lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20061207154545.6eb516c4.zaitcev@redhat.com>
Date:	Thu, 7 Dec 2006 15:45:45 -0800
From:	Pete Zaitcev <zaitcev@...hat.com>
To:	Matthias Schniedermeyer <ms@...d.de>
Cc:	usb-storage@...ts.one-eyed-alien.net, linux-kernel@...r.kernel.org
Subject: Re: single bit errors on files stored on USB-HDDs via
 USB2/usb_storage

On Thu, 07 Dec 2006 20:41:12 +0100, Matthias Schniedermeyer <ms@...d.de> wrote:

> >>I'm using a Bunch auf HDDs in USB-Enclosures for storing files.
> >>(currently 38 HDD, with a total capacity of 9,5 TB of which 8,5 TB is used)
> >>[....]
> >>This time i kept the defective files and used "vbindiff" to show me the
> >>difference. Strangly in EVERY case the difference is a single bit in a
> >>sequence of "0xff"-Bytes inside a block of varing bit-values that
> >>changed a "0xff" into a "0xf7".

> > This was almost certainly caused by hardware flaws in the USB interface 
> > chips of the enclosures.  There's nothing the kernel can do about it 
> > because the errors aren't reported; all that happens is that incorrect 
> > data is sent to or from the drive.
> 
> So pretty much all ich can do is to pray that the errors don't corrupt
> the Filesystem-Metadata (XFS).

No, this is not all. You should buy a variety of different enclosures
with different chipsets (e.g. find a Freecom if you can), and also
use decent cables.

-- Pete
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