Lines Matching +full:device +full:- +full:tree

2 dm-verity
5 Device-Mapper's "verity" target provides transparent integrity checking of
7 This target is read-only.
21 This is the type of the on-disk hash format.
32 This is the device containing data, the integrity of which needs to be
33 checked. It may be specified as a path, like /dev/sdaX, or a device number,
37 This is the device that supplies the hash tree data. It may be
38 specified similarly to the device path and may be the same device. If the
39 same device is used, the hash_start should be outside the configured
40 dm-verity device.
43 The block size on a data device in bytes.
44 Each block corresponds to one digest on the hash device.
50 The number of data blocks on the data device. Additional blocks are
55 This is the offset, in <hash_block_size>-blocks, from the start of hash_dev
56 to the root block of the hash tree.
59 The cryptographic hash algorithm used for this device. This should
87 Panic the device when a corrupted block is discovered. This option is
97 verification fails. Use encoding data from the specified device. This
98 may be the same device where data and hash blocks reside, in which case
102 on the hash device after the hash blocks.
110 is M-N.
113 The number of encoding data blocks on the FEC device. The block size for
114 the FEC device is <data_block_size>.
118 FEC device to the beginning of the encoding data.
121 Verify data blocks only the first time they are read from the data device,
122 rather than every time. This reduces the overhead of dm-verity so that it
125 data device's content will be detected, not online tampering.
127 Hash blocks are still verified each time they are read from the hash device,
135 the root hash during the creation of the device mapper block device.
151 dm-verity is meant to be set up as part of a verified boot path. This
153 booting from a known-good device (like a USB drive or CD).
155 When a dm-verity device is configured, it is expected that the caller
157 After instantiation, all hashes will be verified on-demand during
159 tree, the root hash, then the I/O will fail. This should detect
160 tampering with any data on the device and the hash data.
162 Cryptographic hashes are used to assert the integrity of the device on a
163 per-block basis. This allows for a lightweight hash computation on first read
172 Hash Tree
173 ---------
175 Each node in the tree is a cryptographic hash. If it is a leaf node, the hash
179 Each entry in the tree is a collection of neighboring nodes that fit in one
181 selected cryptographic digest algorithm. The hashes are linearly-ordered in
185 The tree looks something like:
200 On-disk format
203 The verity kernel code does not read the verity metadata on-disk header.
205 It is expected that a user-space tool will verify the integrity of the
209 be passed via the kernel command-line in a rooted chain of trust where
210 the command-line is verified.
216 The full specification of kernel parameters and on-disk metadata format
228 Set up a device::
230 # dmsetup create vroot --readonly --table \
236 the hash tree or activate the kernel device. This is available from
240 Create hash on the device::
246 Activate the device::