ELF4("!GNUp =N`QP.WvRSPXÅt6BtSXt@tSX[&[Í&'t$։|$ lj\$l$PXB PPtRtLnF$HPnË$Gt `1؋t$\$|$ l$Ít&ߐ@pHt I4tÐ1 \$t$Rptu\$t$ Í&Zt[ tڋt$`4$ΐ|$|$l$l$ \$Ét$ p<$l$=t+xF @XP\$t$ |$l$Ðʐt& $Ӊt$Ɖ|$CpBt+XDt$Ӊ؋$t$|$ Í1RX@pRRp1Ã0\$ Ét$$։|$(l$,z GTD$@t BCЀFp|\|d5VpG@r%=@|%=tCHs@{DSH9 C t$|$\$D$ D$($1҉Ћ\$ t$$|$(l$,0Í&D$($l| D$($D$@|1돍t&D$($胣|1[usdD$($@%SH$$VpD$ G(T$D$($D$T$($\$Él$$S(͉t$L$|$ @p0C$V(F$C $xT$`D$l$ D$D$V$N(S$K(xL$u(V RJPRLOPWL\$t$|$ l$$(fT$u(\$Ét$ ։|$$ϋH@ T$D$|$4$uYD$|$VL$4$NjD$ FL$t$ڋD$$Et$PLHPVLNPPTHXVTNXP`@\V`F\U=*sFr%=@|D$$xCd$[^_]Ðt&D$$S&D$$c|$[^_]ÍvD$D$$$[^_]ÍND$ C(D$$TD$LD$$D3|$D$$D$$}D$$D$$UWVSD$L$ BXpD$(@XXt t ~ntEEvSЉT${T$t vOE$D$t4CFD$[^_]ÐD$ 1ɋWD$9D$ tU1 f  & v' \$Ӊl$ʼnt$|$BX`pt D$ D$GLWPELUPGTWXETUXG\W`{E\U`C`R(P(CU\M`P\H`CuSCCtPC vvD$ yD$\$t$|$l$  D$$t&UWVS,T$ @PHH@XDL$$\$(HH9FXXEXۋxt t D$PD$u-Gt&D$ ꋈ$D$D${CuSCCtPC vv}EuUEEtPE vv~FuVFFtPF vvD$,[^_]ÐWL$ T$BLRPALQPT$L$ BTRXATQXL$A\Q`L$ A\ȉQ`WV`@(B(E@HT$$L$(P@HD@HHH  ҉\$Ӊl$ʼnt$|$ BXpt t G$$tUGPLHPULMPPTHXUTMXP`@\U`E\G@(E(v$\$t$|$ l$ÉGsPLHPULMPHXPTMXUTP`@\U`E\G@(E(CuSCCtPC vvW  t&0\$ Ӊl$,͉t$$|$(D$D$B$BPC@XpFxK$C(NjFxXOt8L$؉,$NjD$\$ t$$|$(l$,0Í&CTƒt@tT$K$T$L$K(D$|$$‰L$1FxL$D$NjFx?D$C(1sCuSCCtPC vvt&B(tC$eC(|$D$ D$$@rD$D$$U&'\$Ӊ|$ωl$t$ D$BXp(T$ŋ@$u'Ft D$ڋ$t&/st`\$t$ |$l$fEt$PLHPVLNPPTHXVTNXP`@\V`F\Usut&sCuSCCtPC vvSt&'\$Ӊt$ |$ωl$D$BXhƋ@u'Mt D$ڋ$t%Stg\$t$ |$l$ÐFl$PLHPULMPPTHXUTMXP`@\U`E\VF@(E(Sut&sCuSCCtPC vvLt&',t$ ։|$$ωl$(ʼn\$BXXt VD$ D$L$L$T$D$|$ $1t5D$ ^\$t$ |$$l$(,Ít&T$ L$BNjD$uCt$uL$ APLHPULMPPTHXUTMXP`@\U`E\D$ PI^FuVFFtPF vv t&'@&D$ wD$D$ $É'S11ۍv`t u[Ð&t&'\$ˉ|$׉t$ p;t\$t$ |$ɸtމعt$$@Vr%==@=`tG= t@=t9=t21ɉGPD$u(1:N4‰yډ1 ǃVr%=@cǃVr%Iǃĉ'(|$ ljt$\$l$$_dhD$dt%D$\$t$|$ l$$(ÍGX8@,$D$T$dD$tD$ D$|$$D$ǃd닐&D$ T$x7tT$$Í& ߃Ív'UWVSL$L$D$D$D$$HD$H@T@D$ىt$$0-vۉ$t$M1L$|$ EEE EE0MUPMrD$EQT$@$L$<$D$8D$4D$0D$,D$(D$$D$ ;t` v\$D$$$ M@릍$1ɍ$$E,D$0tt&$ D$8EqD$(Jf$D$<ƅT$2T$$D$D$$ T$Y1)(QH{HCHzD$$AHl$l$$\$ |$ljT$h؉L$t$dT$L$tWP$H(%p@dL$ P$$lj%p\$ t$|$l$ t&\$Ét$ ։|$1 1 t$t$t$4$Ɖ1NƋ\$t$ |$Ðt$h\$É|$ ׉l$dtkT$L$P$H(%h@dL$ P$$lj%hغ\$t$|$ l$ v\$ Ӊt$Ɖ|$ωl$B11 ljT$ <$T$‰l$Ɖ1NƋ\$ t$|$l$fUWVSLD$0|$hT$@@ @D$@H˨S@KDkH99L$dT$HL$DP@\$`t$dD$`|$ T$dD$ D$$T$$;t$$XT$`D$(D$,׉T$<|$4T$4ݹ) )9F9t$dD$؉L$T$|9\$`vT$<)‰9T$FD$D$T$1ɋD$0=D$t;t$d}+D$1ҋL$D$89t$d?2D$8t&;\$`frˋD$T$@L$T$(1ҋD$D$(T$,D$T$|tKʼnD$1;t$$~5D$$9D$D~?v1L[^_]Ít&L$(D$ $;\$ D$$9D$D| T$ 9T$HsL$AHD$ T$$L$A@QDAH|ttD$$q&9\$`9T$`Ӊ;\$ )l$D$$`L$ʼnD$ D$$ L$kH@1ҹfɃ uH@ @ҁ P Í&'S t t tˀ u@t([f[É'UWVS$|$1ۅtb111ɉu 9vBD`tYv׀t:u܉ 9׹wÐt&$[^_]Ív 1Ƀ녍$D[^_]Ít&$Ét$rB 1Ή3t$ffC$Í'$\$t$Ɖ|$׺l$ ͍Ct1Ћ$t$|$l$ Ít&0\$ \$8|$(׉l$,ʼnt$$ATv"FuD$4]t-L$4$EƉ\$ t$$|$(l$,0Ðt&CD$D$4T$D$D$L$$1D$D$ twD$T$L$$D$ D$L$D$D$ 4$D$uD$ XD$ $L$4$wʋD$D$ $D$ 'UWVSÃ$t$8)𽫪RT$)D$D$#*uD1D$!D1D$"D$ۉD$D$ L$L$!L$D$1&L$;D$DL$9qI $́,*0  <:D$L$"tu'E ECRY@PTFS@_FNE@ K_EN@CRYP@TED.SK$T$D$L$PDCD$ [^_]Ívt EDD$L$ T$D$SD$k $dSKt&'UWVSD$$T$$e$1BƉD$ ||51ҹ-$D$,6D$,1ҋ\$ D$0D$ځ4T$(T$,\$8\$$D$T$4\$쀉[^_]ËD$ $#D$GD$ $D$W뛉t$$|%뉋D$|$P%jt$$$UC t$$$D$9l$D$$# &UWVSˁD$$T$$$e $1ɋ$DŽ$D$T$x DŽ$FDŽ$DŽ$|$D$$,D$ $L$Q$xD$hu T$j$hC u L$k i6k n{ t11t&L 9u9[=D$l$(V$LPVT$VL$XD$$P$D$$$HW7T$BD$ $((D$V鋼$G$T$X$$W Nj$sD$ $t( ~'FD$ $D$VD$|$$VJ9nL$ |$$^T$L$$D$PD$ L$L$BDDT$ȉPL$T$D` ЋNT$L$FT$$)$e3=[^_]Él$D$ $%FSD$ND$ $L&D$D$$HD$ $&-X9$|$D$ $'L$vT$ tX|$oVD$D$ $&T$ 몋VD$D$ $h'T$ 넋T$ dC BT$ D$ $H)T$=D$L$$(D$$(D$ $&$$x,$%D$|$G$VT$ D$$#T$|$$T(w|$1ɉ\$øt$։=@TP @ fuz<tVD$ D$D$ $*D$D$$P*\$t$|$ffz}1\$t$|$ÍvɉL$ D$D$ $)눉|$$x)t~t[t8D$D$ $)f$*PD$ $2D$ $D$ $\$Ét$ D$uD$t$ @1\$Í&ډ\$t$ É'UWVS(D$l$@T$4@`|$D NT F KS DC SK Cу9L$DKdL$ D$ TCtPT D$KXL$$L$SD$$CC(D$SL$$CCC CSk@$CuCu@@@ C\L$ C$T$<S$fzsD$<ˆsXH(V CsXL$$D$$Vk C}KK f9Pv ЉC|u9Cl$)A=MAT$ll$S SMD$EC CtT$L$([^_]ËK1XD$D$ $(/띋T$|$D$ D$6 $-T$@B(l$D$6 $0D$ D$D$6 $$1l$D$$#UWVS`D$$ATD$(D$tЉT$DD$Q\$,9ىL$\$D$D$V,NLT$8L$@\$<81l$4 9rf9KPT$D$,CXL$ A\$3D$(D$ =LD$` $?L$ D$,Q#D$` $<D$ L$D$ $4>|$$>\$D$` $>|$D$ D$ $p>D$ $=D$ $=lD$D$ $+OD$ $<=6D$D$ $d=Vi7S˹ + | tt&q09V u9^t u[^Ív1[^ÍvSËP@B CCtC[Í&UWVSi5x(tdhƸh;űC1ECh[^_]Íԉ'UWVS T$L$9Pk<C(D$C + R\pz8i7|uP;r u;zuT$;t$T$;|$D$49B;C;D$8 uC12vD$4t$D$ D$ $BCD$ [^_]ËT$t$ D$ $@T$ƋD$|$ D$ $0AD$량t$D$ D$ $AyD$ $A[T$8D$D$ $BT$ 1t$D$ $PBD$ $@D$ \$D$ $P@& t$p\$É|$l$u~C,k,x9W C@SDtPCC@CD tCtCt 1\$t$|$l$ ËCD$ $BD$à T$ kD$ $TCT$ J B ׃ 9+ WVS tohtG11k<(Bt B(9wh|tg ~W|1۾Y;C u;Su)h=ut&?GGtdP>WGB GG(hD$ \$D$$fuV؃[^_]áD$ $ED$hD$ $E몉D$D$ $E됉D$D$ $Dnu  '\$ Ӊ|$ljl$t$d-p@\H8D$D$T$1t.D$\$ t$|$l$Í&D$ۋD$P4u$T$B,9B,t A뙍&t؉D$̋1y D$ 1$ FT$TfVSD$ dp@\H8D$ ugD$ t_D$ P;\ulta D$ D$ u 1[^ D$D$` $LF   &'(\$t$|$ l$$D$dXd=H@@0dt$ڋ@\H8utD$tldD$H;\1ۋD$uq؋\$t$|$ l$$(Ðd\R\J8ډ$u D$aD$D$y $Ft&냋=/(Ջ/uD$D$y $G1L$D$y $LG\T$@ L$D$y $FD$ t&@\$0t$4Ή|$8׉l$<1dɋ@D$u\$0t$4|$8l$<@Ð= N   (z  _   (' 0 ~$SXhmzz'47h +>HS_WIS_g5<~U2x ?xZaf~zfW  HBtt{  %6=BOX]mr(|8 IQY`g77;Zx_fxXWxx1x6@^h xExz  (5]rz xx!@GL]diWA Y x^ h  x E !Wi!!x!!!x1"Q"g"""("W ##x#(#U#x28( ########N$`$m$r$$L$$7$$%%,%%%6%V%p%y%,%%z%&G/&8&i&z&&\&&&'='G'U''''''''(0(Y((((!)N))U)z))U)*0*T**W*>**+ ++>G+[+}+++U++++++, ,,!,6,;,T,`,e,t,y,,,,,,,,,,,- --&-7-A-_T-8p-u-V---_---------q##$f*.B4.A..z....../&/./D/L/\/d/t/|/////)//~,0mA0/F0a0l0_}0000/,0dN0~1/1pO1V1_11N2233#3<30d3{3333344#4:4A4J4Q4p44441444444"565=5w5(55_5z6\6r6{66~666666666?777hb88888 91$9+949`9v9}99999:::L:*Z:s:::::::s;;;p;;;;B<I<N<b<I}<$=:=A=W=^=g=}====z:>M>>Z>@>>z0?C?O??Z?w?