Lines Matching refs:protection
12 protocols (SBC Data Integrity Field, SCC protection proposal) as well
15 metadata (or protection information in SCSI terminology) includes a
18 for some protection schemes also that the I/O is written to the right
25 DIF and the other integrity extensions is that the protection format
38 the protection information to be transferred to and from their
41 The SCSI Data Integrity Field works by appending 8 bytes of protection
81 The data integrity framework in Linux enables protection information
88 disadvantage. It means that the protection information must be in a
97 protection information to send to a disk. Consequently, the very
98 concept of an end-to-end protection scheme is a layering violation.
108 generate the protection information for any I/O. Eventually the
138 A kernel subsystem can enable data integrity protection on a bio by
150 Because the format of the protection data is tied to the physical
156 the protection data, as well as getting and setting application tags.
219 nr_pages indicate how many pages of protection data need to be