Vendor API level 202504 is re-frozen (II)

(This is a reland after addind ag/3386504)

Ignore-AOSP-First: VINTF 202504 Finalization
Bug: 388072383
Test: build
Change-Id: I59e3acae6d39ac371e49cc8588dc822198cb65b4
diff --git a/prebuilts/api/202504/202504_general_sepolicy.conf b/prebuilts/api/202504/202504_general_sepolicy.conf
index e76c7cd..c971e07 100644
--- a/prebuilts/api/202504/202504_general_sepolicy.conf
+++ b/prebuilts/api/202504/202504_general_sepolicy.conf
@@ -9266,6 +9266,39 @@
     attribute tee_service_type;
 #line 459
 
+
+# HAL service used for custom smc filtering project
+
+#line 462
+    
+#line 462
+attribute hal_vm_capabilities;
+#line 462
+expandattribute hal_vm_capabilities true;
+#line 462
+attribute hal_vm_capabilities_client;
+#line 462
+expandattribute hal_vm_capabilities_client true;
+#line 462
+attribute hal_vm_capabilities_server;
+#line 462
+expandattribute hal_vm_capabilities_server false;
+#line 462
+
+#line 462
+neverallow { hal_vm_capabilities_server -halserverdomain } domain:process fork;
+#line 462
+# hal_*_client and halclientdomain attributes are always expanded for
+#line 462
+# performance reasons. Neverallow rules targeting expanded attributes can not be
+#line 462
+# verified by CTS since these attributes are already expanded by that time.
+#line 462
+
+#line 462
+;
+#line 464
+
 #line 1 "system/sepolicy/public/adbd.te"
 # adbd seclabel is specified in init.rc since
 # it lives in the rootfs and has no unique file type.
@@ -9800,6 +9833,13 @@
 type sysfs_uio, sysfs_type, fs_type;
 type sysfs_batteryinfo, fs_type, sysfs_type;
 type sysfs_bluetooth_writable, fs_type, sysfs_type, mlstrustedobject;
+
+
+#line 107
+    type sysfs_cma, fs_type, sysfs_type;
+#line 109
+
+
 type sysfs_devfreq_cur, fs_type, sysfs_type;
 type sysfs_devfreq_dir, fs_type, sysfs_type;
 type sysfs_devices_block, fs_type, sysfs_type;
@@ -9823,9 +9863,9 @@
 type sysfs_rtc, fs_type, sysfs_type;
 
 
-#line 128
+#line 133
     type sysfs_mem_sleep, fs_type, sysfs_type;
-#line 130
+#line 135
 
 
 type sysfs_suspend_stats, fs_type, sysfs_type;
@@ -9843,7 +9883,7 @@
 type sysfs_fs_incfs_features, sysfs_type, fs_type;
 type sysfs_fs_incfs_metrics, sysfs_type, fs_type;
 type sysfs_vendor_sched, sysfs_type, fs_type;
-#line 149
+#line 154
 
 type fs_bpf, fs_type, bpffs_type;
 # TODO: S+ fs_bpf_tethering (used by mainline) should be private
@@ -9927,14 +9967,14 @@
 # Cgroups description file under /system/etc/cgroups.json or
 # API file under /system/etc/task_profiles/cgroups_*.json
 type cgroup_desc_file, system_file_type, file_type;
-#line 235
+#line 240
 
 # Vendor cgroups description file under /vendor/etc/cgroups.json
 type vendor_cgroup_desc_file, vendor_file_type, file_type;
 # Task profiles file under /system/etc/task_profiles.json or
 # API file under /system/etc/task_profiles/task_profiles_*.json
 type task_profiles_file, system_file_type, file_type;
-#line 244
+#line 249
 
 # Vendor task profiles file under /vendor/etc/task_profiles.json
 type vendor_task_profiles_file, vendor_file_type, file_type;
@@ -9976,11 +10016,11 @@
 type vendor_microdroid_file, vendor_file_type, file_type;
 
 
-#line 284
+#line 289
     # boot otas for 16KB developer option
-#line 284
+#line 289
     type vendor_boot_ota_file, vendor_file_type, file_type;
-#line 287
+#line 292
 
 
 # Input configuration
@@ -10298,70 +10338,70 @@
 type pdx_bufferhub_dir, pdx_endpoint_dir_type, file_type;
 
 
-#line 603
+#line 608
 typeattribute pdx_display_dir pdx_display_client_endpoint_dir_type;
-#line 603
+#line 608
 type pdx_display_client_endpoint_socket, pdx_display_client_endpoint_socket_type, pdx_endpoint_socket_type, file_type, coredomain_socket, mlstrustedobject, mlstrustedsubject;
-#line 603
+#line 608
 type pdx_display_client_channel_socket, pdx_display_client_channel_socket_type, pdx_channel_socket_type, coredomain_socket;
-#line 603
+#line 608
 
-#line 603
+#line 608
 
 
-#line 604
+#line 609
 typeattribute pdx_display_dir pdx_display_manager_endpoint_dir_type;
-#line 604
+#line 609
 type pdx_display_manager_endpoint_socket, pdx_display_manager_endpoint_socket_type, pdx_endpoint_socket_type, file_type, coredomain_socket, mlstrustedobject, mlstrustedsubject;
-#line 604
+#line 609
 type pdx_display_manager_channel_socket, pdx_display_manager_channel_socket_type, pdx_channel_socket_type, coredomain_socket;
-#line 604
+#line 609
 
-#line 604
+#line 609
 
 
-#line 605
+#line 610
 typeattribute pdx_display_dir pdx_display_screenshot_endpoint_dir_type;
-#line 605
+#line 610
 type pdx_display_screenshot_endpoint_socket, pdx_display_screenshot_endpoint_socket_type, pdx_endpoint_socket_type, file_type, coredomain_socket, mlstrustedobject, mlstrustedsubject;
-#line 605
+#line 610
 type pdx_display_screenshot_channel_socket, pdx_display_screenshot_channel_socket_type, pdx_channel_socket_type, coredomain_socket;
-#line 605
+#line 610
 
-#line 605
+#line 610
 
 
-#line 606
+#line 611
 typeattribute pdx_display_dir pdx_display_vsync_endpoint_dir_type;
-#line 606
+#line 611
 type pdx_display_vsync_endpoint_socket, pdx_display_vsync_endpoint_socket_type, pdx_endpoint_socket_type, file_type, coredomain_socket, mlstrustedobject, mlstrustedsubject;
-#line 606
+#line 611
 type pdx_display_vsync_channel_socket, pdx_display_vsync_channel_socket_type, pdx_channel_socket_type, coredomain_socket;
-#line 606
+#line 611
 
-#line 606
+#line 611
 
 
-#line 607
+#line 612
 typeattribute pdx_performance_dir pdx_performance_client_endpoint_dir_type;
-#line 607
+#line 612
 type pdx_performance_client_endpoint_socket, pdx_performance_client_endpoint_socket_type, pdx_endpoint_socket_type, file_type, coredomain_socket, mlstrustedobject, mlstrustedsubject;
-#line 607
+#line 612
 type pdx_performance_client_channel_socket, pdx_performance_client_channel_socket_type, pdx_channel_socket_type, coredomain_socket;
-#line 607
+#line 612
 
-#line 607
+#line 612
 
 
-#line 608
+#line 613
 typeattribute pdx_bufferhub_dir pdx_bufferhub_client_endpoint_dir_type;
-#line 608
+#line 613
 type pdx_bufferhub_client_endpoint_socket, pdx_bufferhub_client_endpoint_socket_type, pdx_endpoint_socket_type, file_type, coredomain_socket, mlstrustedobject, mlstrustedsubject;
-#line 608
+#line 613
 type pdx_bufferhub_client_channel_socket, pdx_bufferhub_client_channel_socket_type, pdx_channel_socket_type, coredomain_socket;
-#line 608
+#line 613
 
-#line 608
+#line 613
 
 
 # file_contexts files
@@ -10410,11 +10450,11 @@
 type audiohal_data_file, file_type, data_file_type, core_data_file_type;
 
 
-#line 655
+#line 660
     type sysfs_udc, fs_type, sysfs_type;
-#line 655
+#line 660
     type tee_service_contexts_file, system_file_type, file_type;
-#line 658
+#line 663
 
 
 # system/sepolicy/public is for vendor-facing type and attribute definitions.
@@ -16673,17 +16713,12 @@
 type activity_task_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
 type adb_service, system_api_service, system_server_service, service_manager_type;
 type adservices_manager_service, system_api_service, system_server_service, service_manager_type;
-
-#line 69
-    type advanced_protection_service, app_api_service, system_server_service, service_manager_type;
-#line 71
-
 type alarm_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
 type app_binding_service, system_server_service, service_manager_type;
 
-#line 74
+#line 71
     type app_function_service, app_api_service, system_server_service, service_manager_type;
-#line 76
+#line 73
 
 type app_hibernation_service, app_api_service, system_api_service, system_server_service, service_manager_type;
 type app_integrity_service, system_api_service, system_server_service, service_manager_type;
@@ -16755,11 +16790,6 @@
 type platform_compat_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
 type face_service, app_api_service, system_server_service, service_manager_type;
 type fingerprint_service, app_api_service, system_server_service, service_manager_type;
-
-#line 147
-    type forensic_service, app_api_service, system_api_service, system_server_service, service_manager_type;
-#line 149
-
 type fwk_altitude_service, system_server_service, service_manager_type;
 type fwk_stats_service, app_api_service, system_server_service, service_manager_type;
 type fwk_sensor_service, system_server_service, service_manager_type;
@@ -16779,9 +16809,9 @@
 type input_method_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
 type input_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
 
-#line 168
+#line 162
     type intrusion_detection_service, app_api_service, system_api_service, system_server_service, service_manager_type;
-#line 170
+#line 164
 
 type ipsec_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
 type iris_service, app_api_service, system_server_service, service_manager_type;
@@ -16798,9 +16828,9 @@
 type media_metrics_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
 type media_projection_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
 
-#line 185
+#line 179
     type media_quality_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
-#line 187
+#line 181
 
 type media_router_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
 type media_session_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
@@ -16910,9 +16940,9 @@
 type wifinl80211_service, service_manager_type;
 type wifiaware_service, app_api_service, system_server_service, service_manager_type;
 
-#line 295
+#line 289
    type wifi_usd_service, app_api_service, system_server_service, service_manager_type;
-#line 297
+#line 291
 
 type window_service, system_api_service, system_server_service, service_manager_type;
 type inputflinger_service, system_api_service, system_server_service, service_manager_type;
@@ -16956,9 +16986,9 @@
 type hal_light_service, protected_service, hal_service_type, service_manager_type;
 type hal_macsec_service, protected_service, hal_service_type, service_manager_type;
 
-#line 339
+#line 333
     type hal_mediaquality_service, protected_service, hal_service_type, service_manager_type;
-#line 341
+#line 335
 
 type hal_memtrack_service, protected_service, hal_service_type, service_manager_type;
 type hal_neuralnetworks_service, hal_service_type, service_manager_type;
@@ -16997,6 +17027,11 @@
 type hal_wifi_supplicant_service, protected_service, hal_service_type, service_manager_type;
 type hal_gatekeeper_service, protected_service, hal_service_type, service_manager_type;
 
+#line 372
+    type hal_vm_capabilities_service, protected_service, hal_service_type, service_manager_type;
+#line 374
+
+
 # system/sepolicy/public is for vendor-facing type and attribute definitions.
 # DO NOT ADD allow, neverallow, or dontaudit statements here.
 # Instead, add such policy rules to system/sepolicy/private/*.te.
@@ -17289,6 +17324,20 @@
 # system/sepolicy/public is for vendor-facing type and attribute definitions.
 # DO NOT ADD allow, neverallow, or dontaudit statements here.
 # Instead, add such policy rules to system/sepolicy/private/*.te.
+#line 1 "system/sepolicy/public/virtual_camera.te"
+# virtual_camera - virtual camera daemon
+
+
+#line 3
+    type virtual_camera, domain, coredomain;
+#line 3
+    type virtual_camera_exec, system_file_type, exec_type, file_type;
+#line 6
+
+
+# system/sepolicy/public is for vendor-facing type and attribute definitions.
+# DO NOT ADD allow, neverallow, or dontaudit statements here.
+# Instead, add such policy rules to system/sepolicy/private/*.te.
 #line 1 "system/sepolicy/public/virtual_touchpad.te"
 type virtual_touchpad, domain;
 type virtual_touchpad_exec, system_file_type, exec_type, file_type;
@@ -17432,6 +17481,9 @@
 
 #line 33
 
+
+#line 37
+
 #line 1 "system/sepolicy/private/aconfigd.te"
 # aconfigd -- manager for aconfig flags
 type aconfigd, domain, coredomain, mlstrustedsubject;
@@ -19500,21 +19552,30 @@
 allow { appdomain -isolated_app_all -mlstrustedsubject -sdk_sandbox_all } {
   app_data_file
   privapp_data_file
-  
+  storage_area_content_file
 }:dir { create reparent rename rmdir setattr { { open getattr read search ioctl lock watch watch_reads } { open search write add_name remove_name lock } } };
 allow { appdomain -isolated_app_all -mlstrustedsubject -sdk_sandbox_all } {
   app_data_file
   privapp_data_file
-  
+  storage_area_content_file
 }:file { create rename setattr unlink { { getattr open read ioctl lock map watch watch_reads } { open append write lock map } } };
 
+
+#line 258
+  # an app can read but cannot write to its own directory of storage areas
+#line 258
+  allow { appdomain -isolated_app_all -mlstrustedsubject -sdk_sandbox_all } storage_area_app_dir:dir { open getattr read search ioctl lock watch watch_reads };
+#line 258
+  # an app can write to its storage areas
+#line 258
+  allow { appdomain -isolated_app_all -mlstrustedsubject -sdk_sandbox_all } storage_area_dir:dir { { open getattr read search ioctl lock watch watch_reads } { open search write add_name remove_name lock } };
 #line 263
 
 
 allowxperm { appdomain -isolated_app_all -mlstrustedsubject -sdk_sandbox_all } {
   app_data_file
   privapp_data_file
-  
+  storage_area_content_file
 }:file ioctl 0x6686;
 
 # Access via already open fds is ok even for mlstrustedsubject.
@@ -19522,7 +19583,7 @@
   app_data_file
   privapp_data_file
   system_app_data_file
-  
+  storage_area_content_file
 }:file { getattr map read write };
 
 # Access open fds from SDK sandbox
@@ -20268,6 +20329,23 @@
 neverallow appdomain system_font_fallback_file:file { { append create link unlink relabelfrom rename setattr write } open read ioctl lock watch watch_mount watch_sb watch_with_perm watch_reads };
 
 neverallow { appdomain -shell } tombstone_data_file:file ~{ getattr read };
+
+#line 803
+  # Files and directories that apps write to their storage areas
+#line 803
+  # should have type storage_area_content_file
+#line 803
+  type_transition {
+#line 803
+    appdomain
+#line 803
+    -isolated_app_all
+#line 803
+    -ephemeral_app
+#line 803
+    -sdk_sandbox_all
+#line 803
+  } storage_area_dir:{ { file lnk_file sock_file fifo_file } dir } storage_area_content_file;
 #line 812
 
 #line 1 "system/sepolicy/private/app_neverallows.te"
@@ -20775,9 +20853,29 @@
   -runas_app
 } { app_data_file privapp_data_file }:file execute_no_trans;
 
+
+#line 75
+  # block apps from executing files in their storage areas
+#line 75
+  # this is a stronger and more desirable guarantee than blocking execute_no_trans, but
+#line 75
+  # execute cannot be blocked on all of app_data_file without causing
+#line 75
+  # backwards compatibility issues (see b/237289679)
+#line 75
+  neverallow appdomain storage_area_content_file:file execute;
 #line 81
 
 
+
+#line 83
+     # dont allow apps to modify their own directories of storage areas
+#line 83
+    neverallow appdomain storage_area_app_dir:{ dir { { chr_file blk_file } { file lnk_file sock_file fifo_file } } } {
+#line 83
+        create write setattr relabelfrom relabelto append unlink link rename
+#line 83
+    };
 #line 88
 
 
@@ -21313,7 +21411,7 @@
   file_type
   -app_data_file            # The apps sandbox itself
   -privapp_data_file
-  
+  -storage_area_content_file
   -app_exec_data_file       # stored within the app sandbox directory
   -media_rw_data_file       # Internal storage. Known that apps can
                             # leave artfacts here after uninstall.
@@ -28275,7 +28373,7 @@
   apk_data_file
   app_data_file
   privapp_data_file
-  
+  storage_area_content_file
   vm_data_file
   
 }:file open;
@@ -28912,6 +29010,7 @@
   system_file
   system_lib_file
   tmpfs
+  vendor_configs_file
   vendor_file
 }:dir mounton;
 
@@ -28938,11 +29037,11 @@
 
 # Allow reading /apex in chroot.
 
-#line 104
+#line 105
 allow dexopt_chroot_setup apex_mnt_dir:dir { open getattr read search ioctl lock watch watch_reads };
-#line 104
+#line 105
 allow dexopt_chroot_setup apex_mnt_dir:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 104
+#line 105
 
 allow dexopt_chroot_setup apex_info_file:file { getattr open read ioctl lock map watch watch_reads };
 
@@ -28969,95 +29068,95 @@
 
 # Allow running other binaries in their own domains.
 
-#line 129
+#line 130
 # Allow the necessary permissions.
-#line 129
+#line 130
 
-#line 129
+#line 130
 # Old domain may exec the file and transition to the new domain.
-#line 129
+#line 130
 allow dexopt_chroot_setup apexd_exec:file { getattr open read execute map };
-#line 129
+#line 130
 allow dexopt_chroot_setup apexd:process transition;
-#line 129
+#line 130
 # New domain is entered by executing the file.
-#line 129
+#line 130
 allow apexd apexd_exec:file { entrypoint open read execute getattr map };
-#line 129
+#line 130
 # New domain can send SIGCHLD to its caller.
-#line 129
+#line 130
 allow apexd dexopt_chroot_setup:process sigchld;
-#line 129
+#line 130
 # Enable AT_SECURE, i.e. libc secure mode.
-#line 129
+#line 130
 dontaudit dexopt_chroot_setup apexd:process noatsecure;
-#line 129
+#line 130
 # XXX dontaudit candidate but requires further study.
-#line 129
+#line 130
 allow dexopt_chroot_setup apexd:process { siginh rlimitinh };
-#line 129
+#line 130
 
-#line 129
+#line 130
 # Make the transition occur by default.
-#line 129
+#line 130
 type_transition dexopt_chroot_setup apexd_exec:process apexd;
-#line 129
-
-
 #line 130
+
+
+#line 131
 # Allow the necessary permissions.
-#line 130
+#line 131
 
-#line 130
+#line 131
 # Old domain may exec the file and transition to the new domain.
-#line 130
+#line 131
 allow dexopt_chroot_setup linkerconfig_exec:file { getattr open read execute map };
-#line 130
+#line 131
 allow dexopt_chroot_setup linkerconfig:process transition;
-#line 130
+#line 131
 # New domain is entered by executing the file.
-#line 130
+#line 131
 allow linkerconfig linkerconfig_exec:file { entrypoint open read execute getattr map };
-#line 130
+#line 131
 # New domain can send SIGCHLD to its caller.
-#line 130
+#line 131
 allow linkerconfig dexopt_chroot_setup:process sigchld;
-#line 130
+#line 131
 # Enable AT_SECURE, i.e. libc secure mode.
-#line 130
+#line 131
 dontaudit dexopt_chroot_setup linkerconfig:process noatsecure;
-#line 130
+#line 131
 # XXX dontaudit candidate but requires further study.
-#line 130
+#line 131
 allow dexopt_chroot_setup linkerconfig:process { siginh rlimitinh };
-#line 130
+#line 131
 
-#line 130
+#line 131
 # Make the transition occur by default.
-#line 130
+#line 131
 type_transition dexopt_chroot_setup linkerconfig_exec:process linkerconfig;
-#line 130
+#line 131
 
 
 # Allow running snapshotctl through init, to map and unmap block devices.
 
-#line 133
+#line 134
 
-#line 133
+#line 134
 allow dexopt_chroot_setup property_socket:sock_file write;
-#line 133
+#line 134
 allow dexopt_chroot_setup init:unix_stream_socket connectto;
-#line 133
+#line 134
 
-#line 133
+#line 134
 allow dexopt_chroot_setup snapshotctl_prop:property_service set;
-#line 133
+#line 134
 
-#line 133
+#line 134
 allow dexopt_chroot_setup snapshotctl_prop:file { getattr open read map };
-#line 133
+#line 134
 
-#line 133
+#line 134
 
 
 # Allow accessing /data/app/..., to bind-mount dirs for incremental apps.
@@ -32654,9 +32753,22 @@
 } {
   privapp_data_file
   app_data_file
-  
+  storage_area_content_file
 }:{ dir { { chr_file blk_file } { file lnk_file sock_file fifo_file } } } { create unlink };
 
+
+#line 1643
+  neverallow {
+#line 1643
+    domain
+#line 1643
+    -artd # compile secondary dex files
+#line 1643
+    -installd # creation of sandbox
+#line 1643
+    -vold_prepare_subdirs # creation of storage area directories
+#line 1643
+  } {storage_area_app_dir storage_area_dir }:dir { create unlink };
 #line 1650
 
 
@@ -32677,12 +32789,56 @@
 } {
   privapp_data_file
   app_data_file
-  
+  storage_area_content_file
 }:dir *;
 
+
+#line 1672
+  neverallow {
+#line 1672
+    domain
+#line 1672
+    -appdomain
+#line 1672
+    -app_zygote
+#line 1672
+    -artd # compile secondary dex files
+#line 1672
+    -installd
+#line 1672
+    -rs # spawned by appdomain, so carryover the exception above
+#line 1672
+    -system_server
+#line 1672
+    -vold # encryption of storage area directories
+#line 1672
+    -vold_prepare_subdirs # creation of storage area directories
+#line 1672
+    -zygote
+#line 1672
+  } { storage_area_dir storage_area_app_dir }:dir *;
 #line 1685
 
 
+
+#line 1687
+  # only vold and installd can access the storage area key files
+#line 1687
+  # (and init, in case of a recursive restorecon)
+#line 1687
+  neverallow {
+#line 1687
+    domain
+#line 1687
+    -init
+#line 1687
+    -vold
+#line 1687
+    -vold_prepare_subdirs
+#line 1687
+    -installd
+#line 1687
+  } { storage_area_key_file }:{ dir { { chr_file blk_file } { file lnk_file sock_file fifo_file } } } *;
 #line 1697
 
 
@@ -32697,9 +32853,26 @@
 } {
   privapp_data_file
   app_data_file
-  
+  storage_area_content_file
 }:dir ~{ open getattr read search ioctl lock watch watch_reads };
 
+
+#line 1713
+  neverallow {
+#line 1713
+    domain
+#line 1713
+    -appdomain
+#line 1713
+    -artd # compile secondary dex files
+#line 1713
+    -installd
+#line 1713
+    -rs # spawned by appdomain, so carryover the exception above
+#line 1713
+    -vold_prepare_subdirs # creation of storage area directories
+#line 1713
+  } { storage_area_dir storage_area_app_dir }:dir ~{ open getattr read search ioctl lock watch watch_reads };
 #line 1722
 
 
@@ -32713,7 +32886,7 @@
 } {
   privapp_data_file
   app_data_file
-  
+  storage_area_content_file
 }:{ { chr_file blk_file } { file lnk_file sock_file fifo_file } } open;
 
 neverallow {
@@ -32724,7 +32897,7 @@
 } {
   privapp_data_file
   app_data_file
-  
+  storage_area_content_file
 }:{ dir { { chr_file blk_file } { file lnk_file sock_file fifo_file } } } { create unlink };
 
 neverallow {
@@ -32734,9 +32907,22 @@
 } {
   privapp_data_file
   app_data_file
-  
+  storage_area_content_file
 }:{ dir { { chr_file blk_file } { file lnk_file sock_file fifo_file } } } { relabelfrom relabelto };
 
+
+#line 1758
+  neverallow {
+#line 1758
+    domain
+#line 1758
+    -artd # compile secondary dex files
+#line 1758
+    -installd
+#line 1758
+    -vold_prepare_subdirs
+#line 1758
+  } { storage_area_dir storage_area_app_dir }:dir { relabelfrom relabelto };
 #line 1765
 
 
@@ -35843,7 +36029,7 @@
 #line 350
 typeattribute dumpstate halclientdomain;
 #line 350
-typeattribute dumpstate hal_weaver_client;
+typeattribute dumpstate hal_vm_capabilities_client;
 #line 350
 
 #line 350
@@ -35855,23 +36041,23 @@
 #line 350
 
 #line 350
-typeattribute dumpstate hal_weaver;
+typeattribute dumpstate hal_vm_capabilities;
 #line 350
 # Find passthrough HAL implementations
 #line 350
-allow hal_weaver system_file:dir { open getattr read search ioctl lock watch watch_reads };
+allow hal_vm_capabilities system_file:dir { open getattr read search ioctl lock watch watch_reads };
 #line 350
-allow hal_weaver vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
+allow hal_vm_capabilities vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
 #line 350
-allow hal_weaver vendor_file:file { read open getattr execute map };
+allow hal_vm_capabilities vendor_file:file { read open getattr execute map };
 #line 350
 
 #line 350
 ;
 #line 350
-  allow hal_weaver_server dumpstate:fifo_file write;
+  allow hal_vm_capabilities_server dumpstate:fifo_file write;
 #line 350
-  allow hal_weaver_server dumpstate:fd use;
+  allow hal_vm_capabilities_server dumpstate:fd use;
 #line 350
 
 
@@ -35880,7 +36066,7 @@
 #line 351
 typeattribute dumpstate halclientdomain;
 #line 351
-typeattribute dumpstate hal_wifi_client;
+typeattribute dumpstate hal_weaver_client;
 #line 351
 
 #line 351
@@ -35892,55 +36078,92 @@
 #line 351
 
 #line 351
-typeattribute dumpstate hal_wifi;
+typeattribute dumpstate hal_weaver;
 #line 351
 # Find passthrough HAL implementations
 #line 351
-allow hal_wifi system_file:dir { open getattr read search ioctl lock watch watch_reads };
+allow hal_weaver system_file:dir { open getattr read search ioctl lock watch watch_reads };
 #line 351
-allow hal_wifi vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
+allow hal_weaver vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
 #line 351
-allow hal_wifi vendor_file:file { read open getattr execute map };
+allow hal_weaver vendor_file:file { read open getattr execute map };
 #line 351
 
 #line 351
 ;
 #line 351
+  allow hal_weaver_server dumpstate:fifo_file write;
+#line 351
+  allow hal_weaver_server dumpstate:fd use;
+#line 351
+
+
+#line 352
+  
+#line 352
+typeattribute dumpstate halclientdomain;
+#line 352
+typeattribute dumpstate hal_wifi_client;
+#line 352
+
+#line 352
+# TODO(b/34170079): Make the inclusion of the rules below conditional also on
+#line 352
+# non-Treble devices. For now, on non-Treble device, always grant clients of a
+#line 352
+# HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
+#line 352
+
+#line 352
+typeattribute dumpstate hal_wifi;
+#line 352
+# Find passthrough HAL implementations
+#line 352
+allow hal_wifi system_file:dir { open getattr read search ioctl lock watch watch_reads };
+#line 352
+allow hal_wifi vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
+#line 352
+allow hal_wifi vendor_file:file { read open getattr execute map };
+#line 352
+
+#line 352
+;
+#line 352
   allow hal_wifi_server dumpstate:fifo_file write;
-#line 351
+#line 352
   allow hal_wifi_server dumpstate:fd use;
-#line 351
+#line 352
 
 
 # Vibrate the device after we are done collecting the bugreport
 
-#line 354
+#line 355
 typeattribute dumpstate halclientdomain;
-#line 354
+#line 355
 typeattribute dumpstate hal_vibrator_client;
-#line 354
+#line 355
 
-#line 354
+#line 355
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 354
+#line 355
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 354
+#line 355
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 354
+#line 355
 
-#line 354
+#line 355
 typeattribute dumpstate hal_vibrator;
-#line 354
+#line 355
 # Find passthrough HAL implementations
-#line 354
+#line 355
 allow hal_vibrator system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 354
+#line 355
 allow hal_vibrator vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 354
+#line 355
 allow hal_vibrator vendor_file:file { read open getattr execute map };
-#line 354
+#line 355
 
-#line 354
+#line 355
 
 
 # Reading /proc/PID/maps of other processes
@@ -35979,37 +36202,37 @@
 
 # logd access
 
-#line 391
+#line 392
 allow dumpstate logcat_exec:file { { getattr open read ioctl lock map watch watch_reads } { getattr execute execute_no_trans map } };
-#line 391
+#line 392
 
-#line 391
+#line 392
 allow dumpstate logdr_socket:sock_file write;
-#line 391
+#line 392
 allow dumpstate logd:unix_stream_socket connectto;
-#line 391
-
-#line 391
-
+#line 392
 
 #line 392
+
+
+#line 393
 # Group AID_LOG checked by filesystem & logd
-#line 392
+#line 393
 # to permit control commands
-#line 392
+#line 393
 
-#line 392
+#line 393
 allow dumpstate logd_socket:sock_file write;
-#line 392
+#line 393
 allow dumpstate logd:unix_stream_socket connectto;
-#line 392
-
-#line 392
-
+#line 393
 
 #line 393
+
+
+#line 394
 allow dumpstate runtime_event_log_tags_file:file { getattr open read ioctl lock map watch watch_reads };
-#line 393
+#line 394
 
 
 # Read files in /proc
@@ -36058,7 +36281,7 @@
 allow dumpstate snapuserd_log_data_file:file { getattr open read ioctl lock map watch watch_reads };
 
 # Access /data/misc/profiles/{cur,ref}/
-#line 444
+#line 445
 
 
 # Access /data/misc/logd
@@ -36080,6 +36303,7 @@
   -hal_service_type
   -virtual_touchpad_service
   -vold_service
+  -fwk_vold_service
   -default_android_service
 }:service_manager find;
 # suppress denials for services dumpstate should not be accessing.
@@ -36090,6 +36314,7 @@
   hal_service_type
   virtual_touchpad_service
   vold_service
+  fwk_vold_service
 }:service_manager find;
 
 # Most of these are neverallowed.
@@ -36102,9 +36327,9 @@
 
 # Read any system properties
 
-#line 486
+#line 489
 allow dumpstate property_type:file { getattr open read map };
-#line 486
+#line 489
 
 
 # Access to /data/media.
@@ -36116,19 +36341,19 @@
 
 # Create a service for talking back to system_server
 
-#line 496
+#line 499
   allow dumpstate dumpstate_service:service_manager { add find };
-#line 496
+#line 499
   neverallow { domain -dumpstate } dumpstate_service:service_manager add;
-#line 496
+#line 499
 
-#line 496
+#line 499
   # On debug builds with root, allow binder services to use binder over TCP.
-#line 496
+#line 499
   # Not using rw_socket_perms_no_ioctl to avoid granting too many permissions.
-#line 496
+#line 499
   
-#line 496
+#line 499
 
 
 # use /dev/ion for screen capture
@@ -36146,19 +36371,19 @@
 
 # Allow dumpstate to talk to installd over binder
 
-#line 512
+#line 515
 # Call the server domain and optionally transfer references to it.
-#line 512
+#line 515
 allow dumpstate installd:binder { call transfer };
-#line 512
+#line 515
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 512
+#line 515
 allow installd dumpstate:binder transfer;
-#line 512
+#line 515
 # Receive and use open files from the server.
-#line 512
+#line 515
 allow dumpstate installd:fd use;
-#line 512
+#line 515
 ;
 
 # Allow dumpstate to run ip xfrm policy
@@ -36195,36 +36420,36 @@
 
 # Allow dumpstate to talk to bufferhubd over binder
 
-#line 547
+#line 550
 # Call the server domain and optionally transfer references to it.
-#line 547
+#line 550
 allow dumpstate bufferhubd:binder { call transfer };
-#line 547
+#line 550
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 547
+#line 550
 allow bufferhubd dumpstate:binder transfer;
-#line 547
+#line 550
 # Receive and use open files from the server.
-#line 547
+#line 550
 allow dumpstate bufferhubd:fd use;
-#line 547
+#line 550
 ;
 
 # Allow dumpstate to talk to mediaswcodec over binder
 
-#line 550
+#line 553
 # Call the server domain and optionally transfer references to it.
-#line 550
+#line 553
 allow dumpstate mediaswcodec:binder { call transfer };
-#line 550
+#line 553
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 550
+#line 553
 allow mediaswcodec dumpstate:binder transfer;
-#line 550
+#line 553
 # Receive and use open files from the server.
-#line 550
+#line 553
 allow dumpstate mediaswcodec:fd use;
-#line 550
+#line 553
 ;
 
 #Access /data/misc/snapshotctl_log
@@ -36238,19 +36463,19 @@
 allow dumpstate binderfs_logs_stats:file { getattr open read ioctl lock map watch watch_reads };
 
 
-#line 562
+#line 565
   allow dumpstate apex_mnt_dir:dir { open getattr read search ioctl lock watch watch_reads };
-#line 562
+#line 565
   allow dumpstate apex_info_file:file { getattr open read ioctl lock map watch watch_reads };
-#line 562
+#line 565
   
-#line 562
+#line 565
 allow dumpstate vendor_apex_metadata_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 562
+#line 565
 allow dumpstate vendor_apex_metadata_file:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 562
+#line 565
 
-#line 562
+#line 565
 
 
 # Allow reading files under /data/system/shutdown-checkpoints/
@@ -47162,6 +47387,82 @@
 
 # Allow HAL vibrator to control some parameters of a vibration, such as scaling.
 allow hal_vibrator fwk_vibrator_control_service:service_manager find;
+#line 1 "system/sepolicy/private/hal_vm_capabilities.te"
+# Domain for the VM capability HAL, which is used to allow some pVMs to issue
+# vendor-specific SMCs.
+
+
+#line 4
+# Call the server domain and optionally transfer references to it.
+#line 4
+allow hal_vm_capabilities_client hal_vm_capabilities_server:binder { call transfer };
+#line 4
+# Allow the serverdomain to transfer references to the client on the reply.
+#line 4
+allow hal_vm_capabilities_server hal_vm_capabilities_client:binder transfer;
+#line 4
+# Receive and use open files from the server.
+#line 4
+allow hal_vm_capabilities_client hal_vm_capabilities_server:fd use;
+#line 4
+
+
+
+#line 6
+  allow hal_vm_capabilities_client hal_vm_capabilities_service:service_manager find;
+#line 6
+  
+#line 6
+  allow hal_vm_capabilities_server hal_vm_capabilities_service:service_manager { add find };
+#line 6
+  neverallow { domain -hal_vm_capabilities_server } hal_vm_capabilities_service:service_manager add;
+#line 6
+
+#line 6
+  # On debug builds with root, allow binder services to use binder over TCP.
+#line 6
+  # Not using rw_socket_perms_no_ioctl to avoid granting too many permissions.
+#line 6
+  
+#line 6
+
+#line 6
+
+#line 6
+  
+#line 6
+
+
+
+#line 8
+# Call the servicemanager and transfer references to it.
+#line 8
+allow hal_vm_capabilities_client servicemanager:binder { call transfer };
+#line 8
+# Allow servicemanager to send out callbacks
+#line 8
+allow servicemanager hal_vm_capabilities_client:binder { call transfer };
+#line 8
+# rw access to /dev/binder and /dev/ashmem is presently granted to
+#line 8
+# all domains in domain.te.
+#line 8
+
+
+#line 9
+# Call the servicemanager and transfer references to it.
+#line 9
+allow hal_vm_capabilities_server servicemanager:binder { call transfer };
+#line 9
+# Allow servicemanager to send out callbacks
+#line 9
+allow servicemanager hal_vm_capabilities_server:binder { call transfer };
+#line 9
+# rw access to /dev/binder and /dev/ashmem is presently granted to
+#line 9
+# all domains in domain.te.
+#line 9
+
 #line 1 "system/sepolicy/private/hal_vr.te"
 # HwBinder IPC from client to server, and callbacks
 
@@ -49910,6 +50211,14 @@
   file_type
   -app_data_file
   
+#line 318
+    -storage_area_dir
+#line 318
+    -storage_area_app_dir
+#line 318
+    -storage_area_content_file
+#line 318
+  
 #line 323
   -vm_data_file
   -bpffs_type
@@ -49927,6 +50236,14 @@
   file_type
   -app_data_file
   
+#line 338
+    -storage_area_dir
+#line 338
+    -storage_area_app_dir
+#line 338
+    -storage_area_content_file
+#line 338
+  
 #line 343
   -vm_data_file
   -bpffs_type
@@ -49952,6 +50269,14 @@
   -apex_info_file
   -app_data_file
   
+#line 366
+    -storage_area_dir
+#line 366
+    -storage_area_app_dir
+#line 366
+    -storage_area_content_file
+#line 366
+  
 #line 371
   -vm_data_file
   -bpffs_type
@@ -49988,6 +50313,14 @@
   file_type
   -app_data_file
   
+#line 399
+    -storage_area_dir
+#line 399
+    -storage_area_app_dir
+#line 399
+    -storage_area_content_file
+#line 399
+  
 #line 404
   -vm_data_file
   -bpffs_type
@@ -50011,6 +50344,14 @@
   -apex_mnt_dir
   -app_data_file
   
+#line 425
+    -storage_area_dir
+#line 425
+    -storage_area_app_dir
+#line 425
+    -storage_area_content_file
+#line 425
+  
 #line 430
   -vm_data_file
   -bpffs_type
@@ -50040,6 +50381,14 @@
   -exec_type
   -app_data_file
   
+#line 457
+    -storage_area_dir
+#line 457
+    -storage_area_app_dir
+#line 457
+    -storage_area_content_file
+#line 457
+  
 #line 462
   -vm_data_file
   -privapp_data_file
@@ -51191,6 +51540,17 @@
 allow installd vold:fd use;
 
 # on app uninstall, installd deletes the storage area keys for the app
+
+#line 221
+  allow installd storage_area_key_file:dir {
+#line 221
+    open search write remove_name
+#line 221
+    lock read getattr rmdir
+#line 221
+  };
+#line 221
+  allow installd storage_area_key_file:file unlink;
 #line 227
 
 
@@ -55938,7 +56298,205 @@
 #line 35
 };
 
-#line 18 "system/sepolicy/private/microfuchsiad.te"
+#line 1 "system/sepolicy/private/microfuchsiad.te"
+
+#line 1
+    type microfuchsiad, domain, coredomain;
+#line 1
+    type microfuchsiad_exec, system_file_type, exec_type, file_type;
+#line 1
+
+#line 1
+    # Host dynamic AIDL services
+#line 1
+    
+#line 1
+
+#line 1
+# Allow the necessary permissions.
+#line 1
+
+#line 1
+# Old domain may exec the file and transition to the new domain.
+#line 1
+allow init microfuchsiad_exec:file { getattr open read execute map };
+#line 1
+allow init microfuchsiad:process transition;
+#line 1
+# New domain is entered by executing the file.
+#line 1
+allow microfuchsiad microfuchsiad_exec:file { entrypoint open read execute getattr map };
+#line 1
+# New domain can send SIGCHLD to its caller.
+#line 1
+
+#line 1
+# Enable AT_SECURE, i.e. libc secure mode.
+#line 1
+dontaudit init microfuchsiad:process noatsecure;
+#line 1
+# XXX dontaudit candidate but requires further study.
+#line 1
+allow init microfuchsiad:process { siginh rlimitinh };
+#line 1
+
+#line 1
+# Make the transition occur by default.
+#line 1
+type_transition init microfuchsiad_exec:process microfuchsiad;
+#line 1
+
+#line 1
+
+#line 1
+    
+#line 1
+# Call the servicemanager and transfer references to it.
+#line 1
+allow microfuchsiad servicemanager:binder { call transfer };
+#line 1
+# Allow servicemanager to send out callbacks
+#line 1
+allow servicemanager microfuchsiad:binder { call transfer };
+#line 1
+# rw access to /dev/binder and /dev/ashmem is presently granted to
+#line 1
+# all domains in domain.te.
+#line 1
+
+#line 1
+    
+#line 1
+  allow microfuchsiad microfuchsia_service:service_manager { add find };
+#line 1
+  neverallow { domain -microfuchsiad } microfuchsia_service:service_manager add;
+#line 1
+
+#line 1
+  # On debug builds with root, allow binder services to use binder over TCP.
+#line 1
+  # Not using rw_socket_perms_no_ioctl to avoid granting too many permissions.
+#line 1
+  
+#line 1
+
+#line 1
+
+#line 1
+    # Call back into system server
+#line 1
+    
+#line 1
+# Call the server domain and optionally transfer references to it.
+#line 1
+allow microfuchsiad system_server:binder { call transfer };
+#line 1
+# Allow the serverdomain to transfer references to the client on the reply.
+#line 1
+allow system_server microfuchsiad:binder transfer;
+#line 1
+# Receive and use open files from the server.
+#line 1
+allow microfuchsiad system_server:fd use;
+#line 1
+
+#line 1
+
+#line 1
+    # Start a VM
+#line 1
+    
+#line 1
+# Transition to virtualizationmanager when the client executes it.
+#line 1
+
+#line 1
+# Allow the necessary permissions.
+#line 1
+
+#line 1
+# Old domain may exec the file and transition to the new domain.
+#line 1
+allow microfuchsiad virtualizationmanager_exec:file { getattr open read execute map };
+#line 1
+allow microfuchsiad virtualizationmanager:process transition;
+#line 1
+# New domain is entered by executing the file.
+#line 1
+allow virtualizationmanager virtualizationmanager_exec:file { entrypoint open read execute getattr map };
+#line 1
+# New domain can send SIGCHLD to its caller.
+#line 1
+allow virtualizationmanager microfuchsiad:process sigchld;
+#line 1
+# Enable AT_SECURE, i.e. libc secure mode.
+#line 1
+dontaudit microfuchsiad virtualizationmanager:process noatsecure;
+#line 1
+# XXX dontaudit candidate but requires further study.
+#line 1
+allow microfuchsiad virtualizationmanager:process { siginh rlimitinh };
+#line 1
+
+#line 1
+# Make the transition occur by default.
+#line 1
+type_transition microfuchsiad virtualizationmanager_exec:process virtualizationmanager;
+#line 1
+
+#line 1
+# Allow virtualizationmanager to communicate over UDS with the client.
+#line 1
+allow { virtualizationmanager crosvm } microfuchsiad:unix_stream_socket { ioctl getattr read write };
+#line 1
+# Let the client pass file descriptors to virtualizationmanager and on to crosvm.
+#line 1
+allow { virtualizationmanager crosvm } microfuchsiad:fd use;
+#line 1
+# Let the client use file descriptors created by virtualizationmanager.
+#line 1
+allow microfuchsiad virtualizationmanager:fd use;
+#line 1
+# Allow piping console log to the client
+#line 1
+allow { virtualizationmanager crosvm } microfuchsiad:fifo_file { ioctl getattr read write };
+#line 1
+# Allow client to read/write vsock created by virtualizationmanager to communicate with the VM
+#line 1
+# that it created. Notice that we do not grant permission to create a vsock;
+#line 1
+# the client can only connect to VMs that it owns.
+#line 1
+allow microfuchsiad virtualizationmanager:vsock_socket { getattr getopt read write };
+#line 1
+# Allow client to inspect hypervisor capabilities
+#line 1
+
+#line 1
+allow microfuchsiad hypervisor_prop:file { getattr open read map };
+#line 1
+
+#line 1
+# Allow client to read (but not open) the crashdump provided by virtualizationmanager
+#line 1
+allow microfuchsiad virtualizationservice_data_file:file { getattr read };
+#line 1
+# Allow virtualizationmanager to read the path of the client using /proc/{PID}/exe
+#line 1
+allow virtualizationmanager microfuchsiad:dir search;
+#line 1
+allow virtualizationmanager microfuchsiad:file read;
+#line 1
+allow virtualizationmanager microfuchsiad:lnk_file read;
+#line 1
+
+#line 1
+
+#line 1
+    # Create pty devices
+#line 1
+    allow microfuchsiad devpts:chr_file { read write open getattr ioctl };
+#line 18
 
 #line 1 "system/sepolicy/private/migrate_legacy_obb_data.te"
 type migrate_legacy_obb_data, domain, coredomain;
@@ -56065,7 +56623,7 @@
 } {
   app_data_file
   privapp_data_file
-  
+  storage_area_content_file
 }:file ~{ read write map getattr ioctl lock append };
 
 neverallow {
@@ -56075,9 +56633,24 @@
 } {
   app_data_file
   privapp_data_file
-  
+  storage_area_content_file
 }:dir ~{ read getattr search };
 
+
+#line 27
+  neverallow {
+#line 27
+    mlstrustedsubject
+#line 27
+    -artd # compile secondary dex files
+#line 27
+    -installd
+#line 27
+    -vold # encryption of storage areas
+#line 27
+    -vold_prepare_subdirs # creation of storage area directories
+#line 27
+  } { storage_area_dir storage_area_app_dir }:dir ~{ read getattr search };
 #line 35
 
 
@@ -56092,9 +56665,32 @@
 } {
   app_data_file
   privapp_data_file
-  
+  storage_area_content_file
 }:dir { read getattr search };
 
+
+#line 51
+  neverallow {
+#line 51
+    mlstrustedsubject
+#line 51
+    -artd # compile secondary dex files
+#line 51
+    -installd
+#line 51
+    -system_server
+#line 51
+    -adbd
+#line 51
+    -runas
+#line 51
+    -vold # encryption of storage area directories
+#line 51
+    -vold_prepare_subdirs # creation of storage area directories
+#line 51
+    -zygote
+#line 51
+  } { storage_area_dir storage_area_app_dir }:dir { read getattr search };
 #line 63
 
 #line 1 "system/sepolicy/private/mm_events.te"
@@ -65857,6 +66453,9 @@
     type vmnic_service,        service_manager_type;
 #line 57
 
+
+#line 58
+    type microfuchsia_service,          service_manager_type;
 #line 60
 
 
@@ -65865,11 +66464,15 @@
 type wearable_sensing_service,         app_api_service, system_server_service, service_manager_type;
 type wifi_mainline_supplicant_service, service_manager_type;
 type dynamic_instrumentation_service,  app_api_service, system_server_service, service_manager_type;
+type advanced_protection_service,      app_api_service, system_server_service, service_manager_type;
 
 
-#line 68
+#line 69
     type ranging_service, app_api_service, system_server_service, service_manager_type;
-#line 70
+#line 71
+
+
+#line 75
 
 
 ###
@@ -69678,7 +70281,7 @@
 ###
 neverallow storaged domain:process ptrace;
 neverallow storaged self:{ capability capability2 cap_userns cap2_userns } *;
-#line 135 "system/sepolicy/private/su.te"
+#line 136 "system/sepolicy/private/su.te"
 
 #line 1 "system/sepolicy/private/surfaceflinger.te"
 # surfaceflinger - display compositor service
@@ -71742,6 +72345,13 @@
 # Read /sys/kernel/dma_heap/*.
 allow system_server sysfs_dma_heap:file { getattr open read ioctl lock map watch watch_reads };
 
+# Read /sys/kernel/mm/cma/*.
+
+#line 247
+allow system_server sysfs_cma:file { getattr open read ioctl lock map watch watch_reads };
+#line 249
+
+
 # Allow reading DMA-BUF sysfs stats from /sys/kernel/dmabuf.
 allow system_server sysfs_dmabuf_stats:dir { open getattr read search ioctl lock watch watch_reads };
 allow system_server sysfs_dmabuf_stats:file { getattr open read ioctl lock map watch watch_reads };
@@ -71761,34 +72371,34 @@
 
 # Talk to init and various daemons via sockets.
 
-#line 264
+#line 269
 allow system_server lmkd_socket:sock_file write;
-#line 264
+#line 269
 allow system_server lmkd:unix_stream_socket connectto;
-#line 264
+#line 269
 
 
-#line 265
+#line 270
 allow system_server zygote_socket:sock_file write;
-#line 265
+#line 270
 allow system_server zygote:unix_stream_socket connectto;
-#line 265
+#line 270
 
 
-#line 266
+#line 271
 allow system_server uncrypt_socket:sock_file write;
-#line 266
+#line 271
 allow system_server uncrypt:unix_stream_socket connectto;
-#line 266
+#line 271
 
 
 # Allow system_server to write to statsd.
 
-#line 269
+#line 274
 allow system_server statsdw_socket:sock_file write;
-#line 269
+#line 274
 allow system_server statsd:unix_dgram_socket sendto;
-#line 269
+#line 274
 
 
 # Communicate over a socket created by surfaceflinger.
@@ -71804,1782 +72414,1782 @@
 
 # Perform Binder IPC.
 
-#line 283
+#line 288
 # Call the servicemanager and transfer references to it.
-#line 283
+#line 288
 allow system_server servicemanager:binder { call transfer };
-#line 283
+#line 288
 # Allow servicemanager to send out callbacks
-#line 283
+#line 288
 allow servicemanager system_server:binder { call transfer };
-#line 283
+#line 288
 # rw access to /dev/binder and /dev/ashmem is presently granted to
-#line 283
+#line 288
 # all domains in domain.te.
-#line 283
+#line 288
 
 
-#line 284
+#line 289
 # Call the server domain and optionally transfer references to it.
-#line 284
+#line 289
 allow system_server appdomain:binder { call transfer };
-#line 284
+#line 289
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 284
+#line 289
 allow appdomain system_server:binder transfer;
-#line 284
+#line 289
 # Receive and use open files from the server.
-#line 284
+#line 289
 allow system_server appdomain:fd use;
-#line 284
+#line 289
 
 
-#line 285
+#line 290
 # Call the server domain and optionally transfer references to it.
-#line 285
+#line 290
 allow system_server artd:binder { call transfer };
-#line 285
+#line 290
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 285
+#line 290
 allow artd system_server:binder transfer;
-#line 285
+#line 290
 # Receive and use open files from the server.
-#line 285
+#line 290
 allow system_server artd:fd use;
-#line 285
+#line 290
 
 
-#line 286
+#line 291
 # Call the server domain and optionally transfer references to it.
-#line 286
+#line 291
 allow system_server binderservicedomain:binder { call transfer };
-#line 286
+#line 291
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 286
+#line 291
 allow binderservicedomain system_server:binder transfer;
-#line 286
+#line 291
 # Receive and use open files from the server.
-#line 286
+#line 291
 allow system_server binderservicedomain:fd use;
-#line 286
+#line 291
 
 
-#line 287
+#line 292
 # Call the server domain and optionally transfer references to it.
-#line 287
+#line 292
 allow system_server composd:binder { call transfer };
-#line 287
+#line 292
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 287
+#line 292
 allow composd system_server:binder transfer;
-#line 287
+#line 292
 # Receive and use open files from the server.
-#line 287
+#line 292
 allow system_server composd:fd use;
-#line 287
+#line 292
 
 
-#line 288
+#line 293
 # Call the server domain and optionally transfer references to it.
-#line 288
+#line 293
 allow system_server dexopt_chroot_setup:binder { call transfer };
-#line 288
+#line 293
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 288
+#line 293
 allow dexopt_chroot_setup system_server:binder transfer;
-#line 288
+#line 293
 # Receive and use open files from the server.
-#line 288
+#line 293
 allow system_server dexopt_chroot_setup:fd use;
-#line 288
+#line 293
 
 
-#line 289
+#line 294
 # Call the server domain and optionally transfer references to it.
-#line 289
+#line 294
 allow system_server dumpstate:binder { call transfer };
-#line 289
+#line 294
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 289
+#line 294
 allow dumpstate system_server:binder transfer;
-#line 289
+#line 294
 # Receive and use open files from the server.
-#line 289
+#line 294
 allow system_server dumpstate:fd use;
-#line 289
+#line 294
 
 
-#line 290
+#line 295
 # Call the server domain and optionally transfer references to it.
-#line 290
+#line 295
 allow system_server fingerprintd:binder { call transfer };
-#line 290
+#line 295
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 290
+#line 295
 allow fingerprintd system_server:binder transfer;
-#line 290
+#line 295
 # Receive and use open files from the server.
-#line 290
+#line 295
 allow system_server fingerprintd:fd use;
-#line 290
+#line 295
 
 
-#line 291
+#line 296
 # Call the server domain and optionally transfer references to it.
-#line 291
+#line 296
 allow system_server gatekeeperd:binder { call transfer };
-#line 291
+#line 296
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 291
+#line 296
 allow gatekeeperd system_server:binder transfer;
-#line 291
+#line 296
 # Receive and use open files from the server.
-#line 291
+#line 296
 allow system_server gatekeeperd:fd use;
-#line 291
+#line 296
 
 
-#line 292
+#line 297
 # Call the server domain and optionally transfer references to it.
-#line 292
+#line 297
 allow system_server gpuservice:binder { call transfer };
-#line 292
+#line 297
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 292
+#line 297
 allow gpuservice system_server:binder transfer;
-#line 292
+#line 297
 # Receive and use open files from the server.
-#line 292
+#line 297
 allow system_server gpuservice:fd use;
-#line 292
+#line 297
 
 
-#line 293
+#line 298
 # Call the server domain and optionally transfer references to it.
-#line 293
+#line 298
 allow system_server idmap:binder { call transfer };
-#line 293
+#line 298
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 293
+#line 298
 allow idmap system_server:binder transfer;
-#line 293
+#line 298
 # Receive and use open files from the server.
-#line 293
+#line 298
 allow system_server idmap:fd use;
-#line 293
+#line 298
 
 
-#line 294
+#line 299
 # Call the server domain and optionally transfer references to it.
-#line 294
+#line 299
 allow system_server installd:binder { call transfer };
-#line 294
+#line 299
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 294
+#line 299
 allow installd system_server:binder transfer;
-#line 294
+#line 299
 # Receive and use open files from the server.
-#line 294
+#line 299
 allow system_server installd:fd use;
-#line 294
+#line 299
 
 
-#line 295
+#line 300
 # Call the server domain and optionally transfer references to it.
-#line 295
+#line 300
 allow system_server incidentd:binder { call transfer };
-#line 295
+#line 300
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 295
+#line 300
 allow incidentd system_server:binder transfer;
-#line 295
+#line 300
 # Receive and use open files from the server.
-#line 295
+#line 300
 allow system_server incidentd:fd use;
-#line 295
+#line 300
 
 
-#line 296
+#line 301
 # Call the server domain and optionally transfer references to it.
-#line 296
+#line 301
 allow system_server mmd:binder { call transfer };
-#line 296
+#line 301
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 296
+#line 301
 allow mmd system_server:binder transfer;
-#line 296
+#line 301
 # Receive and use open files from the server.
-#line 296
+#line 301
 allow system_server mmd:fd use;
-#line 296
+#line 301
 
 
-#line 297
+#line 302
 # Call the server domain and optionally transfer references to it.
-#line 297
+#line 302
 allow system_server netd:binder { call transfer };
-#line 297
+#line 302
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 297
+#line 302
 allow netd system_server:binder transfer;
-#line 297
+#line 302
 # Receive and use open files from the server.
-#line 297
+#line 302
 allow system_server netd:fd use;
-#line 297
+#line 302
 
 
-#line 298
+#line 303
 # Call the server domain and optionally transfer references to it.
-#line 298
+#line 303
 allow system_server ot_daemon:binder { call transfer };
-#line 298
+#line 303
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 298
+#line 303
 allow ot_daemon system_server:binder transfer;
-#line 298
+#line 303
 # Receive and use open files from the server.
-#line 298
+#line 303
 allow system_server ot_daemon:fd use;
-#line 298
+#line 303
 
 
 
-#line 300
+#line 305
 # Call the server domain and optionally transfer references to it.
-#line 300
+#line 305
 allow system_server statsd:binder { call transfer };
-#line 300
+#line 305
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 300
+#line 305
 allow statsd system_server:binder transfer;
-#line 300
+#line 305
 # Receive and use open files from the server.
-#line 300
+#line 305
 allow system_server statsd:fd use;
-#line 300
+#line 305
 
 
-#line 301
+#line 306
 # Call the server domain and optionally transfer references to it.
-#line 301
+#line 306
 allow system_server storaged:binder { call transfer };
-#line 301
+#line 306
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 301
+#line 306
 allow storaged system_server:binder transfer;
-#line 301
+#line 306
 # Receive and use open files from the server.
-#line 301
+#line 306
 allow system_server storaged:fd use;
-#line 301
+#line 306
 
 
-#line 302
+#line 307
 # Call the server domain and optionally transfer references to it.
-#line 302
+#line 307
 allow system_server update_engine:binder { call transfer };
-#line 302
+#line 307
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 302
+#line 307
 allow update_engine system_server:binder transfer;
-#line 302
+#line 307
 # Receive and use open files from the server.
-#line 302
+#line 307
 allow system_server update_engine:fd use;
-#line 302
+#line 307
 
 
-#line 303
+#line 308
 # Call the server domain and optionally transfer references to it.
-#line 303
+#line 308
 allow system_server virtual_camera:binder { call transfer };
-#line 303
+#line 308
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 303
+#line 308
 allow virtual_camera system_server:binder transfer;
-#line 303
+#line 308
 # Receive and use open files from the server.
-#line 303
+#line 308
 allow system_server virtual_camera:fd use;
-#line 303
+#line 308
 
 
-#line 304
+#line 309
 # Call the server domain and optionally transfer references to it.
-#line 304
+#line 309
 allow system_server vold:binder { call transfer };
-#line 304
+#line 309
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 304
+#line 309
 allow vold system_server:binder transfer;
-#line 304
+#line 309
 # Receive and use open files from the server.
-#line 304
+#line 309
 allow system_server vold:fd use;
-#line 304
+#line 309
 
 
-#line 305
+#line 310
 # Call the server domain and optionally transfer references to it.
-#line 305
+#line 310
 allow system_server logd:binder { call transfer };
-#line 305
+#line 310
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 305
+#line 310
 allow logd system_server:binder transfer;
-#line 305
+#line 310
 # Receive and use open files from the server.
-#line 305
+#line 310
 allow system_server logd:fd use;
-#line 305
+#line 310
 
 
-#line 306
+#line 311
 # Call the server domain and optionally transfer references to it.
-#line 306
+#line 311
 allow system_server wificond:binder { call transfer };
-#line 306
+#line 311
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 306
+#line 311
 allow wificond system_server:binder transfer;
-#line 306
+#line 311
 # Receive and use open files from the server.
-#line 306
+#line 311
 allow system_server wificond:fd use;
-#line 306
+#line 311
 
 
-#line 307
+#line 312
 # Call the server domain and optionally transfer references to it.
-#line 307
+#line 312
 allow system_server uprobestats:binder { call transfer };
-#line 307
+#line 312
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 307
+#line 312
 allow uprobestats system_server:binder transfer;
-#line 307
+#line 312
 # Receive and use open files from the server.
-#line 307
+#line 312
 allow system_server uprobestats:fd use;
-#line 307
+#line 312
 
 
-#line 308
+#line 313
 # Call the server domain and optionally transfer references to it.
-#line 308
+#line 313
 allow system_server wifi_mainline_supplicant:binder { call transfer };
-#line 308
+#line 313
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 308
+#line 313
 allow wifi_mainline_supplicant system_server:binder transfer;
-#line 308
+#line 313
 # Receive and use open files from the server.
-#line 308
+#line 313
 allow system_server wifi_mainline_supplicant:fd use;
-#line 308
+#line 313
 
 
-#line 309
+#line 314
 typeattribute system_server binderservicedomain;
-#line 309
+#line 314
 
 
 # Use HALs
 
-#line 312
+#line 317
 typeattribute system_server halclientdomain;
-#line 312
+#line 317
 typeattribute system_server hal_allocator_client;
-#line 312
+#line 317
 
-#line 312
+#line 317
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 312
+#line 317
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 312
+#line 317
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 312
+#line 317
 
-#line 312
+#line 317
 typeattribute system_server hal_allocator;
-#line 312
+#line 317
 # Find passthrough HAL implementations
-#line 312
+#line 317
 allow hal_allocator system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 312
+#line 317
 allow hal_allocator vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 312
+#line 317
 allow hal_allocator vendor_file:file { read open getattr execute map };
-#line 312
+#line 317
 
-#line 312
+#line 317
 
 
-#line 313
+#line 318
 typeattribute system_server halclientdomain;
-#line 313
+#line 318
 typeattribute system_server hal_audio_client;
-#line 313
+#line 318
 
-#line 313
+#line 318
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 313
+#line 318
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 313
+#line 318
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 313
+#line 318
 
-#line 313
+#line 318
 typeattribute system_server hal_audio;
-#line 313
+#line 318
 # Find passthrough HAL implementations
-#line 313
+#line 318
 allow hal_audio system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 313
+#line 318
 allow hal_audio vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 313
+#line 318
 allow hal_audio vendor_file:file { read open getattr execute map };
-#line 313
+#line 318
 
-#line 313
+#line 318
 
 
-#line 314
+#line 319
 typeattribute system_server halclientdomain;
-#line 314
+#line 319
 typeattribute system_server hal_authgraph_client;
-#line 314
+#line 319
 
-#line 314
+#line 319
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 314
+#line 319
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 314
+#line 319
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 314
+#line 319
 
-#line 314
+#line 319
 typeattribute system_server hal_authgraph;
-#line 314
+#line 319
 # Find passthrough HAL implementations
-#line 314
+#line 319
 allow hal_authgraph system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 314
+#line 319
 allow hal_authgraph vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 314
+#line 319
 allow hal_authgraph vendor_file:file { read open getattr execute map };
-#line 314
+#line 319
 
-#line 314
+#line 319
 
 
-#line 315
+#line 320
 typeattribute system_server halclientdomain;
-#line 315
+#line 320
 typeattribute system_server hal_authsecret_client;
-#line 315
+#line 320
 
-#line 315
+#line 320
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 315
+#line 320
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 315
+#line 320
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 315
+#line 320
 
-#line 315
+#line 320
 typeattribute system_server hal_authsecret;
-#line 315
+#line 320
 # Find passthrough HAL implementations
-#line 315
+#line 320
 allow hal_authsecret system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 315
+#line 320
 allow hal_authsecret vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 315
+#line 320
 allow hal_authsecret vendor_file:file { read open getattr execute map };
-#line 315
+#line 320
 
-#line 315
+#line 320
 
 
-#line 316
+#line 321
 typeattribute system_server halclientdomain;
-#line 316
+#line 321
 typeattribute system_server hal_bluetooth_client;
-#line 316
+#line 321
 
-#line 316
+#line 321
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 316
+#line 321
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 316
+#line 321
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 316
+#line 321
 
-#line 316
+#line 321
 typeattribute system_server hal_bluetooth;
-#line 316
+#line 321
 # Find passthrough HAL implementations
-#line 316
+#line 321
 allow hal_bluetooth system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 316
+#line 321
 allow hal_bluetooth vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 316
+#line 321
 allow hal_bluetooth vendor_file:file { read open getattr execute map };
-#line 316
+#line 321
 
-#line 316
+#line 321
 
 
-#line 317
+#line 322
 typeattribute system_server halclientdomain;
-#line 317
+#line 322
 typeattribute system_server hal_broadcastradio_client;
-#line 317
+#line 322
 
-#line 317
+#line 322
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 317
+#line 322
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 317
+#line 322
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 317
+#line 322
 
-#line 317
+#line 322
 typeattribute system_server hal_broadcastradio;
-#line 317
+#line 322
 # Find passthrough HAL implementations
-#line 317
+#line 322
 allow hal_broadcastradio system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 317
+#line 322
 allow hal_broadcastradio vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 317
+#line 322
 allow hal_broadcastradio vendor_file:file { read open getattr execute map };
-#line 317
+#line 322
 
-#line 317
+#line 322
 
 
-#line 318
+#line 323
 typeattribute system_server halclientdomain;
-#line 318
+#line 323
 typeattribute system_server hal_codec2_client;
-#line 318
+#line 323
 
-#line 318
+#line 323
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 318
+#line 323
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 318
+#line 323
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 318
+#line 323
 
-#line 318
+#line 323
 typeattribute system_server hal_codec2;
-#line 318
+#line 323
 # Find passthrough HAL implementations
-#line 318
+#line 323
 allow hal_codec2 system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 318
+#line 323
 allow hal_codec2 vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 318
+#line 323
 allow hal_codec2 vendor_file:file { read open getattr execute map };
-#line 318
+#line 323
 
-#line 318
+#line 323
 
 
-#line 319
+#line 324
 typeattribute system_server halclientdomain;
-#line 319
+#line 324
 typeattribute system_server hal_configstore_client;
-#line 319
+#line 324
 
-#line 319
+#line 324
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 319
+#line 324
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 319
+#line 324
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 319
+#line 324
 
-#line 319
+#line 324
 typeattribute system_server hal_configstore;
-#line 319
+#line 324
 # Find passthrough HAL implementations
-#line 319
+#line 324
 allow hal_configstore system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 319
+#line 324
 allow hal_configstore vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 319
+#line 324
 allow hal_configstore vendor_file:file { read open getattr execute map };
-#line 319
+#line 324
 
-#line 319
+#line 324
 
 
-#line 320
+#line 325
 typeattribute system_server halclientdomain;
-#line 320
+#line 325
 typeattribute system_server hal_contexthub_client;
-#line 320
+#line 325
 
-#line 320
+#line 325
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 320
+#line 325
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 320
+#line 325
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 320
+#line 325
 
-#line 320
+#line 325
 typeattribute system_server hal_contexthub;
-#line 320
+#line 325
 # Find passthrough HAL implementations
-#line 320
+#line 325
 allow hal_contexthub system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 320
+#line 325
 allow hal_contexthub vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 320
+#line 325
 allow hal_contexthub vendor_file:file { read open getattr execute map };
-#line 320
+#line 325
 
-#line 320
+#line 325
 
 
-#line 321
+#line 326
 typeattribute system_server halclientdomain;
-#line 321
+#line 326
 typeattribute system_server hal_face_client;
-#line 321
+#line 326
 
-#line 321
+#line 326
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 321
+#line 326
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 321
+#line 326
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 321
+#line 326
 
-#line 321
+#line 326
 typeattribute system_server hal_face;
-#line 321
+#line 326
 # Find passthrough HAL implementations
-#line 321
+#line 326
 allow hal_face system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 321
+#line 326
 allow hal_face vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 321
+#line 326
 allow hal_face vendor_file:file { read open getattr execute map };
-#line 321
+#line 326
 
-#line 321
+#line 326
 
 
-#line 322
+#line 327
 typeattribute system_server halclientdomain;
-#line 322
+#line 327
 typeattribute system_server hal_fingerprint_client;
-#line 322
+#line 327
 
-#line 322
+#line 327
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 322
+#line 327
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 322
+#line 327
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 322
+#line 327
 
-#line 322
+#line 327
 typeattribute system_server hal_fingerprint;
-#line 322
+#line 327
 # Find passthrough HAL implementations
-#line 322
+#line 327
 allow hal_fingerprint system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 322
+#line 327
 allow hal_fingerprint vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 322
+#line 327
 allow hal_fingerprint vendor_file:file { read open getattr execute map };
-#line 322
+#line 327
 
-#line 322
+#line 327
 
 
-#line 323
+#line 328
 typeattribute system_server halclientdomain;
-#line 323
+#line 328
 typeattribute system_server hal_gnss_client;
-#line 323
+#line 328
 
-#line 323
+#line 328
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 323
+#line 328
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 323
+#line 328
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 323
+#line 328
 
-#line 323
+#line 328
 typeattribute system_server hal_gnss;
-#line 323
+#line 328
 # Find passthrough HAL implementations
-#line 323
+#line 328
 allow hal_gnss system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 323
+#line 328
 allow hal_gnss vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 323
+#line 328
 allow hal_gnss vendor_file:file { read open getattr execute map };
-#line 323
+#line 328
 
-#line 323
+#line 328
 
 
-#line 324
+#line 329
 typeattribute system_server halclientdomain;
-#line 324
+#line 329
 typeattribute system_server hal_graphics_allocator_client;
-#line 324
+#line 329
 
-#line 324
+#line 329
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 324
+#line 329
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 324
+#line 329
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 324
+#line 329
 
-#line 324
+#line 329
 typeattribute system_server hal_graphics_allocator;
-#line 324
+#line 329
 # Find passthrough HAL implementations
-#line 324
+#line 329
 allow hal_graphics_allocator system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 324
+#line 329
 allow hal_graphics_allocator vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 324
+#line 329
 allow hal_graphics_allocator vendor_file:file { read open getattr execute map };
-#line 324
+#line 329
 
-#line 324
+#line 329
 
 
-#line 325
+#line 330
 typeattribute system_server halclientdomain;
-#line 325
+#line 330
 typeattribute system_server hal_health_client;
-#line 325
+#line 330
 
-#line 325
+#line 330
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 325
+#line 330
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 325
+#line 330
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 325
+#line 330
 
-#line 325
+#line 330
 typeattribute system_server hal_health;
-#line 325
+#line 330
 # Find passthrough HAL implementations
-#line 325
+#line 330
 allow hal_health system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 325
+#line 330
 allow hal_health vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 325
+#line 330
 allow hal_health vendor_file:file { read open getattr execute map };
-#line 325
+#line 330
 
-#line 325
+#line 330
 
 
-#line 326
+#line 331
 typeattribute system_server halclientdomain;
-#line 326
+#line 331
 typeattribute system_server hal_input_classifier_client;
-#line 326
+#line 331
 
-#line 326
+#line 331
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 326
+#line 331
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 326
+#line 331
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 326
+#line 331
 
-#line 326
+#line 331
 typeattribute system_server hal_input_classifier;
-#line 326
+#line 331
 # Find passthrough HAL implementations
-#line 326
+#line 331
 allow hal_input_classifier system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 326
+#line 331
 allow hal_input_classifier vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 326
+#line 331
 allow hal_input_classifier vendor_file:file { read open getattr execute map };
-#line 326
+#line 331
 
-#line 326
+#line 331
 
 
-#line 327
+#line 332
 typeattribute system_server halclientdomain;
-#line 327
+#line 332
 typeattribute system_server hal_input_processor_client;
-#line 327
+#line 332
 
-#line 327
+#line 332
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 327
+#line 332
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 327
+#line 332
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 327
+#line 332
 
-#line 327
+#line 332
 typeattribute system_server hal_input_processor;
-#line 327
+#line 332
 # Find passthrough HAL implementations
-#line 327
+#line 332
 allow hal_input_processor system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 327
+#line 332
 allow hal_input_processor vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 327
+#line 332
 allow hal_input_processor vendor_file:file { read open getattr execute map };
-#line 327
+#line 332
 
-#line 327
+#line 332
 
 
-#line 328
+#line 333
 typeattribute system_server halclientdomain;
-#line 328
+#line 333
 typeattribute system_server hal_ir_client;
-#line 328
+#line 333
 
-#line 328
+#line 333
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 328
+#line 333
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 328
+#line 333
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 328
+#line 333
 
-#line 328
+#line 333
 typeattribute system_server hal_ir;
-#line 328
+#line 333
 # Find passthrough HAL implementations
-#line 328
+#line 333
 allow hal_ir system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 328
+#line 333
 allow hal_ir vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 328
+#line 333
 allow hal_ir vendor_file:file { read open getattr execute map };
-#line 328
+#line 333
 
-#line 328
+#line 333
 
 
-#line 329
+#line 334
 typeattribute system_server halclientdomain;
-#line 329
+#line 334
 typeattribute system_server hal_keymint_client;
-#line 329
+#line 334
 
-#line 329
+#line 334
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 329
+#line 334
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 329
+#line 334
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 329
+#line 334
 
-#line 329
+#line 334
 typeattribute system_server hal_keymint;
-#line 329
+#line 334
 # Find passthrough HAL implementations
-#line 329
+#line 334
 allow hal_keymint system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 329
+#line 334
 allow hal_keymint vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 329
+#line 334
 allow hal_keymint vendor_file:file { read open getattr execute map };
-#line 329
+#line 334
 
-#line 329
+#line 334
 
 
-#line 330
+#line 335
 typeattribute system_server halclientdomain;
-#line 330
+#line 335
 typeattribute system_server hal_light_client;
-#line 330
+#line 335
 
-#line 330
+#line 335
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 330
+#line 335
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 330
+#line 335
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 330
+#line 335
 
-#line 330
+#line 335
 typeattribute system_server hal_light;
-#line 330
+#line 335
 # Find passthrough HAL implementations
-#line 330
+#line 335
 allow hal_light system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 330
+#line 335
 allow hal_light vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 330
+#line 335
 allow hal_light vendor_file:file { read open getattr execute map };
-#line 330
+#line 335
 
-#line 330
+#line 335
 
 
-#line 331
+#line 336
 typeattribute system_server halclientdomain;
-#line 331
+#line 336
 typeattribute system_server hal_mediaquality_client;
-#line 331
+#line 336
 
-#line 331
+#line 336
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 331
+#line 336
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 331
+#line 336
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 331
+#line 336
 
-#line 331
+#line 336
 typeattribute system_server hal_mediaquality;
-#line 331
+#line 336
 # Find passthrough HAL implementations
-#line 331
+#line 336
 allow hal_mediaquality system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 331
+#line 336
 allow hal_mediaquality vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 331
+#line 336
 allow hal_mediaquality vendor_file:file { read open getattr execute map };
-#line 331
+#line 336
 
-#line 331
+#line 336
 
 
-#line 332
+#line 337
 typeattribute system_server halclientdomain;
-#line 332
+#line 337
 typeattribute system_server hal_memtrack_client;
-#line 332
+#line 337
 
-#line 332
+#line 337
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 332
+#line 337
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 332
+#line 337
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 332
+#line 337
 
-#line 332
+#line 337
 typeattribute system_server hal_memtrack;
-#line 332
+#line 337
 # Find passthrough HAL implementations
-#line 332
+#line 337
 allow hal_memtrack system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 332
+#line 337
 allow hal_memtrack vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 332
+#line 337
 allow hal_memtrack vendor_file:file { read open getattr execute map };
-#line 332
+#line 337
 
-#line 332
+#line 337
 
 
-#line 333
+#line 338
 typeattribute system_server halclientdomain;
-#line 333
+#line 338
 typeattribute system_server hal_neuralnetworks_client;
-#line 333
+#line 338
 
-#line 333
+#line 338
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 333
+#line 338
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 333
+#line 338
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 333
+#line 338
 
-#line 333
+#line 338
 typeattribute system_server hal_neuralnetworks;
-#line 333
+#line 338
 # Find passthrough HAL implementations
-#line 333
+#line 338
 allow hal_neuralnetworks system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 333
+#line 338
 allow hal_neuralnetworks vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 333
+#line 338
 allow hal_neuralnetworks vendor_file:file { read open getattr execute map };
-#line 333
+#line 338
 
-#line 333
+#line 338
 
 
-#line 334
+#line 339
 typeattribute system_server halclientdomain;
-#line 334
+#line 339
 typeattribute system_server hal_oemlock_client;
-#line 334
+#line 339
 
-#line 334
+#line 339
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 334
+#line 339
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 334
+#line 339
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 334
+#line 339
 
-#line 334
+#line 339
 typeattribute system_server hal_oemlock;
-#line 334
+#line 339
 # Find passthrough HAL implementations
-#line 334
+#line 339
 allow hal_oemlock system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 334
+#line 339
 allow hal_oemlock vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 334
+#line 339
 allow hal_oemlock vendor_file:file { read open getattr execute map };
-#line 334
+#line 339
 
-#line 334
+#line 339
 
 
-#line 335
+#line 340
 typeattribute system_server halclientdomain;
-#line 335
+#line 340
 typeattribute system_server hal_omx_client;
-#line 335
+#line 340
 
-#line 335
+#line 340
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 335
+#line 340
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 335
+#line 340
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 335
+#line 340
 
-#line 335
+#line 340
 typeattribute system_server hal_omx;
-#line 335
+#line 340
 # Find passthrough HAL implementations
-#line 335
+#line 340
 allow hal_omx system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 335
+#line 340
 allow hal_omx vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 335
+#line 340
 allow hal_omx vendor_file:file { read open getattr execute map };
-#line 335
+#line 340
 
-#line 335
+#line 340
 
 
-#line 336
+#line 341
 typeattribute system_server halclientdomain;
-#line 336
+#line 341
 typeattribute system_server hal_power_client;
-#line 336
+#line 341
 
-#line 336
+#line 341
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 336
+#line 341
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 336
+#line 341
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 336
+#line 341
 
-#line 336
+#line 341
 typeattribute system_server hal_power;
-#line 336
+#line 341
 # Find passthrough HAL implementations
-#line 336
+#line 341
 allow hal_power system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 336
+#line 341
 allow hal_power vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 336
+#line 341
 allow hal_power vendor_file:file { read open getattr execute map };
-#line 336
+#line 341
 
-#line 336
+#line 341
 
 
-#line 337
+#line 342
 typeattribute system_server halclientdomain;
-#line 337
+#line 342
 typeattribute system_server hal_power_stats_client;
-#line 337
+#line 342
 
-#line 337
+#line 342
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 337
+#line 342
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 337
+#line 342
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 337
+#line 342
 
-#line 337
+#line 342
 typeattribute system_server hal_power_stats;
-#line 337
+#line 342
 # Find passthrough HAL implementations
-#line 337
+#line 342
 allow hal_power_stats system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 337
+#line 342
 allow hal_power_stats vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 337
+#line 342
 allow hal_power_stats vendor_file:file { read open getattr execute map };
-#line 337
+#line 342
 
-#line 337
+#line 342
 
 
-#line 338
+#line 343
 typeattribute system_server halclientdomain;
-#line 338
+#line 343
 typeattribute system_server hal_rebootescrow_client;
-#line 338
+#line 343
 
-#line 338
+#line 343
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 338
+#line 343
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 338
+#line 343
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 338
+#line 343
 
-#line 338
+#line 343
 typeattribute system_server hal_rebootescrow;
-#line 338
+#line 343
 # Find passthrough HAL implementations
-#line 338
+#line 343
 allow hal_rebootescrow system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 338
+#line 343
 allow hal_rebootescrow vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 338
+#line 343
 allow hal_rebootescrow vendor_file:file { read open getattr execute map };
-#line 338
+#line 343
 
-#line 338
+#line 343
 
 
-#line 339
+#line 344
 typeattribute system_server halclientdomain;
-#line 339
+#line 344
 typeattribute system_server hal_remotelyprovisionedcomponent_avf_client;
-#line 339
+#line 344
 
-#line 339
+#line 344
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 339
+#line 344
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 339
+#line 344
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 339
+#line 344
 
-#line 339
+#line 344
 typeattribute system_server hal_remotelyprovisionedcomponent_avf;
-#line 339
+#line 344
 # Find passthrough HAL implementations
-#line 339
+#line 344
 allow hal_remotelyprovisionedcomponent_avf system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 339
+#line 344
 allow hal_remotelyprovisionedcomponent_avf vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 339
+#line 344
 allow hal_remotelyprovisionedcomponent_avf vendor_file:file { read open getattr execute map };
-#line 339
+#line 344
 
-#line 339
+#line 344
 
 
-#line 340
+#line 345
 typeattribute system_server halclientdomain;
-#line 340
+#line 345
 typeattribute system_server hal_sensors_client;
-#line 340
+#line 345
 
-#line 340
+#line 345
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 340
+#line 345
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 340
+#line 345
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 340
+#line 345
 
-#line 340
+#line 345
 typeattribute system_server hal_sensors;
-#line 340
+#line 345
 # Find passthrough HAL implementations
-#line 340
+#line 345
 allow hal_sensors system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 340
+#line 345
 allow hal_sensors vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 340
+#line 345
 allow hal_sensors vendor_file:file { read open getattr execute map };
-#line 340
+#line 345
 
-#line 340
+#line 345
 
 
-#line 341
+#line 346
 typeattribute system_server halclientdomain;
-#line 341
+#line 346
 typeattribute system_server hal_secretkeeper_client;
-#line 341
+#line 346
 
-#line 341
+#line 346
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 341
+#line 346
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 341
+#line 346
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 341
+#line 346
 
-#line 341
+#line 346
 typeattribute system_server hal_secretkeeper;
-#line 341
+#line 346
 # Find passthrough HAL implementations
-#line 341
+#line 346
 allow hal_secretkeeper system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 341
+#line 346
 allow hal_secretkeeper vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 341
+#line 346
 allow hal_secretkeeper vendor_file:file { read open getattr execute map };
-#line 341
+#line 346
 
-#line 341
+#line 346
 
 
-#line 342
+#line 347
 typeattribute system_server halclientdomain;
-#line 342
+#line 347
 typeattribute system_server hal_tetheroffload_client;
-#line 342
+#line 347
 
-#line 342
+#line 347
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 342
+#line 347
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 342
+#line 347
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 342
+#line 347
 
-#line 342
+#line 347
 typeattribute system_server hal_tetheroffload;
-#line 342
+#line 347
 # Find passthrough HAL implementations
-#line 342
+#line 347
 allow hal_tetheroffload system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 342
+#line 347
 allow hal_tetheroffload vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 342
+#line 347
 allow hal_tetheroffload vendor_file:file { read open getattr execute map };
-#line 342
+#line 347
 
-#line 342
+#line 347
 
 
-#line 343
+#line 348
 typeattribute system_server halclientdomain;
-#line 343
+#line 348
 typeattribute system_server hal_thermal_client;
-#line 343
+#line 348
 
-#line 343
+#line 348
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 343
+#line 348
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 343
+#line 348
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 343
+#line 348
 
-#line 343
+#line 348
 typeattribute system_server hal_thermal;
-#line 343
+#line 348
 # Find passthrough HAL implementations
-#line 343
+#line 348
 allow hal_thermal system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 343
+#line 348
 allow hal_thermal vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 343
+#line 348
 allow hal_thermal vendor_file:file { read open getattr execute map };
-#line 343
+#line 348
 
-#line 343
+#line 348
 
 
-#line 344
+#line 349
 typeattribute system_server halclientdomain;
-#line 344
+#line 349
 typeattribute system_server hal_threadnetwork_client;
-#line 344
+#line 349
 
-#line 344
+#line 349
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 344
+#line 349
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 344
+#line 349
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 344
+#line 349
 
-#line 344
+#line 349
 typeattribute system_server hal_threadnetwork;
-#line 344
+#line 349
 # Find passthrough HAL implementations
-#line 344
+#line 349
 allow hal_threadnetwork system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 344
+#line 349
 allow hal_threadnetwork vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 344
+#line 349
 allow hal_threadnetwork vendor_file:file { read open getattr execute map };
-#line 344
+#line 349
 
-#line 344
+#line 349
 
 
-#line 345
+#line 350
 typeattribute system_server halclientdomain;
-#line 345
+#line 350
 typeattribute system_server hal_tv_cec_client;
-#line 345
+#line 350
 
-#line 345
+#line 350
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 345
+#line 350
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 345
+#line 350
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 345
+#line 350
 
-#line 345
+#line 350
 typeattribute system_server hal_tv_cec;
-#line 345
+#line 350
 # Find passthrough HAL implementations
-#line 345
+#line 350
 allow hal_tv_cec system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 345
+#line 350
 allow hal_tv_cec vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 345
+#line 350
 allow hal_tv_cec vendor_file:file { read open getattr execute map };
-#line 345
+#line 350
 
-#line 345
+#line 350
 
 
-#line 346
+#line 351
 typeattribute system_server halclientdomain;
-#line 346
+#line 351
 typeattribute system_server hal_tv_hdmi_cec_client;
-#line 346
+#line 351
 
-#line 346
+#line 351
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 346
+#line 351
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 346
+#line 351
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 346
+#line 351
 
-#line 346
+#line 351
 typeattribute system_server hal_tv_hdmi_cec;
-#line 346
+#line 351
 # Find passthrough HAL implementations
-#line 346
+#line 351
 allow hal_tv_hdmi_cec system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 346
+#line 351
 allow hal_tv_hdmi_cec vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 346
+#line 351
 allow hal_tv_hdmi_cec vendor_file:file { read open getattr execute map };
-#line 346
+#line 351
 
-#line 346
+#line 351
 
 
-#line 347
+#line 352
 typeattribute system_server halclientdomain;
-#line 347
+#line 352
 typeattribute system_server hal_tv_hdmi_connection_client;
-#line 347
+#line 352
 
-#line 347
+#line 352
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 347
+#line 352
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 347
+#line 352
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 347
+#line 352
 
-#line 347
+#line 352
 typeattribute system_server hal_tv_hdmi_connection;
-#line 347
+#line 352
 # Find passthrough HAL implementations
-#line 347
+#line 352
 allow hal_tv_hdmi_connection system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 347
+#line 352
 allow hal_tv_hdmi_connection vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 347
+#line 352
 allow hal_tv_hdmi_connection vendor_file:file { read open getattr execute map };
-#line 347
+#line 352
 
-#line 347
+#line 352
 
 
-#line 348
+#line 353
 typeattribute system_server halclientdomain;
-#line 348
+#line 353
 typeattribute system_server hal_tv_hdmi_earc_client;
-#line 348
+#line 353
 
-#line 348
+#line 353
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 348
+#line 353
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 348
+#line 353
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 348
+#line 353
 
-#line 348
+#line 353
 typeattribute system_server hal_tv_hdmi_earc;
-#line 348
+#line 353
 # Find passthrough HAL implementations
-#line 348
+#line 353
 allow hal_tv_hdmi_earc system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 348
+#line 353
 allow hal_tv_hdmi_earc vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 348
+#line 353
 allow hal_tv_hdmi_earc vendor_file:file { read open getattr execute map };
-#line 348
+#line 353
 
-#line 348
+#line 353
 
 
-#line 349
+#line 354
 typeattribute system_server halclientdomain;
-#line 349
+#line 354
 typeattribute system_server hal_tv_input_client;
-#line 349
+#line 354
 
-#line 349
+#line 354
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 349
+#line 354
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 349
+#line 354
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 349
+#line 354
 
-#line 349
+#line 354
 typeattribute system_server hal_tv_input;
-#line 349
+#line 354
 # Find passthrough HAL implementations
-#line 349
+#line 354
 allow hal_tv_input system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 349
+#line 354
 allow hal_tv_input vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 349
+#line 354
 allow hal_tv_input vendor_file:file { read open getattr execute map };
-#line 349
+#line 354
 
-#line 349
+#line 354
 
 
-#line 350
+#line 355
 typeattribute system_server halclientdomain;
-#line 350
+#line 355
 typeattribute system_server hal_usb_client;
-#line 350
+#line 355
 
-#line 350
+#line 355
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 350
+#line 355
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 350
+#line 355
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 350
+#line 355
 
-#line 350
+#line 355
 typeattribute system_server hal_usb;
-#line 350
+#line 355
 # Find passthrough HAL implementations
-#line 350
+#line 355
 allow hal_usb system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 350
+#line 355
 allow hal_usb vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 350
+#line 355
 allow hal_usb vendor_file:file { read open getattr execute map };
-#line 350
+#line 355
 
-#line 350
+#line 355
 
 
-#line 351
+#line 356
 typeattribute system_server halclientdomain;
-#line 351
+#line 356
 typeattribute system_server hal_usb_gadget_client;
-#line 351
+#line 356
 
-#line 351
+#line 356
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 351
+#line 356
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 351
+#line 356
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 351
+#line 356
 
-#line 351
+#line 356
 typeattribute system_server hal_usb_gadget;
-#line 351
+#line 356
 # Find passthrough HAL implementations
-#line 351
+#line 356
 allow hal_usb_gadget system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 351
+#line 356
 allow hal_usb_gadget vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 351
+#line 356
 allow hal_usb_gadget vendor_file:file { read open getattr execute map };
-#line 351
+#line 356
 
-#line 351
+#line 356
 
 
-#line 352
+#line 357
 typeattribute system_server halclientdomain;
-#line 352
+#line 357
 typeattribute system_server hal_uwb_client;
-#line 352
+#line 357
 
-#line 352
+#line 357
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 352
+#line 357
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 352
+#line 357
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 352
+#line 357
 
-#line 352
+#line 357
 typeattribute system_server hal_uwb;
-#line 352
+#line 357
 # Find passthrough HAL implementations
-#line 352
+#line 357
 allow hal_uwb system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 352
+#line 357
 allow hal_uwb vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 352
+#line 357
 allow hal_uwb vendor_file:file { read open getattr execute map };
-#line 352
+#line 357
 
-#line 352
+#line 357
 
 
-#line 353
+#line 358
 typeattribute system_server halclientdomain;
-#line 353
+#line 358
 typeattribute system_server hal_vibrator_client;
-#line 353
+#line 358
 
-#line 353
+#line 358
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 353
+#line 358
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 353
+#line 358
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 353
+#line 358
 
-#line 353
+#line 358
 typeattribute system_server hal_vibrator;
-#line 353
+#line 358
 # Find passthrough HAL implementations
-#line 353
+#line 358
 allow hal_vibrator system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 353
+#line 358
 allow hal_vibrator vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 353
+#line 358
 allow hal_vibrator vendor_file:file { read open getattr execute map };
-#line 353
+#line 358
 
-#line 353
+#line 358
 
 
-#line 354
+#line 359
 typeattribute system_server halclientdomain;
-#line 354
+#line 359
 typeattribute system_server hal_vr_client;
-#line 354
+#line 359
 
-#line 354
+#line 359
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 354
+#line 359
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 354
+#line 359
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 354
+#line 359
 
-#line 354
+#line 359
 typeattribute system_server hal_vr;
-#line 354
+#line 359
 # Find passthrough HAL implementations
-#line 354
+#line 359
 allow hal_vr system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 354
+#line 359
 allow hal_vr vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 354
+#line 359
 allow hal_vr vendor_file:file { read open getattr execute map };
-#line 354
+#line 359
 
-#line 354
+#line 359
 
 
-#line 355
+#line 360
 typeattribute system_server halclientdomain;
-#line 355
+#line 360
 typeattribute system_server hal_weaver_client;
-#line 355
+#line 360
 
-#line 355
+#line 360
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 355
+#line 360
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 355
+#line 360
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 355
+#line 360
 
-#line 355
+#line 360
 typeattribute system_server hal_weaver;
-#line 355
+#line 360
 # Find passthrough HAL implementations
-#line 355
+#line 360
 allow hal_weaver system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 355
+#line 360
 allow hal_weaver vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 355
+#line 360
 allow hal_weaver vendor_file:file { read open getattr execute map };
-#line 355
+#line 360
 
-#line 355
+#line 360
 
 
-#line 356
+#line 361
 typeattribute system_server halclientdomain;
-#line 356
+#line 361
 typeattribute system_server hal_wifi_client;
-#line 356
+#line 361
 
-#line 356
+#line 361
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 356
+#line 361
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 356
+#line 361
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 356
+#line 361
 
-#line 356
+#line 361
 typeattribute system_server hal_wifi;
-#line 356
+#line 361
 # Find passthrough HAL implementations
-#line 356
+#line 361
 allow hal_wifi system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 356
+#line 361
 allow hal_wifi vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 356
+#line 361
 allow hal_wifi vendor_file:file { read open getattr execute map };
-#line 356
+#line 361
 
-#line 356
+#line 361
 
 
-#line 357
+#line 362
 typeattribute system_server halclientdomain;
-#line 357
+#line 362
 typeattribute system_server hal_wifi_hostapd_client;
-#line 357
+#line 362
 
-#line 357
+#line 362
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 357
+#line 362
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 357
+#line 362
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 357
+#line 362
 
-#line 357
+#line 362
 typeattribute system_server hal_wifi_hostapd;
-#line 357
+#line 362
 # Find passthrough HAL implementations
-#line 357
+#line 362
 allow hal_wifi_hostapd system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 357
+#line 362
 allow hal_wifi_hostapd vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 357
+#line 362
 allow hal_wifi_hostapd vendor_file:file { read open getattr execute map };
-#line 357
+#line 362
 
-#line 357
+#line 362
 
 
-#line 358
+#line 363
 typeattribute system_server halclientdomain;
-#line 358
+#line 363
 typeattribute system_server hal_wifi_supplicant_client;
-#line 358
+#line 363
 
-#line 358
+#line 363
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 358
+#line 363
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 358
+#line 363
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 358
+#line 363
 
-#line 358
+#line 363
 typeattribute system_server hal_wifi_supplicant;
-#line 358
+#line 363
 # Find passthrough HAL implementations
-#line 358
+#line 363
 allow hal_wifi_supplicant system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 358
+#line 363
 allow hal_wifi_supplicant vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 358
+#line 363
 allow hal_wifi_supplicant vendor_file:file { read open getattr execute map };
-#line 358
+#line 363
 
-#line 358
+#line 363
 
 # The bootctl is a pass through HAL mode under recovery mode. So we skip the
 # permission for recovery in order not to give system server the access to
 # the low level block devices.
 
-#line 362
+#line 367
 typeattribute system_server halclientdomain;
-#line 362
+#line 367
 typeattribute system_server hal_bootctl_client;
-#line 362
+#line 367
 
-#line 362
+#line 367
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 362
+#line 367
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 362
+#line 367
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 362
+#line 367
 
-#line 362
+#line 367
 typeattribute system_server hal_bootctl;
-#line 362
+#line 367
 # Find passthrough HAL implementations
-#line 362
+#line 367
 allow hal_bootctl system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 362
+#line 367
 allow hal_bootctl vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 362
+#line 367
 allow hal_bootctl vendor_file:file { read open getattr execute map };
-#line 362
+#line 367
 
-#line 362
+#line 367
 
 
 # Talk with graphics composer fences
@@ -73591,11 +74201,11 @@
 
 # Talk to tombstoned to get ANR traces.
 
-#line 372
+#line 377
 allow system_server tombstoned_intercept_socket:sock_file write;
-#line 372
+#line 377
 allow system_server tombstoned:unix_stream_socket connectto;
-#line 372
+#line 377
 
 
 # List HAL interfaces to get ANR traces.
@@ -73667,29 +74277,29 @@
 # Write trace data to the Perfetto traced daemon. This requires connecting to
 # its producer socket and obtaining a (per-process) tmpfs fd.
 
-#line 442
+#line 447
   allow system_server traced:fd use;
-#line 442
+#line 447
   allow system_server traced_tmpfs:file { read write getattr map };
-#line 442
+#line 447
   
-#line 442
+#line 447
 allow system_server traced_producer_socket:sock_file write;
-#line 442
+#line 447
 allow system_server traced:unix_stream_socket connectto;
-#line 442
+#line 447
 
-#line 442
+#line 447
 
-#line 442
+#line 447
   # Also allow the service to use the producer file descriptors. This is
-#line 442
+#line 447
   # necessary when the producer is creating the shared memory, as it will be
-#line 442
+#line 447
   # passed to the service as a file descriptor (obtained from memfd_create).
-#line 442
+#line 447
   allow traced system_server:fd use;
-#line 442
+#line 447
 
 
 # Get file context
@@ -73698,64 +74308,64 @@
 allow system_server mac_perms_file: file { getattr open read ioctl lock map watch watch_reads };
 # Check SELinux permissions.
 
-#line 449
+#line 454
 
-#line 449
+#line 454
 allow system_server selinuxfs:dir { open getattr read search ioctl lock watch watch_reads };
-#line 449
+#line 454
 allow system_server selinuxfs:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 449
+#line 454
 
-#line 449
+#line 454
 allow system_server selinuxfs:file { open append write lock map };
-#line 449
+#line 454
 allow system_server kernel:security compute_av;
-#line 449
+#line 454
 allow system_server self:netlink_selinux_socket { read write create getattr setattr lock relabelfrom relabelto append bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind };
-#line 449
+#line 454
 
 
 allow system_server sysfs_type:dir { open getattr read search ioctl lock watch watch_reads };
 
 
-#line 453
+#line 458
 allow system_server sysfs_android_usb:dir { open getattr read search ioctl lock watch watch_reads };
-#line 453
+#line 458
 allow system_server sysfs_android_usb:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 453
+#line 458
 
 allow system_server sysfs_android_usb:file { open append write lock map };
 
 
-#line 456
+#line 461
 allow system_server sysfs_extcon:dir { open getattr read search ioctl lock watch watch_reads };
-#line 456
+#line 461
 allow system_server sysfs_extcon:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 456
+#line 461
 
 
 
-#line 458
+#line 463
 allow system_server sysfs_ipv4:dir { open getattr read search ioctl lock watch watch_reads };
-#line 458
+#line 463
 allow system_server sysfs_ipv4:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 458
+#line 463
 
 allow system_server sysfs_ipv4:file { open append write lock map };
 
 
-#line 461
+#line 466
 allow system_server sysfs_rtc:dir { open getattr read search ioctl lock watch watch_reads };
-#line 461
+#line 466
 allow system_server sysfs_rtc:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 461
+#line 466
 
 
-#line 462
+#line 467
 allow system_server sysfs_switch:dir { open getattr read search ioctl lock watch watch_reads };
-#line 462
+#line 467
 allow system_server sysfs_switch:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 462
+#line 467
 
 
 allow system_server sysfs_nfc_power_writable:file { { getattr open read ioctl lock map watch watch_reads } { open append write lock map } };
@@ -73827,53 +74437,53 @@
 
 # Access input configuration files in the /vendor directory
 
-#line 532
+#line 537
 allow system_server vendor_keylayout_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 532
+#line 537
 allow system_server vendor_keylayout_file:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 532
+#line 537
 
 
-#line 533
+#line 538
 allow system_server vendor_keychars_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 533
+#line 538
 allow system_server vendor_keychars_file:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 533
+#line 538
 
 
-#line 534
+#line 539
 allow system_server vendor_idc_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 534
+#line 539
 allow system_server vendor_idc_file:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 534
+#line 539
 
 
-#line 535
+#line 540
 allow system_server input_device_config_prop:file { getattr open read map };
-#line 535
+#line 540
 
 
 # Access /vendor/{app,framework,overlay}
 
-#line 538
+#line 543
 allow system_server vendor_app_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 538
+#line 543
 allow system_server vendor_app_file:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 538
+#line 543
 
 
-#line 539
+#line 544
 allow system_server vendor_framework_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 539
+#line 544
 allow system_server vendor_framework_file:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 539
+#line 544
 
 
-#line 540
+#line 545
 allow system_server vendor_overlay_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 540
+#line 545
 allow system_server vendor_overlay_file:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 540
+#line 545
 
 
 # Manage /data/app-private.
@@ -73903,17 +74513,17 @@
 # order to dump its traces. Also allow the system server to write its traces to
 # dumpstate during bugreport capture and incidentd during incident collection.
 
-#line 568
+#line 573
 allow system_server tombstoned_java_trace_socket:sock_file write;
-#line 568
+#line 573
 allow system_server tombstoned:unix_stream_socket connectto;
-#line 568
+#line 573
 
 allow system_server tombstoned:fd use;
 allow system_server dumpstate:fifo_file append;
 allow system_server incidentd:fifo_file append;
 # Write to a pipe created from `adb shell` (for debuggerd -j `pidof system_server`)
-#line 575
+#line 580
 
 
 # Allow system_server to read pipes from incidentd (used to deliver incident reports
@@ -73935,39 +74545,39 @@
 
 # Allow system_server to exec the perfetto cmdline client and pass it a trace config
 
-#line 595
+#line 600
 # Allow the necessary permissions.
-#line 595
+#line 600
 
-#line 595
+#line 600
 # Old domain may exec the file and transition to the new domain.
-#line 595
+#line 600
 allow system_server perfetto_exec:file { getattr open read execute map };
-#line 595
+#line 600
 allow system_server perfetto:process transition;
-#line 595
+#line 600
 # New domain is entered by executing the file.
-#line 595
+#line 600
 allow perfetto perfetto_exec:file { entrypoint open read execute getattr map };
-#line 595
+#line 600
 # New domain can send SIGCHLD to its caller.
-#line 595
+#line 600
 allow perfetto system_server:process sigchld;
-#line 595
+#line 600
 # Enable AT_SECURE, i.e. libc secure mode.
-#line 595
+#line 600
 dontaudit system_server perfetto:process noatsecure;
-#line 595
+#line 600
 # XXX dontaudit candidate but requires further study.
-#line 595
+#line 600
 allow system_server perfetto:process { siginh rlimitinh };
-#line 595
+#line 600
 
-#line 595
+#line 600
 # Make the transition occur by default.
-#line 595
+#line 600
 type_transition system_server perfetto_exec:process perfetto;
-#line 595
+#line 600
 ;
 allow system_server perfetto:fifo_file { read write };
 
@@ -73979,39 +74589,39 @@
 # Allow system server to exec the trace redactor cmdline client and kill the process for
 # ProfilingService.
 
-#line 605
+#line 610
 # Allow the necessary permissions.
-#line 605
+#line 610
 
-#line 605
+#line 610
 # Old domain may exec the file and transition to the new domain.
-#line 605
+#line 610
 allow system_server trace_redactor_exec:file { getattr open read execute map };
-#line 605
+#line 610
 allow system_server trace_redactor:process transition;
-#line 605
+#line 610
 # New domain is entered by executing the file.
-#line 605
+#line 610
 allow trace_redactor trace_redactor_exec:file { entrypoint open read execute getattr map };
-#line 605
+#line 610
 # New domain can send SIGCHLD to its caller.
-#line 605
+#line 610
 allow trace_redactor system_server:process sigchld;
-#line 605
+#line 610
 # Enable AT_SECURE, i.e. libc secure mode.
-#line 605
+#line 610
 dontaudit system_server trace_redactor:process noatsecure;
-#line 605
+#line 610
 # XXX dontaudit candidate but requires further study.
-#line 605
+#line 610
 allow system_server trace_redactor:process { siginh rlimitinh };
-#line 605
+#line 610
 
-#line 605
+#line 610
 # Make the transition occur by default.
-#line 605
+#line 610
 type_transition system_server trace_redactor_exec:process trace_redactor;
-#line 605
+#line 610
 ;
 allow system_server trace_redactor:process signal;
 
@@ -74151,1667 +74761,1667 @@
 
 # Property Service write
 
-#line 743
+#line 748
 
-#line 743
+#line 748
 allow system_server property_socket:sock_file write;
-#line 743
+#line 748
 allow system_server init:unix_stream_socket connectto;
-#line 743
+#line 748
 
-#line 743
+#line 748
 allow system_server system_prop:property_service set;
-#line 743
+#line 748
 
-#line 743
+#line 748
 allow system_server system_prop:file { getattr open read map };
-#line 743
+#line 748
 
-#line 743
+#line 748
 
 
-#line 744
+#line 749
 
-#line 744
+#line 749
 allow system_server property_socket:sock_file write;
-#line 744
+#line 749
 allow system_server init:unix_stream_socket connectto;
-#line 744
+#line 749
 
-#line 744
+#line 749
 allow system_server bootanim_system_prop:property_service set;
-#line 744
+#line 749
 
-#line 744
+#line 749
 allow system_server bootanim_system_prop:file { getattr open read map };
-#line 744
+#line 749
 
-#line 744
+#line 749
 
 
-#line 745
+#line 750
 
-#line 745
+#line 750
 allow system_server property_socket:sock_file write;
-#line 745
+#line 750
 allow system_server init:unix_stream_socket connectto;
-#line 745
+#line 750
 
-#line 745
+#line 750
 allow system_server bluetooth_prop:property_service set;
-#line 745
+#line 750
 
-#line 745
+#line 750
 allow system_server bluetooth_prop:file { getattr open read map };
-#line 745
+#line 750
 
-#line 745
+#line 750
 
 
-#line 746
+#line 751
 
-#line 746
+#line 751
 allow system_server property_socket:sock_file write;
-#line 746
+#line 751
 allow system_server init:unix_stream_socket connectto;
-#line 746
+#line 751
 
-#line 746
+#line 751
 allow system_server exported_system_prop:property_service set;
-#line 746
+#line 751
 
-#line 746
+#line 751
 allow system_server exported_system_prop:file { getattr open read map };
-#line 746
+#line 751
 
-#line 746
+#line 751
 
 
-#line 747
+#line 752
 
-#line 747
+#line 752
 allow system_server property_socket:sock_file write;
-#line 747
+#line 752
 allow system_server init:unix_stream_socket connectto;
-#line 747
+#line 752
 
-#line 747
+#line 752
 allow system_server exported3_system_prop:property_service set;
-#line 747
+#line 752
 
-#line 747
+#line 752
 allow system_server exported3_system_prop:file { getattr open read map };
-#line 747
+#line 752
 
-#line 747
+#line 752
 
 
-#line 748
+#line 753
 
-#line 748
+#line 753
 allow system_server property_socket:sock_file write;
-#line 748
+#line 753
 allow system_server init:unix_stream_socket connectto;
-#line 748
+#line 753
 
-#line 748
+#line 753
 allow system_server safemode_prop:property_service set;
-#line 748
+#line 753
 
-#line 748
+#line 753
 allow system_server safemode_prop:file { getattr open read map };
-#line 748
+#line 753
 
-#line 748
+#line 753
 
 
-#line 749
+#line 754
 
-#line 749
+#line 754
 allow system_server property_socket:sock_file write;
-#line 749
+#line 754
 allow system_server init:unix_stream_socket connectto;
-#line 749
+#line 754
 
-#line 749
+#line 754
 allow system_server theme_prop:property_service set;
-#line 749
+#line 754
 
-#line 749
+#line 754
 allow system_server theme_prop:file { getattr open read map };
-#line 749
+#line 754
 
-#line 749
+#line 754
 
 
-#line 750
+#line 755
 
-#line 750
+#line 755
 allow system_server property_socket:sock_file write;
-#line 750
+#line 755
 allow system_server init:unix_stream_socket connectto;
-#line 750
+#line 755
 
-#line 750
+#line 755
 allow system_server dhcp_prop:property_service set;
-#line 750
+#line 755
 
-#line 750
+#line 755
 allow system_server dhcp_prop:file { getattr open read map };
-#line 750
+#line 755
 
-#line 750
+#line 755
 
 
-#line 751
+#line 756
 
-#line 751
+#line 756
 allow system_server property_socket:sock_file write;
-#line 751
+#line 756
 allow system_server init:unix_stream_socket connectto;
-#line 751
+#line 756
 
-#line 751
+#line 756
 allow system_server net_connectivity_prop:property_service set;
-#line 751
+#line 756
 
-#line 751
+#line 756
 allow system_server net_connectivity_prop:file { getattr open read map };
-#line 751
+#line 756
 
-#line 751
+#line 756
 
 
-#line 752
+#line 757
 
-#line 752
+#line 757
 allow system_server property_socket:sock_file write;
-#line 752
+#line 757
 allow system_server init:unix_stream_socket connectto;
-#line 752
+#line 757
 
-#line 752
+#line 757
 allow system_server net_radio_prop:property_service set;
-#line 752
+#line 757
 
-#line 752
+#line 757
 allow system_server net_radio_prop:file { getattr open read map };
-#line 752
+#line 757
 
-#line 752
+#line 757
 
 
-#line 753
+#line 758
 
-#line 753
+#line 758
 allow system_server property_socket:sock_file write;
-#line 753
+#line 758
 allow system_server init:unix_stream_socket connectto;
-#line 753
+#line 758
 
-#line 753
+#line 758
 allow system_server net_dns_prop:property_service set;
-#line 753
+#line 758
 
-#line 753
+#line 758
 allow system_server net_dns_prop:file { getattr open read map };
-#line 753
+#line 758
 
-#line 753
+#line 758
 
 
-#line 754
+#line 759
 
-#line 754
+#line 759
 allow system_server property_socket:sock_file write;
-#line 754
+#line 759
 allow system_server init:unix_stream_socket connectto;
-#line 754
+#line 759
 
-#line 754
+#line 759
 allow system_server usb_control_prop:property_service set;
-#line 754
+#line 759
 
-#line 754
+#line 759
 allow system_server usb_control_prop:file { getattr open read map };
-#line 754
+#line 759
 
-#line 754
+#line 759
 
 
-#line 755
+#line 760
 
-#line 755
+#line 760
 allow system_server property_socket:sock_file write;
-#line 755
+#line 760
 allow system_server init:unix_stream_socket connectto;
-#line 755
+#line 760
 
-#line 755
+#line 760
 allow system_server usb_prop:property_service set;
-#line 755
+#line 760
 
-#line 755
+#line 760
 allow system_server usb_prop:file { getattr open read map };
-#line 755
+#line 760
 
-#line 755
+#line 760
 
 
-#line 756
+#line 761
 
-#line 756
+#line 761
 allow system_server property_socket:sock_file write;
-#line 756
+#line 761
 allow system_server init:unix_stream_socket connectto;
-#line 756
+#line 761
 
-#line 756
+#line 761
 allow system_server debug_prop:property_service set;
-#line 756
+#line 761
 
-#line 756
+#line 761
 allow system_server debug_prop:file { getattr open read map };
-#line 756
+#line 761
 
-#line 756
+#line 761
 
 
-#line 757
+#line 762
 
-#line 757
+#line 762
 allow system_server property_socket:sock_file write;
-#line 757
+#line 762
 allow system_server init:unix_stream_socket connectto;
-#line 757
+#line 762
 
-#line 757
+#line 762
 allow system_server powerctl_prop:property_service set;
-#line 757
+#line 762
 
-#line 757
+#line 762
 allow system_server powerctl_prop:file { getattr open read map };
-#line 757
+#line 762
 
-#line 757
+#line 762
 
 
-#line 758
+#line 763
 
-#line 758
+#line 763
 allow system_server property_socket:sock_file write;
-#line 758
+#line 763
 allow system_server init:unix_stream_socket connectto;
-#line 758
+#line 763
 
-#line 758
+#line 763
 allow system_server fingerprint_prop:property_service set;
-#line 758
+#line 763
 
-#line 758
+#line 763
 allow system_server fingerprint_prop:file { getattr open read map };
-#line 758
+#line 763
 
-#line 758
+#line 763
 
 
-#line 759
+#line 764
 
-#line 759
+#line 764
 allow system_server property_socket:sock_file write;
-#line 759
+#line 764
 allow system_server init:unix_stream_socket connectto;
-#line 759
+#line 764
 
-#line 759
+#line 764
 allow system_server device_logging_prop:property_service set;
-#line 759
+#line 764
 
-#line 759
+#line 764
 allow system_server device_logging_prop:file { getattr open read map };
-#line 759
+#line 764
 
-#line 759
+#line 764
 
 
-#line 760
+#line 765
 
-#line 760
+#line 765
 allow system_server property_socket:sock_file write;
-#line 760
+#line 765
 allow system_server init:unix_stream_socket connectto;
-#line 760
+#line 765
 
-#line 760
+#line 765
 allow system_server dumpstate_options_prop:property_service set;
-#line 760
+#line 765
 
-#line 760
+#line 765
 allow system_server dumpstate_options_prop:file { getattr open read map };
-#line 760
+#line 765
 
-#line 760
+#line 765
 
 
-#line 761
+#line 766
 
-#line 761
+#line 766
 allow system_server property_socket:sock_file write;
-#line 761
+#line 766
 allow system_server init:unix_stream_socket connectto;
-#line 761
+#line 766
 
-#line 761
+#line 766
 allow system_server overlay_prop:property_service set;
-#line 761
+#line 766
 
-#line 761
+#line 766
 allow system_server overlay_prop:file { getattr open read map };
-#line 761
+#line 766
 
-#line 761
+#line 766
 
 
-#line 762
+#line 767
 
-#line 762
+#line 767
 allow system_server property_socket:sock_file write;
-#line 762
+#line 767
 allow system_server init:unix_stream_socket connectto;
-#line 762
+#line 767
 
-#line 762
+#line 767
 allow system_server exported_overlay_prop:property_service set;
-#line 762
+#line 767
 
-#line 762
+#line 767
 allow system_server exported_overlay_prop:file { getattr open read map };
-#line 762
+#line 767
 
-#line 762
+#line 767
 
 
-#line 763
+#line 768
 
-#line 763
+#line 768
 allow system_server property_socket:sock_file write;
-#line 763
+#line 768
 allow system_server init:unix_stream_socket connectto;
-#line 763
+#line 768
 
-#line 763
+#line 768
 allow system_server pm_prop:property_service set;
-#line 763
+#line 768
 
-#line 763
+#line 768
 allow system_server pm_prop:file { getattr open read map };
-#line 763
+#line 768
 
-#line 763
+#line 768
 
 
-#line 764
+#line 769
 
-#line 764
+#line 769
 allow system_server property_socket:sock_file write;
-#line 764
+#line 769
 allow system_server init:unix_stream_socket connectto;
-#line 764
+#line 769
 
-#line 764
+#line 769
 allow system_server exported_pm_prop:property_service set;
-#line 764
+#line 769
 
-#line 764
+#line 769
 allow system_server exported_pm_prop:file { getattr open read map };
-#line 764
+#line 769
 
-#line 764
+#line 769
 
 
-#line 765
+#line 770
 
-#line 765
+#line 770
 allow system_server property_socket:sock_file write;
-#line 765
+#line 770
 allow system_server init:unix_stream_socket connectto;
-#line 765
+#line 770
 
-#line 765
+#line 770
 allow system_server socket_hook_prop:property_service set;
-#line 765
+#line 770
 
-#line 765
+#line 770
 allow system_server socket_hook_prop:file { getattr open read map };
-#line 765
+#line 770
 
-#line 765
+#line 770
 
 
-#line 766
+#line 771
 
-#line 766
+#line 771
 allow system_server property_socket:sock_file write;
-#line 766
+#line 771
 allow system_server init:unix_stream_socket connectto;
-#line 766
+#line 771
 
-#line 766
+#line 771
 allow system_server audio_prop:property_service set;
-#line 766
+#line 771
 
-#line 766
+#line 771
 allow system_server audio_prop:file { getattr open read map };
-#line 766
+#line 771
 
-#line 766
+#line 771
 
 
-#line 767
+#line 772
 
-#line 767
+#line 772
 allow system_server property_socket:sock_file write;
-#line 767
+#line 772
 allow system_server init:unix_stream_socket connectto;
-#line 767
+#line 772
 
-#line 767
+#line 772
 allow system_server boot_status_prop:property_service set;
-#line 767
+#line 772
 
-#line 767
+#line 772
 allow system_server boot_status_prop:file { getattr open read map };
-#line 767
+#line 772
 
-#line 767
+#line 772
 
 
-#line 768
+#line 773
 
-#line 768
+#line 773
 allow system_server property_socket:sock_file write;
-#line 768
+#line 773
 allow system_server init:unix_stream_socket connectto;
-#line 768
+#line 773
 
-#line 768
+#line 773
 allow system_server surfaceflinger_color_prop:property_service set;
-#line 768
+#line 773
 
-#line 768
+#line 773
 allow system_server surfaceflinger_color_prop:file { getattr open read map };
-#line 768
+#line 773
 
-#line 768
+#line 773
 
 
-#line 769
+#line 774
 
-#line 769
+#line 774
 allow system_server property_socket:sock_file write;
-#line 769
+#line 774
 allow system_server init:unix_stream_socket connectto;
-#line 769
+#line 774
 
-#line 769
+#line 774
 allow system_server provisioned_prop:property_service set;
-#line 769
+#line 774
 
-#line 769
+#line 774
 allow system_server provisioned_prop:file { getattr open read map };
-#line 769
+#line 774
 
-#line 769
+#line 774
 
 
-#line 770
+#line 775
 
-#line 770
+#line 775
 allow system_server property_socket:sock_file write;
-#line 770
+#line 775
 allow system_server init:unix_stream_socket connectto;
-#line 770
+#line 775
 
-#line 770
+#line 775
 allow system_server retaildemo_prop:property_service set;
-#line 770
+#line 775
 
-#line 770
+#line 775
 allow system_server retaildemo_prop:file { getattr open read map };
-#line 770
+#line 775
 
-#line 770
+#line 775
 
 
-#line 771
+#line 776
 
-#line 771
+#line 776
 allow system_server property_socket:sock_file write;
-#line 771
+#line 776
 allow system_server init:unix_stream_socket connectto;
-#line 771
+#line 776
 
-#line 771
+#line 776
 allow system_server dmesgd_start_prop:property_service set;
-#line 771
+#line 776
 
-#line 771
+#line 776
 allow system_server dmesgd_start_prop:file { getattr open read map };
-#line 771
+#line 776
 
-#line 771
+#line 776
 
 
-#line 772
+#line 777
 
-#line 772
+#line 777
 allow system_server property_socket:sock_file write;
-#line 772
+#line 777
 allow system_server init:unix_stream_socket connectto;
-#line 772
+#line 777
 
-#line 772
+#line 777
 allow system_server locale_prop:property_service set;
-#line 772
+#line 777
 
-#line 772
+#line 777
 allow system_server locale_prop:file { getattr open read map };
-#line 772
+#line 777
 
-#line 772
+#line 777
 
 
-#line 773
+#line 778
 
-#line 773
+#line 778
 allow system_server property_socket:sock_file write;
-#line 773
+#line 778
 allow system_server init:unix_stream_socket connectto;
-#line 773
+#line 778
 
-#line 773
+#line 778
 allow system_server timezone_metadata_prop:property_service set;
-#line 773
+#line 778
 
-#line 773
+#line 778
 allow system_server timezone_metadata_prop:file { getattr open read map };
-#line 773
+#line 778
 
-#line 773
+#line 778
 
 
-#line 774
+#line 779
 
-#line 774
+#line 779
 allow system_server property_socket:sock_file write;
-#line 774
+#line 779
 allow system_server init:unix_stream_socket connectto;
-#line 774
+#line 779
 
-#line 774
+#line 779
 allow system_server timezone_prop:property_service set;
-#line 774
+#line 779
 
-#line 774
+#line 779
 allow system_server timezone_prop:file { getattr open read map };
-#line 774
+#line 779
 
-#line 774
+#line 779
 
 
-#line 775
+#line 780
 
-#line 775
+#line 780
 allow system_server property_socket:sock_file write;
-#line 775
+#line 780
 allow system_server init:unix_stream_socket connectto;
-#line 775
+#line 780
 
-#line 775
+#line 780
 allow system_server crashrecovery_prop:property_service set;
-#line 775
+#line 780
 
-#line 775
+#line 780
 allow system_server crashrecovery_prop:file { getattr open read map };
-#line 775
+#line 780
 
-#line 775
+#line 780
 
 
 
 
 # ctl interface
 
-#line 780
+#line 785
 
-#line 780
+#line 785
 allow system_server property_socket:sock_file write;
-#line 780
+#line 785
 allow system_server init:unix_stream_socket connectto;
-#line 780
+#line 785
 
-#line 780
+#line 785
 allow system_server ctl_default_prop:property_service set;
-#line 780
+#line 785
 
-#line 780
+#line 785
 allow system_server ctl_default_prop:file { getattr open read map };
-#line 780
+#line 785
 
-#line 780
+#line 785
 
 
-#line 781
+#line 786
 
-#line 781
+#line 786
 allow system_server property_socket:sock_file write;
-#line 781
+#line 786
 allow system_server init:unix_stream_socket connectto;
-#line 781
+#line 786
 
-#line 781
+#line 786
 allow system_server ctl_bugreport_prop:property_service set;
-#line 781
+#line 786
 
-#line 781
+#line 786
 allow system_server ctl_bugreport_prop:file { getattr open read map };
-#line 781
+#line 786
 
-#line 781
+#line 786
 
 
-#line 782
+#line 787
 
-#line 782
+#line 787
 allow system_server property_socket:sock_file write;
-#line 782
+#line 787
 allow system_server init:unix_stream_socket connectto;
-#line 782
+#line 787
 
-#line 782
+#line 787
 allow system_server ctl_gsid_prop:property_service set;
-#line 782
+#line 787
 
-#line 782
+#line 787
 allow system_server ctl_gsid_prop:file { getattr open read map };
-#line 782
+#line 787
 
-#line 782
+#line 787
 
 
-#line 783
+#line 788
 
-#line 783
+#line 788
 allow system_server property_socket:sock_file write;
-#line 783
+#line 788
 allow system_server init:unix_stream_socket connectto;
-#line 783
+#line 788
 
-#line 783
+#line 788
 allow system_server ctl_artd_pre_reboot_prop:property_service set;
-#line 783
+#line 788
 
-#line 783
+#line 788
 allow system_server ctl_artd_pre_reboot_prop:file { getattr open read map };
-#line 783
+#line 788
 
-#line 783
+#line 788
 
 
 # cppreopt property
 
-#line 786
+#line 791
 
-#line 786
+#line 791
 allow system_server property_socket:sock_file write;
-#line 786
+#line 791
 allow system_server init:unix_stream_socket connectto;
-#line 786
+#line 791
 
-#line 786
+#line 791
 allow system_server cppreopt_prop:property_service set;
-#line 786
+#line 791
 
-#line 786
+#line 791
 allow system_server cppreopt_prop:file { getattr open read map };
-#line 786
+#line 791
 
-#line 786
+#line 791
 
 
 # server configurable flags properties
 
-#line 789
+#line 794
 
-#line 789
+#line 794
 allow system_server property_socket:sock_file write;
-#line 789
+#line 794
 allow system_server init:unix_stream_socket connectto;
-#line 789
+#line 794
 
-#line 789
+#line 794
 allow system_server device_config_core_experiments_team_internal_prop:property_service set;
-#line 789
+#line 794
 
-#line 789
+#line 794
 allow system_server device_config_core_experiments_team_internal_prop:file { getattr open read map };
-#line 789
+#line 794
 
-#line 789
+#line 794
 
 
-#line 790
+#line 795
 
-#line 790
+#line 795
 allow system_server property_socket:sock_file write;
-#line 790
+#line 795
 allow system_server init:unix_stream_socket connectto;
-#line 790
+#line 795
 
-#line 790
+#line 795
 allow system_server device_config_edgetpu_native_prop:property_service set;
-#line 790
+#line 795
 
-#line 790
+#line 795
 allow system_server device_config_edgetpu_native_prop:file { getattr open read map };
-#line 790
+#line 795
 
-#line 790
+#line 795
 
 
-#line 791
+#line 796
 
-#line 791
+#line 796
 allow system_server property_socket:sock_file write;
-#line 791
+#line 796
 allow system_server init:unix_stream_socket connectto;
-#line 791
+#line 796
 
-#line 791
+#line 796
 allow system_server device_config_input_native_boot_prop:property_service set;
-#line 791
+#line 796
 
-#line 791
+#line 796
 allow system_server device_config_input_native_boot_prop:file { getattr open read map };
-#line 791
+#line 796
 
-#line 791
+#line 796
 
 
-#line 792
+#line 797
 
-#line 792
+#line 797
 allow system_server property_socket:sock_file write;
-#line 792
+#line 797
 allow system_server init:unix_stream_socket connectto;
-#line 792
+#line 797
 
-#line 792
+#line 797
 allow system_server device_config_netd_native_prop:property_service set;
-#line 792
+#line 797
 
-#line 792
+#line 797
 allow system_server device_config_netd_native_prop:file { getattr open read map };
-#line 792
+#line 797
 
-#line 792
+#line 797
 
 
-#line 793
+#line 798
 
-#line 793
+#line 798
 allow system_server property_socket:sock_file write;
-#line 793
+#line 798
 allow system_server init:unix_stream_socket connectto;
-#line 793
+#line 798
 
-#line 793
+#line 798
 allow system_server device_config_nnapi_native_prop:property_service set;
-#line 793
+#line 798
 
-#line 793
+#line 798
 allow system_server device_config_nnapi_native_prop:file { getattr open read map };
-#line 793
+#line 798
 
-#line 793
+#line 798
 
 
-#line 794
+#line 799
 
-#line 794
+#line 799
 allow system_server property_socket:sock_file write;
-#line 794
+#line 799
 allow system_server init:unix_stream_socket connectto;
-#line 794
+#line 799
 
-#line 794
+#line 799
 allow system_server device_config_activity_manager_native_boot_prop:property_service set;
-#line 794
+#line 799
 
-#line 794
+#line 799
 allow system_server device_config_activity_manager_native_boot_prop:file { getattr open read map };
-#line 794
+#line 799
 
-#line 794
+#line 799
 
 
-#line 795
+#line 800
 
-#line 795
+#line 800
 allow system_server property_socket:sock_file write;
-#line 795
+#line 800
 allow system_server init:unix_stream_socket connectto;
-#line 795
+#line 800
 
-#line 795
+#line 800
 allow system_server device_config_runtime_native_boot_prop:property_service set;
-#line 795
+#line 800
 
-#line 795
+#line 800
 allow system_server device_config_runtime_native_boot_prop:file { getattr open read map };
-#line 795
+#line 800
 
-#line 795
+#line 800
 
 
-#line 796
+#line 801
 
-#line 796
+#line 801
 allow system_server property_socket:sock_file write;
-#line 796
+#line 801
 allow system_server init:unix_stream_socket connectto;
-#line 796
+#line 801
 
-#line 796
+#line 801
 allow system_server device_config_runtime_native_prop:property_service set;
-#line 796
+#line 801
 
-#line 796
+#line 801
 allow system_server device_config_runtime_native_prop:file { getattr open read map };
-#line 796
+#line 801
 
-#line 796
+#line 801
 
 
-#line 797
+#line 802
 
-#line 797
+#line 802
 allow system_server property_socket:sock_file write;
-#line 797
+#line 802
 allow system_server init:unix_stream_socket connectto;
-#line 797
+#line 802
 
-#line 797
+#line 802
 allow system_server device_config_lmkd_native_prop:property_service set;
-#line 797
+#line 802
 
-#line 797
+#line 802
 allow system_server device_config_lmkd_native_prop:file { getattr open read map };
-#line 797
+#line 802
 
-#line 797
+#line 802
 
 
-#line 798
+#line 803
 
-#line 798
+#line 803
 allow system_server property_socket:sock_file write;
-#line 798
+#line 803
 allow system_server init:unix_stream_socket connectto;
-#line 798
+#line 803
 
-#line 798
+#line 803
 allow system_server device_config_media_native_prop:property_service set;
-#line 798
+#line 803
 
-#line 798
+#line 803
 allow system_server device_config_media_native_prop:file { getattr open read map };
-#line 798
+#line 803
 
-#line 798
+#line 803
 
 
-#line 799
+#line 804
 
-#line 799
+#line 804
 allow system_server property_socket:sock_file write;
-#line 799
+#line 804
 allow system_server init:unix_stream_socket connectto;
-#line 799
+#line 804
 
-#line 799
+#line 804
 allow system_server device_config_camera_native_prop:property_service set;
-#line 799
+#line 804
 
-#line 799
+#line 804
 allow system_server device_config_camera_native_prop:file { getattr open read map };
-#line 799
+#line 804
 
-#line 799
+#line 804
 
 
-#line 800
+#line 805
 
-#line 800
+#line 805
 allow system_server property_socket:sock_file write;
-#line 800
+#line 805
 allow system_server init:unix_stream_socket connectto;
-#line 800
+#line 805
 
-#line 800
+#line 805
 allow system_server device_config_mglru_native_prop:property_service set;
-#line 800
+#line 805
 
-#line 800
+#line 805
 allow system_server device_config_mglru_native_prop:file { getattr open read map };
-#line 800
+#line 805
 
-#line 800
+#line 805
 
 
-#line 801
+#line 806
 
-#line 801
+#line 806
 allow system_server property_socket:sock_file write;
-#line 801
+#line 806
 allow system_server init:unix_stream_socket connectto;
-#line 801
+#line 806
 
-#line 801
+#line 806
 allow system_server device_config_profcollect_native_boot_prop:property_service set;
-#line 801
+#line 806
 
-#line 801
+#line 806
 allow system_server device_config_profcollect_native_boot_prop:file { getattr open read map };
-#line 801
+#line 806
 
-#line 801
+#line 806
 
 
-#line 802
+#line 807
 
-#line 802
+#line 807
 allow system_server property_socket:sock_file write;
-#line 802
+#line 807
 allow system_server init:unix_stream_socket connectto;
-#line 802
+#line 807
 
-#line 802
+#line 807
 allow system_server device_config_statsd_native_prop:property_service set;
-#line 802
+#line 807
 
-#line 802
+#line 807
 allow system_server device_config_statsd_native_prop:file { getattr open read map };
-#line 802
+#line 807
 
-#line 802
+#line 807
 
 
-#line 803
+#line 808
 
-#line 803
+#line 808
 allow system_server property_socket:sock_file write;
-#line 803
+#line 808
 allow system_server init:unix_stream_socket connectto;
-#line 803
+#line 808
 
-#line 803
+#line 808
 allow system_server device_config_statsd_native_boot_prop:property_service set;
-#line 803
+#line 808
 
-#line 803
+#line 808
 allow system_server device_config_statsd_native_boot_prop:file { getattr open read map };
-#line 803
+#line 808
 
-#line 803
+#line 808
 
 
-#line 804
+#line 809
 
-#line 804
+#line 809
 allow system_server property_socket:sock_file write;
-#line 804
+#line 809
 allow system_server init:unix_stream_socket connectto;
-#line 804
+#line 809
 
-#line 804
+#line 809
 allow system_server device_config_storage_native_boot_prop:property_service set;
-#line 804
+#line 809
 
-#line 804
+#line 809
 allow system_server device_config_storage_native_boot_prop:file { getattr open read map };
-#line 804
+#line 809
 
-#line 804
+#line 809
 
 
-#line 805
+#line 810
 
-#line 805
+#line 810
 allow system_server property_socket:sock_file write;
-#line 805
+#line 810
 allow system_server init:unix_stream_socket connectto;
-#line 805
+#line 810
 
-#line 805
+#line 810
 allow system_server device_config_swcodec_native_prop:property_service set;
-#line 805
+#line 810
 
-#line 805
+#line 810
 allow system_server device_config_swcodec_native_prop:file { getattr open read map };
-#line 805
+#line 810
 
-#line 805
+#line 810
 
 
-#line 806
+#line 811
 
-#line 806
+#line 811
 allow system_server property_socket:sock_file write;
-#line 806
+#line 811
 allow system_server init:unix_stream_socket connectto;
-#line 806
+#line 811
 
-#line 806
+#line 811
 allow system_server device_config_sys_traced_prop:property_service set;
-#line 806
+#line 811
 
-#line 806
+#line 811
 allow system_server device_config_sys_traced_prop:file { getattr open read map };
-#line 806
+#line 811
 
-#line 806
+#line 811
 
 
-#line 807
+#line 812
 
-#line 807
+#line 812
 allow system_server property_socket:sock_file write;
-#line 807
+#line 812
 allow system_server init:unix_stream_socket connectto;
-#line 807
+#line 812
 
-#line 807
+#line 812
 allow system_server device_config_window_manager_native_boot_prop:property_service set;
-#line 807
+#line 812
 
-#line 807
+#line 812
 allow system_server device_config_window_manager_native_boot_prop:file { getattr open read map };
-#line 807
+#line 812
 
-#line 807
+#line 812
 
 
-#line 808
+#line 813
 
-#line 808
+#line 813
 allow system_server property_socket:sock_file write;
-#line 808
+#line 813
 allow system_server init:unix_stream_socket connectto;
-#line 808
+#line 813
 
-#line 808
+#line 813
 allow system_server device_config_configuration_prop:property_service set;
-#line 808
+#line 813
 
-#line 808
+#line 813
 allow system_server device_config_configuration_prop:file { getattr open read map };
-#line 808
+#line 813
 
-#line 808
+#line 813
 
 
-#line 809
+#line 814
 
-#line 809
+#line 814
 allow system_server property_socket:sock_file write;
-#line 809
+#line 814
 allow system_server init:unix_stream_socket connectto;
-#line 809
+#line 814
 
-#line 809
+#line 814
 allow system_server device_config_connectivity_prop:property_service set;
-#line 809
+#line 814
 
-#line 809
+#line 814
 allow system_server device_config_connectivity_prop:file { getattr open read map };
-#line 809
+#line 814
 
-#line 809
+#line 814
 
 
-#line 810
+#line 815
 
-#line 810
+#line 815
 allow system_server property_socket:sock_file write;
-#line 810
+#line 815
 allow system_server init:unix_stream_socket connectto;
-#line 810
+#line 815
 
-#line 810
+#line 815
 allow system_server device_config_surface_flinger_native_boot_prop:property_service set;
-#line 810
+#line 815
 
-#line 810
+#line 815
 allow system_server device_config_surface_flinger_native_boot_prop:file { getattr open read map };
-#line 810
+#line 815
 
-#line 810
+#line 815
 
 
-#line 811
+#line 816
 
-#line 811
+#line 816
 allow system_server property_socket:sock_file write;
-#line 811
+#line 816
 allow system_server init:unix_stream_socket connectto;
-#line 811
+#line 816
 
-#line 811
+#line 816
 allow system_server device_config_aconfig_flags_prop:property_service set;
-#line 811
+#line 816
 
-#line 811
+#line 816
 allow system_server device_config_aconfig_flags_prop:file { getattr open read map };
-#line 811
+#line 816
 
-#line 811
+#line 816
 
 
-#line 812
+#line 817
 
-#line 812
+#line 817
 allow system_server property_socket:sock_file write;
-#line 812
+#line 817
 allow system_server init:unix_stream_socket connectto;
-#line 812
+#line 817
 
-#line 812
+#line 817
 allow system_server device_config_vendor_system_native_prop:property_service set;
-#line 812
+#line 817
 
-#line 812
+#line 817
 allow system_server device_config_vendor_system_native_prop:file { getattr open read map };
-#line 812
+#line 817
 
-#line 812
+#line 817
 
 
-#line 813
+#line 818
 
-#line 813
+#line 818
 allow system_server property_socket:sock_file write;
-#line 813
+#line 818
 allow system_server init:unix_stream_socket connectto;
-#line 813
+#line 818
 
-#line 813
+#line 818
 allow system_server device_config_vendor_system_native_boot_prop:property_service set;
-#line 813
+#line 818
 
-#line 813
+#line 818
 allow system_server device_config_vendor_system_native_boot_prop:file { getattr open read map };
-#line 813
+#line 818
 
-#line 813
+#line 818
 
 
-#line 814
+#line 819
 
-#line 814
+#line 819
 allow system_server property_socket:sock_file write;
-#line 814
+#line 819
 allow system_server init:unix_stream_socket connectto;
-#line 814
+#line 819
 
-#line 814
+#line 819
 allow system_server device_config_virtualization_framework_native_prop:property_service set;
-#line 814
+#line 819
 
-#line 814
+#line 819
 allow system_server device_config_virtualization_framework_native_prop:file { getattr open read map };
-#line 814
+#line 819
 
-#line 814
+#line 819
 
 
-#line 815
+#line 820
 
-#line 815
+#line 820
 allow system_server property_socket:sock_file write;
-#line 815
+#line 820
 allow system_server init:unix_stream_socket connectto;
-#line 815
+#line 820
 
-#line 815
+#line 820
 allow system_server device_config_memory_safety_native_boot_prop:property_service set;
-#line 815
+#line 820
 
-#line 815
+#line 820
 allow system_server device_config_memory_safety_native_boot_prop:file { getattr open read map };
-#line 815
+#line 820
 
-#line 815
+#line 820
 
 
-#line 816
+#line 821
 
-#line 816
+#line 821
 allow system_server property_socket:sock_file write;
-#line 816
+#line 821
 allow system_server init:unix_stream_socket connectto;
-#line 816
+#line 821
 
-#line 816
+#line 821
 allow system_server device_config_memory_safety_native_prop:property_service set;
-#line 816
+#line 821
 
-#line 816
+#line 821
 allow system_server device_config_memory_safety_native_prop:file { getattr open read map };
-#line 816
+#line 821
 
-#line 816
+#line 821
 
 
-#line 817
+#line 822
 
-#line 817
+#line 822
 allow system_server property_socket:sock_file write;
-#line 817
+#line 822
 allow system_server init:unix_stream_socket connectto;
-#line 817
+#line 822
 
-#line 817
+#line 822
 allow system_server device_config_remote_key_provisioning_native_prop:property_service set;
-#line 817
+#line 822
 
-#line 817
+#line 822
 allow system_server device_config_remote_key_provisioning_native_prop:file { getattr open read map };
-#line 817
+#line 822
 
-#line 817
+#line 822
 
 
-#line 818
+#line 823
 
-#line 818
+#line 823
 allow system_server property_socket:sock_file write;
-#line 818
+#line 823
 allow system_server init:unix_stream_socket connectto;
-#line 818
+#line 823
 
-#line 818
+#line 823
 allow system_server device_config_tethering_u_or_later_native_prop:property_service set;
-#line 818
+#line 823
 
-#line 818
+#line 823
 allow system_server device_config_tethering_u_or_later_native_prop:file { getattr open read map };
-#line 818
+#line 823
 
-#line 818
+#line 823
 
 
-#line 819
+#line 824
 
-#line 819
+#line 824
 allow system_server property_socket:sock_file write;
-#line 819
+#line 824
 allow system_server init:unix_stream_socket connectto;
-#line 819
+#line 824
 
-#line 819
+#line 824
 allow system_server device_config_mmd_native_prop:property_service set;
-#line 819
+#line 824
 
-#line 819
+#line 824
 allow system_server device_config_mmd_native_prop:file { getattr open read map };
-#line 819
+#line 824
 
-#line 819
+#line 824
 
 
-#line 820
+#line 825
 
-#line 820
+#line 825
 allow system_server property_socket:sock_file write;
-#line 820
+#line 825
 allow system_server init:unix_stream_socket connectto;
-#line 820
+#line 825
 
-#line 820
+#line 825
 allow system_server smart_idle_maint_enabled_prop:property_service set;
-#line 820
+#line 825
 
-#line 820
+#line 825
 allow system_server smart_idle_maint_enabled_prop:file { getattr open read map };
-#line 820
+#line 825
 
-#line 820
+#line 825
 
 
-#line 821
+#line 826
 
-#line 821
+#line 826
 allow system_server property_socket:sock_file write;
-#line 821
+#line 826
 allow system_server init:unix_stream_socket connectto;
-#line 821
+#line 826
 
-#line 821
+#line 826
 allow system_server arm64_memtag_prop:property_service set;
-#line 821
+#line 826
 
-#line 821
+#line 826
 allow system_server arm64_memtag_prop:file { getattr open read map };
-#line 821
+#line 826
 
-#line 821
+#line 826
 
 
 # staged flag properties
 
-#line 824
+#line 829
 
-#line 824
+#line 829
 allow system_server property_socket:sock_file write;
-#line 824
+#line 829
 allow system_server init:unix_stream_socket connectto;
-#line 824
+#line 829
 
-#line 824
+#line 829
 allow system_server next_boot_prop:property_service set;
-#line 824
+#line 829
 
-#line 824
+#line 829
 allow system_server next_boot_prop:file { getattr open read map };
-#line 824
+#line 829
 
-#line 824
+#line 829
 
 
 # Allow system server to read pm.16kb.app_compat.disabled
 
-#line 827
+#line 832
 allow system_server pm_16kb_app_compat_prop:file { getattr open read map };
-#line 827
+#line 832
 
 
 # Allow query ART device config properties
 
-#line 830
+#line 835
 allow system_server device_config_runtime_native_boot_prop:file { getattr open read map };
-#line 830
+#line 835
 
 
-#line 831
+#line 836
 allow system_server device_config_runtime_native_prop:file { getattr open read map };
-#line 831
+#line 836
 
 
 # BootReceiver to read ro.boot.bootreason
 
-#line 834
+#line 839
 allow system_server bootloader_boot_reason_prop:file { getattr open read map };
-#line 834
+#line 839
 
 # PowerManager to read sys.boot.reason
 
-#line 836
+#line 841
 allow system_server system_boot_reason_prop:file { getattr open read map };
-#line 836
+#line 841
 
 
 # Collect metrics on boot time created by init
 
-#line 839
+#line 844
 allow system_server boottime_prop:file { getattr open read map };
-#line 839
+#line 844
 
 
 # Read device's serial number from system properties
 
-#line 842
+#line 847
 allow system_server serialno_prop:file { getattr open read map };
-#line 842
+#line 847
 
 
 # Read/write the property which keeps track of whether this is the first start of system_server
 
-#line 845
+#line 850
 
-#line 845
+#line 850
 allow system_server property_socket:sock_file write;
-#line 845
+#line 850
 allow system_server init:unix_stream_socket connectto;
-#line 845
+#line 850
 
-#line 845
+#line 850
 allow system_server firstboot_prop:property_service set;
-#line 845
+#line 850
 
-#line 845
+#line 850
 allow system_server firstboot_prop:file { getattr open read map };
-#line 845
+#line 850
 
-#line 845
+#line 850
 
 
 # Audio service in system server can read audio config properties,
 # such as camera shutter enforcement
 
-#line 849
+#line 854
 allow system_server audio_config_prop:file { getattr open read map };
-#line 849
+#line 854
 
 
 # StorageManager service reads media config while checking if transcoding is supported.
 
-#line 852
+#line 857
 allow system_server media_config_prop:file { getattr open read map };
-#line 852
+#line 857
 
 
 # system server reads this property to keep track of whether server configurable flags have been
 # reset during current boot.
 
-#line 856
+#line 861
 allow system_server device_config_reset_performed_prop:file { getattr open read map };
-#line 856
+#line 861
 
 
 # Read/write the property that enables Test Harness Mode
 
-#line 859
+#line 864
 
-#line 859
+#line 864
 allow system_server property_socket:sock_file write;
-#line 859
+#line 864
 allow system_server init:unix_stream_socket connectto;
-#line 859
+#line 864
 
-#line 859
+#line 864
 allow system_server test_harness_prop:property_service set;
-#line 859
+#line 864
 
-#line 859
+#line 864
 allow system_server test_harness_prop:file { getattr open read map };
-#line 859
+#line 864
 
-#line 859
+#line 864
 
 
 # Read gsid.image_running.
 
-#line 862
+#line 867
 allow system_server gsid_prop:file { getattr open read map };
-#line 862
+#line 867
 
 
 # Read the property that mocks an OTA
 
-#line 865
+#line 870
 allow system_server mock_ota_prop:file { getattr open read map };
-#line 865
+#line 870
 
 
 # Read the property as feature flag for protecting apks with fs-verity.
 
-#line 868
+#line 873
 allow system_server apk_verity_prop:file { getattr open read map };
-#line 868
+#line 873
 
 
 # Read wifi.interface
 
-#line 871
+#line 876
 allow system_server wifi_prop:file { getattr open read map };
-#line 871
+#line 876
 
 
 # Read the vendor property that indicates if Incremental features is enabled
 
-#line 874
+#line 879
 allow system_server incremental_prop:file { getattr open read map };
-#line 874
+#line 879
 
 
 # Read ro.zram. properties
 
-#line 877
+#line 882
 allow system_server zram_config_prop:file { getattr open read map };
-#line 877
+#line 882
 
 
 # Read/write persist.sys.zram_enabled
 
-#line 880
+#line 885
 
-#line 880
+#line 885
 allow system_server property_socket:sock_file write;
-#line 880
+#line 885
 allow system_server init:unix_stream_socket connectto;
-#line 880
+#line 885
 
-#line 880
+#line 885
 allow system_server zram_control_prop:property_service set;
-#line 880
+#line 885
 
-#line 880
+#line 885
 allow system_server zram_control_prop:file { getattr open read map };
-#line 880
+#line 885
 
-#line 880
+#line 885
 
 
 # Read/write persist.sys.dalvik.vm.lib.2
 
-#line 883
+#line 888
 
-#line 883
+#line 888
 allow system_server property_socket:sock_file write;
-#line 883
+#line 888
 allow system_server init:unix_stream_socket connectto;
-#line 883
+#line 888
 
-#line 883
+#line 888
 allow system_server dalvik_runtime_prop:property_service set;
-#line 883
+#line 888
 
-#line 883
+#line 888
 allow system_server dalvik_runtime_prop:file { getattr open read map };
-#line 883
+#line 888
 
-#line 883
+#line 888
 
 
 # Read ro.control_privapp_permissions and ro.cp_system_other_odex
 
-#line 886
+#line 891
 allow system_server packagemanager_config_prop:file { getattr open read map };
-#line 886
+#line 891
 
 
 # Read the net.464xlat.cellular.enabled property (written by init).
 
-#line 889
+#line 894
 allow system_server net_464xlat_fromvendor_prop:file { getattr open read map };
-#line 889
+#line 894
 
 
 # Read hypervisor capabilities ro.boot.hypervisor.*
 
-#line 892
+#line 897
 allow system_server hypervisor_prop:file { getattr open read map };
-#line 892
+#line 897
 
 
 # Read persist.wm.debug. properties
 
-#line 895
+#line 900
 allow system_server persist_wm_debug_prop:file { getattr open read map };
-#line 895
+#line 900
 
 
 # Read persist.sysui.notification.builder_extras_override property
 
-#line 898
+#line 903
 allow system_server persist_sysui_builder_extras_prop:file { getattr open read map };
-#line 898
+#line 903
 
 # Read persist.sysui.notification.ranking_update_ashmem property
 
-#line 900
+#line 905
 allow system_server persist_sysui_ranking_update_prop:file { getattr open read map };
-#line 900
+#line 905
 
 
 # Read ro.tuner.lazyhal
 
-#line 903
+#line 908
 allow system_server tuner_config_prop:file { getattr open read map };
-#line 903
+#line 908
 
 # Write tuner.server.enable
 
-#line 905
+#line 910
 
-#line 905
+#line 910
 allow system_server property_socket:sock_file write;
-#line 905
+#line 910
 allow system_server init:unix_stream_socket connectto;
-#line 905
+#line 910
 
-#line 905
+#line 910
 allow system_server tuner_server_ctl_prop:property_service set;
-#line 905
+#line 910
 
-#line 905
+#line 910
 allow system_server tuner_server_ctl_prop:file { getattr open read map };
-#line 905
+#line 910
 
-#line 905
+#line 910
 
 
 # Allow the heap dump ART plugin to the count of sessions waiting for OOME
 
-#line 908
+#line 913
 allow system_server traced_oome_heap_session_count_prop:file { getattr open read map };
-#line 908
+#line 913
 
 
 # Allow the sensor service (running in the system service) to read sensor
 # configuration properties
 
-#line 912
+#line 917
 allow system_server sensors_config_prop:file { getattr open read map };
-#line 912
+#line 917
 
 
 # Allow system server to determine if system services are enabled
 
-#line 915
+#line 920
 allow system_server system_service_enable_prop:file { getattr open read map };
-#line 915
+#line 920
 
 
 # Create a socket for connections from debuggerd.
@@ -75853,11 +76463,11 @@
 
 # Read and delete files under /dev/fscklogs.
 
-#line 955
+#line 960
 allow system_server fscklogs:dir { open getattr read search ioctl lock watch watch_reads };
-#line 955
+#line 960
 allow system_server fscklogs:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 955
+#line 960
 
 allow system_server fscklogs:dir { write remove_name add_name };
 allow system_server fscklogs:file rename;
@@ -75868,22 +76478,22 @@
 
 # Read from log daemon.
 
-#line 964
+#line 969
 allow system_server logcat_exec:file { { getattr open read ioctl lock map watch watch_reads } { getattr execute execute_no_trans map } };
-#line 964
+#line 969
 
-#line 964
+#line 969
 allow system_server logdr_socket:sock_file write;
-#line 964
+#line 969
 allow system_server logd:unix_stream_socket connectto;
-#line 964
+#line 969
 
-#line 964
+#line 969
 
 
-#line 965
+#line 970
 allow system_server runtime_event_log_tags_file:file { getattr open read ioctl lock map watch watch_reads };
-#line 965
+#line 970
 
 
 # Be consistent with DAC permissions. Allow system_server to write to
@@ -75905,19 +76515,19 @@
 allow system_server kernel:security read_policy;
 
 
-#line 985
+#line 990
   allow system_server system_server_service:service_manager { add find };
-#line 985
+#line 990
   neverallow { domain -system_server } system_server_service:service_manager add;
-#line 985
+#line 990
 
-#line 985
+#line 990
   # On debug builds with root, allow binder services to use binder over TCP.
-#line 985
+#line 990
   # Not using rw_socket_perms_no_ioctl to avoid granting too many permissions.
-#line 985
+#line 990
   
-#line 985
+#line 990
 ;
 allow system_server artd_service:service_manager find;
 allow system_server artd_pre_reboot_service:service_manager find;
@@ -75959,31 +76569,31 @@
 allow system_server update_engine_service:service_manager find;
 allow system_server virtual_camera_service:service_manager find;
 
-#line 1025
+#line 1030
     allow system_server virtualization_maintenance_service:service_manager find;
-#line 1027
+#line 1032
 
 allow system_server vold_service:service_manager find;
 allow system_server wifinl80211_service:service_manager find;
 allow system_server logd_service:service_manager find;
-#line 1033
+#line 1038
 
 allow system_server wifi_mainline_supplicant_service:service_manager find;
 
 
-#line 1036
+#line 1041
   allow system_server batteryproperties_service:service_manager { add find };
-#line 1036
+#line 1041
   neverallow { domain -system_server } batteryproperties_service:service_manager add;
-#line 1036
+#line 1041
 
-#line 1036
+#line 1041
   # On debug builds with root, allow binder services to use binder over TCP.
-#line 1036
+#line 1041
   # Not using rw_socket_perms_no_ioctl to avoid granting too many permissions.
-#line 1036
+#line 1041
   
-#line 1036
+#line 1041
 
 
 allow system_server keystore:keystore2 {
@@ -76052,11 +76662,11 @@
 
 # /oem access
 
-#line 1103
+#line 1108
 allow system_server oemfs:dir { open getattr read search ioctl lock watch watch_reads };
-#line 1103
+#line 1108
 allow system_server oemfs:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 1103
+#line 1108
 
 
 # Allow resolving per-user storage symlinks
@@ -76075,7 +76685,7 @@
 allow system_server fingerprintd_data_file:dir { { open getattr read search ioctl lock watch watch_reads } remove_name rmdir relabelto write };
 allow system_server fingerprintd_data_file:file { getattr unlink };
 
-#line 1136
+#line 1141
 
 
 # For AppFuse.
@@ -76095,51 +76705,51 @@
 
 # Read service.adb.tls.port, persist.adb.wifi. properties
 
-#line 1154
+#line 1159
 allow system_server adbd_prop:file { getattr open read map };
-#line 1154
+#line 1159
 
 
 # Set persist.adb.tls_server.enable property
 
-#line 1157
+#line 1162
 
-#line 1157
+#line 1162
 allow system_server property_socket:sock_file write;
-#line 1157
+#line 1162
 allow system_server init:unix_stream_socket connectto;
-#line 1157
+#line 1162
 
-#line 1157
+#line 1162
 allow system_server system_adbd_prop:property_service set;
-#line 1157
+#line 1162
 
-#line 1157
+#line 1162
 allow system_server system_adbd_prop:file { getattr open read map };
-#line 1157
+#line 1162
 
-#line 1157
+#line 1162
 
 
 # Set service.adbd.tradeinmode from ITradeInService.
 
-#line 1160
+#line 1165
 
-#line 1160
+#line 1165
 allow system_server property_socket:sock_file write;
-#line 1160
+#line 1165
 allow system_server init:unix_stream_socket connectto;
-#line 1160
+#line 1165
 
-#line 1160
+#line 1165
 allow system_server adbd_tradeinmode_prop:property_service set;
-#line 1160
+#line 1165
 
-#line 1160
+#line 1165
 allow system_server adbd_tradeinmode_prop:file { getattr open read map };
-#line 1160
+#line 1165
 
-#line 1160
+#line 1165
 
 
 # Allow invoking tools like "timeout"
@@ -76156,19 +76766,19 @@
 #
 # For OTA dexopt, allow calls coming from postinstall.
 
-#line 1175
+#line 1180
 # Call the server domain and optionally transfer references to it.
-#line 1175
+#line 1180
 allow system_server postinstall:binder { call transfer };
-#line 1175
+#line 1180
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 1175
+#line 1180
 allow postinstall system_server:binder transfer;
-#line 1175
+#line 1180
 # Receive and use open files from the server.
-#line 1175
+#line 1180
 allow system_server postinstall:fd use;
-#line 1175
+#line 1180
 
 
 allow system_server postinstall:fifo_file write;
@@ -76182,18 +76792,18 @@
 allow system_server preloads_media_file:dir { { open getattr read search ioctl lock watch watch_reads } write remove_name rmdir };
 
 
-#line 1187
+#line 1192
 allow system_server cgroup:dir { open getattr read search ioctl lock watch watch_reads };
-#line 1187
+#line 1192
 allow system_server cgroup:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 1187
+#line 1192
 
 
-#line 1188
+#line 1193
 allow system_server cgroup_v2:dir { open getattr read search ioctl lock watch watch_reads };
-#line 1188
+#line 1193
 allow system_server cgroup_v2:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 1188
+#line 1193
 
 allow system_server ion_device:chr_file { getattr open read ioctl lock map watch watch_reads };
 
@@ -76203,25 +76813,25 @@
 allow system_server dmabuf_system_secure_heap_device:chr_file { getattr open read ioctl lock map watch watch_reads };
 
 
-#line 1196
+#line 1201
 allow system_server proc_asound:dir { open getattr read search ioctl lock watch watch_reads };
-#line 1196
+#line 1201
 allow system_server proc_asound:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 1196
+#line 1201
 
 
-#line 1197
+#line 1202
 allow system_server proc_net_type:dir { open getattr read search ioctl lock watch watch_reads };
-#line 1197
+#line 1202
 allow system_server proc_net_type:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 1197
+#line 1202
 
 
-#line 1198
+#line 1203
 allow system_server proc_qtaguid_stat:dir { open getattr read search ioctl lock watch watch_reads };
-#line 1198
+#line 1203
 allow system_server proc_qtaguid_stat:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 1198
+#line 1203
 
 allow system_server {
   proc_cmdline
@@ -76244,11 +76854,11 @@
 allow system_server proc_uid_cpupower:file { getattr open read ioctl lock map watch watch_reads };
 
 
-#line 1219
+#line 1224
 allow system_server rootfs:dir { open getattr read search ioctl lock watch watch_reads };
-#line 1219
+#line 1224
 allow system_server rootfs:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 1219
+#line 1224
 
 
 # Allow WifiService to start, stop, and read wifi-specific trace events.
@@ -76265,7 +76875,7 @@
 
 # allow system_server to exec shell, asanwrapper & zygote(app_process) on ASAN builds. Needed to run
 # asanwrapper.
-#line 1239
+#line 1244
 
 
 # allow system_server to read the eBPF maps that stores the traffic stats information and update
@@ -76288,39 +76898,39 @@
 
 # Allow system_server to start clatd in its own domain and kill it.
 
-#line 1260
+#line 1265
 # Allow the necessary permissions.
-#line 1260
+#line 1265
 
-#line 1260
+#line 1265
 # Old domain may exec the file and transition to the new domain.
-#line 1260
+#line 1265
 allow system_server clatd_exec:file { getattr open read execute map };
-#line 1260
+#line 1265
 allow system_server clatd:process transition;
-#line 1260
+#line 1265
 # New domain is entered by executing the file.
-#line 1260
+#line 1265
 allow clatd clatd_exec:file { entrypoint open read execute getattr map };
-#line 1260
+#line 1265
 # New domain can send SIGCHLD to its caller.
-#line 1260
+#line 1265
 allow clatd system_server:process sigchld;
-#line 1260
+#line 1265
 # Enable AT_SECURE, i.e. libc secure mode.
-#line 1260
+#line 1265
 dontaudit system_server clatd:process noatsecure;
-#line 1260
+#line 1265
 # XXX dontaudit candidate but requires further study.
-#line 1260
+#line 1265
 allow system_server clatd:process { siginh rlimitinh };
-#line 1260
+#line 1265
 
-#line 1260
+#line 1265
 # Make the transition occur by default.
-#line 1260
+#line 1265
 type_transition system_server clatd_exec:process clatd;
-#line 1260
+#line 1265
 
 allow system_server clatd:process { sigkill signal };
 
@@ -76338,13 +76948,13 @@
 allow system_server profman_dump_data_file:dir { { open getattr read search ioctl lock watch watch_reads } { open search write add_name remove_name lock } };
 
 # On userdebug build we may profile system server. Allow it to write and create its own profile.
-#line 1280
+#line 1285
 
 # Allow system server to load JVMTI agents under control of a property.
 
-#line 1282
+#line 1287
 allow system_server system_jvmti_agent_prop:file { getattr open read map };
-#line 1282
+#line 1287
 
 
 # UsbDeviceManager uses /dev/usb-ffs
@@ -76352,51 +76962,51 @@
 allow system_server functionfs:file { { getattr open read ioctl lock map watch watch_reads } { open append write lock map } };
 # To resolve arbitrary sysfs paths from /sys/class/udc/* symlinks.
 
-#line 1288
+#line 1293
 allow system_server sysfs_type:dir search;
-#line 1288
+#line 1293
 
-#line 1288
+#line 1293
 allow system_server sysfs_udc:dir { open getattr read search ioctl lock watch watch_reads };
-#line 1288
+#line 1293
 allow system_server sysfs_udc:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 1288
+#line 1293
 
-#line 1291
+#line 1296
 
 
 # system_server contains time / time zone detection logic so reads the associated properties.
 
-#line 1294
+#line 1299
 allow system_server time_prop:file { getattr open read map };
-#line 1294
+#line 1299
 
 
 # system_server reads this property to know it should expect the lmkd sends notification to it
 # on low memory kills.
 
-#line 1298
+#line 1303
 allow system_server system_lmk_prop:file { getattr open read map };
-#line 1298
+#line 1303
 
 
 
-#line 1300
+#line 1305
 allow system_server wifi_config_prop:file { getattr open read map };
-#line 1300
+#line 1305
 
 
 # Only system server can access BINDER_FREEZE and BINDER_GET_FROZEN_INFO
 allowxperm system_server binder_device:chr_file ioctl { 0x400c620e 0xc00c620f };
 
 # Watchdog prints debugging log to /dev/kmsg_debug.
-#line 1308
+#line 1313
 
 # Watchdog reads sysprops framework_watchdog.fatal_* to handle watchdog timeout loop.
 
-#line 1310
+#line 1315
 allow system_server framework_watchdog_config_prop:file { getattr open read map };
-#line 1310
+#line 1315
 
 
 
@@ -76408,9 +77018,9 @@
 
 # Read qemu.hw.mainkeys property
 
-#line 1320
+#line 1325
 allow system_server qemu_hw_prop:file { getattr open read map };
-#line 1320
+#line 1325
 
 
 # Allow system server to read profcollectd reports for upload.
@@ -76418,28 +77028,28 @@
 
 # Power controls for debugging/diagnostics
 
-#line 1326
+#line 1331
 allow system_server power_debug_prop:file { getattr open read map };
-#line 1326
+#line 1331
 
 
-#line 1327
+#line 1332
 
-#line 1327
+#line 1332
 allow system_server property_socket:sock_file write;
-#line 1327
+#line 1332
 allow system_server init:unix_stream_socket connectto;
-#line 1327
+#line 1332
 
-#line 1327
+#line 1332
 allow system_server power_debug_prop:property_service set;
-#line 1327
+#line 1332
 
-#line 1327
+#line 1332
 allow system_server power_debug_prop:file { getattr open read map };
-#line 1327
+#line 1332
 
-#line 1327
+#line 1332
 
 
 ###
@@ -76559,7 +77169,7 @@
 # rendering via SwiftShader, which requires JIT support. These builds are
 # never shipped to users.
 neverallow system_server self:process execmem;
-#line 1448
+#line 1453
 neverallow system_server { ashmem_device ashmem_libcutils_device }:chr_file execute;
 
 # TODO: deal with tmpfs_domain pub/priv split properly
@@ -76582,136 +77192,136 @@
 
 # Allow system_server to communicate with tradeinmode.
 
-#line 1469
+#line 1474
 # Call the server domain and optionally transfer references to it.
-#line 1469
+#line 1474
 allow system_server tradeinmode:binder { call transfer };
-#line 1469
+#line 1474
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 1469
+#line 1474
 allow tradeinmode system_server:binder transfer;
-#line 1469
+#line 1474
 # Receive and use open files from the server.
-#line 1469
+#line 1474
 allow system_server tradeinmode:fd use;
-#line 1469
+#line 1474
 
 
 # Allow system server to communicate to system-suspend's control interface
 allow system_server system_suspend_control_internal_service:service_manager find;
 allow system_server system_suspend_control_service:service_manager find;
 
-#line 1474
+#line 1479
 # Call the server domain and optionally transfer references to it.
-#line 1474
+#line 1479
 allow system_server system_suspend:binder { call transfer };
-#line 1474
+#line 1479
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 1474
+#line 1479
 allow system_suspend system_server:binder transfer;
-#line 1474
+#line 1479
 # Receive and use open files from the server.
-#line 1474
+#line 1479
 allow system_server system_suspend:fd use;
-#line 1474
+#line 1479
 
 
-#line 1475
+#line 1480
 # Call the server domain and optionally transfer references to it.
-#line 1475
+#line 1480
 allow system_suspend system_server:binder { call transfer };
-#line 1475
+#line 1480
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 1475
+#line 1480
 allow system_server system_suspend:binder transfer;
-#line 1475
+#line 1480
 # Receive and use open files from the server.
-#line 1475
+#line 1480
 allow system_suspend system_server:fd use;
-#line 1475
+#line 1480
 
 
 # Allow system server to communicate to system-suspend's wakelock interface
 
-#line 1478
+#line 1483
 # TODO(b/115946999): Remove /sys/power/* permissions once CONFIG_PM_WAKELOCKS is
-#line 1478
+#line 1483
 # deprecated.
-#line 1478
+#line 1483
 # Access /sys/power/wake_lock and /sys/power/wake_unlock
-#line 1478
+#line 1483
 allow system_server sysfs_wake_lock:file { { getattr open read ioctl lock map watch watch_reads } { open append write lock map } };
-#line 1478
+#line 1483
 # Accessing these files requires CAP_BLOCK_SUSPEND
-#line 1478
+#line 1483
 allow system_server self:{ capability2 cap2_userns } block_suspend;
-#line 1478
+#line 1483
 # system_suspend permissions
-#line 1478
+#line 1483
 
-#line 1478
+#line 1483
 # Call the server domain and optionally transfer references to it.
-#line 1478
+#line 1483
 allow system_server system_suspend_server:binder { call transfer };
-#line 1478
+#line 1483
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 1478
+#line 1483
 allow system_suspend_server system_server:binder transfer;
-#line 1478
+#line 1483
 # Receive and use open files from the server.
-#line 1478
+#line 1483
 allow system_server system_suspend_server:fd use;
-#line 1478
+#line 1483
 
-#line 1478
+#line 1483
 allow system_server system_suspend_hwservice:hwservice_manager find;
-#line 1478
+#line 1483
 # halclientdomain permissions
-#line 1478
+#line 1483
 
-#line 1478
+#line 1483
 # Call the hwservicemanager and transfer references to it.
-#line 1478
+#line 1483
 allow system_server hwservicemanager:binder { call transfer };
-#line 1478
+#line 1483
 # Allow hwservicemanager to send out callbacks
-#line 1478
+#line 1483
 allow hwservicemanager system_server:binder { call transfer };
-#line 1478
+#line 1483
 # rw access to /dev/hwbinder and /dev/ashmem is presently granted to
-#line 1478
+#line 1483
 # all domains in domain.te.
-#line 1478
+#line 1483
 
-#line 1478
+#line 1483
 
-#line 1478
+#line 1483
 allow system_server hwservicemanager_prop:file { getattr open read map };
-#line 1478
+#line 1483
 
-#line 1478
+#line 1483
 allow system_server hidl_manager_hwservice:hwservice_manager find;
-#line 1478
+#line 1483
 # AIDL suspend hal permissions
-#line 1478
+#line 1483
 allow system_server hal_system_suspend_service:service_manager find;
-#line 1478
+#line 1483
 
-#line 1478
+#line 1483
 # Call the servicemanager and transfer references to it.
-#line 1478
+#line 1483
 allow system_server servicemanager:binder { call transfer };
-#line 1478
+#line 1483
 # Allow servicemanager to send out callbacks
-#line 1478
+#line 1483
 allow servicemanager system_server:binder { call transfer };
-#line 1478
+#line 1483
 # rw access to /dev/binder and /dev/ashmem is presently granted to
-#line 1478
+#line 1483
 # all domains in domain.te.
-#line 1478
+#line 1483
 
-#line 1478
+#line 1483
 
 
 # Allow the system server to read files under /data/apex. The system_server
@@ -76772,20 +77382,20 @@
 
 # allow system_server write to aconfigd socket
 
-#line 1537
+#line 1542
 allow system_server aconfigd_socket:sock_file write;
-#line 1537
+#line 1542
 allow system_server aconfigd:unix_stream_socket connectto;
-#line 1537
+#line 1542
 ;
 
 # allow system_server write to aconfigd_mainline socket
 
-#line 1540
+#line 1545
 allow system_server aconfigd_mainline_socket:sock_file write;
-#line 1540
+#line 1545
 allow system_server aconfigd_mainline:unix_stream_socket connectto;
-#line 1540
+#line 1545
 ;
 
 allow system_server repair_mode_metadata_file:dir { { open getattr read search ioctl lock watch watch_reads } { open search write add_name remove_name lock } };
@@ -76803,23 +77413,23 @@
 
 # Allow init to set sysprop used to compute stats about userspace reboot.
 
-#line 1556
+#line 1561
 
-#line 1556
+#line 1561
 allow system_server property_socket:sock_file write;
-#line 1556
+#line 1561
 allow system_server init:unix_stream_socket connectto;
-#line 1556
+#line 1561
 
-#line 1556
+#line 1561
 allow system_server userspace_reboot_log_prop:property_service set;
-#line 1556
+#line 1561
 
-#line 1556
+#line 1561
 allow system_server userspace_reboot_log_prop:file { getattr open read map };
-#line 1556
+#line 1561
 
-#line 1556
+#line 1561
 
 
 # JVMTI agent settings are only readable from the system server.
@@ -76856,23 +77466,23 @@
 
 # Allow systemserver to read/write the invalidation property
 
-#line 1591
+#line 1596
 
-#line 1591
+#line 1596
 allow system_server property_socket:sock_file write;
-#line 1591
+#line 1596
 allow system_server init:unix_stream_socket connectto;
-#line 1591
+#line 1596
 
-#line 1591
+#line 1596
 allow system_server binder_cache_system_server_prop:property_service set;
-#line 1591
+#line 1596
 
-#line 1591
+#line 1596
 allow system_server binder_cache_system_server_prop:file { getattr open read map };
-#line 1591
+#line 1596
 
-#line 1591
+#line 1596
 
 neverallow { domain -system_server -init }
     binder_cache_system_server_prop:property_service set;
@@ -76923,23 +77533,23 @@
 
 # Allow system server to set dynamic ART properties.
 
-#line 1640
+#line 1645
 
-#line 1640
+#line 1645
 allow system_server property_socket:sock_file write;
-#line 1640
+#line 1645
 allow system_server init:unix_stream_socket connectto;
-#line 1640
+#line 1645
 
-#line 1640
+#line 1645
 allow system_server dalvik_dynamic_config_prop:property_service set;
-#line 1640
+#line 1645
 
-#line 1640
+#line 1645
 allow system_server dalvik_dynamic_config_prop:file { getattr open read map };
-#line 1640
+#line 1645
 
-#line 1640
+#line 1645
 
 
 # Allow system server to read binderfs
@@ -76947,49 +77557,49 @@
 allow system_server binderfs_logs_stats:file { getattr open read ioctl lock map watch watch_reads };
 
 # For ANRs
-#line 1649
+#line 1654
 
 
 # Allow GameManagerService to read and write persist.graphics.game_default_frame_rate.enabled
 
-#line 1652
+#line 1657
 
-#line 1652
+#line 1657
 allow system_server property_socket:sock_file write;
-#line 1652
+#line 1657
 allow system_server init:unix_stream_socket connectto;
-#line 1652
+#line 1657
 
-#line 1652
+#line 1657
 allow system_server game_manager_config_prop:property_service set;
-#line 1652
+#line 1657
 
-#line 1652
+#line 1657
 allow system_server game_manager_config_prop:file { getattr open read map };
-#line 1652
+#line 1657
 
-#line 1652
+#line 1657
 
 
 # Allow system server to write HintManagerService properties
 
-#line 1655
+#line 1660
 
-#line 1655
+#line 1660
 allow system_server property_socket:sock_file write;
-#line 1655
+#line 1660
 allow system_server init:unix_stream_socket connectto;
-#line 1655
+#line 1660
 
-#line 1655
+#line 1660
 allow system_server hint_manager_config_prop:property_service set;
-#line 1655
+#line 1660
 
-#line 1655
+#line 1660
 allow system_server hint_manager_config_prop:file { getattr open read map };
-#line 1655
+#line 1660
 
-#line 1655
+#line 1660
 
 neverallow {
   domain
@@ -77001,9 +77611,9 @@
 
 # ThreadNetworkService reads Thread Network properties
 
-#line 1665
+#line 1670
 allow system_server threadnetwork_config_prop:file { getattr open read map };
-#line 1665
+#line 1670
 
 
 # Do not allow any domain other than init and system server to set the property
@@ -77273,6 +77883,7 @@
     -dumpstate # bug reports
     -system_suspend_internal_server # implements system_suspend_control_internal_service
     -system_server # configures system_suspend via ISuspendControlServiceInternal
+    -traced_probes # tracing
     -traceur_app # tracing
 } system_suspend_control_internal_service:service_manager find;
 #line 1 "system/sepolicy/private/system_suspend_server.te"
@@ -78326,12 +78937,16 @@
 
 allow traced_probes stats_service:service_manager find;
 
+# Allow traced_probes to talk to suspend control service to read details of kernel wakelocks.
+allow traced_probes system_suspend_control_internal_service:service_manager find;
+allow traced_probes system_suspend:binder call;
+
 # Allow reading the system property representing number of desktop windows to
 # set the initial value for the counter in traces.
 
-#line 119
+#line 123
 allow traced_probes debug_tracing_desktop_mode_visible_tasks_prop:file { getattr open read map };
-#line 119
+#line 123
 
 
 ###
@@ -82861,273 +83476,278 @@
 #line 1 "system/sepolicy/private/virtual_camera.te"
 # virtual_camera - virtual camera daemon
 
-type virtual_camera, domain, coredomain;
-type virtual_camera_exec, system_file_type, exec_type, file_type;
+# The types are moved to public starting at 202502
+#line 7
 
 
-#line 6
 
-#line 6
+#line 9
+
+#line 9
 # Allow the necessary permissions.
-#line 6
+#line 9
 
-#line 6
+#line 9
 # Old domain may exec the file and transition to the new domain.
-#line 6
+#line 9
 allow init virtual_camera_exec:file { getattr open read execute map };
-#line 6
+#line 9
 allow init virtual_camera:process transition;
-#line 6
+#line 9
 # New domain is entered by executing the file.
-#line 6
+#line 9
 allow virtual_camera virtual_camera_exec:file { entrypoint open read execute getattr map };
-#line 6
+#line 9
 # New domain can send SIGCHLD to its caller.
-#line 6
+#line 9
 
-#line 6
+#line 9
 # Enable AT_SECURE, i.e. libc secure mode.
-#line 6
+#line 9
 dontaudit init virtual_camera:process noatsecure;
-#line 6
+#line 9
 # XXX dontaudit candidate but requires further study.
-#line 6
+#line 9
 allow init virtual_camera:process { siginh rlimitinh };
-#line 6
+#line 9
 
-#line 6
+#line 9
 # Make the transition occur by default.
-#line 6
+#line 9
 type_transition init virtual_camera_exec:process virtual_camera;
-#line 6
+#line 9
 
-#line 6
+#line 9
 
 
 # Since virtual_camera is not a real HAL we don't set the
 # hal_server_domain(virtual_camera, hal_camera) macro but only the rules that
 # we actually need from halserverdomain and hal_camera_server:
 
-#line 11
+#line 14
 # Call the servicemanager and transfer references to it.
-#line 11
+#line 14
 allow virtual_camera servicemanager:binder { call transfer };
-#line 11
+#line 14
 # Allow servicemanager to send out callbacks
-#line 11
+#line 14
 allow servicemanager virtual_camera:binder { call transfer };
-#line 11
+#line 14
 # rw access to /dev/binder and /dev/ashmem is presently granted to
-#line 11
+#line 14
 # all domains in domain.te.
-#line 11
+#line 14
 
 
-#line 12
+#line 15
 # Call the server domain and optionally transfer references to it.
-#line 12
+#line 15
 allow virtual_camera cameraserver:binder { call transfer };
-#line 12
+#line 15
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 12
+#line 15
 allow cameraserver virtual_camera:binder transfer;
-#line 12
+#line 15
 # Receive and use open files from the server.
-#line 12
+#line 15
 allow virtual_camera cameraserver:fd use;
-#line 12
+#line 15
 
 
-#line 13
+#line 16
 # Call the server domain and optionally transfer references to it.
-#line 13
+#line 16
 allow virtual_camera system_server:binder { call transfer };
-#line 13
+#line 16
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 13
+#line 16
 allow system_server virtual_camera:binder transfer;
-#line 13
+#line 16
 # Receive and use open files from the server.
-#line 13
+#line 16
 allow virtual_camera system_server:fd use;
-#line 13
+#line 16
 
 
 # Allow virtual_camera to communicate with
 # mediaserver (required for using Surface originating
 # from virtual camera in mediaserver).
 
-#line 18
+#line 21
 # Call the server domain and optionally transfer references to it.
-#line 18
+#line 21
 allow virtual_camera mediaserver:binder { call transfer };
-#line 18
+#line 21
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 18
+#line 21
 allow mediaserver virtual_camera:binder transfer;
-#line 18
+#line 21
 # Receive and use open files from the server.
-#line 18
+#line 21
 allow virtual_camera mediaserver:fd use;
-#line 18
+#line 21
 
 
 # Required for the codecs to be able to decode
 # video into surface provided by virtual camera.
 
-#line 22
+#line 25
 typeattribute virtual_camera halclientdomain;
-#line 22
+#line 25
 typeattribute virtual_camera hal_codec2_client;
-#line 22
+#line 25
 
-#line 22
+#line 25
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 22
+#line 25
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 22
+#line 25
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 22
+#line 25
 
-#line 22
+#line 25
 typeattribute virtual_camera hal_codec2;
-#line 22
+#line 25
 # Find passthrough HAL implementations
-#line 22
+#line 25
 allow hal_codec2 system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 22
+#line 25
 allow hal_codec2 vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 22
+#line 25
 allow hal_codec2 vendor_file:file { read open getattr execute map };
-#line 22
+#line 25
 
-#line 22
+#line 25
 
 
-#line 23
+#line 26
 typeattribute virtual_camera halclientdomain;
-#line 23
+#line 26
 typeattribute virtual_camera hal_omx_client;
-#line 23
+#line 26
 
-#line 23
+#line 26
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 23
+#line 26
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 23
+#line 26
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 23
+#line 26
 
-#line 23
+#line 26
 typeattribute virtual_camera hal_omx;
-#line 23
+#line 26
 # Find passthrough HAL implementations
-#line 23
+#line 26
 allow hal_omx system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 23
+#line 26
 allow hal_omx vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 23
+#line 26
 allow hal_omx vendor_file:file { read open getattr execute map };
-#line 23
+#line 26
 
-#line 23
+#line 26
 
 
 # Allow virtualCamera to call apps via binder.
 
-#line 26
+#line 29
 # Call the server domain and optionally transfer references to it.
-#line 26
+#line 29
 allow virtual_camera appdomain:binder { call transfer };
-#line 26
+#line 29
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 26
+#line 29
 allow appdomain virtual_camera:binder transfer;
-#line 26
+#line 29
 # Receive and use open files from the server.
-#line 26
+#line 29
 allow virtual_camera appdomain:fd use;
-#line 26
+#line 29
 
 
 # Allow virtual_camera to use fd from apps
 allow virtual_camera { appdomain -isolated_app }:fd use;
 
 
-#line 31
+#line 34
 # Call the server domain and optionally transfer references to it.
-#line 31
+#line 34
 allow virtual_camera surfaceflinger:binder { call transfer };
-#line 31
+#line 34
 # Allow the serverdomain to transfer references to the client on the reply.
-#line 31
+#line 34
 allow surfaceflinger virtual_camera:binder transfer;
-#line 31
+#line 34
 # Receive and use open files from the server.
-#line 31
+#line 34
 allow virtual_camera surfaceflinger:fd use;
-#line 31
+#line 34
 ;
 
 # Only allow virtual_camera to add a virtual_camera_service and no one else.
 
-#line 34
+#line 37
   allow virtual_camera virtual_camera_service:service_manager { add find };
-#line 34
+#line 37
   neverallow { domain -virtual_camera } virtual_camera_service:service_manager add;
-#line 34
+#line 37
 
-#line 34
+#line 37
   # On debug builds with root, allow binder services to use binder over TCP.
-#line 34
+#line 37
   # Not using rw_socket_perms_no_ioctl to avoid granting too many permissions.
-#line 34
+#line 37
   
-#line 34
+#line 37
 ;
 
 # Allow virtual_camera to map graphic buffers
 
-#line 37
+#line 40
 typeattribute virtual_camera halclientdomain;
-#line 37
+#line 40
 typeattribute virtual_camera hal_graphics_allocator_client;
-#line 37
+#line 40
 
-#line 37
+#line 40
 # TODO(b/34170079): Make the inclusion of the rules below conditional also on
-#line 37
+#line 40
 # non-Treble devices. For now, on non-Treble device, always grant clients of a
-#line 37
+#line 40
 # HAL sufficient access to run the HAL in passthrough mode (i.e., in-process).
-#line 37
+#line 40
 
-#line 37
+#line 40
 typeattribute virtual_camera hal_graphics_allocator;
-#line 37
+#line 40
 # Find passthrough HAL implementations
-#line 37
+#line 40
 allow hal_graphics_allocator system_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 37
+#line 40
 allow hal_graphics_allocator vendor_file:dir { open getattr read search ioctl lock watch watch_reads };
-#line 37
+#line 40
 allow hal_graphics_allocator vendor_file:file { read open getattr execute map };
-#line 37
+#line 40
 
-#line 37
+#line 40
 
 
 # Allow virtual_camera to use GPU
 allow virtual_camera gpu_device:chr_file { { getattr open read ioctl lock map watch watch_reads } { open append write lock map } };
 allow virtual_camera gpu_device:dir { open getattr read search ioctl lock watch watch_reads };
 
-#line 42
+#line 45
 allow virtual_camera sysfs_gpu:dir { open getattr read search ioctl lock watch watch_reads };
-#line 42
+#line 45
 allow virtual_camera sysfs_gpu:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
-#line 42
+#line 45
 
 
+# ION And DMABUF are used by vendor to allocate graphic buffers needed by virtual_camera
+allow cameraserver ion_device:chr_file { { getattr open read ioctl lock map watch watch_reads } { open append write lock map } };
+allow cameraserver dmabuf_system_heap_device:chr_file { getattr open read ioctl lock map watch watch_reads };
+
 # Allow virtual camera to use graphics composer fd-s (fences).
 allow virtual_camera hal_graphics_composer:fd use;
 
@@ -84992,11 +85612,35 @@
 allow vold keystore:keystore2 early_boot_ended;
 allow vold keystore:keystore2 delete_all_keys;
 
+
+#line 65
+    allow vold storage_area_app_dir:dir search;
+#line 65
+    # Allow vold to get the encryption policy and
+#line 65
+    # verify the ownership of storage areas
+#line 65
+    allow vold storage_area_dir:dir {
+#line 65
+        read
+#line 65
+        open
+#line 65
+        getattr
+#line 65
+        ioctl
+#line 65
+    };
 #line 75
 
 
 # when a storage area is created (with `openStorageArea`), vold creates the key
 # and when a storage area is deleted (with `deleteStorageArea`), vold deletes the key
+
+#line 79
+  allow vold storage_area_key_file:file { create rename setattr unlink { { getattr open read ioctl lock map watch watch_reads } { open append write lock map } } };
+#line 79
+  allow vold storage_area_key_file:dir { create reparent rename rmdir setattr { { open getattr read search ioctl lock watch watch_reads } { open search write add_name remove_name lock } } };
 #line 82
 
 
@@ -85088,7 +85732,7 @@
 allowxperm vold {
   vold_data_file
   vold_metadata_file
-  
+  storage_area_key_file
 }:file ioctl {
   0xf514
   0xc020660b
@@ -85553,7 +86197,7 @@
   -vold
   -init
   -vendor_init
-  
+   -vold_prepare_subdirs 
 } data_file_type:dir ioctl { 0x800c6613 };
 
 # Only vold should ever add/remove file-based encryption keys.
@@ -85687,7 +86331,7 @@
     fingerprint_vendor_data_file
     iris_vendor_data_file
     rollback_data_file
-    
+    storage_area_key_file
     storaged_data_file
     sdk_sandbox_data_file
     sdk_sandbox_system_data_file
@@ -85716,9 +86360,71 @@
 allow vold_prepare_subdirs user_profile_root_file:dir { search getattr relabelfrom relabelto };
 
 # Allow vold_prepare_subdirs to create storage area directories on behalf of apps.
+
+#line 60
+  allow vold_prepare_subdirs {
+#line 60
+      storage_area_dir
+#line 60
+      storage_area_app_dir
+#line 60
+  }:dir {
+#line 60
+      { { open getattr read search ioctl lock watch watch_reads } { open search write add_name remove_name lock } }
+#line 60
+      create
+#line 60
+      setattr # for chown() and chmod()
+#line 60
+      rmdir
+#line 60
+      unlink
+#line 60
+      relabelfrom # setfilecon
+#line 60
+      relabelto # setfilecon
+#line 60
+  };
+#line 60
+
+#line 60
+  # The storage area directories should have type storage_area_dir
+#line 60
+  type_transition vold_prepare_subdirs storage_area_app_dir:dir storage_area_dir;
+#line 60
+
+#line 60
+  
+#line 60
+
+#line 60
+allow vold_prepare_subdirs selinuxfs:dir { open getattr read search ioctl lock watch watch_reads };
+#line 60
+allow vold_prepare_subdirs selinuxfs:{ file lnk_file } { getattr open read ioctl lock map watch watch_reads };
+#line 60
+
+#line 60
+allow vold_prepare_subdirs selinuxfs:file { open append write lock map };
+#line 60
+allow vold_prepare_subdirs kernel:security check_context;
+#line 60
+
+#line 60
+
+#line 60
+  allowxperm vold_prepare_subdirs storage_area_dir:dir ioctl 0x800c6613;
 #line 80
 
 
+
+#line 82
+  neverallowxperm vold_prepare_subdirs {
+#line 82
+    data_file_type
+#line 82
+    -storage_area_dir
+#line 82
+  }:dir ioctl 0x800c6613;
 #line 87
 
 
@@ -87311,6 +88017,11 @@
 genfscon sysfs /kernel/dma_heap u:object_r:sysfs_dma_heap:s0
 genfscon sysfs /kernel/ion u:object_r:sysfs_ion:s0
 genfscon sysfs /kernel/ipv4 u:object_r:sysfs_ipv4:s0
+
+#line 172
+genfscon sysfs /kernel/mm/cma u:object_r:sysfs_cma:s0
+#line 174
+
 genfscon sysfs /kernel/mm/transparent_hugepage u:object_r:sysfs_transparent_hugepage:s0
 genfscon sysfs /kernel/mm/lru_gen/enabled u:object_r:sysfs_lru_gen_enabled:s0
 genfscon sysfs /kernel/mm/pgsize_migration/enabled u:object_r:sysfs_pgsize_migration:s0
diff --git a/prebuilts/api/202504/202504_mapping.cil b/prebuilts/api/202504/202504_mapping.cil
index d3404fa..19efdc7 100644
--- a/prebuilts/api/202504/202504_mapping.cil
+++ b/prebuilts/api/202504/202504_mapping.cil
@@ -451,6 +451,9 @@
 (typeattributeset mediaextractor_exec_202504 (mediaextractor_exec))
 (expandtypeattribute (mediaextractor_exec_202504) true)
 (typeattribute mediaextractor_exec_202504)
+(typeattributeset virtual_camera_202504 (virtual_camera))
+(expandtypeattribute (virtual_camera_202504) true)
+(typeattribute virtual_camera_202504)
 (typeattributeset fwk_automotive_display_hwservice_202504 (fwk_automotive_display_hwservice))
 (expandtypeattribute (fwk_automotive_display_hwservice_202504) true)
 (typeattribute fwk_automotive_display_hwservice_202504)
@@ -1537,6 +1540,9 @@
 (typeattributeset block_device_202504 (block_device))
 (expandtypeattribute (block_device_202504) true)
 (typeattribute block_device_202504)
+(typeattributeset sysfs_cma_202504 (sysfs_cma))
+(expandtypeattribute (sysfs_cma_202504) true)
+(typeattribute sysfs_cma_202504)
 (typeattributeset frp_block_device_202504 (frp_block_device))
 (expandtypeattribute (frp_block_device_202504) true)
 (typeattribute frp_block_device_202504)
@@ -2272,6 +2278,9 @@
 (typeattributeset uio_device_202504 (uio_device))
 (expandtypeattribute (uio_device_202504) true)
 (typeattribute uio_device_202504)
+(typeattributeset hal_vm_capabilities_service_202504 (hal_vm_capabilities_service))
+(expandtypeattribute (hal_vm_capabilities_service_202504) true)
+(typeattribute hal_vm_capabilities_service_202504)
 (typeattributeset usb_device_202504 (usb_device))
 (expandtypeattribute (usb_device_202504) true)
 (typeattribute usb_device_202504)
@@ -2896,9 +2905,6 @@
 (typeattributeset profman_exec_202504 (profman_exec))
 (expandtypeattribute (profman_exec_202504) true)
 (typeattribute profman_exec_202504)
-(typeattributeset forensic_service_202504 (forensic_service))
-(expandtypeattribute (forensic_service_202504) true)
-(typeattribute forensic_service_202504)
 (typeattributeset debugfs_restriction_prop_202504 (debugfs_restriction_prop))
 (expandtypeattribute (debugfs_restriction_prop_202504) true)
 (typeattribute debugfs_restriction_prop_202504)
@@ -3121,6 +3127,9 @@
 (typeattributeset enable_16k_pages_prop_202504 (enable_16k_pages_prop))
 (expandtypeattribute (enable_16k_pages_prop_202504) true)
 (typeattribute enable_16k_pages_prop_202504)
+(typeattributeset virtual_camera_exec_202504 (virtual_camera_exec))
+(expandtypeattribute (virtual_camera_exec_202504) true)
+(typeattribute virtual_camera_exec_202504)
 (typeattributeset boottrace_data_file_202504 (boottrace_data_file))
 (expandtypeattribute (boottrace_data_file_202504) true)
 (typeattribute boottrace_data_file_202504)
@@ -4159,9 +4168,6 @@
 (typeattributeset proc_panic_202504 (proc_panic))
 (expandtypeattribute (proc_panic_202504) true)
 (typeattribute proc_panic_202504)
-(typeattributeset advanced_protection_service_202504 (advanced_protection_service))
-(expandtypeattribute (advanced_protection_service_202504) true)
-(typeattribute advanced_protection_service_202504)
 (typeattributeset hal_memtrack_service_202504 (hal_memtrack_service))
 (expandtypeattribute (hal_memtrack_service_202504) true)
 (typeattribute hal_memtrack_service_202504)
diff --git a/prebuilts/api/202504/202504_plat_sepolicy.cil b/prebuilts/api/202504/202504_plat_sepolicy.cil
index 4db6b44..1253ecd 100644
--- a/prebuilts/api/202504/202504_plat_sepolicy.cil
+++ b/prebuilts/api/202504/202504_plat_sepolicy.cil
@@ -296,6 +296,7 @@
 (genfscon sysfs "/kernel/dma_heap" (u object_r sysfs_dma_heap ((s0) (s0))))
 (genfscon sysfs "/devices/cs_etm" (u object_r sysfs_devices_cs_etm ((s0) (s0))))
 (genfscon sysfs "/devices/uprobe" (u object_r sysfs_uprobe ((s0) (s0))))
+(genfscon sysfs "/kernel/mm/cma" (u object_r sysfs_cma ((s0) (s0))))
 (genfscon sysfs "/class/extcon" (u object_r sysfs_extcon ((s0) (s0))))
 (genfscon sysfs "/class/switch" (u object_r sysfs_switch ((s0) (s0))))
 (genfscon sysfs "/class/wakeup" (u object_r sysfs_wakeup ((s0) (s0))))
@@ -694,17 +695,17 @@
 (typeattribute bpffs_type)
 (typeattributeset bpffs_type (fs_bpf fs_bpf_tethering fs_bpf_vendor fs_bpf_net_private fs_bpf_net_shared fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_loader fs_bpf_uprobestats fs_bpf_memevents ))
 (typeattribute domain)
-(typeattributeset domain (adbd aidl_lazy_test_server apexd app_zygote artd atrace audioserver blkid blkid_untrusted bluetooth bootanim bootstat bpfloader bufferhubd cameraserver charger charger_vendor crash_dump credstore crosvm dhcp dnsmasq drmserver dumpstate e2fs early_virtmgr ephemeral_app evsmanagerd extra_free_kbytes fastbootd fingerprintd flags_health_check fsck fsck_untrusted gatekeeperd gmscore_app gpuservice healthd heapprofd hwservicemanager idmap incident incident_helper incidentd init inputflinger installd isolated_app isolated_compute_app kernel keystore llkd lmkd logd logpersist mdnsd mediadrmserver mediaextractor mediametrics mediaprovider mediaserver mediaswcodec mediatranscoding modprobe mtp netd netutils_wrapper network_stack nfc perfetto performanced platform_app postinstall ppp priv_app prng_seeder profman radio recovery recovery_persist recovery_refresh rkpdapp rs rss_hwm_reset runas runas_app sdcardd secure_element servicemanager sgdisk shared_relro shell simpleperf simpleperf_app_runner slideshow statsd su surfaceflinger system_app system_server tee tombstoned toolbox traced traced_perf traced_probes traceur_app ueventd uncrypt untrusted_app untrusted_app_32 untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 update_engine update_verifier usbd vdc vendor_init vendor_misc_writer vendor_modprobe vendor_shell virtual_touchpad virtualizationmanager vndservicemanager vold vold_prepare_subdirs watchdogd webview_zygote wificond zygote aconfigd aconfigd_mainline adbd_tradeinmode apex_test_prepostinstall apexd_derive_classpath art_boot art_exec auditctl automotive_display_service bert_collector blank_screen boringssl_self_test vendor_boringssl_self_test canhalconfigurator clatd compos_fd_server compos_verify composd cppreopts derive_classpath derive_sdk device_as_webcam dex2oat dexopt_chroot_setup dmesgd fuseblkd fuseblkd_untrusted fwk_bufferhub gki_apex_prepostinstall gsid hal_allocator_default hal_keymint_system hidl_lazy_test_server iw kcmdlinectrl linkerconfig linux_vm_setup lpdumpd mediaprovider_app mediatuner migrate_legacy_obb_data misctrl mm_events mmd mtectrl odrefresh odsign ot_ctl ot_daemon otapreopt_chroot otapreopt_slot permissioncontroller_app postinstall_dexopt prefetch preloads_copy preopt2cachename profcollectd remount rkp_cert_processor rkpd sdk_sandbox_34 sdk_sandbox_audit sdk_sandbox_next simpleperf_boot snapshotctl snapuserd stats storaged system_server_startup system_suspend trace_redactor tradeinmode uprobestats vehicle_binding_util vfio_handler virtual_camera virtual_face virtual_fingerprint virtualizationservice vmlauncher_app vmnic vzwomatrigger_app wait_for_keymaster wifi_mainline_supplicant ))
+(typeattributeset domain (adbd aidl_lazy_test_server apexd app_zygote artd atrace audioserver blkid blkid_untrusted bluetooth bootanim bootstat bpfloader bufferhubd cameraserver charger charger_vendor crash_dump credstore crosvm dhcp dnsmasq drmserver dumpstate e2fs early_virtmgr ephemeral_app evsmanagerd extra_free_kbytes fastbootd fingerprintd flags_health_check fsck fsck_untrusted gatekeeperd gmscore_app gpuservice healthd heapprofd hwservicemanager idmap incident incident_helper incidentd init inputflinger installd isolated_app isolated_compute_app kernel keystore llkd lmkd logd logpersist mdnsd mediadrmserver mediaextractor mediametrics mediaprovider mediaserver mediaswcodec mediatranscoding modprobe mtp netd netutils_wrapper network_stack nfc perfetto performanced platform_app postinstall ppp priv_app prng_seeder profman radio recovery recovery_persist recovery_refresh rkpdapp rs rss_hwm_reset runas runas_app sdcardd secure_element servicemanager sgdisk shared_relro shell simpleperf simpleperf_app_runner slideshow statsd su surfaceflinger system_app system_server tee tombstoned toolbox traced traced_perf traced_probes traceur_app ueventd uncrypt untrusted_app untrusted_app_32 untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 update_engine update_verifier usbd vdc vendor_init vendor_misc_writer vendor_modprobe vendor_shell virtual_camera virtual_touchpad virtualizationmanager vndservicemanager vold vold_prepare_subdirs watchdogd webview_zygote wificond zygote aconfigd aconfigd_mainline adbd_tradeinmode apex_test_prepostinstall apexd_derive_classpath art_boot art_exec auditctl automotive_display_service bert_collector blank_screen boringssl_self_test vendor_boringssl_self_test canhalconfigurator clatd compos_fd_server compos_verify composd cppreopts derive_classpath derive_sdk device_as_webcam dex2oat dexopt_chroot_setup dmesgd fuseblkd fuseblkd_untrusted fwk_bufferhub gki_apex_prepostinstall gsid hal_allocator_default hal_keymint_system hidl_lazy_test_server iw kcmdlinectrl linkerconfig linux_vm_setup lpdumpd mediaprovider_app mediatuner microfuchsiad migrate_legacy_obb_data misctrl mm_events mmd mtectrl odrefresh odsign ot_ctl ot_daemon otapreopt_chroot otapreopt_slot permissioncontroller_app postinstall_dexopt prefetch preloads_copy preopt2cachename profcollectd remount rkp_cert_processor rkpd sdk_sandbox_34 sdk_sandbox_audit sdk_sandbox_next simpleperf_boot snapshotctl snapuserd stats storaged system_server_startup system_suspend trace_redactor tradeinmode uprobestats vehicle_binding_util vfio_handler virtual_face virtual_fingerprint virtualizationservice vmlauncher_app vmnic vzwomatrigger_app wait_for_keymaster wifi_mainline_supplicant ))
 (typeattribute fs_type)
-(typeattributeset fs_type (device labeledfs pipefs sockfs rootfs proc binderfs binderfs_logs binderfs_logs_proc binderfs_logs_stats binderfs_logs_transactions binderfs_logs_transaction_history binderfs_features proc_security proc_drop_caches proc_overcommit_memory proc_min_free_order_shift proc_kpageflags proc_watermark_boost_factor proc_percpu_pagelist_high_fraction usermodehelper sysfs_usermodehelper proc_qtaguid_ctrl proc_qtaguid_stat proc_bluetooth_writable proc_abi proc_asound proc_bootconfig proc_bpf proc_buddyinfo proc_cgroups proc_cmdline proc_cpu_alignment proc_cpuinfo proc_dirty proc_diskstats proc_extra_free_kbytes proc_filesystems proc_fs_verity proc_hostname proc_hung_task proc_interrupts proc_iomem proc_kallsyms proc_keys proc_kmsg proc_loadavg proc_locks proc_lowmemorykiller proc_max_map_count proc_meminfo proc_misc proc_modules proc_mounts proc_net proc_net_tcp_udp proc_page_cluster proc_pagetypeinfo proc_panic proc_perf proc_pid_max proc_pipe_conf proc_pressure_cpu proc_pressure_io proc_pressure_mem proc_random proc_sched proc_slabinfo proc_stat proc_swaps proc_sysrq proc_timer proc_tty_drivers proc_uid_cputime_showstat proc_uid_cputime_removeuid proc_uid_io_stats proc_uid_procstat_set proc_uid_time_in_state proc_uid_concurrent_active_time proc_uid_concurrent_policy_time proc_uid_cpupower proc_uptime proc_version proc_vmallocinfo proc_vmstat proc_watermark_scale_factor proc_zoneinfo proc_vendor_sched selinuxfs fusectlfs cgroup cgroup_v2 sysfs sysfs_android_usb sysfs_uio sysfs_batteryinfo sysfs_bluetooth_writable sysfs_devfreq_cur sysfs_devfreq_dir sysfs_devices_block sysfs_dm sysfs_dm_verity sysfs_dma_heap sysfs_dmabuf_stats sysfs_dt_firmware_android sysfs_extcon sysfs_ion sysfs_ipv4 sysfs_kernel_notes sysfs_leds sysfs_loop sysfs_gpu sysfs_hwrandom sysfs_nfc_power_writable sysfs_wake_lock sysfs_net sysfs_power sysfs_rtc sysfs_mem_sleep sysfs_suspend_stats sysfs_switch sysfs_sync_on_suspend sysfs_transparent_hugepage sysfs_lru_gen_enabled sysfs_usb sysfs_wakeup sysfs_wakeup_reasons sysfs_fs_ext4_features sysfs_fs_f2fs sysfs_fs_fuse_bpf sysfs_fs_fuse_features sysfs_fs_incfs_features sysfs_fs_incfs_metrics sysfs_vendor_sched fs_bpf fs_bpf_tethering fs_bpf_vendor configfs sysfs_devices_cs_etm sysfs_devices_system_cpu sysfs_lowmemorykiller sysfs_wlan_fwpath sysfs_vibrator sysfs_uhid sysfs_thermal sysfs_zram sysfs_zram_uevent inotify devpts tmpfs shm mqueue fuse fuseblk sdcardfs vfat exfat debugfs debugfs_kprobes debugfs_mmc debugfs_mm_events_tracing debugfs_trace_marker debugfs_tracing debugfs_tracing_debug debugfs_tracing_instances debugfs_tracing_printk_formats debugfs_wakeup_sources debugfs_wifi_tracing securityfs pstorefs functionfs oemfs usbfs binfmt_miscfs app_fusefs debugfs_bootreceiver_tracing sysfs_udc apex_test_prepostinstall_devpts apexd_devpts proc_allocinfo config_gz fs_bpf_net_private fs_bpf_net_shared fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_loader fs_bpf_uprobestats fs_bpf_memevents debugfs_kcov sysfs_dt_avf proc_dt_avf sysfs_uprobe sysfs_pgsize_migration sysfs_firmware_acpi_tables odsign_devpts priv_app_devpts untrusted_app_all_devpts vmlauncher_app_devpts ))
+(typeattributeset fs_type (device labeledfs pipefs sockfs rootfs proc binderfs binderfs_logs binderfs_logs_proc binderfs_logs_stats binderfs_logs_transactions binderfs_logs_transaction_history binderfs_features proc_security proc_drop_caches proc_overcommit_memory proc_min_free_order_shift proc_kpageflags proc_watermark_boost_factor proc_percpu_pagelist_high_fraction usermodehelper sysfs_usermodehelper proc_qtaguid_ctrl proc_qtaguid_stat proc_bluetooth_writable proc_abi proc_asound proc_bootconfig proc_bpf proc_buddyinfo proc_cgroups proc_cmdline proc_cpu_alignment proc_cpuinfo proc_dirty proc_diskstats proc_extra_free_kbytes proc_filesystems proc_fs_verity proc_hostname proc_hung_task proc_interrupts proc_iomem proc_kallsyms proc_keys proc_kmsg proc_loadavg proc_locks proc_lowmemorykiller proc_max_map_count proc_meminfo proc_misc proc_modules proc_mounts proc_net proc_net_tcp_udp proc_page_cluster proc_pagetypeinfo proc_panic proc_perf proc_pid_max proc_pipe_conf proc_pressure_cpu proc_pressure_io proc_pressure_mem proc_random proc_sched proc_slabinfo proc_stat proc_swaps proc_sysrq proc_timer proc_tty_drivers proc_uid_cputime_showstat proc_uid_cputime_removeuid proc_uid_io_stats proc_uid_procstat_set proc_uid_time_in_state proc_uid_concurrent_active_time proc_uid_concurrent_policy_time proc_uid_cpupower proc_uptime proc_version proc_vmallocinfo proc_vmstat proc_watermark_scale_factor proc_zoneinfo proc_vendor_sched selinuxfs fusectlfs cgroup cgroup_v2 sysfs sysfs_android_usb sysfs_uio sysfs_batteryinfo sysfs_bluetooth_writable sysfs_cma sysfs_devfreq_cur sysfs_devfreq_dir sysfs_devices_block sysfs_dm sysfs_dm_verity sysfs_dma_heap sysfs_dmabuf_stats sysfs_dt_firmware_android sysfs_extcon sysfs_ion sysfs_ipv4 sysfs_kernel_notes sysfs_leds sysfs_loop sysfs_gpu sysfs_hwrandom sysfs_nfc_power_writable sysfs_wake_lock sysfs_net sysfs_power sysfs_rtc sysfs_mem_sleep sysfs_suspend_stats sysfs_switch sysfs_sync_on_suspend sysfs_transparent_hugepage sysfs_lru_gen_enabled sysfs_usb sysfs_wakeup sysfs_wakeup_reasons sysfs_fs_ext4_features sysfs_fs_f2fs sysfs_fs_fuse_bpf sysfs_fs_fuse_features sysfs_fs_incfs_features sysfs_fs_incfs_metrics sysfs_vendor_sched fs_bpf fs_bpf_tethering fs_bpf_vendor configfs sysfs_devices_cs_etm sysfs_devices_system_cpu sysfs_lowmemorykiller sysfs_wlan_fwpath sysfs_vibrator sysfs_uhid sysfs_thermal sysfs_zram sysfs_zram_uevent inotify devpts tmpfs shm mqueue fuse fuseblk sdcardfs vfat exfat debugfs debugfs_kprobes debugfs_mmc debugfs_mm_events_tracing debugfs_trace_marker debugfs_tracing debugfs_tracing_debug debugfs_tracing_instances debugfs_tracing_printk_formats debugfs_wakeup_sources debugfs_wifi_tracing securityfs pstorefs functionfs oemfs usbfs binfmt_miscfs app_fusefs debugfs_bootreceiver_tracing sysfs_udc apex_test_prepostinstall_devpts apexd_devpts proc_allocinfo config_gz fs_bpf_net_private fs_bpf_net_shared fs_bpf_netd_readonly fs_bpf_netd_shared fs_bpf_loader fs_bpf_uprobestats fs_bpf_memevents debugfs_kcov sysfs_dt_avf proc_dt_avf sysfs_uprobe sysfs_pgsize_migration sysfs_firmware_acpi_tables odsign_devpts priv_app_devpts untrusted_app_all_devpts vmlauncher_app_devpts ))
 (typeattribute contextmount_type)
 (typeattributeset contextmount_type (oemfs app_fusefs ))
 (typeattribute fusefs_type)
 (typeattributeset fusefs_type (fuse fuseblk app_fusefs ))
 (typeattribute file_type)
-(typeattributeset file_type (adbd_exec aidl_lazy_test_server_exec apexd_exec appdomain_tmpfs app_zygote_tmpfs audioserver_tmpfs bootanim_exec bootstat_exec bufferhubd_exec cameraserver_exec cameraserver_tmpfs charger_exec crash_dump_exec credstore_exec dhcp_exec dnsmasq_exec drmserver_exec drmserver_socket dumpstate_exec e2fs_exec early_virtmgr_exec extra_free_kbytes_exec unlabeled system_file system_asan_options_file system_event_log_tags_file system_lib_file system_bootstrap_lib_file system_group_file system_linker_exec system_linker_config_file system_passwd_file system_seccomp_policy_file system_security_cacerts_file tcpdump_exec system_zoneinfo_file cgroup_desc_file vendor_cgroup_desc_file task_profiles_file vendor_task_profiles_file art_apex_dir linkerconfig_file incremental_control_file bootanim_oem_file vendor_hal_file vendor_file vendor_app_file vendor_configs_file same_process_hal_file vndk_sp_file vendor_framework_file vendor_overlay_file vendor_public_lib_file vendor_public_framework_file vendor_microdroid_file vendor_boot_ota_file vendor_keylayout_file vendor_keychars_file vendor_idc_file vendor_uuid_mapping_config_file vendor_vm_file vendor_vm_data_file metadata_file vold_metadata_file gsi_metadata_file gsi_public_metadata_file password_slot_metadata_file apex_metadata_file ota_metadata_file metadata_bootstat_file userspace_reboot_metadata_file staged_install_file watchdog_metadata_file repair_mode_metadata_file aconfig_storage_metadata_file aconfig_storage_flags_metadata_file dev_cpu_variant runtime_event_log_tags_file logcat_exec cgroup_rc_file coredump_file system_data_root_file system_data_file system_userdir_file packages_list_file game_mode_intervention_list_file vendor_data_file vendor_userdir_file unencrypted_data_file install_data_file drm_data_file adb_data_file anr_data_file tombstone_data_file tombstone_wifi_data_file apex_data_file apk_data_file apk_tmp_file apk_private_data_file apk_private_tmp_file dalvikcache_data_file ota_data_file ota_package_file user_profile_root_file user_profile_data_file profman_dump_data_file prereboot_data_file resourcecache_data_file shell_data_file property_data_file bootchart_data_file dropbox_data_file heapdump_data_file nativetest_data_file shell_test_data_file ringtone_file preloads_data_file preloads_media_file dhcp_data_file server_configurable_flags_data_file staging_data_file vendor_apex_file vendor_apex_metadata_file shutdown_checkpoints_system_data_file mnt_media_rw_file mnt_user_file mnt_pass_through_file mnt_expand_file mnt_sdcard_file storage_file mnt_media_rw_stub_file storage_stub_file mnt_vendor_file mnt_product_file apex_mnt_dir apex_info_file postinstall_mnt_dir postinstall_file postinstall_apex_mnt_dir mirror_data_file adb_keys_file apex_system_server_data_file apex_module_data_file apex_ota_reserved_file apex_rollback_data_file appcompat_data_file audio_data_file audioserver_data_file bluetooth_data_file bluetooth_logs_data_file bootstat_data_file boottrace_data_file camera_data_file credstore_data_file gatekeeper_data_file incident_data_file keychain_data_file keystore_data_file media_data_file media_rw_data_file media_userdir_file misc_user_data_file net_data_file network_watchlist_data_file nfc_data_file nfc_logs_data_file radio_data_file recovery_data_file shared_relro_file snapshotctl_log_data_file stats_config_data_file stats_data_file systemkeys_data_file textclassifier_data_file trace_data_file vpn_data_file wifi_data_file vold_data_file tee_data_file update_engine_data_file update_engine_log_data_file snapuserd_log_data_file method_trace_data_file gsi_data_file radio_core_data_file app_data_file privapp_data_file system_app_data_file cache_file overlayfs_file cache_backup_file cache_private_backup_file cache_recovery_file efs_file wallpaper_file shortcut_manager_icons icon_file asec_apk_file asec_public_file asec_image_file backup_data_file bluetooth_efs_file fingerprintd_data_file fingerprint_vendor_data_file app_fuse_file face_vendor_data_file iris_vendor_data_file adbd_socket bluetooth_socket dnsproxyd_socket dumpstate_socket fwmarkd_socket lmkd_socket logd_socket logdr_socket logdw_socket mdns_socket mdnsd_socket misc_logd_file mtpd_socket ot_daemon_socket property_socket racoon_socket recovery_socket rild_socket rild_debug_socket snapuserd_socket snapuserd_proxy_socket statsdw_socket system_wpa_socket system_ndebug_socket system_unsolzygote_socket tombstoned_crash_socket tombstoned_java_trace_socket tombstoned_intercept_socket traced_consumer_socket traced_perf_socket traced_producer_socket uncrypt_socket wpa_socket zygote_socket heapprofd_socket gps_control pdx_display_dir pdx_performance_dir pdx_bufferhub_dir pdx_display_client_endpoint_socket pdx_display_manager_endpoint_socket pdx_display_screenshot_endpoint_socket pdx_display_vsync_endpoint_socket pdx_performance_client_endpoint_socket pdx_bufferhub_client_endpoint_socket file_contexts_file mac_perms_file property_contexts_file seapp_contexts_file sepolicy_file service_contexts_file keystore2_key_contexts_file vendor_service_contexts_file hwservice_contexts_file vndservice_contexts_file vendor_kernel_modules system_dlkm_file audiohal_data_file tee_service_contexts_file fingerprintd_exec flags_health_check_exec fsck_exec gatekeeperd_exec hal_graphics_composer_server_tmpfs hwservicemanager_exec idmap_exec init_exec init_tmpfs inputflinger_exec installd_exec keystore_exec llkd_exec lmkd_exec logd_exec mediadrmserver_exec mediaextractor_exec mediaextractor_tmpfs mediametrics_exec mediaserver_exec mediaserver_tmpfs mediaswcodec_exec netd_exec netutils_wrapper_exec performanced_exec profman_exec recovery_persist_exec recovery_refresh_exec rs_exec runas_exec sdcardd_exec servicemanager_exec sgdisk_exec shell_exec simpleperf_app_runner_exec statsd_exec su_exec surfaceflinger_tmpfs system_server_tmpfs tombstoned_exec toolbox_exec traced_tmpfs ueventd_tmpfs uncrypt_exec update_engine_exec update_verifier_exec usbd_exec vdc_exec vendor_misc_writer_exec vendor_shell_exec vendor_toolbox_exec virtual_touchpad_exec virtualizationmanager_exec vold_exec vold_prepare_subdirs_exec watchdogd_exec webview_zygote_exec webview_zygote_tmpfs wificond_exec zygote_tmpfs zygote_exec aconfigd_exec aconfigd_mainline_exec apex_test_prepostinstall_exec art_boot_exec art_exec_exec artd_exec artd_tmpfs atrace_exec audioserver_exec auditctl_exec automotive_display_service_exec bert_collector_exec blank_screen_exec blkid_exec boringssl_self_test_exec vendor_boringssl_self_test_exec boringssl_self_test_marker bpfloader_exec canhalconfigurator_exec clatd_exec compos_verify_exec composd_exec cppreopts_exec crosvm_exec crosvm_tmpfs derive_classpath_exec derive_sdk_exec dex2oat_exec dexopt_chroot_setup_exec dexopt_chroot_setup_tmpfs dexoptanalyzer_exec dmesgd_exec dumpstate_tmpfs evsmanagerd_exec storaged_data_file wm_trace_data_file accessibility_trace_data_file perfetto_traces_data_file perfetto_traces_bugreport_data_file perfetto_traces_profiling_data_file perfetto_configs_data_file system_perfetto_config_file uprobestats_configs_data_file oatdump_exec sdk_sandbox_system_data_file sdk_sandbox_data_file app_exec_data_file rollback_data_file checkin_data_file ota_image_data_file gsi_persistent_data_file emergency_data_file profcollectd_data_file apex_art_data_file apex_art_staging_data_file apex_compos_data_file apex_virt_data_file apex_tethering_data_file apex_uwb_data_file apex_appsearch_data_file apex_permission_data_file apex_scheduling_data_file apex_wifi_data_file font_data_file dmesgd_data_file odrefresh_data_file odsign_data_file odsign_metrics_file virtualizationservice_data_file vm_data_file environ_system_data_file bootanim_data_file fd_server_exec compos_exec compos_key_helper_exec prng_seeder_socket system_font_fallback_file aconfigd_socket aconfigd_mainline_socket system_aconfig_storage_file vendor_aconfig_storage_file connectivityblob_data_file mainline_supplicant_data_file pre_reboot_dexopt_file pre_reboot_dexopt_artd_file apk_metadata_file storage_area_app_dir storage_area_dir storage_area_content_file storage_area_key_file tradeinmode_metadata_file prefetch_metadata_file fuseblkd_exec fuseblkd_untrusted_exec fwk_bufferhub_exec gki_apex_prepostinstall_exec gpuservice_exec gsid_exec hal_allocator_default_exec hal_keymint_system_exec heapprofd_exec heapprofd_tmpfs hidl_lazy_test_server_exec incident_exec incident_helper_exec incidentd_exec iw_exec kcmdlinectrl_exec linkerconfig_exec linux_vm_setup_exec lpdumpd_exec mdnsd_exec mediatranscoding_exec mediatranscoding_tmpfs mediatuner_exec migrate_legacy_obb_data_exec misctrl_exec mm_events_exec mmd_exec mtectrl_exec odrefresh_exec odsign_exec ot_ctl_exec ot_daemon_exec otapreopt_chroot_exec otapreopt_slot_exec perfetto_exec perfetto_tmpfs postinstall_exec postinstall_dexopt_exec postinstall_dexopt_tmpfs prefetch_exec preloads_copy_exec preopt2cachename_exec prng_seeder_exec profcollectd_exec remount_exec rkp_cert_processor_exec rkpd_exec rss_hwm_reset_exec simpleperf_exec simpleperf_boot_data_file snapshotctl_exec snapuserd_exec stats_exec storaged_exec surfaceflinger_exec system_server_startup_tmpfs system_suspend_exec trace_redactor_exec traced_exec traced_perf_exec traced_probes_exec traced_probes_tmpfs tradeinmode_exec uprobestats_exec vehicle_binding_util_exec vfio_handler_exec virtual_camera_exec virtual_face_exec virtual_fingerprint_exec virtualizationservice_exec vmnic_exec wait_for_keymaster_exec wifi_mainline_supplicant_exec ))
+(typeattributeset file_type (adbd_exec aidl_lazy_test_server_exec apexd_exec appdomain_tmpfs app_zygote_tmpfs audioserver_tmpfs bootanim_exec bootstat_exec bufferhubd_exec cameraserver_exec cameraserver_tmpfs charger_exec crash_dump_exec credstore_exec dhcp_exec dnsmasq_exec drmserver_exec drmserver_socket dumpstate_exec e2fs_exec early_virtmgr_exec extra_free_kbytes_exec unlabeled system_file system_asan_options_file system_event_log_tags_file system_lib_file system_bootstrap_lib_file system_group_file system_linker_exec system_linker_config_file system_passwd_file system_seccomp_policy_file system_security_cacerts_file tcpdump_exec system_zoneinfo_file cgroup_desc_file vendor_cgroup_desc_file task_profiles_file vendor_task_profiles_file art_apex_dir linkerconfig_file incremental_control_file bootanim_oem_file vendor_hal_file vendor_file vendor_app_file vendor_configs_file same_process_hal_file vndk_sp_file vendor_framework_file vendor_overlay_file vendor_public_lib_file vendor_public_framework_file vendor_microdroid_file vendor_boot_ota_file vendor_keylayout_file vendor_keychars_file vendor_idc_file vendor_uuid_mapping_config_file vendor_vm_file vendor_vm_data_file metadata_file vold_metadata_file gsi_metadata_file gsi_public_metadata_file password_slot_metadata_file apex_metadata_file ota_metadata_file metadata_bootstat_file userspace_reboot_metadata_file staged_install_file watchdog_metadata_file repair_mode_metadata_file aconfig_storage_metadata_file aconfig_storage_flags_metadata_file dev_cpu_variant runtime_event_log_tags_file logcat_exec cgroup_rc_file coredump_file system_data_root_file system_data_file system_userdir_file packages_list_file game_mode_intervention_list_file vendor_data_file vendor_userdir_file unencrypted_data_file install_data_file drm_data_file adb_data_file anr_data_file tombstone_data_file tombstone_wifi_data_file apex_data_file apk_data_file apk_tmp_file apk_private_data_file apk_private_tmp_file dalvikcache_data_file ota_data_file ota_package_file user_profile_root_file user_profile_data_file profman_dump_data_file prereboot_data_file resourcecache_data_file shell_data_file property_data_file bootchart_data_file dropbox_data_file heapdump_data_file nativetest_data_file shell_test_data_file ringtone_file preloads_data_file preloads_media_file dhcp_data_file server_configurable_flags_data_file staging_data_file vendor_apex_file vendor_apex_metadata_file shutdown_checkpoints_system_data_file mnt_media_rw_file mnt_user_file mnt_pass_through_file mnt_expand_file mnt_sdcard_file storage_file mnt_media_rw_stub_file storage_stub_file mnt_vendor_file mnt_product_file apex_mnt_dir apex_info_file postinstall_mnt_dir postinstall_file postinstall_apex_mnt_dir mirror_data_file adb_keys_file apex_system_server_data_file apex_module_data_file apex_ota_reserved_file apex_rollback_data_file appcompat_data_file audio_data_file audioserver_data_file bluetooth_data_file bluetooth_logs_data_file bootstat_data_file boottrace_data_file camera_data_file credstore_data_file gatekeeper_data_file incident_data_file keychain_data_file keystore_data_file media_data_file media_rw_data_file media_userdir_file misc_user_data_file net_data_file network_watchlist_data_file nfc_data_file nfc_logs_data_file radio_data_file recovery_data_file shared_relro_file snapshotctl_log_data_file stats_config_data_file stats_data_file systemkeys_data_file textclassifier_data_file trace_data_file vpn_data_file wifi_data_file vold_data_file tee_data_file update_engine_data_file update_engine_log_data_file snapuserd_log_data_file method_trace_data_file gsi_data_file radio_core_data_file app_data_file privapp_data_file system_app_data_file cache_file overlayfs_file cache_backup_file cache_private_backup_file cache_recovery_file efs_file wallpaper_file shortcut_manager_icons icon_file asec_apk_file asec_public_file asec_image_file backup_data_file bluetooth_efs_file fingerprintd_data_file fingerprint_vendor_data_file app_fuse_file face_vendor_data_file iris_vendor_data_file adbd_socket bluetooth_socket dnsproxyd_socket dumpstate_socket fwmarkd_socket lmkd_socket logd_socket logdr_socket logdw_socket mdns_socket mdnsd_socket misc_logd_file mtpd_socket ot_daemon_socket property_socket racoon_socket recovery_socket rild_socket rild_debug_socket snapuserd_socket snapuserd_proxy_socket statsdw_socket system_wpa_socket system_ndebug_socket system_unsolzygote_socket tombstoned_crash_socket tombstoned_java_trace_socket tombstoned_intercept_socket traced_consumer_socket traced_perf_socket traced_producer_socket uncrypt_socket wpa_socket zygote_socket heapprofd_socket gps_control pdx_display_dir pdx_performance_dir pdx_bufferhub_dir pdx_display_client_endpoint_socket pdx_display_manager_endpoint_socket pdx_display_screenshot_endpoint_socket pdx_display_vsync_endpoint_socket pdx_performance_client_endpoint_socket pdx_bufferhub_client_endpoint_socket file_contexts_file mac_perms_file property_contexts_file seapp_contexts_file sepolicy_file service_contexts_file keystore2_key_contexts_file vendor_service_contexts_file hwservice_contexts_file vndservice_contexts_file vendor_kernel_modules system_dlkm_file audiohal_data_file tee_service_contexts_file fingerprintd_exec flags_health_check_exec fsck_exec gatekeeperd_exec hal_graphics_composer_server_tmpfs hwservicemanager_exec idmap_exec init_exec init_tmpfs inputflinger_exec installd_exec keystore_exec llkd_exec lmkd_exec logd_exec mediadrmserver_exec mediaextractor_exec mediaextractor_tmpfs mediametrics_exec mediaserver_exec mediaserver_tmpfs mediaswcodec_exec netd_exec netutils_wrapper_exec performanced_exec profman_exec recovery_persist_exec recovery_refresh_exec rs_exec runas_exec sdcardd_exec servicemanager_exec sgdisk_exec shell_exec simpleperf_app_runner_exec statsd_exec su_exec surfaceflinger_tmpfs system_server_tmpfs tombstoned_exec toolbox_exec traced_tmpfs ueventd_tmpfs uncrypt_exec update_engine_exec update_verifier_exec usbd_exec vdc_exec vendor_misc_writer_exec vendor_shell_exec vendor_toolbox_exec virtual_camera_exec virtual_touchpad_exec virtualizationmanager_exec vold_exec vold_prepare_subdirs_exec watchdogd_exec webview_zygote_exec webview_zygote_tmpfs wificond_exec zygote_tmpfs zygote_exec aconfigd_exec aconfigd_mainline_exec apex_test_prepostinstall_exec art_boot_exec art_exec_exec artd_exec artd_tmpfs atrace_exec audioserver_exec auditctl_exec automotive_display_service_exec bert_collector_exec blank_screen_exec blkid_exec boringssl_self_test_exec vendor_boringssl_self_test_exec boringssl_self_test_marker bpfloader_exec canhalconfigurator_exec clatd_exec compos_verify_exec composd_exec cppreopts_exec crosvm_exec crosvm_tmpfs derive_classpath_exec derive_sdk_exec dex2oat_exec dexopt_chroot_setup_exec dexopt_chroot_setup_tmpfs dexoptanalyzer_exec dmesgd_exec dumpstate_tmpfs evsmanagerd_exec storaged_data_file wm_trace_data_file accessibility_trace_data_file perfetto_traces_data_file perfetto_traces_bugreport_data_file perfetto_traces_profiling_data_file perfetto_configs_data_file system_perfetto_config_file uprobestats_configs_data_file oatdump_exec sdk_sandbox_system_data_file sdk_sandbox_data_file app_exec_data_file rollback_data_file checkin_data_file ota_image_data_file gsi_persistent_data_file emergency_data_file profcollectd_data_file apex_art_data_file apex_art_staging_data_file apex_compos_data_file apex_virt_data_file apex_tethering_data_file apex_uwb_data_file apex_appsearch_data_file apex_permission_data_file apex_scheduling_data_file apex_wifi_data_file font_data_file dmesgd_data_file odrefresh_data_file odsign_data_file odsign_metrics_file virtualizationservice_data_file vm_data_file environ_system_data_file bootanim_data_file fd_server_exec compos_exec compos_key_helper_exec prng_seeder_socket system_font_fallback_file aconfigd_socket aconfigd_mainline_socket system_aconfig_storage_file vendor_aconfig_storage_file connectivityblob_data_file mainline_supplicant_data_file pre_reboot_dexopt_file pre_reboot_dexopt_artd_file apk_metadata_file storage_area_app_dir storage_area_dir storage_area_content_file storage_area_key_file tradeinmode_metadata_file prefetch_metadata_file fuseblkd_exec fuseblkd_untrusted_exec fwk_bufferhub_exec gki_apex_prepostinstall_exec gpuservice_exec gsid_exec hal_allocator_default_exec hal_keymint_system_exec heapprofd_exec heapprofd_tmpfs hidl_lazy_test_server_exec incident_exec incident_helper_exec incidentd_exec iw_exec kcmdlinectrl_exec linkerconfig_exec linux_vm_setup_exec lpdumpd_exec mdnsd_exec mediatranscoding_exec mediatranscoding_tmpfs mediatuner_exec microfuchsiad_exec migrate_legacy_obb_data_exec misctrl_exec mm_events_exec mmd_exec mtectrl_exec odrefresh_exec odsign_exec ot_ctl_exec ot_daemon_exec otapreopt_chroot_exec otapreopt_slot_exec perfetto_exec perfetto_tmpfs postinstall_exec postinstall_dexopt_exec postinstall_dexopt_tmpfs prefetch_exec preloads_copy_exec preopt2cachename_exec prng_seeder_exec profcollectd_exec remount_exec rkp_cert_processor_exec rkpd_exec rss_hwm_reset_exec simpleperf_exec simpleperf_boot_data_file snapshotctl_exec snapuserd_exec stats_exec storaged_exec surfaceflinger_exec system_server_startup_tmpfs system_suspend_exec trace_redactor_exec traced_exec traced_perf_exec traced_probes_exec traced_probes_tmpfs tradeinmode_exec uprobestats_exec vehicle_binding_util_exec vfio_handler_exec virtual_face_exec virtual_fingerprint_exec virtualizationservice_exec vmnic_exec wait_for_keymaster_exec wifi_mainline_supplicant_exec ))
 (typeattribute exec_type)
-(typeattributeset exec_type (adbd_exec aidl_lazy_test_server_exec apexd_exec bootanim_exec bootstat_exec bufferhubd_exec cameraserver_exec charger_exec crash_dump_exec credstore_exec dhcp_exec dnsmasq_exec drmserver_exec dumpstate_exec e2fs_exec early_virtmgr_exec extra_free_kbytes_exec tcpdump_exec logcat_exec fingerprintd_exec flags_health_check_exec fsck_exec gatekeeperd_exec hwservicemanager_exec idmap_exec init_exec inputflinger_exec installd_exec keystore_exec llkd_exec lmkd_exec logd_exec mediadrmserver_exec mediaextractor_exec mediametrics_exec mediaserver_exec mediaswcodec_exec netd_exec netutils_wrapper_exec performanced_exec profman_exec recovery_persist_exec recovery_refresh_exec rs_exec runas_exec sdcardd_exec servicemanager_exec sgdisk_exec shell_exec simpleperf_app_runner_exec statsd_exec su_exec tombstoned_exec toolbox_exec uncrypt_exec update_engine_exec update_verifier_exec usbd_exec vdc_exec vendor_misc_writer_exec vendor_shell_exec vendor_toolbox_exec virtual_touchpad_exec virtualizationmanager_exec vold_exec vold_prepare_subdirs_exec watchdogd_exec webview_zygote_exec wificond_exec zygote_exec aconfigd_exec aconfigd_mainline_exec apex_test_prepostinstall_exec art_boot_exec art_exec_exec artd_exec atrace_exec audioserver_exec auditctl_exec automotive_display_service_exec bert_collector_exec blank_screen_exec blkid_exec boringssl_self_test_exec vendor_boringssl_self_test_exec bpfloader_exec canhalconfigurator_exec clatd_exec compos_verify_exec composd_exec cppreopts_exec crosvm_exec derive_classpath_exec derive_sdk_exec dex2oat_exec dexopt_chroot_setup_exec dexoptanalyzer_exec dmesgd_exec evsmanagerd_exec oatdump_exec fd_server_exec compos_exec compos_key_helper_exec fuseblkd_exec fuseblkd_untrusted_exec fwk_bufferhub_exec gki_apex_prepostinstall_exec gpuservice_exec gsid_exec hal_allocator_default_exec hal_keymint_system_exec heapprofd_exec hidl_lazy_test_server_exec incident_exec incident_helper_exec incidentd_exec iw_exec kcmdlinectrl_exec linkerconfig_exec linux_vm_setup_exec lpdumpd_exec mdnsd_exec mediatranscoding_exec mediatuner_exec migrate_legacy_obb_data_exec misctrl_exec mm_events_exec mmd_exec mtectrl_exec odrefresh_exec odsign_exec ot_ctl_exec ot_daemon_exec otapreopt_chroot_exec otapreopt_slot_exec perfetto_exec postinstall_exec postinstall_dexopt_exec prefetch_exec preloads_copy_exec preopt2cachename_exec prng_seeder_exec profcollectd_exec remount_exec rkp_cert_processor_exec rkpd_exec rss_hwm_reset_exec simpleperf_exec snapshotctl_exec snapuserd_exec stats_exec storaged_exec surfaceflinger_exec system_suspend_exec trace_redactor_exec traced_exec traced_perf_exec traced_probes_exec tradeinmode_exec uprobestats_exec vehicle_binding_util_exec vfio_handler_exec virtual_camera_exec virtual_face_exec virtual_fingerprint_exec virtualizationservice_exec vmnic_exec wait_for_keymaster_exec wifi_mainline_supplicant_exec ))
+(typeattributeset exec_type (adbd_exec aidl_lazy_test_server_exec apexd_exec bootanim_exec bootstat_exec bufferhubd_exec cameraserver_exec charger_exec crash_dump_exec credstore_exec dhcp_exec dnsmasq_exec drmserver_exec dumpstate_exec e2fs_exec early_virtmgr_exec extra_free_kbytes_exec tcpdump_exec logcat_exec fingerprintd_exec flags_health_check_exec fsck_exec gatekeeperd_exec hwservicemanager_exec idmap_exec init_exec inputflinger_exec installd_exec keystore_exec llkd_exec lmkd_exec logd_exec mediadrmserver_exec mediaextractor_exec mediametrics_exec mediaserver_exec mediaswcodec_exec netd_exec netutils_wrapper_exec performanced_exec profman_exec recovery_persist_exec recovery_refresh_exec rs_exec runas_exec sdcardd_exec servicemanager_exec sgdisk_exec shell_exec simpleperf_app_runner_exec statsd_exec su_exec tombstoned_exec toolbox_exec uncrypt_exec update_engine_exec update_verifier_exec usbd_exec vdc_exec vendor_misc_writer_exec vendor_shell_exec vendor_toolbox_exec virtual_camera_exec virtual_touchpad_exec virtualizationmanager_exec vold_exec vold_prepare_subdirs_exec watchdogd_exec webview_zygote_exec wificond_exec zygote_exec aconfigd_exec aconfigd_mainline_exec apex_test_prepostinstall_exec art_boot_exec art_exec_exec artd_exec atrace_exec audioserver_exec auditctl_exec automotive_display_service_exec bert_collector_exec blank_screen_exec blkid_exec boringssl_self_test_exec vendor_boringssl_self_test_exec bpfloader_exec canhalconfigurator_exec clatd_exec compos_verify_exec composd_exec cppreopts_exec crosvm_exec derive_classpath_exec derive_sdk_exec dex2oat_exec dexopt_chroot_setup_exec dexoptanalyzer_exec dmesgd_exec evsmanagerd_exec oatdump_exec fd_server_exec compos_exec compos_key_helper_exec fuseblkd_exec fuseblkd_untrusted_exec fwk_bufferhub_exec gki_apex_prepostinstall_exec gpuservice_exec gsid_exec hal_allocator_default_exec hal_keymint_system_exec heapprofd_exec hidl_lazy_test_server_exec incident_exec incident_helper_exec incidentd_exec iw_exec kcmdlinectrl_exec linkerconfig_exec linux_vm_setup_exec lpdumpd_exec mdnsd_exec mediatranscoding_exec mediatuner_exec microfuchsiad_exec migrate_legacy_obb_data_exec misctrl_exec mm_events_exec mmd_exec mtectrl_exec odrefresh_exec odsign_exec ot_ctl_exec ot_daemon_exec otapreopt_chroot_exec otapreopt_slot_exec perfetto_exec postinstall_exec postinstall_dexopt_exec prefetch_exec preloads_copy_exec preopt2cachename_exec prng_seeder_exec profcollectd_exec remount_exec rkp_cert_processor_exec rkpd_exec rss_hwm_reset_exec simpleperf_exec snapshotctl_exec snapuserd_exec stats_exec storaged_exec surfaceflinger_exec system_suspend_exec trace_redactor_exec traced_exec traced_perf_exec traced_probes_exec tradeinmode_exec uprobestats_exec vehicle_binding_util_exec vfio_handler_exec virtual_face_exec virtual_fingerprint_exec virtualizationservice_exec vmnic_exec wait_for_keymaster_exec wifi_mainline_supplicant_exec ))
 (typeattribute data_file_type)
 (expandtypeattribute (data_file_type) false)
 (typeattributeset data_file_type (incremental_control_file system_data_root_file system_data_file system_userdir_file packages_list_file game_mode_intervention_list_file vendor_data_file vendor_userdir_file unencrypted_data_file install_data_file drm_data_file adb_data_file anr_data_file tombstone_data_file tombstone_wifi_data_file apex_data_file apk_data_file apk_tmp_file apk_private_data_file apk_private_tmp_file dalvikcache_data_file ota_data_file ota_package_file user_profile_root_file user_profile_data_file profman_dump_data_file prereboot_data_file resourcecache_data_file shell_data_file property_data_file bootchart_data_file dropbox_data_file heapdump_data_file nativetest_data_file shell_test_data_file ringtone_file preloads_data_file preloads_media_file dhcp_data_file server_configurable_flags_data_file staging_data_file shutdown_checkpoints_system_data_file adb_keys_file apex_system_server_data_file apex_module_data_file apex_ota_reserved_file apex_rollback_data_file appcompat_data_file audio_data_file audioserver_data_file bluetooth_data_file bluetooth_logs_data_file bootstat_data_file boottrace_data_file camera_data_file credstore_data_file gatekeeper_data_file incident_data_file keychain_data_file keystore_data_file media_data_file media_rw_data_file media_userdir_file misc_user_data_file net_data_file network_watchlist_data_file nfc_data_file nfc_logs_data_file radio_data_file recovery_data_file shared_relro_file snapshotctl_log_data_file stats_config_data_file stats_data_file systemkeys_data_file textclassifier_data_file trace_data_file vpn_data_file wifi_data_file vold_data_file tee_data_file update_engine_data_file update_engine_log_data_file snapuserd_log_data_file method_trace_data_file gsi_data_file radio_core_data_file app_data_file privapp_data_file system_app_data_file cache_file overlayfs_file cache_backup_file cache_private_backup_file cache_recovery_file wallpaper_file shortcut_manager_icons icon_file asec_apk_file asec_public_file asec_image_file backup_data_file fingerprintd_data_file fingerprint_vendor_data_file app_fuse_file face_vendor_data_file iris_vendor_data_file bluetooth_socket misc_logd_file system_wpa_socket system_ndebug_socket system_unsolzygote_socket wpa_socket audiohal_data_file storaged_data_file wm_trace_data_file accessibility_trace_data_file perfetto_traces_data_file perfetto_traces_bugreport_data_file perfetto_traces_profiling_data_file perfetto_configs_data_file uprobestats_configs_data_file sdk_sandbox_system_data_file sdk_sandbox_data_file app_exec_data_file rollback_data_file checkin_data_file ota_image_data_file gsi_persistent_data_file emergency_data_file profcollectd_data_file apex_art_data_file apex_art_staging_data_file apex_compos_data_file apex_virt_data_file apex_tethering_data_file apex_uwb_data_file apex_appsearch_data_file apex_permission_data_file apex_scheduling_data_file apex_wifi_data_file font_data_file dmesgd_data_file odrefresh_data_file odsign_data_file odsign_metrics_file virtualizationservice_data_file environ_system_data_file bootanim_data_file connectivityblob_data_file mainline_supplicant_data_file apk_metadata_file storage_area_app_dir storage_area_dir storage_area_content_file storage_area_key_file ))
@@ -715,7 +716,7 @@
 (expandtypeattribute (app_data_file_type) false)
 (typeattributeset app_data_file_type (shell_data_file bluetooth_data_file nfc_data_file radio_data_file app_data_file privapp_data_file system_app_data_file sdk_sandbox_data_file storage_area_app_dir storage_area_dir storage_area_content_file ))
 (typeattribute system_file_type)
-(typeattributeset system_file_type (adbd_exec aidl_lazy_test_server_exec apexd_exec bootanim_exec bootstat_exec bufferhubd_exec cameraserver_exec charger_exec crash_dump_exec credstore_exec dhcp_exec dnsmasq_exec drmserver_exec dumpstate_exec e2fs_exec early_virtmgr_exec extra_free_kbytes_exec system_file system_asan_options_file system_event_log_tags_file system_lib_file system_bootstrap_lib_file system_group_file system_linker_exec system_linker_config_file system_passwd_file system_seccomp_policy_file system_security_cacerts_file tcpdump_exec system_zoneinfo_file cgroup_desc_file task_profiles_file art_apex_dir bootanim_oem_file logcat_exec file_contexts_file mac_perms_file property_contexts_file seapp_contexts_file sepolicy_file service_contexts_file keystore2_key_contexts_file hwservice_contexts_file tee_service_contexts_file fingerprintd_exec flags_health_check_exec fsck_exec gatekeeperd_exec hwservicemanager_exec idmap_exec init_exec inputflinger_exec installd_exec keystore_exec llkd_exec lmkd_exec logd_exec mediadrmserver_exec mediaextractor_exec mediametrics_exec mediaserver_exec mediaswcodec_exec netd_exec netutils_wrapper_exec performanced_exec profman_exec recovery_persist_exec recovery_refresh_exec rs_exec runas_exec sdcardd_exec servicemanager_exec sgdisk_exec shell_exec simpleperf_app_runner_exec statsd_exec su_exec tombstoned_exec toolbox_exec uncrypt_exec update_engine_exec update_verifier_exec usbd_exec vdc_exec virtual_touchpad_exec virtualizationmanager_exec vold_exec vold_prepare_subdirs_exec watchdogd_exec wificond_exec zygote_exec aconfigd_exec aconfigd_mainline_exec apex_test_prepostinstall_exec art_boot_exec art_exec_exec artd_exec atrace_exec audioserver_exec auditctl_exec automotive_display_service_exec bert_collector_exec blank_screen_exec blkid_exec boringssl_self_test_exec bpfloader_exec canhalconfigurator_exec clatd_exec compos_verify_exec composd_exec cppreopts_exec crosvm_exec derive_classpath_exec derive_sdk_exec dex2oat_exec dexopt_chroot_setup_exec dexoptanalyzer_exec dmesgd_exec evsmanagerd_exec system_perfetto_config_file oatdump_exec fd_server_exec compos_exec compos_key_helper_exec system_font_fallback_file system_aconfig_storage_file fuseblkd_exec fuseblkd_untrusted_exec fwk_bufferhub_exec gki_apex_prepostinstall_exec gpuservice_exec gsid_exec hal_allocator_default_exec hal_keymint_system_exec heapprofd_exec hidl_lazy_test_server_exec incident_exec incident_helper_exec incidentd_exec iw_exec kcmdlinectrl_exec linkerconfig_exec linux_vm_setup_exec lpdumpd_exec mdnsd_exec mediatranscoding_exec mediatuner_exec migrate_legacy_obb_data_exec misctrl_exec mm_events_exec mmd_exec mtectrl_exec odrefresh_exec odsign_exec ot_ctl_exec ot_daemon_exec otapreopt_chroot_exec otapreopt_slot_exec perfetto_exec postinstall_exec postinstall_dexopt_exec prefetch_exec preloads_copy_exec preopt2cachename_exec prng_seeder_exec profcollectd_exec remount_exec rkp_cert_processor_exec rkpd_exec rss_hwm_reset_exec simpleperf_exec snapshotctl_exec snapuserd_exec stats_exec storaged_exec surfaceflinger_exec system_suspend_exec trace_redactor_exec traced_exec traced_perf_exec traced_probes_exec tradeinmode_exec uprobestats_exec vehicle_binding_util_exec vfio_handler_exec virtual_camera_exec virtual_face_exec virtual_fingerprint_exec virtualizationservice_exec vmnic_exec wait_for_keymaster_exec wifi_mainline_supplicant_exec ))
+(typeattributeset system_file_type (adbd_exec aidl_lazy_test_server_exec apexd_exec bootanim_exec bootstat_exec bufferhubd_exec cameraserver_exec charger_exec crash_dump_exec credstore_exec dhcp_exec dnsmasq_exec drmserver_exec dumpstate_exec e2fs_exec early_virtmgr_exec extra_free_kbytes_exec system_file system_asan_options_file system_event_log_tags_file system_lib_file system_bootstrap_lib_file system_group_file system_linker_exec system_linker_config_file system_passwd_file system_seccomp_policy_file system_security_cacerts_file tcpdump_exec system_zoneinfo_file cgroup_desc_file task_profiles_file art_apex_dir bootanim_oem_file logcat_exec file_contexts_file mac_perms_file property_contexts_file seapp_contexts_file sepolicy_file service_contexts_file keystore2_key_contexts_file hwservice_contexts_file tee_service_contexts_file fingerprintd_exec flags_health_check_exec fsck_exec gatekeeperd_exec hwservicemanager_exec idmap_exec init_exec inputflinger_exec installd_exec keystore_exec llkd_exec lmkd_exec logd_exec mediadrmserver_exec mediaextractor_exec mediametrics_exec mediaserver_exec mediaswcodec_exec netd_exec netutils_wrapper_exec performanced_exec profman_exec recovery_persist_exec recovery_refresh_exec rs_exec runas_exec sdcardd_exec servicemanager_exec sgdisk_exec shell_exec simpleperf_app_runner_exec statsd_exec su_exec tombstoned_exec toolbox_exec uncrypt_exec update_engine_exec update_verifier_exec usbd_exec vdc_exec virtual_camera_exec virtual_touchpad_exec virtualizationmanager_exec vold_exec vold_prepare_subdirs_exec watchdogd_exec wificond_exec zygote_exec aconfigd_exec aconfigd_mainline_exec apex_test_prepostinstall_exec art_boot_exec art_exec_exec artd_exec atrace_exec audioserver_exec auditctl_exec automotive_display_service_exec bert_collector_exec blank_screen_exec blkid_exec boringssl_self_test_exec bpfloader_exec canhalconfigurator_exec clatd_exec compos_verify_exec composd_exec cppreopts_exec crosvm_exec derive_classpath_exec derive_sdk_exec dex2oat_exec dexopt_chroot_setup_exec dexoptanalyzer_exec dmesgd_exec evsmanagerd_exec system_perfetto_config_file oatdump_exec fd_server_exec compos_exec compos_key_helper_exec system_font_fallback_file system_aconfig_storage_file fuseblkd_exec fuseblkd_untrusted_exec fwk_bufferhub_exec gki_apex_prepostinstall_exec gpuservice_exec gsid_exec hal_allocator_default_exec hal_keymint_system_exec heapprofd_exec hidl_lazy_test_server_exec incident_exec incident_helper_exec incidentd_exec iw_exec kcmdlinectrl_exec linkerconfig_exec linux_vm_setup_exec lpdumpd_exec mdnsd_exec mediatranscoding_exec mediatuner_exec microfuchsiad_exec migrate_legacy_obb_data_exec misctrl_exec mm_events_exec mmd_exec mtectrl_exec odrefresh_exec odsign_exec ot_ctl_exec ot_daemon_exec otapreopt_chroot_exec otapreopt_slot_exec perfetto_exec postinstall_exec postinstall_dexopt_exec prefetch_exec preloads_copy_exec preopt2cachename_exec prng_seeder_exec profcollectd_exec remount_exec rkp_cert_processor_exec rkpd_exec rss_hwm_reset_exec simpleperf_exec snapshotctl_exec snapuserd_exec stats_exec storaged_exec surfaceflinger_exec system_suspend_exec trace_redactor_exec traced_exec traced_perf_exec traced_probes_exec tradeinmode_exec uprobestats_exec vehicle_binding_util_exec vfio_handler_exec virtual_face_exec virtual_fingerprint_exec virtualizationservice_exec vmnic_exec wait_for_keymaster_exec wifi_mainline_supplicant_exec ))
 (typeattribute system_dlkm_file_type)
 (typeattributeset system_dlkm_file_type (system_dlkm_file ))
 (typeattribute vendor_file_type)
@@ -727,7 +728,7 @@
 (expandtypeattribute (proc_net_type) true)
 (typeattributeset proc_net_type (proc_net ))
 (typeattribute sysfs_type)
-(typeattributeset sysfs_type (sysfs_usermodehelper sysfs sysfs_android_usb sysfs_uio sysfs_batteryinfo sysfs_bluetooth_writable sysfs_devfreq_cur sysfs_devfreq_dir sysfs_devices_block sysfs_dm sysfs_dm_verity sysfs_dma_heap sysfs_dmabuf_stats sysfs_dt_firmware_android sysfs_extcon sysfs_ion sysfs_ipv4 sysfs_kernel_notes sysfs_leds sysfs_loop sysfs_gpu sysfs_hwrandom sysfs_nfc_power_writable sysfs_wake_lock sysfs_net sysfs_power sysfs_rtc sysfs_mem_sleep sysfs_suspend_stats sysfs_switch sysfs_sync_on_suspend sysfs_transparent_hugepage sysfs_lru_gen_enabled sysfs_usb sysfs_wakeup sysfs_wakeup_reasons sysfs_fs_ext4_features sysfs_fs_f2fs sysfs_fs_fuse_bpf sysfs_fs_fuse_features sysfs_fs_incfs_features sysfs_fs_incfs_metrics sysfs_vendor_sched sysfs_devices_cs_etm sysfs_devices_system_cpu sysfs_lowmemorykiller sysfs_wlan_fwpath sysfs_vibrator sysfs_uhid sysfs_thermal sysfs_zram sysfs_zram_uevent sysfs_udc sysfs_dt_avf sysfs_uprobe sysfs_pgsize_migration sysfs_firmware_acpi_tables ))
+(typeattributeset sysfs_type (sysfs_usermodehelper sysfs sysfs_android_usb sysfs_uio sysfs_batteryinfo sysfs_bluetooth_writable sysfs_cma sysfs_devfreq_cur sysfs_devfreq_dir sysfs_devices_block sysfs_dm sysfs_dm_verity sysfs_dma_heap sysfs_dmabuf_stats sysfs_dt_firmware_android sysfs_extcon sysfs_ion sysfs_ipv4 sysfs_kernel_notes sysfs_leds sysfs_loop sysfs_gpu sysfs_hwrandom sysfs_nfc_power_writable sysfs_wake_lock sysfs_net sysfs_power sysfs_rtc sysfs_mem_sleep sysfs_suspend_stats sysfs_switch sysfs_sync_on_suspend sysfs_transparent_hugepage sysfs_lru_gen_enabled sysfs_usb sysfs_wakeup sysfs_wakeup_reasons sysfs_fs_ext4_features sysfs_fs_f2fs sysfs_fs_fuse_bpf sysfs_fs_fuse_features sysfs_fs_incfs_features sysfs_fs_incfs_metrics sysfs_vendor_sched sysfs_devices_cs_etm sysfs_devices_system_cpu sysfs_lowmemorykiller sysfs_wlan_fwpath sysfs_vibrator sysfs_uhid sysfs_thermal sysfs_zram sysfs_zram_uevent sysfs_udc sysfs_dt_avf sysfs_uprobe sysfs_pgsize_migration sysfs_firmware_acpi_tables ))
 (typeattribute debugfs_type)
 (typeattributeset debugfs_type (debugfs debugfs_kprobes debugfs_mmc debugfs_mm_events_tracing debugfs_trace_marker debugfs_tracing debugfs_tracing_debug debugfs_tracing_instances debugfs_tracing_printk_formats debugfs_wakeup_sources debugfs_wifi_tracing debugfs_bootreceiver_tracing debugfs_kcov ))
 (typeattribute tracefs_type)
@@ -773,17 +774,17 @@
 (expandtypeattribute (vendor_public_property_type) false)
 (typeattributeset vendor_public_property_type (persist_vendor_debug_wifi_prop ))
 (typeattribute system_server_service)
-(typeattributeset system_server_service (device_config_updatable_service ondevicepersonalization_system_service profiling_service accessibility_service account_service activity_service activity_task_service adb_service adservices_manager_service advanced_protection_service alarm_service app_binding_service app_function_service app_hibernation_service app_integrity_service app_prediction_service app_search_service appops_service appwidget_service archive_service assetatlas_service attestation_verification_service audio_service auth_service autofill_service backup_service batterystats_service battery_service binder_calls_stats_service blob_store_service bluetooth_manager_service broadcastradio_service cacheinfo_service cameraproxy_service clipboard_service cloudsearch_service contexthub_service contextual_search_service crossprofileapps_service IProxyService_service companion_device_service connectivity_native_service connectivity_service connmetrics_service consumer_ir_service content_capture_service content_suggestions_service content_service country_detector_service coverage_service cpuinfo_service cpu_monitor_service credential_service dataloader_manager_service dbinfo_service device_config_service device_policy_service device_state_service deviceidle_service device_identifiers_service devicestoragemonitor_service diskstats_service display_service domain_verification_service color_display_service ecm_enhanced_confirmation_service external_vibrator_service file_integrity_service font_service netd_listener_service network_watchlist_service devicelock_service DockObserver_service dreams_service dropbox_service ethernet_service biometric_service bugreport_service platform_compat_service face_service fingerprint_service forensic_service fwk_altitude_service fwk_stats_service fwk_sensor_service fwk_vibrator_control_service game_service gfxinfo_service gnss_time_update_service grammatical_inflection_service graphicsstats_service hardware_service hardware_properties_service hdmi_control_service healthconnect_service hint_service imms_service incremental_service input_method_service input_service intrusion_detection_service ipsec_service iris_service jobscheduler_service launcherapps_service legacy_permission_service light_service locale_service location_service location_time_zone_manager_service lock_settings_service looper_stats_service media_communication_service media_metrics_service media_projection_service media_quality_service media_router_service media_session_service meminfo_service memtrackproxy_service midi_service mount_service music_recognition_service nearby_service netpolicy_service netstats_service network_management_service network_score_service network_stack_service network_time_update_service notification_service oem_lock_service otadexopt_service overlay_service pac_proxy_service package_service package_native_service people_service permission_service permissionmgr_service permission_checker_service persistent_data_block_service pinner_service powerstats_service power_service print_service processinfo_service procstats_service reboot_readiness_service recovery_service registry_service remote_auth_service remote_provisioning_service resources_manager_service restrictions_service role_service rollback_service runtime_service rttmanager_service samplingprofiler_service scheduling_policy_service search_service search_ui_service sec_key_att_app_id_provider_service security_state_service selection_toolbar_service sensitive_content_protection_service sensorservice_service sensor_privacy_service serial_service servicediscovery_service settings_service shortcut_service slice_service smartspace_service statusbar_service storagestats_service sdk_sandbox_service system_config_service system_server_dumper_service system_update_service soundtrigger_middleware_service speech_recognition_service tare_service task_service testharness_service textclassification_service textservices_service texttospeech_service telecom_service thermal_service threadnetwork_service timedetector_service timezonedetector_service translation_service trust_service tv_ad_service tv_iapp_service tv_input_service tv_tuner_resource_mgr_service uimode_service updatelock_service uri_grants_service usagestats_service usb_service user_service uwb_service vcn_management_service vibrator_service vibrator_manager_service virtual_device_service virtual_device_native_service voiceinteraction_service vpn_management_service vr_manager_service wallpaper_service wallpaper_effects_generation_service webviewupdate_service wifip2p_service wifiscanner_service wifi_service wifiaware_service wifi_usd_service window_service inputflinger_service tethering_service emergency_affordance_service ambient_context_service authentication_policy_service attention_service bg_install_control_service communal_service dynamic_system_service feature_flags_service fwk_devicestate_service incidentcompanion_service logcat_service on_device_intelligence_service protolog_configuration_service resolver_service safety_center_service statsbootstrap_service statscompanion_service statsmanager_service supervision_service tracingproxy_service tradeinmode_service transparency_service vm_tethering_service wearable_sensing_service dynamic_instrumentation_service ranging_service ))
+(typeattributeset system_server_service (device_config_updatable_service ondevicepersonalization_system_service profiling_service accessibility_service account_service activity_service activity_task_service adb_service adservices_manager_service alarm_service app_binding_service app_function_service app_hibernation_service app_integrity_service app_prediction_service app_search_service appops_service appwidget_service archive_service assetatlas_service attestation_verification_service audio_service auth_service autofill_service backup_service batterystats_service battery_service binder_calls_stats_service blob_store_service bluetooth_manager_service broadcastradio_service cacheinfo_service cameraproxy_service clipboard_service cloudsearch_service contexthub_service contextual_search_service crossprofileapps_service IProxyService_service companion_device_service connectivity_native_service connectivity_service connmetrics_service consumer_ir_service content_capture_service content_suggestions_service content_service country_detector_service coverage_service cpuinfo_service cpu_monitor_service credential_service dataloader_manager_service dbinfo_service device_config_service device_policy_service device_state_service deviceidle_service device_identifiers_service devicestoragemonitor_service diskstats_service display_service domain_verification_service color_display_service ecm_enhanced_confirmation_service external_vibrator_service file_integrity_service font_service netd_listener_service network_watchlist_service devicelock_service DockObserver_service dreams_service dropbox_service ethernet_service biometric_service bugreport_service platform_compat_service face_service fingerprint_service fwk_altitude_service fwk_stats_service fwk_sensor_service fwk_vibrator_control_service game_service gfxinfo_service gnss_time_update_service grammatical_inflection_service graphicsstats_service hardware_service hardware_properties_service hdmi_control_service healthconnect_service hint_service imms_service incremental_service input_method_service input_service intrusion_detection_service ipsec_service iris_service jobscheduler_service launcherapps_service legacy_permission_service light_service locale_service location_service location_time_zone_manager_service lock_settings_service looper_stats_service media_communication_service media_metrics_service media_projection_service media_quality_service media_router_service media_session_service meminfo_service memtrackproxy_service midi_service mount_service music_recognition_service nearby_service netpolicy_service netstats_service network_management_service network_score_service network_stack_service network_time_update_service notification_service oem_lock_service otadexopt_service overlay_service pac_proxy_service package_service package_native_service people_service permission_service permissionmgr_service permission_checker_service persistent_data_block_service pinner_service powerstats_service power_service print_service processinfo_service procstats_service reboot_readiness_service recovery_service registry_service remote_auth_service remote_provisioning_service resources_manager_service restrictions_service role_service rollback_service runtime_service rttmanager_service samplingprofiler_service scheduling_policy_service search_service search_ui_service sec_key_att_app_id_provider_service security_state_service selection_toolbar_service sensitive_content_protection_service sensorservice_service sensor_privacy_service serial_service servicediscovery_service settings_service shortcut_service slice_service smartspace_service statusbar_service storagestats_service sdk_sandbox_service system_config_service system_server_dumper_service system_update_service soundtrigger_middleware_service speech_recognition_service tare_service task_service testharness_service textclassification_service textservices_service texttospeech_service telecom_service thermal_service threadnetwork_service timedetector_service timezonedetector_service translation_service trust_service tv_ad_service tv_iapp_service tv_input_service tv_tuner_resource_mgr_service uimode_service updatelock_service uri_grants_service usagestats_service usb_service user_service uwb_service vcn_management_service vibrator_service vibrator_manager_service virtual_device_service virtual_device_native_service voiceinteraction_service vpn_management_service vr_manager_service wallpaper_service wallpaper_effects_generation_service webviewupdate_service wifip2p_service wifiscanner_service wifi_service wifiaware_service wifi_usd_service window_service inputflinger_service tethering_service emergency_affordance_service ambient_context_service authentication_policy_service attention_service bg_install_control_service communal_service dynamic_system_service feature_flags_service fwk_devicestate_service incidentcompanion_service logcat_service on_device_intelligence_service protolog_configuration_service resolver_service safety_center_service statsbootstrap_service statscompanion_service statsmanager_service supervision_service tracingproxy_service tradeinmode_service transparency_service vm_tethering_service wearable_sensing_service dynamic_instrumentation_service advanced_protection_service ranging_service ))
 (typeattribute app_api_service)
-(typeattributeset app_api_service (batteryproperties_service gatekeeper_service gpu_service credstore_service mediatranscoding_service profiling_service surfaceflinger_service accessibility_service account_service activity_service activity_task_service advanced_protection_service alarm_service app_function_service app_hibernation_service app_prediction_service app_search_service appops_service appwidget_service archive_service assetatlas_service attestation_verification_service audio_service auth_service autofill_service backup_service batterystats_service blob_store_service bluetooth_manager_service broadcastradio_service clipboard_service cloudsearch_service contexthub_service contextual_search_service crossprofileapps_service IProxyService_service companion_device_service connectivity_native_service connectivity_service connmetrics_service consumer_ir_service content_capture_service content_suggestions_service content_service country_detector_service credential_service device_policy_service device_state_service deviceidle_service device_identifiers_service display_service domain_verification_service color_display_service ecm_enhanced_confirmation_service file_integrity_service font_service devicelock_service dreams_service dropbox_service ethernet_service biometric_service bugreport_service platform_compat_service face_service fingerprint_service forensic_service fwk_stats_service game_service grammatical_inflection_service graphicsstats_service hardware_properties_service hdmi_control_service healthconnect_service hint_service imms_service input_method_service input_service intrusion_detection_service ipsec_service iris_service jobscheduler_service launcherapps_service legacy_permission_service light_service locale_service location_service lock_settings_service media_communication_service media_metrics_service media_projection_service media_quality_service media_router_service media_session_service memtrackproxy_service midi_service mount_service music_recognition_service nearby_service netpolicy_service netstats_service network_management_service notification_service pac_proxy_service package_service package_native_service people_service permission_service permissionmgr_service permission_checker_service persistent_data_block_service powerstats_service power_service print_service procstats_service reboot_readiness_service registry_service remote_auth_service restrictions_service role_service rollback_service rttmanager_service search_service search_ui_service sec_key_att_app_id_provider_service security_state_service selection_toolbar_service sensitive_content_protection_service sensorservice_service sensor_privacy_service servicediscovery_service settings_service shortcut_service slice_service smartspace_service statusbar_service storagestats_service sdk_sandbox_service speech_recognition_service tare_service textclassification_service textservices_service texttospeech_service telecom_service thermal_service threadnetwork_service timedetector_service timezonedetector_service translation_service trust_service tv_ad_service tv_iapp_service tv_input_service tv_tuner_resource_mgr_service uimode_service uri_grants_service usagestats_service usb_service user_service uwb_service vcn_management_service vibrator_service vibrator_manager_service virtual_device_service virtual_device_native_service voiceinteraction_service vpn_management_service wallpaper_service wallpaper_effects_generation_service webviewupdate_service wifip2p_service wifiscanner_service wifi_service wifiaware_service wifi_usd_service tethering_service ambient_context_service communal_service feature_flags_service incidentcompanion_service mediatuner_service on_device_intelligence_service protolog_configuration_service safety_center_service supervision_service wearable_sensing_service dynamic_instrumentation_service ranging_service ))
+(typeattributeset app_api_service (batteryproperties_service gatekeeper_service gpu_service credstore_service mediatranscoding_service profiling_service surfaceflinger_service accessibility_service account_service activity_service activity_task_service alarm_service app_function_service app_hibernation_service app_prediction_service app_search_service appops_service appwidget_service archive_service assetatlas_service attestation_verification_service audio_service auth_service autofill_service backup_service batterystats_service blob_store_service bluetooth_manager_service broadcastradio_service clipboard_service cloudsearch_service contexthub_service contextual_search_service crossprofileapps_service IProxyService_service companion_device_service connectivity_native_service connectivity_service connmetrics_service consumer_ir_service content_capture_service content_suggestions_service content_service country_detector_service credential_service device_policy_service device_state_service deviceidle_service device_identifiers_service display_service domain_verification_service color_display_service ecm_enhanced_confirmation_service file_integrity_service font_service devicelock_service dreams_service dropbox_service ethernet_service biometric_service bugreport_service platform_compat_service face_service fingerprint_service fwk_stats_service game_service grammatical_inflection_service graphicsstats_service hardware_properties_service hdmi_control_service healthconnect_service hint_service imms_service input_method_service input_service intrusion_detection_service ipsec_service iris_service jobscheduler_service launcherapps_service legacy_permission_service light_service locale_service location_service lock_settings_service media_communication_service media_metrics_service media_projection_service media_quality_service media_router_service media_session_service memtrackproxy_service midi_service mount_service music_recognition_service nearby_service netpolicy_service netstats_service network_management_service notification_service pac_proxy_service package_service package_native_service people_service permission_service permissionmgr_service permission_checker_service persistent_data_block_service powerstats_service power_service print_service procstats_service reboot_readiness_service registry_service remote_auth_service restrictions_service role_service rollback_service rttmanager_service search_service search_ui_service sec_key_att_app_id_provider_service security_state_service selection_toolbar_service sensitive_content_protection_service sensorservice_service sensor_privacy_service servicediscovery_service settings_service shortcut_service slice_service smartspace_service statusbar_service storagestats_service sdk_sandbox_service speech_recognition_service tare_service textclassification_service textservices_service texttospeech_service telecom_service thermal_service threadnetwork_service timedetector_service timezonedetector_service translation_service trust_service tv_ad_service tv_iapp_service tv_input_service tv_tuner_resource_mgr_service uimode_service uri_grants_service usagestats_service usb_service user_service uwb_service vcn_management_service vibrator_service vibrator_manager_service virtual_device_service virtual_device_native_service voiceinteraction_service vpn_management_service wallpaper_service wallpaper_effects_generation_service webviewupdate_service wifip2p_service wifiscanner_service wifi_service wifiaware_service wifi_usd_service tethering_service ambient_context_service communal_service feature_flags_service incidentcompanion_service mediatuner_service on_device_intelligence_service protolog_configuration_service safety_center_service supervision_service wearable_sensing_service dynamic_instrumentation_service advanced_protection_service ranging_service ))
 (typeattribute ephemeral_app_api_service)
 (typeattributeset ephemeral_app_api_service (batteryproperties_service gpu_service surfaceflinger_service accessibility_service account_service activity_service activity_task_service alarm_service app_search_service appops_service appwidget_service assetatlas_service audio_service autofill_service backup_service batterystats_service bluetooth_manager_service clipboard_service IProxyService_service companion_device_service connectivity_native_service connectivity_service connmetrics_service consumer_ir_service content_capture_service content_suggestions_service content_service country_detector_service credential_service deviceidle_service device_identifiers_service display_service font_service devicelock_service dreams_service dropbox_service platform_compat_service game_service grammatical_inflection_service graphicsstats_service hardware_properties_service hint_service imms_service input_method_service input_service ipsec_service jobscheduler_service launcherapps_service legacy_permission_service light_service locale_service location_service media_communication_service media_metrics_service media_projection_service media_quality_service media_router_service media_session_service memtrackproxy_service midi_service mount_service music_recognition_service netpolicy_service netstats_service network_management_service notification_service package_service package_native_service permission_service permissionmgr_service permission_checker_service power_service print_service procstats_service registry_service restrictions_service rttmanager_service search_service security_state_service selection_toolbar_service sensorservice_service sensor_privacy_service servicediscovery_service settings_service statusbar_service storagestats_service speech_recognition_service textclassification_service textservices_service texttospeech_service telecom_service thermal_service timedetector_service translation_service tv_ad_service tv_iapp_service tv_input_service uimode_service uri_grants_service usagestats_service user_service vcn_management_service vibrator_service vibrator_manager_service virtual_device_native_service voiceinteraction_service webviewupdate_service tethering_service supervision_service ))
 (typeattribute system_api_service)
-(typeattributeset system_api_service (device_config_updatable_service ondevicepersonalization_system_service adb_service adservices_manager_service app_hibernation_service app_integrity_service cacheinfo_service cpuinfo_service credential_service dbinfo_service device_state_service diskstats_service color_display_service forensic_service gfxinfo_service intrusion_detection_service lock_settings_service meminfo_service network_score_service oem_lock_service overlay_service persistent_data_block_service resources_manager_service serial_service system_config_service system_server_dumper_service updatelock_service window_service inputflinger_service authentication_policy_service bg_install_control_service dynamic_system_service incidentcompanion_service protolog_configuration_service safety_center_service statsmanager_service ))
+(typeattributeset system_api_service (device_config_updatable_service ondevicepersonalization_system_service adb_service adservices_manager_service app_hibernation_service app_integrity_service cacheinfo_service cpuinfo_service credential_service dbinfo_service device_state_service diskstats_service color_display_service gfxinfo_service intrusion_detection_service lock_settings_service meminfo_service network_score_service oem_lock_service overlay_service persistent_data_block_service resources_manager_service serial_service system_config_service system_server_dumper_service updatelock_service window_service inputflinger_service authentication_policy_service bg_install_control_service dynamic_system_service incidentcompanion_service protolog_configuration_service safety_center_service statsmanager_service ))
 (typeattribute protected_service)
-(typeattributeset protected_service (hal_audio_service hal_authgraph_service hal_authsecret_service hal_bluetooth_service hal_bootctl_service hal_broadcastradio_service hal_camera_service hal_can_controller_service hal_confirmationui_service hal_contexthub_service hal_dumpstate_service hal_evs_service hal_face_service hal_fastboot_service hal_fingerprint_service hal_gnss_service hal_graphics_composer_service hal_health_service hal_health_storage_service hal_identity_service hal_input_processor_service hal_ir_service hal_ivn_service hal_keymint_service hal_light_service hal_macsec_service hal_mediaquality_service hal_memtrack_service hal_nfc_service hal_oemlock_service hal_power_service hal_power_stats_service hal_radio_service hal_rebootescrow_service hal_remoteaccess_service hal_remotelyprovisionedcomponent_avf_service hal_remotelyprovisionedcomponent_service hal_sensors_service hal_secretkeeper_service hal_secureclock_service hal_secure_element_service hal_sharedsecret_service hal_system_suspend_service hal_tetheroffload_service hal_thermal_service hal_tv_hdmi_cec_service hal_tv_hdmi_connection_service hal_tv_hdmi_earc_service hal_tv_input_service hal_threadnetwork_service hal_tv_tuner_service hal_usb_service hal_usb_gadget_service hal_uwb_service hal_vehicle_service hal_vibrator_service hal_weaver_service hal_nlinterceptor_service hal_wifi_service hal_wifi_hostapd_service hal_wifi_supplicant_service hal_gatekeeper_service ))
+(typeattributeset protected_service (hal_audio_service hal_authgraph_service hal_authsecret_service hal_bluetooth_service hal_bootctl_service hal_broadcastradio_service hal_camera_service hal_can_controller_service hal_confirmationui_service hal_contexthub_service hal_dumpstate_service hal_evs_service hal_face_service hal_fastboot_service hal_fingerprint_service hal_gnss_service hal_graphics_composer_service hal_health_service hal_health_storage_service hal_identity_service hal_input_processor_service hal_ir_service hal_ivn_service hal_keymint_service hal_light_service hal_macsec_service hal_mediaquality_service hal_memtrack_service hal_nfc_service hal_oemlock_service hal_power_service hal_power_stats_service hal_radio_service hal_rebootescrow_service hal_remoteaccess_service hal_remotelyprovisionedcomponent_avf_service hal_remotelyprovisionedcomponent_service hal_sensors_service hal_secretkeeper_service hal_secureclock_service hal_secure_element_service hal_sharedsecret_service hal_system_suspend_service hal_tetheroffload_service hal_thermal_service hal_tv_hdmi_cec_service hal_tv_hdmi_connection_service hal_tv_hdmi_earc_service hal_tv_input_service hal_threadnetwork_service hal_tv_tuner_service hal_usb_service hal_usb_gadget_service hal_uwb_service hal_vehicle_service hal_vibrator_service hal_weaver_service hal_nlinterceptor_service hal_wifi_service hal_wifi_hostapd_service hal_wifi_supplicant_service hal_gatekeeper_service hal_vm_capabilities_service ))
 (typeattribute service_manager_type)
-(typeattributeset service_manager_type (aidl_lazy_test_service apc_service apex_service artd_service artd_pre_reboot_service audioserver_service authorization_service batteryproperties_service bluetooth_service cameraserver_service fwk_camera_service default_android_service device_config_updatable_service dexopt_chroot_setup_service dnsresolver_service drmserver_service dumpstate_service evsmanagerd_service fingerprintd_service fwk_automotive_display_service gatekeeper_service gpu_service idmap_service incident_service installd_service credstore_service keystore_compat_hal_service keystore_maintenance_service keystore_metrics_service keystore_service legacykeystore_service lpdump_service mdns_service mediaserver_service mediametrics_service mediaextractor_service mediadrmserver_service mediatranscoding_service netd_service nfc_service ondevicepersonalization_system_service ot_daemon_service profiling_service radio_service secure_element_service service_manager_service storaged_service surfaceflinger_service system_app_service system_net_netd_service system_suspend_control_internal_service system_suspend_control_service update_engine_service update_engine_stable_service virtualization_service virtual_camera_service virtual_touchpad_service vold_service vr_hwc_service vrflinger_vsync_service accessibility_service account_service activity_service activity_task_service adb_service adservices_manager_service advanced_protection_service alarm_service app_binding_service app_function_service app_hibernation_service app_integrity_service app_prediction_service app_search_service appops_service appwidget_service archive_service assetatlas_service attestation_verification_service audio_service auth_service autofill_service backup_service batterystats_service battery_service binder_calls_stats_service blob_store_service bluetooth_manager_service broadcastradio_service cacheinfo_service cameraproxy_service clipboard_service cloudsearch_service contexthub_service contextual_search_service crossprofileapps_service IProxyService_service companion_device_service connectivity_native_service connectivity_service connmetrics_service consumer_ir_service content_capture_service content_suggestions_service content_service country_detector_service coverage_service cpuinfo_service cpu_monitor_service credential_service dataloader_manager_service dbinfo_service device_config_service device_policy_service device_state_service deviceidle_service device_identifiers_service devicestoragemonitor_service diskstats_service display_service domain_verification_service color_display_service ecm_enhanced_confirmation_service external_vibrator_service file_integrity_service font_service netd_listener_service network_watchlist_service devicelock_service DockObserver_service dreams_service dropbox_service ethernet_service biometric_service bugreport_service platform_compat_service face_service fingerprint_service forensic_service fwk_altitude_service fwk_stats_service fwk_sensor_service fwk_vibrator_control_service game_service gfxinfo_service gnss_time_update_service grammatical_inflection_service graphicsstats_service hardware_service hardware_properties_service hdmi_control_service healthconnect_service hint_service imms_service incremental_service input_method_service input_service intrusion_detection_service ipsec_service iris_service jobscheduler_service launcherapps_service legacy_permission_service light_service locale_service location_service location_time_zone_manager_service lock_settings_service looper_stats_service media_communication_service media_metrics_service media_projection_service media_quality_service media_router_service media_session_service meminfo_service memtrackproxy_service midi_service mount_service music_recognition_service nearby_service netpolicy_service netstats_service network_management_service network_score_service network_stack_service network_time_update_service notification_service oem_lock_service otadexopt_service overlay_service pac_proxy_service package_service package_native_service people_service permission_service permissionmgr_service permission_checker_service persistent_data_block_service pinner_service powerstats_service power_service print_service processinfo_service procstats_service reboot_readiness_service recovery_service registry_service remote_auth_service remote_provisioning_service resources_manager_service restrictions_service role_service rollback_service runtime_service rttmanager_service samplingprofiler_service scheduling_policy_service search_service search_ui_service sec_key_att_app_id_provider_service security_state_service selection_toolbar_service sensitive_content_protection_service sensorservice_service sensor_privacy_service serial_service servicediscovery_service settings_service shortcut_service slice_service smartspace_service statusbar_service storagestats_service sdk_sandbox_service system_config_service system_server_dumper_service system_update_service soundtrigger_middleware_service speech_recognition_service tare_service task_service testharness_service textclassification_service textservices_service texttospeech_service telecom_service thermal_service threadnetwork_service timedetector_service timezonedetector_service translation_service trust_service tv_ad_service tv_iapp_service tv_input_service tv_tuner_resource_mgr_service uimode_service updatelock_service uri_grants_service usagestats_service usb_service user_service uwb_service vcn_management_service vibrator_service vibrator_manager_service virtual_device_service virtual_device_native_service voiceinteraction_service vpn_management_service vr_manager_service wallpaper_service wallpaper_effects_generation_service webviewupdate_service wifip2p_service wifiscanner_service wifi_service wifinl80211_service wifiaware_service wifi_usd_service window_service inputflinger_service tethering_service emergency_affordance_service hal_audio_service hal_audiocontrol_service hal_authgraph_service hal_authsecret_service hal_bluetooth_service hal_bootctl_service hal_broadcastradio_service hal_camera_service hal_can_controller_service hal_cas_service hal_codec2_service hal_confirmationui_service hal_contexthub_service hal_drm_service hal_dumpstate_service hal_evs_service hal_face_service hal_fastboot_service hal_fingerprint_service hal_gnss_service hal_graphics_allocator_service hal_graphics_composer_service hal_graphics_mapper_service hal_health_service hal_health_storage_service hal_identity_service hal_input_processor_service hal_ir_service hal_ivn_service hal_keymint_service hal_light_service hal_macsec_service hal_mediaquality_service hal_memtrack_service hal_neuralnetworks_service hal_nfc_service hal_oemlock_service hal_power_service hal_power_stats_service hal_radio_service hal_rebootescrow_service hal_remoteaccess_service hal_remotelyprovisionedcomponent_avf_service hal_remotelyprovisionedcomponent_service hal_sensors_service hal_secretkeeper_service hal_secureclock_service hal_secure_element_service hal_sharedsecret_service hal_system_suspend_service hal_tetheroffload_service hal_thermal_service hal_tv_hdmi_cec_service hal_tv_hdmi_connection_service hal_tv_hdmi_earc_service hal_tv_input_service hal_threadnetwork_service hal_tv_tuner_service hal_usb_service hal_usb_gadget_service hal_uwb_service hal_vehicle_service hal_vibrator_service hal_weaver_service hal_nlinterceptor_service hal_wifi_service hal_wifi_hostapd_service hal_wifi_supplicant_service hal_gatekeeper_service ambient_context_service authentication_policy_service attention_service bg_install_control_service compos_service communal_service dynamic_system_service feature_flags_service fwk_devicestate_service gsi_service incidentcompanion_service logcat_service logd_service mediatuner_service mmd_service on_device_intelligence_service profcollectd_service protolog_configuration_service resolver_service rkpd_registrar_service rkpd_refresh_service rkp_cert_processor_service safety_center_service stats_service statsbootstrap_service statscompanion_service statsmanager_service supervision_service tracingproxy_service tradeinmode_service transparency_service vfio_handler_service virtualization_maintenance_service vm_tethering_service vmnic_service uce_service fwk_vold_service wearable_sensing_service wifi_mainline_supplicant_service dynamic_instrumentation_service ranging_service ))
+(typeattributeset service_manager_type (aidl_lazy_test_service apc_service apex_service artd_service artd_pre_reboot_service audioserver_service authorization_service batteryproperties_service bluetooth_service cameraserver_service fwk_camera_service default_android_service device_config_updatable_service dexopt_chroot_setup_service dnsresolver_service drmserver_service dumpstate_service evsmanagerd_service fingerprintd_service fwk_automotive_display_service gatekeeper_service gpu_service idmap_service incident_service installd_service credstore_service keystore_compat_hal_service keystore_maintenance_service keystore_metrics_service keystore_service legacykeystore_service lpdump_service mdns_service mediaserver_service mediametrics_service mediaextractor_service mediadrmserver_service mediatranscoding_service netd_service nfc_service ondevicepersonalization_system_service ot_daemon_service profiling_service radio_service secure_element_service service_manager_service storaged_service surfaceflinger_service system_app_service system_net_netd_service system_suspend_control_internal_service system_suspend_control_service update_engine_service update_engine_stable_service virtualization_service virtual_camera_service virtual_touchpad_service vold_service vr_hwc_service vrflinger_vsync_service accessibility_service account_service activity_service activity_task_service adb_service adservices_manager_service alarm_service app_binding_service app_function_service app_hibernation_service app_integrity_service app_prediction_service app_search_service appops_service appwidget_service archive_service assetatlas_service attestation_verification_service audio_service auth_service autofill_service backup_service batterystats_service battery_service binder_calls_stats_service blob_store_service bluetooth_manager_service broadcastradio_service cacheinfo_service cameraproxy_service clipboard_service cloudsearch_service contexthub_service contextual_search_service crossprofileapps_service IProxyService_service companion_device_service connectivity_native_service connectivity_service connmetrics_service consumer_ir_service content_capture_service content_suggestions_service content_service country_detector_service coverage_service cpuinfo_service cpu_monitor_service credential_service dataloader_manager_service dbinfo_service device_config_service device_policy_service device_state_service deviceidle_service device_identifiers_service devicestoragemonitor_service diskstats_service display_service domain_verification_service color_display_service ecm_enhanced_confirmation_service external_vibrator_service file_integrity_service font_service netd_listener_service network_watchlist_service devicelock_service DockObserver_service dreams_service dropbox_service ethernet_service biometric_service bugreport_service platform_compat_service face_service fingerprint_service fwk_altitude_service fwk_stats_service fwk_sensor_service fwk_vibrator_control_service game_service gfxinfo_service gnss_time_update_service grammatical_inflection_service graphicsstats_service hardware_service hardware_properties_service hdmi_control_service healthconnect_service hint_service imms_service incremental_service input_method_service input_service intrusion_detection_service ipsec_service iris_service jobscheduler_service launcherapps_service legacy_permission_service light_service locale_service location_service location_time_zone_manager_service lock_settings_service looper_stats_service media_communication_service media_metrics_service media_projection_service media_quality_service media_router_service media_session_service meminfo_service memtrackproxy_service midi_service mount_service music_recognition_service nearby_service netpolicy_service netstats_service network_management_service network_score_service network_stack_service network_time_update_service notification_service oem_lock_service otadexopt_service overlay_service pac_proxy_service package_service package_native_service people_service permission_service permissionmgr_service permission_checker_service persistent_data_block_service pinner_service powerstats_service power_service print_service processinfo_service procstats_service reboot_readiness_service recovery_service registry_service remote_auth_service remote_provisioning_service resources_manager_service restrictions_service role_service rollback_service runtime_service rttmanager_service samplingprofiler_service scheduling_policy_service search_service search_ui_service sec_key_att_app_id_provider_service security_state_service selection_toolbar_service sensitive_content_protection_service sensorservice_service sensor_privacy_service serial_service servicediscovery_service settings_service shortcut_service slice_service smartspace_service statusbar_service storagestats_service sdk_sandbox_service system_config_service system_server_dumper_service system_update_service soundtrigger_middleware_service speech_recognition_service tare_service task_service testharness_service textclassification_service textservices_service texttospeech_service telecom_service thermal_service threadnetwork_service timedetector_service timezonedetector_service translation_service trust_service tv_ad_service tv_iapp_service tv_input_service tv_tuner_resource_mgr_service uimode_service updatelock_service uri_grants_service usagestats_service usb_service user_service uwb_service vcn_management_service vibrator_service vibrator_manager_service virtual_device_service virtual_device_native_service voiceinteraction_service vpn_management_service vr_manager_service wallpaper_service wallpaper_effects_generation_service webviewupdate_service wifip2p_service wifiscanner_service wifi_service wifinl80211_service wifiaware_service wifi_usd_service window_service inputflinger_service tethering_service emergency_affordance_service hal_audio_service hal_audiocontrol_service hal_authgraph_service hal_authsecret_service hal_bluetooth_service hal_bootctl_service hal_broadcastradio_service hal_camera_service hal_can_controller_service hal_cas_service hal_codec2_service hal_confirmationui_service hal_contexthub_service hal_drm_service hal_dumpstate_service hal_evs_service hal_face_service hal_fastboot_service hal_fingerprint_service hal_gnss_service hal_graphics_allocator_service hal_graphics_composer_service hal_graphics_mapper_service hal_health_service hal_health_storage_service hal_identity_service hal_input_processor_service hal_ir_service hal_ivn_service hal_keymint_service hal_light_service hal_macsec_service hal_mediaquality_service hal_memtrack_service hal_neuralnetworks_service hal_nfc_service hal_oemlock_service hal_power_service hal_power_stats_service hal_radio_service hal_rebootescrow_service hal_remoteaccess_service hal_remotelyprovisionedcomponent_avf_service hal_remotelyprovisionedcomponent_service hal_sensors_service hal_secretkeeper_service hal_secureclock_service hal_secure_element_service hal_sharedsecret_service hal_system_suspend_service hal_tetheroffload_service hal_thermal_service hal_tv_hdmi_cec_service hal_tv_hdmi_connection_service hal_tv_hdmi_earc_service hal_tv_input_service hal_threadnetwork_service hal_tv_tuner_service hal_usb_service hal_usb_gadget_service hal_uwb_service hal_vehicle_service hal_vibrator_service hal_weaver_service hal_nlinterceptor_service hal_wifi_service hal_wifi_hostapd_service hal_wifi_supplicant_service hal_gatekeeper_service hal_vm_capabilities_service ambient_context_service authentication_policy_service attention_service bg_install_control_service compos_service communal_service dynamic_system_service feature_flags_service fwk_devicestate_service gsi_service incidentcompanion_service logcat_service logd_service mediatuner_service mmd_service on_device_intelligence_service profcollectd_service protolog_configuration_service resolver_service rkpd_registrar_service rkpd_refresh_service rkp_cert_processor_service safety_center_service stats_service statsbootstrap_service statscompanion_service statsmanager_service supervision_service tracingproxy_service tradeinmode_service transparency_service vfio_handler_service virtualization_maintenance_service vm_tethering_service vmnic_service microfuchsia_service uce_service fwk_vold_service wearable_sensing_service wifi_mainline_supplicant_service dynamic_instrumentation_service advanced_protection_service ranging_service ))
 (typeattribute hwservice_manager_type)
 (typeattributeset hwservice_manager_type (default_android_hwservice fwk_camera_hwservice fwk_display_hwservice fwk_scheduler_hwservice fwk_sensor_hwservice fwk_stats_hwservice fwk_automotive_display_hwservice hal_atrace_hwservice hal_audio_hwservice hal_audiocontrol_hwservice hal_authsecret_hwservice hal_bluetooth_hwservice hal_bootctl_hwservice hal_broadcastradio_hwservice hal_camera_hwservice hal_can_bus_hwservice hal_can_controller_hwservice hal_confirmationui_hwservice hal_contexthub_hwservice hal_dumpstate_hwservice hal_evs_hwservice hal_face_hwservice hal_fingerprint_hwservice hal_gatekeeper_hwservice hal_gnss_hwservice hal_graphics_composer_hwservice hal_health_hwservice hal_health_storage_hwservice hal_input_classifier_hwservice hal_ir_hwservice hal_keymaster_hwservice hal_light_hwservice hal_lowpan_hwservice hal_memtrack_hwservice hal_nfc_hwservice hal_oemlock_hwservice hal_power_hwservice hal_power_stats_hwservice hal_secure_element_hwservice hal_sensors_hwservice hal_telephony_hwservice hal_tetheroffload_hwservice hal_thermal_hwservice hal_tv_cec_hwservice hal_tv_input_hwservice hal_tv_tuner_hwservice hal_usb_gadget_hwservice hal_usb_hwservice hal_vehicle_hwservice hal_vibrator_hwservice hal_vr_hwservice hal_weaver_hwservice hal_wifi_hostapd_hwservice hal_wifi_hwservice hal_wifi_supplicant_hwservice system_net_netd_hwservice system_suspend_hwservice system_wifi_keystore_hwservice fwk_bufferhub_hwservice hal_cas_hwservice hal_codec2_hwservice hal_configstore_ISurfaceFlingerConfigs hal_drm_hwservice hal_graphics_allocator_hwservice hal_graphics_mapper_hwservice hal_neuralnetworks_hwservice hal_omx_hwservice hal_renderscript_hwservice hidl_allocator_hwservice hidl_base_hwservice hidl_manager_hwservice hidl_memory_hwservice hidl_token_hwservice hal_lazy_test_hwservice ))
 (typeattribute same_process_hwservice)
@@ -795,7 +796,7 @@
 (typeattribute vndservice_manager_type)
 (typeattributeset vndservice_manager_type (service_manager_vndservice default_android_vndservice ))
 (typeattribute hal_service_type)
-(typeattributeset hal_service_type (hal_audio_service hal_audiocontrol_service hal_authgraph_service hal_authsecret_service hal_bluetooth_service hal_bootctl_service hal_broadcastradio_service hal_camera_service hal_can_controller_service hal_cas_service hal_codec2_service hal_confirmationui_service hal_contexthub_service hal_drm_service hal_dumpstate_service hal_evs_service hal_face_service hal_fastboot_service hal_fingerprint_service hal_gnss_service hal_graphics_allocator_service hal_graphics_composer_service hal_graphics_mapper_service hal_health_service hal_health_storage_service hal_identity_service hal_input_processor_service hal_ir_service hal_ivn_service hal_keymint_service hal_light_service hal_macsec_service hal_mediaquality_service hal_memtrack_service hal_neuralnetworks_service hal_nfc_service hal_oemlock_service hal_power_service hal_power_stats_service hal_radio_service hal_rebootescrow_service hal_remoteaccess_service hal_remotelyprovisionedcomponent_avf_service hal_remotelyprovisionedcomponent_service hal_sensors_service hal_secretkeeper_service hal_secureclock_service hal_secure_element_service hal_sharedsecret_service hal_system_suspend_service hal_tetheroffload_service hal_thermal_service hal_tv_hdmi_cec_service hal_tv_hdmi_connection_service hal_tv_hdmi_earc_service hal_tv_input_service hal_threadnetwork_service hal_tv_tuner_service hal_usb_service hal_usb_gadget_service hal_uwb_service hal_vehicle_service hal_vibrator_service hal_weaver_service hal_nlinterceptor_service hal_wifi_service hal_wifi_hostapd_service hal_wifi_supplicant_service hal_gatekeeper_service ))
+(typeattributeset hal_service_type (hal_audio_service hal_audiocontrol_service hal_authgraph_service hal_authsecret_service hal_bluetooth_service hal_bootctl_service hal_broadcastradio_service hal_camera_service hal_can_controller_service hal_cas_service hal_codec2_service hal_confirmationui_service hal_contexthub_service hal_drm_service hal_dumpstate_service hal_evs_service hal_face_service hal_fastboot_service hal_fingerprint_service hal_gnss_service hal_graphics_allocator_service hal_graphics_composer_service hal_graphics_mapper_service hal_health_service hal_health_storage_service hal_identity_service hal_input_processor_service hal_ir_service hal_ivn_service hal_keymint_service hal_light_service hal_macsec_service hal_mediaquality_service hal_memtrack_service hal_neuralnetworks_service hal_nfc_service hal_oemlock_service hal_power_service hal_power_stats_service hal_radio_service hal_rebootescrow_service hal_remoteaccess_service hal_remotelyprovisionedcomponent_avf_service hal_remotelyprovisionedcomponent_service hal_sensors_service hal_secretkeeper_service hal_secureclock_service hal_secure_element_service hal_sharedsecret_service hal_system_suspend_service hal_tetheroffload_service hal_thermal_service hal_tv_hdmi_cec_service hal_tv_hdmi_connection_service hal_tv_hdmi_earc_service hal_tv_input_service hal_threadnetwork_service hal_tv_tuner_service hal_usb_service hal_usb_gadget_service hal_uwb_service hal_vehicle_service hal_vibrator_service hal_weaver_service hal_nlinterceptor_service hal_wifi_service hal_wifi_hostapd_service hal_wifi_supplicant_service hal_gatekeeper_service hal_vm_capabilities_service ))
 (typeattribute mlstrustedsubject)
 (typeattributeset mlstrustedsubject (adbd artd bluetooth bufferhubd drmserver dumpstate pdx_display_client_endpoint_socket pdx_display_manager_endpoint_socket pdx_display_screenshot_endpoint_socket pdx_display_vsync_endpoint_socket pdx_performance_client_endpoint_socket pdx_bufferhub_client_endpoint_socket heapprofd hwservicemanager incidentd init installd kernel keystore llkd lmkd logd mdnsd mediadrmserver mediaextractor mediaserver netd network_stack nfc performanced prng_seeder radio rss_hwm_reset runas servicemanager shell simpleperf_app_runner statsd su surfaceflinger system_app system_server tombstoned traced traced_perf traced_probes uncrypt vendor_init vold vold_prepare_subdirs webview_zygote zygote aconfigd aconfigd_mainline cppreopts device_as_webcam otapreopt_slot postinstall_dexopt profcollectd simpleperf_boot storaged virtualizationservice ))
 (typeattribute mlstrustedobject)
@@ -822,7 +823,7 @@
 (typeattribute update_engine_common)
 (typeattributeset update_engine_common (update_engine ))
 (typeattribute coredomain)
-(typeattributeset coredomain (adbd aidl_lazy_test_server apexd app_zygote artd atrace audioserver blkid blkid_untrusted bluetooth bootanim bootstat bpfloader bufferhubd cameraserver charger crash_dump credstore crosvm dhcp dnsmasq drmserver dumpstate e2fs early_virtmgr ephemeral_app evsmanagerd extra_free_kbytes fastbootd fingerprintd flags_health_check fsck fsck_untrusted gatekeeperd gmscore_app gpuservice healthd heapprofd hwservicemanager idmap incident incident_helper incidentd init inputflinger installd isolated_app isolated_compute_app kernel keystore llkd lmkd logd logpersist mdnsd mediadrmserver mediaextractor mediametrics mediaprovider mediaserver mediaswcodec mediatranscoding modprobe netd netutils_wrapper network_stack nfc perfetto performanced platform_app postinstall priv_app prng_seeder profman radio recovery recovery_persist recovery_refresh rkpdapp rs rss_hwm_reset runas runas_app sdcardd secure_element servicemanager sgdisk shared_relro shell simpleperf simpleperf_app_runner slideshow statsd su surfaceflinger system_app system_server tombstoned toolbox traced traced_perf traced_probes traceur_app ueventd uncrypt untrusted_app untrusted_app_32 untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 update_engine update_verifier usbd vdc virtual_touchpad virtualizationmanager vold vold_prepare_subdirs watchdogd webview_zygote wificond zygote aconfigd aconfigd_mainline adbd_tradeinmode apex_test_prepostinstall apexd_derive_classpath art_boot art_exec auditctl automotive_display_service bert_collector blank_screen boringssl_self_test canhalconfigurator clatd compos_fd_server compos_verify composd cppreopts derive_classpath derive_sdk device_as_webcam dex2oat dexopt_chroot_setup dmesgd fuseblkd fuseblkd_untrusted fwk_bufferhub gki_apex_prepostinstall gsid hal_allocator_default hal_keymint_system hidl_lazy_test_server iw kcmdlinectrl linkerconfig linux_vm_setup lpdumpd mediaprovider_app mediatuner migrate_legacy_obb_data misctrl mm_events mmd mtectrl odrefresh odsign ot_ctl ot_daemon otapreopt_chroot otapreopt_slot permissioncontroller_app postinstall_dexopt prefetch preloads_copy preopt2cachename profcollectd remount rkp_cert_processor rkpd sdk_sandbox_34 sdk_sandbox_audit sdk_sandbox_next simpleperf_boot snapshotctl snapuserd stats storaged system_server_startup system_suspend trace_redactor tradeinmode uprobestats vehicle_binding_util vfio_handler virtual_camera virtual_face virtual_fingerprint virtualizationservice vmlauncher_app vmnic wait_for_keymaster wifi_mainline_supplicant ))
+(typeattributeset coredomain (adbd aidl_lazy_test_server apexd app_zygote artd atrace audioserver blkid blkid_untrusted bluetooth bootanim bootstat bpfloader bufferhubd cameraserver charger crash_dump credstore crosvm dhcp dnsmasq drmserver dumpstate e2fs early_virtmgr ephemeral_app evsmanagerd extra_free_kbytes fastbootd fingerprintd flags_health_check fsck fsck_untrusted gatekeeperd gmscore_app gpuservice healthd heapprofd hwservicemanager idmap incident incident_helper incidentd init inputflinger installd isolated_app isolated_compute_app kernel keystore llkd lmkd logd logpersist mdnsd mediadrmserver mediaextractor mediametrics mediaprovider mediaserver mediaswcodec mediatranscoding modprobe netd netutils_wrapper network_stack nfc perfetto performanced platform_app postinstall priv_app prng_seeder profman radio recovery recovery_persist recovery_refresh rkpdapp rs rss_hwm_reset runas runas_app sdcardd secure_element servicemanager sgdisk shared_relro shell simpleperf simpleperf_app_runner slideshow statsd su surfaceflinger system_app system_server tombstoned toolbox traced traced_perf traced_probes traceur_app ueventd uncrypt untrusted_app untrusted_app_32 untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 update_engine update_verifier usbd vdc virtual_camera virtual_touchpad virtualizationmanager vold vold_prepare_subdirs watchdogd webview_zygote wificond zygote aconfigd aconfigd_mainline adbd_tradeinmode apex_test_prepostinstall apexd_derive_classpath art_boot art_exec auditctl automotive_display_service bert_collector blank_screen boringssl_self_test canhalconfigurator clatd compos_fd_server compos_verify composd cppreopts derive_classpath derive_sdk device_as_webcam dex2oat dexopt_chroot_setup dmesgd fuseblkd fuseblkd_untrusted fwk_bufferhub gki_apex_prepostinstall gsid hal_allocator_default hal_keymint_system hidl_lazy_test_server iw kcmdlinectrl linkerconfig linux_vm_setup lpdumpd mediaprovider_app mediatuner microfuchsiad migrate_legacy_obb_data misctrl mm_events mmd mtectrl odrefresh odsign ot_ctl ot_daemon otapreopt_chroot otapreopt_slot permissioncontroller_app postinstall_dexopt prefetch preloads_copy preopt2cachename profcollectd remount rkp_cert_processor rkpd sdk_sandbox_34 sdk_sandbox_audit sdk_sandbox_next simpleperf_boot snapshotctl snapuserd stats storaged system_server_startup system_suspend trace_redactor tradeinmode uprobestats vehicle_binding_util vfio_handler virtual_face virtual_fingerprint virtualizationservice vmlauncher_app vmnic wait_for_keymaster wifi_mainline_supplicant ))
 (typeattribute vendor_hwservice_type)
 (typeattribute coredomain_socket)
 (expandtypeattribute (coredomain_socket) false)
@@ -903,7 +904,7 @@
 (typeattributeset halserverdomain (charger_vendor mediaswcodec hal_allocator_default hal_keymint_system hidl_lazy_test_server virtual_face virtual_fingerprint virtualizationservice ))
 (typeattribute halclientdomain)
 (expandtypeattribute (halclientdomain) true)
-(typeattributeset halclientdomain (adbd atrace audioserver bluetooth bootanim bufferhubd cameraserver charger credstore crosvm dumpstate early_virtmgr evsmanagerd gatekeeperd isolated_compute_app keystore mediadrmserver mediaextractor mediaserver mediaswcodec mediatranscoding network_stack nfc radio rkpdapp secure_element shell statsd su surfaceflinger system_app system_server traced_probes traceur_app update_engine update_verifier usbd virtualizationmanager vold wificond automotive_display_service blank_screen canhalconfigurator fwk_bufferhub mediatuner odsign ot_daemon snapshotctl storaged vehicle_binding_util virtual_camera virtualizationservice ))
+(typeattributeset halclientdomain (adbd atrace audioserver bluetooth bootanim bufferhubd cameraserver charger credstore crosvm dumpstate early_virtmgr evsmanagerd gatekeeperd isolated_compute_app keystore mediadrmserver mediaextractor mediaserver mediaswcodec mediatranscoding network_stack nfc radio rkpdapp secure_element shell statsd su surfaceflinger system_app system_server traced_probes traceur_app update_engine update_verifier usbd virtual_camera virtualizationmanager vold wificond automotive_display_service blank_screen canhalconfigurator fwk_bufferhub mediatuner odsign ot_daemon snapshotctl storaged vehicle_binding_util virtualizationservice ))
 (typeattribute hal_automotive_socket_exemption)
 (typeattribute hal_allocator)
 (expandtypeattribute (hal_allocator) true)
@@ -1090,7 +1091,7 @@
 (expandtypeattribute (hal_graphics_allocator) true)
 (typeattribute hal_graphics_allocator_client)
 (expandtypeattribute (hal_graphics_allocator_client) true)
-(typeattributeset hal_graphics_allocator_client (adbd bootanim bufferhubd cameraserver crosvm dumpstate mediadrmserver mediaserver mediaswcodec mediatranscoding su surfaceflinger system_server automotive_display_service fwk_bufferhub virtual_camera ))
+(typeattributeset hal_graphics_allocator_client (adbd bootanim bufferhubd cameraserver crosvm dumpstate mediadrmserver mediaserver mediaswcodec mediatranscoding su surfaceflinger system_server virtual_camera automotive_display_service fwk_bufferhub ))
 (typeattribute hal_graphics_allocator_server)
 (expandtypeattribute (hal_graphics_allocator_server) false)
 (typeattribute hal_graphics_composer)
@@ -1476,6 +1477,13 @@
 (typeattributeset dalvik_config_prop_type (dalvik_config_prop dalvik_dynamic_config_prop ))
 (typeattribute tee_service_type)
 (typeattributeset tee_service_type (test_pkvm_tee_service ))
+(typeattribute hal_vm_capabilities)
+(expandtypeattribute (hal_vm_capabilities) true)
+(typeattribute hal_vm_capabilities_client)
+(expandtypeattribute (hal_vm_capabilities_client) true)
+(typeattributeset hal_vm_capabilities_client (dumpstate su ))
+(typeattribute hal_vm_capabilities_server)
+(expandtypeattribute (hal_vm_capabilities_server) false)
 (type adbd)
 (roletype object_r adbd)
 (type adbd_exec)
@@ -1940,6 +1948,8 @@
 (roletype object_r sysfs_batteryinfo)
 (type sysfs_bluetooth_writable)
 (roletype object_r sysfs_bluetooth_writable)
+(type sysfs_cma)
+(roletype object_r sysfs_cma)
 (type sysfs_devfreq_cur)
 (roletype object_r sysfs_devfreq_cur)
 (type sysfs_devfreq_dir)
@@ -3577,8 +3587,6 @@
 (roletype object_r adb_service)
 (type adservices_manager_service)
 (roletype object_r adservices_manager_service)
-(type advanced_protection_service)
-(roletype object_r advanced_protection_service)
 (type alarm_service)
 (roletype object_r alarm_service)
 (type app_binding_service)
@@ -3721,8 +3729,6 @@
 (roletype object_r face_service)
 (type fingerprint_service)
 (roletype object_r fingerprint_service)
-(type forensic_service)
-(roletype object_r forensic_service)
 (type fwk_altitude_service)
 (roletype object_r fwk_altitude_service)
 (type fwk_stats_service)
@@ -4153,6 +4159,8 @@
 (roletype object_r hal_wifi_supplicant_service)
 (type hal_gatekeeper_service)
 (roletype object_r hal_gatekeeper_service)
+(type hal_vm_capabilities_service)
+(roletype object_r hal_vm_capabilities_service)
 (type servicemanager)
 (roletype object_r servicemanager)
 (type servicemanager_exec)
@@ -4266,6 +4274,10 @@
 (roletype object_r vendor_shell_exec)
 (type vendor_toolbox_exec)
 (roletype object_r vendor_toolbox_exec)
+(type virtual_camera)
+(roletype object_r virtual_camera)
+(type virtual_camera_exec)
+(roletype object_r virtual_camera_exec)
 (type virtual_touchpad)
 (roletype object_r virtual_touchpad)
 (type virtual_touchpad_exec)
@@ -4715,6 +4727,10 @@
 (roletype object_r mediatuner)
 (type mediatuner_exec)
 (roletype object_r mediatuner_exec)
+(type microfuchsiad)
+(roletype object_r microfuchsiad)
+(type microfuchsiad_exec)
+(roletype object_r microfuchsiad_exec)
 (type migrate_legacy_obb_data)
 (roletype object_r migrate_legacy_obb_data)
 (type migrate_legacy_obb_data_exec)
@@ -5093,6 +5109,8 @@
 (roletype object_r vm_tethering_service)
 (type vmnic_service)
 (roletype object_r vmnic_service)
+(type microfuchsia_service)
+(roletype object_r microfuchsia_service)
 (type uce_service)
 (roletype object_r uce_service)
 (type fwk_vold_service)
@@ -5103,6 +5121,8 @@
 (roletype object_r wifi_mainline_supplicant_service)
 (type dynamic_instrumentation_service)
 (roletype object_r dynamic_instrumentation_service)
+(type advanced_protection_service)
+(roletype object_r advanced_protection_service)
 (type ranging_service)
 (roletype object_r ranging_service)
 (type shared_relro_userfaultfd)
@@ -5199,10 +5219,6 @@
 (roletype object_r vfio_handler)
 (type vfio_handler_exec)
 (roletype object_r vfio_handler_exec)
-(type virtual_camera)
-(roletype object_r virtual_camera)
-(type virtual_camera_exec)
-(roletype object_r virtual_camera_exec)
 (type virtual_face)
 (roletype object_r virtual_face)
 (type virtual_face_exec)
@@ -7399,6 +7415,21 @@
 (neverallow base_typeattr_225 domain (process (fork)))
 ;;* lme
 
+;;* lmx 462 system/sepolicy/public/attributes
+
+(neverallow base_typeattr_226 domain (process (fork)))
+;;* lme
+
+;;* lmx 462 system/sepolicy/public/attributes
+
+(neverallow base_typeattr_227 domain (process (fork)))
+;;* lme
+
+;;* lmx 462 system/sepolicy/public/attributes
+
+(neverallow base_typeattr_228 domain (process (fork)))
+;;* lme
+
 (dontaudit su pdx_display_client_endpoint_socket (unix_stream_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind connectto)))
 (dontaudit su pdx_display_client_channel_socket (unix_stream_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind connectto)))
 (dontaudit su pdx_display_manager_endpoint_socket (unix_stream_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind connectto)))
@@ -7413,577 +7444,577 @@
 (dontaudit su pdx_bufferhub_client_channel_socket (unix_stream_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind connectto)))
 ;;* lmx 6 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 apexd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 apexd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 7 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 bootloader_boot_reason_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 bootloader_boot_reason_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 8 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_activity_manager_native_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_activity_manager_native_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 9 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_boot_count_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_boot_count_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 10 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_input_native_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_input_native_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 11 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_netd_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_netd_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 12 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_reset_performed_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_reset_performed_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 firstboot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 firstboot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 boottime_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 boottime_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 charger_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 charger_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 cold_boot_done_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 cold_boot_done_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_adbd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_adbd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_apexd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_apexd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_bootanim_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_bootanim_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_bugreport_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_bugreport_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_console_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_console_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_dumpstate_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_dumpstate_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_fuse_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_fuse_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_gsid_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_gsid_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_interface_restart_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_interface_restart_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_interface_stop_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_interface_stop_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_mdnsd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_mdnsd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_restart_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_restart_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_rildaemon_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_rildaemon_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ctl_sigstop_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_sigstop_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 dynamic_system_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 dynamic_system_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 heapprofd_enabled_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 heapprofd_enabled_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 llkd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 llkd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 lpdumpd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 lpdumpd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 mmc_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 mmc_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 mock_ota_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 mock_ota_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 net_dns_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 net_dns_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 overlay_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 overlay_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 persistent_properties_ready_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 persistent_properties_ready_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 safemode_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 safemode_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 system_lmk_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 system_lmk_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 system_trace_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 system_trace_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 test_boot_reason_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 test_boot_reason_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 time_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 time_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 traced_enabled_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 traced_enabled_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 traced_lazy_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 traced_lazy_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 53 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 aac_drc_prop (property_service (set)))
+(neverallow base_typeattr_229 aac_drc_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 54 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 adaptive_haptics_prop (property_service (set)))
+(neverallow base_typeattr_229 adaptive_haptics_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 55 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 apex_ready_prop (property_service (set)))
+(neverallow base_typeattr_229 apex_ready_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 56 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 arm64_memtag_prop (property_service (set)))
+(neverallow base_typeattr_229 arm64_memtag_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 57 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 binder_cache_bluetooth_server_prop (property_service (set)))
+(neverallow base_typeattr_229 binder_cache_bluetooth_server_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 58 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 binder_cache_system_server_prop (property_service (set)))
+(neverallow base_typeattr_229 binder_cache_system_server_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 59 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 binder_cache_telephony_server_prop (property_service (set)))
+(neverallow base_typeattr_229 binder_cache_telephony_server_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 60 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 boot_status_prop (property_service (set)))
+(neverallow base_typeattr_229 boot_status_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 61 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 bootanim_system_prop (property_service (set)))
+(neverallow base_typeattr_229 bootanim_system_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 62 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 bootloader_prop (property_service (set)))
+(neverallow base_typeattr_229 bootloader_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 63 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 boottime_public_prop (property_service (set)))
+(neverallow base_typeattr_229 boottime_public_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 64 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 bq_config_prop (property_service (set)))
+(neverallow base_typeattr_229 bq_config_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 65 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 build_bootimage_prop (property_service (set)))
+(neverallow base_typeattr_229 build_bootimage_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 66 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 build_prop (property_service (set)))
+(neverallow base_typeattr_229 build_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 67 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 composd_vm_art_prop (property_service (set)))
+(neverallow base_typeattr_229 composd_vm_art_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 68 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_aconfig_flags_prop (property_service (set)))
+(neverallow base_typeattr_229 device_config_aconfig_flags_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 69 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_camera_native_prop (property_service (set)))
+(neverallow base_typeattr_229 device_config_camera_native_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 70 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_edgetpu_native_prop (property_service (set)))
+(neverallow base_typeattr_229 device_config_edgetpu_native_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 71 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_media_native_prop (property_service (set)))
+(neverallow base_typeattr_229 device_config_media_native_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 72 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_nnapi_native_prop (property_service (set)))
+(neverallow base_typeattr_229 device_config_nnapi_native_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 73 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_runtime_native_boot_prop (property_service (set)))
+(neverallow base_typeattr_229 device_config_runtime_native_boot_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 74 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_runtime_native_prop (property_service (set)))
+(neverallow base_typeattr_229 device_config_runtime_native_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 75 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_surface_flinger_native_boot_prop (property_service (set)))
+(neverallow base_typeattr_229 device_config_surface_flinger_native_boot_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 76 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_vendor_system_native_prop (property_service (set)))
+(neverallow base_typeattr_229 device_config_vendor_system_native_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 77 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_config_vendor_system_native_boot_prop (property_service (set)))
+(neverallow base_typeattr_229 device_config_vendor_system_native_boot_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 78 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 drm_forcel3_prop (property_service (set)))
+(neverallow base_typeattr_229 drm_forcel3_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 79 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 fingerprint_prop (property_service (set)))
+(neverallow base_typeattr_229 fingerprint_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 80 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 gwp_asan_prop (property_service (set)))
+(neverallow base_typeattr_229 gwp_asan_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 81 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 hal_instrumentation_prop (property_service (set)))
+(neverallow base_typeattr_229 hal_instrumentation_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 82 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 userdebug_or_eng_prop (property_service (set)))
+(neverallow base_typeattr_229 userdebug_or_eng_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 83 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 init_service_status_prop (property_service (set)))
+(neverallow base_typeattr_229 init_service_status_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 84 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 libc_debug_prop (property_service (set)))
+(neverallow base_typeattr_229 libc_debug_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 85 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 module_sdkextensions_prop (property_service (set)))
+(neverallow base_typeattr_229 module_sdkextensions_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 86 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 nnapi_ext_deny_product_prop (property_service (set)))
+(neverallow base_typeattr_229 nnapi_ext_deny_product_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 87 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 persist_wm_debug_prop (property_service (set)))
+(neverallow base_typeattr_229 persist_wm_debug_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 88 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 power_debug_prop (property_service (set)))
+(neverallow base_typeattr_229 power_debug_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 89 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 property_service_version_prop (property_service (set)))
+(neverallow base_typeattr_229 property_service_version_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 90 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 provisioned_prop (property_service (set)))
+(neverallow base_typeattr_229 provisioned_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 91 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 restorecon_prop (property_service (set)))
+(neverallow base_typeattr_229 restorecon_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 92 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 retaildemo_prop (property_service (set)))
+(neverallow base_typeattr_229 retaildemo_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 93 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 servicemanager_prop (property_service (set)))
+(neverallow base_typeattr_229 servicemanager_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 94 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 smart_idle_maint_enabled_prop (property_service (set)))
+(neverallow base_typeattr_229 smart_idle_maint_enabled_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 95 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 socket_hook_prop (property_service (set)))
+(neverallow base_typeattr_229 socket_hook_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 96 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 sqlite_log_prop (property_service (set)))
+(neverallow base_typeattr_229 sqlite_log_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 97 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 surfaceflinger_display_prop (property_service (set)))
+(neverallow base_typeattr_229 surfaceflinger_display_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 98 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 system_boot_reason_prop (property_service (set)))
+(neverallow base_typeattr_229 system_boot_reason_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 99 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 system_jvmti_agent_prop (property_service (set)))
+(neverallow base_typeattr_229 system_jvmti_agent_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 100 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 traced_oome_heap_session_count_prop (property_service (set)))
+(neverallow base_typeattr_229 traced_oome_heap_session_count_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 101 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 ab_update_gki_prop (property_service (set)))
+(neverallow base_typeattr_229 ab_update_gki_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 102 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 usb_prop (property_service (set)))
+(neverallow base_typeattr_229 usb_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 103 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 userspace_reboot_exported_prop (property_service (set)))
+(neverallow base_typeattr_229 userspace_reboot_exported_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 104 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 vold_status_prop (property_service (set)))
+(neverallow base_typeattr_229 vold_status_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 105 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 vts_status_prop (property_service (set)))
+(neverallow base_typeattr_229 vts_status_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 107 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 enable_16k_pages_prop (property_service (set)))
+(neverallow base_typeattr_229 enable_16k_pages_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 107 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 profcollectd_etr_prop (property_service (set)))
+(neverallow base_typeattr_229 profcollectd_etr_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 config_prop (property_service (set)))
+(neverallow base_typeattr_229 config_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 cppreopt_prop (property_service (set)))
+(neverallow base_typeattr_229 cppreopt_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 dalvik_prop (property_service (set)))
+(neverallow base_typeattr_229 dalvik_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 debuggerd_prop (property_service (set)))
+(neverallow base_typeattr_229 debuggerd_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 device_logging_prop (property_service (set)))
+(neverallow base_typeattr_229 device_logging_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 dhcp_prop (property_service (set)))
+(neverallow base_typeattr_229 dhcp_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 dumpstate_prop (property_service (set)))
+(neverallow base_typeattr_229 dumpstate_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 exported3_system_prop (property_service (set)))
+(neverallow base_typeattr_229 exported3_system_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 exported_dumpstate_prop (property_service (set)))
+(neverallow base_typeattr_229 exported_dumpstate_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 exported_secure_prop (property_service (set)))
+(neverallow base_typeattr_229 exported_secure_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 heapprofd_prop (property_service (set)))
+(neverallow base_typeattr_229 heapprofd_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 net_radio_prop (property_service (set)))
+(neverallow base_typeattr_229 net_radio_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 pan_result_prop (property_service (set)))
+(neverallow base_typeattr_229 pan_result_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 persist_debug_prop (property_service (set)))
+(neverallow base_typeattr_229 persist_debug_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 shell_prop (property_service (set)))
+(neverallow base_typeattr_229 shell_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 test_harness_prop (property_service (set)))
+(neverallow base_typeattr_229 test_harness_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 theme_prop (property_service (set)))
+(neverallow base_typeattr_229 theme_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 use_memfd_prop (property_service (set)))
+(neverallow base_typeattr_229 use_memfd_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 vold_prop (property_service (set)))
+(neverallow base_typeattr_229 vold_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -7992,7 +8023,7 @@
 (allow vendor_init apexd_config_prop (file (read getattr map open)))
 ;;* lmx 136 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 apexd_config_prop (property_service (set)))
+(neverallow base_typeattr_230 apexd_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8001,7 +8032,7 @@
 (allow vendor_init apexd_select_prop (file (read getattr map open)))
 ;;* lmx 137 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 apexd_select_prop (property_service (set)))
+(neverallow base_typeattr_230 apexd_select_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8010,7 +8041,7 @@
 (allow vendor_init aaudio_config_prop (file (read getattr map open)))
 ;;* lmx 138 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 aaudio_config_prop (property_service (set)))
+(neverallow base_typeattr_230 aaudio_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8019,7 +8050,7 @@
 (allow vendor_init apk_verity_prop (file (read getattr map open)))
 ;;* lmx 139 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 apk_verity_prop (property_service (set)))
+(neverallow base_typeattr_230 apk_verity_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8028,7 +8059,7 @@
 (allow vendor_init audio_config_prop (file (read getattr map open)))
 ;;* lmx 140 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 audio_config_prop (property_service (set)))
+(neverallow base_typeattr_230 audio_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8037,7 +8068,7 @@
 (allow vendor_init bootanim_config_prop (file (read getattr map open)))
 ;;* lmx 141 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 bootanim_config_prop (property_service (set)))
+(neverallow base_typeattr_230 bootanim_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8046,7 +8077,7 @@
 (allow vendor_init bluetooth_config_prop (file (read getattr map open)))
 ;;* lmx 142 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 bluetooth_config_prop (property_service (set)))
+(neverallow base_typeattr_230 bluetooth_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8055,7 +8086,7 @@
 (allow vendor_init build_attestation_prop (file (read getattr map open)))
 ;;* lmx 143 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 build_attestation_prop (property_service (set)))
+(neverallow base_typeattr_230 build_attestation_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8064,7 +8095,7 @@
 (allow vendor_init build_config_prop (file (read getattr map open)))
 ;;* lmx 144 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 build_config_prop (property_service (set)))
+(neverallow base_typeattr_230 build_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8073,7 +8104,7 @@
 (allow vendor_init build_odm_prop (file (read getattr map open)))
 ;;* lmx 145 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 build_odm_prop (property_service (set)))
+(neverallow base_typeattr_230 build_odm_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8082,7 +8113,7 @@
 (allow vendor_init build_vendor_prop (file (read getattr map open)))
 ;;* lmx 146 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 build_vendor_prop (property_service (set)))
+(neverallow base_typeattr_230 build_vendor_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8091,7 +8122,7 @@
 (allow vendor_init camera_calibration_prop (file (read getattr map open)))
 ;;* lmx 147 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 camera_calibration_prop (property_service (set)))
+(neverallow base_typeattr_230 camera_calibration_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8100,7 +8131,7 @@
 (allow vendor_init camera_config_prop (file (read getattr map open)))
 ;;* lmx 148 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 camera_config_prop (property_service (set)))
+(neverallow base_typeattr_230 camera_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8109,7 +8140,7 @@
 (allow vendor_init camera2_extensions_prop (file (read getattr map open)))
 ;;* lmx 149 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 camera2_extensions_prop (property_service (set)))
+(neverallow base_typeattr_230 camera2_extensions_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8118,7 +8149,7 @@
 (allow vendor_init camerax_extensions_prop (file (read getattr map open)))
 ;;* lmx 150 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 camerax_extensions_prop (property_service (set)))
+(neverallow base_typeattr_230 camerax_extensions_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8127,7 +8158,7 @@
 (allow vendor_init charger_config_prop (file (read getattr map open)))
 ;;* lmx 151 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 charger_config_prop (property_service (set)))
+(neverallow base_typeattr_230 charger_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8136,7 +8167,7 @@
 (allow vendor_init codec2_config_prop (file (read getattr map open)))
 ;;* lmx 152 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 codec2_config_prop (property_service (set)))
+(neverallow base_typeattr_230 codec2_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8145,7 +8176,7 @@
 (allow vendor_init composd_vm_vendor_prop (file (read getattr map open)))
 ;;* lmx 153 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 composd_vm_vendor_prop (property_service (set)))
+(neverallow base_typeattr_230 composd_vm_vendor_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8154,7 +8185,7 @@
 (allow vendor_init cpu_variant_prop (file (read getattr map open)))
 ;;* lmx 154 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 cpu_variant_prop (property_service (set)))
+(neverallow base_typeattr_230 cpu_variant_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8163,7 +8194,7 @@
 (allow vendor_init debugfs_restriction_prop (file (read getattr map open)))
 ;;* lmx 155 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 debugfs_restriction_prop (property_service (set)))
+(neverallow base_typeattr_230 debugfs_restriction_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8172,7 +8203,7 @@
 (allow vendor_init drm_service_config_prop (file (read getattr map open)))
 ;;* lmx 156 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 drm_service_config_prop (property_service (set)))
+(neverallow base_typeattr_230 drm_service_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8181,7 +8212,7 @@
 (allow vendor_init exported_camera_prop (file (read getattr map open)))
 ;;* lmx 157 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 exported_camera_prop (property_service (set)))
+(neverallow base_typeattr_230 exported_camera_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8190,7 +8221,7 @@
 (allow vendor_init exported_config_prop (file (read getattr map open)))
 ;;* lmx 158 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 exported_config_prop (property_service (set)))
+(neverallow base_typeattr_230 exported_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8199,7 +8230,7 @@
 (allow vendor_init exported_default_prop (file (read getattr map open)))
 ;;* lmx 159 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 exported_default_prop (property_service (set)))
+(neverallow base_typeattr_230 exported_default_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8208,7 +8239,7 @@
 (allow vendor_init ffs_config_prop (file (read getattr map open)))
 ;;* lmx 160 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 ffs_config_prop (property_service (set)))
+(neverallow base_typeattr_230 ffs_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8217,7 +8248,7 @@
 (allow vendor_init framework_watchdog_config_prop (file (read getattr map open)))
 ;;* lmx 161 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 framework_watchdog_config_prop (property_service (set)))
+(neverallow base_typeattr_230 framework_watchdog_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8226,7 +8257,7 @@
 (allow vendor_init graphics_config_prop (file (read getattr map open)))
 ;;* lmx 162 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 graphics_config_prop (property_service (set)))
+(neverallow base_typeattr_230 graphics_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8235,7 +8266,7 @@
 (allow vendor_init hdmi_config_prop (file (read getattr map open)))
 ;;* lmx 163 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 hdmi_config_prop (property_service (set)))
+(neverallow base_typeattr_230 hdmi_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8244,7 +8275,7 @@
 (allow vendor_init hw_timeout_multiplier_prop (file (read getattr map open)))
 ;;* lmx 164 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 hw_timeout_multiplier_prop (property_service (set)))
+(neverallow base_typeattr_230 hw_timeout_multiplier_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8253,7 +8284,7 @@
 (allow vendor_init hypervisor_prop (file (read getattr map open)))
 ;;* lmx 165 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 hypervisor_prop (property_service (set)))
+(neverallow base_typeattr_230 hypervisor_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8262,7 +8293,7 @@
 (allow vendor_init hypervisor_restricted_prop (file (read getattr map open)))
 ;;* lmx 166 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 hypervisor_restricted_prop (property_service (set)))
+(neverallow base_typeattr_230 hypervisor_restricted_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8271,7 +8302,7 @@
 (allow vendor_init incremental_prop (file (read getattr map open)))
 ;;* lmx 167 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 incremental_prop (property_service (set)))
+(neverallow base_typeattr_230 incremental_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8280,7 +8311,7 @@
 (allow vendor_init input_device_config_prop (file (read getattr map open)))
 ;;* lmx 168 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 input_device_config_prop (property_service (set)))
+(neverallow base_typeattr_230 input_device_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8289,7 +8320,7 @@
 (allow vendor_init keyguard_config_prop (file (read getattr map open)))
 ;;* lmx 169 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 keyguard_config_prop (property_service (set)))
+(neverallow base_typeattr_230 keyguard_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8298,7 +8329,7 @@
 (allow vendor_init keystore_config_prop (file (read getattr map open)))
 ;;* lmx 170 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 keystore_config_prop (property_service (set)))
+(neverallow base_typeattr_230 keystore_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8307,7 +8338,7 @@
 (allow vendor_init lmkd_config_prop (file (read getattr map open)))
 ;;* lmx 171 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 lmkd_config_prop (property_service (set)))
+(neverallow base_typeattr_230 lmkd_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8316,7 +8347,7 @@
 (allow vendor_init media_config_prop (file (read getattr map open)))
 ;;* lmx 172 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 media_config_prop (property_service (set)))
+(neverallow base_typeattr_230 media_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8325,7 +8356,7 @@
 (allow vendor_init media_variant_prop (file (read getattr map open)))
 ;;* lmx 173 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 media_variant_prop (property_service (set)))
+(neverallow base_typeattr_230 media_variant_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8334,7 +8365,7 @@
 (allow vendor_init mediadrm_config_prop (file (read getattr map open)))
 ;;* lmx 174 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 mediadrm_config_prop (property_service (set)))
+(neverallow base_typeattr_230 mediadrm_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8343,7 +8374,7 @@
 (allow vendor_init mm_events_config_prop (file (read getattr map open)))
 ;;* lmx 175 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 mm_events_config_prop (property_service (set)))
+(neverallow base_typeattr_230 mm_events_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8352,7 +8383,7 @@
 (allow vendor_init oem_unlock_prop (file (read getattr map open)))
 ;;* lmx 176 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 oem_unlock_prop (property_service (set)))
+(neverallow base_typeattr_230 oem_unlock_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8361,7 +8392,7 @@
 (allow vendor_init ota_build_prop (file (read getattr map open)))
 ;;* lmx 177 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 ota_build_prop (property_service (set)))
+(neverallow base_typeattr_230 ota_build_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8370,7 +8401,7 @@
 (allow vendor_init packagemanager_config_prop (file (read getattr map open)))
 ;;* lmx 178 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 packagemanager_config_prop (property_service (set)))
+(neverallow base_typeattr_230 packagemanager_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8379,7 +8410,7 @@
 (allow vendor_init quick_start_prop (file (read getattr map open)))
 ;;* lmx 179 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 quick_start_prop (property_service (set)))
+(neverallow base_typeattr_230 quick_start_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8388,7 +8419,7 @@
 (allow vendor_init recovery_config_prop (file (read getattr map open)))
 ;;* lmx 180 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 recovery_config_prop (property_service (set)))
+(neverallow base_typeattr_230 recovery_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8397,7 +8428,7 @@
 (allow vendor_init recovery_usb_config_prop (file (read getattr map open)))
 ;;* lmx 181 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 recovery_usb_config_prop (property_service (set)))
+(neverallow base_typeattr_230 recovery_usb_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8406,7 +8437,7 @@
 (allow vendor_init sendbug_config_prop (file (read getattr map open)))
 ;;* lmx 182 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 sendbug_config_prop (property_service (set)))
+(neverallow base_typeattr_230 sendbug_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8415,7 +8446,7 @@
 (allow vendor_init soc_prop (file (read getattr map open)))
 ;;* lmx 183 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 soc_prop (property_service (set)))
+(neverallow base_typeattr_230 soc_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8424,7 +8455,7 @@
 (allow vendor_init storage_config_prop (file (read getattr map open)))
 ;;* lmx 184 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 storage_config_prop (property_service (set)))
+(neverallow base_typeattr_230 storage_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8433,7 +8464,7 @@
 (allow vendor_init storagemanager_config_prop (file (read getattr map open)))
 ;;* lmx 185 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 storagemanager_config_prop (property_service (set)))
+(neverallow base_typeattr_230 storagemanager_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8442,7 +8473,7 @@
 (allow vendor_init surfaceflinger_prop (file (read getattr map open)))
 ;;* lmx 186 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 surfaceflinger_prop (property_service (set)))
+(neverallow base_typeattr_230 surfaceflinger_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8451,7 +8482,7 @@
 (allow vendor_init suspend_prop (file (read getattr map open)))
 ;;* lmx 187 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 suspend_prop (property_service (set)))
+(neverallow base_typeattr_230 suspend_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8460,7 +8491,7 @@
 (allow vendor_init systemsound_config_prop (file (read getattr map open)))
 ;;* lmx 188 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 systemsound_config_prop (property_service (set)))
+(neverallow base_typeattr_230 systemsound_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8469,7 +8500,7 @@
 (allow vendor_init telephony_config_prop (file (read getattr map open)))
 ;;* lmx 189 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 telephony_config_prop (property_service (set)))
+(neverallow base_typeattr_230 telephony_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8478,7 +8509,7 @@
 (allow vendor_init threadnetwork_config_prop (file (read getattr map open)))
 ;;* lmx 190 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 threadnetwork_config_prop (property_service (set)))
+(neverallow base_typeattr_230 threadnetwork_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8487,7 +8518,7 @@
 (allow vendor_init tombstone_config_prop (file (read getattr map open)))
 ;;* lmx 191 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 tombstone_config_prop (property_service (set)))
+(neverallow base_typeattr_230 tombstone_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8496,7 +8527,7 @@
 (allow vendor_init usb_config_prop (file (read getattr map open)))
 ;;* lmx 192 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 usb_config_prop (property_service (set)))
+(neverallow base_typeattr_230 usb_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8505,7 +8536,7 @@
 (allow vendor_init userspace_reboot_config_prop (file (read getattr map open)))
 ;;* lmx 193 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 userspace_reboot_config_prop (property_service (set)))
+(neverallow base_typeattr_230 userspace_reboot_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8514,7 +8545,7 @@
 (allow vendor_init vehicle_hal_prop (file (read getattr map open)))
 ;;* lmx 194 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 vehicle_hal_prop (property_service (set)))
+(neverallow base_typeattr_230 vehicle_hal_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8523,7 +8554,7 @@
 (allow vendor_init vendor_security_patch_level_prop (file (read getattr map open)))
 ;;* lmx 195 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 vendor_security_patch_level_prop (property_service (set)))
+(neverallow base_typeattr_230 vendor_security_patch_level_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8532,7 +8563,7 @@
 (allow vendor_init vendor_socket_hook_prop (file (read getattr map open)))
 ;;* lmx 196 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 vendor_socket_hook_prop (property_service (set)))
+(neverallow base_typeattr_230 vendor_socket_hook_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8541,7 +8572,7 @@
 (allow vendor_init virtual_ab_prop (file (read getattr map open)))
 ;;* lmx 197 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 virtual_ab_prop (property_service (set)))
+(neverallow base_typeattr_230 virtual_ab_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8550,7 +8581,7 @@
 (allow vendor_init vndk_prop (file (read getattr map open)))
 ;;* lmx 198 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 vndk_prop (property_service (set)))
+(neverallow base_typeattr_230 vndk_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8559,7 +8590,7 @@
 (allow vendor_init vts_config_prop (file (read getattr map open)))
 ;;* lmx 199 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 vts_config_prop (property_service (set)))
+(neverallow base_typeattr_230 vts_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8568,7 +8599,7 @@
 (allow vendor_init vold_config_prop (file (read getattr map open)))
 ;;* lmx 200 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 vold_config_prop (property_service (set)))
+(neverallow base_typeattr_230 vold_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8577,7 +8608,7 @@
 (allow vendor_init wifi_config_prop (file (read getattr map open)))
 ;;* lmx 201 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 wifi_config_prop (property_service (set)))
+(neverallow base_typeattr_230 wifi_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8586,7 +8617,7 @@
 (allow vendor_init zram_config_prop (file (read getattr map open)))
 ;;* lmx 202 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 zram_config_prop (property_service (set)))
+(neverallow base_typeattr_230 zram_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8595,7 +8626,7 @@
 (allow vendor_init zygote_config_prop (file (read getattr map open)))
 ;;* lmx 203 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 zygote_config_prop (property_service (set)))
+(neverallow base_typeattr_230 zygote_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8604,7 +8635,7 @@
 (allow vendor_init dck_prop (file (read getattr map open)))
 ;;* lmx 204 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 dck_prop (property_service (set)))
+(neverallow base_typeattr_230 dck_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8613,7 +8644,7 @@
 (allow vendor_init tuner_config_prop (file (read getattr map open)))
 ;;* lmx 205 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 tuner_config_prop (property_service (set)))
+(neverallow base_typeattr_230 tuner_config_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8622,7 +8653,7 @@
 (allow vendor_init usb_uvc_enabled_prop (file (read getattr map open)))
 ;;* lmx 206 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 usb_uvc_enabled_prop (property_service (set)))
+(neverallow base_typeattr_230 usb_uvc_enabled_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8631,7 +8662,7 @@
 (allow vendor_init setupwizard_mode_prop (file (read getattr map open)))
 ;;* lmx 207 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 setupwizard_mode_prop (property_service (set)))
+(neverallow base_typeattr_230 setupwizard_mode_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8640,7 +8671,7 @@
 (allow vendor_init pm_archiving_enabled_prop (file (read getattr map open)))
 ;;* lmx 208 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 pm_archiving_enabled_prop (property_service (set)))
+(neverallow base_typeattr_230 pm_archiving_enabled_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -8649,47 +8680,47 @@
 (allow vendor_init trusty_security_vm_sys_vendor_prop (file (read getattr map open)))
 ;;* lmx 209 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_227 trusty_security_vm_sys_vendor_prop (property_service (set)))
+(neverallow base_typeattr_230 trusty_security_vm_sys_vendor_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 276 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_226 default_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 default_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 279 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_228 rebootescrow_hal_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_231 rebootescrow_hal_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 282 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_228 virtual_face_hal_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_231 virtual_face_hal_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 288 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_228 virtual_fingerprint_hal_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_231 virtual_fingerprint_hal_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 358 system/sepolicy/public/property.te
 
-(neverallow base_typeattr_228 vendor_default_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_231 vendor_default_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1 system/sepolicy/private/attributes
 
-(neverallow base_typeattr_229 domain (process (fork)))
+(neverallow base_typeattr_232 domain (process (fork)))
 ;;* lme
 
 ;;* lmx 1 system/sepolicy/private/attributes
 
-(neverallow base_typeattr_230 domain (process (fork)))
+(neverallow base_typeattr_233 domain (process (fork)))
 ;;* lme
 
 ;;* lmx 1 system/sepolicy/private/attributes
 
-(neverallow base_typeattr_231 domain (process (fork)))
+(neverallow base_typeattr_234 domain (process (fork)))
 ;;* lme
 
 (allow init aconfigd_exec (file (read getattr map execute open)))
@@ -8711,32 +8742,32 @@
 (dontaudit aconfigd apex_info_file (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lmx 37 system/sepolicy/private/aconfigd.te
 
-(neverallow base_typeattr_232 aconfigd (process (transition)))
+(neverallow base_typeattr_235 aconfigd (process (transition)))
 ;;* lme
 
 ;;* lmx 38 system/sepolicy/private/aconfigd.te
 
-(neverallow base_typeattr_233 aconfigd (process (dyntransition)))
+(neverallow base_typeattr_236 aconfigd (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 48 system/sepolicy/private/aconfigd.te
 
-(neverallow base_typeattr_234 aconfig_storage_metadata_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_237 aconfig_storage_metadata_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 54 system/sepolicy/private/aconfigd.te
 
-(neverallow base_typeattr_234 aconfig_storage_metadata_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_237 aconfig_storage_metadata_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 64 system/sepolicy/private/aconfigd.te
 
-(neverallow base_typeattr_234 aconfig_storage_flags_metadata_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_237 aconfig_storage_flags_metadata_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 70 system/sepolicy/private/aconfigd.te
 
-(neverallow base_typeattr_234 aconfig_storage_flags_metadata_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_237 aconfig_storage_flags_metadata_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow init aconfigd_mainline_exec (file (read getattr map execute open)))
@@ -8756,12 +8787,12 @@
 (dontaudit aconfigd_mainline apex_info_file (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lmx 37 system/sepolicy/private/aconfigd_mainline.te
 
-(neverallow base_typeattr_232 aconfigd_mainline (process (transition)))
+(neverallow base_typeattr_235 aconfigd_mainline (process (transition)))
 ;;* lme
 
 ;;* lmx 38 system/sepolicy/private/aconfigd_mainline.te
 
-(neverallow base_typeattr_233 aconfigd_mainline (process (dyntransition)))
+(neverallow base_typeattr_236 aconfigd_mainline (process (dyntransition)))
 ;;* lme
 
 (allow init adbd_exec (file (read getattr map execute open)))
@@ -8902,22 +8933,22 @@
 (allow adbd shell_test_data_file (lnk_file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
 ;;* lmx 220 system/sepolicy/private/adbd.te
 
-(neverallow adbd base_typeattr_235 (process (transition)))
+(neverallow adbd base_typeattr_238 (process (transition)))
 ;;* lme
 
 ;;* lmx 226 system/sepolicy/private/adbd.te
 
-(neverallow adbd base_typeattr_236 (process (dyntransition)))
+(neverallow adbd base_typeattr_239 (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 229 system/sepolicy/private/adbd.te
 
-(neverallow base_typeattr_232 adbd (process (transition)))
+(neverallow base_typeattr_235 adbd (process (transition)))
 ;;* lme
 
 ;;* lmx 230 system/sepolicy/private/adbd.te
 
-(neverallow base_typeattr_233 adbd (process (dyntransition)))
+(neverallow base_typeattr_236 adbd (process (dyntransition)))
 ;;* lme
 
 (allow adbd_common mdnsd_socket (sock_file (write)))
@@ -8974,7 +9005,7 @@
 (allow aidl_lazy_test_server aidl_lazy_test_service (service_manager (add find)))
 ;;* lmx 1 system/sepolicy/private/aidl_lazy_test_server.te
 
-(neverallow base_typeattr_237 aidl_lazy_test_service (service_manager (add)))
+(neverallow base_typeattr_240 aidl_lazy_test_service (service_manager (add)))
 ;;* lme
 
 (allow aidl_lazy_test_server su (tcp_socket (read write accept getopt)))
@@ -8984,7 +9015,7 @@
 (allowx apex_test_prepostinstall apex_test_prepostinstall_devpts (ioctl chr_file ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
 ;;* lmx 9 system/sepolicy/private/apex_test_prepostinstall.te
 
-(neverallowx base_typeattr_233 apex_test_prepostinstall_devpts (ioctl chr_file (0x5412)))
+(neverallowx base_typeattr_236 apex_test_prepostinstall_devpts (ioctl chr_file (0x5412)))
 ;;* lme
 
 (allow apex_test_prepostinstall shell_exec (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
@@ -9001,7 +9032,7 @@
 (allow apexd apex_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_238 apex_service (service_manager (add)))
+(neverallow base_typeattr_241 apex_service (service_manager (add)))
 ;;* lme
 
 (allow apexd su (tcp_socket (read write accept getopt)))
@@ -9085,7 +9116,7 @@
 (allowx apexd apexd_devpts (ioctl chr_file ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
 ;;* lmx 146 system/sepolicy/private/apexd.te
 
-(neverallowx base_typeattr_233 apexd_devpts (ioctl chr_file (0x5412)))
+(neverallowx base_typeattr_236 apexd_devpts (ioctl chr_file (0x5412)))
 ;;* lme
 
 (allow apexd file_contexts_file (file (ioctl read getattr lock map open watch watch_reads)))
@@ -9125,93 +9156,93 @@
 (allow apexd system_server (fd (use)))
 ;;* lmx 202 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_239 apex_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_242 apex_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 203 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_239 apex_metadata_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_242 apex_metadata_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 204 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_240 apex_data_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_243 apex_data_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 205 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_240 apex_metadata_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_243 apex_metadata_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 206 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_238 apex_mnt_dir (lnk_file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_241 apex_mnt_dir (lnk_file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 208 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_241 apex_module_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_244 apex_module_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 209 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_241 apex_module_data_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_244 apex_module_data_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 211 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_241 apex_rollback_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_244 apex_rollback_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 212 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_241 apex_rollback_data_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_244 apex_rollback_data_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 215 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_239 apexd_prop (property_service (set)))
+(neverallow base_typeattr_242 apexd_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 218 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_238 apex_info_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_241 apex_info_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 226 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_242 apex_mnt_dir (filesystem (mount unmount)))
+(neverallow base_typeattr_245 apex_mnt_dir (filesystem (mount unmount)))
 ;;* lme
 
 ;;* lmx 227 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_243 apex_mnt_dir (dir (mounton)))
+(neverallow base_typeattr_246 apex_mnt_dir (dir (mounton)))
 ;;* lme
 
 ;;* lmx 232 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_244 apex_service (service_manager (find)))
+(neverallow base_typeattr_247 apex_service (service_manager (find)))
 ;;* lme
 
 ;;* lmx 234 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_245 apexd (binder (call)))
+(neverallow base_typeattr_248 apexd (binder (call)))
 ;;* lme
 
 ;;* lmx 236 system/sepolicy/private/apexd.te
 
-(neverallow base_typeattr_246 apexd (process (ptrace)))
+(neverallow base_typeattr_249 apexd (process (ptrace)))
 ;;* lme
 
 (allow apexd_derive_classpath apexd (fd (use)))
 (allow apexd_derive_classpath apex_mnt_dir (file (write open)))
 (allow apexd_derive_classpath apexd_devpts (chr_file (read write)))
-(allow base_typeattr_247 proc_net_type (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_247 proc_net_type (file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_247 proc_net_type (lnk_file (ioctl read getattr lock map open watch watch_reads)))
-(auditallow base_typeattr_248 proc_net_type (file (read getattr open)))
-(auditallow base_typeattr_248 proc_net_type (dir (read getattr open)))
-(auditallow base_typeattr_248 proc_net_type (lnk_file (read getattr open)))
+(allow base_typeattr_250 proc_net_type (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_250 proc_net_type (file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_250 proc_net_type (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(auditallow base_typeattr_251 proc_net_type (file (read getattr open)))
+(auditallow base_typeattr_251 proc_net_type (dir (read getattr open)))
+(auditallow base_typeattr_251 proc_net_type (lnk_file (read getattr open)))
 (allow appdomain test_harness_prop (file (read getattr map open)))
 (allow appdomain boot_status_prop (file (read getattr map open)))
 (allow appdomain dalvik_config_prop_type (file (read getattr map open)))
@@ -9234,7 +9265,7 @@
 (dontaudit appdomain storage_stub_file (dir (getattr)))
 (dontaudit appdomain system_data_file (dir (write)))
 (dontaudit appdomain vendor_default_prop (file (read)))
-(allow base_typeattr_249 mnt_media_rw_file (dir (search)))
+(allow base_typeattr_252 mnt_media_rw_file (dir (search)))
 (allow appdomain system_server (udp_socket (read write getattr connect getopt setopt recvfrom sendto)))
 (allow appdomain sendbug_config_prop (file (read getattr map open)))
 (allow appdomain graphics_config_prop (file (read getattr map open)))
@@ -9247,83 +9278,83 @@
 (allow appdomain apex_art_data_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow appdomain apex_art_data_file (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
 (allow appdomain tombstone_data_file (file (read getattr)))
-(allow base_typeattr_250 shell_exec (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
-(allow base_typeattr_250 toolbox_exec (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
-(allow base_typeattr_250 vendor_app_file (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_250 vendor_app_file (file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_250 vendor_app_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_250 vendor_app_file (file (execute)))
-(allow base_typeattr_251 vendor_microdroid_file (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_251 vendor_microdroid_file (file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_251 vendor_microdroid_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_253 shell_exec (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
+(allow base_typeattr_253 toolbox_exec (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
+(allow base_typeattr_253 vendor_app_file (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_253 vendor_app_file (file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_253 vendor_app_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_253 vendor_app_file (file (execute)))
+(allow base_typeattr_254 vendor_microdroid_file (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_254 vendor_microdroid_file (file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_254 vendor_microdroid_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow appdomain sdk_sandbox_all (binder (call transfer)))
 (allow sdk_sandbox_all appdomain (binder (transfer)))
 (allow appdomain sdk_sandbox_all (fd (use)))
 (allow appdomain virtual_camera (binder (call transfer)))
 (allow virtual_camera appdomain (binder (transfer)))
 (allow appdomain virtual_camera (fd (use)))
-(allow base_typeattr_251 storage_file (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_251 storage_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_251 mnt_user_file (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_251 mnt_user_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_251 sdcard_type (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
-(allow base_typeattr_251 fuse (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
-(allow base_typeattr_251 sdcard_type (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
-(allow base_typeattr_251 fuse (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
-(allow base_typeattr_251 media_rw_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
-(allow base_typeattr_251 media_rw_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
-(allow base_typeattr_251 usb_device (chr_file (ioctl read write getattr)))
-(allow base_typeattr_251 usbaccessory_device (chr_file (read write getattr)))
-(allow base_typeattr_250 logd_socket (sock_file (write)))
-(allow base_typeattr_250 logd (unix_stream_socket (connectto)))
-(allow base_typeattr_251 keystore (keystore2_key (delete get_info grant rebind update use)))
-(allow base_typeattr_251 keystore_maintenance_service (service_manager (find)))
-(allow base_typeattr_251 apc_service (service_manager (find)))
-(allow base_typeattr_251 keystore_service (service_manager (find)))
-(allow base_typeattr_251 legacykeystore_service (service_manager (find)))
-(allow base_typeattr_251 keystore (binder (call transfer)))
-(allow keystore base_typeattr_251 (binder (transfer)))
-(allow base_typeattr_251 keystore (fd (use)))
-(allow keystore base_typeattr_251 (binder (call transfer)))
-(allow base_typeattr_251 keystore (binder (transfer)))
-(allow keystore base_typeattr_251 (fd (use)))
-(allow base_typeattr_251 credstore_service (service_manager (find)))
-(allow base_typeattr_251 credstore (binder (call transfer)))
-(allow credstore base_typeattr_251 (binder (transfer)))
-(allow base_typeattr_251 credstore (fd (use)))
-(allow credstore base_typeattr_251 (binder (call transfer)))
-(allow base_typeattr_251 credstore (binder (transfer)))
-(allow credstore base_typeattr_251 (fd (use)))
-(allow base_typeattr_251 persistent_data_block_service (service_manager (find)))
-(allow base_typeattr_251 pdx_display_client_endpoint_dir_type (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_251 pdx_display_client_endpoint_socket_type (sock_file (ioctl read write getattr lock append map open watch watch_reads)))
-(allow base_typeattr_251 pdx_display_client_endpoint_socket_type (unix_stream_socket (read write shutdown connectto)))
-(allow base_typeattr_251 pdx_display_client_channel_socket_type (unix_stream_socket (read write getattr setattr lock append getopt setopt shutdown)))
-(allow base_typeattr_251 pdx_display_client_server_type (fd (use)))
-(allow pdx_display_client_server_type base_typeattr_251 (fd (use)))
-(allow base_typeattr_251 pdx_display_manager_endpoint_dir_type (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_251 pdx_display_manager_endpoint_socket_type (sock_file (ioctl read write getattr lock append map open watch watch_reads)))
-(allow base_typeattr_251 pdx_display_manager_endpoint_socket_type (unix_stream_socket (read write shutdown connectto)))
-(allow base_typeattr_251 pdx_display_manager_channel_socket_type (unix_stream_socket (read write getattr setattr lock append getopt setopt shutdown)))
-(allow base_typeattr_251 pdx_display_manager_server_type (fd (use)))
-(allow pdx_display_manager_server_type base_typeattr_251 (fd (use)))
-(allow base_typeattr_251 pdx_display_vsync_endpoint_dir_type (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_251 pdx_display_vsync_endpoint_socket_type (sock_file (ioctl read write getattr lock append map open watch watch_reads)))
-(allow base_typeattr_251 pdx_display_vsync_endpoint_socket_type (unix_stream_socket (read write shutdown connectto)))
-(allow base_typeattr_251 pdx_display_vsync_channel_socket_type (unix_stream_socket (read write getattr setattr lock append getopt setopt shutdown)))
-(allow base_typeattr_251 pdx_display_vsync_server_type (fd (use)))
-(allow pdx_display_vsync_server_type base_typeattr_251 (fd (use)))
-(allow base_typeattr_251 pdx_performance_client_endpoint_dir_type (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_251 pdx_performance_client_endpoint_socket_type (sock_file (ioctl read write getattr lock append map open watch watch_reads)))
-(allow base_typeattr_251 pdx_performance_client_endpoint_socket_type (unix_stream_socket (read write shutdown connectto)))
-(allow base_typeattr_251 pdx_performance_client_channel_socket_type (unix_stream_socket (read write getattr setattr lock append getopt setopt shutdown)))
-(allow base_typeattr_251 pdx_performance_client_server_type (fd (use)))
-(allow pdx_performance_client_server_type base_typeattr_251 (fd (use)))
-(allow base_typeattr_251 pdx_bufferhub_client_channel_socket_type (unix_stream_socket (read write getattr setattr lock append getopt setopt shutdown)))
-(allow base_typeattr_251 pdx_bufferhub_client_server_type (fd (use)))
-(allow pdx_bufferhub_client_server_type base_typeattr_251 (fd (use)))
-(allow base_typeattr_251 tun_device (chr_file (ioctl read write getattr append)))
-(allowx base_typeattr_251 tun_device (ioctl chr_file (0x54d2)))
+(allow base_typeattr_254 storage_file (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_254 storage_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_254 mnt_user_file (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_254 mnt_user_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_254 sdcard_type (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
+(allow base_typeattr_254 fuse (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
+(allow base_typeattr_254 sdcard_type (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(allow base_typeattr_254 fuse (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(allow base_typeattr_254 media_rw_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
+(allow base_typeattr_254 media_rw_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(allow base_typeattr_254 usb_device (chr_file (ioctl read write getattr)))
+(allow base_typeattr_254 usbaccessory_device (chr_file (read write getattr)))
+(allow base_typeattr_253 logd_socket (sock_file (write)))
+(allow base_typeattr_253 logd (unix_stream_socket (connectto)))
+(allow base_typeattr_254 keystore (keystore2_key (delete get_info grant rebind update use)))
+(allow base_typeattr_254 keystore_maintenance_service (service_manager (find)))
+(allow base_typeattr_254 apc_service (service_manager (find)))
+(allow base_typeattr_254 keystore_service (service_manager (find)))
+(allow base_typeattr_254 legacykeystore_service (service_manager (find)))
+(allow base_typeattr_254 keystore (binder (call transfer)))
+(allow keystore base_typeattr_254 (binder (transfer)))
+(allow base_typeattr_254 keystore (fd (use)))
+(allow keystore base_typeattr_254 (binder (call transfer)))
+(allow base_typeattr_254 keystore (binder (transfer)))
+(allow keystore base_typeattr_254 (fd (use)))
+(allow base_typeattr_254 credstore_service (service_manager (find)))
+(allow base_typeattr_254 credstore (binder (call transfer)))
+(allow credstore base_typeattr_254 (binder (transfer)))
+(allow base_typeattr_254 credstore (fd (use)))
+(allow credstore base_typeattr_254 (binder (call transfer)))
+(allow base_typeattr_254 credstore (binder (transfer)))
+(allow credstore base_typeattr_254 (fd (use)))
+(allow base_typeattr_254 persistent_data_block_service (service_manager (find)))
+(allow base_typeattr_254 pdx_display_client_endpoint_dir_type (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_254 pdx_display_client_endpoint_socket_type (sock_file (ioctl read write getattr lock append map open watch watch_reads)))
+(allow base_typeattr_254 pdx_display_client_endpoint_socket_type (unix_stream_socket (read write shutdown connectto)))
+(allow base_typeattr_254 pdx_display_client_channel_socket_type (unix_stream_socket (read write getattr setattr lock append getopt setopt shutdown)))
+(allow base_typeattr_254 pdx_display_client_server_type (fd (use)))
+(allow pdx_display_client_server_type base_typeattr_254 (fd (use)))
+(allow base_typeattr_254 pdx_display_manager_endpoint_dir_type (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_254 pdx_display_manager_endpoint_socket_type (sock_file (ioctl read write getattr lock append map open watch watch_reads)))
+(allow base_typeattr_254 pdx_display_manager_endpoint_socket_type (unix_stream_socket (read write shutdown connectto)))
+(allow base_typeattr_254 pdx_display_manager_channel_socket_type (unix_stream_socket (read write getattr setattr lock append getopt setopt shutdown)))
+(allow base_typeattr_254 pdx_display_manager_server_type (fd (use)))
+(allow pdx_display_manager_server_type base_typeattr_254 (fd (use)))
+(allow base_typeattr_254 pdx_display_vsync_endpoint_dir_type (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_254 pdx_display_vsync_endpoint_socket_type (sock_file (ioctl read write getattr lock append map open watch watch_reads)))
+(allow base_typeattr_254 pdx_display_vsync_endpoint_socket_type (unix_stream_socket (read write shutdown connectto)))
+(allow base_typeattr_254 pdx_display_vsync_channel_socket_type (unix_stream_socket (read write getattr setattr lock append getopt setopt shutdown)))
+(allow base_typeattr_254 pdx_display_vsync_server_type (fd (use)))
+(allow pdx_display_vsync_server_type base_typeattr_254 (fd (use)))
+(allow base_typeattr_254 pdx_performance_client_endpoint_dir_type (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_254 pdx_performance_client_endpoint_socket_type (sock_file (ioctl read write getattr lock append map open watch watch_reads)))
+(allow base_typeattr_254 pdx_performance_client_endpoint_socket_type (unix_stream_socket (read write shutdown connectto)))
+(allow base_typeattr_254 pdx_performance_client_channel_socket_type (unix_stream_socket (read write getattr setattr lock append getopt setopt shutdown)))
+(allow base_typeattr_254 pdx_performance_client_server_type (fd (use)))
+(allow pdx_performance_client_server_type base_typeattr_254 (fd (use)))
+(allow base_typeattr_254 pdx_bufferhub_client_channel_socket_type (unix_stream_socket (read write getattr setattr lock append getopt setopt shutdown)))
+(allow base_typeattr_254 pdx_bufferhub_client_server_type (fd (use)))
+(allow pdx_bufferhub_client_server_type base_typeattr_254 (fd (use)))
+(allow base_typeattr_254 tun_device (chr_file (ioctl read write getattr append)))
+(allowx base_typeattr_254 tun_device (ioctl chr_file (0x54d2)))
 (allow appdomain self (process (execmem)))
 (allow appdomain ashmem_device (chr_file (execute)))
 (allow appdomain ashmem_libcutils_device (chr_file (execute)))
@@ -9333,9 +9364,9 @@
 (allow appdomain zygote (process (sigchld)))
 (allow appdomain dalvikcache_data_file (dir (getattr search)))
 (allow appdomain dalvikcache_data_file (file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_252 rootfs (lnk_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_252 tmpfs (lnk_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_249 tmpfs (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_255 rootfs (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_255 tmpfs (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_252 tmpfs (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow appdomain zygote (fifo_file (write)))
 (allow appdomain method_trace_data_file (dir (write lock open add_name remove_name search)))
 (allow appdomain method_trace_data_file (file (write create lock append map open)))
@@ -9349,15 +9380,21 @@
 (allow appdomain vold (fd (use)))
 (allow appdomain appdomain (fifo_file (ioctl read write getattr lock append map open watch watch_reads)))
 (allow appdomain surfaceflinger (unix_stream_socket (read write getattr getopt setopt shutdown)))
-(allow base_typeattr_253 app_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
-(allow base_typeattr_253 privapp_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
-(allow base_typeattr_253 app_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
-(allow base_typeattr_253 privapp_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
-(allowx base_typeattr_253 app_data_file (ioctl file (0x6686)))
-(allowx base_typeattr_253 privapp_data_file (ioctl file (0x6686)))
-(allow base_typeattr_252 app_data_file (file (read write getattr map)))
-(allow base_typeattr_252 privapp_data_file (file (read write getattr map)))
-(allow base_typeattr_252 system_app_data_file (file (read write getattr map)))
+(allow base_typeattr_256 app_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
+(allow base_typeattr_256 privapp_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
+(allow base_typeattr_256 storage_area_content_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
+(allow base_typeattr_256 app_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(allow base_typeattr_256 privapp_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(allow base_typeattr_256 storage_area_content_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(allow base_typeattr_256 storage_area_app_dir (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_256 storage_area_dir (dir (ioctl read write getattr lock open watch watch_reads add_name remove_name search)))
+(allowx base_typeattr_256 app_data_file (ioctl file (0x6686)))
+(allowx base_typeattr_256 privapp_data_file (ioctl file (0x6686)))
+(allowx base_typeattr_256 storage_area_content_file (ioctl file (0x6686)))
+(allow base_typeattr_255 app_data_file (file (read write getattr map)))
+(allow base_typeattr_255 privapp_data_file (file (read write getattr map)))
+(allow base_typeattr_255 system_app_data_file (file (read write getattr map)))
+(allow base_typeattr_255 storage_area_content_file (file (read write getattr map)))
 (allow appdomain sdk_sandbox_data_file (file (read getattr)))
 (allow appdomain mnt_expand_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow appdomain keychain_data_file (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -9365,15 +9402,15 @@
 (allow appdomain keychain_data_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow appdomain misc_user_data_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow appdomain misc_user_data_file (file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_254 textclassifier_data_file (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_254 textclassifier_data_file (file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_254 textclassifier_data_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_257 textclassifier_data_file (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_257 textclassifier_data_file (file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_257 textclassifier_data_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow appdomain oemfs (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow appdomain oemfs (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
 (allow appdomain system_file (file (getattr map execute execute_no_trans)))
 (allow appdomain system_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow appdomain system_file (lnk_file (read getattr open)))
-(allow base_typeattr_254 vendor_file (dir (read open)))
+(allow base_typeattr_257 vendor_file (dir (read open)))
 (allow appdomain vendor_overlay_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow appdomain vendor_overlay_file (file (ioctl read getattr lock map open watch watch_reads)))
 (allow appdomain vendor_overlay_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
@@ -9412,9 +9449,9 @@
 (allow appdomain traced (unix_stream_socket (connectto)))
 (allow traced appdomain (fd (use)))
 (allow appdomain heapdump_data_file (file (append)))
-(allow base_typeattr_254 gpu_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
-(allow base_typeattr_254 gpu_device (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_254 sysfs_gpu (file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_257 gpu_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
+(allow base_typeattr_257 gpu_device (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_257 sysfs_gpu (file (ioctl read getattr lock map open watch watch_reads)))
 (allow appdomain servicemanager (binder (call transfer)))
 (allow servicemanager appdomain (binder (call transfer)))
 (allow appdomain binderservicedomain (binder (call transfer)))
@@ -9426,9 +9463,9 @@
 (allow appdomain ephemeral_app (binder (call transfer)))
 (allow ephemeral_app appdomain (binder (transfer)))
 (allow appdomain ephemeral_app (fd (use)))
-(allow base_typeattr_254 gpuservice (binder (call transfer)))
-(allow gpuservice base_typeattr_254 (binder (transfer)))
-(allow base_typeattr_254 gpuservice (fd (use)))
+(allow base_typeattr_257 gpuservice (binder (call transfer)))
+(allow gpuservice base_typeattr_257 (binder (transfer)))
+(allow base_typeattr_257 gpuservice (fd (use)))
 (allow appdomain hal_graphics_composer (fd (use)))
 (allow appdomain appdomain (unix_stream_socket (read write getattr getopt shutdown)))
 (allow appdomain backup_data_file (file (read write getattr map)))
@@ -9436,8 +9473,8 @@
 (allow appdomain cache_backup_file (dir (getattr)))
 (allow appdomain system_data_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow appdomain system_data_file (file (read getattr map)))
-(allow base_typeattr_252 media_rw_data_file (file (read getattr)))
-(allow base_typeattr_254 radio_data_file (file (read write getattr)))
+(allow base_typeattr_255 media_rw_data_file (file (read getattr)))
+(allow base_typeattr_257 radio_data_file (file (read write getattr)))
 (allow appdomain dalvikcache_data_file (file (execute)))
 (allow appdomain dalvikcache_data_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow appdomain shared_relro_file (dir (search)))
@@ -9451,23 +9488,23 @@
 (allow appdomain logd (unix_stream_socket (connectto)))
 (allow appdomain zygote (unix_dgram_socket (write)))
 (allow appdomain console_device (chr_file (read write)))
-(allowx base_typeattr_255 self (ioctl tcp_socket ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
-(allowx base_typeattr_255 self (ioctl udp_socket ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
-(allowx base_typeattr_255 self (ioctl rawip_socket ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
-(allowx base_typeattr_255 self (ioctl tcp_socket ((range 0x8906 0x8907) 0x8910 (range 0x8912 0x8913) 0x8915 0x8917 0x8919 0x891b 0x8921 0x8933 0x8938 0x8942)))
-(allowx base_typeattr_255 self (ioctl udp_socket ((range 0x8906 0x8907) 0x8910 (range 0x8912 0x8913) 0x8915 0x8917 0x8919 0x891b 0x8921 0x8933 0x8938 0x8942)))
-(allowx base_typeattr_255 self (ioctl rawip_socket ((range 0x8906 0x8907) 0x8910 (range 0x8912 0x8913) 0x8915 0x8917 0x8919 0x891b 0x8921 0x8933 0x8938 0x8942)))
-(allowx base_typeattr_255 self (ioctl tcp_socket (0x8b01 0x8b05 0x8b07 0x8b09 0x8b0b 0x8b0d 0x8b0f (range 0x8b11 0x8b13) 0x8b21 0x8b23 0x8b25 0x8b27 0x8b29 0x8b2d)))
-(allowx base_typeattr_255 self (ioctl udp_socket (0x8b01 0x8b05 0x8b07 0x8b09 0x8b0b 0x8b0d 0x8b0f (range 0x8b11 0x8b13) 0x8b21 0x8b23 0x8b25 0x8b27 0x8b29 0x8b2d)))
-(allowx base_typeattr_255 self (ioctl rawip_socket (0x8b01 0x8b05 0x8b07 0x8b09 0x8b0b 0x8b0d 0x8b0f (range 0x8b11 0x8b13) 0x8b21 0x8b23 0x8b25 0x8b27 0x8b29 0x8b2d)))
-(allow base_typeattr_254 ion_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_254 dmabuf_system_heap_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_254 dmabuf_system_secure_heap_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_254 hal_audio (fd (use)))
-(allow base_typeattr_254 hal_camera (fd (use)))
-(allow base_typeattr_254 hal_tv_tuner_server (fd (use)))
-(allow base_typeattr_254 hal_power_server (fd (use)))
-(allow base_typeattr_254 hal_renderscript_hwservice (hwservice_manager (find)))
+(allowx base_typeattr_258 self (ioctl tcp_socket ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
+(allowx base_typeattr_258 self (ioctl udp_socket ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
+(allowx base_typeattr_258 self (ioctl rawip_socket ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
+(allowx base_typeattr_258 self (ioctl tcp_socket ((range 0x8906 0x8907) 0x8910 (range 0x8912 0x8913) 0x8915 0x8917 0x8919 0x891b 0x8921 0x8933 0x8938 0x8942)))
+(allowx base_typeattr_258 self (ioctl udp_socket ((range 0x8906 0x8907) 0x8910 (range 0x8912 0x8913) 0x8915 0x8917 0x8919 0x891b 0x8921 0x8933 0x8938 0x8942)))
+(allowx base_typeattr_258 self (ioctl rawip_socket ((range 0x8906 0x8907) 0x8910 (range 0x8912 0x8913) 0x8915 0x8917 0x8919 0x891b 0x8921 0x8933 0x8938 0x8942)))
+(allowx base_typeattr_258 self (ioctl tcp_socket (0x8b01 0x8b05 0x8b07 0x8b09 0x8b0b 0x8b0d 0x8b0f (range 0x8b11 0x8b13) 0x8b21 0x8b23 0x8b25 0x8b27 0x8b29 0x8b2d)))
+(allowx base_typeattr_258 self (ioctl udp_socket (0x8b01 0x8b05 0x8b07 0x8b09 0x8b0b 0x8b0d 0x8b0f (range 0x8b11 0x8b13) 0x8b21 0x8b23 0x8b25 0x8b27 0x8b29 0x8b2d)))
+(allowx base_typeattr_258 self (ioctl rawip_socket (0x8b01 0x8b05 0x8b07 0x8b09 0x8b0b 0x8b0d 0x8b0f (range 0x8b11 0x8b13) 0x8b21 0x8b23 0x8b25 0x8b27 0x8b29 0x8b2d)))
+(allow base_typeattr_257 ion_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_257 dmabuf_system_heap_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_257 dmabuf_system_secure_heap_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_257 hal_audio (fd (use)))
+(allow base_typeattr_257 hal_camera (fd (use)))
+(allow base_typeattr_257 hal_tv_tuner_server (fd (use)))
+(allow base_typeattr_257 hal_power_server (fd (use)))
+(allow base_typeattr_257 hal_renderscript_hwservice (hwservice_manager (find)))
 (allow appdomain same_process_hal_file (file (read getattr map execute open)))
 (allow appdomain proc_meminfo (file (ioctl read getattr lock map open watch watch_reads)))
 (allow appdomain app_fuse_file (file (read write getattr append map)))
@@ -9483,10 +9520,10 @@
 (allow appdomain zygote_tmpfs (file (read map)))
 ;;* lmx 522 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_256 self (capability (chown dac_override dac_read_search fowner fsetid kill setgid setuid setpcap linux_immutable net_bind_service net_broadcast net_admin net_raw ipc_lock ipc_owner sys_module sys_rawio sys_chroot sys_ptrace sys_pacct sys_admin sys_boot sys_nice sys_resource sys_time sys_tty_config mknod lease audit_write audit_control setfcap)))
-(neverallow base_typeattr_256 self (capability2 (mac_override mac_admin syslog wake_alarm block_suspend audit_read perfmon checkpoint_restore bpf)))
-(neverallow base_typeattr_256 self (cap_userns (chown dac_override dac_read_search fowner fsetid kill setgid setuid setpcap linux_immutable net_bind_service net_broadcast net_admin net_raw ipc_lock ipc_owner sys_module sys_rawio sys_chroot sys_ptrace sys_pacct sys_admin sys_boot sys_nice sys_resource sys_time sys_tty_config mknod lease audit_write audit_control setfcap)))
-(neverallow base_typeattr_256 self (cap2_userns (mac_override mac_admin syslog wake_alarm block_suspend audit_read perfmon checkpoint_restore bpf)))
+(neverallow base_typeattr_259 self (capability (chown dac_override dac_read_search fowner fsetid kill setgid setuid setpcap linux_immutable net_bind_service net_broadcast net_admin net_raw ipc_lock ipc_owner sys_module sys_rawio sys_chroot sys_ptrace sys_pacct sys_admin sys_boot sys_nice sys_resource sys_time sys_tty_config mknod lease audit_write audit_control setfcap)))
+(neverallow base_typeattr_259 self (capability2 (mac_override mac_admin syslog wake_alarm block_suspend audit_read perfmon checkpoint_restore bpf)))
+(neverallow base_typeattr_259 self (cap_userns (chown dac_override dac_read_search fowner fsetid kill setgid setuid setpcap linux_immutable net_bind_service net_broadcast net_admin net_raw ipc_lock ipc_owner sys_module sys_rawio sys_chroot sys_ptrace sys_pacct sys_admin sys_boot sys_nice sys_resource sys_time sys_tty_config mknod lease audit_write audit_control setfcap)))
+(neverallow base_typeattr_259 self (cap2_userns (mac_override mac_admin syslog wake_alarm block_suspend audit_read perfmon checkpoint_restore bpf)))
 ;;* lme
 
 ;;* lmx 525 system/sepolicy/private/app.te
@@ -9503,12 +9540,12 @@
 
 ;;* lmx 531 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_257 nfc_device (chr_file (read write)))
+(neverallow base_typeattr_260 nfc_device (chr_file (read write)))
 ;;* lme
 
 ;;* lmx 533 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_255 hci_attach_dev (chr_file (read write)))
+(neverallow base_typeattr_258 hci_attach_dev (chr_file (read write)))
 ;;* lme
 
 ;;* lmx 534 system/sepolicy/private/app.te
@@ -9518,16 +9555,16 @@
 
 ;;* lmx 544 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_258 domain (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow base_typeattr_258 domain (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow base_typeattr_258 domain (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow base_typeattr_258 domain (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow base_typeattr_258 domain (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow base_typeattr_261 domain (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow base_typeattr_261 domain (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow base_typeattr_261 domain (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow base_typeattr_261 domain (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow base_typeattr_261 domain (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
 ;;* lme
 
 ;;* lmx 550 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_258 domain (netlink_kobject_uevent_socket (write append)))
+(neverallow base_typeattr_261 domain (netlink_kobject_uevent_socket (write append)))
 ;;* lme
 
 ;;* lmx 553 system/sepolicy/private/app.te
@@ -9542,32 +9579,32 @@
 
 ;;* lmx 557 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_259 rild_socket (sock_file (write)))
+(neverallow base_typeattr_262 rild_socket (sock_file (write)))
 ;;* lme
 
 ;;* lmx 560 system/sepolicy/private/app.te
 
-(neverallow appdomain base_typeattr_260 (process (ptrace)))
+(neverallow appdomain base_typeattr_263 (process (ptrace)))
 ;;* lme
 
 ;;* lmx 574 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_261 appdomain (process (ptrace)))
+(neverallow base_typeattr_264 appdomain (process (ptrace)))
 ;;* lme
 
 ;;* lmx 578 system/sepolicy/private/app.te
 
-(neverallow appdomain base_typeattr_260 (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow appdomain base_typeattr_263 (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 579 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_262 base_typeattr_260 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_265 base_typeattr_263 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 588 system/sepolicy/private/app.te
 
-(neverallow appdomain base_typeattr_263 (process (sigkill sigstop signal)))
+(neverallow appdomain base_typeattr_266 (process (sigkill sigstop signal)))
 ;;* lme
 
 ;;* lmx 592 system/sepolicy/private/app.te
@@ -9621,68 +9658,68 @@
 
 ;;* lmx 614 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_264 apk_data_file (file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_data_file (dir (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_data_file (lnk_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_data_file (chr_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_data_file (blk_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_data_file (sock_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_data_file (fifo_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_data_file (file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_data_file (dir (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_data_file (lnk_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_data_file (chr_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_data_file (blk_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_data_file (sock_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_data_file (fifo_file (write create setattr relabelfrom relabelto append unlink link rename)))
 ;;* lme
 
 ;;* lmx 617 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_264 apk_private_data_file (file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_private_data_file (dir (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_private_data_file (lnk_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_private_data_file (chr_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_private_data_file (blk_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_private_data_file (sock_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_private_data_file (fifo_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_data_file (file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_data_file (dir (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_data_file (lnk_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_data_file (chr_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_data_file (blk_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_data_file (sock_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_data_file (fifo_file (write create setattr relabelfrom relabelto append unlink link rename)))
 ;;* lme
 
 ;;* lmx 620 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_264 apk_private_tmp_file (file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_private_tmp_file (dir (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_private_tmp_file (lnk_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_private_tmp_file (chr_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_private_tmp_file (blk_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_private_tmp_file (sock_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_private_tmp_file (fifo_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_tmp_file (file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_tmp_file (dir (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_tmp_file (lnk_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_tmp_file (chr_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_tmp_file (blk_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_tmp_file (sock_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_private_tmp_file (fifo_file (write create setattr relabelfrom relabelto append unlink link rename)))
 ;;* lme
 
 ;;* lmx 623 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_262 shell_data_file (file (create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_262 shell_data_file (dir (create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_262 shell_data_file (lnk_file (create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_262 shell_data_file (chr_file (create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_262 shell_data_file (blk_file (create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_262 shell_data_file (sock_file (create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_262 shell_data_file (fifo_file (create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_265 shell_data_file (file (create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_265 shell_data_file (dir (create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_265 shell_data_file (lnk_file (create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_265 shell_data_file (chr_file (create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_265 shell_data_file (blk_file (create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_265 shell_data_file (sock_file (create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_265 shell_data_file (fifo_file (create setattr relabelfrom relabelto append unlink link rename)))
 ;;* lme
 
 ;;* lmx 626 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_255 bluetooth_data_file (file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_255 bluetooth_data_file (dir (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_255 bluetooth_data_file (lnk_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_255 bluetooth_data_file (chr_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_255 bluetooth_data_file (blk_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_255 bluetooth_data_file (sock_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_255 bluetooth_data_file (fifo_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_258 bluetooth_data_file (file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_258 bluetooth_data_file (dir (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_258 bluetooth_data_file (lnk_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_258 bluetooth_data_file (chr_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_258 bluetooth_data_file (blk_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_258 bluetooth_data_file (sock_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_258 bluetooth_data_file (fifo_file (write create setattr relabelfrom relabelto append unlink link rename)))
 ;;* lme
 
 ;;* lmx 627 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_265 credstore_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_265 credstore_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
-(neverallow base_typeattr_265 credstore_data_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_265 credstore_data_file (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_265 credstore_data_file (blk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_265 credstore_data_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_265 credstore_data_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_268 credstore_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_268 credstore_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_268 credstore_data_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_268 credstore_data_file (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_268 credstore_data_file (blk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_268 credstore_data_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_268 credstore_data_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 630 system/sepolicy/private/app.te
@@ -9731,13 +9768,13 @@
 
 ;;* lmx 644 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_264 apk_tmp_file (file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_tmp_file (dir (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_tmp_file (lnk_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_tmp_file (chr_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_tmp_file (blk_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_tmp_file (sock_file (write create setattr relabelfrom relabelto append unlink link rename)))
-(neverallow base_typeattr_264 apk_tmp_file (fifo_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_tmp_file (file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_tmp_file (dir (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_tmp_file (lnk_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_tmp_file (chr_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_tmp_file (blk_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_tmp_file (sock_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow base_typeattr_267 apk_tmp_file (fifo_file (write create setattr relabelfrom relabelto append unlink link rename)))
 ;;* lme
 
 ;;* lmx 647 system/sepolicy/private/app.te
@@ -9753,24 +9790,24 @@
 
 ;;* lmx 648 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_262 efs_file (file (read)))
-(neverallow base_typeattr_262 efs_file (dir (read)))
-(neverallow base_typeattr_262 efs_file (lnk_file (read)))
-(neverallow base_typeattr_262 efs_file (chr_file (read)))
-(neverallow base_typeattr_262 efs_file (blk_file (read)))
-(neverallow base_typeattr_262 efs_file (sock_file (read)))
-(neverallow base_typeattr_262 efs_file (fifo_file (read)))
+(neverallow base_typeattr_265 efs_file (file (read)))
+(neverallow base_typeattr_265 efs_file (dir (read)))
+(neverallow base_typeattr_265 efs_file (lnk_file (read)))
+(neverallow base_typeattr_265 efs_file (chr_file (read)))
+(neverallow base_typeattr_265 efs_file (blk_file (read)))
+(neverallow base_typeattr_265 efs_file (sock_file (read)))
+(neverallow base_typeattr_265 efs_file (fifo_file (read)))
 ;;* lme
 
 ;;* lmx 652 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_266 sysfs (file (write)))
-(neverallow base_typeattr_266 sysfs (dir (write)))
-(neverallow base_typeattr_266 sysfs (lnk_file (write)))
-(neverallow base_typeattr_266 sysfs (chr_file (write)))
-(neverallow base_typeattr_266 sysfs (blk_file (write)))
-(neverallow base_typeattr_266 sysfs (sock_file (write)))
-(neverallow base_typeattr_266 sysfs (fifo_file (write)))
+(neverallow base_typeattr_269 sysfs (file (write)))
+(neverallow base_typeattr_269 sysfs (dir (write)))
+(neverallow base_typeattr_269 sysfs (lnk_file (write)))
+(neverallow base_typeattr_269 sysfs (chr_file (write)))
+(neverallow base_typeattr_269 sysfs (blk_file (write)))
+(neverallow base_typeattr_269 sysfs (sock_file (write)))
+(neverallow base_typeattr_269 sysfs (fifo_file (write)))
 ;;* lme
 
 ;;* lmx 654 system/sepolicy/private/app.te
@@ -9791,12 +9828,12 @@
 
 ;;* lmx 660 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_262 base_typeattr_233 (security (compute_av check_context)))
+(neverallow base_typeattr_265 base_typeattr_236 (security (compute_av check_context)))
 ;;* lme
 
 ;;* lmx 661 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_262 base_typeattr_233 (netlink_selinux_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow base_typeattr_265 base_typeattr_236 (netlink_selinux_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
 ;;* lme
 
 ;;* lmx 665 system/sepolicy/private/app.te
@@ -9817,15 +9854,15 @@
 
 ;;* lmx 682 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_262 input_device (chr_file (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_265 input_device (chr_file (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 690 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_267 bluetooth_a2dp_offload_prop (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
-(neverallow base_typeattr_267 bluetooth_audio_hal_prop (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
-(neverallow base_typeattr_267 bluetooth_prop (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
-(neverallow base_typeattr_267 exported_bluetooth_prop (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(neverallow base_typeattr_270 bluetooth_a2dp_offload_prop (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(neverallow base_typeattr_270 bluetooth_audio_hal_prop (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(neverallow base_typeattr_270 bluetooth_prop (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(neverallow base_typeattr_270 exported_bluetooth_prop (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
 ;;* lme
 
 (allow system_app property_socket (sock_file (write)))
@@ -9858,7 +9895,7 @@
 
 ;;* lmx 713 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_262 proc_net_tcp_udp (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_265 proc_net_tcp_udp (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 721 system/sepolicy/private/app.te
@@ -9873,13 +9910,13 @@
 
 ;;* lmx 742 system/sepolicy/private/app.te
 
-(neverallow isolated_app_all base_typeattr_268 (file (execute execute_no_trans)))
-(neverallow bluetooth base_typeattr_268 (file (execute execute_no_trans)))
-(neverallow nfc base_typeattr_268 (file (execute execute_no_trans)))
-(neverallow radio base_typeattr_268 (file (execute execute_no_trans)))
-(neverallow shared_relro base_typeattr_268 (file (execute execute_no_trans)))
-(neverallow system_app base_typeattr_268 (file (execute execute_no_trans)))
-(neverallow sdk_sandbox_all base_typeattr_268 (file (execute execute_no_trans)))
+(neverallow isolated_app_all base_typeattr_271 (file (execute execute_no_trans)))
+(neverallow bluetooth base_typeattr_271 (file (execute execute_no_trans)))
+(neverallow nfc base_typeattr_271 (file (execute execute_no_trans)))
+(neverallow radio base_typeattr_271 (file (execute execute_no_trans)))
+(neverallow shared_relro base_typeattr_271 (file (execute execute_no_trans)))
+(neverallow system_app base_typeattr_271 (file (execute execute_no_trans)))
+(neverallow sdk_sandbox_all base_typeattr_271 (file (execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 751 system/sepolicy/private/app.te
@@ -9893,17 +9930,17 @@
 
 ;;* lmx 758 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_269 video_device (chr_file (read write)))
+(neverallow base_typeattr_272 video_device (chr_file (read write)))
 ;;* lme
 
 ;;* lmx 770 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_270 apk_data_file (dir (watch watch_reads)))
+(neverallow base_typeattr_273 apk_data_file (dir (watch watch_reads)))
 ;;* lme
 
 ;;* lmx 778 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_270 apk_data_file (file (watch watch_reads)))
+(neverallow base_typeattr_273 apk_data_file (file (watch watch_reads)))
 ;;* lme
 
 ;;* lmx 782 system/sepolicy/private/app.te
@@ -9913,17 +9950,17 @@
 
 ;;* lmx 791 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_271 base_typeattr_272 (process (transition)))
+(neverallow base_typeattr_274 base_typeattr_275 (process (transition)))
 ;;* lme
 
 ;;* lmx 793 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_271 base_typeattr_260 (process (dyntransition)))
+(neverallow base_typeattr_274 base_typeattr_263 (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 796 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_273 storage_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_276 storage_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (dontaudit appdomain system_font_fallback_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
@@ -9934,9 +9971,14 @@
 
 ;;* lmx 802 system/sepolicy/private/app.te
 
-(neverallow base_typeattr_262 tombstone_data_file (file (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_265 tombstone_data_file (file (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
+(typetransition base_typeattr_254 storage_area_dir fifo_file storage_area_content_file)
+(typetransition base_typeattr_254 storage_area_dir sock_file storage_area_content_file)
+(typetransition base_typeattr_254 storage_area_dir lnk_file storage_area_content_file)
+(typetransition base_typeattr_254 storage_area_dir dir storage_area_content_file)
+(typetransition base_typeattr_254 storage_area_dir file storage_area_content_file)
 ;;* lmx 20 system/sepolicy/private/app_neverallows.te
 
 (neverallow untrusted_app_all domain (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
@@ -9987,24 +10029,24 @@
 
 ;;* lmx 30 system/sepolicy/private/app_neverallows.te
 
-(neverallow untrusted_app_all base_typeattr_274 (file (read)))
-(neverallow isolated_app_all base_typeattr_274 (file (read)))
-(neverallow ephemeral_app base_typeattr_274 (file (read)))
-(neverallow isolated_app base_typeattr_274 (file (read)))
-(neverallow isolated_compute_app base_typeattr_274 (file (read)))
-(neverallow mediaprovider base_typeattr_274 (file (read)))
-(neverallow untrusted_app base_typeattr_274 (file (read)))
-(neverallow untrusted_app_30 base_typeattr_274 (file (read)))
-(neverallow untrusted_app_29 base_typeattr_274 (file (read)))
-(neverallow untrusted_app_27 base_typeattr_274 (file (read)))
-(neverallow untrusted_app_25 base_typeattr_274 (file (read)))
-(neverallow mediaprovider_app base_typeattr_274 (file (read)))
+(neverallow untrusted_app_all base_typeattr_277 (file (read)))
+(neverallow isolated_app_all base_typeattr_277 (file (read)))
+(neverallow ephemeral_app base_typeattr_277 (file (read)))
+(neverallow isolated_app base_typeattr_277 (file (read)))
+(neverallow isolated_compute_app base_typeattr_277 (file (read)))
+(neverallow mediaprovider base_typeattr_277 (file (read)))
+(neverallow untrusted_app base_typeattr_277 (file (read)))
+(neverallow untrusted_app_30 base_typeattr_277 (file (read)))
+(neverallow untrusted_app_29 base_typeattr_277 (file (read)))
+(neverallow untrusted_app_27 base_typeattr_277 (file (read)))
+(neverallow untrusted_app_25 base_typeattr_277 (file (read)))
+(neverallow mediaprovider_app base_typeattr_277 (file (read)))
 ;;* lme
 
 ;;* lmx 31 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_275 debugfs_type (file (read)))
-(neverallow base_typeattr_275 debugfs_type (lnk_file (read)))
+(neverallow base_typeattr_278 debugfs_type (file (read)))
+(neverallow base_typeattr_278 debugfs_type (lnk_file (read)))
 ;;* lme
 
 ;;* lmx 36 system/sepolicy/private/app_neverallows.te
@@ -10057,17 +10099,17 @@
 
 ;;* lmx 44 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_276 property_socket (sock_file (write)))
+(neverallow base_typeattr_279 property_socket (sock_file (write)))
 ;;* lme
 
 ;;* lmx 45 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_276 init (unix_stream_socket (connectto)))
+(neverallow base_typeattr_279 init (unix_stream_socket (connectto)))
 ;;* lme
 
 ;;* lmx 46 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_276 property_type (property_service (set)))
+(neverallow base_typeattr_279 property_type (property_service (set)))
 ;;* lme
 
 ;;* lmx 49 system/sepolicy/private/app_neverallows.te
@@ -10296,13 +10338,29 @@
 
 ;;* lmx 73 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_277 app_data_file (file (execute_no_trans)))
-(neverallow base_typeattr_277 privapp_data_file (file (execute_no_trans)))
+(neverallow base_typeattr_280 app_data_file (file (execute_no_trans)))
+(neverallow base_typeattr_280 privapp_data_file (file (execute_no_trans)))
+;;* lme
+
+;;* lmx 75 system/sepolicy/private/app_neverallows.te
+
+(neverallow appdomain storage_area_content_file (file (execute)))
+;;* lme
+
+;;* lmx 83 system/sepolicy/private/app_neverallows.te
+
+(neverallow appdomain storage_area_app_dir (file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow appdomain storage_area_app_dir (dir (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow appdomain storage_area_app_dir (lnk_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow appdomain storage_area_app_dir (chr_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow appdomain storage_area_app_dir (blk_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow appdomain storage_area_app_dir (sock_file (write create setattr relabelfrom relabelto append unlink link rename)))
+(neverallow appdomain storage_area_app_dir (fifo_file (write create setattr relabelfrom relabelto append unlink link rename)))
 ;;* lme
 
 ;;* lmx 97 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_278 dex2oat_exec (file (execute execute_no_trans)))
+(neverallow base_typeattr_281 dex2oat_exec (file (execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 107 system/sepolicy/private/app_neverallows.te
@@ -10543,626 +10601,626 @@
 
 ;;* lmx 129 system/sepolicy/private/app_neverallows.te
 
-(neverallow untrusted_app_all base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_selinux_socket (ioctl)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_selinux_socket (ioctl)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_selinux_socket (ioctl)))
-(neverallow isolated_app base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow isolated_app base_typeattr_233 (netlink_selinux_socket (ioctl)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_selinux_socket (ioctl)))
-(neverallow mediaprovider base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow mediaprovider base_typeattr_233 (netlink_selinux_socket (ioctl)))
-(neverallow untrusted_app base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow untrusted_app base_typeattr_233 (netlink_selinux_socket (ioctl)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_selinux_socket (ioctl)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_selinux_socket (ioctl)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_selinux_socket (ioctl)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_selinux_socket (ioctl)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_selinux_socket (ioctl)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_selinux_socket (ioctl)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_selinux_socket (ioctl)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_selinux_socket (ioctl)))
+(neverallow isolated_app base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow isolated_app base_typeattr_236 (netlink_selinux_socket (ioctl)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_selinux_socket (ioctl)))
+(neverallow mediaprovider base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow mediaprovider base_typeattr_236 (netlink_selinux_socket (ioctl)))
+(neverallow untrusted_app base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow untrusted_app base_typeattr_236 (netlink_selinux_socket (ioctl)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_selinux_socket (ioctl)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_selinux_socket (ioctl)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_selinux_socket (ioctl)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_selinux_socket (ioctl)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_selinux_socket (ioctl)))
 ;;* lme
 
 ;;* lmx 142 system/sepolicy/private/app_neverallows.te
 
-(neverallow untrusted_app_all base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow untrusted_app_all base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_all base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow isolated_app_all base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow ephemeral_app base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow isolated_app base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow isolated_app base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow isolated_app base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow isolated_app base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow isolated_app base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow isolated_compute_app base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow mediaprovider base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow mediaprovider base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow mediaprovider base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow mediaprovider base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow mediaprovider base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow untrusted_app base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow untrusted_app base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow untrusted_app base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow untrusted_app base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow untrusted_app base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow untrusted_app_30 base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow untrusted_app_29 base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow untrusted_app_27 base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow untrusted_app_25 base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow mediaprovider_app base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow untrusted_app_all base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow isolated_app_all base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow ephemeral_app base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow isolated_app base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow isolated_app base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow isolated_app base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow isolated_app base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow isolated_app base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow isolated_compute_app base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow mediaprovider base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow mediaprovider base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow mediaprovider base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow mediaprovider base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow mediaprovider base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow untrusted_app base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow untrusted_app base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow untrusted_app base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow untrusted_app base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow untrusted_app base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow untrusted_app_30 base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow untrusted_app_29 base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow untrusted_app_27 base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow untrusted_app_25 base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow mediaprovider_app base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
 ;;* lme
 
 ;;* lmx 147 system/sepolicy/private/app_neverallows.te
 
-(neverallow untrusted_app_all base_typeattr_233 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app_all base_typeattr_233 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
-(neverallow ephemeral_app base_typeattr_233 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_app base_typeattr_233 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
-(neverallow isolated_compute_app base_typeattr_233 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider base_typeattr_233 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app base_typeattr_233 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_30 base_typeattr_233 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_29 base_typeattr_233 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_27 base_typeattr_233 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
-(neverallow untrusted_app_25 base_typeattr_233 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
-(neverallow mediaprovider_app base_typeattr_233 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_all base_typeattr_236 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app_all base_typeattr_236 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
+(neverallow ephemeral_app base_typeattr_236 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_app base_typeattr_236 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
+(neverallow isolated_compute_app base_typeattr_236 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider base_typeattr_236 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app base_typeattr_236 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_30 base_typeattr_236 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_29 base_typeattr_236 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_27 base_typeattr_236 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
+(neverallow untrusted_app_25 base_typeattr_236 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
+(neverallow mediaprovider_app base_typeattr_236 (vsock_socket (ioctl create setattr lock relabelfrom relabelto append map bind connect listen accept setopt shutdown recvfrom sendto name_bind)))
 ;;* lme
 
 ;;* lmx 150 system/sepolicy/private/app_neverallows.te
@@ -11188,35 +11246,35 @@
 
 ;;* lmx 160 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_279 domain (netlink_route_socket (nlmsg_getneigh)))
+(neverallow base_typeattr_282 domain (netlink_route_socket (nlmsg_getneigh)))
 ;;* lme
 
 ;;* lmx 163 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_276 cache_file (dir (write create setattr relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm add_name remove_name reparent rmdir)))
-(neverallow base_typeattr_276 cache_recovery_file (dir (write create setattr relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_279 cache_file (dir (write create setattr relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_279 cache_recovery_file (dir (write create setattr relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 164 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_276 cache_file (file (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_276 cache_recovery_file (file (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_279 cache_file (file (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_279 cache_recovery_file (file (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 187 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_276 base_typeattr_280 (file (create unlink)))
-(neverallow base_typeattr_276 base_typeattr_280 (dir (create unlink)))
-(neverallow base_typeattr_276 base_typeattr_280 (lnk_file (create unlink)))
-(neverallow base_typeattr_276 base_typeattr_280 (chr_file (create unlink)))
-(neverallow base_typeattr_276 base_typeattr_280 (blk_file (create unlink)))
-(neverallow base_typeattr_276 base_typeattr_280 (sock_file (create unlink)))
-(neverallow base_typeattr_276 base_typeattr_280 (fifo_file (create unlink)))
+(neverallow base_typeattr_279 base_typeattr_283 (file (create unlink)))
+(neverallow base_typeattr_279 base_typeattr_283 (dir (create unlink)))
+(neverallow base_typeattr_279 base_typeattr_283 (lnk_file (create unlink)))
+(neverallow base_typeattr_279 base_typeattr_283 (chr_file (create unlink)))
+(neverallow base_typeattr_279 base_typeattr_283 (blk_file (create unlink)))
+(neverallow base_typeattr_279 base_typeattr_283 (sock_file (create unlink)))
+(neverallow base_typeattr_279 base_typeattr_283 (fifo_file (create unlink)))
 ;;* lme
 
 ;;* lmx 190 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_281 fuse_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_284 fuse_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 193 system/sepolicy/private/app_neverallows.te
@@ -11473,7 +11531,7 @@
 
 ;;* lmx 224 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_281 proc_filesystems (file (ioctl read write create setattr lock relabelfrom append unlink link rename execute open watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans)))
+(neverallow base_typeattr_284 proc_filesystems (file (ioctl read write create setattr lock relabelfrom append unlink link rename execute open watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans)))
 ;;* lme
 
 ;;* lmx 227 system/sepolicy/private/app_neverallows.te
@@ -11526,18 +11584,18 @@
 
 ;;* lmx 238 system/sepolicy/private/app_neverallows.te
 
-(neverallow untrusted_app_all base_typeattr_233 (hwservice_manager (add list)))
-(neverallow isolated_app_all base_typeattr_233 (hwservice_manager (add list)))
-(neverallow ephemeral_app base_typeattr_233 (hwservice_manager (add list)))
-(neverallow isolated_app base_typeattr_233 (hwservice_manager (add list)))
-(neverallow isolated_compute_app base_typeattr_233 (hwservice_manager (add list)))
-(neverallow mediaprovider base_typeattr_233 (hwservice_manager (add list)))
-(neverallow untrusted_app base_typeattr_233 (hwservice_manager (add list)))
-(neverallow untrusted_app_30 base_typeattr_233 (hwservice_manager (add list)))
-(neverallow untrusted_app_29 base_typeattr_233 (hwservice_manager (add list)))
-(neverallow untrusted_app_27 base_typeattr_233 (hwservice_manager (add list)))
-(neverallow untrusted_app_25 base_typeattr_233 (hwservice_manager (add list)))
-(neverallow mediaprovider_app base_typeattr_233 (hwservice_manager (add list)))
+(neverallow untrusted_app_all base_typeattr_236 (hwservice_manager (add list)))
+(neverallow isolated_app_all base_typeattr_236 (hwservice_manager (add list)))
+(neverallow ephemeral_app base_typeattr_236 (hwservice_manager (add list)))
+(neverallow isolated_app base_typeattr_236 (hwservice_manager (add list)))
+(neverallow isolated_compute_app base_typeattr_236 (hwservice_manager (add list)))
+(neverallow mediaprovider base_typeattr_236 (hwservice_manager (add list)))
+(neverallow untrusted_app base_typeattr_236 (hwservice_manager (add list)))
+(neverallow untrusted_app_30 base_typeattr_236 (hwservice_manager (add list)))
+(neverallow untrusted_app_29 base_typeattr_236 (hwservice_manager (add list)))
+(neverallow untrusted_app_27 base_typeattr_236 (hwservice_manager (add list)))
+(neverallow untrusted_app_25 base_typeattr_236 (hwservice_manager (add list)))
+(neverallow mediaprovider_app base_typeattr_236 (hwservice_manager (add list)))
 ;;* lme
 
 ;;* lmx 253 system/sepolicy/private/app_neverallows.te
@@ -11590,7 +11648,7 @@
 
 ;;* lmx 264 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_282 proc_tty_drivers (file (ioctl read getattr lock map open watch watch_reads)))
+(neverallow base_typeattr_285 proc_tty_drivers (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lme
 
 ;;* lmx 265 system/sepolicy/private/app_neverallows.te
@@ -11643,7 +11701,7 @@
 
 ;;* lmx 277 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_278 mnt_sdcard_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_281 mnt_sdcard_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 280 system/sepolicy/private/app_neverallows.te
@@ -11680,17 +11738,17 @@
 
 ;;* lmx 293 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_283 userdebug_or_eng_prop (file (read)))
+(neverallow base_typeattr_286 userdebug_or_eng_prop (file (read)))
 ;;* lme
 
 ;;* lmx 307 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_284 mdnsd_socket (sock_file (write)))
+(neverallow base_typeattr_287 mdnsd_socket (sock_file (write)))
 ;;* lme
 
 ;;* lmx 315 system/sepolicy/private/app_neverallows.te
 
-(neverallow base_typeattr_284 mdnsd (unix_stream_socket (connectto)))
+(neverallow base_typeattr_287 mdnsd (unix_stream_socket (connectto)))
 ;;* lme
 
 ;;* lmx 321 system/sepolicy/private/app_neverallows.te
@@ -11762,7 +11820,7 @@
 (dontaudit su app_zygote_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 63 system/sepolicy/private/app_zygote.te
 
-(neverallow base_typeattr_285 app_zygote_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_288 app_zygote_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow app_zygote apex_module_data_file (dir (search)))
@@ -11787,22 +11845,22 @@
 (allow app_zygote resourcecache_data_file (dir (ioctl read getattr lock open watch watch_reads search)))
 ;;* lmx 105 system/sepolicy/private/app_zygote.te
 
-(neverallow app_zygote base_typeattr_286 (process (dyntransition)))
+(neverallow app_zygote base_typeattr_289 (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 108 system/sepolicy/private/app_zygote.te
 
-(neverallow app_zygote base_typeattr_246 (process (transition)))
+(neverallow app_zygote base_typeattr_249 (process (transition)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/private/app_zygote.te
 
-(neverallow app_zygote base_typeattr_233 (file (execute_no_trans)))
+(neverallow app_zygote base_typeattr_236 (file (execute_no_trans)))
 ;;* lme
 
 ;;* lmx 116 system/sepolicy/private/app_zygote.te
 
-(neverallow base_typeattr_287 app_zygote (process (dyntransition)))
+(neverallow base_typeattr_290 app_zygote (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 119 system/sepolicy/private/app_zygote.te
@@ -11822,7 +11880,7 @@
 
 ;;* lmx 129 system/sepolicy/private/app_zygote.te
 
-(neverallow app_zygote base_typeattr_288 (service_manager (find)))
+(neverallow app_zygote base_typeattr_291 (service_manager (find)))
 ;;* lme
 
 ;;* lmx 132 system/sepolicy/private/app_zygote.te
@@ -11899,17 +11957,17 @@
 
 ;;* lmx 163 system/sepolicy/private/app_zygote.te
 
-(neverallow app_zygote base_typeattr_289 (unix_dgram_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow app_zygote base_typeattr_292 (unix_dgram_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
 ;;* lme
 
 ;;* lmx 170 system/sepolicy/private/app_zygote.te
 
-(neverallow app_zygote base_typeattr_290 (unix_stream_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind connectto)))
+(neverallow app_zygote base_typeattr_293 (unix_stream_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind connectto)))
 ;;* lme
 
 ;;* lmx 173 system/sepolicy/private/app_zygote.te
 
-(neverallow app_zygote base_typeattr_233 (process (ptrace)))
+(neverallow app_zygote base_typeattr_236 (process (ptrace)))
 ;;* lme
 
 ;;* lmx 182 system/sepolicy/private/app_zygote.te
@@ -11953,14 +12011,14 @@
 (allow artd artd_service (service_manager (add find)))
 ;;* lmx 12 system/sepolicy/private/artd.te
 
-(neverallow base_typeattr_291 artd_service (service_manager (add)))
+(neverallow base_typeattr_294 artd_service (service_manager (add)))
 ;;* lme
 
 (allow artd su (tcp_socket (read write accept getopt)))
 (allow artd artd_pre_reboot_service (service_manager (add find)))
 ;;* lmx 13 system/sepolicy/private/artd.te
 
-(neverallow base_typeattr_291 artd_pre_reboot_service (service_manager (add)))
+(neverallow base_typeattr_294 artd_pre_reboot_service (service_manager (add)))
 ;;* lme
 
 (allow artd su (tcp_socket (read write accept getopt)))
@@ -11981,7 +12039,7 @@
 (dontaudit su artd_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 35 system/sepolicy/private/artd.te
 
-(neverallow base_typeattr_291 artd_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_294 artd_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow artd mnt_expand_file (dir (getattr search)))
@@ -12079,12 +12137,12 @@
 (allow artd pre_reboot_dexopt_artd_file (dir (mounton)))
 ;;* lmx 189 system/sepolicy/private/artd.te
 
-(neverallow artd base_typeattr_292 (file (execute_no_trans)))
+(neverallow artd base_typeattr_295 (file (execute_no_trans)))
 ;;* lme
 
 ;;* lmx 193 system/sepolicy/private/artd.te
 
-(neverallow artd base_typeattr_293 (process (transition)))
+(neverallow artd base_typeattr_296 (process (transition)))
 ;;* lme
 
 ;;* lmx 200 system/sepolicy/private/artd.te
@@ -12094,7 +12152,7 @@
 
 ;;* lmx 201 system/sepolicy/private/artd.te
 
-(neverallow artd_subprocess_type base_typeattr_293 (process (transition)))
+(neverallow artd_subprocess_type base_typeattr_296 (process (transition)))
 ;;* lme
 
 (allow atrace boottrace_data_file (dir (search)))
@@ -12108,7 +12166,7 @@
 (allow atrace init (unix_stream_socket (connectto)))
 (allow atrace debug_prop (property_service (set)))
 (allow atrace debug_prop (file (read getattr map open)))
-(allow atrace base_typeattr_294 (service_manager (find)))
+(allow atrace base_typeattr_297 (service_manager (find)))
 (allow atrace servicemanager (service_manager (list)))
 (allow atrace servicemanager (binder (call transfer)))
 (allow servicemanager atrace (binder (call transfer)))
@@ -12161,7 +12219,7 @@
 (allow audioserver audioserver_service (service_manager (add find)))
 ;;* lmx 32 system/sepolicy/private/audioserver.te
 
-(neverallow base_typeattr_295 audioserver_service (service_manager (add)))
+(neverallow base_typeattr_298 audioserver_service (service_manager (add)))
 ;;* lme
 
 (allow audioserver su (tcp_socket (read write accept getopt)))
@@ -12243,7 +12301,7 @@
 
 ;;* lmx 115 system/sepolicy/private/audioserver.te
 
-(neverallow audioserver base_typeattr_296 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
+(neverallow audioserver base_typeattr_299 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
 ;;* lme
 
 (allow init auditctl_exec (file (read getattr map execute open)))
@@ -12259,7 +12317,7 @@
 (allow automotive_display_service hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 8 system/sepolicy/private/automotive_display_service.te
 
-(neverallow base_typeattr_297 fwk_automotive_display_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_300 fwk_automotive_display_hwservice (hwservice_manager (add)))
 ;;* lme
 
 (allow init automotive_display_service_exec (file (read getattr map execute open)))
@@ -12284,7 +12342,7 @@
 (allow automotive_display_service fwk_automotive_display_service (service_manager (add find)))
 ;;* lmx 41 system/sepolicy/private/automotive_display_service.te
 
-(neverallow base_typeattr_297 fwk_automotive_display_service (service_manager (add)))
+(neverallow base_typeattr_300 fwk_automotive_display_service (service_manager (add)))
 ;;* lme
 
 (allow automotive_display_service su (tcp_socket (read write accept getopt)))
@@ -12348,17 +12406,17 @@
 (allow blkid blkid_exec (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
 ;;* lmx 21 system/sepolicy/private/blkid.te
 
-(neverallow base_typeattr_298 blkid (process (transition)))
+(neverallow base_typeattr_301 blkid (process (transition)))
 ;;* lme
 
 ;;* lmx 22 system/sepolicy/private/blkid.te
 
-(neverallow base_typeattr_233 blkid (process (dyntransition)))
+(neverallow base_typeattr_236 blkid (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 23 system/sepolicy/private/blkid.te
 
-(neverallow blkid base_typeattr_299 (file (entrypoint)))
+(neverallow blkid base_typeattr_302 (file (entrypoint)))
 ;;* lme
 
 (allow blkid_untrusted block_device (dir (search)))
@@ -12382,17 +12440,17 @@
 
 ;;* lmx 36 system/sepolicy/private/blkid_untrusted.te
 
-(neverallow base_typeattr_298 blkid_untrusted (process (transition)))
+(neverallow base_typeattr_301 blkid_untrusted (process (transition)))
 ;;* lme
 
 ;;* lmx 37 system/sepolicy/private/blkid_untrusted.te
 
-(neverallow base_typeattr_233 blkid_untrusted (process (dyntransition)))
+(neverallow base_typeattr_236 blkid_untrusted (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 38 system/sepolicy/private/blkid_untrusted.te
 
-(neverallow blkid_untrusted base_typeattr_299 (file (entrypoint)))
+(neverallow blkid_untrusted base_typeattr_302 (file (entrypoint)))
 ;;* lme
 
 (typetransition bluetooth tmpfs file appdomain_tmpfs)
@@ -12400,23 +12458,23 @@
 (dontaudit su bluetooth_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 5 system/sepolicy/private/bluetooth.te
 
-(neverallow base_typeattr_300 bluetooth_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_303 bluetooth_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow bluetooth appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 5 system/sepolicy/private/bluetooth.te
 
-(neverallow base_typeattr_301 base_typeattr_300 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_304 base_typeattr_303 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/bluetooth.te
 
-(neverallow base_typeattr_302 bluetooth (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_305 bluetooth (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/bluetooth.te
 
-(neverallow base_typeattr_303 bluetooth (process (ptrace)))
+(neverallow base_typeattr_306 bluetooth (process (ptrace)))
 ;;* lme
 
 (typetransition bluetooth bluetooth_data_file sock_file bluetooth_socket)
@@ -12469,7 +12527,7 @@
 (allow bluetooth binder_cache_bluetooth_server_prop (file (read getattr map open)))
 ;;* lmx 55 system/sepolicy/private/bluetooth.te
 
-(neverallow base_typeattr_304 binder_cache_bluetooth_server_prop (property_service (set)))
+(neverallow base_typeattr_307 binder_cache_bluetooth_server_prop (property_service (set)))
 ;;* lme
 
 (allow bluetooth property_socket (sock_file (write)))
@@ -12600,13 +12658,13 @@
 (allow bootstat statsd (unix_dgram_socket (sendto)))
 ;;* lmx 44 system/sepolicy/private/bootstat.te
 
-(neverallow base_typeattr_305 system_boot_reason_prop (property_service (set)))
+(neverallow base_typeattr_308 system_boot_reason_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 57 system/sepolicy/private/bootstat.te
 
-(neverallow base_typeattr_306 bootloader_boot_reason_prop (file (ioctl read getattr lock map open watch watch_reads)))
-(neverallow base_typeattr_306 last_boot_reason_prop (file (ioctl read getattr lock map open watch watch_reads)))
+(neverallow base_typeattr_309 bootloader_boot_reason_prop (file (ioctl read getattr lock map open watch watch_reads)))
+(neverallow base_typeattr_309 last_boot_reason_prop (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lme
 
 ;;* lmx 59 system/sepolicy/private/bootstat.te
@@ -12617,8 +12675,8 @@
 
 ;;* lmx 66 system/sepolicy/private/bootstat.te
 
-(neverallow base_typeattr_307 bootloader_boot_reason_prop (property_service (set)))
-(neverallow base_typeattr_307 last_boot_reason_prop (property_service (set)))
+(neverallow base_typeattr_310 bootloader_boot_reason_prop (property_service (set)))
+(neverallow base_typeattr_310 last_boot_reason_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 68 system/sepolicy/private/bootstat.te
@@ -12646,23 +12704,23 @@
 (allow vendor_boringssl_self_test kmsg_debug_device (chr_file (ioctl write getattr lock append map open)))
 ;;* lmx 66 system/sepolicy/private/boringssl_self_test.te
 
-(neverallow base_typeattr_308 boringssl_self_test_marker (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_311 boringssl_self_test_marker (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 74 system/sepolicy/private/boringssl_self_test.te
 
-(neverallow base_typeattr_308 boringssl_self_test_marker (dir (write)))
+(neverallow base_typeattr_311 boringssl_self_test_marker (dir (write)))
 ;;* lme
 
 ;;* lmx 10 system/sepolicy/private/bpfdomain.te
 
-(neverallow base_typeattr_309 self (capability (net_admin net_raw)))
-(neverallow base_typeattr_309 self (cap_userns (net_admin net_raw)))
+(neverallow base_typeattr_312 self (capability (net_admin net_raw)))
+(neverallow base_typeattr_312 self (cap_userns (net_admin net_raw)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/private/bpfdomain.te
 
-(neverallow base_typeattr_310 base_typeattr_233 (bpf (map_create map_read map_write prog_load prog_run)))
+(neverallow base_typeattr_313 base_typeattr_236 (bpf (map_create map_read map_write prog_load prog_run)))
 ;;* lme
 
 (allow bpfdomain fs_bpf (dir (search)))
@@ -12672,7 +12730,7 @@
 (allow bpfloader bpffs_type (dir (read write create setattr open add_name remove_name search)))
 (allow bpfloader bpffs_type (file (read create getattr setattr rename)))
 (allow bpfloader bpffs_type (lnk_file (read create getattr)))
-(allow base_typeattr_311 fs_bpf (filesystem (associate)))
+(allow base_typeattr_314 fs_bpf (filesystem (associate)))
 (allow bpfloader self (bpf (map_create map_read map_write prog_load prog_run)))
 (allow bpfloader self (capability (chown net_admin sys_admin)))
 (allow bpfloader sysfs_fs_fuse_bpf (file (ioctl read getattr lock map open watch watch_reads)))
@@ -12689,7 +12747,7 @@
 
 ;;* lmx 33 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_312 bpffs_type (dir (read write create setattr open add_name remove_name)))
+(neverallow base_typeattr_315 bpffs_type (dir (read write create setattr open add_name remove_name)))
 ;;* lme
 
 ;;* lmx 35 system/sepolicy/private/bpfloader.te
@@ -12699,109 +12757,109 @@
 
 ;;* lmx 36 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_312 bpffs_type (file (create setattr map rename open)))
+(neverallow base_typeattr_315 bpffs_type (file (create setattr map rename open)))
 ;;* lme
 
 ;;* lmx 37 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_313 fs_bpf (file (read getattr)))
+(neverallow base_typeattr_316 fs_bpf (file (read getattr)))
 ;;* lme
 
 ;;* lmx 38 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_312 fs_bpf_loader (file (read getattr)))
+(neverallow base_typeattr_315 fs_bpf_loader (file (read getattr)))
 ;;* lme
 
 ;;* lmx 39 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_314 fs_bpf_net_private (file (read getattr)))
+(neverallow base_typeattr_317 fs_bpf_net_private (file (read getattr)))
 ;;* lme
 
 ;;* lmx 40 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_315 fs_bpf_net_shared (file (read getattr)))
+(neverallow base_typeattr_318 fs_bpf_net_shared (file (read getattr)))
 ;;* lme
 
 ;;* lmx 41 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_316 fs_bpf_netd_readonly (file (read getattr)))
+(neverallow base_typeattr_319 fs_bpf_netd_readonly (file (read getattr)))
 ;;* lme
 
 ;;* lmx 42 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_317 fs_bpf_netd_shared (file (read getattr)))
+(neverallow base_typeattr_320 fs_bpf_netd_shared (file (read getattr)))
 ;;* lme
 
 ;;* lmx 43 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_314 fs_bpf_tethering (file (read getattr)))
+(neverallow base_typeattr_317 fs_bpf_tethering (file (read getattr)))
 ;;* lme
 
 ;;* lmx 44 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_318 fs_bpf_uprobestats (file (read getattr)))
+(neverallow base_typeattr_321 fs_bpf_uprobestats (file (read getattr)))
 ;;* lme
 
 ;;* lmx 45 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_319 base_typeattr_320 (file (write)))
+(neverallow base_typeattr_322 base_typeattr_323 (file (write)))
 ;;* lme
 
 ;;* lmx 47 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_312 bpffs_type (lnk_file (ioctl write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_315 bpffs_type (lnk_file (ioctl write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 48 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_310 bpffs_type (lnk_file (read)))
+(neverallow base_typeattr_313 bpffs_type (lnk_file (read)))
 ;;* lme
 
 ;;* lmx 50 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_312 base_typeattr_233 (bpf (prog_load)))
+(neverallow base_typeattr_315 base_typeattr_236 (bpf (prog_load)))
 ;;* lme
 
 ;;* lmx 51 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_310 base_typeattr_233 (bpf (map_create map_read map_write prog_run)))
+(neverallow base_typeattr_313 base_typeattr_236 (bpf (map_create map_read map_write prog_run)))
 ;;* lme
 
 ;;* lmx 54 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_312 fs_bpf_loader (bpf (map_create map_read map_write prog_load prog_run)))
+(neverallow base_typeattr_315 fs_bpf_loader (bpf (map_create map_read map_write prog_load prog_run)))
 ;;* lme
 
 ;;* lmx 55 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_312 fs_bpf_loader (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_315 fs_bpf_loader (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 57 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_321 bpfloader_exec (file (execute execute_no_trans)))
+(neverallow base_typeattr_324 bpfloader_exec (file (execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 59 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_322 fs_bpf_vendor (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_325 fs_bpf_vendor (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 61 system/sepolicy/private/bpfloader.te
 
-(neverallow bpfloader base_typeattr_233 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
-(neverallow bpfloader base_typeattr_233 (udp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
-(neverallow bpfloader base_typeattr_233 (rawip_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
+(neverallow bpfloader base_typeattr_236 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
+(neverallow bpfloader base_typeattr_236 (udp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
+(neverallow bpfloader base_typeattr_236 (rawip_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
 ;;* lme
 
 ;;* lmx 64 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_323 bpfloader (process (ptrace)))
+(neverallow base_typeattr_326 bpfloader (process (ptrace)))
 ;;* lme
 
 ;;* lmx 66 system/sepolicy/private/bpfloader.te
 
-(neverallow base_typeattr_312 proc_bpf (file (write)))
+(neverallow base_typeattr_315 proc_bpf (file (write)))
 ;;* lme
 
 (allow init bufferhubd_exec (file (read getattr map execute open)))
@@ -12816,7 +12874,7 @@
 (allow bufferhubd pdx_bufferhub_client_channel_socket_type (unix_stream_socket (ioctl read write create getattr setattr lock append map bind connect listen accept getopt setopt shutdown)))
 ;;* lmx 8 system/sepolicy/private/bufferhubd.te
 
-(neverallow base_typeattr_324 pdx_bufferhub_client_endpoint_socket_type (unix_stream_socket (listen accept)))
+(neverallow base_typeattr_327 pdx_bufferhub_client_endpoint_socket_type (unix_stream_socket (listen accept)))
 ;;* lme
 
 (allow bufferhubd pdx_performance_client_endpoint_dir_type (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -12833,7 +12891,7 @@
 (allow camera_service_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 1 system/sepolicy/private/camera_service_server.te
 
-(neverallow base_typeattr_325 fwk_camera_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_328 fwk_camera_hwservice (hwservice_manager (add)))
 ;;* lme
 
 (allow init cameraserver_exec (file (read getattr map execute open)))
@@ -12862,14 +12920,14 @@
 (allow cameraserver cameraserver_service (service_manager (add find)))
 ;;* lmx 26 system/sepolicy/private/cameraserver.te
 
-(neverallow base_typeattr_326 cameraserver_service (service_manager (add)))
+(neverallow base_typeattr_329 cameraserver_service (service_manager (add)))
 ;;* lme
 
 (allow cameraserver su (tcp_socket (read write accept getopt)))
 (allow cameraserver fwk_camera_service (service_manager (add find)))
 ;;* lmx 27 system/sepolicy/private/cameraserver.te
 
-(neverallow base_typeattr_326 fwk_camera_service (service_manager (add)))
+(neverallow base_typeattr_329 fwk_camera_service (service_manager (add)))
 ;;* lme
 
 (allow cameraserver su (tcp_socket (read write accept getopt)))
@@ -12877,7 +12935,7 @@
 (allow cameraserver hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 28 system/sepolicy/private/cameraserver.te
 
-(neverallow base_typeattr_326 fwk_camera_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_329 fwk_camera_hwservice (hwservice_manager (add)))
 ;;* lme
 
 (allow cameraserver activity_service (service_manager (find)))
@@ -12921,7 +12979,7 @@
 
 ;;* lmx 92 system/sepolicy/private/cameraserver.te
 
-(neverallow cameraserver base_typeattr_296 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
+(neverallow cameraserver base_typeattr_299 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
 ;;* lme
 
 (allow init canhalconfigurator_exec (file (read getattr map execute open)))
@@ -12950,7 +13008,7 @@
 (allow charger charger_prop (file (read getattr map open)))
 ;;* lmx 16 system/sepolicy/private/charger.te
 
-(neverallow base_typeattr_327 charger_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_330 charger_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow charger_type property_socket (sock_file (write)))
@@ -13001,18 +13059,18 @@
 (allow charger_type proc_sysrq (file (ioctl read write getattr lock append map open watch watch_reads)))
 ;;* lmx 54 system/sepolicy/private/charger_type.te
 
-(neverallow base_typeattr_227 charger_config_prop (property_service (set)))
+(neverallow base_typeattr_230 charger_config_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 64 system/sepolicy/private/charger_type.te
 
-(neverallow base_typeattr_328 charger_status_prop (property_service (set)))
+(neverallow base_typeattr_331 charger_status_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 76 system/sepolicy/private/charger_type.te
 
-(neverallow base_typeattr_329 charger_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_329 charger_status_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_332 charger_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_332 charger_status_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow clatd system_server (fd (use)))
@@ -13029,12 +13087,12 @@
 (allow compos_fd_server self (vsock_socket (read write create getattr setattr lock append map bind connect listen accept getopt setopt shutdown)))
 ;;* lmx 26 system/sepolicy/private/compos_fd_server.te
 
-(neverallow base_typeattr_330 compos_fd_server (process (transition)))
+(neverallow base_typeattr_333 compos_fd_server (process (transition)))
 ;;* lme
 
 ;;* lmx 27 system/sepolicy/private/compos_fd_server.te
 
-(neverallow base_typeattr_233 compos_fd_server (process (dyntransition)))
+(neverallow base_typeattr_236 compos_fd_server (process (dyntransition)))
 ;;* lme
 
 (allow compos_verify servicemanager (binder (call transfer)))
@@ -13068,12 +13126,12 @@
 (allow compos_verify odsign_devpts (chr_file (read write)))
 ;;* lmx 23 system/sepolicy/private/compos_verify.te
 
-(neverallow base_typeattr_331 compos_verify (process (transition)))
+(neverallow base_typeattr_334 compos_verify (process (transition)))
 ;;* lme
 
 ;;* lmx 24 system/sepolicy/private/compos_verify.te
 
-(neverallow base_typeattr_233 compos_verify (process (dyntransition)))
+(neverallow base_typeattr_236 compos_verify (process (dyntransition)))
 ;;* lme
 
 (allow init composd_exec (file (read getattr map execute open)))
@@ -13087,7 +13145,7 @@
 (allow composd compos_service (service_manager (add find)))
 ;;* lmx 7 system/sepolicy/private/composd.te
 
-(neverallow base_typeattr_330 compos_service (service_manager (add)))
+(neverallow base_typeattr_333 compos_service (service_manager (add)))
 ;;* lme
 
 (allow composd su (tcp_socket (read write accept getopt)))
@@ -13141,7 +13199,7 @@
 
 ;;* lmx 45 system/sepolicy/private/composd.te
 
-(neverallow base_typeattr_232 composd_vm_art_prop (property_service (set)))
+(neverallow base_typeattr_235 composd_vm_art_prop (property_service (set)))
 ;;* lme
 
 (allow coredomain apex_ready_prop (file (read getattr map open)))
@@ -13177,43 +13235,43 @@
 (allow coredomain default_prop (file (read getattr map open)))
 ;;* lmx 35 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_332 sysfs_leds (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_335 sysfs_leds (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 51 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_333 vendor_app_file (dir (read getattr open search)))
+(neverallow base_typeattr_336 vendor_app_file (dir (read getattr open search)))
 ;;* lme
 
 ;;* lmx 69 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_334 vendor_app_file (file (ioctl read getattr lock map open watch watch_reads)))
+(neverallow base_typeattr_337 vendor_app_file (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lme
 
 ;;* lmx 90 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_335 vendor_overlay_file (dir (read getattr open search)))
+(neverallow base_typeattr_338 vendor_overlay_file (dir (read getattr open search)))
 ;;* lme
 
 ;;* lmx 111 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_336 vendor_overlay_file (file (open)))
+(neverallow base_typeattr_339 vendor_overlay_file (file (open)))
 ;;* lme
 
 ;;* lmx 136 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_337 proc (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_340 proc (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 136 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_338 sysfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_341 sysfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 136 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_339 device (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_339 device (blk_file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_342 device (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_342 device (blk_file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 136 system/sepolicy/private/coredomain.te
@@ -13223,38 +13281,38 @@
 
 ;;* lmx 136 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_340 debugfs_tracing (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_343 debugfs_tracing (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 136 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_341 inotify (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_344 inotify (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 136 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_342 pstorefs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_345 pstorefs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 136 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_343 configfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_346 configfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 136 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_344 functionfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_347 functionfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 136 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_341 usbfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_341 binfmt_miscfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_344 usbfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_344 binfmt_miscfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 136 system/sepolicy/private/coredomain.te
 
-(neverallow base_typeattr_345 base_typeattr_346 (chr_file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_348 base_typeattr_349 (chr_file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 253 system/sepolicy/private/coredomain.te
@@ -13289,7 +13347,7 @@
 (dontaudit cppreopts postinstall_mnt_dir (dir (search)))
 (dontaudit crash_dump dev_type (chr_file (read write)))
 (dontaudit crash_dump devpts (chr_file (read write)))
-(allow crash_dump base_typeattr_347 (process (sigchld sigkill sigstop signal ptrace)))
+(allow crash_dump base_typeattr_350 (process (sigchld sigkill sigstop signal ptrace)))
 (allow crash_dump apexd (process (sigchld sigkill sigstop signal ptrace)))
 (allow crash_dump llkd (process (sigchld sigkill sigstop signal ptrace)))
 (allow crash_dump logd (process (sigchld sigkill sigstop signal ptrace)))
@@ -13351,7 +13409,7 @@
 
 ;;* lmx 140 system/sepolicy/private/crash_dump.te
 
-(neverallow crash_dump base_typeattr_348 (process (sigkill sigstop signal ptrace)))
+(neverallow crash_dump base_typeattr_351 (process (sigkill sigstop signal ptrace)))
 ;;* lme
 
 ;;* lmx 142 system/sepolicy/private/crash_dump.te
@@ -13382,7 +13440,7 @@
 (allow credstore credstore_service (service_manager (add find)))
 ;;* lmx 22 system/sepolicy/private/credstore.te
 
-(neverallow base_typeattr_349 credstore_service (service_manager (add)))
+(neverallow base_typeattr_352 credstore_service (service_manager (add)))
 ;;* lme
 
 (allow credstore su (tcp_socket (read write accept getopt)))
@@ -13399,32 +13457,32 @@
 (allow crosvm vm_manager_device_type (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
 ;;* lmx 40 system/sepolicy/private/credstore.te
 
-(neverallow base_typeattr_350 kvm_device (chr_file (getattr)))
+(neverallow base_typeattr_353 kvm_device (chr_file (getattr)))
 ;;* lme
 
 ;;* lmx 41 system/sepolicy/private/credstore.te
 
-(neverallow base_typeattr_351 kvm_device (chr_file (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_354 kvm_device (chr_file (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 42 system/sepolicy/private/credstore.te
 
-(neverallowx base_typeattr_352 kvm_device (ioctl chr_file ((range 0x0 0xadff) (range 0xaf00 0xffff))))
+(neverallowx base_typeattr_355 kvm_device (ioctl chr_file ((range 0x0 0xadff) (range 0xaf00 0xffff))))
 ;;* lme
 
 ;;* lmx 42 system/sepolicy/private/credstore.te
 
-(neverallowx base_typeattr_352 kvm_device (ioctl chr_file ((range 0xae00 0xae02) (range 0xae04 0xaeff))))
+(neverallowx base_typeattr_355 kvm_device (ioctl chr_file ((range 0xae00 0xae02) (range 0xae04 0xaeff))))
 ;;* lme
 
 ;;* lmx 47 system/sepolicy/private/credstore.te
 
-(neverallow base_typeattr_353 vm_manager_device_type (chr_file (getattr)))
+(neverallow base_typeattr_356 vm_manager_device_type (chr_file (getattr)))
 ;;* lme
 
 ;;* lmx 48 system/sepolicy/private/credstore.te
 
-(neverallow base_typeattr_354 vm_manager_device_type (chr_file (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_357 vm_manager_device_type (chr_file (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 (typetransition crosvm tmpfs file crosvm_tmpfs)
@@ -13499,22 +13557,22 @@
 (allow crosvm kmsg_debug_device (chr_file (write lock append map open)))
 ;;* lmx 189 system/sepolicy/private/credstore.te
 
-(neverallow crosvm base_typeattr_355 (file (open)))
+(neverallow crosvm base_typeattr_358 (file (open)))
 ;;* lme
 
 ;;* lmx 192 system/sepolicy/private/credstore.te
 
-(neverallow crosvm base_typeattr_356 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow crosvm base_typeattr_359 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 217 system/sepolicy/private/credstore.te
 
-(neverallow crosvm base_typeattr_357 (file (read)))
+(neverallow crosvm base_typeattr_360 (file (read)))
 ;;* lme
 
 ;;* lmx 228 system/sepolicy/private/credstore.te
 
-(neverallow base_typeattr_358 crosvm_exec (file (execute execute_no_trans)))
+(neverallow base_typeattr_361 crosvm_exec (file (execute execute_no_trans)))
 ;;* lme
 
 (allow init derive_classpath_exec (file (read getattr map execute open)))
@@ -13550,7 +13608,7 @@
 (allow derive_sdk module_sdkextensions_prop (file (read getattr map open)))
 ;;* lmx 13 system/sepolicy/private/derive_sdk.te
 
-(neverallow base_typeattr_359 module_sdkextensions_prop (property_service (set)))
+(neverallow base_typeattr_362 module_sdkextensions_prop (property_service (set)))
 ;;* lme
 
 (allow derive_sdk dumpstate (fd (use)))
@@ -13561,23 +13619,23 @@
 (dontaudit su device_as_webcam_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 4 system/sepolicy/private/device_as_webcam.te
 
-(neverallow base_typeattr_360 device_as_webcam_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_363 device_as_webcam_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow device_as_webcam appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 4 system/sepolicy/private/device_as_webcam.te
 
-(neverallow base_typeattr_361 base_typeattr_360 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_364 base_typeattr_363 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/device_as_webcam.te
 
-(neverallow base_typeattr_362 device_as_webcam (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_365 device_as_webcam (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/device_as_webcam.te
 
-(neverallow base_typeattr_363 device_as_webcam (process (ptrace)))
+(neverallow base_typeattr_366 device_as_webcam (process (ptrace)))
 ;;* lme
 
 (allow device_as_webcam system_app_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
@@ -13592,7 +13650,7 @@
 (dontaudit su dex2oat_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 5 system/sepolicy/private/dex2oat.te
 
-(neverallow base_typeattr_364 dex2oat_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_367 dex2oat_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow dex2oat apk_data_file (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -13663,7 +13721,7 @@
 (allow dexopt_chroot_setup dexopt_chroot_setup_service (service_manager (add find)))
 ;;* lmx 8 system/sepolicy/private/dexopt_chroot_setup.te
 
-(neverallow base_typeattr_365 dexopt_chroot_setup_service (service_manager (add)))
+(neverallow base_typeattr_368 dexopt_chroot_setup_service (service_manager (add)))
 ;;* lme
 
 (allow dexopt_chroot_setup su (tcp_socket (read write accept getopt)))
@@ -13685,7 +13743,7 @@
 (dontaudit su dexopt_chroot_setup_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 24 system/sepolicy/private/dexopt_chroot_setup.te
 
-(neverallow base_typeattr_365 dexopt_chroot_setup_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_368 dexopt_chroot_setup_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow dexopt_chroot_setup self (capability (sys_chroot sys_admin)))
@@ -13715,6 +13773,7 @@
 (allow dexopt_chroot_setup system_lib_file (dir (mounton)))
 (allow dexopt_chroot_setup linkerconfig_file (dir (mounton)))
 (allow dexopt_chroot_setup vendor_file (dir (mounton)))
+(allow dexopt_chroot_setup vendor_configs_file (dir (mounton)))
 (allow dexopt_chroot_setup metadata_file (dir (mounton)))
 (allow dexopt_chroot_setup system_data_root_file (dir (mounton)))
 (allow dexopt_chroot_setup system_data_file (dir (mounton)))
@@ -13767,24 +13826,24 @@
 (allow dexopt_chroot_setup snapshotctl_prop (property_service (set)))
 (allow dexopt_chroot_setup snapshotctl_prop (file (read getattr map open)))
 (allow dexopt_chroot_setup apk_data_file (dir (getattr search)))
-;;* lmx 142 system/sepolicy/private/dexopt_chroot_setup.te
+;;* lmx 143 system/sepolicy/private/dexopt_chroot_setup.te
 
-(neverallow dexopt_chroot_setup base_typeattr_292 (file (execute_no_trans)))
-;;* lme
-
-;;* lmx 145 system/sepolicy/private/dexopt_chroot_setup.te
-
-(neverallow base_typeattr_232 dexopt_chroot_setup (process (transition)))
+(neverallow dexopt_chroot_setup base_typeattr_295 (file (execute_no_trans)))
 ;;* lme
 
 ;;* lmx 146 system/sepolicy/private/dexopt_chroot_setup.te
 
-(neverallow base_typeattr_233 dexopt_chroot_setup (process (dyntransition)))
+(neverallow base_typeattr_235 dexopt_chroot_setup (process (transition)))
 ;;* lme
 
-;;* lmx 157 system/sepolicy/private/dexopt_chroot_setup.te
+;;* lmx 147 system/sepolicy/private/dexopt_chroot_setup.te
 
-(neverallow base_typeattr_366 pre_reboot_dexopt_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_236 dexopt_chroot_setup (process (dyntransition)))
+;;* lme
+
+;;* lmx 158 system/sepolicy/private/dexopt_chroot_setup.te
+
+(neverallow base_typeattr_369 pre_reboot_dexopt_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 (allow init dhcp_exec (file (read getattr map execute open)))
@@ -13827,7 +13886,7 @@
 (allow display_service_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 1 system/sepolicy/private/display_service_server.te
 
-(neverallow base_typeattr_367 fwk_display_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_370 fwk_display_hwservice (hwservice_manager (add)))
 ;;* lme
 
 (allow init dmesgd_exec (file (read getattr map execute open)))
@@ -13867,7 +13926,7 @@
 (allow dnsmasq netd (udp_socket (read write)))
 (allow domain init (process (sigchld)))
 (allow domain self (process (fork sigchld sigkill sigstop signull signal getsched setsched getsession getpgid getcap setcap getattr setrlimit)))
-(allow base_typeattr_368 self (process (setpgid)))
+(allow base_typeattr_371 self (process (setpgid)))
 (allow domain self (fd (use)))
 (allow domain proc (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow domain proc_net_type (dir (search)))
@@ -13882,7 +13941,7 @@
 (allow domain su (fd (use)))
 (allow domain su (unix_stream_socket (read write getattr getopt shutdown connectto)))
 (allow domain su (unix_dgram_socket (sendto)))
-(allow base_typeattr_232 su (binder (call transfer)))
+(allow base_typeattr_235 su (binder (call transfer)))
 (allow domain su (fifo_file (write getattr)))
 (allow domain su (process (sigchld)))
 (allow domain coredump_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
@@ -13901,15 +13960,15 @@
 (allow domain zero_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
 (allow domain ashmem_device (chr_file (ioctl read write getattr lock append map)))
 (allow domain ashmem_libcutils_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
-(allow base_typeattr_369 binder_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
-(allow base_typeattr_369 servicemanager_prop (file (read getattr map open)))
+(allow base_typeattr_372 binder_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
+(allow base_typeattr_372 servicemanager_prop (file (read getattr map open)))
 (dontaudit domain hwservicemanager_exec (file (ioctl read getattr lock map open watch watch_reads)))
 (allowx domain binder_device (ioctl chr_file (0x6201 0x6203 (range 0x6205 0x6209) (range 0x620b 0x620d) (range 0x6210 0x6211))))
 (allow domain binderfs (dir (getattr search)))
 (allow domain binderfs_logs_proc (dir (search)))
 (allow domain binderfs_features (dir (search)))
 (allow domain binderfs_features (file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_370 hwbinder_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
+(allow base_typeattr_373 hwbinder_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
 (allow domain ptmx_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
 (allow domain random_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
 (allow domain proc_random (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -13944,16 +14003,16 @@
 (allow coredomain system_file (file (read getattr map execute open)))
 (allow domain vendor_hal_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow domain same_process_hal_file (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_226 same_process_hal_file (file (read getattr map execute open)))
+(allow base_typeattr_229 same_process_hal_file (file (read getattr map execute open)))
 (allow domain vndk_sp_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow domain vndk_sp_file (file (read getattr map execute open)))
 (allow domain vendor_configs_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow domain vendor_configs_file (file (read getattr map open)))
 (allow domain vendor_file_type (lnk_file (read getattr open)))
 (allow domain vendor_file (dir (getattr search)))
-(allow base_typeattr_226 vendor_file_type (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_226 vendor_file_type (file (read getattr map execute open)))
-(allow base_typeattr_226 vendor_file_type (lnk_file (read getattr)))
+(allow base_typeattr_229 vendor_file_type (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_229 vendor_file_type (file (read getattr map execute open)))
+(allow base_typeattr_229 vendor_file_type (lnk_file (read getattr)))
 (allow domain sysfs (lnk_file (read getattr)))
 (allow domain system_zoneinfo_file (file (ioctl read getattr lock map open watch watch_reads)))
 (allow domain system_zoneinfo_file (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -14038,37 +14097,37 @@
 (allowx domain dev_type (ioctl blk_file (0x1268 0x1272)))
 (allowx domain file_type (ioctl file ((range 0xf501 0xf502) 0xf505 (range 0xf50c 0xf50e))))
 (allowx domain sdcard_type (ioctl file ((range 0xf501 0xf502) 0xf505 (range 0xf50c 0xf50e))))
-(allow base_typeattr_371 hwservice_manager_type (hwservice_manager (add find)))
-(allow base_typeattr_371 vndservice_manager_type (service_manager (add find)))
+(allow base_typeattr_374 hwservice_manager_type (hwservice_manager (add find)))
+(allow base_typeattr_374 vndservice_manager_type (service_manager (add find)))
 (allow domain apex_mnt_dir (dir (getattr search)))
 (allow domain apex_mnt_dir (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow domain sysfs_pgsize_migration (dir (search)))
 (allow domain sysfs_pgsize_migration (file (ioctl read getattr lock map open watch watch_reads)))
 (allow domain bionic_linker_16kb_app_compat_prop (file (read getattr map open)))
 (allow domain device_config_media_native_prop (file (read getattr map open)))
-(allow base_typeattr_296 crash_dump_exec (file (read getattr map execute open)))
-(allow base_typeattr_296 crash_dump (process (transition)))
+(allow base_typeattr_299 crash_dump_exec (file (read getattr map execute open)))
+(allow base_typeattr_299 crash_dump (process (transition)))
 (allow crash_dump crash_dump_exec (file (read getattr map execute open entrypoint)))
-(allow crash_dump base_typeattr_296 (process (sigchld)))
-(dontaudit base_typeattr_296 crash_dump (process (noatsecure)))
-(allow base_typeattr_296 crash_dump (process (siginh rlimitinh)))
-(typetransition base_typeattr_296 crash_dump_exec process crash_dump)
+(allow crash_dump base_typeattr_299 (process (sigchld)))
+(dontaudit base_typeattr_299 crash_dump (process (noatsecure)))
+(allow base_typeattr_299 crash_dump (process (siginh rlimitinh)))
+(typetransition base_typeattr_299 crash_dump_exec process crash_dump)
 (allow domain crash_dump (process (sigchld)))
 (allow domain heapprofd_prop (file (read getattr map open)))
-(allow heapprofd base_typeattr_372 (process (signal)))
-(allow base_typeattr_372 heapprofd_socket (sock_file (write)))
-(allow base_typeattr_372 heapprofd (unix_stream_socket (connectto)))
-(allow heapprofd base_typeattr_372 (fd (use)))
-(allow base_typeattr_372 heapprofd_tmpfs (file (read write getattr map)))
-(allow base_typeattr_372 heapprofd (fd (use)))
-(allow heapprofd base_typeattr_372 (file (ioctl read write getattr lock append map open watch watch_reads)))
-(allow heapprofd base_typeattr_372 (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow traced_perf base_typeattr_373 (file (ioctl read getattr lock map open watch watch_reads)))
-(allow traced_perf base_typeattr_373 (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow traced_perf base_typeattr_373 (process (signal)))
-(allow base_typeattr_373 traced_perf_socket (sock_file (write)))
-(allow base_typeattr_373 traced_perf (unix_stream_socket (connectto)))
-(allow traced_perf base_typeattr_373 (fd (use)))
+(allow heapprofd base_typeattr_375 (process (signal)))
+(allow base_typeattr_375 heapprofd_socket (sock_file (write)))
+(allow base_typeattr_375 heapprofd (unix_stream_socket (connectto)))
+(allow heapprofd base_typeattr_375 (fd (use)))
+(allow base_typeattr_375 heapprofd_tmpfs (file (read write getattr map)))
+(allow base_typeattr_375 heapprofd (fd (use)))
+(allow heapprofd base_typeattr_375 (file (ioctl read write getattr lock append map open watch watch_reads)))
+(allow heapprofd base_typeattr_375 (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow traced_perf base_typeattr_376 (file (ioctl read getattr lock map open watch watch_reads)))
+(allow traced_perf base_typeattr_376 (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow traced_perf base_typeattr_376 (process (signal)))
+(allow base_typeattr_376 traced_perf_socket (sock_file (write)))
+(allow base_typeattr_376 traced_perf (unix_stream_socket (connectto)))
+(allow traced_perf base_typeattr_376 (fd (use)))
 (allow domain sysfs_fs_incfs_features (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow domain sysfs_fs_incfs_features (file (ioctl read getattr lock map open watch watch_reads)))
 (allow domain sysfs_fs_incfs_features (lnk_file (ioctl read getattr lock map open watch watch_reads)))
@@ -14076,11 +14135,11 @@
 (allow domain sysfs_fs_fuse_features (file (ioctl read getattr lock map open watch watch_reads)))
 (allow domain sysfs_fs_fuse_features (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow domain cgroup (dir (search)))
-(allow base_typeattr_374 cgroup (dir (write lock open add_name remove_name search)))
-(allow base_typeattr_374 cgroup (file (write lock append map open)))
+(allow base_typeattr_377 cgroup (dir (write lock open add_name remove_name search)))
+(allow base_typeattr_377 cgroup (file (write lock append map open)))
 (allow domain cgroup_v2 (dir (search)))
-(allow base_typeattr_374 cgroup_v2 (dir (write lock open add_name remove_name search)))
-(allow base_typeattr_374 cgroup_v2 (file (write lock append map open)))
+(allow base_typeattr_377 cgroup_v2 (dir (write lock open add_name remove_name search)))
+(allow base_typeattr_377 cgroup_v2 (file (write lock append map open)))
 (allow domain cgroup_desc_file (file (ioctl read getattr lock map open watch watch_reads)))
 (allow domain cgroup_rc_file (dir (search)))
 (allow domain cgroup_rc_file (file (ioctl read getattr lock map open watch watch_reads)))
@@ -14110,7 +14169,7 @@
 (allow shell userspace_reboot_log_prop (file (read getattr map open)))
 (allow coredomain userspace_reboot_test_prop (file (read getattr map open)))
 (allow shell userspace_reboot_test_prop (file (read getattr map open)))
-(allow base_typeattr_375 vendor_default_prop (file (read getattr map open)))
+(allow base_typeattr_378 vendor_default_prop (file (read getattr map open)))
 (allow domain aaudio_config_prop (file (read getattr map open)))
 (allow domain apexd_select_prop (file (read getattr map open)))
 (allow domain arm64_memtag_prop (file (read getattr map open)))
@@ -14141,7 +14200,7 @@
 (allow domain surfaceflinger_prop (file (read getattr map open)))
 (allow domain telephony_status_prop (file (read getattr map open)))
 (allow domain timezone_prop (file (read getattr map open)))
-(allow base_typeattr_376 userdebug_or_eng_prop (file (read getattr map open)))
+(allow base_typeattr_379 userdebug_or_eng_prop (file (read getattr map open)))
 (allow domain vendor_socket_hook_prop (file (read getattr map open)))
 (allow domain vndk_prop (file (read getattr map open)))
 (allow domain vold_status_prop (file (read getattr map open)))
@@ -14151,12 +14210,12 @@
 (allow domain binder_cache_telephony_server_prop (file (read getattr map open)))
 ;;* lmx 523 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_377 binderfs_logs_transactions (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_380 binderfs_logs_transactions (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 527 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_377 binderfs_logs_transaction_history (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_380 binderfs_logs_transaction_history (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow domain kernel (key (search)))
@@ -14167,8 +14226,8 @@
 (allow domain log_file_logger_prop (file (read getattr map open)))
 (allow domain prng_seeder_socket (sock_file (write)))
 (allow domain prng_seeder (unix_stream_socket (connectto)))
-(allow base_typeattr_378 shell_exec (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
-(allow base_typeattr_378 toolbox_exec (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
+(allow base_typeattr_381 shell_exec (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
+(allow base_typeattr_381 toolbox_exec (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
 (allow domain aconfig_storage_metadata_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow domain aconfig_storage_metadata_file (file (ioctl read getattr lock map open watch watch_reads)))
 (allow domain aconfig_storage_metadata_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
@@ -14181,69 +14240,69 @@
 (allow domain metadata_file (dir (search)))
 ;;* lmx 602 system/sepolicy/private/domain.te
 
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl file (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl dir (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl lnk_file (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl blk_file (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl sock_file (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl fifo_file (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl tcp_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl udp_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl rawip_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl packet_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl key_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl unix_stream_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl unix_dgram_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_route_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_tcpdiag_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_nflog_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_xfrm_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_selinux_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_audit_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_dnrt_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_kobject_uevent_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl appletalk_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl tun_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_iscsi_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_fib_lookup_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_connector_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_netfilter_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_generic_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_scsitransport_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_rdma_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netlink_crypto_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl sctp_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl icmp_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl ax25_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl ipx_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl netrom_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl atmpvc_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl x25_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl rose_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl decnet_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl atmsvc_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl rds_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl irda_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl pppox_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl llc_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl can_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl tipc_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl bluetooth_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl iucv_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl rxrpc_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl isdn_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl phonet_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl ieee802154_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl caif_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl alg_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl nfc_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl vsock_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl kcm_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl qipcrtr_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl smc_socket (0x0)))
-(neverallowx base_typeattr_233 base_typeattr_233 (ioctl xdp_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl file (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl dir (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl lnk_file (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl blk_file (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl sock_file (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl fifo_file (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl tcp_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl udp_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl rawip_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl packet_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl key_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl unix_stream_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl unix_dgram_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_route_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_tcpdiag_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_nflog_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_xfrm_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_selinux_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_audit_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_dnrt_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_kobject_uevent_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl appletalk_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl tun_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_iscsi_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_fib_lookup_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_connector_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_netfilter_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_generic_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_scsitransport_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_rdma_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netlink_crypto_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl sctp_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl icmp_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl ax25_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl ipx_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl netrom_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl atmpvc_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl x25_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl rose_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl decnet_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl atmsvc_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl rds_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl irda_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl pppox_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl llc_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl can_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl tipc_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl bluetooth_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl iucv_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl rxrpc_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl isdn_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl phonet_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl ieee802154_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl caif_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl alg_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl nfc_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl vsock_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl kcm_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl qipcrtr_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl smc_socket (0x0)))
+(neverallowx base_typeattr_236 base_typeattr_236 (ioctl xdp_socket (0x0)))
 ;;* lme
 
 ;;* lmx 606 system/sepolicy/private/domain.te
@@ -14309,139 +14368,139 @@
 
 ;;* lmx 611 system/sepolicy/private/domain.te
 
-(neverallowx base_typeattr_233 devpts (ioctl chr_file (0x5412)))
+(neverallowx base_typeattr_236 devpts (ioctl chr_file (0x5412)))
 ;;* lme
 
 ;;* lmx 614 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_379 unlabeled (file (create)))
-(neverallow base_typeattr_379 unlabeled (dir (create)))
-(neverallow base_typeattr_379 unlabeled (lnk_file (create)))
-(neverallow base_typeattr_379 unlabeled (chr_file (create)))
-(neverallow base_typeattr_379 unlabeled (blk_file (create)))
-(neverallow base_typeattr_379 unlabeled (sock_file (create)))
-(neverallow base_typeattr_379 unlabeled (fifo_file (create)))
+(neverallow base_typeattr_382 unlabeled (file (create)))
+(neverallow base_typeattr_382 unlabeled (dir (create)))
+(neverallow base_typeattr_382 unlabeled (lnk_file (create)))
+(neverallow base_typeattr_382 unlabeled (chr_file (create)))
+(neverallow base_typeattr_382 unlabeled (blk_file (create)))
+(neverallow base_typeattr_382 unlabeled (sock_file (create)))
+(neverallow base_typeattr_382 unlabeled (fifo_file (create)))
 ;;* lme
 
 ;;* lmx 623 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_380 self (capability (mknod)))
-(neverallow base_typeattr_380 self (cap_userns (mknod)))
+(neverallow base_typeattr_383 self (capability (mknod)))
+(neverallow base_typeattr_383 self (cap_userns (mknod)))
 ;;* lme
 
 ;;* lmx 626 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 self (memprotect (mmap_zero)))
+(neverallow base_typeattr_236 self (memprotect (mmap_zero)))
 ;;* lme
 
 ;;* lmx 629 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 self (capability2 (mac_override)))
-(neverallow base_typeattr_233 self (cap2_userns (mac_override)))
+(neverallow base_typeattr_236 self (capability2 (mac_override)))
+(neverallow base_typeattr_236 self (cap2_userns (mac_override)))
 ;;* lme
 
 ;;* lmx 634 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 self (capability2 (mac_admin)))
-(neverallow base_typeattr_233 self (cap2_userns (mac_admin)))
+(neverallow base_typeattr_236 self (capability2 (mac_admin)))
+(neverallow base_typeattr_236 self (cap2_userns (mac_admin)))
 ;;* lme
 
 ;;* lmx 638 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 kernel (security (load_policy)))
+(neverallow base_typeattr_236 kernel (security (load_policy)))
 ;;* lme
 
 ;;* lmx 644 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 kernel (security (setenforce)))
+(neverallow base_typeattr_236 kernel (security (setenforce)))
 ;;* lme
 
 ;;* lmx 645 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_381 kernel (security (setcheckreqprot)))
+(neverallow base_typeattr_384 kernel (security (setcheckreqprot)))
 ;;* lme
 
 ;;* lmx 648 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 kernel (security (setbool)))
+(neverallow base_typeattr_236 kernel (security (setbool)))
 ;;* lme
 
 ;;* lmx 653 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 kernel (security (setsecparam)))
+(neverallow base_typeattr_235 kernel (security (setsecparam)))
 ;;* lme
 
 ;;* lmx 661 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_382 hw_random_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_385 hw_random_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 667 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_383 keychord_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_386 keychord_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 670 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 base_typeattr_384 (file (entrypoint)))
+(neverallow base_typeattr_236 base_typeattr_387 (file (entrypoint)))
 ;;* lme
 
 (dontaudit domain postinstall_mnt_dir (dir (audit_access)))
 ;;* lmx 682 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_383 port_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_386 port_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 683 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 port_device (chr_file (ioctl read write lock relabelfrom append map link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_236 port_device (chr_file (ioctl read write lock relabelfrom append map link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 686 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 usermodehelper (file (write append)))
+(neverallow base_typeattr_235 usermodehelper (file (write append)))
 ;;* lme
 
 ;;* lmx 687 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_385 sysfs_usermodehelper (file (write append)))
+(neverallow base_typeattr_388 sysfs_usermodehelper (file (write append)))
 ;;* lme
 
 ;;* lmx 688 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_227 proc_security (file (read write append open)))
+(neverallow base_typeattr_230 proc_security (file (read write append open)))
 ;;* lme
 
 ;;* lmx 692 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 init (binder (impersonate call set_context_mgr transfer)))
+(neverallow base_typeattr_236 init (binder (impersonate call set_context_mgr transfer)))
 ;;* lme
 
 ;;* lmx 693 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 vendor_init (binder (impersonate call set_context_mgr transfer)))
+(neverallow base_typeattr_236 vendor_init (binder (impersonate call set_context_mgr transfer)))
 ;;* lme
 
 ;;* lmx 696 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_386 binderfs_logs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_386 binderfs_logs_proc (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_389 binderfs_logs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_389 binderfs_logs_proc (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 697 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_377 binderfs_logs_stats (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_380 binderfs_logs_stats (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 701 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_387 block_device (blk_file (read write open)))
+(neverallow base_typeattr_390 block_device (blk_file (read write open)))
 ;;* lme
 
 ;;* lmx 706 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 base_typeattr_233 (chr_file (rename)))
-(neverallow base_typeattr_233 base_typeattr_233 (blk_file (rename)))
+(neverallow base_typeattr_236 base_typeattr_236 (chr_file (rename)))
+(neverallow base_typeattr_236 base_typeattr_236 (blk_file (rename)))
 ;;* lme
 
 ;;* lmx 710 system/sepolicy/private/domain.te
@@ -14459,12 +14518,12 @@
 
 ;;* lmx 716 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_381 nativetest_data_file (file (write create setattr relabelfrom append unlink link rename)))
-(neverallow base_typeattr_381 nativetest_data_file (lnk_file (write create setattr relabelfrom append unlink link rename)))
-(neverallow base_typeattr_381 nativetest_data_file (chr_file (write create setattr relabelfrom append unlink link rename)))
-(neverallow base_typeattr_381 nativetest_data_file (blk_file (write create setattr relabelfrom append unlink link rename)))
-(neverallow base_typeattr_381 nativetest_data_file (sock_file (write create setattr relabelfrom append unlink link rename)))
-(neverallow base_typeattr_381 nativetest_data_file (fifo_file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_384 nativetest_data_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_384 nativetest_data_file (lnk_file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_384 nativetest_data_file (chr_file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_384 nativetest_data_file (blk_file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_384 nativetest_data_file (sock_file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_384 nativetest_data_file (fifo_file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 717 system/sepolicy/private/domain.te
@@ -14474,27 +14533,27 @@
 
 ;;* lmx 718 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_388 nativetest_data_file (file (execute execute_no_trans)))
+(neverallow base_typeattr_391 nativetest_data_file (file (execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 720 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_389 shell_test_data_file (file (write create setattr relabelfrom append unlink link rename)))
-(neverallow base_typeattr_389 shell_test_data_file (lnk_file (write create setattr relabelfrom append unlink link rename)))
-(neverallow base_typeattr_389 shell_test_data_file (chr_file (write create setattr relabelfrom append unlink link rename)))
-(neverallow base_typeattr_389 shell_test_data_file (blk_file (write create setattr relabelfrom append unlink link rename)))
-(neverallow base_typeattr_389 shell_test_data_file (sock_file (write create setattr relabelfrom append unlink link rename)))
-(neverallow base_typeattr_389 shell_test_data_file (fifo_file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_392 shell_test_data_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_392 shell_test_data_file (lnk_file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_392 shell_test_data_file (chr_file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_392 shell_test_data_file (blk_file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_392 shell_test_data_file (sock_file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_392 shell_test_data_file (fifo_file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 721 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_389 shell_test_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_392 shell_test_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 722 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_390 shell_test_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_393 shell_test_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 723 system/sepolicy/private/domain.te
@@ -14504,32 +14563,32 @@
 
 ;;* lmx 724 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_389 shell_test_data_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_392 shell_test_data_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 727 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 property_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_235 property_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 728 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 property_data_file (file (write create setattr relabelfrom append unlink link rename execute execute_no_trans)))
+(neverallow base_typeattr_235 property_data_file (file (write create setattr relabelfrom append unlink link rename execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 729 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 property_type (file (write create setattr relabelfrom append unlink link rename execute execute_no_trans)))
+(neverallow base_typeattr_235 property_type (file (write create setattr relabelfrom append unlink link rename execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 730 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 properties_device (file (write create setattr relabelfrom append unlink link rename execute execute_no_trans)))
+(neverallow base_typeattr_235 properties_device (file (write create setattr relabelfrom append unlink link rename execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 731 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 properties_serial (file (write create setattr relabelfrom append unlink link rename execute execute_no_trans)))
+(neverallow base_typeattr_235 properties_serial (file (write create setattr relabelfrom append unlink link rename execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 745 system/sepolicy/private/domain.te
@@ -14559,59 +14618,59 @@
 
 ;;* lmx 747 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_381 exec_type (file (relabelto)))
-(neverallow base_typeattr_381 exec_type (dir (relabelto)))
-(neverallow base_typeattr_381 exec_type (lnk_file (relabelto)))
-(neverallow base_typeattr_381 exec_type (chr_file (relabelto)))
-(neverallow base_typeattr_381 exec_type (blk_file (relabelto)))
-(neverallow base_typeattr_381 exec_type (sock_file (relabelto)))
-(neverallow base_typeattr_381 exec_type (fifo_file (relabelto)))
-(neverallow base_typeattr_381 system_file_type (file (relabelto)))
-(neverallow base_typeattr_381 system_file_type (dir (relabelto)))
-(neverallow base_typeattr_381 system_file_type (lnk_file (relabelto)))
-(neverallow base_typeattr_381 system_file_type (chr_file (relabelto)))
-(neverallow base_typeattr_381 system_file_type (blk_file (relabelto)))
-(neverallow base_typeattr_381 system_file_type (sock_file (relabelto)))
-(neverallow base_typeattr_381 system_file_type (fifo_file (relabelto)))
-(neverallow base_typeattr_381 vendor_file_type (file (relabelto)))
-(neverallow base_typeattr_381 vendor_file_type (dir (relabelto)))
-(neverallow base_typeattr_381 vendor_file_type (lnk_file (relabelto)))
-(neverallow base_typeattr_381 vendor_file_type (chr_file (relabelto)))
-(neverallow base_typeattr_381 vendor_file_type (blk_file (relabelto)))
-(neverallow base_typeattr_381 vendor_file_type (sock_file (relabelto)))
-(neverallow base_typeattr_381 vendor_file_type (fifo_file (relabelto)))
+(neverallow base_typeattr_384 exec_type (file (relabelto)))
+(neverallow base_typeattr_384 exec_type (dir (relabelto)))
+(neverallow base_typeattr_384 exec_type (lnk_file (relabelto)))
+(neverallow base_typeattr_384 exec_type (chr_file (relabelto)))
+(neverallow base_typeattr_384 exec_type (blk_file (relabelto)))
+(neverallow base_typeattr_384 exec_type (sock_file (relabelto)))
+(neverallow base_typeattr_384 exec_type (fifo_file (relabelto)))
+(neverallow base_typeattr_384 system_file_type (file (relabelto)))
+(neverallow base_typeattr_384 system_file_type (dir (relabelto)))
+(neverallow base_typeattr_384 system_file_type (lnk_file (relabelto)))
+(neverallow base_typeattr_384 system_file_type (chr_file (relabelto)))
+(neverallow base_typeattr_384 system_file_type (blk_file (relabelto)))
+(neverallow base_typeattr_384 system_file_type (sock_file (relabelto)))
+(neverallow base_typeattr_384 system_file_type (fifo_file (relabelto)))
+(neverallow base_typeattr_384 vendor_file_type (file (relabelto)))
+(neverallow base_typeattr_384 vendor_file_type (dir (relabelto)))
+(neverallow base_typeattr_384 vendor_file_type (lnk_file (relabelto)))
+(neverallow base_typeattr_384 vendor_file_type (chr_file (relabelto)))
+(neverallow base_typeattr_384 vendor_file_type (blk_file (relabelto)))
+(neverallow base_typeattr_384 vendor_file_type (sock_file (relabelto)))
+(neverallow base_typeattr_384 vendor_file_type (fifo_file (relabelto)))
 ;;* lme
 
 ;;* lmx 750 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 exec_type (file (mounton)))
-(neverallow base_typeattr_233 exec_type (dir (mounton)))
-(neverallow base_typeattr_233 exec_type (lnk_file (mounton)))
-(neverallow base_typeattr_233 exec_type (chr_file (mounton)))
-(neverallow base_typeattr_233 exec_type (blk_file (mounton)))
-(neverallow base_typeattr_233 exec_type (sock_file (mounton)))
-(neverallow base_typeattr_233 exec_type (fifo_file (mounton)))
+(neverallow base_typeattr_236 exec_type (file (mounton)))
+(neverallow base_typeattr_236 exec_type (dir (mounton)))
+(neverallow base_typeattr_236 exec_type (lnk_file (mounton)))
+(neverallow base_typeattr_236 exec_type (chr_file (mounton)))
+(neverallow base_typeattr_236 exec_type (blk_file (mounton)))
+(neverallow base_typeattr_236 exec_type (sock_file (mounton)))
+(neverallow base_typeattr_236 exec_type (fifo_file (mounton)))
 ;;* lme
 
 ;;* lmx 753 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 rootfs (file (write create setattr relabelto append unlink link rename)))
+(neverallow base_typeattr_236 rootfs (file (write create setattr relabelto append unlink link rename)))
 ;;* lme
 
 ;;* lmx 757 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 base_typeattr_391 (filesystem (relabelto)))
+(neverallow base_typeattr_236 base_typeattr_394 (filesystem (relabelto)))
 ;;* lme
 
 ;;* lmx 763 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 contextmount_type (file (create setattr relabelfrom relabelto append link rename)))
-(neverallow base_typeattr_233 contextmount_type (dir (create setattr relabelfrom relabelto append link rename)))
-(neverallow base_typeattr_233 contextmount_type (lnk_file (create setattr relabelfrom relabelto append link rename)))
-(neverallow base_typeattr_233 contextmount_type (chr_file (create setattr relabelfrom relabelto append link rename)))
-(neverallow base_typeattr_233 contextmount_type (blk_file (create setattr relabelfrom relabelto append link rename)))
-(neverallow base_typeattr_233 contextmount_type (sock_file (create setattr relabelfrom relabelto append link rename)))
-(neverallow base_typeattr_233 contextmount_type (fifo_file (create setattr relabelfrom relabelto append link rename)))
+(neverallow base_typeattr_236 contextmount_type (file (create setattr relabelfrom relabelto append link rename)))
+(neverallow base_typeattr_236 contextmount_type (dir (create setattr relabelfrom relabelto append link rename)))
+(neverallow base_typeattr_236 contextmount_type (lnk_file (create setattr relabelfrom relabelto append link rename)))
+(neverallow base_typeattr_236 contextmount_type (chr_file (create setattr relabelfrom relabelto append link rename)))
+(neverallow base_typeattr_236 contextmount_type (blk_file (create setattr relabelfrom relabelto append link rename)))
+(neverallow base_typeattr_236 contextmount_type (sock_file (create setattr relabelfrom relabelto append link rename)))
+(neverallow base_typeattr_236 contextmount_type (fifo_file (create setattr relabelfrom relabelto append link rename)))
 ;;* lme
 
 ;;* lmx 764 system/sepolicy/private/domain.te
@@ -14627,123 +14686,123 @@
 
 ;;* lmx 771 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 default_android_service (service_manager (add find list)))
+(neverallow base_typeattr_236 default_android_service (service_manager (add find list)))
 ;;* lme
 
 ;;* lmx 772 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 default_android_vndservice (service_manager (add find list)))
+(neverallow base_typeattr_236 default_android_vndservice (service_manager (add find list)))
 ;;* lme
 
 ;;* lmx 773 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 default_android_hwservice (hwservice_manager (add find list)))
+(neverallow base_typeattr_236 default_android_hwservice (hwservice_manager (add find list)))
 ;;* lme
 
 ;;* lmx 782 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 hidl_base_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_236 hidl_base_hwservice (hwservice_manager (find)))
 ;;* lme
 
 ;;* lmx 786 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_227 mmc_prop (property_service (set)))
+(neverallow base_typeattr_230 mmc_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 787 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_227 vndk_prop (property_service (set)))
+(neverallow base_typeattr_230 vndk_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 789 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 mmc_prop (property_service (set)))
+(neverallow base_typeattr_235 mmc_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 789 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_227 exported_default_prop (property_service (set)))
+(neverallow base_typeattr_230 exported_default_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 789 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 exported_secure_prop (property_service (set)))
+(neverallow base_typeattr_235 exported_secure_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 789 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_227 vendor_default_prop (property_service (set)))
+(neverallow base_typeattr_230 vendor_default_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 789 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_227 storage_config_prop (property_service (set)))
+(neverallow base_typeattr_230 storage_config_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 789 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_227 hw_timeout_multiplier_prop (property_service (set)))
+(neverallow base_typeattr_230 hw_timeout_multiplier_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 798 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_392 exported_pm_prop (property_service (set)))
+(neverallow base_typeattr_395 exported_pm_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 798 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_393 exported_pm_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_396 exported_pm_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 804 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_394 future_pm_prop (property_service (set)))
+(neverallow base_typeattr_397 future_pm_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 805 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_394 future_pm_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_397 future_pm_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (dontaudit domain future_pm_prop (file (read)))
 ;;* lmx 811 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 aac_drc_prop (property_service (set)))
+(neverallow base_typeattr_235 aac_drc_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 812 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 build_prop (property_service (set)))
+(neverallow base_typeattr_235 build_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 813 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 userdebug_or_eng_prop (property_service (set)))
+(neverallow base_typeattr_235 userdebug_or_eng_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 835 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_395 serialno_prop (file (ioctl read getattr lock map open watch watch_reads)))
+(neverallow base_typeattr_398 serialno_prop (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lme
 
 ;;* lmx 843 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_396 frp_block_device (blk_file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_399 frp_block_device (blk_file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 857 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_397 metadata_block_device (blk_file (ioctl read write lock append link rename open)))
+(neverallow base_typeattr_400 metadata_block_device (blk_file (ioctl read write lock append link rename open)))
 ;;* lme
 
 ;;* lmx 868 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_398 system_block_device (blk_file (write append)))
+(neverallow base_typeattr_401 system_block_device (blk_file (write append)))
 ;;* lme
 
 ;;* lmx 871 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_399 base_typeattr_233 (binder (set_context_mgr)))
+(neverallow base_typeattr_402 base_typeattr_236 (binder (set_context_mgr)))
 ;;* lme
 
 ;;* lmx 873 system/sepolicy/private/domain.te
@@ -14778,12 +14837,12 @@
 
 ;;* lmx 880 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_400 base_typeattr_401 (service_manager (find)))
+(neverallow base_typeattr_403 base_typeattr_404 (service_manager (find)))
 ;;* lme
 
 ;;* lmx 917 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_402 vndbinder_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
+(neverallow base_typeattr_405 vndbinder_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
 ;;* lme
 
 ;;* lmx 925 system/sepolicy/private/domain.te
@@ -14793,130 +14852,130 @@
 
 ;;* lmx 928 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_403 vndservice_manager_type (service_manager (add find list)))
+(neverallow base_typeattr_406 vndservice_manager_type (service_manager (add find list)))
 ;;* lme
 
 ;;* lmx 935 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_403 vndservicemanager (binder (impersonate call set_context_mgr transfer)))
+(neverallow base_typeattr_406 vndservicemanager (binder (impersonate call set_context_mgr transfer)))
 ;;* lme
 
 ;;* lmx 952 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_404 base_typeattr_405 (socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (tcp_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (udp_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (rawip_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (packet_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (key_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (unix_stream_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (unix_dgram_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_route_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_tcpdiag_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_nflog_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_xfrm_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_selinux_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_audit_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_dnrt_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_kobject_uevent_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (appletalk_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (tun_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_iscsi_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_fib_lookup_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_connector_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_netfilter_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_generic_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_scsitransport_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_rdma_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netlink_crypto_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (sctp_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (icmp_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (ax25_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (ipx_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (netrom_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (atmpvc_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (x25_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (rose_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (decnet_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (atmsvc_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (rds_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (irda_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (pppox_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (llc_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (can_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (tipc_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (bluetooth_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (iucv_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (rxrpc_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (isdn_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (phonet_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (ieee802154_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (caif_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (alg_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (nfc_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (vsock_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (kcm_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (qipcrtr_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (smc_socket (connect sendto)))
-(neverallow base_typeattr_404 base_typeattr_405 (xdp_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (tcp_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (udp_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (rawip_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (packet_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (key_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (unix_stream_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (unix_dgram_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_route_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_tcpdiag_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_nflog_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_xfrm_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_selinux_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_audit_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_dnrt_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_kobject_uevent_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (appletalk_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (tun_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_iscsi_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_fib_lookup_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_connector_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_netfilter_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_generic_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_scsitransport_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_rdma_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netlink_crypto_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (sctp_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (icmp_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (ax25_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (ipx_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (netrom_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (atmpvc_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (x25_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (rose_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (decnet_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (atmsvc_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (rds_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (irda_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (pppox_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (llc_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (can_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (tipc_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (bluetooth_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (iucv_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (rxrpc_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (isdn_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (phonet_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (ieee802154_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (caif_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (alg_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (nfc_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (vsock_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (kcm_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (qipcrtr_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (smc_socket (connect sendto)))
+(neverallow base_typeattr_407 base_typeattr_408 (xdp_socket (connect sendto)))
 ;;* lme
 
 ;;* lmx 952 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_404 base_typeattr_405 (unix_stream_socket (connectto)))
+(neverallow base_typeattr_407 base_typeattr_408 (unix_stream_socket (connectto)))
 ;;* lme
 
 ;;* lmx 965 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_406 core_data_file_type (sock_file (create setattr lock relabelfrom relabelto map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_406 coredomain_socket (sock_file (create setattr lock relabelfrom relabelto map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_406 unlabeled (sock_file (create setattr lock relabelfrom relabelto map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_409 core_data_file_type (sock_file (create setattr lock relabelfrom relabelto map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_409 coredomain_socket (sock_file (create setattr lock relabelfrom relabelto map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_409 unlabeled (sock_file (create setattr lock relabelfrom relabelto map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 979 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_400 base_typeattr_407 (sock_file (create setattr lock relabelfrom relabelto map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_403 base_typeattr_410 (sock_file (create setattr lock relabelfrom relabelto map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 995 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_408 base_typeattr_409 (sock_file (create setattr lock relabelfrom relabelto map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_411 base_typeattr_412 (sock_file (create setattr lock relabelfrom relabelto map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1019 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_410 base_typeattr_411 (file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_410 base_typeattr_411 (lnk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_410 base_typeattr_411 (chr_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_410 base_typeattr_411 (blk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_410 base_typeattr_411 (sock_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_410 base_typeattr_411 (fifo_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_413 base_typeattr_414 (file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_413 base_typeattr_414 (lnk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_413 base_typeattr_414 (chr_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_413 base_typeattr_414 (blk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_413 base_typeattr_414 (sock_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_413 base_typeattr_414 (fifo_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1034 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_410 base_typeattr_412 (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_413 base_typeattr_415 (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 1051 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_413 core_data_file_type (file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_413 core_data_file_type (lnk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_413 core_data_file_type (chr_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_413 core_data_file_type (blk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_413 core_data_file_type (sock_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_413 core_data_file_type (fifo_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_416 core_data_file_type (file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_416 core_data_file_type (lnk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_416 core_data_file_type (chr_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_416 core_data_file_type (blk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_416 core_data_file_type (sock_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_416 core_data_file_type (fifo_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1051 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_414 base_typeattr_415 (file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_414 base_typeattr_415 (lnk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_414 base_typeattr_415 (chr_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_414 base_typeattr_415 (blk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_414 base_typeattr_415 (sock_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_414 base_typeattr_415 (fifo_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_417 base_typeattr_418 (file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_417 base_typeattr_418 (lnk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_417 base_typeattr_418 (chr_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_417 base_typeattr_418 (blk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_417 base_typeattr_418 (sock_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_417 base_typeattr_418 (fifo_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1051 system/sepolicy/private/domain.te
@@ -14926,12 +14985,12 @@
 
 ;;* lmx 1075 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_413 base_typeattr_416 (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_416 base_typeattr_419 (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 1075 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_414 base_typeattr_417 (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_417 base_typeattr_420 (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 1075 system/sepolicy/private/domain.te
@@ -14941,82 +15000,82 @@
 
 ;;* lmx 1107 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_418 system_data_file (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_421 system_data_file (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 1119 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_419 vendor_data_file (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_422 vendor_data_file (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 1132 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_420 vendor_data_file (file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_420 vendor_data_file (lnk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_420 vendor_data_file (chr_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_420 vendor_data_file (blk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_420 vendor_data_file (sock_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_420 vendor_data_file (fifo_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_423 vendor_data_file (file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_423 vendor_data_file (lnk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_423 vendor_data_file (chr_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_423 vendor_data_file (blk_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_423 vendor_data_file (sock_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_423 vendor_data_file (fifo_file (create setattr lock relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1143 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_421 vendor_shell_exec (file (execute execute_no_trans)))
+(neverallow base_typeattr_424 vendor_shell_exec (file (execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 1154 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_422 base_typeattr_423 (file (execute execute_no_trans entrypoint)))
+(neverallow base_typeattr_425 base_typeattr_426 (file (execute execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 1179 system/sepolicy/private/domain.te
 
-(neverallow coredomain base_typeattr_424 (file (entrypoint)))
+(neverallow coredomain base_typeattr_427 (file (entrypoint)))
 ;;* lme
 
 ;;* lmx 1179 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_226 base_typeattr_425 (file (entrypoint)))
+(neverallow base_typeattr_229 base_typeattr_428 (file (entrypoint)))
 ;;* lme
 
 ;;* lmx 1196 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_426 base_typeattr_427 (file (execute)))
+(neverallow base_typeattr_429 base_typeattr_430 (file (execute)))
 ;;* lme
 
 ;;* lmx 1215 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_428 base_typeattr_429 (file (execute_no_trans)))
+(neverallow base_typeattr_431 base_typeattr_432 (file (execute_no_trans)))
 ;;* lme
 
 ;;* lmx 1226 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_422 base_typeattr_430 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_425 base_typeattr_433 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 1266 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_431 zygote (unix_stream_socket (connectto)))
+(neverallow base_typeattr_434 zygote (unix_stream_socket (connectto)))
 ;;* lme
 
 ;;* lmx 1267 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_432 zygote_socket (sock_file (write)))
+(neverallow base_typeattr_435 zygote_socket (sock_file (write)))
 ;;* lme
 
 ;;* lmx 1269 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_433 webview_zygote (unix_stream_socket (connectto)))
+(neverallow base_typeattr_436 webview_zygote (unix_stream_socket (connectto)))
 ;;* lme
 
 ;;* lmx 1270 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_432 webview_zygote (sock_file (write)))
+(neverallow base_typeattr_435 webview_zygote (sock_file (write)))
 ;;* lme
 
 ;;* lmx 1271 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_432 app_zygote (sock_file (write)))
+(neverallow base_typeattr_435 app_zygote (sock_file (write)))
 ;;* lme
 
 ;;* lmx 1273 system/sepolicy/private/domain.te
@@ -15026,68 +15085,68 @@
 
 ;;* lmx 1277 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_434 tombstoned_intercept_socket (sock_file (write)))
+(neverallow base_typeattr_437 tombstoned_intercept_socket (sock_file (write)))
 ;;* lme
 
 ;;* lmx 1278 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_434 tombstoned_intercept_socket (unix_stream_socket (connectto)))
+(neverallow base_typeattr_437 tombstoned_intercept_socket (unix_stream_socket (connectto)))
 ;;* lme
 
 ;;* lmx 1281 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_435 heapdump_data_file (file (read)))
+(neverallow base_typeattr_438 heapdump_data_file (file (read)))
 ;;* lme
 
 ;;* lmx 1299 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 base_typeattr_233 (sem (create destroy getattr setattr read write associate unix_read unix_write)))
-(neverallow base_typeattr_233 base_typeattr_233 (msg (send receive)))
-(neverallow base_typeattr_233 base_typeattr_233 (msgq (create destroy getattr setattr read write associate unix_read unix_write enqueue)))
-(neverallow base_typeattr_233 base_typeattr_233 (shm (create destroy getattr setattr read write associate unix_read unix_write lock)))
+(neverallow base_typeattr_236 base_typeattr_236 (sem (create destroy getattr setattr read write associate unix_read unix_write)))
+(neverallow base_typeattr_236 base_typeattr_236 (msg (send receive)))
+(neverallow base_typeattr_236 base_typeattr_236 (msgq (create destroy getattr setattr read write associate unix_read unix_write enqueue)))
+(neverallow base_typeattr_236 base_typeattr_236 (shm (create destroy getattr setattr read write associate unix_read unix_write lock)))
 ;;* lme
 
 ;;* lmx 1303 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 dev_type (lnk_file (mounton)))
-(neverallow base_typeattr_233 dev_type (sock_file (mounton)))
-(neverallow base_typeattr_233 dev_type (fifo_file (mounton)))
-(neverallow base_typeattr_233 fs_type (lnk_file (mounton)))
-(neverallow base_typeattr_233 fs_type (sock_file (mounton)))
-(neverallow base_typeattr_233 fs_type (fifo_file (mounton)))
-(neverallow base_typeattr_233 file_type (lnk_file (mounton)))
-(neverallow base_typeattr_233 file_type (sock_file (mounton)))
-(neverallow base_typeattr_233 file_type (fifo_file (mounton)))
+(neverallow base_typeattr_236 dev_type (lnk_file (mounton)))
+(neverallow base_typeattr_236 dev_type (sock_file (mounton)))
+(neverallow base_typeattr_236 dev_type (fifo_file (mounton)))
+(neverallow base_typeattr_236 fs_type (lnk_file (mounton)))
+(neverallow base_typeattr_236 fs_type (sock_file (mounton)))
+(neverallow base_typeattr_236 fs_type (fifo_file (mounton)))
+(neverallow base_typeattr_236 file_type (lnk_file (mounton)))
+(neverallow base_typeattr_236 file_type (sock_file (mounton)))
+(neverallow base_typeattr_236 file_type (fifo_file (mounton)))
 ;;* lme
 
 ;;* lmx 1308 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_436 su_exec (file (execute execute_no_trans)))
+(neverallow base_typeattr_439 su_exec (file (execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 1320 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 base_typeattr_437 (file (execmod)))
+(neverallow base_typeattr_236 base_typeattr_440 (file (execmod)))
 ;;* lme
 
 ;;* lmx 1325 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 self (process (execstack execheap)))
+(neverallow base_typeattr_236 self (process (execstack execheap)))
 ;;* lme
 
 ;;* lmx 1329 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_438 file_type (file (execmod)))
+(neverallow base_typeattr_441 file_type (file (execmod)))
 ;;* lme
 
 ;;* lmx 1337 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_439 domain (process (transition dyntransition)))
+(neverallow base_typeattr_442 domain (process (transition dyntransition)))
 ;;* lme
 
 ;;* lmx 1356 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_440 system_data_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_443 system_data_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 1359 system/sepolicy/private/domain.te
@@ -15097,44 +15156,44 @@
 
 ;;* lmx 1372 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_441 shell (process (transition dyntransition)))
+(neverallow base_typeattr_444 shell (process (transition dyntransition)))
 ;;* lme
 
 ;;* lmx 1386 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_442 base_typeattr_443 (process (transition dyntransition)))
+(neverallow base_typeattr_445 base_typeattr_446 (process (transition dyntransition)))
 ;;* lme
 
 ;;* lmx 1395 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_444 app_data_file (lnk_file (read)))
-(neverallow base_typeattr_444 privapp_data_file (lnk_file (read)))
+(neverallow base_typeattr_447 app_data_file (lnk_file (read)))
+(neverallow base_typeattr_447 privapp_data_file (lnk_file (read)))
 ;;* lme
 
 ;;* lmx 1402 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_445 shell_data_file (lnk_file (read)))
+(neverallow base_typeattr_448 shell_data_file (lnk_file (read)))
 ;;* lme
 
 ;;* lmx 1409 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 base_typeattr_446 (service_manager (list)))
+(neverallow base_typeattr_236 base_typeattr_449 (service_manager (list)))
 ;;* lme
 
 ;;* lmx 1414 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 base_typeattr_447 (hwservice_manager (list)))
+(neverallow base_typeattr_236 base_typeattr_450 (hwservice_manager (list)))
 ;;* lme
 
 ;;* lmx 1433 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 domain (file (execute execute_no_trans entrypoint)))
+(neverallow base_typeattr_236 domain (file (execute execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 1439 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_394 debugfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_394 debugfs (lnk_file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_397 debugfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_397 debugfs (lnk_file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1442 system/sepolicy/private/domain.te
@@ -15144,23 +15203,23 @@
 
 ;;* lmx 1445 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_448 fusectlfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_451 fusectlfs (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1454 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_449 profman_exec (file (execute execute_no_trans)))
+(neverallow base_typeattr_452 profman_exec (file (execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 1460 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 base_typeattr_450 (system (module_load)))
+(neverallow base_typeattr_236 base_typeattr_453 (system (module_load)))
 ;;* lme
 
 ;;* lmx 1464 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 self (capability (setfcap)))
-(neverallow base_typeattr_233 self (cap_userns (setfcap)))
+(neverallow base_typeattr_236 self (capability (setfcap)))
+(neverallow base_typeattr_236 self (cap_userns (setfcap)))
 ;;* lme
 
 ;;* lmx 1467 system/sepolicy/private/domain.te
@@ -15170,12 +15229,12 @@
 
 ;;* lmx 1471 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_451 coredomain_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_454 coredomain_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 1476 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_233 same_process_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_236 same_process_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 1487 system/sepolicy/private/domain.te
@@ -15204,181 +15263,245 @@
 (dontaudit domain sysfs_type (file (create)))
 ;;* lmx 1514 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_452 mnt_vendor_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_455 mnt_vendor_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 1517 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_453 vendor_public_lib_file (file (execute execute_no_trans)))
-(neverallow base_typeattr_453 vendor_public_framework_file (file (execute execute_no_trans)))
+(neverallow base_typeattr_456 vendor_public_lib_file (file (execute execute_no_trans)))
+(neverallow base_typeattr_456 vendor_public_framework_file (file (execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 1528 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_226 mnt_product_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_229 mnt_product_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 1531 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_454 sysfs_batteryinfo (file (read open)))
+(neverallow base_typeattr_457 sysfs_batteryinfo (file (read open)))
 ;;* lme
 
 ;;* lmx 1554 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_455 hal_codec2_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_458 hal_codec2_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 1563 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_456 ashmem_device (chr_file (open)))
+(neverallow base_typeattr_459 ashmem_device (chr_file (open)))
 ;;* lme
 
 ;;* lmx 1565 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_457 debugfs_tracing_printk_formats (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_460 debugfs_tracing_printk_formats (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 1587 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_458 misc_block_device (blk_file (ioctl read write lock relabelfrom append link rename open)))
+(neverallow base_typeattr_461 misc_block_device (blk_file (ioctl read write lock relabelfrom append link rename open)))
 ;;* lme
 
 ;;* lmx 1601 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_459 self (capability (sys_ptrace)))
-(neverallow base_typeattr_459 self (cap_userns (sys_ptrace)))
+(neverallow base_typeattr_462 self (capability (sys_ptrace)))
+(neverallow base_typeattr_462 self (cap_userns (sys_ptrace)))
 ;;* lme
 
 ;;* lmx 1604 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_460 base_typeattr_233 (keystore2_key (gen_unique_id)))
+(neverallow base_typeattr_463 base_typeattr_236 (keystore2_key (gen_unique_id)))
 ;;* lme
 
 ;;* lmx 1605 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_432 base_typeattr_233 (keystore2_key (use_dev_id)))
+(neverallow base_typeattr_435 base_typeattr_236 (keystore2_key (use_dev_id)))
 ;;* lme
 
 ;;* lmx 1606 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_432 keystore (keystore2 (clear_ns lock reset unlock)))
+(neverallow base_typeattr_435 keystore (keystore2 (clear_ns lock reset unlock)))
 ;;* lme
 
 ;;* lmx 1613 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_461 debugfs_tracing_debug (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_464 debugfs_tracing_debug (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1622 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_462 dropbox_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_465 dropbox_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 1628 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_462 dropbox_data_file (file (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_465 dropbox_data_file (file (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 1641 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_444 app_data_file (file (create unlink)))
-(neverallow base_typeattr_444 app_data_file (dir (create unlink)))
-(neverallow base_typeattr_444 app_data_file (lnk_file (create unlink)))
-(neverallow base_typeattr_444 app_data_file (chr_file (create unlink)))
-(neverallow base_typeattr_444 app_data_file (blk_file (create unlink)))
-(neverallow base_typeattr_444 app_data_file (sock_file (create unlink)))
-(neverallow base_typeattr_444 app_data_file (fifo_file (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (file (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (dir (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (lnk_file (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (chr_file (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (blk_file (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (sock_file (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (fifo_file (create unlink)))
+(neverallow base_typeattr_447 app_data_file (file (create unlink)))
+(neverallow base_typeattr_447 app_data_file (dir (create unlink)))
+(neverallow base_typeattr_447 app_data_file (lnk_file (create unlink)))
+(neverallow base_typeattr_447 app_data_file (chr_file (create unlink)))
+(neverallow base_typeattr_447 app_data_file (blk_file (create unlink)))
+(neverallow base_typeattr_447 app_data_file (sock_file (create unlink)))
+(neverallow base_typeattr_447 app_data_file (fifo_file (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (file (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (dir (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (lnk_file (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (chr_file (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (blk_file (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (sock_file (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (fifo_file (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (file (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (dir (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (lnk_file (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (chr_file (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (blk_file (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (sock_file (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (fifo_file (create unlink)))
+;;* lme
+
+;;* lmx 1643 system/sepolicy/private/domain.te
+
+(neverallow base_typeattr_466 storage_area_app_dir (dir (create unlink)))
+(neverallow base_typeattr_466 storage_area_dir (dir (create unlink)))
 ;;* lme
 
 ;;* lmx 1670 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_463 app_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
-(neverallow base_typeattr_463 privapp_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_467 app_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_467 privapp_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_467 storage_area_content_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+;;* lme
+
+;;* lmx 1672 system/sepolicy/private/domain.te
+
+(neverallow base_typeattr_468 storage_area_app_dir (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_468 storage_area_dir (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+;;* lme
+
+;;* lmx 1687 system/sepolicy/private/domain.te
+
+(neverallow base_typeattr_469 storage_area_key_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_469 storage_area_key_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_469 storage_area_key_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_469 storage_area_key_file (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_469 storage_area_key_file (blk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_469 storage_area_key_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_469 storage_area_key_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1711 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_464 app_data_file (dir (write create setattr relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm add_name remove_name reparent rmdir)))
-(neverallow base_typeattr_464 privapp_data_file (dir (write create setattr relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_470 app_data_file (dir (write create setattr relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_470 privapp_data_file (dir (write create setattr relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_470 storage_area_content_file (dir (write create setattr relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm add_name remove_name reparent rmdir)))
+;;* lme
+
+;;* lmx 1713 system/sepolicy/private/domain.te
+
+(neverallow base_typeattr_471 storage_area_app_dir (dir (write create setattr relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_471 storage_area_dir (dir (write create setattr relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 1735 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_465 app_data_file (file (open)))
-(neverallow base_typeattr_465 app_data_file (lnk_file (open)))
-(neverallow base_typeattr_465 app_data_file (chr_file (open)))
-(neverallow base_typeattr_465 app_data_file (blk_file (open)))
-(neverallow base_typeattr_465 app_data_file (sock_file (open)))
-(neverallow base_typeattr_465 app_data_file (fifo_file (open)))
-(neverallow base_typeattr_465 privapp_data_file (file (open)))
-(neverallow base_typeattr_465 privapp_data_file (lnk_file (open)))
-(neverallow base_typeattr_465 privapp_data_file (chr_file (open)))
-(neverallow base_typeattr_465 privapp_data_file (blk_file (open)))
-(neverallow base_typeattr_465 privapp_data_file (sock_file (open)))
-(neverallow base_typeattr_465 privapp_data_file (fifo_file (open)))
+(neverallow base_typeattr_472 app_data_file (file (open)))
+(neverallow base_typeattr_472 app_data_file (lnk_file (open)))
+(neverallow base_typeattr_472 app_data_file (chr_file (open)))
+(neverallow base_typeattr_472 app_data_file (blk_file (open)))
+(neverallow base_typeattr_472 app_data_file (sock_file (open)))
+(neverallow base_typeattr_472 app_data_file (fifo_file (open)))
+(neverallow base_typeattr_472 privapp_data_file (file (open)))
+(neverallow base_typeattr_472 privapp_data_file (lnk_file (open)))
+(neverallow base_typeattr_472 privapp_data_file (chr_file (open)))
+(neverallow base_typeattr_472 privapp_data_file (blk_file (open)))
+(neverallow base_typeattr_472 privapp_data_file (sock_file (open)))
+(neverallow base_typeattr_472 privapp_data_file (fifo_file (open)))
+(neverallow base_typeattr_472 storage_area_content_file (file (open)))
+(neverallow base_typeattr_472 storage_area_content_file (lnk_file (open)))
+(neverallow base_typeattr_472 storage_area_content_file (chr_file (open)))
+(neverallow base_typeattr_472 storage_area_content_file (blk_file (open)))
+(neverallow base_typeattr_472 storage_area_content_file (sock_file (open)))
+(neverallow base_typeattr_472 storage_area_content_file (fifo_file (open)))
 ;;* lme
 
 ;;* lmx 1746 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_444 app_data_file (file (create unlink)))
-(neverallow base_typeattr_444 app_data_file (dir (create unlink)))
-(neverallow base_typeattr_444 app_data_file (lnk_file (create unlink)))
-(neverallow base_typeattr_444 app_data_file (chr_file (create unlink)))
-(neverallow base_typeattr_444 app_data_file (blk_file (create unlink)))
-(neverallow base_typeattr_444 app_data_file (sock_file (create unlink)))
-(neverallow base_typeattr_444 app_data_file (fifo_file (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (file (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (dir (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (lnk_file (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (chr_file (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (blk_file (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (sock_file (create unlink)))
-(neverallow base_typeattr_444 privapp_data_file (fifo_file (create unlink)))
+(neverallow base_typeattr_447 app_data_file (file (create unlink)))
+(neverallow base_typeattr_447 app_data_file (dir (create unlink)))
+(neverallow base_typeattr_447 app_data_file (lnk_file (create unlink)))
+(neverallow base_typeattr_447 app_data_file (chr_file (create unlink)))
+(neverallow base_typeattr_447 app_data_file (blk_file (create unlink)))
+(neverallow base_typeattr_447 app_data_file (sock_file (create unlink)))
+(neverallow base_typeattr_447 app_data_file (fifo_file (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (file (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (dir (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (lnk_file (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (chr_file (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (blk_file (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (sock_file (create unlink)))
+(neverallow base_typeattr_447 privapp_data_file (fifo_file (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (file (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (dir (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (lnk_file (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (chr_file (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (blk_file (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (sock_file (create unlink)))
+(neverallow base_typeattr_447 storage_area_content_file (fifo_file (create unlink)))
 ;;* lme
 
 ;;* lmx 1756 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_466 app_data_file (file (relabelfrom relabelto)))
-(neverallow base_typeattr_466 app_data_file (dir (relabelfrom relabelto)))
-(neverallow base_typeattr_466 app_data_file (lnk_file (relabelfrom relabelto)))
-(neverallow base_typeattr_466 app_data_file (chr_file (relabelfrom relabelto)))
-(neverallow base_typeattr_466 app_data_file (blk_file (relabelfrom relabelto)))
-(neverallow base_typeattr_466 app_data_file (sock_file (relabelfrom relabelto)))
-(neverallow base_typeattr_466 app_data_file (fifo_file (relabelfrom relabelto)))
-(neverallow base_typeattr_466 privapp_data_file (file (relabelfrom relabelto)))
-(neverallow base_typeattr_466 privapp_data_file (dir (relabelfrom relabelto)))
-(neverallow base_typeattr_466 privapp_data_file (lnk_file (relabelfrom relabelto)))
-(neverallow base_typeattr_466 privapp_data_file (chr_file (relabelfrom relabelto)))
-(neverallow base_typeattr_466 privapp_data_file (blk_file (relabelfrom relabelto)))
-(neverallow base_typeattr_466 privapp_data_file (sock_file (relabelfrom relabelto)))
-(neverallow base_typeattr_466 privapp_data_file (fifo_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 app_data_file (file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 app_data_file (dir (relabelfrom relabelto)))
+(neverallow base_typeattr_473 app_data_file (lnk_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 app_data_file (chr_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 app_data_file (blk_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 app_data_file (sock_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 app_data_file (fifo_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 privapp_data_file (file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 privapp_data_file (dir (relabelfrom relabelto)))
+(neverallow base_typeattr_473 privapp_data_file (lnk_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 privapp_data_file (chr_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 privapp_data_file (blk_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 privapp_data_file (sock_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 privapp_data_file (fifo_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 storage_area_content_file (file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 storage_area_content_file (dir (relabelfrom relabelto)))
+(neverallow base_typeattr_473 storage_area_content_file (lnk_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 storage_area_content_file (chr_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 storage_area_content_file (blk_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 storage_area_content_file (sock_file (relabelfrom relabelto)))
+(neverallow base_typeattr_473 storage_area_content_file (fifo_file (relabelfrom relabelto)))
+;;* lme
+
+;;* lmx 1758 system/sepolicy/private/domain.te
+
+(neverallow base_typeattr_466 storage_area_app_dir (dir (relabelfrom relabelto)))
+(neverallow base_typeattr_466 storage_area_dir (dir (relabelfrom relabelto)))
 ;;* lme
 
 ;;* lmx 1781 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_467 staging_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_474 staging_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 1796 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_468 staging_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_475 staging_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 1798 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_469 staging_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_476 staging_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 1803 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_470 staging_data_file (file (write create setattr relabelfrom append unlink link rename execute execute_no_trans)))
+(neverallow base_typeattr_477 staging_data_file (file (write create setattr relabelfrom append unlink link rename execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 1807 system/sepolicy/private/domain.te
@@ -15388,186 +15511,186 @@
 
 ;;* lmx 1814 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_471 base_typeattr_472 (file (execute)))
+(neverallow base_typeattr_478 base_typeattr_479 (file (execute)))
 ;;* lme
 
 ;;* lmx 1844 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_473 base_typeattr_474 (file (execute)))
+(neverallow base_typeattr_480 base_typeattr_481 (file (execute)))
 ;;* lme
 
 ;;* lmx 1851 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_227 cgroup_rc_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_230 cgroup_rc_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 1864 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_475 dalvikcache_data_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_482 dalvikcache_data_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 1876 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_475 dalvikcache_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_482 dalvikcache_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 1891 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_476 apex_art_data_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_483 apex_art_data_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 1904 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_476 apex_art_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_483 apex_art_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 1916 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_260 base_typeattr_268 (file (execute execute_no_trans)))
+(neverallow base_typeattr_263 base_typeattr_271 (file (execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 1944 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_477 self (capability (dac_override)))
-(neverallow base_typeattr_477 self (cap_userns (dac_override)))
+(neverallow base_typeattr_484 self (capability (dac_override)))
+(neverallow base_typeattr_484 self (cap_userns (dac_override)))
 ;;* lme
 
 ;;* lmx 1954 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_478 self (capability (dac_read_search)))
-(neverallow base_typeattr_478 self (cap_userns (dac_read_search)))
+(neverallow base_typeattr_485 self (capability (dac_read_search)))
+(neverallow base_typeattr_485 self (cap_userns (dac_read_search)))
 ;;* lme
 
 ;;* lmx 1974 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_479 base_typeattr_480 (filesystem (mount remount relabelfrom relabelto)))
+(neverallow base_typeattr_486 base_typeattr_487 (filesystem (mount remount relabelfrom relabelto)))
 ;;* lme
 
 ;;* lmx 1976 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 base_typeattr_481 (filesystem (mount remount relabelfrom relabelto)))
+(neverallow base_typeattr_235 base_typeattr_488 (filesystem (mount remount relabelfrom relabelto)))
 ;;* lme
 
 ;;* lmx 1995 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_482 self (capability (sys_rawio)))
-(neverallow base_typeattr_482 self (cap_userns (sys_rawio)))
+(neverallow base_typeattr_489 self (capability (sys_rawio)))
+(neverallow base_typeattr_489 self (cap_userns (sys_rawio)))
 ;;* lme
 
 ;;* lmx 2004 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_483 mirror_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_490 mirror_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 2007 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_392 net_dns_prop (property_service (set)))
+(neverallow base_typeattr_395 net_dns_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 2008 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_377 net_dns_prop (file (read)))
+(neverallow base_typeattr_380 net_dns_prop (file (read)))
 ;;* lme
 
 ;;* lmx 2011 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_435 pm_prop (property_service (set)))
+(neverallow base_typeattr_438 pm_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 2012 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_226 pm_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 pm_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 2015 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_462 firstboot_prop (file (ioctl read getattr lock map open watch watch_reads)))
+(neverallow base_typeattr_465 firstboot_prop (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lme
 
 ;;* lmx 2019 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_484 dalvik_config_prop (property_service (set)))
+(neverallow base_typeattr_491 dalvik_config_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 2022 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_227 debugfs_kprobes (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_230 debugfs_kprobes (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 2026 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_485 vendor_file (file (write create setattr relabelfrom append unlink link rename execute open execute_no_trans)))
+(neverallow base_typeattr_492 vendor_file (file (write create setattr relabelfrom append unlink link rename execute open execute_no_trans)))
 ;;* lme
 
 ;;* lmx 2043 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_486 base_typeattr_487 (socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (tcp_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (udp_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (rawip_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (packet_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (key_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (unix_stream_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (unix_dgram_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_route_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_tcpdiag_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_nflog_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_xfrm_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_selinux_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_audit_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_dnrt_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_kobject_uevent_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (appletalk_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (tun_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_iscsi_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_fib_lookup_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_connector_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_netfilter_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_generic_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_scsitransport_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_rdma_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netlink_crypto_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (sctp_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (icmp_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (ax25_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (ipx_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (netrom_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (atmpvc_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (x25_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (rose_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (decnet_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (atmsvc_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (rds_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (irda_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (pppox_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (llc_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (can_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (tipc_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (bluetooth_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (iucv_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (rxrpc_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (isdn_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (phonet_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (ieee802154_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (caif_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (alg_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (nfc_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (vsock_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (kcm_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (qipcrtr_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (smc_socket (connect sendto)))
-(neverallow base_typeattr_486 base_typeattr_487 (xdp_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (tcp_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (udp_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (rawip_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (packet_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (key_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (unix_stream_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (unix_dgram_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_route_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_tcpdiag_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_nflog_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_xfrm_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_selinux_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_audit_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_dnrt_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_kobject_uevent_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (appletalk_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (tun_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_iscsi_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_fib_lookup_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_connector_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_netfilter_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_generic_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_scsitransport_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_rdma_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netlink_crypto_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (sctp_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (icmp_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (ax25_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (ipx_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (netrom_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (atmpvc_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (x25_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (rose_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (decnet_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (atmsvc_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (rds_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (irda_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (pppox_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (llc_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (can_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (tipc_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (bluetooth_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (iucv_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (rxrpc_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (isdn_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (phonet_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (ieee802154_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (caif_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (alg_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (nfc_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (vsock_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (kcm_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (qipcrtr_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (smc_socket (connect sendto)))
+(neverallow base_typeattr_493 base_typeattr_494 (xdp_socket (connect sendto)))
 ;;* lme
 
 ;;* lmx 2043 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_486 base_typeattr_487 (unix_stream_socket (connectto)))
+(neverallow base_typeattr_493 base_typeattr_494 (unix_stream_socket (connectto)))
 ;;* lme
 
 ;;* lmx 2064 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_488 base_typeattr_489 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_495 base_typeattr_496 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 2111 system/sepolicy/private/domain.te
@@ -15577,76 +15700,76 @@
 
 ;;* lmx 2115 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_490 system_file_type (file (mounton)))
-(neverallow base_typeattr_490 system_file_type (dir (mounton)))
-(neverallow base_typeattr_490 system_file_type (lnk_file (mounton)))
-(neverallow base_typeattr_490 system_file_type (chr_file (mounton)))
-(neverallow base_typeattr_490 system_file_type (blk_file (mounton)))
-(neverallow base_typeattr_490 system_file_type (sock_file (mounton)))
-(neverallow base_typeattr_490 system_file_type (fifo_file (mounton)))
-(neverallow base_typeattr_490 vendor_file_type (file (mounton)))
-(neverallow base_typeattr_490 vendor_file_type (dir (mounton)))
-(neverallow base_typeattr_490 vendor_file_type (lnk_file (mounton)))
-(neverallow base_typeattr_490 vendor_file_type (chr_file (mounton)))
-(neverallow base_typeattr_490 vendor_file_type (blk_file (mounton)))
-(neverallow base_typeattr_490 vendor_file_type (sock_file (mounton)))
-(neverallow base_typeattr_490 vendor_file_type (fifo_file (mounton)))
+(neverallow base_typeattr_497 system_file_type (file (mounton)))
+(neverallow base_typeattr_497 system_file_type (dir (mounton)))
+(neverallow base_typeattr_497 system_file_type (lnk_file (mounton)))
+(neverallow base_typeattr_497 system_file_type (chr_file (mounton)))
+(neverallow base_typeattr_497 system_file_type (blk_file (mounton)))
+(neverallow base_typeattr_497 system_file_type (sock_file (mounton)))
+(neverallow base_typeattr_497 system_file_type (fifo_file (mounton)))
+(neverallow base_typeattr_497 vendor_file_type (file (mounton)))
+(neverallow base_typeattr_497 vendor_file_type (dir (mounton)))
+(neverallow base_typeattr_497 vendor_file_type (lnk_file (mounton)))
+(neverallow base_typeattr_497 vendor_file_type (chr_file (mounton)))
+(neverallow base_typeattr_497 vendor_file_type (blk_file (mounton)))
+(neverallow base_typeattr_497 vendor_file_type (sock_file (mounton)))
+(neverallow base_typeattr_497 vendor_file_type (fifo_file (mounton)))
 ;;* lme
 
 ;;* lmx 2124 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_394 mm_events_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_397 mm_events_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 2143 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_491 proc_kallsyms (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_498 proc_kallsyms (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 2149 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_492 base_typeattr_493 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_499 base_typeattr_500 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 2165 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_494 sysfs_devices_cs_etm (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_501 sysfs_devices_cs_etm (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 2175 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_495 self (capability2 (perfmon)))
+(neverallow base_typeattr_502 self (capability2 (perfmon)))
 ;;* lme
 
 ;;* lmx 2195 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_496 shell_data_file (file (open)))
+(neverallow base_typeattr_503 shell_data_file (file (open)))
 ;;* lme
 
 ;;* lmx 2213 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_497 shell_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_504 shell_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 2226 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_498 shell_data_file (dir (open)))
+(neverallow base_typeattr_505 shell_data_file (dir (open)))
 ;;* lme
 
 ;;* lmx 2241 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_499 shell_data_file (dir (search)))
+(neverallow base_typeattr_506 shell_data_file (dir (search)))
 ;;* lme
 
 ;;* lmx 2253 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_500 system_app_data_file (file (create unlink open)))
-(neverallow base_typeattr_500 system_app_data_file (dir (create unlink open)))
-(neverallow base_typeattr_500 system_app_data_file (lnk_file (create unlink open)))
-(neverallow base_typeattr_500 system_app_data_file (chr_file (create unlink open)))
-(neverallow base_typeattr_500 system_app_data_file (blk_file (create unlink open)))
-(neverallow base_typeattr_500 system_app_data_file (sock_file (create unlink open)))
-(neverallow base_typeattr_500 system_app_data_file (fifo_file (create unlink open)))
+(neverallow base_typeattr_507 system_app_data_file (file (create unlink open)))
+(neverallow base_typeattr_507 system_app_data_file (dir (create unlink open)))
+(neverallow base_typeattr_507 system_app_data_file (lnk_file (create unlink open)))
+(neverallow base_typeattr_507 system_app_data_file (chr_file (create unlink open)))
+(neverallow base_typeattr_507 system_app_data_file (blk_file (create unlink open)))
+(neverallow base_typeattr_507 system_app_data_file (sock_file (create unlink open)))
+(neverallow base_typeattr_507 system_app_data_file (fifo_file (create unlink open)))
 ;;* lme
 
 ;;* lmx 2260 system/sepolicy/private/domain.te
@@ -15690,40 +15813,40 @@
 
 ;;* lmx 2262 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 mtectrl (process (transition dyntransition)))
+(neverallow base_typeattr_235 mtectrl (process (transition dyntransition)))
 ;;* lme
 
 ;;* lmx 2263 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_232 kcmdlinectrl (process (transition dyntransition)))
+(neverallow base_typeattr_235 kcmdlinectrl (process (transition dyntransition)))
 ;;* lme
 
 ;;* lmx 2266 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_501 checkin_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_501 checkin_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_508 checkin_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_508 checkin_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 2268 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_502 proc (file (mounton)))
-(neverallow base_typeattr_502 proc (dir (mounton)))
+(neverallow base_typeattr_509 proc (file (mounton)))
+(neverallow base_typeattr_509 proc (dir (mounton)))
 ;;* lme
 
 ;;* lmx 2269 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_503 proc_type (file (mounton)))
-(neverallow base_typeattr_503 proc_type (dir (mounton)))
+(neverallow base_typeattr_510 proc_type (file (mounton)))
+(neverallow base_typeattr_510 proc_type (dir (mounton)))
 ;;* lme
 
 ;;* lmx 2273 system/sepolicy/private/domain.te
 
-(neverallow base_typeattr_504 sysfs_pgsize_migration (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_511 sysfs_pgsize_migration (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 2276 system/sepolicy/private/domain.te
 
-(neverallow domain base_typeattr_233 (vsock_socket (relabelfrom relabelto)))
+(neverallow domain base_typeattr_236 (vsock_socket (relabelfrom relabelto)))
 ;;* lme
 
 (allow init drmserver_exec (file (read getattr map execute open)))
@@ -15778,7 +15901,7 @@
 (allow drmserver drmserver_service (service_manager (add find)))
 ;;* lmx 61 system/sepolicy/private/drmserver.te
 
-(neverallow base_typeattr_505 drmserver_service (service_manager (add)))
+(neverallow base_typeattr_512 drmserver_service (service_manager (add)))
 ;;* lme
 
 (allow drmserver su (tcp_socket (read write accept getopt)))
@@ -15858,8 +15981,8 @@
 (allow dumpstate mediatranscoding (process (signal)))
 (allow dumpstate netd (process (signal)))
 (allow dumpstate statsd (process (signal)))
-(allow dumpstate ot_daemon (process (signal)))
 (allow dumpstate virtual_camera (process (signal)))
+(allow dumpstate ot_daemon (process (signal)))
 (allow dumpstate keystore (process (signal)))
 (dontaudit dumpstate keystore (process (signal)))
 (allow dumpstate dev_type (blk_file (getattr)))
@@ -16118,6 +16241,8 @@
 (allow hal_thermal_server dumpstate (fd (use)))
 (allow hal_vehicle_server dumpstate (fifo_file (write)))
 (allow hal_vehicle_server dumpstate (fd (use)))
+(allow hal_vm_capabilities_server dumpstate (fifo_file (write)))
+(allow hal_vm_capabilities_server dumpstate (fd (use)))
 (allow hal_weaver_server dumpstate (fifo_file (write)))
 (allow hal_weaver_server dumpstate (fd (use)))
 (allow hal_wifi_server dumpstate (fifo_file (write)))
@@ -16184,13 +16309,14 @@
 (allow dumpstate prereboot_data_file (file (ioctl read getattr lock map open watch watch_reads)))
 (allow dumpstate app_fuse_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow dumpstate overlayfs_file (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow dumpstate base_typeattr_506 (service_manager (find)))
+(allow dumpstate base_typeattr_513 (service_manager (find)))
 (dontaudit dumpstate hal_service_type (service_manager (find)))
 (dontaudit dumpstate apex_service (service_manager (find)))
 (dontaudit dumpstate dumpstate_service (service_manager (find)))
 (dontaudit dumpstate gatekeeper_service (service_manager (find)))
 (dontaudit dumpstate virtual_touchpad_service (service_manager (find)))
 (dontaudit dumpstate vold_service (service_manager (find)))
+(dontaudit dumpstate fwk_vold_service (service_manager (find)))
 (dontaudit dumpstate hwservice_manager_type (hwservice_manager (find)))
 (allow dumpstate servicemanager (service_manager (list)))
 (allow dumpstate hwservicemanager (hwservice_manager (list)))
@@ -16200,9 +16326,9 @@
 (allow dumpstate proc_interrupts (file (ioctl read getattr lock map open watch watch_reads)))
 (allow dumpstate proc_zoneinfo (file (ioctl read getattr lock map open watch watch_reads)))
 (allow dumpstate dumpstate_service (service_manager (add find)))
-;;* lmx 496 system/sepolicy/private/dumpstate.te
+;;* lmx 499 system/sepolicy/private/dumpstate.te
 
-(neverallow base_typeattr_507 dumpstate_service (service_manager (add)))
+(neverallow base_typeattr_514 dumpstate_service (service_manager (add)))
 ;;* lme
 
 (allow dumpstate su (tcp_socket (read write accept getopt)))
@@ -16419,24 +16545,24 @@
 (allow dumpstate vendor_apex_metadata_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow dumpstate shutdown_checkpoints_system_data_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow dumpstate shutdown_checkpoints_system_data_file (file (ioctl read getattr lock map open watch watch_reads)))
-;;* lmx 574 system/sepolicy/private/dumpstate.te
+;;* lmx 577 system/sepolicy/private/dumpstate.te
 
-(neverallow dumpstate base_typeattr_233 (process (ptrace)))
+(neverallow dumpstate base_typeattr_236 (process (ptrace)))
 ;;* lme
 
-;;* lmx 583 system/sepolicy/private/dumpstate.te
+;;* lmx 586 system/sepolicy/private/dumpstate.te
 
-(neverallow base_typeattr_508 dumpstate_service (service_manager (find)))
+(neverallow base_typeattr_515 dumpstate_service (service_manager (find)))
 ;;* lme
 
-;;* lmx 593 system/sepolicy/private/dumpstate.te
+;;* lmx 596 system/sepolicy/private/dumpstate.te
 
-(neverallow base_typeattr_509 apex_uwb_data_file (dir (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_516 apex_uwb_data_file (dir (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
-;;* lmx 601 system/sepolicy/private/dumpstate.te
+;;* lmx 604 system/sepolicy/private/dumpstate.te
 
-(neverallow base_typeattr_509 apex_uwb_data_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_516 apex_uwb_data_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow e2fs devpts (chr_file (ioctl read write getattr)))
@@ -16499,17 +16625,17 @@
 (allow early_virtmgr kmsg_debug_device (chr_file (write lock append map open)))
 ;;* lmx 1 system/sepolicy/private/early_virtmgr.te
 
-(neverallow base_typeattr_510 vm_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_517 vm_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 1 system/sepolicy/private/early_virtmgr.te
 
-(neverallow base_typeattr_511 vm_data_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_518 vm_data_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1 system/sepolicy/private/early_virtmgr.te
 
-(neverallow base_typeattr_512 early_virtmgr (vsock_socket (create bind connect listen accept)))
+(neverallow base_typeattr_519 early_virtmgr (vsock_socket (create bind connect listen accept)))
 ;;* lme
 
 (typetransition ephemeral_app tmpfs file appdomain_tmpfs)
@@ -16517,23 +16643,23 @@
 (dontaudit su ephemeral_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 17 system/sepolicy/private/ephemeral_app.te
 
-(neverallow base_typeattr_513 ephemeral_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_520 ephemeral_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow ephemeral_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 17 system/sepolicy/private/ephemeral_app.te
 
-(neverallow base_typeattr_514 base_typeattr_513 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_521 base_typeattr_520 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 17 system/sepolicy/private/ephemeral_app.te
 
-(neverallow base_typeattr_515 ephemeral_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_522 ephemeral_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 17 system/sepolicy/private/ephemeral_app.te
 
-(neverallow base_typeattr_516 ephemeral_app (process (ptrace)))
+(neverallow base_typeattr_523 ephemeral_app (process (ptrace)))
 ;;* lme
 
 (allow ephemeral_app sdcard_type (file (ioctl read write getattr lock append)))
@@ -16624,7 +16750,7 @@
 (allow evsmanagerd evsmanagerd_service (service_manager (add find)))
 ;;* lmx 13 system/sepolicy/private/evsmanagerd.te
 
-(neverallow base_typeattr_517 evsmanagerd_service (service_manager (add)))
+(neverallow base_typeattr_524 evsmanagerd_service (service_manager (add)))
 ;;* lme
 
 (allow evsmanagerd su (tcp_socket (read write accept getopt)))
@@ -16663,7 +16789,7 @@
 (allow fastbootd self (io_uring (sqpoll)))
 ;;* lmx 170 system/sepolicy/private/fastbootd.te
 
-(neverallow base_typeattr_518 fastbootd_iouring (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_525 fastbootd_iouring (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (dontaudit fastbootd self (capability (ipc_lock)))
@@ -16705,7 +16831,7 @@
 (allow fingerprintd fingerprintd_service (service_manager (add find)))
 ;;* lmx 11 system/sepolicy/private/fingerprintd.te
 
-(neverallow base_typeattr_519 fingerprintd_service (service_manager (add)))
+(neverallow base_typeattr_526 fingerprintd_service (service_manager (add)))
 ;;* lme
 
 (allow fingerprintd su (tcp_socket (read write accept getopt)))
@@ -16872,17 +16998,17 @@
 (allow flags_health_check server_configurable_flags_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
 ;;* lmx 50 system/sepolicy/private/flags_health_check.te
 
-(neverallow base_typeattr_520 server_configurable_flags_data_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_527 server_configurable_flags_data_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 56 system/sepolicy/private/flags_health_check.te
 
-(neverallow base_typeattr_520 device_config_boot_count_prop (property_service (set)))
+(neverallow base_typeattr_527 device_config_boot_count_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 61 system/sepolicy/private/flags_health_check.te
 
-(neverallow base_typeattr_520 device_config_reset_performed_prop (property_service (set)))
+(neverallow base_typeattr_527 device_config_reset_performed_prop (property_service (set)))
 ;;* lme
 
 (allow init fsck_exec (file (read getattr map execute open)))
@@ -16915,22 +17041,22 @@
 (allow fsck sysfs_dm (dir (ioctl read getattr lock open watch watch_reads search)))
 ;;* lmx 77 system/sepolicy/private/fsck.te
 
-(neverallow fsck base_typeattr_521 (blk_file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow fsck base_typeattr_528 (blk_file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 80 system/sepolicy/private/fsck.te
 
-(neverallow base_typeattr_522 fsck (process (transition)))
+(neverallow base_typeattr_529 fsck (process (transition)))
 ;;* lme
 
 ;;* lmx 81 system/sepolicy/private/fsck.te
 
-(neverallow base_typeattr_233 fsck (process (dyntransition)))
+(neverallow base_typeattr_236 fsck (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 82 system/sepolicy/private/fsck.te
 
-(neverallow fsck base_typeattr_523 (file (entrypoint)))
+(neverallow fsck base_typeattr_530 (file (entrypoint)))
 ;;* lme
 
 (allow fsck system_bootstrap_lib_file (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -16958,17 +17084,17 @@
 
 ;;* lmx 48 system/sepolicy/private/fsck_untrusted.te
 
-(neverallow base_typeattr_298 fsck_untrusted (process (transition)))
+(neverallow base_typeattr_301 fsck_untrusted (process (transition)))
 ;;* lme
 
 ;;* lmx 49 system/sepolicy/private/fsck_untrusted.te
 
-(neverallow base_typeattr_233 fsck_untrusted (process (dyntransition)))
+(neverallow base_typeattr_236 fsck_untrusted (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 50 system/sepolicy/private/fsck_untrusted.te
 
-(neverallow fsck_untrusted base_typeattr_523 (file (entrypoint)))
+(neverallow fsck_untrusted base_typeattr_530 (file (entrypoint)))
 ;;* lme
 
 ;;* lmx 55 system/sepolicy/private/fsck_untrusted.te
@@ -16991,17 +17117,17 @@
 (allow fuseblkd mnt_media_rw_stub_file (dir (mounton)))
 ;;* lmx 30 system/sepolicy/private/fuseblkd.te
 
-(neverallow base_typeattr_524 fuseblkd (process (transition)))
+(neverallow base_typeattr_531 fuseblkd (process (transition)))
 ;;* lme
 
 ;;* lmx 31 system/sepolicy/private/fuseblkd.te
 
-(neverallow base_typeattr_233 fuseblkd (process (dyntransition)))
+(neverallow base_typeattr_236 fuseblkd (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 32 system/sepolicy/private/fuseblkd.te
 
-(neverallow fuseblkd base_typeattr_525 (file (entrypoint)))
+(neverallow fuseblkd base_typeattr_532 (file (entrypoint)))
 ;;* lme
 
 (allow fuseblkd_untrusted fuseblkd_exec (file (read getattr map execute open)))
@@ -17040,17 +17166,17 @@
 
 ;;* lmx 68 system/sepolicy/private/fuseblkd_untrusted.te
 
-(neverallow base_typeattr_298 fuseblkd_untrusted (process (transition)))
+(neverallow base_typeattr_301 fuseblkd_untrusted (process (transition)))
 ;;* lme
 
 ;;* lmx 69 system/sepolicy/private/fuseblkd_untrusted.te
 
-(neverallow base_typeattr_233 fuseblkd_untrusted (process (dyntransition)))
+(neverallow base_typeattr_236 fuseblkd_untrusted (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 70 system/sepolicy/private/fuseblkd_untrusted.te
 
-(neverallow fuseblkd_untrusted base_typeattr_526 (file (entrypoint)))
+(neverallow fuseblkd_untrusted base_typeattr_533 (file (entrypoint)))
 ;;* lme
 
 ;;* lmx 77 system/sepolicy/private/fuseblkd_untrusted.te
@@ -17090,7 +17216,7 @@
 (allow gatekeeperd gatekeeper_service (service_manager (add find)))
 ;;* lmx 25 system/sepolicy/private/gatekeeperd.te
 
-(neverallow base_typeattr_527 gatekeeper_service (service_manager (add)))
+(neverallow base_typeattr_534 gatekeeper_service (service_manager (add)))
 ;;* lme
 
 (allow gatekeeperd su (tcp_socket (read write accept getopt)))
@@ -17131,23 +17257,23 @@
 (dontaudit su gmscore_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 6 system/sepolicy/private/gmscore_app.te
 
-(neverallow base_typeattr_528 gmscore_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_535 gmscore_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow gmscore_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 6 system/sepolicy/private/gmscore_app.te
 
-(neverallow base_typeattr_529 base_typeattr_528 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_536 base_typeattr_535 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/gmscore_app.te
 
-(neverallow base_typeattr_530 gmscore_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_537 gmscore_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/gmscore_app.te
 
-(neverallow base_typeattr_531 gmscore_app (process (ptrace)))
+(neverallow base_typeattr_538 gmscore_app (process (ptrace)))
 ;;* lme
 
 (allow gmscore_app sysfs_type (dir (search)))
@@ -17244,7 +17370,7 @@
 (allow gmscore_app quick_start_prop (file (read getattr map open)))
 ;;* lmx 159 system/sepolicy/private/gmscore_app.te
 
-(neverallow base_typeattr_532 quick_start_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_539 quick_start_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow gmscore_app bluetooth_finder_prop (file (read getattr map open)))
@@ -17279,60 +17405,60 @@
 
 ;;* lmx 170 system/sepolicy/private/gmscore_app.te
 
-(neverallow gmscore_app base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow gmscore_app base_typeattr_233 (netlink_selinux_socket (ioctl)))
+(neverallow gmscore_app base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow gmscore_app base_typeattr_236 (netlink_selinux_socket (ioctl)))
 ;;* lme
 
 ;;* lmx 183 system/sepolicy/private/gmscore_app.te
 
-(neverallow gmscore_app base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow gmscore_app base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow gmscore_app base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow gmscore_app base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow gmscore_app base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow gmscore_app base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow gmscore_app base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow gmscore_app base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow gmscore_app base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow gmscore_app base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow gmscore_app base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow gmscore_app base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow gmscore_app base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
 ;;* lme
 
 (allow init gpuservice_exec (file (read getattr map execute open)))
@@ -17388,7 +17514,7 @@
 (allow gpuservice gpu_service (service_manager (add find)))
 ;;* lmx 61 system/sepolicy/private/gpuservice.te
 
-(neverallow base_typeattr_533 gpu_service (service_manager (add)))
+(neverallow base_typeattr_540 gpu_service (service_manager (add)))
 ;;* lme
 
 (allow gpuservice su (tcp_socket (read write accept getopt)))
@@ -17398,7 +17524,7 @@
 (allow gpuservice graphics_config_writable_prop (file (read getattr map open)))
 ;;* lmx 66 system/sepolicy/private/gpuservice.te
 
-(neverallow base_typeattr_534 graphics_config_writable_prop (property_service (set)))
+(neverallow base_typeattr_541 graphics_config_writable_prop (property_service (set)))
 ;;* lme
 
 (allow gpuservice permission_service (service_manager (find)))
@@ -17413,7 +17539,7 @@
 (allow gsid gsi_service (service_manager (add find)))
 ;;* lmx 11 system/sepolicy/private/gsid.te
 
-(neverallow base_typeattr_535 gsi_service (service_manager (add)))
+(neverallow base_typeattr_542 gsi_service (service_manager (add)))
 ;;* lme
 
 (allow gsid su (tcp_socket (read write accept getopt)))
@@ -17468,7 +17594,7 @@
 (allow gsid fuse (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lmx 104 system/sepolicy/private/gsid.te
 
-(neverallow base_typeattr_536 gsid_prop (property_service (set)))
+(neverallow base_typeattr_543 gsid_prop (property_service (set)))
 ;;* lme
 
 (allow gsid userdata_block_device (blk_file (ioctl read getattr lock map open watch watch_reads)))
@@ -17489,59 +17615,59 @@
 (allow gsid system_server (binder (call)))
 ;;* lmx 176 system/sepolicy/private/gsid.te
 
-(neverallow base_typeattr_537 gsi_metadata_file_type (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_544 gsi_metadata_file_type (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 183 system/sepolicy/private/gsid.te
 
-(neverallow base_typeattr_537 base_typeattr_538 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_537 base_typeattr_538 (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_537 base_typeattr_538 (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_537 base_typeattr_538 (blk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_537 base_typeattr_538 (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_537 base_typeattr_538 (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_544 base_typeattr_545 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_544 base_typeattr_545 (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_544 base_typeattr_545 (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_544 base_typeattr_545 (blk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_544 base_typeattr_545 (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_544 base_typeattr_545 (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 190 system/sepolicy/private/gsid.te
 
-(neverallow base_typeattr_537 gsi_public_metadata_file (file (write create setattr relabelfrom relabelto append unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm execute_no_trans entrypoint)))
-(neverallow base_typeattr_537 gsi_public_metadata_file (lnk_file (write create setattr relabelfrom relabelto append unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm)))
-(neverallow base_typeattr_537 gsi_public_metadata_file (chr_file (write create setattr relabelfrom relabelto append unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm execute_no_trans entrypoint)))
-(neverallow base_typeattr_537 gsi_public_metadata_file (blk_file (write create setattr relabelfrom relabelto append unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm)))
-(neverallow base_typeattr_537 gsi_public_metadata_file (sock_file (write create setattr relabelfrom relabelto append unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm)))
-(neverallow base_typeattr_537 gsi_public_metadata_file (fifo_file (write create setattr relabelfrom relabelto append unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm)))
+(neverallow base_typeattr_544 gsi_public_metadata_file (file (write create setattr relabelfrom relabelto append unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm execute_no_trans entrypoint)))
+(neverallow base_typeattr_544 gsi_public_metadata_file (lnk_file (write create setattr relabelfrom relabelto append unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm)))
+(neverallow base_typeattr_544 gsi_public_metadata_file (chr_file (write create setattr relabelfrom relabelto append unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm execute_no_trans entrypoint)))
+(neverallow base_typeattr_544 gsi_public_metadata_file (blk_file (write create setattr relabelfrom relabelto append unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm)))
+(neverallow base_typeattr_544 gsi_public_metadata_file (sock_file (write create setattr relabelfrom relabelto append unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm)))
+(neverallow base_typeattr_544 gsi_public_metadata_file (fifo_file (write create setattr relabelfrom relabelto append unlink link rename execute quotaon mounton audit_access execmod watch_mount watch_sb watch_with_perm)))
 ;;* lme
 
 ;;* lmx 196 system/sepolicy/private/gsid.te
 
-(neverallow base_typeattr_262 gsi_metadata_file_type (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_262 gsi_metadata_file_type (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
-(neverallow base_typeattr_262 gsi_metadata_file_type (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_262 gsi_metadata_file_type (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_262 gsi_metadata_file_type (blk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_262 gsi_metadata_file_type (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_262 gsi_metadata_file_type (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_265 gsi_metadata_file_type (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_265 gsi_metadata_file_type (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_265 gsi_metadata_file_type (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_265 gsi_metadata_file_type (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_265 gsi_metadata_file_type (blk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_265 gsi_metadata_file_type (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_265 gsi_metadata_file_type (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 202 system/sepolicy/private/gsid.te
 
-(neverallow base_typeattr_539 gsi_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_539 gsi_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
-(neverallow base_typeattr_539 gsi_data_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_539 gsi_data_file (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_539 gsi_data_file (blk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_539 gsi_data_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_539 gsi_data_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_546 gsi_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_546 gsi_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_546 gsi_data_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_546 gsi_data_file (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_546 gsi_data_file (blk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_546 gsi_data_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_546 gsi_data_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 207 system/sepolicy/private/gsid.te
 
-(neverallow base_typeattr_535 gsi_data_file (file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_535 gsi_data_file (lnk_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_535 gsi_data_file (chr_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_535 gsi_data_file (blk_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_535 gsi_data_file (sock_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_535 gsi_data_file (fifo_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_542 gsi_data_file (file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_542 gsi_data_file (lnk_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_542 gsi_data_file (chr_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_542 gsi_data_file (blk_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_542 gsi_data_file (sock_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_542 gsi_data_file (fifo_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow hal_allocator_client hal_allocator_server (binder (call transfer)))
@@ -17552,12 +17678,12 @@
 (allow hal_allocator_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_allocator.te
 
-(neverallow base_typeattr_540 hidl_allocator_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_547 hidl_allocator_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_allocator.te
 
-(neverallow base_typeattr_541 hidl_allocator_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_548 hidl_allocator_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_allocator_client hidl_memory_hwservice (hwservice_manager (find)))
@@ -17580,12 +17706,12 @@
 (allow hal_atrace_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_atrace.te
 
-(neverallow base_typeattr_542 hal_atrace_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_549 hal_atrace_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_atrace.te
 
-(neverallow base_typeattr_543 hal_atrace_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_550 hal_atrace_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_audio_client hal_audio_server (binder (call transfer)))
@@ -17599,25 +17725,25 @@
 (allow hal_audio_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_audio.te
 
-(neverallow base_typeattr_544 hal_audio_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_551 hal_audio_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_audio.te
 
-(neverallow base_typeattr_545 hal_audio_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_552 hal_audio_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_audio_client hal_audio_service (service_manager (find)))
 (allow hal_audio_server hal_audio_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_audio.te
 
-(neverallow base_typeattr_544 hal_audio_service (service_manager (add)))
+(neverallow base_typeattr_551 hal_audio_service (service_manager (add)))
 ;;* lme
 
 (allow hal_audio_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_audio.te
 
-(neverallow base_typeattr_546 hal_audio_service (service_manager (find)))
+(neverallow base_typeattr_553 hal_audio_service (service_manager (find)))
 ;;* lme
 
 (allow hal_audio ion_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
@@ -17650,7 +17776,7 @@
 
 ;;* lmx 42 system/sepolicy/private/hal_audio.te
 
-(neverallow base_typeattr_547 audio_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_554 audio_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 (allow hal_audio audio_config_prop (file (read getattr map open)))
@@ -17667,25 +17793,25 @@
 (allow hal_audiocontrol_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_audiocontrol.te
 
-(neverallow base_typeattr_548 hal_audiocontrol_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_555 hal_audiocontrol_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_audiocontrol.te
 
-(neverallow base_typeattr_549 hal_audiocontrol_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_556 hal_audiocontrol_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_audiocontrol_client hal_audiocontrol_service (service_manager (find)))
 (allow hal_audiocontrol_server hal_audiocontrol_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_audiocontrol.te
 
-(neverallow base_typeattr_548 hal_audiocontrol_service (service_manager (add)))
+(neverallow base_typeattr_555 hal_audiocontrol_service (service_manager (add)))
 ;;* lme
 
 (allow hal_audiocontrol_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_audiocontrol.te
 
-(neverallow base_typeattr_550 hal_audiocontrol_service (service_manager (find)))
+(neverallow base_typeattr_557 hal_audiocontrol_service (service_manager (find)))
 ;;* lme
 
 (allow hal_audiocontrol_server servicemanager (binder (call transfer)))
@@ -17698,13 +17824,13 @@
 (allow hal_authgraph_server hal_authgraph_service (service_manager (add find)))
 ;;* lmx 3 system/sepolicy/private/hal_authgraph.te
 
-(neverallow base_typeattr_551 hal_authgraph_service (service_manager (add)))
+(neverallow base_typeattr_558 hal_authgraph_service (service_manager (add)))
 ;;* lme
 
 (allow hal_authgraph_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 3 system/sepolicy/private/hal_authgraph.te
 
-(neverallow base_typeattr_552 hal_authgraph_service (service_manager (find)))
+(neverallow base_typeattr_559 hal_authgraph_service (service_manager (find)))
 ;;* lme
 
 (allow hal_authgraph_server servicemanager (binder (call transfer)))
@@ -17720,25 +17846,25 @@
 (allow hal_authsecret_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_authsecret.te
 
-(neverallow base_typeattr_553 hal_authsecret_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_560 hal_authsecret_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_authsecret.te
 
-(neverallow base_typeattr_554 hal_authsecret_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_561 hal_authsecret_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_authsecret_client hal_authsecret_service (service_manager (find)))
 (allow hal_authsecret_server hal_authsecret_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_authsecret.te
 
-(neverallow base_typeattr_553 hal_authsecret_service (service_manager (add)))
+(neverallow base_typeattr_560 hal_authsecret_service (service_manager (add)))
 ;;* lme
 
 (allow hal_authsecret_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_authsecret.te
 
-(neverallow base_typeattr_555 hal_authsecret_service (service_manager (find)))
+(neverallow base_typeattr_562 hal_authsecret_service (service_manager (find)))
 ;;* lme
 
 (allow hal_authsecret_server servicemanager (binder (call transfer)))
@@ -17758,25 +17884,25 @@
 (allow hal_bluetooth_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 6 system/sepolicy/private/hal_bluetooth.te
 
-(neverallow base_typeattr_556 hal_bluetooth_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_563 hal_bluetooth_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/hal_bluetooth.te
 
-(neverallow base_typeattr_557 hal_bluetooth_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_564 hal_bluetooth_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_bluetooth_client hal_bluetooth_service (service_manager (find)))
 (allow hal_bluetooth_server hal_bluetooth_service (service_manager (add find)))
 ;;* lmx 7 system/sepolicy/private/hal_bluetooth.te
 
-(neverallow base_typeattr_556 hal_bluetooth_service (service_manager (add)))
+(neverallow base_typeattr_563 hal_bluetooth_service (service_manager (add)))
 ;;* lme
 
 (allow hal_bluetooth_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 7 system/sepolicy/private/hal_bluetooth.te
 
-(neverallow base_typeattr_558 hal_bluetooth_service (service_manager (find)))
+(neverallow base_typeattr_565 hal_bluetooth_service (service_manager (find)))
 ;;* lme
 
 (allow hal_bluetooth sysfs_wake_lock (file (ioctl read write getattr lock append map open watch watch_reads)))
@@ -17842,12 +17968,12 @@
 (allow hal_bootctl_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 6 system/sepolicy/private/hal_bootctl.te
 
-(neverallow base_typeattr_559 hal_bootctl_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_566 hal_bootctl_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/hal_bootctl.te
 
-(neverallow base_typeattr_560 hal_bootctl_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_567 hal_bootctl_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_bootctl_server proc_bootconfig (file (ioctl read getattr lock map open watch watch_reads)))
@@ -17855,13 +17981,13 @@
 (allow hal_bootctl_server hal_bootctl_service (service_manager (add find)))
 ;;* lmx 10 system/sepolicy/private/hal_bootctl.te
 
-(neverallow base_typeattr_559 hal_bootctl_service (service_manager (add)))
+(neverallow base_typeattr_566 hal_bootctl_service (service_manager (add)))
 ;;* lme
 
 (allow hal_bootctl_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 10 system/sepolicy/private/hal_bootctl.te
 
-(neverallow base_typeattr_561 hal_bootctl_service (service_manager (find)))
+(neverallow base_typeattr_568 hal_bootctl_service (service_manager (find)))
 ;;* lme
 
 (allow hal_broadcastradio_client hal_broadcastradio_server (binder (call transfer)))
@@ -17875,25 +18001,25 @@
 (allow hal_broadcastradio_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_broadcastradio.te
 
-(neverallow base_typeattr_562 hal_broadcastradio_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_569 hal_broadcastradio_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_broadcastradio.te
 
-(neverallow base_typeattr_563 hal_broadcastradio_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_570 hal_broadcastradio_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_broadcastradio_client hal_broadcastradio_service (service_manager (find)))
 (allow hal_broadcastradio_server hal_broadcastradio_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_broadcastradio.te
 
-(neverallow base_typeattr_562 hal_broadcastradio_service (service_manager (add)))
+(neverallow base_typeattr_569 hal_broadcastradio_service (service_manager (add)))
 ;;* lme
 
 (allow hal_broadcastradio_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_broadcastradio.te
 
-(neverallow base_typeattr_564 hal_broadcastradio_service (service_manager (find)))
+(neverallow base_typeattr_571 hal_broadcastradio_service (service_manager (find)))
 ;;* lme
 
 (allow hal_broadcastradio_server servicemanager (binder (call transfer)))
@@ -17912,25 +18038,25 @@
 (allow hal_camera_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 8 system/sepolicy/private/hal_camera.te
 
-(neverallow base_typeattr_565 hal_camera_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_572 hal_camera_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 8 system/sepolicy/private/hal_camera.te
 
-(neverallow base_typeattr_566 hal_camera_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_573 hal_camera_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_camera_client hal_camera_service (service_manager (find)))
 (allow hal_camera_server hal_camera_service (service_manager (add find)))
 ;;* lmx 9 system/sepolicy/private/hal_camera.te
 
-(neverallow base_typeattr_565 hal_camera_service (service_manager (add)))
+(neverallow base_typeattr_572 hal_camera_service (service_manager (add)))
 ;;* lme
 
 (allow hal_camera_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 9 system/sepolicy/private/hal_camera.te
 
-(neverallow base_typeattr_567 hal_camera_service (service_manager (find)))
+(neverallow base_typeattr_574 hal_camera_service (service_manager (find)))
 ;;* lme
 
 (allow hal_camera device (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -17941,7 +18067,7 @@
 (allow hal_camera dmabuf_system_heap_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
 (allow hal_camera_client hal_graphics_allocator (fd (use)))
 (allow hal_camera_server hal_graphics_allocator (fd (use)))
-(allow hal_camera base_typeattr_568 (fd (use)))
+(allow hal_camera base_typeattr_575 (fd (use)))
 (allow hal_camera surfaceflinger (fd (use)))
 (allow hal_camera hal_allocator_server (fd (use)))
 (allow hal_camera shell (fd (use)))
@@ -17954,14 +18080,14 @@
 
 ;;* lmx 39 system/sepolicy/private/hal_camera.te
 
-(neverallow hal_camera_server base_typeattr_296 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
-(neverallow hal_camera_server base_typeattr_296 (udp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
-(neverallow hal_camera_server base_typeattr_296 (rawip_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
+(neverallow hal_camera_server base_typeattr_299 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
+(neverallow hal_camera_server base_typeattr_299 (udp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
+(neverallow hal_camera_server base_typeattr_299 (rawip_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
 ;;* lme
 
 ;;* lmx 42 system/sepolicy/private/hal_camera.te
 
-(neverallow base_typeattr_569 camera_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_576 camera_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 (allow hal_can_controller_client hal_can_controller_server (binder (call transfer)))
@@ -17975,12 +18101,12 @@
 (allow hal_can_controller_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_can.te
 
-(neverallow base_typeattr_570 hal_can_controller_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_577 hal_can_controller_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_can.te
 
-(neverallow base_typeattr_571 hal_can_controller_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_578 hal_can_controller_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_can_bus_client hal_can_bus_server (binder (call transfer)))
@@ -17994,25 +18120,25 @@
 (allow hal_can_bus_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 9 system/sepolicy/private/hal_can.te
 
-(neverallow base_typeattr_572 hal_can_bus_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_579 hal_can_bus_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 9 system/sepolicy/private/hal_can.te
 
-(neverallow base_typeattr_573 hal_can_bus_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_580 hal_can_bus_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_can_controller_client hal_can_controller_service (service_manager (find)))
 (allow hal_can_controller_server hal_can_controller_service (service_manager (add find)))
 ;;* lmx 12 system/sepolicy/private/hal_can.te
 
-(neverallow base_typeattr_570 hal_can_controller_service (service_manager (add)))
+(neverallow base_typeattr_577 hal_can_controller_service (service_manager (add)))
 ;;* lme
 
 (allow hal_can_controller_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 12 system/sepolicy/private/hal_can.te
 
-(neverallow base_typeattr_574 hal_can_controller_service (service_manager (find)))
+(neverallow base_typeattr_581 hal_can_controller_service (service_manager (find)))
 ;;* lme
 
 (allow hal_can_controller servicemanager (binder (call transfer)))
@@ -18028,12 +18154,12 @@
 (allow hal_cas_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_cas.te
 
-(neverallow base_typeattr_575 hal_cas_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_582 hal_cas_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_cas.te
 
-(neverallow base_typeattr_576 hal_cas_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_583 hal_cas_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_cas_server hidl_memory_hwservice (hwservice_manager (find)))
@@ -18041,13 +18167,13 @@
 (allow hal_cas_server hal_cas_service (service_manager (add find)))
 ;;* lmx 8 system/sepolicy/private/hal_cas.te
 
-(neverallow base_typeattr_575 hal_cas_service (service_manager (add)))
+(neverallow base_typeattr_582 hal_cas_service (service_manager (add)))
 ;;* lme
 
 (allow hal_cas_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 8 system/sepolicy/private/hal_cas.te
 
-(neverallow base_typeattr_577 hal_cas_service (service_manager (find)))
+(neverallow base_typeattr_584 hal_cas_service (service_manager (find)))
 ;;* lme
 
 (allow hal_cas_server servicemanager (binder (call transfer)))
@@ -18113,25 +18239,25 @@
 (allow hal_codec2_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 9 system/sepolicy/private/hal_codec2.te
 
-(neverallow base_typeattr_578 hal_codec2_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_585 hal_codec2_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 9 system/sepolicy/private/hal_codec2.te
 
-(neverallow base_typeattr_579 hal_codec2_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_586 hal_codec2_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_codec2_client hal_codec2_service (service_manager (find)))
 (allow hal_codec2_server hal_codec2_service (service_manager (add find)))
 ;;* lmx 10 system/sepolicy/private/hal_codec2.te
 
-(neverallow base_typeattr_578 hal_codec2_service (service_manager (add)))
+(neverallow base_typeattr_585 hal_codec2_service (service_manager (add)))
 ;;* lme
 
 (allow hal_codec2_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 10 system/sepolicy/private/hal_codec2.te
 
-(neverallow base_typeattr_580 hal_codec2_service (service_manager (find)))
+(neverallow base_typeattr_587 hal_codec2_service (service_manager (find)))
 ;;* lme
 
 (allow hal_codec2_server hal_graphics_composer (fd (use)))
@@ -18139,10 +18265,10 @@
 (allow hal_codec2_server hal_camera (fd (use)))
 (allow hal_codec2_server bufferhubd (fd (use)))
 (allow hal_codec2_client ion_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_581 surfaceflinger_service (service_manager (find)))
+(allow base_typeattr_588 surfaceflinger_service (service_manager (find)))
 (allow hal_codec2_server su (fifo_file (read)))
 (allow hal_codec2_server hal_codec2_client (fifo_file (read)))
-(allow hal_codec2_server base_typeattr_254 (fifo_file (read)))
+(allow hal_codec2_server base_typeattr_257 (fifo_file (read)))
 (allow hal_configstore_client hal_configstore_server (binder (call transfer)))
 (allow hal_configstore_server hal_configstore_client (binder (transfer)))
 (allow hal_configstore_client hal_configstore_server (fd (use)))
@@ -18151,12 +18277,12 @@
 (allow hal_configstore_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_configstore.te
 
-(neverallow base_typeattr_582 hal_configstore_ISurfaceFlingerConfigs (hwservice_manager (add)))
+(neverallow base_typeattr_589 hal_configstore_ISurfaceFlingerConfigs (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_configstore.te
 
-(neverallow base_typeattr_583 hal_configstore_ISurfaceFlingerConfigs (hwservice_manager (find)))
+(neverallow base_typeattr_590 hal_configstore_ISurfaceFlingerConfigs (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_configstore_server su (fifo_file (append)))
@@ -18207,15 +18333,15 @@
 
 ;;* lmx 37 system/sepolicy/private/hal_configstore.te
 
-(neverallow hal_configstore_server base_typeattr_584 (unix_stream_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind connectto)))
-(neverallow hal_configstore_server base_typeattr_584 (unix_dgram_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow hal_configstore_server base_typeattr_591 (unix_stream_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind connectto)))
+(neverallow hal_configstore_server base_typeattr_591 (unix_dgram_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
 ;;* lme
 
 ;;* lmx 45 system/sepolicy/private/hal_configstore.te
 
-(neverallow hal_configstore_server base_typeattr_585 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow hal_configstore_server base_typeattr_585 (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow hal_configstore_server base_typeattr_585 (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow hal_configstore_server base_typeattr_592 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow hal_configstore_server base_typeattr_592 (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow hal_configstore_server base_typeattr_592 (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 51 system/sepolicy/private/hal_configstore.te
@@ -18240,7 +18366,7 @@
 
 ;;* lmx 58 system/sepolicy/private/hal_configstore.te
 
-(neverallow hal_configstore_server base_typeattr_233 (service_manager (add find list)))
+(neverallow hal_configstore_server base_typeattr_236 (service_manager (add find list)))
 ;;* lme
 
 ;;* lmx 61 system/sepolicy/private/hal_configstore.te
@@ -18253,18 +18379,18 @@
 
 ;;* lmx 64 system/sepolicy/private/hal_configstore.te
 
-(neverallow hal_configstore_server base_typeattr_233 (process (ptrace)))
+(neverallow hal_configstore_server base_typeattr_236 (process (ptrace)))
 ;;* lme
 
 ;;* lmx 67 system/sepolicy/private/hal_configstore.te
 
-(neverallow hal_configstore_server base_typeattr_233 (file (relabelfrom relabelto)))
-(neverallow hal_configstore_server base_typeattr_233 (dir (relabelfrom relabelto)))
-(neverallow hal_configstore_server base_typeattr_233 (lnk_file (relabelfrom relabelto)))
-(neverallow hal_configstore_server base_typeattr_233 (chr_file (relabelfrom relabelto)))
-(neverallow hal_configstore_server base_typeattr_233 (blk_file (relabelfrom relabelto)))
-(neverallow hal_configstore_server base_typeattr_233 (sock_file (relabelfrom relabelto)))
-(neverallow hal_configstore_server base_typeattr_233 (fifo_file (relabelfrom relabelto)))
+(neverallow hal_configstore_server base_typeattr_236 (file (relabelfrom relabelto)))
+(neverallow hal_configstore_server base_typeattr_236 (dir (relabelfrom relabelto)))
+(neverallow hal_configstore_server base_typeattr_236 (lnk_file (relabelfrom relabelto)))
+(neverallow hal_configstore_server base_typeattr_236 (chr_file (relabelfrom relabelto)))
+(neverallow hal_configstore_server base_typeattr_236 (blk_file (relabelfrom relabelto)))
+(neverallow hal_configstore_server base_typeattr_236 (sock_file (relabelfrom relabelto)))
+(neverallow hal_configstore_server base_typeattr_236 (fifo_file (relabelfrom relabelto)))
 ;;* lme
 
 (allow hal_confirmationui_client hal_confirmationui_server (binder (call transfer)))
@@ -18275,25 +18401,25 @@
 (allow hal_confirmationui_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_confirmationui.te
 
-(neverallow base_typeattr_586 hal_confirmationui_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_593 hal_confirmationui_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_confirmationui.te
 
-(neverallow base_typeattr_587 hal_confirmationui_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_594 hal_confirmationui_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_confirmationui_client hal_confirmationui_service (service_manager (find)))
 (allow hal_confirmationui_server hal_confirmationui_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_confirmationui.te
 
-(neverallow base_typeattr_586 hal_confirmationui_service (service_manager (add)))
+(neverallow base_typeattr_593 hal_confirmationui_service (service_manager (add)))
 ;;* lme
 
 (allow hal_confirmationui_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_confirmationui.te
 
-(neverallow base_typeattr_588 hal_confirmationui_service (service_manager (find)))
+(neverallow base_typeattr_595 hal_confirmationui_service (service_manager (find)))
 ;;* lme
 
 (allow hal_confirmationui_server servicemanager (binder (call transfer)))
@@ -18308,7 +18434,7 @@
 (allow hal_contexthub_server hal_contexthub_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_contexthub.te
 
-(neverallow base_typeattr_589 hal_contexthub_service (service_manager (add)))
+(neverallow base_typeattr_596 hal_contexthub_service (service_manager (add)))
 ;;* lme
 
 (allow hal_contexthub_server su (tcp_socket (read write accept getopt)))
@@ -18321,12 +18447,12 @@
 (allow hal_contexthub_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 10 system/sepolicy/private/hal_contexthub.te
 
-(neverallow base_typeattr_589 hal_contexthub_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_596 hal_contexthub_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 10 system/sepolicy/private/hal_contexthub.te
 
-(neverallow base_typeattr_590 hal_contexthub_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_597 hal_contexthub_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_drm_server servicemanager (binder (call transfer)))
@@ -18342,25 +18468,25 @@
 (allow hal_drm_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 6 system/sepolicy/private/hal_drm.te
 
-(neverallow base_typeattr_591 hal_drm_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_598 hal_drm_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/hal_drm.te
 
-(neverallow base_typeattr_592 hal_drm_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_599 hal_drm_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_drm_client hal_drm_service (service_manager (find)))
 (allow hal_drm_server hal_drm_service (service_manager (add find)))
 ;;* lmx 7 system/sepolicy/private/hal_drm.te
 
-(neverallow base_typeattr_591 hal_drm_service (service_manager (add)))
+(neverallow base_typeattr_598 hal_drm_service (service_manager (add)))
 ;;* lme
 
 (allow hal_drm_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 7 system/sepolicy/private/hal_drm.te
 
-(neverallow base_typeattr_593 hal_drm_service (service_manager (find)))
+(neverallow base_typeattr_600 hal_drm_service (service_manager (find)))
 ;;* lme
 
 (allow hal_drm hidl_memory_hwservice (hwservice_manager (find)))
@@ -18386,7 +18512,7 @@
 (allow hal_drm mediaserver (fd (use)))
 (allow hal_drm sysfs (file (ioctl read getattr lock map open watch watch_reads)))
 (allow hal_drm tee_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
-(allow hal_drm_server base_typeattr_568 (fd (use)))
+(allow hal_drm_server base_typeattr_575 (fd (use)))
 (allowx hal_drm self (ioctl tcp_socket ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
 (allowx hal_drm self (ioctl udp_socket ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
 (allowx hal_drm self (ioctl rawip_socket ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
@@ -18438,25 +18564,25 @@
 (allow hal_dumpstate_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 7 system/sepolicy/private/hal_dumpstate.te
 
-(neverallow base_typeattr_594 hal_dumpstate_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_601 hal_dumpstate_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 7 system/sepolicy/private/hal_dumpstate.te
 
-(neverallow base_typeattr_595 hal_dumpstate_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_602 hal_dumpstate_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_dumpstate_client hal_dumpstate_service (service_manager (find)))
 (allow hal_dumpstate_server hal_dumpstate_service (service_manager (add find)))
 ;;* lmx 8 system/sepolicy/private/hal_dumpstate.te
 
-(neverallow base_typeattr_594 hal_dumpstate_service (service_manager (add)))
+(neverallow base_typeattr_601 hal_dumpstate_service (service_manager (add)))
 ;;* lme
 
 (allow hal_dumpstate_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 8 system/sepolicy/private/hal_dumpstate.te
 
-(neverallow base_typeattr_596 hal_dumpstate_service (service_manager (find)))
+(neverallow base_typeattr_603 hal_dumpstate_service (service_manager (find)))
 ;;* lme
 
 (allow hal_dumpstate_server servicemanager (binder (call transfer)))
@@ -18484,20 +18610,20 @@
 (allow hal_evs_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 12 system/sepolicy/private/hal_evs.te
 
-(neverallow base_typeattr_597 hal_evs_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_604 hal_evs_hwservice (hwservice_manager (add)))
 ;;* lme
 
 (allow hal_evs_client hal_evs_service (service_manager (find)))
 (allow hal_evs_server hal_evs_service (service_manager (add find)))
 ;;* lmx 15 system/sepolicy/private/hal_evs.te
 
-(neverallow base_typeattr_598 hal_evs_service (service_manager (add)))
+(neverallow base_typeattr_605 hal_evs_service (service_manager (add)))
 ;;* lme
 
 (allow hal_evs_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 15 system/sepolicy/private/hal_evs.te
 
-(neverallow base_typeattr_599 hal_evs_service (service_manager (find)))
+(neverallow base_typeattr_606 hal_evs_service (service_manager (find)))
 ;;* lme
 
 (allow hal_face_client hal_face_server (binder (call transfer)))
@@ -18511,32 +18637,32 @@
 (allow hal_face_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_face.te
 
-(neverallow base_typeattr_600 hal_face_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_607 hal_face_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_face.te
 
-(neverallow base_typeattr_601 hal_face_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_608 hal_face_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_face_client hal_face_service (service_manager (find)))
 (allow hal_face_server hal_face_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_face.te
 
-(neverallow base_typeattr_600 hal_face_service (service_manager (add)))
+(neverallow base_typeattr_607 hal_face_service (service_manager (add)))
 ;;* lme
 
 (allow hal_face_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_face.te
 
-(neverallow base_typeattr_602 hal_face_service (service_manager (find)))
+(neverallow base_typeattr_609 hal_face_service (service_manager (find)))
 ;;* lme
 
 (allow hal_face_server servicemanager (binder (call transfer)))
 (allow servicemanager hal_face_server (binder (call transfer)))
 (allow hal_face ion_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_603 face_vendor_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
-(allow base_typeattr_603 face_vendor_data_file (dir (ioctl read write getattr lock open watch watch_reads add_name remove_name search)))
+(allow base_typeattr_610 face_vendor_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(allow base_typeattr_610 face_vendor_data_file (dir (ioctl read write getattr lock open watch watch_reads add_name remove_name search)))
 (allow hal_fastboot_client hal_fastboot_server (binder (call transfer)))
 (allow hal_fastboot_server hal_fastboot_client (binder (transfer)))
 (allow hal_fastboot_client hal_fastboot_server (fd (use)))
@@ -18544,13 +18670,13 @@
 (allow hal_fastboot_server hal_fastboot_service (service_manager (add find)))
 ;;* lmx 4 system/sepolicy/private/hal_fastboot.te
 
-(neverallow base_typeattr_604 hal_fastboot_service (service_manager (add)))
+(neverallow base_typeattr_611 hal_fastboot_service (service_manager (add)))
 ;;* lme
 
 (allow hal_fastboot_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 4 system/sepolicy/private/hal_fastboot.te
 
-(neverallow base_typeattr_605 hal_fastboot_service (service_manager (find)))
+(neverallow base_typeattr_612 hal_fastboot_service (service_manager (find)))
 ;;* lme
 
 (allow hal_fastboot_server servicemanager (binder (call transfer)))
@@ -18567,41 +18693,41 @@
 (allow hal_fingerprint_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_fingerprint.te
 
-(neverallow base_typeattr_606 hal_fingerprint_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_613 hal_fingerprint_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_fingerprint.te
 
-(neverallow base_typeattr_607 hal_fingerprint_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_614 hal_fingerprint_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_fingerprint_client hal_fingerprint_service (service_manager (find)))
 (allow hal_fingerprint_server hal_fingerprint_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_fingerprint.te
 
-(neverallow base_typeattr_606 hal_fingerprint_service (service_manager (add)))
+(neverallow base_typeattr_613 hal_fingerprint_service (service_manager (add)))
 ;;* lme
 
 (allow hal_fingerprint_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_fingerprint.te
 
-(neverallow base_typeattr_608 hal_fingerprint_service (service_manager (find)))
+(neverallow base_typeattr_615 hal_fingerprint_service (service_manager (find)))
 ;;* lme
 
 (allow hal_fingerprint_server servicemanager (binder (call transfer)))
 (allow servicemanager hal_fingerprint_server (binder (call transfer)))
 (allow hal_fingerprint ion_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_609 fingerprint_vendor_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
-(allow base_typeattr_609 fingerprint_vendor_data_file (dir (ioctl read write getattr lock open watch watch_reads add_name remove_name search)))
+(allow base_typeattr_616 fingerprint_vendor_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(allow base_typeattr_616 fingerprint_vendor_data_file (dir (ioctl read write getattr lock open watch watch_reads add_name remove_name search)))
 (allow hal_fingerprint cgroup (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow hal_fingerprint cgroup (file (ioctl read getattr lock map open watch watch_reads)))
 (allow hal_fingerprint cgroup (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow hal_fingerprint cgroup_v2 (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow hal_fingerprint cgroup_v2 (file (ioctl read getattr lock map open watch watch_reads)))
 (allow hal_fingerprint cgroup_v2 (lnk_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_609 sysfs (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow base_typeattr_609 sysfs (file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_609 sysfs (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_616 sysfs (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow base_typeattr_616 sysfs (file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_616 sysfs (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow hal_gatekeeper_client hal_gatekeeper_server (binder (call transfer)))
 (allow hal_gatekeeper_server hal_gatekeeper_client (binder (transfer)))
 (allow hal_gatekeeper_client hal_gatekeeper_server (fd (use)))
@@ -18610,25 +18736,25 @@
 (allow hal_gatekeeper_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 3 system/sepolicy/private/hal_gatekeeper.te
 
-(neverallow base_typeattr_610 hal_gatekeeper_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_617 hal_gatekeeper_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 3 system/sepolicy/private/hal_gatekeeper.te
 
-(neverallow base_typeattr_611 hal_gatekeeper_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_618 hal_gatekeeper_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_gatekeeper_client hal_gatekeeper_service (service_manager (find)))
 (allow hal_gatekeeper_server hal_gatekeeper_service (service_manager (add find)))
 ;;* lmx 4 system/sepolicy/private/hal_gatekeeper.te
 
-(neverallow base_typeattr_610 hal_gatekeeper_service (service_manager (add)))
+(neverallow base_typeattr_617 hal_gatekeeper_service (service_manager (add)))
 ;;* lme
 
 (allow hal_gatekeeper_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 4 system/sepolicy/private/hal_gatekeeper.te
 
-(neverallow base_typeattr_612 hal_gatekeeper_service (service_manager (find)))
+(neverallow base_typeattr_619 hal_gatekeeper_service (service_manager (find)))
 ;;* lme
 
 (allow hal_gatekeeper_server servicemanager (binder (call transfer)))
@@ -18647,25 +18773,25 @@
 (allow hal_gnss_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_gnss.te
 
-(neverallow base_typeattr_613 hal_gnss_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_620 hal_gnss_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_gnss.te
 
-(neverallow base_typeattr_614 hal_gnss_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_621 hal_gnss_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_gnss_client hal_gnss_service (service_manager (find)))
 (allow hal_gnss_server hal_gnss_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_gnss.te
 
-(neverallow base_typeattr_613 hal_gnss_service (service_manager (add)))
+(neverallow base_typeattr_620 hal_gnss_service (service_manager (add)))
 ;;* lme
 
 (allow hal_gnss_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_gnss.te
 
-(neverallow base_typeattr_615 hal_gnss_service (service_manager (find)))
+(neverallow base_typeattr_622 hal_gnss_service (service_manager (find)))
 ;;* lme
 
 (allow hal_gnss_server servicemanager (binder (call transfer)))
@@ -18680,12 +18806,12 @@
 (allow hal_graphics_allocator_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_graphics_allocator.te
 
-(neverallow base_typeattr_616 hal_graphics_allocator_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_623 hal_graphics_allocator_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_graphics_allocator.te
 
-(neverallow base_typeattr_617 hal_graphics_allocator_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_624 hal_graphics_allocator_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_graphics_allocator_client hal_graphics_mapper_hwservice (hwservice_manager (find)))
@@ -18702,13 +18828,13 @@
 (allow hal_graphics_allocator_server hal_graphics_allocator_service (service_manager (add find)))
 ;;* lmx 22 system/sepolicy/private/hal_graphics_allocator.te
 
-(neverallow base_typeattr_616 hal_graphics_allocator_service (service_manager (add)))
+(neverallow base_typeattr_623 hal_graphics_allocator_service (service_manager (add)))
 ;;* lme
 
 (allow hal_graphics_allocator_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 22 system/sepolicy/private/hal_graphics_allocator.te
 
-(neverallow base_typeattr_618 hal_graphics_allocator_service (service_manager (find)))
+(neverallow base_typeattr_625 hal_graphics_allocator_service (service_manager (find)))
 ;;* lme
 
 (allow hal_graphics_allocator_server servicemanager (binder (call transfer)))
@@ -18730,12 +18856,12 @@
 (allow hal_graphics_composer_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 7 system/sepolicy/private/hal_graphics_composer.te
 
-(neverallow base_typeattr_619 hal_graphics_composer_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_626 hal_graphics_composer_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 7 system/sepolicy/private/hal_graphics_composer.te
 
-(neverallow base_typeattr_620 hal_graphics_composer_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_627 hal_graphics_composer_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_graphics_composer_server hal_graphics_mapper_hwservice (hwservice_manager (find)))
@@ -18762,13 +18888,13 @@
 (allow hal_graphics_composer_server hal_graphics_composer_service (service_manager (add find)))
 ;;* lmx 38 system/sepolicy/private/hal_graphics_composer.te
 
-(neverallow base_typeattr_619 hal_graphics_composer_service (service_manager (add)))
+(neverallow base_typeattr_626 hal_graphics_composer_service (service_manager (add)))
 ;;* lme
 
 (allow hal_graphics_composer_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 38 system/sepolicy/private/hal_graphics_composer.te
 
-(neverallow base_typeattr_621 hal_graphics_composer_service (service_manager (find)))
+(neverallow base_typeattr_628 hal_graphics_composer_service (service_manager (find)))
 ;;* lme
 
 (allow hal_health_client hal_health_server (binder (call transfer)))
@@ -18782,25 +18908,25 @@
 (allow hal_health_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_health.te
 
-(neverallow base_typeattr_622 hal_health_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_629 hal_health_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_health.te
 
-(neverallow base_typeattr_623 hal_health_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_630 hal_health_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_health_client hal_health_service (service_manager (find)))
 (allow hal_health_server hal_health_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_health.te
 
-(neverallow base_typeattr_622 hal_health_service (service_manager (add)))
+(neverallow base_typeattr_629 hal_health_service (service_manager (add)))
 ;;* lme
 
 (allow hal_health_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_health.te
 
-(neverallow base_typeattr_624 hal_health_service (service_manager (find)))
+(neverallow base_typeattr_631 hal_health_service (service_manager (find)))
 ;;* lme
 
 (allow hal_health_server self (netlink_kobject_uevent_socket (read write create getattr setattr lock append map bind connect getopt setopt shutdown)))
@@ -18840,25 +18966,25 @@
 (allow hal_health_storage_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 7 system/sepolicy/private/hal_health_storage.te
 
-(neverallow base_typeattr_625 hal_health_storage_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_632 hal_health_storage_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 7 system/sepolicy/private/hal_health_storage.te
 
-(neverallow base_typeattr_626 hal_health_storage_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_633 hal_health_storage_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_health_storage_client hal_health_storage_service (service_manager (find)))
 (allow hal_health_storage_server hal_health_storage_service (service_manager (add find)))
 ;;* lmx 8 system/sepolicy/private/hal_health_storage.te
 
-(neverallow base_typeattr_625 hal_health_storage_service (service_manager (add)))
+(neverallow base_typeattr_632 hal_health_storage_service (service_manager (add)))
 ;;* lme
 
 (allow hal_health_storage_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 8 system/sepolicy/private/hal_health_storage.te
 
-(neverallow base_typeattr_627 hal_health_storage_service (service_manager (find)))
+(neverallow base_typeattr_634 hal_health_storage_service (service_manager (find)))
 ;;* lme
 
 (allow hal_health_storage_server gsi_metadata_file_type (dir (search)))
@@ -18873,13 +18999,13 @@
 (allow hal_identity_server hal_identity_service (service_manager (add find)))
 ;;* lmx 4 system/sepolicy/private/hal_identity.te
 
-(neverallow base_typeattr_628 hal_identity_service (service_manager (add)))
+(neverallow base_typeattr_635 hal_identity_service (service_manager (add)))
 ;;* lme
 
 (allow hal_identity_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 4 system/sepolicy/private/hal_identity.te
 
-(neverallow base_typeattr_629 hal_identity_service (service_manager (find)))
+(neverallow base_typeattr_636 hal_identity_service (service_manager (find)))
 ;;* lme
 
 (allow hal_identity_server servicemanager (binder (call transfer)))
@@ -18893,12 +19019,12 @@
 (allow hal_input_classifier_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_input_classifier.te
 
-(neverallow base_typeattr_630 hal_input_classifier_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_637 hal_input_classifier_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_input_classifier.te
 
-(neverallow base_typeattr_631 hal_input_classifier_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_638 hal_input_classifier_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_input_processor_client hal_input_processor_server (binder (call transfer)))
@@ -18911,13 +19037,13 @@
 (allow hal_input_processor_server hal_input_processor_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_input_processor.te
 
-(neverallow base_typeattr_632 hal_input_processor_service (service_manager (add)))
+(neverallow base_typeattr_639 hal_input_processor_service (service_manager (add)))
 ;;* lme
 
 (allow hal_input_processor_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_input_processor.te
 
-(neverallow base_typeattr_633 hal_input_processor_service (service_manager (find)))
+(neverallow base_typeattr_640 hal_input_processor_service (service_manager (find)))
 ;;* lme
 
 (allow hal_input_processor_server dumpstate (fifo_file (write)))
@@ -18931,13 +19057,13 @@
 (allow hal_ir_server hal_ir_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_ir.te
 
-(neverallow base_typeattr_634 hal_ir_service (service_manager (add)))
+(neverallow base_typeattr_641 hal_ir_service (service_manager (add)))
 ;;* lme
 
 (allow hal_ir_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_ir.te
 
-(neverallow base_typeattr_635 hal_ir_service (service_manager (find)))
+(neverallow base_typeattr_642 hal_ir_service (service_manager (find)))
 ;;* lme
 
 (allow hal_ir_server servicemanager (binder (call transfer)))
@@ -18948,12 +19074,12 @@
 (allow hal_ir_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 8 system/sepolicy/private/hal_ir.te
 
-(neverallow base_typeattr_634 hal_ir_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_641 hal_ir_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 8 system/sepolicy/private/hal_ir.te
 
-(neverallow base_typeattr_636 hal_ir_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_643 hal_ir_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_ivn_client hal_ivn_server (binder (call transfer)))
@@ -18963,13 +19089,13 @@
 (allow hal_ivn_server hal_ivn_service (service_manager (add find)))
 ;;* lmx 4 system/sepolicy/private/hal_ivn.te
 
-(neverallow base_typeattr_637 hal_ivn_service (service_manager (add)))
+(neverallow base_typeattr_644 hal_ivn_service (service_manager (add)))
 ;;* lme
 
 (allow hal_ivn_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 4 system/sepolicy/private/hal_ivn.te
 
-(neverallow base_typeattr_638 hal_ivn_service (service_manager (find)))
+(neverallow base_typeattr_645 hal_ivn_service (service_manager (find)))
 ;;* lme
 
 (allow hal_keymaster_client hal_keymaster_server (binder (call transfer)))
@@ -18980,12 +19106,12 @@
 (allow hal_keymaster_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_keymaster.te
 
-(neverallow base_typeattr_639 hal_keymaster_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_646 hal_keymaster_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_keymaster.te
 
-(neverallow base_typeattr_640 hal_keymaster_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_647 hal_keymaster_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_keymaster tee_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
@@ -18997,33 +19123,33 @@
 (allow hal_keymint_server hal_keymint_service (service_manager (add find)))
 ;;* lmx 3 system/sepolicy/private/hal_keymint.te
 
-(neverallow base_typeattr_641 hal_keymint_service (service_manager (add)))
+(neverallow base_typeattr_648 hal_keymint_service (service_manager (add)))
 ;;* lme
 
 (allow hal_keymint_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 3 system/sepolicy/private/hal_keymint.te
 
-(neverallow base_typeattr_642 hal_keymint_service (service_manager (find)))
+(neverallow base_typeattr_649 hal_keymint_service (service_manager (find)))
 ;;* lme
 
 (allow hal_keymint_client hal_remotelyprovisionedcomponent_service (service_manager (find)))
 (allow hal_keymint_server hal_remotelyprovisionedcomponent_service (service_manager (add find)))
 ;;* lmx 4 system/sepolicy/private/hal_keymint.te
 
-(neverallow base_typeattr_641 hal_remotelyprovisionedcomponent_service (service_manager (add)))
+(neverallow base_typeattr_648 hal_remotelyprovisionedcomponent_service (service_manager (add)))
 ;;* lme
 
 (allow hal_keymint_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 4 system/sepolicy/private/hal_keymint.te
 
-(neverallow base_typeattr_642 hal_remotelyprovisionedcomponent_service (service_manager (find)))
+(neverallow base_typeattr_649 hal_remotelyprovisionedcomponent_service (service_manager (find)))
 ;;* lme
 
 (allow hal_keymint_server servicemanager (binder (call transfer)))
 (allow servicemanager hal_keymint_server (binder (transfer)))
 (allow hal_keymint_server servicemanager (fd (use)))
-(allow base_typeattr_643 tee_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
-(allow base_typeattr_643 ion_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
+(allow base_typeattr_650 tee_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
+(allow base_typeattr_650 ion_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
 (allow init hal_keymint_system_exec (file (read getattr map execute open)))
 (allow init hal_keymint_system (process (transition)))
 (allow hal_keymint_system hal_keymint_system_exec (file (read getattr map execute open entrypoint)))
@@ -19036,12 +19162,12 @@
 (allow hal_lazy_test_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 1 system/sepolicy/private/hal_lazy_test.te
 
-(neverallow base_typeattr_644 hal_lazy_test_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_651 hal_lazy_test_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 1 system/sepolicy/private/hal_lazy_test.te
 
-(neverallow base_typeattr_645 hal_lazy_test_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_652 hal_lazy_test_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_light_client hal_light_server (binder (call transfer)))
@@ -19055,25 +19181,25 @@
 (allow hal_light_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_light.te
 
-(neverallow base_typeattr_646 hal_light_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_653 hal_light_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_light.te
 
-(neverallow base_typeattr_647 hal_light_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_654 hal_light_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_light_client hal_light_service (service_manager (find)))
 (allow hal_light_server hal_light_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_light.te
 
-(neverallow base_typeattr_646 hal_light_service (service_manager (add)))
+(neverallow base_typeattr_653 hal_light_service (service_manager (add)))
 ;;* lme
 
 (allow hal_light_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_light.te
 
-(neverallow base_typeattr_648 hal_light_service (service_manager (find)))
+(neverallow base_typeattr_655 hal_light_service (service_manager (find)))
 ;;* lme
 
 (allow hal_light_server servicemanager (binder (call transfer)))
@@ -19096,12 +19222,12 @@
 (allow hal_lowpan_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 7 system/sepolicy/private/hal_lowpan.te
 
-(neverallow base_typeattr_649 hal_lowpan_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_656 hal_lowpan_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 7 system/sepolicy/private/hal_lowpan.te
 
-(neverallow base_typeattr_650 hal_lowpan_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_657 hal_lowpan_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_lowpan_server property_socket (sock_file (write)))
@@ -19111,7 +19237,7 @@
 (allow hal_lowpan_server lowpan_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
 ;;* lmx 20 system/sepolicy/private/hal_lowpan.te
 
-(neverallow base_typeattr_651 lowpan_device (chr_file (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_658 lowpan_device (chr_file (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 (allow hal_macsec_client hal_macsec_server (binder (call transfer)))
@@ -19124,13 +19250,13 @@
 (allow hal_macsec_server hal_macsec_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_macsec.te
 
-(neverallow base_typeattr_652 hal_macsec_service (service_manager (add)))
+(neverallow base_typeattr_659 hal_macsec_service (service_manager (add)))
 ;;* lme
 
 (allow hal_macsec_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_macsec.te
 
-(neverallow base_typeattr_653 hal_macsec_service (service_manager (find)))
+(neverallow base_typeattr_660 hal_macsec_service (service_manager (find)))
 ;;* lme
 
 (allow hal_macsec_server servicemanager (binder (call transfer)))
@@ -19145,13 +19271,13 @@
 (allow hal_mediaquality_server hal_mediaquality_service (service_manager (add find)))
 ;;* lmx 1 system/sepolicy/private/hal_mediaquality.te
 
-(neverallow base_typeattr_654 hal_mediaquality_service (service_manager (add)))
+(neverallow base_typeattr_661 hal_mediaquality_service (service_manager (add)))
 ;;* lme
 
 (allow hal_mediaquality_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 1 system/sepolicy/private/hal_mediaquality.te
 
-(neverallow base_typeattr_655 hal_mediaquality_service (service_manager (find)))
+(neverallow base_typeattr_662 hal_mediaquality_service (service_manager (find)))
 ;;* lme
 
 (allow hal_mediaquality_server servicemanager (binder (call transfer)))
@@ -19168,25 +19294,25 @@
 (allow hal_memtrack_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_memtrack.te
 
-(neverallow base_typeattr_656 hal_memtrack_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_663 hal_memtrack_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_memtrack.te
 
-(neverallow base_typeattr_657 hal_memtrack_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_664 hal_memtrack_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_memtrack_client hal_memtrack_service (service_manager (find)))
 (allow hal_memtrack_server hal_memtrack_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_memtrack.te
 
-(neverallow base_typeattr_656 hal_memtrack_service (service_manager (add)))
+(neverallow base_typeattr_663 hal_memtrack_service (service_manager (add)))
 ;;* lme
 
 (allow hal_memtrack_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_memtrack.te
 
-(neverallow base_typeattr_658 hal_memtrack_service (service_manager (find)))
+(neverallow base_typeattr_665 hal_memtrack_service (service_manager (find)))
 ;;* lme
 
 (allow hal_memtrack_server servicemanager (binder (call transfer)))
@@ -19203,12 +19329,12 @@
 (allow hal_neuralnetworks_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_neuralnetworks.te
 
-(neverallow base_typeattr_659 hal_neuralnetworks_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_666 hal_neuralnetworks_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_neuralnetworks.te
 
-(neverallow base_typeattr_660 hal_neuralnetworks_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_667 hal_neuralnetworks_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_neuralnetworks hidl_memory_hwservice (hwservice_manager (find)))
@@ -19227,20 +19353,20 @@
 (allow hal_neuralnetworks_client device_config_nnapi_native_prop (file (read getattr map open)))
 ;;* lmx 39 system/sepolicy/private/hal_neuralnetworks.te
 
-(neverallow base_typeattr_232 nnapi_ext_deny_product_prop (property_service (set)))
+(neverallow base_typeattr_235 nnapi_ext_deny_product_prop (property_service (set)))
 ;;* lme
 
 (allow hal_neuralnetworks_client hal_neuralnetworks_service (service_manager (find)))
 (allow hal_neuralnetworks_server hal_neuralnetworks_service (service_manager (add find)))
 ;;* lmx 42 system/sepolicy/private/hal_neuralnetworks.te
 
-(neverallow base_typeattr_659 hal_neuralnetworks_service (service_manager (add)))
+(neverallow base_typeattr_666 hal_neuralnetworks_service (service_manager (add)))
 ;;* lme
 
 (allow hal_neuralnetworks_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 42 system/sepolicy/private/hal_neuralnetworks.te
 
-(neverallow base_typeattr_661 hal_neuralnetworks_service (service_manager (find)))
+(neverallow base_typeattr_668 hal_neuralnetworks_service (service_manager (find)))
 ;;* lme
 
 (allow hal_neuralnetworks_server servicemanager (binder (call transfer)))
@@ -19251,19 +19377,19 @@
 (allow hal_neuralnetworks_server dumpstate (fifo_file (write)))
 ;;* lmx 17 system/sepolicy/private/hal_neverallows.te
 
-(neverallow base_typeattr_662 self (capability (net_admin net_raw)))
-(neverallow base_typeattr_662 self (cap_userns (net_admin net_raw)))
+(neverallow base_typeattr_669 self (capability (net_admin net_raw)))
+(neverallow base_typeattr_669 self (cap_userns (net_admin net_raw)))
 ;;* lme
 
 ;;* lmx 40 system/sepolicy/private/hal_neverallows.te
 
-(neverallow base_typeattr_663 domain (udp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
-(neverallow base_typeattr_663 domain (rawip_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
+(neverallow base_typeattr_670 domain (udp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
+(neverallow base_typeattr_670 domain (rawip_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
 ;;* lme
 
 ;;* lmx 57 system/sepolicy/private/hal_neverallows.te
 
-(neverallow base_typeattr_664 base_typeattr_296 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
+(neverallow base_typeattr_671 base_typeattr_299 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
 ;;* lme
 
 ;;* lmx 61 system/sepolicy/private/hal_neverallows.te
@@ -19301,17 +19427,17 @@
 
 ;;* lmx 98 system/sepolicy/private/hal_neverallows.te
 
-(neverallow base_typeattr_665 base_typeattr_666 (file (execute_no_trans)))
+(neverallow base_typeattr_672 base_typeattr_673 (file (execute_no_trans)))
 ;;* lme
 
 ;;* lmx 100 system/sepolicy/private/hal_neverallows.te
 
-(neverallow base_typeattr_232 halserverdomain (process (transition)))
+(neverallow base_typeattr_235 halserverdomain (process (transition)))
 ;;* lme
 
 ;;* lmx 104 system/sepolicy/private/hal_neverallows.te
 
-(neverallow base_typeattr_233 halserverdomain (process (dyntransition)))
+(neverallow base_typeattr_236 halserverdomain (process (dyntransition)))
 ;;* lme
 
 (allow hal_nfc_client hal_nfc_server (binder (call transfer)))
@@ -19328,25 +19454,25 @@
 (allow hal_nfc_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 6 system/sepolicy/private/hal_nfc.te
 
-(neverallow base_typeattr_667 hal_nfc_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_674 hal_nfc_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/hal_nfc.te
 
-(neverallow base_typeattr_668 hal_nfc_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_675 hal_nfc_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_nfc_client hal_nfc_service (service_manager (find)))
 (allow hal_nfc_server hal_nfc_service (service_manager (add find)))
 ;;* lmx 7 system/sepolicy/private/hal_nfc.te
 
-(neverallow base_typeattr_667 hal_nfc_service (service_manager (add)))
+(neverallow base_typeattr_674 hal_nfc_service (service_manager (add)))
 ;;* lme
 
 (allow hal_nfc_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 7 system/sepolicy/private/hal_nfc.te
 
-(neverallow base_typeattr_669 hal_nfc_service (service_manager (find)))
+(neverallow base_typeattr_676 hal_nfc_service (service_manager (find)))
 ;;* lme
 
 (allow hal_nfc property_socket (sock_file (write)))
@@ -19361,13 +19487,13 @@
 (allow hal_nlinterceptor_server hal_nlinterceptor_service (service_manager (add find)))
 ;;* lmx 3 system/sepolicy/private/hal_nlinterceptor.te
 
-(neverallow base_typeattr_670 hal_nlinterceptor_service (service_manager (add)))
+(neverallow base_typeattr_677 hal_nlinterceptor_service (service_manager (add)))
 ;;* lme
 
 (allow hal_nlinterceptor_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 3 system/sepolicy/private/hal_nlinterceptor.te
 
-(neverallow base_typeattr_671 hal_nlinterceptor_service (service_manager (find)))
+(neverallow base_typeattr_678 hal_nlinterceptor_service (service_manager (find)))
 ;;* lme
 
 (allow hal_nlinterceptor servicemanager (binder (call transfer)))
@@ -19385,25 +19511,25 @@
 (allow hal_oemlock_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_oemlock.te
 
-(neverallow base_typeattr_672 hal_oemlock_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_679 hal_oemlock_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_oemlock.te
 
-(neverallow base_typeattr_673 hal_oemlock_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_680 hal_oemlock_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_oemlock_client hal_oemlock_service (service_manager (find)))
 (allow hal_oemlock_server hal_oemlock_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_oemlock.te
 
-(neverallow base_typeattr_672 hal_oemlock_service (service_manager (add)))
+(neverallow base_typeattr_679 hal_oemlock_service (service_manager (add)))
 ;;* lme
 
 (allow hal_oemlock_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_oemlock.te
 
-(neverallow base_typeattr_674 hal_oemlock_service (service_manager (find)))
+(neverallow base_typeattr_681 hal_oemlock_service (service_manager (find)))
 ;;* lme
 
 (allow hal_oemlock_server servicemanager (binder (call transfer)))
@@ -19412,9 +19538,9 @@
 (allow hal_omx_server binderservicedomain (binder (call transfer)))
 (allow binderservicedomain hal_omx_server (binder (transfer)))
 (allow hal_omx_server binderservicedomain (fd (use)))
-(allow hal_omx_server base_typeattr_568 (binder (call transfer)))
-(allow base_typeattr_568 hal_omx_server (binder (transfer)))
-(allow hal_omx_server base_typeattr_568 (fd (use)))
+(allow hal_omx_server base_typeattr_575 (binder (call transfer)))
+(allow base_typeattr_575 hal_omx_server (binder (transfer)))
+(allow hal_omx_server base_typeattr_575 (fd (use)))
 (allow hal_omx_server hal_graphics_composer (fd (use)))
 (allow hal_omx_server ion_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
 (allow hal_omx_server hal_camera (fd (use)))
@@ -19435,12 +19561,12 @@
 (allow hal_omx_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 21 system/sepolicy/private/hal_omx.te
 
-(neverallow base_typeattr_675 hal_omx_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_682 hal_omx_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 21 system/sepolicy/private/hal_omx.te
 
-(neverallow base_typeattr_676 hal_omx_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_683 hal_omx_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_omx_client hidl_token_hwservice (hwservice_manager (find)))
@@ -19466,7 +19592,7 @@
 
 ;;* lmx 50 system/sepolicy/private/hal_omx.te
 
-(neverallow hal_omx_server base_typeattr_296 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
+(neverallow hal_omx_server base_typeattr_299 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
 ;;* lme
 
 (allow hal_power_client hal_power_server (binder (call transfer)))
@@ -19480,25 +19606,25 @@
 (allow hal_power_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_power.te
 
-(neverallow base_typeattr_677 hal_power_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_684 hal_power_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_power.te
 
-(neverallow base_typeattr_678 hal_power_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_685 hal_power_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_power_client hal_power_service (service_manager (find)))
 (allow hal_power_server hal_power_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_power.te
 
-(neverallow base_typeattr_677 hal_power_service (service_manager (add)))
+(neverallow base_typeattr_684 hal_power_service (service_manager (add)))
 ;;* lme
 
 (allow hal_power_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_power.te
 
-(neverallow base_typeattr_679 hal_power_service (service_manager (find)))
+(neverallow base_typeattr_686 hal_power_service (service_manager (find)))
 ;;* lme
 
 (allow hal_power_server servicemanager (binder (call transfer)))
@@ -19522,25 +19648,25 @@
 (allow hal_power_stats_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_power_stats.te
 
-(neverallow base_typeattr_680 hal_power_stats_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_687 hal_power_stats_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_power_stats.te
 
-(neverallow base_typeattr_681 hal_power_stats_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_688 hal_power_stats_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_power_stats_client hal_power_stats_service (service_manager (find)))
 (allow hal_power_stats_server hal_power_stats_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_power_stats.te
 
-(neverallow base_typeattr_680 hal_power_stats_service (service_manager (add)))
+(neverallow base_typeattr_687 hal_power_stats_service (service_manager (add)))
 ;;* lme
 
 (allow hal_power_stats_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_power_stats.te
 
-(neverallow base_typeattr_682 hal_power_stats_service (service_manager (find)))
+(neverallow base_typeattr_689 hal_power_stats_service (service_manager (find)))
 ;;* lme
 
 (allow hal_power_stats_server servicemanager (binder (call transfer)))
@@ -19556,13 +19682,13 @@
 (allow hal_rebootescrow_server hal_rebootescrow_service (service_manager (add find)))
 ;;* lmx 4 system/sepolicy/private/hal_rebootescrow.te
 
-(neverallow base_typeattr_683 hal_rebootescrow_service (service_manager (add)))
+(neverallow base_typeattr_690 hal_rebootescrow_service (service_manager (add)))
 ;;* lme
 
 (allow hal_rebootescrow_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 4 system/sepolicy/private/hal_rebootescrow.te
 
-(neverallow base_typeattr_684 hal_rebootescrow_service (service_manager (find)))
+(neverallow base_typeattr_691 hal_rebootescrow_service (service_manager (find)))
 ;;* lme
 
 (allow hal_rebootescrow_server servicemanager (binder (call transfer)))
@@ -19577,13 +19703,13 @@
 (allow hal_remoteaccess_server hal_remoteaccess_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_remoteaccess.te
 
-(neverallow base_typeattr_685 hal_remoteaccess_service (service_manager (add)))
+(neverallow base_typeattr_692 hal_remoteaccess_service (service_manager (add)))
 ;;* lme
 
 (allow hal_remoteaccess_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_remoteaccess.te
 
-(neverallow base_typeattr_686 hal_remoteaccess_service (service_manager (find)))
+(neverallow base_typeattr_693 hal_remoteaccess_service (service_manager (find)))
 ;;* lme
 
 (allow hal_remotelyprovisionedcomponent_avf_client hal_remotelyprovisionedcomponent_avf_server (binder (call transfer)))
@@ -19593,13 +19719,13 @@
 (allow hal_remotelyprovisionedcomponent_avf_server hal_remotelyprovisionedcomponent_avf_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_remotelyprovisionedcomponent_avf.te
 
-(neverallow base_typeattr_687 hal_remotelyprovisionedcomponent_avf_service (service_manager (add)))
+(neverallow base_typeattr_694 hal_remotelyprovisionedcomponent_avf_service (service_manager (add)))
 ;;* lme
 
 (allow hal_remotelyprovisionedcomponent_avf_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_remotelyprovisionedcomponent_avf.te
 
-(neverallow base_typeattr_688 hal_remotelyprovisionedcomponent_avf_service (service_manager (find)))
+(neverallow base_typeattr_695 hal_remotelyprovisionedcomponent_avf_service (service_manager (find)))
 ;;* lme
 
 (allow hal_remotelyprovisionedcomponent_avf_server servicemanager (binder (call transfer)))
@@ -19611,13 +19737,13 @@
 (allow hal_secretkeeper_server hal_secretkeeper_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_secretkeeper.te
 
-(neverallow base_typeattr_689 hal_secretkeeper_service (service_manager (add)))
+(neverallow base_typeattr_696 hal_secretkeeper_service (service_manager (add)))
 ;;* lme
 
 (allow hal_secretkeeper_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_secretkeeper.te
 
-(neverallow base_typeattr_690 hal_secretkeeper_service (service_manager (find)))
+(neverallow base_typeattr_697 hal_secretkeeper_service (service_manager (find)))
 ;;* lme
 
 (allow hal_secretkeeper_server servicemanager (binder (call transfer)))
@@ -19636,25 +19762,25 @@
 (allow hal_secure_element_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_secure_element.te
 
-(neverallow base_typeattr_691 hal_secure_element_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_698 hal_secure_element_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_secure_element.te
 
-(neverallow base_typeattr_692 hal_secure_element_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_699 hal_secure_element_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_secure_element_client hal_secure_element_service (service_manager (find)))
 (allow hal_secure_element_server hal_secure_element_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_secure_element.te
 
-(neverallow base_typeattr_691 hal_secure_element_service (service_manager (add)))
+(neverallow base_typeattr_698 hal_secure_element_service (service_manager (add)))
 ;;* lme
 
 (allow hal_secure_element_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_secure_element.te
 
-(neverallow base_typeattr_693 hal_secure_element_service (service_manager (find)))
+(neverallow base_typeattr_700 hal_secure_element_service (service_manager (find)))
 ;;* lme
 
 (allow hal_secure_element_server servicemanager (binder (call transfer)))
@@ -19668,22 +19794,22 @@
 (allow hal_sensors_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_sensors.te
 
-(neverallow base_typeattr_694 hal_sensors_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_701 hal_sensors_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_sensors.te
 
-(neverallow base_typeattr_695 hal_sensors_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_702 hal_sensors_hwservice (hwservice_manager (find)))
 ;;* lme
 
-(allow hal_sensors base_typeattr_568 (fd (use)))
+(allow hal_sensors base_typeattr_575 (fd (use)))
 (allow hal_sensors hal_allocator (fd (use)))
 (allow hal_sensors self (capability (sys_nice)))
 (allow hal_sensors self (cap_userns (sys_nice)))
 (allow hal_sensors_server hal_sensors_service (service_manager (add find)))
 ;;* lmx 16 system/sepolicy/private/hal_sensors.te
 
-(neverallow base_typeattr_694 hal_sensors_service (service_manager (add)))
+(neverallow base_typeattr_701 hal_sensors_service (service_manager (add)))
 ;;* lme
 
 (allow hal_sensors_server su (tcp_socket (read write accept getopt)))
@@ -19702,25 +19828,25 @@
 (allow hal_telephony_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_telephony.te
 
-(neverallow base_typeattr_696 hal_telephony_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_703 hal_telephony_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_telephony.te
 
-(neverallow base_typeattr_697 hal_telephony_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_704 hal_telephony_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_telephony_client hal_radio_service (service_manager (find)))
 (allow hal_telephony_server hal_radio_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_telephony.te
 
-(neverallow base_typeattr_696 hal_radio_service (service_manager (add)))
+(neverallow base_typeattr_703 hal_radio_service (service_manager (add)))
 ;;* lme
 
 (allow hal_telephony_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_telephony.te
 
-(neverallow base_typeattr_698 hal_radio_service (service_manager (find)))
+(neverallow base_typeattr_705 hal_radio_service (service_manager (find)))
 ;;* lme
 
 (allowx hal_telephony_server self (ioctl udp_socket (0x6900 0x6902)))
@@ -19794,25 +19920,25 @@
 (allow hal_tetheroffload_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_tetheroffload.te
 
-(neverallow base_typeattr_699 hal_tetheroffload_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_706 hal_tetheroffload_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_tetheroffload.te
 
-(neverallow base_typeattr_700 hal_tetheroffload_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_707 hal_tetheroffload_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_tetheroffload_client hal_tetheroffload_service (service_manager (find)))
 (allow hal_tetheroffload_server hal_tetheroffload_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_tetheroffload.te
 
-(neverallow base_typeattr_699 hal_tetheroffload_service (service_manager (add)))
+(neverallow base_typeattr_706 hal_tetheroffload_service (service_manager (add)))
 ;;* lme
 
 (allow hal_tetheroffload_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_tetheroffload.te
 
-(neverallow base_typeattr_701 hal_tetheroffload_service (service_manager (find)))
+(neverallow base_typeattr_708 hal_tetheroffload_service (service_manager (find)))
 ;;* lme
 
 (allow hal_tetheroffload_server servicemanager (binder (call transfer)))
@@ -19829,31 +19955,31 @@
 (allow hal_thermal_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_thermal.te
 
-(neverallow base_typeattr_702 hal_thermal_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_709 hal_thermal_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_thermal.te
 
-(neverallow base_typeattr_703 hal_thermal_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_710 hal_thermal_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_thermal_client hal_thermal_service (service_manager (find)))
 (allow hal_thermal_server hal_thermal_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_thermal.te
 
-(neverallow base_typeattr_702 hal_thermal_service (service_manager (add)))
+(neverallow base_typeattr_709 hal_thermal_service (service_manager (add)))
 ;;* lme
 
 (allow hal_thermal_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_thermal.te
 
-(neverallow base_typeattr_704 hal_thermal_service (service_manager (find)))
+(neverallow base_typeattr_711 hal_thermal_service (service_manager (find)))
 ;;* lme
 
 (allow hal_thermal_server hal_thermal_service (service_manager (add find)))
 ;;* lmx 8 system/sepolicy/private/hal_thermal.te
 
-(neverallow base_typeattr_702 hal_thermal_service (service_manager (add)))
+(neverallow base_typeattr_709 hal_thermal_service (service_manager (add)))
 ;;* lme
 
 (allow hal_thermal_server su (tcp_socket (read write accept getopt)))
@@ -19873,13 +19999,13 @@
 (allow hal_threadnetwork_server hal_threadnetwork_service (service_manager (add find)))
 ;;* lmx 4 system/sepolicy/private/hal_threadnetwork.te
 
-(neverallow base_typeattr_705 hal_threadnetwork_service (service_manager (add)))
+(neverallow base_typeattr_712 hal_threadnetwork_service (service_manager (add)))
 ;;* lme
 
 (allow hal_threadnetwork_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 4 system/sepolicy/private/hal_threadnetwork.te
 
-(neverallow base_typeattr_706 hal_threadnetwork_service (service_manager (find)))
+(neverallow base_typeattr_713 hal_threadnetwork_service (service_manager (find)))
 ;;* lme
 
 (allow hal_threadnetwork_server servicemanager (binder (call transfer)))
@@ -19899,12 +20025,12 @@
 (allow hal_tv_cec_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_tv_cec.te
 
-(neverallow base_typeattr_707 hal_tv_cec_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_714 hal_tv_cec_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_tv_cec.te
 
-(neverallow base_typeattr_708 hal_tv_cec_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_715 hal_tv_cec_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_tv_hdmi_cec_client hal_tv_hdmi_cec_server (binder (call transfer)))
@@ -19921,13 +20047,13 @@
 (allow hal_tv_hdmi_cec_server hal_tv_hdmi_cec_service (service_manager (add find)))
 ;;* lmx 7 system/sepolicy/private/hal_tv_hdmi_cec.te
 
-(neverallow base_typeattr_709 hal_tv_hdmi_cec_service (service_manager (add)))
+(neverallow base_typeattr_716 hal_tv_hdmi_cec_service (service_manager (add)))
 ;;* lme
 
 (allow hal_tv_hdmi_cec_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 7 system/sepolicy/private/hal_tv_hdmi_cec.te
 
-(neverallow base_typeattr_710 hal_tv_hdmi_cec_service (service_manager (find)))
+(neverallow base_typeattr_717 hal_tv_hdmi_cec_service (service_manager (find)))
 ;;* lme
 
 (allow hal_tv_hdmi_connection_client hal_tv_hdmi_connection_server (binder (call transfer)))
@@ -19944,13 +20070,13 @@
 (allow hal_tv_hdmi_connection_server hal_tv_hdmi_connection_service (service_manager (add find)))
 ;;* lmx 7 system/sepolicy/private/hal_tv_hdmi_connection.te
 
-(neverallow base_typeattr_711 hal_tv_hdmi_connection_service (service_manager (add)))
+(neverallow base_typeattr_718 hal_tv_hdmi_connection_service (service_manager (add)))
 ;;* lme
 
 (allow hal_tv_hdmi_connection_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 7 system/sepolicy/private/hal_tv_hdmi_connection.te
 
-(neverallow base_typeattr_712 hal_tv_hdmi_connection_service (service_manager (find)))
+(neverallow base_typeattr_719 hal_tv_hdmi_connection_service (service_manager (find)))
 ;;* lme
 
 (allow hal_tv_hdmi_earc_client hal_tv_hdmi_earc_server (binder (call transfer)))
@@ -19967,13 +20093,13 @@
 (allow hal_tv_hdmi_earc_server hal_tv_hdmi_earc_service (service_manager (add find)))
 ;;* lmx 7 system/sepolicy/private/hal_tv_hdmi_earc.te
 
-(neverallow base_typeattr_713 hal_tv_hdmi_earc_service (service_manager (add)))
+(neverallow base_typeattr_720 hal_tv_hdmi_earc_service (service_manager (add)))
 ;;* lme
 
 (allow hal_tv_hdmi_earc_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 7 system/sepolicy/private/hal_tv_hdmi_earc.te
 
-(neverallow base_typeattr_714 hal_tv_hdmi_earc_service (service_manager (find)))
+(neverallow base_typeattr_721 hal_tv_hdmi_earc_service (service_manager (find)))
 ;;* lme
 
 (allow hal_tv_input_client hal_tv_input_server (binder (call transfer)))
@@ -19987,25 +20113,25 @@
 (allow hal_tv_input_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_tv_input.te
 
-(neverallow base_typeattr_715 hal_tv_input_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_722 hal_tv_input_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_tv_input.te
 
-(neverallow base_typeattr_716 hal_tv_input_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_723 hal_tv_input_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_tv_input_client hal_tv_input_service (service_manager (find)))
 (allow hal_tv_input_server hal_tv_input_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_tv_input.te
 
-(neverallow base_typeattr_715 hal_tv_input_service (service_manager (add)))
+(neverallow base_typeattr_722 hal_tv_input_service (service_manager (add)))
 ;;* lme
 
 (allow hal_tv_input_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_tv_input.te
 
-(neverallow base_typeattr_717 hal_tv_input_service (service_manager (find)))
+(neverallow base_typeattr_724 hal_tv_input_service (service_manager (find)))
 ;;* lme
 
 (allow hal_tv_input_server servicemanager (binder (call transfer)))
@@ -20025,25 +20151,25 @@
 (allow hal_tv_tuner_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_tv_tuner.te
 
-(neverallow base_typeattr_718 hal_tv_tuner_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_725 hal_tv_tuner_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_tv_tuner.te
 
-(neverallow base_typeattr_719 hal_tv_tuner_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_726 hal_tv_tuner_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_tv_tuner_client hal_tv_tuner_service (service_manager (find)))
 (allow hal_tv_tuner_server hal_tv_tuner_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_tv_tuner.te
 
-(neverallow base_typeattr_718 hal_tv_tuner_service (service_manager (add)))
+(neverallow base_typeattr_725 hal_tv_tuner_service (service_manager (add)))
 ;;* lme
 
 (allow hal_tv_tuner_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_tv_tuner.te
 
-(neverallow base_typeattr_720 hal_tv_tuner_service (service_manager (find)))
+(neverallow base_typeattr_727 hal_tv_tuner_service (service_manager (find)))
 ;;* lme
 
 (allow hal_tv_tuner_server servicemanager (binder (call transfer)))
@@ -20062,13 +20188,13 @@
 (allow hal_usb_server hal_usb_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_usb.te
 
-(neverallow base_typeattr_721 hal_usb_service (service_manager (add)))
+(neverallow base_typeattr_728 hal_usb_service (service_manager (add)))
 ;;* lme
 
 (allow hal_usb_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_usb.te
 
-(neverallow base_typeattr_722 hal_usb_service (service_manager (find)))
+(neverallow base_typeattr_729 hal_usb_service (service_manager (find)))
 ;;* lme
 
 (allow hal_usb_server servicemanager (binder (call transfer)))
@@ -20079,12 +20205,12 @@
 (allow hal_usb_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 8 system/sepolicy/private/hal_usb.te
 
-(neverallow base_typeattr_721 hal_usb_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_728 hal_usb_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 8 system/sepolicy/private/hal_usb.te
 
-(neverallow base_typeattr_723 hal_usb_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_730 hal_usb_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_usb self (netlink_kobject_uevent_socket (create)))
@@ -20108,13 +20234,13 @@
 (allow hal_usb_gadget_server hal_usb_gadget_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_usb_gadget.te
 
-(neverallow base_typeattr_724 hal_usb_gadget_service (service_manager (add)))
+(neverallow base_typeattr_731 hal_usb_gadget_service (service_manager (add)))
 ;;* lme
 
 (allow hal_usb_gadget_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_usb_gadget.te
 
-(neverallow base_typeattr_725 hal_usb_gadget_service (service_manager (find)))
+(neverallow base_typeattr_732 hal_usb_gadget_service (service_manager (find)))
 ;;* lme
 
 (allow hal_usb_gadget_server servicemanager (binder (call transfer)))
@@ -20125,12 +20251,12 @@
 (allow hal_usb_gadget_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 8 system/sepolicy/private/hal_usb_gadget.te
 
-(neverallow base_typeattr_724 hal_usb_gadget_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_731 hal_usb_gadget_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 8 system/sepolicy/private/hal_usb_gadget.te
 
-(neverallow base_typeattr_726 hal_usb_gadget_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_733 hal_usb_gadget_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_usb_gadget_server configfs (lnk_file (read create unlink)))
@@ -20150,13 +20276,13 @@
 (allow hal_uwb_server hal_uwb_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_uwb.te
 
-(neverallow base_typeattr_727 hal_uwb_service (service_manager (add)))
+(neverallow base_typeattr_734 hal_uwb_service (service_manager (add)))
 ;;* lme
 
 (allow hal_uwb_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_uwb.te
 
-(neverallow base_typeattr_728 hal_uwb_service (service_manager (find)))
+(neverallow base_typeattr_735 hal_uwb_service (service_manager (find)))
 ;;* lme
 
 (allow hal_uwb_server servicemanager (binder (call transfer)))
@@ -20176,25 +20302,25 @@
 (allow hal_vehicle_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 6 system/sepolicy/private/hal_vehicle.te
 
-(neverallow base_typeattr_729 hal_vehicle_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_736 hal_vehicle_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/hal_vehicle.te
 
-(neverallow base_typeattr_730 hal_vehicle_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_737 hal_vehicle_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_vehicle_client hal_vehicle_service (service_manager (find)))
 (allow hal_vehicle_server hal_vehicle_service (service_manager (add find)))
 ;;* lmx 7 system/sepolicy/private/hal_vehicle.te
 
-(neverallow base_typeattr_729 hal_vehicle_service (service_manager (add)))
+(neverallow base_typeattr_736 hal_vehicle_service (service_manager (add)))
 ;;* lme
 
 (allow hal_vehicle_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 7 system/sepolicy/private/hal_vehicle.te
 
-(neverallow base_typeattr_731 hal_vehicle_service (service_manager (find)))
+(neverallow base_typeattr_738 hal_vehicle_service (service_manager (find)))
 ;;* lme
 
 (allow hal_vibrator_client hal_vibrator_server (binder (call transfer)))
@@ -20208,25 +20334,25 @@
 (allow hal_vibrator_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_vibrator.te
 
-(neverallow base_typeattr_732 hal_vibrator_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_739 hal_vibrator_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_vibrator.te
 
-(neverallow base_typeattr_733 hal_vibrator_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_740 hal_vibrator_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_vibrator_client hal_vibrator_service (service_manager (find)))
 (allow hal_vibrator_server hal_vibrator_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_vibrator.te
 
-(neverallow base_typeattr_732 hal_vibrator_service (service_manager (add)))
+(neverallow base_typeattr_739 hal_vibrator_service (service_manager (add)))
 ;;* lme
 
 (allow hal_vibrator_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_vibrator.te
 
-(neverallow base_typeattr_734 hal_vibrator_service (service_manager (find)))
+(neverallow base_typeattr_741 hal_vibrator_service (service_manager (find)))
 ;;* lme
 
 (allow hal_vibrator_server servicemanager (binder (call transfer)))
@@ -20236,6 +20362,26 @@
 (allow hal_vibrator sysfs_vibrator (file (ioctl read write getattr lock append map open watch watch_reads)))
 (allow hal_vibrator sysfs_vibrator (dir (search)))
 (allow hal_vibrator fwk_vibrator_control_service (service_manager (find)))
+(allow hal_vm_capabilities_client hal_vm_capabilities_server (binder (call transfer)))
+(allow hal_vm_capabilities_server hal_vm_capabilities_client (binder (transfer)))
+(allow hal_vm_capabilities_client hal_vm_capabilities_server (fd (use)))
+(allow hal_vm_capabilities_client hal_vm_capabilities_service (service_manager (find)))
+(allow hal_vm_capabilities_server hal_vm_capabilities_service (service_manager (add find)))
+;;* lmx 6 system/sepolicy/private/hal_vm_capabilities.te
+
+(neverallow base_typeattr_742 hal_vm_capabilities_service (service_manager (add)))
+;;* lme
+
+(allow hal_vm_capabilities_server su (tcp_socket (read write accept getopt)))
+;;* lmx 6 system/sepolicy/private/hal_vm_capabilities.te
+
+(neverallow base_typeattr_743 hal_vm_capabilities_service (service_manager (find)))
+;;* lme
+
+(allow hal_vm_capabilities_client servicemanager (binder (call transfer)))
+(allow servicemanager hal_vm_capabilities_client (binder (call transfer)))
+(allow hal_vm_capabilities_server servicemanager (binder (call transfer)))
+(allow servicemanager hal_vm_capabilities_server (binder (call transfer)))
 (allow hal_vr_client hal_vr_server (binder (call transfer)))
 (allow hal_vr_server hal_vr_client (binder (transfer)))
 (allow hal_vr_client hal_vr_server (fd (use)))
@@ -20247,12 +20393,12 @@
 (allow hal_vr_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_vr.te
 
-(neverallow base_typeattr_735 hal_vr_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_744 hal_vr_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_vr.te
 
-(neverallow base_typeattr_736 hal_vr_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_745 hal_vr_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_weaver_client hal_weaver_server (binder (call transfer)))
@@ -20263,25 +20409,25 @@
 (allow hal_weaver_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 4 system/sepolicy/private/hal_weaver.te
 
-(neverallow base_typeattr_737 hal_weaver_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_746 hal_weaver_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/hal_weaver.te
 
-(neverallow base_typeattr_738 hal_weaver_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_747 hal_weaver_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_weaver_client hal_weaver_service (service_manager (find)))
 (allow hal_weaver_server hal_weaver_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/hal_weaver.te
 
-(neverallow base_typeattr_737 hal_weaver_service (service_manager (add)))
+(neverallow base_typeattr_746 hal_weaver_service (service_manager (add)))
 ;;* lme
 
 (allow hal_weaver_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 5 system/sepolicy/private/hal_weaver.te
 
-(neverallow base_typeattr_739 hal_weaver_service (service_manager (find)))
+(neverallow base_typeattr_748 hal_weaver_service (service_manager (find)))
 ;;* lme
 
 (allow hal_weaver_server servicemanager (binder (call transfer)))
@@ -20298,25 +20444,25 @@
 (allow hal_wifi_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_wifi.te
 
-(neverallow base_typeattr_740 hal_wifi_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_749 hal_wifi_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_wifi.te
 
-(neverallow base_typeattr_741 hal_wifi_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_750 hal_wifi_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_wifi_client hal_wifi_service (service_manager (find)))
 (allow hal_wifi_server hal_wifi_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_wifi.te
 
-(neverallow base_typeattr_740 hal_wifi_service (service_manager (add)))
+(neverallow base_typeattr_749 hal_wifi_service (service_manager (add)))
 ;;* lme
 
 (allow hal_wifi_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_wifi.te
 
-(neverallow base_typeattr_742 hal_wifi_service (service_manager (find)))
+(neverallow base_typeattr_751 hal_wifi_service (service_manager (find)))
 ;;* lme
 
 (allow hal_wifi_server servicemanager (binder (call transfer)))
@@ -20358,25 +20504,25 @@
 (allow hal_wifi_hostapd_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_wifi_hostapd.te
 
-(neverallow base_typeattr_743 hal_wifi_hostapd_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_752 hal_wifi_hostapd_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_wifi_hostapd.te
 
-(neverallow base_typeattr_744 hal_wifi_hostapd_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_753 hal_wifi_hostapd_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_wifi_hostapd_client hal_wifi_hostapd_service (service_manager (find)))
 (allow hal_wifi_hostapd_server hal_wifi_hostapd_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_wifi_hostapd.te
 
-(neverallow base_typeattr_743 hal_wifi_hostapd_service (service_manager (add)))
+(neverallow base_typeattr_752 hal_wifi_hostapd_service (service_manager (add)))
 ;;* lme
 
 (allow hal_wifi_hostapd_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_wifi_hostapd.te
 
-(neverallow base_typeattr_745 hal_wifi_hostapd_service (service_manager (find)))
+(neverallow base_typeattr_754 hal_wifi_hostapd_service (service_manager (find)))
 ;;* lme
 
 (allow hal_wifi_hostapd_server servicemanager (binder (call transfer)))
@@ -20416,25 +20562,25 @@
 (allow hal_wifi_supplicant_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hal_wifi_supplicant.te
 
-(neverallow base_typeattr_746 hal_wifi_supplicant_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_755 hal_wifi_supplicant_hwservice (hwservice_manager (add)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/hal_wifi_supplicant.te
 
-(neverallow base_typeattr_747 hal_wifi_supplicant_hwservice (hwservice_manager (find)))
+(neverallow base_typeattr_756 hal_wifi_supplicant_hwservice (hwservice_manager (find)))
 ;;* lme
 
 (allow hal_wifi_supplicant_client hal_wifi_supplicant_service (service_manager (find)))
 (allow hal_wifi_supplicant_server hal_wifi_supplicant_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/hal_wifi_supplicant.te
 
-(neverallow base_typeattr_746 hal_wifi_supplicant_service (service_manager (add)))
+(neverallow base_typeattr_755 hal_wifi_supplicant_service (service_manager (add)))
 ;;* lme
 
 (allow hal_wifi_supplicant_server su (tcp_socket (read write accept getopt)))
 ;;* lmx 6 system/sepolicy/private/hal_wifi_supplicant.te
 
-(neverallow base_typeattr_748 hal_wifi_supplicant_service (service_manager (find)))
+(neverallow base_typeattr_757 hal_wifi_supplicant_service (service_manager (find)))
 ;;* lme
 
 (allowx hal_wifi_supplicant self (ioctl udp_socket (0x6900 0x6902)))
@@ -20585,7 +20731,7 @@
 
 ;;* lmx 72 system/sepolicy/private/heapprofd.te
 
-(neverallow heapprofd base_typeattr_749 (file (execute execute_no_trans)))
+(neverallow heapprofd base_typeattr_758 (file (execute execute_no_trans)))
 ;;* lme
 
 (allow init hidl_lazy_test_server_exec (file (read getattr map execute open)))
@@ -20596,7 +20742,7 @@
 (typetransition init hidl_lazy_test_server_exec process hidl_lazy_test_server)
 ;;* lmx 11 system/sepolicy/private/hwservice.te
 
-(neverallow domain base_typeattr_750 (hwservice_manager (add find)))
+(neverallow domain base_typeattr_759 (hwservice_manager (add find)))
 ;;* lme
 
 (allow init hwservicemanager_exec (file (read getattr map execute open)))
@@ -20609,14 +20755,14 @@
 (allow hwservicemanager hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 5 system/sepolicy/private/hwservicemanager.te
 
-(neverallow base_typeattr_751 hidl_manager_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_760 hidl_manager_hwservice (hwservice_manager (add)))
 ;;* lme
 
 (allow hwservicemanager hidl_token_hwservice (hwservice_manager (add find)))
 (allow hwservicemanager hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 6 system/sepolicy/private/hwservicemanager.te
 
-(neverallow base_typeattr_751 hidl_token_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_760 hidl_token_hwservice (hwservice_manager (add)))
 ;;* lme
 
 (allow hwservicemanager property_socket (sock_file (write)))
@@ -20668,7 +20814,7 @@
 (allow idmap idmap_service (service_manager (add find)))
 ;;* lmx 26 system/sepolicy/private/idmap.te
 
-(neverallow base_typeattr_752 idmap_service (service_manager (add)))
+(neverallow base_typeattr_761 idmap_service (service_manager (add)))
 ;;* lme
 
 (allow idmap su (tcp_socket (read write accept getopt)))
@@ -20703,7 +20849,7 @@
 (allow incident incidentd (fifo_file (write)))
 ;;* lmx 37 system/sepolicy/private/incident.te
 
-(neverallow base_typeattr_753 incident_exec (file (execute execute_no_trans)))
+(neverallow base_typeattr_762 incident_exec (file (execute execute_no_trans)))
 ;;* lme
 
 (allow incidentd incident_helper_exec (file (read getattr map execute open)))
@@ -20724,7 +20870,7 @@
 (allow incident_helper incidentd (unix_stream_socket (read write)))
 ;;* lmx 14 system/sepolicy/private/incident_helper.te
 
-(neverallow base_typeattr_754 incident_helper_exec (file (execute execute_no_trans)))
+(neverallow base_typeattr_763 incident_helper_exec (file (execute execute_no_trans)))
 ;;* lme
 
 (allow init incidentd_exec (file (read getattr map execute open)))
@@ -20822,7 +20968,7 @@
 (allow incidentd self (cap_userns (sys_ptrace)))
 ;;* lmx 122 system/sepolicy/private/incidentd.te
 
-(neverallow incidentd base_typeattr_233 (process (ptrace)))
+(neverallow incidentd base_typeattr_236 (process (ptrace)))
 ;;* lme
 
 (allow incidentd self (capability (kill)))
@@ -20846,11 +20992,11 @@
 (allow incidentd misc_logd_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow incidentd misc_logd_file (file (ioctl read getattr lock map open watch watch_reads)))
 (allow incidentd misc_logd_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
-(allow incidentd base_typeattr_755 (service_manager (find)))
+(allow incidentd base_typeattr_764 (service_manager (find)))
 (allow incidentd incident_service (service_manager (add find)))
 ;;* lmx 171 system/sepolicy/private/incidentd.te
 
-(neverallow base_typeattr_756 incident_service (service_manager (add)))
+(neverallow base_typeattr_765 incident_service (service_manager (add)))
 ;;* lme
 
 (allow incidentd su (tcp_socket (read write accept getopt)))
@@ -20868,17 +21014,17 @@
 (allow incidentd build_attestation_prop (file (read getattr map open)))
 ;;* lmx 212 system/sepolicy/private/incidentd.te
 
-(neverallow base_typeattr_757 incident_data_file (file (write create getattr setattr lock append map unlink rename execute open execute_no_trans)))
+(neverallow base_typeattr_766 incident_data_file (file (write create getattr setattr lock append map unlink rename execute open execute_no_trans)))
 ;;* lme
 
 ;;* lmx 214 system/sepolicy/private/incidentd.te
 
-(neverallow base_typeattr_758 incident_data_file (file (ioctl read getattr lock map open watch watch_reads)))
+(neverallow base_typeattr_767 incident_data_file (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lme
 
 ;;* lmx 216 system/sepolicy/private/incidentd.te
 
-(neverallow base_typeattr_757 incident_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_766 incident_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 (typetransition init tmpfs file init_tmpfs)
@@ -20983,7 +21129,7 @@
 (allow init debugfs_bootreceiver_tracing (file (write lock append map open)))
 (allow init prng_seeder (unix_stream_socket (create bind listen)))
 (dontaudit init debugfs_tracing_debug (dir (write add_name)))
-(allow init base_typeattr_759 (chr_file (setattr)))
+(allow init base_typeattr_768 (chr_file (setattr)))
 (allow init tmpfs (chr_file (ioctl read write create getattr setattr lock append map unlink open watch watch_reads)))
 (allow init tmpfs (chr_file (relabelfrom)))
 (allow init kmsg_device (chr_file (write getattr relabelto)))
@@ -21087,7 +21233,7 @@
 (allow init dev_type (blk_file (ioctl read getattr lock map open watch watch_reads)))
 (allowx init dev_type (ioctl blk_file (0x125d)))
 (allowx init system_data_root_file (ioctl dir (0x587d)))
-(allow init base_typeattr_760 (filesystem (mount remount unmount getattr relabelfrom associate quotamod quotaget watch)))
+(allow init base_typeattr_769 (filesystem (mount remount unmount getattr relabelfrom associate quotamod quotaget watch)))
 (allow init debugfs_type (filesystem (mount unmount)))
 (allow init debugfs_tracing_debug (filesystem (mount)))
 (allow init unlabeled (filesystem (mount remount unmount getattr relabelfrom associate quotamod quotaget watch)))
@@ -21101,22 +21247,22 @@
 (allow init rootfs (dir (relabelfrom)))
 (allow init self (capability (chown fowner fsetid)))
 (allow init self (cap_userns (chown fowner fsetid)))
-(allow init base_typeattr_761 (dir (ioctl read create getattr setattr open search)))
-(allow init base_typeattr_762 (dir (write relabelfrom add_name remove_name rmdir)))
-(allow init base_typeattr_763 (file (read write create getattr setattr relabelfrom map unlink open)))
+(allow init base_typeattr_770 (dir (ioctl read create getattr setattr open search)))
+(allow init base_typeattr_771 (dir (write relabelfrom add_name remove_name rmdir)))
+(allow init base_typeattr_772 (file (read write create getattr setattr relabelfrom map unlink open)))
 (allow init tracefs_type (file (ioctl read write create getattr setattr lock relabelfrom append map unlink rename open watch watch_reads)))
 (allow init apex_info_file (file (ioctl read getattr lock map open watch watch_reads)))
-(allow init base_typeattr_764 (sock_file (read create getattr setattr relabelfrom unlink open)))
-(allow init base_typeattr_764 (fifo_file (read create getattr setattr relabelfrom unlink open)))
-(allow init base_typeattr_765 (lnk_file (create getattr setattr relabelfrom unlink)))
+(allow init base_typeattr_773 (sock_file (read create getattr setattr relabelfrom unlink open)))
+(allow init base_typeattr_773 (fifo_file (read create getattr setattr relabelfrom unlink open)))
+(allow init base_typeattr_774 (lnk_file (create getattr setattr relabelfrom unlink)))
 (allow init cache_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
-(allow init base_typeattr_766 (file (relabelto)))
-(allow init base_typeattr_766 (dir (relabelto)))
-(allow init base_typeattr_766 (lnk_file (relabelto)))
-(allow init base_typeattr_766 (chr_file (relabelto)))
-(allow init base_typeattr_766 (blk_file (relabelto)))
-(allow init base_typeattr_766 (sock_file (relabelto)))
-(allow init base_typeattr_766 (fifo_file (relabelto)))
+(allow init base_typeattr_775 (file (relabelto)))
+(allow init base_typeattr_775 (dir (relabelto)))
+(allow init base_typeattr_775 (lnk_file (relabelto)))
+(allow init base_typeattr_775 (chr_file (relabelto)))
+(allow init base_typeattr_775 (blk_file (relabelto)))
+(allow init base_typeattr_775 (sock_file (relabelto)))
+(allow init base_typeattr_775 (fifo_file (relabelto)))
 (allow init sysfs (file (getattr relabelfrom)))
 (allow init sysfs (dir (getattr relabelfrom)))
 (allow init sysfs (lnk_file (getattr relabelfrom)))
@@ -21139,8 +21285,8 @@
 (allow init debugfs_tracing_instances (file (write lock append map open)))
 (allow init debugfs_wifi_tracing (file (write lock append map open)))
 (allow init debugfs_wifi_tracing (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
-(allow init base_typeattr_767 (file (read setattr open)))
-(allow init base_typeattr_768 (dir (read setattr open search)))
+(allow init base_typeattr_776 (file (read setattr open)))
+(allow init base_typeattr_777 (dir (read setattr open search)))
 (allow init binder_device (chr_file (read open)))
 (allow init hwbinder_device (chr_file (read open)))
 (allow init dm_device (chr_file (read open)))
@@ -21328,12 +21474,12 @@
 
 ;;* lmx 817 system/sepolicy/private/init.te
 
-(neverallow base_typeattr_381 init (process (transition)))
+(neverallow base_typeattr_384 init (process (transition)))
 ;;* lme
 
 ;;* lmx 818 system/sepolicy/private/init.te
 
-(neverallow init base_typeattr_769 (file (entrypoint)))
+(neverallow init base_typeattr_778 (file (entrypoint)))
 ;;* lme
 
 ;;* lmx 821 system/sepolicy/private/init.te
@@ -21354,7 +21500,7 @@
 
 ;;* lmx 834 system/sepolicy/private/init.te
 
-(neverallow init base_typeattr_233 (process (noatsecure)))
+(neverallow init base_typeattr_236 (process (noatsecure)))
 ;;* lme
 
 ;;* lmx 837 system/sepolicy/private/init.te
@@ -21379,17 +21525,17 @@
 
 ;;* lmx 848 system/sepolicy/private/init.te
 
-(neverallow base_typeattr_233 init (process (ptrace)))
+(neverallow base_typeattr_236 init (process (ptrace)))
 ;;* lme
 
 ;;* lmx 853 system/sepolicy/private/init.te
 
-(neverallow base_typeattr_770 system_data_root_file (dir (write add_name remove_name)))
+(neverallow base_typeattr_779 system_data_root_file (dir (write add_name remove_name)))
 ;;* lme
 
 ;;* lmx 856 system/sepolicy/private/init.te
 
-(neverallow base_typeattr_232 userspace_reboot_exported_prop (property_service (set)))
+(neverallow base_typeattr_235 userspace_reboot_exported_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 858 system/sepolicy/private/init.te
@@ -21400,32 +21546,32 @@
 (dontaudit init self (perf_event (kernel tracepoint read write)))
 ;;* lmx 863 system/sepolicy/private/init.te
 
-(neverallow base_typeattr_232 init_perf_lsm_hooks_prop (property_service (set)))
+(neverallow base_typeattr_235 init_perf_lsm_hooks_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 866 system/sepolicy/private/init.te
 
-(neverallow base_typeattr_232 vts_status_prop (property_service (set)))
+(neverallow base_typeattr_235 vts_status_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 869 system/sepolicy/private/init.te
 
-(neverallow base_typeattr_232 bootloader_prop (property_service (set)))
+(neverallow base_typeattr_235 bootloader_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 872 system/sepolicy/private/init.te
 
-(neverallow base_typeattr_232 hal_instrumentation_prop (property_service (set)))
+(neverallow base_typeattr_235 hal_instrumentation_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 875 system/sepolicy/private/init.te
 
-(neverallow base_typeattr_232 property_service_version_prop (property_service (set)))
+(neverallow base_typeattr_235 property_service_version_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 878 system/sepolicy/private/init.te
 
-(neverallow base_typeattr_232 keystore_listen_prop (property_service (set)))
+(neverallow base_typeattr_235 keystore_listen_prop (property_service (set)))
 ;;* lme
 
 (allow init inputflinger_exec (file (read getattr map execute open)))
@@ -21620,7 +21766,7 @@
 (allow installd installd_service (service_manager (add find)))
 ;;* lmx 192 system/sepolicy/private/installd.te
 
-(neverallow base_typeattr_771 installd_service (service_manager (add)))
+(neverallow base_typeattr_780 installd_service (service_manager (add)))
 ;;* lme
 
 (allow installd su (tcp_socket (read write accept getopt)))
@@ -21638,20 +21784,22 @@
 (allow installd proc_filesystems (file (ioctl read getattr lock map open watch watch_reads)))
 (allow installd storage_config_prop (file (read getattr map open)))
 (allow installd vold (fd (use)))
+(allow installd storage_area_key_file (dir (read write getattr lock open remove_name search rmdir)))
+(allow installd storage_area_key_file (file (unlink)))
 (allow installd virtualizationservice_data_file (file (unlink)))
 ;;* lmx 241 system/sepolicy/private/installd.te
 
-(neverallow base_typeattr_772 installd_service (service_manager (find)))
+(neverallow base_typeattr_781 installd_service (service_manager (find)))
 ;;* lme
 
 ;;* lmx 242 system/sepolicy/private/installd.te
 
-(neverallow base_typeattr_773 installd (binder (call)))
+(neverallow base_typeattr_782 installd (binder (call)))
 ;;* lme
 
 ;;* lmx 248 system/sepolicy/private/installd.te
 
-(neverallow installd base_typeattr_774 (binder (call)))
+(neverallow installd base_typeattr_783 (binder (call)))
 ;;* lme
 
 (typetransition isolated_app tmpfs file appdomain_tmpfs)
@@ -21659,23 +21807,23 @@
 (dontaudit su isolated_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 10 system/sepolicy/private/isolated_app.te
 
-(neverallow base_typeattr_286 isolated_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_289 isolated_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow isolated_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 10 system/sepolicy/private/isolated_app.te
 
-(neverallow base_typeattr_775 base_typeattr_286 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_784 base_typeattr_289 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 10 system/sepolicy/private/isolated_app.te
 
-(neverallow base_typeattr_776 isolated_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_785 isolated_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 10 system/sepolicy/private/isolated_app.te
 
-(neverallow base_typeattr_777 isolated_app (process (ptrace)))
+(neverallow base_typeattr_786 isolated_app (process (ptrace)))
 ;;* lme
 
 (allow isolated_app webviewupdate_service (service_manager (find)))
@@ -21721,12 +21869,12 @@
 
 ;;* lmx 53 system/sepolicy/private/isolated_app_all.te
 
-(neverallow base_typeattr_778 hwbinder_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_787 hwbinder_device (chr_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 54 system/sepolicy/private/isolated_app_all.te
 
-(neverallow base_typeattr_778 base_typeattr_233 (hwservice_manager (add find list)))
+(neverallow base_typeattr_787 base_typeattr_236 (hwservice_manager (add find list)))
 ;;* lme
 
 ;;* lmx 57 system/sepolicy/private/isolated_app_all.te
@@ -21736,17 +21884,17 @@
 
 ;;* lmx 61 system/sepolicy/private/isolated_app_all.te
 
-(neverallow base_typeattr_778 base_typeattr_233 (service_manager (add list)))
+(neverallow base_typeattr_787 base_typeattr_236 (service_manager (add list)))
 ;;* lme
 
 ;;* lmx 71 system/sepolicy/private/isolated_app_all.te
 
-(neverallow base_typeattr_778 base_typeattr_779 (service_manager (find)))
+(neverallow base_typeattr_787 base_typeattr_788 (service_manager (find)))
 ;;* lme
 
 ;;* lmx 74 system/sepolicy/private/isolated_app_all.te
 
-(neverallow base_typeattr_778 gpu_device (chr_file (ioctl read write getattr lock append map execute open watch watch_reads)))
+(neverallow base_typeattr_787 gpu_device (chr_file (ioctl read write getattr lock append map execute open watch watch_reads)))
 ;;* lme
 
 ;;* lmx 77 system/sepolicy/private/isolated_app_all.te
@@ -21816,7 +21964,7 @@
 
 ;;* lmx 105 system/sepolicy/private/isolated_app_all.te
 
-(neverallow base_typeattr_778 base_typeattr_780 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_787 base_typeattr_789 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 126 system/sepolicy/private/isolated_app_all.te
@@ -22103,23 +22251,23 @@
 (dontaudit su isolated_compute_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 14 system/sepolicy/private/isolated_compute_app.te
 
-(neverallow base_typeattr_781 isolated_compute_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_790 isolated_compute_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow isolated_compute_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 14 system/sepolicy/private/isolated_compute_app.te
 
-(neverallow base_typeattr_782 base_typeattr_781 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_791 base_typeattr_790 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 14 system/sepolicy/private/isolated_compute_app.te
 
-(neverallow base_typeattr_783 isolated_compute_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_792 isolated_compute_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 14 system/sepolicy/private/isolated_compute_app.te
 
-(neverallow base_typeattr_784 isolated_compute_app (process (ptrace)))
+(neverallow base_typeattr_793 isolated_compute_app (process (ptrace)))
 ;;* lme
 
 (allow isolated_compute_app isolated_compute_allowed_service (service_manager (find)))
@@ -22251,12 +22399,12 @@
 (dontaudit kernel tmpfs (blk_file (read open)))
 ;;* lmx 172 system/sepolicy/private/kernel.te
 
-(neverallow base_typeattr_233 kernel (process (transition dyntransition)))
+(neverallow base_typeattr_236 kernel (process (transition dyntransition)))
 ;;* lme
 
 ;;* lmx 182 system/sepolicy/private/kernel.te
 
-(neverallow kernel base_typeattr_233 (file (execute_no_trans entrypoint)))
+(neverallow kernel base_typeattr_236 (file (execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 187 system/sepolicy/private/kernel.te
@@ -22267,7 +22415,7 @@
 
 ;;* lmx 190 system/sepolicy/private/kernel.te
 
-(neverallow base_typeattr_233 kernel (process (ptrace)))
+(neverallow base_typeattr_236 kernel (process (ptrace)))
 ;;* lme
 
 (allow init keystore_exec (file (read getattr map execute open)))
@@ -22319,7 +22467,7 @@
 (allow keystore keystore_service (service_manager (add find)))
 ;;* lmx 62 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_785 keystore_service (service_manager (add)))
+(neverallow base_typeattr_794 keystore_service (service_manager (add)))
 ;;* lme
 
 (allow keystore su (tcp_socket (read write accept getopt)))
@@ -22331,42 +22479,42 @@
 (allow keystore apc_service (service_manager (add find)))
 ;;* lmx 71 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_785 apc_service (service_manager (add)))
+(neverallow base_typeattr_794 apc_service (service_manager (add)))
 ;;* lme
 
 (allow keystore su (tcp_socket (read write accept getopt)))
 (allow keystore keystore_compat_hal_service (service_manager (add find)))
 ;;* lmx 72 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_785 keystore_compat_hal_service (service_manager (add)))
+(neverallow base_typeattr_794 keystore_compat_hal_service (service_manager (add)))
 ;;* lme
 
 (allow keystore su (tcp_socket (read write accept getopt)))
 (allow keystore authorization_service (service_manager (add find)))
 ;;* lmx 73 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_785 authorization_service (service_manager (add)))
+(neverallow base_typeattr_794 authorization_service (service_manager (add)))
 ;;* lme
 
 (allow keystore su (tcp_socket (read write accept getopt)))
 (allow keystore keystore_maintenance_service (service_manager (add find)))
 ;;* lmx 74 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_785 keystore_maintenance_service (service_manager (add)))
+(neverallow base_typeattr_794 keystore_maintenance_service (service_manager (add)))
 ;;* lme
 
 (allow keystore su (tcp_socket (read write accept getopt)))
 (allow keystore keystore_metrics_service (service_manager (add find)))
 ;;* lmx 75 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_785 keystore_metrics_service (service_manager (add)))
+(neverallow base_typeattr_794 keystore_metrics_service (service_manager (add)))
 ;;* lme
 
 (allow keystore su (tcp_socket (read write accept getopt)))
 (allow keystore legacykeystore_service (service_manager (add find)))
 ;;* lmx 76 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_785 legacykeystore_service (service_manager (add)))
+(neverallow base_typeattr_794 legacykeystore_service (service_manager (add)))
 ;;* lme
 
 (allow keystore su (tcp_socket (read write accept getopt)))
@@ -22386,38 +22534,38 @@
 (allow keystore keystore_config_prop (file (read getattr map open)))
 ;;* lmx 97 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_785 keystore_data_file (dir (write lock relabelfrom append map unlink link rename execute quotaon mounton audit_access execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_794 keystore_data_file (dir (write lock relabelfrom append map unlink link rename execute quotaon mounton audit_access execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 98 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_785 keystore_data_file (file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_785 keystore_data_file (lnk_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_785 keystore_data_file (sock_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_785 keystore_data_file (fifo_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_794 keystore_data_file (file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_794 keystore_data_file (lnk_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_794 keystore_data_file (sock_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_794 keystore_data_file (fifo_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 100 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_786 keystore_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_795 keystore_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 101 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_786 keystore_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_786 keystore_data_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_786 keystore_data_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_786 keystore_data_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_795 keystore_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_795 keystore_data_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_795 keystore_data_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_795 keystore_data_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 103 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_233 keystore (process (ptrace)))
+(neverallow base_typeattr_236 keystore (process (ptrace)))
 ;;* lme
 
 ;;* lmx 107 system/sepolicy/private/keystore.te
 
-(neverallow base_typeattr_786 keystore_diagnostics_prop (property_service (set)))
+(neverallow base_typeattr_795 keystore_diagnostics_prop (property_service (set)))
 ;;* lme
 
 (allow init linkerconfig_exec (file (read getattr map execute open)))
@@ -22441,7 +22589,7 @@
 (allow linkerconfig dexopt_chroot_setup (fd (use)))
 ;;* lmx 39 system/sepolicy/private/linkerconfig.te
 
-(neverallow base_typeattr_787 linkerconfig_exec (file (execute execute_no_trans)))
+(neverallow base_typeattr_796 linkerconfig_exec (file (execute execute_no_trans)))
 ;;* lme
 
 (allow init linux_vm_setup_exec (file (read getattr map execute open)))
@@ -22466,7 +22614,7 @@
 (allow llkd self (capability (ipc_lock)))
 (allow llkd self (cap_userns (ipc_lock)))
 (allow llkd domain (process (sigkill)))
-(allow llkd base_typeattr_788 (process (ptrace)))
+(allow llkd base_typeattr_797 (process (ptrace)))
 (allow llkd domain (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow llkd domain (file (ioctl read getattr lock map open watch watch_reads)))
 (allow llkd domain (lnk_file (read)))
@@ -22475,17 +22623,17 @@
 (allow llkd kmsg_device (chr_file (write lock append map open)))
 ;;* lmx 49 system/sepolicy/private/llkd.te
 
-(neverallow base_typeattr_232 llkd (process (transition dyntransition)))
+(neverallow base_typeattr_235 llkd (process (transition dyntransition)))
 ;;* lme
 
 ;;* lmx 50 system/sepolicy/private/llkd.te
 
-(neverallow base_typeattr_246 llkd (process (ptrace)))
+(neverallow base_typeattr_249 llkd (process (ptrace)))
 ;;* lme
 
 ;;* lmx 53 system/sepolicy/private/llkd.te
 
-(neverallow base_typeattr_233 llkd (process (noatsecure)))
+(neverallow base_typeattr_236 llkd (process (noatsecure)))
 ;;* lme
 
 (allow init lmkd_exec (file (read getattr map execute open)))
@@ -22544,7 +22692,7 @@
 (allow lmkd statsd (unix_dgram_socket (sendto)))
 ;;* lmx 92 system/sepolicy/private/lmkd.te
 
-(neverallow base_typeattr_233 lmkd (process (noatsecure)))
+(neverallow base_typeattr_236 lmkd (process (noatsecure)))
 ;;* lme
 
 ;;* lmx 93 system/sepolicy/private/lmkd.te
@@ -22555,7 +22703,7 @@
 
 ;;* lmx 94 system/sepolicy/private/lmkd.te
 
-(neverallow base_typeattr_789 lmkd_prop (property_service (set)))
+(neverallow base_typeattr_798 lmkd_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 95 system/sepolicy/private/lmkd.te
@@ -22572,17 +22720,17 @@
 (allow logd device_logging_prop (file (read getattr map open)))
 ;;* lmx 17 system/sepolicy/private/logd.te
 
-(neverallow logd base_typeattr_790 (file (write create append)))
+(neverallow logd base_typeattr_799 (file (write create append)))
 ;;* lme
 
 ;;* lmx 32 system/sepolicy/private/logd.te
 
-(neverallow base_typeattr_791 runtime_event_log_tags_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_800 runtime_event_log_tags_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 43 system/sepolicy/private/logd.te
 
-(neverallow base_typeattr_792 runtime_event_log_tags_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_801 runtime_event_log_tags_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow logd servicemanager (binder (call transfer)))
@@ -22593,7 +22741,7 @@
 (allow logd logd_service (service_manager (add find)))
 ;;* lmx 50 system/sepolicy/private/logd.te
 
-(neverallow base_typeattr_793 logd_service (service_manager (add)))
+(neverallow base_typeattr_802 logd_service (service_manager (add)))
 ;;* lme
 
 (allow logd su (tcp_socket (read write accept getopt)))
@@ -22650,7 +22798,7 @@
 
 ;;* lmx 105 system/sepolicy/private/logd.te
 
-(neverallow base_typeattr_794 logd (process (ptrace)))
+(neverallow base_typeattr_803 logd (process (ptrace)))
 ;;* lme
 
 ;;* lmx 108 system/sepolicy/private/logd.te
@@ -22666,28 +22814,28 @@
 
 ;;* lmx 116 system/sepolicy/private/logd.te
 
-(neverallow logd base_typeattr_795 (file (write)))
-(neverallow logd base_typeattr_795 (dir (write)))
-(neverallow logd base_typeattr_795 (lnk_file (write)))
-(neverallow logd base_typeattr_795 (chr_file (write)))
-(neverallow logd base_typeattr_795 (blk_file (write)))
-(neverallow logd base_typeattr_795 (sock_file (write)))
-(neverallow logd base_typeattr_795 (fifo_file (write)))
+(neverallow logd base_typeattr_804 (file (write)))
+(neverallow logd base_typeattr_804 (dir (write)))
+(neverallow logd base_typeattr_804 (lnk_file (write)))
+(neverallow logd base_typeattr_804 (chr_file (write)))
+(neverallow logd base_typeattr_804 (blk_file (write)))
+(neverallow logd base_typeattr_804 (sock_file (write)))
+(neverallow logd base_typeattr_804 (fifo_file (write)))
 ;;* lme
 
 ;;* lmx 119 system/sepolicy/private/logd.te
 
-(neverallow base_typeattr_232 logd (process (transition)))
+(neverallow base_typeattr_235 logd (process (transition)))
 ;;* lme
 
 ;;* lmx 120 system/sepolicy/private/logd.te
 
-(neverallow base_typeattr_233 logd (process (dyntransition)))
+(neverallow base_typeattr_236 logd (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 127 system/sepolicy/private/logd.te
 
-(neverallow base_typeattr_796 runtime_event_log_tags_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_805 runtime_event_log_tags_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 (allow logpersist cgroup (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -22742,27 +22890,27 @@
 
 ;;* lmx 54 system/sepolicy/private/logpersist.te
 
-(neverallow base_typeattr_233 logpersist (process (dyntransition)))
+(neverallow base_typeattr_236 logpersist (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 61 system/sepolicy/private/logpersist.te
 
-(neverallow logpersist base_typeattr_797 (file (write create append)))
+(neverallow logpersist base_typeattr_806 (file (write create append)))
 ;;* lme
 
 ;;* lmx 62 system/sepolicy/private/logpersist.te
 
-(neverallow base_typeattr_798 misc_logd_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_807 misc_logd_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 63 system/sepolicy/private/logpersist.te
 
-(neverallow base_typeattr_799 misc_logd_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_808 misc_logd_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
 ;;* lmx 64 system/sepolicy/private/logpersist.te
 
-(neverallow base_typeattr_799 misc_logd_file (dir (write relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_808 misc_logd_file (dir (write relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 (allow init lpdumpd_exec (file (read getattr map execute open)))
@@ -22776,7 +22924,7 @@
 (allow lpdumpd lpdump_service (service_manager (add find)))
 ;;* lmx 8 system/sepolicy/private/lpdumpd.te
 
-(neverallow base_typeattr_800 lpdump_service (service_manager (add)))
+(neverallow base_typeattr_809 lpdump_service (service_manager (add)))
 ;;* lme
 
 (allow lpdumpd su (tcp_socket (read write accept getopt)))
@@ -22799,12 +22947,12 @@
 (allow lpdumpd ota_metadata_file (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lmx 39 system/sepolicy/private/lpdumpd.te
 
-(neverallow base_typeattr_801 lpdump_service (service_manager (find)))
+(neverallow base_typeattr_810 lpdump_service (service_manager (find)))
 ;;* lme
 
 ;;* lmx 47 system/sepolicy/private/lpdumpd.te
 
-(neverallow base_typeattr_802 lpdumpd (binder (call)))
+(neverallow base_typeattr_811 lpdumpd (binder (call)))
 ;;* lme
 
 (allow init mdnsd_exec (file (read getattr map execute open)))
@@ -22834,7 +22982,7 @@
 (allow mediadrmserver mediadrmserver_service (service_manager (add find)))
 ;;* lmx 18 system/sepolicy/private/mediadrmserver.te
 
-(neverallow base_typeattr_803 mediadrmserver_service (service_manager (add)))
+(neverallow base_typeattr_812 mediadrmserver_service (service_manager (add)))
 ;;* lme
 
 (allow mediadrmserver su (tcp_socket (read write accept getopt)))
@@ -22897,7 +23045,7 @@
 (allow mediaextractor mediaextractor_service (service_manager (add find)))
 ;;* lmx 19 system/sepolicy/private/mediaextractor.te
 
-(neverallow base_typeattr_804 mediaextractor_service (service_manager (add)))
+(neverallow base_typeattr_813 mediaextractor_service (service_manager (add)))
 ;;* lme
 
 (allow mediaextractor su (tcp_socket (read write accept getopt)))
@@ -22946,12 +23094,12 @@
 
 ;;* lmx 69 system/sepolicy/private/mediaextractor.te
 
-(neverallow mediaextractor base_typeattr_296 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
+(neverallow mediaextractor base_typeattr_299 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
 ;;* lme
 
 ;;* lmx 78 system/sepolicy/private/mediaextractor.te
 
-(neverallow mediaextractor base_typeattr_805 (file (open)))
+(neverallow mediaextractor base_typeattr_814 (file (open)))
 ;;* lme
 
 (allow init mediametrics_exec (file (read getattr map execute open)))
@@ -22973,7 +23121,7 @@
 (allow mediametrics mediametrics_service (service_manager (add find)))
 ;;* lmx 14 system/sepolicy/private/mediametrics.te
 
-(neverallow base_typeattr_806 mediametrics_service (service_manager (add)))
+(neverallow base_typeattr_815 mediametrics_service (service_manager (add)))
 ;;* lme
 
 (allow mediametrics su (tcp_socket (read write accept getopt)))
@@ -23004,7 +23152,7 @@
 
 ;;* lmx 50 system/sepolicy/private/mediametrics.te
 
-(neverallow mediametrics base_typeattr_296 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
+(neverallow mediametrics base_typeattr_299 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
 ;;* lme
 
 (typetransition mediaprovider tmpfs file appdomain_tmpfs)
@@ -23012,23 +23160,23 @@
 (dontaudit su mediaprovider_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 7 system/sepolicy/private/mediaprovider.te
 
-(neverallow base_typeattr_807 mediaprovider_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_816 mediaprovider_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow mediaprovider appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 7 system/sepolicy/private/mediaprovider.te
 
-(neverallow base_typeattr_808 base_typeattr_807 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_817 base_typeattr_816 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 7 system/sepolicy/private/mediaprovider.te
 
-(neverallow base_typeattr_809 mediaprovider (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_818 mediaprovider (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 7 system/sepolicy/private/mediaprovider.te
 
-(neverallow base_typeattr_810 mediaprovider (process (ptrace)))
+(neverallow base_typeattr_819 mediaprovider (process (ptrace)))
 ;;* lme
 
 (allow mediaprovider cache_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
@@ -23060,23 +23208,23 @@
 (dontaudit su mediaprovider_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 6 system/sepolicy/private/mediaprovider_app.te
 
-(neverallow base_typeattr_811 mediaprovider_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_820 mediaprovider_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow mediaprovider_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 6 system/sepolicy/private/mediaprovider_app.te
 
-(neverallow base_typeattr_812 base_typeattr_811 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_821 base_typeattr_820 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/mediaprovider_app.te
 
-(neverallow base_typeattr_813 mediaprovider_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_822 mediaprovider_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/mediaprovider_app.te
 
-(neverallow base_typeattr_814 mediaprovider_app (process (ptrace)))
+(neverallow base_typeattr_823 mediaprovider_app (process (ptrace)))
 ;;* lme
 
 (allow mediaprovider_app mnt_pass_through_file (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -23198,7 +23346,7 @@
 (allow mediaserver mediaserver_service (service_manager (add find)))
 ;;* lmx 103 system/sepolicy/private/mediaserver.te
 
-(neverallow base_typeattr_815 mediaserver_service (service_manager (add)))
+(neverallow base_typeattr_824 mediaserver_service (service_manager (add)))
 ;;* lme
 
 (allow mediaserver su (tcp_socket (read write accept getopt)))
@@ -23312,7 +23460,7 @@
 
 ;;* lmx 41 system/sepolicy/private/mediaswcodec.te
 
-(neverallow mediaswcodec base_typeattr_296 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
+(neverallow mediaswcodec base_typeattr_299 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
 ;;* lme
 
 (allow init mediatranscoding_exec (file (read getattr map execute open)))
@@ -23335,7 +23483,7 @@
 (allow mediatranscoding mediatranscoding_service (service_manager (add find)))
 ;;* lmx 15 system/sepolicy/private/mediatranscoding.te
 
-(neverallow base_typeattr_816 mediatranscoding_service (service_manager (add)))
+(neverallow base_typeattr_825 mediatranscoding_service (service_manager (add)))
 ;;* lme
 
 (allow mediatranscoding su (tcp_socket (read write accept getopt)))
@@ -23371,7 +23519,7 @@
 
 ;;* lmx 66 system/sepolicy/private/mediatranscoding.te
 
-(neverallow mediatranscoding base_typeattr_296 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
+(neverallow mediatranscoding base_typeattr_299 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
 ;;* lme
 
 (allow init mediatuner_exec (file (read getattr map execute open)))
@@ -23388,7 +23536,7 @@
 (allow mediatuner mediatuner_service (service_manager (add find)))
 ;;* lmx 14 system/sepolicy/private/mediatuner.te
 
-(neverallow base_typeattr_817 mediatuner_service (service_manager (add)))
+(neverallow base_typeattr_826 mediatuner_service (service_manager (add)))
 ;;* lme
 
 (allow mediatuner su (tcp_socket (read write accept getopt)))
@@ -23427,6 +23575,45 @@
 (neverallowx mediatuner domain (ioctl rawip_socket (0x8b00 0x8b02 0x8b04 0x8b06 0x8b08 0x8b0a 0x8b0c 0x8b0e 0x8b10 (range 0x8b14 0x8b1d) 0x8b20 0x8b22 0x8b24 0x8b26 0x8b28 (range 0x8b2a 0x8b2c) (range 0x8b30 0x8b36) (range 0x8be0 0x8bff))))
 ;;* lme
 
+(allow init microfuchsiad_exec (file (read getattr map execute open)))
+(allow init microfuchsiad (process (transition)))
+(allow microfuchsiad microfuchsiad_exec (file (read getattr map execute open entrypoint)))
+(dontaudit init microfuchsiad (process (noatsecure)))
+(allow init microfuchsiad (process (siginh rlimitinh)))
+(typetransition init microfuchsiad_exec process microfuchsiad)
+(allow microfuchsiad servicemanager (binder (call transfer)))
+(allow servicemanager microfuchsiad (binder (call transfer)))
+(allow microfuchsiad microfuchsia_service (service_manager (add find)))
+;;* lmx 1 system/sepolicy/private/microfuchsiad.te
+
+(neverallow base_typeattr_827 microfuchsia_service (service_manager (add)))
+;;* lme
+
+(allow microfuchsiad su (tcp_socket (read write accept getopt)))
+(allow microfuchsiad system_server (binder (call transfer)))
+(allow system_server microfuchsiad (binder (transfer)))
+(allow microfuchsiad system_server (fd (use)))
+(allow microfuchsiad virtualizationmanager_exec (file (read getattr map execute open)))
+(allow microfuchsiad virtualizationmanager (process (transition)))
+(allow virtualizationmanager virtualizationmanager_exec (file (read getattr map execute open entrypoint)))
+(allow virtualizationmanager microfuchsiad (process (sigchld)))
+(dontaudit microfuchsiad virtualizationmanager (process (noatsecure)))
+(allow microfuchsiad virtualizationmanager (process (siginh rlimitinh)))
+(typetransition microfuchsiad virtualizationmanager_exec process virtualizationmanager)
+(allow crosvm microfuchsiad (unix_stream_socket (ioctl read write getattr)))
+(allow virtualizationmanager microfuchsiad (unix_stream_socket (ioctl read write getattr)))
+(allow crosvm microfuchsiad (fd (use)))
+(allow virtualizationmanager microfuchsiad (fd (use)))
+(allow microfuchsiad virtualizationmanager (fd (use)))
+(allow crosvm microfuchsiad (fifo_file (ioctl read write getattr)))
+(allow virtualizationmanager microfuchsiad (fifo_file (ioctl read write getattr)))
+(allow microfuchsiad virtualizationmanager (vsock_socket (read write getattr getopt)))
+(allow microfuchsiad hypervisor_prop (file (read getattr map open)))
+(allow microfuchsiad virtualizationservice_data_file (file (read getattr)))
+(allow virtualizationmanager microfuchsiad (dir (search)))
+(allow virtualizationmanager microfuchsiad (file (read)))
+(allow virtualizationmanager microfuchsiad (lnk_file (read)))
+(allow microfuchsiad devpts (chr_file (ioctl read write getattr open)))
 (allow migrate_legacy_obb_data media_rw_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
 (allow migrate_legacy_obb_data media_rw_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
 (allow migrate_legacy_obb_data shell_exec (file (ioctl read getattr lock map execute open watch watch_reads execute_no_trans)))
@@ -23461,20 +23648,35 @@
 (dontaudit misctrl vendor_property_type (file (read)))
 ;;* lmx 16 system/sepolicy/private/mlstrustedsubject.te
 
-(neverallow base_typeattr_818 app_data_file (file (create setattr relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_818 privapp_data_file (file (create setattr relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_828 app_data_file (file (create setattr relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_828 privapp_data_file (file (create setattr relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_828 storage_area_content_file (file (create setattr relabelfrom relabelto unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 26 system/sepolicy/private/mlstrustedsubject.te
 
-(neverallow base_typeattr_818 app_data_file (dir (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
-(neverallow base_typeattr_818 privapp_data_file (dir (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_828 app_data_file (dir (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_828 privapp_data_file (dir (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_828 storage_area_content_file (dir (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
+;;* lme
+
+;;* lmx 27 system/sepolicy/private/mlstrustedsubject.te
+
+(neverallow base_typeattr_829 storage_area_app_dir (dir (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_829 storage_area_dir (dir (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 49 system/sepolicy/private/mlstrustedsubject.te
 
-(neverallow base_typeattr_819 app_data_file (dir (read getattr search)))
-(neverallow base_typeattr_819 privapp_data_file (dir (read getattr search)))
+(neverallow base_typeattr_830 app_data_file (dir (read getattr search)))
+(neverallow base_typeattr_830 privapp_data_file (dir (read getattr search)))
+(neverallow base_typeattr_830 storage_area_content_file (dir (read getattr search)))
+;;* lme
+
+;;* lmx 51 system/sepolicy/private/mlstrustedsubject.te
+
+(neverallow base_typeattr_831 storage_area_app_dir (dir (read getattr search)))
+(neverallow base_typeattr_831 storage_area_dir (dir (read getattr search)))
 ;;* lme
 
 (allow init mm_events_exec (file (read getattr map execute open)))
@@ -23507,7 +23709,7 @@
 (allow mmd mmd_service (service_manager (add find)))
 ;;* lmx 13 system/sepolicy/private/mmd.te
 
-(neverallow base_typeattr_820 mmd_service (service_manager (add)))
+(neverallow base_typeattr_832 mmd_service (service_manager (add)))
 ;;* lme
 
 (allow mmd su (tcp_socket (read write accept getopt)))
@@ -23547,13 +23749,13 @@
 (allow mtectrl proc_cmdline (file (ioctl read getattr lock map open watch watch_reads)))
 (dontaudit mtectrl sysfs_dt_firmware_android (dir (search)))
 (dontaudit mtectrl vendor_property_type (file (read)))
-(allow base_typeattr_821 node_type (tcp_socket (node_bind)))
-(allow base_typeattr_821 node_type (udp_socket (node_bind)))
-(allow base_typeattr_821 node_type (rawip_socket (node_bind)))
-(allow base_typeattr_821 node_type (icmp_socket (node_bind)))
-(allow base_typeattr_821 port_type (udp_socket (name_bind)))
-(allow base_typeattr_821 port_type (tcp_socket (name_bind)))
-(allow base_typeattr_822 self (netlink_route_socket (bind nlmsg_readpriv nlmsg_getneigh)))
+(allow base_typeattr_833 node_type (tcp_socket (node_bind)))
+(allow base_typeattr_833 node_type (udp_socket (node_bind)))
+(allow base_typeattr_833 node_type (rawip_socket (node_bind)))
+(allow base_typeattr_833 node_type (icmp_socket (node_bind)))
+(allow base_typeattr_833 port_type (udp_socket (name_bind)))
+(allow base_typeattr_833 port_type (tcp_socket (name_bind)))
+(allow base_typeattr_834 self (netlink_route_socket (bind nlmsg_readpriv nlmsg_getneigh)))
 (allow netdomain self (tcp_socket (ioctl read write create getattr setattr lock append map bind connect listen accept getopt setopt shutdown)))
 (allow netdomain self (udp_socket (ioctl read write create getattr setattr lock append map bind connect getopt setopt shutdown)))
 (allow netdomain self (rawip_socket (ioctl read write create getattr setattr lock append map bind connect getopt setopt shutdown)))
@@ -23666,21 +23868,21 @@
 (allow netd netd_service (service_manager (add find)))
 ;;* lmx 116 system/sepolicy/private/netd.te
 
-(neverallow base_typeattr_823 netd_service (service_manager (add)))
+(neverallow base_typeattr_835 netd_service (service_manager (add)))
 ;;* lme
 
 (allow netd su (tcp_socket (read write accept getopt)))
 (allow netd dnsresolver_service (service_manager (add find)))
 ;;* lmx 117 system/sepolicy/private/netd.te
 
-(neverallow base_typeattr_823 dnsresolver_service (service_manager (add)))
+(neverallow base_typeattr_835 dnsresolver_service (service_manager (add)))
 ;;* lme
 
 (allow netd su (tcp_socket (read write accept getopt)))
 (allow netd mdns_service (service_manager (add find)))
 ;;* lmx 118 system/sepolicy/private/netd.te
 
-(neverallow base_typeattr_823 mdns_service (service_manager (add)))
+(neverallow base_typeattr_835 mdns_service (service_manager (add)))
 ;;* lme
 
 (allow netd su (tcp_socket (read write accept getopt)))
@@ -23699,7 +23901,7 @@
 (allow netd hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 142 system/sepolicy/private/netd.te
 
-(neverallow base_typeattr_823 system_net_netd_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_835 system_net_netd_hwservice (hwservice_manager (add)))
 ;;* lme
 
 (allow netd hwservicemanager (binder (call transfer)))
@@ -23710,7 +23912,7 @@
 (allow netd system_net_netd_service (service_manager (add find)))
 ;;* lmx 147 system/sepolicy/private/netd.te
 
-(neverallow base_typeattr_823 system_net_netd_service (service_manager (add)))
+(neverallow base_typeattr_835 system_net_netd_service (service_manager (add)))
 ;;* lme
 
 (allow netd su (tcp_socket (read write accept getopt)))
@@ -23755,27 +23957,27 @@
 
 ;;* lmx 174 system/sepolicy/private/netd.te
 
-(neverallow base_typeattr_824 netd_service (service_manager (find)))
+(neverallow base_typeattr_836 netd_service (service_manager (find)))
 ;;* lme
 
 ;;* lmx 184 system/sepolicy/private/netd.te
 
-(neverallow base_typeattr_824 dnsresolver_service (service_manager (find)))
+(neverallow base_typeattr_836 dnsresolver_service (service_manager (find)))
 ;;* lme
 
 ;;* lmx 194 system/sepolicy/private/netd.te
 
-(neverallow base_typeattr_824 mdns_service (service_manager (find)))
+(neverallow base_typeattr_836 mdns_service (service_manager (find)))
 ;;* lme
 
 ;;* lmx 197 system/sepolicy/private/netd.te
 
-(neverallow base_typeattr_258 netd (binder (call)))
+(neverallow base_typeattr_261 netd (binder (call)))
 ;;* lme
 
 ;;* lmx 198 system/sepolicy/private/netd.te
 
-(neverallow netd base_typeattr_825 (binder (call)))
+(neverallow netd base_typeattr_837 (binder (call)))
 ;;* lme
 
 ;;* lmx 203 system/sepolicy/private/netd.te
@@ -23800,12 +24002,12 @@
 (dontaudit netd appdomain (unix_stream_socket (read write)))
 ;;* lmx 221 system/sepolicy/private/netd.te
 
-(neverallow base_typeattr_826 netd_stable_secret_prop (file (ioctl read getattr lock map open watch watch_reads)))
+(neverallow base_typeattr_838 netd_stable_secret_prop (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lme
 
 ;;* lmx 225 system/sepolicy/private/netd.te
 
-(neverallow base_typeattr_827 netd_stable_secret_prop (property_service (set)))
+(neverallow base_typeattr_839 netd_stable_secret_prop (property_service (set)))
 ;;* lme
 
 (allow netutils_wrapper system_file (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -23840,13 +24042,13 @@
 (allow netutils_wrapper net_data_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow netutils_wrapper net_data_file (file (ioctl read getattr lock map open watch watch_reads)))
 (allow netutils_wrapper net_data_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
-(allow base_typeattr_375 netutils_wrapper_exec (file (read getattr map execute open)))
-(allow base_typeattr_375 netutils_wrapper (process (transition)))
+(allow base_typeattr_378 netutils_wrapper_exec (file (read getattr map execute open)))
+(allow base_typeattr_378 netutils_wrapper (process (transition)))
 (allow netutils_wrapper netutils_wrapper_exec (file (read getattr map execute open entrypoint)))
-(allow netutils_wrapper base_typeattr_375 (process (sigchld)))
-(dontaudit base_typeattr_375 netutils_wrapper (process (noatsecure)))
-(allow base_typeattr_375 netutils_wrapper (process (siginh rlimitinh)))
-(typetransition base_typeattr_375 netutils_wrapper_exec process netutils_wrapper)
+(allow netutils_wrapper base_typeattr_378 (process (sigchld)))
+(dontaudit base_typeattr_378 netutils_wrapper (process (noatsecure)))
+(allow base_typeattr_378 netutils_wrapper (process (siginh rlimitinh)))
+(typetransition base_typeattr_378 netutils_wrapper_exec process netutils_wrapper)
 (dontaudit netutils_wrapper self (capability (sys_resource)))
 (dontaudit netutils_wrapper self (cap_userns (sys_resource)))
 (dontaudit netutils_wrapper sysfs_type (file (read)))
@@ -23866,23 +24068,23 @@
 (dontaudit su network_stack_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 6 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_828 network_stack_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_840 network_stack_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow network_stack appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 6 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_829 base_typeattr_828 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_841 base_typeattr_840 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_830 network_stack (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_842 network_stack (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_831 network_stack (process (ptrace)))
+(neverallow base_typeattr_843 network_stack (process (ptrace)))
 ;;* lme
 
 (allow network_stack self (capability (net_bind_service net_broadcast net_admin net_raw)))
@@ -23938,32 +24140,32 @@
 (allowx network_stack tun_device (ioctl chr_file (0x54ca 0x54cd 0x54d2 0x54e2)))
 ;;* lmx 87 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_314 fs_bpf_net_private (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_317 fs_bpf_net_private (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 88 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_314 fs_bpf_net_private (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_317 fs_bpf_net_private (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 91 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_315 fs_bpf_net_shared (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_318 fs_bpf_net_shared (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 92 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_315 fs_bpf_net_shared (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_318 fs_bpf_net_shared (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 96 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_316 fs_bpf_netd_readonly (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_319 fs_bpf_netd_readonly (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 97 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_316 fs_bpf_netd_readonly (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_319 fs_bpf_netd_readonly (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 98 system/sepolicy/private/network_stack.te
@@ -23973,12 +24175,12 @@
 
 ;;* lmx 102 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_317 fs_bpf_netd_shared (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_320 fs_bpf_netd_shared (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 103 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_317 fs_bpf_netd_shared (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_320 fs_bpf_netd_shared (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 104 system/sepolicy/private/network_stack.te
@@ -23988,12 +24190,12 @@
 
 ;;* lmx 107 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_314 fs_bpf_tethering (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_317 fs_bpf_tethering (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 108 system/sepolicy/private/network_stack.te
 
-(neverallow base_typeattr_314 fs_bpf_tethering (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_317 fs_bpf_tethering (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 (typetransition nfc tmpfs file appdomain_tmpfs)
@@ -24001,29 +24203,29 @@
 (dontaudit su nfc_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 3 system/sepolicy/private/nfc.te
 
-(neverallow base_typeattr_832 nfc_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_844 nfc_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow nfc appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 3 system/sepolicy/private/nfc.te
 
-(neverallow base_typeattr_833 base_typeattr_832 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_845 base_typeattr_844 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 3 system/sepolicy/private/nfc.te
 
-(neverallow base_typeattr_834 nfc (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_846 nfc (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 3 system/sepolicy/private/nfc.te
 
-(neverallow base_typeattr_835 nfc (process (ptrace)))
+(neverallow base_typeattr_847 nfc (process (ptrace)))
 ;;* lme
 
 (allow nfc nfc_service (service_manager (add find)))
 ;;* lmx 7 system/sepolicy/private/nfc.te
 
-(neverallow base_typeattr_832 nfc_service (service_manager (add)))
+(neverallow base_typeattr_844 nfc_service (service_manager (add)))
 ;;* lme
 
 (allow nfc su (tcp_socket (read write accept getopt)))
@@ -24059,7 +24261,7 @@
 (dontaudit su odrefresh_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 14 system/sepolicy/private/odrefresh.te
 
-(neverallow base_typeattr_836 odrefresh_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_848 odrefresh_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow odrefresh apex_art_staging_data_file (dir (ioctl read write create getattr setattr lock relabelto rename open watch watch_reads add_name remove_name reparent search rmdir)))
@@ -24096,17 +24298,17 @@
 (allow odrefresh artd (fd (use)))
 ;;* lmx 65 system/sepolicy/private/odrefresh.te
 
-(neverallow base_typeattr_837 apex_art_staging_data_file (file (open)))
+(neverallow base_typeattr_849 apex_art_staging_data_file (file (open)))
 ;;* lme
 
 ;;* lmx 71 system/sepolicy/private/odrefresh.te
 
-(neverallow base_typeattr_838 odrefresh_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_850 odrefresh_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 72 system/sepolicy/private/odrefresh.te
 
-(neverallow base_typeattr_839 odrefresh_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_851 odrefresh_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 (allow init odsign_exec (file (read getattr map execute open)))
@@ -24124,7 +24326,7 @@
 (allowx odsign odsign_devpts (ioctl chr_file ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
 ;;* lmx 21 system/sepolicy/private/odsign.te
 
-(neverallowx base_typeattr_233 odsign_devpts (ioctl chr_file (0x5412)))
+(neverallowx base_typeattr_236 odsign_devpts (ioctl chr_file (0x5412)))
 ;;* lme
 
 (allowx odsign apex_art_data_file (ioctl file (0x6601 (range 0x6685 0x6686))))
@@ -24163,7 +24365,7 @@
 (allow odsign odsign_prop (file (read getattr map open)))
 ;;* lmx 59 system/sepolicy/private/odsign.te
 
-(neverallow base_typeattr_840 odsign_prop (property_service (set)))
+(neverallow base_typeattr_852 odsign_prop (property_service (set)))
 ;;* lme
 
 (allow odsign property_socket (sock_file (write)))
@@ -24172,12 +24374,12 @@
 (allow odsign ctl_odsign_prop (file (read getattr map open)))
 ;;* lmx 65 system/sepolicy/private/odsign.te
 
-(neverallow base_typeattr_840 odsign_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_852 odsign_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 66 system/sepolicy/private/odsign.te
 
-(neverallow base_typeattr_840 odsign_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_852 odsign_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 (allow ot_ctl ot_daemon_socket (sock_file (ioctl read write getattr lock append map open watch watch_reads)))
@@ -24198,7 +24400,7 @@
 (allow ot_daemon ot_daemon_service (service_manager (add find)))
 ;;* lmx 36 system/sepolicy/private/ot_daemon.te
 
-(neverallow base_typeattr_841 ot_daemon_service (service_manager (add)))
+(neverallow base_typeattr_853 ot_daemon_service (service_manager (add)))
 ;;* lme
 
 (allow ot_daemon su (tcp_socket (read write accept getopt)))
@@ -24211,7 +24413,7 @@
 (allow ot_daemon dumpstate (fifo_file (write)))
 ;;* lmx 53 system/sepolicy/private/ot_daemon.te
 
-(neverallow base_typeattr_842 ot_daemon_socket (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_854 ot_daemon_socket (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow otapreopt_chroot postinstall_file (dir (mounton search)))
@@ -24347,12 +24549,12 @@
 (dontauditx perfetto shell (ioctl fifo_file ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
 ;;* lmx 99 system/sepolicy/private/perfetto.te
 
-(neverallow base_typeattr_843 perfetto_traces_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_855 perfetto_traces_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 109 system/sepolicy/private/perfetto.te
 
-(neverallow base_typeattr_844 perfetto_traces_data_file (file (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_856 perfetto_traces_data_file (file (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 115 system/sepolicy/private/perfetto.te
@@ -24372,17 +24574,17 @@
 
 ;;* lmx 139 system/sepolicy/private/perfetto.te
 
-(neverallow perfetto base_typeattr_845 (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow perfetto base_typeattr_857 (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 144 system/sepolicy/private/perfetto.te
 
-(neverallow perfetto base_typeattr_846 (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
+(neverallow perfetto base_typeattr_858 (dir (ioctl read write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 152 system/sepolicy/private/perfetto.te
 
-(neverallow perfetto base_typeattr_847 (file (ioctl read create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow perfetto base_typeattr_859 (file (ioctl read create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 (allow init performanced_exec (file (read getattr map execute open)))
@@ -24403,7 +24605,7 @@
 (allow performanced pdx_performance_client_channel_socket_type (unix_stream_socket (ioctl read write create getattr setattr lock append map bind connect listen accept getopt setopt shutdown)))
 ;;* lmx 10 system/sepolicy/private/performanced.te
 
-(neverallow base_typeattr_848 pdx_performance_client_endpoint_socket_type (unix_stream_socket (listen accept)))
+(neverallow base_typeattr_860 pdx_performance_client_endpoint_socket_type (unix_stream_socket (listen accept)))
 ;;* lme
 
 (allow performanced self (capability (setgid setuid sys_nice)))
@@ -24438,23 +24640,23 @@
 (dontaudit su permissioncontroller_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 6 system/sepolicy/private/permissioncontroller_app.te
 
-(neverallow base_typeattr_849 permissioncontroller_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_861 permissioncontroller_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow permissioncontroller_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 6 system/sepolicy/private/permissioncontroller_app.te
 
-(neverallow base_typeattr_850 base_typeattr_849 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_862 base_typeattr_861 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/permissioncontroller_app.te
 
-(neverallow base_typeattr_851 permissioncontroller_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_863 permissioncontroller_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/permissioncontroller_app.te
 
-(neverallow base_typeattr_852 permissioncontroller_app (process (ptrace)))
+(neverallow base_typeattr_864 permissioncontroller_app (process (ptrace)))
 ;;* lme
 
 (allow permissioncontroller_app app_api_service (service_manager (find)))
@@ -24474,23 +24676,23 @@
 (dontaudit su platform_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 7 system/sepolicy/private/platform_app.te
 
-(neverallow base_typeattr_853 platform_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_865 platform_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow platform_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 7 system/sepolicy/private/platform_app.te
 
-(neverallow base_typeattr_854 base_typeattr_853 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_866 base_typeattr_865 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 7 system/sepolicy/private/platform_app.te
 
-(neverallow base_typeattr_855 platform_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_867 platform_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 7 system/sepolicy/private/platform_app.te
 
-(neverallow base_typeattr_856 platform_app (process (ptrace)))
+(neverallow base_typeattr_868 platform_app (process (ptrace)))
 ;;* lme
 
 (allow platform_app shell_data_file (dir (search)))
@@ -24518,7 +24720,7 @@
 (allow platform_app persist_wm_debug_prop (file (read getattr map open)))
 ;;* lmx 46 system/sepolicy/private/platform_app.te
 
-(neverallow base_typeattr_857 persist_wm_debug_prop (property_service (set)))
+(neverallow base_typeattr_869 persist_wm_debug_prop (property_service (set)))
 ;;* lme
 
 (allow platform_app property_socket (sock_file (write)))
@@ -24606,7 +24808,7 @@
 (allow virtualizationmanager platform_app (lnk_file (read)))
 ;;* lmx 151 system/sepolicy/private/platform_app.te
 
-(neverallow base_typeattr_858 persist_sysui_builder_extras_prop (property_service (set)))
+(neverallow base_typeattr_870 persist_sysui_builder_extras_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 154 system/sepolicy/private/platform_app.te
@@ -24641,7 +24843,7 @@
 (allow postinstall sysfs_fs_f2fs (dir (ioctl read getattr lock open watch watch_reads search)))
 ;;* lmx 53 system/sepolicy/private/postinstall.te
 
-(neverallow base_typeattr_859 postinstall (process (transition dyntransition)))
+(neverallow base_typeattr_871 postinstall (process (transition dyntransition)))
 ;;* lme
 
 (allow postinstall_dexopt dex2oat_exec (file (read getattr map execute open)))
@@ -24735,7 +24937,7 @@
 (allow prefetch prefetch_service_prop (file (read getattr map open)))
 ;;* lmx 24 system/sepolicy/private/prefetch.te
 
-(neverallow base_typeattr_860 ctl_prefetch_prop (property_service (set)))
+(neverallow base_typeattr_872 ctl_prefetch_prop (property_service (set)))
 ;;* lme
 
 (allow init preloads_copy_exec (file (read getattr map execute open)))
@@ -24763,23 +24965,23 @@
 (dontaudit su priv_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 6 system/sepolicy/private/priv_app.te
 
-(neverallow base_typeattr_861 priv_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_873 priv_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow priv_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 6 system/sepolicy/private/priv_app.te
 
-(neverallow base_typeattr_862 base_typeattr_861 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_874 base_typeattr_873 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/priv_app.te
 
-(neverallow base_typeattr_863 priv_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_875 priv_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/priv_app.te
 
-(neverallow base_typeattr_864 priv_app (process (ptrace)))
+(neverallow base_typeattr_876 priv_app (process (ptrace)))
 ;;* lme
 
 (typetransition priv_app devpts chr_file priv_app_devpts)
@@ -24787,7 +24989,7 @@
 (allowx priv_app priv_app_devpts (ioctl chr_file ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
 ;;* lmx 15 system/sepolicy/private/priv_app.te
 
-(neverallowx base_typeattr_233 priv_app_devpts (ioctl chr_file (0x5412)))
+(neverallowx base_typeattr_236 priv_app_devpts (ioctl chr_file (0x5412)))
 ;;* lme
 
 (allow priv_app privapp_data_file (file (execute)))
@@ -24990,12 +25192,12 @@
 
 ;;* lmx 275 system/sepolicy/private/priv_app.te
 
-(neverallow priv_app base_typeattr_865 (file (execute execute_no_trans)))
+(neverallow priv_app base_typeattr_877 (file (execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 278 system/sepolicy/private/priv_app.te
 
-(neverallow priv_app base_typeattr_865 (lnk_file (read getattr open)))
+(neverallow priv_app base_typeattr_877 (lnk_file (read getattr open)))
 ;;* lme
 
 ;;* lmx 281 system/sepolicy/private/priv_app.te
@@ -25029,60 +25231,60 @@
 
 ;;* lmx 286 system/sepolicy/private/priv_app.te
 
-(neverallow priv_app base_typeattr_233 (netlink_route_socket (ioctl)))
-(neverallow priv_app base_typeattr_233 (netlink_selinux_socket (ioctl)))
+(neverallow priv_app base_typeattr_236 (netlink_route_socket (ioctl)))
+(neverallow priv_app base_typeattr_236 (netlink_selinux_socket (ioctl)))
 ;;* lme
 
 ;;* lmx 299 system/sepolicy/private/priv_app.te
 
-(neverallow priv_app base_typeattr_233 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow priv_app base_typeattr_233 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
-(neverallow priv_app base_typeattr_233 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
-(neverallow priv_app base_typeattr_233 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
-(neverallow priv_app base_typeattr_233 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
-(neverallow priv_app base_typeattr_233 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
-(neverallow priv_app base_typeattr_233 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (netlink_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (packet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (key_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (netlink_tcpdiag_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow priv_app base_typeattr_236 (netlink_nflog_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (netlink_xfrm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write)))
+(neverallow priv_app base_typeattr_236 (netlink_audit_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind nlmsg_read nlmsg_write nlmsg_relay nlmsg_readpriv nlmsg_tty_audit)))
+(neverallow priv_app base_typeattr_236 (netlink_dnrt_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (netlink_kobject_uevent_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (appletalk_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (tun_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind attach_queue)))
+(neverallow priv_app base_typeattr_236 (netlink_iscsi_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (netlink_fib_lookup_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (netlink_connector_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (netlink_netfilter_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (netlink_generic_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (netlink_scsitransport_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (netlink_rdma_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (netlink_crypto_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (sctp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect association)))
+(neverallow priv_app base_typeattr_236 (ax25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (ipx_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (netrom_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (atmpvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (x25_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (rose_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (decnet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (atmsvc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (rds_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (irda_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (pppox_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (llc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (can_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (tipc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (bluetooth_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (iucv_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (rxrpc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (isdn_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (phonet_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (ieee802154_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (caif_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (alg_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (nfc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (kcm_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (qipcrtr_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (smc_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow priv_app base_typeattr_236 (xdp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
 ;;* lme
 
 (allow init prng_seeder_exec (file (read getattr map execute open)))
@@ -25139,7 +25341,7 @@
 (allow profcollectd profcollectd_service (service_manager (add find)))
 ;;* lmx 5 system/sepolicy/private/profcollectd.te
 
-(neverallow base_typeattr_866 profcollectd_service (service_manager (add)))
+(neverallow base_typeattr_878 profcollectd_service (service_manager (add)))
 ;;* lme
 
 (allow profcollectd su (tcp_socket (read write accept getopt)))
@@ -25195,437 +25397,437 @@
 
 ;;* lmx 2 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 adbd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 adbd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 3 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 adbd_tradeinmode_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 adbd_tradeinmode_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 apexd_payload_metadata_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 apexd_payload_metadata_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 ctl_snapuserd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_snapuserd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 ctl_prefetch_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_prefetch_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 7 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 ctl_uprobestats_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_uprobestats_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 8 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 crashrecovery_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 crashrecovery_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 9 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 debug_tracing_desktop_mode_visible_tasks_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 debug_tracing_desktop_mode_visible_tasks_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 10 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_core_experiments_team_internal_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_core_experiments_team_internal_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 11 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_lmkd_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_lmkd_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 12 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_mglru_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_mglru_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_mmd_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_mmd_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 14 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_profcollect_native_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_profcollect_native_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_remote_key_provisioning_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_remote_key_provisioning_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 16 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_statsd_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_statsd_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 17 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_statsd_native_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_statsd_native_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 18 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_storage_native_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_storage_native_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 19 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_sys_traced_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_sys_traced_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 20 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_window_manager_native_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_window_manager_native_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 21 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_configuration_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_configuration_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 22 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_connectivity_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_connectivity_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 23 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_swcodec_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_swcodec_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 24 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_tethering_u_or_later_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 device_config_tethering_u_or_later_native_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 25 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 dmesgd_start_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 dmesgd_start_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 26 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 fastbootd_protocol_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 fastbootd_protocol_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 27 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 gsid_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 gsid_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 28 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 init_perf_lsm_hooks_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 init_perf_lsm_hooks_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 29 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 init_service_status_private_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 init_service_status_private_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 30 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 init_storage_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 init_storage_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 31 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 init_svc_debug_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 init_svc_debug_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 32 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 kcmdline_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 kcmdline_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 33 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 keystore_diagnostics_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 keystore_diagnostics_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 34 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 keystore_listen_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 keystore_listen_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 35 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 last_boot_reason_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 last_boot_reason_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 36 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 localization_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 localization_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 37 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 logd_auditrate_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 logd_auditrate_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 38 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 lower_kptr_restrict_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 lower_kptr_restrict_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 39 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 mmd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 mmd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 40 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 net_464xlat_fromvendor_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 net_464xlat_fromvendor_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 41 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 net_connectivity_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 net_connectivity_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 42 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 netd_stable_secret_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 netd_stable_secret_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 43 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 next_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 next_boot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 44 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 odsign_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 odsign_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 45 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 misctrl_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 misctrl_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 46 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 perf_drop_caches_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 perf_drop_caches_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 47 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 pm_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 pm_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 48 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 prefetch_service_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 prefetch_service_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 49 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 profcollectd_node_id_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 profcollectd_node_id_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 50 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 radio_cdma_ecm_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 radio_cdma_ecm_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 51 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 remote_prov_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 remote_prov_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 52 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 remote_prov_cert_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 remote_prov_cert_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 53 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 rollback_test_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 rollback_test_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 54 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 setupwizard_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 setupwizard_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 55 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 snapshotctl_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 snapshotctl_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 56 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 snapuserd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 snapuserd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 57 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 system_adbd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 system_adbd_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 58 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 system_audio_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 system_audio_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 59 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 timezone_metadata_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 timezone_metadata_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 60 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 traced_perf_enabled_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 traced_perf_enabled_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 61 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 uprobestats_start_with_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 uprobestats_start_with_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 62 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 tuner_server_ctl_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 tuner_server_ctl_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 63 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 userspace_reboot_log_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 userspace_reboot_log_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 64 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 userspace_reboot_test_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 userspace_reboot_test_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 65 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 verity_status_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 verity_status_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 66 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 zygote_wrap_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 zygote_wrap_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 67 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 ctl_mediatranscoding_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_mediatranscoding_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 68 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 ctl_odsign_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_odsign_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 69 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 virtualizationservice_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 virtualizationservice_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 70 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 ctl_apex_load_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_apex_load_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 71 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 sensors_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 sensors_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 72 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 hypervisor_pvmfw_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 hypervisor_pvmfw_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 73 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 hypervisor_virtualizationmanager_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 hypervisor_virtualizationmanager_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 74 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 game_manager_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 game_manager_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 75 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 hidl_memory_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 hidl_memory_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 76 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 suspend_debug_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 suspend_debug_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 77 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 system_service_enable_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 system_service_enable_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 78 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 ctl_artd_pre_reboot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 ctl_artd_pre_reboot_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 79 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 trusty_security_vm_sys_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 trusty_security_vm_sys_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 80 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 hint_manager_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 hint_manager_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 83 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 bionic_linker_16kb_app_compat_prop (property_service (set)))
+(neverallow base_typeattr_229 bionic_linker_16kb_app_compat_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 84 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 device_config_virtualization_framework_native_prop (property_service (set)))
+(neverallow base_typeattr_229 device_config_virtualization_framework_native_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 85 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 fstype_prop (property_service (set)))
+(neverallow base_typeattr_229 fstype_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 86 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 log_file_logger_prop (property_service (set)))
+(neverallow base_typeattr_229 log_file_logger_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 87 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 persist_sysui_builder_extras_prop (property_service (set)))
+(neverallow base_typeattr_229 persist_sysui_builder_extras_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 88 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 persist_sysui_ranking_update_prop (property_service (set)))
+(neverallow base_typeattr_229 persist_sysui_ranking_update_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 89 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 page_size_prop (property_service (set)))
+(neverallow base_typeattr_229 page_size_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 90 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 pm_16kb_app_compat_prop (property_service (set)))
+(neverallow base_typeattr_229 pm_16kb_app_compat_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -25634,7 +25836,7 @@
 (allow vendor_init avf_virtualizationservice_prop (file (read getattr map open)))
 ;;* lmx 112 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_227 avf_virtualizationservice_prop (property_service (set)))
+(neverallow base_typeattr_230 avf_virtualizationservice_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -25643,7 +25845,7 @@
 (allow vendor_init high_barometer_quality_prop (file (read getattr map open)))
 ;;* lmx 113 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_227 high_barometer_quality_prop (property_service (set)))
+(neverallow base_typeattr_230 high_barometer_quality_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -25652,7 +25854,7 @@
 (allow vendor_init prefetch_boot_prop (file (read getattr map open)))
 ;;* lmx 114 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_227 prefetch_boot_prop (property_service (set)))
+(neverallow base_typeattr_230 prefetch_boot_prop (property_service (set)))
 ;;* lme
 
 (allow vendor_init property_socket (sock_file (write)))
@@ -25661,33 +25863,33 @@
 (allow vendor_init widevine_sys_vendor_prop (file (read getattr map open)))
 ;;* lmx 115 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_227 widevine_sys_vendor_prop (property_service (set)))
+(neverallow base_typeattr_230 widevine_sys_vendor_prop (property_service (set)))
 ;;* lme
 
 (allow property_type tmpfs (filesystem (associate)))
 ;;* lmx 159 system/sepolicy/private/property.te
 
-(neverallow domain base_typeattr_867 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow domain base_typeattr_879 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 159 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 base_typeattr_868 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_229 base_typeattr_880 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 159 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_226 base_typeattr_869 (property_service (set)))
+(neverallow base_typeattr_229 base_typeattr_881 (property_service (set)))
 ;;* lme
 
 ;;* lmx 159 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_228 base_typeattr_870 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_231 base_typeattr_882 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 159 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_341 base_typeattr_871 (property_service (set)))
+(neverallow base_typeattr_344 base_typeattr_883 (property_service (set)))
 ;;* lme
 
 ;;* lmx 202 system/sepolicy/private/property.te
@@ -25697,12 +25899,12 @@
 
 ;;* lmx 228 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_233 base_typeattr_872 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_236 base_typeattr_884 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 236 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_227 ctl_sigstop_prop (property_service (set)))
+(neverallow base_typeattr_230 ctl_sigstop_prop (property_service (set)))
 ;;* lme
 
 (dontaudit domain ctl_bootanim_prop (property_service (set)))
@@ -25715,319 +25917,319 @@
 (dontaudit domain ctl_default_prop (property_service (set)))
 ;;* lmx 255 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_873 init_storage_prop (property_service (set)))
+(neverallow base_typeattr_885 init_storage_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 260 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_232 init_svc_debug_prop (property_service (set)))
+(neverallow base_typeattr_235 init_svc_debug_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 267 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_874 init_svc_debug_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_886 init_svc_debug_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 278 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_875 misctrl_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_887 misctrl_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 284 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_876 misctrl_prop (property_service (set)))
+(neverallow base_typeattr_888 misctrl_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_877 base_typeattr_878 (property_service (set)))
+(neverallow base_typeattr_889 base_typeattr_890 (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_879 nfc_prop (property_service (set)))
+(neverallow base_typeattr_891 nfc_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_880 radio_control_prop (property_service (set)))
+(neverallow base_typeattr_892 radio_control_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_881 radio_prop (property_service (set)))
+(neverallow base_typeattr_893 radio_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_882 bluetooth_prop (property_service (set)))
+(neverallow base_typeattr_894 bluetooth_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_883 exported_bluetooth_prop (property_service (set)))
+(neverallow base_typeattr_895 exported_bluetooth_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_884 exported_camera_prop (property_service (set)))
+(neverallow base_typeattr_896 exported_camera_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_885 wifi_prop (property_service (set)))
+(neverallow base_typeattr_897 wifi_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_886 wifi_hal_prop (property_service (set)))
+(neverallow base_typeattr_898 wifi_hal_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_877 base_typeattr_887 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_889 base_typeattr_899 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_888 dalvik_dynamic_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_900 dalvik_dynamic_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_879 nfc_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_891 nfc_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_881 radio_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_893 radio_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_882 bluetooth_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_894 bluetooth_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_885 wifi_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_897 wifi_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_393 suspend_prop (property_service (set)))
+(neverallow base_typeattr_396 suspend_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_232 suspend_debug_prop (property_service (set)))
+(neverallow base_typeattr_235 suspend_debug_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_227 high_barometer_quality_prop (property_service (set)))
+(neverallow base_typeattr_230 high_barometer_quality_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 286 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_889 suspend_debug_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_901 suspend_debug_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (dontaudit system_suspend suspend_debug_prop (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lmx 483 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_890 base_typeattr_891 (property_service (set)))
+(neverallow base_typeattr_902 base_typeattr_903 (property_service (set)))
 ;;* lme
 
 ;;* lmx 503 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_393 ffs_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_393 ffs_control_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_396 ffs_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_396 ffs_control_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 511 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_435 userspace_reboot_log_prop (property_service (set)))
+(neverallow base_typeattr_438 userspace_reboot_log_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 520 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_435 system_adbd_prop (property_service (set)))
+(neverallow base_typeattr_438 system_adbd_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 532 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_892 adbd_config_prop (property_service (set)))
+(neverallow base_typeattr_904 adbd_config_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 542 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_893 adbd_prop (property_service (set)))
+(neverallow base_typeattr_905 adbd_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 550 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_232 apexd_payload_metadata_prop (property_service (set)))
+(neverallow base_typeattr_235 apexd_payload_metadata_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 560 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_860 userspace_reboot_test_prop (property_service (set)))
+(neverallow base_typeattr_872 userspace_reboot_test_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 569 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_392 surfaceflinger_color_prop (property_service (set)))
+(neverallow base_typeattr_395 surfaceflinger_color_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 576 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_232 libc_debug_prop (property_service (set)))
+(neverallow base_typeattr_235 libc_debug_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 591 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_894 arm64_memtag_prop (property_service (set)))
-(neverallow base_typeattr_894 gwp_asan_prop (property_service (set)))
+(neverallow base_typeattr_906 arm64_memtag_prop (property_service (set)))
+(neverallow base_typeattr_906 gwp_asan_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 600 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_895 kcmdline_prop (property_service (set)))
+(neverallow base_typeattr_907 kcmdline_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 607 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_392 zram_control_prop (property_service (set)))
+(neverallow base_typeattr_395 zram_control_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 614 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_392 dalvik_runtime_prop (property_service (set)))
+(neverallow base_typeattr_395 dalvik_runtime_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 623 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_393 usb_config_prop (property_service (set)))
-(neverallow base_typeattr_393 usb_control_prop (property_service (set)))
+(neverallow base_typeattr_396 usb_config_prop (property_service (set)))
+(neverallow base_typeattr_396 usb_control_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 632 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_435 provisioned_prop (property_service (set)))
-(neverallow base_typeattr_435 retaildemo_prop (property_service (set)))
+(neverallow base_typeattr_438 provisioned_prop (property_service (set)))
+(neverallow base_typeattr_438 retaildemo_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 641 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_393 provisioned_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_393 retaildemo_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_396 provisioned_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_396 retaildemo_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 649 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_232 init_service_status_prop (property_service (set)))
-(neverallow base_typeattr_232 init_service_status_private_prop (property_service (set)))
+(neverallow base_typeattr_235 init_service_status_prop (property_service (set)))
+(neverallow base_typeattr_235 init_service_status_private_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 658 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_896 telephony_status_prop (property_service (set)))
+(neverallow base_typeattr_908 telephony_status_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 666 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_227 graphics_config_prop (property_service (set)))
+(neverallow base_typeattr_230 graphics_config_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 674 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_897 surfaceflinger_display_prop (property_service (set)))
+(neverallow base_typeattr_909 surfaceflinger_display_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 681 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_877 packagemanager_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_889 packagemanager_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 687 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_393 keyguard_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_396 keyguard_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 694 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_232 localization_prop (property_service (set)))
+(neverallow base_typeattr_235 localization_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 702 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_898 oem_unlock_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_910 oem_unlock_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 708 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_393 storagemanager_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_396 storagemanager_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 716 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_899 sendbug_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_911 sendbug_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 724 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_899 camera_calibration_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_911 camera_calibration_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 732 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_900 hal_dumpstate_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_912 hal_dumpstate_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 743 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_491 lower_kptr_restrict_prop (property_service (set)))
+(neverallow base_typeattr_498 lower_kptr_restrict_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 748 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_232 zygote_wrap_prop (property_service (set)))
+(neverallow base_typeattr_235 zygote_wrap_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 753 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_232 verity_status_prop (property_service (set)))
+(neverallow base_typeattr_235 verity_status_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 759 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_227 setupwizard_mode_prop (property_service (set)))
+(neverallow base_typeattr_230 setupwizard_mode_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 764 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_232 setupwizard_prop (property_service (set)))
+(neverallow base_typeattr_235 setupwizard_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 773 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_394 build_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_397 build_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 779 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_860 sqlite_log_prop (property_service (set)))
+(neverallow base_typeattr_872 sqlite_log_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 785 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_375 sqlite_log_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_378 sqlite_log_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 790 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_232 default_prop (property_service (set)))
+(neverallow base_typeattr_235 default_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 794 system/sepolicy/private/property.te
@@ -26038,72 +26240,72 @@
 
 ;;* lmx 803 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_901 remote_prov_prop (property_service (set)))
+(neverallow base_typeattr_913 remote_prov_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 808 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_232 remote_prov_cert_prop (property_service (set)))
+(neverallow base_typeattr_235 remote_prov_cert_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 815 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_860 rollback_test_prop (property_service (set)))
+(neverallow base_typeattr_872 rollback_test_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 821 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_239 ctl_apex_load_prop (property_service (set)))
+(neverallow base_typeattr_242 ctl_apex_load_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 829 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_902 ctl_apex_load_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_914 ctl_apex_load_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 835 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_239 apex_ready_prop (property_service (set)))
+(neverallow base_typeattr_242 apex_ready_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 843 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_903 apex_ready_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_915 apex_ready_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 851 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_904 profcollectd_node_id_prop (file (ioctl read getattr lock map open watch watch_reads)))
+(neverallow base_typeattr_916 profcollectd_node_id_prop (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lme
 
 ;;* lmx 856 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_232 log_file_logger_prop (property_service (set)))
+(neverallow base_typeattr_235 log_file_logger_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 862 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_227 usb_uvc_enabled_prop (property_service (set)))
+(neverallow base_typeattr_230 usb_uvc_enabled_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 869 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_905 usb_uvc_enabled_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_917 usb_uvc_enabled_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 875 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_227 pm_archiving_enabled_prop (property_service (set)))
+(neverallow base_typeattr_230 pm_archiving_enabled_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 882 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_906 bionic_linker_16kb_app_compat_prop (property_service (set)))
+(neverallow base_typeattr_918 bionic_linker_16kb_app_compat_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 889 system/sepolicy/private/property.te
 
-(neverallow base_typeattr_906 pm_16kb_app_compat_prop (property_service (set)))
+(neverallow base_typeattr_918 pm_16kb_app_compat_prop (property_service (set)))
 ;;* lme
 
 (typetransition radio tmpfs file appdomain_tmpfs)
@@ -26111,23 +26313,23 @@
 (dontaudit su radio_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 3 system/sepolicy/private/radio.te
 
-(neverallow base_typeattr_907 radio_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_919 radio_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow radio appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 3 system/sepolicy/private/radio.te
 
-(neverallow base_typeattr_908 base_typeattr_907 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_920 base_typeattr_919 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 3 system/sepolicy/private/radio.te
 
-(neverallow base_typeattr_909 radio (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_921 radio (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 3 system/sepolicy/private/radio.te
 
-(neverallow base_typeattr_910 radio (process (ptrace)))
+(neverallow base_typeattr_922 radio (process (ptrace)))
 ;;* lme
 
 (allow radio runtime_event_log_tags_file (file (ioctl read getattr lock map open watch watch_reads)))
@@ -26179,7 +26381,7 @@
 (allow radio radio_service (service_manager (add find)))
 ;;* lmx 51 system/sepolicy/private/radio.te
 
-(neverallow base_typeattr_907 radio_service (service_manager (add)))
+(neverallow base_typeattr_919 radio_service (service_manager (add)))
 ;;* lme
 
 (allow radio su (tcp_socket (read write accept getopt)))
@@ -26197,17 +26399,17 @@
 (allow radio proc_cmdline (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lmx 74 system/sepolicy/private/radio.te
 
-(neverallow base_typeattr_911 binder_cache_telephony_server_prop (property_service (set)))
+(neverallow base_typeattr_923 binder_cache_telephony_server_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 206 system/sepolicy/private/recovery.te
 
-(neverallow recovery base_typeattr_912 (file (write create setattr relabelfrom append unlink link rename execute execute_no_trans)))
+(neverallow recovery base_typeattr_924 (file (write create setattr relabelfrom append unlink link rename execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 212 system/sepolicy/private/recovery.te
 
-(neverallow recovery base_typeattr_912 (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow recovery base_typeattr_924 (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 (allow init recovery_persist_exec (file (read getattr map execute open)))
@@ -26265,7 +26467,7 @@
 
 ;;* lmx 39 system/sepolicy/private/recovery_persist.te
 
-(neverallow recovery_persist base_typeattr_913 (file (write)))
+(neverallow recovery_persist base_typeattr_925 (file (write)))
 ;;* lme
 
 (allow init recovery_refresh_exec (file (read getattr map execute open)))
@@ -26317,13 +26519,13 @@
 
 ;;* lmx 31 system/sepolicy/private/recovery_refresh.te
 
-(neverallow recovery_refresh base_typeattr_914 (file (write)))
+(neverallow recovery_refresh base_typeattr_926 (file (write)))
 ;;* lme
 
 (allow remote_provisioning_service_server remote_provisioning_service (service_manager (add find)))
 ;;* lmx 3 system/sepolicy/private/remote_provisioning_service_server.te
 
-(neverallow base_typeattr_915 remote_provisioning_service (service_manager (add)))
+(neverallow base_typeattr_927 remote_provisioning_service (service_manager (add)))
 ;;* lme
 
 (allow remote_provisioning_service_server su (tcp_socket (read write accept getopt)))
@@ -26365,7 +26567,7 @@
 (allow rkp_cert_processor rkp_cert_processor_service (service_manager (add find)))
 ;;* lmx 11 system/sepolicy/private/rkp_cert_processor.te
 
-(neverallow base_typeattr_916 rkp_cert_processor_service (service_manager (add)))
+(neverallow base_typeattr_928 rkp_cert_processor_service (service_manager (add)))
 ;;* lme
 
 (allow rkp_cert_processor su (tcp_socket (read write accept getopt)))
@@ -26383,14 +26585,14 @@
 (allow rkpd rkpd_registrar_service (service_manager (add find)))
 ;;* lmx 12 system/sepolicy/private/rkpd.te
 
-(neverallow base_typeattr_917 rkpd_registrar_service (service_manager (add)))
+(neverallow base_typeattr_929 rkpd_registrar_service (service_manager (add)))
 ;;* lme
 
 (allow rkpd su (tcp_socket (read write accept getopt)))
 (allow rkpd rkpd_refresh_service (service_manager (add find)))
 ;;* lmx 13 system/sepolicy/private/rkpd.te
 
-(neverallow base_typeattr_917 rkpd_refresh_service (service_manager (add)))
+(neverallow base_typeattr_929 rkpd_refresh_service (service_manager (add)))
 ;;* lme
 
 (allow rkpd su (tcp_socket (read write accept getopt)))
@@ -26400,23 +26602,23 @@
 (dontaudit su rkpdapp_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 7 system/sepolicy/private/rkpd_app.te
 
-(neverallow base_typeattr_918 rkpdapp_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_930 rkpdapp_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow rkpdapp appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 7 system/sepolicy/private/rkpd_app.te
 
-(neverallow base_typeattr_919 base_typeattr_918 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_931 base_typeattr_930 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 7 system/sepolicy/private/rkpd_app.te
 
-(neverallow base_typeattr_920 rkpdapp (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_932 rkpdapp (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 7 system/sepolicy/private/rkpd_app.te
 
-(neverallow base_typeattr_921 rkpdapp (process (ptrace)))
+(neverallow base_typeattr_933 rkpdapp (process (ptrace)))
 ;;* lme
 
 (allow rkpdapp device_config_remote_key_provisioning_native_prop (file (read getattr map open)))
@@ -26473,12 +26675,12 @@
 
 ;;* lmx 42 system/sepolicy/private/rs.te
 
-(neverallow base_typeattr_260 rs (process (transition dyntransition)))
+(neverallow base_typeattr_263 rs (process (transition dyntransition)))
 ;;* lme
 
 ;;* lmx 43 system/sepolicy/private/rs.te
 
-(neverallow rs base_typeattr_246 (process (transition dyntransition)))
+(neverallow rs base_typeattr_249 (process (transition dyntransition)))
 ;;* lme
 
 ;;* lmx 44 system/sepolicy/private/rs.te
@@ -26493,10 +26695,10 @@
 
 ;;* lmx 46 system/sepolicy/private/rs.te
 
-(neverallow rs base_typeattr_233 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
-(neverallow rs base_typeattr_233 (udp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
-(neverallow rs base_typeattr_233 (rawip_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
-(neverallow rs base_typeattr_233 (icmp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
+(neverallow rs base_typeattr_236 (tcp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind name_connect)))
+(neverallow rs base_typeattr_236 (udp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
+(neverallow rs base_typeattr_236 (rawip_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
+(neverallow rs base_typeattr_236 (icmp_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
 ;;* lme
 
 (allow init rss_hwm_reset_exec (file (read getattr map execute open)))
@@ -26539,7 +26741,7 @@
 (allow runas selinuxfs (file (write lock append map open)))
 (allow runas kernel (security (check_context)))
 (allow runas self (process (setcurrent)))
-(allow runas base_typeattr_922 (process (dyntransition)))
+(allow runas base_typeattr_934 (process (dyntransition)))
 (allow runas seapp_contexts_file (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lmx 44 system/sepolicy/private/runas.te
 
@@ -26558,23 +26760,23 @@
 (dontaudit su runas_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 3 system/sepolicy/private/runas_app.te
 
-(neverallow base_typeattr_923 runas_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_935 runas_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow runas_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 3 system/sepolicy/private/runas_app.te
 
-(neverallow base_typeattr_924 base_typeattr_923 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_936 base_typeattr_935 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 3 system/sepolicy/private/runas_app.te
 
-(neverallow base_typeattr_925 runas_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_937 runas_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 3 system/sepolicy/private/runas_app.te
 
-(neverallow base_typeattr_926 runas_app (process (ptrace)))
+(neverallow base_typeattr_938 runas_app (process (ptrace)))
 ;;* lme
 
 (allow runas_app app_data_file (file (execute_no_trans)))
@@ -26596,7 +26798,7 @@
 (allow scheduler_service_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 1 system/sepolicy/private/scheduler_service_server.te
 
-(neverallow base_typeattr_927 fwk_scheduler_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_939 fwk_scheduler_hwservice (hwservice_manager (add)))
 ;;* lme
 
 (typetransition sdcardd system_data_file dir media_rw_data_file)
@@ -26643,23 +26845,23 @@
 (dontaudit su sdk_sandbox_34_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 9 system/sepolicy/private/sdk_sandbox_34.te
 
-(neverallow base_typeattr_928 sdk_sandbox_34_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_940 sdk_sandbox_34_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow sdk_sandbox_34 appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 9 system/sepolicy/private/sdk_sandbox_34.te
 
-(neverallow base_typeattr_929 base_typeattr_928 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_941 base_typeattr_940 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 9 system/sepolicy/private/sdk_sandbox_34.te
 
-(neverallow base_typeattr_930 sdk_sandbox_34 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_942 sdk_sandbox_34 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 9 system/sepolicy/private/sdk_sandbox_34.te
 
-(neverallow base_typeattr_931 sdk_sandbox_34 (process (ptrace)))
+(neverallow base_typeattr_943 sdk_sandbox_34 (process (ptrace)))
 ;;* lme
 
 (allow sdk_sandbox_all system_linker_exec (file (execute_no_trans)))
@@ -26725,12 +26927,12 @@
 
 ;;* lmx 71 system/sepolicy/private/sdk_sandbox_all.te
 
-(neverallow sdk_sandbox_all base_typeattr_932 (dir (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow sdk_sandbox_all base_typeattr_944 (dir (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 72 system/sepolicy/private/sdk_sandbox_all.te
 
-(neverallow sdk_sandbox_all base_typeattr_932 (file (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow sdk_sandbox_all base_typeattr_944 (file (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 75 system/sepolicy/private/sdk_sandbox_all.te
@@ -26755,22 +26957,22 @@
 
 ;;* lmx 90 system/sepolicy/private/sdk_sandbox_all.te
 
-(neverallow base_typeattr_933 sdk_sandbox_system_data_file (dir (relabelfrom)))
+(neverallow base_typeattr_945 sdk_sandbox_system_data_file (dir (relabelfrom)))
 ;;* lme
 
 ;;* lmx 100 system/sepolicy/private/sdk_sandbox_all.te
 
-(neverallow base_typeattr_934 sdk_sandbox_system_data_file (dir (ioctl read write create getattr setattr lock relabelto rename open watch watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_946 sdk_sandbox_system_data_file (dir (ioctl read write create getattr setattr lock relabelto rename open watch watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 110 system/sepolicy/private/sdk_sandbox_all.te
 
-(neverallow base_typeattr_933 sdk_sandbox_system_data_file (dir (relabelfrom)))
+(neverallow base_typeattr_945 sdk_sandbox_system_data_file (dir (relabelfrom)))
 ;;* lme
 
 ;;* lmx 120 system/sepolicy/private/sdk_sandbox_all.te
 
-(neverallow base_typeattr_934 sdk_sandbox_system_data_file (dir (ioctl read write create getattr setattr lock relabelto rename open watch watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_946 sdk_sandbox_system_data_file (dir (ioctl read write create getattr setattr lock relabelto rename open watch watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 123 system/sepolicy/private/sdk_sandbox_all.te
@@ -26780,17 +26982,17 @@
 
 ;;* lmx 126 system/sepolicy/private/sdk_sandbox_all.te
 
-(neverallow base_typeattr_232 sdk_sandbox_system_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_235 sdk_sandbox_system_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 144 system/sepolicy/private/sdk_sandbox_all.te
 
-(neverallow sdk_sandbox_all base_typeattr_935 (unix_stream_socket (connectto)))
+(neverallow sdk_sandbox_all base_typeattr_947 (unix_stream_socket (connectto)))
 ;;* lme
 
 ;;* lmx 149 system/sepolicy/private/sdk_sandbox_all.te
 
-(neverallow base_typeattr_936 sdk_sandbox_all (unix_stream_socket (connectto)))
+(neverallow base_typeattr_948 sdk_sandbox_all (unix_stream_socket (connectto)))
 ;;* lme
 
 (typetransition sdk_sandbox_audit tmpfs file appdomain_tmpfs)
@@ -26798,31 +27000,31 @@
 (dontaudit su sdk_sandbox_audit_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 14 system/sepolicy/private/sdk_sandbox_audit.te
 
-(neverallow base_typeattr_937 sdk_sandbox_audit_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_949 sdk_sandbox_audit_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow sdk_sandbox_audit appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 14 system/sepolicy/private/sdk_sandbox_audit.te
 
-(neverallow base_typeattr_938 base_typeattr_937 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_950 base_typeattr_949 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 14 system/sepolicy/private/sdk_sandbox_audit.te
 
-(neverallow base_typeattr_939 sdk_sandbox_audit (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_951 sdk_sandbox_audit (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 14 system/sepolicy/private/sdk_sandbox_audit.te
 
-(neverallow base_typeattr_940 sdk_sandbox_audit (process (ptrace)))
+(neverallow base_typeattr_952 sdk_sandbox_audit (process (ptrace)))
 ;;* lme
 
 (auditallow sdk_sandbox_audit ephemeral_app_api_service (service_manager (find)))
 (auditallow sdk_sandbox_audit cameraserver_service (service_manager (find)))
 (auditallow sdk_sandbox_audit mediadrmserver_service (service_manager (find)))
 (auditallow sdk_sandbox_audit radio_service (service_manager (find)))
-(auditallow sdk_sandbox_audit base_typeattr_941 (file (ioctl read write getattr lock append map open watch watch_reads)))
-(auditallow sdk_sandbox_audit base_typeattr_941 (dir (ioctl read write getattr lock open watch watch_reads add_name remove_name search)))
+(auditallow sdk_sandbox_audit base_typeattr_953 (file (ioctl read write getattr lock append map open watch watch_reads)))
+(auditallow sdk_sandbox_audit base_typeattr_953 (dir (ioctl read write getattr lock open watch watch_reads add_name remove_name search)))
 (allow sdk_sandbox_current ephemeral_app_api_service (service_manager (find)))
 (allow sdk_sandbox_current audioserver_service (service_manager (find)))
 (allow sdk_sandbox_current batteryproperties_service (service_manager (find)))
@@ -26904,23 +27106,23 @@
 (dontaudit su sdk_sandbox_next_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 11 system/sepolicy/private/sdk_sandbox_next.te
 
-(neverallow base_typeattr_942 sdk_sandbox_next_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_954 sdk_sandbox_next_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow sdk_sandbox_next appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 11 system/sepolicy/private/sdk_sandbox_next.te
 
-(neverallow base_typeattr_943 base_typeattr_942 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_955 base_typeattr_954 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 11 system/sepolicy/private/sdk_sandbox_next.te
 
-(neverallow base_typeattr_944 sdk_sandbox_next (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_956 sdk_sandbox_next (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 11 system/sepolicy/private/sdk_sandbox_next.te
 
-(neverallow base_typeattr_945 sdk_sandbox_next (process (ptrace)))
+(neverallow base_typeattr_957 sdk_sandbox_next (process (ptrace)))
 ;;* lme
 
 (allow sdk_sandbox_next audioserver_service (service_manager (find)))
@@ -27000,29 +27202,29 @@
 (dontaudit su secure_element_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 3 system/sepolicy/private/secure_element.te
 
-(neverallow base_typeattr_946 secure_element_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_958 secure_element_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow secure_element appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 3 system/sepolicy/private/secure_element.te
 
-(neverallow base_typeattr_947 base_typeattr_946 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_959 base_typeattr_958 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 3 system/sepolicy/private/secure_element.te
 
-(neverallow base_typeattr_948 secure_element (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_960 secure_element (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 3 system/sepolicy/private/secure_element.te
 
-(neverallow base_typeattr_949 secure_element (process (ptrace)))
+(neverallow base_typeattr_961 secure_element (process (ptrace)))
 ;;* lme
 
 (allow secure_element secure_element_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/secure_element.te
 
-(neverallow base_typeattr_946 secure_element_service (service_manager (add)))
+(neverallow base_typeattr_958 secure_element_service (service_manager (add)))
 ;;* lme
 
 (allow secure_element su (tcp_socket (read write accept getopt)))
@@ -27033,12 +27235,12 @@
 (allow sensor_service_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 1 system/sepolicy/private/sensor_service_server.te
 
-(neverallow base_typeattr_950 fwk_sensor_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_962 fwk_sensor_hwservice (hwservice_manager (add)))
 ;;* lme
 
-;;* lmx 79 system/sepolicy/private/service.te
+;;* lmx 84 system/sepolicy/private/service.te
 
-(neverallow domain base_typeattr_951 (service_manager (add find)))
+(neverallow domain base_typeattr_963 (service_manager (add find)))
 ;;* lme
 
 (allow init servicemanager_exec (file (read getattr map execute open)))
@@ -27064,13 +27266,13 @@
 (allow servicemanager vendor_apex_metadata_file (file (ioctl read getattr lock map open watch watch_reads)))
 (allow servicemanager vendor_apex_metadata_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow servicemanager self (binder (set_context_mgr)))
-(allow servicemanager base_typeattr_952 (binder (transfer)))
+(allow servicemanager base_typeattr_964 (binder (transfer)))
 (allow servicemanager service_contexts_file (file (ioctl read getattr lock map open watch watch_reads)))
 (allow servicemanager vendor_service_contexts_file (file (ioctl read getattr lock map open watch watch_reads)))
 (allow servicemanager service_manager_service (service_manager (add find)))
 ;;* lmx 38 system/sepolicy/private/servicemanager.te
 
-(neverallow base_typeattr_953 service_manager_service (service_manager (add)))
+(neverallow base_typeattr_965 service_manager_service (service_manager (add)))
 ;;* lme
 
 (allow servicemanager su (tcp_socket (read write accept getopt)))
@@ -27101,17 +27303,17 @@
 (allow sgdisk self (cap_userns (sys_admin)))
 ;;* lmx 37 system/sepolicy/private/sgdisk.te
 
-(neverallow base_typeattr_298 sgdisk (process (transition)))
+(neverallow base_typeattr_301 sgdisk (process (transition)))
 ;;* lme
 
 ;;* lmx 38 system/sepolicy/private/sgdisk.te
 
-(neverallow base_typeattr_233 sgdisk (process (dyntransition)))
+(neverallow base_typeattr_236 sgdisk (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 39 system/sepolicy/private/sgdisk.te
 
-(neverallow sgdisk base_typeattr_954 (file (entrypoint)))
+(neverallow sgdisk base_typeattr_966 (file (entrypoint)))
 ;;* lme
 
 (typetransition shared_relro tmpfs file appdomain_tmpfs)
@@ -27119,23 +27321,23 @@
 (dontaudit su shared_relro_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 5 system/sepolicy/private/shared_relro.te
 
-(neverallow base_typeattr_955 shared_relro_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_967 shared_relro_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow shared_relro appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 5 system/sepolicy/private/shared_relro.te
 
-(neverallow base_typeattr_956 base_typeattr_955 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_968 base_typeattr_967 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/shared_relro.te
 
-(neverallow base_typeattr_957 shared_relro (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_969 shared_relro (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 5 system/sepolicy/private/shared_relro.te
 
-(neverallow base_typeattr_958 shared_relro (process (ptrace)))
+(neverallow base_typeattr_970 shared_relro (process (ptrace)))
 ;;* lme
 
 (allow shared_relro shared_relro_file (dir (ioctl read write getattr lock open watch watch_reads add_name remove_name search)))
@@ -27159,23 +27361,23 @@
 (dontaudit su shell_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 26 system/sepolicy/private/shell.te
 
-(neverallow base_typeattr_388 shell_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_391 shell_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow shell appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 26 system/sepolicy/private/shell.te
 
-(neverallow base_typeattr_959 base_typeattr_388 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_971 base_typeattr_391 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 26 system/sepolicy/private/shell.te
 
-(neverallow base_typeattr_925 shell (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_937 shell (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 26 system/sepolicy/private/shell.te
 
-(neverallow base_typeattr_960 shell (process (ptrace)))
+(neverallow base_typeattr_972 shell (process (ptrace)))
 ;;* lme
 
 (allow shell storaged (binder (call transfer)))
@@ -27501,7 +27703,7 @@
 (allow shell boottrace_data_file (dir (ioctl read write getattr lock open watch watch_reads add_name remove_name search)))
 (allow shell boottrace_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
 (allow shell servicemanager (service_manager (list)))
-(allow shell base_typeattr_961 (service_manager (find)))
+(allow shell base_typeattr_973 (service_manager (find)))
 (allow shell dumpstate (binder (call)))
 (allow shell hwservicemanager (binder (call transfer)))
 (allow hwservicemanager shell (binder (call transfer)))
@@ -27626,43 +27828,43 @@
 
 ;;* lmx 548 system/sepolicy/private/shell.te
 
-(neverallow base_typeattr_860 perf_drop_caches_prop (property_service (set)))
+(neverallow base_typeattr_872 perf_drop_caches_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 549 system/sepolicy/private/shell.te
 
-(neverallow base_typeattr_962 perf_drop_caches_prop (file (read)))
+(neverallow base_typeattr_974 perf_drop_caches_prop (file (read)))
 ;;* lme
 
-(allow base_typeattr_963 simpleperf_exec (file (read getattr map execute open)))
-(allow base_typeattr_963 simpleperf (process (transition)))
+(allow base_typeattr_975 simpleperf_exec (file (read getattr map execute open)))
+(allow base_typeattr_975 simpleperf (process (transition)))
 (allow simpleperf simpleperf_exec (file (read getattr map execute open entrypoint)))
-(allow simpleperf base_typeattr_963 (process (sigchld)))
-(dontaudit base_typeattr_963 simpleperf (process (noatsecure)))
-(allow base_typeattr_963 simpleperf (process (siginh rlimitinh)))
-(typetransition base_typeattr_963 simpleperf_exec process simpleperf)
+(allow simpleperf base_typeattr_975 (process (sigchld)))
+(dontaudit base_typeattr_975 simpleperf (process (noatsecure)))
+(allow base_typeattr_975 simpleperf (process (siginh rlimitinh)))
+(typetransition base_typeattr_975 simpleperf_exec process simpleperf)
 (typetransition simpleperf tmpfs file appdomain_tmpfs)
 (allow simpleperf simpleperf_userfaultfd (anon_inode (ioctl read create)))
 (dontaudit su simpleperf_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 23 system/sepolicy/private/simpleperf.te
 
-(neverallow base_typeattr_964 simpleperf_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_976 simpleperf_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow simpleperf appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 23 system/sepolicy/private/simpleperf.te
 
-(neverallow base_typeattr_965 base_typeattr_964 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_977 base_typeattr_976 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 23 system/sepolicy/private/simpleperf.te
 
-(neverallow base_typeattr_925 simpleperf (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_937 simpleperf (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 23 system/sepolicy/private/simpleperf.te
 
-(neverallow base_typeattr_926 simpleperf (process (ptrace)))
+(neverallow base_typeattr_938 simpleperf (process (ptrace)))
 ;;* lme
 
 (allow simpleperf untrusted_app_all (process (ptrace)))
@@ -27873,7 +28075,7 @@
 (allow snapuserd tmpfs (dir (read watch)))
 ;;* lmx 56 system/sepolicy/private/snapuserd.te
 
-(neverallow base_typeattr_966 snapuserd_prop (property_service (set)))
+(neverallow base_typeattr_978 snapuserd_prop (property_service (set)))
 ;;* lme
 
 (allow snapuserd metadata_file (dir (search)))
@@ -27887,14 +28089,14 @@
 (allow snapuserd self (io_uring (sqpoll)))
 ;;* lmx 73 system/sepolicy/private/snapuserd.te
 
-(neverallow base_typeattr_967 snapuserd_iouring (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_979 snapuserd_iouring (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (dontaudit snapuserd self (capability (ipc_lock)))
 (dontaudit snapuserd self (cap_userns (ipc_lock)))
 ;;* lmx 84 system/sepolicy/private/snapuserd.te
 
-(neverallow base_typeattr_968 ctl_snapuserd_prop (property_service (set)))
+(neverallow base_typeattr_980 ctl_snapuserd_prop (property_service (set)))
 ;;* lme
 
 (allow shell stats_exec (file (read getattr map execute open)))
@@ -27918,7 +28120,7 @@
 (allow statsd stats_service (service_manager (add find)))
 ;;* lmx 27 system/sepolicy/private/stats.te
 
-(neverallow base_typeattr_969 stats_service (service_manager (add)))
+(neverallow base_typeattr_981 stats_service (service_manager (add)))
 ;;* lme
 
 (allow statsd su (tcp_socket (read write accept getopt)))
@@ -27931,13 +28133,13 @@
 (allow stats_service_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 1 system/sepolicy/private/stats_service_server.te
 
-(neverallow base_typeattr_970 fwk_stats_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_982 fwk_stats_hwservice (hwservice_manager (add)))
 ;;* lme
 
 (allow stats_service_server fwk_stats_service (service_manager (add find)))
 ;;* lmx 2 system/sepolicy/private/stats_service_server.te
 
-(neverallow base_typeattr_970 fwk_stats_service (service_manager (add)))
+(neverallow base_typeattr_982 fwk_stats_service (service_manager (add)))
 ;;* lme
 
 (allow stats_service_server su (tcp_socket (read write accept getopt)))
@@ -27977,7 +28179,7 @@
 (allow statsd self (io_uring (sqpoll)))
 ;;* lmx 46 system/sepolicy/private/statsd.te
 
-(neverallow base_typeattr_969 statsd_iouring (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_981 statsd_iouring (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (dontaudit statsd self (capability (ipc_lock)))
@@ -28047,22 +28249,22 @@
 (allow statsd statsd (unix_dgram_socket (sendto)))
 ;;* lmx 140 system/sepolicy/private/statsd.te
 
-(neverallow base_typeattr_971 stats_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_983 stats_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 141 system/sepolicy/private/statsd.te
 
-(neverallow base_typeattr_972 stats_config_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_984 stats_config_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 145 system/sepolicy/private/statsd.te
 
-(neverallow base_typeattr_971 stats_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_983 stats_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 146 system/sepolicy/private/statsd.te
 
-(neverallow base_typeattr_972 stats_config_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_984 stats_config_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 (allow init storaged_exec (file (read getattr map execute open)))
@@ -28090,7 +28292,7 @@
 (allow storaged storaged_service (service_manager (add find)))
 ;;* lmx 45 system/sepolicy/private/storaged.te
 
-(neverallow base_typeattr_973 storaged_service (service_manager (add)))
+(neverallow base_typeattr_985 storaged_service (service_manager (add)))
 ;;* lme
 
 (allow storaged su (tcp_socket (read write accept getopt)))
@@ -28184,23 +28386,23 @@
 (dontaudit su su_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 1 system/sepolicy/private/su.te
 
-(neverallow base_typeattr_296 su_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_299 su_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow su appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 1 system/sepolicy/private/su.te
 
-(neverallow base_typeattr_974 base_typeattr_296 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_986 base_typeattr_299 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1 system/sepolicy/private/su.te
 
-(neverallow base_typeattr_975 su (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_987 su (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 1 system/sepolicy/private/su.te
 
-(neverallow base_typeattr_976 su (process (ptrace)))
+(neverallow base_typeattr_988 su (process (ptrace)))
 ;;* lme
 
 (dontaudit su keystore2_key_type (keystore2 (add_auth change_password change_user clear_ns clear_uid delete_all_keys early_boot_ended get_attestation_key get_auth_token get_last_auth_time get_state list lock pull_metrics report_off_body reset unlock)))
@@ -28477,7 +28679,7 @@
 (allow surfaceflinger traced (unix_stream_socket (connectto)))
 (allow traced surfaceflinger (fd (use)))
 (allow surfaceflinger adbd (unix_stream_socket (read write getattr)))
-(allow surfaceflinger base_typeattr_251 (unix_stream_socket (read write)))
+(allow surfaceflinger base_typeattr_254 (unix_stream_socket (read write)))
 (allow surfaceflinger bootanim (unix_stream_socket (read write)))
 (allow surfaceflinger automotive_display_service (unix_stream_socket (read write)))
 (allow surfaceflinger dumpstate (binder (call transfer)))
@@ -28519,7 +28721,7 @@
 (allow surfaceflinger pdx_display_client_channel_socket_type (unix_stream_socket (ioctl read write create getattr setattr lock append map bind connect listen accept getopt setopt shutdown)))
 ;;* lmx 130 system/sepolicy/private/surfaceflinger.te
 
-(neverallow base_typeattr_977 pdx_display_client_endpoint_socket_type (unix_stream_socket (listen accept)))
+(neverallow base_typeattr_989 pdx_display_client_endpoint_socket_type (unix_stream_socket (listen accept)))
 ;;* lme
 
 (allow init pdx_display_manager_endpoint_socket_type (unix_stream_socket (create bind)))
@@ -28528,7 +28730,7 @@
 (allow surfaceflinger pdx_display_manager_channel_socket_type (unix_stream_socket (ioctl read write create getattr setattr lock append map bind connect listen accept getopt setopt shutdown)))
 ;;* lmx 131 system/sepolicy/private/surfaceflinger.te
 
-(neverallow base_typeattr_977 pdx_display_manager_endpoint_socket_type (unix_stream_socket (listen accept)))
+(neverallow base_typeattr_989 pdx_display_manager_endpoint_socket_type (unix_stream_socket (listen accept)))
 ;;* lme
 
 (allow init pdx_display_screenshot_endpoint_socket_type (unix_stream_socket (create bind)))
@@ -28537,7 +28739,7 @@
 (allow surfaceflinger pdx_display_screenshot_channel_socket_type (unix_stream_socket (ioctl read write create getattr setattr lock append map bind connect listen accept getopt setopt shutdown)))
 ;;* lmx 132 system/sepolicy/private/surfaceflinger.te
 
-(neverallow base_typeattr_977 pdx_display_screenshot_endpoint_socket_type (unix_stream_socket (listen accept)))
+(neverallow base_typeattr_989 pdx_display_screenshot_endpoint_socket_type (unix_stream_socket (listen accept)))
 ;;* lme
 
 (allow init pdx_display_vsync_endpoint_socket_type (unix_stream_socket (create bind)))
@@ -28546,7 +28748,7 @@
 (allow surfaceflinger pdx_display_vsync_channel_socket_type (unix_stream_socket (ioctl read write create getattr setattr lock append map bind connect listen accept getopt setopt shutdown)))
 ;;* lmx 133 system/sepolicy/private/surfaceflinger.te
 
-(neverallow base_typeattr_977 pdx_display_vsync_endpoint_socket_type (unix_stream_socket (listen accept)))
+(neverallow base_typeattr_989 pdx_display_vsync_endpoint_socket_type (unix_stream_socket (listen accept)))
 ;;* lme
 
 (allow surfaceflinger pdx_bufferhub_client_endpoint_dir_type (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -28582,23 +28784,23 @@
 (dontaudit su system_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 9 system/sepolicy/private/system_app.te
 
-(neverallow base_typeattr_978 system_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_990 system_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow system_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 9 system/sepolicy/private/system_app.te
 
-(neverallow base_typeattr_979 base_typeattr_978 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_991 base_typeattr_990 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 9 system/sepolicy/private/system_app.te
 
-(neverallow base_typeattr_980 system_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_992 system_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 9 system/sepolicy/private/system_app.te
 
-(neverallow base_typeattr_981 system_app (process (ptrace)))
+(neverallow base_typeattr_993 system_app (process (ptrace)))
 ;;* lme
 
 (allow system_app rootfs (dir (getattr)))
@@ -28725,7 +28927,7 @@
 (allow update_engine system_app (binder (transfer)))
 (allow system_app update_engine (fd (use)))
 (allow system_app servicemanager (service_manager (list)))
-(allow system_app base_typeattr_982 (service_manager (find)))
+(allow system_app base_typeattr_994 (service_manager (find)))
 (dontaudit system_app dnsresolver_service (service_manager (find)))
 (dontaudit system_app dumpstate_service (service_manager (find)))
 (dontaudit system_app installd_service (service_manager (find)))
@@ -28769,12 +28971,12 @@
 
 ;;* lmx 199 system/sepolicy/private/system_app.te
 
-(neverallow base_typeattr_983 adaptive_haptics_prop (property_service (set)))
+(neverallow base_typeattr_995 adaptive_haptics_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 201 system/sepolicy/private/system_app.te
 
-(neverallow base_typeattr_983 drm_forcel3_prop (property_service (set)))
+(neverallow base_typeattr_995 drm_forcel3_prop (property_service (set)))
 ;;* lme
 
 (allow system_app vendor_boot_ota_file (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -28787,7 +28989,7 @@
 (dontaudit su system_server_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 17 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_432 system_server_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_435 system_server_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow system_server zygote_tmpfs (file (read map)))
@@ -28872,6 +29074,7 @@
 (allow system_server odsign_metrics_file (file (ioctl read getattr lock map unlink open watch watch_reads)))
 (allow system_server sysfs_ion (file (ioctl read getattr lock map open watch watch_reads)))
 (allow system_server sysfs_dma_heap (file (ioctl read getattr lock map open watch watch_reads)))
+(allow system_server sysfs_cma (file (ioctl read getattr lock map open watch watch_reads)))
 (allow system_server sysfs_dmabuf_stats (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow system_server sysfs_dmabuf_stats (file (ioctl read getattr lock map open watch watch_reads)))
 (allow system_server dmabuf_heap_device (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -29610,9 +29813,9 @@
 (allow system_server sysfs_zram (file (ioctl read write getattr lock append map open watch watch_reads)))
 (allow system_server kernel (security (read_policy)))
 (allow system_server system_server_service (service_manager (add find)))
-;;* lmx 985 system/sepolicy/private/system_server.te
+;;* lmx 990 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_432 system_server_service (service_manager (add)))
+(neverallow base_typeattr_435 system_server_service (service_manager (add)))
 ;;* lme
 
 (allow system_server su (tcp_socket (read write accept getopt)))
@@ -29662,9 +29865,9 @@
 (allow system_server profcollectd_service (service_manager (find)))
 (allow system_server wifi_mainline_supplicant_service (service_manager (find)))
 (allow system_server batteryproperties_service (service_manager (add find)))
-;;* lmx 1036 system/sepolicy/private/system_server.te
+;;* lmx 1041 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_432 batteryproperties_service (service_manager (add)))
+(neverallow base_typeattr_435 batteryproperties_service (service_manager (add)))
 ;;* lme
 
 (allow system_server su (tcp_socket (read write accept getopt)))
@@ -29835,116 +30038,116 @@
 (allow system_server init (unix_stream_socket (connectto)))
 (allow system_server power_debug_prop (property_service (set)))
 (allow system_server power_debug_prop (file (read getattr map open)))
-;;* lmx 1336 system/sepolicy/private/system_server.te
+;;* lmx 1341 system/sepolicy/private/system_server.te
 
 (neverallow system_server sdcard_type (dir (read write open)))
 (neverallow system_server fuse (dir (read write open)))
 ;;* lme
 
-;;* lmx 1337 system/sepolicy/private/system_server.te
+;;* lmx 1342 system/sepolicy/private/system_server.te
 
 (neverallow system_server sdcard_type (file (ioctl read write getattr lock append map open watch watch_reads)))
 (neverallow system_server fuse (file (ioctl read write getattr lock append map open watch watch_reads)))
 ;;* lme
 
-;;* lmx 1347 system/sepolicy/private/system_server.te
+;;* lmx 1352 system/sepolicy/private/system_server.te
 
-(neverallow system_server base_typeattr_984 (file (create unlink link open)))
-;;* lme
-
-;;* lmx 1358 system/sepolicy/private/system_server.te
-
-(neverallow system_server base_typeattr_985 (file (execute_no_trans)))
+(neverallow system_server base_typeattr_996 (file (create unlink link open)))
 ;;* lme
 
 ;;* lmx 1363 system/sepolicy/private/system_server.te
 
-(neverallow system_server base_typeattr_986 (process (transition)))
+(neverallow system_server base_typeattr_997 (file (execute_no_trans)))
 ;;* lme
 
-;;* lmx 1364 system/sepolicy/private/system_server.te
+;;* lmx 1368 system/sepolicy/private/system_server.te
 
-(neverallow system_server base_typeattr_233 (process (dyntransition)))
+(neverallow system_server base_typeattr_998 (process (transition)))
 ;;* lme
 
-;;* lmx 1367 system/sepolicy/private/system_server.te
+;;* lmx 1369 system/sepolicy/private/system_server.te
+
+(neverallow system_server base_typeattr_236 (process (dyntransition)))
+;;* lme
+
+;;* lmx 1372 system/sepolicy/private/system_server.te
 
 (neverallow system_server perfetto_traces_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
 ;;* lme
 
-;;* lmx 1370 system/sepolicy/private/system_server.te
+;;* lmx 1375 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_987 system_ndebug_socket (sock_file (write open)))
+(neverallow base_typeattr_999 system_ndebug_socket (sock_file (write open)))
 ;;* lme
 
-;;* lmx 1380 system/sepolicy/private/system_server.te
+;;* lmx 1385 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_988 system_unsolzygote_socket (sock_file (write open)))
+(neverallow base_typeattr_1000 system_unsolzygote_socket (sock_file (write open)))
 ;;* lme
 
-;;* lmx 1411 system/sepolicy/private/system_server.te
+;;* lmx 1416 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_989 device_config_activity_manager_native_boot_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_input_native_boot_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_netd_native_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_aconfig_flags_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_edgetpu_native_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_media_native_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_nnapi_native_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_runtime_native_boot_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_runtime_native_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_surface_flinger_native_boot_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_core_experiments_team_internal_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_lmkd_native_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_mglru_native_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_mmd_native_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_remote_key_provisioning_native_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_storage_native_boot_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_sys_traced_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_window_manager_native_boot_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_connectivity_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_swcodec_native_prop (property_service (set)))
-(neverallow base_typeattr_989 device_config_tethering_u_or_later_native_prop (property_service (set)))
-(neverallow base_typeattr_989 next_boot_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_activity_manager_native_boot_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_input_native_boot_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_netd_native_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_aconfig_flags_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_edgetpu_native_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_media_native_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_nnapi_native_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_runtime_native_boot_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_runtime_native_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_surface_flinger_native_boot_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_core_experiments_team_internal_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_lmkd_native_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_mglru_native_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_mmd_native_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_remote_key_provisioning_native_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_storage_native_boot_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_sys_traced_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_window_manager_native_boot_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_connectivity_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_swcodec_native_prop (property_service (set)))
+(neverallow base_typeattr_1001 device_config_tethering_u_or_later_native_prop (property_service (set)))
+(neverallow base_typeattr_1001 next_boot_prop (property_service (set)))
 ;;* lme
 
-;;* lmx 1418 system/sepolicy/private/system_server.te
+;;* lmx 1423 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_435 tuner_server_ctl_prop (property_service (set)))
-;;* lme
-
-;;* lmx 1424 system/sepolicy/private/system_server.te
-
-(neverallow system_server dex2oat_exec (file (execute execute_no_trans)))
+(neverallow base_typeattr_438 tuner_server_ctl_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 1429 system/sepolicy/private/system_server.te
 
+(neverallow system_server dex2oat_exec (file (execute execute_no_trans)))
+;;* lme
+
+;;* lmx 1434 system/sepolicy/private/system_server.te
+
 (neverallow system_server data_file_type (file (execute execute_no_trans)))
 ;;* lme
 
-;;* lmx 1436 system/sepolicy/private/system_server.te
+;;* lmx 1441 system/sepolicy/private/system_server.te
 
-(neverallow system_server base_typeattr_990 (blk_file (write create setattr relabelfrom append unlink link rename)))
+(neverallow system_server base_typeattr_1002 (blk_file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
-;;* lmx 1437 system/sepolicy/private/system_server.te
+;;* lmx 1442 system/sepolicy/private/system_server.te
 
-(neverallow system_server base_typeattr_991 (blk_file (ioctl read getattr lock map open watch watch_reads)))
+(neverallow system_server base_typeattr_1003 (blk_file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lme
 
-;;* lmx 1445 system/sepolicy/private/system_server.te
+;;* lmx 1450 system/sepolicy/private/system_server.te
 
 (neverallow system_server self (process (execmem)))
 ;;* lme
 
-;;* lmx 1448 system/sepolicy/private/system_server.te
+;;* lmx 1453 system/sepolicy/private/system_server.te
 
 (neverallow system_server ashmem_device (chr_file (execute)))
 (neverallow system_server ashmem_libcutils_device (chr_file (execute)))
 ;;* lme
 
-;;* lmx 1451 system/sepolicy/private/system_server.te
+;;* lmx 1456 system/sepolicy/private/system_server.te
 
 (neverallow system_server system_server_tmpfs (file (execute)))
 ;;* lme
@@ -30026,96 +30229,96 @@
 (allow system_server init (unix_stream_socket (connectto)))
 (allow system_server userspace_reboot_log_prop (property_service (set)))
 (allow system_server userspace_reboot_log_prop (file (read getattr map open)))
-;;* lmx 1567 system/sepolicy/private/system_server.te
+;;* lmx 1572 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_377 system_jvmti_agent_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_380 system_jvmti_agent_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow system_server proc_pressure_mem (file (ioctl read write getattr lock append map open watch watch_reads)))
 (allow system_server proc_pressure_cpu (file (ioctl read getattr lock map open watch watch_reads)))
 (allow system_server proc_pressure_io (file (ioctl read getattr lock map open watch watch_reads)))
-;;* lmx 1575 system/sepolicy/private/system_server.te
+;;* lmx 1580 system/sepolicy/private/system_server.te
 
-(neverallow system_server base_typeattr_432 (process (ptrace)))
+(neverallow system_server base_typeattr_435 (process (ptrace)))
 ;;* lme
 
-;;* lmx 1579 system/sepolicy/private/system_server.te
+;;* lmx 1584 system/sepolicy/private/system_server.te
 
 (neverallow system_server system_server (capability (sys_resource)))
 (neverallow system_server system_server (cap_userns (sys_resource)))
 ;;* lme
 
-;;* lmx 1582 system/sepolicy/private/system_server.te
-
-(neverallow base_typeattr_435 password_slot_metadata_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
-;;* lme
-
 ;;* lmx 1587 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_435 password_slot_metadata_file (file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_435 password_slot_metadata_file (lnk_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_435 password_slot_metadata_file (sock_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_435 password_slot_metadata_file (fifo_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_438 password_slot_metadata_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
-;;* lmx 1588 system/sepolicy/private/system_server.te
+;;* lmx 1592 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_435 password_slot_metadata_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_435 password_slot_metadata_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_435 password_slot_metadata_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_435 password_slot_metadata_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_438 password_slot_metadata_file (file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_438 password_slot_metadata_file (lnk_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_438 password_slot_metadata_file (sock_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_438 password_slot_metadata_file (fifo_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+;;* lme
+
+;;* lmx 1593 system/sepolicy/private/system_server.te
+
+(neverallow base_typeattr_438 password_slot_metadata_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_438 password_slot_metadata_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_438 password_slot_metadata_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_438 password_slot_metadata_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow system_server property_socket (sock_file (write)))
 (allow system_server init (unix_stream_socket (connectto)))
 (allow system_server binder_cache_system_server_prop (property_service (set)))
 (allow system_server binder_cache_system_server_prop (file (read getattr map open)))
-;;* lmx 1593 system/sepolicy/private/system_server.te
+;;* lmx 1598 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_435 binder_cache_system_server_prop (property_service (set)))
+(neverallow base_typeattr_438 binder_cache_system_server_prop (property_service (set)))
 ;;* lme
 
 (allow system_server self (perf_event (open cpu kernel write)))
-;;* lmx 1598 system/sepolicy/private/system_server.te
+;;* lmx 1603 system/sepolicy/private/system_server.te
 
 (neverallow system_server self (perf_event (tracepoint read)))
 ;;* lme
 
 (allow system_server shutdown_checkpoints_system_data_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
 (allow system_server shutdown_checkpoints_system_data_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
-;;* lmx 1605 system/sepolicy/private/system_server.te
+;;* lmx 1610 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_435 socket_hook_prop (property_service (set)))
+(neverallow base_typeattr_438 socket_hook_prop (property_service (set)))
 ;;* lme
 
-;;* lmx 1607 system/sepolicy/private/system_server.te
+;;* lmx 1612 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_435 boot_status_prop (property_service (set)))
+(neverallow base_typeattr_438 boot_status_prop (property_service (set)))
 ;;* lme
 
-;;* lmx 1615 system/sepolicy/private/system_server.te
+;;* lmx 1620 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_377 wifi_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_380 wifi_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
-;;* lmx 1624 system/sepolicy/private/system_server.te
+;;* lmx 1629 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_992 sysfs_uhid (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_1004 sysfs_uhid (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
-;;* lmx 1630 system/sepolicy/private/system_server.te
+;;* lmx 1635 system/sepolicy/private/system_server.te
 
-(neverallowx base_typeattr_432 binder_device (ioctl chr_file ((range 0x620e 0x620f))))
+(neverallowx base_typeattr_435 binder_device (ioctl chr_file ((range 0x620e 0x620f))))
 ;;* lme
 
-;;* lmx 1633 system/sepolicy/private/system_server.te
+;;* lmx 1638 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_435 font_data_file (file (write create setattr relabelfrom append unlink link rename)))
+(neverallow base_typeattr_438 font_data_file (file (write create setattr relabelfrom append unlink link rename)))
 ;;* lme
 
-;;* lmx 1634 system/sepolicy/private/system_server.te
+;;* lmx 1639 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_435 font_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_438 font_data_file (dir (write create setattr relabelfrom link rename add_name remove_name reparent rmdir)))
 ;;* lme
 
 (allow system_server system_font_fallback_file (file (ioctl read getattr lock map open watch watch_reads)))
@@ -30134,15 +30337,15 @@
 (allow system_server init (unix_stream_socket (connectto)))
 (allow system_server hint_manager_config_prop (property_service (set)))
 (allow system_server hint_manager_config_prop (file (read getattr map open)))
-;;* lmx 1662 system/sepolicy/private/system_server.te
+;;* lmx 1667 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_993 hint_manager_config_prop (property_service (set)))
+(neverallow base_typeattr_1005 hint_manager_config_prop (property_service (set)))
 ;;* lme
 
 (allow system_server threadnetwork_config_prop (file (read getattr map open)))
-;;* lmx 1674 system/sepolicy/private/system_server.te
+;;* lmx 1679 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_377 threadnetwork_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_380 threadnetwork_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow system_server pre_reboot_dexopt_file (dir (getattr search)))
@@ -30153,24 +30356,24 @@
 (allow system_server derive_classpath (process (sigkill)))
 (allow system_server dex2oat (process (sigkill)))
 (allow system_server odrefresh (process (sigkill)))
-;;* lmx 1700 system/sepolicy/private/system_server.te
+;;* lmx 1705 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_435 crashrecovery_prop (property_service (set)))
+(neverallow base_typeattr_438 crashrecovery_prop (property_service (set)))
 ;;* lme
 
-;;* lmx 1701 system/sepolicy/private/system_server.te
+;;* lmx 1706 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_462 crashrecovery_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_465 crashrecovery_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
-;;* lmx 1704 system/sepolicy/private/system_server.te
+;;* lmx 1709 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_435 tradeinmode_metadata_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_438 tradeinmode_metadata_file (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
-;;* lmx 1712 system/sepolicy/private/system_server.te
+;;* lmx 1717 system/sepolicy/private/system_server.te
 
-(neverallow base_typeattr_993 power_debug_prop (property_service (set)))
+(neverallow base_typeattr_1005 power_debug_prop (property_service (set)))
 ;;* lme
 
 (typetransition system_server_startup tmpfs file system_server_startup_tmpfs)
@@ -30195,14 +30398,14 @@
 (allow system_suspend system_suspend_control_service (service_manager (add find)))
 ;;* lmx 8 system/sepolicy/private/system_suspend.te
 
-(neverallow base_typeattr_994 system_suspend_control_service (service_manager (add)))
+(neverallow base_typeattr_1006 system_suspend_control_service (service_manager (add)))
 ;;* lme
 
 (allow system_suspend su (tcp_socket (read write accept getopt)))
 (allow system_suspend hal_system_suspend_service (service_manager (add find)))
 ;;* lmx 10 system/sepolicy/private/system_suspend.te
 
-(neverallow base_typeattr_994 hal_system_suspend_service (service_manager (add)))
+(neverallow base_typeattr_1006 hal_system_suspend_service (service_manager (add)))
 ;;* lme
 
 (allow system_suspend su (tcp_socket (read write accept getopt)))
@@ -30231,19 +30434,19 @@
 (allow init sysfs_sync_on_suspend (file (write lock append map open)))
 ;;* lmx 56 system/sepolicy/private/system_suspend.te
 
-(neverallow base_typeattr_995 system_suspend_control_service (service_manager (find)))
+(neverallow base_typeattr_1007 system_suspend_control_service (service_manager (find)))
 ;;* lme
 
 (allow system_suspend_internal_server system_suspend_control_internal_service (service_manager (add find)))
 ;;* lmx 2 system/sepolicy/private/system_suspend_internal_server.te
 
-(neverallow base_typeattr_996 system_suspend_control_internal_service (service_manager (add)))
+(neverallow base_typeattr_1008 system_suspend_control_internal_service (service_manager (add)))
 ;;* lme
 
 (allow system_suspend_internal_server su (tcp_socket (read write accept getopt)))
-;;* lmx 11 system/sepolicy/private/system_suspend_internal_server.te
+;;* lmx 12 system/sepolicy/private/system_suspend_internal_server.te
 
-(neverallow base_typeattr_997 system_suspend_control_internal_service (service_manager (find)))
+(neverallow base_typeattr_1009 system_suspend_control_internal_service (service_manager (find)))
 ;;* lme
 
 (allow system_suspend_server hwservicemanager (binder (call transfer)))
@@ -30253,7 +30456,7 @@
 (allow system_suspend_server hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 6 system/sepolicy/private/system_suspend_server.te
 
-(neverallow base_typeattr_998 system_suspend_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_1010 system_suspend_hwservice (hwservice_manager (add)))
 ;;* lme
 
 (allow tee fingerprint_vendor_data_file (dir (ioctl read write getattr lock open watch watch_reads add_name remove_name search)))
@@ -30275,7 +30478,7 @@
 (allow tombstoned anr_data_file (file (create getattr append unlink link open)))
 ;;* lmx 31 system/sepolicy/private/tombstoned.te
 
-(neverallow base_typeattr_999 tombstone_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1011 tombstone_config_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow init toolbox_exec (file (read getattr map execute open)))
@@ -30298,17 +30501,17 @@
 (allowx toolbox media_userdir_file (ioctl dir ((range 0x6601 0x6602))))
 ;;* lmx 42 system/sepolicy/private/toolbox.te
 
-(neverallow base_typeattr_232 toolbox (process (transition)))
+(neverallow base_typeattr_235 toolbox (process (transition)))
 ;;* lme
 
 ;;* lmx 43 system/sepolicy/private/toolbox.te
 
-(neverallow base_typeattr_233 toolbox (process (dyntransition)))
+(neverallow base_typeattr_236 toolbox (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 44 system/sepolicy/private/toolbox.te
 
-(neverallow toolbox base_typeattr_1000 (file (entrypoint)))
+(neverallow toolbox base_typeattr_1012 (file (entrypoint)))
 ;;* lme
 
 (allow trace_redactor system_server (fd (use)))
@@ -30382,7 +30585,7 @@
 
 ;;* lmx 107 system/sepolicy/private/traced.te
 
-(neverallow traced base_typeattr_1001 (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow traced base_typeattr_1013 (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 108 system/sepolicy/private/traced.te
@@ -30392,22 +30595,22 @@
 
 ;;* lmx 114 system/sepolicy/private/traced.te
 
-(neverallow traced base_typeattr_1002 (file (ioctl read create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow traced base_typeattr_1014 (file (ioctl read create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
 ;;* lme
 
 ;;* lmx 117 system/sepolicy/private/traced.te
 
-(neverallow base_typeattr_232 traced (process (transition)))
+(neverallow base_typeattr_235 traced (process (transition)))
 ;;* lme
 
 ;;* lmx 118 system/sepolicy/private/traced.te
 
-(neverallow base_typeattr_233 traced (process (dyntransition)))
+(neverallow base_typeattr_236 traced (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 130 system/sepolicy/private/traced.te
 
-(neverallow base_typeattr_1003 tracingproxy_service (service_manager (find)))
+(neverallow base_typeattr_1015 tracingproxy_service (service_manager (find)))
 ;;* lme
 
 (allow init traced_perf_exec (file (read getattr map execute open)))
@@ -30572,45 +30775,47 @@
 (allow statsd traced_probes (binder (transfer)))
 (allow traced_probes statsd (fd (use)))
 (allow traced_probes stats_service (service_manager (find)))
+(allow traced_probes system_suspend_control_internal_service (service_manager (find)))
+(allow traced_probes system_suspend (binder (call)))
 (allow traced_probes debug_tracing_desktop_mode_visible_tasks_prop (file (read getattr map open)))
-;;* lmx 128 system/sepolicy/private/traced_probes.te
+;;* lmx 132 system/sepolicy/private/traced_probes.te
 
 (neverallow traced_probes self (process (execmem)))
 ;;* lme
 
-;;* lmx 131 system/sepolicy/private/traced_probes.te
+;;* lmx 135 system/sepolicy/private/traced_probes.te
 
 (neverallow traced_probes dev_type (blk_file (read write)))
 ;;* lme
 
-;;* lmx 134 system/sepolicy/private/traced_probes.te
+;;* lmx 138 system/sepolicy/private/traced_probes.te
 
 (neverallow traced_probes domain (process (ptrace)))
 ;;* lme
 
-;;* lmx 159 system/sepolicy/private/traced_probes.te
+;;* lmx 163 system/sepolicy/private/traced_probes.te
 
-(neverallow traced_probes base_typeattr_1004 (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow traced_probes base_typeattr_1016 (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
-;;* lmx 160 system/sepolicy/private/traced_probes.te
+;;* lmx 164 system/sepolicy/private/traced_probes.te
 
 (neverallow traced_probes system_data_file (dir (ioctl write create setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
 ;;* lme
 
-;;* lmx 166 system/sepolicy/private/traced_probes.te
-
-(neverallow traced_probes base_typeattr_1005 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-;;* lme
-
-;;* lmx 169 system/sepolicy/private/traced_probes.te
-
-(neverallow base_typeattr_232 traced_probes (process (transition)))
-;;* lme
-
 ;;* lmx 170 system/sepolicy/private/traced_probes.te
 
-(neverallow base_typeattr_233 traced_probes (process (dyntransition)))
+(neverallow traced_probes base_typeattr_1017 (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+;;* lme
+
+;;* lmx 173 system/sepolicy/private/traced_probes.te
+
+(neverallow base_typeattr_235 traced_probes (process (transition)))
+;;* lme
+
+;;* lmx 174 system/sepolicy/private/traced_probes.te
+
+(neverallow base_typeattr_236 traced_probes (process (dyntransition)))
 ;;* lme
 
 (typetransition traceur_app tmpfs file appdomain_tmpfs)
@@ -30618,23 +30823,23 @@
 (dontaudit su traceur_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 3 system/sepolicy/private/traceur_app.te
 
-(neverallow base_typeattr_1006 traceur_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1018 traceur_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow traceur_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 3 system/sepolicy/private/traceur_app.te
 
-(neverallow base_typeattr_1007 base_typeattr_1006 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1019 base_typeattr_1018 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 3 system/sepolicy/private/traceur_app.te
 
-(neverallow base_typeattr_1008 traceur_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1020 traceur_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 3 system/sepolicy/private/traceur_app.te
 
-(neverallow base_typeattr_1009 traceur_app (process (ptrace)))
+(neverallow base_typeattr_1021 traceur_app (process (ptrace)))
 ;;* lme
 
 (allow traceur_app debugfs_tracing (file (ioctl read write getattr lock append map open watch watch_reads)))
@@ -30655,7 +30860,7 @@
 (allow traceur_app debug_prop (file (read getattr map open)))
 (allow traceur_app servicemanager (service_manager (list)))
 (allow traceur_app hwservicemanager (hwservice_manager (list)))
-(allow traceur_app base_typeattr_1010 (service_manager (find)))
+(allow traceur_app base_typeattr_1022 (service_manager (find)))
 (dontaudit traceur_app service_manager_type (service_manager (find)))
 (dontaudit traceur_app hwservice_manager_type (hwservice_manager (find)))
 (dontaudit traceur_app domain (binder (call)))
@@ -30716,9 +30921,9 @@
 (allow ueventd selinuxfs (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow ueventd selinuxfs (file (ioctl read getattr lock map open watch watch_reads)))
 (allow ueventd selinuxfs (lnk_file (ioctl read getattr lock map open watch watch_reads)))
-(allow ueventd base_typeattr_1011 (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow ueventd base_typeattr_1011 (file (ioctl read getattr lock map open watch watch_reads)))
-(allow ueventd base_typeattr_1011 (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow ueventd base_typeattr_1023 (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow ueventd base_typeattr_1023 (file (ioctl read getattr lock map open watch watch_reads)))
+(allow ueventd base_typeattr_1023 (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow ueventd apex_mnt_dir (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow ueventd file_contexts_file (file (ioctl read getattr lock map open watch watch_reads)))
 (allow ueventd self (process (setfscreate)))
@@ -30747,7 +30952,7 @@
 
 ;;* lmx 89 system/sepolicy/private/ueventd.te
 
-(neverallow base_typeattr_233 ueventd (process (ptrace)))
+(neverallow base_typeattr_236 ueventd (process (ptrace)))
 ;;* lme
 
 ;;* lmx 92 system/sepolicy/private/ueventd.te
@@ -30801,23 +31006,23 @@
 (dontaudit su untrusted_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 13 system/sepolicy/private/untrusted_app.te
 
-(neverallow base_typeattr_1012 untrusted_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1024 untrusted_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow untrusted_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 13 system/sepolicy/private/untrusted_app.te
 
-(neverallow base_typeattr_1013 base_typeattr_1012 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1025 base_typeattr_1024 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/private/untrusted_app.te
 
-(neverallow base_typeattr_1014 untrusted_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1026 untrusted_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/private/untrusted_app.te
 
-(neverallow base_typeattr_1015 untrusted_app (process (ptrace)))
+(neverallow base_typeattr_1027 untrusted_app (process (ptrace)))
 ;;* lme
 
 (allow untrusted_app sdk_sandbox_data_file (fd (use)))
@@ -30832,23 +31037,23 @@
 (dontaudit su untrusted_app_25_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 13 system/sepolicy/private/untrusted_app_25.te
 
-(neverallow base_typeattr_1016 untrusted_app_25_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1028 untrusted_app_25_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow untrusted_app_25 appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 13 system/sepolicy/private/untrusted_app_25.te
 
-(neverallow base_typeattr_1017 base_typeattr_1016 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1029 base_typeattr_1028 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/private/untrusted_app_25.te
 
-(neverallow base_typeattr_1018 untrusted_app_25 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1030 untrusted_app_25 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/private/untrusted_app_25.te
 
-(neverallow base_typeattr_1019 untrusted_app_25 (process (ptrace)))
+(neverallow base_typeattr_1031 untrusted_app_25 (process (ptrace)))
 ;;* lme
 
 (allow untrusted_app_25 proc_misc (file (ioctl read getattr lock map open watch watch_reads)))
@@ -30878,23 +31083,23 @@
 (dontaudit su untrusted_app_27_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 13 system/sepolicy/private/untrusted_app_27.te
 
-(neverallow base_typeattr_1020 untrusted_app_27_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1032 untrusted_app_27_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow untrusted_app_27 appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 13 system/sepolicy/private/untrusted_app_27.te
 
-(neverallow base_typeattr_1021 base_typeattr_1020 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1033 base_typeattr_1032 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/private/untrusted_app_27.te
 
-(neverallow base_typeattr_1022 untrusted_app_27 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1034 untrusted_app_27 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/private/untrusted_app_27.te
 
-(neverallow base_typeattr_1023 untrusted_app_27 (process (ptrace)))
+(neverallow base_typeattr_1035 untrusted_app_27 (process (ptrace)))
 ;;* lme
 
 (allow untrusted_app_27 apk_data_file (file (execmod)))
@@ -30922,23 +31127,23 @@
 (dontaudit su untrusted_app_29_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 13 system/sepolicy/private/untrusted_app_29.te
 
-(neverallow base_typeattr_1024 untrusted_app_29_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1036 untrusted_app_29_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow untrusted_app_29 appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 13 system/sepolicy/private/untrusted_app_29.te
 
-(neverallow base_typeattr_1025 base_typeattr_1024 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1037 base_typeattr_1036 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/private/untrusted_app_29.te
 
-(neverallow base_typeattr_1026 untrusted_app_29 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1038 untrusted_app_29 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/private/untrusted_app_29.te
 
-(neverallow base_typeattr_1027 untrusted_app_29 (process (ptrace)))
+(neverallow base_typeattr_1039 untrusted_app_29 (process (ptrace)))
 ;;* lme
 
 (allow untrusted_app_29 self (netlink_route_socket (nlmsg_getneigh)))
@@ -30956,23 +31161,23 @@
 (dontaudit su untrusted_app_30_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 15 system/sepolicy/private/untrusted_app_30.te
 
-(neverallow base_typeattr_1028 untrusted_app_30_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1040 untrusted_app_30_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow untrusted_app_30 appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 15 system/sepolicy/private/untrusted_app_30.te
 
-(neverallow base_typeattr_1029 base_typeattr_1028 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1041 base_typeattr_1040 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/private/untrusted_app_30.te
 
-(neverallow base_typeattr_1030 untrusted_app_30 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1042 untrusted_app_30 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 15 system/sepolicy/private/untrusted_app_30.te
 
-(neverallow base_typeattr_1031 untrusted_app_30 (process (ptrace)))
+(neverallow base_typeattr_1043 untrusted_app_30 (process (ptrace)))
 ;;* lme
 
 (allow untrusted_app_30 self (netlink_route_socket (nlmsg_getneigh)))
@@ -30990,23 +31195,23 @@
 (dontaudit su untrusted_app_32_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 13 system/sepolicy/private/untrusted_app_32.te
 
-(neverallow base_typeattr_1032 untrusted_app_32_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1044 untrusted_app_32_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow untrusted_app_32 appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 13 system/sepolicy/private/untrusted_app_32.te
 
-(neverallow base_typeattr_1033 base_typeattr_1032 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1045 base_typeattr_1044 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/private/untrusted_app_32.te
 
-(neverallow base_typeattr_1034 untrusted_app_32 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1046 untrusted_app_32 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 13 system/sepolicy/private/untrusted_app_32.te
 
-(neverallow base_typeattr_1035 untrusted_app_32 (process (ptrace)))
+(neverallow base_typeattr_1047 untrusted_app_32 (process (ptrace)))
 ;;* lme
 
 (allow untrusted_app_32 sdk_sandbox_data_file (fd (use)))
@@ -31101,7 +31306,7 @@
 (allowx untrusted_app_all untrusted_app_all_devpts (ioctl chr_file ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
 ;;* lmx 157 system/sepolicy/private/untrusted_app_all.te
 
-(neverallowx base_typeattr_233 untrusted_app_all_devpts (ioctl chr_file (0x5412)))
+(neverallowx base_typeattr_236 untrusted_app_all_devpts (ioctl chr_file (0x5412)))
 ;;* lme
 
 (allow untrusted_app_all debugfs_kcov (file (ioctl read write getattr lock append map open watch watch_reads)))
@@ -31198,14 +31403,14 @@
 (allow update_engine update_engine_service (service_manager (add find)))
 ;;* lmx 72 system/sepolicy/private/update_engine.te
 
-(neverallow base_typeattr_1036 update_engine_service (service_manager (add)))
+(neverallow base_typeattr_1048 update_engine_service (service_manager (add)))
 ;;* lme
 
 (allow update_engine su (tcp_socket (read write accept getopt)))
 (allow update_engine update_engine_stable_service (service_manager (add find)))
 ;;* lmx 73 system/sepolicy/private/update_engine.te
 
-(neverallow base_typeattr_1036 update_engine_stable_service (service_manager (add)))
+(neverallow base_typeattr_1048 update_engine_stable_service (service_manager (add)))
 ;;* lme
 
 (allow update_engine su (tcp_socket (read write accept getopt)))
@@ -31347,9 +31552,9 @@
 (allow system_server uprobestats (binder (transfer)))
 (allow uprobestats system_server (fd (use)))
 (allow uprobestats package_native_service (service_manager (find)))
-(allow uprobestats base_typeattr_260 (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow uprobestats base_typeattr_260 (file (ioctl read getattr lock map open watch watch_reads)))
-(allow uprobestats base_typeattr_260 (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow uprobestats base_typeattr_263 (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow uprobestats base_typeattr_263 (file (ioctl read getattr lock map open watch watch_reads)))
+(allow uprobestats base_typeattr_263 (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow uprobestats uprobestats_configs_data_file (dir (ioctl read write getattr lock open watch watch_reads add_name remove_name search)))
 (allow uprobestats uprobestats_configs_data_file (file (ioctl read getattr lock map unlink open watch watch_reads)))
 (allow init usbd_exec (file (read getattr map execute open)))
@@ -31414,7 +31619,7 @@
 (allow vendor_init device_config_virtualization_framework_native_prop (file (read getattr map open)))
 (allow vendor_init apex_ready_prop (file (read getattr map open)))
 (allow vendor_init fstype_prop (file (read getattr map open)))
-(allow vendor_init base_typeattr_1037 (chr_file (setattr)))
+(allow vendor_init base_typeattr_1049 (chr_file (setattr)))
 (allow vendor_init init (unix_stream_socket (read write)))
 (allow vendor_init kmsg_device (chr_file (write getattr open)))
 (allow vendor_init device (dir (mounton)))
@@ -31435,29 +31640,29 @@
 (allow vendor_init unencrypted_data_file (file (ioctl read getattr lock map open watch watch_reads)))
 (allowx vendor_init data_file_type (ioctl dir (0x6613 0x6615)))
 (allow vendor_init system_data_file (dir (getattr)))
-(allow vendor_init base_typeattr_1038 (dir (ioctl read write create getattr setattr relabelfrom open add_name remove_name search rmdir)))
+(allow vendor_init base_typeattr_1050 (dir (ioctl read write create getattr setattr relabelfrom open add_name remove_name search rmdir)))
 (allow vendor_init unlabeled (file (getattr relabelfrom)))
 (allow vendor_init unlabeled (dir (getattr relabelfrom)))
 (allow vendor_init unlabeled (lnk_file (getattr relabelfrom)))
 (allow vendor_init unlabeled (sock_file (getattr relabelfrom)))
 (allow vendor_init unlabeled (fifo_file (getattr relabelfrom)))
-(allow vendor_init base_typeattr_1039 (file (read write create getattr setattr relabelfrom map unlink open)))
-(allow vendor_init base_typeattr_1040 (sock_file (read create getattr setattr relabelfrom unlink open)))
-(allow vendor_init base_typeattr_1040 (fifo_file (read create getattr setattr relabelfrom unlink open)))
-(allow vendor_init base_typeattr_1041 (lnk_file (create getattr setattr relabelfrom unlink)))
-(allow vendor_init base_typeattr_1042 (file (relabelto)))
-(allow vendor_init base_typeattr_1042 (dir (relabelto)))
-(allow vendor_init base_typeattr_1042 (lnk_file (relabelto)))
-(allow vendor_init base_typeattr_1042 (chr_file (relabelto)))
-(allow vendor_init base_typeattr_1042 (blk_file (relabelto)))
-(allow vendor_init base_typeattr_1042 (sock_file (relabelto)))
-(allow vendor_init base_typeattr_1042 (fifo_file (relabelto)))
+(allow vendor_init base_typeattr_1051 (file (read write create getattr setattr relabelfrom map unlink open)))
+(allow vendor_init base_typeattr_1052 (sock_file (read create getattr setattr relabelfrom unlink open)))
+(allow vendor_init base_typeattr_1052 (fifo_file (read create getattr setattr relabelfrom unlink open)))
+(allow vendor_init base_typeattr_1053 (lnk_file (create getattr setattr relabelfrom unlink)))
+(allow vendor_init base_typeattr_1054 (file (relabelto)))
+(allow vendor_init base_typeattr_1054 (dir (relabelto)))
+(allow vendor_init base_typeattr_1054 (lnk_file (relabelto)))
+(allow vendor_init base_typeattr_1054 (chr_file (relabelto)))
+(allow vendor_init base_typeattr_1054 (blk_file (relabelto)))
+(allow vendor_init base_typeattr_1054 (sock_file (relabelto)))
+(allow vendor_init base_typeattr_1054 (fifo_file (relabelto)))
 (allow vendor_init dev_type (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
 (allow vendor_init dev_type (lnk_file (create)))
 (allow vendor_init debugfs_tracing (file (write lock append map open)))
-(allow vendor_init base_typeattr_1043 (file (read setattr map open)))
+(allow vendor_init base_typeattr_1055 (file (read setattr map open)))
 (allow vendor_init tracefs_type (file (read setattr map open)))
-(allow vendor_init base_typeattr_1044 (dir (read setattr open search)))
+(allow vendor_init base_typeattr_1056 (dir (read setattr open search)))
 (allow vendor_init dev_type (blk_file (getattr)))
 (allow vendor_init proc_net_type (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow vendor_init proc_net_type (file (ioctl read getattr lock map open watch watch_reads)))
@@ -31468,7 +31673,7 @@
 (allow vendor_init proc_page_cluster (file (write lock append map open)))
 (allow vendor_init sysfs_type (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow vendor_init sysfs_type (lnk_file (read)))
-(allow vendor_init base_typeattr_1045 (file (ioctl read write getattr lock append map open watch watch_reads)))
+(allow vendor_init base_typeattr_1057 (file (ioctl read write getattr lock append map open watch watch_reads)))
 (allow vendor_init self (process (setfscreate)))
 (allow vendor_init vendor_file_type (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow vendor_init vendor_file_type (file (ioctl read getattr lock map open watch watch_reads)))
@@ -31676,68 +31881,68 @@
 (allow vendor_init profcollectd_etr_prop (file (read getattr map open)))
 ;;* lmx 341 system/sepolicy/private/vendor_init.te
 
-(neverallow vendor_init base_typeattr_1046 (socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (tcp_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (udp_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (rawip_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (packet_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (key_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (unix_stream_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (unix_dgram_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_route_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_tcpdiag_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_nflog_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_xfrm_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_selinux_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_audit_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_dnrt_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_kobject_uevent_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (appletalk_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (tun_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_iscsi_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_fib_lookup_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_connector_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_netfilter_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_generic_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_scsitransport_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_rdma_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netlink_crypto_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (sctp_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (icmp_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (ax25_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (ipx_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (netrom_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (atmpvc_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (x25_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (rose_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (decnet_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (atmsvc_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (rds_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (irda_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (pppox_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (llc_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (can_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (tipc_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (bluetooth_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (iucv_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (rxrpc_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (isdn_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (phonet_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (ieee802154_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (caif_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (alg_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (nfc_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (vsock_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (kcm_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (qipcrtr_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (smc_socket (connect sendto)))
-(neverallow vendor_init base_typeattr_1046 (xdp_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (tcp_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (udp_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (rawip_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (packet_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (key_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (unix_stream_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (unix_dgram_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_route_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_tcpdiag_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_nflog_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_xfrm_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_selinux_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_audit_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_dnrt_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_kobject_uevent_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (appletalk_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (tun_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_iscsi_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_fib_lookup_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_connector_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_netfilter_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_generic_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_scsitransport_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_rdma_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netlink_crypto_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (sctp_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (icmp_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (ax25_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (ipx_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (netrom_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (atmpvc_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (x25_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (rose_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (decnet_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (atmsvc_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (rds_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (irda_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (pppox_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (llc_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (can_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (tipc_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (bluetooth_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (iucv_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (rxrpc_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (isdn_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (phonet_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (ieee802154_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (caif_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (alg_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (nfc_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (vsock_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (kcm_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (qipcrtr_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (smc_socket (connect sendto)))
+(neverallow vendor_init base_typeattr_1058 (xdp_socket (connect sendto)))
 ;;* lme
 
 ;;* lmx 341 system/sepolicy/private/vendor_init.te
 
-(neverallow vendor_init base_typeattr_1046 (unix_stream_socket (connectto)))
+(neverallow vendor_init base_typeattr_1058 (unix_stream_socket (connectto)))
 ;;* lme
 
 ;;* lmx 346 system/sepolicy/private/vendor_init.te
@@ -31747,12 +31952,12 @@
 
 ;;* lmx 347 system/sepolicy/private/vendor_init.te
 
-(neverallow base_typeattr_232 vendor_init (process (transition)))
+(neverallow base_typeattr_235 vendor_init (process (transition)))
 ;;* lme
 
 ;;* lmx 348 system/sepolicy/private/vendor_init.te
 
-(neverallow vendor_init base_typeattr_769 (file (entrypoint)))
+(neverallow vendor_init base_typeattr_778 (file (entrypoint)))
 ;;* lme
 
 ;;* lmx 351 system/sepolicy/private/vendor_init.te
@@ -31788,7 +31993,7 @@
 
 ;;* lmx 364 system/sepolicy/private/vendor_init.te
 
-(neverallow base_typeattr_233 vendor_init (process (ptrace)))
+(neverallow base_typeattr_236 vendor_init (process (ptrace)))
 ;;* lme
 
 (allow vendor_misc_writer misc_block_device (blk_file (write lock append map open)))
@@ -31818,7 +32023,7 @@
 (allow vendor_shell persist_vendor_debug_wifi_prop (file (read getattr map open)))
 ;;* lmx 3 system/sepolicy/private/vendor_toolbox.te
 
-(neverallow base_typeattr_1047 vendor_toolbox_exec (file (execute execute_no_trans entrypoint)))
+(neverallow base_typeattr_1059 vendor_toolbox_exec (file (execute execute_no_trans entrypoint)))
 ;;* lme
 
 (allow init vfio_handler_exec (file (read getattr map execute open)))
@@ -31830,7 +32035,7 @@
 (allow vfio_handler vfio_handler_service (service_manager (add find)))
 ;;* lmx 1 system/sepolicy/private/vfio_handler.te
 
-(neverallow base_typeattr_1048 vfio_handler_service (service_manager (add)))
+(neverallow base_typeattr_1060 vfio_handler_service (service_manager (add)))
 ;;* lme
 
 (allow vfio_handler su (tcp_socket (read write accept getopt)))
@@ -31869,14 +32074,14 @@
 (allow virtual_camera appdomain (binder (call transfer)))
 (allow appdomain virtual_camera (binder (transfer)))
 (allow virtual_camera appdomain (fd (use)))
-(allow virtual_camera base_typeattr_568 (fd (use)))
+(allow virtual_camera base_typeattr_575 (fd (use)))
 (allow virtual_camera surfaceflinger (binder (call transfer)))
 (allow surfaceflinger virtual_camera (binder (transfer)))
 (allow virtual_camera surfaceflinger (fd (use)))
 (allow virtual_camera virtual_camera_service (service_manager (add find)))
-;;* lmx 34 system/sepolicy/private/virtual_camera.te
+;;* lmx 37 system/sepolicy/private/virtual_camera.te
 
-(neverallow base_typeattr_1049 virtual_camera_service (service_manager (add)))
+(neverallow base_typeattr_1061 virtual_camera_service (service_manager (add)))
 ;;* lme
 
 (allow virtual_camera su (tcp_socket (read write accept getopt)))
@@ -31885,6 +32090,8 @@
 (allow virtual_camera sysfs_gpu (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow virtual_camera sysfs_gpu (file (ioctl read getattr lock map open watch watch_reads)))
 (allow virtual_camera sysfs_gpu (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow cameraserver ion_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
+(allow cameraserver dmabuf_system_heap_device (chr_file (ioctl read getattr lock map open watch watch_reads)))
 (allow virtual_camera hal_graphics_composer (fd (use)))
 (allow virtual_camera dumpstate (fd (use)))
 (allow virtual_camera dumpstate (fifo_file (write)))
@@ -31924,7 +32131,7 @@
 (allow virtual_touchpad virtual_touchpad_service (service_manager (add find)))
 ;;* lmx 7 system/sepolicy/private/virtual_touchpad.te
 
-(neverallow base_typeattr_1050 virtual_touchpad_service (service_manager (add)))
+(neverallow base_typeattr_1062 virtual_touchpad_service (service_manager (add)))
 ;;* lme
 
 (allow virtual_touchpad su (tcp_socket (read write accept getopt)))
@@ -31974,7 +32181,7 @@
 (allow virtualizationmanager self (vsock_socket (read write create getattr setattr lock append map bind connect listen accept getopt setopt shutdown)))
 ;;* lmx 64 system/sepolicy/private/virtual_touchpad.te
 
-(neverallow base_typeattr_1051 virtualizationmanager (vsock_socket (create bind connect listen accept)))
+(neverallow base_typeattr_1063 virtualizationmanager (vsock_socket (create bind connect listen accept)))
 ;;* lme
 
 (allow virtualizationmanager hypervisor_prop (file (read getattr map open)))
@@ -31983,14 +32190,14 @@
 (dontaudit virtualizationmanager hypervisor_pvmfw_prop (file (read)))
 ;;* lmx 79 system/sepolicy/private/virtual_touchpad.te
 
-(neverallow base_typeattr_1052 hypervisor_pvmfw_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1064 hypervisor_pvmfw_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow virtualizationmanager hypervisor_virtualizationmanager_prop (file (read getattr map open)))
 (dontaudit virtualizationmanager hypervisor_virtualizationmanager_prop (file (read)))
 ;;* lmx 90 system/sepolicy/private/virtual_touchpad.te
 
-(neverallow base_typeattr_1052 hypervisor_virtualizationmanager_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1064 hypervisor_virtualizationmanager_prop (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow virtualizationmanager tombstoned_crash_socket (sock_file (write)))
@@ -32045,14 +32252,14 @@
 (allow virtualizationservice virtualization_service (service_manager (add find)))
 ;;* lmx 16 system/sepolicy/private/virtualizationservice.te
 
-(neverallow base_typeattr_1053 virtualization_service (service_manager (add)))
+(neverallow base_typeattr_1065 virtualization_service (service_manager (add)))
 ;;* lme
 
 (allow virtualizationservice su (tcp_socket (read write accept getopt)))
 (allow virtualizationservice virtualization_maintenance_service (service_manager (add find)))
 ;;* lmx 17 system/sepolicy/private/virtualizationservice.te
 
-(neverallow base_typeattr_1053 virtualization_maintenance_service (service_manager (add)))
+(neverallow base_typeattr_1065 virtualization_maintenance_service (service_manager (add)))
 ;;* lme
 
 (allow virtualizationservice su (tcp_socket (read write accept getopt)))
@@ -32109,7 +32316,7 @@
 (allow virtualizationservice self (vsock_socket (read write create getattr setattr lock append map bind listen accept getopt setopt shutdown)))
 ;;* lmx 91 system/sepolicy/private/virtualizationservice.te
 
-(neverallow base_typeattr_1054 virtualizationservice (vsock_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
+(neverallow base_typeattr_1066 virtualizationservice (vsock_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind)))
 ;;* lme
 
 (allow virtualizationservice property_socket (sock_file (write)))
@@ -32130,24 +32337,24 @@
 (allow virtualizationservice vendor_configs_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lmx 120 system/sepolicy/private/virtualizationservice.te
 
-(neverallow base_typeattr_1055 virtualizationservice_prop (property_service (set)))
+(neverallow base_typeattr_1067 virtualizationservice_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 127 system/sepolicy/private/virtualizationservice.te
 
-(neverallow base_typeattr_1056 virtualizationservice_data_file (file (create open)))
+(neverallow base_typeattr_1068 virtualizationservice_data_file (file (create open)))
 ;;* lme
 
 ;;* lmx 135 system/sepolicy/private/virtualizationservice.te
 
-(neverallow virtualizationservice base_typeattr_1057 (process (setrlimit)))
+(neverallow virtualizationservice base_typeattr_1069 (process (setrlimit)))
 ;;* lme
 
 (allow virtualizationservice tun_device (chr_file (ioctl read write getattr lock append map open watch watch_reads)))
 (allow virtualizationservice vmnic (fd (use)))
 ;;* lmx 143 system/sepolicy/private/virtualizationservice.te
 
-(neverallow base_typeattr_1058 vfio_handler (binder (call)))
+(neverallow base_typeattr_1070 vfio_handler (binder (call)))
 ;;* lme
 
 (typetransition vmlauncher_app tmpfs file appdomain_tmpfs)
@@ -32155,23 +32362,23 @@
 (dontaudit su vmlauncher_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 4 system/sepolicy/private/vmlauncher_app.te
 
-(neverallow base_typeattr_1059 vmlauncher_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1071 vmlauncher_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow vmlauncher_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 4 system/sepolicy/private/vmlauncher_app.te
 
-(neverallow base_typeattr_1060 base_typeattr_1059 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1072 base_typeattr_1071 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/vmlauncher_app.te
 
-(neverallow base_typeattr_1061 vmlauncher_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1073 vmlauncher_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 4 system/sepolicy/private/vmlauncher_app.te
 
-(neverallow base_typeattr_1062 vmlauncher_app (process (ptrace)))
+(neverallow base_typeattr_1074 vmlauncher_app (process (ptrace)))
 ;;* lme
 
 (allow vmlauncher_app app_api_service (service_manager (find)))
@@ -32212,7 +32419,7 @@
 (allowx vmlauncher_app vmlauncher_app_devpts (ioctl chr_file ((range 0x5401 0x5404) 0x540b (range 0x540e 0x5411) (range 0x5413 0x5414) (range 0x5450 0x5451))))
 ;;* lmx 32 system/sepolicy/private/vmlauncher_app.te
 
-(neverallowx base_typeattr_233 vmlauncher_app_devpts (ioctl chr_file (0x5412)))
+(neverallowx base_typeattr_236 vmlauncher_app_devpts (ioctl chr_file (0x5412)))
 ;;* lme
 
 (allow vmlauncher_app vmlauncher_app_devpts (chr_file (setattr)))
@@ -32229,7 +32436,7 @@
 (allow vmnic vmnic_service (service_manager (add find)))
 ;;* lmx 1 system/sepolicy/private/vmnic.te
 
-(neverallow base_typeattr_1063 vmnic_service (service_manager (add)))
+(neverallow base_typeattr_1075 vmnic_service (service_manager (add)))
 ;;* lme
 
 (allow vmnic su (tcp_socket (read write accept getopt)))
@@ -32244,7 +32451,7 @@
 (allowx vmnic self (ioctl udp_socket (0x8914)))
 ;;* lmx 1 system/sepolicy/private/vmnic.te
 
-(neverallow base_typeattr_1064 vmnic (binder (call)))
+(neverallow base_typeattr_1076 vmnic (binder (call)))
 ;;* lme
 
 (allow init vold_exec (file (read getattr map execute open)))
@@ -32349,15 +32556,19 @@
 (allow vold keystore_maintenance_service (service_manager (find)))
 (allow vold keystore (keystore2 (early_boot_ended)))
 (allow vold keystore (keystore2 (delete_all_keys)))
+(allow vold storage_area_app_dir (dir (search)))
+(allow vold storage_area_dir (dir (ioctl read getattr open)))
+(allow vold storage_area_key_file (file (ioctl read write create getattr setattr lock append map unlink rename open watch watch_reads)))
+(allow vold storage_area_key_file (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
 (allow vold system_userdir_file (dir (write add_name remove_name)))
 (allow vold vendor_userdir_file (dir (write add_name remove_name)))
 (allow vold media_userdir_file (dir (write add_name remove_name)))
 (allow vold cache_file (dir (ioctl read getattr lock open watch watch_reads search)))
 (allow vold cache_file (file (read getattr)))
 (allow vold cache_file (lnk_file (ioctl read getattr lock map open watch watch_reads)))
-(allow vold base_typeattr_1065 (dir (ioctl read getattr lock open watch watch_reads search)))
-(allow vold base_typeattr_1065 (file (ioctl read getattr lock map open watch watch_reads)))
-(allow vold base_typeattr_1065 (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow vold base_typeattr_1077 (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow vold base_typeattr_1077 (file (ioctl read getattr lock map open watch watch_reads)))
+(allow vold base_typeattr_1077 (lnk_file (ioctl read getattr lock map open watch watch_reads)))
 (allow vold sysfs (file (write lock append map open)))
 (allow vold sysfs_devices_block (file (write lock append map open)))
 (allow vold sysfs_dm (file (write lock append map open)))
@@ -32386,8 +32597,10 @@
 (allowx vold data_file_type (ioctl dir (0x6613 (range 0x6615 0x6618) 0x661a)))
 (allowx vold vold_metadata_file (ioctl file (0x660b)))
 (allowx vold vold_data_file (ioctl file (0x660b)))
+(allowx vold storage_area_key_file (ioctl file (0x660b)))
 (allowx vold vold_metadata_file (ioctl file (0xf514)))
 (allowx vold vold_data_file (ioctl file (0xf514)))
+(allowx vold storage_area_key_file (ioctl file (0xf514)))
 (allow vold self (process (setfscreate)))
 (allow vold system_file (file (getattr map execute execute_no_trans)))
 (allow vold block_device (dir (ioctl read write create getattr setattr lock rename open watch watch_reads add_name remove_name reparent search rmdir)))
@@ -32490,14 +32703,14 @@
 (allow vold vold_service (service_manager (add find)))
 ;;* lmx 296 system/sepolicy/private/vold.te
 
-(neverallow base_typeattr_298 vold_service (service_manager (add)))
+(neverallow base_typeattr_301 vold_service (service_manager (add)))
 ;;* lme
 
 (allow vold su (tcp_socket (read write accept getopt)))
 (allow vold fwk_vold_service (service_manager (add find)))
 ;;* lmx 297 system/sepolicy/private/vold.te
 
-(neverallow base_typeattr_298 fwk_vold_service (service_manager (add)))
+(neverallow base_typeattr_301 fwk_vold_service (service_manager (add)))
 ;;* lme
 
 (allow vold su (tcp_socket (read write accept getopt)))
@@ -32546,77 +32759,77 @@
 (allow vold vendor_apex_file (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lmx 388 system/sepolicy/private/vold.te
 
-(neverallow base_typeattr_1066 vold_service (service_manager (find)))
+(neverallow base_typeattr_1078 vold_service (service_manager (find)))
 ;;* lme
 
 ;;* lmx 405 system/sepolicy/private/vold.te
 
-(neverallow base_typeattr_298 system_userdir_file (dir (write add_name remove_name)))
-(neverallow base_typeattr_298 vendor_userdir_file (dir (write add_name remove_name)))
-(neverallow base_typeattr_298 media_userdir_file (dir (write add_name remove_name)))
+(neverallow base_typeattr_301 system_userdir_file (dir (write add_name remove_name)))
+(neverallow base_typeattr_301 vendor_userdir_file (dir (write add_name remove_name)))
+(neverallow base_typeattr_301 media_userdir_file (dir (write add_name remove_name)))
 ;;* lme
 
 ;;* lmx 414 system/sepolicy/private/vold.te
 
-(neverallowx base_typeattr_448 data_file_type (ioctl dir (0x6613)))
+(neverallowx base_typeattr_1079 data_file_type (ioctl dir (0x6613)))
 ;;* lme
 
 ;;* lmx 420 system/sepolicy/private/vold.te
 
-(neverallowx base_typeattr_298 data_file_type (ioctl dir ((range 0x6617 0x6618) 0x661a)))
+(neverallowx base_typeattr_301 data_file_type (ioctl dir ((range 0x6617 0x6618) 0x661a)))
 ;;* lme
 
 ;;* lmx 426 system/sepolicy/private/vold.te
 
-(neverallow base_typeattr_1067 vold_data_file (dir (write lock append map unlink link rename execute quotaon mounton audit_access execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
+(neverallow base_typeattr_1080 vold_data_file (dir (write lock append map unlink link rename execute quotaon mounton audit_access execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent rmdir)))
 ;;* lme
 
 ;;* lmx 433 system/sepolicy/private/vold.te
 
-(neverallow base_typeattr_1068 vold_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_1081 vold_data_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 439 system/sepolicy/private/vold.te
 
-(neverallow base_typeattr_522 vold_metadata_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
+(neverallow base_typeattr_529 vold_metadata_file (dir (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads add_name remove_name reparent search rmdir)))
 ;;* lme
 
 ;;* lmx 446 system/sepolicy/private/vold.te
 
-(neverallow base_typeattr_1069 vold_data_file (file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_1069 vold_data_file (lnk_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_1069 vold_data_file (sock_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_1069 vold_data_file (fifo_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1082 vold_data_file (file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_1082 vold_data_file (lnk_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1082 vold_data_file (sock_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1082 vold_data_file (fifo_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 453 system/sepolicy/private/vold.te
 
-(neverallow base_typeattr_1068 vold_metadata_file (file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_1068 vold_metadata_file (lnk_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_1068 vold_metadata_file (sock_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_1068 vold_metadata_file (fifo_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1081 vold_metadata_file (file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_1081 vold_metadata_file (lnk_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1081 vold_metadata_file (sock_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1081 vold_metadata_file (fifo_file (ioctl read write create setattr lock relabelfrom append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 461 system/sepolicy/private/vold.te
 
-(neverallow base_typeattr_1070 vold_metadata_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_1070 vold_metadata_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_1070 vold_metadata_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_1070 vold_metadata_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_1070 vold_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
-(neverallow base_typeattr_1070 vold_data_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_1070 vold_data_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
-(neverallow base_typeattr_1070 vold_data_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1083 vold_metadata_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_1083 vold_metadata_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1083 vold_metadata_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1083 vold_metadata_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1083 vold_data_file (file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads execute_no_trans entrypoint)))
+(neverallow base_typeattr_1083 vold_data_file (lnk_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1083 vold_data_file (sock_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1083 vold_data_file (fifo_file (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 463 system/sepolicy/private/vold.te
 
-(neverallow base_typeattr_522 restorecon_prop (property_service (set)))
+(neverallow base_typeattr_529 restorecon_prop (property_service (set)))
 ;;* lme
 
 ;;* lmx 476 system/sepolicy/private/vold.te
 
-(neverallow vold base_typeattr_1071 (binder (call)))
+(neverallow vold base_typeattr_1084 (binder (call)))
 ;;* lme
 
 ;;* lmx 478 system/sepolicy/private/vold.te
@@ -32626,17 +32839,17 @@
 
 ;;* lmx 479 system/sepolicy/private/vold.te
 
-(neverallow base_typeattr_232 vold (process (transition dyntransition)))
+(neverallow base_typeattr_235 vold (process (transition dyntransition)))
 ;;* lme
 
 ;;* lmx 480 system/sepolicy/private/vold.te
 
-(neverallow vold base_typeattr_233 (process (ptrace)))
+(neverallow vold base_typeattr_236 (process (ptrace)))
 ;;* lme
 
 ;;* lmx 481 system/sepolicy/private/vold.te
 
-(neverallow vold base_typeattr_233 (rawip_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
+(neverallow vold base_typeattr_236 (rawip_socket (ioctl read write create getattr setattr lock relabelfrom relabelto append map bind connect listen accept getopt setopt shutdown recvfrom sendto name_bind node_bind)))
 ;;* lme
 
 (allow vold vold_prepare_subdirs_exec (file (read getattr map execute open)))
@@ -32674,6 +32887,7 @@
 (allow vold_prepare_subdirs sdk_sandbox_data_file (dir (ioctl read write create getattr setattr lock relabelto rename open watch watch_reads add_name remove_name reparent search rmdir)))
 (allow vold_prepare_subdirs rollback_data_file (dir (ioctl read write create getattr setattr lock relabelto rename open watch watch_reads add_name remove_name reparent search rmdir)))
 (allow vold_prepare_subdirs checkin_data_file (dir (ioctl read write create getattr setattr lock relabelto rename open watch watch_reads add_name remove_name reparent search rmdir)))
+(allow vold_prepare_subdirs storage_area_key_file (dir (ioctl read write create getattr setattr lock relabelto rename open watch watch_reads add_name remove_name reparent search rmdir)))
 (allow vold_prepare_subdirs apex_data_file_type (file (getattr unlink)))
 (allow vold_prepare_subdirs system_data_file (file (getattr unlink)))
 (allow vold_prepare_subdirs apex_module_data_file (file (getattr unlink)))
@@ -32692,6 +32906,20 @@
 (allow vold_prepare_subdirs mnt_expand_file (dir (search)))
 (allow vold_prepare_subdirs user_profile_data_file (dir (getattr relabelfrom search)))
 (allow vold_prepare_subdirs user_profile_root_file (dir (getattr relabelfrom relabelto search)))
+(allow vold_prepare_subdirs storage_area_app_dir (dir (ioctl read write create getattr setattr lock relabelfrom relabelto unlink open watch watch_reads add_name remove_name search rmdir)))
+(allow vold_prepare_subdirs storage_area_dir (dir (ioctl read write create getattr setattr lock relabelfrom relabelto unlink open watch watch_reads add_name remove_name search rmdir)))
+(typetransition vold_prepare_subdirs storage_area_app_dir dir storage_area_dir)
+(allow vold_prepare_subdirs selinuxfs (dir (ioctl read getattr lock open watch watch_reads search)))
+(allow vold_prepare_subdirs selinuxfs (file (ioctl read getattr lock map open watch watch_reads)))
+(allow vold_prepare_subdirs selinuxfs (lnk_file (ioctl read getattr lock map open watch watch_reads)))
+(allow vold_prepare_subdirs selinuxfs (file (write lock append map open)))
+(allow vold_prepare_subdirs kernel (security (check_context)))
+(allowx vold_prepare_subdirs storage_area_dir (ioctl dir (0x6613)))
+;;* lmx 82 system/sepolicy/private/vold_prepare_subdirs.te
+
+(neverallowx vold_prepare_subdirs base_typeattr_1085 (ioctl dir (0x6613)))
+;;* lme
+
 (allow vold_prepare_subdirs apex_tethering_data_file (dir (relabelfrom)))
 (allow vold_prepare_subdirs apex_appsearch_data_file (dir (relabelfrom)))
 (allow vold_prepare_subdirs apex_permission_data_file (dir (relabelfrom)))
@@ -32705,23 +32933,23 @@
 (dontaudit su vzwomatrigger_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 6 system/sepolicy/private/vzwomatrigger_app.te
 
-(neverallow base_typeattr_1072 vzwomatrigger_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1086 vzwomatrigger_app_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow vzwomatrigger_app appdomain_tmpfs (file (read write getattr map execute)))
 ;;* lmx 6 system/sepolicy/private/vzwomatrigger_app.te
 
-(neverallow base_typeattr_1073 base_typeattr_1072 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1087 base_typeattr_1086 (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/vzwomatrigger_app.te
 
-(neverallow base_typeattr_1074 vzwomatrigger_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1088 vzwomatrigger_app (file (ioctl read write create setattr lock relabelfrom append unlink link rename open watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 ;;* lmx 6 system/sepolicy/private/vzwomatrigger_app.te
 
-(neverallow base_typeattr_1075 vzwomatrigger_app (process (ptrace)))
+(neverallow base_typeattr_1089 vzwomatrigger_app (process (ptrace)))
 ;;* lme
 
 (allow init watchdogd_exec (file (read getattr map execute open)))
@@ -32738,7 +32966,7 @@
 (dontaudit su webview_zygote_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 13 system/sepolicy/private/webview_zygote.te
 
-(neverallow base_typeattr_1076 webview_zygote_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_1090 webview_zygote_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow webview_zygote apk_data_file (dir (ioctl read getattr lock open watch watch_reads search)))
@@ -32794,22 +33022,22 @@
 (allow webview_zygote resourcecache_data_file (dir (ioctl read getattr lock open watch watch_reads search)))
 ;;* lmx 105 system/sepolicy/private/webview_zygote.te
 
-(neverallow webview_zygote base_typeattr_286 (process (dyntransition)))
+(neverallow webview_zygote base_typeattr_289 (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 108 system/sepolicy/private/webview_zygote.te
 
-(neverallow webview_zygote base_typeattr_246 (process (transition)))
+(neverallow webview_zygote base_typeattr_249 (process (transition)))
 ;;* lme
 
 ;;* lmx 112 system/sepolicy/private/webview_zygote.te
 
-(neverallow webview_zygote base_typeattr_233 (file (execute_no_trans)))
+(neverallow webview_zygote base_typeattr_236 (file (execute_no_trans)))
 ;;* lme
 
 ;;* lmx 116 system/sepolicy/private/webview_zygote.te
 
-(neverallow base_typeattr_287 webview_zygote (process (dyntransition)))
+(neverallow base_typeattr_290 webview_zygote (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 119 system/sepolicy/private/webview_zygote.te
@@ -32829,7 +33057,7 @@
 
 ;;* lmx 129 system/sepolicy/private/webview_zygote.te
 
-(neverallow webview_zygote base_typeattr_288 (service_manager (find)))
+(neverallow webview_zygote base_typeattr_291 (service_manager (find)))
 ;;* lme
 
 ;;* lmx 132 system/sepolicy/private/webview_zygote.te
@@ -32924,7 +33152,7 @@
 (allow wifi_mainline_supplicant wifi_mainline_supplicant_service (service_manager (add find)))
 ;;* lmx 6 system/sepolicy/private/wifi_mainline_supplicant.te
 
-(neverallow base_typeattr_1077 wifi_mainline_supplicant_service (service_manager (add)))
+(neverallow base_typeattr_1091 wifi_mainline_supplicant_service (service_manager (add)))
 ;;* lme
 
 (allow wifi_mainline_supplicant su (tcp_socket (read write accept getopt)))
@@ -32979,7 +33207,7 @@
 (allow wificond wifinl80211_service (service_manager (add find)))
 ;;* lmx 17 system/sepolicy/private/wificond.te
 
-(neverallow base_typeattr_1078 wifinl80211_service (service_manager (add)))
+(neverallow base_typeattr_1092 wifinl80211_service (service_manager (add)))
 ;;* lme
 
 (allow wificond su (tcp_socket (read write accept getopt)))
@@ -33001,7 +33229,7 @@
 (allow wificond hidl_base_hwservice (hwservice_manager (add)))
 ;;* lmx 42 system/sepolicy/private/wificond.te
 
-(neverallow base_typeattr_1078 system_wifi_keystore_hwservice (hwservice_manager (add)))
+(neverallow base_typeattr_1092 system_wifi_keystore_hwservice (hwservice_manager (add)))
 ;;* lme
 
 (allow wificond keystore_service (service_manager (find)))
@@ -33030,7 +33258,7 @@
 (dontaudit su zygote_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lmx 27 system/sepolicy/private/zygote.te
 
-(neverallow base_typeattr_287 zygote_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
+(neverallow base_typeattr_290 zygote_userfaultfd (anon_inode (ioctl read write create getattr setattr lock relabelfrom relabelto append map unlink link rename execute quotaon mounton audit_access open execmod watch watch_mount watch_sb watch_with_perm watch_reads)))
 ;;* lme
 
 (allow zygote system_server (process (getpgid setpgid)))
@@ -33157,12 +33385,12 @@
 (allow zygote system_font_fallback_file (file (ioctl read getattr lock map open watch watch_reads)))
 ;;* lmx 289 system/sepolicy/private/zygote.te
 
-(neverallow zygote base_typeattr_1079 (process (dyntransition)))
+(neverallow zygote base_typeattr_1093 (process (dyntransition)))
 ;;* lme
 
 ;;* lmx 298 system/sepolicy/private/zygote.te
 
-(neverallow zygote base_typeattr_1080 (file (execute execute_no_trans)))
+(neverallow zygote base_typeattr_1094 (file (execute execute_no_trans)))
 ;;* lme
 
 ;;* lmx 306 system/sepolicy/private/zygote.te
@@ -33225,1716 +33453,1744 @@
 (typetransition bluetooth bluetooth anon_inode "[userfaultfd]" bluetooth_userfaultfd)
 (typetransition artd artd anon_inode "[userfaultfd]" artd_userfaultfd)
 (typetransition app_zygote app_zygote anon_inode "[userfaultfd]" app_zygote_userfaultfd)
+(typeattribute base_typeattr_1094)
+(typeattributeset base_typeattr_1094 (and (data_file_type ) (not (dalvikcache_data_file apex_art_data_file ))))
+(typeattribute base_typeattr_1093)
+(typeattributeset base_typeattr_1093 (not (appdomain app_zygote webview_zygote system_server_startup ) ))
+(typeattribute base_typeattr_1092)
+(typeattributeset base_typeattr_1092 (and (domain ) (not (wificond ))))
+(typeattribute base_typeattr_1091)
+(typeattributeset base_typeattr_1091 (and (domain ) (not (wifi_mainline_supplicant ))))
+(typeattribute base_typeattr_1090)
+(typeattributeset base_typeattr_1090 (and (domain ) (not (webview_zygote ))))
+(typeattribute base_typeattr_1089)
+(typeattributeset base_typeattr_1089 (and (domain ) (not (crash_dump llkd runas_app simpleperf vzwomatrigger_app ))))
+(typeattribute base_typeattr_1088)
+(typeattributeset base_typeattr_1088 (and (appdomain ) (not (runas_app shell simpleperf vzwomatrigger_app ))))
+(typeattribute base_typeattr_1087)
+(typeattributeset base_typeattr_1087 (and (vzwomatrigger_app ) (not (runas_app shell simpleperf ))))
+(typeattribute base_typeattr_1086)
+(typeattributeset base_typeattr_1086 (and (domain ) (not (vzwomatrigger_app ))))
+(typeattribute base_typeattr_1085)
+(typeattributeset base_typeattr_1085 (and (data_file_type ) (not (storage_area_dir ))))
+(typeattribute base_typeattr_1084)
+(typeattributeset base_typeattr_1084 (and (domain ) (not (hal_bootctl_server hal_health_storage_server hal_keymaster_server system_suspend_server hwservicemanager keystore servicemanager su system_server ))))
+(typeattribute base_typeattr_1083)
+(typeattributeset base_typeattr_1083 (and (domain ) (not (init kernel vold vold_prepare_subdirs ))))
+(typeattribute base_typeattr_1082)
+(typeattributeset base_typeattr_1082 (and (domain ) (not (kernel vold vold_prepare_subdirs ))))
+(typeattribute base_typeattr_1081)
+(typeattributeset base_typeattr_1081 (and (domain ) (not (init vold vold_prepare_subdirs ))))
 (typeattribute base_typeattr_1080)
-(typeattributeset base_typeattr_1080 (and (data_file_type ) (not (dalvikcache_data_file apex_art_data_file ))))
+(typeattributeset base_typeattr_1080 (and (domain ) (not (vold vold_prepare_subdirs ))))
 (typeattribute base_typeattr_1079)
-(typeattributeset base_typeattr_1079 (not (appdomain app_zygote webview_zygote system_server_startup ) ))
+(typeattributeset base_typeattr_1079 (and (domain ) (not (init vendor_init vold vold_prepare_subdirs ))))
 (typeattribute base_typeattr_1078)
-(typeattributeset base_typeattr_1078 (and (domain ) (not (wificond ))))
+(typeattributeset base_typeattr_1078 (and (domain ) (not (apexd system_server update_verifier vdc vold gsid ))))
 (typeattribute base_typeattr_1077)
-(typeattributeset base_typeattr_1077 (and (domain ) (not (wifi_mainline_supplicant ))))
+(typeattributeset base_typeattr_1077 (and (sysfs_type ) (not (sysfs_batteryinfo ))))
 (typeattribute base_typeattr_1076)
-(typeattributeset base_typeattr_1076 (and (domain ) (not (webview_zygote ))))
+(typeattributeset base_typeattr_1076 (and (domain ) (not (servicemanager virtualizationservice ))))
 (typeattribute base_typeattr_1075)
-(typeattributeset base_typeattr_1075 (and (domain ) (not (crash_dump llkd runas_app simpleperf vzwomatrigger_app ))))
+(typeattributeset base_typeattr_1075 (and (domain ) (not (vmnic ))))
 (typeattribute base_typeattr_1074)
-(typeattributeset base_typeattr_1074 (and (appdomain ) (not (runas_app shell simpleperf vzwomatrigger_app ))))
+(typeattributeset base_typeattr_1074 (and (domain ) (not (crash_dump llkd runas_app simpleperf vmlauncher_app ))))
 (typeattribute base_typeattr_1073)
-(typeattributeset base_typeattr_1073 (and (vzwomatrigger_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_1073 (and (appdomain ) (not (runas_app shell simpleperf vmlauncher_app ))))
 (typeattribute base_typeattr_1072)
-(typeattributeset base_typeattr_1072 (and (domain ) (not (vzwomatrigger_app ))))
+(typeattributeset base_typeattr_1072 (and (vmlauncher_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_1071)
-(typeattributeset base_typeattr_1071 (and (domain ) (not (hal_bootctl_server hal_health_storage_server hal_keymaster_server system_suspend_server hwservicemanager keystore servicemanager su system_server ))))
+(typeattributeset base_typeattr_1071 (and (domain ) (not (vmlauncher_app ))))
 (typeattribute base_typeattr_1070)
-(typeattributeset base_typeattr_1070 (and (domain ) (not (init kernel vold vold_prepare_subdirs ))))
+(typeattributeset base_typeattr_1070 (and (domain ) (not (servicemanager virtualizationmanager virtualizationservice ))))
 (typeattribute base_typeattr_1069)
-(typeattributeset base_typeattr_1069 (and (domain ) (not (kernel vold vold_prepare_subdirs ))))
+(typeattributeset base_typeattr_1069 (and (domain ) (not (crosvm virtualizationmanager virtualizationservice ))))
 (typeattribute base_typeattr_1068)
-(typeattributeset base_typeattr_1068 (and (domain ) (not (init vold vold_prepare_subdirs ))))
+(typeattributeset base_typeattr_1068 (and (domain ) (not (init virtualizationmanager virtualizationservice ))))
 (typeattribute base_typeattr_1067)
-(typeattributeset base_typeattr_1067 (and (domain ) (not (vold vold_prepare_subdirs ))))
+(typeattributeset base_typeattr_1067 (and (domain ) (not (init virtualizationservice ))))
 (typeattribute base_typeattr_1066)
-(typeattributeset base_typeattr_1066 (and (domain ) (not (apexd system_server update_verifier vdc vold gsid ))))
+(typeattributeset base_typeattr_1066 (and (domain ) (not (dumpstate virtualizationservice ))))
 (typeattribute base_typeattr_1065)
-(typeattributeset base_typeattr_1065 (and (sysfs_type ) (not (sysfs_batteryinfo ))))
+(typeattributeset base_typeattr_1065 (and (domain ) (not (virtualizationservice ))))
 (typeattribute base_typeattr_1064)
-(typeattributeset base_typeattr_1064 (and (domain ) (not (servicemanager virtualizationservice ))))
+(typeattributeset base_typeattr_1064 (and (domain ) (not (dumpstate early_virtmgr init virtualizationmanager ))))
 (typeattribute base_typeattr_1063)
-(typeattributeset base_typeattr_1063 (and (domain ) (not (vmnic ))))
+(typeattributeset base_typeattr_1063 (and (domain ) (not (virtualizationmanager ))))
 (typeattribute base_typeattr_1062)
-(typeattributeset base_typeattr_1062 (and (domain ) (not (crash_dump llkd runas_app simpleperf vmlauncher_app ))))
+(typeattributeset base_typeattr_1062 (and (domain ) (not (virtual_touchpad ))))
 (typeattribute base_typeattr_1061)
-(typeattributeset base_typeattr_1061 (and (appdomain ) (not (runas_app shell simpleperf vmlauncher_app ))))
+(typeattributeset base_typeattr_1061 (and (domain ) (not (virtual_camera ))))
 (typeattribute base_typeattr_1060)
-(typeattributeset base_typeattr_1060 (and (vmlauncher_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_1060 (and (domain ) (not (vfio_handler ))))
 (typeattribute base_typeattr_1059)
-(typeattributeset base_typeattr_1059 (and (domain ) (not (vmlauncher_app ))))
+(typeattributeset base_typeattr_1059 (and (coredomain ) (not (init modprobe ))))
 (typeattribute base_typeattr_1058)
-(typeattributeset base_typeattr_1058 (and (domain ) (not (servicemanager virtualizationmanager virtualizationservice ))))
+(typeattributeset base_typeattr_1058 (and (domain ) (not (init logd prng_seeder su vendor_init ))))
 (typeattribute base_typeattr_1057)
-(typeattributeset base_typeattr_1057 (and (domain ) (not (crosvm virtualizationmanager virtualizationservice ))))
+(typeattributeset base_typeattr_1057 (and (sysfs_type ) (not (sysfs_usermodehelper ))))
 (typeattribute base_typeattr_1056)
-(typeattributeset base_typeattr_1056 (and (domain ) (not (init virtualizationmanager virtualizationservice ))))
+(typeattributeset base_typeattr_1056 (and (fs_type ) (not (bpffs_type contextmount_type fusefs_type sdcard_type rootfs proc_uid_time_in_state proc_uid_concurrent_active_time proc_uid_concurrent_policy_time ))))
 (typeattribute base_typeattr_1055)
-(typeattributeset base_typeattr_1055 (and (domain ) (not (init virtualizationservice ))))
+(typeattributeset base_typeattr_1055 (and (fs_type ) (not (bpffs_type contextmount_type fusefs_type debugfs_type sdcard_type keychord_device rootfs proc_kallsyms proc_uid_time_in_state proc_uid_concurrent_active_time proc_uid_concurrent_policy_time ))))
 (typeattribute base_typeattr_1054)
-(typeattributeset base_typeattr_1054 (and (domain ) (not (dumpstate virtualizationservice ))))
+(typeattributeset base_typeattr_1054 (and (file_type ) (not (bpffs_type exec_type core_data_file_type system_file_type system_dlkm_file_type vendor_file_type gsi_metadata_file_type vold_metadata_file password_slot_metadata_file apex_metadata_file ota_metadata_file userspace_reboot_metadata_file aconfig_storage_metadata_file aconfig_storage_flags_metadata_file mnt_product_file ))))
 (typeattribute base_typeattr_1053)
-(typeattributeset base_typeattr_1053 (and (domain ) (not (virtualizationservice ))))
+(typeattributeset base_typeattr_1053 (and (file_type ) (not (bpffs_type exec_type core_data_file_type system_file_type system_dlkm_file_type vendor_file_type gsi_metadata_file_type unlabeled vold_metadata_file password_slot_metadata_file apex_metadata_file ota_metadata_file userspace_reboot_metadata_file aconfig_storage_metadata_file aconfig_storage_flags_metadata_file apex_mnt_dir ))))
 (typeattribute base_typeattr_1052)
-(typeattributeset base_typeattr_1052 (and (domain ) (not (dumpstate early_virtmgr init virtualizationmanager ))))
+(typeattributeset base_typeattr_1052 (and (file_type ) (not (bpffs_type exec_type core_data_file_type system_file_type system_dlkm_file_type vendor_file_type gsi_metadata_file_type unlabeled vold_metadata_file password_slot_metadata_file apex_metadata_file ota_metadata_file userspace_reboot_metadata_file aconfig_storage_metadata_file aconfig_storage_flags_metadata_file ))))
 (typeattribute base_typeattr_1051)
-(typeattributeset base_typeattr_1051 (and (domain ) (not (virtualizationmanager ))))
+(typeattributeset base_typeattr_1051 (and (file_type ) (not (bpffs_type exec_type core_data_file_type system_file_type system_dlkm_file_type vendor_file_type debugfs_type gsi_metadata_file_type proc_kallsyms unlabeled vold_metadata_file password_slot_metadata_file apex_metadata_file ota_metadata_file userspace_reboot_metadata_file aconfig_storage_metadata_file aconfig_storage_flags_metadata_file runtime_event_log_tags_file apex_info_file tradeinmode_metadata_file ))))
 (typeattribute base_typeattr_1050)
-(typeattributeset base_typeattr_1050 (and (domain ) (not (virtual_touchpad ))))
+(typeattributeset base_typeattr_1050 (and (file_type ) (not (bpffs_type exec_type core_data_file_type system_file_type system_dlkm_file_type vendor_file_type gsi_metadata_file_type unlabeled vold_metadata_file password_slot_metadata_file apex_metadata_file ota_metadata_file userspace_reboot_metadata_file aconfig_storage_metadata_file aconfig_storage_flags_metadata_file mnt_product_file ))))
 (typeattribute base_typeattr_1049)
-(typeattributeset base_typeattr_1049 (and (domain ) (not (virtual_camera ))))
+(typeattributeset base_typeattr_1049 (and (dev_type ) (not (vm_manager_device_type keychord_device hw_random_device port_device lowpan_device ))))
 (typeattribute base_typeattr_1048)
-(typeattributeset base_typeattr_1048 (and (domain ) (not (vfio_handler ))))
+(typeattributeset base_typeattr_1048 (and (domain ) (not (update_engine ))))
 (typeattribute base_typeattr_1047)
-(typeattributeset base_typeattr_1047 (and (coredomain ) (not (init modprobe ))))
+(typeattributeset base_typeattr_1047 (and (domain ) (not (crash_dump llkd runas_app simpleperf untrusted_app_32 ))))
 (typeattribute base_typeattr_1046)
-(typeattributeset base_typeattr_1046 (and (domain ) (not (init logd prng_seeder su vendor_init ))))
+(typeattributeset base_typeattr_1046 (and (appdomain ) (not (runas_app shell simpleperf untrusted_app_32 ))))
 (typeattribute base_typeattr_1045)
-(typeattributeset base_typeattr_1045 (and (sysfs_type ) (not (sysfs_usermodehelper ))))
+(typeattributeset base_typeattr_1045 (and (untrusted_app_32 ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_1044)
-(typeattributeset base_typeattr_1044 (and (fs_type ) (not (bpffs_type contextmount_type fusefs_type sdcard_type rootfs proc_uid_time_in_state proc_uid_concurrent_active_time proc_uid_concurrent_policy_time ))))
+(typeattributeset base_typeattr_1044 (and (domain ) (not (untrusted_app_32 ))))
 (typeattribute base_typeattr_1043)
-(typeattributeset base_typeattr_1043 (and (fs_type ) (not (bpffs_type contextmount_type fusefs_type debugfs_type sdcard_type keychord_device rootfs proc_kallsyms proc_uid_time_in_state proc_uid_concurrent_active_time proc_uid_concurrent_policy_time ))))
+(typeattributeset base_typeattr_1043 (and (domain ) (not (crash_dump llkd runas_app simpleperf untrusted_app_30 ))))
 (typeattribute base_typeattr_1042)
-(typeattributeset base_typeattr_1042 (and (file_type ) (not (bpffs_type exec_type core_data_file_type system_file_type system_dlkm_file_type vendor_file_type gsi_metadata_file_type vold_metadata_file password_slot_metadata_file apex_metadata_file ota_metadata_file userspace_reboot_metadata_file aconfig_storage_metadata_file aconfig_storage_flags_metadata_file mnt_product_file ))))
+(typeattributeset base_typeattr_1042 (and (appdomain ) (not (runas_app shell simpleperf untrusted_app_30 ))))
 (typeattribute base_typeattr_1041)
-(typeattributeset base_typeattr_1041 (and (file_type ) (not (bpffs_type exec_type core_data_file_type system_file_type system_dlkm_file_type vendor_file_type gsi_metadata_file_type unlabeled vold_metadata_file password_slot_metadata_file apex_metadata_file ota_metadata_file userspace_reboot_metadata_file aconfig_storage_metadata_file aconfig_storage_flags_metadata_file apex_mnt_dir ))))
+(typeattributeset base_typeattr_1041 (and (untrusted_app_30 ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_1040)
-(typeattributeset base_typeattr_1040 (and (file_type ) (not (bpffs_type exec_type core_data_file_type system_file_type system_dlkm_file_type vendor_file_type gsi_metadata_file_type unlabeled vold_metadata_file password_slot_metadata_file apex_metadata_file ota_metadata_file userspace_reboot_metadata_file aconfig_storage_metadata_file aconfig_storage_flags_metadata_file ))))
+(typeattributeset base_typeattr_1040 (and (domain ) (not (untrusted_app_30 ))))
 (typeattribute base_typeattr_1039)
-(typeattributeset base_typeattr_1039 (and (file_type ) (not (bpffs_type exec_type core_data_file_type system_file_type system_dlkm_file_type vendor_file_type debugfs_type gsi_metadata_file_type proc_kallsyms unlabeled vold_metadata_file password_slot_metadata_file apex_metadata_file ota_metadata_file userspace_reboot_metadata_file aconfig_storage_metadata_file aconfig_storage_flags_metadata_file runtime_event_log_tags_file apex_info_file tradeinmode_metadata_file ))))
+(typeattributeset base_typeattr_1039 (and (domain ) (not (crash_dump llkd runas_app simpleperf untrusted_app_29 ))))
 (typeattribute base_typeattr_1038)
-(typeattributeset base_typeattr_1038 (and (file_type ) (not (bpffs_type exec_type core_data_file_type system_file_type system_dlkm_file_type vendor_file_type gsi_metadata_file_type unlabeled vold_metadata_file password_slot_metadata_file apex_metadata_file ota_metadata_file userspace_reboot_metadata_file aconfig_storage_metadata_file aconfig_storage_flags_metadata_file mnt_product_file ))))
+(typeattributeset base_typeattr_1038 (and (appdomain ) (not (runas_app shell simpleperf untrusted_app_29 ))))
 (typeattribute base_typeattr_1037)
-(typeattributeset base_typeattr_1037 (and (dev_type ) (not (vm_manager_device_type keychord_device hw_random_device port_device lowpan_device ))))
+(typeattributeset base_typeattr_1037 (and (untrusted_app_29 ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_1036)
-(typeattributeset base_typeattr_1036 (and (domain ) (not (update_engine ))))
+(typeattributeset base_typeattr_1036 (and (domain ) (not (untrusted_app_29 ))))
 (typeattribute base_typeattr_1035)
-(typeattributeset base_typeattr_1035 (and (domain ) (not (crash_dump llkd runas_app simpleperf untrusted_app_32 ))))
+(typeattributeset base_typeattr_1035 (and (domain ) (not (crash_dump llkd runas_app simpleperf untrusted_app_27 ))))
 (typeattribute base_typeattr_1034)
-(typeattributeset base_typeattr_1034 (and (appdomain ) (not (runas_app shell simpleperf untrusted_app_32 ))))
+(typeattributeset base_typeattr_1034 (and (appdomain ) (not (runas_app shell simpleperf untrusted_app_27 ))))
 (typeattribute base_typeattr_1033)
-(typeattributeset base_typeattr_1033 (and (untrusted_app_32 ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_1033 (and (untrusted_app_27 ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_1032)
-(typeattributeset base_typeattr_1032 (and (domain ) (not (untrusted_app_32 ))))
+(typeattributeset base_typeattr_1032 (and (domain ) (not (untrusted_app_27 ))))
 (typeattribute base_typeattr_1031)
-(typeattributeset base_typeattr_1031 (and (domain ) (not (crash_dump llkd runas_app simpleperf untrusted_app_30 ))))
+(typeattributeset base_typeattr_1031 (and (domain ) (not (crash_dump llkd runas_app simpleperf untrusted_app_25 ))))
 (typeattribute base_typeattr_1030)
-(typeattributeset base_typeattr_1030 (and (appdomain ) (not (runas_app shell simpleperf untrusted_app_30 ))))
+(typeattributeset base_typeattr_1030 (and (appdomain ) (not (runas_app shell simpleperf untrusted_app_25 ))))
 (typeattribute base_typeattr_1029)
-(typeattributeset base_typeattr_1029 (and (untrusted_app_30 ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_1029 (and (untrusted_app_25 ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_1028)
-(typeattributeset base_typeattr_1028 (and (domain ) (not (untrusted_app_30 ))))
+(typeattributeset base_typeattr_1028 (and (domain ) (not (untrusted_app_25 ))))
 (typeattribute base_typeattr_1027)
-(typeattributeset base_typeattr_1027 (and (domain ) (not (crash_dump llkd runas_app simpleperf untrusted_app_29 ))))
+(typeattributeset base_typeattr_1027 (and (domain ) (not (crash_dump llkd runas_app simpleperf untrusted_app ))))
 (typeattribute base_typeattr_1026)
-(typeattributeset base_typeattr_1026 (and (appdomain ) (not (runas_app shell simpleperf untrusted_app_29 ))))
+(typeattributeset base_typeattr_1026 (and (appdomain ) (not (runas_app shell simpleperf untrusted_app ))))
 (typeattribute base_typeattr_1025)
-(typeattributeset base_typeattr_1025 (and (untrusted_app_29 ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_1025 (and (untrusted_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_1024)
-(typeattributeset base_typeattr_1024 (and (domain ) (not (untrusted_app_29 ))))
+(typeattributeset base_typeattr_1024 (and (domain ) (not (untrusted_app ))))
 (typeattribute base_typeattr_1023)
-(typeattributeset base_typeattr_1023 (and (domain ) (not (crash_dump llkd runas_app simpleperf untrusted_app_27 ))))
+(typeattributeset base_typeattr_1023 (and (vendor_file_type ) (not (vendor_app_file vendor_overlay_file ))))
 (typeattribute base_typeattr_1022)
-(typeattributeset base_typeattr_1022 (and (appdomain ) (not (runas_app shell simpleperf untrusted_app_27 ))))
+(typeattributeset base_typeattr_1022 (and (service_manager_type ) (not (apex_service default_android_service dnsresolver_service gatekeeper_service incident_service installd_service lpdump_service mdns_service netd_service virtual_touchpad_service vold_service ))))
 (typeattribute base_typeattr_1021)
-(typeattributeset base_typeattr_1021 (and (untrusted_app_27 ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_1021 (and (domain ) (not (crash_dump llkd runas_app simpleperf traceur_app ))))
 (typeattribute base_typeattr_1020)
-(typeattributeset base_typeattr_1020 (and (domain ) (not (untrusted_app_27 ))))
+(typeattributeset base_typeattr_1020 (and (appdomain ) (not (runas_app shell simpleperf traceur_app ))))
 (typeattribute base_typeattr_1019)
-(typeattributeset base_typeattr_1019 (and (domain ) (not (crash_dump llkd runas_app simpleperf untrusted_app_25 ))))
+(typeattributeset base_typeattr_1019 (and (traceur_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_1018)
-(typeattributeset base_typeattr_1018 (and (appdomain ) (not (runas_app shell simpleperf untrusted_app_25 ))))
+(typeattributeset base_typeattr_1018 (and (domain ) (not (traceur_app ))))
 (typeattribute base_typeattr_1017)
-(typeattributeset base_typeattr_1017 (and (untrusted_app_25 ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_1017 (and (data_file_type ) (not (packages_list_file game_mode_intervention_list_file ))))
 (typeattribute base_typeattr_1016)
-(typeattributeset base_typeattr_1016 (and (domain ) (not (untrusted_app_25 ))))
+(typeattributeset base_typeattr_1016 (and (data_file_type ) (not (system_data_root_file system_data_file system_userdir_file vendor_data_file vendor_userdir_file apk_data_file dalvikcache_data_file user_profile_root_file user_profile_data_file apex_module_data_file bootstat_data_file media_userdir_file update_engine_data_file update_engine_log_data_file system_app_data_file backup_data_file apex_art_data_file ))))
 (typeattribute base_typeattr_1015)
-(typeattributeset base_typeattr_1015 (and (domain ) (not (crash_dump llkd runas_app simpleperf untrusted_app ))))
+(typeattributeset base_typeattr_1015 (and (domain ) (not (dumpstate perfetto platform_app shell system_server traced traceur_app ))))
 (typeattribute base_typeattr_1014)
-(typeattributeset base_typeattr_1014 (and (appdomain ) (not (runas_app shell simpleperf untrusted_app ))))
+(typeattributeset base_typeattr_1014 (and (data_file_type ) (not (trace_data_file perfetto_traces_data_file ))))
 (typeattribute base_typeattr_1013)
-(typeattributeset base_typeattr_1013 (and (untrusted_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_1013 (and (data_file_type ) (not (system_data_root_file system_data_file system_userdir_file vendor_data_file vendor_userdir_file media_userdir_file perfetto_traces_data_file ))))
 (typeattribute base_typeattr_1012)
-(typeattributeset base_typeattr_1012 (and (domain ) (not (untrusted_app ))))
+(typeattributeset base_typeattr_1012 (and (fs_type file_type ) (not (toolbox_exec ))))
 (typeattribute base_typeattr_1011)
-(typeattributeset base_typeattr_1011 (and (vendor_file_type ) (not (vendor_app_file vendor_overlay_file ))))
+(typeattributeset base_typeattr_1011 (and (domain ) (not (dumpstate init tombstoned vendor_init ))))
 (typeattribute base_typeattr_1010)
-(typeattributeset base_typeattr_1010 (and (service_manager_type ) (not (apex_service default_android_service dnsresolver_service gatekeeper_service incident_service installd_service lpdump_service mdns_service netd_service virtual_touchpad_service vold_service ))))
+(typeattributeset base_typeattr_1010 (and (domain ) (not (system_suspend_server ))))
 (typeattribute base_typeattr_1009)
-(typeattributeset base_typeattr_1009 (and (domain ) (not (crash_dump llkd runas_app simpleperf traceur_app ))))
+(typeattributeset base_typeattr_1009 (and (domain ) (not (system_suspend_internal_server atrace dumpstate system_server traced_probes traceur_app ))))
 (typeattribute base_typeattr_1008)
-(typeattributeset base_typeattr_1008 (and (appdomain ) (not (runas_app shell simpleperf traceur_app ))))
+(typeattributeset base_typeattr_1008 (and (domain ) (not (system_suspend_internal_server ))))
 (typeattribute base_typeattr_1007)
-(typeattributeset base_typeattr_1007 (and (traceur_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_1007 (and (domain ) (not (atrace bluetooth dumpstate system_server traceur_app system_suspend ))))
 (typeattribute base_typeattr_1006)
-(typeattributeset base_typeattr_1006 (and (domain ) (not (traceur_app ))))
+(typeattributeset base_typeattr_1006 (and (domain ) (not (system_suspend ))))
 (typeattribute base_typeattr_1005)
-(typeattributeset base_typeattr_1005 (and (data_file_type ) (not (packages_list_file game_mode_intervention_list_file ))))
+(typeattributeset base_typeattr_1005 (and (domain ) (not (init shell system_server vendor_init ))))
 (typeattribute base_typeattr_1004)
-(typeattributeset base_typeattr_1004 (and (data_file_type ) (not (system_data_root_file system_data_file system_userdir_file vendor_data_file vendor_userdir_file apk_data_file dalvikcache_data_file user_profile_root_file user_profile_data_file apex_module_data_file bootstat_data_file media_userdir_file update_engine_data_file update_engine_log_data_file system_app_data_file backup_data_file apex_art_data_file ))))
+(typeattributeset base_typeattr_1004 (and (domain ) (not (init system_server ueventd vendor_init ))))
 (typeattribute base_typeattr_1003)
-(typeattributeset base_typeattr_1003 (and (domain ) (not (dumpstate perfetto platform_app shell system_server traced traceur_app ))))
+(typeattributeset base_typeattr_1003 (and (dev_type ) (not (vd_device frp_block_device ))))
 (typeattribute base_typeattr_1002)
-(typeattributeset base_typeattr_1002 (and (data_file_type ) (not (trace_data_file perfetto_traces_data_file ))))
+(typeattributeset base_typeattr_1002 (and (dev_type ) (not (frp_block_device ))))
 (typeattribute base_typeattr_1001)
-(typeattributeset base_typeattr_1001 (and (data_file_type ) (not (system_data_root_file system_data_file system_userdir_file vendor_data_file vendor_userdir_file media_userdir_file perfetto_traces_data_file ))))
+(typeattributeset base_typeattr_1001 (and (domain ) (not (flags_health_check init system_server ))))
 (typeattribute base_typeattr_1000)
-(typeattributeset base_typeattr_1000 (and (fs_type file_type ) (not (toolbox_exec ))))
+(typeattributeset base_typeattr_1000 (and (domain ) (not (app_zygote init system_server webview_zygote zygote ))))
 (typeattribute base_typeattr_999)
-(typeattributeset base_typeattr_999 (and (domain ) (not (dumpstate init tombstoned vendor_init ))))
+(typeattributeset base_typeattr_999 (and (domain ) (not (crash_dump init system_server ))))
 (typeattribute base_typeattr_998)
-(typeattributeset base_typeattr_998 (and (domain ) (not (system_suspend_server ))))
+(typeattributeset base_typeattr_998 (and (domain ) (not (crash_dump perfetto clatd trace_redactor ))))
 (typeattribute base_typeattr_997)
-(typeattributeset base_typeattr_997 (and (domain ) (not (system_suspend_internal_server atrace dumpstate system_server traceur_app ))))
+(typeattributeset base_typeattr_997 (and (file_type ) (not (logcat_exec toolbox_exec ))))
 (typeattribute base_typeattr_996)
-(typeattributeset base_typeattr_996 (and (domain ) (not (system_suspend_internal_server ))))
+(typeattributeset base_typeattr_996 (and (app_data_file_type ) (not (radio_data_file system_app_data_file ))))
 (typeattribute base_typeattr_995)
-(typeattributeset base_typeattr_995 (and (domain ) (not (atrace bluetooth dumpstate system_server traceur_app system_suspend ))))
+(typeattributeset base_typeattr_995 (and (domain ) (not (init system_app ))))
 (typeattribute base_typeattr_994)
-(typeattributeset base_typeattr_994 (and (domain ) (not (system_suspend ))))
+(typeattributeset base_typeattr_994 (and (service_manager_type ) (not (apex_service default_android_service dnsresolver_service dumpstate_service installd_service lpdump_service mdns_service netd_service system_suspend_control_internal_service system_suspend_control_service virtual_touchpad_service vold_service tracingproxy_service ))))
 (typeattribute base_typeattr_993)
-(typeattributeset base_typeattr_993 (and (domain ) (not (init shell system_server vendor_init ))))
+(typeattributeset base_typeattr_993 (and (domain ) (not (crash_dump llkd runas_app simpleperf system_app ))))
 (typeattribute base_typeattr_992)
-(typeattributeset base_typeattr_992 (and (domain ) (not (init system_server ueventd vendor_init ))))
+(typeattributeset base_typeattr_992 (and (appdomain ) (not (runas_app shell simpleperf system_app ))))
 (typeattribute base_typeattr_991)
-(typeattributeset base_typeattr_991 (and (dev_type ) (not (vd_device frp_block_device ))))
+(typeattributeset base_typeattr_991 (and (system_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_990)
-(typeattributeset base_typeattr_990 (and (dev_type ) (not (frp_block_device ))))
+(typeattributeset base_typeattr_990 (and (domain ) (not (system_app ))))
 (typeattribute base_typeattr_989)
-(typeattributeset base_typeattr_989 (and (domain ) (not (flags_health_check init system_server ))))
+(typeattributeset base_typeattr_989 (and (domain ) (not (surfaceflinger ))))
 (typeattribute base_typeattr_988)
-(typeattributeset base_typeattr_988 (and (domain ) (not (app_zygote init system_server webview_zygote zygote ))))
+(typeattributeset base_typeattr_988 (and (domain ) (not (crash_dump llkd runas_app simpleperf su ))))
 (typeattribute base_typeattr_987)
-(typeattributeset base_typeattr_987 (and (domain ) (not (crash_dump init system_server ))))
+(typeattributeset base_typeattr_987 (and (appdomain ) (not (runas_app shell simpleperf su ))))
 (typeattribute base_typeattr_986)
-(typeattributeset base_typeattr_986 (and (domain ) (not (crash_dump perfetto clatd trace_redactor ))))
+(typeattributeset base_typeattr_986 (and (su ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_985)
-(typeattributeset base_typeattr_985 (and (file_type ) (not (logcat_exec toolbox_exec ))))
+(typeattributeset base_typeattr_985 (and (domain ) (not (storaged ))))
 (typeattribute base_typeattr_984)
-(typeattributeset base_typeattr_984 (and (app_data_file_type ) (not (radio_data_file system_app_data_file ))))
+(typeattributeset base_typeattr_984 (and (domain ) (not (init statsd system_server vold ))))
 (typeattribute base_typeattr_983)
-(typeattributeset base_typeattr_983 (and (domain ) (not (init system_app ))))
+(typeattributeset base_typeattr_983 (and (domain ) (not (init statsd vold ))))
 (typeattribute base_typeattr_982)
-(typeattributeset base_typeattr_982 (and (service_manager_type ) (not (apex_service default_android_service dnsresolver_service dumpstate_service installd_service lpdump_service mdns_service netd_service system_suspend_control_internal_service system_suspend_control_service virtual_touchpad_service vold_service tracingproxy_service ))))
+(typeattributeset base_typeattr_982 (and (domain ) (not (stats_service_server ))))
 (typeattribute base_typeattr_981)
-(typeattributeset base_typeattr_981 (and (domain ) (not (crash_dump llkd runas_app simpleperf system_app ))))
+(typeattributeset base_typeattr_981 (and (domain ) (not (statsd ))))
 (typeattribute base_typeattr_980)
-(typeattributeset base_typeattr_980 (and (appdomain ) (not (runas_app shell simpleperf system_app ))))
+(typeattributeset base_typeattr_980 (and (domain ) (not (fastbootd init recovery shell update_engine snapshotctl ))))
 (typeattribute base_typeattr_979)
-(typeattributeset base_typeattr_979 (and (system_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_979 (and (domain ) (not (snapuserd ))))
 (typeattribute base_typeattr_978)
-(typeattributeset base_typeattr_978 (and (domain ) (not (system_app ))))
+(typeattributeset base_typeattr_978 (and (domain ) (not (init snapuserd ))))
 (typeattribute base_typeattr_977)
-(typeattributeset base_typeattr_977 (and (domain ) (not (surfaceflinger ))))
+(typeattributeset base_typeattr_977 (and (simpleperf ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_976)
-(typeattributeset base_typeattr_976 (and (domain ) (not (crash_dump llkd runas_app simpleperf su ))))
+(typeattributeset base_typeattr_976 (and (domain ) (not (simpleperf ))))
 (typeattribute base_typeattr_975)
-(typeattributeset base_typeattr_975 (and (appdomain ) (not (runas_app shell simpleperf su ))))
+(typeattributeset base_typeattr_975 (and (untrusted_app_all ephemeral_app isolated_app platform_app priv_app ) (not (runas_app ))))
 (typeattribute base_typeattr_974)
-(typeattributeset base_typeattr_974 (and (su ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_974 (and (domain ) (not (dumpstate init shell ))))
 (typeattribute base_typeattr_973)
-(typeattributeset base_typeattr_973 (and (domain ) (not (storaged ))))
+(typeattributeset base_typeattr_973 (and (service_manager_type ) (not (apex_service default_android_service dnsresolver_service gatekeeper_service incident_service installd_service mdns_service netd_service system_suspend_control_internal_service system_suspend_control_service virtualization_service virtual_touchpad_service vold_service hal_keymint_service hal_secureclock_service hal_sharedsecret_service ))))
 (typeattribute base_typeattr_972)
-(typeattributeset base_typeattr_972 (and (domain ) (not (init statsd system_server vold ))))
+(typeattributeset base_typeattr_972 (and (domain ) (not (crash_dump llkd runas_app shell simpleperf ))))
 (typeattribute base_typeattr_971)
-(typeattributeset base_typeattr_971 (and (domain ) (not (init statsd vold ))))
+(typeattributeset base_typeattr_971 (and (shell ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_970)
-(typeattributeset base_typeattr_970 (and (domain ) (not (stats_service_server ))))
+(typeattributeset base_typeattr_970 (and (domain ) (not (crash_dump llkd runas_app shared_relro simpleperf ))))
 (typeattribute base_typeattr_969)
-(typeattributeset base_typeattr_969 (and (domain ) (not (statsd ))))
+(typeattributeset base_typeattr_969 (and (appdomain ) (not (runas_app shared_relro shell simpleperf ))))
 (typeattribute base_typeattr_968)
-(typeattributeset base_typeattr_968 (and (domain ) (not (fastbootd init recovery shell update_engine snapshotctl ))))
+(typeattributeset base_typeattr_968 (and (shared_relro ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_967)
-(typeattributeset base_typeattr_967 (and (domain ) (not (snapuserd ))))
+(typeattributeset base_typeattr_967 (and (domain ) (not (shared_relro ))))
 (typeattribute base_typeattr_966)
-(typeattributeset base_typeattr_966 (and (domain ) (not (init snapuserd ))))
+(typeattributeset base_typeattr_966 (and (fs_type file_type ) (not (sgdisk_exec ))))
 (typeattribute base_typeattr_965)
-(typeattributeset base_typeattr_965 (and (simpleperf ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_965 (and (domain ) (not (servicemanager ))))
 (typeattribute base_typeattr_964)
-(typeattributeset base_typeattr_964 (and (domain ) (not (simpleperf ))))
+(typeattributeset base_typeattr_964 (and (domain ) (not (hwservicemanager init vendor_init vndservicemanager ))))
 (typeattribute base_typeattr_963)
-(typeattributeset base_typeattr_963 (and (untrusted_app_all ephemeral_app isolated_app platform_app priv_app ) (not (runas_app ))))
+(typeattributeset base_typeattr_963 (not (service_manager_type vndservice_manager_type ) ))
 (typeattribute base_typeattr_962)
-(typeattributeset base_typeattr_962 (and (domain ) (not (dumpstate init shell ))))
+(typeattributeset base_typeattr_962 (and (domain ) (not (sensor_service_server ))))
 (typeattribute base_typeattr_961)
-(typeattributeset base_typeattr_961 (and (service_manager_type ) (not (apex_service default_android_service dnsresolver_service gatekeeper_service incident_service installd_service mdns_service netd_service system_suspend_control_internal_service system_suspend_control_service virtualization_service virtual_touchpad_service vold_service hal_keymint_service hal_secureclock_service hal_sharedsecret_service ))))
+(typeattributeset base_typeattr_961 (and (domain ) (not (crash_dump llkd runas_app secure_element simpleperf ))))
 (typeattribute base_typeattr_960)
-(typeattributeset base_typeattr_960 (and (domain ) (not (crash_dump llkd runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_960 (and (appdomain ) (not (runas_app secure_element shell simpleperf ))))
 (typeattribute base_typeattr_959)
-(typeattributeset base_typeattr_959 (and (shell ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_959 (and (secure_element ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_958)
-(typeattributeset base_typeattr_958 (and (domain ) (not (crash_dump llkd runas_app shared_relro simpleperf ))))
+(typeattributeset base_typeattr_958 (and (domain ) (not (secure_element ))))
 (typeattribute base_typeattr_957)
-(typeattributeset base_typeattr_957 (and (appdomain ) (not (runas_app shared_relro shell simpleperf ))))
+(typeattributeset base_typeattr_957 (and (domain ) (not (crash_dump llkd runas_app simpleperf sdk_sandbox_next ))))
 (typeattribute base_typeattr_956)
-(typeattributeset base_typeattr_956 (and (shared_relro ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_956 (and (appdomain ) (not (runas_app shell simpleperf sdk_sandbox_next ))))
 (typeattribute base_typeattr_955)
-(typeattributeset base_typeattr_955 (and (domain ) (not (shared_relro ))))
+(typeattributeset base_typeattr_955 (and (sdk_sandbox_next ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_954)
-(typeattributeset base_typeattr_954 (and (fs_type file_type ) (not (sgdisk_exec ))))
+(typeattributeset base_typeattr_954 (and (domain ) (not (sdk_sandbox_next ))))
 (typeattribute base_typeattr_953)
-(typeattributeset base_typeattr_953 (and (domain ) (not (servicemanager ))))
+(typeattributeset base_typeattr_953 (and (property_type ) (not (system_property_type ))))
 (typeattribute base_typeattr_952)
-(typeattributeset base_typeattr_952 (and (domain ) (not (hwservicemanager init vendor_init vndservicemanager ))))
+(typeattributeset base_typeattr_952 (and (domain ) (not (crash_dump llkd runas_app simpleperf sdk_sandbox_audit ))))
 (typeattribute base_typeattr_951)
-(typeattributeset base_typeattr_951 (not (service_manager_type vndservice_manager_type ) ))
+(typeattributeset base_typeattr_951 (and (appdomain ) (not (runas_app shell simpleperf sdk_sandbox_audit ))))
 (typeattribute base_typeattr_950)
-(typeattributeset base_typeattr_950 (and (domain ) (not (sensor_service_server ))))
+(typeattributeset base_typeattr_950 (and (sdk_sandbox_audit ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_949)
-(typeattributeset base_typeattr_949 (and (domain ) (not (crash_dump llkd runas_app secure_element simpleperf ))))
+(typeattributeset base_typeattr_949 (and (domain ) (not (sdk_sandbox_audit ))))
 (typeattribute base_typeattr_948)
-(typeattributeset base_typeattr_948 (and (appdomain ) (not (runas_app secure_element shell simpleperf ))))
+(typeattributeset base_typeattr_948 (and (domain ) (not (adbd sdk_sandbox_all ))))
 (typeattribute base_typeattr_947)
-(typeattributeset base_typeattr_947 (and (secure_element ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_947 (and (domain ) (not (adbd heapprofd logd netd prng_seeder su tombstoned traced traced_perf sdk_sandbox_all ))))
 (typeattribute base_typeattr_946)
-(typeattributeset base_typeattr_946 (and (domain ) (not (secure_element ))))
+(typeattributeset base_typeattr_946 (and (domain ) (not (init installd system_server vold_prepare_subdirs zygote sdk_sandbox_all ))))
 (typeattribute base_typeattr_945)
-(typeattributeset base_typeattr_945 (and (domain ) (not (crash_dump llkd runas_app simpleperf sdk_sandbox_next ))))
+(typeattributeset base_typeattr_945 (and (domain ) (not (init installd system_server vold_prepare_subdirs ))))
 (typeattribute base_typeattr_944)
-(typeattributeset base_typeattr_944 (and (appdomain ) (not (runas_app shell simpleperf sdk_sandbox_next ))))
+(typeattributeset base_typeattr_944 (and (app_data_file_type ) (not (shell_data_file radio_data_file sdk_sandbox_data_file ))))
 (typeattribute base_typeattr_943)
-(typeattributeset base_typeattr_943 (and (sdk_sandbox_next ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_943 (and (domain ) (not (crash_dump llkd runas_app simpleperf sdk_sandbox_34 ))))
 (typeattribute base_typeattr_942)
-(typeattributeset base_typeattr_942 (and (domain ) (not (sdk_sandbox_next ))))
+(typeattributeset base_typeattr_942 (and (appdomain ) (not (runas_app shell simpleperf sdk_sandbox_34 ))))
 (typeattribute base_typeattr_941)
-(typeattributeset base_typeattr_941 (and (property_type ) (not (system_property_type ))))
+(typeattributeset base_typeattr_941 (and (sdk_sandbox_34 ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_940)
-(typeattributeset base_typeattr_940 (and (domain ) (not (crash_dump llkd runas_app simpleperf sdk_sandbox_audit ))))
+(typeattributeset base_typeattr_940 (and (domain ) (not (sdk_sandbox_34 ))))
 (typeattribute base_typeattr_939)
-(typeattributeset base_typeattr_939 (and (appdomain ) (not (runas_app shell simpleperf sdk_sandbox_audit ))))
+(typeattributeset base_typeattr_939 (and (domain ) (not (scheduler_service_server ))))
 (typeattribute base_typeattr_938)
-(typeattributeset base_typeattr_938 (and (sdk_sandbox_audit ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_938 (and (domain ) (not (crash_dump llkd runas_app simpleperf ))))
 (typeattribute base_typeattr_937)
-(typeattributeset base_typeattr_937 (and (domain ) (not (sdk_sandbox_audit ))))
+(typeattributeset base_typeattr_937 (and (appdomain ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_936)
-(typeattributeset base_typeattr_936 (and (domain ) (not (adbd sdk_sandbox_all ))))
+(typeattributeset base_typeattr_936 (and (runas_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_935)
-(typeattributeset base_typeattr_935 (and (domain ) (not (adbd heapprofd logd netd prng_seeder su tombstoned traced traced_perf sdk_sandbox_all ))))
+(typeattributeset base_typeattr_935 (and (domain ) (not (runas_app ))))
 (typeattribute base_typeattr_934)
-(typeattributeset base_typeattr_934 (and (domain ) (not (init installd system_server vold_prepare_subdirs zygote sdk_sandbox_all ))))
+(typeattributeset base_typeattr_934 (and (appdomain ) (not (system_app ))))
 (typeattribute base_typeattr_933)
-(typeattributeset base_typeattr_933 (and (domain ) (not (init installd system_server vold_prepare_subdirs ))))
+(typeattributeset base_typeattr_933 (and (domain ) (not (crash_dump llkd rkpdapp runas_app simpleperf ))))
 (typeattribute base_typeattr_932)
-(typeattributeset base_typeattr_932 (and (app_data_file_type ) (not (shell_data_file radio_data_file sdk_sandbox_data_file ))))
+(typeattributeset base_typeattr_932 (and (appdomain ) (not (rkpdapp runas_app shell simpleperf ))))
 (typeattribute base_typeattr_931)
-(typeattributeset base_typeattr_931 (and (domain ) (not (crash_dump llkd runas_app simpleperf sdk_sandbox_34 ))))
+(typeattributeset base_typeattr_931 (and (rkpdapp ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_930)
-(typeattributeset base_typeattr_930 (and (appdomain ) (not (runas_app shell simpleperf sdk_sandbox_34 ))))
+(typeattributeset base_typeattr_930 (and (domain ) (not (rkpdapp ))))
 (typeattribute base_typeattr_929)
-(typeattributeset base_typeattr_929 (and (sdk_sandbox_34 ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_929 (and (domain ) (not (rkpd ))))
 (typeattribute base_typeattr_928)
-(typeattributeset base_typeattr_928 (and (domain ) (not (sdk_sandbox_34 ))))
+(typeattributeset base_typeattr_928 (and (domain ) (not (rkp_cert_processor ))))
 (typeattribute base_typeattr_927)
-(typeattributeset base_typeattr_927 (and (domain ) (not (scheduler_service_server ))))
+(typeattributeset base_typeattr_927 (and (domain ) (not (remote_provisioning_service_server ))))
 (typeattribute base_typeattr_926)
-(typeattributeset base_typeattr_926 (and (domain ) (not (crash_dump llkd runas_app simpleperf ))))
+(typeattributeset base_typeattr_926 (and (file_type ) (not (coredump_file ))))
 (typeattribute base_typeattr_925)
-(typeattributeset base_typeattr_925 (and (appdomain ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_925 (and (file_type ) (not (coredump_file recovery_data_file ))))
 (typeattribute base_typeattr_924)
-(typeattributeset base_typeattr_924 (and (runas_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_924 (and (data_file_type ) (not (cache_file cache_recovery_file ))))
 (typeattribute base_typeattr_923)
-(typeattributeset base_typeattr_923 (and (domain ) (not (runas_app ))))
+(typeattributeset base_typeattr_923 (and (domain ) (not (init radio ))))
 (typeattribute base_typeattr_922)
-(typeattributeset base_typeattr_922 (and (appdomain ) (not (system_app ))))
+(typeattributeset base_typeattr_922 (and (domain ) (not (crash_dump llkd radio runas_app simpleperf ))))
 (typeattribute base_typeattr_921)
-(typeattributeset base_typeattr_921 (and (domain ) (not (crash_dump llkd rkpdapp runas_app simpleperf ))))
+(typeattributeset base_typeattr_921 (and (appdomain ) (not (radio runas_app shell simpleperf ))))
 (typeattribute base_typeattr_920)
-(typeattributeset base_typeattr_920 (and (appdomain ) (not (rkpdapp runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_920 (and (radio ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_919)
-(typeattributeset base_typeattr_919 (and (rkpdapp ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_919 (and (domain ) (not (radio ))))
 (typeattribute base_typeattr_918)
-(typeattributeset base_typeattr_918 (and (domain ) (not (rkpdapp ))))
+(typeattributeset base_typeattr_918 (and (domain ) (not (init shell su ))))
 (typeattribute base_typeattr_917)
-(typeattributeset base_typeattr_917 (and (domain ) (not (rkpd ))))
+(typeattributeset base_typeattr_917 (and (appdomain ) (not (system_app device_as_webcam ))))
 (typeattribute base_typeattr_916)
-(typeattributeset base_typeattr_916 (and (domain ) (not (rkp_cert_processor ))))
+(typeattributeset base_typeattr_916 (and (domain ) (not (dumpstate init profcollectd ))))
 (typeattribute base_typeattr_915)
-(typeattributeset base_typeattr_915 (and (domain ) (not (remote_provisioning_service_server ))))
+(typeattributeset base_typeattr_915 (and (domain ) (not (coredomain apexd dumpstate vendor_init ))))
 (typeattribute base_typeattr_914)
-(typeattributeset base_typeattr_914 (and (file_type ) (not (coredump_file ))))
+(typeattributeset base_typeattr_914 (and (domain ) (not (coredomain apexd dumpstate init ))))
 (typeattribute base_typeattr_913)
-(typeattributeset base_typeattr_913 (and (file_type ) (not (coredump_file recovery_data_file ))))
+(typeattributeset base_typeattr_913 (and (domain ) (not (init keystore rkpdapp shell system_server ))))
 (typeattribute base_typeattr_912)
-(typeattributeset base_typeattr_912 (and (data_file_type ) (not (cache_file cache_recovery_file ))))
+(typeattributeset base_typeattr_912 (and (domain ) (not (hal_dumpstate_server dumpstate init ))))
 (typeattribute base_typeattr_911)
-(typeattributeset base_typeattr_911 (and (domain ) (not (init radio ))))
+(typeattributeset base_typeattr_911 (and (domain ) (not (appdomain dumpstate init vendor_init ))))
 (typeattribute base_typeattr_910)
-(typeattributeset base_typeattr_910 (and (domain ) (not (crash_dump llkd radio runas_app simpleperf ))))
+(typeattributeset base_typeattr_910 (and (domain ) (not (dumpstate init system_app vendor_init ))))
 (typeattribute base_typeattr_909)
-(typeattributeset base_typeattr_909 (and (appdomain ) (not (radio runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_909 (and (domain ) (not (init surfaceflinger ))))
 (typeattribute base_typeattr_908)
-(typeattributeset base_typeattr_908 (and (radio ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_908 (and (domain ) (not (appdomain hal_telephony_server init radio ))))
 (typeattribute base_typeattr_907)
-(typeattributeset base_typeattr_907 (and (domain ) (not (radio ))))
+(typeattributeset base_typeattr_907 (and (domain ) (not (init shell kcmdlinectrl ))))
 (typeattribute base_typeattr_906)
-(typeattributeset base_typeattr_906 (and (domain ) (not (init shell su ))))
+(typeattributeset base_typeattr_906 (and (domain ) (not (init shell system_app system_server mtectrl ))))
 (typeattribute base_typeattr_905)
-(typeattributeset base_typeattr_905 (and (appdomain ) (not (system_app device_as_webcam ))))
+(typeattributeset base_typeattr_905 (and (domain ) (not (adbd init adbd_tradeinmode ))))
 (typeattribute base_typeattr_904)
-(typeattributeset base_typeattr_904 (and (domain ) (not (dumpstate init profcollectd ))))
+(typeattributeset base_typeattr_904 (and (domain ) (not (adbd init system_server vendor_init adbd_tradeinmode ))))
 (typeattribute base_typeattr_903)
-(typeattributeset base_typeattr_903 (and (domain ) (not (coredomain apexd dumpstate vendor_init ))))
+(typeattributeset base_typeattr_903 (and (property_type ) (not (extended_core_property_type system_property_type ))))
 (typeattribute base_typeattr_902)
-(typeattributeset base_typeattr_902 (and (domain ) (not (coredomain apexd dumpstate init ))))
+(typeattributeset base_typeattr_902 (and (coredomain ) (not (system_writes_vendor_properties_violators init ))))
 (typeattribute base_typeattr_901)
-(typeattributeset base_typeattr_901 (and (domain ) (not (init keystore rkpdapp shell system_server ))))
+(typeattributeset base_typeattr_901 (and (domain ) (not (dumpstate init system_suspend ))))
 (typeattribute base_typeattr_900)
-(typeattributeset base_typeattr_900 (and (domain ) (not (hal_dumpstate_server dumpstate init ))))
+(typeattributeset base_typeattr_900 (and (domain ) (not (appdomain coredomain hal_power_server vendor_init ))))
 (typeattribute base_typeattr_899)
-(typeattributeset base_typeattr_899 (and (domain ) (not (appdomain dumpstate init vendor_init ))))
+(typeattributeset base_typeattr_899 (and (core_property_type extended_core_property_type dalvik_config_prop_type exported3_system_prop systemsound_config_prop ) (not (dalvik_dynamic_config_prop debug_prop logd_prop nfc_prop powerctl_prop radio_prop ))))
 (typeattribute base_typeattr_898)
-(typeattributeset base_typeattr_898 (and (domain ) (not (dumpstate init system_app vendor_init ))))
+(typeattributeset base_typeattr_898 (and (domain ) (not (hal_wifi_server dumpstate init vendor_init wificond ))))
 (typeattribute base_typeattr_897)
-(typeattributeset base_typeattr_897 (and (domain ) (not (init surfaceflinger ))))
+(typeattributeset base_typeattr_897 (and (domain ) (not (coredomain hal_wifi_server wificond ))))
 (typeattribute base_typeattr_896)
-(typeattributeset base_typeattr_896 (and (domain ) (not (appdomain hal_telephony_server init radio ))))
+(typeattributeset base_typeattr_896 (and (domain ) (not (coredomain hal_camera_server cameraserver vendor_init ))))
 (typeattribute base_typeattr_895)
-(typeattributeset base_typeattr_895 (and (domain ) (not (init shell kcmdlinectrl ))))
+(typeattributeset base_typeattr_895 (and (domain ) (not (coredomain hal_bluetooth_server bluetooth vendor_init ))))
 (typeattribute base_typeattr_894)
-(typeattributeset base_typeattr_894 (and (domain ) (not (init shell system_app system_server mtectrl ))))
+(typeattributeset base_typeattr_894 (and (domain ) (not (coredomain hal_bluetooth_server bluetooth ))))
 (typeattribute base_typeattr_893)
-(typeattributeset base_typeattr_893 (and (domain ) (not (adbd init adbd_tradeinmode ))))
+(typeattributeset base_typeattr_893 (and (domain ) (not (appdomain coredomain hal_telephony_server ))))
 (typeattribute base_typeattr_892)
-(typeattributeset base_typeattr_892 (and (domain ) (not (adbd init system_server vendor_init adbd_tradeinmode ))))
+(typeattributeset base_typeattr_892 (and (domain ) (not (appdomain coredomain hal_telephony_server vendor_init ))))
 (typeattribute base_typeattr_891)
-(typeattributeset base_typeattr_891 (and (property_type ) (not (extended_core_property_type system_property_type ))))
+(typeattributeset base_typeattr_891 (and (domain ) (not (appdomain coredomain hal_nfc_server ))))
 (typeattribute base_typeattr_890)
-(typeattributeset base_typeattr_890 (and (coredomain ) (not (system_writes_vendor_properties_violators init ))))
+(typeattributeset base_typeattr_890 (and (core_property_type extended_core_property_type exported3_system_prop exported_dumpstate_prop exported_config_prop exported_default_prop exported_system_prop usb_control_prop ) (not (nfc_prop powerctl_prop radio_prop ))))
 (typeattribute base_typeattr_889)
-(typeattributeset base_typeattr_889 (and (domain ) (not (dumpstate init system_suspend ))))
+(typeattributeset base_typeattr_889 (and (domain ) (not (appdomain coredomain vendor_init ))))
 (typeattribute base_typeattr_888)
-(typeattributeset base_typeattr_888 (and (domain ) (not (appdomain coredomain hal_power_server vendor_init ))))
+(typeattributeset base_typeattr_888 (and (domain ) (not (init su misctrl ))))
 (typeattribute base_typeattr_887)
-(typeattributeset base_typeattr_887 (and (core_property_type extended_core_property_type dalvik_config_prop_type exported3_system_prop systemsound_config_prop ) (not (dalvik_dynamic_config_prop debug_prop logd_prop nfc_prop powerctl_prop radio_prop ))))
+(typeattributeset base_typeattr_887 (and (domain ) (not (crash_dump dumpstate init statsd su misctrl ))))
 (typeattribute base_typeattr_886)
-(typeattributeset base_typeattr_886 (and (domain ) (not (hal_wifi_server dumpstate init vendor_init wificond ))))
+(typeattributeset base_typeattr_886 (and (domain ) (not (dumpstate init su ))))
 (typeattribute base_typeattr_885)
-(typeattributeset base_typeattr_885 (and (domain ) (not (coredomain hal_wifi_server wificond ))))
+(typeattributeset base_typeattr_885 (and (domain ) (not (extra_free_kbytes init ))))
 (typeattribute base_typeattr_884)
-(typeattributeset base_typeattr_884 (and (domain ) (not (coredomain hal_camera_server cameraserver vendor_init ))))
+(typeattributeset base_typeattr_884 (and (core_property_type ) (not (fingerprint_prop restorecon_prop usb_prop config_prop cppreopt_prop dalvik_prop debuggerd_prop dhcp_prop dumpstate_prop net_radio_prop pan_result_prop persist_debug_prop shell_prop vold_prop audio_prop debug_prop logd_prop nfc_prop ota_prop powerctl_prop radio_prop system_prop ))))
 (typeattribute base_typeattr_883)
-(typeattributeset base_typeattr_883 (and (domain ) (not (coredomain hal_bluetooth_server bluetooth vendor_init ))))
+(typeattributeset base_typeattr_883 (and (vendor_property_type ) (not (vendor_public_property_type ))))
 (typeattribute base_typeattr_882)
-(typeattributeset base_typeattr_882 (and (domain ) (not (coredomain hal_bluetooth_server bluetooth ))))
+(typeattributeset base_typeattr_882 (and (vendor_property_type vendor_internal_property_type ) (not (vendor_restricted_property_type vendor_public_property_type ))))
 (typeattribute base_typeattr_881)
-(typeattributeset base_typeattr_881 (and (domain ) (not (appdomain coredomain hal_telephony_server ))))
+(typeattributeset base_typeattr_881 (and (system_property_type ) (not (system_public_property_type ))))
 (typeattribute base_typeattr_880)
-(typeattributeset base_typeattr_880 (and (domain ) (not (appdomain coredomain hal_telephony_server vendor_init ))))
+(typeattributeset base_typeattr_880 (and (system_property_type system_internal_property_type ) (not (system_restricted_property_type system_public_property_type ))))
 (typeattribute base_typeattr_879)
-(typeattributeset base_typeattr_879 (and (domain ) (not (appdomain coredomain hal_nfc_server ))))
+(typeattributeset base_typeattr_879 (and (property_type ) (not (system_property_type vendor_property_type ))))
 (typeattribute base_typeattr_878)
-(typeattributeset base_typeattr_878 (and (core_property_type extended_core_property_type exported3_system_prop exported_dumpstate_prop exported_config_prop exported_default_prop exported_system_prop usb_control_prop ) (not (nfc_prop powerctl_prop radio_prop ))))
+(typeattributeset base_typeattr_878 (and (domain ) (not (profcollectd ))))
 (typeattribute base_typeattr_877)
-(typeattributeset base_typeattr_877 (and (domain ) (not (appdomain coredomain vendor_init ))))
+(typeattributeset base_typeattr_877 (and (app_data_file_type ) (not (privapp_data_file ))))
 (typeattribute base_typeattr_876)
-(typeattributeset base_typeattr_876 (and (domain ) (not (init su misctrl ))))
+(typeattributeset base_typeattr_876 (and (domain ) (not (crash_dump llkd priv_app runas_app simpleperf ))))
 (typeattribute base_typeattr_875)
-(typeattributeset base_typeattr_875 (and (domain ) (not (crash_dump dumpstate init statsd su misctrl ))))
+(typeattributeset base_typeattr_875 (and (appdomain ) (not (priv_app runas_app shell simpleperf ))))
 (typeattribute base_typeattr_874)
-(typeattributeset base_typeattr_874 (and (domain ) (not (dumpstate init su ))))
+(typeattributeset base_typeattr_874 (and (priv_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_873)
-(typeattributeset base_typeattr_873 (and (domain ) (not (extra_free_kbytes init ))))
+(typeattributeset base_typeattr_873 (and (domain ) (not (priv_app ))))
 (typeattribute base_typeattr_872)
-(typeattributeset base_typeattr_872 (and (core_property_type ) (not (fingerprint_prop restorecon_prop usb_prop config_prop cppreopt_prop dalvik_prop debuggerd_prop dhcp_prop dumpstate_prop net_radio_prop pan_result_prop persist_debug_prop shell_prop vold_prop audio_prop debug_prop logd_prop nfc_prop ota_prop powerctl_prop radio_prop system_prop ))))
+(typeattributeset base_typeattr_872 (and (domain ) (not (init shell ))))
 (typeattribute base_typeattr_871)
-(typeattributeset base_typeattr_871 (and (vendor_property_type ) (not (vendor_public_property_type ))))
+(typeattributeset base_typeattr_871 (and (domain ) (not (recovery update_engine ))))
 (typeattribute base_typeattr_870)
-(typeattributeset base_typeattr_870 (and (vendor_property_type vendor_internal_property_type ) (not (vendor_restricted_property_type vendor_public_property_type ))))
+(typeattributeset base_typeattr_870 (and (domain ) (not (init platform_app shell ))))
 (typeattribute base_typeattr_869)
-(typeattributeset base_typeattr_869 (and (system_property_type ) (not (system_public_property_type ))))
+(typeattributeset base_typeattr_869 (and (domain ) (not (domain dumpstate init ))))
 (typeattribute base_typeattr_868)
-(typeattributeset base_typeattr_868 (and (system_property_type system_internal_property_type ) (not (system_restricted_property_type system_public_property_type ))))
+(typeattributeset base_typeattr_868 (and (domain ) (not (crash_dump llkd platform_app runas_app simpleperf ))))
 (typeattribute base_typeattr_867)
-(typeattributeset base_typeattr_867 (and (property_type ) (not (system_property_type vendor_property_type ))))
+(typeattributeset base_typeattr_867 (and (appdomain ) (not (platform_app runas_app shell simpleperf ))))
 (typeattribute base_typeattr_866)
-(typeattributeset base_typeattr_866 (and (domain ) (not (profcollectd ))))
+(typeattributeset base_typeattr_866 (and (platform_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_865)
-(typeattributeset base_typeattr_865 (and (app_data_file_type ) (not (privapp_data_file ))))
+(typeattributeset base_typeattr_865 (and (domain ) (not (platform_app ))))
 (typeattribute base_typeattr_864)
-(typeattributeset base_typeattr_864 (and (domain ) (not (crash_dump llkd priv_app runas_app simpleperf ))))
+(typeattributeset base_typeattr_864 (and (domain ) (not (crash_dump llkd runas_app simpleperf permissioncontroller_app ))))
 (typeattribute base_typeattr_863)
-(typeattributeset base_typeattr_863 (and (appdomain ) (not (priv_app runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_863 (and (appdomain ) (not (runas_app shell simpleperf permissioncontroller_app ))))
 (typeattribute base_typeattr_862)
-(typeattributeset base_typeattr_862 (and (priv_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_862 (and (permissioncontroller_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_861)
-(typeattributeset base_typeattr_861 (and (domain ) (not (priv_app ))))
+(typeattributeset base_typeattr_861 (and (domain ) (not (permissioncontroller_app ))))
 (typeattribute base_typeattr_860)
-(typeattributeset base_typeattr_860 (and (domain ) (not (init shell ))))
+(typeattributeset base_typeattr_860 (and (domain ) (not (performanced ))))
 (typeattribute base_typeattr_859)
-(typeattributeset base_typeattr_859 (and (domain ) (not (recovery update_engine ))))
+(typeattributeset base_typeattr_859 (and (data_file_type ) (not (perfetto_traces_data_file perfetto_traces_bugreport_data_file perfetto_traces_profiling_data_file perfetto_configs_data_file ))))
 (typeattribute base_typeattr_858)
-(typeattributeset base_typeattr_858 (and (domain ) (not (init platform_app shell ))))
+(typeattributeset base_typeattr_858 (and (system_data_file ) (not (perfetto_traces_data_file perfetto_traces_profiling_data_file ))))
 (typeattribute base_typeattr_857)
-(typeattributeset base_typeattr_857 (and (domain ) (not (domain dumpstate init ))))
+(typeattributeset base_typeattr_857 (and (data_file_type ) (not (system_data_root_file system_data_file system_userdir_file vendor_data_file vendor_userdir_file media_userdir_file perfetto_traces_data_file perfetto_traces_bugreport_data_file perfetto_traces_profiling_data_file perfetto_configs_data_file ))))
 (typeattribute base_typeattr_856)
-(typeattributeset base_typeattr_856 (and (domain ) (not (crash_dump llkd platform_app runas_app simpleperf ))))
+(typeattributeset base_typeattr_856 (and (domain ) (not (adbd incidentd init perfetto shell traced trace_redactor ))))
 (typeattribute base_typeattr_855)
-(typeattributeset base_typeattr_855 (and (appdomain ) (not (platform_app runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_855 (and (domain ) (not (adbd dumpstate incidentd init perfetto priv_app shell system_server traced trace_redactor ))))
 (typeattribute base_typeattr_854)
-(typeattributeset base_typeattr_854 (and (platform_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_854 (and (domain ) (not (init vendor_init ot_ctl ot_daemon ))))
 (typeattribute base_typeattr_853)
-(typeattributeset base_typeattr_853 (and (domain ) (not (platform_app ))))
+(typeattributeset base_typeattr_853 (and (domain ) (not (ot_daemon ))))
 (typeattribute base_typeattr_852)
-(typeattributeset base_typeattr_852 (and (domain ) (not (crash_dump llkd runas_app simpleperf permissioncontroller_app ))))
+(typeattributeset base_typeattr_852 (and (domain ) (not (init odsign ))))
 (typeattribute base_typeattr_851)
-(typeattributeset base_typeattr_851 (and (appdomain ) (not (runas_app shell simpleperf permissioncontroller_app ))))
+(typeattributeset base_typeattr_851 (and (domain ) (not (init system_server odrefresh ))))
 (typeattribute base_typeattr_850)
-(typeattributeset base_typeattr_850 (and (permissioncontroller_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_850 (and (domain ) (not (artd init system_server odrefresh ))))
 (typeattribute base_typeattr_849)
-(typeattributeset base_typeattr_849 (and (domain ) (not (permissioncontroller_app ))))
+(typeattributeset base_typeattr_849 (and (domain ) (not (init compos_fd_server odrefresh ))))
 (typeattribute base_typeattr_848)
-(typeattributeset base_typeattr_848 (and (domain ) (not (performanced ))))
+(typeattributeset base_typeattr_848 (and (domain ) (not (odrefresh ))))
 (typeattribute base_typeattr_847)
-(typeattributeset base_typeattr_847 (and (data_file_type ) (not (perfetto_traces_data_file perfetto_traces_bugreport_data_file perfetto_traces_profiling_data_file perfetto_configs_data_file ))))
+(typeattributeset base_typeattr_847 (and (domain ) (not (crash_dump llkd nfc runas_app simpleperf ))))
 (typeattribute base_typeattr_846)
-(typeattributeset base_typeattr_846 (and (system_data_file ) (not (perfetto_traces_data_file perfetto_traces_profiling_data_file ))))
+(typeattributeset base_typeattr_846 (and (appdomain ) (not (nfc runas_app shell simpleperf ))))
 (typeattribute base_typeattr_845)
-(typeattributeset base_typeattr_845 (and (data_file_type ) (not (system_data_root_file system_data_file system_userdir_file vendor_data_file vendor_userdir_file media_userdir_file perfetto_traces_data_file perfetto_traces_bugreport_data_file perfetto_traces_profiling_data_file perfetto_configs_data_file ))))
+(typeattributeset base_typeattr_845 (and (nfc ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_844)
-(typeattributeset base_typeattr_844 (and (domain ) (not (adbd incidentd init perfetto shell traced trace_redactor ))))
+(typeattributeset base_typeattr_844 (and (domain ) (not (nfc ))))
 (typeattribute base_typeattr_843)
-(typeattributeset base_typeattr_843 (and (domain ) (not (adbd dumpstate incidentd init perfetto priv_app shell system_server traced trace_redactor ))))
+(typeattributeset base_typeattr_843 (and (domain ) (not (crash_dump llkd network_stack runas_app simpleperf ))))
 (typeattribute base_typeattr_842)
-(typeattributeset base_typeattr_842 (and (domain ) (not (init vendor_init ot_ctl ot_daemon ))))
+(typeattributeset base_typeattr_842 (and (appdomain ) (not (network_stack runas_app shell simpleperf ))))
 (typeattribute base_typeattr_841)
-(typeattributeset base_typeattr_841 (and (domain ) (not (ot_daemon ))))
+(typeattributeset base_typeattr_841 (and (network_stack ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_840)
-(typeattributeset base_typeattr_840 (and (domain ) (not (init odsign ))))
+(typeattributeset base_typeattr_840 (and (domain ) (not (network_stack ))))
 (typeattribute base_typeattr_839)
-(typeattributeset base_typeattr_839 (and (domain ) (not (init system_server odrefresh ))))
+(typeattributeset base_typeattr_839 (and (domain ) (not (init netd ))))
 (typeattribute base_typeattr_838)
-(typeattributeset base_typeattr_838 (and (domain ) (not (artd init system_server odrefresh ))))
+(typeattributeset base_typeattr_838 (and (domain ) (not (dumpstate init netd ))))
 (typeattribute base_typeattr_837)
-(typeattributeset base_typeattr_837 (and (domain ) (not (init compos_fd_server odrefresh ))))
+(typeattributeset base_typeattr_837 (and (appdomain ) (not (network_stack su ))))
 (typeattribute base_typeattr_836)
-(typeattributeset base_typeattr_836 (and (domain ) (not (odrefresh ))))
+(typeattributeset base_typeattr_836 (and (domain ) (not (dumpstate netd netutils_wrapper network_stack system_server ))))
 (typeattribute base_typeattr_835)
-(typeattributeset base_typeattr_835 (and (domain ) (not (crash_dump llkd nfc runas_app simpleperf ))))
+(typeattributeset base_typeattr_835 (and (domain ) (not (netd ))))
 (typeattribute base_typeattr_834)
-(typeattributeset base_typeattr_834 (and (appdomain ) (not (nfc runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_834 (and (netdomain ) (not (untrusted_app_all ephemeral_app mediaprovider priv_app sdk_sandbox_all ))))
 (typeattribute base_typeattr_833)
-(typeattributeset base_typeattr_833 (and (nfc ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_833 (and (netdomain ) (not (ephemeral_app sdk_sandbox_all ))))
 (typeattribute base_typeattr_832)
-(typeattributeset base_typeattr_832 (and (domain ) (not (nfc ))))
+(typeattributeset base_typeattr_832 (and (domain ) (not (mmd ))))
 (typeattribute base_typeattr_831)
-(typeattributeset base_typeattr_831 (and (domain ) (not (crash_dump llkd network_stack runas_app simpleperf ))))
+(typeattributeset base_typeattr_831 (and (mlstrustedsubject ) (not (adbd artd installd runas system_server vold vold_prepare_subdirs zygote ))))
 (typeattribute base_typeattr_830)
-(typeattributeset base_typeattr_830 (and (appdomain ) (not (network_stack runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_830 (and (mlstrustedsubject ) (not (adbd artd installd runas system_server zygote ))))
 (typeattribute base_typeattr_829)
-(typeattributeset base_typeattr_829 (and (network_stack ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_829 (and (mlstrustedsubject ) (not (artd installd vold vold_prepare_subdirs ))))
 (typeattribute base_typeattr_828)
-(typeattributeset base_typeattr_828 (and (domain ) (not (network_stack ))))
+(typeattributeset base_typeattr_828 (and (mlstrustedsubject ) (not (artd installd ))))
 (typeattribute base_typeattr_827)
-(typeattributeset base_typeattr_827 (and (domain ) (not (init netd ))))
+(typeattributeset base_typeattr_827 (and (domain ) (not (microfuchsiad ))))
 (typeattribute base_typeattr_826)
-(typeattributeset base_typeattr_826 (and (domain ) (not (dumpstate init netd ))))
+(typeattributeset base_typeattr_826 (and (domain ) (not (mediatuner ))))
 (typeattribute base_typeattr_825)
-(typeattributeset base_typeattr_825 (and (appdomain ) (not (network_stack su ))))
+(typeattributeset base_typeattr_825 (and (domain ) (not (mediatranscoding ))))
 (typeattribute base_typeattr_824)
-(typeattributeset base_typeattr_824 (and (domain ) (not (dumpstate netd netutils_wrapper network_stack system_server ))))
+(typeattributeset base_typeattr_824 (and (domain ) (not (mediaserver ))))
 (typeattribute base_typeattr_823)
-(typeattributeset base_typeattr_823 (and (domain ) (not (netd ))))
+(typeattributeset base_typeattr_823 (and (domain ) (not (crash_dump llkd runas_app simpleperf mediaprovider_app ))))
 (typeattribute base_typeattr_822)
-(typeattributeset base_typeattr_822 (and (netdomain ) (not (untrusted_app_all ephemeral_app mediaprovider priv_app sdk_sandbox_all ))))
+(typeattributeset base_typeattr_822 (and (appdomain ) (not (runas_app shell simpleperf mediaprovider_app ))))
 (typeattribute base_typeattr_821)
-(typeattributeset base_typeattr_821 (and (netdomain ) (not (ephemeral_app sdk_sandbox_all ))))
+(typeattributeset base_typeattr_821 (and (mediaprovider_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_820)
-(typeattributeset base_typeattr_820 (and (domain ) (not (mmd ))))
+(typeattributeset base_typeattr_820 (and (domain ) (not (mediaprovider_app ))))
 (typeattribute base_typeattr_819)
-(typeattributeset base_typeattr_819 (and (mlstrustedsubject ) (not (adbd artd installd runas system_server zygote ))))
+(typeattributeset base_typeattr_819 (and (domain ) (not (crash_dump llkd mediaprovider runas_app simpleperf ))))
 (typeattribute base_typeattr_818)
-(typeattributeset base_typeattr_818 (and (mlstrustedsubject ) (not (artd installd ))))
+(typeattributeset base_typeattr_818 (and (appdomain ) (not (mediaprovider runas_app shell simpleperf ))))
 (typeattribute base_typeattr_817)
-(typeattributeset base_typeattr_817 (and (domain ) (not (mediatuner ))))
+(typeattributeset base_typeattr_817 (and (mediaprovider ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_816)
-(typeattributeset base_typeattr_816 (and (domain ) (not (mediatranscoding ))))
+(typeattributeset base_typeattr_816 (and (domain ) (not (mediaprovider ))))
 (typeattribute base_typeattr_815)
-(typeattributeset base_typeattr_815 (and (domain ) (not (mediaserver ))))
+(typeattributeset base_typeattr_815 (and (domain ) (not (mediametrics ))))
 (typeattribute base_typeattr_814)
-(typeattributeset base_typeattr_814 (and (domain ) (not (crash_dump llkd runas_app simpleperf mediaprovider_app ))))
+(typeattributeset base_typeattr_814 (and (data_file_type ) (not (apk_data_file ))))
 (typeattribute base_typeattr_813)
-(typeattributeset base_typeattr_813 (and (appdomain ) (not (runas_app shell simpleperf mediaprovider_app ))))
+(typeattributeset base_typeattr_813 (and (domain ) (not (mediaextractor ))))
 (typeattribute base_typeattr_812)
-(typeattributeset base_typeattr_812 (and (mediaprovider_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_812 (and (domain ) (not (mediadrmserver ))))
 (typeattribute base_typeattr_811)
-(typeattributeset base_typeattr_811 (and (domain ) (not (mediaprovider_app ))))
+(typeattributeset base_typeattr_811 (and (domain ) (not (dumpstate servicemanager shell lpdumpd ))))
 (typeattribute base_typeattr_810)
-(typeattributeset base_typeattr_810 (and (domain ) (not (crash_dump llkd mediaprovider runas_app simpleperf ))))
+(typeattributeset base_typeattr_810 (and (domain ) (not (dumpstate shell lpdumpd ))))
 (typeattribute base_typeattr_809)
-(typeattributeset base_typeattr_809 (and (appdomain ) (not (mediaprovider runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_809 (and (domain ) (not (lpdumpd ))))
 (typeattribute base_typeattr_808)
-(typeattributeset base_typeattr_808 (and (mediaprovider ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_808 (and (domain ) (not (init logd logpersist ))))
 (typeattribute base_typeattr_807)
-(typeattributeset base_typeattr_807 (and (domain ) (not (mediaprovider ))))
+(typeattributeset base_typeattr_807 (and (domain ) (not (dumpstate incidentd init logd logpersist ))))
 (typeattribute base_typeattr_806)
-(typeattributeset base_typeattr_806 (and (domain ) (not (mediametrics ))))
+(typeattributeset base_typeattr_806 (and (file_type ) (not (coredump_file misc_logd_file ))))
 (typeattribute base_typeattr_805)
-(typeattributeset base_typeattr_805 (and (data_file_type ) (not (apk_data_file ))))
+(typeattributeset base_typeattr_805 (and (domain ) (not (init logd ))))
 (typeattribute base_typeattr_804)
-(typeattributeset base_typeattr_804 (and (domain ) (not (mediaextractor ))))
+(typeattributeset base_typeattr_804 (and (app_data_file_type system_data_file packages_list_file ) (not (shell_data_file ))))
 (typeattribute base_typeattr_803)
-(typeattributeset base_typeattr_803 (and (domain ) (not (mediadrmserver ))))
+(typeattributeset base_typeattr_803 (and (domain ) (not (crash_dump llkd ))))
 (typeattribute base_typeattr_802)
-(typeattributeset base_typeattr_802 (and (domain ) (not (dumpstate servicemanager shell lpdumpd ))))
+(typeattributeset base_typeattr_802 (and (domain ) (not (logd ))))
 (typeattribute base_typeattr_801)
-(typeattributeset base_typeattr_801 (and (domain ) (not (dumpstate shell lpdumpd ))))
+(typeattributeset base_typeattr_801 (and (appdomain ) (not (bluetooth platform_app priv_app radio shell su system_app ))))
 (typeattribute base_typeattr_800)
-(typeattributeset base_typeattr_800 (and (domain ) (not (lpdumpd ))))
+(typeattributeset base_typeattr_800 (and (domain ) (not (appdomain bootstat dumpstate init logd logpersist servicemanager surfaceflinger system_server zygote ))))
 (typeattribute base_typeattr_799)
-(typeattributeset base_typeattr_799 (and (domain ) (not (init logd logpersist ))))
+(typeattributeset base_typeattr_799 (and (file_type ) (not (runtime_event_log_tags_file coredump_file shell_data_file misc_logd_file ))))
 (typeattribute base_typeattr_798)
-(typeattributeset base_typeattr_798 (and (domain ) (not (dumpstate incidentd init logd logpersist ))))
+(typeattributeset base_typeattr_798 (and (domain ) (not (init lmkd vendor_init ))))
 (typeattribute base_typeattr_797)
-(typeattributeset base_typeattr_797 (and (file_type ) (not (coredump_file misc_logd_file ))))
+(typeattributeset base_typeattr_797 (and (domain ) (not (apexd init kernel keystore llkd ueventd vendor_init ))))
 (typeattribute base_typeattr_796)
-(typeattributeset base_typeattr_796 (and (domain ) (not (init logd ))))
+(typeattributeset base_typeattr_796 (and (domain ) (not (init dexopt_chroot_setup linkerconfig otapreopt_chroot ))))
 (typeattribute base_typeattr_795)
-(typeattributeset base_typeattr_795 (and (app_data_file_type system_data_file packages_list_file ) (not (shell_data_file ))))
+(typeattributeset base_typeattr_795 (and (domain ) (not (init keystore ))))
 (typeattribute base_typeattr_794)
-(typeattributeset base_typeattr_794 (and (domain ) (not (crash_dump llkd ))))
+(typeattributeset base_typeattr_794 (and (domain ) (not (keystore ))))
 (typeattribute base_typeattr_793)
-(typeattributeset base_typeattr_793 (and (domain ) (not (logd ))))
+(typeattributeset base_typeattr_793 (and (domain ) (not (crash_dump isolated_compute_app llkd runas_app simpleperf ))))
 (typeattribute base_typeattr_792)
-(typeattributeset base_typeattr_792 (and (appdomain ) (not (bluetooth platform_app priv_app radio shell su system_app ))))
+(typeattributeset base_typeattr_792 (and (appdomain ) (not (isolated_compute_app runas_app shell simpleperf ))))
 (typeattribute base_typeattr_791)
-(typeattributeset base_typeattr_791 (and (domain ) (not (appdomain bootstat dumpstate init logd logpersist servicemanager surfaceflinger system_server zygote ))))
+(typeattributeset base_typeattr_791 (and (isolated_compute_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_790)
-(typeattributeset base_typeattr_790 (and (file_type ) (not (runtime_event_log_tags_file coredump_file shell_data_file misc_logd_file ))))
+(typeattributeset base_typeattr_790 (and (domain ) (not (isolated_compute_app ))))
 (typeattribute base_typeattr_789)
-(typeattributeset base_typeattr_789 (and (domain ) (not (init lmkd vendor_init ))))
+(typeattributeset base_typeattr_789 (and (sysfs_type ) (not (sysfs_transparent_hugepage sysfs_usb sysfs_fs_fuse_features sysfs_fs_incfs_features sysfs_devices_system_cpu sysfs_pgsize_migration ))))
 (typeattribute base_typeattr_788)
-(typeattributeset base_typeattr_788 (and (domain ) (not (apexd init kernel keystore llkd ueventd vendor_init ))))
+(typeattributeset base_typeattr_788 (and (service_manager_type ) (not (activity_service display_service webviewupdate_service ))))
 (typeattribute base_typeattr_787)
-(typeattributeset base_typeattr_787 (and (domain ) (not (init dexopt_chroot_setup linkerconfig otapreopt_chroot ))))
+(typeattributeset base_typeattr_787 (and (isolated_app_all ) (not (isolated_compute_app ))))
 (typeattribute base_typeattr_786)
-(typeattributeset base_typeattr_786 (and (domain ) (not (init keystore ))))
+(typeattributeset base_typeattr_786 (and (domain ) (not (crash_dump isolated_app llkd runas_app simpleperf ))))
 (typeattribute base_typeattr_785)
-(typeattributeset base_typeattr_785 (and (domain ) (not (keystore ))))
+(typeattributeset base_typeattr_785 (and (appdomain ) (not (isolated_app runas_app shell simpleperf ))))
 (typeattribute base_typeattr_784)
-(typeattributeset base_typeattr_784 (and (domain ) (not (crash_dump isolated_compute_app llkd runas_app simpleperf ))))
+(typeattributeset base_typeattr_784 (and (isolated_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_783)
-(typeattributeset base_typeattr_783 (and (appdomain ) (not (isolated_compute_app runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_783 (and (domain ) (not (servicemanager su system_server ))))
 (typeattribute base_typeattr_782)
-(typeattributeset base_typeattr_782 (and (isolated_compute_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_782 (and (domain ) (not (dumpstate servicemanager system_server ))))
 (typeattribute base_typeattr_781)
-(typeattributeset base_typeattr_781 (and (domain ) (not (isolated_compute_app ))))
+(typeattributeset base_typeattr_781 (and (domain ) (not (dumpstate installd system_server ))))
 (typeattribute base_typeattr_780)
-(typeattributeset base_typeattr_780 (and (sysfs_type ) (not (sysfs_transparent_hugepage sysfs_usb sysfs_fs_fuse_features sysfs_fs_incfs_features sysfs_devices_system_cpu sysfs_pgsize_migration ))))
+(typeattributeset base_typeattr_780 (and (domain ) (not (installd ))))
 (typeattribute base_typeattr_779)
-(typeattributeset base_typeattr_779 (and (service_manager_type ) (not (activity_service display_service webviewupdate_service ))))
+(typeattributeset base_typeattr_779 (and (domain ) (not (init toolbox vendor_init vold ))))
 (typeattribute base_typeattr_778)
-(typeattributeset base_typeattr_778 (and (isolated_app_all ) (not (isolated_compute_app ))))
+(typeattributeset base_typeattr_778 (and (fs_type file_type ) (not (init_exec ))))
 (typeattribute base_typeattr_777)
-(typeattributeset base_typeattr_777 (and (domain ) (not (crash_dump isolated_app llkd runas_app simpleperf ))))
+(typeattributeset base_typeattr_777 (and (fs_type ) (not (bpffs_type contextmount_type fusefs_type sdcard_type rootfs ))))
 (typeattribute base_typeattr_776)
-(typeattributeset base_typeattr_776 (and (appdomain ) (not (isolated_app runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_776 (and (fs_type ) (not (bpffs_type contextmount_type fusefs_type proc_type sysfs_type debugfs_type sdcard_type keychord_device rootfs ))))
 (typeattribute base_typeattr_775)
-(typeattributeset base_typeattr_775 (and (isolated_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_775 (and (file_type ) (not (bpffs_type exec_type system_file_type system_dlkm_file_type vendor_file_type app_data_file privapp_data_file vm_data_file storage_area_app_dir storage_area_dir storage_area_content_file ))))
 (typeattribute base_typeattr_774)
-(typeattributeset base_typeattr_774 (and (domain ) (not (servicemanager su system_server ))))
+(typeattributeset base_typeattr_774 (and (file_type ) (not (bpffs_type exec_type system_file_type system_dlkm_file_type vendor_file_type shell_data_file nativetest_data_file apex_mnt_dir credstore_data_file keystore_data_file vold_data_file gsi_data_file app_data_file privapp_data_file system_app_data_file misc_logd_file vm_data_file storage_area_app_dir storage_area_dir storage_area_content_file ))))
 (typeattribute base_typeattr_773)
-(typeattributeset base_typeattr_773 (and (domain ) (not (dumpstate servicemanager system_server ))))
+(typeattributeset base_typeattr_773 (and (file_type ) (not (bpffs_type exec_type system_file_type system_dlkm_file_type vendor_file_type shell_data_file nativetest_data_file credstore_data_file keystore_data_file vold_data_file gsi_data_file app_data_file privapp_data_file system_app_data_file misc_logd_file vm_data_file storage_area_app_dir storage_area_dir storage_area_content_file ))))
 (typeattribute base_typeattr_772)
-(typeattributeset base_typeattr_772 (and (domain ) (not (dumpstate installd system_server ))))
+(typeattributeset base_typeattr_772 (and (file_type ) (not (bpffs_type exec_type system_file_type system_dlkm_file_type vendor_file_type debugfs_type runtime_event_log_tags_file shell_data_file nativetest_data_file apex_info_file credstore_data_file keystore_data_file vold_data_file gsi_data_file app_data_file privapp_data_file system_app_data_file misc_logd_file vm_data_file storage_area_app_dir storage_area_dir storage_area_content_file ))))
 (typeattribute base_typeattr_771)
-(typeattributeset base_typeattr_771 (and (domain ) (not (installd ))))
+(typeattributeset base_typeattr_771 (and (file_type ) (not (bpffs_type exec_type system_file_type system_dlkm_file_type vendor_file_type system_userdir_file vendor_userdir_file shell_data_file nativetest_data_file credstore_data_file keystore_data_file media_userdir_file vold_data_file app_data_file privapp_data_file system_app_data_file misc_logd_file vm_data_file storage_area_app_dir storage_area_dir storage_area_content_file ))))
 (typeattribute base_typeattr_770)
-(typeattributeset base_typeattr_770 (and (domain ) (not (init toolbox vendor_init vold ))))
+(typeattributeset base_typeattr_770 (and (file_type ) (not (bpffs_type exec_type system_file_type system_dlkm_file_type vendor_file_type nativetest_data_file app_data_file privapp_data_file system_app_data_file misc_logd_file vm_data_file storage_area_app_dir storage_area_dir storage_area_content_file ))))
 (typeattribute base_typeattr_769)
-(typeattributeset base_typeattr_769 (and (fs_type file_type ) (not (init_exec ))))
+(typeattributeset base_typeattr_769 (and (fs_type ) (not (debugfs_type ))))
 (typeattribute base_typeattr_768)
-(typeattributeset base_typeattr_768 (and (fs_type ) (not (bpffs_type contextmount_type fusefs_type sdcard_type rootfs ))))
+(typeattributeset base_typeattr_768 (and (dev_type ) (not (vm_manager_device_type keychord_device hw_random_device port_device ))))
 (typeattribute base_typeattr_767)
-(typeattributeset base_typeattr_767 (and (fs_type ) (not (bpffs_type contextmount_type fusefs_type proc_type sysfs_type debugfs_type sdcard_type keychord_device rootfs ))))
+(typeattributeset base_typeattr_767 (and (domain ) (not (incidentd init system_server vold ))))
 (typeattribute base_typeattr_766)
-(typeattributeset base_typeattr_766 (and (file_type ) (not (bpffs_type exec_type system_file_type system_dlkm_file_type vendor_file_type app_data_file privapp_data_file vm_data_file ))))
+(typeattributeset base_typeattr_766 (and (domain ) (not (incidentd init vold ))))
 (typeattribute base_typeattr_765)
-(typeattributeset base_typeattr_765 (and (file_type ) (not (bpffs_type exec_type system_file_type system_dlkm_file_type vendor_file_type shell_data_file nativetest_data_file apex_mnt_dir credstore_data_file keystore_data_file vold_data_file gsi_data_file app_data_file privapp_data_file system_app_data_file misc_logd_file vm_data_file ))))
+(typeattributeset base_typeattr_765 (and (domain ) (not (incidentd ))))
 (typeattribute base_typeattr_764)
-(typeattributeset base_typeattr_764 (and (file_type ) (not (bpffs_type exec_type system_file_type system_dlkm_file_type vendor_file_type shell_data_file nativetest_data_file credstore_data_file keystore_data_file vold_data_file gsi_data_file app_data_file privapp_data_file system_app_data_file misc_logd_file vm_data_file ))))
+(typeattributeset base_typeattr_764 (and (system_server_service app_api_service system_api_service ) (not (tracingproxy_service ))))
 (typeattribute base_typeattr_763)
-(typeattributeset base_typeattr_763 (and (file_type ) (not (bpffs_type exec_type system_file_type system_dlkm_file_type vendor_file_type debugfs_type runtime_event_log_tags_file shell_data_file nativetest_data_file apex_info_file credstore_data_file keystore_data_file vold_data_file gsi_data_file app_data_file privapp_data_file system_app_data_file misc_logd_file vm_data_file ))))
+(typeattributeset base_typeattr_763 (and (domain ) (not (incident_helper incidentd shell ))))
 (typeattribute base_typeattr_762)
-(typeattributeset base_typeattr_762 (and (file_type ) (not (bpffs_type exec_type system_file_type system_dlkm_file_type vendor_file_type system_userdir_file vendor_userdir_file shell_data_file nativetest_data_file credstore_data_file keystore_data_file media_userdir_file vold_data_file app_data_file privapp_data_file system_app_data_file misc_logd_file vm_data_file ))))
+(typeattributeset base_typeattr_762 (and (domain ) (not (dumpstate incident shell su ))))
 (typeattribute base_typeattr_761)
-(typeattributeset base_typeattr_761 (and (file_type ) (not (bpffs_type exec_type system_file_type system_dlkm_file_type vendor_file_type nativetest_data_file app_data_file privapp_data_file system_app_data_file misc_logd_file vm_data_file ))))
+(typeattributeset base_typeattr_761 (and (domain ) (not (idmap ))))
 (typeattribute base_typeattr_760)
-(typeattributeset base_typeattr_760 (and (fs_type ) (not (debugfs_type ))))
+(typeattributeset base_typeattr_760 (and (domain ) (not (hwservicemanager ))))
 (typeattribute base_typeattr_759)
-(typeattributeset base_typeattr_759 (and (dev_type ) (not (vm_manager_device_type keychord_device hw_random_device port_device ))))
+(typeattributeset base_typeattr_759 (not (hwservice_manager_type ) ))
 (typeattribute base_typeattr_758)
-(typeattributeset base_typeattr_758 (and (domain ) (not (incidentd init system_server vold ))))
+(typeattributeset base_typeattr_758 (and (vendor_file_type ) (not (vndk_sp_file ))))
 (typeattribute base_typeattr_757)
-(typeattributeset base_typeattr_757 (and (domain ) (not (incidentd init vold ))))
+(typeattributeset base_typeattr_757 (and (domain ) (not (hal_wifi_supplicant_client hal_wifi_supplicant_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_756)
-(typeattributeset base_typeattr_756 (and (domain ) (not (incidentd ))))
+(typeattributeset base_typeattr_756 (and (domain ) (not (hal_wifi_supplicant_client hal_wifi_supplicant_server ))))
 (typeattribute base_typeattr_755)
-(typeattributeset base_typeattr_755 (and (system_server_service app_api_service system_api_service ) (not (tracingproxy_service ))))
+(typeattributeset base_typeattr_755 (and (domain ) (not (hal_wifi_supplicant_server ))))
 (typeattribute base_typeattr_754)
-(typeattributeset base_typeattr_754 (and (domain ) (not (incident_helper incidentd shell ))))
+(typeattributeset base_typeattr_754 (and (domain ) (not (hal_wifi_hostapd_client hal_wifi_hostapd_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_753)
-(typeattributeset base_typeattr_753 (and (domain ) (not (dumpstate incident shell su ))))
+(typeattributeset base_typeattr_753 (and (domain ) (not (hal_wifi_hostapd_client hal_wifi_hostapd_server ))))
 (typeattribute base_typeattr_752)
-(typeattributeset base_typeattr_752 (and (domain ) (not (idmap ))))
+(typeattributeset base_typeattr_752 (and (domain ) (not (hal_wifi_hostapd_server ))))
 (typeattribute base_typeattr_751)
-(typeattributeset base_typeattr_751 (and (domain ) (not (hwservicemanager ))))
+(typeattributeset base_typeattr_751 (and (domain ) (not (hal_wifi_client hal_wifi_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_750)
-(typeattributeset base_typeattr_750 (not (hwservice_manager_type ) ))
+(typeattributeset base_typeattr_750 (and (domain ) (not (hal_wifi_client hal_wifi_server ))))
 (typeattribute base_typeattr_749)
-(typeattributeset base_typeattr_749 (and (vendor_file_type ) (not (vndk_sp_file ))))
+(typeattributeset base_typeattr_749 (and (domain ) (not (hal_wifi_server ))))
 (typeattribute base_typeattr_748)
-(typeattributeset base_typeattr_748 (and (domain ) (not (hal_wifi_supplicant_client hal_wifi_supplicant_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_748 (and (domain ) (not (hal_weaver_client hal_weaver_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_747)
-(typeattributeset base_typeattr_747 (and (domain ) (not (hal_wifi_supplicant_client hal_wifi_supplicant_server ))))
+(typeattributeset base_typeattr_747 (and (domain ) (not (hal_weaver_client hal_weaver_server ))))
 (typeattribute base_typeattr_746)
-(typeattributeset base_typeattr_746 (and (domain ) (not (hal_wifi_supplicant_server ))))
+(typeattributeset base_typeattr_746 (and (domain ) (not (hal_weaver_server ))))
 (typeattribute base_typeattr_745)
-(typeattributeset base_typeattr_745 (and (domain ) (not (hal_wifi_hostapd_client hal_wifi_hostapd_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_745 (and (domain ) (not (hal_vr_client hal_vr_server ))))
 (typeattribute base_typeattr_744)
-(typeattributeset base_typeattr_744 (and (domain ) (not (hal_wifi_hostapd_client hal_wifi_hostapd_server ))))
+(typeattributeset base_typeattr_744 (and (domain ) (not (hal_vr_server ))))
 (typeattribute base_typeattr_743)
-(typeattributeset base_typeattr_743 (and (domain ) (not (hal_wifi_hostapd_server ))))
+(typeattributeset base_typeattr_743 (and (domain ) (not (hal_vm_capabilities_client hal_vm_capabilities_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_742)
-(typeattributeset base_typeattr_742 (and (domain ) (not (hal_wifi_client hal_wifi_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_742 (and (domain ) (not (hal_vm_capabilities_server ))))
 (typeattribute base_typeattr_741)
-(typeattributeset base_typeattr_741 (and (domain ) (not (hal_wifi_client hal_wifi_server ))))
+(typeattributeset base_typeattr_741 (and (domain ) (not (hal_vibrator_client hal_vibrator_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_740)
-(typeattributeset base_typeattr_740 (and (domain ) (not (hal_wifi_server ))))
+(typeattributeset base_typeattr_740 (and (domain ) (not (hal_vibrator_client hal_vibrator_server ))))
 (typeattribute base_typeattr_739)
-(typeattributeset base_typeattr_739 (and (domain ) (not (hal_weaver_client hal_weaver_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_739 (and (domain ) (not (hal_vibrator_server ))))
 (typeattribute base_typeattr_738)
-(typeattributeset base_typeattr_738 (and (domain ) (not (hal_weaver_client hal_weaver_server ))))
+(typeattributeset base_typeattr_738 (and (domain ) (not (hal_vehicle_client hal_vehicle_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_737)
-(typeattributeset base_typeattr_737 (and (domain ) (not (hal_weaver_server ))))
+(typeattributeset base_typeattr_737 (and (domain ) (not (hal_vehicle_client hal_vehicle_server ))))
 (typeattribute base_typeattr_736)
-(typeattributeset base_typeattr_736 (and (domain ) (not (hal_vr_client hal_vr_server ))))
+(typeattributeset base_typeattr_736 (and (domain ) (not (hal_vehicle_server ))))
 (typeattribute base_typeattr_735)
-(typeattributeset base_typeattr_735 (and (domain ) (not (hal_vr_server ))))
+(typeattributeset base_typeattr_735 (and (domain ) (not (hal_uwb_client hal_uwb_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_734)
-(typeattributeset base_typeattr_734 (and (domain ) (not (hal_vibrator_client hal_vibrator_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_734 (and (domain ) (not (hal_uwb_server ))))
 (typeattribute base_typeattr_733)
-(typeattributeset base_typeattr_733 (and (domain ) (not (hal_vibrator_client hal_vibrator_server ))))
+(typeattributeset base_typeattr_733 (and (domain ) (not (hal_usb_gadget_client hal_usb_gadget_server ))))
 (typeattribute base_typeattr_732)
-(typeattributeset base_typeattr_732 (and (domain ) (not (hal_vibrator_server ))))
+(typeattributeset base_typeattr_732 (and (domain ) (not (hal_usb_gadget_client hal_usb_gadget_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_731)
-(typeattributeset base_typeattr_731 (and (domain ) (not (hal_vehicle_client hal_vehicle_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_731 (and (domain ) (not (hal_usb_gadget_server ))))
 (typeattribute base_typeattr_730)
-(typeattributeset base_typeattr_730 (and (domain ) (not (hal_vehicle_client hal_vehicle_server ))))
+(typeattributeset base_typeattr_730 (and (domain ) (not (hal_usb_client hal_usb_server ))))
 (typeattribute base_typeattr_729)
-(typeattributeset base_typeattr_729 (and (domain ) (not (hal_vehicle_server ))))
+(typeattributeset base_typeattr_729 (and (domain ) (not (hal_usb_client hal_usb_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_728)
-(typeattributeset base_typeattr_728 (and (domain ) (not (hal_uwb_client hal_uwb_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_728 (and (domain ) (not (hal_usb_server ))))
 (typeattribute base_typeattr_727)
-(typeattributeset base_typeattr_727 (and (domain ) (not (hal_uwb_server ))))
+(typeattributeset base_typeattr_727 (and (domain ) (not (hal_tv_tuner_client hal_tv_tuner_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_726)
-(typeattributeset base_typeattr_726 (and (domain ) (not (hal_usb_gadget_client hal_usb_gadget_server ))))
+(typeattributeset base_typeattr_726 (and (domain ) (not (hal_tv_tuner_client hal_tv_tuner_server ))))
 (typeattribute base_typeattr_725)
-(typeattributeset base_typeattr_725 (and (domain ) (not (hal_usb_gadget_client hal_usb_gadget_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_725 (and (domain ) (not (hal_tv_tuner_server ))))
 (typeattribute base_typeattr_724)
-(typeattributeset base_typeattr_724 (and (domain ) (not (hal_usb_gadget_server ))))
+(typeattributeset base_typeattr_724 (and (domain ) (not (hal_tv_input_client hal_tv_input_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_723)
-(typeattributeset base_typeattr_723 (and (domain ) (not (hal_usb_client hal_usb_server ))))
+(typeattributeset base_typeattr_723 (and (domain ) (not (hal_tv_input_client hal_tv_input_server ))))
 (typeattribute base_typeattr_722)
-(typeattributeset base_typeattr_722 (and (domain ) (not (hal_usb_client hal_usb_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_722 (and (domain ) (not (hal_tv_input_server ))))
 (typeattribute base_typeattr_721)
-(typeattributeset base_typeattr_721 (and (domain ) (not (hal_usb_server ))))
+(typeattributeset base_typeattr_721 (and (domain ) (not (hal_tv_hdmi_earc_client hal_tv_hdmi_earc_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_720)
-(typeattributeset base_typeattr_720 (and (domain ) (not (hal_tv_tuner_client hal_tv_tuner_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_720 (and (domain ) (not (hal_tv_hdmi_earc_server ))))
 (typeattribute base_typeattr_719)
-(typeattributeset base_typeattr_719 (and (domain ) (not (hal_tv_tuner_client hal_tv_tuner_server ))))
+(typeattributeset base_typeattr_719 (and (domain ) (not (hal_tv_hdmi_connection_client hal_tv_hdmi_connection_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_718)
-(typeattributeset base_typeattr_718 (and (domain ) (not (hal_tv_tuner_server ))))
+(typeattributeset base_typeattr_718 (and (domain ) (not (hal_tv_hdmi_connection_server ))))
 (typeattribute base_typeattr_717)
-(typeattributeset base_typeattr_717 (and (domain ) (not (hal_tv_input_client hal_tv_input_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_717 (and (domain ) (not (hal_tv_hdmi_cec_client hal_tv_hdmi_cec_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_716)
-(typeattributeset base_typeattr_716 (and (domain ) (not (hal_tv_input_client hal_tv_input_server ))))
+(typeattributeset base_typeattr_716 (and (domain ) (not (hal_tv_hdmi_cec_server ))))
 (typeattribute base_typeattr_715)
-(typeattributeset base_typeattr_715 (and (domain ) (not (hal_tv_input_server ))))
+(typeattributeset base_typeattr_715 (and (domain ) (not (hal_tv_cec_client hal_tv_cec_server ))))
 (typeattribute base_typeattr_714)
-(typeattributeset base_typeattr_714 (and (domain ) (not (hal_tv_hdmi_earc_client hal_tv_hdmi_earc_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_714 (and (domain ) (not (hal_tv_cec_server ))))
 (typeattribute base_typeattr_713)
-(typeattributeset base_typeattr_713 (and (domain ) (not (hal_tv_hdmi_earc_server ))))
+(typeattributeset base_typeattr_713 (and (domain ) (not (hal_threadnetwork_client hal_threadnetwork_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_712)
-(typeattributeset base_typeattr_712 (and (domain ) (not (hal_tv_hdmi_connection_client hal_tv_hdmi_connection_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_712 (and (domain ) (not (hal_threadnetwork_server ))))
 (typeattribute base_typeattr_711)
-(typeattributeset base_typeattr_711 (and (domain ) (not (hal_tv_hdmi_connection_server ))))
+(typeattributeset base_typeattr_711 (and (domain ) (not (hal_thermal_client hal_thermal_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_710)
-(typeattributeset base_typeattr_710 (and (domain ) (not (hal_tv_hdmi_cec_client hal_tv_hdmi_cec_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_710 (and (domain ) (not (hal_thermal_client hal_thermal_server ))))
 (typeattribute base_typeattr_709)
-(typeattributeset base_typeattr_709 (and (domain ) (not (hal_tv_hdmi_cec_server ))))
+(typeattributeset base_typeattr_709 (and (domain ) (not (hal_thermal_server ))))
 (typeattribute base_typeattr_708)
-(typeattributeset base_typeattr_708 (and (domain ) (not (hal_tv_cec_client hal_tv_cec_server ))))
+(typeattributeset base_typeattr_708 (and (domain ) (not (hal_tetheroffload_client hal_tetheroffload_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_707)
-(typeattributeset base_typeattr_707 (and (domain ) (not (hal_tv_cec_server ))))
+(typeattributeset base_typeattr_707 (and (domain ) (not (hal_tetheroffload_client hal_tetheroffload_server ))))
 (typeattribute base_typeattr_706)
-(typeattributeset base_typeattr_706 (and (domain ) (not (hal_threadnetwork_client hal_threadnetwork_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_706 (and (domain ) (not (hal_tetheroffload_server ))))
 (typeattribute base_typeattr_705)
-(typeattributeset base_typeattr_705 (and (domain ) (not (hal_threadnetwork_server ))))
+(typeattributeset base_typeattr_705 (and (domain ) (not (hal_telephony_client hal_telephony_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_704)
-(typeattributeset base_typeattr_704 (and (domain ) (not (hal_thermal_client hal_thermal_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_704 (and (domain ) (not (hal_telephony_client hal_telephony_server ))))
 (typeattribute base_typeattr_703)
-(typeattributeset base_typeattr_703 (and (domain ) (not (hal_thermal_client hal_thermal_server ))))
+(typeattributeset base_typeattr_703 (and (domain ) (not (hal_telephony_server ))))
 (typeattribute base_typeattr_702)
-(typeattributeset base_typeattr_702 (and (domain ) (not (hal_thermal_server ))))
+(typeattributeset base_typeattr_702 (and (domain ) (not (hal_sensors_client hal_sensors_server ))))
 (typeattribute base_typeattr_701)
-(typeattributeset base_typeattr_701 (and (domain ) (not (hal_tetheroffload_client hal_tetheroffload_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_701 (and (domain ) (not (hal_sensors_server ))))
 (typeattribute base_typeattr_700)
-(typeattributeset base_typeattr_700 (and (domain ) (not (hal_tetheroffload_client hal_tetheroffload_server ))))
+(typeattributeset base_typeattr_700 (and (domain ) (not (hal_secure_element_client hal_secure_element_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_699)
-(typeattributeset base_typeattr_699 (and (domain ) (not (hal_tetheroffload_server ))))
+(typeattributeset base_typeattr_699 (and (domain ) (not (hal_secure_element_client hal_secure_element_server ))))
 (typeattribute base_typeattr_698)
-(typeattributeset base_typeattr_698 (and (domain ) (not (hal_telephony_client hal_telephony_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_698 (and (domain ) (not (hal_secure_element_server ))))
 (typeattribute base_typeattr_697)
-(typeattributeset base_typeattr_697 (and (domain ) (not (hal_telephony_client hal_telephony_server ))))
+(typeattributeset base_typeattr_697 (and (domain ) (not (hal_secretkeeper_client hal_secretkeeper_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_696)
-(typeattributeset base_typeattr_696 (and (domain ) (not (hal_telephony_server ))))
+(typeattributeset base_typeattr_696 (and (domain ) (not (hal_secretkeeper_server ))))
 (typeattribute base_typeattr_695)
-(typeattributeset base_typeattr_695 (and (domain ) (not (hal_sensors_client hal_sensors_server ))))
+(typeattributeset base_typeattr_695 (and (domain ) (not (hal_remotelyprovisionedcomponent_avf_client hal_remotelyprovisionedcomponent_avf_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_694)
-(typeattributeset base_typeattr_694 (and (domain ) (not (hal_sensors_server ))))
+(typeattributeset base_typeattr_694 (and (domain ) (not (hal_remotelyprovisionedcomponent_avf_server ))))
 (typeattribute base_typeattr_693)
-(typeattributeset base_typeattr_693 (and (domain ) (not (hal_secure_element_client hal_secure_element_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_693 (and (domain ) (not (hal_remoteaccess_client hal_remoteaccess_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_692)
-(typeattributeset base_typeattr_692 (and (domain ) (not (hal_secure_element_client hal_secure_element_server ))))
+(typeattributeset base_typeattr_692 (and (domain ) (not (hal_remoteaccess_server ))))
 (typeattribute base_typeattr_691)
-(typeattributeset base_typeattr_691 (and (domain ) (not (hal_secure_element_server ))))
+(typeattributeset base_typeattr_691 (and (domain ) (not (hal_rebootescrow_client hal_rebootescrow_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_690)
-(typeattributeset base_typeattr_690 (and (domain ) (not (hal_secretkeeper_client hal_secretkeeper_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_690 (and (domain ) (not (hal_rebootescrow_server ))))
 (typeattribute base_typeattr_689)
-(typeattributeset base_typeattr_689 (and (domain ) (not (hal_secretkeeper_server ))))
+(typeattributeset base_typeattr_689 (and (domain ) (not (hal_power_stats_client hal_power_stats_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_688)
-(typeattributeset base_typeattr_688 (and (domain ) (not (hal_remotelyprovisionedcomponent_avf_client hal_remotelyprovisionedcomponent_avf_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_688 (and (domain ) (not (hal_power_stats_client hal_power_stats_server ))))
 (typeattribute base_typeattr_687)
-(typeattributeset base_typeattr_687 (and (domain ) (not (hal_remotelyprovisionedcomponent_avf_server ))))
+(typeattributeset base_typeattr_687 (and (domain ) (not (hal_power_stats_server ))))
 (typeattribute base_typeattr_686)
-(typeattributeset base_typeattr_686 (and (domain ) (not (hal_remoteaccess_client hal_remoteaccess_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_686 (and (domain ) (not (hal_power_client hal_power_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_685)
-(typeattributeset base_typeattr_685 (and (domain ) (not (hal_remoteaccess_server ))))
+(typeattributeset base_typeattr_685 (and (domain ) (not (hal_power_client hal_power_server ))))
 (typeattribute base_typeattr_684)
-(typeattributeset base_typeattr_684 (and (domain ) (not (hal_rebootescrow_client hal_rebootescrow_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_684 (and (domain ) (not (hal_power_server ))))
 (typeattribute base_typeattr_683)
-(typeattributeset base_typeattr_683 (and (domain ) (not (hal_rebootescrow_server ))))
+(typeattributeset base_typeattr_683 (and (domain ) (not (hal_omx_client hal_omx_server ))))
 (typeattribute base_typeattr_682)
-(typeattributeset base_typeattr_682 (and (domain ) (not (hal_power_stats_client hal_power_stats_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_682 (and (domain ) (not (hal_omx_server ))))
 (typeattribute base_typeattr_681)
-(typeattributeset base_typeattr_681 (and (domain ) (not (hal_power_stats_client hal_power_stats_server ))))
+(typeattributeset base_typeattr_681 (and (domain ) (not (hal_oemlock_client hal_oemlock_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_680)
-(typeattributeset base_typeattr_680 (and (domain ) (not (hal_power_stats_server ))))
+(typeattributeset base_typeattr_680 (and (domain ) (not (hal_oemlock_client hal_oemlock_server ))))
 (typeattribute base_typeattr_679)
-(typeattributeset base_typeattr_679 (and (domain ) (not (hal_power_client hal_power_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_679 (and (domain ) (not (hal_oemlock_server ))))
 (typeattribute base_typeattr_678)
-(typeattributeset base_typeattr_678 (and (domain ) (not (hal_power_client hal_power_server ))))
+(typeattributeset base_typeattr_678 (and (domain ) (not (hal_nlinterceptor_client hal_nlinterceptor_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_677)
-(typeattributeset base_typeattr_677 (and (domain ) (not (hal_power_server ))))
+(typeattributeset base_typeattr_677 (and (domain ) (not (hal_nlinterceptor_server ))))
 (typeattribute base_typeattr_676)
-(typeattributeset base_typeattr_676 (and (domain ) (not (hal_omx_client hal_omx_server ))))
+(typeattributeset base_typeattr_676 (and (domain ) (not (hal_nfc_client hal_nfc_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_675)
-(typeattributeset base_typeattr_675 (and (domain ) (not (hal_omx_server ))))
+(typeattributeset base_typeattr_675 (and (domain ) (not (hal_nfc_client hal_nfc_server ))))
 (typeattribute base_typeattr_674)
-(typeattributeset base_typeattr_674 (and (domain ) (not (hal_oemlock_client hal_oemlock_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_674 (and (domain ) (not (hal_nfc_server ))))
 (typeattribute base_typeattr_673)
-(typeattributeset base_typeattr_673 (and (domain ) (not (hal_oemlock_client hal_oemlock_server ))))
+(typeattributeset base_typeattr_673 (and (fs_type file_type ) (not (shell_exec toolbox_exec ))))
 (typeattribute base_typeattr_672)
-(typeattributeset base_typeattr_672 (and (domain ) (not (hal_oemlock_server ))))
+(typeattributeset base_typeattr_672 (and (halserverdomain ) (not (hal_dumpstate_server hal_telephony_server ))))
 (typeattribute base_typeattr_671)
-(typeattributeset base_typeattr_671 (and (domain ) (not (hal_nlinterceptor_client hal_nlinterceptor_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_671 (and (halserverdomain ) (not (hal_automotive_socket_exemption hal_bluetooth_server hal_can_controller_server hal_nlinterceptor_server hal_telephony_server hal_tetheroffload_server hal_tv_tuner_server hal_wifi_server hal_wifi_hostapd_server hal_wifi_supplicant_server ))))
 (typeattribute base_typeattr_670)
-(typeattributeset base_typeattr_670 (and (domain ) (not (hal_nlinterceptor_server ))))
+(typeattributeset base_typeattr_670 (and (halserverdomain ) (not (hal_automotive_socket_exemption hal_bluetooth_server hal_can_controller_server hal_nlinterceptor_server hal_telephony_server hal_tetheroffload_server hal_tv_tuner_server hal_uwb_server hal_uwb_vendor_server hal_wifi_server hal_wifi_hostapd_server hal_wifi_supplicant_server ))))
 (typeattribute base_typeattr_669)
-(typeattributeset base_typeattr_669 (and (domain ) (not (hal_nfc_client hal_nfc_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_669 (and (halserverdomain ) (not (hal_bluetooth_server hal_can_controller_server hal_nlinterceptor_server hal_telephony_server hal_tv_tuner_server hal_uwb_server hal_uwb_vendor_server hal_wifi_server hal_wifi_hostapd_server hal_wifi_supplicant_server ))))
 (typeattribute base_typeattr_668)
-(typeattributeset base_typeattr_668 (and (domain ) (not (hal_nfc_client hal_nfc_server ))))
+(typeattributeset base_typeattr_668 (and (domain ) (not (hal_neuralnetworks_client hal_neuralnetworks_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_667)
-(typeattributeset base_typeattr_667 (and (domain ) (not (hal_nfc_server ))))
+(typeattributeset base_typeattr_667 (and (domain ) (not (hal_neuralnetworks_client hal_neuralnetworks_server ))))
 (typeattribute base_typeattr_666)
-(typeattributeset base_typeattr_666 (and (fs_type file_type ) (not (shell_exec toolbox_exec ))))
+(typeattributeset base_typeattr_666 (and (domain ) (not (hal_neuralnetworks_server ))))
 (typeattribute base_typeattr_665)
-(typeattributeset base_typeattr_665 (and (halserverdomain ) (not (hal_dumpstate_server hal_telephony_server ))))
+(typeattributeset base_typeattr_665 (and (domain ) (not (hal_memtrack_client hal_memtrack_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_664)
-(typeattributeset base_typeattr_664 (and (halserverdomain ) (not (hal_automotive_socket_exemption hal_bluetooth_server hal_can_controller_server hal_nlinterceptor_server hal_telephony_server hal_tetheroffload_server hal_tv_tuner_server hal_wifi_server hal_wifi_hostapd_server hal_wifi_supplicant_server ))))
+(typeattributeset base_typeattr_664 (and (domain ) (not (hal_memtrack_client hal_memtrack_server ))))
 (typeattribute base_typeattr_663)
-(typeattributeset base_typeattr_663 (and (halserverdomain ) (not (hal_automotive_socket_exemption hal_bluetooth_server hal_can_controller_server hal_nlinterceptor_server hal_telephony_server hal_tetheroffload_server hal_tv_tuner_server hal_uwb_server hal_uwb_vendor_server hal_wifi_server hal_wifi_hostapd_server hal_wifi_supplicant_server ))))
+(typeattributeset base_typeattr_663 (and (domain ) (not (hal_memtrack_server ))))
 (typeattribute base_typeattr_662)
-(typeattributeset base_typeattr_662 (and (halserverdomain ) (not (hal_bluetooth_server hal_can_controller_server hal_nlinterceptor_server hal_telephony_server hal_tv_tuner_server hal_uwb_server hal_uwb_vendor_server hal_wifi_server hal_wifi_hostapd_server hal_wifi_supplicant_server ))))
+(typeattributeset base_typeattr_662 (and (domain ) (not (hal_mediaquality_client hal_mediaquality_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_661)
-(typeattributeset base_typeattr_661 (and (domain ) (not (hal_neuralnetworks_client hal_neuralnetworks_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_661 (and (domain ) (not (hal_mediaquality_server ))))
 (typeattribute base_typeattr_660)
-(typeattributeset base_typeattr_660 (and (domain ) (not (hal_neuralnetworks_client hal_neuralnetworks_server ))))
+(typeattributeset base_typeattr_660 (and (domain ) (not (hal_macsec_client hal_macsec_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_659)
-(typeattributeset base_typeattr_659 (and (domain ) (not (hal_neuralnetworks_server ))))
+(typeattributeset base_typeattr_659 (and (domain ) (not (hal_macsec_server ))))
 (typeattribute base_typeattr_658)
-(typeattributeset base_typeattr_658 (and (domain ) (not (hal_memtrack_client hal_memtrack_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_658 (and (domain ) (not (hal_lowpan_server init ueventd ))))
 (typeattribute base_typeattr_657)
-(typeattributeset base_typeattr_657 (and (domain ) (not (hal_memtrack_client hal_memtrack_server ))))
+(typeattributeset base_typeattr_657 (and (domain ) (not (hal_lowpan_client hal_lowpan_server ))))
 (typeattribute base_typeattr_656)
-(typeattributeset base_typeattr_656 (and (domain ) (not (hal_memtrack_server ))))
+(typeattributeset base_typeattr_656 (and (domain ) (not (hal_lowpan_server ))))
 (typeattribute base_typeattr_655)
-(typeattributeset base_typeattr_655 (and (domain ) (not (hal_mediaquality_client hal_mediaquality_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_655 (and (domain ) (not (hal_light_client hal_light_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_654)
-(typeattributeset base_typeattr_654 (and (domain ) (not (hal_mediaquality_server ))))
+(typeattributeset base_typeattr_654 (and (domain ) (not (hal_light_client hal_light_server ))))
 (typeattribute base_typeattr_653)
-(typeattributeset base_typeattr_653 (and (domain ) (not (hal_macsec_client hal_macsec_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_653 (and (domain ) (not (hal_light_server ))))
 (typeattribute base_typeattr_652)
-(typeattributeset base_typeattr_652 (and (domain ) (not (hal_macsec_server ))))
+(typeattributeset base_typeattr_652 (and (domain ) (not (hal_lazy_test_client hal_lazy_test_server ))))
 (typeattribute base_typeattr_651)
-(typeattributeset base_typeattr_651 (and (domain ) (not (hal_lowpan_server init ueventd ))))
+(typeattributeset base_typeattr_651 (and (domain ) (not (hal_lazy_test_server ))))
 (typeattribute base_typeattr_650)
-(typeattributeset base_typeattr_650 (and (domain ) (not (hal_lowpan_client hal_lowpan_server ))))
+(typeattributeset base_typeattr_650 (and (hal_keymint_server ) (not (coredomain ))))
 (typeattribute base_typeattr_649)
-(typeattributeset base_typeattr_649 (and (domain ) (not (hal_lowpan_server ))))
+(typeattributeset base_typeattr_649 (and (domain ) (not (hal_keymint_client hal_keymint_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_648)
-(typeattributeset base_typeattr_648 (and (domain ) (not (hal_light_client hal_light_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_648 (and (domain ) (not (hal_keymint_server ))))
 (typeattribute base_typeattr_647)
-(typeattributeset base_typeattr_647 (and (domain ) (not (hal_light_client hal_light_server ))))
+(typeattributeset base_typeattr_647 (and (domain ) (not (hal_keymaster_client hal_keymaster_server ))))
 (typeattribute base_typeattr_646)
-(typeattributeset base_typeattr_646 (and (domain ) (not (hal_light_server ))))
+(typeattributeset base_typeattr_646 (and (domain ) (not (hal_keymaster_server ))))
 (typeattribute base_typeattr_645)
-(typeattributeset base_typeattr_645 (and (domain ) (not (hal_lazy_test_client hal_lazy_test_server ))))
+(typeattributeset base_typeattr_645 (and (domain ) (not (hal_ivn_client hal_ivn_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_644)
-(typeattributeset base_typeattr_644 (and (domain ) (not (hal_lazy_test_server ))))
+(typeattributeset base_typeattr_644 (and (domain ) (not (hal_ivn_server ))))
 (typeattribute base_typeattr_643)
-(typeattributeset base_typeattr_643 (and (hal_keymint_server ) (not (coredomain ))))
+(typeattributeset base_typeattr_643 (and (domain ) (not (hal_ir_client hal_ir_server ))))
 (typeattribute base_typeattr_642)
-(typeattributeset base_typeattr_642 (and (domain ) (not (hal_keymint_client hal_keymint_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_642 (and (domain ) (not (hal_ir_client hal_ir_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_641)
-(typeattributeset base_typeattr_641 (and (domain ) (not (hal_keymint_server ))))
+(typeattributeset base_typeattr_641 (and (domain ) (not (hal_ir_server ))))
 (typeattribute base_typeattr_640)
-(typeattributeset base_typeattr_640 (and (domain ) (not (hal_keymaster_client hal_keymaster_server ))))
+(typeattributeset base_typeattr_640 (and (domain ) (not (hal_input_processor_client hal_input_processor_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_639)
-(typeattributeset base_typeattr_639 (and (domain ) (not (hal_keymaster_server ))))
+(typeattributeset base_typeattr_639 (and (domain ) (not (hal_input_processor_server ))))
 (typeattribute base_typeattr_638)
-(typeattributeset base_typeattr_638 (and (domain ) (not (hal_ivn_client hal_ivn_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_638 (and (domain ) (not (hal_input_classifier_client hal_input_classifier_server ))))
 (typeattribute base_typeattr_637)
-(typeattributeset base_typeattr_637 (and (domain ) (not (hal_ivn_server ))))
+(typeattributeset base_typeattr_637 (and (domain ) (not (hal_input_classifier_server ))))
 (typeattribute base_typeattr_636)
-(typeattributeset base_typeattr_636 (and (domain ) (not (hal_ir_client hal_ir_server ))))
+(typeattributeset base_typeattr_636 (and (domain ) (not (hal_identity_client hal_identity_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_635)
-(typeattributeset base_typeattr_635 (and (domain ) (not (hal_ir_client hal_ir_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_635 (and (domain ) (not (hal_identity_server ))))
 (typeattribute base_typeattr_634)
-(typeattributeset base_typeattr_634 (and (domain ) (not (hal_ir_server ))))
+(typeattributeset base_typeattr_634 (and (domain ) (not (hal_health_storage_client hal_health_storage_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_633)
-(typeattributeset base_typeattr_633 (and (domain ) (not (hal_input_processor_client hal_input_processor_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_633 (and (domain ) (not (hal_health_storage_client hal_health_storage_server ))))
 (typeattribute base_typeattr_632)
-(typeattributeset base_typeattr_632 (and (domain ) (not (hal_input_processor_server ))))
+(typeattributeset base_typeattr_632 (and (domain ) (not (hal_health_storage_server ))))
 (typeattribute base_typeattr_631)
-(typeattributeset base_typeattr_631 (and (domain ) (not (hal_input_classifier_client hal_input_classifier_server ))))
+(typeattributeset base_typeattr_631 (and (domain ) (not (hal_health_client hal_health_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_630)
-(typeattributeset base_typeattr_630 (and (domain ) (not (hal_input_classifier_server ))))
+(typeattributeset base_typeattr_630 (and (domain ) (not (hal_health_client hal_health_server ))))
 (typeattribute base_typeattr_629)
-(typeattributeset base_typeattr_629 (and (domain ) (not (hal_identity_client hal_identity_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_629 (and (domain ) (not (hal_health_server ))))
 (typeattribute base_typeattr_628)
-(typeattributeset base_typeattr_628 (and (domain ) (not (hal_identity_server ))))
+(typeattributeset base_typeattr_628 (and (domain ) (not (hal_graphics_composer_client hal_graphics_composer_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_627)
-(typeattributeset base_typeattr_627 (and (domain ) (not (hal_health_storage_client hal_health_storage_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_627 (and (domain ) (not (hal_graphics_composer_client hal_graphics_composer_server ))))
 (typeattribute base_typeattr_626)
-(typeattributeset base_typeattr_626 (and (domain ) (not (hal_health_storage_client hal_health_storage_server ))))
+(typeattributeset base_typeattr_626 (and (domain ) (not (hal_graphics_composer_server ))))
 (typeattribute base_typeattr_625)
-(typeattributeset base_typeattr_625 (and (domain ) (not (hal_health_storage_server ))))
+(typeattributeset base_typeattr_625 (and (domain ) (not (hal_graphics_allocator_client hal_graphics_allocator_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_624)
-(typeattributeset base_typeattr_624 (and (domain ) (not (hal_health_client hal_health_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_624 (and (domain ) (not (hal_graphics_allocator_client hal_graphics_allocator_server ))))
 (typeattribute base_typeattr_623)
-(typeattributeset base_typeattr_623 (and (domain ) (not (hal_health_client hal_health_server ))))
+(typeattributeset base_typeattr_623 (and (domain ) (not (hal_graphics_allocator_server ))))
 (typeattribute base_typeattr_622)
-(typeattributeset base_typeattr_622 (and (domain ) (not (hal_health_server ))))
+(typeattributeset base_typeattr_622 (and (domain ) (not (hal_gnss_client hal_gnss_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_621)
-(typeattributeset base_typeattr_621 (and (domain ) (not (hal_graphics_composer_client hal_graphics_composer_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_621 (and (domain ) (not (hal_gnss_client hal_gnss_server ))))
 (typeattribute base_typeattr_620)
-(typeattributeset base_typeattr_620 (and (domain ) (not (hal_graphics_composer_client hal_graphics_composer_server ))))
+(typeattributeset base_typeattr_620 (and (domain ) (not (hal_gnss_server ))))
 (typeattribute base_typeattr_619)
-(typeattributeset base_typeattr_619 (and (domain ) (not (hal_graphics_composer_server ))))
+(typeattributeset base_typeattr_619 (and (domain ) (not (hal_gatekeeper_client hal_gatekeeper_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_618)
-(typeattributeset base_typeattr_618 (and (domain ) (not (hal_graphics_allocator_client hal_graphics_allocator_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_618 (and (domain ) (not (hal_gatekeeper_client hal_gatekeeper_server ))))
 (typeattribute base_typeattr_617)
-(typeattributeset base_typeattr_617 (and (domain ) (not (hal_graphics_allocator_client hal_graphics_allocator_server ))))
+(typeattributeset base_typeattr_617 (and (domain ) (not (hal_gatekeeper_server ))))
 (typeattribute base_typeattr_616)
-(typeattributeset base_typeattr_616 (and (domain ) (not (hal_graphics_allocator_server ))))
+(typeattributeset base_typeattr_616 (and (hal_fingerprint ) (not (coredomain ))))
 (typeattribute base_typeattr_615)
-(typeattributeset base_typeattr_615 (and (domain ) (not (hal_gnss_client hal_gnss_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_615 (and (domain ) (not (hal_fingerprint_client hal_fingerprint_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_614)
-(typeattributeset base_typeattr_614 (and (domain ) (not (hal_gnss_client hal_gnss_server ))))
+(typeattributeset base_typeattr_614 (and (domain ) (not (hal_fingerprint_client hal_fingerprint_server ))))
 (typeattribute base_typeattr_613)
-(typeattributeset base_typeattr_613 (and (domain ) (not (hal_gnss_server ))))
+(typeattributeset base_typeattr_613 (and (domain ) (not (hal_fingerprint_server ))))
 (typeattribute base_typeattr_612)
-(typeattributeset base_typeattr_612 (and (domain ) (not (hal_gatekeeper_client hal_gatekeeper_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_612 (and (domain ) (not (hal_fastboot_client hal_fastboot_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_611)
-(typeattributeset base_typeattr_611 (and (domain ) (not (hal_gatekeeper_client hal_gatekeeper_server ))))
+(typeattributeset base_typeattr_611 (and (domain ) (not (hal_fastboot_server ))))
 (typeattribute base_typeattr_610)
-(typeattributeset base_typeattr_610 (and (domain ) (not (hal_gatekeeper_server ))))
+(typeattributeset base_typeattr_610 (and (hal_face ) (not (coredomain ))))
 (typeattribute base_typeattr_609)
-(typeattributeset base_typeattr_609 (and (hal_fingerprint ) (not (coredomain ))))
+(typeattributeset base_typeattr_609 (and (domain ) (not (hal_face_client hal_face_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_608)
-(typeattributeset base_typeattr_608 (and (domain ) (not (hal_fingerprint_client hal_fingerprint_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_608 (and (domain ) (not (hal_face_client hal_face_server ))))
 (typeattribute base_typeattr_607)
-(typeattributeset base_typeattr_607 (and (domain ) (not (hal_fingerprint_client hal_fingerprint_server ))))
+(typeattributeset base_typeattr_607 (and (domain ) (not (hal_face_server ))))
 (typeattribute base_typeattr_606)
-(typeattributeset base_typeattr_606 (and (domain ) (not (hal_fingerprint_server ))))
+(typeattributeset base_typeattr_606 (and (domain ) (not (hal_evs_client hal_evs_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_605)
-(typeattributeset base_typeattr_605 (and (domain ) (not (hal_fastboot_client hal_fastboot_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_605 (and (domain ) (not (hal_evs_server ))))
 (typeattribute base_typeattr_604)
-(typeattributeset base_typeattr_604 (and (domain ) (not (hal_fastboot_server ))))
+(typeattributeset base_typeattr_604 (and (domain ) (not (hal_evs_server evsmanagerd ))))
 (typeattribute base_typeattr_603)
-(typeattributeset base_typeattr_603 (and (hal_face ) (not (coredomain ))))
+(typeattributeset base_typeattr_603 (and (domain ) (not (hal_dumpstate_client hal_dumpstate_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_602)
-(typeattributeset base_typeattr_602 (and (domain ) (not (hal_face_client hal_face_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_602 (and (domain ) (not (hal_dumpstate_client hal_dumpstate_server ))))
 (typeattribute base_typeattr_601)
-(typeattributeset base_typeattr_601 (and (domain ) (not (hal_face_client hal_face_server ))))
+(typeattributeset base_typeattr_601 (and (domain ) (not (hal_dumpstate_server ))))
 (typeattribute base_typeattr_600)
-(typeattributeset base_typeattr_600 (and (domain ) (not (hal_face_server ))))
+(typeattributeset base_typeattr_600 (and (domain ) (not (hal_drm_client hal_drm_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_599)
-(typeattributeset base_typeattr_599 (and (domain ) (not (hal_evs_client hal_evs_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_599 (and (domain ) (not (hal_drm_client hal_drm_server ))))
 (typeattribute base_typeattr_598)
-(typeattributeset base_typeattr_598 (and (domain ) (not (hal_evs_server ))))
+(typeattributeset base_typeattr_598 (and (domain ) (not (hal_drm_server ))))
 (typeattribute base_typeattr_597)
-(typeattributeset base_typeattr_597 (and (domain ) (not (hal_evs_server evsmanagerd ))))
+(typeattributeset base_typeattr_597 (and (domain ) (not (hal_contexthub_client hal_contexthub_server ))))
 (typeattribute base_typeattr_596)
-(typeattributeset base_typeattr_596 (and (domain ) (not (hal_dumpstate_client hal_dumpstate_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_596 (and (domain ) (not (hal_contexthub_server ))))
 (typeattribute base_typeattr_595)
-(typeattributeset base_typeattr_595 (and (domain ) (not (hal_dumpstate_client hal_dumpstate_server ))))
+(typeattributeset base_typeattr_595 (and (domain ) (not (hal_confirmationui_client hal_confirmationui_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_594)
-(typeattributeset base_typeattr_594 (and (domain ) (not (hal_dumpstate_server ))))
+(typeattributeset base_typeattr_594 (and (domain ) (not (hal_confirmationui_client hal_confirmationui_server ))))
 (typeattribute base_typeattr_593)
-(typeattributeset base_typeattr_593 (and (domain ) (not (hal_drm_client hal_drm_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_593 (and (domain ) (not (hal_confirmationui_server ))))
 (typeattribute base_typeattr_592)
-(typeattributeset base_typeattr_592 (and (domain ) (not (hal_drm_client hal_drm_server ))))
+(typeattributeset base_typeattr_592 (and (data_file_type ) (not (anr_data_file tombstone_data_file ))))
 (typeattribute base_typeattr_591)
-(typeattributeset base_typeattr_591 (and (domain ) (not (hal_drm_server ))))
+(typeattributeset base_typeattr_591 (and (domain ) (not (hal_configstore_server logd prng_seeder su tombstoned ))))
 (typeattribute base_typeattr_590)
-(typeattributeset base_typeattr_590 (and (domain ) (not (hal_contexthub_client hal_contexthub_server ))))
+(typeattributeset base_typeattr_590 (and (domain ) (not (hal_configstore_client hal_configstore_server ))))
 (typeattribute base_typeattr_589)
-(typeattributeset base_typeattr_589 (and (domain ) (not (hal_contexthub_server ))))
+(typeattributeset base_typeattr_589 (and (domain ) (not (hal_configstore_server ))))
 (typeattribute base_typeattr_588)
-(typeattributeset base_typeattr_588 (and (domain ) (not (hal_confirmationui_client hal_confirmationui_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_588 (and (hal_codec2_client ) (not (isolated_app_all ))))
 (typeattribute base_typeattr_587)
-(typeattributeset base_typeattr_587 (and (domain ) (not (hal_confirmationui_client hal_confirmationui_server ))))
+(typeattributeset base_typeattr_587 (and (domain ) (not (hal_codec2_client hal_codec2_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_586)
-(typeattributeset base_typeattr_586 (and (domain ) (not (hal_confirmationui_server ))))
+(typeattributeset base_typeattr_586 (and (domain ) (not (hal_codec2_client hal_codec2_server ))))
 (typeattribute base_typeattr_585)
-(typeattributeset base_typeattr_585 (and (data_file_type ) (not (anr_data_file tombstone_data_file ))))
+(typeattributeset base_typeattr_585 (and (domain ) (not (hal_codec2_server ))))
 (typeattribute base_typeattr_584)
-(typeattributeset base_typeattr_584 (and (domain ) (not (hal_configstore_server logd prng_seeder su tombstoned ))))
+(typeattributeset base_typeattr_584 (and (domain ) (not (hal_cas_client hal_cas_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_583)
-(typeattributeset base_typeattr_583 (and (domain ) (not (hal_configstore_client hal_configstore_server ))))
+(typeattributeset base_typeattr_583 (and (domain ) (not (hal_cas_client hal_cas_server ))))
 (typeattribute base_typeattr_582)
-(typeattributeset base_typeattr_582 (and (domain ) (not (hal_configstore_server ))))
+(typeattributeset base_typeattr_582 (and (domain ) (not (hal_cas_server ))))
 (typeattribute base_typeattr_581)
-(typeattributeset base_typeattr_581 (and (hal_codec2_client ) (not (isolated_app_all ))))
+(typeattributeset base_typeattr_581 (and (domain ) (not (hal_can_controller_client hal_can_controller_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_580)
-(typeattributeset base_typeattr_580 (and (domain ) (not (hal_codec2_client hal_codec2_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_580 (and (domain ) (not (hal_can_bus_client hal_can_bus_server ))))
 (typeattribute base_typeattr_579)
-(typeattributeset base_typeattr_579 (and (domain ) (not (hal_codec2_client hal_codec2_server ))))
+(typeattributeset base_typeattr_579 (and (domain ) (not (hal_can_bus_server ))))
 (typeattribute base_typeattr_578)
-(typeattributeset base_typeattr_578 (and (domain ) (not (hal_codec2_server ))))
+(typeattributeset base_typeattr_578 (and (domain ) (not (hal_can_controller_client hal_can_controller_server ))))
 (typeattribute base_typeattr_577)
-(typeattributeset base_typeattr_577 (and (domain ) (not (hal_cas_client hal_cas_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_577 (and (domain ) (not (hal_can_controller_server ))))
 (typeattribute base_typeattr_576)
-(typeattributeset base_typeattr_576 (and (domain ) (not (hal_cas_client hal_cas_server ))))
+(typeattributeset base_typeattr_576 (and (halserverdomain ) (not (hal_camera_server ))))
 (typeattribute base_typeattr_575)
-(typeattributeset base_typeattr_575 (and (domain ) (not (hal_cas_server ))))
+(typeattributeset base_typeattr_575 (and (appdomain ) (not (isolated_app ))))
 (typeattribute base_typeattr_574)
-(typeattributeset base_typeattr_574 (and (domain ) (not (hal_can_controller_client hal_can_controller_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_574 (and (domain ) (not (hal_camera_client hal_camera_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_573)
-(typeattributeset base_typeattr_573 (and (domain ) (not (hal_can_bus_client hal_can_bus_server ))))
+(typeattributeset base_typeattr_573 (and (domain ) (not (hal_camera_client hal_camera_server ))))
 (typeattribute base_typeattr_572)
-(typeattributeset base_typeattr_572 (and (domain ) (not (hal_can_bus_server ))))
+(typeattributeset base_typeattr_572 (and (domain ) (not (hal_camera_server ))))
 (typeattribute base_typeattr_571)
-(typeattributeset base_typeattr_571 (and (domain ) (not (hal_can_controller_client hal_can_controller_server ))))
+(typeattributeset base_typeattr_571 (and (domain ) (not (hal_broadcastradio_client hal_broadcastradio_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_570)
-(typeattributeset base_typeattr_570 (and (domain ) (not (hal_can_controller_server ))))
+(typeattributeset base_typeattr_570 (and (domain ) (not (hal_broadcastradio_client hal_broadcastradio_server ))))
 (typeattribute base_typeattr_569)
-(typeattributeset base_typeattr_569 (and (halserverdomain ) (not (hal_camera_server ))))
+(typeattributeset base_typeattr_569 (and (domain ) (not (hal_broadcastradio_server ))))
 (typeattribute base_typeattr_568)
-(typeattributeset base_typeattr_568 (and (appdomain ) (not (isolated_app ))))
+(typeattributeset base_typeattr_568 (and (domain ) (not (hal_bootctl_client hal_bootctl_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_567)
-(typeattributeset base_typeattr_567 (and (domain ) (not (hal_camera_client hal_camera_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_567 (and (domain ) (not (hal_bootctl_client hal_bootctl_server ))))
 (typeattribute base_typeattr_566)
-(typeattributeset base_typeattr_566 (and (domain ) (not (hal_camera_client hal_camera_server ))))
+(typeattributeset base_typeattr_566 (and (domain ) (not (hal_bootctl_server ))))
 (typeattribute base_typeattr_565)
-(typeattributeset base_typeattr_565 (and (domain ) (not (hal_camera_server ))))
+(typeattributeset base_typeattr_565 (and (domain ) (not (hal_bluetooth_client hal_bluetooth_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_564)
-(typeattributeset base_typeattr_564 (and (domain ) (not (hal_broadcastradio_client hal_broadcastradio_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_564 (and (domain ) (not (hal_bluetooth_client hal_bluetooth_server ))))
 (typeattribute base_typeattr_563)
-(typeattributeset base_typeattr_563 (and (domain ) (not (hal_broadcastradio_client hal_broadcastradio_server ))))
+(typeattributeset base_typeattr_563 (and (domain ) (not (hal_bluetooth_server ))))
 (typeattribute base_typeattr_562)
-(typeattributeset base_typeattr_562 (and (domain ) (not (hal_broadcastradio_server ))))
+(typeattributeset base_typeattr_562 (and (domain ) (not (hal_authsecret_client hal_authsecret_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_561)
-(typeattributeset base_typeattr_561 (and (domain ) (not (hal_bootctl_client hal_bootctl_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_561 (and (domain ) (not (hal_authsecret_client hal_authsecret_server ))))
 (typeattribute base_typeattr_560)
-(typeattributeset base_typeattr_560 (and (domain ) (not (hal_bootctl_client hal_bootctl_server ))))
+(typeattributeset base_typeattr_560 (and (domain ) (not (hal_authsecret_server ))))
 (typeattribute base_typeattr_559)
-(typeattributeset base_typeattr_559 (and (domain ) (not (hal_bootctl_server ))))
+(typeattributeset base_typeattr_559 (and (domain ) (not (hal_authgraph_client hal_authgraph_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_558)
-(typeattributeset base_typeattr_558 (and (domain ) (not (hal_bluetooth_client hal_bluetooth_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_558 (and (domain ) (not (hal_authgraph_server ))))
 (typeattribute base_typeattr_557)
-(typeattributeset base_typeattr_557 (and (domain ) (not (hal_bluetooth_client hal_bluetooth_server ))))
+(typeattributeset base_typeattr_557 (and (domain ) (not (hal_audiocontrol_client hal_audiocontrol_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_556)
-(typeattributeset base_typeattr_556 (and (domain ) (not (hal_bluetooth_server ))))
+(typeattributeset base_typeattr_556 (and (domain ) (not (hal_audiocontrol_client hal_audiocontrol_server ))))
 (typeattribute base_typeattr_555)
-(typeattributeset base_typeattr_555 (and (domain ) (not (hal_authsecret_client hal_authsecret_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_555 (and (domain ) (not (hal_audiocontrol_server ))))
 (typeattribute base_typeattr_554)
-(typeattributeset base_typeattr_554 (and (domain ) (not (hal_authsecret_client hal_authsecret_server ))))
+(typeattributeset base_typeattr_554 (and (halserverdomain ) (not (hal_audio_server hal_omx_server ))))
 (typeattribute base_typeattr_553)
-(typeattributeset base_typeattr_553 (and (domain ) (not (hal_authsecret_server ))))
+(typeattributeset base_typeattr_553 (and (domain ) (not (hal_audio_client hal_audio_server atrace shell system_app traceur_app ))))
 (typeattribute base_typeattr_552)
-(typeattributeset base_typeattr_552 (and (domain ) (not (hal_authgraph_client hal_authgraph_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_552 (and (domain ) (not (hal_audio_client hal_audio_server ))))
 (typeattribute base_typeattr_551)
-(typeattributeset base_typeattr_551 (and (domain ) (not (hal_authgraph_server ))))
+(typeattributeset base_typeattr_551 (and (domain ) (not (hal_audio_server ))))
 (typeattribute base_typeattr_550)
-(typeattributeset base_typeattr_550 (and (domain ) (not (hal_audiocontrol_client hal_audiocontrol_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_550 (and (domain ) (not (hal_atrace_client hal_atrace_server ))))
 (typeattribute base_typeattr_549)
-(typeattributeset base_typeattr_549 (and (domain ) (not (hal_audiocontrol_client hal_audiocontrol_server ))))
+(typeattributeset base_typeattr_549 (and (domain ) (not (hal_atrace_server ))))
 (typeattribute base_typeattr_548)
-(typeattributeset base_typeattr_548 (and (domain ) (not (hal_audiocontrol_server ))))
+(typeattributeset base_typeattr_548 (and (domain ) (not (hal_allocator_client hal_allocator_server ))))
 (typeattribute base_typeattr_547)
-(typeattributeset base_typeattr_547 (and (halserverdomain ) (not (hal_audio_server hal_omx_server ))))
+(typeattributeset base_typeattr_547 (and (domain ) (not (hal_allocator_server ))))
 (typeattribute base_typeattr_546)
-(typeattributeset base_typeattr_546 (and (domain ) (not (hal_audio_client hal_audio_server atrace shell system_app traceur_app ))))
+(typeattributeset base_typeattr_546 (and (domain ) (not (init gsid ))))
 (typeattribute base_typeattr_545)
-(typeattributeset base_typeattr_545 (and (domain ) (not (hal_audio_client hal_audio_server ))))
+(typeattributeset base_typeattr_545 (and (gsi_metadata_file_type ) (not (gsi_public_metadata_file ))))
 (typeattribute base_typeattr_544)
-(typeattributeset base_typeattr_544 (and (domain ) (not (hal_audio_server ))))
+(typeattributeset base_typeattr_544 (and (domain ) (not (fastbootd init gsid ))))
 (typeattribute base_typeattr_543)
-(typeattributeset base_typeattr_543 (and (domain ) (not (hal_atrace_client hal_atrace_server ))))
+(typeattributeset base_typeattr_543 (and (domain ) (not (update_engine_common fastbootd init recovery gsid ))))
 (typeattribute base_typeattr_542)
-(typeattributeset base_typeattr_542 (and (domain ) (not (hal_atrace_server ))))
+(typeattributeset base_typeattr_542 (and (domain ) (not (gsid ))))
 (typeattribute base_typeattr_541)
-(typeattributeset base_typeattr_541 (and (domain ) (not (hal_allocator_client hal_allocator_server ))))
+(typeattributeset base_typeattr_541 (and (domain ) (not (gpuservice init vendor_init ))))
 (typeattribute base_typeattr_540)
-(typeattributeset base_typeattr_540 (and (domain ) (not (hal_allocator_server ))))
+(typeattributeset base_typeattr_540 (and (domain ) (not (gpuservice ))))
 (typeattribute base_typeattr_539)
-(typeattributeset base_typeattr_539 (and (domain ) (not (init gsid ))))
+(typeattributeset base_typeattr_539 (and (domain ) (not (dumpstate gmscore_app init vendor_init ))))
 (typeattribute base_typeattr_538)
-(typeattributeset base_typeattr_538 (and (gsi_metadata_file_type ) (not (gsi_public_metadata_file ))))
+(typeattributeset base_typeattr_538 (and (domain ) (not (crash_dump gmscore_app llkd runas_app simpleperf ))))
 (typeattribute base_typeattr_537)
-(typeattributeset base_typeattr_537 (and (domain ) (not (fastbootd init gsid ))))
+(typeattributeset base_typeattr_537 (and (appdomain ) (not (gmscore_app runas_app shell simpleperf ))))
 (typeattribute base_typeattr_536)
-(typeattributeset base_typeattr_536 (and (domain ) (not (update_engine_common fastbootd init recovery gsid ))))
+(typeattributeset base_typeattr_536 (and (gmscore_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_535)
-(typeattributeset base_typeattr_535 (and (domain ) (not (gsid ))))
+(typeattributeset base_typeattr_535 (and (domain ) (not (gmscore_app ))))
 (typeattribute base_typeattr_534)
-(typeattributeset base_typeattr_534 (and (domain ) (not (gpuservice init vendor_init ))))
+(typeattributeset base_typeattr_534 (and (domain ) (not (gatekeeperd ))))
 (typeattribute base_typeattr_533)
-(typeattributeset base_typeattr_533 (and (domain ) (not (gpuservice ))))
+(typeattributeset base_typeattr_533 (and (fs_type file_type ) (not (fuseblkd_untrusted_exec ))))
 (typeattribute base_typeattr_532)
-(typeattributeset base_typeattr_532 (and (domain ) (not (dumpstate gmscore_app init vendor_init ))))
+(typeattributeset base_typeattr_532 (and (fs_type file_type ) (not (fuseblkd_exec ))))
 (typeattribute base_typeattr_531)
-(typeattributeset base_typeattr_531 (and (domain ) (not (crash_dump gmscore_app llkd runas_app simpleperf ))))
+(typeattributeset base_typeattr_531 (and (domain ) (not (fuseblkd_untrusted ))))
 (typeattribute base_typeattr_530)
-(typeattributeset base_typeattr_530 (and (appdomain ) (not (gmscore_app runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_530 (and (fs_type file_type ) (not (fsck_exec ))))
 (typeattribute base_typeattr_529)
-(typeattributeset base_typeattr_529 (and (gmscore_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_529 (and (domain ) (not (init vold ))))
 (typeattribute base_typeattr_528)
-(typeattributeset base_typeattr_528 (and (domain ) (not (gmscore_app ))))
+(typeattributeset base_typeattr_528 (and (vold_device root_block_device frp_block_device system_block_device recovery_block_device boot_block_device swap_block_device ) (not (system_block_device ))))
 (typeattribute base_typeattr_527)
-(typeattributeset base_typeattr_527 (and (domain ) (not (gatekeeperd ))))
+(typeattributeset base_typeattr_527 (and (domain ) (not (flags_health_check init ))))
 (typeattribute base_typeattr_526)
-(typeattributeset base_typeattr_526 (and (fs_type file_type ) (not (fuseblkd_untrusted_exec ))))
+(typeattributeset base_typeattr_526 (and (domain ) (not (fingerprintd ))))
 (typeattribute base_typeattr_525)
-(typeattributeset base_typeattr_525 (and (fs_type file_type ) (not (fuseblkd_exec ))))
+(typeattributeset base_typeattr_525 (and (domain ) (not (fastbootd ))))
 (typeattribute base_typeattr_524)
-(typeattributeset base_typeattr_524 (and (domain ) (not (fuseblkd_untrusted ))))
+(typeattributeset base_typeattr_524 (and (domain ) (not (evsmanagerd ))))
 (typeattribute base_typeattr_523)
-(typeattributeset base_typeattr_523 (and (fs_type file_type ) (not (fsck_exec ))))
+(typeattributeset base_typeattr_523 (and (domain ) (not (crash_dump ephemeral_app llkd runas_app simpleperf ))))
 (typeattribute base_typeattr_522)
-(typeattributeset base_typeattr_522 (and (domain ) (not (init vold ))))
+(typeattributeset base_typeattr_522 (and (appdomain ) (not (ephemeral_app runas_app shell simpleperf ))))
 (typeattribute base_typeattr_521)
-(typeattributeset base_typeattr_521 (and (vold_device root_block_device frp_block_device system_block_device recovery_block_device boot_block_device swap_block_device ) (not (system_block_device ))))
+(typeattributeset base_typeattr_521 (and (ephemeral_app ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_520)
-(typeattributeset base_typeattr_520 (and (domain ) (not (flags_health_check init ))))
+(typeattributeset base_typeattr_520 (and (domain ) (not (ephemeral_app ))))
 (typeattribute base_typeattr_519)
-(typeattributeset base_typeattr_519 (and (domain ) (not (fingerprintd ))))
+(typeattributeset base_typeattr_519 (and (domain ) (not (early_virtmgr ))))
 (typeattribute base_typeattr_518)
-(typeattributeset base_typeattr_518 (and (domain ) (not (fastbootd ))))
+(typeattributeset base_typeattr_518 (and (domain ) (not (crosvm early_virtmgr ))))
 (typeattribute base_typeattr_517)
-(typeattributeset base_typeattr_517 (and (domain ) (not (evsmanagerd ))))
+(typeattributeset base_typeattr_517 (and (domain ) (not (crosvm early_virtmgr init ))))
 (typeattribute base_typeattr_516)
-(typeattributeset base_typeattr_516 (and (domain ) (not (crash_dump ephemeral_app llkd runas_app simpleperf ))))
+(typeattributeset base_typeattr_516 (and (domain ) (not (apexd dumpstate init system_server vold_prepare_subdirs ))))
 (typeattribute base_typeattr_515)
-(typeattributeset base_typeattr_515 (and (appdomain ) (not (ephemeral_app runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_515 (and (domain ) (not (dumpstate shell system_server traceur_app ))))
 (typeattribute base_typeattr_514)
-(typeattributeset base_typeattr_514 (and (ephemeral_app ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_514 (and (domain ) (not (dumpstate ))))
 (typeattribute base_typeattr_513)
-(typeattributeset base_typeattr_513 (and (domain ) (not (ephemeral_app ))))
+(typeattributeset base_typeattr_513 (and (service_manager_type ) (not (hal_service_type apex_service default_android_service dumpstate_service gatekeeper_service virtual_touchpad_service vold_service fwk_vold_service ))))
 (typeattribute base_typeattr_512)
-(typeattributeset base_typeattr_512 (and (domain ) (not (early_virtmgr ))))
+(typeattributeset base_typeattr_512 (and (domain ) (not (drmserver ))))
 (typeattribute base_typeattr_511)
-(typeattributeset base_typeattr_511 (and (domain ) (not (crosvm early_virtmgr ))))
+(typeattributeset base_typeattr_511 (and (domain ) (not (init ueventd vendor_init ))))
 (typeattribute base_typeattr_510)
-(typeattributeset base_typeattr_510 (and (domain ) (not (crosvm early_virtmgr init ))))
+(typeattributeset base_typeattr_510 (and (domain ) (not (init zygote dexopt_chroot_setup ))))
 (typeattribute base_typeattr_509)
-(typeattributeset base_typeattr_509 (and (domain ) (not (apexd dumpstate init system_server vold_prepare_subdirs ))))
+(typeattributeset base_typeattr_509 (and (domain ) (not (init dexopt_chroot_setup ))))
 (typeattribute base_typeattr_508)
-(typeattributeset base_typeattr_508 (and (domain ) (not (dumpstate shell system_server traceur_app ))))
+(typeattributeset base_typeattr_508 (and (domain ) (not (gmscore_app init vold_prepare_subdirs ))))
 (typeattribute base_typeattr_507)
-(typeattributeset base_typeattr_507 (and (domain ) (not (dumpstate ))))
+(typeattributeset base_typeattr_507 (and (domain ) (not (appdomain artd installd system_server traced_probes ))))
 (typeattribute base_typeattr_506)
-(typeattributeset base_typeattr_506 (and (service_manager_type ) (not (hal_service_type apex_service default_android_service dumpstate_service gatekeeper_service virtual_touchpad_service vold_service ))))
+(typeattributeset base_typeattr_506 (and (domain ) (not (appdomain adbd artd crosvm dumpstate init installd simpleperf_app_runner system_server uncrypt virtualizationmanager ))))
 (typeattribute base_typeattr_505)
-(typeattributeset base_typeattr_505 (and (domain ) (not (drmserver ))))
+(typeattributeset base_typeattr_505 (and (domain ) (not (appdomain adbd artd dumpstate init installd simpleperf_app_runner system_server uncrypt ))))
 (typeattribute base_typeattr_504)
-(typeattributeset base_typeattr_504 (and (domain ) (not (init ueventd vendor_init ))))
+(typeattributeset base_typeattr_504 (and (domain ) (not (adbd artd dumpstate init installd shell vold ))))
 (typeattribute base_typeattr_503)
-(typeattributeset base_typeattr_503 (and (domain ) (not (init zygote dexopt_chroot_setup ))))
+(typeattributeset base_typeattr_503 (and (domain ) (not (appdomain adbd artd crosvm dumpstate installd uncrypt virtualizationmanager virtualizationservice ))))
 (typeattribute base_typeattr_502)
-(typeattributeset base_typeattr_502 (and (domain ) (not (init dexopt_chroot_setup ))))
+(typeattributeset base_typeattr_502 (and (domain ) (not (init kernel vendor_modprobe simpleperf_boot uprobestats ))))
 (typeattribute base_typeattr_501)
-(typeattributeset base_typeattr_501 (and (domain ) (not (gmscore_app init vold_prepare_subdirs ))))
+(typeattributeset base_typeattr_501 (and (domain ) (not (ueventd vendor_init ))))
 (typeattribute base_typeattr_500)
-(typeattributeset base_typeattr_500 (and (domain ) (not (appdomain artd installd system_server traced_probes ))))
+(typeattributeset base_typeattr_500 (and (debugfs_type ) (not (tracefs_type debugfs_kcov ))))
 (typeattribute base_typeattr_499)
-(typeattributeset base_typeattr_499 (and (domain ) (not (appdomain adbd artd crosvm dumpstate init installd simpleperf_app_runner system_server uncrypt virtualizationmanager ))))
+(typeattributeset base_typeattr_499 (and (domain ) (not (hal_dumpstate incidentd init vendor_modprobe ))))
 (typeattribute base_typeattr_498)
-(typeattributeset base_typeattr_498 (and (domain ) (not (appdomain adbd artd dumpstate init installd simpleperf_app_runner system_server uncrypt ))))
+(typeattributeset base_typeattr_498 (and (domain ) (not (init traced_perf traced_probes profcollectd simpleperf_boot ))))
 (typeattribute base_typeattr_497)
-(typeattributeset base_typeattr_497 (and (domain ) (not (adbd artd dumpstate init installd shell vold ))))
+(typeattributeset base_typeattr_497 (and (domain ) (not (init dexopt_chroot_setup otapreopt_chroot ))))
 (typeattribute base_typeattr_496)
-(typeattributeset base_typeattr_496 (and (domain ) (not (appdomain adbd artd crosvm dumpstate installd uncrypt virtualizationmanager virtualizationservice ))))
+(typeattributeset base_typeattr_496 (and (vendor_file_type ) (not (vendor_cgroup_desc_file vendor_task_profiles_file vendor_app_file vendor_configs_file same_process_hal_file vndk_sp_file vendor_framework_file vendor_overlay_file vendor_public_lib_file vendor_public_framework_file vendor_microdroid_file vendor_boot_ota_file vendor_keylayout_file vendor_keychars_file vendor_idc_file vendor_uuid_mapping_config_file vendor_apex_file vendor_apex_metadata_file vendor_service_contexts_file vendor_aconfig_storage_file ))))
 (typeattribute base_typeattr_495)
-(typeattributeset base_typeattr_495 (and (domain ) (not (init kernel vendor_modprobe simpleperf_boot uprobestats ))))
+(typeattributeset base_typeattr_495 (and (coredomain ) (not (system_executes_vendor_violators crash_dump crosvm heapprofd init kernel shell traced_perf ueventd vold profcollectd simpleperf_boot ))))
 (typeattribute base_typeattr_494)
-(typeattributeset base_typeattr_494 (and (domain ) (not (ueventd vendor_init ))))
+(typeattributeset base_typeattr_494 (and (coredomain ) (not (heapprofd init logd mdnsd netd prng_seeder su tombstoned traced traced_perf ))))
 (typeattribute base_typeattr_493)
-(typeattributeset base_typeattr_493 (and (debugfs_type ) (not (tracefs_type debugfs_kcov ))))
+(typeattributeset base_typeattr_493 (and (domain ) (not (appdomain coredomain socket_between_core_and_vendor_violators ))))
 (typeattribute base_typeattr_492)
-(typeattributeset base_typeattr_492 (and (domain ) (not (hal_dumpstate incidentd init vendor_modprobe ))))
+(typeattributeset base_typeattr_492 (and (coredomain ) (not (appdomain bootanim crash_dump heapprofd init kernel traced_perf ueventd profcollectd simpleperf_boot ))))
 (typeattribute base_typeattr_491)
-(typeattributeset base_typeattr_491 (and (domain ) (not (init traced_perf traced_probes profcollectd simpleperf_boot ))))
+(typeattributeset base_typeattr_491 (and (domain ) (not (init vendor_init art_boot ))))
 (typeattribute base_typeattr_490)
-(typeattributeset base_typeattr_490 (and (domain ) (not (init dexopt_chroot_setup otapreopt_chroot ))))
+(typeattributeset base_typeattr_490 (and (domain ) (not (fsck init installd zygote ))))
 (typeattribute base_typeattr_489)
-(typeattributeset base_typeattr_489 (and (vendor_file_type ) (not (vendor_cgroup_desc_file vendor_task_profiles_file vendor_app_file vendor_configs_file same_process_hal_file vndk_sp_file vendor_framework_file vendor_overlay_file vendor_public_lib_file vendor_public_framework_file vendor_microdroid_file vendor_boot_ota_file vendor_keylayout_file vendor_keychars_file vendor_idc_file vendor_uuid_mapping_config_file vendor_apex_file vendor_apex_metadata_file vendor_service_contexts_file vendor_aconfig_storage_file ))))
+(typeattributeset base_typeattr_489 (and (domain ) (not (domain hal_bootctl_server fastbootd init kernel recovery tee ueventd uncrypt gsid ))))
 (typeattribute base_typeattr_488)
-(typeattributeset base_typeattr_488 (and (coredomain ) (not (system_executes_vendor_violators crash_dump crosvm heapprofd init kernel shell traced_perf ueventd vold profcollectd simpleperf_boot ))))
+(typeattributeset base_typeattr_488 (and (debugfs_type ) (not (debugfs_tracing_debug ))))
 (typeattribute base_typeattr_487)
-(typeattributeset base_typeattr_487 (and (coredomain ) (not (heapprofd init logd mdnsd netd prng_seeder su tombstoned traced traced_perf ))))
+(typeattributeset base_typeattr_487 (and (fs_type ) (not (fusefs_type sdcard_type ))))
 (typeattribute base_typeattr_486)
-(typeattributeset base_typeattr_486 (and (domain ) (not (appdomain coredomain socket_between_core_and_vendor_violators ))))
+(typeattributeset base_typeattr_486 (and (domain ) (not (apexd init kernel recovery update_engine vold zygote dexopt_chroot_setup otapreopt_chroot ))))
 (typeattribute base_typeattr_485)
-(typeattributeset base_typeattr_485 (and (coredomain ) (not (appdomain bootanim crash_dump heapprofd init kernel traced_perf ueventd profcollectd simpleperf_boot ))))
+(typeattributeset base_typeattr_485 (not (apexd artd dnsmasq dumpstate heapprofd init installd llkd lmkd netd recovery rss_hwm_reset sdcardd tee traced_perf traced_probes ueventd uncrypt vendor_init vold vold_prepare_subdirs zygote migrate_legacy_obb_data postinstall_dexopt ) ))
 (typeattribute base_typeattr_484)
-(typeattributeset base_typeattr_484 (and (domain ) (not (init vendor_init art_boot ))))
+(typeattributeset base_typeattr_484 (not (apexd artd dnsmasq dumpstate init installd llkd lmkd netd recovery rss_hwm_reset sdcardd tee ueventd uncrypt vendor_init vold vold_prepare_subdirs zygote migrate_legacy_obb_data postinstall_dexopt ) ))
 (typeattribute base_typeattr_483)
-(typeattributeset base_typeattr_483 (and (domain ) (not (fsck init installd zygote ))))
+(typeattributeset base_typeattr_483 (and (domain ) (not (apexd init vold_prepare_subdirs compos_fd_server composd odrefresh odsign ))))
 (typeattribute base_typeattr_482)
-(typeattributeset base_typeattr_482 (and (domain ) (not (domain hal_bootctl_server fastbootd init kernel recovery tee ueventd uncrypt gsid ))))
+(typeattributeset base_typeattr_482 (and (domain ) (not (artd init installd zygote cppreopts dex2oat otapreopt_slot postinstall_dexopt ))))
 (typeattribute base_typeattr_481)
-(typeattributeset base_typeattr_481 (and (debugfs_type ) (not (debugfs_tracing_debug ))))
+(typeattributeset base_typeattr_481 (and (file_type ) (not (exec_type system_file_type vendor_file_type system_lib_file system_bootstrap_lib_file system_linker_exec postinstall_file ))))
 (typeattribute base_typeattr_480)
-(typeattributeset base_typeattr_480 (and (fs_type ) (not (fusefs_type sdcard_type ))))
+(typeattributeset base_typeattr_480 (and (domain ) (not (appdomain app_zygote mediaextractor mediaswcodec shell su webview_zygote zygote system_server_startup ))))
 (typeattribute base_typeattr_479)
-(typeattributeset base_typeattr_479 (and (domain ) (not (apexd init kernel recovery update_engine vold zygote dexopt_chroot_setup otapreopt_chroot ))))
+(typeattributeset base_typeattr_479 (and (fs_type ) (not (rootfs ))))
 (typeattribute base_typeattr_478)
-(typeattributeset base_typeattr_478 (not (apexd artd dnsmasq dumpstate heapprofd init installd llkd lmkd netd recovery rss_hwm_reset sdcardd tee traced_perf traced_probes ueventd uncrypt vendor_init vold vold_prepare_subdirs zygote migrate_legacy_obb_data postinstall_dexopt ) ))
+(typeattributeset base_typeattr_478 (and (domain ) (not (appdomain bootanim recovery ))))
 (typeattribute base_typeattr_477)
-(typeattributeset base_typeattr_477 (not (apexd artd dnsmasq dumpstate init installd llkd lmkd netd recovery rss_hwm_reset sdcardd tee ueventd uncrypt vendor_init vold vold_prepare_subdirs zygote migrate_legacy_obb_data postinstall_dexopt ) ))
+(typeattributeset base_typeattr_477 (and (domain ) (not (apexd init installd system_server update_provider ))))
 (typeattribute base_typeattr_476)
-(typeattributeset base_typeattr_476 (and (domain ) (not (apexd init vold_prepare_subdirs compos_fd_server composd odrefresh odsign ))))
+(typeattributeset base_typeattr_476 (and (domain ) (not (init installd system_server update_provider ))))
 (typeattribute base_typeattr_475)
-(typeattributeset base_typeattr_475 (and (domain ) (not (artd init installd zygote cppreopts dex2oat otapreopt_slot postinstall_dexopt ))))
+(typeattributeset base_typeattr_475 (and (domain ) (not (adbd apexd crosvm init installd kernel priv_app shell system_app system_server virtualizationmanager update_provider ))))
 (typeattribute base_typeattr_474)
-(typeattributeset base_typeattr_474 (and (file_type ) (not (exec_type system_file_type vendor_file_type system_lib_file system_bootstrap_lib_file system_linker_exec postinstall_file ))))
+(typeattributeset base_typeattr_474 (and (domain ) (not (apexd init installd priv_app system_server virtualizationmanager update_provider ))))
 (typeattribute base_typeattr_473)
-(typeattributeset base_typeattr_473 (and (domain ) (not (appdomain app_zygote mediaextractor mediaswcodec shell su webview_zygote zygote system_server_startup ))))
+(typeattributeset base_typeattr_473 (and (domain ) (not (artd installd ))))
 (typeattribute base_typeattr_472)
-(typeattributeset base_typeattr_472 (and (fs_type ) (not (rootfs ))))
+(typeattributeset base_typeattr_472 (and (domain ) (not (appdomain app_zygote artd installd rs ))))
 (typeattribute base_typeattr_471)
-(typeattributeset base_typeattr_471 (and (domain ) (not (appdomain bootanim recovery ))))
+(typeattributeset base_typeattr_471 (and (domain ) (not (appdomain artd installd rs vold_prepare_subdirs ))))
 (typeattribute base_typeattr_470)
-(typeattributeset base_typeattr_470 (and (domain ) (not (apexd init installd system_server update_provider ))))
+(typeattributeset base_typeattr_470 (and (domain ) (not (appdomain artd installd rs ))))
 (typeattribute base_typeattr_469)
-(typeattributeset base_typeattr_469 (and (domain ) (not (init installd system_server update_provider ))))
+(typeattributeset base_typeattr_469 (and (domain ) (not (init installd vold vold_prepare_subdirs ))))
 (typeattribute base_typeattr_468)
-(typeattributeset base_typeattr_468 (and (domain ) (not (adbd apexd crosvm init installd kernel priv_app shell system_app system_server virtualizationmanager update_provider ))))
+(typeattributeset base_typeattr_468 (and (domain ) (not (appdomain app_zygote artd installd rs system_server vold vold_prepare_subdirs zygote ))))
 (typeattribute base_typeattr_467)
-(typeattributeset base_typeattr_467 (and (domain ) (not (apexd init installd priv_app system_server virtualizationmanager update_provider ))))
+(typeattributeset base_typeattr_467 (and (domain ) (not (appdomain adbd app_zygote artd installd profman rs runas system_server zygote ))))
 (typeattribute base_typeattr_466)
-(typeattributeset base_typeattr_466 (and (domain ) (not (artd installd ))))
+(typeattributeset base_typeattr_466 (and (domain ) (not (artd installd vold_prepare_subdirs ))))
 (typeattribute base_typeattr_465)
-(typeattributeset base_typeattr_465 (and (domain ) (not (appdomain app_zygote artd installd rs ))))
+(typeattributeset base_typeattr_465 (and (domain ) (not (dumpstate init system_server ))))
 (typeattribute base_typeattr_464)
-(typeattributeset base_typeattr_464 (and (domain ) (not (appdomain artd installd rs ))))
+(typeattributeset base_typeattr_464 (and (domain ) (not (domain init vendor_init ))))
 (typeattribute base_typeattr_463)
-(typeattributeset base_typeattr_463 (and (domain ) (not (appdomain adbd app_zygote artd installd profman rs runas system_server zygote ))))
+(typeattributeset base_typeattr_463 (and (domain ) (not (gmscore_app priv_app ))))
 (typeattribute base_typeattr_462)
-(typeattributeset base_typeattr_462 (and (domain ) (not (dumpstate init system_server ))))
+(typeattributeset base_typeattr_462 (and (domain ) (not (dumpstate incidentd llkd system_server vold profcollectd simpleperf_boot storaged ))))
 (typeattribute base_typeattr_461)
-(typeattributeset base_typeattr_461 (and (domain ) (not (domain init vendor_init ))))
+(typeattributeset base_typeattr_461 (and (domain ) (not (domain hal_bootctl_server fastbootd init recovery ueventd uncrypt update_engine vendor_init vendor_misc_writer vold kcmdlinectrl misctrl mtectrl ))))
 (typeattribute base_typeattr_460)
-(typeattributeset base_typeattr_460 (and (domain ) (not (gmscore_app priv_app ))))
+(typeattributeset base_typeattr_460 (and (domain ) (not (init traced_probes vendor_init ))))
 (typeattribute base_typeattr_459)
-(typeattributeset base_typeattr_459 (and (domain ) (not (dumpstate incidentd llkd system_server vold profcollectd simpleperf_boot storaged ))))
+(typeattributeset base_typeattr_459 (and (domain ) (not (ephemeral_app untrusted_app_27 untrusted_app_25 ))))
 (typeattribute base_typeattr_458)
-(typeattributeset base_typeattr_458 (and (domain ) (not (domain hal_bootctl_server fastbootd init recovery ueventd uncrypt update_engine vendor_init vendor_misc_writer vold kcmdlinectrl misctrl mtectrl ))))
+(typeattributeset base_typeattr_458 (and (domain ) (not (hal_codec2_server hal_omx_server ))))
 (typeattribute base_typeattr_457)
-(typeattributeset base_typeattr_457 (and (domain ) (not (init traced_probes vendor_init ))))
+(typeattributeset base_typeattr_457 (and (coredomain ) (not (apexd charger incidentd init recovery shell ueventd ))))
 (typeattribute base_typeattr_456)
-(typeattributeset base_typeattr_456 (and (domain ) (not (ephemeral_app untrusted_app_27 untrusted_app_25 ))))
+(typeattributeset base_typeattr_456 (and (coredomain ) (not (appdomain ))))
 (typeattribute base_typeattr_455)
-(typeattributeset base_typeattr_455 (and (domain ) (not (hal_codec2_server hal_omx_server ))))
+(typeattributeset base_typeattr_455 (and (coredomain ) (not (system_writes_mnt_vendor_violators init ueventd vold ))))
 (typeattribute base_typeattr_454)
-(typeattributeset base_typeattr_454 (and (coredomain ) (not (apexd charger incidentd init recovery shell ueventd ))))
+(typeattributeset base_typeattr_454 (not (coredomain ) ))
 (typeattribute base_typeattr_453)
-(typeattributeset base_typeattr_453 (and (coredomain ) (not (appdomain ))))
+(typeattributeset base_typeattr_453 (not (system_file_type system_dlkm_file_type vendor_file_type rootfs ) ))
 (typeattribute base_typeattr_452)
-(typeattributeset base_typeattr_452 (and (coredomain ) (not (system_writes_mnt_vendor_violators init ueventd vold ))))
+(typeattributeset base_typeattr_452 (and (domain ) (not (artd installd profman ))))
 (typeattribute base_typeattr_451)
-(typeattributeset base_typeattr_451 (not (coredomain ) ))
+(typeattributeset base_typeattr_451 (and (domain ) (not (init vendor_init vold ))))
 (typeattribute base_typeattr_450)
-(typeattributeset base_typeattr_450 (not (system_file_type system_dlkm_file_type vendor_file_type rootfs ) ))
+(typeattributeset base_typeattr_450 (not (hwservicemanager ) ))
 (typeattribute base_typeattr_449)
-(typeattributeset base_typeattr_449 (and (domain ) (not (artd installd profman ))))
+(typeattributeset base_typeattr_449 (not (servicemanager vndservicemanager ) ))
 (typeattribute base_typeattr_448)
-(typeattributeset base_typeattr_448 (and (domain ) (not (init vendor_init vold ))))
+(typeattributeset base_typeattr_448 (and (domain ) (not (installd shell uncrypt ))))
 (typeattribute base_typeattr_447)
-(typeattributeset base_typeattr_447 (not (hwservicemanager ) ))
+(typeattributeset base_typeattr_447 (and (domain ) (not (appdomain artd installd ))))
 (typeattribute base_typeattr_446)
-(typeattributeset base_typeattr_446 (not (servicemanager vndservicemanager ) ))
+(typeattributeset base_typeattr_446 (and (appdomain ) (not (shell simpleperf su tradeinmode ))))
 (typeattribute base_typeattr_445)
-(typeattributeset base_typeattr_445 (and (domain ) (not (installd shell uncrypt ))))
+(typeattributeset base_typeattr_445 (and (domain ) (not (app_zygote runas simpleperf_app_runner webview_zygote zygote ))))
 (typeattribute base_typeattr_444)
-(typeattributeset base_typeattr_444 (and (domain ) (not (appdomain artd installd ))))
+(typeattributeset base_typeattr_444 (and (domain ) (not (adbd init runas zygote ))))
 (typeattribute base_typeattr_443)
-(typeattributeset base_typeattr_443 (and (appdomain ) (not (shell simpleperf su tradeinmode ))))
+(typeattributeset base_typeattr_443 (and (domain ) (not (init installd system_app system_server toolbox vold_prepare_subdirs ))))
 (typeattribute base_typeattr_442)
-(typeattributeset base_typeattr_442 (and (domain ) (not (app_zygote runas simpleperf_app_runner webview_zygote zygote ))))
+(typeattributeset base_typeattr_442 (not (domain ) ))
 (typeattribute base_typeattr_441)
-(typeattributeset base_typeattr_441 (and (domain ) (not (adbd init runas zygote ))))
+(typeattributeset base_typeattr_441 (and (domain ) (not (untrusted_app_27 untrusted_app_25 ))))
 (typeattribute base_typeattr_440)
-(typeattributeset base_typeattr_440 (and (domain ) (not (init installd system_app system_server toolbox vold_prepare_subdirs ))))
+(typeattributeset base_typeattr_440 (and (file_type ) (not (apk_data_file app_data_file asec_public_file ))))
 (typeattribute base_typeattr_439)
-(typeattributeset base_typeattr_439 (not (domain ) ))
+(typeattributeset base_typeattr_439 (and (domain ) (not (dumpstate shell su ))))
 (typeattribute base_typeattr_438)
-(typeattributeset base_typeattr_438 (and (domain ) (not (untrusted_app_27 untrusted_app_25 ))))
+(typeattributeset base_typeattr_438 (and (domain ) (not (init system_server ))))
 (typeattribute base_typeattr_437)
-(typeattributeset base_typeattr_437 (and (file_type ) (not (apk_data_file app_data_file asec_public_file ))))
+(typeattributeset base_typeattr_437 (and (domain ) (not (dumpstate incidentd system_server ))))
 (typeattribute base_typeattr_436)
-(typeattributeset base_typeattr_436 (and (domain ) (not (dumpstate shell su ))))
+(typeattributeset base_typeattr_436 (and (domain ) (not (app_zygote system_server webview_zygote ))))
 (typeattribute base_typeattr_435)
-(typeattributeset base_typeattr_435 (and (domain ) (not (init system_server ))))
+(typeattributeset base_typeattr_435 (and (domain ) (not (system_server ))))
 (typeattribute base_typeattr_434)
-(typeattributeset base_typeattr_434 (and (domain ) (not (dumpstate incidentd system_server ))))
+(typeattributeset base_typeattr_434 (and (domain ) (not (system_server zygote ))))
 (typeattribute base_typeattr_433)
-(typeattributeset base_typeattr_433 (and (domain ) (not (app_zygote system_server webview_zygote ))))
+(typeattributeset base_typeattr_433 (and (system_file_type ) (not (crash_dump_exec early_virtmgr_exec system_event_log_tags_file system_lib_file system_bootstrap_lib_file system_group_file system_linker_exec system_linker_config_file system_passwd_file system_seccomp_policy_file system_security_cacerts_file tcpdump_exec system_zoneinfo_file cgroup_desc_file task_profiles_file file_contexts_file property_contexts_file netutils_wrapper_exec shell_exec toolbox_exec virtualizationmanager_exec ))))
 (typeattribute base_typeattr_432)
-(typeattributeset base_typeattr_432 (and (domain ) (not (system_server ))))
+(typeattributeset base_typeattr_432 (and (vendor_file_type ) (not (same_process_hal_file ))))
 (typeattribute base_typeattr_431)
-(typeattributeset base_typeattr_431 (and (domain ) (not (system_server zygote ))))
+(typeattributeset base_typeattr_431 (and (coredomain ) (not (system_executes_vendor_violators shell ))))
 (typeattribute base_typeattr_430)
-(typeattributeset base_typeattr_430 (and (system_file_type ) (not (crash_dump_exec early_virtmgr_exec system_event_log_tags_file system_lib_file system_bootstrap_lib_file system_group_file system_linker_exec system_linker_config_file system_passwd_file system_seccomp_policy_file system_security_cacerts_file tcpdump_exec system_zoneinfo_file cgroup_desc_file task_profiles_file file_contexts_file property_contexts_file netutils_wrapper_exec shell_exec toolbox_exec virtualizationmanager_exec ))))
+(typeattributeset base_typeattr_430 (and (vendor_file_type ) (not (vendor_app_file same_process_hal_file vndk_sp_file vendor_public_lib_file vendor_public_framework_file ))))
 (typeattribute base_typeattr_429)
-(typeattributeset base_typeattr_429 (and (vendor_file_type ) (not (same_process_hal_file ))))
+(typeattributeset base_typeattr_429 (and (coredomain ) (not (system_executes_vendor_violators init shell ueventd ))))
 (typeattribute base_typeattr_428)
-(typeattributeset base_typeattr_428 (and (coredomain ) (not (system_executes_vendor_violators shell ))))
+(typeattributeset base_typeattr_428 (and (file_type ) (not (vendor_file_type init_exec ))))
 (typeattribute base_typeattr_427)
-(typeattributeset base_typeattr_427 (and (vendor_file_type ) (not (vendor_app_file same_process_hal_file vndk_sp_file vendor_public_lib_file vendor_public_framework_file ))))
+(typeattributeset base_typeattr_427 (and (file_type ) (not (system_file_type postinstall_file ))))
 (typeattribute base_typeattr_426)
-(typeattributeset base_typeattr_426 (and (coredomain ) (not (system_executes_vendor_violators init shell ueventd ))))
+(typeattributeset base_typeattr_426 (and (system_file_type ) (not (crash_dump_exec early_virtmgr_exec system_lib_file system_bootstrap_lib_file system_linker_exec tcpdump_exec netutils_wrapper_exec shell_exec toolbox_exec virtualizationmanager_exec ))))
 (typeattribute base_typeattr_425)
-(typeattributeset base_typeattr_425 (and (file_type ) (not (vendor_file_type init_exec ))))
+(typeattributeset base_typeattr_425 (and (domain ) (not (appdomain coredomain vendor_executes_system_violators vendor_init ))))
 (typeattribute base_typeattr_424)
-(typeattributeset base_typeattr_424 (and (file_type ) (not (system_file_type postinstall_file ))))
+(typeattributeset base_typeattr_424 (and (coredomain ) (not (init shell ueventd ))))
 (typeattribute base_typeattr_423)
-(typeattributeset base_typeattr_423 (and (system_file_type ) (not (crash_dump_exec early_virtmgr_exec system_lib_file system_bootstrap_lib_file system_linker_exec tcpdump_exec netutils_wrapper_exec shell_exec toolbox_exec virtualizationmanager_exec ))))
+(typeattributeset base_typeattr_423 (and (coredomain ) (not (data_between_core_and_vendor_violators init ))))
 (typeattribute base_typeattr_422)
-(typeattributeset base_typeattr_422 (and (domain ) (not (appdomain coredomain vendor_executes_system_violators vendor_init ))))
+(typeattributeset base_typeattr_422 (and (coredomain ) (not (data_between_core_and_vendor_violators init vold vold_prepare_subdirs ))))
 (typeattribute base_typeattr_421)
-(typeattributeset base_typeattr_421 (and (coredomain ) (not (init shell ueventd ))))
+(typeattributeset base_typeattr_421 (and (domain ) (not (appdomain coredomain data_between_core_and_vendor_violators ))))
 (typeattribute base_typeattr_420)
-(typeattributeset base_typeattr_420 (and (coredomain ) (not (data_between_core_and_vendor_violators init ))))
+(typeattributeset base_typeattr_420 (and (core_data_file_type ) (not (system_data_root_file system_data_file vendor_data_file vendor_userdir_file unencrypted_data_file ))))
 (typeattribute base_typeattr_419)
-(typeattributeset base_typeattr_419 (and (coredomain ) (not (data_between_core_and_vendor_violators init vold vold_prepare_subdirs ))))
+(typeattributeset base_typeattr_419 (and (core_data_file_type ) (not (system_data_root_file system_data_file vendor_data_file vendor_userdir_file ))))
 (typeattribute base_typeattr_418)
-(typeattributeset base_typeattr_418 (and (domain ) (not (appdomain coredomain data_between_core_and_vendor_violators ))))
+(typeattributeset base_typeattr_418 (and (core_data_file_type ) (not (unencrypted_data_file ))))
 (typeattribute base_typeattr_417)
-(typeattributeset base_typeattr_417 (and (core_data_file_type ) (not (system_data_root_file system_data_file vendor_data_file vendor_userdir_file unencrypted_data_file ))))
+(typeattributeset base_typeattr_417 (and (vendor_init ) (not (data_between_core_and_vendor_violators ))))
 (typeattribute base_typeattr_416)
-(typeattributeset base_typeattr_416 (and (core_data_file_type ) (not (system_data_root_file system_data_file vendor_data_file vendor_userdir_file ))))
+(typeattributeset base_typeattr_416 (and (domain ) (not (appdomain coredomain data_between_core_and_vendor_violators vendor_init ))))
 (typeattribute base_typeattr_415)
-(typeattributeset base_typeattr_415 (and (core_data_file_type ) (not (unencrypted_data_file ))))
+(typeattributeset base_typeattr_415 (and (data_file_type ) (not (core_data_file_type app_data_file_type vendor_data_file ))))
 (typeattribute base_typeattr_414)
-(typeattributeset base_typeattr_414 (and (vendor_init ) (not (data_between_core_and_vendor_violators ))))
+(typeattributeset base_typeattr_414 (and (data_file_type ) (not (core_data_file_type app_data_file_type ))))
 (typeattribute base_typeattr_413)
-(typeattributeset base_typeattr_413 (and (domain ) (not (appdomain coredomain data_between_core_and_vendor_violators vendor_init ))))
+(typeattributeset base_typeattr_413 (and (coredomain ) (not (appdomain data_between_core_and_vendor_violators init vold_prepare_subdirs ))))
 (typeattribute base_typeattr_412)
-(typeattributeset base_typeattr_412 (and (data_file_type ) (not (core_data_file_type app_data_file_type vendor_data_file ))))
+(typeattributeset base_typeattr_412 (and (dev_type file_type ) (not (core_data_file_type app_data_file_type coredomain_socket unlabeled ))))
 (typeattribute base_typeattr_411)
-(typeattributeset base_typeattr_411 (and (data_file_type ) (not (core_data_file_type app_data_file_type ))))
+(typeattributeset base_typeattr_411 (and (coredomain ) (not (socket_between_core_and_vendor_violators init ueventd ))))
 (typeattribute base_typeattr_410)
-(typeattributeset base_typeattr_410 (and (coredomain ) (not (appdomain data_between_core_and_vendor_violators init vold_prepare_subdirs ))))
+(typeattributeset base_typeattr_410 (and (core_data_file_type coredomain_socket unlabeled ) (not (pdx_endpoint_socket_type pdx_channel_socket_type app_data_file privapp_data_file ))))
 (typeattribute base_typeattr_409)
-(typeattributeset base_typeattr_409 (and (dev_type file_type ) (not (core_data_file_type app_data_file_type coredomain_socket unlabeled ))))
+(typeattributeset base_typeattr_409 (and (domain ) (not (appdomain coredomain socket_between_core_and_vendor_violators data_between_core_and_vendor_violators vendor_init ))))
 (typeattribute base_typeattr_408)
-(typeattributeset base_typeattr_408 (and (coredomain ) (not (socket_between_core_and_vendor_violators init ueventd ))))
+(typeattributeset base_typeattr_408 (and (domain ) (not (coredomain socket_between_core_and_vendor_violators ))))
 (typeattribute base_typeattr_407)
-(typeattributeset base_typeattr_407 (and (core_data_file_type coredomain_socket unlabeled ) (not (pdx_endpoint_socket_type pdx_channel_socket_type app_data_file privapp_data_file ))))
+(typeattributeset base_typeattr_407 (and (coredomain ) (not (adbd init ))))
 (typeattribute base_typeattr_406)
-(typeattributeset base_typeattr_406 (and (domain ) (not (appdomain coredomain socket_between_core_and_vendor_violators data_between_core_and_vendor_violators vendor_init ))))
+(typeattributeset base_typeattr_406 (and (coredomain ) (not (shell su ))))
 (typeattribute base_typeattr_405)
-(typeattributeset base_typeattr_405 (and (domain ) (not (coredomain socket_between_core_and_vendor_violators ))))
+(typeattributeset base_typeattr_405 (and (coredomain ) (not (shell su ueventd ))))
 (typeattribute base_typeattr_404)
-(typeattributeset base_typeattr_404 (and (coredomain ) (not (adbd init ))))
+(typeattributeset base_typeattr_404 (and (service_manager_type ) (not (app_api_service ephemeral_app_api_service hal_service_type apc_service audioserver_service cameraserver_service drmserver_service credstore_service keystore_maintenance_service keystore_service legacykeystore_service mediaserver_service mediametrics_service mediaextractor_service mediadrmserver_service nfc_service radio_service virtual_touchpad_service vr_manager_service hal_face_service ))))
 (typeattribute base_typeattr_403)
-(typeattributeset base_typeattr_403 (and (coredomain ) (not (shell su ))))
+(typeattributeset base_typeattr_403 (and (appdomain ) (not (coredomain ))))
 (typeattribute base_typeattr_402)
-(typeattributeset base_typeattr_402 (and (coredomain ) (not (shell su ueventd ))))
+(typeattributeset base_typeattr_402 (and (domain ) (not (hwservicemanager servicemanager vndservicemanager ))))
 (typeattribute base_typeattr_401)
-(typeattributeset base_typeattr_401 (and (service_manager_type ) (not (app_api_service ephemeral_app_api_service hal_service_type apc_service audioserver_service cameraserver_service drmserver_service credstore_service keystore_maintenance_service keystore_service legacykeystore_service mediaserver_service mediametrics_service mediaextractor_service mediadrmserver_service nfc_service radio_service virtual_touchpad_service vr_manager_service hal_face_service ))))
+(typeattributeset base_typeattr_401 (and (domain ) (not (fastbootd fsck init recovery update_engine remount ))))
 (typeattribute base_typeattr_400)
-(typeattributeset base_typeattr_400 (and (appdomain ) (not (coredomain ))))
+(typeattributeset base_typeattr_400 (and (domain ) (not (hal_fastboot_server e2fs fastbootd fsck init recovery vold ))))
 (typeattribute base_typeattr_399)
-(typeattributeset base_typeattr_399 (and (domain ) (not (hwservicemanager servicemanager vndservicemanager ))))
+(typeattributeset base_typeattr_399 (and (domain ) (not (init recovery system_server ueventd ))))
 (typeattribute base_typeattr_398)
-(typeattributeset base_typeattr_398 (and (domain ) (not (fastbootd fsck init recovery update_engine remount ))))
+(typeattributeset base_typeattr_398 (and (domain ) (not (hal_camera_server hal_cas_server hal_drm_server hal_keymint_server adbd dumpstate fastbootd incidentd init mediadrmserver mediaserver recovery shell system_server vendor_init adbd_tradeinmode ))))
 (typeattribute base_typeattr_397)
-(typeattributeset base_typeattr_397 (and (domain ) (not (hal_fastboot_server e2fs fastbootd fsck init recovery vold ))))
+(typeattributeset base_typeattr_397 (and (domain ) (not (dumpstate init vendor_init ))))
 (typeattribute base_typeattr_396)
-(typeattributeset base_typeattr_396 (and (domain ) (not (init recovery system_server ueventd ))))
+(typeattributeset base_typeattr_396 (and (domain ) (not (coredomain vendor_init ))))
 (typeattribute base_typeattr_395)
-(typeattributeset base_typeattr_395 (and (domain ) (not (hal_camera_server hal_cas_server hal_drm_server hal_keymint_server adbd dumpstate fastbootd incidentd init mediadrmserver mediaserver recovery shell system_server vendor_init adbd_tradeinmode ))))
+(typeattributeset base_typeattr_395 (and (domain ) (not (init system_server vendor_init ))))
 (typeattribute base_typeattr_394)
-(typeattributeset base_typeattr_394 (and (domain ) (not (dumpstate init vendor_init ))))
+(typeattributeset base_typeattr_394 (and (fs_type ) (not (contextmount_type ))))
 (typeattribute base_typeattr_393)
-(typeattributeset base_typeattr_393 (and (domain ) (not (coredomain vendor_init ))))
+(typeattributeset base_typeattr_393 (and (domain ) (not (adbd crash_dump heapprofd init shell ))))
 (typeattribute base_typeattr_392)
-(typeattributeset base_typeattr_392 (and (domain ) (not (init system_server vendor_init ))))
+(typeattributeset base_typeattr_392 (and (domain ) (not (adbd init shell ))))
 (typeattribute base_typeattr_391)
-(typeattributeset base_typeattr_391 (and (fs_type ) (not (contextmount_type ))))
+(typeattributeset base_typeattr_391 (and (domain ) (not (shell ))))
 (typeattribute base_typeattr_390)
-(typeattributeset base_typeattr_390 (and (domain ) (not (adbd crash_dump heapprofd init shell ))))
+(typeattributeset base_typeattr_390 (and (domain ) (not (init kernel recovery ))))
 (typeattribute base_typeattr_389)
-(typeattributeset base_typeattr_389 (and (domain ) (not (adbd init shell ))))
+(typeattributeset base_typeattr_389 (and (domain ) (not (domain dumpstate init vendor_init ))))
 (typeattribute base_typeattr_388)
-(typeattributeset base_typeattr_388 (and (domain ) (not (shell ))))
+(typeattributeset base_typeattr_388 (and (domain ) (not (init ueventd ))))
 (typeattribute base_typeattr_387)
-(typeattributeset base_typeattr_387 (and (domain ) (not (init kernel recovery ))))
+(typeattributeset base_typeattr_387 (and (file_type ) (not (exec_type postinstall_file ))))
 (typeattribute base_typeattr_386)
-(typeattributeset base_typeattr_386 (and (domain ) (not (domain dumpstate init vendor_init ))))
+(typeattributeset base_typeattr_386 (and (domain ) (not (shell ueventd ))))
 (typeattribute base_typeattr_385)
-(typeattributeset base_typeattr_385 (and (domain ) (not (init ueventd ))))
+(typeattributeset base_typeattr_385 (and (domain ) (not (prng_seeder shell ueventd ))))
 (typeattribute base_typeattr_384)
-(typeattributeset base_typeattr_384 (and (file_type ) (not (exec_type postinstall_file ))))
+(typeattributeset base_typeattr_384 (and (domain ) (not (kernel ))))
 (typeattribute base_typeattr_383)
-(typeattributeset base_typeattr_383 (and (domain ) (not (shell ueventd ))))
+(typeattributeset base_typeattr_383 (and (domain ) (not (init kernel ueventd vold ))))
 (typeattribute base_typeattr_382)
-(typeattributeset base_typeattr_382 (and (domain ) (not (prng_seeder shell ueventd ))))
+(typeattributeset base_typeattr_382 (and (domain ) (not (init recovery ))))
 (typeattribute base_typeattr_381)
-(typeattributeset base_typeattr_381 (and (domain ) (not (kernel ))))
+(typeattributeset base_typeattr_381 (and (domain ) (not (hal_audio_server hal_camera_server hal_cas_server hal_codec2_server hal_configstore_server hal_drm_server hal_omx_server app_zygote artd audioserver cameraserver init kernel mediadrmserver mediaextractor mediametrics mediaserver mediatranscoding system_server ueventd vendor_init webview_zygote dexopt_chroot_setup mediatuner ))))
 (typeattribute base_typeattr_380)
-(typeattributeset base_typeattr_380 (and (domain ) (not (init kernel ueventd vold ))))
+(typeattributeset base_typeattr_380 (and (domain ) (not (dumpstate init system_server vendor_init ))))
 (typeattribute base_typeattr_379)
-(typeattributeset base_typeattr_379 (and (domain ) (not (init recovery ))))
+(typeattributeset base_typeattr_379 (and (domain ) (not (untrusted_app_all isolated_app_all app_zygote ephemeral_app ))))
 (typeattribute base_typeattr_378)
-(typeattributeset base_typeattr_378 (and (domain ) (not (hal_audio_server hal_camera_server hal_cas_server hal_codec2_server hal_configstore_server hal_drm_server hal_omx_server app_zygote artd audioserver cameraserver init kernel mediadrmserver mediaextractor mediametrics mediaserver mediatranscoding system_server ueventd vendor_init webview_zygote dexopt_chroot_setup mediatuner ))))
+(typeattributeset base_typeattr_378 (and (domain ) (not (appdomain coredomain ))))
 (typeattribute base_typeattr_377)
-(typeattributeset base_typeattr_377 (and (domain ) (not (dumpstate init system_server vendor_init ))))
+(typeattributeset base_typeattr_377 (and (domain ) (not (appdomain rs ))))
 (typeattribute base_typeattr_376)
-(typeattributeset base_typeattr_376 (and (domain ) (not (untrusted_app_all isolated_app_all app_zygote ephemeral_app ))))
+(typeattributeset base_typeattr_376 (and (domain ) (not (hal_configstore_server apexd app_zygote bpfloader crash_dump crosvm init kernel keystore llkd logd ueventd vendor_init vold webview_zygote zygote ))))
 (typeattribute base_typeattr_375)
-(typeattributeset base_typeattr_375 (and (domain ) (not (appdomain coredomain ))))
+(typeattributeset base_typeattr_375 (and (domain ) (not (hal_configstore_server apexd app_zygote bpfloader crash_dump crosvm init kernel keystore llkd logd logpersist recovery recovery_persist recovery_refresh ueventd vendor_init vold webview_zygote zygote ))))
 (typeattribute base_typeattr_374)
-(typeattributeset base_typeattr_374 (and (domain ) (not (appdomain rs ))))
+(typeattributeset base_typeattr_374 (and (domain ) (not (domain ))))
 (typeattribute base_typeattr_373)
-(typeattributeset base_typeattr_373 (and (domain ) (not (hal_configstore_server apexd app_zygote bpfloader crash_dump crosvm init kernel keystore llkd logd ueventd vendor_init vold webview_zygote zygote ))))
+(typeattributeset base_typeattr_373 (and (domain ) (not (isolated_app servicemanager vndservicemanager ))))
 (typeattribute base_typeattr_372)
-(typeattributeset base_typeattr_372 (and (domain ) (not (hal_configstore_server apexd app_zygote bpfloader crash_dump crosvm init kernel keystore llkd logd logpersist recovery recovery_persist recovery_refresh ueventd vendor_init vold webview_zygote zygote ))))
+(typeattributeset base_typeattr_372 (and (domain ) (not (hwservicemanager vndservicemanager ))))
 (typeattribute base_typeattr_371)
-(typeattributeset base_typeattr_371 (and (domain ) (not (domain ))))
+(typeattributeset base_typeattr_371 (and (domain ) (not (artd_subprocess_type ))))
 (typeattribute base_typeattr_370)
-(typeattributeset base_typeattr_370 (and (domain ) (not (isolated_app servicemanager vndservicemanager ))))
+(typeattributeset base_typeattr_370 (and (domain ) (not (display_service_server ))))
 (typeattribute base_typeattr_369)
-(typeattributeset base_typeattr_369 (and (domain ) (not (hwservicemanager vndservicemanager ))))
+(typeattributeset base_typeattr_369 (and (domain ) (not (artd init system_server vendor_init art_exec dexopt_chroot_setup ))))
 (typeattribute base_typeattr_368)
-(typeattributeset base_typeattr_368 (and (domain ) (not (artd_subprocess_type ))))
+(typeattributeset base_typeattr_368 (and (domain ) (not (dexopt_chroot_setup ))))
 (typeattribute base_typeattr_367)
-(typeattributeset base_typeattr_367 (and (domain ) (not (display_service_server ))))
+(typeattributeset base_typeattr_367 (and (domain ) (not (dex2oat ))))
 (typeattribute base_typeattr_366)
-(typeattributeset base_typeattr_366 (and (domain ) (not (artd init system_server vendor_init art_exec dexopt_chroot_setup ))))
+(typeattributeset base_typeattr_366 (and (domain ) (not (crash_dump llkd runas_app simpleperf device_as_webcam ))))
 (typeattribute base_typeattr_365)
-(typeattributeset base_typeattr_365 (and (domain ) (not (dexopt_chroot_setup ))))
+(typeattributeset base_typeattr_365 (and (appdomain ) (not (runas_app shell simpleperf device_as_webcam ))))
 (typeattribute base_typeattr_364)
-(typeattributeset base_typeattr_364 (and (domain ) (not (dex2oat ))))
+(typeattributeset base_typeattr_364 (and (device_as_webcam ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_363)
-(typeattributeset base_typeattr_363 (and (domain ) (not (crash_dump llkd runas_app simpleperf device_as_webcam ))))
+(typeattributeset base_typeattr_363 (and (domain ) (not (device_as_webcam ))))
 (typeattribute base_typeattr_362)
-(typeattributeset base_typeattr_362 (and (appdomain ) (not (runas_app shell simpleperf device_as_webcam ))))
+(typeattributeset base_typeattr_362 (and (domain ) (not (init derive_sdk ))))
 (typeattribute base_typeattr_361)
-(typeattributeset base_typeattr_361 (and (device_as_webcam ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_361 (and (domain ) (not (crosvm early_virtmgr virtualizationmanager vmlauncher_app ))))
 (typeattribute base_typeattr_360)
-(typeattributeset base_typeattr_360 (and (domain ) (not (device_as_webcam ))))
+(typeattributeset base_typeattr_360 (and (app_data_file_type ) (not (shell_data_file app_data_file privapp_data_file ))))
 (typeattribute base_typeattr_359)
-(typeattributeset base_typeattr_359 (and (domain ) (not (init derive_sdk ))))
+(typeattributeset base_typeattr_359 (and (vendor_file_type ) (not (vendor_cgroup_desc_file vendor_task_profiles_file vendor_configs_file same_process_hal_file vndk_sp_file vendor_microdroid_file vendor_vm_file vendor_vm_data_file ))))
 (typeattribute base_typeattr_358)
-(typeattributeset base_typeattr_358 (and (domain ) (not (crosvm early_virtmgr virtualizationmanager vmlauncher_app ))))
+(typeattributeset base_typeattr_358 (and (apk_data_file staging_data_file app_data_file privapp_data_file virtualizationservice_data_file vm_data_file storage_area_content_file ) (not (shell_data_file ))))
 (typeattribute base_typeattr_357)
-(typeattributeset base_typeattr_357 (and (app_data_file_type ) (not (shell_data_file app_data_file privapp_data_file ))))
+(typeattributeset base_typeattr_357 (and (appdomain coredomain ) (not (crosvm ueventd ))))
 (typeattribute base_typeattr_356)
-(typeattributeset base_typeattr_356 (and (vendor_file_type ) (not (vendor_cgroup_desc_file vendor_task_profiles_file vendor_configs_file same_process_hal_file vndk_sp_file vendor_microdroid_file vendor_vm_file vendor_vm_data_file ))))
+(typeattributeset base_typeattr_356 (and (appdomain coredomain ) (not (crosvm shell ueventd ))))
 (typeattribute base_typeattr_355)
-(typeattributeset base_typeattr_355 (and (apk_data_file staging_data_file app_data_file privapp_data_file virtualizationservice_data_file vm_data_file ) (not (shell_data_file ))))
+(typeattributeset base_typeattr_355 (and (domain ) (not (crosvm ))))
 (typeattribute base_typeattr_354)
-(typeattributeset base_typeattr_354 (and (appdomain coredomain ) (not (crosvm ueventd ))))
+(typeattributeset base_typeattr_354 (and (domain ) (not (crosvm ueventd ))))
 (typeattribute base_typeattr_353)
-(typeattributeset base_typeattr_353 (and (appdomain coredomain ) (not (crosvm shell ueventd ))))
+(typeattributeset base_typeattr_353 (and (domain ) (not (crosvm shell ueventd ))))
 (typeattribute base_typeattr_352)
-(typeattributeset base_typeattr_352 (and (domain ) (not (crosvm ))))
+(typeattributeset base_typeattr_352 (and (domain ) (not (credstore ))))
 (typeattribute base_typeattr_351)
-(typeattributeset base_typeattr_351 (and (domain ) (not (crosvm ueventd ))))
+(typeattributeset base_typeattr_351 (and (apexd bpfloader init kernel keystore llkd logd ueventd vendor_init vold ) (not (apexd llkd logd vold ))))
 (typeattribute base_typeattr_350)
-(typeattributeset base_typeattr_350 (and (domain ) (not (crosvm shell ueventd ))))
+(typeattributeset base_typeattr_350 (and (domain ) (not (apexd bpfloader crash_dump init kernel keystore llkd logd ueventd vendor_init vold ))))
 (typeattribute base_typeattr_349)
-(typeattributeset base_typeattr_349 (and (domain ) (not (credstore ))))
+(typeattributeset base_typeattr_349 (and (dmabuf_heap_device_type ) (not (dmabuf_system_heap_device dmabuf_system_secure_heap_device ))))
 (typeattribute base_typeattr_348)
-(typeattributeset base_typeattr_348 (and (apexd bpfloader init kernel keystore llkd logd ueventd vendor_init vold ) (not (apexd llkd logd vold ))))
+(typeattributeset base_typeattr_348 (and (coredomain ) (not (init ueventd ))))
 (typeattribute base_typeattr_347)
-(typeattributeset base_typeattr_347 (and (domain ) (not (apexd bpfloader crash_dump init kernel keystore llkd logd ueventd vendor_init vold ))))
+(typeattributeset base_typeattr_347 (and (coredomain ) (not (adbd init mediaprovider system_server adbd_tradeinmode ))))
 (typeattribute base_typeattr_346)
-(typeattributeset base_typeattr_346 (and (dmabuf_heap_device_type ) (not (dmabuf_system_heap_device dmabuf_system_secure_heap_device ))))
+(typeattributeset base_typeattr_346 (and (coredomain ) (not (init system_server ))))
 (typeattribute base_typeattr_345)
-(typeattributeset base_typeattr_345 (and (coredomain ) (not (init ueventd ))))
+(typeattributeset base_typeattr_345 (and (coredomain ) (not (bootstat charger dumpstate incidentd init logd logpersist recovery_persist recovery_refresh shell system_server ))))
 (typeattribute base_typeattr_344)
-(typeattributeset base_typeattr_344 (and (coredomain ) (not (adbd init mediaprovider system_server adbd_tradeinmode ))))
+(typeattributeset base_typeattr_344 (and (coredomain ) (not (init ))))
 (typeattribute base_typeattr_343)
-(typeattributeset base_typeattr_343 (and (coredomain ) (not (init system_server ))))
+(typeattributeset base_typeattr_343 (and (coredomain ) (not (atrace dumpstate gpuservice init lmkd shell system_server traced_perf traced_probes traceur_app prefetch profcollectd simpleperf_boot ))))
 (typeattribute base_typeattr_342)
-(typeattributeset base_typeattr_342 (and (coredomain ) (not (bootstat charger dumpstate incidentd init logd logpersist recovery_persist recovery_refresh shell system_server ))))
+(typeattributeset base_typeattr_342 (and (coredomain ) (not (apexd fsck init ueventd ))))
 (typeattribute base_typeattr_341)
-(typeattributeset base_typeattr_341 (and (coredomain ) (not (init ))))
+(typeattributeset base_typeattr_341 (and (coredomain ) (not (apexd init ueventd vold vfio_handler ))))
 (typeattribute base_typeattr_340)
-(typeattributeset base_typeattr_340 (and (coredomain ) (not (atrace dumpstate gpuservice init lmkd shell system_server traced_perf traced_probes traceur_app prefetch profcollectd simpleperf_boot ))))
+(typeattributeset base_typeattr_340 (and (coredomain ) (not (init vold ))))
 (typeattribute base_typeattr_339)
-(typeattributeset base_typeattr_339 (and (coredomain ) (not (apexd fsck init ueventd ))))
+(typeattributeset base_typeattr_339 (and (coredomain ) (not (appdomain app_zygote artd heapprofd idmap init installd rs system_server traced_perf webview_zygote zygote dex2oat postinstall_dexopt profcollectd simpleperf_boot ))))
 (typeattribute base_typeattr_338)
-(typeattributeset base_typeattr_338 (and (coredomain ) (not (apexd init ueventd vold vfio_handler ))))
+(typeattributeset base_typeattr_338 (and (coredomain ) (not (appdomain app_zygote artd heapprofd idmap init installd rs system_server traced_perf webview_zygote zygote dex2oat postinstall_dexopt ))))
 (typeattribute base_typeattr_337)
-(typeattributeset base_typeattr_337 (and (coredomain ) (not (init vold ))))
+(typeattributeset base_typeattr_337 (and (coredomain ) (not (appdomain artd heapprofd idmap init installd mediaserver profman rs system_server traced_perf dex2oat postinstall_dexopt profcollectd simpleperf_boot ))))
 (typeattribute base_typeattr_336)
-(typeattributeset base_typeattr_336 (and (coredomain ) (not (appdomain app_zygote artd heapprofd idmap init installd rs system_server traced_perf webview_zygote zygote dex2oat postinstall_dexopt profcollectd simpleperf_boot ))))
+(typeattributeset base_typeattr_336 (and (coredomain ) (not (appdomain artd heapprofd idmap init installd rs system_server traced_perf dex2oat postinstall_dexopt ))))
 (typeattribute base_typeattr_335)
-(typeattributeset base_typeattr_335 (and (coredomain ) (not (appdomain app_zygote artd heapprofd idmap init installd rs system_server traced_perf webview_zygote zygote dex2oat postinstall_dexopt ))))
+(typeattributeset base_typeattr_335 (and (coredomain ) (not (apexd init ueventd vold ))))
 (typeattribute base_typeattr_334)
-(typeattributeset base_typeattr_334 (and (coredomain ) (not (appdomain artd heapprofd idmap init installd mediaserver profman rs system_server traced_perf dex2oat postinstall_dexopt profcollectd simpleperf_boot ))))
+(typeattributeset base_typeattr_334 (and (domain ) (not (odsign ))))
 (typeattribute base_typeattr_333)
-(typeattributeset base_typeattr_333 (and (coredomain ) (not (appdomain artd heapprofd idmap init installd rs system_server traced_perf dex2oat postinstall_dexopt ))))
+(typeattributeset base_typeattr_333 (and (domain ) (not (composd ))))
 (typeattribute base_typeattr_332)
-(typeattributeset base_typeattr_332 (and (coredomain ) (not (apexd init ueventd vold ))))
+(typeattributeset base_typeattr_332 (and (domain ) (not (charger charger_vendor dumpstate init vendor_init ))))
 (typeattribute base_typeattr_331)
-(typeattributeset base_typeattr_331 (and (domain ) (not (odsign ))))
+(typeattributeset base_typeattr_331 (and (domain ) (not (charger charger_vendor init vendor_init ))))
 (typeattribute base_typeattr_330)
-(typeattributeset base_typeattr_330 (and (domain ) (not (composd ))))
+(typeattributeset base_typeattr_330 (and (domain ) (not (charger dumpstate init ))))
 (typeattribute base_typeattr_329)
-(typeattributeset base_typeattr_329 (and (domain ) (not (charger charger_vendor dumpstate init vendor_init ))))
+(typeattributeset base_typeattr_329 (and (domain ) (not (cameraserver ))))
 (typeattribute base_typeattr_328)
-(typeattributeset base_typeattr_328 (and (domain ) (not (charger charger_vendor init vendor_init ))))
+(typeattributeset base_typeattr_328 (and (domain ) (not (camera_service_server ))))
 (typeattribute base_typeattr_327)
-(typeattributeset base_typeattr_327 (and (domain ) (not (charger dumpstate init ))))
+(typeattributeset base_typeattr_327 (and (domain ) (not (bufferhubd ))))
 (typeattribute base_typeattr_326)
-(typeattributeset base_typeattr_326 (and (domain ) (not (cameraserver ))))
+(typeattributeset base_typeattr_326 (and (domain ) (not (llkd ))))
 (typeattribute base_typeattr_325)
-(typeattributeset base_typeattr_325 (and (domain ) (not (camera_service_server ))))
+(typeattributeset base_typeattr_325 (and (coredomain ) (not (bpfloader netd netutils_wrapper ))))
 (typeattribute base_typeattr_324)
-(typeattributeset base_typeattr_324 (and (domain ) (not (bufferhubd ))))
+(typeattributeset base_typeattr_324 (and (domain ) (not (bpfloader init ))))
 (typeattribute base_typeattr_323)
-(typeattributeset base_typeattr_323 (and (domain ) (not (llkd ))))
+(typeattributeset base_typeattr_323 (and (bpffs_type ) (not (fs_bpf_vendor ))))
 (typeattribute base_typeattr_322)
-(typeattributeset base_typeattr_322 (and (coredomain ) (not (bpfloader netd netutils_wrapper ))))
+(typeattributeset base_typeattr_322 (and (domain ) (not (bpfloader gpuservice lmkd netd netutils_wrapper network_stack system_server uprobestats ))))
 (typeattribute base_typeattr_321)
-(typeattributeset base_typeattr_321 (and (domain ) (not (bpfloader init ))))
+(typeattributeset base_typeattr_321 (and (domain ) (not (bpfloader uprobestats ))))
 (typeattribute base_typeattr_320)
-(typeattributeset base_typeattr_320 (and (bpffs_type ) (not (fs_bpf_vendor ))))
+(typeattributeset base_typeattr_320 (and (domain ) (not (bpfloader netd netutils_wrapper network_stack system_server ))))
 (typeattribute base_typeattr_319)
-(typeattributeset base_typeattr_319 (and (domain ) (not (bpfloader gpuservice lmkd netd netutils_wrapper network_stack system_server uprobestats ))))
+(typeattributeset base_typeattr_319 (and (domain ) (not (bpfloader netd network_stack system_server ))))
 (typeattribute base_typeattr_318)
-(typeattributeset base_typeattr_318 (and (domain ) (not (bpfloader uprobestats ))))
+(typeattributeset base_typeattr_318 (and (domain ) (not (bpfloader network_stack system_server ))))
 (typeattribute base_typeattr_317)
-(typeattributeset base_typeattr_317 (and (domain ) (not (bpfloader netd netutils_wrapper network_stack system_server ))))
+(typeattributeset base_typeattr_317 (and (domain ) (not (bpfloader network_stack ))))
 (typeattribute base_typeattr_316)
-(typeattributeset base_typeattr_316 (and (domain ) (not (bpfloader netd network_stack system_server ))))
+(typeattributeset base_typeattr_316 (and (domain ) (not (bpfloader gpuservice lmkd netd netutils_wrapper system_server mediaprovider_app ))))
 (typeattribute base_typeattr_315)
-(typeattributeset base_typeattr_315 (and (domain ) (not (bpfloader network_stack system_server ))))
+(typeattributeset base_typeattr_315 (and (domain ) (not (bpfloader ))))
 (typeattribute base_typeattr_314)
-(typeattributeset base_typeattr_314 (and (domain ) (not (bpfloader network_stack ))))
+(typeattributeset base_typeattr_314 (and (bpffs_type ) (not (fs_bpf ))))
 (typeattribute base_typeattr_313)
-(typeattributeset base_typeattr_313 (and (domain ) (not (bpfloader gpuservice lmkd netd netutils_wrapper system_server mediaprovider_app ))))
+(typeattributeset base_typeattr_313 (and (domain ) (not (bpfdomain ))))
 (typeattribute base_typeattr_312)
-(typeattributeset base_typeattr_312 (and (domain ) (not (bpfloader ))))
+(typeattributeset base_typeattr_312 (and (bpfdomain ) (not (bpfloader netd netutils_wrapper network_stack system_server ))))
 (typeattribute base_typeattr_311)
-(typeattributeset base_typeattr_311 (and (bpffs_type ) (not (fs_bpf ))))
+(typeattributeset base_typeattr_311 (and (domain ) (not (init vendor_init boringssl_self_test vendor_boringssl_self_test ))))
 (typeattribute base_typeattr_310)
-(typeattributeset base_typeattr_310 (and (domain ) (not (bpfdomain ))))
+(typeattributeset base_typeattr_310 (and (domain ) (not (bootstat init system_server ))))
 (typeattribute base_typeattr_309)
-(typeattributeset base_typeattr_309 (and (bpfdomain ) (not (bpfloader netd netutils_wrapper network_stack system_server ))))
+(typeattributeset base_typeattr_309 (and (domain ) (not (bootanim bootstat dumpstate incidentd init platform_app recovery shell system_server ))))
 (typeattribute base_typeattr_308)
-(typeattributeset base_typeattr_308 (and (domain ) (not (init vendor_init boringssl_self_test vendor_boringssl_self_test ))))
+(typeattributeset base_typeattr_308 (and (domain ) (not (bootstat init ))))
 (typeattribute base_typeattr_307)
-(typeattributeset base_typeattr_307 (and (domain ) (not (bootstat init system_server ))))
+(typeattributeset base_typeattr_307 (and (domain ) (not (bluetooth init ))))
 (typeattribute base_typeattr_306)
-(typeattributeset base_typeattr_306 (and (domain ) (not (bootanim bootstat dumpstate incidentd init platform_app recovery shell system_server ))))
+(typeattributeset base_typeattr_306 (and (domain ) (not (bluetooth crash_dump llkd runas_app simpleperf ))))
 (typeattribute base_typeattr_305)
-(typeattributeset base_typeattr_305 (and (domain ) (not (bootstat init ))))
+(typeattributeset base_typeattr_305 (and (appdomain ) (not (bluetooth runas_app shell simpleperf ))))
 (typeattribute base_typeattr_304)
-(typeattributeset base_typeattr_304 (and (domain ) (not (bluetooth init ))))
+(typeattributeset base_typeattr_304 (and (bluetooth ) (not (runas_app shell simpleperf ))))
 (typeattribute base_typeattr_303)
-(typeattributeset base_typeattr_303 (and (domain ) (not (bluetooth crash_dump llkd runas_app simpleperf ))))
+(typeattributeset base_typeattr_303 (and (domain ) (not (bluetooth ))))
 (typeattribute base_typeattr_302)
-(typeattributeset base_typeattr_302 (and (appdomain ) (not (bluetooth runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_302 (and (fs_type file_type ) (not (shell_exec blkid_exec ))))
 (typeattribute base_typeattr_301)
-(typeattributeset base_typeattr_301 (and (bluetooth ) (not (runas_app shell simpleperf ))))
+(typeattributeset base_typeattr_301 (and (domain ) (not (vold ))))
 (typeattribute base_typeattr_300)
-(typeattributeset base_typeattr_300 (and (domain ) (not (bluetooth ))))
+(typeattributeset base_typeattr_300 (and (domain ) (not (automotive_display_service ))))
 (typeattribute base_typeattr_299)
-(typeattributeset base_typeattr_299 (and (fs_type file_type ) (not (shell_exec blkid_exec ))))
+(typeattributeset base_typeattr_299 (and (domain ) (not (su ))))
 (typeattribute base_typeattr_298)
-(typeattributeset base_typeattr_298 (and (domain ) (not (vold ))))
+(typeattributeset base_typeattr_298 (and (domain ) (not (audioserver ))))
 (typeattribute base_typeattr_297)
-(typeattributeset base_typeattr_297 (and (domain ) (not (automotive_display_service ))))
+(typeattributeset base_typeattr_297 (and (service_manager_type ) (not (apex_service default_android_service dnsresolver_service dumpstate_service incident_service installd_service lpdump_service mdns_service netd_service vold_service stats_service tracingproxy_service ))))
 (typeattribute base_typeattr_296)
-(typeattributeset base_typeattr_296 (and (domain ) (not (su ))))
+(typeattributeset base_typeattr_296 (not (crash_dump artd_subprocess_type ) ))
 (typeattribute base_typeattr_295)
-(typeattributeset base_typeattr_295 (and (domain ) (not (audioserver ))))
+(typeattributeset base_typeattr_295 (not (art_exec_exec ) ))
 (typeattribute base_typeattr_294)
-(typeattributeset base_typeattr_294 (and (service_manager_type ) (not (apex_service default_android_service dnsresolver_service dumpstate_service incident_service installd_service lpdump_service mdns_service netd_service vold_service stats_service tracingproxy_service ))))
+(typeattributeset base_typeattr_294 (and (domain ) (not (artd ))))
 (typeattribute base_typeattr_293)
-(typeattributeset base_typeattr_293 (not (crash_dump artd_subprocess_type ) ))
+(typeattributeset base_typeattr_293 (and (domain ) (not (app_zygote prng_seeder su ))))
 (typeattribute base_typeattr_292)
-(typeattributeset base_typeattr_292 (not (art_exec_exec ) ))
+(typeattributeset base_typeattr_292 (and (domain ) (not (app_zygote logd su system_server ))))
 (typeattribute base_typeattr_291)
-(typeattributeset base_typeattr_291 (and (domain ) (not (artd ))))
+(typeattributeset base_typeattr_291 (and (service_manager_type ) (not (activity_service webviewupdate_service ))))
 (typeattribute base_typeattr_290)
-(typeattributeset base_typeattr_290 (and (domain ) (not (app_zygote prng_seeder su ))))
+(typeattributeset base_typeattr_290 (and (domain ) (not (zygote ))))
 (typeattribute base_typeattr_289)
-(typeattributeset base_typeattr_289 (and (domain ) (not (app_zygote logd su system_server ))))
+(typeattributeset base_typeattr_289 (and (domain ) (not (isolated_app ))))
 (typeattribute base_typeattr_288)
-(typeattributeset base_typeattr_288 (and (service_manager_type ) (not (activity_service webviewupdate_service ))))
+(typeattributeset base_typeattr_288 (and (domain ) (not (app_zygote ))))
 (typeattribute base_typeattr_287)
-(typeattributeset base_typeattr_287 (and (domain ) (not (zygote ))))
+(typeattributeset base_typeattr_287 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (untrusted_app_32 untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 ))))
 (typeattribute base_typeattr_286)
-(typeattributeset base_typeattr_286 (and (domain ) (not (isolated_app ))))
+(typeattributeset base_typeattr_286 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (mediaprovider mediaprovider_app ))))
 (typeattribute base_typeattr_285)
-(typeattributeset base_typeattr_285 (and (domain ) (not (app_zygote ))))
+(typeattributeset base_typeattr_285 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (untrusted_app_25 ))))
 (typeattribute base_typeattr_284)
-(typeattributeset base_typeattr_284 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (untrusted_app_32 untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 ))))
+(typeattributeset base_typeattr_284 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (mediaprovider_app ))))
 (typeattribute base_typeattr_283)
-(typeattributeset base_typeattr_283 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (mediaprovider mediaprovider_app ))))
+(typeattributeset base_typeattr_283 (and (fs_type file_type ) (not (sdcard_type fuse coredump_file user_profile_data_file media_rw_data_file method_trace_data_file app_data_file privapp_data_file app_exec_data_file storage_area_content_file ))))
 (typeattribute base_typeattr_282)
-(typeattributeset base_typeattr_282 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (untrusted_app_25 ))))
+(typeattributeset base_typeattr_282 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 ))))
 (typeattribute base_typeattr_281)
-(typeattributeset base_typeattr_281 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (mediaprovider_app ))))
+(typeattributeset base_typeattr_281 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (untrusted_app_27 untrusted_app_25 ))))
 (typeattribute base_typeattr_280)
-(typeattributeset base_typeattr_280 (and (fs_type file_type ) (not (sdcard_type fuse coredump_file user_profile_data_file media_rw_data_file method_trace_data_file app_data_file privapp_data_file app_exec_data_file ))))
+(typeattributeset base_typeattr_280 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (runas_app untrusted_app_27 untrusted_app_25 ))))
 (typeattribute base_typeattr_279)
-(typeattributeset base_typeattr_279 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 ))))
+(typeattributeset base_typeattr_279 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (mediaprovider ))))
 (typeattribute base_typeattr_278)
-(typeattributeset base_typeattr_278 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (untrusted_app_27 untrusted_app_25 ))))
+(typeattributeset base_typeattr_278 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (domain ))))
 (typeattribute base_typeattr_277)
-(typeattributeset base_typeattr_277 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (runas_app untrusted_app_27 untrusted_app_25 ))))
+(typeattributeset base_typeattr_277 (and (debugfs_type ) (not (debugfs_kcov ))))
 (typeattribute base_typeattr_276)
-(typeattributeset base_typeattr_276 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (mediaprovider ))))
+(typeattributeset base_typeattr_276 (and (appdomain ) (not (mediaprovider_app ))))
 (typeattribute base_typeattr_275)
-(typeattributeset base_typeattr_275 (and (untrusted_app_all isolated_app_all ephemeral_app isolated_app isolated_compute_app mediaprovider untrusted_app untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 mediaprovider_app ) (not (domain ))))
+(typeattributeset base_typeattr_275 (and (domain ) (not (appdomain crash_dump rs virtualizationmanager ))))
 (typeattribute base_typeattr_274)
-(typeattributeset base_typeattr_274 (and (debugfs_type ) (not (debugfs_kcov ))))
+(typeattributeset base_typeattr_274 (and (appdomain ) (not (shell su ))))
 (typeattribute base_typeattr_273)
-(typeattributeset base_typeattr_273 (and (appdomain ) (not (mediaprovider_app ))))
+(typeattributeset base_typeattr_273 (and (appdomain ) (not (untrusted_app_32 untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 ))))
 (typeattribute base_typeattr_272)
-(typeattributeset base_typeattr_272 (and (domain ) (not (appdomain crash_dump rs virtualizationmanager ))))
+(typeattributeset base_typeattr_272 (and (appdomain ) (not (device_as_webcam ))))
 (typeattribute base_typeattr_271)
-(typeattributeset base_typeattr_271 (and (appdomain ) (not (shell su ))))
+(typeattributeset base_typeattr_271 (and (data_file_type ) (not (system_data_file apk_data_file dalvikcache_data_file apex_art_data_file ))))
 (typeattribute base_typeattr_270)
-(typeattributeset base_typeattr_270 (and (appdomain ) (not (untrusted_app_32 untrusted_app_30 untrusted_app_29 untrusted_app_27 untrusted_app_25 ))))
+(typeattributeset base_typeattr_270 (and (appdomain ) (not (bluetooth system_app ))))
 (typeattribute base_typeattr_269)
-(typeattributeset base_typeattr_269 (and (appdomain ) (not (device_as_webcam ))))
+(typeattributeset base_typeattr_269 (and (appdomain ) (not (bluetooth nfc ))))
 (typeattribute base_typeattr_268)
-(typeattributeset base_typeattr_268 (and (data_file_type ) (not (system_data_file apk_data_file dalvikcache_data_file apex_art_data_file ))))
+(typeattributeset base_typeattr_268 (and (domain ) (not (credstore init ))))
 (typeattribute base_typeattr_267)
-(typeattributeset base_typeattr_267 (and (appdomain ) (not (bluetooth system_app ))))
+(typeattributeset base_typeattr_267 (and (appdomain ) (not (platform_app ))))
 (typeattribute base_typeattr_266)
-(typeattributeset base_typeattr_266 (and (appdomain ) (not (bluetooth nfc ))))
+(typeattributeset base_typeattr_266 (and (domain ) (not (appdomain perfetto ))))
 (typeattribute base_typeattr_265)
-(typeattributeset base_typeattr_265 (and (domain ) (not (credstore init ))))
+(typeattributeset base_typeattr_265 (and (appdomain ) (not (shell ))))
 (typeattribute base_typeattr_264)
-(typeattributeset base_typeattr_264 (and (appdomain ) (not (platform_app ))))
+(typeattributeset base_typeattr_264 (and (domain ) (not (appdomain crash_dump llkd ))))
 (typeattribute base_typeattr_263)
-(typeattributeset base_typeattr_263 (and (domain ) (not (appdomain perfetto ))))
+(typeattributeset base_typeattr_263 (and (domain ) (not (appdomain ))))
 (typeattribute base_typeattr_262)
-(typeattributeset base_typeattr_262 (and (appdomain ) (not (shell ))))
+(typeattributeset base_typeattr_262 (and (appdomain ) (not (radio ))))
 (typeattribute base_typeattr_261)
-(typeattributeset base_typeattr_261 (and (domain ) (not (appdomain crash_dump llkd ))))
+(typeattributeset base_typeattr_261 (and (appdomain ) (not (network_stack ))))
 (typeattribute base_typeattr_260)
-(typeattributeset base_typeattr_260 (and (domain ) (not (appdomain ))))
+(typeattributeset base_typeattr_260 (and (appdomain ) (not (nfc ))))
 (typeattribute base_typeattr_259)
-(typeattributeset base_typeattr_259 (and (appdomain ) (not (radio ))))
+(typeattributeset base_typeattr_259 (and (appdomain ) (not (bluetooth network_stack ))))
 (typeattribute base_typeattr_258)
-(typeattributeset base_typeattr_258 (and (appdomain ) (not (network_stack ))))
+(typeattributeset base_typeattr_258 (and (appdomain ) (not (bluetooth ))))
 (typeattribute base_typeattr_257)
-(typeattributeset base_typeattr_257 (and (appdomain ) (not (nfc ))))
+(typeattributeset base_typeattr_257 (and (appdomain ) (not (isolated_app_all ))))
 (typeattribute base_typeattr_256)
-(typeattributeset base_typeattr_256 (and (appdomain ) (not (bluetooth network_stack ))))
+(typeattributeset base_typeattr_256 (and (appdomain ) (not (mlstrustedsubject isolated_app_all sdk_sandbox_all ))))
 (typeattribute base_typeattr_255)
-(typeattributeset base_typeattr_255 (and (appdomain ) (not (bluetooth ))))
+(typeattributeset base_typeattr_255 (and (appdomain ) (not (isolated_app_all sdk_sandbox_all ))))
 (typeattribute base_typeattr_254)
-(typeattributeset base_typeattr_254 (and (appdomain ) (not (isolated_app_all ))))
+(typeattributeset base_typeattr_254 (and (appdomain ) (not (isolated_app_all ephemeral_app sdk_sandbox_all ))))
 (typeattribute base_typeattr_253)
-(typeattributeset base_typeattr_253 (and (appdomain ) (not (mlstrustedsubject isolated_app_all sdk_sandbox_all ))))
+(typeattributeset base_typeattr_253 (and (appdomain ) (not (ephemeral_app sdk_sandbox_all ))))
 (typeattribute base_typeattr_252)
-(typeattributeset base_typeattr_252 (and (appdomain ) (not (isolated_app_all sdk_sandbox_all ))))
+(typeattributeset base_typeattr_252 (and (appdomain ) (not (sdk_sandbox_all ))))
 (typeattribute base_typeattr_251)
-(typeattributeset base_typeattr_251 (and (appdomain ) (not (isolated_app_all ephemeral_app sdk_sandbox_all ))))
+(typeattributeset base_typeattr_251 (and (appdomain ) (not (untrusted_app_all isolated_app_all ephemeral_app platform_app priv_app shell su system_app sdk_sandbox_all ))))
 (typeattribute base_typeattr_250)
-(typeattributeset base_typeattr_250 (and (appdomain ) (not (ephemeral_app sdk_sandbox_all ))))
+(typeattributeset base_typeattr_250 (and (appdomain ) (not (untrusted_app_all isolated_app_all ephemeral_app platform_app priv_app shell system_app sdk_sandbox_all ))))
 (typeattribute base_typeattr_249)
-(typeattributeset base_typeattr_249 (and (appdomain ) (not (sdk_sandbox_all ))))
+(typeattributeset base_typeattr_249 (and (domain ) (not (crash_dump ))))
 (typeattribute base_typeattr_248)
-(typeattributeset base_typeattr_248 (and (appdomain ) (not (untrusted_app_all isolated_app_all ephemeral_app platform_app priv_app shell su system_app sdk_sandbox_all ))))
+(typeattributeset base_typeattr_248 (and (domain ) (not (apexd init keystore servicemanager system_server update_engine update_provider ))))
 (typeattribute base_typeattr_247)
-(typeattributeset base_typeattr_247 (and (appdomain ) (not (untrusted_app_all isolated_app_all ephemeral_app platform_app priv_app shell system_app sdk_sandbox_all ))))
+(typeattributeset base_typeattr_247 (and (domain ) (not (apexd init keystore system_server update_engine update_provider ))))
 (typeattribute base_typeattr_246)
-(typeattributeset base_typeattr_246 (and (domain ) (not (crash_dump ))))
+(typeattributeset base_typeattr_246 (and (domain ) (not (apexd init dexopt_chroot_setup otapreopt_chroot ))))
 (typeattribute base_typeattr_245)
-(typeattributeset base_typeattr_245 (and (domain ) (not (apexd init keystore servicemanager system_server update_engine update_provider ))))
+(typeattributeset base_typeattr_245 (and (domain ) (not (apexd init otapreopt_chroot ))))
 (typeattribute base_typeattr_244)
-(typeattributeset base_typeattr_244 (and (domain ) (not (apexd init keystore system_server update_engine update_provider ))))
+(typeattributeset base_typeattr_244 (and (domain ) (not (apexd init vold_prepare_subdirs ))))
 (typeattribute base_typeattr_243)
-(typeattributeset base_typeattr_243 (and (domain ) (not (apexd init dexopt_chroot_setup otapreopt_chroot ))))
+(typeattributeset base_typeattr_243 (and (domain ) (not (apexd init kernel ))))
 (typeattribute base_typeattr_242)
-(typeattributeset base_typeattr_242 (and (domain ) (not (apexd init otapreopt_chroot ))))
+(typeattributeset base_typeattr_242 (and (domain ) (not (apexd init ))))
 (typeattribute base_typeattr_241)
-(typeattributeset base_typeattr_241 (and (domain ) (not (apexd init vold_prepare_subdirs ))))
+(typeattributeset base_typeattr_241 (and (domain ) (not (apexd ))))
 (typeattribute base_typeattr_240)
-(typeattributeset base_typeattr_240 (and (domain ) (not (apexd init kernel ))))
+(typeattributeset base_typeattr_240 (and (domain ) (not (aidl_lazy_test_server ))))
 (typeattribute base_typeattr_239)
-(typeattributeset base_typeattr_239 (and (domain ) (not (apexd init ))))
+(typeattributeset base_typeattr_239 (and (domain ) (not (su adbd_tradeinmode ))))
 (typeattribute base_typeattr_238)
-(typeattributeset base_typeattr_238 (and (domain ) (not (apexd ))))
+(typeattributeset base_typeattr_238 (and (domain ) (not (crash_dump shell adbd_tradeinmode ))))
 (typeattribute base_typeattr_237)
-(typeattributeset base_typeattr_237 (and (domain ) (not (aidl_lazy_test_server ))))
+(typeattributeset base_typeattr_237 (and (domain ) (not (init aconfigd aconfigd_mainline ))))
 (typeattribute base_typeattr_236)
-(typeattributeset base_typeattr_236 (and (domain ) (not (su adbd_tradeinmode ))))
+(typeattributeset base_typeattr_236 (all))
 (typeattribute base_typeattr_235)
-(typeattributeset base_typeattr_235 (and (domain ) (not (crash_dump shell adbd_tradeinmode ))))
+(typeattributeset base_typeattr_235 (and (domain ) (not (init ))))
 (typeattribute base_typeattr_234)
-(typeattributeset base_typeattr_234 (and (domain ) (not (init aconfigd aconfigd_mainline ))))
+(typeattributeset base_typeattr_234 (and (hal_lazy_test_client ) (not (halclientdomain ))))
 (typeattribute base_typeattr_233)
-(typeattributeset base_typeattr_233 (all))
+(typeattributeset base_typeattr_233 (and (hal_lazy_test_server ) (not (hal_lazy_test ))))
 (typeattribute base_typeattr_232)
-(typeattributeset base_typeattr_232 (and (domain ) (not (init ))))
+(typeattributeset base_typeattr_232 (and (hal_lazy_test_server ) (not (halserverdomain ))))
 (typeattribute base_typeattr_231)
-(typeattributeset base_typeattr_231 (and (hal_lazy_test_client ) (not (halclientdomain ))))
+(typeattributeset base_typeattr_231 (and (coredomain ) (not (dumpstate init ))))
 (typeattribute base_typeattr_230)
-(typeattributeset base_typeattr_230 (and (hal_lazy_test_server ) (not (hal_lazy_test ))))
+(typeattributeset base_typeattr_230 (and (domain ) (not (init vendor_init ))))
 (typeattribute base_typeattr_229)
-(typeattributeset base_typeattr_229 (and (hal_lazy_test_server ) (not (halserverdomain ))))
+(typeattributeset base_typeattr_229 (and (domain ) (not (coredomain ))))
 (typeattribute base_typeattr_228)
-(typeattributeset base_typeattr_228 (and (coredomain ) (not (dumpstate init ))))
+(typeattributeset base_typeattr_228 (and (hal_vm_capabilities_client ) (not (halclientdomain ))))
 (typeattribute base_typeattr_227)
-(typeattributeset base_typeattr_227 (and (domain ) (not (init vendor_init ))))
+(typeattributeset base_typeattr_227 (and (hal_vm_capabilities_server ) (not (hal_vm_capabilities ))))
 (typeattribute base_typeattr_226)
-(typeattributeset base_typeattr_226 (and (domain ) (not (coredomain ))))
+(typeattributeset base_typeattr_226 (and (hal_vm_capabilities_server ) (not (halserverdomain ))))
 (typeattribute base_typeattr_225)
 (typeattributeset base_typeattr_225 (and (hal_wifi_supplicant_client ) (not (halclientdomain ))))
 (typeattribute base_typeattr_224)
diff --git a/prebuilts/api/202504/private/attributes b/prebuilts/api/202504/private/attributes
index 13479c9..0da777a 100644
--- a/prebuilts/api/202504/private/attributes
+++ b/prebuilts/api/202504/private/attributes
@@ -31,3 +31,7 @@
 until_board_api(202504, `
     attribute tee_service_type;
 ')
+
+until_board_api(202504, `
+    hal_attribute(vm_capabilities);
+')
diff --git a/prebuilts/api/202504/private/compat/202404/202404.ignore.cil b/prebuilts/api/202504/private/compat/202404/202404.ignore.cil
index 0aa0580..c10b0d5 100644
--- a/prebuilts/api/202504/private/compat/202404/202404.ignore.cil
+++ b/prebuilts/api/202504/private/compat/202404/202404.ignore.cil
@@ -5,7 +5,6 @@
 (typeattribute new_objects)
 (typeattributeset new_objects
   ( new_objects
-    advanced_protection_service
     app_function_service
     binderfs_logs_transaction_history
     binderfs_logs_transactions
@@ -16,6 +15,7 @@
     forensic_service
     fstype_prop
     hal_mediaquality_service
+    hal_vm_capabilities_service
     intrusion_detection_service
     media_quality_service
     proc_cgroups
@@ -23,9 +23,12 @@
     profcollectd_etr_prop
     ranging_service
     supervision_service
+    sysfs_cma
     sysfs_firmware_acpi_tables
     tee_service_contexts_file
     trusty_security_vm_sys_vendor_prop
+    virtual_camera
+    virtual_camera_exec
     virtual_face
     virtual_face_exec
     virtual_fingerprint
diff --git a/prebuilts/api/202504/private/dexopt_chroot_setup.te b/prebuilts/api/202504/private/dexopt_chroot_setup.te
index 9e98bae..b4b35dd 100644
--- a/prebuilts/api/202504/private/dexopt_chroot_setup.te
+++ b/prebuilts/api/202504/private/dexopt_chroot_setup.te
@@ -76,6 +76,7 @@
   system_file
   system_lib_file
   tmpfs
+  vendor_configs_file
   vendor_file
 }:dir mounton;
 
