Staging
v0.8.1
Revision 8d057e3a180da16b0d1519056295165e7b8dc8f5 authored by Benson Leung on 28 May 2016, 15:25:33 UTC, committed by Olof Johansson on 28 May 2016, 15:47:48 UTC
This reverts commit bff3c624dc7261a084a4d25a0b09c3fb0fec872a.

Board "Leon" is otherwise known as "Toshiba CB35" and we already have
the entry that supports that board as of this commit :
963cb6f platform/chrome: chromeos_laptop - Add Toshiba CB35 Touch

Remove this duplicate.

Signed-off-by: Benson Leung <bleung@chromium.org>
Signed-off-by: Olof Johansson <olof@lixom.net>
1 parent 9e96aa7
Raw File
apparmor.txt
--- What is AppArmor? ---

AppArmor is MAC style security extension for the Linux kernel.  It implements
a task centered policy, with task "profiles" being created and loaded
from user space.  Tasks on the system that do not have a profile defined for
them run in an unconfined state which is equivalent to standard Linux DAC
permissions.

--- How to enable/disable ---

set CONFIG_SECURITY_APPARMOR=y

If AppArmor should be selected as the default security module then
   set CONFIG_DEFAULT_SECURITY="apparmor"
   and CONFIG_SECURITY_APPARMOR_BOOTPARAM_VALUE=1

Build the kernel

If AppArmor is not the default security module it can be enabled by passing
security=apparmor on the kernel's command line.

If AppArmor is the default security module it can be disabled by passing
apparmor=0, security=XXXX (where XXX is valid security module), on the
kernel's command line

For AppArmor to enforce any restrictions beyond standard Linux DAC permissions
policy must be loaded into the kernel from user space (see the Documentation
and tools links).

--- Documentation ---

Documentation can be found on the wiki.

--- Links ---

Mailing List - apparmor@lists.ubuntu.com
Wiki - http://apparmor.wiki.kernel.org/
User space tools - https://launchpad.net/apparmor
Kernel module - git://git.kernel.org/pub/scm/linux/kernel/git/jj/apparmor-dev.git
back to top