AA_DEBUG 640 security/apparmor/domain.c AA_DEBUG("name lookup ix on error"); AA_DEBUG 652 security/apparmor/domain.c AA_DEBUG("unconfined attached to new label"); AA_DEBUG 655 security/apparmor/domain.c AA_DEBUG("unconfined exec no attachment"); AA_DEBUG 773 security/apparmor/domain.c AA_DEBUG("name lookup ix on error"); AA_DEBUG 1218 security/apparmor/domain.c AA_DEBUG("no_new_privs - change_hat denied"); AA_DEBUG 1239 security/apparmor/domain.c AA_DEBUG("no_new_privs - change_hat denied"); AA_DEBUG 1338 security/apparmor/domain.c AA_DEBUG("no profile name"); AA_DEBUG 1434 security/apparmor/domain.c AA_DEBUG("no_new_privs - change_hat denied"); AA_DEBUG 267 security/apparmor/include/lib.h AA_DEBUG("label build failed\n"); \ AA_DEBUG 435 security/apparmor/label.c AA_DEBUG("%s (%p)\n", __func__, new); AA_DEBUG 1721 security/apparmor/label.c AA_DEBUG("label print error"); AA_DEBUG 1749 security/apparmor/label.c AA_DEBUG("label print error"); AA_DEBUG 1772 security/apparmor/label.c AA_DEBUG("label print error"); AA_DEBUG 210 security/apparmor/policy.c AA_DEBUG("%s(%p)\n", __func__, profile); AA_DEBUG 667 security/apparmor/policy.c AA_DEBUG("cap_mac_admin? %d\n", capable); AA_DEBUG 668 security/apparmor/policy.c AA_DEBUG("policy locked? %d\n", aa_g_lock_policy); AA_DEBUG 92 security/apparmor/policy_ns.c AA_DEBUG("%s(%p)\n", __func__, ns); AA_DEBUG 129 security/apparmor/procattr.c AA_DEBUG("%s: (pid %d) Magic 0x%llx count %d hat '%s'\n" AA_DEBUG 134 security/apparmor/procattr.c AA_DEBUG("%s: (pid %d) Magic 0x%llx count %d Hat '%s'\n",