ELF>p@@$#GNUX(6?UD8UHSHHHHt?H~Ht*HH>HtLJHH=H[ffff.UHH0H]LeLmLuHIHHxHHHtcH8t]LvL.H~HHHLsL+I|$HtHP1҉EEH]LeLmLufސUHHH8HG HtH@hHt @1fff.UHHHtH0Hu @HF HtH@@HtHPUHH H]LeLmLg H=At1ExID$HHpH8IcH]LeLmHAUHH H]LeLmIAI$H0HF Ht6HHt*DLeH]Lmf1fff.UHHHpHH8ff.UHH=H1UHH@H]LeLmLuL}L~HIIHHE@t F8CH=ЀHIzLLLHXH+IHIG%=@L%=t LuHLE1HK@LChHHH1DH]LeLmLuL}@1HHHE@LE1묐HH1 H1HLE1LO@LAuuHXHHAH1AH1ALIH=IW8HH1fff.UHH@H]LeLmHHHUHL HG@ID$@HGLLhHuHHEHMEEIT$@HS@x M؅u-IT$HRHJpIMpHRxIUxH]LeLmfDU܅uH]LeLmUHHPH]LeLmLuL}GHGIHHuH}IMLLcHDMADMuGMLUHuH;HCH}AExCDH]LeLmLuL}ÉLHH1ːUH1H;PfUHSHHHHǸHH[UHH H]LeLmHAIHXH{HHtI~1LLAE1LH(D[A\A]A^A_I E1LHLAtDHH1fDHH1MMHH1MAbHH1ALH1A3HH1AHH1,fff.UHAVAUATSI1IA@It,E8,$uHcLHIHHuA>t 1[A\A]A^1AHHffffff.UHHpH]LeLmLuL}HIAHCHLHUELuLHEHuDLHEHtxH@H}HEDLH}H@HELH}H@ujLLeH]LmLuL}fDHH=HEwZHCH]HH1떉HH1zHH1^ÉHH1@fDUHH@H]LeLmeH%(HE1HGHHH?HO LeHWpHLAu7HSHLHUeH3%(Du_H]LeLm@HH1HSH1 @HH1A  fffff.UHAWAVAUATSH(HLgLM$LIVHHULI$LHEA$ADŽ$aesIDŽ$ADŽ$HU A$I$HHUI$PHHEIF HHEM~HUIL9uiMIL9t[AuIw(LHUHUtӉH1H}H}H1@H}M~XH}LH}HcLHAƄIvHI$HI$A$LDE:LtHUHH1H([A\A]A^A_HH1I$HfUHHpH]LeLmLuL}DeH%(HE1IHIE LLeHSLLLH{1LHHHGDEHKLmLHLAuQHSLLD EHUeH3%(Du7H]LeLmLuL}f.HH1HH1HsLJHH1LHsLHH1HsL6UHAWAVAUATSHeH%(HE1HHI1fIIHvHG H}HHH@tHpMl$AHpHPL DžxD|HHpAHPM$HUL D\EHPHLHUAʼnXID$@HEI|$@IT$ It$pHGM1DHHHEHH}DHpH@ LuAD"D-Ej1HUeH3%('HĘ[A\A]A^A_ÐHH1H@HH1H@11HH1HHHHIHm۶m۶mILHHID$I I<>HDHH1LIV HHAHH11HHIt$H}1HHHHm۶m۶mIHHHH HHHIT$H<  fffff.UHAWAVAUATSHHGIL I$HEA$P1HIHHm۶m۶mI$II1HH1H N<8HH1<DHuHLLI$1ҸHHH9vHHLHIu HHLI$yHH1MM1LMMH[A\A]A^A_HH1ӉHH1MM UHAWAVAUATSHeH%(HE1H@I1fL}HHvLIID$ HHHHA=HCHpH0HPAHpH0@HPH @L ቅ8H1HALIT$ ALHH1FHS HH1Hs H{p  f.fffff.UHAWAVAUATSH(HGIHHHEj1HHE6HHEHm۶m۶mE1HHHH HHU1HHE1E1A @1LIHMI9HuH}LLIuxH1LHuHHIF ITHHAyHH1H}1H(D[A\A]A^A_E1։HH1MMAHHA f.UHAWAVAUATSHAHAH׉IEEE1H߁MtEIcHHH ITHHH2H)HHzB H H )D92Mt IcHBD* A)AE~*E9~:HHnfDMt IcHFd( AHD[A\A]A^A_E1EDOUHAVAUATSHu[A\A]A^LoLLsIL9MftSI%DH=LL9ID$t/ML`I~Hk8I~HtAu@LH߹1H[A\A]A^f.UHAWAVAUATSHIA~NL}fEEI1D1LHATUADEA$IA9H[A\A]A^A_UHAVAUATSHIIIt311fD<A1HHcI|=HcL9r[A\A]A^ÐUHH H$Ld$Ll$Lt$HH=IЀAHItZI$IF(ID$LcE.AF8LIF0HSHsI~HC8L1H$Ld$Ll$Lt$H1ffffff.UHATSHH=IHt.I$HHHPIT$HPH1[A\HUHHv.Hw5H@@@wH@H1@71HfH1HHÐUHHHHpHp A?HI>IAD?`H HI>IT$IHI}FTHSHsI<>AHsHCHHSH HC HH9UIuHHUH}IuI46ƃIEHPIUATH IEHHE3HAHHHs8HUHUH}AH{8HCPLI}HEHs HAHC IEH{ HHC@nLspHs HLA*HHǃH{HH@HHUHu~AHsHf~HEHHƈHPHHGAEHHK LHUH}H@ AHK@HC09H{ H{ DH9HPv HHC0<uH9HH)HC0HGI?H=HHUHHOHs@Hs0HIHEHIH{@H{8EtHUIEIHHH8D[A\A]A^A_H{ 1DHH1HUHKHHHLBHH1bHH1ABHUHH1"HK HH1HS HHAHK HH1HuȉH1HH1HUHLHH1AxHH1\FHH1A4HUȹ HH1A HH1E1IHHAHHHH1AHH1Ajfffff.UHAWAVAUATSHHHuH5H}HUHMLELMHHǀHEHHs@HLmHUH}IqLA4H{@H1H@Pp$HC8Hs HMHHHKHHtHNH)HK8HMHKHQ HSH}HEHH9-H{ЀHHCHHUFHC(HSHsH}H HAOH{H{(H{(LuH}IƒLHC(LHMHqHHS(HMH{PHHS(HuLAHsPf~gHHEHHƈǃHH=H~LH@LAHHSPLHuH@AHLLLH@A\HS8HC0HL1Le3HHSH:uBHC0HS8HHC0HJH9HHSH HC0HƒHuLLHLH@HLLH@HLLH@sIIIGIFHC0/HH{HHUHuLkXHsH{HLAyH}H{(LsxHsLAHHǃH@HHHMHsPHQHHGHƈA!HHKLLH}H@AHCHC(HC(HUHHMH)HHH{HH{@HHHD[A\A]A^A_HMHADHH1ADHH1ADHH1bHH1AZHKHH1"HEHKPDHHL@HH1HH1HSHHAHKHH1HH1E1HH1VHH1AELHH1&HELHHAHHH1AĉHH1LH1UHAWAVAUATSHHMHpILEHHHHHHhHH0H=HIǹM$I$H`I9|HpIT$pID$PI_HxIwHHH8H@HX@1LCHIUH}HhHEHX CffHuH|HxH6HEHEHuHIt$ Ht#11DLHH H9uHD[ EutC It$ HHHEI|$ WHHIZHxHUBGHEH|ITH H]HKHXI<HJIt$ HUHH]WAHH8IT$ I<It$ HH:11ALpHHH9uHHATHsHUALH}HuH}_HCLGA@H@HUH L(L(HEIWHH4H9HiHXI4((H}(L(DE~%HH1IwHXIGHUHpH9mHpH]Hp H}HU;HH}H<;HH1((HH1(HE(H=L((t HEHH0((Hĸ[A\A]A^A_HEHEHxHPHUHH D H HEHXH<IWIGHEHUH)EHEHMmL;`H}H]Hp1HDHH1((HH1((L((H1((vHUHpLMHuLMH:H\mHuHH]HHUHEHQHpHUH{HEHEHEI_CONSOLEbDHPLtD HHxHUHH HUH)EHEHxS HXHsHH1((HH1((HH1((VHH1"HH1HH1((HH1Hp(H1W11HH1HHH1HH14H1((H1H1HH1(HE(HH1/HH1 HHHH1H1((KUHAWAVAUATSHxE1H]HWPIeH%(HE1HuH]H]HpLeL)H}MA$<:<<L1HHHEH9nH9Lp^MfPAFRMf.Iw8H}LHuHIF@H} H=ЀHII|$HUHuYHuH ;HUHDH9EgA|HB>I4IHhHU AV\HhHH HUI~dI4 HhH AFXEf\I~@HhfAFRHAFTN$!AFXHUMA9HH1AH}LwH9Mn@t7I@ fDMIH=LIE@I}@H@H9uHUeH3%(DHx[A\A]A^A_H}eH=ЀHI5I|$HUHuHuH HUHBH 0H9M" Av\HA<I Hp1H`HhH`Hhue9AF\IG LH`H`u:A|iA|HBATHH1g1LHLH=HH1A/@ft2H1AvRH1AM@IG II~dI)AL ɃHJ AV\AI4 HhAFXAdžI~@fAFRHEf\AFXHUH}HhELN,)LxLmLxA}jI}HUHuQHuH 3LeIJD&H9E HNHC|%bC|%Kt%H}HHhHhH#HxIHuMlAƆ(A~AFRf;ftMLA^HH1"HH1AIHtLLL4tLAH1HHELhH9HIU@t1HI9tQLjDIUPI9t=IIE@I}@H@H9u HH1AMH=LHEHH1ANH1HH1AH1H1H1H1렉H1g1LHLH=HH1ALH1H1H1IHt LLL H1LAHpHH1H1 H1AtH1H1H1H1H1H1H1AtH1lHH1LGUHSIHIII3HL)H6IIII=M)I9H?ILL)Hȹ@+ HH HHt fDHHH9puH9PtHHu[fD1[UHSHHW(HG0HHH(HBHHH{HtHCH[fUHAVAUATSHHILgHLifDMt{LHLHIL;uHCIEHCE1HLH[A\DA]A^AUHHpH]LeLmLuL}uHUHHMDE9(HRL$IL%Mt$HLHID$ H`HH@H@H}HRpDhHJXDHHMHAEHMD;mZH;M,HEHUH9PA<$AT$;UDkILHID$t^LHHA$I|$ LDH]LeLmLuL}ÍHHH1ALHHA롋MHH1AHH1AaHHDH1A;HUHH1AUDHH1AHMDHH1AHH1HA@UHH0H]LeLmLuL}H_(IHA$ID$HMt$HLhL9M}8ID$pIT$xHHtHPI|$ HH IL$pIT$xHtI|$HtI|$Ht HHL1H]LeLmLuL}IT$HH1HI8HAl$HH1LMIW8IG8H8L9IDUHAUATSHH=Htb1HcH@L$ILH=HHLHHxHtLHHxH9wH=HH=H ~uH=1AfDHcL,Mt'@I}uLMmMuH= D9HH[A\A]H=։HH1fffff.UHAUATSH=hHHHHt,Ӄu HH<HH ~!HTfHHH9uHH@Hu\DH}Le ID$HEeH%HEHUHELHA>tLHLA>Aƒu`IFHH=FLEEH=LEEzHHH1HH1 UHATSHH H=HXtBfDLc8L H{ 1ɺLHCXH=HXuHH=1ɺH[A\UHATSHHHHH11HHHHH=IwH1L%[A\ÉÉHHH1DUHAWAVAUATSHheH%HUHE`H}HEHHxHHMIIH}fDH=IGH@HfDI]Lc8LLAEuLIEHt HC1Ht HsLkIHH{IE H{ 1ɺLL-IdHH=HMHQHRHx HUHEHEHUHUHE4fDuGHMHAHPu3H@HuHH=tHuHHH=FIGH@ADHHh1[A\A]A^A_ HuHH}HGH@yUHH H]LeLmI~u"H1fDH]LeLm71H~MAAu1HAAtID9ՅtH11UHATSH@HeH%(HE1HHHCtrHH1S1HHC"HEeH3%(DH@[A\Ð1HHLeHL1LHHEJHHUHHEHEHHE1f1HHS 1HH1HHs H{1HHS1HH1HH ~HCy1HHCQ1HHC)HH1 'EjSX\G%F\e\5Bl\sv CMql)  - 4 9Yc j pq    @    (6;M T [ 0M{\8   -5U\>\Q\% 5 ]   \   8-        N! T \ 8   N C \g r 8   85 : d       ,8pq$Nc8|.'.9.. ) P0]%G)  z  %> KW}q$iqy9AemB     +2 7?   H  x"]iV  Y   H+ 2 c9U \ ct  x  p      02 %-UGmGK   X&Bi  X jr v (   &! +!3!r! !! ! ! " "H" t"""""8 #(#D#W#k## # # ## # # $A$c$i$% %%%h% %%V%i|&& &&& -'f'''''8(ig(x( }((( (( (() `)))%);) @) Z)c) p)))x))* * #'*H*^* *G***&*<**+ ,+ K+ U+<++ ++,X&, H-,I,,,,,m- -- G-Om- 4x--  - `-W. \.u. }.. .  .. @/ g/#/>/ gC/k/// I0i\0Of0 ( m0v0~0000  00 g01$Q1111$)2Z222 2 2 23  3,3 33 @ :3L3  V3e3 p l3u3 33 33 833  33 33 44)4.4qL4 Hb4 g4h{4 44q4 4 44 4 44 5 P 5.o%5@5 SK5 ^5 u55o556  6(6 -06E6R6 >Z66 66 66 66 j67 R 7%717<R7a7k79r7z77v77~7?778!8+8q?8M8 0T8 Y888o8889  9  9B99 :: @ : ::@ ;}; @ ;  ;;; p ; `;;< p < %<-<^< p e< l<<A< p < P<<< (< =*=?=Nc=n=8= =q=>  >\M> Y>\d>p> x>> >>  > >> >> 0> ?6??? u@ @  @ @@A@  A   A,AzDA  KA XRArAA  A AA  A B*BIB:YBvBBB B B C C CKCnCCC-C C CCZCD D HD1D HD WDmD tD  {DDD pD E)ELE nEEEE%FQmFFF FFF,GFGGGH ,H7H-HfI5-IQIZnIII 0II  I II  J  J%JJJ!K @ K L&LAL5LL K3MwMTM8M  M MM  M xMM{N OOLONP8PiPPP-QQQ8YQ8Q  Q QQ  Q (QQ8 R  'R `4RSDSgVS|\S vS SSS S yT7T DTdT  TT xT }T gTT T|TTTT U U 3U pUUgUUqU xU UUV 9V8FV MVTV\VVVV\W8 W|W WDWdKW XWmW tWW 0WW8W pWWX g X+XKX gPXyXX XXX gXX|X XX[YYY  Y g%Y[  E[ L[y[[[  [ 8[[[  \'\4\8O\  V\ ]\}\  \ \\\ ]  ]  i]]  ]] (]] @ ] H] ^ @ ^ ^5^H^ T^j^^ ^ ^^^P^q_Q_P__@t`  {` `` P`` `` ```@0a 7a `BabaabEb  Mb  bbbbFc %c16c  =c DcUc  \c fcpc  wc cc  c cc cc  c cc  c Hcd#d bd gd d P d ddd e=!e\Be\`e\nee (ee  e Hee  e ee  e ff  f !fEff5f  f ffg  g ggdRgggh?hRh `Yhbhkhth {hhhhh5hhchii p i "i:i  Ai HiXiC}iii5i =i i*j51jsj  zj Xjjdj  j BjjCj  j ,jjCj  j RjjC%kik%ykkk7lOl\cl P jl h oll\lll P l  l m 0 m m.m 0 5m !:mCm 0 Jm H!OmmCm P m @ mmm 0 m  mmdm 0 n  nnC!n 0 (n  -nynCnnnoQo  o !oopo  o p!pp  p !"pEpp%pppqqq  q h"qq\qq/r  6r =rLr  Sr "XrdrCmr  tr 8"yrrCrdr  r "rr  r  #rseyW\\*5A8Jq8 0 (4 0 p3юݎ 0 03 0 2# 0* @21A 0H 2Se 0l X1s $ 0 01 0ŏ 0ҏ 0 , 0 0+ 02 p0?P 0W  0ap 0w 2 0 4 0 `4Ð| Ndx$ W(lӒ= \E\m\=\8\V\5Ҕ"\K\[,8 Pȕ x6ϕޕ P 6 P 6  P 5#; PB 7I` Pg p3y P 5 P H5ɖ PЖ X1ז P  0 P 7! P( 03/F PM 2Tg Pn 5 P 06 $՗$.q!(y  (5vܚ)5>8F8[g pn uCƛ כ pޛ ;   <!/V5  p9, 3 9@T8c x;p e5q x +  ,  P;Ξ   0<  0+   % P82D K 9Rg  8n  ;  0:Ο  ՟ `<ܟ 7 x8+ x82>  E @9Zl s x:z  :  :Ԡ 8q x ?}qs5  ??FNqƣ5sg  X=äȤϤ ֤ =ݤ * @5q5Цc  A  A I HAW \  >ŧϧ֧ާ (= 0@  >& - @>4F MV j]f =mv =} <  p?Ҩ L٨ > <- 4A\ c  Bjv j}  ? = ȩ jϩݩ < L . d "4 =;G N @U]vêͪ) > CQ8| ;ī ̫ԫ MS  u߬] uOg5vU~ 0 hB 0ȭ Dͭ߭ 0 D 0 `D  0) D6F 0M CZl 0s hC 0 C 0 BȮ uӮ uU 0,ί Pկ  Eܯ P ENU c hn  8 ̰Ұ۰ 8  u EY_p8w u|  EαԱ   u u DZdp uIJβ ۲    & '8 F gq z  ó ͳӳ {  F% , F3: u?R Y @Faj u]ɴҴ u״ F-74ONo/ D   ϵ%?| p D uŶζ ]    / ES  \ } ̷ٷ u޷  G   @G'. 8? F GMX _ Hfu{ @¸ Ӹ u߸] u$Kv\  `H% ; uD_]u tƺ u˺  H' = uEM Sdl Mv~ M ]˻ػ  u5 Um t H{ t ^ \Ҽ ټ J  I ! (I-]f "Ͻ ֽ xLݽ8ey K  (L  PJǾ  ξ K۾  J  (K!/ 6 J=bk z u]ſ uS  n,E]{ u&08Qz a4** u @% L,@ @G LN] @d Mk @ ` xM .;s5E  Mm>q (  ( H<l" h'. H3F xKEp y a4*> H  p (N"0 p7 N>X_ Hdkdq;x hE h H xE (  H") (0 x5@ G N`R hYh] hb7wU~  N  ` h/ H4:;\dEd h H` h DH aDa x4` h x*d hD` H" x'*ek      / N4A H O[ b Og    !  N5E L  PQ] d HPir y P~C  O  O  OC  hO!5 < 8OAS Z 8akdUHtH1H  #{(r-(4  9'>L)UH1HAUATSHHeL#Hs1H{LC II$HH H8u6IUHH1H1!HuH1H5HHHuH3HHH1H=H1zHH1\tH1<tH15~+H1HAZ[A\A]HY;  >JTL)_ f x ry      k    ` (   $ + ` 29F  MTWc  jo{w 0 r(  'L)  I+ecryptfs_openecryptfs_filldirecryptfs_lookupecryptfs_createecryptfs_do_createecryptfs_initialize_fileecryptfs_setattrecryptfs_lookup_and_interpose_lower ecryptfs_parse_optionsecryptfs_read_superecryptfs_fill_superecryptfs_initecryptfs_init_kmem_cachesecryptfs_number_of_usersecryptfs_message_wait_timeoutecryptfs_message_buf_lenecryptfs_verbosityecryptfs_write_endecryptfs_write_beginecryptfs_copy_up_encrypted_with_headerecryptfs_readpageecryptfs_writepageecryptfs_write_inode_size_to_headerecryptfs_writeecryptfs_decode_and_decrypt_filename  !"#$%&'()*+,-./0123456789:;<=>?ecryptfs_encrypt_and_encode_filenameecryptfs_encrypt_filenameecryptfs_read_metadataecryptfs_read_headers_virtcontains_ecryptfs_marker ecryptfs_write_metadataecryptfs_write_headers_virtecryptfs_write_metadata_to_contentsecryptfs_read_and_validate_header_regionecryptfs_cipher_code_to_stringecryptfs_new_file_contextecryptfs_generate_new_keyecryptfs_compute_root_ivecryptfs_calculate_md5ecryptfs_init_crypt_ctxecryptfs_decrypt_pageecryptfs_decrypt_extentdecrypt_scatterlistecryptfs_encrypt_pageecryptfs_encrypt_extentencrypt_scatterlistecryptfs_derive_iv ecryptfs_generate_key_packet_setwrite_tag_3_packetwrite_tag_1_packetpki_encrypt_session_keywrite_tag_66_packetparse_tag_67_packetecryptfs_parse_packet_setparse_tag_3_packetdecrypt_pki_encrypted_session_keywrite_tag_64_packetparse_tag_65_packetdecrypt_passphrase_encrypted_session_keyprocess_request_key_errecryptfs_verify_versionecryptfs_parse_tag_70_packetecryptfs_write_tag_70_packetecryptfs_write_packet_lengthecryptfs_parse_packet_lengthecryptfs_release_messagingecryptfs_init_messagingecryptfs_send_message_lockedecryptfs_acquire_free_msg_ctxecryptfs_process_responseecryptfs_exorcise_daemonecryptfs_spawn_daemonecryptfs_miscdev_releaseecryptfs_miscdev_openecryptfs_miscdev_pollecryptfs_miscdev_writeecryptfs_miscdev_responseecryptfs_miscdev_readecryptfs_init_ecryptfs_miscdevecryptfs_send_miscdevecryptfs_privileged_openecryptfs_init_kthreadecryptfs_dump_auth_tokp p`l   HP_X6`hpp`l      @}1 @@!0 '(%08#@ h x@1 @( 8@@H1P X`@@P2HP2P2X2`1h1p1x1p1@110x2    # 6 L( a8 yH X h x  87@7p5( 785`8h;>B8 #P@ ##E #(#0#8#@#H#eP#-X#`#*h#ep#x##5#m##=#####E#t###m # ##m#B##R# #(#0#8#= @iEHiUPiXi`ihipixiiiz U2R:QQQ} Q<(Q08e@HPXm`hbp x e  P  ZYB%2] !