Solved

Linux application-- disk surface test ?

Posted on 1998-10-20
4
1,312 Views
Last Modified: 2012-05-04
Is there a Linux application where I can perform a disk
surface test on a Linux partition? Where can I get it?
0
Comment
Question by:thithi
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 5

Expert Comment

by:JBURGHARDT
ID: 1638317
When you install redhat you can do surface test so it got to be with redhat linux, fsck will do surface test but it will not mark them as bad blocks
0
 
LVL 1

Accepted Solution

by:
m4rc earned 50 total points
ID: 1638318
im betting you want fsck. It will test the filesystem structure, inodes, all that and can try to repair problems it finds.  the pesky thing for me was that you can't fsck your current partition, so to check / you have to pull out your root/book disks or emergency repair disks and run fsck from there.  (i could be wrong about that, but it works for me)

m4rc

NAME
       fsck - check and repair a Linux file system

SYNOPSIS
       fsck [ -A ] [ -V ] [ -t fstype ] [ fs-options ] filesys

DESCRIPTION
       fsck  is  used to check and optionally repair a Linux file
       system.   filesys  is  either  the   device   name   (e.g.
       /dev/hda1,  /dev/sdb2)  or  the mount point (e.g. /, /usr,
       /home) for the file system.
0
 

Author Comment

by:thithi
ID: 1638319
Yes, I knew about fsck, but I wanted to check disk surface
like dos/win chekdisk, looking for bad blocks and
marking them if in that case. I found out there is a command
called "badblocks"  that works just fine.
0
 
LVL 1

Expert Comment

by:m4rc
ID: 1638320
hmmm, well im glad i -almost- helped you.  :)
duh, badblocks, i should have remembered that myself.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Google Drive is extremely cheap offsite storage, and it's even possible to get extra storage for free for two years.  You can use the free account 15GB, and if you have an Android device..when you install Google Drive for the first time it will give…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question