HP-UX Reference (11i v3 07/02) - 1 User Commands A-M (vol 1)
c
cpio(1) cpio(1)
system that does not support extent attributes. If
-e is not specified, the default value for
extarg is
warn.
f Copy in all files except those selected by pattern....
h Follow symbolic links as though they were normal files or directories. Normally,
cpio
archives the link.
l Whenever possible, link files rather than copying them. This option does not destroy exist-
ing files. Use only with -p
.
m Retain previous file modification time. This option does not affect directories that are being
copied.
r Rename files interactively. If the user types a null line, the file is skipped.
s Swap all bytes of the file. Use only with
-i. See the P option for details; see also the s
and S options.
t Print only a table of contents of the input. No files are created, read, or copied.
u Copy unconditionally (normally, an older file does not replace a newer file with the same
name).
v Print a list of file names as they are processed. When used with the
t option, the table of
contents has the format:
numeric-mode owner-name blocks date-time filename
where numeric-mode is the file privileges in numeric format, owner-name is the name of
the file owner, blocks is the size of the file in 512-byte blocks, date-time is the date and time
the file was last modified, and filename is the path name of the file as recorded in the
archive.
x Save or restore device special files. Since mknod() is used to recreate these files on a
restore, -ix and -px can be used only by users with appropriate privileges (see
mknod(2)). This option is intended for intrasystem (backup) use only. Restoring device
files from previous versions of the OS, or from different systems can be very dangerous.
cpio may prevent the restoration of certain device files from the archive.
A Suppress warning messages regarding optional access control list entries. cpio does not
back up optional access control list entries in a file’s access control list (see acl(5)). Nor-
mally, a warning message is printed for each file that has optional access control list
entries.
B Block input/output at 5120 bytes to the record (does not apply to
cpio -p). This option is
meaningful only with data directed to or from devices that support variable-length records
such as magnetic tape.
C Have cpio checkpoint itself at the start of each volume. If cpio is writing to a streaming
tape drive with immediate-report mode enabled and a write error occurs, it normally aborts
and exits with return code 2. With this option specified, cpio instead automatically res-
tarts itself from the checkpoint and rewrites the current volume. Alternatively, if
cpio is
not writing to such a device and a write error occurs,
cpio normally continues with the
next volume. With this option specified, however, the user can choose to either ignore the
error or rewrite the current volume.
P Read a file written on a PDP-11 or VAX system (with byte-swapping) that did not use the
c
option. Use only with -i. Files copied in this mode are not changed. Non-ASCII files are
likely to need further processing to be readable. This processing often requires knowledge
of file contents, and thus cannot always be done by this program. The b, s, and S options
can be used when swapping all the bytes on the tape (rather than just in the headers) is
appropriate. In general, text is best processed with P and binary data with one of the other
options.
R Resynchronize automatically when cpio goes "out of phase", (see the DIAGNOSTICS sec-
tion).
S Swap all half-words in the file. Use only with -i. See the P option for details; see also the
b and s options.
162 Hewlett-Packard Company − 2 − HP-UX 11i Version 3: February 2007