Two disks, model Intel SSDSC2BB016T4I (1.6T SATA) were in a Linux desktop. They each had individual partitions, but the majority of these partitions were in btrfs RAID0 (more details below). These disks contain the operating system and user files.

One morning, the computer containing these disks was frozen. On reboot, one of the disks (the failed one) was no longer detected on it's SATA controller and the computer was no longer able to boot. Removing the disk and putting into a USB enclosure, it would power on, but not show up as a disk.

Failed disk SN: BTWD421605LL1P6HGN

Known working disk SN: BTWD4216068T1P6HGN

Failed disk is marked as "F", working disk is marked as "Working". I have a full disk image of the working disk already backed up before providing this disk to you.

when connecting

No disk shows up in fdisk. kernel dmesg does show something:

[150018.207511] usb 2-12: new high-speed USB device number 8 using xhci_hcd
[150018.360929] usb 2-12: New USB device found, idVendor=0480, idProduct=a006, bcdDevice= 1.00
[150018.360940] usb 2-12: New USB device strings: Mfr=2, Product=3, SerialNumber=1
[150018.360944] usb 2-12: Product: ASM1352R-PM
[150018.360947] usb 2-12: Manufacturer: Asmedia
[150018.360950] usb 2-12: SerialNumber: 123456789639
[150018.363148] usb-storage 2-12:1.0: USB Mass Storage device detected
[150018.363433] scsi host16: usb-storage 2-12:1.0
[150019.369478] scsi 16:0:0:0: Direct-Access     ASMT     ASM1352R-PM      0    PQ: 0 ANSI: 6
[150019.369765] sd 16:0:0:0: Attached scsi generic sg16 type 0
[150019.370389] sd 16:0:0:0: [sdq] Media removed, stopped polling
[150019.370785] sd 16:0:0:0: [sdq] Attached SCSI removable disk

Looks if disk is connected on power-up, but immediately removed. Controller failure?

Disk gets VERY warm.

Information from working disk:

fdisk partition layout

$ sudo fdisk -l /dev/sdq
Disk /dev/sdq: 1.46 TiB, 1600321314816 bytes, 3125627568 sectors
Disk model: ASM1352R-PM     
Units: sectors of 1 * 512 = 512 bytes
Sector size (logical/physical): 512 bytes / 4096 bytes
I/O size (minimum/optimal): 4096 bytes / 4096 bytes
Disklabel type: gpt
Disk identifier: 88343E8C-5BDB-4E55-9DA5-8CF34593D083

Device         Start        End    Sectors  Size Type
/dev/sdq1       2048    1050623    1048576  512M EFI System
/dev/sdq2    1050624    5244927    4194304    2G Linux filesystem
/dev/sdq3    5244928   68159487   62914560   30G Linux filesystem
/dev/sdq4   68159488  152045567   83886080   40G Linux filesystem
/dev/sdq5  152045568 3125627534 2973581967  1.4T Linux filesystem

btrfs layout

$ sudo btrfs filesystem show
warning, device 2 is missing
warning, device 2 is missing
warning, device 2 is missing
warning, device 2 is missing
Label: none  uuid: 3c2a0082-e0c0-4882-ac23-5da6bb386d6f
        Total devices 2 FS bytes used 35.84GiB
        devid    1 size 40.00GiB used 33.03GiB path /dev/sdq4
        *** Some devices missing

Label: none  uuid: 8c1c111a-d844-4f50-812c-2383f28c5092
        Total devices 2 FS bytes used 1.24GiB
        devid    1 size 2.00GiB used 1.30GiB path /dev/sdq2
        *** Some devices missing

Label: none  uuid: efd66661-3432-4e44-8fe5-03671104f994
        Total devices 2 FS bytes used 2.54TiB
        devid    1 size 1.38TiB used 1.38TiB path /dev/sdq5
        *** Some devices missing

Label: none  uuid: 5096903a-854b-4759-94e0-047c0e3ee145
        Total devices 2 FS bytes used 45.71GiB
        devid    1 size 30.00GiB used 30.00GiB path /dev/sdq3
        *** Some devices missing

btrfs RAID0 on partitions sd{2..5}. Recovering partition 4 and 5 most desired.

Partition 4 was "/", prefer to retrieve "/etc".

Partition 5 was "/home", prefer to retrieve as much as possible. Home directories were using Ubuntu's ecryptfs home directory encryption, unclear how to mount, but I have the key (user password) and otherwise partition 5 should be mountable once recovered and encrypted files visible. Please recover all of these.

If not able to get this far, it may make sense to recover as many of these as possible, and mount the encrypted ecryptfs volume. User is "xjjk", password is $PASSWORD. Of the unecrypted volume, would prefer to retrieve: