lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 23 Apr 2009 15:15:10 -0700 (PDT) From: Christian Kujau <lists@...dbynature.de> To: Theodore Tso <tytso@....edu> cc: Eric Sandeen <sandeen@...hat.com>, linux-ext4@...r.kernel.org Subject: Re: ext4_ext_check_inode: bad header/extent in inode On Thu, 23 Apr 2009, Theodore Tso wrote: > Eventually I might need a raw e2image dump, i.e.: > > e2image -r /dev/md0 - | bzip2 > /var/tmp/md0.e2i.bz2 I've put the raw e2image dump on http://nerdbynature.de/bits/2.6.30-rc2/ Do you still need the dump without the "-r"? I could even delete all the intact files on the filesystem, fill the free space will zeros and try to dump the whole image if that would be helpful. Thanks, Christian. -- Bruce Schneier only smiles when he finds an unbreakable cryptosystem. Of course, Bruce Schneier never smiles. -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists