Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Starting /usr/sbin/ocs-sr at 2023-02-25 18:09:10 UTC...
- *****************************************************.
- Clonezilla image dir: /home/partimag
- Shutting down the Logical Volume Manager
- Finished Shutting down the Logical Volume Manager
- The selected devices: sda
- PS. Next time you can run this command directly:
- /usr/sbin/ocs-sr -luks yes -q2 -c -j2 -gm -z9p -i 0 -sfsck -enc -p choose savedisk 2023-02-25-debian11_xfce_Nathan-MSI sda
- *****************************************************.
- *****************************************************.
- [1;33m//NOTE// You have to remember the passphrase, otherwise the image will _NOT_ be usable in the future.
- [0;39m*** Enter the passphrase to encrypt the image: 2023-02-25-debian11_xfce_Nathan-MSI ***
- (It will not be echoed in the screen)
- *** Re-enter to verify the passphrase for encrypting the image: 2023-02-25-debian11_xfce_Nathan-MSI ***
- (It will not be echoed in the screen)
- The temporary encrypted image dir is now as: /tmp/ecryptfs_mnt.MhaWLk
- The selected devices: sda
- Searching for data/swap/extended partition(s)...
- The data partition to be saved: sda1 sda5
- The extended partition to be saved: sda2
- The selected devices: sda1 sda5
- The following step is to save the hard disk/partition(s) on this machine as an image:
- *****************************************************.
- Machine: MS-7309
- sda (256GB_SanDisk_Z400s_2._SanDisk_Z400s_2.5_7MM_256GB_155344403343)
- sda1 (953M_ext4(In_SanDisk_Z400s_2.)_SanDisk_Z400s_2.5_7MM_256GB_155344403343)
- sda5 (237.5G_crypto_LUKS(In_SanDisk_Z400s_2.)_SanDisk_Z400s_2.5_7MM_256GB_155344403343)
- *****************************************************.
- -> "/tmp/ecryptfs_mnt.MhaWLk".
- Shutting down the Logical Volume Manager
- Finished Shutting down the Logical Volume Manager
- *****************************************************.
- Now open the LUKS device: /dev/sda5
- Running: cryptsetup open --type luks /dev/sda5 sde5_crypt
- Starting saving /dev/sda1 as /tmp/ecryptfs_mnt.MhaWLk/sda1.XXX...
- /dev/sda1 filesystem: ext4.
- *****************************************************.
- *****************************************************.
- Use partclone with zstdmt to save the image.
- Image file will not be split.
- *****************************************************.
- If this action fails or hangs, check:
- * Is the disk full ?
- *****************************************************.
- Running: partclone.ext4 -z 10485760 -N -L /var/log/partclone.log -c -s /dev/sda1 --output - | zstdmt -c -3 > /tmp/ecryptfs_mnt.MhaWLk/sda1.ext4-ptcl-img.zst 2> /tmp/img_out_err.olFmVk
- Partclone v0.3.23 http://partclone.org
- Starting to clone device (/dev/sda1) to image (-)
- Reading Super Block
- memory needed: 21002020 bytes
- bitmap 30496 bytes, blocks 2*10485760 bytes, checksum 4 bytes
- Calculating bitmap... Please wait...
- done!
- File system: EXTFS
- Device size: 999.3 MB = 243968 Blocks
- Space in use: 159.0 MB = 38818 Blocks
- Free Space: 840.3 MB = 205150 Blocks
- Block size: 4096 Byte
- Total block 243968
- Syncing... OK!
- Partclone successfully cloned the device (/dev/sda1) to the image (-)
- >>> Time elapsed: 15.34 secs (~ .255 mins)
- *****************************************************.
- Finished saving /dev/sda1 as /tmp/ecryptfs_mnt.MhaWLk/sda1.ext4-ptcl-img.zst
- *****************************************************.
- Parsing LVM layout for sde5_crypt ...
- vg0 /dev/mapper/sde5_crypt B8B7XT-R8zG-vgU1-o8wG-lHhi-vsyk-uwirTP
- Parsing logical volumes...
- Saving the VG config...
- Volume group "vg0" successfully backed up.
- done.
- Checking if the VG config was saved correctly...
- done.
