Package: ecryptfs-utils
Version: 111-4
Severity: important

Happening today on a mixed testing / unstable machine.

# mount -t ecryptfs test test
Unable to link the KEY_SPEC_USER_KEYRING into the KEY_SPEC_SESSION_KEYRING; 
there is something wrong with your kernel keyring. 
Did you build key retention support into your kernel?

This works with the same version of Debian, as virtual machine in QubesOS using 
a Qubes kernel.

-- System Information:
Debian Release: 10.0
  APT prefers testing
  APT policy: (990, 'testing'), (700, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-5-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_HK:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages ecryptfs-utils depends on:
ii  gettext-base    0.19.8.1-9
ii  keyutils        1.6-6
ii  libassuan0      2.5.2-1
ii  libc6           2.28-10
ii  libecryptfs1    111-4
ii  libgpg-error0   1.35-1
ii  libgpgme11      1.12.0-6
ii  libkeyutils1    1.6-6
ii  libpam-runtime  1.3.1-5
ii  libpam0g        1.3.1-5
ii  libtspi1        0.3.14+fixed1-1

ecryptfs-utils recommends no packages.

Versions of packages ecryptfs-utils suggests:
ii  cryptsetup  2:2.1.0-5

-- no debconf information

Reply via email to