when is fsck required?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



thanks, Stephen.  these replies are
very helpful and will take some time
for me to understand...

--Tom
----- Original Message ----- 
From: "Stephen C. Tweedie" <sct@redhat.com>
To: "Thomas Bassel" <tbassel@nc.rr.com>
Cc: <ext3-users@redhat.com>
Sent: Wednesday, May 15, 2002 11:58 AM
Subject: Re: when is fsck required?


> Hi,
> 
> On Wed, May 15, 2002 at 11:47:40AM -0400, Thomas Bassel wrote:
>  
> > by disabling, do you mean deleting fsck from
> > the install, or not automatically running it after
> > X months/Y reboots?
> 
> Never delete fsck, you might need it some day!
> 
> The best way to disable it, if you want to do that, is to use
> "tune2fs" to set the fsck-every-N-mounts and fsck-every-N-days counts
> to zero.  That way, fsck will never do a timeout-based fsck, but it
> will still have a quick look at the filesystem superblock to see if
> there have been any errors reported on the fs that require a full
> forced fsck to recover from.
> 
> > bugs in the ext3 code aside, is there any
> > advantage in setting it up to autorun at all
> > or to wait for "something funny to happen"?
> 
> Only if you are worried about possible hardware corruption.   There
> are just so many ways in which hardware can corrupt data that it's
> quite reasonable to do a fsck every so often just to be sure, unless
> you really trust your motherboard, disks and controllers.
> 
> > what I'm getting at is, if it's allright to not
> > run fsck for 24 months for ext3, but there's
> > a chance that a bit flips that goes undetected,
> > the bit could have flipped during month 1.
> > if so, users/programs have been using that
> > bad bit for 23 months.
> 
> You can't detect that if it happens inside a data file (unless it
> happens to be inside a file that you can verify independently --- eg.
> tripwire or rpm can both verify the contents of files recorded in
> their databases.)  The only way to be sure of recovering from that is
> to take good backups and make archive copies, so if a user does ever
> spot file corruption, you've got an old copy to fall back to.
> 
> Cheers,
>  Stephen





[Index of Archives]         [Linux RAID]     [Kernel Development]     [Red Hat Install]     [Video 4 Linux]     [Postgresql]     [Fedora]     [Gimp]     [Yosemite News]

  Powered by Linux