- Saving /dev/vg0/root as filename: vg0-root. /dev/vg0/root info: Linux rev 1.0 ext4 filesystem data, UUID=e2e16b70-411a-451b-a746-1b269b03ff2c, volume name "root" (extents) (64bit) (large files) (huge files)
- Starting saving /dev/vg0/root as /tmp/ecryptfs_mnt.MhaWLk/vg0-root.XXX...
- /dev/vg0/root filesystem: ext4.
- *****************************************************.
- *****************************************************.
- Use partclone with zstdmt to save the image.
- Image file will not be split.
- *****************************************************.
- If this action fails or hangs, check:
- * Is the disk full ?
- *****************************************************.
- Running: partclone.ext4 -z 10485760 -N -L /var/log/partclone.log -c -s /dev/vg0/root --output - | zstdmt -c -3 > /tmp/ecryptfs_mnt.MhaWLk/vg0-root.ext4-ptcl-img.zst 2> /tmp/img_out_err.2ewOx0
- Partclone v0.3.23 http://partclone.org
- Starting to clone device (/dev/vg0/root) to image (-)
- Reading Super Block
- memory needed: 28600836 bytes
- bitmap 7629312 bytes, blocks 2*10485760 bytes, checksum 4 bytes
- Calculating bitmap... Please wait...
- done!
- File system: EXTFS
- Device size: 250.0 GB = 61034496 Blocks
- Space in use: 9.7 GB = 2373889 Blocks
- Free Space: 240.3 GB = 58660607 Blocks
- Block size: 4096 Byte
- Total block 61034496
- Syncing... OK!
- Partclone successfully cloned the device (/dev/vg0/root) to the image (-)
- >>> Time elapsed: 309.83 secs (~ 5.163 mins)
- *****************************************************.
- Finished saving /dev/vg0/root as /tmp/ecryptfs_mnt.MhaWLk/vg0-root.ext4-ptcl-img.zst
- *****************************************************.
- Saving /dev/vg0/swap as filename: vg0-swap. /dev/vg0/swap info: Linux swap file, 4k page size, little endian, version 1, size 1230847 pages, 0 bad pages, no label, UUID=63efee57-df88-4c08-8db2-37bd6739da13
- Saving block devices info in /tmp/ecryptfs_mnt.MhaWLk/blkdev.list...
- Saving block devices attributes in /tmp/ecryptfs_mnt.MhaWLk/blkid.list...
- Checking the integrity of partition table in the disk /dev/sda...
- Reading the partition table for /dev/sda...RETVAL=0
- *****************************************************.
- The first partition of disk /dev/sda starts at 2048.
- Saving the hidden data between MBR (1st sector, i.e. 512 bytes) and 1st partition, which might be useful for some recovery tool, by:
- dd if=/dev/sda of=/tmp/ecryptfs_mnt.MhaWLk/sda-hidden-data-after-mbr skip=1 bs=512 count=2047
- 2047+0 records in
- 2047+0 records out
- 1048064 bytes (1.0 MB, 1.0 MiB) copied, 0.734344 s, 1.4 MB/s
- *****************************************************.
- Saving the MBR data for sda...
- 1+0 records in
- 1+0 records out
- 512 bytes copied, 0.00338171 s, 151 kB/s
- End of saveparts job for image /tmp/ecryptfs_mnt.MhaWLk.
- *****************************************************.
- *****************************************************.
- Saving extended partition sda2 info in /tmp/ecryptfs_mnt.MhaWLk/sda2-ebr if it exists...
- 1+0 records in
- 1+0 records out
- 512 bytes copied, 0.00150215 s, 341 kB/s
- End of savedisk job for image ecryptfs_mnt.MhaWLk.
- Checking if udevd rules have to be restored...
- This program is not started by Clonezilla server, so skip notifying it the job is done.
- This program is not started by Clonezilla server, so skip notifying it the job is done.
- Finished!
- Finished!
- Partition table type: mbr
- The partition table file for this disk was found: sda, /tmp/ecryptfs_mnt.MhaWLk/sda-pt.sf
- MBR file for this disk was found: sda
- [1;33mThe image of this partition is restorable: sda1
- [0;39mLUKS header file not found: /tmp/ecryptfs_mnt.MhaWLk/sda5-luksHeader.bin
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement