lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200114212551.GE140865@mit.edu>
Date:   Tue, 14 Jan 2020 16:25:51 -0500
From:   "Theodore Y. Ts'o" <tytso@....edu>
To:     James Courtier-Dutton <james.dutton@...il.com>
Cc:     linux-ext4 <linux-ext4@...r.kernel.org>
Subject: Re: ext4 recovery

On Tue, Jan 14, 2020 at 04:03:53PM +0000, James Courtier-Dutton wrote:
> 
> Say I started with 1 disk using LVM with an ext4 partition.
> I then added another disk. Added it to the LVM group, expanded the
> ext4 partition to then fill 2 disks.
> I then added another disk. Added it to the LVM group, expanded the
> ext4 partition to then fill 3 disks.

Where you using RAID 0, or some more advanced RAID level?

> One of the disk has now failed.

How has it failed?  It is dead dead dead?  Or are there a large number
of sector errors?

> Are there any tools available for ext4 that could help recover this?
> Note, I am a single user, not a company, so there is no money to give
> to a data recovery company, so I wish to try myself.

How valuable is your data?  The first thing I would recommend, if your
data is worth it (and only you can make that decision) is to create a
new RAID set (using larger disks if that helps reduce the price) so
you can make an block-level image backup using the dd_rescue program.

If you can, then run e2fsck on the backup copy, and then see what you
can recover from that image set.  This will save time (how much is
your time worth?) and perhaps increase the amount of data you can
recover (how much is your data worth?).

					- Ted

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