diff --git a/prebuilts/api/202504/private/dumpstate.te b/prebuilts/api/202504/private/dumpstate.te
index a1c9ed3..501d829 100644
--- a/prebuilts/api/202504/private/dumpstate.te
+++ b/prebuilts/api/202504/private/dumpstate.te
@@ -347,6 +347,7 @@
 dump_hal(hal_sensors)
 dump_hal(hal_thermal)
 dump_hal(hal_vehicle)
+dump_hal(hal_vm_capabilities)
 dump_hal(hal_weaver)
 dump_hal(hal_wifi)
 
@@ -462,6 +463,7 @@
   -hal_service_type
   -virtual_touchpad_service
   -vold_service
+  -fwk_vold_service
   -default_android_service
 }:service_manager find;
 # suppress denials for services dumpstate should not be accessing.
@@ -472,6 +474,7 @@
   hal_service_type
   virtual_touchpad_service
   vold_service
+  fwk_vold_service
 }:service_manager find;
 
 # Most of these are neverallowed.
diff --git a/prebuilts/api/202504/private/genfs_contexts b/prebuilts/api/202504/private/genfs_contexts
index 62d6c1a..a872a04 100644
--- a/prebuilts/api/202504/private/genfs_contexts
+++ b/prebuilts/api/202504/private/genfs_contexts
@@ -169,6 +169,9 @@
 genfscon sysfs /kernel/dma_heap u:object_r:sysfs_dma_heap:s0
 genfscon sysfs /kernel/ion u:object_r:sysfs_ion:s0
 genfscon sysfs /kernel/ipv4 u:object_r:sysfs_ipv4:s0
+starting_at_board_api(202504, `
+genfscon sysfs /kernel/mm/cma u:object_r:sysfs_cma:s0
+')
 genfscon sysfs /kernel/mm/transparent_hugepage u:object_r:sysfs_transparent_hugepage:s0
 genfscon sysfs /kernel/mm/lru_gen/enabled u:object_r:sysfs_lru_gen_enabled:s0
 genfscon sysfs /kernel/mm/pgsize_migration/enabled u:object_r:sysfs_pgsize_migration:s0
diff --git a/prebuilts/api/202504/private/hal_vm_capabilities.te b/prebuilts/api/202504/private/hal_vm_capabilities.te
new file mode 100644
index 0000000..3197784
--- /dev/null
+++ b/prebuilts/api/202504/private/hal_vm_capabilities.te
@@ -0,0 +1,9 @@
+# Domain for the VM capability HAL, which is used to allow some pVMs to issue
+# vendor-specific SMCs.
+
+binder_call(hal_vm_capabilities_client, hal_vm_capabilities_server)
+
+hal_attribute_service(hal_vm_capabilities, hal_vm_capabilities_service)
+
+binder_use(hal_vm_capabilities_client)
+binder_use(hal_vm_capabilities_server)
diff --git a/prebuilts/api/202504/private/property_contexts b/prebuilts/api/202504/private/property_contexts
index fe4b6d8..843a778 100644
--- a/prebuilts/api/202504/private/property_contexts
+++ b/prebuilts/api/202504/private/property_contexts
@@ -622,6 +622,7 @@
 persist.bluetooth.btsnoopdefaultmode                        u:object_r:bluetooth_prop:s0 exact enum empty disabled filtered full
 persist.bluetooth.btsnooplogmode                            u:object_r:bluetooth_prop:s0 exact enum empty disabled filtered full
 persist.bluetooth.finder.supported                          u:object_r:bluetooth_finder_prop:s0 exact bool
+persist.bluetooth.sniff_offload.enabled                     u:object_r:bluetooth_config_prop:s0 exact bool
 persist.bluetooth.snooplogfilter.headers.enabled            u:object_r:bluetooth_prop:s0 exact bool
 persist.bluetooth.snooplogfilter.profiles.a2dp.enabled      u:object_r:bluetooth_prop:s0 exact bool
 persist.bluetooth.snooplogfilter.profiles.map               u:object_r:bluetooth_prop:s0 exact enum empty disabled fullfilter header magic
@@ -1723,7 +1724,7 @@
 persist.vendor.fingerprint.virtual.sensor_id u:object_r:virtual_fingerprint_prop:s0 exact int
 persist.vendor.fingerprint.virtual.sensor_strength u:object_r:virtual_fingerprint_prop:s0 exact int
 persist.vendor.fingerprint.virtual.max_enrollments u:object_r:virtual_fingerprint_prop:s0 exact int
-persist.vendor.fingerprint.virtual.navigation_guesture u:object_r:virtual_fingerprint_prop:s0 exact bool
+persist.vendor.fingerprint.virtual.navigation_gesture u:object_r:virtual_fingerprint_prop:s0 exact bool
 persist.vendor.fingerprint.virtual.detect_interaction u:object_r:virtual_fingerprint_prop:s0 exact bool
 persist.vendor.fingerprint.virtual.udfps.display_touch u:object_r:virtual_fingerprint_prop:s0 exact bool
 persist.vendor.fingerprint.virtual.udfps.control_illumination u:object_r:virtual_fingerprint_prop:s0 exact bool
diff --git a/prebuilts/api/202504/private/service.te b/prebuilts/api/202504/private/service.te
index ce648c2..6912eb9 100644
--- a/prebuilts/api/202504/private/service.te
+++ b/prebuilts/api/202504/private/service.te
@@ -64,11 +64,16 @@
 type wearable_sensing_service,         app_api_service, system_server_service, service_manager_type;
 type wifi_mainline_supplicant_service, service_manager_type;
 type dynamic_instrumentation_service,  app_api_service, system_server_service, service_manager_type;
+type advanced_protection_service,      app_api_service, system_server_service, service_manager_type;
 
 is_flag_enabled(RELEASE_RANGING_STACK, `
     type ranging_service, app_api_service, system_server_service, service_manager_type;
 ')
 
+until_board_api(202504, `
+    type hal_vm_capabilities_service, protected_service, hal_service_type, service_manager_type;
+')
+
 ###
 ### Neverallow rules
 ###
diff --git a/prebuilts/api/202504/private/service_contexts b/prebuilts/api/202504/private/service_contexts
index e2998c7..c72f9b0 100644
--- a/prebuilts/api/202504/private/service_contexts
+++ b/prebuilts/api/202504/private/service_contexts
@@ -138,6 +138,8 @@
 android.hardware.secure_element.ISecureElement/SIM3                  u:object_r:hal_secure_element_service:s0
 android.hardware.security.secretkeeper.ISecretkeeper/default         u:object_r:hal_secretkeeper_service:s0
 android.hardware.security.secretkeeper.ISecretkeeper/nonsecure       u:object_r:hal_secretkeeper_service:s0
+android.hardware.virtualization.capabilities.IVmCapabilitiesService/default u:object_r:hal_vm_capabilities_service:s0
+android.hardware.virtualization.capabilities.IVmCapabilitiesService/noop u:object_r:hal_vm_capabilities_service:s0
 android.system.keystore2.IKeystoreService/default                    u:object_r:keystore_service:s0
 android.system.net.netd.INetd/default                                u:object_r:system_net_netd_service:s0
 android.system.suspend.ISystemSuspend/default                        u:object_r:hal_system_suspend_service:s0
@@ -149,9 +151,7 @@
 activity_task                             u:object_r:activity_task_service:s0
 adb                                       u:object_r:adb_service:s0
 adservices_manager                        u:object_r:adservices_manager_service:s0
-starting_at_board_api(202504, `
-    advanced_protection                       u:object_r:advanced_protection_service:s0
-')
+advanced_protection                       u:object_r:advanced_protection_service:s0
 aidl_lazy_test_1                          u:object_r:aidl_lazy_test_service:s0
 aidl_lazy_test_2                          u:object_r:aidl_lazy_test_service:s0
 aidl_lazy_test_quit                       u:object_r:aidl_lazy_test_service:s0
@@ -279,9 +279,6 @@
 file_integrity                            u:object_r:file_integrity_service:s0
 fingerprint                               u:object_r:fingerprint_service:s0
 font                                      u:object_r:font_service:s0
-starting_at_board_api(202504, `
-    forensic                                  u:object_r:forensic_service:s0
-')
 android.hardware.fingerprint.IFingerprintDaemon u:object_r:fingerprintd_service:s0
 game                                      u:object_r:game_service:s0
 gfxinfo                                   u:object_r:gfxinfo_service:s0
diff --git a/prebuilts/api/202504/private/su.te b/prebuilts/api/202504/private/su.te
index 1e2adef..247fd0b 100644
--- a/prebuilts/api/202504/private/su.te
+++ b/prebuilts/api/202504/private/su.te
@@ -127,6 +127,7 @@
   typeattribute su hal_tv_tuner_client;
   typeattribute su hal_usb_client;
   typeattribute su hal_vibrator_client;
+  typeattribute su hal_vm_capabilities_client;
   typeattribute su hal_vr_client;
   typeattribute su hal_weaver_client;
   typeattribute su hal_wifi_client;
diff --git a/prebuilts/api/202504/private/system_server.te b/prebuilts/api/202504/private/system_server.te
index fecca1b..20556ab 100644
--- a/prebuilts/api/202504/private/system_server.te
+++ b/prebuilts/api/202504/private/system_server.te
@@ -243,6 +243,11 @@
 # Read /sys/kernel/dma_heap/*.
 allow system_server sysfs_dma_heap:file r_file_perms;
 
+# Read /sys/kernel/mm/cma/*.
+starting_at_board_api(202504, `
+allow system_server sysfs_cma:file r_file_perms;
+')
+
 # Allow reading DMA-BUF sysfs stats from /sys/kernel/dmabuf.
 allow system_server sysfs_dmabuf_stats:dir r_dir_perms;
 allow system_server sysfs_dmabuf_stats:file r_file_perms;
diff --git a/prebuilts/api/202504/private/system_suspend_internal_server.te b/prebuilts/api/202504/private/system_suspend_internal_server.te
index 67bff77..8ff9da9 100644
--- a/prebuilts/api/202504/private/system_suspend_internal_server.te
+++ b/prebuilts/api/202504/private/system_suspend_internal_server.te
@@ -7,5 +7,6 @@
     -dumpstate # bug reports
     -system_suspend_internal_server # implements system_suspend_control_internal_service
     -system_server # configures system_suspend via ISuspendControlServiceInternal
+    -traced_probes # tracing
     -traceur_app # tracing
 } system_suspend_control_internal_service:service_manager find;
diff --git a/prebuilts/api/202504/private/traced_probes.te b/prebuilts/api/202504/private/traced_probes.te
index 78dc7eb..6a42eb2 100644
--- a/prebuilts/api/202504/private/traced_probes.te
+++ b/prebuilts/api/202504/private/traced_probes.te
@@ -114,6 +114,10 @@
 binder_call(traced_probes, statsd)
 allow traced_probes stats_service:service_manager find;
 
+# Allow traced_probes to talk to suspend control service to read details of kernel wakelocks.
+allow traced_probes system_suspend_control_internal_service:service_manager find;
+allow traced_probes system_suspend:binder call;
+
 # Allow reading the system property representing number of desktop windows to
 # set the initial value for the counter in traces.
 get_prop(traced_probes, debug_tracing_desktop_mode_visible_tasks_prop)
diff --git a/prebuilts/api/202504/private/virtual_camera.te b/prebuilts/api/202504/private/virtual_camera.te
index 31eadb2..86174b1 100644
--- a/prebuilts/api/202504/private/virtual_camera.te
+++ b/prebuilts/api/202504/private/virtual_camera.te
@@ -1,7 +1,10 @@
 # virtual_camera - virtual camera daemon
 
-type virtual_camera, domain, coredomain;
-type virtual_camera_exec, system_file_type, exec_type, file_type;
+# The types are moved to public starting at 202502
+until_board_api(202504, `
+    type virtual_camera, domain, coredomain;
+    type virtual_camera_exec, system_file_type, exec_type, file_type;
+')
 
 init_daemon_domain(virtual_camera)
 
@@ -41,6 +44,10 @@
 allow virtual_camera gpu_device:dir r_dir_perms;
 r_dir_file(virtual_camera, sysfs_gpu)
 
+# ION And DMABUF are used by vendor to allocate graphic buffers needed by virtual_camera
+allow cameraserver ion_device:chr_file rw_file_perms;
+allow cameraserver dmabuf_system_heap_device:chr_file r_file_perms;
+
 # Allow virtual camera to use graphics composer fd-s (fences).
 allow virtual_camera hal_graphics_composer:fd use;
 
diff --git a/prebuilts/api/202504/public/attributes b/prebuilts/api/202504/public/attributes
index 6e11b86..1556d57 100644
--- a/prebuilts/api/202504/public/attributes
+++ b/prebuilts/api/202504/public/attributes
@@ -457,3 +457,8 @@
 starting_at_board_api(202504, `
     attribute tee_service_type;
 ')
+
+# HAL service used for custom smc filtering project
+starting_at_board_api(202504, `
+    hal_attribute(vm_capabilities);
+')
diff --git a/prebuilts/api/202504/public/file.te b/prebuilts/api/202504/public/file.te
index 4fca64e..7a8e3af 100644
--- a/prebuilts/api/202504/public/file.te
+++ b/prebuilts/api/202504/public/file.te
@@ -103,6 +103,11 @@
 type sysfs_uio, sysfs_type, fs_type;
 type sysfs_batteryinfo, fs_type, sysfs_type;
 type sysfs_bluetooth_writable, fs_type, sysfs_type, mlstrustedobject;
+
+starting_at_board_api(202504, `
+    type sysfs_cma, fs_type, sysfs_type;
+')
+
 type sysfs_devfreq_cur, fs_type, sysfs_type;
 type sysfs_devfreq_dir, fs_type, sysfs_type;
 type sysfs_devices_block, fs_type, sysfs_type;
diff --git a/prebuilts/api/202504/public/service.te b/prebuilts/api/202504/public/service.te
index 68f4ea0..db79fdf 100644
--- a/prebuilts/api/202504/public/service.te
+++ b/prebuilts/api/202504/public/service.te
@@ -66,9 +66,6 @@
 type activity_task_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
 type adb_service, system_api_service, system_server_service, service_manager_type;
 type adservices_manager_service, system_api_service, system_server_service, service_manager_type;
-starting_at_board_api(202504, `
-    type advanced_protection_service, app_api_service, system_server_service, service_manager_type;
-')
 type alarm_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
 type app_binding_service, system_server_service, service_manager_type;
 starting_at_board_api(202504, `
@@ -144,9 +141,6 @@
 type platform_compat_service, app_api_service, ephemeral_app_api_service, system_server_service, service_manager_type;
 type face_service, app_api_service, system_server_service, service_manager_type;
 type fingerprint_service, app_api_service, system_server_service, service_manager_type;
-starting_at_board_api(202504, `
-    type forensic_service, app_api_service, system_api_service, system_server_service, service_manager_type;
-')
 type fwk_altitude_service, system_server_service, service_manager_type;
 type fwk_stats_service, app_api_service, system_server_service, service_manager_type;
 type fwk_sensor_service, system_server_service, service_manager_type;
@@ -375,6 +369,9 @@
 type hal_wifi_hostapd_service, protected_service, hal_service_type, service_manager_type;
 type hal_wifi_supplicant_service, protected_service, hal_service_type, service_manager_type;
 type hal_gatekeeper_service, protected_service, hal_service_type, service_manager_type;
+starting_at_board_api(202504, `
+    type hal_vm_capabilities_service, protected_service, hal_service_type, service_manager_type;
+')
 
 # system/sepolicy/public is for vendor-facing type and attribute definitions.
 # DO NOT ADD allow, neverallow, or dontaudit statements here.
diff --git a/prebuilts/api/202504/public/virtual_camera.te b/prebuilts/api/202504/public/virtual_camera.te
new file mode 100644
index 0000000..1c9e9d6
--- /dev/null
+++ b/prebuilts/api/202504/public/virtual_camera.te
@@ -0,0 +1,10 @@
+# virtual_camera - virtual camera daemon
+
+starting_at_board_api(202504, `
+    type virtual_camera, domain, coredomain;
+    type virtual_camera_exec, system_file_type, exec_type, file_type;
+')
+
+# system/sepolicy/public is for vendor-facing type and attribute definitions.
+# DO NOT ADD allow, neverallow, or dontaudit statements here.
+# Instead, add such policy rules to system/sepolicy/private/*.te.