1 .\" Copyright (c) 1985, 1991, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" @(#)restore.8 8.4 (Berkeley) 5/1/95
33 .\" $FreeBSD: src/sbin/restore/restore.8,v 1.20.2.15 2003/02/23 22:47:13 trhodes Exp $
34 .\" $DragonFly: src/sbin/restore/restore.8,v 1.4 2006/04/17 18:01:37 swildner Exp $
42 .Nd "restore files or file systems from backups made with dump"
78 is an alternate name for
84 option syntax is implemented for backward compatibility, but
85 is not documented here.)
89 utility performs the inverse function of
91 A full backup of a file system may be restored and
92 subsequent incremental backups layered on top of it.
94 directory subtrees may be restored from full or partial
98 utility works across a network;
101 flag described below.
102 Other arguments to the command are file or directory
103 names specifying the files that are to be restored.
106 flag is specified (see below),
107 the appearance of a directory name refers to
108 the files and (recursively) subdirectories of that directory.
110 Exactly one of the following flags is required:
113 This mode allows interactive restoration of files from a dump.
114 After reading in the directory information from the dump,
116 provides a shell like interface that allows the user to move
117 around the directory tree selecting files to be extracted.
118 The available commands are given below;
119 for those commands that require an argument,
120 the default is the current directory.
123 The current directory or specified argument is added to the list of
124 files to be extracted.
125 If a directory is specified, then it and all its descendents are
126 added to the extraction list
129 flag is specified on the command line).
130 Files that are on the extraction list are prepended with a ``*''
131 when they are listed by
134 Change the current working directory to the specified argument.
135 .It Ic delete Op Ar arg
136 The current directory or specified argument is deleted from the list of
137 files to be extracted.
138 If a directory is specified, then it and all its descendents are
139 deleted from the extraction list
142 flag is specified on the command line).
143 The most expedient way to extract most of the files from a directory
144 is to add the directory to the extraction list and then delete
145 those files that are not needed.
147 All the files that are on the extraction list are extracted
151 utility will ask which volume the user wishes to mount.
152 The fastest way to extract a few files is to
153 start with the last volume, and work towards the first volume.
155 List a summary of the available commands.
156 .It Ic \&ls Op Ar arg
157 List the current or specified directory.
158 Entries that are directories are appended with a ``/''.
159 Entries that have been marked for extraction are prepended with a ``*''.
161 flag is set the inode number of each entry is also listed.
163 Print the full pathname of the current working directory.
166 even if the extraction list is not empty.
168 All the directories that have been added to the extraction list
169 have their owner, modes, and times set;
170 nothing is extracted from the dump.
171 This is useful for cleaning up after a restore has been prematurely aborted.
176 When set, the verbose flag causes the
178 command to list the inode numbers of all entries.
181 to print out information about each file as it is extracted.
183 Display dump header information, which includes: date,
184 level, label, and the file system and host dump was made
188 Request a particular tape of a multi volume set on which to restart
193 This is useful if the restore has been interrupted.
195 Restore (rebuild a file system).
196 The target file system should be made pristine with
200 into the pristine file system
201 before starting the restoration of the initial level 0 backup.
203 level 0 restores successfully, the
205 flag may be used to restore
206 any necessary incremental backups on top of the level 0.
209 flag precludes an interactive file extraction and can be
210 detrimental to one's health if not used carefully (not to mention
211 the disk). An example:
212 .Bd -literal -offset indent
214 mount /dev/da0s1a /mnt
224 in the root directory to pass information between incremental
226 This file should be removed when the last incremental has been
236 may be used to modify file system parameters
237 such as size or block size.
239 The names of the specified files are listed if they occur
241 If no file argument is given,
242 then the root directory is listed,
243 which results in the entire content of the
247 flag has been specified.
250 flag replaces the function of the old
254 The named files are read from the given media.
255 If a named file matches a directory whose contents
259 flag is not specified,
260 the directory is recursively extracted.
261 The owner, modification time,
262 and mode are restored (if possible).
263 If no file argument is given,
264 then the root directory is extracted,
265 which results in the entire content of the
266 backup being extracted,
269 flag has been specified.
272 The following additional options may be specified:
274 .It Fl b Ar blocksize
275 The number of kilobytes per dump record.
278 option is not specified,
280 tries to determine the media block size dynamically.
