Pax solaris 1 03 serial
Full Specifications. What's new in version 1. Release November 8, Date Added September 16, Version 1. Operating Systems. Total Downloads 29, Downloads Last Week 0. Report Software. Related Software. Sid Meier's Civilization V is the fifth offering in the multi-award winning Civilization turn-based PC strategy game series.
Play through two new scenarios - American civil war and scramble for Africa. Feature updates and fixes for the original Age of Empires II. User Reviews. Each value affects all subsequent files that do not override that value in their own extended header record and until another global extended header record is reached that provides another value for the same field.
The typeflag g global headers should not be used with interchange media that could suffer partial data loss in transporting the archive. The format of these extended header records is as described in pax Extended Header. For both of these types, the size field is the size of the extended header records in octets. The other fields in the header block are not meaningful to this version of pax.
However, if this archive is read by pax conforming to a previous version of ISO POSIX Standard, the header block fields are used to create a regular file that contains the extended header records as data.
Therefore, header block field values should be selected to provide reasonable file access to this regular file. A further difference from the ustar header block is that data blocks for files of typeflag 1 the digit one hard link might be included, which means that the size field can be greater than zero. Archives created by pax -o linkdata includes these data blocks with the hard links.
The values in an extended header add attributes to the specified file or files or override values in the specified header blocks, as indicated in the following list of keywords. See the description of the typeflag g header block. Keywords consisting entirely of lowercase letters, digits, and periods are reserved for future standardization.
A keyword does not include an equals sign. In the following list, the notation of file s or block s are used to acknowledge that a keyword affects the specified single file after a typeflag x extended header, but possibly multiple files after typeflag g. Any requirements in the list for pax to include a record when in write or copy mode applies only when such a record has not already been provided through the use of the -o option. When used in copy mode, pax behaves as if an archive had been created with applicable extended header records and then extracted.
The access time atime is restored if the process has the appropriate privi- lege required to do so. The format of the value is as described in pax Extended Header File Times. The entries in the following table are defined to refer to known standards; additional names can be agreed on between the originator and recipient.
When used in write or copy mode, it is implementation-defined whether pax includes a charset extended header record for a file. All characters in the value field are ignored by pax. This record overrides the gid field in the specified header blocks. When used in write or copy mode, pax includes a gid extended header record for each file whose group ID is greater than octal This record overrides the gid and gname fields in the specified header blocks, and any gid extended header record.
When used in read, copy, or list mode, pax translates the name from the UTF-8 encoding in the header record to the character set appropriate for the group database on the receiving system. When used in write or copy mode, pax includes a gname extended header record for each file whose group name cannot be represented entirely with the letters and digits of the portable character set. This record overrides the linkname field in the specified ustar header blocks.
The specified ustar header block determines the type of link created. If type- flag of the specified header block is 1, it is a hard link. If typeflag is 2, it is a symbolic link and the linkpath value is the contents of the symbolic link.
When used in write or copy mode, pax includes a linkpath extended header record for each link whose pathname cannot be represented entirely with the members of the porta- ble character set other than NULL. This record overrides the name and prefix fields in the specified header blocks. When used in write or copy mode, pax includes a path extended header record for each file whose pathname cannot be repre- sented entirely with the members of the portable character set other than NULL.
This record overrides the size field in the specified header blocks. When used in write or copy mode, pax includes a size extended header record for each file with a size value greater than octal This record overrides the uid field in the following header block s.
When used in write or copy mode, pax includes a uid extended header record for each file whose owner ID is greater than octal This record overrides the uid and uname fields in the specified header blocks, and any uid extended header record.
When used in read, copy, or list mode, pax translates the name from the UTF-8 encoding in the header record to the character set appropriate for the user database on the receiving system.
When used in write or copy mode, pax includes a uname extended header record for each file whose user name cannot be represented entirely with the letters and digits of the portable character set. If the value field is zero length, it deletes any header block field, previously entered extended header value, or global extended header value of the same name. If a keyword in an extended header record or in an -o option-argument overrides or deletes a corresponding field in the ustar header block, pax ignores the contents of that header block field.
Unlike the ustar header block fields, NULLs does not delimit values; all characters within the value field are considered data for the field. When pax is used in read or list modes, it determines a file attribute in the following sequence: 1. If there is a typeflag x extended header record, the affected attribute is assigned the value. When extended header records con- flict, the last one given in the header takes precedence. If there is a typeflag g global extended header record, the affected attribute is assigned the value.
When global extended header records conflict, the last one given in the global header takes precedence. Otherwise, the attribute is determined from the ustar header block. This can occur if the time is out of ustar range, or if the file system of the underlying implementation supports non-integer time granularities and the time is not an integer. All of these time records are formatted as a decimal representation of the time in seconds since the Epoch.
