Let's clarify what constitutes a bad sector or bad block: it's a portion of a hard drive or flash memory that's become unreadable or unwritable, typically due to physical damage to the disk surface or malfunctioning flash memory transistors.
Accumulating bad sectors significantly degrades storage device performance, diminishes capacity, and can ultimately cause complete hardware failure. The presence of bad blocks is a strong indicator that you should consider replacing your drive or, at minimum, marking the affected blocks as unusable.
This article details how to identify bad sectors on your Linux system using disk scanning utilities.
Methods for Detecting Bad Sectors:
1. Using the badblocks
Utility:
The badblocks
command scans storage devices (hard drives, external drives, etc.) for bad sectors. Device names usually appear as files like /dev/sdc
or /dev/sda
.
Step 1: Identify Disks and Partitions
First, use fdisk
(with root privileges) to list your drives and partitions:
sudo fdisk -l
This output helps you determine the correct device name for scanning.
Step 2: Scan for Bad Blocks
Next, scan your drive for bad sectors:
sudo badblocks -v /dev/sda10 > badsectors.txt
This command scans /dev/sda10
(replace with your device). -v
provides verbose output, and the results are saved to badsectors.txt
.
If bad sectors are found, unmount the drive and prevent the system from writing to them.
Step 3: Mark Bad Sectors as Unusable
Use e2fsck
(for ext2/ext3/ext4 filesystems) or fsck
with badsectors.txt
:
For ext2/ext3/ext4:
sudo e2fsck -l badsectors.txt /dev/sda10
For other filesystems:
sudo fsck -l badsectors.txt /dev/sda10
2. Using smartmontools
(Recommended):
This is a more reliable method, especially for modern drives (ATA/SATA, SCSI/SAS, SSDs) with S.M.A.R.T. (Self-Monitoring, Analysis, and Reporting Technology). S.M.A.R.T. helps detect and report drive health.
Step 1: Install smartmontools
Install using your distribution's package manager:
sudo apt install smartmontools # Debian/Ubuntu sudo dnf install smartmontools # Fedora/RHEL/CentOS
Step 2: Use smartctl
for Health Checks
smartctl
interacts with the drive's S.M.A.R.T. system. Review its manual page:
man smartctl smartctl -h
Step 3: Run a Basic Health Test
Run a basic health check:
sudo smartctl -H /dev/sda10
A healthy drive will show a positive result.
Optional: View Full SMART Report
For a complete report, use:
sudo smartctl -a /dev/sda10 # All SMART attributes sudo smartctl -x /dev/sda10 # All SMART and non-SMART data
Conclusion:
This guide demonstrates how to detect and manage bad sectors using badblocks
and smartmontools
. Regularly monitoring your storage health is essential, and these tools simplify the process. If you have any questions, please comment below.
The above is the detailed content of How to Check for Bad Sectors on a Hard Disk in Linux. For more information, please follow other related articles on the PHP Chinese website!

This guide shows you how to set up the free and open-source DOS-compatible operating system, FreeDOS, within a Linux environment using the QEMU emulator. This allows you to run legacy DOS software and games on modern hardware without needing a separ

Linux Mint, an operating system known for its simplicity, stability and ease of use, is popular with users and is especially suitable for beginners. It uses the Cinnamon desktop environment by default, providing a simple and friendly user interface. But if you prefer a different look or need more customization options, you can install other desktop environments such as KDE Plasma. KDE Plasma is a feature-rich, highly customizable and visually excellent desktop environment that provides a modern and stylish user experience. It has a wide range of customization options, advanced window management capabilities and sophisticated aesthetics, perfect for users who want to have a better control over the desktop experience. This guide will guide you step by step to install KDE Pl on Linux Mint 22

Linux system performance optimization: Reduce RAM and CPU usage Linux systems are powerful and efficient, but high RAM and CPU usage can reduce performance, slow down applications, and even cause servers, workstations, or embedded systems to crash. Therefore, optimizing resource usage is crucial for the smooth operation of the system. This guide will explore practical ways to reduce RAM and CPU usage in Linux systems, covering monitoring tools, process management, kernel tuning and system optimization technologies to help you keep your system running efficiently. Identify resource-intensive processes The first step in reducing RAM and CPU usage is to identify which processes consume the most resources. To do this, you can use the following command-line tools: a. Use top

Single User Mode (also known as Rescue Mode) Guide for AlmaLinux 8 and 9 Single-user mode is a streamlined Linux environment that allows system administrators to perform maintenance tasks, troubleshoot problems, and recover from system failures. Single-user mode is especially useful when you need to reset your root password, fix configuration errors, fix corrupt file systems, or investigate system errors that prevent normal startup. As RHEL-based distributions, AlmaLinux 8 and 9 provide an easy way to enter single-user mode via the GRUB boot loader. This guide will explain step by step how to enter single-user mode on AlmaLinux 8 and 9. What is single use

Linux systems are known for their power and reliability, but even experienced users will encounter unexpected problems. Whether it is an unexpectedly deleted file, a forgotten root password, or a slow system running, efficient troubleshooting skills are the key to becoming a Linux expert. This guide will introduce common Linux problem solving scenarios and step-by-step solutions that are common among system administrators, developers, and everyday Linux users. Scene 1: Unexpected deletion of important files You accidentally deleted an important file using the rm command and now you need to restore it. Unlike Windows and macOS, Linux does not have a built-in "recycle bin" to store files deleted from the terminal. Recovery options depend on

Docker is a powerful tool that allows you to run applications in an isolated environment called containers. However, sometimes you may need to change the permissions of the Docker folder to ensure that your application has access to the necessary files and directories. This article will guide you through the process of permanently changing Docker folder permissions on Linux systems. Understand Docker folder permissions By default, Docker stores its data, including images, containers, and volumes, in specific directories on Linux systems. The most common directory is /var/lib/docker. The permissions of these folders determine who can read, write, or execute the files in it. if

Simplify Docker Management with Portainer CE on Linux: A Step-by-Step Guide Managing Docker containers via the command line can be daunting, especially for newcomers. Portainer CE (Community Edition) offers a free, lightweight, and intuitive solutio

This guide details how to install and use Whisper AI for real-time speech-to-text transcription on Linux systems. Whisper AI, an OpenAI creation, offers high-accuracy transcription across multiple languages. While primarily designed for batch proces


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Atom editor mac version download
The most popular open source editor

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

Zend Studio 13.0.1
Powerful PHP integrated development environment
