From owner-freebsd-hackers@freebsd.org Sun Mar 12 21:02:31 2017 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 22FAED09147 for ; Sun, 12 Mar 2017 21:02:31 +0000 (UTC) (envelope-from michael@fuckner.net) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 093831B44 for ; Sun, 12 Mar 2017 21:02:31 +0000 (UTC) (envelope-from michael@fuckner.net) Received: by mailman.ysv.freebsd.org (Postfix) id 0885ED09145; Sun, 12 Mar 2017 21:02:31 +0000 (UTC) Delivered-To: hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 08305D09144 for ; Sun, 12 Mar 2017 21:02:31 +0000 (UTC) (envelope-from michael@fuckner.net) Received: from mo6-p00-ob.smtp.rzone.de (mo6-p00-ob.smtp.rzone.de [IPv6:2a01:238:20a:202:5300::7]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.smtp.rzone.de", Issuer "TeleSec ServerPass DE-2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 9D8071B41 for ; Sun, 12 Mar 2017 21:02:30 +0000 (UTC) (envelope-from michael@fuckner.net) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1489352548; l=802; s=domk; d=fuckner.net; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:MIME-Version: Date:From:References:To:Subject; bh=gWt6OJuZuJmgHKnvmTvVa1lguvP0chSFKwq+JO+BcEc=; b=XcrKxPJ/F38J839GFSUk8tPafQIP27uwCh8U1cmkB70bgEAv7CXQbaVFFRpMezVl7P 2KPDI+gvVzLO2CPWEkNG3lub273+u34XA1YPwJ3c35mWb8ZY8Azvm8afBp9YaSBJ9M66 ksG3vjXw7y2oeN4mxVO+MEq7LtigwxaU0mcos= X-RZG-AUTH: :IWUHfUGtd9+6EujMWHx57N4dWae4bmTL/JIGbzkGUoozgknstV9BEzWRmW1UT4IlxRED3LBIlRTDfUFX/rf8N34aEwuWdBLF X-RZG-CLASS-ID: mo00 Received: from [IPv6:2a02:2028:704:8a01:69e8:f111:2fc4:1d9] (some-ipv6-address.wtnet.de [IPv6:2a02:2028:704:8a01:69e8:f111:2fc4:1d9]) by smtp.strato.de (RZmta 40.1 AUTH) with ESMTPSA id U0229bt2CL2RMA8 (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (curve secp521r1 with 521 ECDH bits, eq. 15360 bits RSA)) (Client did not present a certificate); Sun, 12 Mar 2017 22:02:27 +0100 (CET) Subject: Re: Mini sas forward/ reverse cables ? To: Mark Saad , hackers@freebsd.org References: <4AF2C082-2494-42DE-B2C2-9C750BF39F76@longcount.org> From: Michael Fuckner Message-ID: Date: Sun, 12 Mar 2017 22:02:27 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <4AF2C082-2494-42DE-B2C2-9C750BF39F76@longcount.org> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 12 Mar 2017 21:02:31 -0000 On 3/12/2017 9:54 PM, Mark Saad wrote: > All > I read this post on zfs corruption and there is an interesting comment about cable types . > > http://changelog.complete.org/archives/9769-silent-data-corruption-is-real > The part of the story I found interesting was how the disks didn't show up in the controller bios . > I have that issue with a similar card on this server . So has anyone > ever seen this cabling issue ? Is it worth changing? How do I know > which cable I have ? it's pretty straight forward- if your controller is multilane and backplane single- you need a straight cable. This is the default! If your controller is single and your backplane is multilane, your cable needs to be cross over. If it is working, there is no need to change. Regards, Michael!