Jump to content

dd (Unix)

From Wikipedia, the free encyclopedia
dd
Original author(s)Ken Thompson
(AT&T Bell Laboratories)
Developer(s)Various open-source and commercial developers
Initial releaseJune 1974; 50 years ago (1974-06)
Repositorycoreutils: git.savannah.gnu.org/cgit/coreutils.git/
Written inPlan 9: C
Operating systemUnix, Unix-like, Plan 9, Inferno, Windows
PlatformCross-platform
TypeCommand
Licensecoreutils: GPLv3+
Plan 9: MIT License

dd is a command-line interface (CLI) tool for reading, writing and converting file data. Originally developed for Unix, it has been ported to many other operating systems (OSs) including Unix-like OSs, Windows, Plan 9 and Inferno.[1]

The tool can be used for many purposes. For relatively simple copying operations, it tends to be slower than domain-specific alternatives, but it excels at overwriting or truncating a file at any point or seeking in a file.[2]

The tool reads and writes files, and if a driver is available to support file-like access, the tool can access devices too. Such access is typically supported on Unix and similar OSs that tend to provide file-like access to devices (such as storage) and special device files (such as /dev/zero and /dev/random). Therefore, the tool can be used for tasks such as backing up the boot sector of a drive, and obtaining random data.

The tool can also convert data while copying; including byte order swapping and converting between ASCII and EBCDIC text encodings.[3]

History

[edit]

In 1974, the dd command appeared as part of Version 5 Unix. According to Dennis Ritchie, the name is an allusion to the DD statement found in IBM's Job Control Language (JCL),[4][5] in which it is an abbreviation for "Data Definition".[6][7] According to Douglas McIlroy, dd was "originally intended for converting files between the ASCII, little-endian, byte-stream world of DEC computers and the EBCDIC, big-endian, blocked world of IBM"; thus, explaining the cultural context of its syntax.[8] Eric S. Raymond believes "the interface design was clearly a prank", due to the command's syntax resembling a JCL statement more than other Unix commands do.[5]

In 1987, the dd command is specified in the X/Open Portability Guide issue 2 of 1987. This is inherited by IEEE Std 1003.1-2008 (POSIX), which is part of the Single UNIX Specification.[9]

In 1990, David MacKenzie announced GNU fileutils (now part of coreutils) which includes the dd command;[10] it was written by Paul Rubin, David MacKenzie, and Stuart Kemp.[11] Since 1991, Jim Meyering is its maintainer.[12]

In 1995, Plan 9 2nd edition was released; its dd command interface was redesigned to use a traditional command-line option style instead of a JCL statement style.[13]

Since at least 1999,[14] a native Win32 port has existed for Microsoft Windows under UnxUtils.[15]

dd is sometimes humorously called "Disk Destroyer", due to its drive-erasing capabilities involving typos.[16]

Usage

[edit]

The command line interface (CLI) significantly differs from most command-line tools of the same environments in that an option is formatted as option=value instead of the more typical syntax that denotes an option with a dash prefix such as: -x, -y value, --abc, --def value.

By default, dd reads from standard input and writes to standard output, but input and output can be overridden. Option if specifies an input file and option of specifies an output file.

Non-standardized aspects of dd depend on the underlying system or implementation, including:

  • Direct memory access
  • Signal handling
  • End-of-file (EOF) handling; in particular the Windows ports vary: Cygwin uses Ctrl+D (the usual for Unix) and MKS Toolkit uses Ctrl+Z (the usual for Windows)

Output messages

[edit]

On completion, dd writes statisitcs to standard error. The format is standardized in POSIX.[9]: STDERR  The manual page for GNU dd does not describe this format, but the BSD manuals do. Each of the "Records in" and "Records out" lines shows the number of complete blocks transferred + the number of partial blocks, e.g. because the physical medium ended before a complete block was read, or a physical error prevented reading the complete block.

If dd receives a SIGINFO signal while it's running – typically triggered by the user pressing Ctrl+T – it writes intermediate statistics to standard error and continues processing.

Block size

[edit]

The tool processes data in blocks. The default size is 512 (the POSIX-mandated size and a common legacy size for disk hardware) but can be specified via command-line options. Option bs specifies the size for both input (read) and output (write) operations. Alternatively, option ibs specifies the size for input operations and obs for output operations. Option cbs affects conversion operations.

