mirror of
https://gitlab.com/apparmor/apparmor.git
synced 2025-03-04 08:24:42 +01:00
49 lines
1.7 KiB
Text
49 lines
1.7 KiB
Text
# This publication is intellectual property of Novell Inc. and Canonical
|
|
# Ltd. Its contents can be duplicated, either in part or in whole, provided
|
|
# that a copyright label is visibly located on each copy.
|
|
#
|
|
# All information found in this book has been compiled with utmost
|
|
# attention to detail. However, this does not guarantee complete accuracy.
|
|
# Neither SUSE LINUX GmbH, Canonical Ltd, the authors, nor the translators
|
|
# shall be held liable for possible errors or the consequences thereof.
|
|
#
|
|
# Many of the software and hardware descriptions cited in this book
|
|
# are registered trademarks. All trade names are subject to copyright
|
|
# restrictions and may be registered trade marks. SUSE LINUX GmbH
|
|
# and Canonical Ltd. essentially adhere to the manufacturer's spelling.
|
|
#
|
|
# Names of products and trademarks appearing in this book (with or without
|
|
# specific notation) are likewise subject to trademark and trade protection
|
|
# laws and may thus fall under copyright restrictions.
|
|
#
|
|
|
|
|
|
=pod
|
|
|
|
=head1 NAME
|
|
|
|
aa-disable - disable an AppArmor security profile
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
B<aa-disable I<E<lt>executableE<gt>> [I<E<lt>executableE<gt>> ...]>
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
B<aa-disable> is used to disable the enforcement mode for one or more
|
|
profiles. This command will unload the profile from the kernel and
|
|
prevent the profile from being loaded on AppArmor startup. The
|
|
I<aa-enforce> and I<aa-complain> utilities may be used to to change this
|
|
behavior.
|
|
|
|
=head1 BUGS
|
|
|
|
If you find any bugs, please report them at
|
|
L<http://https://bugs.launchpad.net/apparmor/+filebug>.
|
|
|
|
=head1 SEE ALSO
|
|
|
|
apparmor(7), apparmor.d(5), aa-enforce(1), aa-complain(1),
|
|
aa_change_hat(2), and L<http://wiki.apparmor.net>.
|
|
|
|
=cut
|