"Fossies" - the Fresh Open Source Software Archive

Member "cryptsetup-2.4.3/docs/v1.7.2-ReleaseNotes" (8 Mar 2021, 1487 Bytes) of package /linux/misc/cryptsetup-2.4.3.tar.xz:


As a special service "Fossies" has tried to format the requested text file into HTML format (style: standard) with prefixed line numbers. Alternatively you can here view or download the uninterpreted source code file.

    1 Cryptsetup 1.7.2 Release Notes
    2 ==============================
    3 
    4 Changes since version 1.7.1
    5 
    6 * Update LUKS documentation format.
    7   Clarify fixed sector size and keyslots alignment.
    8 
    9 * Support activation options for error handling modes in Linux kernel
   10   dm-verity module:
   11 
   12   --ignore-corruption - dm-verity just logs detected corruption
   13 
   14   --restart-on-corruption - dm-verity restarts the kernel if corruption is detected
   15 
   16   If the options above are not specified, default behavior for dm-verity remains.
   17   Default is that I/O operation fails with I/O error if corrupted block is detected.
   18 
   19   --ignore-zero-blocks - Instructs dm-verity to not verify blocks that are expected
   20   to contain zeroes and always return zeroes directly instead.
   21 
   22   NOTE that these options could have security or functional impacts,
   23   do not use them without assessing the risks!
   24 
   25 * Fix help text for cipher benchmark specification (mention --cipher option).
   26 
   27 * Fix off-by-one error in maximum keyfile size.
   28   Allow keyfiles up to compiled-in default and not that value minus one.
   29 
   30 * Support resume of interrupted decryption in cryptsetup-reencrypt utility.
   31   To resume decryption, LUKS device UUID (--uuid option) option must be used.
   32 
   33 * Do not use direct-io for LUKS header with unaligned keyslots.
   34   Such headers were used only by the first cryptsetup-luks-1.0.0 release (2005).
   35 
   36 * Fix device block size detection to properly work on particular file-based
   37   containers over underlying devices with 4k sectors.