From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from plane.gmane.org ([80.91.229.3]:55356 "EHLO plane.gmane.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751184AbcDBSb1 (ORCPT ); Sat, 2 Apr 2016 14:31:27 -0400 Received: from list by plane.gmane.org with local (Exim 4.69) (envelope-from ) id 1amQKS-0005fS-Gk for linux-btrfs@vger.kernel.org; Sat, 02 Apr 2016 20:31:24 +0200 Received: from ip5f5ae008.dynamic.kabel-deutschland.de ([95.90.224.8]) by main.gmane.org with esmtp (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Sat, 02 Apr 2016 20:31:24 +0200 Received: from hurikhan77 by ip5f5ae008.dynamic.kabel-deutschland.de with local (Gmexim 0.1 (Debian)) id 1AlnuQ-0007hv-00 for ; Sat, 02 Apr 2016 20:31:24 +0200 To: linux-btrfs@vger.kernel.org From: Kai Krakow Subject: Re: bad metadata crossing stripe boundary Date: Sat, 2 Apr 2016 20:31:17 +0200 Message-ID: <20160402203117.4d815f13@jupiter.sol.kaishome.de> References: <20160326203035.4b876a04@jupiter.sol.kaishome.de> <20160327035038.5ab6e64b@jupiter.sol.kaishome.de> <56F7E65C.7020300@gmx.com> <20160328120203.1b8d79dc@jupiter.sol.kaishome.de> <56FC7E6D.8010805@cn.fujitsu.com> <56FC8C15.5060002@cn.fujitsu.com> <20160331210004.GZ9342@torres.zugschlus.de> <20160331231630.7b4ceda9@jupiter.sol.kaishome.de> <20160401055725.GA9342@torres.zugschlus.de> <20160402110353.10ae123a@jupiter.sol.kaishome.de> <20160402094432.GQ9342@torres.zugschlus.de> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-btrfs-owner@vger.kernel.org List-ID: Am Sat, 2 Apr 2016 11:44:32 +0200 schrieb Marc Haber : > On Sat, Apr 02, 2016 at 11:03:53AM +0200, Kai Krakow wrote: > > Am Fri, 1 Apr 2016 07:57:25 +0200 > > schrieb Marc Haber : > > > On Thu, Mar 31, 2016 at 11:16:30PM +0200, Kai Krakow wrote: > [...] > [...] > [...] > > > > > > I cryptsetup luksFormat'ted the partition before I mkfs.btrfs'ed > > > it. That should do a much better job than wipefsing it, shouldnt > > > it? > > > > Not sure how luksFormat works. If it encrypts what is already on the > > device, it would also encrypt orphan superblocks. > > It overwrites the LUKS metadata including the symmetric key that was > used to encrypt the existing data. Short of Shor's Algorithm and > Quantum Computers, after that operation it is no longer possible to > even guess what was on the disk before. If it was encrypted before... ;-) -- Regards, Kai Replies to list-only preferred.