Device mapper works by passing data from a virtual block device, which is provided by the device mapper itself, to another block device. Data can be also modified in transition, which is performed, for example, in the case of device mapper providing disk encryption or simulation of unreliable hardware behavior.
This article focuses on the device mapper implementation in the Linux kernel, but the device mapper functionality is also available in both NetBSD and DragonFly BSD.[2][3]
Both of these two userspace components have their source code maintained alongside the LVM2 source.[7]
Features
Functions provided by the device mapper include linear, striped and error mappings, as well as crypt and multipath targets. For example, two disks may be concatenated into one logical volume with a pair of linear mappings, one for each disk. As another example, crypt target encrypts the data passing through the specified device, by using the Linux kernel's Crypto API.[1]
As of 2014[update], the following mapping targets are available:[1][5]
dm-integrity – mapping target that provides data integrity, either using checksumming or cryptographic verification,[10][11] also used with LUKS[12]
dm-log-writes – mapping target that uses two devices, passing through the first device and logging the write operations performed to it on the second device[13]
dm-verity – validates the data blocks contained in a file system against a list of cryptographic hash values, developed as part of the ChromiumOS project[14]