1994-05-26 06:18:55 +00:00
|
|
|
/*-
|
2017-11-20 19:49:47 +00:00
|
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
*
|
1994-05-26 06:18:55 +00:00
|
|
|
* Copyright (c) 1991, 1993, 1994
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
2017-02-28 23:42:47 +00:00
|
|
|
* 3. Neither the name of the University nor the names of its contributors
|
1994-05-26 06:18:55 +00:00
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef lint
|
1998-05-06 06:51:42 +00:00
|
|
|
#if 0
|
1998-05-13 07:25:17 +00:00
|
|
|
static char sccsid[] = "@(#)utils.c 8.3 (Berkeley) 4/1/94";
|
1998-05-06 06:51:42 +00:00
|
|
|
#endif
|
1994-05-26 06:18:55 +00:00
|
|
|
#endif /* not lint */
|
2002-06-30 05:13:54 +00:00
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
1994-05-26 06:18:55 +00:00
|
|
|
|
|
|
|
#include <sys/param.h>
|
2023-02-03 15:37:24 +00:00
|
|
|
#include <sys/acl.h>
|
1994-05-26 06:18:55 +00:00
|
|
|
#include <sys/stat.h>
|
|
|
|
|
|
|
|
#include <err.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <fts.h>
|
2001-05-16 19:10:40 +00:00
|
|
|
#include <limits.h>
|
1994-05-26 06:18:55 +00:00
|
|
|
#include <stdio.h>
|
2001-06-19 15:41:57 +00:00
|
|
|
#include <stdlib.h>
|
2000-01-23 03:04:49 +00:00
|
|
|
#include <sysexits.h>
|
1994-05-26 06:18:55 +00:00
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include "extern.h"
|
2006-10-07 12:11:21 +00:00
|
|
|
|
|
|
|
#define cp_pct(x, y) ((y == 0) ? 0 : (int)(100.0 * (x) / (y)))
|
1994-05-26 06:18:55 +00:00
|
|
|
|
2015-06-08 19:24:18 +00:00
|
|
|
/*
|
|
|
|
* Memory strategy threshold, in pages: if physmem is larger then this, use a
|
|
|
|
* large buffer.
|
|
|
|
*/
|
2008-10-30 14:05:57 +00:00
|
|
|
#define PHYSPAGES_THRESHOLD (32*1024)
|
|
|
|
|
2015-06-08 19:24:18 +00:00
|
|
|
/* Maximum buffer size in bytes - do not allow it to grow larger than this. */
|
2008-10-30 14:05:57 +00:00
|
|
|
#define BUFSIZE_MAX (2*1024*1024)
|
|
|
|
|
2015-06-08 19:24:18 +00:00
|
|
|
/*
|
|
|
|
* Small (default) buffer size in bytes. It's inefficient for this to be
|
|
|
|
* smaller than MAXPHYS.
|
|
|
|
*/
|
2008-10-30 14:05:57 +00:00
|
|
|
#define BUFSIZE_SMALL (MAXPHYS)
|
|
|
|
|
2021-01-03 00:58:43 +00:00
|
|
|
static ssize_t
|
cp: Simplify the common case.
* The allocated buffer is only used in the fallback case, so move it
there. The argument for passing it in from the caller was that if
malloc(3) were to fail, we'd want it to fail before we started
copying anything, but firstly, it was already not in the right place
to ensure that, and secondly, malloc(3) never fails (except in very
contrived circumstances, such as an unreasonable RLIMIT_AS or
RLIMIT_DATA).
* Remove the mmap(2) option. It is almost never beneficial,
especially when the alternative is copy_file_range(2), and it adds
needless complexity and indentation.
MFC after: 1 week
Sponsored by: Klara, Inc.
Reviewed by: rmacklem, mav
Differential Revision: https://reviews.freebsd.org/D38291
2023-02-01 20:06:28 +00:00
|
|
|
copy_fallback(int from_fd, int to_fd)
|
2020-09-11 20:49:36 +00:00
|
|
|
{
|
cp: Simplify the common case.
* The allocated buffer is only used in the fallback case, so move it
there. The argument for passing it in from the caller was that if
malloc(3) were to fail, we'd want it to fail before we started
copying anything, but firstly, it was already not in the right place
to ensure that, and secondly, malloc(3) never fails (except in very
contrived circumstances, such as an unreasonable RLIMIT_AS or
RLIMIT_DATA).
* Remove the mmap(2) option. It is almost never beneficial,
especially when the alternative is copy_file_range(2), and it adds
needless complexity and indentation.
MFC after: 1 week
Sponsored by: Klara, Inc.
Reviewed by: rmacklem, mav
Differential Revision: https://reviews.freebsd.org/D38291
2023-02-01 20:06:28 +00:00
|
|
|
static char *buf = NULL;
|
|
|
|
static size_t bufsize;
|
2021-01-03 00:58:43 +00:00
|
|
|
ssize_t rcount, wresid, wcount = 0;
|
2020-09-11 20:49:36 +00:00
|
|
|
char *bufp;
|
|
|
|
|
cp: Simplify the common case.
* The allocated buffer is only used in the fallback case, so move it
there. The argument for passing it in from the caller was that if
malloc(3) were to fail, we'd want it to fail before we started
copying anything, but firstly, it was already not in the right place
to ensure that, and secondly, malloc(3) never fails (except in very
contrived circumstances, such as an unreasonable RLIMIT_AS or
RLIMIT_DATA).
* Remove the mmap(2) option. It is almost never beneficial,
especially when the alternative is copy_file_range(2), and it adds
needless complexity and indentation.
MFC after: 1 week
Sponsored by: Klara, Inc.
Reviewed by: rmacklem, mav
Differential Revision: https://reviews.freebsd.org/D38291
2023-02-01 20:06:28 +00:00
|
|
|
if (buf == NULL) {
|
|
|
|
if (sysconf(_SC_PHYS_PAGES) > PHYSPAGES_THRESHOLD)
|
|
|
|
bufsize = MIN(BUFSIZE_MAX, MAXPHYS * 8);
|
|
|
|
else
|
|
|
|
bufsize = BUFSIZE_SMALL;
|
|
|
|
buf = malloc(bufsize);
|
|
|
|
if (buf == NULL)
|
|
|
|
err(1, "Not enough memory");
|
|
|
|
}
|
2020-09-11 20:49:36 +00:00
|
|
|
rcount = read(from_fd, buf, bufsize);
|
|
|
|
if (rcount <= 0)
|
|
|
|
return (rcount);
|
|
|
|
for (bufp = buf, wresid = rcount; ; bufp += wcount, wresid -= wcount) {
|
|
|
|
wcount = write(to_fd, bufp, wresid);
|
|
|
|
if (wcount <= 0)
|
|
|
|
break;
|
|
|
|
if (wcount >= (ssize_t)wresid)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return (wcount < 0 ? wcount : rcount);
|
|
|
|
}
|
|
|
|
|
1994-05-26 06:18:55 +00:00
|
|
|
int
|
2002-10-18 14:45:00 +00:00
|
|
|
copy_file(const FTSENT *entp, int dne)
|
1994-05-26 06:18:55 +00:00
|
|
|
{
|
2001-06-11 13:57:54 +00:00
|
|
|
struct stat *fs;
|
2022-08-30 14:51:21 +00:00
|
|
|
ssize_t wcount;
|
2006-10-06 08:30:33 +00:00
|
|
|
off_t wtotal;
|
2021-01-03 00:58:43 +00:00
|
|
|
int ch, checkch, from_fd, rval, to_fd;
|
2020-09-11 20:49:36 +00:00
|
|
|
int use_copy_file_range = 1;
|
1995-05-30 00:07:29 +00:00
|
|
|
|
2015-06-07 06:30:25 +00:00
|
|
|
from_fd = to_fd = -1;
|
|
|
|
if (!lflag && !sflag &&
|
|
|
|
(from_fd = open(entp->fts_path, O_RDONLY, 0)) == -1) {
|
1994-05-26 06:18:55 +00:00
|
|
|
warn("%s", entp->fts_path);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
fs = entp->fts_statp;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the file exists and we're interactive, verify with the user.
|
|
|
|
* If the file DNE, set the mode to be the from file, minus setuid
|
|
|
|
* bits, modified by the umask; arguably wrong, but it makes copying
|
|
|
|
* executables work right and it's been that way forever. (The
|
|
|
|
* other choice is 666 or'ed with the execute bits on the from file
|
|
|
|
* modified by the umask.)
|
|
|
|
*/
|
|
|
|
if (!dne) {
|
1997-10-03 18:11:14 +00:00
|
|
|
#define YESNO "(y/n [n]) "
|
2002-07-23 00:42:56 +00:00
|
|
|
if (nflag) {
|
|
|
|
if (vflag)
|
|
|
|
printf("%s not overwritten\n", to.p_path);
|
2015-06-07 06:30:25 +00:00
|
|
|
rval = 1;
|
|
|
|
goto done;
|
2002-07-23 00:42:56 +00:00
|
|
|
} else if (iflag) {
|
1997-10-03 18:11:14 +00:00
|
|
|
(void)fprintf(stderr, "overwrite %s? %s",
|
2015-06-08 19:24:18 +00:00
|
|
|
to.p_path, YESNO);
|
1994-05-26 06:18:55 +00:00
|
|
|
checkch = ch = getchar();
|
|
|
|
while (ch != '\n' && ch != EOF)
|
|
|
|
ch = getchar();
|
1996-03-08 06:58:08 +00:00
|
|
|
if (checkch != 'y' && checkch != 'Y') {
|
1997-10-03 18:11:14 +00:00
|
|
|
(void)fprintf(stderr, "not overwritten\n");
|
2015-06-07 06:30:25 +00:00
|
|
|
rval = 1;
|
|
|
|
goto done;
|
1994-05-26 06:18:55 +00:00
|
|
|
}
|
|
|
|
}
|
2015-06-08 19:24:18 +00:00
|
|
|
|
1996-03-08 06:58:08 +00:00
|
|
|
if (fflag) {
|
2015-06-08 19:24:18 +00:00
|
|
|
/*
|
|
|
|
* Remove existing destination file name create a new
|
|
|
|
* file.
|
|
|
|
*/
|
|
|
|
(void)unlink(to.p_path);
|
|
|
|
if (!lflag && !sflag) {
|
|
|
|
to_fd = open(to.p_path,
|
|
|
|
O_WRONLY | O_TRUNC | O_CREAT,
|
|
|
|
fs->st_mode & ~(S_ISUID | S_ISGID));
|
|
|
|
}
|
2015-06-07 06:30:25 +00:00
|
|
|
} else if (!lflag && !sflag) {
|
2015-06-08 19:24:18 +00:00
|
|
|
/* Overwrite existing destination file name. */
|
2015-06-07 03:49:41 +00:00
|
|
|
to_fd = open(to.p_path, O_WRONLY | O_TRUNC, 0);
|
2006-08-24 20:45:38 +00:00
|
|
|
}
|
2015-06-07 06:30:25 +00:00
|
|
|
} else if (!lflag && !sflag) {
|
2015-06-07 03:49:41 +00:00
|
|
|
to_fd = open(to.p_path, O_WRONLY | O_TRUNC | O_CREAT,
|
|
|
|
fs->st_mode & ~(S_ISUID | S_ISGID));
|
2006-08-24 20:45:38 +00:00
|
|
|
}
|
2015-06-08 19:24:18 +00:00
|
|
|
|
2015-06-07 06:30:25 +00:00
|
|
|
if (!lflag && !sflag && to_fd == -1) {
|
1994-05-26 06:18:55 +00:00
|
|
|
warn("%s", to.p_path);
|
2015-06-07 06:30:25 +00:00
|
|
|
rval = 1;
|
|
|
|
goto done;
|
1994-05-26 06:18:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
rval = 0;
|
|
|
|
|
2015-06-07 06:30:25 +00:00
|
|
|
if (!lflag && !sflag) {
|
cp: Simplify the common case.
* The allocated buffer is only used in the fallback case, so move it
there. The argument for passing it in from the caller was that if
malloc(3) were to fail, we'd want it to fail before we started
copying anything, but firstly, it was already not in the right place
to ensure that, and secondly, malloc(3) never fails (except in very
contrived circumstances, such as an unreasonable RLIMIT_AS or
RLIMIT_DATA).
* Remove the mmap(2) option. It is almost never beneficial,
especially when the alternative is copy_file_range(2), and it adds
needless complexity and indentation.
MFC after: 1 week
Sponsored by: Klara, Inc.
Reviewed by: rmacklem, mav
Differential Revision: https://reviews.freebsd.org/D38291
2023-02-01 20:06:28 +00:00
|
|
|
wtotal = 0;
|
|
|
|
do {
|
|
|
|
if (use_copy_file_range) {
|
|
|
|
wcount = copy_file_range(from_fd, NULL,
|
|
|
|
to_fd, NULL, SSIZE_MAX, 0);
|
|
|
|
if (wcount < 0 && errno == EINVAL) {
|
|
|
|
/* Prob a non-seekable FD */
|
|
|
|
use_copy_file_range = 0;
|
2008-10-27 15:21:15 +00:00
|
|
|
}
|
|
|
|
}
|
cp: Simplify the common case.
* The allocated buffer is only used in the fallback case, so move it
there. The argument for passing it in from the caller was that if
malloc(3) were to fail, we'd want it to fail before we started
copying anything, but firstly, it was already not in the right place
to ensure that, and secondly, malloc(3) never fails (except in very
contrived circumstances, such as an unreasonable RLIMIT_AS or
RLIMIT_DATA).
* Remove the mmap(2) option. It is almost never beneficial,
especially when the alternative is copy_file_range(2), and it adds
needless complexity and indentation.
MFC after: 1 week
Sponsored by: Klara, Inc.
Reviewed by: rmacklem, mav
Differential Revision: https://reviews.freebsd.org/D38291
2023-02-01 20:06:28 +00:00
|
|
|
if (!use_copy_file_range) {
|
|
|
|
wcount = copy_fallback(from_fd, to_fd);
|
2008-10-27 15:21:15 +00:00
|
|
|
}
|
cp: Simplify the common case.
* The allocated buffer is only used in the fallback case, so move it
there. The argument for passing it in from the caller was that if
malloc(3) were to fail, we'd want it to fail before we started
copying anything, but firstly, it was already not in the right place
to ensure that, and secondly, malloc(3) never fails (except in very
contrived circumstances, such as an unreasonable RLIMIT_AS or
RLIMIT_DATA).
* Remove the mmap(2) option. It is almost never beneficial,
especially when the alternative is copy_file_range(2), and it adds
needless complexity and indentation.
MFC after: 1 week
Sponsored by: Klara, Inc.
Reviewed by: rmacklem, mav
Differential Revision: https://reviews.freebsd.org/D38291
2023-02-01 20:06:28 +00:00
|
|
|
wtotal += wcount;
|
|
|
|
if (info) {
|
|
|
|
info = 0;
|
|
|
|
(void)fprintf(stderr,
|
|
|
|
"%s -> %s %3d%%\n",
|
|
|
|
entp->fts_path, to.p_path,
|
|
|
|
cp_pct(wtotal, fs->st_size));
|
1994-05-26 06:18:55 +00:00
|
|
|
}
|
cp: Simplify the common case.
* The allocated buffer is only used in the fallback case, so move it
there. The argument for passing it in from the caller was that if
malloc(3) were to fail, we'd want it to fail before we started
copying anything, but firstly, it was already not in the right place
to ensure that, and secondly, malloc(3) never fails (except in very
contrived circumstances, such as an unreasonable RLIMIT_AS or
RLIMIT_DATA).
* Remove the mmap(2) option. It is almost never beneficial,
especially when the alternative is copy_file_range(2), and it adds
needless complexity and indentation.
MFC after: 1 week
Sponsored by: Klara, Inc.
Reviewed by: rmacklem, mav
Differential Revision: https://reviews.freebsd.org/D38291
2023-02-01 20:06:28 +00:00
|
|
|
} while (wcount > 0);
|
|
|
|
if (wcount < 0) {
|
|
|
|
warn("%s", entp->fts_path);
|
|
|
|
rval = 1;
|
1994-05-26 06:18:55 +00:00
|
|
|
}
|
2015-06-07 06:30:25 +00:00
|
|
|
} else if (lflag) {
|
2006-08-24 20:45:38 +00:00
|
|
|
if (link(entp->fts_path, to.p_path)) {
|
|
|
|
warn("%s", to.p_path);
|
1994-05-26 06:18:55 +00:00
|
|
|
rval = 1;
|
|
|
|
}
|
2015-06-07 06:30:25 +00:00
|
|
|
} else if (sflag) {
|
|
|
|
if (symlink(entp->fts_path, to.p_path)) {
|
|
|
|
warn("%s", to.p_path);
|
|
|
|
rval = 1;
|
|
|
|
}
|
1994-05-26 06:18:55 +00:00
|
|
|
}
|
2015-06-08 19:24:18 +00:00
|
|
|
|
1995-06-14 05:41:27 +00:00
|
|
|
/*
|
|
|
|
* Don't remove the target even after an error. The target might
|
|
|
|
* not be a regular file, or its attributes might be important,
|
1999-05-08 10:22:15 +00:00
|
|
|
* or its contents might be irreplaceable. It would only be safe
|
1995-06-14 05:41:27 +00:00
|
|
|
* to remove it if we created it and its length is 0.
|
|
|
|
*/
|
1994-05-26 06:18:55 +00:00
|
|
|
|
2015-06-07 06:30:25 +00:00
|
|
|
if (!lflag && !sflag) {
|
2006-08-24 20:45:38 +00:00
|
|
|
if (pflag && setfile(fs, to_fd))
|
|
|
|
rval = 1;
|
|
|
|
if (pflag && preserve_fd_acls(from_fd, to_fd) != 0)
|
|
|
|
rval = 1;
|
|
|
|
if (close(to_fd)) {
|
|
|
|
warn("%s", to.p_path);
|
|
|
|
rval = 1;
|
|
|
|
}
|
1994-05-26 06:18:55 +00:00
|
|
|
}
|
2008-08-07 07:29:26 +00:00
|
|
|
|
2015-06-07 06:30:25 +00:00
|
|
|
done:
|
|
|
|
if (from_fd != -1)
|
|
|
|
(void)close(from_fd);
|
1994-05-26 06:18:55 +00:00
|
|
|
return (rval);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2002-10-18 14:45:00 +00:00
|
|
|
copy_link(const FTSENT *p, int exists)
|
1994-05-26 06:18:55 +00:00
|
|
|
{
|
2023-02-03 15:37:24 +00:00
|
|
|
ssize_t len;
|
2002-02-22 21:24:14 +00:00
|
|
|
char llink[PATH_MAX];
|
1994-05-26 06:18:55 +00:00
|
|
|
|
2013-01-27 05:59:28 +00:00
|
|
|
if (exists && nflag) {
|
|
|
|
if (vflag)
|
|
|
|
printf("%s not overwritten\n", to.p_path);
|
|
|
|
return (1);
|
|
|
|
}
|
2002-02-22 21:24:14 +00:00
|
|
|
if ((len = readlink(p->fts_path, llink, sizeof(llink) - 1)) == -1) {
|
1994-05-26 06:18:55 +00:00
|
|
|
warn("readlink: %s", p->fts_path);
|
|
|
|
return (1);
|
|
|
|
}
|
2002-02-22 21:24:14 +00:00
|
|
|
llink[len] = '\0';
|
1994-05-26 06:18:55 +00:00
|
|
|
if (exists && unlink(to.p_path)) {
|
|
|
|
warn("unlink: %s", to.p_path);
|
|
|
|
return (1);
|
|
|
|
}
|
2002-02-22 21:24:14 +00:00
|
|
|
if (symlink(llink, to.p_path)) {
|
|
|
|
warn("symlink: %s", llink);
|
1994-05-26 06:18:55 +00:00
|
|
|
return (1);
|
|
|
|
}
|
2003-06-22 07:02:17 +00:00
|
|
|
return (pflag ? setfile(p->fts_statp, -1) : 0);
|
1994-05-26 06:18:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2002-02-02 06:15:22 +00:00
|
|
|
copy_fifo(struct stat *from_stat, int exists)
|
1994-05-26 06:18:55 +00:00
|
|
|
{
|
2013-01-27 05:59:28 +00:00
|
|
|
|
|
|
|
if (exists && nflag) {
|
|
|
|
if (vflag)
|
|
|
|
printf("%s not overwritten\n", to.p_path);
|
|
|
|
return (1);
|
|
|
|
}
|
1994-05-26 06:18:55 +00:00
|
|
|
if (exists && unlink(to.p_path)) {
|
|
|
|
warn("unlink: %s", to.p_path);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
if (mkfifo(to.p_path, from_stat->st_mode)) {
|
|
|
|
warn("mkfifo: %s", to.p_path);
|
|
|
|
return (1);
|
|
|
|
}
|
2003-06-22 07:02:17 +00:00
|
|
|
return (pflag ? setfile(from_stat, -1) : 0);
|
1994-05-26 06:18:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2002-02-02 06:15:22 +00:00
|
|
|
copy_special(struct stat *from_stat, int exists)
|
1994-05-26 06:18:55 +00:00
|
|
|
{
|
2013-01-27 05:59:28 +00:00
|
|
|
|
|
|
|
if (exists && nflag) {
|
|
|
|
if (vflag)
|
|
|
|
printf("%s not overwritten\n", to.p_path);
|
|
|
|
return (1);
|
|
|
|
}
|
1994-05-26 06:18:55 +00:00
|
|
|
if (exists && unlink(to.p_path)) {
|
|
|
|
warn("unlink: %s", to.p_path);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
if (mknod(to.p_path, from_stat->st_mode, from_stat->st_rdev)) {
|
|
|
|
warn("mknod: %s", to.p_path);
|
|
|
|
return (1);
|
|
|
|
}
|
2003-06-22 07:02:17 +00:00
|
|
|
return (pflag ? setfile(from_stat, -1) : 0);
|
1994-05-26 06:18:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2002-02-02 06:15:22 +00:00
|
|
|
setfile(struct stat *fs, int fd)
|
1994-05-26 06:18:55 +00:00
|
|
|
{
|
2015-01-24 13:50:13 +00:00
|
|
|
static struct timespec tspec[2];
|
1998-06-10 06:29:23 +00:00
|
|
|
struct stat ts;
|
2003-06-22 07:02:17 +00:00
|
|
|
int rval, gotstat, islink, fdval;
|
1994-05-26 06:18:55 +00:00
|
|
|
|
|
|
|
rval = 0;
|
2003-06-22 07:02:17 +00:00
|
|
|
fdval = fd != -1;
|
|
|
|
islink = !fdval && S_ISLNK(fs->st_mode);
|
1995-10-03 12:55:01 +00:00
|
|
|
fs->st_mode &= S_ISUID | S_ISGID | S_ISVTX |
|
2015-06-08 19:24:18 +00:00
|
|
|
S_IRWXU | S_IRWXG | S_IRWXO;
|
1994-05-26 06:18:55 +00:00
|
|
|
|
2015-01-24 13:50:13 +00:00
|
|
|
tspec[0] = fs->st_atim;
|
|
|
|
tspec[1] = fs->st_mtim;
|
2015-03-23 17:35:05 +00:00
|
|
|
if (fdval ? futimens(fd, tspec) : utimensat(AT_FDCWD, to.p_path, tspec,
|
2015-01-24 13:50:13 +00:00
|
|
|
islink ? AT_SYMLINK_NOFOLLOW : 0)) {
|
|
|
|
warn("utimensat: %s", to.p_path);
|
1994-05-26 06:18:55 +00:00
|
|
|
rval = 1;
|
|
|
|
}
|
2003-06-22 07:02:17 +00:00
|
|
|
if (fdval ? fstat(fd, &ts) :
|
|
|
|
(islink ? lstat(to.p_path, &ts) : stat(to.p_path, &ts)))
|
1998-06-10 06:29:23 +00:00
|
|
|
gotstat = 0;
|
|
|
|
else {
|
|
|
|
gotstat = 1;
|
|
|
|
ts.st_mode &= S_ISUID | S_ISGID | S_ISVTX |
|
2015-06-08 19:24:18 +00:00
|
|
|
S_IRWXU | S_IRWXG | S_IRWXO;
|
1998-06-10 06:29:23 +00:00
|
|
|
}
|
1994-05-26 06:18:55 +00:00
|
|
|
/*
|
|
|
|
* Changing the ownership probably won't succeed, unless we're root
|
|
|
|
* or POSIX_CHOWN_RESTRICTED is not set. Set uid/gid before setting
|
|
|
|
* the mode; current BSD behavior is to remove all setuid bits on
|
|
|
|
* chown. If chown fails, lose setuid/setgid bits.
|
|
|
|
*/
|
1998-06-10 06:29:23 +00:00
|
|
|
if (!gotstat || fs->st_uid != ts.st_uid || fs->st_gid != ts.st_gid)
|
2003-06-22 07:02:17 +00:00
|
|
|
if (fdval ? fchown(fd, fs->st_uid, fs->st_gid) :
|
|
|
|
(islink ? lchown(to.p_path, fs->st_uid, fs->st_gid) :
|
|
|
|
chown(to.p_path, fs->st_uid, fs->st_gid))) {
|
1998-06-10 06:29:23 +00:00
|
|
|
if (errno != EPERM) {
|
|
|
|
warn("chown: %s", to.p_path);
|
|
|
|
rval = 1;
|
|
|
|
}
|
|
|
|
fs->st_mode &= ~(S_ISUID | S_ISGID);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!gotstat || fs->st_mode != ts.st_mode)
|
2003-06-22 07:02:17 +00:00
|
|
|
if (fdval ? fchmod(fd, fs->st_mode) :
|
|
|
|
(islink ? lchmod(to.p_path, fs->st_mode) :
|
|
|
|
chmod(to.p_path, fs->st_mode))) {
|
2001-12-11 13:14:15 +00:00
|
|
|
warn("chmod: %s", to.p_path);
|
1994-05-26 06:18:55 +00:00
|
|
|
rval = 1;
|
|
|
|
}
|
|
|
|
|
1998-06-10 06:29:23 +00:00
|
|
|
if (!gotstat || fs->st_flags != ts.st_flags)
|
2003-06-22 07:02:17 +00:00
|
|
|
if (fdval ?
|
|
|
|
fchflags(fd, fs->st_flags) :
|
2009-05-30 10:36:14 +00:00
|
|
|
(islink ? lchflags(to.p_path, fs->st_flags) :
|
2003-06-22 07:02:17 +00:00
|
|
|
chflags(to.p_path, fs->st_flags))) {
|
1998-06-10 06:29:23 +00:00
|
|
|
warn("chflags: %s", to.p_path);
|
|
|
|
rval = 1;
|
|
|
|
}
|
|
|
|
|
1994-05-26 06:18:55 +00:00
|
|
|
return (rval);
|
|
|
|
}
|
|
|
|
|
2005-09-05 04:36:08 +00:00
|
|
|
int
|
|
|
|
preserve_fd_acls(int source_fd, int dest_fd)
|
|
|
|
{
|
|
|
|
acl_t acl;
|
2009-09-02 08:08:57 +00:00
|
|
|
acl_type_t acl_type;
|
|
|
|
int acl_supported = 0, ret, trivial;
|
|
|
|
|
|
|
|
ret = fpathconf(source_fd, _PC_ACL_NFS4);
|
|
|
|
if (ret > 0 ) {
|
|
|
|
acl_supported = 1;
|
|
|
|
acl_type = ACL_TYPE_NFS4;
|
|
|
|
} else if (ret < 0 && errno != EINVAL) {
|
|
|
|
warn("fpathconf(..., _PC_ACL_NFS4) failed for %s", to.p_path);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
if (acl_supported == 0) {
|
|
|
|
ret = fpathconf(source_fd, _PC_ACL_EXTENDED);
|
|
|
|
if (ret > 0 ) {
|
|
|
|
acl_supported = 1;
|
|
|
|
acl_type = ACL_TYPE_ACCESS;
|
|
|
|
} else if (ret < 0 && errno != EINVAL) {
|
|
|
|
warn("fpathconf(..., _PC_ACL_EXTENDED) failed for %s",
|
|
|
|
to.p_path);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (acl_supported == 0)
|
2005-09-05 04:36:08 +00:00
|
|
|
return (0);
|
2009-09-02 08:08:57 +00:00
|
|
|
|
|
|
|
acl = acl_get_fd_np(source_fd, acl_type);
|
2005-09-05 04:36:08 +00:00
|
|
|
if (acl == NULL) {
|
|
|
|
warn("failed to get acl entries while setting %s", to.p_path);
|
|
|
|
return (1);
|
|
|
|
}
|
2009-09-02 08:08:57 +00:00
|
|
|
if (acl_is_trivial_np(acl, &trivial)) {
|
|
|
|
warn("acl_is_trivial() failed for %s", to.p_path);
|
|
|
|
acl_free(acl);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
if (trivial) {
|
|
|
|
acl_free(acl);
|
2005-09-05 04:36:08 +00:00
|
|
|
return (0);
|
2009-09-02 08:08:57 +00:00
|
|
|
}
|
|
|
|
if (acl_set_fd_np(dest_fd, acl, acl_type) < 0) {
|
2005-09-05 04:36:08 +00:00
|
|
|
warn("failed to set acl entries for %s", to.p_path);
|
2009-09-02 08:08:57 +00:00
|
|
|
acl_free(acl);
|
2005-09-05 04:36:08 +00:00
|
|
|
return (1);
|
|
|
|
}
|
2009-09-02 08:08:57 +00:00
|
|
|
acl_free(acl);
|
2005-09-05 04:36:08 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
preserve_dir_acls(struct stat *fs, char *source_dir, char *dest_dir)
|
|
|
|
{
|
|
|
|
acl_t (*aclgetf)(const char *, acl_type_t);
|
|
|
|
int (*aclsetf)(const char *, acl_type_t, acl_t);
|
|
|
|
struct acl *aclp;
|
|
|
|
acl_t acl;
|
2009-09-02 08:08:57 +00:00
|
|
|
acl_type_t acl_type;
|
|
|
|
int acl_supported = 0, ret, trivial;
|
|
|
|
|
|
|
|
ret = pathconf(source_dir, _PC_ACL_NFS4);
|
|
|
|
if (ret > 0) {
|
|
|
|
acl_supported = 1;
|
|
|
|
acl_type = ACL_TYPE_NFS4;
|
|
|
|
} else if (ret < 0 && errno != EINVAL) {
|
|
|
|
warn("fpathconf(..., _PC_ACL_NFS4) failed for %s", source_dir);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
if (acl_supported == 0) {
|
|
|
|
ret = pathconf(source_dir, _PC_ACL_EXTENDED);
|
|
|
|
if (ret > 0) {
|
|
|
|
acl_supported = 1;
|
|
|
|
acl_type = ACL_TYPE_ACCESS;
|
|
|
|
} else if (ret < 0 && errno != EINVAL) {
|
|
|
|
warn("fpathconf(..., _PC_ACL_EXTENDED) failed for %s",
|
|
|
|
source_dir);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (acl_supported == 0)
|
2005-09-05 04:36:08 +00:00
|
|
|
return (0);
|
2009-09-02 08:08:57 +00:00
|
|
|
|
2005-09-05 04:36:08 +00:00
|
|
|
/*
|
2015-06-08 19:24:18 +00:00
|
|
|
* If the file is a link we will not follow it.
|
2005-09-05 04:36:08 +00:00
|
|
|
*/
|
|
|
|
if (S_ISLNK(fs->st_mode)) {
|
|
|
|
aclgetf = acl_get_link_np;
|
|
|
|
aclsetf = acl_set_link_np;
|
|
|
|
} else {
|
|
|
|
aclgetf = acl_get_file;
|
|
|
|
aclsetf = acl_set_file;
|
|
|
|
}
|
2009-09-02 08:08:57 +00:00
|
|
|
if (acl_type == ACL_TYPE_ACCESS) {
|
|
|
|
/*
|
|
|
|
* Even if there is no ACL_TYPE_DEFAULT entry here, a zero
|
|
|
|
* size ACL will be returned. So it is not safe to simply
|
|
|
|
* check the pointer to see if the default ACL is present.
|
|
|
|
*/
|
|
|
|
acl = aclgetf(source_dir, ACL_TYPE_DEFAULT);
|
|
|
|
if (acl == NULL) {
|
|
|
|
warn("failed to get default acl entries on %s",
|
|
|
|
source_dir);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
aclp = &acl->ats_acl;
|
|
|
|
if (aclp->acl_cnt != 0 && aclsetf(dest_dir,
|
|
|
|
ACL_TYPE_DEFAULT, acl) < 0) {
|
|
|
|
warn("failed to set default acl entries on %s",
|
|
|
|
dest_dir);
|
|
|
|
acl_free(acl);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
acl_free(acl);
|
|
|
|
}
|
|
|
|
acl = aclgetf(source_dir, acl_type);
|
2005-09-05 04:36:08 +00:00
|
|
|
if (acl == NULL) {
|
2009-09-02 08:08:57 +00:00
|
|
|
warn("failed to get acl entries on %s", source_dir);
|
2005-09-05 04:36:08 +00:00
|
|
|
return (1);
|
|
|
|
}
|
2009-09-02 08:08:57 +00:00
|
|
|
if (acl_is_trivial_np(acl, &trivial)) {
|
|
|
|
warn("acl_is_trivial() failed on %s", source_dir);
|
|
|
|
acl_free(acl);
|
2005-09-05 04:36:08 +00:00
|
|
|
return (1);
|
|
|
|
}
|
2009-09-02 08:08:57 +00:00
|
|
|
if (trivial) {
|
|
|
|
acl_free(acl);
|
|
|
|
return (0);
|
2005-09-05 04:36:08 +00:00
|
|
|
}
|
2009-09-02 08:08:57 +00:00
|
|
|
if (aclsetf(dest_dir, acl_type, acl) < 0) {
|
2005-09-05 04:36:08 +00:00
|
|
|
warn("failed to set acl entries on %s", dest_dir);
|
2009-09-02 08:08:57 +00:00
|
|
|
acl_free(acl);
|
2005-09-05 04:36:08 +00:00
|
|
|
return (1);
|
|
|
|
}
|
2009-09-02 08:08:57 +00:00
|
|
|
acl_free(acl);
|
2005-09-05 04:36:08 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
1994-05-26 06:18:55 +00:00
|
|
|
void
|
2002-02-02 06:15:22 +00:00
|
|
|
usage(void)
|
1994-05-26 06:18:55 +00:00
|
|
|
{
|
1999-08-29 07:58:19 +00:00
|
|
|
|
1994-05-26 06:18:55 +00:00
|
|
|
(void)fprintf(stderr, "%s\n%s\n",
|
2015-06-08 19:24:18 +00:00
|
|
|
"usage: cp [-R [-H | -L | -P]] [-f | -i | -n] [-alpsvx] "
|
|
|
|
"source_file target_file",
|
|
|
|
" cp [-R [-H | -L | -P]] [-f | -i | -n] [-alpsvx] "
|
|
|
|
"source_file ... "
|
|
|
|
"target_directory");
|
2000-01-23 03:04:49 +00:00
|
|
|
exit(EX_USAGE);
|
1994-05-26 06:18:55 +00:00
|
|
|
}
|