
Originally Posted by
cciesec2006
How do I determine if fsck will be performed on the next reboot on this firewall? What to look for and how to bypass it?
I'd guess tune2fs should help out here. There are two values that can trigger a fsck on boot, number of mounts and time passed without a check. To look those up:
Code:
[Expert@cpmodule:0]# tune2fs -l /dev/mapper/vg_splat-lv_current | egrep -i 'check|mount'
Last mounted on: <not available>
Default mount options: (none)
Last mount time: Wed Feb 20 11:26:08 2019
Mount count: 5
Maximum mount count: 27
Last checked: Mon Nov 12 14:22:31 2018
Check interval: 15552000 (6 months)
Next check after: Sat May 11 15:22:31 2019
Check mount count vs maximum mount count and next check after. It is possible to change the count and last check values using or respectively.
Note: I never did that in production, you should test this first on a virtual lab device or something.
Bookmarks