This email serves a public record for anyone else wondering what to do with 
these audits.

Recently when working on Android with a 3.14.37 kernel, I came across the 
following audits:


[  170.456077] type=1400 audit(1432616225.277:76): avc: denied {

module_request } for pid=3742 comm="debuggerd" kmod="personality-8"

scontext=u:r:debuggerd:s0 tcontext=u:r:kernel:s0 tclass=system

permissive=1



$ adb shell ps -Z | grep debuggerd

u:r:debuggerd:s0               root      3742  1     /system/bin/debuggerd

u:r:debuggerd:s0               root      3743  1     /system/bin/debuggerd64



I saw these for pretty much any 32 variant of an executable. I was also on an 
intel x86 Android platform, I am not sure if this will

Be relevant to other arch's or not. I was able to safely "dontaudit" this,  and 
it seems removed from 4.0 kernels. Stephen (paraphrasing the email) provided

The following informative links as well as suggesting a dontaudit:



http://marc.info/?l=linux-kernel&m=128934356223514&w=2



More context:

http://marc.info/?l=linux-kernel&m=142878569719810&w=2



Looks like it got removed entirely in 4.0:

http://marc.info/?l=linux-arch&m=142912798314177&w=2



Hopefully this helps some lost soul in the future.


_______________________________________________
Seandroid-list mailing list
[email protected]
To unsubscribe, send email to [email protected].
To get help, send an email containing "help" to 
[email protected].

Reply via email to