-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
verify_zero does not stop after first non-zero byte #572
Comments
Yes, that behaviour is by design as it effectively counts non zero blocks. Yes, a option can be added to change that behaviour so it aborts the verification on the first non zero block it encounters. I'll add it to the project list. |
Awesome, thank you! Would it be possible for this option to also apply the built-in verify phase after an overwrite rather than only for explicit verify passes? Also, I was curious about the failure behavior for overwriting as well. If We would prefer this behavior since we are erasing donated drives for reuse in a refurb non-profit. If any drive fails health checks (via HD Sentinel), or fails during overwriting or verifying we will just physically destroy the drive. So, there is no need for us to continue taking time to overwrite or verify the rest of the drive once a single error has been hit. As a somewhat related, by possible much bigger/different request. Would it be possible/feasible to verify at the same type as overwriting? So, each bit that is written is immediately verified and the process can stop right then if there is any failure. This way, with the erasure and verification passes combined the process could fail faster than doing a full overwrite and then failing during the verification. I believe this would make the behavior more similar to how Finally, a bit more unrelated... looking into this verification behavior made me curious about how exactly |
Yes
Immediately stopping on a I/O errors is nwipes default behaviour already. Others have requested an option to keep writing passed errors or reverse wiping.
That's certainly possible, however it's the first time anybody has asked for that so it depends on how popular that might be as to whether it gets implemented or not
That's because it's pseudo random data. Each of the pseudo random number generators provided with nwipe is seeded with x number of bits. From these bits a stream of random numbers are generated. This stream of random numbers can be reproduced identically as long as you start with the same seed. Nwipe generates a random seed for each drive being wiped. It records this seed for use later in the verification pass then when nwipe exits all the seeds are forgotten, i.e not saved anywhere. The next lot of drives wiped then have new random seeds generated to start of the random number generators. |
Genuine question: can you link to a modern alternative to badblocks? |
It appears as though using the
verify_zero
method does not stop quickly on a drive that I know has data on it, while using something likebadblocks
with the option to stop after the first non-zero byte fails basically instantaneously.Is there some reason/use-case for why
nwipe
continues verifying a drive even after it has encountered a non-zero byte? Is it possible to change this behavior to stop verifying after the first non-zero byte, or to possibly add an option to havenwipe
stop verifying after the first non-zero byte it encounters?(I'm assuming this behavior/change would also apply to
verify_one
.)The text was updated successfully, but these errors were encountered: