Command Reference Guide

__________________________________________________________________________________________________________________________________________________________________________________________________
__________________________________________________________________________________________________________________________________________________________________________________________________
STANDARD Printed by: Nora Chuang [nchuang] STANDARD
/build/1111/BRICK/man1/!!!intro.1
________________________________________________________________
___ ___
c
cpio(1) cpio(1)
warn.
f
Copy in all files except those selected by pattern....
h Follow symbolic links as though they were normal files or directories. Normally, cpio
archives the link.
l Whenever possible, link files rather than copying them. This option does not destroy existing
files. Use only with -p.
m Retain previous file modification time. This option does not affect directories that are being
copied.
r Rename files interactively. If the user types a null line, the file is skipped.
s Swap all bytes of the file. Use only with -i. See the P option for details; see also the s and
S options.
t Print only a table of contents of the input. No files are created, read, or copied.
u Copy unconditionally (normally, an older file does not replace a newer file with the same
name).
v Print a list of file names as they are processed. When used with the
t option, the table of
contents has the format:
numeric-mode owner-name blocks date-time filename
where numeric-mode is the file privileges in numeric format, owner-name is the name of the
file owner, blocks is the size of the file in 512-byte blocks, date-time is the date and time the
file was last modified, and filename is the path name of the file as recorded in the archive.
x Save or restore device special files. Since mknod() is used to recreate these files on a
restore, -ix and -px can be used only by users with appropriate privileges (see mknod(2)).
This option is intended for intrasystem (backup) use only. Restoring device files from previ-
ous versions of the OS, or from different systems can be very dangerous.
cpio may prevent
the restoration of certain device files from the archive.
A Suppress warning messages regarding optional access control list entries. cpio does not
back up optional access control list entries in a file’s access control list (see acl(5)). Normally,
a warning message is printed for each file that has optional access control list entries.
B Block input/output at 5120 bytes to the record (does not apply to
cpio -p). This option is
meaningful only with data directed to or from devices that support variable-length records
such as magnetic tape.
C Have cpio checkpoint itself at the start of each volume. If cpio is writing to a streaming
tape drive with immediate-report mode enabled and a write error occurs, it normally aborts
and exits with return code 2. With this option specified, cpio instead automatically restarts
itself from the checkpoint and rewrites the current volume. Alternatively, if cpio is not
writing to such a device and a write error occurs, cpio normally continues with the next
volume. With this option specified, however, the user can choose to either ignore the error or
rewrite the current volume.
P Read a file written on a PDP-11 or VAX system (with byte-swapping) that did not use the
c
option. Use only with -i. Files copied in this mode are not changed. Non-ASCII files are
likely to need further processing to be readable. This processing often requires knowledge of
file contents, and thus cannot always be done by this program. The
b, s, and
S options can
be used when swapping all the bytes on the tape (rather than just in the headers) is appropri-
ate. In general, text is best processed with
P and binary data with one of the other options.
(PDP-11 and VAX are registered trademarks of Digital Equipment Corporation.)
R Resynchronize automatically when cpio goes "out of phase", (see DIAGNOSTICS).
S Swap all half-words in the file. Use only with -i. See the P option for details; see also the b
and s options.
U Use the process’s file-mode creation mask (see umask(2)) to modify the mode of files created,
in the same manner as creat(2).
6 Process a UNIX Sixth-Edition-format file. Use only with
-i.
Section 1118 2 HP-UX Release 11i: December 2000
___
___