Click to return

MoKee Open Source Changelog from 07/14/2017 - 07/15/2017
---------------------------------------------------------------

Project: kernel/lge/msm8974
  •  Deepak Verma - msm: vidc: Check validity of userspace address
  •  Jan Kara - udf: Check path length when reading symlink

Project: kernel/samsung/apq8084
  •  Corinna Vinschen - apq8084: msm: mdss: fix kernel stackdump during boot on lentislte

Project: kernel/zte/msm8996
  •  Avijit Kanti Das - net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()

Project: hardware/samsung
  •  Basil Gello - secril-client: return exact error code from blockingWrite()
  •  Christopher N. Hesse - Revert "power: Temporary logging fix"
  •  Christopher N. Hesse - power: Allow for a dynamic cluster configuration

Project: packages/apps/Snap
  •  Gabriele M - Revert some permissions related changes

Project: device/sony/satsuki
  •  HaoZeke - Update bluetooth operating voltage from 32.3.A.0.376 Added Wifi operating voltage from 32.3.A.0.376 Added bluetooth and Wifi currents for RX, TX and Idle states
  •  Hamster Tian - sumire: add NFA_PROPRIETARY_CFG for proper Mifare Classic support
  •  Evgeny Pekhterev - sumire: Move libpn547_fw.so to new location

Project: device/sony/huashan
  •  Adrian DC - healthd: Add libcutils dependency for android_reboot

Project: device/sony/blue-common
  •  Adrian DC - healthd: Add libcutils dependency for android_reboot

