Blame SOURCES/tar.1

a4d85a
.\" This file was originally generated by help2man
a4d85a
.TH TAR "1" "February 2013" "tar 1.26" "User Commands"
a4d85a
.SH NAME
a4d85a
tar \- manual page for tar 1.26
a4d85a
.SH SYNOPSIS
a4d85a
.B tar
a4d85a
[\fIOPTION\fR...] [\fIFILE\fR]...
a4d85a
.SH DESCRIPTION
a4d85a
GNU `tar' saves many files together into a single tape or disk archive, and can
a4d85a
restore individual files from the archive.
a4d85a
a4d85a
Note that this manual page contains just very brief description (or more like
a4d85a
a list of possible functionality) originally generated by the
a4d85a
.B
a4d85a
help2man
a4d85a
utility.  The full documentation for
a4d85a
.B tar
a4d85a
is maintained as a Texinfo manual.  If the
a4d85a
.B info
a4d85a
and
a4d85a
.B tar
a4d85a
programs are properly installed at your site, the command
a4d85a
.B `info tar'
a4d85a
should give you access to the complete manual.
a4d85a
.SH EXAMPLES
a4d85a
.TP
a4d85a
tar \fB\-cf\fR archive.tar foo bar
a4d85a
# Create archive.tar from files foo and bar.
a4d85a
.TP
a4d85a
tar \fB\-tvf\fR archive.tar
a4d85a
# List all files in archive.tar verbosely.
a4d85a
.TP
a4d85a
tar \fB\-xf\fR archive.tar
a4d85a
# Extract all files from archive.tar.
a4d85a
.IP
a4d85a
.SH DEFAULTS
a4d85a
*This* tar installation defaults to:
a4d85a
a4d85a
\fB\-\-format\fR=\fIgnu\fR \fB\-f\-\fR \fB\-b20\fR \fB\-\-quoting\-style\fR=\fIescape\fR \fB\-\-rmt\-command=\fR/sbin/rmt
a4d85a
\fB\-\-rsh\-command=\fR/usr/bin/rsh
a4d85a
.SH \fBMain operation mode:\fR
a4d85a
.TP
a4d85a
\fB\-A\fR, \fB\-\-catenate\fR, \fB\-\-concatenate\fR
a4d85a
append tar files to an archive
a4d85a
.TP
a4d85a
\fB\-c\fR, \fB\-\-create\fR
a4d85a
create a new archive
a4d85a
.TP
a4d85a
\fB\-d\fR, \fB\-\-diff\fR, \fB\-\-compare\fR
a4d85a
find differences between archive and file system
a4d85a
.TP
a4d85a
\fB\-\-delete\fR
a4d85a
delete from the archive (not on mag tapes!)
a4d85a
.TP
a4d85a
\fB\-r\fR, \fB\-\-append\fR
a4d85a
append files to the end of an archive
a4d85a
.TP
a4d85a
\fB\-t\fR, \fB\-\-list\fR
a4d85a
list the contents of an archive
a4d85a
.TP
a4d85a
\fB\-\-test\-label\fR
a4d85a
test the archive volume label and exit
a4d85a
.TP
a4d85a
\fB\-u\fR, \fB\-\-update\fR
a4d85a
only append files newer than copy in archive
a4d85a
.TP
a4d85a
\fB\-x\fR, \fB\-\-extract\fR, \fB\-\-get\fR
a4d85a
extract files from an archive
a4d85a
.IP
a4d85a
.SH \fBCommon options:\fR
a4d85a
.TP
a4d85a
\fB-C\fR, \fB--directory=DIR\fR
a4d85a
change to directory DIR
a4d85a
.TP
a4d85a
\fB-f\fR, \fB--file=ARCHIVE\fR
a4d85a
use archive file or device ARCHIVE
a4d85a
.TP
a4d85a
\fB-j\fR, \fB--bzip2\fR
a4d85a
filter the archive through bzip2
a4d85a
.TP
a4d85a
\fB -J\fR, \fB--xz\fR
a4d85a
filter the archive through xz
a4d85a
.TP
a4d85a
\fB-p\fR, \fB--preserve-permissions\fR
a4d85a
extract  information  about  file permissions (default for superuser)
a4d85a
.TP
a4d85a
\fB-v\fR, \fB--verbose\fR
a4d85a
verbosely list files processed
a4d85a
.TP
a4d85a
\fB-z\fR, \fB--gzip\fR
a4d85a
filter the archive through gzip
a4d85a
a4d85a
.SH \fBOperation modifiers:\fR
a4d85a
.TP
a4d85a
\fB\-\-check\-device\fR
a4d85a
check device numbers when creating incremental
a4d85a
archives (default)
a4d85a
.TP
a4d85a
\fB\-g\fR, \fB\-\-listed\-incremental\fR=\fIFILE\fR
a4d85a
handle new GNU\-format incremental backup
a4d85a
.TP
a4d85a
\fB\-G\fR, \fB\-\-incremental\fR
a4d85a
handle old GNU\-format incremental backup
a4d85a
.TP
a4d85a
\fB\-\-ignore\-failed\-read\fR
a4d85a
do not exit with nonzero on unreadable files
a4d85a
.TP
a4d85a
\fB\-\-level\fR=\fINUMBER\fR
a4d85a
dump level for created listed\-incremental archive
a4d85a
.TP
a4d85a
\fB\-n\fR, \fB\-\-seek\fR
a4d85a
archive is seekable
a4d85a
.TP
a4d85a
\fB\-\-no\-check\-device\fR
a4d85a
do not check device numbers when creating
a4d85a
incremental archives
a4d85a
.TP
a4d85a
\fB\-\-no\-seek\fR
a4d85a
archive is not seekable
a4d85a
.TP
a4d85a
\fB\-\-occurrence\fR[=\fINUMBER\fR]
a4d85a
process only the NUMBERth occurrence of each file
a4d85a
in the archive; this option is valid only in
a4d85a
conjunction with one of the subcommands \fB\-\-delete\fR,
a4d85a
\fB\-\-diff\fR, \fB\-\-extract\fR or \fB\-\-list\fR and when a list of
a4d85a
files is given either on the command line or via
a4d85a
the \fB\-T\fR option; NUMBER defaults to 1
a4d85a
.TP
a4d85a
\fB\-\-sparse\-version\fR=\fIMAJOR[\fR.MINOR]
a4d85a
set version of the sparse format to use (implies
a4d85a
\fB\-\-sparse\fR)
a4d85a
.TP
a4d85a
\fB\-S\fR, \fB\-\-sparse\fR
a4d85a
handle sparse files efficiently
a4d85a
.IP
a4d85a
.SH \fBOverwrite control:\fR
a4d85a
.TP
a4d85a
\fB\-k\fR, \fB\-\-keep\-old\-files\fR
a4d85a
don't replace existing files when extracting,
a4d85a
treat them as errors
a4d85a
.TP
a4d85a
\fB\-\-keep\-newer\-files\fR
a4d85a
don't replace existing files that are newer than
a4d85a
their archive copies
a4d85a
.TP
a4d85a
\fB\-\-no\-overwrite\-dir\fR
a4d85a
preserve metadata of existing directories
a4d85a
.TP
a4d85a
\fB\-\-overwrite\fR
a4d85a
overwrite existing files when extracting
a4d85a
.TP
a4d85a
\fB\-\-overwrite\-dir\fR
a4d85a
overwrite metadata of existing directories when
a4d85a
extracting (default)
a4d85a
.TP
a4d85a
\fB\-\-recursive\-unlink\fR
a4d85a
empty hierarchies prior to extracting directory
a4d85a
.TP
a4d85a
\fB\-\-remove\-files\fR
a4d85a
remove files after adding them to the archive
a4d85a
.TP
a4d85a
\fB\-\-skip\-old\-files\fR
a4d85a
don't replace existing files when extracting,
a4d85a
silently skip over them
a4d85a
.TP
a4d85a
