NetBSD/usr.bin/cpio/cpio.1

200 lines
5.8 KiB
Groff

.\" Copyright (c) 1990 The Regents of the University of California.
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" are met:
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. All advertising materials mentioning features or use of this software
.\" must display the following acknowledgement:
.\" This product includes software developed by the University of
.\" California, Berkeley and its contributors.
.\" 4. Neither the name of the University nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\"
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" SUCH DAMAGE.
.\"
.\" @(#)cpio.1 5.6 (Berkeley) 3/14/91
.\"
.Dd March 14, 1991
.Dt CPIO 1
.Os
.Sh NAME
.Nm cpio
.Nd copy file archives in and out
.Sh SYNOPSIS
.Nm cpio
.Fl i
.Op Fl BcdmrtuvfsSb6
.Op Ar patterns
.Nm cpio
.Fl o
.Op Fl acBv
.Nm cpio
.Fl p
.Op Fl adlmruv
.Ar directory
.Sh DESCRIPTION
.Nm Cpio
has three functional modes; copy out, copy in and pass.
.Pp
Functional Options:
.Bl -tag -width 4n
.It Fl i
.Em Copy in .
Extracts files from the standard input,
which is assumed to be the product of a previous
.Nm cpio
.Fl o .
Only files with names that match patterns are selected.
Patterns are given in the name-generating notation of
.Xr sh 1 .
In patterns, meta-characters
.Ql \&? ,
.Ql \&* ,
and
.Ql [...]
match the
slash
.Ql \&/
character. Multiple patterns may be specified and
if no patterns are specified, the default for patterns is
.Ql \&*
(i.e., select all files). The extracted files are
conditionally created and copied into the current directory
tree based upon the options described below. The
permissions of the files will be those of the previous
.Nm cpio
.Fl o .
The owner and group of the files will be that of the
current user unless the user is super-user, which causes
.Nm cpio
to retain the owner and group of the files of the
previous
.Nm cpio
.Fl o .
.It Fl o
.Em Copy out .
Reads the standard input to obtain a list
of path names and copies those files onto the standard
output together with path name and status information.
Output is padded to a 512-byte boundary.
.It Fl p
.Em Pass.
Reads the standard input to obtain a list of
path names of files that are conditionally created and
copied into the destination directory tree based upon the
options described below.
.El
.Pp
Options for the above functional options:
.Bl -tag -width 4n
.It Fl B
Input/output is to be blocked 5,120 bytes to the record
(does not apply to the pass options; meaningful only
with data directed to or from
.Pa /dev/rmt/??).
.It Fl S
Swap halfwords. Use only with the
.Fl i
option.
.It Fl a
Reset access times of input files after they have been
copied.
.It Fl b
halfwords. Use only with the
.Fl i
option.
.It Fl c
Write header information in ASCII character form for
portability.
.It Fl d
Directories are to be created as needed.
.It Fl f
Copy in all files except those in patterns.
.It Fl l
Whenever possible, link files rather than copying them.
Usable only with the
.Fl p
option.
.It Fl m
Retain previous file modification time. This option is
ineffective on directories that are being copied.
.It Fl r
Interactively rename files. If the user types a null
line, the files is skipped.
.It Fl s
Swap bytes. Use only with the
.Fl i
option.
.It Fl t
Print a table of contents of the input. No files are
created.
.It Fl u
Copy unconditionally (normally, an older file will not
replace a newer file with the same name).
.It Fl v
Verbose: causes a list of file names to be printed.
When used with the t option, the table of contents
looks like the output of an
.Ql ls -l
command (see
.Xr ls 1 ) .
.It Fl 6
Process an old (i.e., UNIX System Sixth Edition format)
file. Only useful with
.Fl i
(copy in).
.El
.Sh EXAMPLES
The first example below copies the contents of a directory
into an archive; the second duplicates a directory
hierarchy:
.Pp
.Bd -literal -offset indent
ls \&| cpio -o > edev/rmt/0m
cd olddir
find \&. -depth -print \&| cpio -pdl newdir
.Pp
The trivial case
.Pp
.Dl find \&. -depth -print \&| cpio -oB >/dev/fmt/0m
.Pp
can be handled more efficiently by:
.Pp
.Dl find \&. -cpio /dev/rmt/0m
.Sh SEE ALSO
.Xr ar 1 ,
.Xr find 1 ,
.Xr ls 1 ,
.Xr cpio 4
.Sh HISTORY
The
.Nm cpio
command appeared in System V AT&T UNIX. This program is derived
from the System V AT&T sources which were contributed to the public
domain by AT&T.
.Sh BUGS
Path names are restricted to 128 characters. If there are
too many unique linked files, the program runs out of memory
to keep track of them and, thereafter, linking information
is lost. Only the super-user can copy special files. The
.Fl B
option does not work with certain magnetic tape drives.