ADSM-L

Re: [ADSM-L] Getting unix permissions back from TSM

2011-09-16 04:52:34
Subject: Re: [ADSM-L] Getting unix permissions back from TSM
From: molin gregory <gregory.molin AT AFNOR DOT ORG>
To: ADSM-L AT VM.MARIST DOT EDU
Date: Fri, 16 Sep 2011 10:45:35 +0200
Hello Steve,

You can restore your system with the mksysb backup.
Select the filesystems you want to restore.

Hope that help

Cordialement,
Grégory Molin
Tel : 0141628162
gregory.molin AT afnor DOT org
-----Message d'origine-----
De : ADSM: Dist Stor Manager [mailto:ADSM-L AT VM.MARIST DOT EDU] De la part de 
Steve Harris
Envoyé : vendredi 16 septembre 2011 07:15
À : ADSM-L AT VM.MARIST DOT EDU
Objet : [ADSM-L] Getting unix permissions back from TSM

Hi All

One of my accounts has just had a unix admin tried to run something like

chown -R something:something /home/fred/*

but he had an extra space in there and ran it from the root directory

chown -R something:something /home/fred/ *

This has destroyed the ownership of the operating system binaries and trashed 
the system.  Worse it was done using a distributed tool, so quite a number of 
AIX lpars are affected including the TSM server.

Once we get the TSM Server back up, is there any way to restore just the file 
permissions without restoring the data?  I can't think of a way.  Maybe there 
is a testflag to do this?  Even a listing of the file and permissions for all 
active files would be enough to be able to fix the problem.

TSM Server 5.5 AIX 5.3

Thanks

Steve

TSM Admin
Canberra Australia.

"ATTENTION.

Ce message et les pièces jointes sont confidentiels et établis à l'attention 
exclusive de leur destinataire (aux adresses spécifiques auxquelles il a été 
adressé). Si vous n'êtes pas le destinataire de ce message, vous devez 
immédiatement en avertir l'expéditeur et supprimer ce message et les pièces 
jointes de votre système. 

This message and any attachments are confidential and intended to be received 
only by the addressee. If you are not the intended recipient, please notify 
immediately the sender by reply and delete the message and any attachments from 
your system. "