.\" Copyright (c) 1985, 1991 The Regents of the University of California.
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. All advertising materials mentioning features or use of this software
.\" must display the following acknowledgement:
.\" This product includes software developed by the University of
.\" California, Berkeley and its contributors.
.\" 4. Neither the name of the University nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" @(#)badsect.8 6.4 (Berkeley) 3/16/91
.Nd create files to contain bad sectors
makes a file to contain a bad sector. Normally, bad sectors
are made inaccessible by the standard formatter, which provides
a forwarding table for bad sectors to the driver; see
If a driver supports the bad blocking standard it is much preferable to
use that method to isolate bad blocks, since the bad block forwarding
makes the pack appear perfect, and such packs can then be copied with
The technique used by this program is also less general than
bad blocks in the i-list of file systems or in swap areas.
adding a sector which is suddenly bad to the bad sector table
currently requires the running of the standard
Thus to deal with a newly bad block
or on disks where the drivers
do not support the bad-blocking standard
may be used to good effect.
is used on a quiet file system in the following way:
First mount the file system, and change to its root directory.
all the bad sectors you wish to add.
(The sector numbers must be relative to the beginning of
the file system, but this is not hard as the system reports
relative sector numbers in its console error messages.)
Then change back to the root directory, unmount the file system
on the file system. The bad sectors should show up in two files
or in the bad sector files and the free list. Have
remove files containing the offending bad sectors, but
This will leave the bad sectors in only the
works by giving the specified sector numbers in a
creating an illegal file whose first block address is the block containing
bad sector and whose name is the bad sector number.
.Dq Li "HOLD BAD BLOCK ?"
A positive response will cause
to convert the inode to a regular file containing the bad block.
refuses to attach a block that
resides in a critical area or is out of range of the file system.
A warning is issued if the block is already in use.
If more than one sector which comprise a file system fragment are bad,
you should specify only one of them to
as the blocks in the bad sector files actually cover all the sectors in a