284 will try to determine dynamically whether the dump was made from an
285 old (pre-4.4) or new format file system. The
287 flag disables this check, and only allows reading a dump in the old
290 Sends verbose debugging output to the standard error.
295 may be a special device file
304 (the standard input).
305 If the name of the file is of the form
310 reads from the named file on the remote host using
314 Use Kerberos authentication when contacting the remote tape server.
315 (Only available if this options was enabled when
320 Extract the actual directory,
321 rather than the files that it references.
322 This prevents hierarchical restoration of complete subtrees
325 Extract by inode numbers rather than by file name.
326 This is useful if only a few files are being extracted,
327 and one wants to avoid regenerating the complete pathname
330 Do the extraction normally, but do not actually write any changes
332 This can be used to check the integrity of dump media
333 or other test purposes.
335 Read from the specified
337 on a multi-file tape.
338 File numbering starts at 1.
340 When creating certain types of files, restore may generate a warning
341 diagnostic if they already exist in the target directory.
344 (unlink) flag causes restore to remove old entries before attempting
349 does its work silently.
353 flag causes it to type the name of each file it treats
354 preceded by its file type.
356 Do not ask the user whether to abort the restore in the event of an error.
357 Always try to skip over the bad block(s) and continue.
360 .Bl -tag -width ".Ev TMPDIR"
362 Device from which to read backup.
364 Name of directory where temporary files are to be created.
367 .Bl -tag -width "./restoresymtable" -compact
369 the default tape drive
371 file containing directories on the tape.
373 owner, mode, and time stamps for directories.
374 .It Pa \&./restoresymtable
375 information passed between incremental restores.
380 utility complains if it gets a read error.
383 has been specified, or the user responds
386 will attempt to continue the restore.
388 If a backup was made using more than one tape volume,
390 will notify the user when it is time to mount the next volume.
395 flag has been specified,
397 will also ask which volume the user wishes to mount.
398 The fastest way to extract a few files is to
399 start with the last volume, and work towards the first volume.
401 There are numerous consistency checks that can be listed by
403 Most checks are self-explanatory or can ``never happen''.
404 Common errors are given below.
406 .Bl -tag -width Ds -compact
407 .It Converting to new file system format.
408 A dump tape created from the old file system has been loaded.
409 It is automatically converted to the new file system format.
411 .It <filename>: not found on tape
412 The specified file name was listed in the tape directory,
413 but was not found on the tape.
414 This is caused by tape read errors while looking for the file,
415 and from using a dump tape created on an active file system.
417 .It expected next file <inumber>, got <inumber>
418 A file that was not listed in the directory showed up.
419 This can occur when using a dump created on an active file system.
421 .It Incremental dump too low
422 When doing incremental restore,
423 a dump that was written before the previous incremental dump,
424 or that has too low an incremental level has been loaded.
426 .It Incremental dump too high
427 When doing incremental restore,
428 a dump that does not begin its coverage where the previous incremental
430 or that has too high an incremental level has been loaded.
432 .It Tape read error while restoring <filename>
433 .It Tape read error while skipping over inode <inumber>
434 .It Tape read error while trying to resynchronize
435 A tape (or other media) read error has occurred.
436 If a file name is specified,
437 then its contents are probably partially wrong.
438 If an inode is being skipped or the tape is trying to resynchronize,
439 then no extracted files have been corrupted,
440 though files may not be found on the tape.
442 .It resync restore, skipped <num> blocks
443 After a dump read error,
445 may have to resynchronize itself.
446 This message lists the number of blocks that were skipped over.
461 utility can get confused when doing incremental restores from
462 dumps that were made on active file systems.
464 A level zero dump must be done after a full restore.
465 Because restore runs in user code,
466 it has no control over inode allocation;
467 thus a full dump must be done to get a new set of directories
468 reflecting the new inode numbering,
469 even though the contents of the files is unchanged.
471 To do a network restore, you have to run restore as root. This is due
472 to the previous security history of dump and restore. (restore is
473 written to be setuid root, but we are not certain all bugs are gone
474 from the restore code - run setuid at your own risk.)
480 are generated with a unique name based on the date of the dump
481 and the process ID (see
490 allows you to restart a
492 operation that may have been interrupted, the temporary files should
493 be the same across different processes.
494 In all other cases, the files are unique because it is possible to
495 have two different dumps started at the same time, and separate
496 operations shouldn't conflict with each other.