HP-UX Reference (11i v2 03/08) - 1 User Commands A-M (vol 1)
c
cpio(1) cpio(1)
file system that does not support extent attributes. If
-e is not specified, the default
value for extarg is
warn.
f Copy in all files except those selected by pattern ....
h Follow symbolic links as though they were normal files or directories. Normally,
cpio
archives the link.
l Whenever possible, link files rather than copying them. This option does not destroy
existing files. Use only with -p
.
m Retain previous file modification time. This option does not affect directories that are
being copied.
r Rename files interactively. If the user types a null line, the file is skipped.
s Swap all bytes of the file. Use only with
-i. See the P option for details; see also the s
and S options.
t Print only a table of contents of the input. No files are created, read, or copied.
u Copy unconditionally (normally, an older file does not replace a newer file with the same
name).
v Print a list of file names as they are processed. When used with the
t option, the table of
contents has the format:
numeric-mode owner-name blocks date-time filename
where numeric-mode is the file privileges in numeric format, owner-name is the name of
the file owner, blocks is the size of the file in 512-byte blocks, date-time is the date and
time the file was last modified, and filename is the path name of the file as recorded in
the archive.
x Save or restore device special files. Since mknod() is used to recreate these files on a
restore, -ix and -px can be used only by users with appropriate privileges (see
mknod(2)). This option is intended for intrasystem (backup) use only. Restoring device
files from previous versions of the OS, or from different systems can be very dangerous.
cpio may prevent the restoration of certain device files from the archive.
A Suppress warning messages regarding optional access control list entries. cpio does not
back up optional access control list entries in a file’s access control list (see acl(5)). Nor-
mally, a warning message is printed for each file that has optional access control list
entries.
B Block input/output at 5120 bytes to the record (does not apply to
cpio -p). This option
is meaningful only with data directed to or from devices that support variable-length
records such as magnetic tape.
C Have cpio checkpoint itself at the start of each volume. If cpio is writing to a stream-
ing tape drive with immediate-report mode enabled and a write error occurs, it normally
aborts and exits with return code 2. With this option specified, cpio instead automati-
cally restarts itself from the checkpoint and rewrites the current volume. Alternatively,
if cpio is not writing to such a device and a write error occurs, cpio normally continues
with the next volume. With this option specified, however, the user can choose to either
ignore the error or rewrite the current volume.
P Read a file written on a PDP-11 or VAX system (with byte-swapping) that did not use the
c option. Use only with -i. Files copied in this mode are not changed. Non-ASCII files
are likely to need further processing to be readable. This processing often requires
knowledge of file contents, and thus cannot always be done by this program. The b, s,
and S options can be used when swapping all the bytes on the tape (rather than just in
the headers) is appropriate. In general, text is best processed with P and binary data
with one of the other options.
R Resynchronize automatically when cpio goes "out of phase", (see the DIAGNOSTICS
section).
S Swap all half-words in the file. Use only with -i. See the P option for details; see also
the b and s options.
Section 1−−120 Hewlett-Packard Company − 2 − HP-UX 11i Version 2: August 2003