肺结节吃什么食物好| 风声鹤唳是什么意思| 金舆是什么意思| ck是什么品牌| 军长相当于地方什么官| 猕猴桃什么时候成熟| 乙肝阻断针什么时候打| 太白金星是什么神| 吃什么最健康| 鳗鱼是什么鱼| 有什么有什么的四字词语| 什么是pc| 慌张是什么意思| 氯化镁是什么| 29度穿什么衣服合适| 肠胃不好吃什么药| 狗为什么喜欢吃屎| 身体抽搐是什么原因| 大熊猫吃什么| 为什么叫211大学| 73岁属什么| 手淫是什么意思| 精血是什么意思| 鹦鹉为什么会学人说话| 菠菜什么时候种最合适| 什么叫轻度脂肪肝| 72年是什么年| 褪黑素有什么作用| 左边脖子疼是什么原因| 长期过敏是什么原因| 检查甲状腺挂什么科| 膈是什么器官| hardy是什么意思| 热气是什么意思| 一什么无什么| 请柬写伉俪什么意思| 气虚的人适合什么运动| 大便长期不成形是什么原因| 什么的雾| 算什么男人歌词| p53阳性是什么意思| 梦到黑狗是什么意思| 6月16日是什么日子| 胎盘中药叫什么| lpp什么意思| 肠易激综合症吃什么药| 夏天煲什么汤好| 支原体肺炎用什么药| 属虎男和什么属相最配| 马脸是什么脸型| 抗糖是什么意思| 坐围是什么| 什么叫轻度脂肪肝| 月经前尿频是什么原因| 口苦口干是什么原因造成的| 屠苏指的是什么| 什么是体位性低血压| 血压低吃什么最快最有效| 龟头瘙痒是什么原因| 性质是什么意思| 耳鸣去医院挂什么科| 慢性咽炎有什么症状| 1974年是什么年| 团是什么结构| 同房时阴道疼痛是什么原因| 夏天适合吃什么水果| 静夜思是什么季节| 30号来的月经什么时候是排卵期| 孕妇能吃什么| 夜长梦多是什么意思| 多元是什么意思| 介石是什么意思| 红颜知己什么意思| 查心脏挂什么科| 风热感冒和风寒感冒有什么区别| 孕早期生气对胎儿有什么影响| 什么是冬虫夏草| 青核桃皮的功效与作用是什么| 醋泡葡萄干有什么功效和作用| 对乙酰氨基酚片是什么药| 脸上长肉疙瘩是什么原因| 月经期间可以喝什么汤比较好| 子宫下垂是什么症状| 78年属什么| 八月十六号是什么星座| 吃了小龙虾不能吃什么| 呼吸困难胸闷气短挂什么科| 尿潴留是什么症状| 摇花手是什么意思| 子宫癌筛查做什么检查| 智齿是什么| 世界上笔画最多的字是什么| 怀孕孕酮低吃什么补得快| 阿奇霉素是什么药| 肝郁有什么症状| 虱子用什么药可以根除| 宫闱是什么意思| 老鼠和什么属相相冲| 为什么叫香港脚| 总胆固醇高有什么危害| 甲钴胺片是什么药| 什么叫肠易激综合征| 日龙包是什么意思| 圆寂为什么坐着就死了| 对对子是什么意思| 孕妇吃猕猴桃对胎儿有什么好处| 1月16日是什么星座| 什么的教导| 利可君片是什么药| 水痘能吃什么| 小肠气是什么症状| 牛仔布料是什么面料| 空调外机不出水是什么原因| 方便是什么意思| 玫瑰糠疹是什么原因引起的| 慢性肾炎吃什么药| 侧面是什么意思| 嘴唇发紫是什么原因| 63年属什么| 肺气不足吃什么药| 2008年什么年| 木薯是什么东西| 女人小肚子疼是什么原因| 胃脘是什么意思| 什么分泌胰岛素| 吐槽是什么意思| 肉桂属于什么茶类| 蚊虫叮咬用什么药| 端午是什么时候| hpv是什么意思| 薇字五行属什么| 男士带什么手串好| 什么降胆固醇| 妊娠是什么意思| 脂肪肝吃什么药最好| 抬头纹开了是什么意思| 王一博是什么星座| pci是什么| 爸爸的爷爷叫什么| 双侧苍白球钙化是什么意思| 全身浮肿是什么原因| 什么是脑卒中| 耳朵嗡嗡响什么原因| 眼睛有眼屎用什么眼药水| 高净值什么意思| 芭乐是什么| 1940年中国发生了什么| 教义是什么意思| 经典什么意思| jp是什么意思| 维生素b6吃多了有什么副作用| 高血糖是什么原因引起的| 失眠吃什么水果| 半夜尿多是什么原因| 丹参长什么样子图片| 没胃口吃什么| 喜讯是什么意思| 味美思是什么酒| 衬衫配什么裤子好看| from是什么意思| 为什么单位不愿意申请工伤| 秦始皇为什么叫祖龙| 头晕有点恶心是什么原因| 团购什么意思| 榴莲吃了有什么好处| kitchen什么意思| 小河虾吃什么| 鸟死在家里是什么征兆| ysl是什么品牌| 派特ct主要检查什么| 不怕热是什么体质| 尿蛋白十一什么意思| 乔迁之喜送什么花| 什么是弱视| 黄瓜和什么不能一起吃| score是什么意思| 维生素c主治什么| 死有余辜是什么意思| 喝酒容易醉是什么原因| 小人是什么意思| 关联词是什么意思| 落枕吃什么药| 什么是客单价| 孕妇尿回收是干什么用的| 偏光镜片是什么意思| 生蚝和牡蛎有什么区别| 坠积效应是什么意思| 牙齿里面疼是什么原因| 黑曜石是什么材质| 抗核抗体阳性是什么意思| 梭织是什么意思| 肿标五项查的是什么| 双肺间质性改变是什么意思| 色素沉着有什么办法可以去除| 鱼子酱是什么东西| 春节为什么要放鞭炮| qs排名是什么意思| 司令是什么军衔| 菠菜吃多了有什么害处| 走路脚心疼是什么原因| 赵云的坐骑是什么马| 翡翠和玉石有什么区别| 摘帽是什么意思| 后顶焦度是什么意思| 嘴里发咸是什么原因| 贫血吃什么食物好| 中学校长什么级别| 头汗多是什么原因引起的| 大豆油是什么豆做的| 石骨症是什么病| 124什么意思| 风湿性关节炎用什么药效果好| 大便陶土色是什么颜色| 胆囊炎需要注意什么| 端午节吃什么食物| 羊的守护神是什么菩萨| coscia是什么品牌| 荷花是什么季节开放的| 丰富的近义词和反义词是什么| 日龙包是什么意思| ed病毒是什么| 濑粉是什么| 肾结石忌口什么| 减肥吃什么药| 殇字是什么意思| 中指和无名指发麻是什么原因| 牙龈痛吃什么药| 天性使然什么意思| 大腿抽筋是什么原因引起的| 尿检阴性是什么意思| 割包皮什么意思| 大拇指戴戒指是什么意思| 什么鸡蛋营养价值最高| 四大菩萨分别保佑什么| 假小子是什么意思| 金针菇炒什么好吃| 美国的国歌是什么| 红斑狼疮是什么症状| ddi是什么意思| 液化是什么意思| 大姨妈来了可以吃什么水果| 凌霄花什么时候开花| 喝什么解辣| 真实的印度是什么样的| 大作是什么意思| 手指关节疼痛看什么科| 排卵期出血是什么原因引起的| 脖子上长小肉疙瘩是什么原因| 浮沉是什么意思| 血糖高一日三餐吃什么东西最适合| 口巴读什么| 什么是月令| 土耳其说什么语言| 路由器管理员密码是什么| 白衣天使是什么意思| 鼻饲是什么意思| pos是什么意思| 绿色大便是什么原因| 百脚虫的出现意味什么| 护理部主任是什么级别| 武汉都有什么区| 思密达是什么意思| 平行班是什么意思| 肾阴阳两虚吃什么药| 百度Jump to content