If a period. In read or copy mode, pax truncates the time of a file to the greatest value that is not greater than the input header file time. In write or copy mode, pax outputs a time exactly if it can be represented exactly as a decimal number, and otherwise generates only enough digits so that the same time is recovered if the file is extracted on a system whose underlying imple- mentation supports the same time granularity.
Each logical record is a fixed-size logical record of octets. Although this format can be thought of as being stored on 9-track industry-standard Each file archived is represented by a header logical record that describes the file, followed by zero or more logical records that give the contents of the file.
At the end of the archive file there are two octet logical records filled with binary zeros, interpreted as an end-of-archive indicator. Each group of log- ical records can be written with a single operation equivalent to the write 2 function. On magnetic tape, the result of this write is a single tape physical block.
The last physical block always is the full size, so logical records after the two zero logical records can con- tain undefined data. The header logical record is structured as shown in the following table. All lengths and offsets are in decimal. For maximum porta- bility between implementations, names should be selected from characters represented by the portable filename character set as octets with the most significant bit zero.
If an implementation supports the use of characters outside of slash and the portable filename character set in names for files, users, and groups, one or more implementation-defined encodings of these characters are provided for interchange pur- poses. If a file- name is found on the medium that would create an invalid filename, it is implementation-defined whether the data from the file is stored on the file hierarchy and under what name it is stored.
Each field within the header logical record is contiguous; that is, there is no padding used. Each field within the header logical record is contiguous. There is no padding used. Each character on the archive medium is stored con- tiguously. The fields magic, uname and gname are character strings, each of which is terminated by a NULL character. The fields name, linkname, and prefix are NULL-terminated character strings except when all characters in the array contain non-NULL characters including the last charac- ter.
The version field is two octets containing the characters 00 zero-zero The typeflag contains a single character. Each character on the archive medium is stored contiguously. The fields magic, uname, and gname are character strings each terminated by a NULL character.
The version field is two octets containing the characters 00 zero-zero. The typeflag contains a single character. Each numeric field is terminated by one or more spaces or NULL characters.
The name and the prefix fields produce the pathname of the file. A new pathname is formed, if prefix is not an empty string its first character is not NULL , by concatenating prefix up to the first NULL character , a slash character, and name; otherwise, name is used alone.
In either case, name is terminated at the first NULL character. If prefix begins with a NULL character, it is ignored. In this man- ner, pathnames of at most characters can be supported. If a pathname does not fit in the space provided, pax notifies the user of the error, and does not store any part of the file-header or data-on the medium. The linkname field does not use the prefix to produce a pathname. As such, a linkname is limited to characters.
If the name does not fit in the space provided, pax notifies the user of the error, and does not attempt to store the link on the medium. Process address space can be locked into memory made memory-resident on page boundaries and in integral multiples of pages. The size, in bytes, of the system unit of memory allocation, protection, and mapping.
On systems that have segment rather than page-based memory architectures, the term "page" means a segment. In the shell command language, an entity that stores values. There are three types of parameters: variables named parameters , positional parameters, and special parameters.
In the C language, an object declared as part of a function declaration or definition that acquires a value on entry to the function, or an identifier following the macro name in a function-like macro definition. When discussing a given directory, the directory that both contains a directory entry for the given directory and is represented by the pathname dot-dot in the given directory. When discussing other types of files, a directory containing a directory entry for the file under discussion.
An attribute of a new process identifying the parent of the process. The parent process ID of a process is the process ID of its creator, for the lifetime of the creator.
After the creator's lifetime has ended, the parent process ID is the process ID of an implementation-defined system process. A string that is used to identify a file. A sequence of characters used either with regular expression notation or for pathname expansion, as a means of selecting various character strings or pathnames, respectively. The character '.
The term "period" is contrasted with dot see also Dot , which is used to describe a specific directory entry. Attributes of an object that determine the privilege necessary to access or manipulate the object.
A mode for semaphores, shared memory, and message queues requiring that the object and its state including data, if any are preserved after the object is no longer referenced by any process. Persistence of an object does not imply that the state of the object is maintained across a system crash or a system reboot. A scheduling scheme whereby the local process periodically checks until the pre-specified events for example, read, write have occurred.
The collection of characters that are required to be present in all locales supported by conforming systems. This term is contrasted against the smaller portable filename character set; see also Portable Filename Character Set. A filename consisting only of characters from the portable filename character set. In the shell command language, a parameter denoted by a single digit or one or more digits in curly braces.
Preallocation does not imply that the resources are immediately allocated to that use, but merely indicates that they are guaranteed to be available in bounded time when needed. A running thread whose execution is suspended due to another thread becoming runnable at a higher priority. In the context of job control, the job that will be used as the default for the fg or bg utilities if the current job exits. A non-negative integer associated with processes or threads whose value is constrained to a range defined by the applicable scheduling policy.
