integrity-scrub

Crates.iointegrity-scrub
lib.rsintegrity-scrub
version0.6.4
sourcesrc
created_at2021-10-29 23:07:20.833893
updated_at2024-03-16 12:20:01.212951
descriptionScrub dm-integrity volumes
homepage
repositoryhttps://github.com/illdefined/integrity-scrub
max_upload_size
id474218
size28,800
Mikael (illdefined)

documentation

README

Synopsis

This tool attempts to read all logical sectors of a block device, overwriting any sector that cannot be read due to an I/O error with zeros. It is intended to restore Linux dm-integrity volumes with invalid (corrupted) integrity tags.

Usage

If you wish to scrub a volume, consider creating a backup of the underlying physical device first.

Then run the tool with the volume device path (/dev/mapper/… or /dev/dm-…) as a command line argument.

Unless you really know what you are doing, you should not run it on a mounted volume. Data written by the filesystem might get overwritten by interleaved writes of the tool.

Implementation notes

The block device is first read in large chunks (the maximum sectors per request as reported by the BLKSECTGET ioctl). If a read results in an integrity error (EILSEQ), the logical sectors in the chunk are read individually and any erroneous sector is overwritten with zeros.

Reads are performed using direct I/O (O_DIRECT), while writes rely on buffered I/O with chunk‐wise asynchronous flushing (sync_file_range(2)). Any outstanding writes are finalised using fdatasync(3) before the tool exits.

Caveat

This tool might delete all your data and summon a seal. Use it at your own risk. The seal will demand fish.

If you are not using a filesystem with copy‐on‐write semantics (e.g. btrfs) or data journalling (e.g. ext4 with data=journal), you should probably rely on dm-integrity’s data journal.

Commit count: 109

cargo fmt