/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License (the "License"). * You may not use this file except in compliance with the License. * * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE * or http://www.opensolaris.org/os/licensing. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at usr/src/OPENSOLARIS.LICENSE. * If applicable, add the following below this CDDL HEADER, with the * fields enclosed by brackets "[]" replaced with your own identifying * information: Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END */ /* * Copyright 2013 Nexenta Systems, Inc. All rights reserved. */ /* * Copyright 2009 Sun Microsystems, Inc. All rights reserved. * Use is subject to license terms. */ /* Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T */ /* All Rights Reserved */ /* * Copyright (c) 2018, Joyent, Inc. * Copyright 2024 Oxide Computer Company */ /* * University Copyright- Copyright (c) 1982, 1986, 1988 * The Regents of the University of California * All Rights Reserved * * University Acknowledgment- Portions of this document are derived from * software developed by the University of California, Berkeley, and its * contributors. */ /* * Combined mv/cp/ln command: * mv file1 file2 * mv dir1 dir2 * mv file1 ... filen dir1 */ #include #include #include #include #include #include #include #include #include "getresponse.h" #define FTYPE(A) (A.st_mode) #define FMODE(A) (A.st_mode) #define UID(A) (A.st_uid) #define GID(A) (A.st_gid) #define IDENTICAL(A, B) (A.st_dev == B.st_dev && A.st_ino == B.st_ino) #define ISDIR(A) ((A.st_mode & S_IFMT) == S_IFDIR) #define ISDOOR(A) ((A.st_mode & S_IFMT) == S_IFDOOR) #define ISLNK(A) ((A.st_mode & S_IFMT) == S_IFLNK) #define ISREG(A) (((A).st_mode & S_IFMT) == S_IFREG) #define ISDEV(A) ((A.st_mode & S_IFMT) == S_IFCHR || \ (A.st_mode & S_IFMT) == S_IFBLK || \ (A.st_mode & S_IFMT) == S_IFIFO) #define ISSOCK(A) ((A.st_mode & S_IFMT) == S_IFSOCK) #define DELIM '/' #define EQ(x, y) (strcmp(x, y) == 0) #define FALSE 0 #define MODEBITS (S_ISUID|S_ISGID|S_ISVTX|S_IRWXU|S_IRWXG|S_IRWXO) #define TRUE 1 typedef enum { /* * Indicates that after checking the file we should proceed with the * action. */ CHK_CONT, /* * Indicates that after checking the file we encountered an error that * should be percolated up. */ CHK_ERROR, /* * Indicate that the user opted to skip this file. No action should be * taken and this should be treated as successful. */ CHK_SKIP } chkfiles_t; static chkfiles_t chkfiles(const char *, char **); static const char *dname(const char *); static int lnkfil(const char *, char *); static int cpymve(const char *, char *); static int rcopy(const char *, char *); static int chk_different(const char *, const char *); static int chg_time(const char *, struct stat); static int chg_mode(const char *, uid_t, gid_t, mode_t); static int copydir(const char *, char *); static int copyspecial(const char *); static int getrealpath(const char *, char *); static void usage(void); static void Perror(const char *); static void Perror2(const char *, const char *); static int use_stdin(void); static int copyattributes(const char *, const char *); static int copy_sysattr(const char *, const char *); static tree_node_t *create_tnode(dev_t, ino_t); static struct stat s1, s2, s3, s4; static int cpy = FALSE; static int mve = FALSE; static int lnk = FALSE; static char *cmd; static int fflg = 0; static int pflg = 0; static int Rflg = 0; /* recursive copy */ static int rflg = 0; /* recursive copy */ static int sflg = 0; static int Hflg = 0; /* follow cmd line arg symlink to dir */ static int Lflg = 0; /* follow symlinks */ static int Pflg = 0; /* do not follow symlinks */ static int atflg = 0; static int attrsilent = 0; static int targetexists = 0; static int cmdarg; /* command line argument */ static avl_tree_t *stree = NULL; /* source file inode search tree */ static acl_t *s1acl; static int saflg = 0; /* 'cp' extended system attr. */ static int srcfd = -1; static int targfd = -1; static int sourcedirfd = -1; static int targetdirfd = -1; static DIR *srcdirp = NULL; static int srcattrfd = -1; static int targattrfd = -1; static struct stat attrdir; /* * cp, mv, and ln all have behaviors around what happens when a file already * exists at the target. These behaviors depend on a combination of the program, * the options specified, and the permissions of