($0%&8)@+H,P-X-`hp5xb Ae(]]] ]]]]^]% ] ]@ (I08@HP: X `XhXXpXxXCC<4>Mount has encrypted view enabled; files may only be read <3>%s: Error attempting to allocate memory <7>%s: Setting flags for stat... <3>%s: Error attempting to initialize the persistent file for the dentry with name [%s]; rc = [%d] <7>%s: Valid headers not found <4>Either the lower file is not in a valid eCryptfs format, or the key could not be retrieved. Plaintext passthrough mode is not enabled; returning -EIO <7>%s: inode w/ addr = [0x%p], i_ino = [0x%.16x] size: [0x%.16x] <3>%s: Error attempting to decode and decrypt filename [%s]; rc = [%d] <3>Error attempting to zero out the remainder of the end page on reducing truncate; rc = [%d] <3>Problem with ecryptfs_write_inode_size_to_metadata; rc = [%d] <4>Either the lower file is not in a valid eCryptfs format, or the key could not be retrieved. Plaintext passthrough mode is not enabled; returning -EIO <7>%s: ia->ia_valid = [0x%x] ATTR_SIZE = [0x%x] <3>%s: Out of memory whilst attempting to allocate ecryptfs_dentry_info struct <3>%s: Error interposing; rc = [%d] <3>%s: Cannot kmem_cache_zalloc() a page <3>%s: Error attempting to initialize the persistent file for the dentry with name [%s]; rc = [%d] <3>%s: Error locking directory of dentry <3>%s: Failure to create dentry in lower fs; rc = [%d] <3>%s: Failure in ecryptfs_interpose <4>%s: Failed to create file inlower filesystem <7>%s: Initializing crypto context <3>%s: Error creating new file context; rc = [%d] <3>Error writing headers; rc = [%d] <3>Error growing file; rc = [%d] <3>Error in vfs_unlink; rc = [%d] <3>%s: lookup_one_len() returned [%d] on lower_dentry = [%s] <3>%s: Error attempting to encrypt and encode filename; rc = [%d] <3>Failure whilst attempting to destroy crypto; rc = [%d] <3>Error opening lower persistent file for lower_dentry [0x%p] and lower_mnt [0x%p]; rc = [%d] <4>path_lookup() failed on dev_name = [%s] <3>Mount on filesystem of type eCryptfs explicitly disallowed due to known incompatibilities <3>Getting sb failed; rc = [%d] &mount_crypt_stat->global_auth_tok_list_mutex<3>Error attempting to register global sig; rc = [%d] <3>Error attempting to register global fnek sig [%s]; rc = [%d] <4>%s: eCryptfs: unrecognized option [%s] <3>%s: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README <3>Error attempting to initialize cipher with name = [%s] and key size = [%td]; rc = [%d] <3>Could not find valid key in user session keyring for sig specified in mount option: [%s] <4>One or more global auth toks could not properly register; rc = [%d] <3>Error parsing options; rc = [%d] <3>Mount of device (uid: %d) not owned by requested user (uid: %d) <3>Reading sb failed; rc = [%d] <3>%s: dentry_info_cache alloc failed <4>%s: %s: kmem_cache_create failed <3>Failed to allocate one or more kmem_cache objects <3>Failed to register filesystem <3>Unable to create ecryptfs kset <3>Unable to create ecryptfs version attributes <3>%s: kthread initialization failed; rc = [%d] <3>Failure occured while attempting to initialize the communications channel to ecryptfsd <3>Failure whilst attempting to init crypto; rc = [%d] <2>eCryptfs verbosity set to %d. Secret values will be written to the syslog! ecryptfs_global_auth_tok_cache<4>%s: Error encrypting page (upper index [0x%.16x]) <3>%s: Error reading xattr region; rc = [%d] <3>%s: Error attempting to read extent at offset [%lld] in the lower file; rc = [%d] <7>%s: Passing through unencrypted page <3>%s: Error attempting to copy the encrypted content from the lower file whilst inserting the metadata from the xattr into the header; rc = [%d] <3>Error reading page; rc = [%d] <3>%s: Error decrypting page; rc = [%d] <7>%s: Unlocking page with index = [0x%.16x] <4>No support for setting xattr in lower filesystem <3>Out of memory whilst attempting to write inode size to xattr <3>Error whilst attempting to write inode size to lower file xattr; rc = [%d] <3>%s: Error writing file size to header; rc = [%d] <3>%s: Error attemping to read lower page segment; rc = [%d] <3>%s: Error reading page; rc = [%d] <3>%s: Error decrypting page at index [%ld]; rc = [%d] <3>%s: Error on attempt to truncate to (higher) offset [%lld]; rc = [%d] <7>%s: ECRYPTFS_NEW_FILE flag set in crypt_stat at memory location [%p] <7>%s: Calling fill_zeros_to_end_of_page(page w/ index = [0x%.16x], to = [%d]) <7>%s: Expanded file size to [0x%.16x] <3>Error writing inode size to metadata; rc = [%d] <3>%s: Error getting page at index [%ld] from eCryptfs inode mapping; rc = [%d] <3>%s: Error encrypting page; rc = [%d] <3>Problem with ecryptfs_write_inode_size_to_metadata; rc = [%d] <3>%s: Out of memory whilst attempting to kmalloc [%zd] bytes <6>%s: Could not parse tag 70 packet from filename; copying through filename as-is <3>%s: Out of memory whilst attempting to kzalloc [%zd] bytes <3>%s: Error attempting to get packet size for tag 72; rc = [%d] <3>%s: Error attempting to generate tag 70 packet; rc = [%d] <3>%s: No support for requested filename encryption method in this release <3>%s: Error attempting to encrypt filename; rc = [%d] <3>%s: Error attempting to encode encrypted filename; rc = [%d] <3>Error attempting to allocate from ecryptfs_key_tfm_cache <3>Requested key size is [%zd] bytes; maximum allowable is [%d] <3>Unable to allocate crypto cipher with name [%s]; rc = [%d] <3>Error attempting to set key of size [%zd] for cipher [%s]; rc = [%d] <3>Error attempting to initialize key TFM cipher with name = [%s]; rc = [%d] <3>Error adding new key_tfm to list; rc = [%d] &crypt_stat->keysig_list_mutex&crypt_stat->cs_hash_tfm_mutex<7>%s: m_1 = [0x%.8x]; m_2 = [0x%.8x]; MAGIC_ECRYPTFS_MARKER = [0x%.8x] <7>%s: (m_1 ^ MAGIC_ECRYPTFS_MARKER) = [0x%.8x] <3>%s: Error reading header region; rc = [%d] <7>%s: Initializing cipher [%s]; strlen = [%d]; key_size_bits = [%d] <3>%s: cryptfs: init_crypt_ctx(): Error initializing cipher [%s] <4>%s: File version is [%d]; only file version [%d] is supported by this version of eCryptfs <4>Invalid header size: [%zd] <4>%s: Error reading header metadata; rc = [%d] <6>Error attempting to read the [%s] xattr from the lower file; return value = [%zd] <3>%s: Unable to allocate page_virt <7>Valid eCryptfs headers not found in file header region or xattr region <7>Valid eCryptfs headers not found in file xattr region either <4>Attempt to access file with crypto metadata only in the extended attribute region, but eCryptfs was mounted without xattr support enabled. eCryptfs will not treat this like an encrypted file. <4>Valid data found in [%s] xattr, but the marker is invalid <3>Key is invalid; bailing out <4>%s: Encrypted flag not set <4>%s: Error generating key packet set; rc = [%d] <3>%s: Error whilst writing headers; rc = [%d] <3>%s: Error attempting to write header information to lower file; rc = [%d] <3>%s: Error writing metadata out to lower file; rc = [%d] <4>%s: Cipher code not recognized: [%d] <3>%s: Error attempting to allocate crypto context; rc = [%d] <3>%s: Error initializing crypto hash; rc = [%d] <3>%s: Error updating crypto hash; rc = [%d] <3>%s: Error finalizing crypto hash; rc = [%d] <4>%s: Session key not valid; cannot generate root IV <4>%s: Error attempting to compute MD5 while generating root IV <3>Error adding keysig; rc = [%d] <3>Error attempting to copy mount-wide key sigs to the inode key sigs; rc = [%d] <7>%s: Generated new session key: <3>%s: Error initializing cryptographic context for cipher [%s]: rc = [%d] <4>%s: Error attempting to compute MD5 while generating IV for a page <3>%s: Error attempting to derive IV for extent [0x%.16x]; rc = [%d] <7>%s: Decrypting extent with iv: <7>%s: First 8 bytes before decryption: <3>%s: Error setting key; rc = [%d] <7>%s: Decrypting [%d] bytes. <3>%s: Error decrypting; rc = [%d] <3>%s: Error attempting to decrypt to page with page->index = [%ld], extent_offset = [%ld]; rc = [%d] <7>%s: Decrypt extent [0x%.16x]; rc = [%d] <7>%s: First 8 bytes after decryption: <3>%s: Error allocating memory for encrypted extent <3>%s: Error attempting to read lower page; rc = [%d] <3>%s: Error encrypting extent; rc = [%d] <7>%s: Encrypting extent with iv: <7>%s: First 8 bytes before encryption: <7>%s: Encrypting [%d] bytes. <3>%s: Error attempting to encrypt page with page->index = [%ld], extent_offset = [%ld]; rc = [%d] <7>%s: Encrypt extent [0x%.16x]; rc = [%d] <7>%s: First 8 bytes after encryption: <3>%s: Error attempting to write lower page; rc = [%d] -.0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz<3>Error allocating from ecryptfs_global_auth_tok_cache <3>Error allocating from ecryptfs_key_sig_cache <4>%s: Unsupported packet size: [%d] <3>%s: Five-byte packet length not supported <3>%s: Error parsing packet length <7>%s: Session key encryption key (size [%d]): <3>Internal error whilst attempting to get tfm and mutex for cipher name [%s]; rc = [%d] <3>Internal error whilst attempting to convert auth_tok->session_key.encrypted_key to scatterlist; expected rc = 1; got rc = [%d]. auth_tok->session_key.encrypted_key_size = [%d] <3>Internal error whilst attempting to convert auth_tok->session_key.decrypted_key to scatterlist; expected rc = 1; got rc = [%d] <3>Error setting key for crypto context <3>Error decrypting; rc = [%d] <4>No key size specified at mount; defaulting to [%d] <7>%s: encrypted_session_key_valid != 0; using auth_tok->session_key.encrypted_key, where key_rec->enc_key_size = [%d] <7>%s: Using previously generated session key encryption key of size [%d] <7>%s: Cached session key encryption key: <7>%s: Session key encryption key: <3>%s: Error generating scatterlist for crypt_stat session key; expected rc = 1; got rc = [%d]. key_rec->enc_key_size = [%d] <3>%s: Error generating scatterlist for crypt_stat encrypted session key; expected rc = 1; got rc = [%d]. key_rec->enc_key_size = [%d] <3>%s: Error setting key for crypto context; rc = [%d] <7>%s: Encrypting [%d] bytes of the key <3>Error encrypting; rc = [%d] <7>%s: This should be the encrypted key: <3>Packet too large; need up to [%td] bytes, but there are only [%td] available <3>Error generating tag 3 packet header; cannot generate packet length. rc = [%d] <4>%s: Unable to generate code for cipher [%s] <3>Cannot get sig for auth_tok of type [%d] <3>Unrecognized auth tok type: [%d] <3>%s: Unable to allocate memory <3>%s: Error generating tag 64 packet header; cannot generate packet length <3>%s: Failed to write tag 64 packet <3>%s: Error sending message to ecryptfsd <3>%s: Failed to receive tag 65 packet from the user space daemon <3>%s: Type should be ECRYPTFS_TAG_65 <3>%s: Status indicator has non-zero value [%d] <4>%s: Error parsing packet length; rc = [%d] <3>%s: The message received from ecryptfsd is shorter than expected <3>%s: The decrypted key is not long enough to include a cipher code and checksum <3>%s: key_size [%d] larger than the maximum key size [%d] <3>%s: Invalid checksum for file encryption key; expected [%x]; calculated [%x] <3>Failed to parse tag 65 packet; rc = [%d] <3>%s: Cipher code [%d] is invalid <7>%s: Decrypted session key: <3>Could not find key with description: [%s] <4>%s: Unknown error code: [0x%.16x] <3>%s: Major version