@T@AUA%qA|ApAAAI:BKBPBBBBBBBCDD%>ECEEECE( FFF:FAFJFF$H3H=HHHI0III(I(J!J&J:JAJJJQJ(JJJJ(JJJJJJ KKK!K(?KFKOKjKqKzKK(K(KUKKKKLL@LILcLLLLULLLLLLLLM MLMUZMdM_|MMMMMM(MMMM~7N\NwN(}NNNNRNNNNNNO(0O9OpOU{OzOOUOOOOOUOzOPPv+PJ0P7P~BPIPUNPpPJ~PJPvPP~PPQ QQQ"Q'Q,Q7QCW\}v~Œ̌_Oas΍Ӎ~ۍ _&l%Ď܎W%%6_kpQcjo{v~ӑڑ ',9>GLUZglx} (&A_ϓ% #*/7>CT]ot~ÔȔԔٔ &27ARHMZfk}Ǖ'%r%aі3ޖ $):AFfmr|ŗҗٗޗ!)px}(ĘɘИ+טܘzzq DUazfckzؙc.B%QcVov{DҚٚ#=DMcjo|cz-D9E JQXyvœqz &z,:(@MU\a(fkpyc~zѝ(֝c۝',1c6;c@zFQycĞϞ՞ܞz $)HMR\zaf ɟiܟc .5:]cbzsycʠϠ= :AQYksġˡСcz #X]zci|ǢϢܢoc%-4=BLT[`nuzczK0z5c:_zc#z:KNzp|bc cz)0<7><ESlKzȦcͦ#*/9>bFZ_ҧ٧ =hot}(&-2CJOipu©ǩةߩcz,KJzjcoz)6{Jaqcvzѫ] *=vE(]q|O$Ǭz!c&.5:U\eĭɭz@%JzZw5~B.Q_afozǯ̯ѯ5*O8$JSz.~°ΰӰzz*519CHMRam5αӱ'D )JNZlqzwzv۲5 "&14g4O$ijɳγٳ4NJ]b~մڴ %,1<CLǵεӵ!&4;@KV[cjou3ö˶Ҷ׶ݶ3 $+0DKPZRffffffffffffffffffffffftD$$|# #ui"`',19WV1S` aK ߋSC3L$1$ 8u6#GD$D$$ $8 0u$p u$ *@$ $z\$D$$ [t$ =tD$$| ~+D$$ |# # [^_ø `A s4:EY`elq|Y $)0FAFKiRafm`rw|9P@0 P@0 ecryptfs_openecryptfs_filldir 0 @`!  @ @ecryptfs_lookupecryptfs_createecryptfs_do_createecryptfs_initialize_fileecryptfs_setattrecryptfs_lookup_and_interpose_lower@)@)))((((p(H(((h)+5H^s     ecryptfs_parse_optionsecryptfs_read_superecryptfs_fill_superecryptfs_initecryptfs_init_kmem_cachesecryptfs_number_of_usersecryptfs_message_wait_timeoutecryptfs_message_buf_lenecryptfs_verbosity`00/P./p.137:0ecryptfs_write_endecryptfs_write_beginecryptfs_copy_up_encrypted_with_headerecryptfs_readpageecryptfs_writepageecryptfs_write_inode_size_to_headerecryptfs_writeecryptfs_decode_and_decrypt_filename  !"#$%&'()*+,-./0123456789:;<=>?ecryptfs_encrypt_and_encode_filenameecryptfs_encrypt_filename\"ecryptfs_read_metadataecryptfs_read_headers_virtcontains_ecryptfs_marker ecryptfs_write_metadataecryptfs_write_headers_virtecryptfs_write_metadata_to_contentsecryptfs_read_and_validate_header_regionecryptfs_cipher_code_to_stringecryptfs_new_file_contextecryptfs_generate_new_keyecryptfs_compute_root_ivecryptfs_calculate_md5ecryptfs_init_crypt_ctxecryptfs_decrypt_pageecryptfs_decrypt_extentdecrypt_scatterlistecryptfs_encrypt_pageecryptfs_encrypt_extentencrypt_scatterlistecryptfs_derive_iv ecryptfs_generate_key_packet_setwrite_tag_3_packetwrite_tag_1_packetpki_encrypt_session_keywrite_tag_66_packetparse_tag_67_packetecryptfs_parse_packet_setparse_tag_3_packetdecrypt_pki_encrypted_session_keywrite_tag_64_packetparse_tag_65_packetdecrypt_passphrase_encrypted_session_keyprocess_request_key_errecryptfs_verify_versionecryptfs_parse_tag_70_packetecryptfs_write_tag_70_packetecryptfs_write_packet_lengthecryptfs_parse_packet_lengthecryptfs_release_messagingecryptfs_init_messagingecryptfs_send_message_lockedecryptfs_acquire_free_msg_ctxecryptfs_process_responseecryptfs_exorcise_daemonecryptfs_spawn_daemonecryptfs_miscdev_releaseecryptfs_miscdev_openecryptfs_miscdev_pollecryptfs_miscdev_writeecryptfs_miscdev_responseecryptfs_miscdev_readecryptfs_init_ecryptfs_miscdevecryptfs_send_miscdevУecryptfs_privileged_openecryptfs_init_kthreadecryptfs_dump_auth_tokX`l[ptx| M&[  k!! T\`d!hlp $(,048<@DHLPdlt|  H L \ p x <4>Mount has encrypted view enabled; files may only be read <3>%s: Error attempting to allocate memory <7>%s: Setting flags for stat... <3>%s: Error attempting to initialize the persistent file for the dentry with name [%s]; rc = [%d] <7>%s: Valid headers not found <4>Either the lower file is not in a valid eCryptfs format, or the key could not be retrieved. Plaintext passthrough mode is not enabled; returning -EIO <7>%s: inode w/ addr = [0x%p], i_ino = [0x%.16x] size: [0x%.16x] <3>%s: Error attempting to decode and decrypt filename [%s]; rc = [%d] <3>Error attempting to zero out the remainder of the end page on reducing truncate; rc = [%d] <3>Problem with ecryptfs_write_inode_size_to_metadata; rc = [%d] <4>Either the lower file is not in a valid eCryptfs format, or the key could not be retrieved. Plaintext passthrough mode is not enabled; returning -EIO <7>%s: ia->ia_valid = [0x%x] ATTR_SIZE = [0x%x] <3>%s: Out of memory whilst attempting to allocate ecryptfs_dentry_info struct <3>%s: Error interposing; rc = [%d] <3>%s: Cannot kmem_cache_zalloc() a page <3>%s: Error attempting to initialize the persistent file for the dentry with name [%s]; rc = [%d] <3>%s: Error locking directory of dentry <3>%s: Failure to create dentry in lower fs; rc = [%d] <3>%s: Failure in ecryptfs_interpose <4>%s: Failed to create file inlower filesystem <7>%s: Initializing crypto context <3>%s: Error creating new file context; rc = [%d] <3>Error writing headers; rc = [%d] <3>Error growing file; rc = [%d] <3>Error in vfs_unlink; rc = [%d] <3>%s: lookup_one_len() returned [%d] on lower_dentry = [%s] <3>%s: Error attempting to encrypt and encode filename; rc = [%d] <3>Failure whilst attempting to destroy crypto; rc = [%d] <3>Error opening lower persistent file for lower_dentry [0x%p] and lower_mnt [0x%p]; rc = [%d] <4>path_lookup() failed on dev_name = [%s] <3>Mount on filesystem of type eCryptfs explicitly disallowed due to known incompatibilities <3>Getting sb failed; rc = [%d] &mount_crypt_stat->global_auth_tok_list_mutex<3>Error attempting to register global sig; rc = [%d] <3>Error attempting to register global fnek sig [%s]; rc = [%d] <4>%s: eCryptfs: unrecognized option [%s] <3>%s: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README <3>Error attempting to initialize cipher with name = [%s] and key size = [%td]; rc = [%d] <3>Could not find valid key