Device Mapper

The device mapper is a framework provided by the Linux kernel for mapping physical block devices onto higher-level virtual block devices. It forms the foundation of the logical volume manager (LVM), software RAIDs and dm-crypt disk encryption, and offers additional features such as file system snapshots.[1]

Device mapper works by passing data from a virtual block device, which is provided by the device mapper itself, to another block device. Data can be also modified in transition, which is performed, for example, in the case of device mapper providing disk encryption or simulation of unreliable hardware behavior.

This article focuses on the device mapper implementation in the Linux kernel, but the device mapper functionality is also available in both NetBSD and DragonFly BSD.[2][3]

Usage

Applications (like LVM2 and Enterprise Volume Management System (EVMS) that need to create new mapped devices talk to the device mapper via the libdevmapper.so shared library, which in turn issues ioctls to the /dev/mapper/control device node.[4] Configuration of the device mapper can be also examined and configured interactively‍—‌or from shell scripts‍—‌by using the dmsetup(8) utility.[5][6]

Both of these two userspace components have their source code maintained alongside the LVM2 source.[7]

Features

The position of the device mapper targets within various layers of the Linux kernel's storage stack.[8]

Functions provided by the device mapper include linear, striped and error mappings, as well as crypt and multipath targets. For example, two disks may be concatenated into one logical volume with a pair of linear mappings, one for each disk. As another example, crypt target encrypts the data passing through the specified device, by using the Linux kernel's Crypto API.[1]

The following mapping targets are available:[1][5]

  • cache – allows creation of hybrid volumes, by using solid-state drives (SSDs) as caches for hard disk drives (HDDs)
  • crypt – provides data encryption, by using the Linux kernel's Crypto API
  • delay – delays reads and/or writes to different devices (used for testing)
  • era – behaves in a way similar to the linear target, while it keeps track of blocks that were written to within a user-defined period of time[9]
  • error – simulates I/O errors for all mapped blocks (used for testing)
  • flakey – simulates periodic unreliable behaviour (used for testing)
  • linear – maps a continuous range of blocks onto another block device
  • mirror – maps a mirrored logical device, while providing data redundancy
  • multipath – supports the mapping of multipathed devices, through usage of their path groups
  • raid – offers an interface to the Linux kernel's software RAID driver (md)
  • snapshot and snapshot-origin – used for creation of LVM snapshots, as part of the underlying copy-on-write scheme
  • striped – stripes the data across physical devices, with the number of stripes and the striping chunk size as parameters
  • thin  – allows creation of devices larger than the underlying physical device, physical space is allocated only when written to
  • zero – an equivalent of /dev/zero, all reads return blocks of zeros, and writes are discarded

Applications

The following Linux kernel features and projects are built on top of the device mapper:

  • cryptsetup – utility used to conveniently setup disk encryption based on dm-crypt
  • dm-crypt/LUKS – mapping target that provides volume encryption
  • dm-cache – mapping target that allows creation of hybrid volumes
  • dm-integrity – mapping target that provides data integrity, either using checksumming or cryptographic verification[10][11], also used with LUKS[12]
  • dm-log-writes – mapping target that uses two devices, passing through the first device and logging the write operations performed to it on the second device[13]
  • dm-verity – validates the data blocks contained in a file system against a list of cryptographic hash values, developed as part of the Chromium OS project[14]
  • dmraid(8) – provides access to "fake" RAID configurations via the device mapper
  • DM Multipath – provides I/O failover and load-balancing of block devices within the Linux kernel
  • Docker – uses device mapper to create copy-on-write storage for software containers
  • DRBD (Distributed Replicated Block Device)
  • EVMS (deprecated)
  • kpartx(8) – utility called from hotplug upon device maps creation and deletion
  • LVM2 – logical volume manager for the Linux kernel
  • Linux version of TrueCrypt

References

  1. ^ a b c "Logical Volume Manager Administration, Appendix A. The Device Mapper". Red Hat. Retrieved .
  2. ^ "NetBSD Kernel Interfaces Manual: dm(4)". netbsd.gw.com. 2008-08-30. Retrieved .
  3. ^ "DragonFly On-Line Manual Pages: dm(4)". dragonflybsd.org. 2010-07-28. Retrieved .
  4. ^ "libdevmapper.h". sourceware.org. Retrieved .
  5. ^ a b "dmsetup(8) - Linux man page". man.cx. Retrieved .
  6. ^ "Logical Volume Manager Administration". Appendix A.2. The dmsetup Command. Red Hat. Retrieved .
  7. ^ "Device-mapper Resource Page". sourceware.org. Retrieved .
  8. ^ Werner Fischer; Georg Schönberger (2015-06-01). "Linux Storage Stack Diagram". Thomas-Krenn.AG. Retrieved .
  9. ^ "6. Block layer". Linux kernel 3.15. kernelnewbies.org. 2014-06-08. Retrieved .
  10. ^ "dm-integrity". cryptosetup project. 2018-04-30. Retrieved .
  11. ^ "dm-integrity target". kernel.org. 2017-05-13. Retrieved .
  12. ^ "cryptsetup - manage plain dm-crypt and LUKS encrypted volumes". 2018-01-01. Retrieved .
  13. ^ "Linux kernel documentation: Documentation/device-mapper/log-writes.txt". kernel.org. 2015-05-29. Retrieved .
  14. ^ Jonathan Corbet (2011-09-19). "dm-verity". LWN.net. Retrieved .

External links


  This article uses material from the Wikipedia page available here. It is released under the Creative Commons Attribution-Share-Alike License 3.0.

Device_mapper
 



 

Connect with defaultLogic
What We've Done
Led Digital Marketing Efforts of Top 500 e-Retailers.
Worked with Top Brands at Leading Agencies.
Successfully Managed Over $50 million in Digital Ad Spend.
Developed Strategies and Processes that Enabled Brands to Grow During an Economic Downturn.
Taught Advanced Internet Marketing Strategies at the graduate level.


Manage research, learning and skills at defaultlogic.com. Create an account using LinkedIn to manage and organize your omni-channel knowledge. defaultlogic.com is like a shopping cart for information -- helping you to save, discuss and share.


  Contact Us