|
|
@@ -949,6 +949,7 @@ static int crypt_integrity_ctr(struct crypt_config *cc, struct dm_target *ti)
|
|
|
{
|
|
|
#ifdef CONFIG_BLK_DEV_INTEGRITY
|
|
|
struct blk_integrity *bi = blk_get_integrity(cc->dev->bdev->bd_disk);
|
|
|
+ struct mapped_device *md = dm_table_get_md(ti->table);
|
|
|
|
|
|
/* From now we require underlying device with our integrity profile */
|
|
|
if (!bi || strcasecmp(bi->profile->name, "DM-DIF-EXT-TAG")) {
|
|
|
@@ -968,7 +969,7 @@ static int crypt_integrity_ctr(struct crypt_config *cc, struct dm_target *ti)
|
|
|
|
|
|
if (crypt_integrity_aead(cc)) {
|
|
|
cc->integrity_tag_size = cc->on_disk_tag_size - cc->integrity_iv_size;
|
|
|
- DMINFO("Integrity AEAD, tag size %u, IV size %u.",
|
|
|
+ DMDEBUG("%s: Integrity AEAD, tag size %u, IV size %u.", dm_device_name(md),
|
|
|
cc->integrity_tag_size, cc->integrity_iv_size);
|
|
|
|
|
|
if (crypto_aead_setauthsize(any_tfm_aead(cc), cc->integrity_tag_size)) {
|
|
|
@@ -976,7 +977,7 @@ static int crypt_integrity_ctr(struct crypt_config *cc, struct dm_target *ti)
|
|
|
return -EINVAL;
|
|
|
}
|
|
|
} else if (cc->integrity_iv_size)
|
|
|
- DMINFO("Additional per-sector space %u bytes for IV.",
|
|
|
+ DMDEBUG("%s: Additional per-sector space %u bytes for IV.", dm_device_name(md),
|
|
|
cc->integrity_iv_size);
|
|
|
|
|
|
if ((cc->integrity_tag_size + cc->integrity_iv_size) != bi->tag_size) {
|