\fB\-U\fR, \fB\-\-unlink\-first\fR
a4d85a
remove each file prior to extracting over it
a4d85a
.TP
a4d85a
\fB\-W\fR, \fB\-\-verify\fR
a4d85a
attempt to verify the archive after writing it
a4d85a
.IP
a4d85a
.SH \fBSelect output stream:\fR
a4d85a
.HP
a4d85a
\fB\-\-ignore\-command\-error\fR ignore exit codes of children
a4d85a
.TP
a4d85a
\fB\-\-no\-ignore\-command\-error\fR
a4d85a
treat non\-zero exit codes of children as
a4d85a
error
a4d85a
.TP
a4d85a
\fB\-O\fR, \fB\-\-to\-stdout\fR
a4d85a
extract files to standard output
a4d85a
.TP
a4d85a
\fB\-\-to\-command\fR=\fICOMMAND\fR
a4d85a
pipe extracted files to another program
a4d85a
.IP
a4d85a
.SH \fBHandling of file attributes:\fR
a4d85a
.TP
a4d85a
\fB\-\-atime\-preserve\fR[=\fIMETHOD\fR]
a4d85a
preserve access times on dumped files, either
a4d85a
by restoring the times after reading
a4d85a
(METHOD='replace'; default) or by not setting the
a4d85a
times in the first place (METHOD='system')
a4d85a
.TP
a4d85a
\fB\-\-delay\-directory\-restore\fR
a4d85a
delay setting modification times and
a4d85a
permissions of extracted directories until the end
a4d85a
of extraction
a4d85a
.TP
a4d85a
\fB\-\-group\fR=\fINAME\fR
a4d85a
force NAME as group for added files
a4d85a
.TP
a4d85a
\fB\-\-mode\fR=\fICHANGES\fR
a4d85a
force (symbolic) mode CHANGES for added files
a4d85a
.TP
a4d85a
\fB\-\-mtime\fR=\fIDATE\-OR\-FILE\fR
a4d85a
set mtime for added files from DATE\-OR\-FILE
a4d85a
.TP
a4d85a
\fB\-m\fR, \fB\-\-touch\fR
a4d85a
don't extract file modified time
a4d85a
.TP
a4d85a
\fB\-\-no\-delay\-directory\-restore\fR
a4d85a
cancel the effect of \fB\-\-delay\-directory\-restore\fR
a4d85a
option
a4d85a
.TP
a4d85a
\fB\-\-no\-same\-owner\fR
a4d85a
extract files as yourself (default for ordinary
a4d85a
users)
a4d85a
.TP
a4d85a
\fB\-\-no\-same\-permissions\fR
a4d85a
apply the user's umask when extracting permissions
a4d85a
from the archive (default for ordinary users)
a4d85a
.TP
a4d85a
\fB\-\-numeric\-owner\fR
a4d85a
always use numbers for user/group names
a4d85a
.TP
a4d85a
\fB\-\-owner\fR=\fINAME\fR
a4d85a
force NAME as owner for added files
a4d85a
.TP
a4d85a
\fB\-p\fR, \fB\-\-preserve\-permissions\fR, \fB\-\-same\-permissions\fR
a4d85a
extract information about file permissions
a4d85a
(default for superuser)
a4d85a
.TP
a4d85a
\fB\-\-preserve\fR
a4d85a
same as both \fB\-p\fR and \fB\-s\fR
a4d85a
.TP
a4d85a
\fB\-\-same\-owner\fR
a4d85a
try extracting files with the same ownership as
a4d85a
exists in the archive (default for superuser)
a4d85a
.TP
a4d85a
\fB\-s\fR, \fB\-\-preserve\-order\fR, \fB\-\-same\-order\fR
a4d85a
sort names to extract to match archive
a4d85a
.IP
a4d85a
.SH \fBHandling of extended file attributes:\fR
a4d85a
.TP
a4d85a
\fB\-\-acls\fR
a4d85a
Enable the POSIX ACLs support
a4d85a
.TP
a4d85a
\fB\-\-no\-acls\fR
a4d85a
Disable the POSIX ACLs support
a4d85a
.TP
a4d85a
\fB\-\-no\-selinux\fR
a4d85a
Disable the SELinux context support
a4d85a
.TP
a4d85a
\fB\-\-no\-xattrs\fR
a4d85a
Disable extended attributes support
a4d85a
.TP
a4d85a
\fB\-\-selinux\fR
a4d85a
Enable the SELinux context support
a4d85a
.TP
a4d85a
\fB\-\-xattrs\fR
a4d85a
Enable extended attributes support
a4d85a
.TP
a4d85a
\fB\-\-xattrs\-exclude\fR=\fIMASK\fR
a4d85a
specify the exclude pattern for xattr keys
a4d85a
.TP
a4d85a
\fB\-\-xattrs\-include\fR=\fIMASK\fR
a4d85a
specify the include pattern for xattr keys
a4d85a
.IP
a4d85a
.SH \fBDevice selection and switching:\fR
a4d85a
.TP
a4d85a
\fB\-f\fR, \fB\-\-file\fR=\fIARCHIVE\fR
a4d85a
use archive file or device ARCHIVE
a4d85a
.TP
a4d85a
\fB\-\-force\-local\fR
a4d85a
archive file is local even if it has a colon
a4d85a
.TP
a4d85a
\fB\-F\fR, \fB\-\-info\-script\fR=\fINAME\fR, \fB\-\-new\-volume\-script\fR=\fINAME\fR
a4d85a
run script at end of each tape (implies \fB\-M\fR)
a4d85a
.TP
a4d85a
\fB\-L\fR, \fB\-\-tape\-length\fR=\fINUMBER\fR
a4d85a
change tape after writing NUMBER x 1024 bytes
a4d85a
.TP
a4d85a
\fB\-M\fR, \fB\-\-multi\-volume\fR
a4d85a
create/list/extract multi\-volume archive
a4d85a
.TP
a4d85a
\fB\-\-rmt\-command\fR=\fICOMMAND\fR
a4d85a
use given rmt COMMAND instead of rmt
a4d85a
.TP
a4d85a
\fB\-\-rsh\-command\fR=\fICOMMAND\fR
a4d85a
use remote COMMAND instead of rsh
a4d85a
.TP
a4d85a
\fB\-\-volno\-file\fR=\fIFILE\fR
a4d85a
use/update the volume number in FILE
a4d85a
.IP
a4d85a
.SH \fBDevice blocking:\fR
a4d85a
.TP
a4d85a
\fB\-b\fR, \fB\-\-blocking\-factor\fR=\fIBLOCKS\fR
a4d85a
BLOCKS x 512 bytes per record
a4d85a
.TP
a4d85a
\fB\-B\fR, \fB\-\-read\-full\-records\fR
a4d85a
reblock as we read (for 4.2BSD pipes)
a4d85a
.TP
a4d85a
\fB\-i\fR, \fB\-\-ignore\-zeros\fR
a4d85a
ignore zeroed blocks in archive (means EOF)
a4d85a
.TP
a4d85a
\fB\-\-record\-size\fR=\fINUMBER\fR
a4d85a
NUMBER of bytes per record, multiple of 512
a4d85a
.IP
a4d85a
.SH \fBArchive format selection:\fR
a4d85a
\fB\-H\fR, \fB\-\-format\fR=\fIFORMAT\fR
a4d85a
.RS
a4d85a
create archive of the given format
a4d85a
.sp
a4d85a
FORMAT is one of the following:
a4d85a
.RS
a4d85a
.TP
a4d85a
gnu
a4d85a
GNU tar 1.13.x format
a4d85a
.TP
a4d85a
oldgnu
a4d85a
GNU format as per tar <= 1.12
a4d85a
.TP
a4d85a
pax
a4d85a
POSIX 1003.1\-2001 (pax) format
a4d85a
.TP
a4d85a
posix
a4d85a
same as pax
a4d85a
.TP
a4d85a
ustar
a4d85a
POSIX 1003.1\-1988 (ustar) format
a4d85a
.TP
a4d85a
v7
a4d85a
old V7 tar format
a4d85a
.RE
a4d85a
.RE
a4d85a
.TP
a4d85a
\fB\-\-old\-archive\fR, \fB\-\-portability\fR
a4d85a
same as \fB\-\-format\fR=\fIv7\fR
a4d85a
.TP
a4d85a
\fB\-\-pax\-option\fR=\fIkeyword[[\fR:]=value][,keyword[[:]=value]]...
