12-27-2013
In format, select the c0t1d0, and inquiry, to ensure it's a simple disk.
Then analyze it - non-destructive read test.
It will 'repair' bad sectors i.e. tell the controller to replace by spare sectors. The contents of the 'repaired' sectors is unknown; run an fsck (like Robin suggested) to ensure file system integrity at least.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi
I need to access files from a specific folder of a Linux system from an another Linux System Remotely.
I know how to, Export a folder on One SCO System & can access the same by using Import via., NFS in the Sco Unix SVR4 System using the scoadmin utility.
Also, I know to use mount -t ... (2 Replies)
Discussion started by: S.Vishwanath
2 Replies
2. UNIX for Dummies Questions & Answers
Would anyone know how to get a directory listing of all files in a directory as well as all the files in their respective subdirectories and save the listings to a file? I realize this is tricky. (12 Replies)
Discussion started by: danceofillusion
12 Replies
3. UNIX for Dummies Questions & Answers
I noticed that I have a print job that is hung up (lpstat -o) due to a broken printer. Is there a way to re-route the printed information into a text file? Or does it exist somewhere in UNIX as a text file? (5 Replies)
Discussion started by: danceofillusion
5 Replies
4. HP-UX
Hello,
yeah... here my question :
Exist some way to force umount on HP other than reboot?
Thanks
gb (12 Replies)
Discussion started by: gogol_bordello
12 Replies
5. UNIX for Advanced & Expert Users
I have a CentOS release 5.2 (Final)host running kernel 2.6.18-92.el5 with at raid 10 that had two mirrored drives fail. The drives were re-inserted and now the raid shows healthy (for now). I tried to mount but got an Input/output error. I then attempted a fsck:
fsck.gfs2 -y /dev/vg_01/uss_vol... (0 Replies)
Discussion started by: king_hippo
0 Replies
6. UNIX for Dummies Questions & Answers
hi all,
i want to know y kernel is giving access for multiple users to access a file when one user may be the owner is executing that file. Because other user can manipulate that file when the other user is executing that file, it will give the unexpected result to owner . plz help me... (1 Reply)
Discussion started by: jimmyuk
1 Replies
7. IP Networking
Hi
Good Day, i would like to ask for further info about my problems experiencing this evening. Im a PPP0 connection in the internet using 3G located in asia pacific region.i had this problem this evening in my INTERNET connections that there are some sites i can't open example ( Gizmodo.com,... (2 Replies)
Discussion started by: jao_madn
2 Replies
8. Solaris
Hi All,
I want to configure samba share permission so that only directory creator/owner has a read and write permission and other users should not have any read/write access to that folder.Will that be possible and how can this be achieved within samba configuration.
Regards,
Sahil (1 Reply)
Discussion started by: sahil_shine
1 Replies
9. Homework & Coursework Questions
Dear Friends,
This is not a problem , it's a course work (UNIX scenario)....
As part of it I am searching Remote Attacks and find points as
1. Exploiting a listening service
2. Routing through Unix system that is providing security between 2 or more networks
3. User initiated Remote execution... (1 Reply)
Discussion started by: anespa
1 Replies
10. Proxy Server
Dear all experts here,
:)
I would like to install a proxy server on Linux server to perform solely to control the access of Web server.
In this case, some of my vendor asked me to try Squid and I have installed it onto my Linux server.
I would like know how can I set the configuration to... (1 Reply)
Discussion started by: kwliew999
1 Replies
LEARN ABOUT ULTRIX
disktab
disktab(5) File Formats Manual disktab(5)
Name
disktab - disk description file
Syntax
#include <disktab.h>
Description
The file is a simple data base that describes disk geometries and disk partition characteristics. The format is patterned after the termi-
nal data base. Entries in consist of a number of fields separated by colons (:). The first entry for each disk gives the names that are
known for the disk, separated by vertical bars (|). The last name given should be a long name fully identifying the disk.
The following list indicates the normal values stored for each disk entry:
Name Type Description
ns num Number of sectors per track
nt num Number of tracks per cylinder
nc num Total number of cylinders on the disk
ba num Block size for partition `a' (bytes)
bd num Block size for partition `d' (bytes)
be num Block size for partition `e' (bytes)
bf num Block size for partition `f' (bytes)
bg num Block size for partition `g' (bytes)
bh num Block size for partition `h' (bytes)
fa num Fragment size for partition `a' (bytes)
fd num Fragment size for partition `d' (bytes)
fe num Fragment size for partition `e' (bytes)
ff num Fragment size for partition `f' (bytes)
fg num Fragment size for partition `g' (bytes)
fh num Fragment size for partition `h' (bytes)
pa num Size of partition `a' in sectors
pb num Size of partition `b' in sectors
pc num Size of partition `c' in sectors
pd num Size of partition `d' in sectors
pe num Size of partition `e' in sectors
pf num Size of partition `f' in sectors
pg num Size of partition `g' in sectors
ph num Size of partition `h' in sectors
se num Sector size in bytes
ty str Type of disk (e.g. removable, winchester)
The entries can be automatically generated with the program.
Files
See Also
chpt(8), newfs(8)
disktab(5)