Deleted Added
full compact
1.t (1558) 1.t (66861)
1.\" Copyright (c) 1982, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 15 unchanged lines hidden (view full) ---

24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
1.\" Copyright (c) 1982, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 15 unchanged lines hidden (view full) ---

24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" $FreeBSD: head/sbin/fsck_ffs/SMM.doc/1.t 66861 2000-10-09 08:26:35Z adrian $
32.\" @(#)1.t 8.1 (Berkeley) 6/5/93
33.\"
34.ds RH Introduction
35.NH
36Introduction
37.PP
38This document reflects the use of
33.\" @(#)1.t 8.1 (Berkeley) 6/5/93
34.\"
35.ds RH Introduction
36.NH
37Introduction
38.PP
39This document reflects the use of
39.I fsck
40.I fsck_ffs
40with the 4.2BSD and 4.3BSD file system organization. This
41is a revision of the
42original paper written by
43T. J. Kowalski.
44.PP
45When a UNIX
46operating system is brought up, a consistency
47check of the file systems should always be performed.
48This precautionary measure helps to insure
49a reliable environment for file storage on disk.
50If an inconsistency is discovered,
51corrective action must be taken.
41with the 4.2BSD and 4.3BSD file system organization. This
42is a revision of the
43original paper written by
44T. J. Kowalski.
45.PP
46When a UNIX
47operating system is brought up, a consistency
48check of the file systems should always be performed.
49This precautionary measure helps to insure
50a reliable environment for file storage on disk.
51If an inconsistency is discovered,
52corrective action must be taken.
52.I Fsck
53.I Fsck_ffs
53runs in two modes.
54Normally it is run non-interactively by the system after
55a normal boot.
56When running in this mode,
57it will only make changes to the file system that are known
58to always be correct.
59If an unexpected inconsistency is found
54runs in two modes.
55Normally it is run non-interactively by the system after
56a normal boot.
57When running in this mode,
58it will only make changes to the file system that are known
59to always be correct.
60If an unexpected inconsistency is found
60.I fsck
61.I fsck_ffs
61will exit with a non-zero exit status,
62leaving the system running single-user.
63Typically the operator then runs
62will exit with a non-zero exit status,
63leaving the system running single-user.
64Typically the operator then runs
64.I fsck
65.I fsck_ffs
65interactively.
66When running in this mode,
67each problem is listed followed by a suggested corrective action.
68The operator must decide whether or not the suggested correction
69should be made.
70.PP
71The purpose of this memo is to dispel the
72mystique surrounding
73file system inconsistencies.
74It first describes the updating of the file system
75(the calm before the storm) and
76then describes file system corruption (the storm).
77Finally,
78the set of deterministic corrective actions
79used by
66interactively.
67When running in this mode,
68each problem is listed followed by a suggested corrective action.
69The operator must decide whether or not the suggested correction
70should be made.
71.PP
72The purpose of this memo is to dispel the
73mystique surrounding
74file system inconsistencies.
75It first describes the updating of the file system
76(the calm before the storm) and
77then describes file system corruption (the storm).
78Finally,
79the set of deterministic corrective actions
80used by
80.I fsck
81.I fsck_ffs
81(the Coast Guard
82to the rescue) is presented.
83.ds RH Overview of the File System
82(the Coast Guard
83to the rescue) is presented.
84.ds RH Overview of the File System