number mismatch. Expected [%d]; got [%d] <3>%s: Minor version number mismatch. Expected [%d]; got [%d] <3>Data structure version mismatch. Userspace tools must match eCryptfs kernel module with major version [%d] and minor version [%d] <3>Invalid auth_tok structure returned from key query <3>%s: Out of memory whilst trying to kmalloc [%zd] bytes of kernel memory <4>%s: max_packet_size is [%zd]; it must be at least [%d] <4>%s: Invalid packet tag [0x%.2x]; must be tag [0x%.2x] <4>%s: max_packet_size is [%zd]; real packet size is [%zd] <4>%s: Cipher code [%d] is invalid <3>%s: Internal error whilst attempting to convert encrypted filename memory to scatterlist; expected rc = 1; got rc = [%d]. block_aligned_filename_size = [%zd] <3>%s: Out of memory whilst attempting to kmalloc [%zd] bytes <3>%s: Internal error whilst attempting to convert decrypted filename memory to scatterlist; expected rc = 1; got rc = [%d]. block_aligned_filename_size = [%zd] <3>%s: Error attempting to find auth tok for fnek sig [%s]; rc = [%d] <6>%s: Filename encryption only supports password tokens <3>%s: Error setting key for crypto context; rc = [%d]. s->auth_tok->token.password.session_key_encryption_key = [0x%p]; mount_crypt_stat->global_default_fn_cipher_key_bytes = [%zd] <3>%s: Error attempting to decrypt filename; rc = [%d] <4>%s: Invalid tag 70 packet; could not find valid separator between random characters and the filename <4>%s: Filename size is [%zd], which is invalid <4>%s: Require [%zd] bytes to write; only [%zd] available <3>%s: Out of kernel memory whilst attempting to kzalloc [%zd] bytes <3>%s: Error generating tag 70 packet header; cannot generate packet length; rc = [%d] <4>%s: Unable to generate code for cipher [%s] with key bytes [%zd] <3>%s: Error attempting to allocate hash crypto context; rc = [%d] <3>%s: Error initializing crypto hash; rc = [%d] <3>%s: Error updating crypto hash; rc = [%d] <3>%s: Error finalizing crypto hash; rc = [%d] <3>%s: Internal error whilst attempting to convert filename memory to scatterlist; expected rc = 1; got rc = [%d]. block_aligned_filename_size = [%zd] <3>%s: Error attempting to encrypt filename; rc = [%d] <3>Error attempting to get the global auth_tok; rc = [%d] <4>Skipping invalid auth tok with sig = [%s] <4>%s: Error writing tag 3 packet <3>Packet length larger than maximum allowable; need up to [%td] bytes, but there are only [%td] available <3>Error generating tag 11 packet header; cannot generate packet length. rc = [%d] <3>%s: Error writing auth tok signature packet <3>%s: Error generating tag 66 packet header; cannot generate packet length <3>%s: Error generating tag 66 packet <3>%s: Failed to receive tag 67 packet from the user space daemon <3>%s: message_len is [%zd]; minimum acceptable message length is [%d] <3>%s: Type should be ECRYPTFS_TAG_67 <3>%s: Status indicator has non zero value [%d] <3>%s: message_len [%zd]; max len is [%zd] <3>%s: Encrypted key_size [%zd] larger than the maximum key size [%d] <3>%s: Error parsing tag 67 packet <3>Failed to encrypt session key via a key module; rc = [%d] <3>%s: Error generating tag 1 packet header; cannot generate packet length <4>%s: Error writing tag 1 packet <4>%s: Unsupported authentication token type <3>%s: Error writing boundary byte <4>Error parsing packet length; rc = [%d] <4>Tag 3 packet contains key larger than ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES <4>Unknown version number [%d] <4>Only S2K ID 3 is currently supported <3>%s: Unsupported hash algorithm: [%d] <3>%s: Error parsing tag 3 packet <3>Maximum packet size too small <4>Invalid tag 11 packet format <3>Literal data section in tag 11 packet exceeds expected size <3>%s: No valid (ecryptfs-specific) literal packet containing authentication token signature found after tag 3 packet <3>%s: Expected signature of size [%d]; read size [%d] <3>Invalid max packet size; must be >=12 <4>Tag 1 packet contains key larger than ECRYPTFS_MAX_ENCRYPTED_KEY_BYTES<3>%s: Error parsing tag 1 packet <4>%s: Invalid packet set (Tag 11 not allowed by itself) <7>%s: No packet at offset [%d] of the file header; hex value of character is [0x%.2x] <3>The lower file appears to be a non-encrypted eCryptfs file; this is not supported in this version of the eCryptfs kernel module <7>%s: Considering cadidate auth tok: <3>Unrecognized candidate auth tok type: [%d] <3>%s: Could not find a usable authentication token <4>%s: Error decrypting the session key for authentication token with sig [%.*s]; rc = [%d]. Removing auth tok candidate from the list and searching for the next match. <3>%s: Error computing the root IV <3>%s: Error initializing crypto context for cipher [%s]; rc = [%d] <3>%s: Attempt to reference context buffer at index [%d]; maximum allowable is [%d] <3>%s: Receiving process is a zombie. Dropping message. <4>%s: User [%d] received a message response from process [0x%p] but does not have a registered daemon <4>%s: Received message from user [%d]; expected message from user [%d] <4>%s: Received message from user_ns [0x%p]; expected message from user_ns [0x%p] <3>%s: User [%d] sent a message response from an unrecognized process [0x%p] <4>%s: Desired context element is not pending a response <4>%s: Invalid message sequence; expected [%d]; received [%d] <3>%s: Failed to allocate [%zd] bytes of GFP_KERNEL memory <4>%s: Attempt to destroy daemon with pid [0x%p], but it is in the midst of a read or a poll <4>%s: Warning: dropping message that is in the out queue of a dying daemon <3>%s: Error whilst attempting to destroy daemon; rc = [%d]. Dazed and confused, but trying to continue. <4>%s: Specified number of users is too large, defaulting to [%d] users <3>%s: Failed to allocate memory <3>Received request from user [%d] to unregister unrecognized daemon [0x%p] <3>%s: User [%d] does not have a daemon registered <4>%s: The eCryptfs free context list is empty. It may be helpful to specify the ecryptfs_message_buf_len parameter to be greater than the current value of [%d] <4>%s: Could not claim a free context element <3>%s: Error attempting to send message to userspace daemon; rc = [%d] <4>%s: Attempt to poll on zombified daemon <2>%s: Fatal error whilst attempting to shut down daemon; rc = [%d]. Please report this bug. <3>%s: Error attempting to spawn daemon; rc = [%d] <3>%s: pid [0x%p] has registered with euid [%d], but pid [0x%p] has attempted to open the handle instead <3>%s: Miscellaneous device handle may only be opened once per daemon; pid [0x%p] already has this handle open <3>%s: Error attempting to increment module use count; rc = [%d] <3>%s: memdup_user returned error [%ld] <4>%s: Minimum acceptable packet size is [%zd], but amount of data written is only [%zd]. Discarding response packet. <4>%s: Error parsing packet length; rc = [%d] <4>%s: (1 + packet_size_length([%zd]) + packet_size([%zd]))([%zd]) != count([%zd]). Invalid packet format. <4>%s: (sizeof(*msg) + msg->data_len) = [%zd]; data_size = [%zd]. Invalid packet. <3>Error processing response message; rc = [%d] <4>%s: Failed to deliver miscdev response to requesting operation; rc = [%d] <4>%s: Dropping miscdev message of unrecognized type [%d] <4>%s: Attempt to read from zombified daemon <4>%s: Error writing packet length; rc = [%d] <4>%s: Only given user buffer of size [%zd], but we need [%zd] to read the pending message <3>%s: Failed to register miscellaneous device for communications with userspace daemons; rc = [%d] <3>%s: Out of memory whilst attempting to kmalloc(%zd, GFP_KERNEL) <3>%s: We are in the middle of shutting down; aborting privileged request to open lower file <4>%s: Privileged open request dropped <3>%s: Failed to create kernel thread; rc = [%d] <7>%s: Auth tok at mem loc [%p]: <7>%s: * session_key.flags = [0x%x] <7>%s: * Userspace decrypt request set <7>%s: * Userspace encrypt request set <7>%s: * Contains decrypted key <7>%s: * session_key.decrypted_key_size = [0x%x] <7>%s: * Decrypted session key dump: <7>%s: * Contains encrypted key <7>%s: * session_key.encrypted_key_size = [0x%x] <7>%s: * Encrypted session key dump: <7>%s: This is a directory <7>%s: ia->ia_valid = [%x] fs/ecryptfs/inode.cinclude/linux/dcache.h<7>%s: This is a directory ...%d ecryptfsproc,<4>%s: path_lookup() failed <4>%s: Out of memory /<3>%s: d_alloc failed <3>sysfs registration failed sig=%secryptfs_sig=%scipher=%secryptfs_cipher=%secryptfs_key_bytes=%uecryptfs_passthroughecryptfs_xattr_metadataecryptfs_encrypted_viewecryptfs_fnek_sig=%secryptfs_fn_cipher=%secryptfs_fn_key_bytes=%uecryptfs_unlink_sigsecryptfs_check_dev_ruidecryptfs_auth_tok_list_itemecryptfs_file_cacheecryptfs_dentry_info_cacheecryptfs_inode_cacheecryptfs_sb_cacheecryptfs_headers_1ecryptfs_headers_2ecryptfs_xattr_cacheecryptfs_key_record_cacheecryptfs_key_sig_cacheecryptfs_key_tfm_cacheecryptfs_open_req_cacheversion,ecryptfs_fnek_sig=%s,ecryptfs_sig=%s,ecryptfs_cipher=%s,ecryptfs_key_bytes=%zd,ecryptfs_passthrough,ecryptfs_xattr_metadata,ecryptfs_encrypted_view,ecryptfs_unlink_sigsfs/ecryptfs/super.c&inode_info->lower_file_mutexfs/ecryptfs/mmap.cuser.ecryptfs<7>%s: Not a new file fs/ecryptfs/read_write.cECRYPTFS_FNEK_ENCRYPTED.fs/ecryptfs/crypto.caes&key_tfm_list_mutex%s(%s)&tmp_tfm->key_tfm_mutexecb&crypt_stat->cs_mutex&crypt_stat->cs_tfm_mutex<3>%s: No cipher specified cbcuser.ecryptfs<3>%s: Out of memory md5<7>%s: root iv: %lld<7>%s: source: <7>%s: derived iv: include/linux/scatterlist.h<7>%s: Key size [%d]; key: %.2x<7>%s: FEK of size [%d]: aes<7>%s: EFEK of size [%d]: <4>%s: No key <4>%s: Key expired <4>%s: Key revoked md5<7>%s: Encrypted key: <3>Max packet size too large <3>Unable to allocate memory <4>Invalid body size ([%td]) <3>Packet size exceeds max <4>Unrecognizable packet <4>Packet size exceeds max fs/ecryptfs/keystore.c&ecryptfs_daemon_hash_mux&ecryptfs_msg_ctx_lists_mux&ecryptfs_msg_ctx_arr[i].mux&(*daemon)->muxfs/ecryptfs/miscdev.cecryptfsinclude/linux/dcache.h&req->muxfs/ecryptfs/kthread.c&ecryptfs_kthread_ctl.muxecryptfs-kthread<7>0x%.2x.0x%.2x. <7>%s: * private key type <7>%s: * passphrase type <7>%s: * salt = [%s] <7>%s: * persistent <7>%s: * signature = [%s]  dx (08@HP XT'`8h9p <xp<?@AA B]B%I5=}}}}}}}}}}}}}}}}}}}}}}}y 08 HP`hx$O*\06<B (H8i!@NPv!XTh?"pZL"`_%fl%l&r&x(~( aaaaaaaaaaaT0V'[Z??f\??9 3 #aa@ .AvA$z(A04A<@AHLATXA`dAl!pAx!|A(A7t>E GSaW"g&gnn+p Cr s$,s08u<DHPT\ڹ`hںltxtxIlicense=GPLdescription=eCryptfsauthor=Michael A. Halcrow parm=ecryptfs_number_of_users:An estimate of the number of concurrent users of eCryptfsparmtype=ecryptfs_number_of_users:uintparm=ecryptfs_message_wait_timeout:Maximum number of seconds that an operation will sleep while waiting for a message response from userspaceparmtype=ecryptfs_message_wait_timeout:longparm=ecryptfs_message_buf_len:Number of message buffer elementsparmtype=ecryptfs_message_buf_len:uintparm=ecryptfs_verbosity:Initial verbosity level (0 or 1; defaults to 0, which is Quiet)parmtype=ecryptfs_verbosity:intretpoline=Ysrcversion=6CF7CAE2E85669AB9311844depends=vermagic=2.6.32-754.35.1.el6.x86_64 SMP mod_unload modversions 03b (P8@eHPp`3hbpx @#Rmodule_layout vfs_createދrequest_keykobject_put;Oalloc_pages_current_Wnkmem_cache_destroy9Oper_cpu__current_task\4Z__kmalloc&<fsstack_copy_inode_size×sg_init_table4kref_put ~\get_sb_nodevput_pid>generic_file_llseek8__mark_inode_dirtyϚvfs_readdir8Yinode_permissioniparam_get_int(%strlenZSiget5_locked2ߤ~key_type_user'|autoremove_wake_functiong^vvfs_linkyget_random_bytesˑmalloc_sizeshW4param_set_long5w__lock_pages8_spin_lock|Ltouch_atime0deactivate_locked_super&generic_delete_inode7BWgeneric_file_aio_readcsldputo?wseq_printf)Dmatch_tokeno<dentry_open @vfs_mknodumutex_unlockl߅strsepԞvfs_fsync%Kparam_set_intjx|igrab?NEvfs_symlinkZ,<sprintfk({generic_file_aio_writeJGsysfs_remove_groupC__list_addR mutex_trylockZ%strcmpkobject_create_and_add c}vfs_rmdir؝unlock_renamed_delete8 key_validate__init_waitqueue_headjH)per_cpu__cpu_numbervfs_read:misc_registerzkern_path memset9K__mutex_initcsprintkkthread_stopd|d_rehash -sysfs_create_groupTެ__tracepoint_module_getZV6lock_kernel nǡ_cond_reschedfcopy_to_user~strncpy9mcountÜ<vprintk )skmem_cache_freenwait_on_sync_kiocb^Wlock_rename__put_user_1mutex_lockmper_cpu__kernel_stackHTdcache_lock[D!list_del*Amark_tech_previewhunlock_page  @@ X )  ( H jPecryptfs R2 `dmodule.sig^_ ǽq#zT*׷JYXfq2^`S^XF!o4s񭩊l 8CP    p c3:`HImd tt% t p0  40@, > P Z n   @   $R@   % r5E0tSb!Sr #%'8L((* `  )(P)84IDW @h)},k4         3@0CXd'( 0 ,((E Po@@'P( pX 5x(P o z@(p545f 7@7Y7c8f 0!82/8kB Q09ax @ ';G p  $>"  Bh   2'JOUJs @ {Kx %    %   x! TH xT x` xl xx x pZc  `   )   \   @     $  3  $B  P Q dzh  w    p      k  P   0     0p    .  p = dB fH S  pb  q z p{  ) ~#  P 0  @""  p1  @  O  ^ i}  0  P  p  !             * ? Z  u   0  P            p& B Q `j@Ha  & @ . =PBS @b `q  T((@P p(( s&+3 BQ dn #C &`@yo0t1?O]0 pWGcL`|AZ0hY`i w}^<3?U\epy@ Dv"AFR j0Y0^cn`hP0 >Rdo{`D $.T<CM\@gvGp $0f=N] B\v@ )P8dWb {ZrP@r ,1SQgsWpLyPaXPF#9DQ]p @ 5D0-6CJW@,\ip+p% @pu0yi #Mr@Ym K.)<S[(uoE,6Q]huP dpx2pMgs< xZ PU* ;  JWV 0 w       z!0S! ! 2!J! PX! `f!t!!!!![!p!!!v "!"/"pOT"v""`[4""""""## `dentry.cecryptfs_d_revalidateecryptfs_d_releasefile.cecryptfs_ioctlecryptfs_read_update_atimeecryptfs_fasyncecryptfs_fsyncecryptfs_releaseecryptfs_open__func__.32270ecryptfs_readdirecryptfs_filldir__func__.32212ecryptfs_flushinode.cunlock_direcryptfs_removexattrecryptfs_listxattrecryptfs_getxattrecryptfs_put_linkgrow_fileecryptfs_permissionecryptfs_follow_linkecryptfs_readlink_lowerecryptfs_readlinkecryptfs_setattr__func__.32499__func__.31990lock_parentecryptfs_create__func__.31929__func__.31889__func__.31966ecryptfs_renameecryptfs_unlinkecryptfs_linkecryptfs_rmdirecryptfs_lookup__func__.32085ecryptfs_mknodecryptfs_mkdirecryptfs_symlink.LC5.LC10main.cecryptfs_kill_block_superdo_sysfs_unregistrationecryptfs_kobjattr_groupversion_showecryptfs_free_kmem_cachesecryptfs_cache_infosecryptfs_exitecryptfs_fs_typeinode_info_init_onceecryptfs_get_sbecryptfs_fill_super__key.36652tokens__func__.36701__func__.36818__func__.36790ecryptfs_init__func__.36925__func__.36974__mod_license943__mod_description941__mod_author940__mod_ecryptfs_number_of_users82__mod_ecryptfs_number_of_userstype80__param_ecryptfs_number_of_users__param_str_ecryptfs_number_of_users__mod_ecryptfs_message_wait_timeout71__mod_ecryptfs_message_wait_timeouttype67__param_ecryptfs_message_wait_timeout__param_str_ecryptfs_message_wait_timeout__mod_ecryptfs_message_buf_len57__mod_ecryptfs_message_buf_lentype55__param_ecryptfs_message_buf_len__param_str_ecryptfs_message_buf_len__mod_ecryptfs_verbosity48__mod_ecryptfs_verbositytype45__param_ecryptfs_verbosity__param_str_ecryptfs_verbosityattributesversion_attrsuper.cecryptfs_statfsecryptfs_show_optionsecryptfs_clear_inodeecryptfs_put_superecryptfs_destroy_inodeecryptfs_alloc_inode__key.30503.LC8mmap.cecryptfs_bmapecryptfs_writepage__func__.32008ecryptfs_copy_up_encrypted_with_header__func__.32032ecryptfs_readpage__func__.32072__func__.32205ecryptfs_write_begin__func__.32142ecryptfs_write_end__func__.32282read_write.c__func__.29313.LC0crypto.cecryptfs_copy_mount_wide_flags_to_inode_flagsecryptfs_decode_from_filenamefilename_rev_mapecryptfs_copy_filename__func__.33492portable_filename_chars__func__.33089__func__.33426key_tfm_listecryptfs_cipher_code_str_mapCSWTCH.742__key.33174ecryptfs_crypto_api_algify_cipher_name__key.33208__key.32074__key.32075__key.32076__key.32077contains_ecryptfs_marker__func__.32693__func__.32824__func__.32493ecryptfs_read_headers_virtecryptfs_flag_map__func__.32981__func__.33048__func__.32914__func__.32862__func__.32878__func__.32806ecryptfs_calculate_md5__func__.31995__func__.32552__func__.32666__func__.32582__func__.32047ecryptfs_decrypt_extent__func__.32441__func__.32350__func__.32398ecryptfs_encrypt_extent__func__.32196__func__.32258__func__.32305.LC9.LC69keystore.c__func__.36633__func__.36603ecryptfs_find_global_auth_tok_for_sigdecrypt_passphrase_encrypted_session_key__func__.37571write_tag_3_packet__func__.37912decrypt_pki_encrypted_session_key__func__.37221__func__.36662__func__.36696__func__.37526__func__.36591ecryptfs_find_auth_tok_for_sig__func__.37075__func__.36907__func__.37808__func__.38039__func__.36762__func__.37763__func__.36800__func__.37649__func__.37388.LC127messaging.cecryptfs_hash_bitsecryptfs_daemon_hashecryptfs_msg_ctx_free_listecryptfs_msg_ctx_lists_muxecryptfs_msg_ctx_arr__func__.27765__func__.27702__func__.27944__key.27881__key.27889ecryptfs_msg_counter__key.27890__func__.27880__key.27674__key.27675__func__.27672ecryptfs_