Options count, skip and seek specify a number of blocks: maximum to read, to start reading at offset from the start of the input, and to start writing at offset from the start of the output, respectively.[9]: OPERANDS 

A block size option value is specified as a whole decimal number of bytes with an optional suffix to indicate a multiplier. POSIX requires suffixes b (blocks) for 512 and k (kibibytes) for 1024,[9]: OPERANDS  but implementations differ on other suffixes. (Free) BSD uses m for mebibytes, g for gibibytes and so on for larger power of two units[17]. GNU uses M and G and so on for these units and uses kB, MB, and GB for SI units.[11] For example, for GNU dd, bs=16M indicates a size of 16 mebibytes (16777216 bytes) and bs=3kB specifies 3000 bytes.

For POSIX compliance, some implementations interpret the x character as a multiplication operator for both block size and count option values. For example, bs=2x80x18b is interpreted as 2 × 80 × 18 × 512 = 1474560 bytes, the size of a 1440 KiB floppy disk.[9]: OPERANDS  For implementations that do not support this feature, the POSIX shell arithmetic syntax of bs=$((2*80*18))b may be used.

Block size affects performance. Many small reads and writes is often slower than fewer, larger ones. On the downside, larger blocks require more RAM and can complicate error recovery.

When used with a variable block size device such as a tape drive or a network, the block size may determine the tape record size or network packet size, depending on the network protocol.

Examples

[edit]

The examples below apply to many implementations, but are specifically written for GNU dd. Generally, the only difference between implementations is block size values and can be portable by using shell arithmetic expression instead of a size multiplier suffix. For example, instead of bs=64M use bs=$((64*1024*1024)) or bs=$((64 << 20)).

Data transfer

[edit]

The tool can duplicate data across files, devices, partitions and volumes, and it can transform data during transfer as specified via option conv. In some cases, data transfer is faster with cat.[2]

To create an ISO disk image from a CD-ROM, DVD or Blu-ray disc:[18]

blocks=$(isosize -d 2048 /dev/sr0)
dd if=/dev/sr0 of=isoimage.iso bs=2048 count=$blocks status=progress

To restore a drive from an image file:

dd if=system.img of=/dev/sdc bs=64M conv=noerror

To create an image of partition sdb2, using a 64 MiB block size:

dd if=/dev/sdb2 of=partition.image bs=64M conv=noerror

To clone one partition to another:

dd if=/dev/sda2 of=/dev/sdb2 bs=64M conv=noerror

To clone drive ad0 to ad1; ignoring any errors:

dd if=/dev/ad0 of=/dev/ad1 bs=64M conv=noerror

In-place modification

[edit]

The tool can modify data in place. For example, this overwrites the first 512 bytes of a file with null bytes:

dd if=/dev/zero of=path/to/file bs=512 count=1 conv=notrunc

Option conv=notrunc requests to not truncate the output file. That is, if the output file already exists, replace the specified bytes and leave the rest of the output file as-is. Without this option, the command would create an output file 512 bytes long.

Master boot record backup and restore

[edit]

The example above can also be used to backup and restore any region of a device to a file; including a master boot record. To duplicate the first two sectors of a floppy disk:

dd if=/dev/fd0 of=MBRboot.img bs=512 count=2

Disk wipe

[edit]

For security reasons, it is sometimes necessary to have a disk wipe of a discarded device. This can be achieved by a "data transfer" from the Unix special files.

When compared to the data modification example above, notrunc conversion option is not required as it has no effect when the output file is a block device.[19]

Option bs=16M makes dd read and write 16 mebibytes at a time. For modern systems, an even greater block size may be faster. Note that filling the drive with random data may take longer than zeroing the drive, because the random data must be created by the CPU, while creating zeroes is very fast. On modern hard-disk drives, zeroing the drive will render most data it contains permanently irrecoverable.[20] However, with other kinds of drives such as flash memories, much data may still be recoverable by data remanence.

Modern hard disk drives contain a Secure Erase command designed to permanently and securely erase every accessible and inaccessible portion of a drive. It may also work for some solid-state drives (flash drives). As of 2017, it does not work on USB flash drives nor on Secure Digital flash memories.[citation needed] When available, this is both faster than using dd, and more secure.[citation needed] On Linux machines it is accessible via the hdparm command's --security-erase-enhanced option.

