fsck on encrypted (AES-256) Linux (ext3) partitions

As AES-256 partitions using either a block file device or a physical partition cannot be mounted automatically at boot, they will not be automatically checked.

To manually run a fsck:

  • Unmount the partition
  • Setup loop device: losetup -e aes-256 /dev/loop0 /dev/sdaX
    (use loop1, loop2 etc if the others are being used)
  • Enter encryption password

The losetup will not give an error if the password was incorrect. Therefore a test is needed to confirm that the password was entered correctly – mount then umount the loop device:

mkdir /tmp/test
mount /dev/loop0 /tmp/test
ls /tmp/test
umount /dev/loop0

If the device could not be mounted, run: losetup -d /dev/loop0 and try again.

Execute the fsck:
fsck.ext3 -f /dev/loop0

After running the fsck, delete the loop device: losetup -d /dev/loop0 and mount the partition like usual.

One thought on “fsck on encrypted (AES-256) Linux (ext3) partitions

  1. Pingback: Corrupted Knoppix encrypted persistent volume

Comments are closed.