Sponsored Content
Full Discussion: File System corruption
Top Forums UNIX for Advanced & Expert Users File System corruption Post 302838509 by manivanm on Tuesday 30th of July 2013 01:11:24 AM
Old 07-30-2013
File System corruption

Hi,

While a tar file was created, the file system got full and there was no message on the tar failure. Then the system was shut down and the administrator says because the file system was full the shut down procedure corrupted the file system. I'm wondering, unix should have given some warnings/messages etc during shut down. Can the experts help us to understand what would have happened?

Thanks.

---------- Post updated 07-30-13 at 12:11 AM ---------- Previous update was 07-29-13 at 11:46 PM ----------

Red Hat Linux (RHEL 6) is the OS
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

file corruption

Hi, All of a sudden I landed in a strange problem. I was working with my C source code in vi editor. I did a wq! and when reopened, the file is full of "data".. I mean the text contents are gone!!. I believe this is a file corruption. I have tried the -r option with vi, but no success. ... (5 Replies)
Discussion started by: shibz
5 Replies

2. UNIX for Dummies Questions & Answers

how to mount a file system of a remote machine to local file system

Hi friends, In my case, there are serveral PCs running Linux in a LAN. I would like to to mount the directory /A_river of machine-A to the file system of another machine machine-B so that I can access files in that directory. I do not know how to do this. The situation is complicated by... (2 Replies)
Discussion started by: cy163
2 Replies

3. UNIX for Advanced & Expert Users

rsync data corruption

Dear Peoples I am using the following command to transfer the files inbetween two servers, i am using this command in a crontab for doing it in every 1 hour on all days. rsync --stats --archive --verbose --compress --force --rsh=ssh --exclude-from=/root/cfg/mkt_scn.exclude... (1 Reply)
Discussion started by: thameema
1 Replies

4. AIX

File System Corruption on IBM DS8300

Hi All, We are facing the problem of file system corruption on DS8300,we have done very much effort to find out the root cause of problem but we still not get any success, we have AIX 5.3 OS installed on system with latest patches, we have upgraded HBA firmwares, DS8300 firmware, System... (5 Replies)
Discussion started by: m_raheelahmed
5 Replies

5. Solaris

Data corruption

I have a solaris 5.6 on which oracle is installed. we have an alert file alert_net1.log now whenever any datacorruption happens we get the file id and block id in the above file. through this file and block id , we try to find out which table is corrupted and then try to... (1 Reply)
Discussion started by: asalman.qazi
1 Replies

6. SCO

file system not getting mounted in read write mode after system power failure

After System power get failed File system is not getting mounted in read- write mode (1 Reply)
Discussion started by: gtkpmbpl
1 Replies

7. Emergency UNIX and Linux Support

DSEE LDAP corruption

Today when someone was using Sun Identity Manager to modify a directory managed by Sun Directory Server Enterprise Edition (DSEE 6.3) IDM spit out an object class violation error (I verified that the input data was valid). It also corrupted the directory to the point where I can't even get dsadm to... (7 Replies)
Discussion started by: ilikecows
7 Replies

8. UNIX for Advanced & Expert Users

File system testing for Data corruption

Hi, could any one tell is there any test-suite or any idea How to do data corruption validation testing, means there is no any data corruption ? Regards Manish (1 Reply)
Discussion started by: manish_tcs_hp
1 Replies

9. Shell Programming and Scripting

UNIX file system to Linux file system migration

We would be migrating UNIX file system to Linux file system. We do have many directory and sub directories with files. after migrating unix to linux file system , i want to make sure all the files has been copied ? What would be the best approach to validate directory ,sub-directory and file... (1 Reply)
Discussion started by: balajikalai
1 Replies

10. Solaris

Root user not recognizing on Solaris-10 (shadow file corruption)

Hello, I got into a wired state on one of solaris 10 server. When I noticed that server is having some issue, I found that there were dumpadm.conf entries in /etc/shadow and real entries were wiped of. Probably somebody fat fingers. I was able to boot into failsafe, break SVM mirror, copied... (25 Replies)
Discussion started by: solaris_1977
25 Replies
TAR(1)							      General Commands Manual							    TAR(1)

NAME
tar - archiver SYNOPSIS
tar key [ file ... ] DESCRIPTION
Tar saves and restores file trees. It is most often used to transport a tree of files from one system to another. The key is a string that contains at most one function letter plus optional modifiers. Other arguments to the command are names of files or directories to be dumped or restored. A directory name implies all the contained files and subdirectories (recursively). The function is one of the following letters: c Create a new archive with the given files as contents. x Extract the named files from the archive. If a file is a directory, the directory is extracted recursively. Modes are restored if possible. If no file argument is given, extract the entire archive. If the archive contains multiple entries for a file, the lat- est one wins. t List all occurrences of each file in the archive, or of all files if there are no file arguments. r The named files are appended to the archive. The modifiers are: v (verbose) Print the name of each file treated preceded by the function letter. With t, give more details about the archive entries. f Use the next argument as the name of the archive instead of the default standard input (for keys x and t) or standard output (for keys c and r). u Use the next (numeric) argument as the user id for files in the output archive. This is only useful when moving files to a non-Plan 9 system. g Use the next (numeric) argument as the group id for files in the output archive. EXAMPLES
Tar can be used to copy hierarchies thus: {cd fromdir; tar c .} | {cd todir; tar x} SOURCE
/sys/src/cmd/tar.c SEE ALSO
ar(1), bundle(1), tapefs(1) BUGS
There is no way to ask for any but the last occurrence of a file. File path names are limited to 100 characters. The tar format allows specification of links and symbolic links, concepts foreign to Plan 9: they are ignored. TAR(1)
All times are GMT -4. The time now is 03:48 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy