Package: ecryptfs-utils Version: 111-4 Severity: important Happening today on a mixed testing / unstable machine.
# mount -t ecryptfs test test Unable to link the KEY_SPEC_USER_KEYRING into the KEY_SPEC_SESSION_KEYRING; there is something wrong with your kernel keyring. Did you build key retention support into your kernel? This works with the same version of Debian, as virtual machine in QubesOS using a Qubes kernel. -- System Information: Debian Release: 10.0 APT prefers testing APT policy: (990, 'testing'), (700, 'unstable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 4.19.0-5-amd64 (SMP w/4 CPU cores) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_HK:en (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages ecryptfs-utils depends on: ii gettext-base 0.19.8.1-9 ii keyutils 1.6-6 ii libassuan0 2.5.2-1 ii libc6 2.28-10 ii libecryptfs1 111-4 ii libgpg-error0 1.35-1 ii libgpgme11 1.12.0-6 ii libkeyutils1 1.6-6 ii libpam-runtime 1.3.1-5 ii libpam0g 1.3.1-5 ii libtspi1 0.3.14+fixed1-1 ecryptfs-utils recommends no packages. Versions of packages ecryptfs-utils suggests: ii cryptsetup 2:2.1.0-5 -- no debconf information