The shred program offers multiple overwrites, as well as more secure deletion of individual files.

Data recovery

[edit]

Data recovery involves reading from a drive with some parts potentially inaccessible. The tool is a good fit with this job with its flexible skipping (seek) and other low-level settings. The vanilla dd, however, is clumsy to use as the user has to read the error messages and manually calculate the regions that can be read. The single block size also limits the granularity of the recovery, as a trade-off has to be made: either use a small one for more data recovered or use a large one for speed.

A C program called dd_rescue[21] was written in October 1999. It did away with the conversion functionality of dd, and supports two block sizes to deal with the dilemma. If a read using a large size fails, it falls back to the smaller size to gather as much as data possible. It can also run backwards. In 2003, a dd_rhelp script was written to automate the process of using dd_rescue, keeping track of what areas have been read on its own.[22]

In 2004, GNU wrote a separate utility, unrelated to dd, called ddrescue. It has a more sophisticated dynamic block-size algorithm and keeps track of what has been read internally. The authors of both dd_rescue and dd_rhelp consider it superior to their implementation.[23] To help distinguish the newer GNU program from the older script, alternate names are sometimes used for GNU's ddrescue, including addrescue (the name on freecode.com and freshmeat.net), gddrescue (Debian package name), and gnu_ddrescue (openSUSE package name).

Another open-source program called savehd7 uses a sophisticated algorithm, but it also requires the installation of its own programming-language interpreter.

Benchmark drive performance

[edit]

To make drive benchmark test and analyze the sequential (and usually single-threaded) system read and write performance for 1024-byte blocks:

  • Write performance: dd if=/dev/zero bs=1024 count=1000000 of=1GB_file_to_write
  • Read performance: dd if=1GB_file_to_read of=/dev/null bs=1024

Generate a file with random data

[edit]

To make a file of 100 random bytes using the random driver:

dd if=/dev/urandom of=myrandom bs=100 count=1

Convert a file to upper case

[edit]

To convert a file to uppercase:

dd if=filename of=filename1 conv=ucase,notrunc

Progress feedback

[edit]

On request, the tool reports progress. When it receives signal USR1 (INFO on BSD systems), it writes the number of transferred blocks to standard error.

The following bash script requests progress every 10 seconds until the transfer completes. The text PID stands for the dd process identifier.

while kill -USR1 PID ; do sleep 10 ; done

Newer versions of GNU dd support the option status=progress which enables periodic status feedback.[24]

Forks

[edit]

dcfldd

[edit]

dcfldd is a fork of GNU dd that is an enhanced version developed by Nick Harbour, who at the time was working for the United States' Department of Defense Computer Forensics Lab.[25][26][27] Compared to dd, dcfldd allows more than one output file, supports simultaneous multiple checksum calculations, provides a verification mode for file matching, and can display the percentage progress of an operation. As of February 2024, the last release was 1.9.1 from April 2023.[28]

dc3dd

[edit]

dc3dd is another fork of GNU dd from the United States Department of Defense Cyber Crime Center (DC3). It can be seen as a continuation of the dcfldd, with a stated aim of updating whenever the GNU upstream is updated. As of June 2023, the last release was 7.3.1 from April 2023.[29]

See also

[edit]

References

[edit]
  1. ^ Austin Group. "POSIX standard: dd invocation". Archived from the original on 2010-03-10. Retrieved 2016-09-29.
  2. ^ a b Gilles (2011). "cloning - dd vs cat – is dd still relevant these days?". Unix & Linux Stack Exchange. Archived from the original on 2023-10-24. Retrieved 2020-04-24.
  3. ^ Chessman, Sam. "How and when to use the dd command?". CodeCoffee. Archived from the original on 14 Feb 2008. Retrieved 2008-02-19.
  4. ^ Ritchie, Dennis (Feb 17, 2004). "Re: origin of the UNIX dd command". Newsgroupalt.folklore.computers. Usenet: c0s1he$1atuh9$1@ID-156882.news.uni-berlin.de. Archived from the original on January 22, 2011. Retrieved January 10, 2016. dd was always named after JCL dd cards.
  5. ^ a b Raymond, Eric S. "dd". Archived from the original on 2018-12-13. Retrieved 2008-02-19.
  6. ^ Struble, George (1969). Assembler language programming: the IBM System/360. Reading, Mass., Addison-Wesley Pub. Co. p. 123.
  7. ^ Shein, Barry (Apr 22, 1990). "Re: etymology of the Unix "dd" command". Newsgroupalt.folklore.computers. Usenet: 1990Apr22.191928.11180@world.std.com. Archived from the original on 2023-10-24. Retrieved 2016-07-14.
  8. ^ McIlroy, M. D. (1987). A Research Unix reader: annotated excerpts from the Programmer's Manual, 1971–1986 (PDF) (Technical report). CSTR. Bell Labs. 139.
  9. ^ a b c d e dd – Shell and Utilities Reference, The Single UNIX Specification, Version 4 from The Open Group
  10. ^ "GNU file utilities release 1.0". groups.google.com. Archived from the original on 2023-04-28. Retrieved 2023-04-28.
  11. ^ a b dd(1) – Linux User Manual – User Commands
  12. ^ "GNU's Who". Archived from the original on 2023-04-28. Retrieved 2023-04-28.
  13. ^ dd(1) – Plan 9 Programmer's Manual, Volume 1
  14. ^ "Native Win32 ports of some GNU utilities". 15 August 2000. Archived from the original on 2000-08-15.
  15. ^ "Native Win32 ports of some GNU utilities". unxutils.sourceforge.net. Archived from the original on 2006-02-09. Retrieved 2022-02-23.
  16. ^ "How to use dd in Linux without destroying your disk". Opensource.com. 2018-07-05. Archived from the original on 2020-10-11. Retrieved 2020-10-11.
  17. ^ dd(1) – FreeBSD General Commands Manual
  18. ^ "Creating an ISO image from a CD, DVD, or BD". ArchWiki. Archived from the original on April 18, 2022. Retrieved April 18, 2022.
  19. ^ "linux - Why using conv=notrunc when cloning a disk with dd?". Stack Overflow. 2013-12-11. Archived from the original on 2014-03-24. Retrieved 2014-03-24.
  20. ^ Wright, Craig S.; Kleiman, Dave; S., Shyaam Sundhar R. (2008). "Overwriting Hard Drive Data: The Great Wiping Controversy". In Sekar, R.; Pujari, Arun K. (eds.). Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings. Lecture Notes in Computer Science. Vol. 5352. Springer. pp. 243–257. doi:10.1007/978-3-540-89862-7_21.
  21. ^ "dd_rescue". garloff.de. Archived from the original on 2001-05-16. Retrieved 2006-11-10.
  22. ^ LAB Valentin (19 September 2011). "dd_rhelp author's repository". Archived from the original on 16 May 2008. Retrieved 13 May 2008. Important note : For some times, dd_rhelp was the only tool (AFAIK) that did this type of job, but since a few years, it is not true anymore: Antonio Diaz did write a ideal replacement for my tool: GNU 'ddrescue'.
  23. ^ "Ddrescue - GNU Project - Free Software Foundation (FSF)". gnu.org. Archived from the original on 2021-07-02. Retrieved 2016-07-22.
  24. ^ "GNU Coreutils: dd invocation". The GNU Operating System and the Free Software Movement. Archived from the original on 2019-08-22. Retrieved 2019-08-26.
  25. ^ "DCFLDD at Source Forge". Source Forge. Archived from the original on 2013-08-02. Retrieved 2013-08-17.
  26. ^ Jeremy Faircloth, Chris Hurley (2007). Penetration Tester's Open Source Toolkit. Syngress. pp. 470–472. ISBN 9780080556079.
  27. ^ Jack Wiles, Anthony Reyes (2011). The Best Damn Cybercrime and Digital Forensics Book Period. Syngress. pp. 408–411. ISBN 9780080556086.
  28. ^ "dcfldd: Enhanced version of dd for forensics and security". GitHub. Archived from the original on 2020-10-31. Retrieved 2020-11-19.
  29. ^ "dc3dd". SourceForge. 25 April 2023. Archived from the original on 25 February 2020. Retrieved 24 April 2020.
[edit]