ELF>>@@ GNU<\z[SHGxHHt+HxHtHCxH8HsxH=[[AUATUHSHHHt F8@u{HExHxHHW`Ht6H:t0HtLkL#H{H E1E1HG`HHtLkL#H]0Ht#H(H߉D${HD$DH[]A\A]HH0HF HtHHt1USHHHo H=uHHxHUHRxHrH:HD$HD$H[]HH8SHHH=1[SHHHHC Ht/Hx`t(HHt$HC Ht$HH@`H[H1[AWAVAUATIUHSHH=LnЀHI$uHHLL`uHH1`LHLt IU(HH1CHX@8u%AD$8tHH1 I$HM}0A%=@u1H1HL`LIG(MLHHD$A`BBtZLtLHT$Bt A`5u,I(HuLLÅE1Lu%HM@LHHH1HI$H=H[]A\A]A^A_UHHSHHHtqHHtiHK Ht`HIHHtWft"wf@tv@vtyXu&HHSHr0HUHz0HD$HD$HH[]UHHSHHHtqHHtiHK Ht`HI@HtWft"wf@tv@vtyXu&HHSHr0HUHz0HD$HD$HH[]ATUHSH HHHG@HC@1LOHH4$HT$HHHMa0LL$HS@HU@x(|$t|$tHSHR0HJPIL$PHRXIT$XH []A\AVIAUATIHULLcSHH GHWHt$H|$DL$ADL$tLHH1*ILT$Ht$H;SH|$AExCH D[]A\A]A^ÐHFPHGPHFXHGXHF`HG`HFhHGhHFpHGpHFxHGx1H9(1uHGHt!O(HHO0H!HHHWHHSHtH\CXfC\H[AWIAVIAUATUSHHFxH|$HXHAxHhHHHHILHIMv0H9D$t_H9D$tRIU0I|$0HHD$u6MtI(LIu0LL;|$tIt$0H|$LLLLHHD$H[]A\A]A^A_HHx0HD$HǠHD$HSHH0HǠH[SHHGxHXH{0HW Ht?HǠHt$HC0Ht$HH@ H{0D$HǠD$H[USHHGxHXH{0HG HtAHǠH$Ht$HC0HH$Ht$H@ H{0HǠHHc[]AVAUIHATUSHFxHL`LLHH}0LLAEuHC0Ht@HHu0LHE0H@HAEHEuHH[]A\A]DA^ËFDH|HHwAWAVAUIATUHSHHHFxL(L`LLLLHD$AtH11HL.I(H@HAEHHCpIEpHCxIExH|$LHD[]A\A]A^A_HV0CUHSHARH(HHHE@H HC@HC0H@pHS(HC0H(H3%=u HC $=@uHC Hǃ0I}0It$(H=IH{0v LHLHs0LHLIHvHH1AMHHAt(HHLHHHHHHHD[]A\A]A^SH1HH|$H|$`D$Ht$ H{0uZHt$ HT$`HK 5K,HHH1D$D$ H|$pHHH<|$ uHH1EuH{PHEuCt HsPH{qEuHC@EHs@u CtHsHHkPHuHHHH1HuHS@1HtHS@.CtLHkq1Hu:HSH1Ht(HSHHH1H!HLccMl$ I|$H$Lt+LH1A $H1I|$A$$H(Md$IL;$$uH|$11HIH=Iĉ$LHLH|$(HT$`I$M$(ID$0IDŽ$tHH1HT$hHBhHx(uH1R|$t5HR0reH%H;rtRH1I$L$$HHT$hHcIL$PHBhH@P%H ID$PHJhAPuCt HID$PHBhLH@ ID$ HBhH@ID$X_ID$Hz0H=HHHID$`u HgH=ЀHtQIT$`HBxID$`HT$hH@xHPID$`HT$`H@xHIl$`IL$P@Ht|H}\EXfE\jH|$`I1ILHt&H{H=H ILH1HcHĘH[]A\A]A^A_ýIAVAUIATL0ULSHP'=Hw1u^IExHXeH%HLhL0LLt+LLH1HǃXǃPL[]A\A]A^ýUH0SHHPHAQt,H{0HXHǃXHAX[]_[]ÐHGxHxHGhH@0H@XHtAVAUATUHSHF(HLk LsLLc)A$HIT$ uHH1Md$IM9uLHSP1HHHS@HtHH1CtHH1CtHH1CtHH1C tHH1CtHH1[]A\A]1A^SHH@1HH([HH?HH=H=SH1Ht>H`H0HHǃPHǃXH[SHXHt H`HH['QHH(Hx0HGpHP81HtHZUSHAPt#HSHH1HHH^[]AW1IAVIIAUeL,%ATIUSHHHHvHD$Ll$HD$Hm۶m۶mLHI IIGHD$ IGHD$(HsHK1Hl$Il$HHHl$H9AD1LE1HuGID$LH0AƋtH|$ $HT$8H H|$(HT$0HHD$DEtdDHH1bHID$LLH)HHH AtHHH1HD$HD$H9D$E1HHD[]A\A]A^A_USHARHFLLH`t A`u"Hs1ҹHtVt'HtsHH1PHs1ҹHtAH1%Ht!HH1H H1HS1HHHAY[]HH>eH%DwCHHHm۶m۶m)HHHH H1HHeH%DAWMAVAAUIATII ULSHH|$H$LDHHIHLH tMEA`u/1ҹLHAHH3tbt3I`H1AHH1q1ҹLHAtbHHHCHH;| 1H}4HAt%HSHH1H tHMtDHCHH;~4HD$HHxAtHHH1#IEE1H9u*H<$t#1HHHIHD[]A\A]A^A_SH01HGpHPH=Hw+tHH[AWAVAUIATUSS`u HXHhLu0IF Ht HuH14H=HHuH1MLIF HHHIHIH޸LHMN E1HLHHALtH1H=HmH5HHtJIH 1ҹHLH߉yHH11A[[]A\A]A^A_AWI1I HAVAAAUEDATUDSHLATL.HMA`u2D1LLAI(LAID$HHHH I;D$uLA9AGLAtLHH1NHI;~IHH1LAtH1ALL][]A\A]DA^A_ÐAUATUHSHHXHT$HHt?eH%LHHL$HǃHLHIžHDH[]A\A]USHHHnH $H|$H HHHm۶m۶mH $HH|$HHHHH H1҅NH[]AWAVIAUIATUSHXHHt$HHD$H9HHD$ HNHeH%HL$0HD$(eH %HD$@HL$8\HL$8HH HAH@=LH)I9LGHLHT$HL$H=IHT$HL$vʼnHH1(HD$(DHHm۶m۶mLHHHH HHtL9}H4*1L9H|Ht$HHHt$HLL|$HL$@DA $LA`t LHL$HLLLtHH1RLH;\$01H;\$ ~4A`It#LtH1DHX[]A\A]A^A_L|$0HݹH)I)L9LFL9IQUISHHXHt$Ht/eH%HHHL$HǃHLHHH[]AUIATIUHH SHHLD$HHm۶m۶mLD$HJt-HHLHLH H1҅NH[]A\A]ÐHSHH IHHF AEtZwEt[At2AuO AAD @DEAAHD #DAAHD  D E1HI1E1E1I9tH[Ëω>AUIATIUHSHHyAPHHHtHLLHB Le1Z[]A\A]AT1IHIUHSHHHHHHLD$HH)HcHHI$LD$HtHHH11H[]A\USHUH{ʼn<19t7At HH u~H H[ATIUHHS1uHUHw7HD(*HkLHHuHu1[]A\ATAUHS1&HkD:uHcHHkHHHu1}uAHH[]A\ATUH1SHHFH~HHAfAfDcHE[]A\AWAVAUATUHSH(`H|$t@u0H1HH1ALpAIEH AHuDЀHt2HHm۶m۶mHHHHH Hu HH1AHH|$L`Dd$HsDHs DHp H$A?HI>LAtH1IH$H|$AHIHs u HT$HHA\IIt$AADADHIHIIAD`H IIIL$LIID$HT$IH)IH$eH3 %(DtH[]A\A]A^A_AWAVAUIATLUSHH8fwHD$ft=fL|t0H1sH11A{ HHu HH1AHxHT$ @Au7HD$ I $HTH IL$L`J|%HJs HT$ AtHH1DLd$ K HsHT$LsJD%HHs LAHHuHH1H|$Ht$t HH1ALd$ED$IXA|$AHHAT$ tHH1I|$ HT$ Ht$(LD$ALD$tHH1HD$ HT$(HHH4I9sHHHwHH1EL @SvHHdLHItL1KHATAD 1A6 HH9rf9HH1ADH1HHH1/AM@=~!HH1Iu LH|$HtHH8D[]A\A]A^A_MepKHLI}P[I] AىAsUATIUH1HSHHHHHtH=v)HHH1H;uH;Hx(H;Lt#H;D$H(H;D$HH[]A\AUIATIUHSHASu"AEuAZHHL[]A\A]AY[]A\A]AWIAVMAUIATUSHH8HHHH50L $HL$HD$(HHL $u%0HH1ALI ǀw LHH11H;I>HNJH;Ft(FHH1AHUHuLL $AL $tHHHUHuHBHT2L9HE vHL0LHH1H3HHHD$H3LƅHH HHL$HPHATH UHuAtUHHjHL$HT$HuHH|$(At!HT$HH1HT$Hu8HAtHt$H1H}8LH;HEPHu HHD$AHM HH1+H H} HHE@Hu u!HHHALHLA HM HH1H1HHHuHf~tHHAbHHL$HƈHQ@HPAy1HD$HMHDHHL@@H1 HHM HHT$LP AtHH1HE0HU@HHE0HE0<tH;E rHU H9uHH1/HH)HE0HBIUH=vHH1AQHzHIIMuHQHHAHu@Hu0HIIEH}@H}8EtHIEIH|$(HtH(H|$(HH8D[]A\A]A^A_AWAVAUIPATUSHHHHt$H5HT$LD$(L $HD$8HHu%PHH1AHT$LHpPH|$8ǀLHHAtLHH1)LsiHu@HLAtLH1H}@H1H@PH$H$HE8HHEHM HHtHH)HM8H $HMH}MHW HUu HD$HHD$HH9v HH1ASЀHHEHu"HUHHAAEFHuHUI}HE(H AtHHH}H}(LH}(LHE(LHs@Eu%HK@LHHA~HU(ADHuPHHU(f~t HH1ACH0HT$HƈH|$Dž(HH=H vAĉHH1L LPAHUPH LHt$PAtDHH1kH LLLPAHHE0HD$ HЃHEH HE0HH|$LH LPAtDHHXH Ht$LPA%H Ht$ LPAtDHHHT$ HIHBIGHEHHE08uBHE0HE8HU0HHH9HEHHt$(LuXH $LHHuH}HAHuHHH6LH}(LLA HMHH1H1HHHHuPHS@HƈHPAy(HMPLC@HH1HSHHMHLLPAtHHHEHE(HT$HE(HHT$H)H HH}HH}@H|$8HtH(H|$8HHHD[]A\A]A^A_AWIAVE1AUATUSHHheH%(HD$X1HT$PHD$ HD$8HD$ HD$(HT$O$7AM)A $tBIw H H=ЀHHuH1I|$HT$HHt$@t HhHt$@H wH1vLD$HJDL9v H u\vH1Ct@t@H1 KTH{P2HT$LD$HT$LD$:u HC M\HK HLD$LD$C|tHCTKDH)CL IK4ɃM\HEdHDžfEREXHT$ M\IEXHE@HBHU@HT$ HD$ HUHuTFHH11HHH=HHHIMO$7A<$uI|$HT$@Ht$Ht H]Ht$HH wH1bHD$@HTL9v H*HVHv HA|buA|tH1HItH|$Ht@HH1HHH1HHt$PMtƅ(UI w HH=ЀHHu HI|$HT$HHt$@t HVHt$@H wH1HD$HHTL9vH1At@t@H1ItHHD$HL$@QU\HD$vH1yHUdH H I4HfERETU\HL$ HЋUXIƃUXHU@HQHM@HL$ HT$ HMH 41HHH=HHHH 1LHHLl$ L9l$ AuH1Lt$ =InP~HH1HfAvRMft=fu M.H1AvRH1HS8Ht$0H|$8L9t(Mv@I@IF@L9YHHfAFRfuBHt$0I LHtH|$8H(H|$8HHUdfu@Ht$0ILLHtH|$8H(H|$8HHH|$8H(H|$8AH1LHHD$ HpHH@PHVPH9u?ecryptfs_parse_packet_lengthecryptfs_write_packet_lengthecryptfs_write_tag_70_packetecryptfs_verify_versionecryptfs_parse_tag_70_packetprocess_request_key_errecryptfs_parse_packet_setparse_tag_3_packetdecrypt_pki_encrypted_session_keywrite_tag_64_packetparse_tag_65_packetdecrypt_passphrase_encrypted_session_keyprocess_find_global_auth_tok_for_sig_errecryptfs_generate_key_packet_setwrite_tag_3_packetwrite_tag_1_packetpki_encrypt_session_keywrite_tag_66_packetparse_tag_67_packetecryptfs_spawn_daemonecryptfs_exorcise_daemonecryptfs_process_responseecryptfs_send_message_lockedecryptfs_acquire_free_msg_ctxecryptfs_init_messagingecryptfs_release_messagingecryptfs_send_miscdevecryptfs_init_ecryptfs_miscdevecryptfs_miscdev_releaseecryptfs_miscdev_openecryptfs_miscdev_pollecryptfs_miscdev_writeecryptfs_miscdev_responseecryptfs_miscdev_readecryptfs_init_kthreadecryptfs_privileged_openecryptfs_dump_auth_tok<3>%s: Error attempting to allocate memory <7>%s: Setting flags for stat... <3>%s: Error attempting to initialize the lower file for the dentry with name [%s]; rc = [%d] <4>%s: Lower file is RO; eCryptfs file must hence be opened RO <7>%s: This is a directory <7>%s: inode w/ addr = [0x%p], i_ino = [0x%.16lx] size: [0x%.16llx] <3>%s: Error attempting to decode and decrypt filename [%s]; rc = [%d] <3>Error in vfs_unlink; rc = [%d] ...<7>%s: %s: lookup_one_len() returned [%d] on lower_dentry = [%s] <3>%s: Error attempting to encrypt and encode filename; rc = [%d] /build/linux-5VIh7j/linux-3.2.78/fs/ecryptfs/inode.c<3>%s: Out of memory whilst attempting to allocate ecryptfs_dentry_info struct <3>%s: Error interposing; rc = [%ld] <3>%s: Error attempting to initialize the lower file for the dentry with name [%s]; rc = [%d] <3>Error attempting to zero out the remainder of the end page on reducing truncate; rc = [%d] <3>Problem with ecryptfs_write_inode_size_to_metadata; rc = [%d] <4>Either the lower file is not in a valid eCryptfs format, or the key could not be retrieved. Plaintext passthrough mode is not enabled; returning -EIO <7>%s: This is a directory <7>%s: Initializing crypto context <3>%s: Error creating new file context; rc = [%d] <3>Error writing headers; rc = [%d] <3>%s: Error locking directory of dentry <3>%s: Failure to create dentry in lower fs; rc = [%d] <4>%s: Failed to create file inlower filesystem %d Getting sb failedReading sb failedError parsing options&mount_crypt_stat->global_auth_tok_list_mutex<3>Error attempting to register global sig; rc = [%d] <3>Error attempting to register global fnek sig [%s]; rc = [%d] <4>%s: eCryptfs: unrecognized option [%s] ,<3>%s: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README aes<3>%s: eCryptfs doesn't support cipher: %s<3>Error attempting to initialize cipher with name = [%s] and key size = [%td]; rc = [%d] <3>Could not find valid key in user session keyring for sig specified in mount option: [%s] <4>One or more global auth toks could not properly register; rc = [%d] ecryptfs<4>%s: kern_path() failed <3>Mount on filesystem of type eCryptfs explicitly disallowed due to known incompatibilities <3>Mount of device (uid: %d) not owned by requested user (uid: %d) <3>%s; rc = [%d] /build/linux-5VIh7j/linux-3.2.78/fs/ecryptfs/main.c<3>Error opening lower file for lower_dentry [0x%p] and lower_mnt [0x%p]; rc = [%d] <4>%s: %s: kmem_cache_create failed <3>Failed to allocate one or more kmem_cache objects <3>Failed to register filesystem <3>Unable to create ecryptfs kset <3>Unable to create ecryptfs version attributes <3>sysfs registration failed <3>%s: kthread initialization failed; rc = [%d] <3>Failure occurred while attempting to initialize the communications channel to ecryptfsd <3>Failure whilst attempting to init crypto; rc = [%d] <2>eCryptfs verbosity set to %d. Secret values will be written to the syslog! <3>Failure whilst attempting to destroy crypto; rc = [%d] ecryptfs_auth_tok_list_itemecryptfs_file_cacheecryptfs_dentry_info_cacheecryptfs_inode_cacheecryptfs_sb_cacheecryptfs_headersecryptfs_xattr_cacheecryptfs_key_record_cacheecryptfs_key_sig_cacheecryptfs_global_auth_tok_cacheecryptfs_key_tfm_cacheecryptfs_open_req_cachesig=%secryptfs_sig=%scipher=%secryptfs_cipher=%secryptfs_key_bytes=%uecryptfs_passthroughecryptfs_xattr_metadataecryptfs_encrypted_viewecryptfs_fnek_sig=%secryptfs_fn_cipher=%secryptfs_fn_key_bytes=%uecryptfs_unlink_sigsecryptfs_mount_auth_tok_onlyecryptfs_check_dev_ruidversion,ecryptfs_fnek_sig=%s,ecryptfs_sig=%s,ecryptfs_cipher=%s,ecryptfs_key_bytes=%zd,ecryptfs_passthrough,ecryptfs_xattr_metadata,ecryptfs_encrypted_view,ecryptfs_unlink_sigs,ecryptfs_mount_auth_tok_only&inode_info->lower_file_mutex/build/linux-5VIh7j/linux-3.2.78/fs/ecryptfs/super.c<4>%s: Error encrypting page (upper index [0x%.16lx]) <3>%s: Error reading xattr region; rc = [%d] <3>%s: Error attempting to read extent at offset [%lld] in the lower file; rc = [%d] <3>%s: Error attempting to copy the encrypted content from the lower file whilst inserting the metadata from the xattr into the header; rc = [%d] <3>Error reading page; rc = [%d] <3>%s: Error decrypting page; rc = [%d] <7>%s: Unlocking page with index = [0x%.16lx] <3>%s: Error attemping to read lower page segment; rc = [%d] <3>%s: Error reading page; rc = [%d] <3>%s: Error decrypting page at index [%ld]; rc = [%d] <3>%s: Error on attempt to truncate to (higher) offset [%lld]; rc = [%d] /build/linux-5VIh7j/linux-3.2.78/fs/ecryptfs/mmap.c<4>No support for setting xattr in lower filesystem <3>Out of memory whilst attempting to write inode size to xattr user.ecryptfs<3>Error whilst attempting to write inode size to lower file xattr; rc = [%d] <3>%s: Error writing file size to header; rc = [%d] <7>%s: Calling fill_zeros_to_end_of_page(page w/ index = [0x%.16lx], to = [%d]) <7>%s: Expanded file size to [0x%.16llx] <3>Error writing inode size to metadata; rc = [%d] <3>%s: Error getting page at index [%ld] from eCryptfs inode mapping; rc = [%d] <3>%s: Error encrypting page; rc = [%d] <3>Problem with ecryptfs_write_inode_size_to_metadata; rc = [%d] %s(%s)<7>%s: m_1 = [0x%.8x]; m_2 = [0x%.8x]; MAGIC_ECRYPTFS_MARKER = [0x%.8x] <7>%s: (m_1 ^ MAGIC_ECRYPTFS_MARKER) = [0x%.8x] md5<3>%s: Error attempting to allocate crypto context; rc = [%d] <3>%s: Error initializing crypto hash; rc = [%d] <3>%s: Error updating crypto hash; rc = [%d] <3>%s: Error finalizing crypto hash; rc = [%d] /build/linux-5VIh7j/linux-3.2.78/include/linux/scatterlist.h%.2x<7>%s: root iv: %lld<7>%s: source: <4>%s: Error attempting to compute MD5 while generating IV for a page <7>%s: derived iv: <3>%s: Error attempting to derive IV for extent [0x%.16llx]; rc = [%d] <3>%s: Error setting key; rc = [%d] <7>%s: Decrypting [%d] bytes. <3>%s: Error decrypting; rc = [%d] <3>%s: Error attempting to decrypt to page with page->index = [%ld], extent_offset = [%ld]; rc = [%d] /build/linux-5VIh7j/linux-3.2.78/fs/ecryptfs/crypto.c<7>%s: Key size [%zd]; key: <7>%s: Encrypting [%d] bytes. <3>%s: Error attempting to encrypt page with page->index = [%ld], extent_offset = [%ld]; rc = [%d] &crypt_stat->keysig_list_mutex&crypt_stat->cs_mutex&crypt_stat->cs_tfm_mutex&crypt_stat->cs_hash_tfm_mutex<3>%s: Error allocating memory for encrypted extent <3>%s: Error encrypting extent; rc = [%d] <3>%s: Error attempting to write lower page; rc = [%d] <3>%s: Error attempting to read lower page; rc = [%d] <3>%s: No cipher specified <7>%s: Initializing cipher [%s]; strlen = [%d]; key_size_bits = [%zd] cbc<3>%s: cryptfs: init_crypt_ctx(): Error initializing cipher [%s] <4>%s: Session key not valid; cannot generate root IV <4>%s: Error attempting to compute MD5 while generating root IV aes<3>Error adding keysig; rc = [%d] <3>Error attempting to copy mount-wide key sigs to the inode key sigs; rc = [%d] <7>%s: Generated new session key: <3>%s: Error initializing cryptographic context for cipher [%s]: rc = [%d] <4>%s: Cipher code not recognized: [%d] <3>Key is invalid; bailing out <4>%s: Encrypted flag not set <3>%s: Out of memory <4>%s: Error generating key packet set; rc = [%d] <3>%s: Error whilst writing headers; rc = [%d] user.ecryptfs<3>%s: Error attempting to write header information to lower file; rc = [%d] <3>%s: Error writing metadata out to lower file; rc = [%d] <4>%s: File version is [%d]; only file version [%d] is supported by this version of eCryptfs <4>Invalid header size: [%zd] <4>%s: Error reading header metadata; rc = [%d] <6>Error attempting to read the [%s] xattr from the lower file; return value = [%zd] <3>%s: Unable to allocate page_virt <7>Valid eCryptfs headers not found in file header region or xattr region, inode %lu <7>Valid eCryptfs headers not found in file xattr region either, inode %lu <4>Attempt to access file with crypto metadata only in the extended attribute region, but eCryptfs was mounted without xattr support enabled. eCryptfs will not treat this like an encrypted file, inode %lu &key_tfm_list_mutex<3>Error attempting to allocate from ecryptfs_key_tfm_cache &tmp_tfm->key_tfm_mutex<3>Requested key size is [%zd] bytes; maximum allowable is [%d] ecb<3>Unable to allocate crypto cipher with name [%s]; rc = [%d] <3>Error attempting to set key of size [%zd] for cipher [%s]; rc = [%d] <3>Error attempting to initialize key TFM cipher with name = [%s]; rc = [%d] <3>Error adding new key_tfm to list; rc = [%d] -.0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz<3>%s: Out of memory whilst attempting to kzalloc [%zd] bytes <3>%s: Error attempting to get packet size for tag 72; rc = [%d] <3>%s: Out of memory whilst attempting to kmalloc [%zd] bytes <3>%s: Error attempting to generate tag 70 packet; rc = [%d] <3>%s: No support for requested filename encryption method in this release <3>%s: Error attempting to encrypt filename; rc = [%d] ECRYPTFS_FNEK_ENCRYPTED.<3>%s: Error attempting to encode encrypted filename; rc = [%d] <6>%s: Could not parse tag 70 packet from filename; copying through filename as-is <7>%s: Session key encryption key (size [%d]): <3>Internal error whilst attempting to get tfm and mutex for cipher name [%s]; rc = [%d] <3>Internal error whilst attempting to convert auth_tok->session_key.encrypted_key to scatterlist; expected rc = 1; got rc = [%d]. auth_tok->session_key.encrypted_key_size = [%d] <3>Internal error whilst attempting to convert auth_tok->session_key.decrypted_key to scatterlist; expected rc = 1; got rc = [%d] <3>Error setting key for crypto context <3>Error decrypting; rc = [%d] <7>%s: FEK of size [%zd]: <3>%s: Major version number mismatch. Expected [%d]; got [%d] <3>%s: Minor version number mismatch. Expected [%d]; got [%d] <3>Data structure version mismatch. Userspace