msg_ctx_alloc_list__func__.27825__func__.27602miscdev.cecryptfs_num_miscdev_opensecryptfs_miscdevecryptfs_miscdev_poll__func__.29167ecryptfs_miscdev_release__func__.29264ecryptfs_miscdev_open__func__.29210ecryptfs_miscdev_write__func__.29536__func__.29509ecryptfs_miscdev_read__func__.29343__func__.29601__func__.29309ecryptfs_miscdev_fopskthread.c__key.27906__key.27907ecryptfs_kthread_ctl__func__.27908ecryptfs_kthread__key.27860__key.27861ecryptfs_threadfn__func__.27864.LC3debug.c__func__.27564ecryptfs.mod.c__mod_retpoline189_rheldata__mod_srcversion180__module_depends____versions__mod_vermagic5generic_shutdown_superecryptfs_write_packet_lengthstrcpyecryptfs_xattr_cachegeneric_fillattrvfs_writeecryptfs_encrypt_paged_instantiatemisc_deregisternotify_changeecryptfs_inode_setecryptfs_get_tfm_and_mutex_for_cipher_nameecryptfs_writegrab_cache_page_write_begincrypto_alloc_basevfs_getattrvfs_renameecryptfs_init_ecryptfs_miscdevlookup_one_lenecryptfs_lookup_and_interpose_lowergeneric_file_splice_read__this_moduleecryptfs_init_crypt_statsnprintfecryptfs_process_quitmemdup_userecryptfs_inode_testsimple_strtolecryptfs_derive_ivinit_special_inodeunregister_filesystemecryptfs_from_hexecryptfs_read_metadatafinish_waitecryptfs_init_kthreadkzfreeput_pagevmtruncatekref_getfree_user_nsecryptfs_setxattrcleanup_moduleparam_set_uintprepare_to_waitmemcpydo_sync_writekthread_createkfreeecryptfs_destroy_mount_crypt_statread_cache_pageschedule_timeout_interruptibleiputsg_init_oneecryptfs_open_req_cacheecryptfs_destroy_crypt_statecryptfs_read_xattr_regionecryptfs_decrypt_pageecryptfs_read_and_validate_xattr_regionecryptfs_dump_hexkthread_should_stop__wake_upfree_pagesfsstack_copy_attr_allecryptfs_sopsregister_filesystemkmem_cache_createvfs_unlink__phys_addr__per_cpu_offsetkmem_cache_alloc_tracepath_putecryptfs_header_cache_1ecryptfs_read_lowerinit_moduleecryptfs_main_iopsecryptfs_parse_tag_70_packetwake_up_processvfs_mkdirecryptfs_init_cryptoecryptfs_privileged_openecryptfs_new_file_contextecryptfs_write_lower_page_segmentcrypto_destroy_tfm__x86_indirect_thunk_raxecryptfs_find_daemon_by_euidunlock_new_inodedo_sync_readrefrigeratorscheduleparam_get_uintecryptfs_compute_root_iv__stack_chk_failparam_get_longecryptfs_get_locked_pagekey_tfm_list_mutexd_allocecryptfs_interposemntput_no_expirefs_kobjgeneric_file_mmappath_lookup__put_user_4__x86_indirect_thunk_rdx__free_pageskmem_cache_allocecryptfs_destroy_kthreadecryptfs_cipher_code_to_stringmodule_putecryptfs_daemon_hash_muxunlock_kernelecryptfs_global_auth_tok_cacheinode_init_onceecryptfs_read_and_validate_header_regionecryptfs_truncateecryptfs_release_messagingkey_putecryptfs_getattr_linkfputecryptfs_code_for_cipher_stringecryptfs_send_miscdevunlock_pageecryptfs_msg_ctx_alloc_to_freeecryptfs_decode_and_decrypt_filenamemark_tech_previewecryptfs_write_metadataecryptfs_destroy_cryptolist_delecryptfs_write_lowerdcache_lockper_cpu__kernel_stackmutex_lock__put_user_1lock_renamewait_on_sync_kiocbkmem_cache_freevprintkmcountstrncpycopy_to_user_cond_reschedecryptfs_symlink_iopslock_kernelecryptfs_init_inodeecryptfs_process_response__tracepoint_module_getsysfs_create_groupd_rehashkthread_stopprintk__mutex_init__ecryptfs_printkecryptfs_init_persistent_fileecryptfs_destroy_ecryptfs_miscdevecryptfs_main_fopsecryptfs_key_tfm_cachememsetkern_pathvirt_to_scatterlistecryptfs_add_keysigmisc_registervfs_readecryptfs_encode_for_filenameecryptfs_file_info_cacheper_cpu__cpu_number__init_waitqueue_headkey_validated_deleteecryptfs_auth_tok_list_item_cacheunlock_renamevfs_rmdirkobject_create_and_addstrcmpmutex_trylock__list_addecryptfs_write_header_metadatasysfs_remove_groupgeneric_file_aio_writesprintfecryptfs_inode_info_cacheecryptfs_dump_auth_tokecryptfs_verbosityvfs_symlinkigrabecryptfs_read_lower_page_segmentparam_set_intecryptfs_key_sig_cachevfs_fsyncstrsepmutex_unlockecryptfs_sb_info_cachevfs_mknodecryptfs_dentry_info_cachedentry_openecryptfs_header_cache_2ecryptfs_getattrmatch_tokenecryptfs_add_global_auth_tokseq_printfdputgeneric_file_aio_readgeneric_delete_inodedeactivate_locked_supertouch_atime_spin_lockecryptfs_message_buf_lenecryptfs_wait_for_responseecryptfs_key_record_cache__lock_pageparam_set_longecryptfs_number_of_usersecryptfs_spawn_daemonecryptfs_write_inode_size_to_metadataecryptfs_write_tag_70_packetmalloc_sizesecryptfs_to_hexecryptfs_add_new_key_tfmget_random_bytesecryptfs_set_default_sizesecryptfs_generate_key_packet_setvfs_linkautoremove_wake_functionecryptfs_send_messagekey_type_useriget5_lockedecryptfs_message_wait_timeoutecryptfs_parse_packet_lengthecryptfs_tfm_existsstrlenecryptfs_dir_iopsecryptfs_init_messagingecryptfs_dopsecryptfs_aopsparam_get_intinode_permissionvfs_readdir__mark_inode_dirtygeneric_file_llseekecryptfs_exorcise_daemonecryptfs_getxattr_lowerput_pidget_sb_nodevecryptfs_parse_packet_setkref_putsg_init_tableecryptfs_encrypt_and_encode_filenameecryptfs_keyring_auth_tok_for_sigfsstack_copy_inode_sizeecryptfs_init_crypt_ctx__kmallocper_cpu__current_taskkmem_cache_destroyalloc_pages_currentkobject_putrequest_keyvfs_createecryptfs_dir_fopsecryptfs.ko.debugYj.rodata.str1.1.rodata.str1.8.rela.data.rheldata.rela.rodata.symtab.strtab.shstrtab.rela__mcount_loc.note.gnu.build-id.rela__bug_table.rela.gnu.linkonce.this_module.note.module.sig.gnu_debuglink.rela__param.modinfo.rela.smp_locks__versions.rela.altinstructions.bss.altinstr_replacement.rela.text.rela.init.text.rela.exit.textm@$7pp2 RDMȤ B= 9  4x ``[ 2P2G,j45 x8%:P >@ H L M *NN& $t Hx  |0 P~0 ~ ~xA~0! IЯ"#Q ]