Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 23 Sep 2004 14:45:00 +0200
From:      Gabriel Ambuehl <gabriel_ambuehl@buz.ch>
To:        Bill Moran <wmoran@potentialtech.com>
Cc:        gaml@buz.ch
Subject:   Re[2]: fsck'ing dirty unmounted file system in multi user?
Message-ID:  <1549224949.20040923144500@buz.ch>
In-Reply-To: <20040923074918.7efbcabf.wmoran@potentialtech.com>
References:  <392342192.20040923104959@buz.ch> <20040923074918.7efbcabf.wmoran@potentialtech.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Hello Bill,

Thursday, September 23, 2004, 1:49:18 PM, you wrote:


> You can't/shouldn't fsck them if they're mounted.  Make sure they're
> not mounted first.

They aren't. I can't mount them because they aren't clean ;-)

> Additionally, if your securelevel is high, you can't fsck them no matter
> what, as the securelevel will prevent direct access to raw devices.  You'll
> have to temporarily lower the securelevel in order to fsck them.


kern.securelevel: 2

That would have been it, then. Thanks.


Best regards,
 Gabriel



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1549224949.20040923144500>