Best of Technical Support
When I installed PPP for Internet connection, I changed some properties by using the linuxconf command in Linux configuration. Now whenever I start Linux, it gives me an error like:
starting system loggers:ypbind:clnt_create for server 127.0.0.1 fasiled starting NFS Services:rpc.mountd rpc.nfsd YPBINDPROC_DOMAIN: Domain not bound.
Please help me to solve this problem. —Kalpesh Vakharia, firstname.lastname@example.org
You haven't hurt your PPP configuration; you've just activated a tool (Yellow Pages or yp) that you haven't fully configured. The error is harmless, but you can remove it by commenting out any entries that point to yp in your boot scripts. —Chad Robinson, Chad.Robinson@brt.com
Your message shows that you enabled yellow pages, but that you have no server to talk to. Run chkconfig --del ypbind and you should be fine. —Marc Merlin, email@example.com
My system just crashed and left me with the following message:
checking root filesystems parallelizing fsck version 1.04 (16 may 96) [/sbin/fsck.ext2] fsck.ext2 -a /dev/sda1 /dev/sda1 contains a file system with errors check forced Block 4294967295 of inode 131128 > Blocks (1208304) /dev/sda1: UNEXPECTED INCONSISTENCY; Run fsck manually an error occurred during the file system check. Dropping you to a shell; the system will reboot when you leave the shell (repair filesystem) #
The system is completely stalled at the moment. What should I do from here? Another person was using the computer when it crashed. What did they do to get it in such a situation? —Nathan Cutter, NCutter@ricegrowers.com.au
Like most modern operating systems, Linux uses write caching. Turning the computer off (it's hard to get it to crash without an actual hardware problem) without properly shutting it down can cause data errors on your hard drive. To solve this problem, you should do exactly what it says: run fsck manually on your hard drive. You should do this from a boot disk. The boot disks that you used to install Linux are usually fine for this purpose. Simply run fsck /dev/sda1 (the partition that is showing the errors). The program will prompt you to fix each error in exactly the same way that—Chad Robinson, Chad.Robinson@brt.com
No, it is not stalled, it just isn't yet booted. You must run fsck by hand (e2fsck /dev/sda1) and reply to questions. Most likely, you'll just answer yes to any questions, so you might even add the -y switch to e2fsck, although this is considered unsafe. When you are done, exit from the shell (exit) and the system will reboot. Since not every file system repair can be performed automatically in a fail-safe way, human intervention can be required when bad errors are detected. I can't tell what caused the problem, but I dare say the most likely reason is some hardware failure (the disk itself or a RAM chip), as fsck found an all-one word (0xffffffff, or 4294967295) where real data was expected. —Alessandro Rubini, firstname.lastname@example.org
I am trying to upgrade the kernel from 2.2.7 to 2.2.12. I have downloaded the kernel and it compiles fine. I installed the zImage and System.map files where required. However, when I try to boot up again, the kernel version is still 2.2.7. Subsequently, the system tries to load the 2.2.7 modules and not the 2.2.12 modules I require. —Michael Hoegen, email@example.com
Copying the image files to the correct disk locations isn't enough. In fact, your system may stop booting shortly. You need to tell your boot loader that you've done this. Linux isn't running yet when your system needs to find that file, so to work around that problem, your boot loader records its physical disk location, and copying one file over another always changes this location. If you are using LILO as your boot loader, you can simply type lilo at your shell prompt (as root) to force it to see this file. If you are using another boot loader, consult that program's documentation. —Chad Robinson, Chad.Robinson@brt.com
I don't think you reran /sbin/lilo after copying the kernel, and most likely you didn't even copy the kernel to the right place. If you truly overwrote the kernel and only forgot to run lilo, your system will stop booting very soon (I won't dig into the technical details here; please check LILO documentation and my article about booting in the June 1997 LJ). When upgrading the kernel on a working box, you should always keep a copy of the previous (working) kernel, to recover the computer in case the new kernel image doesn't work for you. To do that, you should add another “image=” stanza to /etc/lilo.conf and rerun lilo. If your lilo.conf is not well-commented, you'll need to refer to proper documentation (such as man lilo.conf). —Alessandro Rubini, firstname.lastname@example.org
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Firefox 46.0 Released
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- The US Government and Open-Source Software
- May 2016 Issue of Linux Journal
- The Death of RoboVM
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide