mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-06-11 02:15:21 +09:00
nixos: nixos/doc/manual/administration/store-corruption.xml to CommonMark
This commit is contained in:
parent
99493b61ea
commit
4df0b9903d
4 changed files with 63 additions and 37 deletions
28
nixos/doc/manual/administration/store-corruption.section.md
Normal file
28
nixos/doc/manual/administration/store-corruption.section.md
Normal file
|
@ -0,0 +1,28 @@
|
||||||
|
# Nix Store Corruption {#sec-nix-store-corruption}
|
||||||
|
|
||||||
|
After a system crash, it's possible for files in the Nix store to become
|
||||||
|
corrupted. (For instance, the Ext4 file system has the tendency to
|
||||||
|
replace un-synced files with zero bytes.) NixOS tries hard to prevent
|
||||||
|
this from happening: it performs a `sync` before switching to a new
|
||||||
|
configuration, and Nix's database is fully transactional. If corruption
|
||||||
|
still occurs, you may be able to fix it automatically.
|
||||||
|
|
||||||
|
If the corruption is in a path in the closure of the NixOS system
|
||||||
|
configuration, you can fix it by doing
|
||||||
|
|
||||||
|
```ShellSession
|
||||||
|
# nixos-rebuild switch --repair
|
||||||
|
```
|
||||||
|
|
||||||
|
This will cause Nix to check every path in the closure, and if its
|
||||||
|
cryptographic hash differs from the hash recorded in Nix's database, the
|
||||||
|
path is rebuilt or redownloaded.
|
||||||
|
|
||||||
|
You can also scan the entire Nix store for corrupt paths:
|
||||||
|
|
||||||
|
```ShellSession
|
||||||
|
# nix-store --verify --check-contents --repair
|
||||||
|
```
|
||||||
|
|
||||||
|
Any corrupt paths will be redownloaded if they're available in a binary
|
||||||
|
cache; otherwise, they cannot be repaired.
|
|
@ -1,36 +0,0 @@
|
||||||
<section xmlns="http://docbook.org/ns/docbook"
|
|
||||||
xmlns:xlink="http://www.w3.org/1999/xlink"
|
|
||||||
xmlns:xi="http://www.w3.org/2001/XInclude"
|
|
||||||
version="5.0"
|
|
||||||
xml:id="sec-nix-store-corruption">
|
|
||||||
<title>Nix Store Corruption</title>
|
|
||||||
|
|
||||||
<para>
|
|
||||||
After a system crash, it’s possible for files in the Nix store to become
|
|
||||||
corrupted. (For instance, the Ext4 file system has the tendency to replace
|
|
||||||
un-synced files with zero bytes.) NixOS tries hard to prevent this from
|
|
||||||
happening: it performs a <command>sync</command> before switching to a new
|
|
||||||
configuration, and Nix’s database is fully transactional. If corruption
|
|
||||||
still occurs, you may be able to fix it automatically.
|
|
||||||
</para>
|
|
||||||
|
|
||||||
<para>
|
|
||||||
If the corruption is in a path in the closure of the NixOS system
|
|
||||||
configuration, you can fix it by doing
|
|
||||||
<screen>
|
|
||||||
<prompt># </prompt>nixos-rebuild switch --repair
|
|
||||||
</screen>
|
|
||||||
This will cause Nix to check every path in the closure, and if its
|
|
||||||
cryptographic hash differs from the hash recorded in Nix’s database, the
|
|
||||||
path is rebuilt or redownloaded.
|
|
||||||
</para>
|
|
||||||
|
|
||||||
<para>
|
|
||||||
You can also scan the entire Nix store for corrupt paths:
|
|
||||||
<screen>
|
|
||||||
<prompt># </prompt>nix-store --verify --check-contents --repair
|
|
||||||
</screen>
|
|
||||||
Any corrupt paths will be redownloaded if they’re available in a binary
|
|
||||||
cache; otherwise, they cannot be repaired.
|
|
||||||
</para>
|
|
||||||
</section>
|
|
|
@ -11,6 +11,6 @@
|
||||||
<xi:include href="../from_md/administration/boot-problems.section.xml" />
|
<xi:include href="../from_md/administration/boot-problems.section.xml" />
|
||||||
<xi:include href="../from_md/administration/maintenance-mode.section.xml" />
|
<xi:include href="../from_md/administration/maintenance-mode.section.xml" />
|
||||||
<xi:include href="../from_md/administration/rollback.section.xml" />
|
<xi:include href="../from_md/administration/rollback.section.xml" />
|
||||||
<xi:include href="store-corruption.xml" />
|
<xi:include href="../from_md/administration/store-corruption.section.xml" />
|
||||||
<xi:include href="network-problems.xml" />
|
<xi:include href="network-problems.xml" />
|
||||||
</chapter>
|
</chapter>
|
||||||
|
|
|
@ -0,0 +1,34 @@
|
||||||
|
<section xmlns="http://docbook.org/ns/docbook" xmlns:xlink="http://www.w3.org/1999/xlink" xml:id="sec-nix-store-corruption">
|
||||||
|
<title>Nix Store Corruption</title>
|
||||||
|
<para>
|
||||||
|
After a system crash, it’s possible for files in the Nix store to
|
||||||
|
become corrupted. (For instance, the Ext4 file system has the
|
||||||
|
tendency to replace un-synced files with zero bytes.) NixOS tries
|
||||||
|
hard to prevent this from happening: it performs a
|
||||||
|
<literal>sync</literal> before switching to a new configuration, and
|
||||||
|
Nix’s database is fully transactional. If corruption still occurs,
|
||||||
|
you may be able to fix it automatically.
|
||||||
|
</para>
|
||||||
|
<para>
|
||||||
|
If the corruption is in a path in the closure of the NixOS system
|
||||||
|
configuration, you can fix it by doing
|
||||||
|
</para>
|
||||||
|
<programlisting>
|
||||||
|
# nixos-rebuild switch --repair
|
||||||
|
</programlisting>
|
||||||
|
<para>
|
||||||
|
This will cause Nix to check every path in the closure, and if its
|
||||||
|
cryptographic hash differs from the hash recorded in Nix’s database,
|
||||||
|
the path is rebuilt or redownloaded.
|
||||||
|
</para>
|
||||||
|
<para>
|
||||||
|
You can also scan the entire Nix store for corrupt paths:
|
||||||
|
</para>
|
||||||
|
<programlisting>
|
||||||
|
# nix-store --verify --check-contents --repair
|
||||||
|
</programlisting>
|
||||||
|
<para>
|
||||||
|
Any corrupt paths will be redownloaded if they’re available in a
|
||||||
|
binary cache; otherwise, they cannot be repaired.
|
||||||
|
</para>
|
||||||
|
</section>
|
Loading…
Add table
Add a link
Reference in a new issue