Solved

syslogd kernel: EXT3-fs error

Posted on 2007-04-06
3
617 Views
Last Modified: 2013-12-16
Hi,

I recently inherited a server that has been routinely generating the following syslog entry:

kernel: EXT3-fs error (device md(9,3)): ext3_free_blocks: Freeing blocks not in datazone - block = 6521216, count = 1

I've done a little research and some sources recommend running an fsck. Does anyone else have recommendations for this? This system has a RAID. Does that affect how I need to run fsck? Can fsck be run on the server if it's in production with no worries? The previous owner is unavailable for advice or history.

Thanks in advance.
0
Comment
Question by:pciccare
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 12

Expert Comment

by:ibu1
ID: 18868723
0
 

Author Comment

by:pciccare
ID: 18879055
Thanks for the response. Do you have any recommendations on how to proceed? I need help determining if fsck is the correct way to resolve the error above.
0
 
LVL 1

Accepted Solution

by:
BrightSide earned 125 total points
ID: 18952438
Running fsck would be the best option to analyze the corruptions on your ext3 partition. Your RAID setup wont affect fsck. Your best option would be to run fsck on the partition in read-only mode using "fsck.ext3 /your/device -n" and see if any errors are found. To fix it, replace the -n with -p.

Also, since ext3 is a journaling filesystem, it does a good job on its own in avoiding corruptions in the filesystem so your problems could indicate a failing harddrive. You can use the -c option with fsck to scan the disk for bad blocks which would be marked in the filesystem to avoid use. This will make your drive usable but if any such bad blocks are found, I would concider buing a replacement

0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Configuring Apache Camel to send and recieive from QPID Broker 2 74
RHEL6 + dockers - No route to host 7 104
SSD to USB-C Adapter 8 57
computer chips and rfid 6 52
What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
In the first part of this tutorial we will cover the prerequisites for installing SQL Server vNext on Linux.
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question