Lines Matching +full:os +full:- +full:data +full:- +full:offset
2 dm-verity
5 Device-Mapper's "verity" target provides transparent integrity checking of
7 This target is read-only.
21 This is the type of the on-disk hash format.
23 0 is the original format used in the Chromium OS.
32 This is the device containing data, the integrity of which needs to be
37 This is the device that supplies the hash tree data. It may be
40 dm-verity device.
43 The block size on a data device in bytes.
50 The number of data blocks on the data device. Additional blocks are
51 inaccessible. You can place hashes to the same partition as data, in this
55 This is the offset, in <hash_block_size>-blocks, from the start of hash_dev
97 verification fails. Use encoding data from the specified device. This
98 may be the same device where data and hash blocks reside, in which case
99 fec_start must be outside data and hash areas.
101 If the encoding data covers additional metadata, it must be accessible
104 Note: block sizes for data and hash devices must match. Also, if the
109 the encoding data. For example, in RS(M, N) encoding, the number of roots
110 is M-N.
113 The number of encoding data blocks on the FEC device. The block size for
116 fec_start <offset>
117 This is the offset, in <data_block_size> blocks, from the start of the
118 FEC device to the beginning of the encoding data.
121 Verify data blocks only the first time they are read from the data device,
122 rather than every time. This reduces the overhead of dm-verity so that it
125 data device's content will be detected, not online tampering.
128 since verification of hash blocks is less performance critical than data
129 blocks, and a hash block will not be verified any more after all the data
146 verify data blocks in bottom half instead of workqueue. This option can
158 dm-verity is meant to be set up as part of a verified boot path. This
160 booting from a known-good device (like a USB drive or CD).
162 When a dm-verity device is configured, it is expected that the caller
164 After instantiation, all hashes will be verified on-demand during
167 tampering with any data on the device and the hash data.
170 per-block basis. This allows for a lightweight hash computation on first read
175 corrupted data will be verified using the cryptographic hash of the
176 corresponding data. This is why combining error correction with
180 ---------
183 of some data block on disk is calculated. If it is an intermediary node,
188 selected cryptographic digest algorithm. The hashes are linearly-ordered in
207 On-disk format
210 The verity kernel code does not read the verity metadata on-disk header.
212 It is expected that a user-space tool will verify the integrity of the
216 be passed via the kernel command-line in a rooted chain of trust where
217 the command-line is verified.
223 The full specification of kernel parameters and on-disk metadata format
237 # dmsetup create vroot --readonly --table \