Lines Matching full:hence
35 up, the more likely that the cause will be lost in the noise. Hence the primary
49 Hence most of the time spent on forensic analysis is spent doing basic
50 verification of metadata values, looking for values that are in range (and hence
57 Hence we need to record more information into the metadata to allow us to
60 ensure that common types of errors are easily detectable. Hence the concept of
66 hence parse and verify the metadata object. IF we can't independently identify
72 magic numbers. Hence we can change the on-disk format of all these objects to
81 not been changed as a result of external influences. Hence we need some form of
87 hence a 32 bit CRC is more than sufficient to detect multi-bit errors in
101 written to the "correct block" of the wrong filesystem. Hence location
109 object, we don't know what inode it belongs to and hence have to walk the entire
118 freespace btree blocks are owned by an allocation group. Hence the size and
143 checkpoint and hence have some idea of how much modification occurred between
162 sibling pointer lists). Hence we still need stateful checking in the main code
218 well. hence the additional metadata headers change the overall format
335 buffer. Hence we do not use per-buffer verifiers to do the work of per-object