1
# This publication is intellectual property of Novell Inc. and Canonical
2
# Ltd. Its contents can be duplicated, either in part or in whole, provided
3
# that a copyright label is visibly located on each copy.
5
# All information found in this book has been compiled with utmost
6
# attention to detail. However, this does not guarantee complete accuracy.
7
# Neither SUSE LINUX GmbH, Canonical Ltd, the authors, nor the translators
8
# shall be held liable for possible errors or the consequences thereof.
10
# Many of the software and hardware descriptions cited in this book
11
# are registered trademarks. All trade names are subject to copyright
12
# restrictions and may be registered trade marks. SUSE LINUX GmbH
13
# and Canonical Ltd. essentially adhere to the manufacturer's spelling.
15
# Names of products and trademarks appearing in this book (with or without
16
# specific notation) are likewise subject to trademark and trade protection
17
# laws and may thus fall under copyright restrictions.
25
aa-disable - disable an AppArmor security profile
29
B<aa-disable I<E<lt>executableE<gt>> [I<E<lt>executableE<gt>> ...]>
33
B<aa-disable> is used to disable the enforcement mode for one or more
34
profiles. This command will unload the profile from the kernel and
35
prevent the profile from being loaded on AppArmor startup. The
36
I<aa-enforce> and I<aa-complain> utilities may be used to to change this
41
If you find any bugs, please report them at
42
L<http://https://bugs.launchpad.net/apparmor/+filebug>.
46
apparmor(7), apparmor.d(5), aa-enforce(1), aa-complain(1),
47
aa_change_hat(2), and L<http://wiki.apparmor.net>.