This script will unmount the problematic drive and try to mount it to another place /tmp/myprecious, a temporary place.
Then, as it says, will attempt to read and then write to the drive.
Finally, it removes the file it wrote to test writeability, unmounts the drive again and removes the temporary mount place.
The scripts needs root access to mount and unmount and possibly to write and read.
Please don't run a script you found on the internet with root access without knowing what it does.
I would remove the formatting of the script. For me that would never run as a bash script as it's filled with markup. Not sure if it shows up nicely for you or not so figured I'd let.you know it may not be displaying for others at least.
If you follow the link to the original post, it displays correctly. For some reason, Lemmy sends HTML for code blocks. kbin rightly escapes it on their end for security.
Makes sense. Though I'll note I find folks find help via methods of others asking for the same thing so a Kbin user could easily come across this post trying to find an answer to a similar problem. That being said, I don't have a good suggestion for a workaround so leads me back to "makes sense."
Only kbin users are seeing what you see. It looks fine on other Lemmy instances.
Lemmy and kbin do weird things with code blocks. From the source, the post itself clearly only contained backticks. Lemmy sends out marked-up text. kbin escapes it.
curl -i -X GET -H 'Accept: application/activity+json' https://lemmy.cafe/comment/1368187