Numerically higher values represent higher priorities. The only differentiation made by the STREAMS mechanism is between zero and non-zero bands, but specific protocol modules may differentiate between priority bands. A condition in which a thread that is not voluntarily suspended waiting for an event or time delay is not running while a lower priority thread is running. Such blocking of the higher priority thread is often caused by contention for a shared resource.
A performance and determinism improvement facility to allow applications to determine the order in which threads that are ready to run are granted access to processor resources. Scheduling in which the selection of a running thread is determined by the priorities of the runnable processes or threads. A live process see Live Process or a zombie process see Zombie Process. The lifetime of a process is described in Process Lifetime. A collection of processes that permits the signaling of related processes.
Each process in the system is a member of a process group that is identified by a process group ID. A newly created process joins the process group of its creator. The unique positive integer identifier representing a process group during its lifetime. The period of time that begins when a process group is created and ends when the last remaining process in the group leaves the group, due either to the end of the lifetime of the last process or to the last remaining process calling the setsid or setpgid functions.
The unique positive integer identifier representing a process during its lifetime. The period of time that begins when a process is created and ends when its process ID is returned to the system.
A performance improvement facility to bind application programs into the high-performance random access memory of a computer system. This avoids potential latencies introduced by the operating system in storing parts of a program that were not recently referenced on secondary memory devices.
Abnormal termination occurs when requested by the abort function or when some signals are received. A prepared sequence of instructions to the system to accomplish a defined task. A facility that provides an interface that is identical to the terminal subsystem, except where noted otherwise in POSIX.
A pseudo-terminal is composed of two devices: the "master device" and a "slave device". The slave device provides processes with an interface that is identical to the terminal interface, although there need not be hardware behind that interface.
Anything written on the master device is presented to the slave as an input and anything written on the slave device is presented as an input on the master side. A file system that has implementation-defined characteristics restricting modifications.
Multiple readers, single writer read-write locks allow many threads to have simultaneous read-only access to data while allowing only one thread to have write access at any given time. They are typically used to protect data that is read-only more frequently than it is changed.
Read-write locks can be used to synchronize threads in the current process and other processes if they are allocated in memory that is writable and shared among the cooperating processes and have been initialized for this behavior. The attribute of a process that, at the time of process creation, identifies the group of the user who created the process; see also Group ID. Time measured as total units elapsed by the system clock without regard to which thread is executing. A determinism improvement facility to enable asynchronous signal notifications to an application to be queued without impacting compatibility with the existing signal functions.
The attribute of a process that, at the time of process creation, identifies the user who created the process; see also User ID. In the shell command language, a method of associating files with the input or output of commands. In the shell command language, a token that performs a redirection function. A file that is a randomly accessible sequence of bytes, with no further structure imposed by the system.
A file holding code or data suitable for linking with other object files to create an executable or a shared object file. The process of connecting symbolic references with symbolic definitions. For example, when a program calls a function, the associated call instruction transfers control to the proper destination address at execution. A service that is either rejected or performed prior to a response from the service to the requester.
A thread currently executing on a processor. On multi-processor systems there may be more than one such thread in a system at a time. An attribute of a process that provides some flexibility in the handling of unrepresentable resource limits, as described in the exec family of functions and setrlimit.
An attribute of a process that allows some flexibility in the assignment of the effective group ID attribute, as described in the exec family of functions and setgid. An attribute of a process that allows some flexibility in the assignment of the effective user ID attribute, as described in the exec family of functions and setuid. The application of a policy to select a runnable process or thread to become a running process or thread, or to alter one or more of the thread lists.
A property of a thread that defines the set of threads against which that thread competes for resources. For example, in a scheduling decision, threads sharing scheduling contention scope compete for processor resources. A set of rules that is used to determine the order of execution of processes or threads to achieve some goal. A rectangular region of columns and lines on a terminal display.
A screen may be a portion of a physical display device or may occupy the entire physical area of the display device. To move the representation of data vertically or horizontally relative to the terminal screen. There are two types of scrolling:. A minimum synchronization primitive to serve as a basis for more complex synchronization mechanisms to be defined by the application program.
A collection of process groups established for job control purposes. Each process group is a member of a session. A process is considered to be a member of the session of which its process group is a member. A newly created process joins the session of its creator.
A process can alter its session membership; see setsid. There can be multiple process groups in the same session. The period between when a session is created and the end of the lifetime of all the process groups that remain as members of the session. An object that represents memory that can be mapped concurrently into the address space of more than one process.
A program that interprets sequences of text input as commands. A file containing shell commands. If the file is made executable, it can be executed by specifying its name as a simple command.
Execution of a shell script causes a shell to execute the commands within the script. Alternatively, a shell can be requested to execute the commands in a shell script by specifying the name of the shell script as the operand to the sh utility. A mechanism by which a process or thread may be notified of, or affected by, an event occurring in the system.
Examples of such events include hardware exceptions and specific actions by processes. The term signal is also used to refer to the event itself. Memory established for a thread, in which signal handlers catching signals sent to that thread are executed. If the process uses dlopen to load a multi-threaded library, the behavior is undefined. A file of a particular type that is used as a communications endpoint for process-to-process communication as described in the System Interfaces volume of POSIX.
An address associated with a socket or remote endpoint, including an address family identifier and addressing information specific to that address family. The address may include multiple parts, such as a network address associated with a host system and an identifier for a specific endpoint. A resource limitation established for each process that the process may set to any value less than or equal to the hard limit. When dealing with the Shell Command Language, input to the command language interpreter.
The term "shell script" is synonymous with this meaning. Source code also refers to the input statements prepared for the following standard utilities: awk , bc , ed , ex , lex , localedef , make , sed , and yacc. Source code can also refer to a collection of sources meeting any or all of these meanings.
A scheduling policy for threads and processes that reserves a certain amount of execution capacity for processing aperiodic events at a given priority level. Appearing in lowercase, a stream is a file access object that allows access to an ordered sequence of characters, as described by the ISO C standard.
A stream provides the additional services of user-selectable buffering and formatted input and output; see also STREAM. Appearing in uppercase, STREAM refers to a full-duplex connection between a process and an open device or pseudo-device.
A shell execution environment, distinguished from the main or current shell execution environment. For a write operation to a regular file, when the system ensures that all data written is readable on any subsequent open of the file even one that follows a system or power failure in the absence of a failure of the physical storage medium. For a read operation, when an image of the data on the physical storage medium is available to the requesting process.
An attribute of a process used in determining file access permissions. The supplementary group IDs of a process are set to the supplementary group IDs of the parent process when the process is created. A suspended job is a background job, but a background job is not necessarily a suspended job. It may be defined as another type of constant-e.
A type of file with the property that when the file is encountered during pathname resolution, a string stored by the file is used to modify the pathname resolution. A determinism and robustness improvement mechanism to enhance the data input and output mechanisms, so that an application can ensure that the data being manipulated is physically present on secondary mass storage devices. For read, when the operation has been completed or diagnosed if unsuccessful.
The read is complete only when an image of the data has been successfully transferred to the requesting process. If there were any pending write requests affecting the data to be read at the time that the synchronized read operation was requested, these write requests are successfully transferred prior to reading the data.
See the -x format option. The action to be taken depends on the presence of the -r and -w options. The four combinations of -r and -w are referred to as the four modes of operation: list, read, write, and copy modes, corresponding respectively to the four forms shown in the SYNOPSIS.
In list mode when neither -r nor -w are specified , pax writes the names of the members of the archive file read from the standard input, with path names matching the specified patterns, to standard output.
If a named file has extended attributes, the extended attributes are also listed. If a named file is of type directory, the file hierarchy rooted at that file will be written out as well. In read mode when -r is specified, but -w is not , pax extracts the members of the archive file read from the standard input, with path names matching the specified patterns.
If an extracted file is of type directory, the file hierarchy rooted at that file will be extracted as well. The extracted files is created relative to the current file hierarchy. The ownership, access and modification times, and file mode of the restored files are discussed under the -p option. In write mode when -w is specified, but -r is not , pax writes the contents of the file operands to the standard output in an archive format.
If no file operands are specified, a list of files to copy, one per line, will be read from the standard input. A file of type directory will include all of the files in the file hierarchy rooted at the file. In copy mode when both -r and -w are specified , pax copies the file operands to the destination directory. The effect of the copy is as if the copied files were written to an archive file and then subsequently extracted, except that there may be hard links between the original and the copied files.
If the destination directory is a subdirectory of one of the files to be copied, the results are unspecified. It is an error if directory does not exist, is not writable by the user, or is not a directory.
In read or copy modes, if intermediate directories are necessary to extract an archive member, pax will perform actions equivalent to the mkdir 2 function, called with the following arguments:. If any specified pattern or file operands are not matched by at least one file or archive member, pax will write a diagnostic message to standard error for each one that did not match and exit with a non-zero exit status. The supported archive formats are automatically detected on input. The default output archive format is tar 1.
If the selected archive format supports the specification of linked files, it is an error if these files cannot be linked when the archive is extracted. Any of the various names in the archive that represent a file can be used to select the file for extraction. Appends files to the end of the archive. Blocks the output at a positive decimal integer number of bytes per write to the archive file. Devices and archive formats may impose restrictions on blocking. Blocking is automatically determined on input.
Portable applications must not specify a blocksize value larger than Default blocking when creating archives depends on the archive format. See the -x option below.
Matches all file or archive members except those specified by the pattern or file operands.
0コメント