lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <24815d81-2e4f-4ddf-b194-b03ea3232b91@youngman.org.uk>
Date: Tue, 3 Jun 2025 17:46:01 +0100
From: Wol <antlists@...ngman.org.uk>
To: David Niklas <simd@...mail.net>, Linux RAID <linux-raid@...r.kernel.org>
Cc: linux-kernel@...r.kernel.org
Subject: Re: Need help increasing raid scan efficiency.

On 03/06/2025 02:05, David Niklas wrote:
> So I setup the array into read-only mode and started the array with only
> two of the drives. Drives 0 and 1. Then I proceeded to try and start a
> second pair, drives 2 and 3, so that I could scan them simultaneously.
> With the intent of then switching it over to 0 and 2 and 1 and 3, then 0
> and 3 and 1 and 2.

BACKUP! BACKUP!! BACKUP!!!

Is your array that messed up that it won't assemble? If you can just get 
it to assemble normally that's your best bet by far. Trying to assemble 
it as two pairs is throwing away the whole point of a raid 6!

And make sure you know the order of the drives in the array! I hope you 
haven't lost that infof.

If your event counts are all similar, then you'll hopefully recover most 
of your data. Your biggest worry will be the mobo and ram having 
trashing an in-flight write that corrupts the disk.

Then once you've got the array assembled, I can't remember the command, 
but there is a command that will read the entire stripe, check the 
paritIES - both of them, and recreate the data. If that fails, your data 
is probably toast, and nothing you can do will be able to retrieve much :-(

Cheers,
Wol

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