a4d85a
control pax keywords
a4d85a
.TP
a4d85a
\fB\-\-posix\fR
a4d85a
same as \fB\-\-format\fR=\fIposix\fR
a4d85a
.TP
a4d85a
\fB\-V\fR, \fB\-\-label\fR=\fITEXT\fR
a4d85a
create archive with volume name TEXT; at
a4d85a
list/extract time, use TEXT as a globbing pattern
a4d85a
for volume name
a4d85a
.IP
a4d85a
.SH \fBCompression options:\fR
a4d85a
.TP
a4d85a
\fB\-a\fR, \fB\-\-auto\-compress\fR
a4d85a
use archive suffix to determine the compression
a4d85a
program
a4d85a
.TP
a4d85a
\fB\-I\fR, \fB\-\-use\-compress\-program\fR=\fIPROG\fR
a4d85a
filter through PROG (must accept \fB\-d\fR)
a4d85a
.TP
a4d85a
\fB\-j\fR, \fB\-\-bzip2\fR
a4d85a
filter the archive through bzip2
a4d85a
.TP
a4d85a
\fB\-J\fR, \fB\-\-xz\fR
a4d85a
filter the archive through xz
a4d85a
.TP
a4d85a
\fB\-\-lzip\fR
a4d85a
filter the archive through lzip
a4d85a
.TP
a4d85a
\fB\-\-lzma\fR
a4d85a
filter the archive through lzma
a4d85a
.HP
a4d85a
\fB\-\-lzop\fR
a4d85a
.TP
a4d85a
\fB\-\-no\-auto\-compress\fR
a4d85a
do not use archive suffix to determine the
a4d85a
compression program
a4d85a
.TP
a4d85a
\fB\-z\fR, \fB\-\-gzip\fR, \fB\-\-gunzip\fR, \fB\-\-ungzip\fR
a4d85a
filter the archive through gzip
a4d85a
.TP
a4d85a
\fB\-Z\fR, \fB\-\-compress\fR, \fB\-\-uncompress\fR
a4d85a
filter the archive through compress
a4d85a
.TP
a4d85a
\fBNote: You might need to install external program (lzip/ncompress/lzma...) to use some of these compression options\fB
a4d85a
.IP
a4d85a
.SH \fBLocal file selection:\fR
a4d85a
.TP
a4d85a
\fB\-\-add\-file\fR=\fIFILE\fR
a4d85a
add given FILE to the archive (useful if its name
a4d85a
starts with a dash)
a4d85a
.TP
a4d85a
\fB\-\-backup\fR[=\fICONTROL\fR]
a4d85a
backup before removal, choose version CONTROL
a4d85a
.TP
a4d85a
\fB\-C\fR, \fB\-\-directory\fR=\fIDIR\fR
a4d85a
change to directory DIR
a4d85a
.TP
a4d85a
\fB\-\-exclude\fR=\fIPATTERN\fR
a4d85a
exclude files, given as a PATTERN
a4d85a
.TP
a4d85a
\fB\-\-exclude\-backups\fR
a4d85a
exclude backup and lock files
a4d85a
.TP
a4d85a
\fB\-\-exclude\-caches\fR
a4d85a
exclude contents of directories containing
a4d85a
CACHEDIR.TAG, except for the tag file itself
a4d85a
.TP
a4d85a
\fB\-\-exclude\-caches\-all\fR
a4d85a
exclude directories containing CACHEDIR.TAG
a4d85a
.TP
a4d85a
\fB\-\-exclude\-caches\-under\fR exclude everything under directories containing
a4d85a
CACHEDIR.TAG
a4d85a
.TP
a4d85a
\fB\-\-exclude\-tag\fR=\fIFILE\fR
a4d85a
exclude contents of directories containing FILE,
a4d85a
except for FILE itself
a4d85a
.HP
a4d85a
\fB\-\-exclude\-tag\-all\fR=\fIFILE\fR exclude directories containing FILE
a4d85a
.TP
a4d85a
\fB\-\-exclude\-tag\-under\fR=\fIFILE\fR
a4d85a
exclude everything under directories
a4d85a
containing FILE
a4d85a
.TP
a4d85a
\fB\-\-exclude\-vcs\fR
a4d85a
exclude version control system directories
a4d85a
.TP
a4d85a
\fB\-h\fR, \fB\-\-dereference\fR
a4d85a
follow symlinks; archive and dump the files they
a4d85a
point to
a4d85a
.TP
a4d85a
\fB\-\-hard\-dereference\fR
a4d85a
follow hard links; archive and dump the files they
a4d85a
refer to
a4d85a
.TP
a4d85a
\fB\-K\fR, \fB\-\-starting\-file\fR=\fIMEMBER\-NAME\fR
a4d85a
begin at member MEMBER\-NAME in the archive
a4d85a
.TP
a4d85a
\fB\-\-newer\-mtime\fR=\fIDATE\fR
a4d85a
compare date and time when data changed only
a4d85a
.TP
a4d85a
\fB\-\-no\-null\fR
a4d85a
disable the effect of the previous \fB\-\-null\fR option
a4d85a
.TP
a4d85a
\fB\-\-no\-recursion\fR
a4d85a
avoid descending automatically in directories
a4d85a
.TP
a4d85a
\fB\-\-no\-unquote\fR
a4d85a
do not unquote filenames read with \fB\-T\fR
a4d85a
.HP
a4d85a
\fB\-\-null\fR                 \fB\-T\fR reads null\-terminated names, disable \fB\-C\fR
a4d85a
.TP
a4d85a
\fB\-N\fR, \fB\-\-newer\fR=\fIDATE\-OR\-FILE\fR, \fB\-\-after\-date\fR=\fIDATE\-OR\-FILE\fR
a4d85a
only store files newer than DATE\-OR\-FILE
a4d85a
.TP
a4d85a
\fB\-\-one\-file\-system\fR
a4d85a
stay in local file system when creating archive
a4d85a
.TP
a4d85a
\fB\-P\fR, \fB\-\-absolute\-names\fR
a4d85a
don't strip leading `/'s from file names
a4d85a
.TP
a4d85a
\fB\-\-recursion\fR
a4d85a
recurse into directories (default)
a4d85a
.TP
a4d85a
\fB\-\-suffix\fR=\fISTRING\fR
a4d85a
backup before removal, override usual suffix ('~'
a4d85a
unless overridden by environment variable
a4d85a
SIMPLE_BACKUP_SUFFIX)
a4d85a
.TP
a4d85a
\fB\-T\fR, \fB\-\-files\-from\fR=\fIFILE\fR
a4d85a
get names to extract or create from FILE
a4d85a
.TP
a4d85a
\fB\-\-unquote\fR
a4d85a
unquote filenames read with \fB\-T\fR (default)
a4d85a
.TP
a4d85a
\fB\-X\fR, \fB\-\-exclude\-from\fR=\fIFILE\fR
a4d85a
exclude patterns listed in FILE
a4d85a
.IP
a4d85a
.SH \fBFile name transformations:\fR
a4d85a
.TP
a4d85a
\fB\-\-strip\-components\fR=\fINUMBER\fR
a4d85a
strip NUMBER leading components from file
a4d85a
names on extraction
a4d85a
.TP
a4d85a
\fB\-\-transform\fR=\fIEXPRESSION\fR, \fB\-\-xform\fR=\fIEXPRESSION\fR
a4d85a
use sed replace EXPRESSION to transform file
a4d85a
names
a4d85a
.IP
a4d85a
File name matching options (affect both exclude and include patterns):
a4d85a
.TP
a4d85a
\fB\-\-anchored\fR
a4d85a
patterns match file name start
a4d85a
.TP
a4d85a
\fB\-\-ignore\-case\fR
a4d85a
ignore case
a4d85a
.TP
a4d85a
\fB\-\-no\-anchored\fR
a4d85a
patterns match after any `/' (default for
a4d85a
exclusion)
a4d85a
.TP
a4d85a
\fB\-\-no\-ignore\-case\fR
a4d85a
case sensitive matching (default)
a4d85a
.TP
a4d85a
\fB\-\-no\-wildcards\fR
a4d85a
verbatim string matching
a4d85a
.TP
a4d85a
\fB\-\-no\-wildcards\-match\-slash\fR
a4d85a
wildcards do not match `/'
a4d85a
.TP
a4d85a
\fB\-\-wildcards\fR
a4d85a
use wildcards (default)
a4d85a
.TP
a4d85a
\fB\-\-wildcards\-match\-slash\fR
a4d85a
wildcards match `/' (default for exclusion)
a4d85a
.IP
a4d85a
.SH \fBInformative output:\fR
a4d85a
.TP
a4d85a
\fB\-\-checkpoint\fR[=\fINUMBER\fR]
a4d85a
display progress messages every NUMBERth record
a4d85a
(default 10)
a4d85a
.TP
a4d85a
\fB\-\-checkpoint\-action\fR=\fIACTION\fR
a4d85a
execute ACTION on each checkpoint
a4d85a
.TP
a4d85a
\fB\-\-full\-time\fR
a4d85a
print file time to its full resolution
a4d85a
.TP
a4d85a
\fB\-\-index\-file\fR=\fIFILE\fR
a4d85a
send verbose output to FILE
a4d85a
.TP
a4d85a
\fB\-l\fR, \fB\-\-check\-links\fR
a4d85a
print a message if not all links are dumped
a4d85a
.TP
a4d85a
\fB\-\-no\-quote\-chars\fR=\fISTRING\fR
a4d85a
disable quoting for characters from STRING
