Symbol: ecryptfs_printk
fs/ecryptfs/crypto.c
100
ecryptfs_printk(KERN_DEBUG, "source:\n");
fs/ecryptfs/crypto.c
106
ecryptfs_printk(KERN_DEBUG, "derived iv:\n");
fs/ecryptfs/crypto.c
1194
ecryptfs_printk(KERN_WARNING, "File version is [%d]; only "
fs/ecryptfs/crypto.c
1207
ecryptfs_printk(KERN_WARNING, "Error reading header "
fs/ecryptfs/crypto.c
1927
ecryptfs_printk(KERN_DEBUG,
fs/ecryptfs/crypto.c
231
ecryptfs_printk(KERN_DEBUG, "Key size [%zd]; key:\n",
fs/ecryptfs/crypto.c
253
ecryptfs_printk(KERN_ERR,
fs/ecryptfs/crypto.c
367
ecryptfs_printk(KERN_ERR, "Error allocating memory for "
fs/ecryptfs/crypto.c
391
ecryptfs_printk(KERN_ERR,
fs/ecryptfs/crypto.c
440
ecryptfs_printk(KERN_ERR,
fs/ecryptfs/crypto.c
478
ecryptfs_printk(KERN_DEBUG,
fs/ecryptfs/crypto.c
496
ecryptfs_printk(KERN_ERR, "cryptfs: init_crypt_ctx(): "
fs/ecryptfs/crypto.c
557
ecryptfs_printk(KERN_WARNING, "Session key not valid; "
fs/ecryptfs/crypto.c
574
ecryptfs_printk(KERN_DEBUG, "Generated new session key:\n");
fs/ecryptfs/crypto.c
702
ecryptfs_printk(KERN_ERR, "Error initializing cryptographic "
fs/ecryptfs/crypto.c
723
ecryptfs_printk(KERN_DEBUG, "m_1 = [0x%.8x]; m_2 = [0x%.8x]; "
fs/ecryptfs/crypto.c
726
ecryptfs_printk(KERN_DEBUG, "(m_1 ^ MAGIC_ECRYPTFS_MARKER) = "
fs/ecryptfs/crypto.c
876
ecryptfs_printk(KERN_WARNING, "Cipher code not recognized: "
fs/ecryptfs/crypto.c
89
ecryptfs_printk(KERN_DEBUG, "root iv:\n");
fs/ecryptfs/crypto.c
973
ecryptfs_printk(KERN_WARNING, "Error generating key packet "
fs/ecryptfs/debug.c
23
ecryptfs_printk(KERN_DEBUG, "Auth tok at mem loc [%p]:\n",
fs/ecryptfs/debug.c
26
ecryptfs_printk(KERN_DEBUG, " * private key type\n");
fs/ecryptfs/debug.c
28
ecryptfs_printk(KERN_DEBUG, " * passphrase type\n");
fs/ecryptfs/debug.c
31
ecryptfs_printk(KERN_DEBUG, " * salt = [%s]\n", salt);
fs/ecryptfs/debug.c
34
ecryptfs_printk(KERN_DEBUG, " * persistent\n");
fs/ecryptfs/debug.c
39
ecryptfs_printk(KERN_DEBUG, " * signature = [%s]\n", sig);
fs/ecryptfs/debug.c
41
ecryptfs_printk(KERN_DEBUG, " * session_key.flags = [0x%x]\n",
fs/ecryptfs/debug.c
45
ecryptfs_printk(KERN_DEBUG,
fs/ecryptfs/debug.c
49
ecryptfs_printk(KERN_DEBUG,
fs/ecryptfs/debug.c
52
ecryptfs_printk(KERN_DEBUG, " * Contains decrypted key\n");
fs/ecryptfs/debug.c
53
ecryptfs_printk(KERN_DEBUG,
fs/ecryptfs/debug.c
56
ecryptfs_printk(KERN_DEBUG, " * Decrypted session key "
fs/ecryptfs/debug.c
63
ecryptfs_printk(KERN_DEBUG, " * Contains encrypted key\n");
fs/ecryptfs/debug.c
64
ecryptfs_printk(KERN_DEBUG,
fs/ecryptfs/debug.c
67
ecryptfs_printk(KERN_DEBUG, " * Encrypted session key "
fs/ecryptfs/file.c
221
ecryptfs_printk(KERN_ERR,
fs/ecryptfs/file.c
229
ecryptfs_printk(KERN_DEBUG, "Setting flags for stat...\n");
fs/ecryptfs/file.c
255
ecryptfs_printk(KERN_DEBUG, "inode w/ addr = [0x%p], i_ino = "
fs/ecryptfs/file.c
290
ecryptfs_printk(KERN_ERR,
fs/ecryptfs/file.c
96
ecryptfs_printk(KERN_DEBUG,
fs/ecryptfs/inode.c
233
ecryptfs_printk(KERN_DEBUG, "This is a directory\n");
fs/ecryptfs/inode.c
237
ecryptfs_printk(KERN_DEBUG, "Initializing crypto context\n");
fs/ecryptfs/inode.c
240
ecryptfs_printk(KERN_ERR, "Error creating new file "
fs/ecryptfs/inode.c
279
ecryptfs_printk(KERN_WARNING, "Failed to create file in"
fs/ecryptfs/inode.c
418
ecryptfs_printk(KERN_DEBUG, "%s: lookup_noperm() returned "
fs/ecryptfs/keystore.c
103
ecryptfs_printk(KERN_ERR, "Error parsing packet length\n");
fs/ecryptfs/keystore.c
1106
ecryptfs_printk(KERN_ERR, "Failed to write tag 64 packet\n");
fs/ecryptfs/keystore.c
1111
ecryptfs_printk(KERN_ERR, "Error sending message to "
fs/ecryptfs/keystore.c
1117
ecryptfs_printk(KERN_ERR, "Failed to receive tag 65 packet "
fs/ecryptfs/keystore.c
1137
ecryptfs_printk(KERN_ERR, "Cipher code [%d] is invalid\n",
fs/ecryptfs/keystore.c
1143
ecryptfs_printk(KERN_DEBUG, "Decrypted session key:\n");
fs/ecryptfs/keystore.c
136
ecryptfs_printk(KERN_WARNING,
fs/ecryptfs/keystore.c
1450
ecryptfs_printk(KERN_ERR, "Unsupported hash algorithm: "
fs/ecryptfs/keystore.c
1620
ecryptfs_printk(
fs/ecryptfs/keystore.c
165
ecryptfs_printk(KERN_ERR, "Unable to allocate memory\n");
fs/ecryptfs/keystore.c
1693
ecryptfs_printk(KERN_DEBUG, "FEK of size [%zd]:\n",
fs/ecryptfs/keystore.c
173
ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet "
fs/ecryptfs/keystore.c
1749
ecryptfs_printk(KERN_ERR, "Error parsing "
fs/ecryptfs/keystore.c
1762
ecryptfs_printk(KERN_ERR, "No valid "
fs/ecryptfs/keystore.c
1773
ecryptfs_printk(KERN_ERR, "Expected "
fs/ecryptfs/keystore.c
1791
ecryptfs_printk(KERN_ERR, "Error parsing "
fs/ecryptfs/keystore.c
1800
ecryptfs_printk(KERN_WARNING, "Invalid packet set "
fs/ecryptfs/keystore.c
1805
ecryptfs_printk(KERN_DEBUG, "No packet at offset [%zd] "
fs/ecryptfs/keystore.c
1829
ecryptfs_printk(KERN_DEBUG,
fs/ecryptfs/keystore.c
184
ecryptfs_printk(KERN_ERR, "Error generating tag 64 packet "
fs/ecryptfs/keystore.c
1852
ecryptfs_printk(KERN_ERR, "Could not find a usable "
fs/ecryptfs/keystore.c
1882
ecryptfs_printk(KERN_WARNING, "Error decrypting the "
fs/ecryptfs/keystore.c
1904
ecryptfs_printk(KERN_ERR, "Error computing "
fs/ecryptfs/keystore.c
1910
ecryptfs_printk(KERN_ERR, "Error initializing crypto "
fs/ecryptfs/keystore.c
1940
ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet\n");
fs/ecryptfs/keystore.c
1945
ecryptfs_printk(KERN_ERR, "Error sending message to "
fs/ecryptfs/keystore.c
1951
ecryptfs_printk(KERN_ERR, "Failed to receive tag 67 packet "
fs/ecryptfs/keystore.c
1958
ecryptfs_printk(KERN_ERR, "Error parsing tag 67 packet\n");
fs/ecryptfs/keystore.c
2016
ecryptfs_printk(KERN_DEBUG, "Encrypted key:\n");
fs/ecryptfs/keystore.c
2040
ecryptfs_printk(KERN_ERR, "Error generating tag 1 packet "
fs/ecryptfs/keystore.c
2191
ecryptfs_printk(KERN_DEBUG, "encrypted_session_key_valid != 0; "
fs/ecryptfs/keystore.c
2202
ecryptfs_printk(KERN_DEBUG, "Using previously generated "
fs/ecryptfs/keystore.c
2209
ecryptfs_printk(KERN_DEBUG,
fs/ecryptfs/keystore.c
2215
ecryptfs_printk(KERN_DEBUG, "Session key encryption key:\n");
fs/ecryptfs/keystore.c
2221
ecryptfs_printk(KERN_ERR, "Error generating scatterlist "
fs/ecryptfs/keystore.c
2231
ecryptfs_printk(KERN_ERR, "Error generating scatterlist "
fs/ecryptfs/keystore.c
224
ecryptfs_printk(KERN_ERR, "Type should be ECRYPTFS_TAG_65\n");
fs/ecryptfs/keystore.c
2244
ecryptfs_printk(KERN_ERR, "Error setting key for crypto "
fs/ecryptfs/keystore.c
2252
ecryptfs_printk(KERN_ERR, "Out of kernel memory whilst "
fs/ecryptfs/keystore.c
2263
