On Thu, 2012-07-26 at 13:30 -0700, William Roberts wrote: > In general I would like to add this feature. I think it is much more > palatable checking for denials and errors with the device "working", > rather then having it freak out at the splash screen. For instance, > suppose the launcher isn't in the right domain, you fix that, just to > find out some other app luanched off the launcher would fail too. If > you could just audit, you could review the denials and then make your > policy change in one movement. > > Just doing it for sebool doesn't make sense to me, as adding the > boolean rule is no different than seinfo or other rules. Either it > matches or not. Understood. But here's the counterargument. Let's suppose I am testing my system in permissive mode, looking for avc denials in my dmesg and logcat output (the latter for zygote denials), and everything looks ok. Now I switch to enforcing mode and suddenly find that all apps fail to launch because there was an error in my seapp_contexts configuration. I never thought to look for other kinds of error messages while in permissive mode (and SEAndroidManager won't currently show me these other messages). And now I can't switch back to permissive mode without going to ADB because I can't even run my SEAndroidManager app to set it. See the concern? -- Stephen Smalley National Security Agency -- This message was distributed to subscribers of the selinux mailing list. If you no longer wish to subscribe, send mail to majordomo@xxxxxxxxxxxxx with the words "unsubscribe selinux" without quotes as the message.