a4d85a
.TP
a4d85a
\fB\-\-quote\-chars\fR=\fISTRING\fR
a4d85a
additionally quote characters from STRING
a4d85a
.TP
a4d85a
\fB\-\-quoting\-style\fR=\fISTYLE\fR
a4d85a
set name quoting style; see below for valid STYLE
a4d85a
values
a4d85a
.TP
a4d85a
\fB\-R\fR, \fB\-\-block\-number\fR
a4d85a
show block number within archive with each
a4d85a
message
a4d85a
.TP
a4d85a
\fB\-\-show\-defaults\fR
a4d85a
show tar defaults
a4d85a
.TP
a4d85a
\fB\-\-show\-omitted\-dirs\fR
a4d85a
when listing or extracting, list each directory
a4d85a
that does not match search criteria
a4d85a
.TP
a4d85a
\fB\-\-show\-transformed\-names\fR, \fB\-\-show\-stored\-names\fR
a4d85a
show file or archive names after transformation
a4d85a
.TP
a4d85a
\fB\-\-totals\fR[=\fISIGNAL\fR]
a4d85a
print total bytes after processing the archive;
a4d85a
with an argument \- print total bytes when this
a4d85a
SIGNAL is delivered; Allowed signals are: SIGHUP,
a4d85a
SIGQUIT, SIGINT, SIGUSR1 and SIGUSR2; the names
a4d85a
without SIG prefix are also accepted
a4d85a
.TP
a4d85a
\fB\-\-utc\fR
a4d85a
print file modification dates in UTC
a4d85a
.TP
a4d85a
\fB\-v\fR, \fB\-\-verbose\fR
a4d85a
verbosely list files processed
a4d85a
.TP
a4d85a
\fB\-\-warning\fR=\fIKEYWORD\fR
a4d85a
warning control
a4d85a
.TP
a4d85a
\fB\-w\fR, \fB\-\-interactive\fR, \fB\-\-confirmation\fR
a4d85a
ask for confirmation for every action
a4d85a
.IP
a4d85a
.SH \fBCompatibility options:\fR
a4d85a
.TP
a4d85a
\fB\-o\fR
a4d85a
when creating, same as \fB\-\-old\-archive\fR; when
a4d85a
extracting, same as \fB\-\-no\-same\-owner\fR
a4d85a
.IP
a4d85a
.SH \fBOther options:\fR
a4d85a
.TP
a4d85a
\-?, \fB\-\-help\fR
a4d85a
give this help list
a4d85a
.TP
a4d85a
\fB\-\-restrict\fR
a4d85a
disable use of some potentially harmful options
a4d85a
.TP
a4d85a
\fB\-\-usage\fR
a4d85a
give a short usage message
a4d85a
.TP
a4d85a
\fB\-\-version\fR
a4d85a
print program version
a4d85a
.PP
a4d85a
.PP
a4d85a
Mandatory or optional arguments to long options are also mandatory or optional
a4d85a
for any corresponding short options.
a4d85a
.PP
a4d85a
The backup suffix is `~', unless set with \fB\-\-suffix\fR or SIMPLE_BACKUP_SUFFIX.
a4d85a
The version control may be set with \fB\-\-backup\fR or VERSION_CONTROL, values are:
a4d85a
.TP
a4d85a
none, off
a4d85a
never make backups
a4d85a
.TP
a4d85a
t, numbered
a4d85a
make numbered backups
a4d85a
.TP
a4d85a
nil, existing
a4d85a
numbered if numbered backups exist, simple otherwise
a4d85a
.TP
a4d85a
never, simple
a4d85a
always make simple backups
a4d85a
.PP
a4d85a
Valid arguments for the \fB\-\-quoting\-style\fR option are:
a4d85a
.IP
a4d85a
literal
a4d85a
shell
a4d85a
shell\-always
a4d85a
c
a4d85a
c\-maybe
a4d85a
escape
a4d85a
locale
a4d85a
clocale
a4d85a
.PP
a4d85a
.SH AUTHOR
a4d85a
Written by John Gilmore and Jay Fenlason.
a4d85a
.SH "REPORTING BUGS"
a4d85a
Report bugs to <bug\-tar@gnu.org>.
a4d85a
.SH COPYRIGHT
a4d85a
Copyright \(co 2013 Free Software Foundation, Inc.
a4d85a
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>.
a4d85a
.br
a4d85a
This is free software: you are free to change and redistribute it.
a4d85a
There is NO WARRANTY, to the extent permitted by law.