tools must match eCryptfs kernel module with major version [%d] and minor version [%d] <3>Invalid auth_tok structure returned from key query <4>Invalidating auth tok with sig = [%s] <4>%s: No key <4>%s: Key expired <4>%s: Key revoked <4>%s: Unknown error code: [0x%.16lx] <3>%s: Five-byte packet length not supported <3>%s: Error parsing packet length <4>%s: Unsupported packet size: [%zd] <4>No key size specified at mount; defaulting to [%d] aes<7>%s: encrypted_session_key_valid != 0; using auth_tok->session_key.encrypted_key, where key_rec->enc_key_size = [%zd] <7>%s: Using previously generated session key encryption key of size [%d] <7>%s: Cached session key encryption key: <7>%s: Session key encryption key: <3>%s: Error generating scatterlist for crypt_stat session key; expected rc = 1; got rc = [%d]. key_rec->enc_key_size = [%zd] <3>%s: Error generating scatterlist for crypt_stat encrypted session key; expected rc = 1; got rc = [%d]. key_rec->enc_key_size = [%zd] <3>%s: Error setting key for crypto context; rc = [%d] <7>%s: Encrypting [%zd] bytes of the key <3>Error encrypting; rc = [%d] <7>%s: This should be the encrypted key: <7>%s: EFEK of size [%zd]: <3>Packet too large; need up to [%td] bytes, but there are only [%td] available <3>Error generating tag 3 packet header; cannot generate packet length. rc = [%d] <4>%s: Unable to generate code for cipher [%s] <3>Cannot get sig for auth_tok of type [%d] <3>Unrecognized auth tok type: [%d] <3>%s: Unable to allocate memory <3>%s: Error generating tag 64 packet header; cannot generate packet length <3>%s: Failed to write tag 64 packet <3>%s: Error sending message to ecryptfsd <3>%s: Failed to receive tag 65 packet from the user space daemon <3>%s: Type should be ECRYPTFS_TAG_65 <3>%s: Status indicator has non-zero value [%d] <4>%s: Error parsing packet length; rc = [%d] <3>%s: The message received from ecryptfsd is shorter than expected <3>%s: The decrypted key is not long enough to include a cipher code and checksum <3>%s: key_size [%d] larger than the maximum key size [%d] <3>%s: Invalid checksum for file encryption key; expected [%x]; calculated [%x] <3>Failed to parse tag 65 packet; rc = [%d] <3>%s: Cipher code [%d] is invalid <7>%s: Decrypted session key: <3>Could not find key with description: [%s] <3>%s: Out of memory whilst trying to kmalloc [%zd] bytes of kernel memory <4>%s: max_packet_size is [%zd]; it must be at least [%d] <4>%s: Invalid packet tag [0x%.2x]; must be tag [0x%.2x] <4>%s: max_packet_size is [%zd]; real packet size is [%zd] <4>%s: Cipher code [%d] is invalid <3>%s: Error attempting to find auth tok for fnek sig [%s]; rc = [%d] <3>%s: Internal error whilst attempting to convert encrypted filename memory to scatterlist; rc = [%d]. block_aligned_filename_size = [%zd] <3>%s: Out of memory whilst attempting to kmalloc [%zd] bytes <3>%s: Internal error whilst attempting to convert decrypted filename memory to scatterlist; rc = [%d]. block_aligned_filename_size = [%zd] <6>%s: Filename encryption only supports password tokens <3>%s: Error setting key for crypto context; rc = [%d]. s->auth_tok->token.password.session_key_encryption_key = [0x%p]; mount_crypt_stat->global_default_fn_cipher_key_bytes = [%zd] <3>%s: Error attempting to decrypt filename; rc = [%d] <4>%s: Invalid tag 70 packet; could not find valid separator between random characters and the filename <4>%s: Filename size is [%zd], which is invalid <4>%s: Require [%zd] bytes to write; only [%zd] available <3>%s: Out of kernel memory whilst attempting to kzalloc [%zd] bytes <3>%s: Error generating tag 70 packet header; cannot generate packet length; rc = [%d] <4>%s: Unable to generate code for cipher [%s] with key bytes [%zd] md5<3>%s: Error attempting to allocate hash crypto context; rc = [%d] <3>%s: Error initializing crypto hash; rc = [%d] <3>%s: Error updating crypto hash; rc = [%d] <3>%s: Error finalizing crypto hash; rc = [%d] <3>%s: Internal error whilst attempting to convert filename memory to scatterlist; rc = [%d]. block_aligned_filename_size = [%zd] <3>%s: Error attempting to encrypt filename; rc = [%d] <3>Max packet size too large <3>Unable to allocate memory <4>Error parsing packet length; rc = [%d] <4>Invalid body size ([%td]) <3>Packet size exceeds max <4>Tag 3 packet contains key larger than ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES <4>Unknown version number [%d] <4>Only S2K ID 3 is currently supported <3>%s: Unsupported hash algorithm: [%d] <3>%s: Error parsing tag 3 packet <3>Maximum packet size too small <4>Invalid tag 11 packet format <3>Literal data section in tag 11 packet exceeds expected size <4>Unrecognizable packet <3>%s: No valid (ecryptfs-specific) literal packet containing authentication token signature found after tag 3 packet <3>%s: Expected signature of size [%d]; read size [%zd] <3>Invalid max packet size; must be >=12 <4>Packet size exceeds max <4>Tag 1 packet contains key larger than ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES<3>%s: Error parsing tag 1 packet <4>%s: Invalid packet set (Tag 11 not allowed by itself) <7>%s: No packet at offset [%zd] of the file header; hex value of character is [0x%.2x] <3>The lower file appears to be a non-encrypted eCryptfs file; this is not supported in this version of the eCryptfs kernel module <7>%s: Considering cadidate auth tok: <3>Unrecognized candidate auth tok type: [%d] <3>%s: Could not find a usable authentication token <4>%s: Error decrypting the session key for authentication token with sig [%.*s]; rc = [%d]. Removing auth tok candidate from the list and searching for the next match. /build/linux-5VIh7j/linux-3.2.78/fs/ecryptfs/keystore.c<3>%s: Error computing the root IV <3>%s: Error initializing crypto context for cipher [%s]; rc = [%d] <4>Unable to retrieve auth tok with sig = [%s] <4>%s: Missing auth tok <4>%s: Invalid auth tok <4>%s: Error writing tag 3 packet <3>Packet length larger than maximum allowable; need up to [%td] bytes, but there are only [%td] available <3>Error generating tag 11 packet header; cannot generate packet length. rc = [%d] <3>%s: Error writing auth tok signature packet <3>%s: Error generating tag 66 packet header; cannot generate packet length <3>%s: Error generating tag 66 packet <3>%s: Failed to receive tag 67 packet from the user space daemon <3>%s: message_len is [%zd]; minimum acceptable message length is [%d] <3>%s: Type should be ECRYPTFS_TAG_67 <3>%s: Status indicator has non zero value [%d] <3>%s: message_len [%zd]; max len is [%zd] <3>%s: Encrypted key_size [%zd] larger than the maximum key size [%d] <3>%s: Error parsing tag 67 packet <3>Failed to encrypt session key via a key module; rc = [%d] <7>%s: Encrypted key: <3>%s: Error generating tag 1 packet header; cannot generate packet length <4>%s: Error writing tag 1 packet <4>%s: Unsupported authentication token type <3>%s: Error writing boundary byte <3>Error allocating from ecryptfs_key_sig_cache <3>Error allocating from ecryptfs_global_auth_tok_cache <3>%s: Failed to allocate [%zd] bytes of GFP_KERNEL memory &(*daemon)->mux<4>%s: Attempt to destroy daemon with pid [0x%p], but it is in the midst of a read or a poll <4>%s: Warning: dropping message that is in the out queue of a dying daemon <3>Received request from user [%d] to unregister unrecognized daemon [0x%p] <3>%s: Attempt to reference context buffer at index [%d]; maximum allowable is [%d] <3>%s: Receiving process is a zombie. Dropping message. <4>%s: User [%d] received a message response from process [0x%p] but does not have a registered daemon <4>%s: Received message from user [%d]; expected message from user [%d] <4>%s: Received message from user_ns [0x%p]; expected message from user_ns [0x%p] <3>%s: User [%d] sent a message response from an unrecognized process [0x%p] <4>%s: Desired context element is not pending a response <4>%s: Invalid message sequence; expected [%d]; received [%d] <3>%s: User [%d] does not have a daemon registered <4>%s: The eCryptfs free context list is empty. It may be helpful to specify the ecryptfs_message_buf_len parameter to be greater than the current value of [%d] <4>%s: Could not claim a free context element <3>%s: Error attempting to send message to userspace daemon; rc = [%d] <3>%s: Error whilst attempting to destroy daemon; rc = [%d]. Dazed and confused, but trying to continue. <4>%s: Specified number of users is too large, defaulting to [%d] users &ecryptfs_daemon_hash_mux<3>%s: Failed to allocate memory &ecryptfs_msg_ctx_lists_mux&ecryptfs_msg_ctx_arr[i].mux<4>%s: Attempt to poll on zombified daemon /build/linux-5VIh7j/linux-3.2.78/fs/ecryptfs/miscdev.c<2>%s: Fatal error whilst attempting to shut down daemon; rc = [%d]. Please report this bug. <3>%s: Error attempting to increment module use count; rc = [%d] <3>%s: Error attempting to spawn daemon; rc = [%d] <3>%s: pid [0x%p] has registered with euid [%d], but pid [0x%p] has attempted to open the handle instead <3>%s: Miscellaneous device handle may only be opened once per daemon; pid [0x%p] already has this handle open <4>%s: Acceptable packet size range is [%d-%lu], but amount of data written is [%zu].<4>%s: Error while inspecting packet size <4>%s: Error parsing packet length; rc = [%d] <4>%s: Invalid packet size [%zu] <3>%s: memdup_user returned error [%ld] <4>%s: Minimum acceptable packet size is [%zd], but amount of data written is only [%zd]. Discarding response packet. <4>%s: (sizeof(*msg) + msg->data_len) = [%zd]; data_size = [%zd]. Invalid packet. <3>Error processing response message; rc = [%d] <4>%s: Failed to deliver miscdev response to requesting operation; rc = [%d] <4>%s: Dropping miscdev message of unrecognized type [%d] <4>%s: Attempt to read from zombified daemon <4>%s: Error writing packet length; rc = [%d] <4>%s: Only given user buffer of size [%zd], but we need [%zd] to read the pending message <3>%s: Out of memory whilst attempting to kmalloc(%zd, GFP_KERNEL) <3>%s: Failed to register miscellaneous device for communications with userspace daemons; rc = [%d] ecryptfs&ecryptfs_kthread_ctl.muxecryptfs-kthread<3>%s: Failed to create kernel thread; rc = [%d] &req->mux<3>%s: We are in the middle of shutting down; aborting privileged request to open lower file /build/linux-5VIh7j/linux-3.2.78/fs/ecryptfs/kthread.c<4>%s: Privileged open request dropped <7>0x%.2x.0x%.2x. <7>%s: Auth tok at mem loc [%p]: <7>%s: * private key type <7>%s: * passphrase type <7>%s: * salt = [%s] <7>%s: * persistent <7>%s: * signature = [%s] <7>%s: * session_key.flags = [0x%x] <7>%s: * Userspace decrypt request set <7>%s: * Userspace encrypt request set <7>%s: * Contains decrypted key <7>%s: * session_key.decrypted_key_size = [0x%x] <7>%s: * Decrypted session key dump: <7>%s: * Contains encrypted key <7>%s: * session_key.encrypted_key_size = [0x%x] <7>%s: * Encrypted session key dump: tZ?\<01 <.+license=GPLdescription=eCryptfsauthor=Michael A. Halcrow parm=ecryptfs_number_of_users:An estimate of the number of concurrent users of eCryptfsparmtype=ecryptfs_number_of_users:uintparm=ecryptfs_message_wait_timeout:Maximum number of seconds that an operation will sleep while waiting for a message response from userspaceparmtype=ecryptfs_message_wait_timeout:longparm=ecryptfs_message_buf_len:Number of message buffer elementsparmtype=ecryptfs_message_buf_len:uintparm=ecryptfs_verbosity:Initial verbosity level (0 or 1; defaults to 0, which is Quiet)parmtype=ecryptfs_verbosity:intdepends=intree=Yvermagic=3.2.0-4-amd64 SMP mod_unload modversions Vmodule_layoutRvfs_createuҜrequest_keyakobject_putalloc_pages_currentnkmem_cache_destroy\4Z__kmalloc?1 fsstack_copy_inode_size×sg_init_table7kref_putTset_anon_superrput_pidOLkernel_stackmake_bad_inode]sgeneric_file_llseek__mark_inode_dirty0mntgetiezvfs_readdirjinode_permissiono>param_ops_int3iget5_lockedkill_anon_superkey_type_userq(ndget_parent'|autoremove_wake_function7-vfs_linkyget_random_bytesFMmalloc_sizesz__lock_page*?filemap_write_and_waittouch_atimeHdeactivate_locked_super generic_file_aio_readxW,dputا!seq_printf)Dmatch_tokenц$dentry_openLvfs_mknod end_writeback generic_drop_inode>mutex_unlockl߅strsepwJvfs_fsyncgeneric_read_dirxigrabO_vfs_symlinkSqsprintfIXKgeneric_file_aio_write0?sysfs_remove_group kthread_create_on_node truncate_setsizemutex_trylockZ%strcmpCSkobject_create_and_addfAvfs_rmdir4Uŧunlock_renameʽkey_validatec__init_waitqueue_head?q_copy_to_userFvfs_read3fmisc_register`kern_pathydefault_llseek!current_tasky__mutex_initI'printkB,kthread_stop{d_rehashsysfs_create_group__tracepoint_module_get/memcmpTsgetɉd_alloc_root nǡ_cond_resched~strncpy_ȫstrncmpJvprintk]kmem_cache_freehwait_on_sync_kiocbx8lock_renameR0warn_slowpath_null__put_user_1Xmutex_lockyanoop_llseekj}Jqunlock_pageJL;up_writeudown_write3fput(=key_put\ inode_init_onceEmntput悊atomic_dec_and_mutex_lock_module_put{kmem_cache_allocZ__free_pages\__put_user_4'v$generic_file_mmapJ:fs_kobj__stack_chk_failQschedule5refrigeratorc2.do_sync_read?unlock_new_inodebdi_setup_and_register d_drop,*inode_newsize_oky,crypto_destroy_tfm avfs_mkdirH^wake_up_process[FWinode_change_okș:path_putg+zkmem_cache_alloc_trace+_raw_spin_lockG)__phys_addr ~Fvfs_unlinkn4Jkmem_cache_createj<register_filesystemP fsstack_copy_attr_allCfree_pagesA!__wake_upo_kthread_should_stopE$sg_init_onehiput\ schedule_timeout_interruptible(_ read_cache_page zkfree\qYdo_sync_write2Pcall_rcu_sched\\prepare_to_waitulparam_ops_longPNfree_user_ns\w kref_get<put_pageۗDzkzfree|ffinish_waitYcYbdi_destroy!unregister_filesystem6 dinit_special_inode/t simple_strtolmemdup_user_ rPsnprintfh generic_file_splice_readįblookup_one_lenT 'vfs_rename˙vfs_getattrJDcrypto_alloc_base!q'grab_cache_page_write_begin3/~_copy_from_userȇparam_ops_uint֬notify_change&Svfs_setxattrьL6misc_deregister5.d_instantiate"a=vfs_writeñgeneric_fillattrstrcpycZtruncate_inode_pages 8@(8hh$aesblowfishdes3_edecast5twofish cast6 aesaes ecryptfsGCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3GCC: (Debian 4.6.3-14) 4.6.3ecryptfs.ko+ .symtab.strtab.shstrtab.note.gnu.build-id.rela.text.rela.text.unlikely.rela.init.text.rela.exit.text.rela.rodata.rodata.str1.1.rela__bug_table.rela.smp_locks.modinfo.rela__param__versions.rela.data.rela.gnu.linkonce.this_module.bss.comment.note.GNU-stack.gnu_debuglink@$3dО.؛H>4J9 JR~&MJ b;]XWr@m0X  z2R b0  $8e hf @'06(0g`9Hj0;x0;T=T=d="F1 wC$  ::*$:LUPda uO(   0L1} ,2EJZ(f q'ip   h q = S  * 7 Is ]3|r   ~I#B!</ @>KN ] lW ~ Cd9!  !)  .(: A P _@p  ;  !0QX'5 V {^,  @@<'a@  `XI `  & 3$!C%Y0&'nW&q&\0&0 ''' '$.'K y'9 0 'H$)Z ` i'*|.*j*   $d.K    3#   4 f4G k4Z p4Sq 4| ?5a   5'   6< 7'  6  9N  ]  l :%  @   `  p p p p            @ ,  ` >  H 0e  t    0   $ :JD  p   P  p p   %    %, 1 7 4W`  )o 9Y  p Y Z      0 !\   - +aO  @^  "m  `| eI    P      )  !  p P " 01 '=8@[p      02G pV Peq}' +  ^- 0< PKSa pp H   H K Pppp `.x:xF ~ ~OU dp u@'y 3 [`h0 ?v6DTaoQ0P J8,;THb={ԅu7Db7cLN%1GNWF?w U;2>"AFRj=KQ&AlAL|<0 >Rdo{2U e! $49?RDl 0s,U !C:K@ ^,<wf#Gh 29Xh~KrA;iFb +7܂PVUM{G-# N/p.>FNIIc$Q{ IQ&4;HWZgv `>m Q(6OerG92IQ(k83}!/1BLc~ _+  ' ^B Y s    ,  k* 7D!N '!8!C:S!yt!