This patch set adds in-kernel pkcs7 signature checking for the roothash of
the dm-verity hash tree.
The verification is to support cases where the roothash is not secured by
Trusted Boot, UEFI Secureboot or similar technologies.
One of the use cases for this is for dm-verity volumes mounted after b
The verification is to support cases where the roothash is not secured by
Trusted Boot, UEFI Secureboot or similar technologies.
One of the use cases for this is for dm-verity volumes mounted after boot,
the root hash provided during the creation of the dm-verity volume has to
be secure and thus in
All of the code that uses vector_foreach_slot_backwards() treats "i" as
the index of the entry "p", but the way it was coded, that wasn't the
case. "i" was the number of the entry counting from 1, not 0.
Signed-off-by: Benjamin Marzinski
---
libmultipath/vector.h | 2 +-
1 file changed, 1 insert
On Fri, May 24, 2019 at 05:00:51PM +0200, Andrea Gelmini wrote:
> Hi Mike,
>I'm doing setup to replicate and test the condition. I see your
> patch is already in the 5.2 dev kernel.
>I'm going to try with latest git, and see what happens. Anyway,
> don't you this it would be good
>to ha
Hi Mike,
I'm doing setup to replicate and test the condition. I see your
patch is already in the 5.2 dev kernel.
I'm going to try with latest git, and see what happens. Anyway,
don't you this it would be good
to have this patch ( 51b86f9a8d1c4bb4e3862ee4b4c5f46072f7520d )
anyway in the 5.1