in user session keyring for sig specified in mount option: [%s] <4>One or more global auth toks could not properly register; rc = [%d] <3>Error parsing options; rc = [%d] <3>Mount of device (uid: %d) not owned by requested user (uid: %d) <3>Reading sb failed; rc = [%d] <3>%s: dentry_info_cache alloc failed <4>%s: %s: kmem_cache_create failed <3>Failed to allocate one or more kmem_cache objects <3>Failed to register filesystem <3>Unable to create ecryptfs kset <3>Unable to create ecryptfs version attributes <3>%s: kthread initialization failed; rc = [%d] <3>Failure occured while attempting to initialize the communications channel to ecryptfsd <3>Failure whilst attempting to init crypto; rc = [%d] <2>eCryptfs verbosity set to %d. Secret values will be written to the syslog! ecryptfs_global_auth_tok_cache<4>%s: Error encrypting page (upper index [0x%.16x]) <3>%s: Error reading xattr region; rc = [%d] <3>%s: Error attempting to read extent at offset [%lld] in the lower file; rc = [%d] <7>%s: Passing through unencrypted page <3>%s: Error attempting to copy the encrypted content from the lower file whilst inserting the metadata from the xattr into the header; rc = [%d] <3>Error reading page; rc = [%d] <3>%s: Error decrypting page; rc = [%d] <7>%s: Unlocking page with index = [0x%.16x] <4>No support for setting xattr in lower filesystem <3>Out of memory whilst attempting to write inode size to xattr <3>Error whilst attempting to write inode size to lower file xattr; rc = [%d] <3>%s: Error writing file size to header; rc = [%d] <3>%s: Error attemping to read lower page segment; rc = [%d] <3>%s: Error reading page; rc = [%d] <3>%s: Error decrypting page at index [%ld]; rc = [%d] <3>%s: Error on attempt to truncate to (higher) offset [%lld]; rc = [%d] <7>%s: ECRYPTFS_NEW_FILE flag set in crypt_stat at memory location [%p] <7>%s: Calling fill_zeros_to_end_of_page(page w/ index = [0x%.16x], to = [%d]) <7>%s: Expanded file size to [0x%.16x] <3>Error writing inode size to metadata; rc = [%d] <3>%s: Error getting page at index [%ld] from eCryptfs inode mapping; rc = [%d] <3>%s: Error encrypting page; rc = [%d] <3>Problem with ecryptfs_write_inode_size_to_metadata; rc = [%d] <3>%s: Out of memory whilst attempting to kmalloc [%zd] bytes <6>%s: Could not parse tag 70 packet from filename; copying through filename as-is <3>%s: Out of memory whilst attempting to kzalloc [%zd] bytes <3>%s: Error attempting to get packet size for tag 72; rc = [%d] <3>%s: Error attempting to generate tag 70 packet; rc = [%d] <3>%s: No support for requested filename encryption method in this release <3>%s: Error attempting to encrypt filename; rc = [%d] <3>%s: Error attempting to encode encrypted filename; rc = [%d] <3>Error attempting to allocate from ecryptfs_key_tfm_cache <3>Requested key size is [%zd] bytes; maximum allowable is [%d] <3>Unable to allocate crypto cipher with name [%s]; rc = [%d] <3>Error attempting to set key of size [%zd] for cipher [%s]; rc = [%d] <3>Error attempting to initialize key TFM cipher with name = [%s]; rc = [%d] <3>Error adding new key_tfm to list; rc = [%d] &crypt_stat->keysig_list_mutex&crypt_stat->cs_hash_tfm_mutex<7>%s: m_1 = [0x%.8x]; m_2 = [0x%.8x]; MAGIC_ECRYPTFS_MARKER = [0x%.8x] <7>%s: (m_1 ^ MAGIC_ECRYPTFS_MARKER) = [0x%.8x] <3>%s: Error reading header region; rc = [%d] <7>%s: Initializing cipher [%s]; strlen = [%d]; key_size_bits = [%d] <3>%s: cryptfs: init_crypt_ctx(): Error initializing cipher [%s] <4>%s: File version is [%d]; only file version [%d] is supported by this version of eCryptfs <4>Invalid header size: [%zd] <4>%s: Error reading header metadata; rc = [%d] <6>Error attempting to read the [%s] xattr from the lower file; return value = [%zd] <3>%s: Unable to allocate page_virt <7>Valid eCryptfs headers not found in file header region or xattr region <7>Valid eCryptfs headers not found in file xattr region either <4>Attempt to access file with crypto metadata only in the extended attribute region, but eCryptfs was mounted without xattr support enabled. eCryptfs will not treat this like an encrypted file. <4>Valid data found in [%s] xattr, but the marker is invalid <3>Key is invalid; bailing out <4>%s: Encrypted flag not set <4>%s: Error generating key packet set; rc = [%d] <3>%s: Error whilst writing headers; rc = [%d] <3>%s: Error attempting to write header information to lower file; rc = [%d] <3>%s: Error writing metadata out to lower file; rc = [%d] <4>%s: Cipher code not recognized: [%d] <3>%s: Error attempting to allocate crypto context; rc = [%d] <3>%s: Error initializing crypto hash; rc = [%d] <3>%s: Error updating crypto hash; rc = [%d] <3>%s: Error finalizing crypto hash; rc = [%d] <4>%s: Session key not valid; cannot generate root IV <4>%s: Error attempting to compute MD5 while generating root IV <3>Error adding keysig; rc = [%d] <3>Error attempting to copy mount-wide key sigs to the inode key sigs; rc = [%d] <7>%s: Generated new session key: <3>%s: Error initializing cryptographic context for cipher [%s]: rc = [%d] <4>%s: Error attempting to compute MD5 while generating IV for a page <3>%s: Error allocating memory for encrypted extent <3>%s: Error attempting to read lower page; rc = [%d] <3>%s: Error attempting to derive IV for extent [0x%.16x]; rc = [%d] <7>%s: Decrypting extent with iv: <7>%s: First 8 bytes before decryption: <3>%s: Error setting key; rc = [%d] <7>%s: Decrypting [%d] bytes. <3>%s: Error decrypting; rc = [%d] <3>%s: Error attempting to decrypt to page with page->index = [%ld], extent_offset = [%ld]; rc = [%d] <7>%s: Decrypt extent [0x%.16x]; rc = [%d] <7>%s: First 8 bytes after decryption: <3>%s: Error encrypting extent; rc = [%d] <7>%s: Encrypting extent with iv: <7>%s: First 8 bytes before encryption: <7>%s: Encrypting [%d] bytes. <3>%s: Error attempting to encrypt page with page->index = [%ld], extent_offset = [%ld]; rc = [%d] <7>%s: Encrypt extent [0x%.16x]; rc = [%d] <7>%s: First 8 bytes after encryption: <3>%s: Error attempting to write lower page; rc = [%d] -.0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz<3>Error allocating from ecryptfs_global_auth_tok_cache <3>Error allocating from ecryptfs_key_sig_cache <4>%s: Unsupported packet size: [%d] <3>%s: Five-byte packet length not supported <3>%s: Error parsing packet length <7>%s: Session key encryption key (size [%d]): <3>Internal error whilst attempting to get tfm and mutex for cipher name [%s]; rc = [%d] <3>Internal error whilst attempting to convert auth_tok->session_key.encrypted_key to scatterlist; expected rc = 1; got rc = [%d]. auth_tok->session_key.encrypted_key_size = [%d] <3>Internal error whilst attempting to convert auth_tok->session_key.decrypted_key to scatterlist; expected rc = 1; got rc = [%d] <3>Error setting key for crypto context <3>Error decrypting; rc = [%d] <4>No key size specified at mount; defaulting to [%d] <7>%s: encrypted_session_key_valid != 0; using auth_tok->session_key.encrypted_key, where key_rec->enc_key_size = [%d] <7>%s: Using previously generated session key encryption key of size [%d] <7>%s: Cached session key encryption key: <7>%s: Session key encryption key: <3>%s: Error generating scatterlist for crypt_stat session key; expected rc = 1; got rc = [%d]. key_rec->enc_key_size = [%d] <3>%s: Error generating scatterlist for crypt_stat encrypted session key; expected rc = 1; got rc = [%d]. key_rec->enc_key_size = [%d] <3>%s: Error setting key for crypto context; rc = [%d] <7>%s: Encrypting [%d] bytes of the key <3>Error encrypting; rc = [%d] <7>%s: This should be the encrypted key: <3>Packet too large; need up to [%td] bytes, but there are only [%td] available <3>Error generating tag 3 packet header; cannot generate packet length. rc = [%d] <4>%s: Unable to generate code for cipher [%s] <3>Could not find key with description: [%s] <4>%s: Unknown error code: [0x%.16x] <3>%s: Major version number mismatch. Expected [%d]; got [%d] <3>%s: Minor version number mismatch. Expected [%d]; got [%d] <3>Data structure version mismatch. Userspace tools must match eCryptfs kernel module with major version [%d] and minor version [%d] <3>Invalid auth_tok structure returned from key query <3>%s: Out of memory whilst trying to kmalloc [%zd] bytes of kernel memory <4>%s: max_packet_size is [%zd]; it must be at least [%d] <4>%s: Invalid packet tag [0x%.2x]; must be tag [0x%.2x] <4>%s: Error parsing packet length; rc = [%d] <4>%s: max_packet_size is [%zd]; real packet size is [%zd] <4>%s: Cipher code [%d] is invalid <3>%s: Internal error whilst attempting to convert encrypted filename memory to scatterlist; expected rc = 1; got rc = [%d]. block_aligned_filename_size = [%zd] <3>%s: Out of memory whilst attempting to kmalloc [%zd] bytes <3>%s: Internal error whilst attempting to convert decrypted filename memory to scatterlist; expected rc = 1; got rc = [%d]. block_aligned_filename_size = [%zd] <3>%s: Error attempting to find auth tok for fnek sig [%s]; rc = [%d] <6>%s: Filename encryption only supports password tokens <3>%s: Error setting key for crypto context; rc = [%d]. s->auth_tok->token.password.session_key_encryption_key = [0x%p]; mount_crypt_stat->global_default_fn_cipher_key_bytes = [%zd] <3>%s: Error attempting to decrypt filename; rc = [%d] <4>%s: Invalid tag 70 packet; could not find valid separator between random characters and the filename <4>%s: Filename size is [%zd], which is invalid <4>%s: Require [%zd] bytes to write; only [%zd] available <3>%s: Out of kernel memory whilst attempting to kzalloc [%zd] bytes <3>%s: Error generating tag 70 packet header; cannot generate packet length; rc = [%d] <4>%s: Unable to generate code for cipher [%s] with key bytes [%zd] <3>%s: Error attempting to allocate hash crypto context; rc = [%d] <3>%s: Error initializing crypto hash; rc = [%d] <3>%s: Error updating crypto hash; rc = [%d] <3>%s: Error finalizing crypto hash; rc = [%d] <3>%s: Internal error whilst attempting to convert filename memory to scatterlist; expected rc = 1; got rc = [%d]. block_aligned_filename_size = [%zd] <3>%s: Error attempting to encrypt filename; rc = [%d] <3>Error attempting to get the global auth_tok; rc = [%d] <4>Skipping invalid auth tok with sig = [%s] <4>%s: Error writing tag 3 packet <3>Packet length larger than maximum allowable; need up to [%td] bytes, but there are only [%td] available <3>Error generating tag 11 packet header; cannot generate packet length. rc = [%d] <3>%s: Error writing auth tok signature packet <3>%s: Unable to allocate memory <3>%s: Error generating tag 66 packet header; cannot generate packet length <3>%s: Error generating tag 66 packet <3>%s: Error sending message to ecryptfsd <3>%s: Failed to receive tag 67 packet from the user space daemon <3>%s: message_len is [%zd]; minimum acceptable message length is [%d] <3>%s: Type should be ECRYPTFS_TAG_67 <3>%s: Status indicator has non zero value [%d] <3>%s: message_len [%zd]; max len is [%zd] <3>%s: Encrypted key_size [%zd] larger than the maximum key size [%d] <3>%s: Error parsing tag 67 packet <3>Failed to encrypt session key via a key module; rc = [%d] <3>%s: Error generating tag 1 packet header; cannot generate packet length <4>%s: Error writing tag 1 packet <4>%s: Unsupported authentication token type <3>%s: Error writing boundary byte <4>Error parsing packet length; rc = [%d] <4>Tag 3 packet contains key larger than ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES <4>Unknown version number [%d] <4>Only S2K ID 3 is currently supported <3>%s: Unsupported hash algorithm: [%d] <3>%s: Error parsing tag 3 packet <3>Maximum packet size too small <4>Invalid tag 11 packet format <3>Literal data section in tag 11 packet exceeds expected size <3>%s: No valid (ecryptfs-specific) literal packet containing authentication token signature found after tag 3 packet <3>%s: Expected signature of size [%d]; read size [%d] <3>Invalid max packet size; must be >=12 <4>Tag 1 packet contains key larger than ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES<3>%s: Error parsing tag 1 packet <4>%s: Invalid packet set (Tag 11 not allowed by itself) <7>%s: No packet at offset [%d] of the file header; hex value of character is [0x%.2x] <3>The lower file appears to be a non-encrypted eCryptfs file; this is not supported in this version of the eCryptfs kernel module <7>%s: Considering cadidate auth tok: <3>Cannot get sig for auth_tok of type [%d] <3>Unrecognized candidate auth tok type: [%d] <3>%s: Could not find a usable authentication token <3>Unrecognized auth tok type: [%d] <3>%s: Error generating tag 64 packet header; cannot generate packet length <3>%s: Failed to write tag 64 packet <3>%s: Failed to receive tag 65 packet from the user space daemon <3>%s: Type should be ECRYPTFS_TAG_65 <3>%s: Status indicator has non-zero value [%d] <3>%s: The message received from ecryptfsd is shorter than expected <3>%s: The decrypted key is not long enough to include a cipher code and checksum <3>%s: key_size [%d] larger than the maximum key size [%d] <3>%s: Invalid checksum for file encryption key; expected [%x]; calculated [%x] <3>Failed to parse tag 65 packet; rc = [%d] <3>%s: Cipher code [%d] is invalid <7>%s: Decrypted session key: <4>%s: Error decrypting the session key for authentication token with sig [%.*s]; rc = [%d]. Removing auth tok candidate from the list and searching for the next match. <3>%s: Error computing the root IV <3>%s: Error initializing crypto context for cipher [%s]; rc = [%d] <3>%s: Attempt to reference context buffer at index [%d]; maximum allowable is [%d] <3>%s: Receiving process is a zombie. Dropping message. <4>%s: Received message from user [%d]; expected message from user [%d] <4>%s: Received message from user_ns [0x%p]; expected message from user_ns [0x%p] <3>%s: User [%d] sent a message response from an unrecognized process [0x%p] <4>%s: Desired context element is not pending a response <4>%s: Invalid message sequence; expected [%d]; received [%d] <3>%s: Failed to allocate [%zd] bytes of GFP_KERNEL memory <4>%s: User [%d] received a message response from process [0x%p] but does not have a registered daemon <4>%s: Attempt to destroy daemon with pid [0x%p], but it is in the midst of a read or a poll <4>%s: Warning: dropping message that is in the out queue of a dying daemon <3>%s: Error whilst attempting to destroy daemon; rc = [%d]. Dazed and confused, but trying to continue. <4>%s: Specified number of users is too large, defaulting to [%d] users <3>%s: Failed to allocate memory <3>Received request from user [%d] to unregister unrecognized daemon [0x%p] <3>%s: User [%d] does not have a daemon registered <4>%s: The eCryptfs free context list is empty. It may be helpful to specify the ecryptfs_message_buf_len parameter to be greater than the current value of [%d] <4>%s: Could not claim a free context element <3>%s: Error attempting to send message to userspace daemon; rc = [%d] <4>%s: Attempt to poll on zombified daemon <2>%s: Fatal error whilst attempting to shut down daemon; rc = [%d]. Please report this bug. <3>%s: Error attempting to spawn daemon; rc = [%d] <3>%s: pid [0x%p] has registered with euid [%d], but pid [0x%p] has attempted to open the handle instead <3>%s: Miscellaneous device handle may only be opened once per daemon; pid [0x%p] already has this handle open <3>%s: Error attempting to increment module use count; rc = [%d] <3>%s: memdup_user returned error [%ld] <4>%s: Minimum acceptable packet size is [%zd], but amount of data written is only [%zd]. Discarding response packet. <4>%s: Error parsing packet length; rc = [%d] <4>%s: (1 + packet_size_length([%zd]) + packet_size([%zd]))([%zd]) != count([%zd]). Invalid packet format. <4>%s: (sizeof(*msg) + msg->data_len) = [%zd]; data_size = [%zd]. Invalid packet. <3>Error processing response message; rc = [%d] <4>%s: Failed to deliver miscdev response to requesting operation; rc = [%d] <4>%s: Dropping miscdev message of unrecognized type [%d] <4>%s: Attempt to read from zombified daemon <4>%s: Error writing packet length; rc = [%d] <4>%s: Only given user buffer of size [%zd], but we need [%zd] to read the pending message <3>%s: Failed to register miscellaneous device for communications with userspace daemons; rc = [%d] <3>%s: Out of memory whilst attempting to kmalloc(%zd, GFP_KERNEL) <3>%s: We are in the middle of shutting down; aborting privileged request to open lower file <4>%s: Privileged open request dropped <3>%s: Failed to create kernel thread; rc = [%d] <7>%s: Auth tok at mem loc [%p]: <7>%s: * session_key.flags = [0x%x] <7>%s: * Userspace decrypt request set <7>%s: * Userspace encrypt request set <7>%s: * Contains decrypted key <7>%s: * session_key.decrypted_key_size = [0x%x] <7>%s: * Decrypted session key dump: <7>%s: * Contains encrypted key <7>%s: * session_key.encrypted_key_size = [0x%x] <7>%s: * Encrypted session key dump: <7>%s: This is a directory <7>%s: ia->ia_valid = [%x] fs/ecryptfs/inode.cinclude/linux/dcache.h<7>%s: This is a directory ...%d ecryptfs,aesfs/ecryptfs/main.c<4>%s: path_lookup() failed <4>%s: Out of memory /<3>%s: d_alloc failed <3>sysfs registration failed sig=%secryptfs_sig=%scipher=%secryptfs_cipher=%secryptfs_key_bytes=%uecryptfs_passthroughecryptfs_xattr_metadataecryptfs_encrypted_viewecryptfs_fnek_sig=%secryptfs_fn_cipher=%secryptfs_fn_key_bytes=%uecryptfs_unlink_sigsecryptfs_check_dev_ruidecryptfs_auth_tok_list_itemecryptfs_file_cacheecryptfs_dentry_info_cacheecryptfs_inode_cacheecryptfs_sb_cacheecryptfs_headers_1ecryptfs_headers_2ecryptfs_xattr_cacheecryptfs_key_record_cacheecryptfs_key_sig_cacheecryptfs_key_tfm_cacheecryptfs_open_req_cacheversion,ecryptfs_fnek_sig=%s,ecryptfs_sig=%s,ecryptfs_cipher=%s,ecryptfs_key_bytes=%zd,ecryptfs_passthrough,ecryptfs_xattr_metadata,ecryptfs_encrypted_view,ecryptfs_unlink_sigsfs/ecryptfs/super.c&inode_info->lower_file_mutexfs/ecryptfs/mmap.cuser.ecryptfs<7>%s: Not a new file fs/ecryptfs/read_write.cECRYPTFS_FNEK_ENCRYPTED.fs/ecryptfs/crypto.caes&key_tfm_list_mutex%s(%s)&tmp_tfm->key_tfm_mutexecb&crypt_stat->cs_mutex&crypt_stat->cs_tfm_mutex<3>%s: No cipher specified cbcuser.ecryptfs<3>%s: Out of memory md5<7>%s: root iv: %lld<7>%s: source: <7>%s: derived iv: include/linux/scatterlist.h<7>%s: Key size [%d]; key: %.2x<7>%s: FEK of size [%d]: aes<7>%s: EFEK of size [%d]: <4>%s: No key <4>%s: Key expired <4>%s: Key revoked md5<7>%s: Encrypted key: <3>Max packet size too large <3>Unable to allocate memory <4>Invalid body size ([%td]) <3>Packet size exceeds max <4>Unrecognizable packet <4>Packet size exceeds max fs/ecryptfs/keystore.c&ecryptfs_daemon_hash_mux&ecryptfs_msg_ctx_lists_mux&ecryptfs_msg_ctx_arr[i].mux&(*daemon)->muxfs/ecryptfs/miscdev.cecryptfsinclude/linux/dcache.h&req->muxfs/ecryptfs/kthread.c&ecryptfs_kthread_ctl.muxecryptfs-kthread<7>0x%.2x.0x%.2x. <7>%s: * private key type <7>%s: * passphrase type <7>%s: * salt = [%s] <7>%s: * persistent <7>%s: * signature = [%s] |1B;U "(1c1-4478899:^:uA1m  $(,048<@DHLPTX\`dhlpt9}C} }}}}}#}(}&-}+2}i7}n<}?A}IF}K} P} U} Z}!_}!d}O#i}Y#n} $(04<@HLTX`dlpx| o8 L_L_L_L_L_L_L_L_SL_WL_c#L_,R0T6 g>Di?D0LvVNv'h\v[r\vZcx?dx?tdvfQgv\hx?hx?ivJ9ãf ٤f3fťfɥfͥfԬffnf rf#vf=_ٰ_ $(04<@HLTX`dlpx|  $,08<DHPT\`hltxlicense=GPLdescription=eCryptfsauthor=Michael A. Halcrow parm=ecryptfs_number_of_users:An estimate of the number of concurrent users of eCryptfsparmtype=ecryptfs_number_of_users:uintparm=ecryptfs_message_wait_timeout:Maximum number of seconds that an operation will sleep while waiting for a message response from userspaceparmtype=ecryptfs_message_wait_timeout:longparm=ecryptfs_message_buf_len:Number of message buffer elementsparmtype=ecryptfs_message_buf_len:uintparm=ecryptfs_verbosity:Initial verbosity level (0 or 1; defaults to 0, which is Quiet)parmtype=ecryptfs_verbosity:intsrcversion=026C28330D859BE3601FF51depends=vermagic=2.6.32-642.1.1.el6.i686 SMP mod_unload modversions 686 7Pn# P S$(0#4P8<DHLnAmodule_layoutҌvfs_createԓrequest_key9kobject_putZ-kmem_cache_destroy }per_cpu__current_task[__kmalloc?fsstack_copy_inode_size×sg_init_table4kref_putQMVget_sb_nodevput_pid:generic_file_llseek;__mark_inode_dirtyvfs_readdireJ82inode_permissioniparam_get_intbstrlen"page_address(wiget5_locked`key_type_user'|autoremove_wake_function"$vfs_linkyget_random_bytesmalloc_sizeshW4param_set_long__lock_pages8_spin_locktouch_atime=Ndeactivate_locked_super3Qgeneric_delete_inode,,generic_file_aio_readQdput-lVyseq_printf)Dmatch_token"9dentry_openP?vfs_mknod(mutex_unlockl߅strsepE;vfs_fsync%Kparam_set_inteRigrab%.vfs_symlinkZ,ysysfs_remove_groupAu__alloc_pages_nodemaskC__list_addSLmutex_trylockZ%strcmpkobject_create_and_add(vfs_rmdiryunlock_renameRnd_deletekunmap_atomickey_validate__init_waitqueue_headjH)per_cpu__cpu_numberxU?vfs_readkmap_atomic.jQmisc_registerkern_path[+memset[|J__mutex_init՗#printk$kthread_stop$d_rehash\sysfs_create_groupTެ__tracepoint_module_getZV6lock_kernelPUkunmap nǡ_cond_resched-copy_to_userSstrncpy 3.lstrncmpIevprintkw"kmem_cache_free&wait_on_sync_kiocba+lock_rename__put_user_1mutex_lockv\mem_sectionHTdcache_lock[D!list_delSmark_tech_preview[unlock_pagedZfput5'contig_page_dataq =key_putqinode_init_onceuunlock_kernel6 module_putkmem_cache_alloc__free_pages\__put_user_4npath_lookup3generic_file_mmap;r9Fkmap7/fs_kobj[Cgmntput_no_expirew.ېd_allocՋparam_get_long__stack_chk_failparam_get_uintL6Bschedule5refrigeratorZLdo_sync_read ]unlock_new_inodewcrypto_destroy_tfm<vfs_mkdirj?,wake_up_processpath_putEkmem_cache_alloc_trace(__per_cpu_offset%|ivfs_unlinkkmem_cache_createPOregister_filesystemGfsstack_copy_attr_allCfree_pagesT.d__wake_upo_kthread_should_stopE$sg_init_oneàiput\ schedule_timeout_interruptible^ read_cache_page zkfreeBkthread_create_do_sync_writeκ`.memcpy/3prepare_to_waitH̅2param_set_uint@Bfree_user_nskref_get= vmtruncateuxP-put_pageۗDzkzfree"&˜finish_wait6,unregister_filesysteminit_special_inode/t simple_strtol^memdup_userpsnprintfSgeneric_file_splice_read~ lookup_one_lenpvfs_renameCYvfs_getattr[3crypto_alloc_base~grab_cache_page_write_beginR#notify_changemisc_deregister"Ld_instantiate 6_vfs_write kgeneric_fillattrstrcpy7,sgeneric_shutdown_super &p#0,0D _p$t (H 88!$#aesblowfishdes3_edecast5twofish cast6 aesaes |@ (,0H`dpt?e .$08DecryptfsA<" `dmodule.sig^WM  DSflDjDؾiVn"2_#$DNhƬ\\~Xcub*ߕ     BP3:!IOXPksT 0@d( `6  @am, >0 P@Z n    $ 9   %&5E*SKb`r % %!p##@ #'#()`>=L ]$r&0-`p        (@08XY'~7  ,:P d@@'(n X  *<E d0o8|P.p.1/ /D0F`0H 0T1e2 A1Gh' w3( $ 7W :DD  @CG@C^`{ oD\ %    % <`~  < Ly3 <? <K <W <c <o PQa V )  PSa   ; $     $ - L < PZ;S  b  q k  k      W  ?  )   S   p  ! mG np )  p     PwW   6   !   )  8   G '  V A  e ` " t     |  h     /  > hJ hV k hw  h h .       $У.3  B[`  j y            @ h '3?,T  ct     ## &@A6plgSZod PO ?5GS^?}`hLP{P /=p^PcyjS U~=%5<JY_0j`PmT[`&VWN@`t~P 0'=;G ` ZwbwL+\p?nM+<IV_n[0:I$w *7DUnYTPQi v)DL sbsxLhЭ`9ESPWr(Og@I>^jv``  .6-0G_r{P&6%h 8)@i=lbQ_kt`FD(2IP^i`D3n!'p>_HVLmw~ 4 R`k%05K`xH'5M }$jwkD0MBBP % 3 @ ^ l{  Kd  ` 3 ( D  !!'!;!ЛT! rl!t!!0 !!!G!u!"0R)"3"I"\"h"t""@h dentry.cecryptfs_d_releaseecryptfs_d_revalidatefile.cecryptfs_flushecryptfs_ioctlecryptfs_read_update_atimeecryptfs_fasyncecryptfs_fsyncecryptfs_releaseecryptfs_open__func__.30832ecryptfs_readdirecryptfs_filldir__func__.30774inode.cunlock_direcryptfs_removexattrecryptfs_listxattrecryptfs_getxattrecryptfs_put_linkgrow_fileecryptfs_permissionecryptfs_follow_linkecryptfs_readlink_lowerecryptfs_readlinkecryptfs_setattr__func__.32005__func__.31502lock_parentecryptfs_create__func__.31441__func__.31401__func__.31478ecryptfs_renameecryptfs_unlinkecryptfs_linkecryptfs_rmdirecryptfs_lookup__func__.31598ecryptfs_mknodecryptfs_mkdirecryptfs_symlinkmain.cecryptfs_kill_block_superdo_sysfs_unregistrationecryptfs_kobjattr_groupversion_showecryptfs_free_kmem_cachesecryptfs_cache_infosecryptfs_exitecryptfs_fs_typeinode_info_init_onceecryptfs_get_sbecryptfs_fill_super__key.36197tokens__func__.36246__func__.36364__func__.36336ecryptfs_init__func__.36467__func__.36515__mod_license939__mod_description937__mod_author936__mod_ecryptfs_number_of_users82__mod_ecryptfs_number_of_userstype80__param_ecryptfs_number_of_users__param_str_ecryptfs_number_of_users__mod_ecryptfs_message_wait_timeout71__mod_ecryptfs_message_wait_timeouttype67__param_ecryptfs_message_wait_timeout__param_str_ecryptfs_message_wait_timeout__mod_ecryptfs_message_buf_len57__mod_ecryptfs_message_buf_lentype55__param_ecryptfs_message_buf_len__param_str_ecryptfs_message_buf_len__mod_ecryptfs_verbosity48__mod_ecryptfs_verbositytype45__param_ecryptfs_verbosity__param_str_ecryptfs_verbosityattributesversion_attrsuper.cecryptfs_statfsecryptfs_show_optionsecryptfs_clear_inodeecryptfs_put_superecryptfs_destroy_inodeecryptfs_alloc_inode__key.29410mmap.cecryptfs_bmapecryptfs_writepage__func__.31520ecryptfs_copy_up_encrypted_with_header__func__.31544ecryptfs_readpage__func__.31585__func__.31718ecryptfs_write_begin__func__.31655ecryptfs_write_end__func__.31795read_write.c__func__.28448crypto.cecryptfs_copy_mount_wide_flags_to_inode_flagsecryptfs_decode_from_filenamefilename_rev_mapecryptfs_copy_filename__func__.33019portable_filename_chars__func__.32618__func__.32953key_tfm_listecryptfs_cipher_code_str_mapCSWTCH.797__key.32701ecryptfs_crypto_api_algify_cipher_name__key.32735__key.31585__key.31586__key.31587__key.31588contains_ecryptfs_marker__func__.32216__func__.32346__func__.32016ecryptfs_read_headers_virtecryptfs_flag_map__func__.32510__func__.32577__func__.32444__func__.32384__func__.32400__func__.32328ecryptfs_calculate_md5__func__.31507__func__.32075__func__.32189__func__.32105__func__.31559__func__.31965__func__.31869__func__.31922__func__.31711__func__.31771__func__.31823keystore.c__func__.35988__func__.35959ecryptfs_find_global_auth_tok_for_sigdecrypt_passphrase_encrypted_session_key__func__.36909write_tag_3_packet__func__.37247__func__.36864__func__.35947ecryptfs_find_auth_tok_for_sig__func__.36421__func__.36256__func__.37144__func__.37369__func__.36112__func__.37099__func__.36150__func__.36985__func__.36728__func__.36565__func__.36017__func__.36049messaging.cecryptfs_hash_bitsecryptfs_daemon_hashecryptfs_msg_ctx_free_listecryptfs_msg_ctx_lists_muxecryptfs_msg_ctx_arr__func__.26201__func__.26138__func__.26375__key.26315__key.26323ecryptfs_msg_counter__key.26324__func__.26314__key.26111__key.26112__func__.26109ecryptfs_msg_ctx_alloc_list__func__.26040__func__.26259miscdev.cecryptfs_num_miscdev_opensecryptfs_miscdevecryptfs_miscdev_poll__func__.28091ecryptfs_miscdev_release__func__.28188ecryptfs_miscdev_open__func__.28134ecryptfs_miscdev_write__func__.28454__func__.28428ecryptfs_miscdev_read__func__.28266__func__.28519__func__.28233ecryptfs_miscdev_fopskthread.c__key.26344__key.26345ecryptfs_kthread_ctl__func__.26346ecryptfs_kthread__key.26298__key.26299ecryptfs_threadfn__func__.26302debug.c__func__.26002ecryptfs.mod.c_rheldata__mod_srcversion183__module_depends____versions__mod_vermagic5generic_shutdown_superecryptfs_write_packet_lengthstrcpyecryptfs_xattr_cachegeneric_fillattrvfs_writeecryptfs_encrypt_paged_instantiatemisc_deregisternotify_changeecryptfs_inode_setecryptfs_get_tfm_and_mutex_for_cipher_nameecryptfs_writegrab_cache_page_write_begincrypto_alloc_basevfs_getattrvfs_renameecryptfs_init_ecryptfs_miscdevlookup_one_lenecryptfs_lookup_and_interpose_lowergeneric_file_splice_read__this_moduleecryptfs_init_crypt_statsnprintfecryptfs_process_quitmemdup_userecryptfs_inode_testsimple_strtolecryptfs_derive_ivinit_special_inodeunregister_filesystemecryptfs_from_hexecryptfs_read_metadatafinish_waitecryptfs_init_kthreadkzfreeput_pagevmtruncatekref_getfree_user_nsecryptfs_setxattrcleanup_moduleparam_set_uintprepare_to_waitmemcpydo_sync_writekthread_createkfreeecryptfs_destroy_mount_crypt_statread_cache_pageschedule_timeout_interruptibleiputsg_init_oneecryptfs_open_req_cacheecryptfs_destroy_crypt_statecryptfs_read_xattr_regionecryptfs_decrypt_pageecryptfs_read_and_validate_xattr_regionecryptfs_dump_hexkthread_should_stop__wake_upfree_pagesfsstack_copy_attr_allecryptfs_sopsregister_filesystemkmem_cache_createvfs_unlink__per_cpu_offsetkmem_cache_alloc_tracepath_putecryptfs_header_cache_1ecryptfs_read_lowerinit_moduleecryptfs_main_iopsecryptfs_parse_tag_70_packetwake_up_processvfs_mkdirecryptfs_init_cryptoecryptfs_privileged_openecryptfs_new_file_contextecryptfs_write_lower_page_segmentcrypto_destroy_tfmecryptfs_find_daemon_by_euidunlock_new_inodedo_sync_readrefrigeratorscheduleparam_get_uintecryptfs_compute_root_iv__stack_chk_failparam_get_longecryptfs_get_locked_pagekey_tfm_list_mutexd_allocecryptfs_interposemntput_no_expirefs_kobjkmapgeneric_file_mmappath_lookup__put_user_4__free_pageskmem_cache_allocecryptfs_destroy_kthreadecryptfs_cipher_code_to_stringmodule_putecryptfs_daemon_hash_muxunlock_kernelecryptfs_global_auth_tok_cacheinode_init_onceecryptfs_read_and_validate_header_regionecryptfs_truncateecryptfs_release_messagingkey_putecryptfs_getattr_linkcontig_page_datafputecryptfs_code_for_cipher_stringecryptfs_send_miscdevunlock_pageecryptfs_msg_ctx_alloc_to_freeecryptfs_decode_and_decrypt_filenamemark_tech_previewecryptfs_write_metadataecryptfs_destroy_cryptolist_delecryptfs_write_lowerdcache_lockmem_sectionmutex_lock__put_user_1lock_renamewait_on_sync_kiocbkmem_cache_freevprintkstrncmpstrncpycopy_to_user_cond_reschedecryptfs_symlink_iopskunmaplock_kernelecryptfs_init_inodeecryptfs_process_response__tracepoint_module_getsysfs_create_groupd_rehashkthread_stopprintk__mutex_init__ecryptfs_printkecryptfs_init_persistent_fileecryptfs_destroy_ecryptfs_miscdevecryptfs_main_fopsecryptfs_key_tfm_cachememsetkern_pathvirt_to_scatterlistecryptfs_add_keysigmisc_registerkmap_atomicvfs_readecryptfs_encode_for_filenameecryptfs_file_info_cacheper_cpu__cpu_number__init_waitqueue_headkey_validatekunmap_atomicd_deleteecryptfs_auth_tok_list_item_cacheunlock_renamevfs_rmdirkobject_create_and_addstrcmpmutex_trylock__list_addecryptfs_write_header_metadata__alloc_pages_nodemasksysfs_remove_groupgeneric_file_aio_writesprintfecryptfs_inode_info_cacheecryptfs_dump_auth_tokecryptfs_verbosityvfs_symlinkigrabecryptfs_read_lower_page_segmentparam_set_intecryptfs_key_sig_cachevfs_fsyncstrsepmutex_unlockecryptfs_sb_info_cachevfs_mknodecryptfs_dentry_info_cachedentry_openecryptfs_header_cache_2ecryptfs_getattrmatch_tokenecryptfs_add_global_auth_tokseq_printfdputgeneric_file_aio_readgeneric_delete_inodedeactivate_locked_supertouch_atime_spin_lockecryptfs_message_buf_lenecryptfs_wait_for_responseecryptfs_key_record_cache__lock_pageparam_set_longecryptfs_number_of_usersecryptfs_spawn_daemonecryptfs_write_inode_size_to_metadataecryptfs_write_tag_70_packetmalloc_sizesecryptfs_to_hexecryptfs_add_new_key_tfmget_random_bytesecryptfs_set_default_sizesecryptfs_generate_key_packet_setvfs_linkautoremove_wake_functionecryptfs_send_messagekey_type_useriget5_lockedecryptfs_message_wait_timeoutecryptfs_parse_packet_lengthpage_addressecryptfs_tfm_existsstrlenecryptfs_dir_iopsecryptfs_init_messagingecryptfs_dopsecryptfs_aopsparam_get_intinode_permissionvfs_readdir__mark_inode_dirtygeneric_file_llseekecryptfs_exorcise_daemonecryptfs_getxattr_lowerput_pidget_sb_nodevecryptfs_parse_packet_setkref_putsg_init_tableecryptfs_encrypt_and_encode_filenameecryptfs_keyring_auth_tok_for_sigfsstack_copy_inode_sizeecryptfs_init_crypt_ctx__kmallocper_cpu__current_taskkmem_cache_destroykobject_putrequest_keyvfs_createecryptfs_dir_fopsecryptfs.ko.debugI.rodata.str1.1.rodata.str1.4.rel.data.rheldata.rel.rodata.symtab.strtab.shstrtab.note.gnu.build-id.rel__bug_table.rel.gnu.linkonce.this_module.note.module.sig.gnu_debuglink.rel__param.modinfo.rel.smp_locks__versions.rel.altinstructions.bss.altinstr_replacement.rel.text.rel.init.text.rel.exit.textY4$`` Bs6C=2 H'# 7 3  ( 28N2S]|ex Hf 8g Lhppil kn rP Tr)rr& #$  ěH L | l x?G"LOdA