Data corruption

Photo data corruption; in this case, a result of a failed data recovery from a hard disk drive

Data corruption refers to errors in computer data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data. Computer, transmission, and storage systems use a number of measures to provide end-to-end data integrity, or lack of errors.

In general, when data corruption occurs, a file containing that data will produce unexpected results when accessed by the system or the related application. Results could range from a minor loss of data to a system crash. For example, if a document file is corrupted, when a person tries to open that file with a document editor they may get an error message, thus the file might not be opened or might open with some of the data corrupted (or in some cases, completely corrupted, leaving the document unintelligible). The adjacent image is a corrupted image file in which most of the information has been lost.

Some types of malware may intentionally corrupt files as part of their payloads, usually by overwriting them with inoperative or garbage code, while a non-malicious virus may also unintentionally corrupt files when it accesses them. If a virus or trojan with this payload method manages to alter files critical to the running of the computer's operating system software or physical hardware, the entire system may be rendered unusable.

Some programs can give a suggestion to repair the file automatically (after the error), and some programs cannot repair it. It depends on the level of corruption, and the built-in functionality of the application to handle the error. There are various causes of the corruption.

Overview

Photo of an Atari 2600 with corrupted RAM.
A video that has been corrupted. Epilepsy warning: This video contains bright, flashing images.

There are two types of data corruption associated with computer systems: undetected and detected. Undetected data corruption, also known as silent data corruption, results in the most dangerous errors as there is no indication that the data is incorrect. Detected data corruption may be permanent with the loss of data, or may be temporary when some part of the system is able to detect and correct the error; there is no data corruption in the latter case.

Data corruption can occur at any level in a system, from the host to the storage medium. Modern systems attempt to detect corruption at many layers and then recover or correct the corruption; this is almost always successful but very rarely the information arriving in the systems memory is corrupted and can cause unpredictable results.

Data corruption during transmission has a variety of causes. Interruption of data transmission causes information loss. Environmental conditions can interfere with data transmission, especially when dealing with wireless transmission methods. Heavy clouds can block satellite transmissions. Wireless networks are susceptible to interference from devices such as microwave ovens.

Hardware and software failure are the two main causes for data loss. Background radiation, head crashes, and aging or wear of the storage device fall into the former category, while software failure typically occurs due to bugs in the code. Cosmic rays cause most soft errors in DRAM.[1]

Silent

Some errors go unnoticed, without being detected by the disk firmware or the host operating system; these errors are known as silent data corruption.[2]

There are many error sources beyond the disk storage subsystem itself. For instance, cables might be slightly loose, the power supply might be unreliable,[3] external vibrations such as a loud sound,[4] the network might introduce undetected corruption,[5] cosmic radiation and many other causes of soft memory errors, etc. In 39,000 storage systems that were analyzed, firmware bugs accounted for 5–10% of storage failures.[6] All in all, the error rates as observed by a CERN study on silent corruption are far higher than one in every 1016 bits.[7] Webshop Amazon.com has acknowledged similar high data corruption rates in their systems.[8] In 2021, faulty processor cores were identified as an additional cause in publications by Google and Facebook; cores were found to be faulty at a rate of several in thousands of cores.[9][10]

One problem is that hard disk drive capacities have increased substantially, but their error rates remain unchanged. The data corruption rate has always been roughly constant in time, meaning that modern disks are not much safer than old disks. In old disks the probability of data corruption was very small because they stored tiny amounts of data. In modern disks the probability is much larger because they store much more data, whilst not being safer. That way, silent data corruption has not been a serious concern while storage devices remained relatively small and slow. In modern times and with the advent of larger drives and very fast RAID setups, users are capable of transferring 1016 bits in a reasonably short time, thus easily reaching the data corruption thresholds.[11]

As an example, ZFS creator Jeff Bonwick stated that the fast database at Greenplum, which is a database software company specializing in large-scale data warehousing and analytics, faces silent corruption every 15 minutes.[12] As another example, a real-life study performed by NetApp on more than 1.5 million HDDs over 41 months found more than 400,000 silent data corruptions, out of which more than 30,000 were not detected by the hardware RAID controller (only detected during scrubbing).[13] Another study, performed by CERN over six months and involving about 97 petabytes of data, found that about 128 megabytes of data became permanently corrupted silently somewhere in the pathway from network to disk.[14]

Silent data corruption may result in cascading failures, in which the system may run for a period of time with undetected initial error causing increasingly more problems until it is ultimately detected.[15] For example, a failure affecting file system metadata can result in multiple files being partially damaged or made completely inaccessible as the file system is used in its corrupted state.

Countermeasures

When data corruption behaves as a Poisson process, where each bit of data has an independently low probability of being changed, data corruption can generally be detected by the use of checksums, and can often be corrected by the use of error correcting codes (ECC).

If an uncorrectable data corruption is detected, procedures such as automatic retransmission or restoration from backups can be applied. Certain levels of RAID disk arrays have the ability to store and evaluate parity bits for data across a set of hard disks and can reconstruct corrupted data upon the failure of a single or multiple disks, depending on the level of RAID implemented. Some CPU architectures employ various transparent checks to detect and mitigate data corruption in CPU caches, CPU buffers and instruction pipelines; an example is Intel Instruction Replay technology, which is available on Intel Itanium processors.[16]

Many errors are detected and corrected by the hard disk drives using the ECC codes[17] which are stored on disk for each sector. If the disk drive detects multiple read errors on a sector it may make a copy of the failing sector on another part of the disk, by remapping the failed sector of the disk to a spare sector without the involvement of the operating system (though this may be delayed until the next write to the sector). This "silent correction" can be monitored using S.M.A.R.T. and tools available for most operating systems to automatically check the disk drive for impending failures by watching for deteriorating SMART parameters.

Some file systems, such as Btrfs, HAMMER, ReFS, and ZFS, use internal data and metadata checksumming to detect silent data corruption. In addition, if a corruption is detected and the file system uses integrated RAID mechanisms that provide data redundancy, such file systems can also reconstruct corrupted data in a transparent way.[18] This approach allows improved data integrity protection covering the entire data paths, which is usually known as end-to-end data protection, compared with other data integrity approaches that do not span different layers in the storage stack and allow data corruption to occur while the data passes boundaries between the different layers.[19]

Data scrubbing is another method to reduce the likelihood of data corruption, as disk errors are caught and recovered from before multiple errors accumulate and overwhelm the number of parity bits. Instead of parity being checked on each read, the parity is checked during a regular scan of the disk, often done as a low priority background process. The "data scrubbing" operation activates a parity check. If a user simply runs a normal program that reads data from the disk, then the parity would not be checked unless parity-check-on-read was both supported and enabled on the disk subsystem.

If appropriate mechanisms are employed to detect and remedy data corruption, data integrity can be maintained. This is particularly important in commercial applications (e.g. banking), where an undetected error could either corrupt a database index or change data to drastically affect an account balance, and in the use of encrypted or compressed data, where a small error can make an extensive dataset unusable.[7]

See also

References

  1. ^ Scientific American (2008-07-21). "Solar Storms: Fast Facts". Nature Publishing Group. Archived from the original on 2010-12-26. Retrieved 2009-12-08.
  2. ^ "Silent Data Corruption". Google Inc. 2023. Retrieved January 30, 2023. Silent Data Corruption (SDC), sometimes referred to as Silent Data Error (SDE), is an industry-wide issue impacting not only long-protected memory, storage, and networking, but also computer CPUs.
  3. ^ Eric Lowe (16 November 2005). "ZFS saves the day(-ta)!". Oracle – Core Dumps of a Kernel Hacker's Brain – Eric Lowe's Blog. Oracle. Archived from the original (Blog) on 5 February 2012. Retrieved 9 June 2012.
  4. ^ bcantrill (31 December 2008). "Shouting in the Datacenter" (Video file). YouTube. Archived from the original on 3 July 2012. Retrieved 9 June 2012.
  5. ^ jforonda (31 January 2007). "Faulty FC port meets ZFS" (Blog). Blogger – Outside the Box. Archived from the original on 26 April 2012. Retrieved 9 June 2012.
  6. ^ "Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure Characteristics" (PDF). USENIX. Archived (PDF) from the original on 2022-01-25. Retrieved 2014-01-18.
  7. ^ a b Bernd Panzer-Steindel (8 April 2007). "Draft 1.3". Data integrity. CERN. Archived from the original on 27 October 2012. Retrieved 9 June 2012.
  8. ^ "Observations on Errors, Corrections, & Trust of Dependent Systems". Archived from the original on 2013-10-29.
  9. ^ Hochschild, Peter H.; Turner, Paul Jack; Mogul, Jeffrey C.; Govindaraju, Rama Krishna; Ranganathan, Parthasarathy; Culler, David E.; Vahdat, Amin (2021). "Cores that don't count" (PDF). Proceedings of the Workshop on Hot Topics in Operating Systems. pp. 9–16. doi:10.1145/3458336.3465297. ISBN 9781450384384. S2CID 235311320. Archived (PDF) from the original on 2021-06-03. Retrieved 2021-06-02.
  10. ^ HotOS 2021: Cores That Don't Count (Fun Hardware), 27 May 2021, archived from the original on 2021-12-22, retrieved 2021-06-02
  11. ^ "Silent data corruption in disk arrays: A solution". NEC. 2009. Archived from the original (PDF) on 29 October 2013. Retrieved 14 December 2020.
  12. ^ "A Conversation with Jeff Bonwick and Bill Moore". Association for Computing Machinery. November 15, 2007. Archived from the original on 16 July 2011. Retrieved 14 December 2020.
  13. ^ David S. H. Rosenthal (October 1, 2010). "Keeping Bits Safe: How Hard Can It Be?". ACM Queue. Archived from the original on December 17, 2013. Retrieved 2014-01-02.; Bairavasundaram, L., Goodson, G., Schroeder, B., Arpaci-Dusseau, A. C., Arpaci-Dusseau, R. H. 2008. An analysis of data corruption in the storage stack. In Proceedings of 6th Usenix Conference on File and Storage Technologies.
  14. ^ Kelemen, P. Silent corruptions (PDF). 8th Annual Workshop on Linux Clusters for Super Computing.
  15. ^ David Fiala; Frank Mueller; Christian Engelmann; Rolf Riesen; Kurt Ferreira; Ron Brightwell (November 2012). "Detection and Correction of Silent Data Corruption for Large-Scale High-Performance Computing" (PDF). fiala.me. IEEE. Archived (PDF) from the original on 2014-11-07. Retrieved 2015-01-26.
  16. ^ Steve Bostian (2012). "Rachet Up Reliability for Mission-Critical Applications: Intel Instruction Replay Technology" (PDF). Intel. Archived (PDF) from the original on 2016-02-02. Retrieved 2016-01-27.
  17. ^ "Read Error Severities and Error Management Logic". Archived from the original on 7 April 2012. Retrieved 4 April 2012.
  18. ^ Margaret Bierman; Lenz Grimmer (August 2012). "How I Use the Advanced Capabilities of Btrfs". Oracle Corporation. Archived from the original on 2014-01-02. Retrieved 2014-01-02.
  19. ^ Yupu Zhang; Abhishek Rajimwale; Andrea Arpaci-Dusseau; Remzi H. Arpaci-Dusseau (2010). "End-to-end data integrity for file systems: a ZFS case study" (PDF). USENIX Conference on File and Storage Technologies. CiteSeerX 10.1.1.154.3979. S2CID 5722163. Wikidata Q111972797. Retrieved 2014-08-12.

Read other articles:

Naval ensign of Italy This is a list of active Italian Navy ships. The navy maintains approximately 181 ships in service,[1] including minor auxiliary vessels. The fleet has started a process of renewal that will see 50 ships retired by 2025 and replaced by 30 multi-mission ships.[2] Ocean going fleet units include: 2 light aircraft carriers, 3 small 8,000-tonne amphibious transport docks, 4 air-defence destroyers, 4 general-purpose frigates, 7 anti-submarine frigates, and 8 a...

 

Oomycetes Klasifikasi ilmiah Domain: Eukarya (tanpa takson): SAR Filum: Heterokontophyta Kelas: kentangArx, 1967[1] Ordo dan familia Lagenidiales Lagenidiaceae Olpidiosidaceae Sirolpidiaceae Leptomitales Leptomitaceae Peronosporales Albuginaceae Peronosporaceae Pythiaceae Rhipidiales Rhipidaceae Saprolegniales Ectrogellaceae Haliphthoraceae Leptolegniellaceae Saprolegniaceae Sinonim Oomycetes Winter, 1879[2] Peronosporomycetes Dick, 2001[3] Oomycetes (dibaca seperti o-...

 

В Википедии есть статьи о других людях с фамилией Накано. Сигэхару Наканояп. 中野重治 Дата рождения 25 января 1902(1902-01-25) Место рождения Сакаи, Фукуи, Япония Дата смерти 24 августа 1979(1979-08-24) (77 лет) Гражданство (подданство)  Япония Род деятельности политик, романист, поэт,...

2017–18 European Rugby Champions Cup pool stageSeason2017–18 European Rugby Champions CupDate13 October 2017 – 21 January 2018QualifiersSeed 1 LeinsterSeed 2 ClermontSeed 3 MunsterSeed 4 ScarletsSeed 5 La RochelleSeed 6 ToulonSeed 7 Racing 92Seed 8 Saracens ← 2016–17(Previous) 2018–19 →(Next) Main article: 2017–18 European Rugby Champions Cup UlsterWaspsHarlequins NorthamptonSaracensOspreysLeinster Exeter Chiefs Glasgow Warriors Leicester Tigers Munster Bath Scarletsclass=notp...

 

Mainstage Music Fundación abril de 2012Fundador(es) Willem van Hanegem Jr. Ward van der HarstDistribuidor Armada MusicGénero(s) Big Room Trance Electro House Progressive House HardstylePaís  Países BajosLocalización Haarlem, Países Bajoswandwmusic.com[editar datos en Wikidata] Mainstage Music era un subsello discográfico de Armada Music, fundado en el año 2012 por el dúo neerlandés de música electrónica W&W. Esta discográfica se centra principalmente en g...

 

W.J.F.M baron van Hugenpoth tot Aerdt (1953) Walraed Jozeph Frederik Maria baron van Hugenpoth tot Aerdt (Boxtel, 9 mei 1904 – Vught, 29 juni 1990) was een Nederlands politicus. Hij werd geboren als zoon van Adolphus Ludovicus Wilhelmus baron van Hugenpoth tot Aerdt (1863-1913) en Anna Josephine Frederica Gijsberta Maria barones van Voorst tot Voorst (1878-1938). Hij was volontair bij de gemeentesecretarie van Renkum voor hij begin 1935 benoemd werd tot burgemeester van Overasselt...

2019 live album by Archie RoachThe Concert Collection 2012–2018Live album by Archie RoachReleased17 May 2019RecordedNovember 2012 - May 2018VenueThe Arts Centre, State Theatre, Melbourne Recital CentreLabelBloodlinesArchie Roach chronology Dancing with My Spirit(2018) The Concert Collection 2012–2018(2019) Tell Me Why(2019) The Concert Collection 2012–2018 is a three-disc live album by Australian singer-songwriter Archie Roach. The album features live recordings from Roach's thr...

 

Indian businessman Some of this article's listed sources may not be reliable. Please help this article by looking for better, more reliable sources. Unreliable citations may be challenged or deleted. (October 2023) (Learn how and when to remove this template message) Mohit AronBorn1973 (age 49–50)Pathankot, IndiaAlma materIndian Institute of Technology, DelhiTitleFounder & CEO of CohesityCo-Founder & CTO of Nutanix Mohit Aron (born 1973),[citation needed] is an...

 

British TV sitcom (1972–1979) SykesEric Sykes on Sykes DVD coverStarring Eric Sykes Hattie Jacques Deryck Guyler Richard Wattis Country of originUnited KingdomOriginal languageEnglishNo. of series7No. of episodes68ProductionProducerRoger RaceRunning time30 minutesProduction companyBBCOriginal releaseNetworkBBC1Release14 September 1972 (1972-09-14) –16 November 1979 (1979-11-16)RelatedSykes and a... Sykes is a British sitcom that aired on BBC 1 from 1972 to 1979. Starring Er...

Markus Yunianus Yustinus (bahasa Latin: Marcus Iunianus Iustinus; lebih dikenal dengan nama Yustinus saja) adalah sejarawan Latin yang hidup pada masa Kekaisaran Romawi. Namanya disebutkan dalam judul catatan sejarahnya sendiri, dalam bentuk genitif, sehingga menjadi M. Juniani Justini terlepas dari nomen yang dia sandang. Epitome historiarum Trogi Pompeii Sedikit mengenainya yang diketahui. Dia adalah penulis Historiarum Philippicarum libri XLIV, sebuah karya yang dia gambarkan dalam pra...

 

Communauté de communes Arbois, Vignes et Villages - Pays de Louis Pasteur Administration Pays France Région Bourgogne-Franche-Comté Département Jura Forme Communauté de communes Siège Arbois Communes 14 Date de création 1er janvier 2001 Date de disparition 31 décembre 2016 Code SIREN 243901055 Démographie Population 6 422 hab. (2012) Densité 45 hab./km2 Géographie Superficie 143,5 km2 Liens Fiche Banatic Données en ligne modifier  La communauté de commune...

 

American college football season 2021 Arkansas Razorbacks footballOutback Bowl championOutback Bowl, W 24–10 vs. Penn StateConferenceSoutheastern ConferenceDivisionWest DivisionRankingCoachesNo. 20APNo. 21Record9–4 (4–4 SEC)Head coachSam Pittman (2nd season)Offensive coordinatorKendal Briles (2nd season)Offensive schemeSpread, hurry-up, no-huddleDefensive coordinatorBarry Odom (2nd season)Base defense3–2–6Captain Grant Morgan Jalen Catalon Joe Fouc...

A military event in Ukrainian history at the end of World War I For other uses, see Death Triangle (disambiguation).You can help expand this article with text translated from the corresponding article in Ukrainian. Click [show] for important translation instructions. Machine translation, like DeepL or Google Translate, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machi...

 

Military practice of eating a communal meal in the Philippines KamayanKamayan in actionAlternative nameskinamo, kinamut, boodle fightPlace of originPhilippinesOther informationSadya  Media: Kamayan A beach kamayan in Baler, Aurora. Men of the 2nd Mechanized Infantry Brigade of the Philippine Army are joined by civilians in a boodle fight. Part of a series onMeals Meals Suhur Breakfast Second breakfast Elevenses Brunch Lunch Tea Tiffin Dinner Supper Iftar Siu yeh Snack Combination mea...

 

Hungarian religious celebration Busó festivities at Mohács: masked end-of-winter carnival customUNESCO Intangible Cultural HeritageSome masked Busós in Mohács town square, February 2006CountryHungaryDomainsCarnivalReference[1]RegionEurope and North AmericaInscription historyInscription2009 (4th session)ListRepresentative List The Busójárás (Hungarian, meaning Busó-walking; in Croatian: Pohod bušara[1]) is an annual celebration of the Šokci living in the town of Mohács, Hung...

Temperate grasslands, savannas, and shrublands ecoregion of Canada and the United States Northern short grasslandsPrairie in southeastern Alberta, CanadaEcologyRealmNearcticBiomeTemperate grasslands, savannas, and shrublandsBorders List Montana Valley and Foothill grasslandsNorthern mixed grasslandsWestern short grasslandsNebraska Sand Hills mixed grasslandsWyoming Basin shrub steppeSouth Central Rockies forestsColorado Rockies forests Bird species231[1]Mammal species78[1]Geog...

 

United States historic placeRidgewood FarmU.S. National Register of Historic PlacesU.S. Historic district Ridgewood Farmhouse, September 2013Show map of PennsylvaniaShow map of the United StatesLocationJct. of PA 724 and I-176, Cumru Township, PennsylvaniaCoordinates40°17′43″N 75°53′50″W / 40.29528°N 75.89722°W / 40.29528; -75.89722Area136 acres (55 ha)Built1809Architectural styleFederal, Pennsylvania bank barnMPSFarms in Berks County MPSNRHP ...

 

Football stadium in Nice, France Stade du RayFull nameStade Municipal du RayLocationNice, FranceOwnerCity of NiceCapacity17,415SurfaceGrassConstructionBuilt1897Opened30 January 1927Renovated1948, 1979, 1992, 1997Closed2013Demolished2017TenantsOGC Nice (1927–2013) Stade Municipal du Ray was a football stadium in Nice, France. It was the home of OGC Nice since it opened in 1927 and had a capacity of 17,415.[1] It was popular for being located in the center of the city, but suffered fr...

For other ships with the same name, see HMS Lynx. Acasta-class destroyer Lynx History United Kingdom NameLynx BuilderLondon and Glasgow Shipbuilding Company, Govan Yard number364[1] Laid down18 January 1912 Launched20 March 1913 CommissionedJanuary 1914 FateSunk by a naval mine, 9 August 1915 General characteristics (as built) Class and typeAcasta-class destroyer Displacement1,072 long tons (1,089 t) (deep load) Length267 ft 6 in (81.5 m) Beam27 ft (8.2 m...

 

This article has an unclear citation style. The references used may be made clearer with a different or consistent style of citation and footnoting. (June 2020) (Learn how and when to remove this template message) Pakistan Army Leadership Chief of Army Staff Chairman Joint Chiefs of Staff Committee Organisation and components Frontier Corps National Guard Pakistan Rangers Frontier Works Organization Special Service Group Army Cantonment Board Pakistan Armoured Corps Installations General Head...

 

Strategi Solo vs Squad di Free Fire: Cara Menang Mudah!