}!!!!!!!"E[|"Pd2" @D"4\" j" `x""""""""="#w#&#,q{@#O#X#R,}###d##B ##$$&$1$ Pecryptfs_d_releaseecryptfs_d_revalidateecryptfs_fasyncecryptfs_read_update_atimeecryptfs_fsyncecryptfs_releaseecryptfs_flushecryptfs_open__func__.28373ecryptfs_compat_ioctlecryptfs_unlocked_ioctlecryptfs_readdirecryptfs_filldir__func__.28343fsstack_copy_attr_timesecryptfs_inode_testupper_size_to_lower_sizedgetecryptfs_renamelock_parentunlock_direcryptfs_removexattrecryptfs_listxattrecryptfs_rmdirecryptfs_put_linkecryptfs_do_unlinkecryptfs_unlinkecryptfs_inode_setecryptfs_inode_newsize_okecryptfs_follow_linkecryptfs_readlink_lowerecryptfs_readlinkecryptfs_permission__ecryptfs_get_inodeecryptfs_lookup__func__.25396__func__.25383__func__.25372truncate_upper.isra.14ecryptfs_setattrecryptfs_interpose.isra.16ecryptfs_mknodecryptfs_mkdirecryptfs_symlinkecryptfs_link__func__.25354ecryptfs_create__func__.25345__func__.25364ecryptfs_getxattr.LC5ecryptfs_kill_block_superdo_sysfs_unregistrationecryptfs_kobjattr_groupversion_showecryptfs_free_kmem_cachesecryptfs_cache_infosinode_info_init_onceecryptfs_mount__key.30236tokens__func__.30283__func__.30306ecryptfs_fs_type__warned.30193ecryptfs_init__func__.30343__func__.30368ecryptfs_exit__mod_license896__mod_description894__mod_author893__mod_ecryptfs_number_of_users84__mod_ecryptfs_number_of_userstype82__param_ecryptfs_number_of_users__param_str_ecryptfs_number_of_users__mod_ecryptfs_message_wait_timeout73__mod_ecryptfs_message_wait_timeouttype69__param_ecryptfs_message_wait_timeout__param_str_ecryptfs_message_wait_timeout__mod_ecryptfs_message_buf_len59__mod_ecryptfs_message_buf_lentype57__param_ecryptfs_message_buf_len__param_str_ecryptfs_message_buf_len__mod_ecryptfs_verbosity50__mod_ecryptfs_verbositytype47__param_ecryptfs_verbosity__param_str_ecryptfs_verbosityattributesversion_attrecryptfs_statfsecryptfs_show_optionsecryptfs_evict_inodeecryptfs_i_callbackecryptfs_alloc_inode__key.24002ecryptfs_destroy_inode.LC10SetPageUptodateClearPageUptodateecryptfs_bmapecryptfs_writepage__func__.25213ecryptfs_copy_up_encrypted_with_header__func__.25231ecryptfs_readpage__func__.25243put_unaligned_be64zero_user_segments.constprop.4ecryptfs_write_begin__func__.25266__func__.25274ecryptfs_write_end__func__.25304.LC11__func__.24137ecryptfs_decode_from_filenamefilename_rev_mapget_unaligned_be32put_unaligned_be32ecryptfs_copy_filenameecryptfs_crypto_api_algify_cipher_nameecryptfs_validate_marker__func__.25545ecryptfs_calculate_md5__func__.25308ecryptfs_copy_mount_wide_flags_to_inode_flags.isra.5sg_set_page__func__.25328ecryptfs_decrypt_extent__func__.25429__func__.25455ecryptfs_encrypt_extent__func__.25403__func__.25387__key.25333__key.25334__key.25335__key.25336__func__.25414__func__.25440__func__.25484__func__.25502__func__.25507__func__.25539ecryptfs_flag_mapCSWTCH.95ecryptfs_cipher_code_str_map__func__.25608__func__.25663__func__.25633__func__.25640ecryptfs_read_headers_virt__func__.25694__func__.25718__key.25754key_tfm_list__key.25777__func__.25849__func__.25728__func__.25865.LC8.LC20decrypt_passphrase_encrypted_session_key__func__.30440ecryptfs_verify_auth_tok_from_key__func__.30232ecryptfs_find_global_auth_tok_for_sigprocess_request_key_err__func__.30136__func__.30156__func__.30164write_tag_3_packet__func__.30562decrypt_pki_encrypted_session_key__func__.30176__func__.30361__func__.30192ecryptfs_find_auth_tok_for_sig__func__.30333__func__.30297__func__.30411__func__.30464__func__.30146__func__.30585__func__.30210__func__.30504__func__.30224__func__.30525.LC105hash_64ecryptfs_msg_ctx_free_listecryptfs_daemon_hashecryptfs_hash_bits__func__.22816__key.22818__key.22819__func__.22826__func__.22859ecryptfs_msg_ctx_arr__func__.22884ecryptfs_msg_ctx_lists_mux__func__.22782ecryptfs_msg_ctx_alloc_listecryptfs_msg_counter__func__.22932__func__.22904__key.22905__key.22913__key.22914ecryptfs_miscdev_poll__func__.24511ecryptfs_miscdev_releaseecryptfs_num_miscdev_opens__func__.24536ecryptfs_miscdev_open__func__.24521ecryptfs_miscdev_write__func__.24624__func__.24603ecryptfs_miscdev_read__func__.24563__func__.24546ecryptfs_miscdev__func__.24638ecryptfs_miscdev_fops.LC1test_tsk_thread_flagecryptfs_threadfnecryptfs_kthread_ctl__key.22923__key.22924ecryptfs_kthread__func__.22927__key.22949__key.22950__func__.22951__func__.22597__module_depends____versions__mod_intree17__mod_vermagic5ecryptfs_write_packet_lengthtruncate_inode_pagesecryptfs_header_cachestrcpyecryptfs_xattr_cachegeneric_fillattrvfs_writeecryptfs_encrypt_paged_instantiatemisc_deregistervfs_setxattrnotify_changeecryptfs_get_tfm_and_mutex_for_cipher_nameparam_ops_uintecryptfs_writegrab_cache_page_write_begin_copy_from_usercrypto_alloc_basevfs_getattrvfs_renameecryptfs_init_ecryptfs_miscdevlookup_one_lengeneric_file_splice_read__this_moduleecryptfs_init_crypt_statsnprintfecryptfs_process_quitmemdup_usersimple_strtolecryptfs_derive_ivinit_special_inodeunregister_filesystemecryptfs_from_hexecryptfs_read_metadatabdi_destroyfinish_waitecryptfs_init_kthreadkzfreeput_pageecryptfs_write_crypt_stat_flagskref_getfree_user_nsecryptfs_setxattrcleanup_moduleparam_ops_longprepare_to_waitcall_rcu_scheddo_sync_writekfreeecryptfs_destroy_mount_crypt_statread_cache_pageschedule_timeout_interruptibleiputsg_init_oneecryptfs_open_req_cacheecryptfs_destroy_crypt_statecryptfs_read_xattr_regionecryptfs_decrypt_pageecryptfs_read_and_validate_xattr_regionecryptfs_dump_hexkthread_should_stop__wake_upfree_pagesfsstack_copy_attr_allecryptfs_sopsregister_filesystemkmem_cache_createvfs_unlink__phys_addr_raw_spin_lockkmem_cache_alloc_tracepath_putinode_change_okecryptfs_read_lowerinit_moduleecryptfs_main_iopsecryptfs_parse_tag_70_packetwake_up_processvfs_mkdirecryptfs_init_cryptoecryptfs_privileged_openecryptfs_new_file_contextecryptfs_write_lower_page_segmentcrypto_destroy_tfmecryptfs_find_daemon_by_euidinode_newsize_okd_dropbdi_setup_and_registerunlock_new_inodedo_sync_readrefrigeratorscheduleecryptfs_compute_root_iv__stack_chk_failkey_tfm_list_mutexecryptfs_get_locked_pagefs_kobjgeneric_file_mmap__put_user_4__free_pageskmem_cache_allocecryptfs_destroy_kthreadecryptfs_cipher_code_to_stringatomic_dec_and_mutex_lockmodule_putecryptfs_daemon_hash_muxmntputecryptfs_global_auth_tok_cacheinode_init_onceecryptfs_read_and_validate_header_regionecryptfs_truncateecryptfs_release_messagingkey_putecryptfs_getattr_linkfputdown_writeecryptfs_code_for_cipher_stringup_writeecryptfs_send_miscdevunlock_pageecryptfs_msg_ctx_alloc_to_freeecryptfs_decode_and_decrypt_filenameecryptfs_write_metadataecryptfs_get_lower_filenoop_llseekecryptfs_destroy_cryptoecryptfs_write_lowermutex_lock__put_user_1lock_renamewarn_slowpath_nullwait_on_sync_kiocbkmem_cache_freevprintkstrncmpecryptfs_i_size_initecryptfs_put_lower_filestrncpy_cond_reschedecryptfs_symlink_iopsd_alloc_rootecryptfs_process_responsesgetmemcmp__tracepoint_module_getsysfs_create_groupd_rehashkthread_stopecryptfs_initialize_fileprintk__mutex_init__ecryptfs_printkcurrent_taskdefault_llseekecryptfs_destroy_ecryptfs_miscdevecryptfs_main_fopsecryptfs_key_tfm_cachekern_pathvirt_to_scatterlistecryptfs_add_keysigmisc_registervfs_readecryptfs_encode_for_filename_copy_to_userecryptfs_file_info_cache__init_waitqueue_headkey_validateecryptfs_auth_tok_list_item_cacheunlock_renamevfs_rmdirkobject_create_and_addstrcmpmutex_trylocktruncate_setsizeecryptfs_write_header_metadatakthread_create_on_nodesysfs_remove_groupgeneric_file_aio_writesprintfecryptfs_inode_info_cacheecryptfs_dump_auth_tokecryptfs_verbosityvfs_symlinkigrabecryptfs_read_lower_page_segmentgeneric_read_direcryptfs_key_sig_cachevfs_fsyncstrsepmutex_unlockgeneric_drop_inodeend_writebackecryptfs_get_inodevfs_mknodecryptfs_sb_info_cacheecryptfs_dentry_info_cachedentry_openecryptfs_getattrmatch_tokenecryptfs_add_global_auth_tokseq_printfdputgeneric_file_aio_readdeactivate_locked_supertouch_atimeecryptfs_message_buf_lenecryptfs_wait_for_responsefilemap_write_and_waitecryptfs_key_record_cache__lock_pageecryptfs_number_of_usersecryptfs_spawn_daemonecryptfs_write_inode_size_to_metadatamalloc_sizesecryptfs_write_tag_70_packetecryptfs_to_hexecryptfs_add_new_key_tfmget_random_bytesecryptfs_set_default_sizesecryptfs_generate_key_packet_setvfs_linkautoremove_wake_functionecryptfs_send_messagedget_parentkey_type_userkill_anon_superiget5_lockedecryptfs_message_wait_timeoutecryptfs_parse_packet_lengthecryptfs_tfm_existsecryptfs_dir_iopsecryptfs_init_messagingecryptfs_dopsecryptfs_aopsparam_ops_intinode_permissionvfs_readdirmntget__mark_inode_dirtygeneric_file_llseekmake_bad_inodeecryptfs_exorcise_daemonkernel_stackecryptfs_getxattr_lowerput_pidecryptfs_parse_packet_setset_anon_superkref_putecryptfs_encrypt_and_encode_filenamesg_init_tablefsstack_copy_inode_sizeecryptfs_keyring_auth_tok_for_sig__kmallocecryptfs_init_crypt_ctxkmem_cache_destroyalloc_pages_currentkobject_putrequest_keyvfs_createecryptfs_dir_fops#q.F4"@ftyk    .>  E ,L[fy   N       -D(    sFFY m 0 N /7]L"4b~FFFX9 D  ]  J  @ ]R  F      R% %2   M  7M [ Mq   7 , A 7  F  F Ug q n }y;;  %8z     .Ycks z xq]     & -5LTt_oA_]7@[7 M 2s(+ 2<[fO$F\ 7_3o]U .]7(]6 @I Rg ltX @  @  . 5  <Q a h JrJ  _;%-_I# 7 \{ `m{8)  5Hkr (y   ` 0U# V #D K Rr w   0  {  4 # e( 2 D b t  _  e  e      !|/! 6! ;!_! _g!^! G! !! ! h!! ! ! " "" ,"""";""k9#LQ#NX# c# k#y#8### # % ## #$$ 7 $#$@$ Y$Wn$ k u$$$n$$ys$?%Q% :_% Pi%%% a%% u%% %% %% %&  && !&>&F&h&t&&k&& 0&  &&>& W&S&;m&&56'G'  N' \U'o'~' K(?j(.(( 0 ( ((( 0 ( (X)) ` ) ))) ))@) ` ) )* ` * **~3* * *+#+  *+ $X+  _+ f+z++  + b+@+  + +,u$,  +, 2,_,~g,-,9,, - >-$- .-k=- sI-]-s- - -- -- ---M(.2.7?.  F. M.r. F. ..Y././ 5/ \000 0 E1fe1  l1 s12~2'2Y12->2  E2 FL222 o23 &3X33P3  45&5 05 p5  w5 |55  5 555<5 266  6 6&6K6  R6 uv6  }6 6  6 66>7 BM77#77  7 G88B)8 XE8 K8U8  \8 ]c8r8B8  8 m888  8 88B8d^9$q9  x9 999:!:  (: 4:<:J:  Q: 5V:z::  : T::  : x::dA;$T; @ [; b;;;;; ` <  <<B)<W< ` `< k<s<< @ < Q<< ` < 2<<<d#= p*= M=[= pb= g=u= p|= == p= ==Z=Z=>M>>w>r>>??K??  ? #?@e@  l@ Xw@@@  @ @AjXAgA  nA #uAAAPA  B B0B  7B XBBBjB  B BB  B BCC U?CMC7nC  uC Y|CCD  D DJD  QD XDDdDD D IEZErEE EEEE :E FFcF(F  /F 6FEFBMF_F @ fF mFF d F ` F FF  G 0GG @;G @NG 0SG qG  xG }GG $GG  H D Hz|{w{ { *>{O{ M>_{{{ >{{ {  ?D|'|||w|{|| p| ,|}b}p} pw} =?~}}|}w} P~ ?~!~ P(~ l-/~F~Q~ PX~ ?_~~ ~ ?~ ~ <@~~ ~ c@~~   2.= D @Kb i @p P A77 +A 0 iAB M>!Yg 0n Ax  A |w % A,c j Bw~ЁՁk ABDrIkX rB_e 76E4M ƒ Bǃ/ B  $. FOY „ BɄф UC/ 7BT 0Ņ, p[ C(/ p8_w ~ C pن  DD p'[1 p6L S }DZz  D  .Eч ؇ E߇  E   F;N U BZzT p ڈ[  HF " *1 08 |F?Vj  ‰ɉ Ή}   ! G(3 : NGAH pMs:  ي  '07F7MX^gl7s x p p Gċҋދ7 p  p0H[] phv} p  H0 p9 [s[ˍ؍ ߍ !I o p p >FP<Yiz M   IĎ ێ[  $ I+>L j Iq }  _JʏՏ ڏo p J 0Q JXbu 0 %K 0Ő PKϐ 0 K"+ 02 K;u 0| K ̑ Pӑ ALڑ L 0 L+ 02 M9A7X pk [ p͒ p p p NM$4 pM pVy Ǔ4b* Jdq px |M p MÔ͔ؔi"I]7•ؕ' . N3SٖD  ( L@P H[C  X4@ HCb X * +@/ H6CD Ra^ (ciw (|ޘL )D2= DDK HX (]j (rxDD Hə (Ιՙlڙ XL-Z}=k x O xٚ̚ (ޚ (   OL& H- (4L@S XXDz  4b*ƛݛ  O =D@] Odu O O O˜ Ҝ O  P 0P/= D KPN^ e bPl  xP  Pȝ ϝ P֝  P   Q   .Q$- 4 aQ9?SBb i Qnz  Q  QBŞd .  ;  % 0, (3 88IC  NU (\ c  ov  }  g _ =   `    " )  07D  KRVa < hmvu t l & H+   p e plt0 P7 H?HO V IH] pbi pnt P cH p p   P' cH,= D HK PW ^dw ~ H $ ).;vN T]l s KNz p ( N p X N @ HH HTl  ` N  v l%, 1&7: `6 haP8X` aPs I1W '@Ps px<h B I1W' s  ( xIx1W'`hpx=dmv,5X ( 8, H6 XI h_ xt       q&&0&$%`.'h$)*d. 'S+T9 &i,z$ 7(0;4<?@HNALTCX`DdlNpxP|x@ϛ#'' ,1nZ   @(38@`HX`hx ( @H `h. I ^  p    ( @rH `h = _d2 NHQ82