OSX Recovery FileVault2 Partition

  
FileVault 2 must have a Recovery HD partition because it relies on it as the system is initially booted. If the Recovery HD partition is deleted in the future or by mistake, your machine will not be able to start the bird. Is it possible to regain a Recovery HD using Apple's method? In principle, it can't be said, because I still remember the key when I originally encrypted it? It is also lost, and you can't decrypt it if you lose it. So, we need another way to recover it. General Steps: Based on the fact that FileVault 2 is based on CoreStorage logical volume management technology, we can start with CoreStorage. First look at what an encrypted disk will look like, pay attention to the Unlocked line, which will be mentioned later: [python] $ diskutil coreStorage list CoreStorage logical volume groups (1 found) |   +-- Logical Volume Group 26B67367-CF79-4D1E-884C-BB96FDD79D19 ============================================ ====================== Name: FileVault Sequence: 1 Free Space: 0 B (0 B) |   +-< Physical Volume A446F211-3BCB-47F4-8EB2-7174AF4CD408 |    -------------------------------------------------- -- |    Index: 0 |    Disk: disk4s2 |    Status: Online |    Size: 9896046592 B (9.9 GB) |   +-> Logical Volume Family 8D077574-ADC1-4979-9F1E-FF901FC20D86 ---------------------------------- ------------------------ Sequence: 8 Encryption Status: Unlocked Encryption Type: AES-XTS Encryption Context: Present Conversion Status: Complete Has Encrypted Extents: Yes Conversion Direction: -none- |   +-> Logical Volume BD95F022-812D-366A-909C-286E5443D88E ----------------------------------- ---------------- Disk: disk5 Status: Online Sequence: 4 Size (Total): 125505781760 B (125.5 GB) Size (Converted): 125505781760 B (125.5 GB) Revertible: Yes (unlock and decryption required) LV Name: FileVault Volume Name: FileVault Content Hint: Apple_HFS It looks like this: [python] diskutil info disk0s2 Device Identifier: disk0s2 Device Node: /dev/disk0s2 Part of Whole: disk0 Device /Media Name: Macintosh HD Volume Name: Macintosh HD Escaped with Unicode: Macintosh%FF%FE%20%00HD Mounted: Yes Mount Point: /Escape d with Unicode: /File System Personality: Journaled HFS+ Type (Bundle): hfs Name (User Visible): Mac OS Extended (Journaled) Journal: Journal size 16384 KB at offset 0x1ab63000 Owners: Enabled Partition Type: Apple_HFS OS Can Be Installed: Yes Media Type: Generic Protocol: SATA SMART Status: Verified Volume UUID: BD95F022-812D-366A-909C-286E5443D88E Total Size: 125.5 GB (125505781760 Bytes) (exactly 245128480 512-Byte-Blocks) Volume Free Space: 62.2 GB (62152081408 Bytes) (exactly 121390784 512-Byte-Blocks) Device Block Size: 512 Bytes Read-Only Media: No Read-Only Volume: No Ejectable: No Whole: No Internal: Yes Solid State: No Other It doesn't matter, the important thing is his Volume UUID, which is "BD95F022-812D-366A-909C-286E5443D88E", and don't forget the key when encrypting, the key looks like this: Now use the following command to decrypt Bar: dnzg.cn [python] $ diskutil coreStorage revert <span style="font-size:18px; ">BD95F022-812D-366A-909C-286E5443D88E</span> -passphrase 2NTO-LQGA- RMXG-LFQO-B8NR-XTCT After decryption, this is the case: [python] $ diskutil coreStorage list
Copyright © Windows knowledge All Rights Reserved