• Home
  • Raw
  • Download

Lines Matching refs:ti

83 	return v->data_start + dm_target_offset(v->ti, bi_sector);  in verity_map_sector()
220 struct mapped_device *md = dm_table_get_md(v->ti->table); in verity_handle_err()
286 struct bio *bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size); in verity_verify_level()
378 struct bio *bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size); in verity_for_io_block()
425 struct bio *bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size); in verity_for_bv_block()
466 struct bio *bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size); in verity_bv_skip_block()
481 struct bio *bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size); in verity_verify_io()
567 struct bio *bio = dm_bio_from_per_bio_data(io, v->ti->per_io_data_size); in verity_finish_io()
678 static int verity_map(struct dm_target *ti, struct bio *bio) in verity_map() argument
680 struct dm_verity *v = ti->private; in verity_map()
701 io = dm_per_bio_data(bio, ti->per_io_data_size); in verity_map()
723 static void verity_status(struct dm_target *ti, status_type_t type, in verity_status() argument
726 struct dm_verity *v = ti->private; in verity_status()
794 DMEMIT_TARGET_NAME_VERSION(ti->type); in verity_status()
838 static int verity_prepare_ioctl(struct dm_target *ti, struct block_device **bdev) in verity_prepare_ioctl() argument
840 struct dm_verity *v = ti->private; in verity_prepare_ioctl()
845 ti->len != i_size_read(v->data_dev->bdev->bd_inode) >> SECTOR_SHIFT) in verity_prepare_ioctl()
850 static int verity_iterate_devices(struct dm_target *ti, in verity_iterate_devices() argument
853 struct dm_verity *v = ti->private; in verity_iterate_devices()
855 return fn(ti, v->data_dev, v->data_start, ti->len, data); in verity_iterate_devices()
858 static void verity_io_hints(struct dm_target *ti, struct queue_limits *limits) in verity_io_hints() argument
860 struct dm_verity *v = ti->private; in verity_io_hints()
871 static void verity_dtr(struct dm_target *ti) in verity_dtr() argument
873 struct dm_verity *v = ti->private; in verity_dtr()
892 dm_put_device(ti, v->hash_dev); in verity_dtr()
895 dm_put_device(ti, v->data_dev); in verity_dtr()
906 struct dm_target *ti = v->ti; in verity_alloc_most_once() local
910 ti->error = "device too large to use check_at_most_once"; in verity_alloc_most_once()
918 ti->error = "failed to allocate bitset for check_at_most_once"; in verity_alloc_most_once()
983 struct dm_target *ti = v->ti; in verity_parse_opt_args() local
990 r = dm_read_arg_group(_args, as, &argc, &ti->error); in verity_parse_opt_args()
1004 ti->error = "Conflicting error handling parameters"; in verity_parse_opt_args()
1012 ti->error = "Cannot allocate zero digest"; in verity_parse_opt_args()
1038 ti->error = "Unrecognized verity feature request"; in verity_parse_opt_args()
1059 static int verity_ctr(struct dm_target *ti, unsigned argc, char **argv) in verity_ctr() argument
1074 ti->error = "Cannot allocate verity structure"; in verity_ctr()
1077 ti->private = v; in verity_ctr()
1078 v->ti = ti; in verity_ctr()
1084 if ((dm_table_get_mode(ti->table) & ~FMODE_READ)) { in verity_ctr()
1085 ti->error = "Device must be readonly"; in verity_ctr()
1091 ti->error = "Not enough arguments"; in verity_ctr()
1098 ti->error = "Invalid version"; in verity_ctr()
1104 r = dm_get_device(ti, argv[1], FMODE_READ, &v->data_dev); in verity_ctr()
1106 ti->error = "Data device lookup failed"; in verity_ctr()
1110 r = dm_get_device(ti, argv[2], FMODE_READ, &v->hash_dev); in verity_ctr()
1112 ti->error = "Hash device lookup failed"; in verity_ctr()
1120 ti->error = "Invalid data device block size"; in verity_ctr()
1130 ti->error = "Invalid hash device block size"; in verity_ctr()
1139 ti->error = "Invalid data blocks"; in verity_ctr()
1145 if (ti->len > (v->data_blocks << (v->data_dev_block_bits - SECTOR_SHIFT))) { in verity_ctr()
1146 ti->error = "Data device is too small"; in verity_ctr()
1154 ti->error = "Invalid hash start"; in verity_ctr()
1162 ti->error = "Cannot allocate algorithm name"; in verity_ctr()
1169 ti->error = "Cannot initialize hash function"; in verity_ctr()
1185 ti->error = "Digest size too big"; in verity_ctr()
1194 ti->error = "Cannot allocate root digest"; in verity_ctr()
1200 ti->error = "Invalid root digest"; in verity_ctr()
1210 ti->error = "Cannot allocate salt"; in verity_ctr()
1216 ti->error = "Invalid salt"; in verity_ctr()
1241 ti->error = "Root hash verification failed"; in verity_ctr()
1255 ti->error = "Too many tree levels"; in verity_ctr()
1267 ti->error = "Hash device offset overflow"; in verity_ctr()
1279 ti->error = "Cannot initialize dm-bufio"; in verity_ctr()
1286 ti->error = "Hash device is too small"; in verity_ctr()
1302 ti->error = "Cannot allocate workqueue"; in verity_ctr()
1307 ti->per_io_data_size = sizeof(struct dm_verity_io) + in verity_ctr()
1314 ti->per_io_data_size = roundup(ti->per_io_data_size, in verity_ctr()
1324 verity_dtr(ti); in verity_ctr()