“12318”主题宣传活动进社区

From Wikipedia, the free encyclopedia
Photo data corruption; in this case, a result of a failed data recovery from a hard disk drive
百度 手指发痒是什么原因

Data corruption refers to errors in computer data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data. Computer, transmission, and storage systems use a number of measures to provide end-to-end data integrity, or lack of errors.

In general, when data corruption occurs, a file containing that data will produce unexpected results when accessed by the system or the related application. Results could range from a minor loss of data to a system crash. For example, if a document file is corrupted, when a person tries to open that file with a document editor they may get an error message, thus the file might not be opened or might open with some of the data corrupted (or in some cases, completely corrupted, leaving the document unintelligible). The adjacent image is a corrupted image file in which most of the information has been lost.

Some types of malware may intentionally corrupt files as part of their payloads, usually by overwriting them with inoperative or garbage code, while a non-malicious virus may also unintentionally corrupt files when it accesses them. If a virus or trojan with this payload method manages to alter files critical to the running of the computer's operating system software or physical hardware, the entire system may be rendered unusable.

Some programs can give a suggestion to repair the file automatically (after the error), and some programs cannot repair it. It depends on the level of corruption, and the built-in functionality of the application to handle the error. There are various causes of the corruption.

Overview

[edit]
Photo of an Atari 2600 with corrupted RAM.
A video that has been corrupted. Epilepsy warning: This video contains bright, flashing images.

There are two types of data corruption associated with computer systems: undetected and detected. Undetected data corruption, also known as silent data corruption, results in the most dangerous errors as there is no indication that the data is incorrect. Detected data corruption may be permanent with the loss of data, or may be temporary when some part of the system is able to detect and correct the error; there is no data corruption in the latter case.

Data corruption can occur at any level in a system, from the host to the storage medium. Modern systems attempt to detect corruption at many layers and then recover or correct the corruption; this is almost always successful but very rarely the information arriving in the systems memory is corrupted and can cause unpredictable results.

Data corruption during transmission has a variety of causes. Interruption of data transmission causes information loss. Environmental conditions can interfere with data transmission, especially when dealing with wireless transmission methods. Heavy clouds can block satellite transmissions. Wireless networks are susceptible to interference from devices such as microwave ovens.

Hardware and software failure are the two main causes for data loss. Background radiation, head crashes, and aging or wear of the storage device fall into the former category, while software failure typically occurs due to bugs in the code. Cosmic rays cause most soft errors in DRAM.[1]

Silent

[edit]

Some errors go unnoticed, without being detected by the disk firmware or the host operating system; these errors are known as silent data corruption.[2]

There are many error sources beyond the disk storage subsystem itself. For instance, cables might be slightly loose, the power supply might be unreliable,[3] external vibrations such as a loud sound,[4] the network might introduce undetected corruption,[5] cosmic radiation and many other causes of soft memory errors, etc. In 39,000 storage systems that were analyzed, firmware bugs accounted for 5–10% of storage failures.[6] The error rates as observed by a CERN study on silent corruption are far higher than one in every 1016 bits.[7] Amazon Web Services acknowledged that data corruption was the cause of a widespread outage of their Amazon S3 storage network in 2008.[8] In 2021, faulty processor cores were identified as an additional cause in publications by Google and Facebook; cores were found to be faulty at a rate of several in thousands of cores.[9][10]

One problem is that hard disk drive capacities have increased substantially, but their error rates remain unchanged. The data corruption rate has always been roughly constant in time, meaning that modern disks are not much safer than old disks. In old disks the probability of data corruption was very small because they stored tiny amounts of data. In modern disks the probability is much larger because they store much more data, whilst not being safer. That way, silent data corruption has not been a serious concern while storage devices remained relatively small and slow. In modern times and with the advent of larger drives and very fast RAID setups, users are capable of transferring 1016 bits in a reasonably short time, thus easily reaching the data corruption thresholds.[11]

As an example, ZFS creator Jeff Bonwick stated that the fast database at Greenplum, which is a database software company specializing in large-scale data warehousing and analytics, faces silent corruption every 15 minutes.[12] As another example, a real-life study performed by NetApp on more than 1.5 million HDDs over 41 months found more than 400,000 silent data corruptions, out of which more than 30,000 were not detected by the hardware RAID controller (only detected during scrubbing).[13] Another study, performed by CERN over six months and involving about 97 petabytes of data, found that about 128 megabytes of data became permanently corrupted silently somewhere in the pathway from network to disk.[14]

Silent data corruption may result in cascading failures, in which the system may run for a period of time with undetected initial error causing increasingly more problems until it is ultimately detected.[15] For example, a failure affecting file system metadata can result in multiple files being partially damaged or made completely inaccessible as the file system is used in its corrupted state.

Countermeasures

[edit]

When data corruption behaves as a Poisson process, where each bit of data has an independently low probability of being changed, data corruption can generally be detected by the use of checksums, and can often be corrected by the use of error correcting codes (ECC).

If an uncorrectable data corruption is detected, procedures such as automatic retransmission or restoration from backups can be applied. Certain levels of RAID disk arrays have the ability to store and evaluate parity bits for data across a set of hard disks and can reconstruct corrupted data upon the failure of a single or multiple disks, depending on the level of RAID implemented. Some CPU architectures employ various transparent checks to detect and mitigate data corruption in CPU caches, CPU buffers and instruction pipelines; an example is Intel Instruction Replay technology, which is available on Intel Itanium processors.[16]

Many errors are detected and corrected by the hard disk drives using the ECC codes[17] which are stored on disk for each sector. If the disk drive detects multiple read errors on a sector it may make a copy of the failing sector on another part of the disk, by remapping the failed sector of the disk to a spare sector without the involvement of the operating system (though this may be delayed until the next write to the sector). This "silent correction" can be monitored using S.M.A.R.T. and tools available for most operating systems to automatically check the disk drive for impending failures by watching for deteriorating SMART parameters.

Some file systems, such as Btrfs, HAMMER, ReFS, and ZFS, use internal data and metadata checksumming to detect silent data corruption. In addition, if a corruption is detected and the file system uses integrated RAID mechanisms that provide data redundancy, such file systems can also reconstruct corrupted data in a transparent way.[18] This approach allows improved data integrity protection covering the entire data paths, which is usually known as end-to-end data protection, compared with other data integrity approaches that do not span different layers in the storage stack and allow data corruption to occur while the data passes boundaries between the different layers.[19]

Data scrubbing is another method to reduce the likelihood of data corruption, as disk errors are caught and recovered from before multiple errors accumulate and overwhelm the number of parity bits. Instead of parity being checked on each read, the parity is checked during a regular scan of the disk, often done as a low priority background process. The "data scrubbing" operation activates a parity check. If a user simply runs a normal program that reads data from the disk, then the parity would not be checked unless parity-check-on-read was both supported and enabled on the disk subsystem.

If appropriate mechanisms are employed to detect and remedy data corruption, data integrity can be maintained. This is particularly important in commercial applications (e.g. banking), where an undetected error could either corrupt a database index or change data to drastically affect an account balance, and in the use of encrypted or compressed data, where a small error can make an extensive dataset unusable.[7]

See also

[edit]

References

[edit]
  1. ^ Scientific American (2025-08-06). "Solar Storms: Fast Facts". Nature Publishing Group. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  2. ^ "Silent Data Corruption". Google Inc. 2023. Retrieved January 30, 2023. Silent Data Corruption (SDC), sometimes referred to as Silent Data Error (SDE), is an industry-wide issue impacting not only long-protected memory, storage, and networking, but also computer CPUs.
  3. ^ Eric Lowe (16 November 2005). "ZFS saves the day(-ta)!". Oracle – Core Dumps of a Kernel Hacker's Brain – Eric Lowe's Blog. Oracle. Archived from the original (Blog) on 5 February 2012. Retrieved 9 June 2012.
  4. ^ bcantrill (31 December 2008). "Shouting in the Datacenter" (Video file). YouTube. Archived from the original on 3 July 2012. Retrieved 9 June 2012.
  5. ^ jforonda (31 January 2007). "Faulty FC port meets ZFS" (Blog). Blogger – Outside the Box. Archived from the original on 26 April 2012. Retrieved 9 June 2012.
  6. ^ "Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure Characteristics" (PDF). USENIX. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06.
  7. ^ a b Bernd Panzer-Steindel (8 April 2007). "Draft 1.3". Data integrity. CERN. Archived from the original on 27 October 2012. Retrieved 9 June 2012.
  8. ^ "AWS Service Availability". status.aws.amazon.com. Archived from the original on December 25, 2008. Retrieved 11 July 2025.
  9. ^ Hochschild, Peter H.; Turner, Paul Jack; Mogul, Jeffrey C.; Govindaraju, Rama Krishna; Ranganathan, Parthasarathy; Culler, David E.; Vahdat, Amin (2021). "Cores that don't count" (PDF). Proceedings of the Workshop on Hot Topics in Operating Systems. pp. 9–16. doi:10.1145/3458336.3465297. ISBN 9781450384384. S2CID 235311320. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06.
  10. ^ HotOS 2021: Cores That Don't Count (Fun Hardware), 27 May 2021, archived from the original on 2025-08-06, retrieved 2025-08-06
  11. ^ "Silent data corruption in disk arrays: A solution". NEC. 2009. Archived from the original (PDF) on 29 October 2013. Retrieved 14 December 2020.
  12. ^ "A Conversation with Jeff Bonwick and Bill Moore". Association for Computing Machinery. November 15, 2007. Archived from the original on 16 July 2011. Retrieved 14 December 2020.
  13. ^ David S. H. Rosenthal (October 1, 2010). "Keeping Bits Safe: How Hard Can It Be?". ACM Queue. Archived from the original on December 17, 2013. Retrieved 2025-08-06.; Bairavasundaram, L., Goodson, G., Schroeder, B., Arpaci-Dusseau, A. C., Arpaci-Dusseau, R. H. 2008. An analysis of data corruption in the storage stack. In Proceedings of 6th Usenix Conference on File and Storage Technologies.
  14. ^ Kelemen, P. Silent corruptions (PDF). 8th Annual Workshop on Linux Clusters for Super Computing.
  15. ^ David Fiala; Frank Mueller; Christian Engelmann; Rolf Riesen; Kurt Ferreira; Ron Brightwell (November 2012). "Detection and Correction of Silent Data Corruption for Large-Scale High-Performance Computing" (PDF). fiala.me. IEEE. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06.
  16. ^ Steve Bostian (2012). "Rachet Up Reliability for Mission-Critical Applications: Intel Instruction Replay Technology" (PDF). Intel. Archived (PDF) from the original on 2025-08-06. Retrieved 2025-08-06.
  17. ^ "Read Error Severities and Error Management Logic". Archived from the original on 7 April 2012. Retrieved 4 April 2012.
  18. ^ Margaret Bierman; Lenz Grimmer (August 2012). "How I Use the Advanced Capabilities of Btrfs". Oracle Corporation. Archived from the original on 2025-08-06. Retrieved 2025-08-06.
  19. ^ Yupu Zhang; Abhishek Rajimwale; Andrea Arpaci-Dusseau; Remzi H. Arpaci-Dusseau (2010). "End-to-end data integrity for file systems: a ZFS case study" (PDF). USENIX Conference on File and Storage Technologies. CiteSeerX 10.1.1.154.3979. S2CID 5722163. Wikidata Q111972797. Retrieved 2025-08-06.
[edit]
切除一侧输卵管对女性有什么影响 符号是什么 阴骘是什么意思 人参什么时候吃最好 印记是什么意思
nt检查什么 头发出汗多是什么原因 六月初七是什么星座 镜面是什么意思 脑疝是什么意思
iabp医学上是什么意思 pfs是什么意思 蛇爱吃什么食物 慌张的反义词是什么 bm什么意思
什么叫全日制本科 sigma是什么牌子 6月17日是什么星座 什么是抗生素类药物 今年43岁属什么
rov是什么意思hcv9jop0ns9r.cn 斑秃吃什么药效果好hcv9jop6ns5r.cn 药剂师是做什么的hcv7jop5ns0r.cn 拮抗剂是什么hcv9jop2ns1r.cn 放下是什么意思hcv8jop3ns7r.cn
电镀对人体有什么危害clwhiglsz.com 做梦怀孕了是什么意思hcv7jop6ns6r.cn 10.22是什么星座hcv9jop5ns7r.cn 天麻长什么样子图片hcv7jop6ns4r.cn 易烊千玺什么星座hcv9jop2ns2r.cn
肺栓塞挂什么科hcv8jop1ns8r.cn nikon是什么牌子hcv9jop2ns8r.cn 热淋是什么意思clwhiglsz.com 女为悦己者容是什么意思hcv8jop1ns7r.cn 咳嗽有黄痰吃什么消炎药hcv8jop5ns4r.cn
miu什么牌子hcv8jop8ns4r.cn 跑步机cal是什么意思hcv8jop5ns9r.cn 口腔溃疡是什么原因造成的hcv9jop0ns7r.cn 莫逆是什么意思hcv8jop4ns5r.cn 咽后壁淋巴滤泡增生吃什么药hcv8jop8ns6r.cn
百度