Date: Thu, 23 Sep 2004 14:45:00 +0200 From: Gabriel Ambuehl <gabriel_ambuehl@buz.ch> To: Bill Moran <wmoran@potentialtech.com> Cc: gaml@buz.ch Subject: Re[2]: fsck'ing dirty unmounted file system in multi user? Message-ID: <1549224949.20040923144500@buz.ch> In-Reply-To: <20040923074918.7efbcabf.wmoran@potentialtech.com> References: <392342192.20040923104959@buz.ch> <20040923074918.7efbcabf.wmoran@potentialtech.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hello Bill, Thursday, September 23, 2004, 1:49:18 PM, you wrote: > You can't/shouldn't fsck them if they're mounted. Make sure they're > not mounted first. They aren't. I can't mount them because they aren't clean ;-) > Additionally, if your securelevel is high, you can't fsck them no matter > what, as the securelevel will prevent direct access to raw devices. You'll > have to temporarily lower the securelevel in order to fsck them. kern.securelevel: 2 That would have been it, then. Thanks. Best regards, Gabriel
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1549224949.20040923144500>