.nh .TH runc-restore "8" .SH NAME .PP \fBrunc-restore\fP - restore a container from a previous checkpoint .SH SYNOPSIS .PP \fBrunc restore\fP [\fIoption\fP ...] \fIcontainer-id\fP .SH DESCRIPTION .PP Restores the container instance from a previously performed \fBrunc checkpoint\fP\&. .SH OPTIONS .TP \fB--console-socket\fP \fIpath\fP Path to an \fBAF_UNIX\fP socket which will receive a file descriptor referencing the master end of the console's pseudoterminal. See docs/terminals \[la]https://github.com/opencontainers/runc/blob/master/docs/terminals.md\[ra]\&. .TP \fB--image-path\fP \fIpath\fP Set path to get criu image files to restore from. .TP \fB--work-path\fP \fIpath\fP Set path for saving criu work files and logs. The default is to reuse the image files directory. .TP \fB--tcp-established\fP Allow checkpoint/restore of established TCP connections. See criu --tcp-establised option \[la]https://criu.org/CLI/opt/--tcp-established\[ra]\&. .TP \fB--ext-unix-sk\fP Allow checkpoint/restore of external unix sockets. See criu --ext-unix-sk option \[la]https://criu.org/CLI/opt/--ext-unix-sk\[ra]\&. .TP \fB--shell-job\fP Allow checkpoint/restore of shell jobs. .TP \fB--file-locks\fP Allow checkpoint/restore of file locks. See criu --file-locks option \[la]https://criu.org/CLI/opt/--file-locks\[ra]\&. .TP \fB--manage-cgroups-mode\fP \fBsoft\fP|\fBfull\fP|\fBstrict\fP\&. Cgroups mode. Default is \fBsoft\fP\&. See criu --manage-cgroups option \[la]https://criu.org/CLI/opt/--manage-cgroups\[ra]\&. .TP \fB--bundle\fP|\fB-b\fP \fIpath\fP Path to the root of the bundle directory. Default is current directory. .TP \fB--detach\fP|\fB-d\fP Detach from the container's process. .TP \fB--pid-file\fP \fIpath\fP Specify the file to write the initial container process' PID to. .TP \fB--no-subreaper\fP Disable the use of the subreaper used to reap reparented processes. .TP \fB--no-pivot\fP Do not use pivot root to jail process inside rootfs. This should not be used except in exceptional circumstances, and may be unsafe from the security standpoint. .TP \fB--empty-ns\fP \fInamespace\fP Create a \fInamespace\fP, but don't restore its properties. See criu --empty-ns option \[la]https://criu.org/CLI/opt/--empty-ns\[ra]\&. .TP \fB--auto-dedup\fP Enable auto deduplication of memory images. See criu --auto-dedup option \[la]https://criu.org/CLI/opt/--auto-dedup\[ra]\&. .TP \fB--lazy-pages\fP Use lazy migration mechanism. This requires a running \fBcriu lazy-pages\fP daemon. See criu --lazy-pages option \[la]https://criu.org/CLI/opt/--lazy-pages\[ra]\&. .TP \fB--lsm-profile\fP \fItype\fP:\fIlabel\fP Specify an LSM profile to be used during restore. Here \fItype\fP can either be \fBapparamor\fP or \fBselinux\fP, and \fIlabel\fP is a valid LSM label. For example, \fB--lsm-profile "selinux:system_u:system_r:container_t:s0:c82,c137"\fP\&. By default, the checkpointed LSM profile is used upon restore. .TP \fB--lsm-mount-context\fP \fIcontext\fP Specify an LSM mount context to be used during restore. Only mounts with an existing context will have their context replaced. With this option it is possible to change SELinux mount options. Instead of mounting with the checkpointed context, the specified \fIcontext\fP will be used. For example, \fB--lsm-mount-context "system_u:object_r:container_file_t:s0:c82,c137"\fP\&. .SH SEE ALSO .PP \fBcriu\fP(8), \fBrunc-checkpoint\fP(8), \fBrunc\fP(8).