Project: device/xiaomi/virgo
  •  GuaiYiHu - virgo: Jelly: use Baidu as the default suggestion provider
  •  GuaiYiHu - virgo: add missing org.apache.http.legacy.jar
  •  GuaiYiHu - virgo: sepolicy: fix up denials         [    7.920716] type=1400 audit(1499567564.720:3): avc: denied { create } for uid=0 pid=579 comm="sensorextd" scontext=u:r:sensorext:s0 tcontext=u:r:sensorext:s0 tclass=udp_socket permissive=1         [    7.920816] type=1400 audit(1499567564.720:4): avc: denied { net_raw } for uid=0 pid=579 comm="sensorextd" capability=13 scontext=u:r:sensorext:s0 tcontext=u:r:sensorext:s0 tclass=capability permissive=1         [    7.920917] type=1400 audit(1499567564.720:5): avc: denied { shutdown } for uid=0 pid=579 comm="sensorextd" scontext=u:r:sensorext:s0 tcontext=u:r:sensorext:s0 tclass=udp_socket permissive=1         [    7.920986] type=1400 audit(1499567564.720:6): avc: denied { read } for uid=0 pid=579 comm="sensorextd" name="devices" dev="sysfs" ino=7637 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1         [    7.921102] type=1400 audit(1499567564.720:7): avc: denied { open } for uid=0 pid=579 comm="sensorextd" name="devices" dev="sysfs" ino=7637 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1         [    7.921177] type=1400 audit(1499567564.720:8): avc: denied { read } for uid=0 pid=579 comm="sensorextd" name="name" dev="sysfs" ino=18240 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    7.921264] type=1400 audit(1499567564.720:9): avc: denied { open } for uid=0 pid=579 comm="sensorextd" name="name" dev="sysfs" ino=18240 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    7.921349] type=1400 audit(1499567564.720:10): avc: denied { getattr } for uid=0 pid=579 comm="sensorextd" path="/sys/devices/f9925000.i2c/i2c-4/4-0060/iio:device0/name" dev="sysfs" ino=18240 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    7.921419] type=1400 audit(1499567564.720:11): avc: denied { dac_override } for uid=0 pid=579 comm="sensorextd" capability=1 scontext=u:r:sensorext:s0 tcontext=u:r:sensorext:s0 tclass=capability permissive=1         [    7.952856] type=1400 audit(1499567564.750:12): avc: denied { call } for uid=0 pid=585 comm="sensorservice" scontext=u:r:sensorservice:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1         [    7.953786] type=1400 audit(1499567564.750:13): avc: denied { read } for uid=0 pid=585 comm="sensorservice" name="u:object_r:sensors_prop:s0" dev="tmpfs" ino=8210 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sensors_prop:s0 tclass=file permissive=1         [    7.953909] type=1400 audit(1499567564.750:14): avc: denied { open } for uid=0 pid=585 comm="sensorservice" name="u:object_r:sensors_prop:s0" dev="tmpfs" ino=8210 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sensors_prop:s0 tclass=file permissive=1         [    7.954028] type=1400 audit(1499567564.750:15): avc: denied { getattr } for uid=0 pid=585 comm="sensorservice" path="/dev/__properties__/u:object_r:sensors_prop:s0" dev="tmpfs" ino=8210 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sensors_prop:s0 tclass=file permissive=1         [    7.967975] type=1400 audit(1499567564.770:16): avc: denied { read } for uid=0 pid=585 comm="sensorservice" name="devices" dev="sysfs" ino=7637 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1         [    7.968118] type=1400 audit(1499567564.770:17): avc: denied { open } for uid=0 pid=585 comm="sensorservice" name="devices" dev="sysfs" ino=7637 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1         [    7.968459] type=1400 audit(1499567564.770:18): avc: denied { read } for uid=0 pid=585 comm="sensorservice" name="name" dev="sysfs" ino=18240 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    7.968571] type=1400 audit(1499567564.770:19): avc: denied { open } for uid=0 pid=585 comm="sensorservice" name="name" dev="sysfs" ino=18240 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    7.968695] type=1400 audit(1499567564.770:20): avc: denied { getattr } for uid=0 pid=585 comm="sensorservice" path="/sys/devices/f9925000.i2c/i2c-4/4-0060/iio:device0/name" dev="sysfs" ino=18240 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    7.968937] type=1400 audit(1499567564.770:21): avc: denied { dac_override } for uid=0 pid=585 comm="sensorservice" capability=1 scontext=u:r:sensorservice:s0 tcontext=u:r:sensorservice:s0 tclass=capability permissive=1         [    8.145783] type=1400 audit(1499567564.940:22): avc: denied { read } for uid=0 pid=579 comm="sensorextd" name="scan_elements" dev="sysfs" ino=22080 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1         [    8.145877] type=1400 audit(1499567564.940:23): avc: denied { open } for uid=0 pid=579 comm="sensorextd" name="scan_elements" dev="sysfs" ino=22080 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1         [    8.145783] type=1400 audit(1499567564.940:22): avc: denied { read } for uid=0 pid=579 comm="sensorextd" name="scan_elements" dev="sysfs" ino=22080 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1         [    8.145877] type=1400 audit(1499567564.940:23): avc: denied { open } for uid=0 pid=579 comm="sensorextd" name="scan_elements" dev="sysfs" ino=22080 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1         [    8.176925] dwc3 f9200000.dwc3: Avail curr from USB = 2 type 4         [    8.177006] android_work: android_work: did not send uevent (0 0   (null))         [    8.185502] init: Starting service 'qmuxd'...         [    8.192960] type=1400 audit(1499567564.990:24): avc: denied { read } for uid=0 pid=585 comm="sensorservice" name="scan_elements" dev="sysfs" ino=20858 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1         [    8.193057] type=1400 audit(1499567564.990:25): avc: denied { open } for uid=0 pid=585 comm="sensorservice" name="scan_elements" dev="sysfs" ino=20858 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1         [    8.199911] type=1400 audit(1499567565.000:26): avc: denied { read } for uid=0 pid=585 comm="sensorservice" name="in_accel_max" dev="sysfs" ino=20887 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    8.200018] type=1400 audit(1499567565.000:27): avc: denied { open } for uid=0 pid=585 comm="sensorservice" name="in_accel_max" dev="sysfs" ino=20887 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    8.200207] type=1400 audit(1499567565.000:28): avc: denied { getattr } for uid=0 pid=585 comm="sensorservice" path="/sys/devices/f9968000.i2c/i2c-12/12-0042/0018:0483:5702.0001/HID-SENSOR-200073.1/iio:device3/in_accel_max" dev="sysfs" ino=20887 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    8.201608] type=1400 audit(1499567565.000:29): avc: denied { read } for uid=0 pid=579 comm="sensorextd" name="in_custom_threshold_high" dev="sysfs" ino=21590 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    8.201680] type=1400 audit(1499567565.000:30): avc: denied { open } for uid=0 pid=579 comm="sensorextd" name="in_custom_threshold_high" dev="sysfs" ino=21590 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    8.201750] type=1400 audit(1499567565.000:31): avc: denied { getattr } for uid=0 pid=579 comm="sensorextd" path="/sys/devices/f9968000.i2c/i2c-12/12-0042/0018:0483:5702.0001/HID-SENSOR-2000e1.10/iio:device11/in_custom_threshold_high" dev="sysfs" ino=21590 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    8.299784] type=1400 audit(1499567565.100:32): avc: denied { dac_override } for uid=0 pid=579 comm="sensorextd" capability=1 scontext=u:r:sensorext:s0 tcontext=u:r:sensorext:s0 tclass=capability permissive=1         [    8.325604] init: Starting service 'ril-daemon2'...         [    8.342678] type=1400 audit(1499567565.140:33): avc: denied { write } for uid=0 pid=579 comm="sensorextd" name="enable" dev="sysfs" ino=21917 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    8.342771] type=1400 audit(1499567565.140:34): avc: denied { read } for uid=0 pid=579 comm="sensorextd" name="iio:device15" dev="tmpfs" ino=6540 scontext=u:r:sensorext:s0 tcontext=u:object_r:iio_device:s0 tclass=chr_file permissive=1         [    8.342836] type=1400 audit(1499567565.140:35): avc: denied { open } for uid=0 pid=579 comm="sensorextd" name="iio:device15" dev="tmpfs" ino=6540 scontext=u:r:sensorext:s0 tcontext=u:object_r:iio_device:s0 tclass=chr_file permissive=1         [    8.347135] init: Service 'qcom-c_main-sh' (pid 605) exited with status 0         [    8.348758] type=1400 audit(1499567565.150:36): avc: denied { dac_override } for uid=0 pid=585 comm="sensorservice" capability=1 scontext=u:r:sensorservice:s0 tcontext=u:r:sensorservice:s0 tclass=capability permissive=1         [    8.397024] init: Service 'irsc_util' (pid 606) exited with status 0         [    8.522221] type=1400 audit(1499567565.130:37): avc: denied { write } for uid=0 pid=579 comm="sensorextd" name="enable" dev="sysfs" ino=21649 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    8.522319] type=1400 audit(1499567565.130:38): avc: denied { open } for uid=0 pid=579 comm="sensorextd" name="enable" dev="sysfs" ino=21649 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    8.522415] type=1400 audit(1499567565.130:39): avc: denied { getattr } for uid=0 pid=579 comm="sensorextd" path="/sys/devices/f9968000.i2c/i2c-12/12-0042/0018:0483:5702.0001/HID-SENSOR-2000e1.11/iio:device12/buffer/enable" dev="sysfs" ino=21649 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [    8.526227] type=1400 audit(1499567565.130:40): avc: denied { read } for uid=0 pid=579 comm="sensorextd" name="devices" dev="sysfs" ino=7637 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1         [    8.526318] type=1400 audit(1499567565.130:41): avc: denied { open } for uid=0 pid=579 comm="sensorextd" name="devices" dev="sysfs" ino=7637 scontext=u:r:sensorext:s0 tcontext=u:object_r:sysfs:s0 tclass=dir permissive=1         [    8.695761] init: avc:  denied  { set } for property=audio.offload.pcm.enable pid=613 uid=1041 gid=1005 scontext=u:r:audioserver:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=1         [   10.524103] type=1400 audit(1499567567.130:66): avc: denied { call } for uid=1013 pid=621 comm="mediaserver" scontext=u:r:mediaserver:s0 tcontext=u:r:sensorservice:s0 tclass=binder permissive=1         [   10.525078] type=1400 audit(1499567567.130:67): avc: denied { transfer } for uid=0 pid=585 comm="Binder:585_2" scontext=u:r:sensorservice:s0 tcontext=u:r:mediaserver:s0 tclass=binder permissive=1         [   10.525417] type=1400 audit(1499567567.130:68): avc: denied { use } for uid=0 pid=928 comm="Binder:585_1" path="socket:[11052]" dev="sockfs" ino=11052 scontext=u:r:mediaserver:s0 tcontext=u:r:sensorservice:s0 tclass=fd permissive=1         [   10.525766] type=1400 audit(1499567567.130:69): avc: denied { read write } for uid=0 pid=928 comm="Binder:585_1" path="socket:[11052]" dev="sockfs" ino=11052 scontext=u:r:mediaserver:s0 tcontext=u:r:sensorservice:s0 tclass=unix_stream_socket permissive=1         [   12.652511] type=1400 audit(1499567569.260:70): avc: denied { call } for uid=0 pid=585 comm="Binder:585_2" scontext=u:r:sensorservice:s0 tcontext=u:r:servicemanager:s0 tclass=binder permissive=1         [   12.652627] type=1400 audit(1499567569.260:71): avc: denied { search } for uid=1000 pid=400 comm="servicemanager" name="585" dev="proc" ino=7617 scontext=u:r:servicemanager:s0 tcontext=u:r:sensorservice:s0 tclass=dir permissive=1         [   12.652698] type=1400 audit(1499567569.260:72): avc: denied { read } for uid=1000 pid=400 comm="servicemanager" name="current" dev="proc" ino=10907 scontext=u:r:servicemanager:s0 tcontext=u:r:sensorservice:s0 tclass=file permissive=1         [   12.652763] type=1400 audit(1499567569.260:73): avc: denied { open } for uid=1000 pid=400 comm="servicemanager" name="current" dev="proc" ino=10907 scontext=u:r:servicemanager:s0 tcontext=u:r:sensorservice:s0 tclass=file permissive=1         [   12.652850] type=1400 audit(1499567569.260:74): avc: denied { getattr } for uid=1000 pid=400 comm="servicemanager" scontext=u:r:servicemanager:s0 tcontext=u:r:sensorservice:s0 tclass=process permissive=1         [   12.653135] type=1400 audit(1499567569.260:75): avc: denied { transfer } for uid=0 pid=928 comm="Binder:585_1" scontext=u:r:sensorservice:s0 tcontext=u:r:mediaserver:s0 tclass=binder permissive=1         [   13.845556] type=1400 audit(1499567570.450:76): avc: denied { open } for uid=1000 pid=1715 comm="StartSensorThre" name="u:object_r:sensors_prop:s0" dev="tmpfs" ino=8210 scontext=u:r:system_server:s0 tcontext=u:object_r:sensors_prop:s0 tclass=file permissive=1         [   13.845911] type=1400 audit(1499567570.450:77): avc: denied { getattr } for uid=1000 pid=1715 comm="StartSensorThre" path="/dev/__properties__/u:object_r:sensors_prop:s0" dev="tmpfs" ino=8210 scontext=u:r:system_server:s0 tcontext=u:object_r:sensors_prop:s0 tclass=file permissive=1         [   13.941280] init: Starting service 'keystore'...         [   13.980085] type=1400 audit(1499567570.589:78): avc: denied { call } for uid=1000 pid=1629 comm="android.ui" scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=binder permissive=1         [   14.235728] type=1400 audit(1499567570.839:79): avc: denied { connectto } for uid=1000 pid=1715 comm="StartSensorThre" path=0053656E736F72457874 scontext=u:r:system_server:s0 tcontext=u:r:sensorext:s0 tclass=unix_stream_socket permissive=1         [   15.774994] type=1400 audit(1499567572.379:80): avc: denied { call } for uid=1000 pid=1552 comm="system_server" scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=binder permissive=1         [   17.067675] type=1400 audit(1499567573.679:81): avc: denied { call } for uid=1013 pid=2337 comm="Binder:621_4" scontext=u:r:mediaserver:s0 tcontext=u:r:sensorservice:s0 tclass=binder permissive=1         [   17.068490] type=1400 audit(1499567573.679:82): avc: denied { transfer } for uid=0 pid=585 comm="Binder:585_2" scontext=u:r:sensorservice:s0 tcontext=u:r:mediaserver:s0 tclass=binder permissive=1         [   17.068698] type=1400 audit(1499567573.679:83): avc: denied { use } for uid=0 pid=928 comm="Binder:585_1" path="socket:[17778]" dev="sockfs" ino=17778 scontext=u:r:mediaserver:s0 tcontext=u:r:sensorservice:s0 tclass=fd permissive=1         [   17.068772] type=1400 audit(1499567573.679:84): avc: denied { read write } for uid=0 pid=928 comm="Binder:585_1" path="socket:[17778]" dev="sockfs" ino=17778 scontext=u:r:mediaserver:s0 tcontext=u:r:sensorservice:s0 tclass=unix_stream_socket permissive=1         [   22.973211] type=1400 audit(1499567579.579:85): avc: denied { call } for uid=1000 pid=1627 comm="ActivityManager" scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=binder permissive=1         [   22.973831] type=1400 audit(1499567579.579:86): avc: denied { transfer } for uid=0 pid=585 comm="Binder:585_2" scontext=u:r:sensorservice:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1         [   22.974870] type=1400 audit(1499567579.579:87): avc: denied { use } for uid=0 pid=928 comm="Binder:585_1" path="socket:[17957]" dev="sockfs" ino=17957 scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=fd permissive=1         [   22.974956] type=1400 audit(1499567579.579:88): avc: denied { read write } for uid=0 pid=928 comm="Binder:585_1" path="socket:[17957]" dev="sockfs" ino=17957 scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=unix_stream_socket permissive=1         [   22.976251] type=1400 audit(1499567579.579:89): avc: denied { call } for uid=0 pid=1285 comm="Binder:585_3" scontext=u:r:sensorservice:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1         [   22.978502] type=1400 audit(1499567579.589:90): avc: denied { dac_override } for uid=0 pid=1285 comm="Binder:585_3" capability=1 scontext=u:r:sensorservice:s0 tcontext=u:r:sensorservice:s0 tclass=capability permissive=1         [   22.978633] type=1400 audit(1499567579.589:91): avc: denied { read } for uid=0 pid=1285 comm="Binder:585_3" name="in_accel_sampling_frequency" dev="sysfs" ino=20894 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [   22.978699] type=1400 audit(1499567579.589:92): avc: denied { open } for uid=0 pid=1285 comm="Binder:585_3" name="in_accel_sampling_frequency" dev="sysfs" ino=20894 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [   22.978771] type=1400 audit(1499567579.589:93): avc: denied { getattr } for uid=0 pid=1285 comm="Binder:585_3" path="/sys/devices/f9968000.i2c/i2c-12/12-0042/0018:0483:5702.0001/HID-SENSOR-200073.1/iio:device3/in_accel_sampling_frequency" dev="sysfs" ino=20894 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [   22.988421] type=1400 audit(1499567579.589:94): avc: denied { write } for uid=0 pid=1285 comm="Binder:585_3" name="in_accel_sampling_frequency" dev="sysfs" ino=20894 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [   28.631725] type=1400 audit(1499567585.585:95): avc: denied { read } for uid=0 pid=585 comm="Binder:585_2" name="in_illuminance_sampling_frequency" dev="sysfs" ino=18278 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [   28.631821] type=1400 audit(1499567585.585:96): avc: denied { open } for uid=0 pid=585 comm="Binder:585_2" name="in_illuminance_sampling_frequency" dev="sysfs" ino=18278 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [   28.631917] type=1400 audit(1499567585.585:97): avc: denied { getattr } for uid=0 pid=585 comm="Binder:585_2" path="/sys/devices/f9925000.i2c/i2c-4/4-0060/iio:device1/in_illuminance_sampling_frequency" dev="sysfs" ino=18278 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [   28.631984] type=1400 audit(1499567585.585:98): avc: denied { write } for uid=0 pid=585 comm="Binder:585_2" name="in_illuminance_sampling_frequency" dev="sysfs" ino=18278 scontext=u:r:sensorservice:s0 tcontext=u:object_r:sysfs:s0 tclass=file permissive=1         [   28.763066] type=1400 audit(1499567585.716:99): avc: denied { read } for uid=1000 pid=1629 comm="android.ui" scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=unix_stream_socket permissive=1         [   28.775085] init: avc:  denied  { set } for property=ro.qualcomm.perf.cores_online pid=2888 uid=0 gid=0 scontext=u:r:qti_init_shell:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=1         [   28.797033] type=1400 audit(1499567585.756:100): avc: denied { call } for uid=1000 pid=1651 comm="PowerManagerSer" scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=binder permissive=1         [   28.797374] type=1400 audit(1499567585.756:101): avc: denied { call } for uid=0 pid=928 comm="Binder:585_1" scontext=u:r:sensorservice:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1         [   28.798199] type=1400 audit(1499567585.756:102): avc: denied { transfer } for uid=0 pid=1286 comm="Binder:585_4" scontext=u:r:sensorservice:s0 tcontext=u:r:system_server:s0 tclass=binder permissive=1         [   28.798498] type=1400 audit(1499567585.756:103): avc: denied { use } for uid=0 pid=585 comm="Binder:585_2" path="socket:[19979]" dev="sockfs" ino=19979 scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=fd permissive=1         [   28.798566] type=1400 audit(1499567585.756:104): avc: denied { write } for uid=0 pid=585 comm="Binder:585_2" path="socket:[19979]" dev="sockfs" ino=19979 scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=unix_stream_socket permissive=1         [   29.360132] type=1400 audit(1499567586.316:105): avc: denied { read } for uid=1000 pid=1629 comm="android.ui" scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=unix_stream_socket permissive=1         [   29.758219] type=1400 audit(1499567586.716:106): avc: denied { read } for uid=1000 pid=1629 comm="android.ui" scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=unix_stream_socket permissive=1         [   30.653588] type=1400 audit(1499567587.606:107): avc: denied { read } for uid=1000 pid=1629 comm="android.ui" scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=unix_stream_socket permissive=1         [   31.347328] type=1400 audit(1499567588.306:108): avc: denied { read } for uid=1000 pid=1651 comm="PowerManagerSer" scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=unix_stream_socket permissive=1         [   33.048856] type=1400 audit(1499567590.006:109): avc: denied { read } for uid=1000 pid=1651 comm="PowerManagerSer" scontext=u:r:system_server:s0 tcontext=u:r:sensorservice:s0 tclass=unix_stream_socket permissive=1         [  128.481992] type=1400 audit(1499578846.592:3): avc: denied { sys_ptrace } for uid=0 pid=3240 comm="mpdecision" capability=19 scontext=u:r:mpdecision:s0 tcontext=u:r:mpdecision:s0 tclass=capability permissive=1
  •  GuaiYiHu - virgo: sepolicy: Resolve qti_init_shell property denial * init: avc:  denied  { set } for property=ro.hardware.sensors pid=568 uid=0 gid=0 scontext=u:r:qti_init_shell:s0 tcontext=u:object_r:default_prop:s0 tclass=property_service permissive=1
  •  GuaiYiHu - virgo: clean up d2w support
  •  GuaiYiHu - mkhw: clean up Keydisabler support
  •  GuaiYiHu - mkhw: VibratorHW: update for new kernel
  •  GuaiYiHu - Revert "virgo: update wifi"
  •  GuaiYiHu - Revert "virgo: add KERNEL_HAS_FINIT_MODULE := false"
  •  GuaiYiHu - virgo: update ramdisk
  •  GuaiYiHu - virgo: sepolicy:  sepolicy: add domains for init sensor services * init: Service sensorext does not have a SELinux domain defined * init: Service sensorservice does not have a SELinux domain defined
  •  GuaiYiHu - Revert "virgo: update cmdline"
  •  GuaiYiHu - Revert "virgo: use prebuilt kernel"
  •  GuaiYiHu - Revert "virgo: update wlan symlink"
  •  GuaiYiHu - Revert "virgo: add cancro kernel path"
  •  GuaiYiHu - Revert "virgo: fix building of boot"
  •  GuaiYiHu - Revert "virgo: fix wlan modules symlink"
  •  GuaiYiHu - Revert "virgo: add sensor path"
  •  GuaiYiHu - virgo: use old sensor hal and enable sensorext service
  •  GuaiYiHu - Jelly: Change default search engine and home page

Project: vendor/sony/satsuki
  •  Chenxi  Mao - satsuki: udpate firmware location

Project: vendor/xiaomi/mido
  •  martincz - Update proprietary libs

Project: vendor/xiaomi/virgo
  •  GuaiYiHu - virgo: fix sensor again!!!!!!!!
  •  GuaiYiHu - virgo: update for sensor
  •  GuaiYiHu - Revert "087312virgo: add prebuilt modules"
  •  GuaiYiHu - Virgo: Sensor: replace new sensor hal(leo) with old sensor hal(st_mve) Bring up sensor with old kernel source

---------------------------------------------------------------
You can see more changelog from http://changelog.mokeedev.com