ecryptfs_printk
ecryptfs_printk(KERN_DEBUG, "source:\n");
ecryptfs_printk(KERN_DEBUG, "derived iv:\n");
ecryptfs_printk(KERN_WARNING, "File version is [%d]; only "
ecryptfs_printk(KERN_WARNING, "Error reading header "
ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk(KERN_DEBUG, "Key size [%zd]; key:\n",
ecryptfs_printk(KERN_ERR,
ecryptfs_printk(KERN_ERR, "Error allocating memory for "
ecryptfs_printk(KERN_ERR,
ecryptfs_printk(KERN_ERR,
ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk(KERN_ERR, "cryptfs: init_crypt_ctx(): "
ecryptfs_printk(KERN_WARNING, "Session key not valid; "
ecryptfs_printk(KERN_DEBUG, "Generated new session key:\n");
ecryptfs_printk(KERN_ERR, "Error initializing cryptographic "
ecryptfs_printk(KERN_DEBUG, "m_1 = [0x%.8x]; m_2 = [0x%.8x]; "
ecryptfs_printk(KERN_DEBUG, "(m_1 ^ MAGIC_ECRYPTFS_MARKER) = "
ecryptfs_printk(KERN_WARNING, "Cipher code not recognized: "
ecryptfs_printk(KERN_DEBUG, "root iv:\n");
ecryptfs_printk(KERN_WARNING, "Error generating key packet "
ecryptfs_printk(KERN_DEBUG, "Auth tok at mem loc [%p]:\n",
ecryptfs_printk(KERN_DEBUG, " * private key type\n");
ecryptfs_printk(KERN_DEBUG, " * passphrase type\n");
ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt);
ecryptfs_printk(KERN_DEBUG, " * persistent\n");
ecryptfs_printk(KERN_DEBUG, " * signature = [%s]\n", sig);
ecryptfs_printk(KERN_DEBUG, " * session_key.flags = [0x%x]\n",
ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk(KERN_DEBUG, " * Contains decrypted key\n");
ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk(KERN_DEBUG, " * Decrypted session key "
ecryptfs_printk(KERN_DEBUG, " * Contains encrypted key\n");
ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk(KERN_DEBUG, " * Encrypted session key "
ecryptfs_printk(KERN_ERR,
ecryptfs_printk(KERN_DEBUG, "Setting flags for stat...\n");
ecryptfs_printk(KERN_DEBUG, "inode w/ addr = [0x%p], i_ino = "
ecryptfs_printk(KERN_ERR,
ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk(KERN_DEBUG, "This is a directory\n");
ecryptfs_printk(KERN_DEBUG, "Initializing crypto context\n");
ecryptfs_printk(KERN_ERR, "Error creating new file "
ecryptfs_printk(KERN_WARNING, "Failed to create file in"
ecryptfs_printk(KERN_DEBUG, "%s: lookup_noperm() returned "
ecryptfs_printk(KERN_ERR, "Error parsing packet length\n");
ecryptfs_printk(KERN_ERR, "Failed to write tag 64 packet\n");
ecryptfs_printk(KERN_ERR, "Error sending message to "
ecryptfs_printk(KERN_ERR, "Failed to receive tag 65 packet "
ecryptfs_printk(KERN_ERR, "Cipher code [%d] is invalid\n",
ecryptfs_printk(KERN_DEBUG, "Decrypted session key:\n");
ecryptfs_printk(KERN_WARNING,
ecryptfs_printk(KERN_ERR, "Unsupported hash algorithm: "
ecryptfs_printk(
ecryptfs_printk(KERN_ERR, "Unable to allocate memory\n");
ecryptfs_printk(KERN_DEBUG, "FEK of size [%zd]:\n",
ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet "
ecryptfs_printk(KERN_ERR, "Error parsing "
ecryptfs_printk(KERN_ERR, "No valid "
ecryptfs_printk(KERN_ERR, "Expected "
ecryptfs_printk(KERN_ERR, "Error parsing "
ecryptfs_printk(KERN_WARNING, "Invalid packet set "
ecryptfs_printk(KERN_DEBUG, "No packet at offset [%zd] "
ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet "
ecryptfs_printk(KERN_ERR, "Could not find a usable "
ecryptfs_printk(KERN_WARNING, "Error decrypting the "
ecryptfs_printk(KERN_ERR, "Error computing "
ecryptfs_printk(KERN_ERR, "Error initializing crypto "
ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet\n");
ecryptfs_printk(KERN_ERR, "Error sending message to "
ecryptfs_printk(KERN_ERR, "Failed to receive tag 67 packet "
ecryptfs_printk(KERN_ERR, "Error parsing tag 67 packet\n");
ecryptfs_printk(KERN_DEBUG, "Encrypted key:\n");
ecryptfs_printk(KERN_ERR, "Error generating tag 1 packet "
ecryptfs_printk(KERN_DEBUG, "encrypted_session_key_valid != 0; "
ecryptfs_printk(KERN_DEBUG, "Using previously generated "
ecryptfs_printk(KERN_DEBUG,
ecryptfs_printk(KERN_DEBUG, "Session key encryption key:\n");
ecryptfs_printk(KERN_ERR, "Error generating scatterlist "
ecryptfs_printk(KERN_ERR, "Error generating scatterlist "
ecryptfs_printk(KERN_ERR, "Type should be ECRYPTFS_TAG_65\n");
ecryptfs_printk(KERN_ERR, "Error setting key for crypto "
ecryptfs_printk(KERN_ERR, "Out of kernel memory whilst "
ecryptfs_printk(KERN_DEBUG, "Encrypting [%zd] bytes of the key\n",
ecryptfs_printk(KERN_DEBUG, "This should be the encrypted key:\n");
ecryptfs_printk(KERN_DEBUG, "EFEK of size [%zd]:\n",
ecryptfs_printk(KERN_ERR, "Status indicator has non-zero value "
ecryptfs_printk(KERN_WARNING, "Unable to generate code for "
ecryptfs_printk(KERN_WARNING, "Error parsing packet length; "
ecryptfs_printk(KERN_WARNING, "Error "
ecryptfs_printk(KERN_ERR, "Error writing "
ecryptfs_printk(KERN_ERR, "The message received from ecryptfsd "
ecryptfs_printk(KERN_WARNING, "Error "
ecryptfs_printk(KERN_WARNING, "Unsupported "
ecryptfs_printk(KERN_ERR, "Error writing boundary byte\n");
ecryptfs_printk(KERN_ERR,
ecryptfs_printk(KERN_ERR, "key_size [%d] larger than "
ecryptfs_printk(KERN_ERR, "Invalid checksum for file "
ecryptfs_printk(KERN_ERR, "Unable to allocate memory\n");
ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet "
ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet "
ecryptfs_printk(KERN_WARNING, "No key\n");
ecryptfs_printk(KERN_WARNING, "Key expired\n");
ecryptfs_printk(KERN_WARNING, "Error parsing packet length; "
ecryptfs_printk(KERN_WARNING, "Key revoked\n");
ecryptfs_printk(KERN_ERR, "Major version number mismatch. "
ecryptfs_printk(KERN_ERR, "Minor version number mismatch. "
ecryptfs_printk(KERN_WARNING, "Unknown error code: "
ecryptfs_printk(KERN_WARNING, "Missing auth tok\n");
ecryptfs_printk(KERN_WARNING, "Invalid auth tok\n");
ecryptfs_printk(KERN_ERR, "Five-byte packet length not "
ecryptfs_printk(KERN_ERR, "You must supply at least one valid "
ecryptfs_printk(KERN_ERR,
ecryptfs_printk(KERN_WARNING, "kern_path() failed\n");
ecryptfs_printk(KERN_WARNING, "%s: "
ecryptfs_printk(KERN_ERR, "The eCryptfs extent size is "
ecryptfs_printk(KERN_WARNING, "Dropping miscdev "
ecryptfs_printk(KERN_ERR, "Error decrypting page; "
ecryptfs_printk(KERN_DEBUG, "Unlocking folio with index = [0x%.16lx]\n",
ecryptfs_printk(KERN_WARNING,
ecryptfs_printk(KERN_DEBUG, "Calling fill_zeros_to_end_of_page"
ecryptfs_printk(KERN_WARNING, "Error attempting to fill "
ecryptfs_printk(KERN_WARNING, "Error encrypting page (upper "
ecryptfs_printk(KERN_DEBUG, "Expanded file size to "