AA_DEBUG          640 security/apparmor/domain.c 			AA_DEBUG("name lookup ix on error");
AA_DEBUG          652 security/apparmor/domain.c 			AA_DEBUG("unconfined attached to new label");
AA_DEBUG          655 security/apparmor/domain.c 		AA_DEBUG("unconfined exec no attachment");
AA_DEBUG          773 security/apparmor/domain.c 			AA_DEBUG("name lookup ix on error");
AA_DEBUG         1218 security/apparmor/domain.c 			AA_DEBUG("no_new_privs - change_hat denied");
AA_DEBUG         1239 security/apparmor/domain.c 			AA_DEBUG("no_new_privs - change_hat denied");
AA_DEBUG         1338 security/apparmor/domain.c 		AA_DEBUG("no profile name");
AA_DEBUG         1434 security/apparmor/domain.c 			AA_DEBUG("no_new_privs - change_hat denied");
AA_DEBUG          267 security/apparmor/include/lib.h 		AA_DEBUG("label build failed\n");			\
AA_DEBUG          435 security/apparmor/label.c 	AA_DEBUG("%s (%p)\n", __func__, new);
AA_DEBUG         1721 security/apparmor/label.c 			AA_DEBUG("label print error");
AA_DEBUG         1749 security/apparmor/label.c 			AA_DEBUG("label print error");
AA_DEBUG         1772 security/apparmor/label.c 			AA_DEBUG("label print error");
AA_DEBUG          210 security/apparmor/policy.c 	AA_DEBUG("%s(%p)\n", __func__, profile);
AA_DEBUG          667 security/apparmor/policy.c 	AA_DEBUG("cap_mac_admin? %d\n", capable);
AA_DEBUG          668 security/apparmor/policy.c 	AA_DEBUG("policy locked? %d\n", aa_g_lock_policy);
AA_DEBUG           92 security/apparmor/policy_ns.c 	AA_DEBUG("%s(%p)\n", __func__, ns);
AA_DEBUG          129 security/apparmor/procattr.c 			AA_DEBUG("%s: (pid %d) Magic 0x%llx count %d hat '%s'\n"
AA_DEBUG          134 security/apparmor/procattr.c 		AA_DEBUG("%s: (pid %d) Magic 0x%llx count %d Hat '%s'\n",