ecryptfs_printk(KERN_DEBUG, "Encrypting [%zd] bytes of the key\n",
fs/ecryptfs/keystore.c
2274
ecryptfs_printk(KERN_DEBUG, "This should be the encrypted key:\n");
fs/ecryptfs/keystore.c
2276
ecryptfs_printk(KERN_DEBUG, "EFEK of size [%zd]:\n",
fs/ecryptfs/keystore.c
229
ecryptfs_printk(KERN_ERR, "Status indicator has non-zero value "
fs/ecryptfs/keystore.c
2318
ecryptfs_printk(KERN_WARNING, "Unable to generate code for "
fs/ecryptfs/keystore.c
236
ecryptfs_printk(KERN_WARNING, "Error parsing packet length; "
fs/ecryptfs/keystore.c
2402
ecryptfs_printk(KERN_WARNING, "Error "
fs/ecryptfs/keystore.c
2412
ecryptfs_printk(KERN_ERR, "Error writing "
fs/ecryptfs/keystore.c
242
ecryptfs_printk(KERN_ERR, "The message received from ecryptfsd "
fs/ecryptfs/keystore.c
2422
ecryptfs_printk(KERN_WARNING, "Error "
fs/ecryptfs/keystore.c
2430
ecryptfs_printk(KERN_WARNING, "Unsupported "
fs/ecryptfs/keystore.c
2439
ecryptfs_printk(KERN_ERR, "Error writing boundary byte\n");
fs/ecryptfs/keystore.c
248
ecryptfs_printk(KERN_ERR,
fs/ecryptfs/keystore.c
258
ecryptfs_printk(KERN_ERR, "key_size [%d] larger than "
fs/ecryptfs/keystore.c
273
ecryptfs_printk(KERN_ERR, "Invalid checksum for file "
fs/ecryptfs/keystore.c
310
ecryptfs_printk(KERN_ERR, "Unable to allocate memory\n");
fs/ecryptfs/keystore.c
318
ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet "
fs/ecryptfs/keystore.c
329
ecryptfs_printk(KERN_ERR, "Error generating tag 66 packet "
fs/ecryptfs/keystore.c
34
ecryptfs_printk(KERN_WARNING, "No key\n");
fs/ecryptfs/keystore.c
38
ecryptfs_printk(KERN_WARNING, "Key expired\n");
fs/ecryptfs/keystore.c
388
ecryptfs_printk(KERN_WARNING, "Error parsing packet length; "
fs/ecryptfs/keystore.c
42
ecryptfs_printk(KERN_WARNING, "Key revoked\n");
fs/ecryptfs/keystore.c
427
ecryptfs_printk(KERN_ERR, "Major version number mismatch. "
fs/ecryptfs/keystore.c
434
ecryptfs_printk(KERN_ERR, "Minor version number mismatch. "
fs/ecryptfs/keystore.c
46
ecryptfs_printk(KERN_WARNING, "Unknown error code: "
fs/ecryptfs/keystore.c
59
ecryptfs_printk(KERN_WARNING, "Missing auth tok\n");
fs/ecryptfs/keystore.c
62
ecryptfs_printk(KERN_WARNING, "Invalid auth tok\n");
fs/ecryptfs/keystore.c
98
ecryptfs_printk(KERN_ERR, "Five-byte packet length not "
fs/ecryptfs/main.c
349
ecryptfs_printk(KERN_ERR, "You must supply at least one valid "
fs/ecryptfs/main.c
376
ecryptfs_printk(KERN_ERR,
fs/ecryptfs/main.c
486
ecryptfs_printk(KERN_WARNING, "kern_path() failed\n");
fs/ecryptfs/main.c
750
ecryptfs_printk(KERN_WARNING, "%s: "
fs/ecryptfs/main.c
810
ecryptfs_printk(KERN_ERR, "The eCryptfs extent size is "
fs/ecryptfs/miscdev.c
433
ecryptfs_printk(KERN_WARNING, "Dropping miscdev "
fs/ecryptfs/mmap.c
199
ecryptfs_printk(KERN_ERR, "Error decrypting page; "
fs/ecryptfs/mmap.c
205
ecryptfs_printk(KERN_DEBUG, "Unlocking folio with index = [0x%.16lx]\n",
fs/ecryptfs/mmap.c
39
ecryptfs_printk(KERN_WARNING,
fs/ecryptfs/mmap.c
453
ecryptfs_printk(KERN_DEBUG, "Calling fill_zeros_to_end_of_page"
fs/ecryptfs/mmap.c
475
ecryptfs_printk(KERN_WARNING, "Error attempting to fill "
fs/ecryptfs/mmap.c
481
ecryptfs_printk(KERN_WARNING, "Error encrypting page (upper "
fs/ecryptfs/mmap.c
487
ecryptfs_printk(KERN_DEBUG, "Expanded file size to "