the target file. * * 1) Explicitly remove any target file * 2) Always ask the user * 3) Take no action and treat as successful * 4) Take no action and treat as a failure * 5) Replace the target file if permissions align, otherwise fail * 6) Replace the target file if permissions align, otherwise prompt if stdin * is a tty * * The default action varies based on the program. cp defaults to (5), mv to * (6), and ln to (4). There are three flags that depending on the program * will change the behavior that is taken: -f, -i, and -n. Of these only -i has * the same meaning across all three programs. In this context, we treat these * flags as: * * -f: take action (1) * -i: take action (2) * -n: take action (3) * * The following table shows which programs honor which of these flags: * * CP LN MV * -f N Y Y * -i Y Y Y * -n Y Y N * * Any case where you see a 'N' above means the program has a different meaning * for the flag. These four actions are summarized in the following enumeration. * * The last wrinkle with these is how they are processed on the command line. In * general, we treat these as the last one wins. That is, if you specified -i -n * then we would use the -n behavior. The only wrinkle for this is with mv. The * non-POSIX form of mv any -f trump all -i options, but the xpg4 behavior was * the last one wins. In this case -n takes the last one wins behavior with mv * to try to make it as similar to everything else as we can. */ typedef enum { /* * Take the program's default behavior. */ TA_DEFAULT, /* * The user has explicitly said we should remove the file. */ TA_OVERWRITE, /* * The user has said we should always prompt about the file. */ TA_PROMPT, /* * The user has said we should always leave it be. */ TA_SKIP } target_action_t; target_action_t targact = TA_DEFAULT; /* Extended system attributes support */ static int open_source(const char *); static int open_target_srctarg_attrdirs(const char *, const char *); static int open_attrdirp(const char *); static int traverse_attrfile(struct dirent *, const char *, const char *, int); static void rewind_attrdir(DIR *); static void close_all(void); int main(int argc, char *argv[]) { int c, i, r, errflg = 0; char target[PATH_MAX]; int (*move)(const char *, char *); /* * Determine command invoked (mv, cp, or ln) */ if (cmd = strrchr(argv[0], '/')) ++cmd; else cmd = argv[0]; /* * Set flags based on command. */ (void) setlocale(LC_ALL, ""); #if !defined(TEXT_DOMAIN) /* Should be defined by cc -D */ #define TEXT_DOMAIN "SYS_TEST" /* Use this only if it weren't */ #endif (void) textdomain(TEXT_DOMAIN); if (init_yes() < 0) { (void) fprintf(stderr, gettext(ERR_MSG_INIT_YES), strerror(errno)); exit(3); } if (EQ(cmd, "mv")) mve = TRUE; else if (EQ(cmd, "ln")) lnk = TRUE; else if (EQ(cmd, "cp")) cpy = TRUE; else { (void) fprintf(stderr, gettext("Invalid command name (%s); expecting " "mv, cp, or ln.\n"), cmd); exit(1); } /* * Check for options: * cp [ -r|-R [-H|-L|-P]] [-afinp@/] file1 [file2 ...] target * cp [-afinprR@/] file1 [file2 ...] target * ln [-fi] [-n] [-s] file1 [file2 ...] target * ln [-fi] [-n] [-s] file1 [file2 ...] * mv [-f|i] [-n] file1 [file2 ...] target * mv [-f|i] [-n] dir1 target */ if (cpy) { while ((c = getopt(argc, argv, "afHinLpPrR@/")) != EOF) switch (c) { case 'f': fflg++; break; case 'i': targact = TA_PROMPT; break; case 'n': targact = TA_SKIP; break; case 'p': pflg++; #ifdef XPG4 attrsilent = 1; atflg = 0; saflg = 0; #else if (atflg == 0) attrsilent = 1; #endif break; case 'H': /* * If more than one of -H, -L, or -P are * specified, only the last option specified * determines the behavior. */ Lflg = Pflg = 0; Hflg++; break; case 'L': Hflg = Pflg = 0; Lflg++; break; case 'P': Lflg = Hflg = 0; Pflg++; break; case 'R': /* * The default behavior of cp -R|-r * when specified without -H|-L|-P * is -L. */ Rflg++; /*FALLTHROUGH*/ case 'r': rflg++; break; case 'a': Lflg = Hflg = 0; pflg++; Pflg++; Rflg++; rflg++; break; case '@': atflg++; attrsilent = 0; #ifdef XPG4 pflg = 0; #endif break; case '/': saflg++; attrsilent = 0; #ifdef XPG4 pflg = 0; #endif break; default: errflg++; } /* -R or -r must be specified with -H, -L, or -P */ if ((Hflg || Lflg || Pflg) && !(Rflg || rflg)) { errflg++; } } else if (mve) { while ((c = getopt(argc, argv, "fins")) != EOF) switch (c) { case 'f': targact = TA_OVERWRITE; break; case 'i': #ifdef XPG4 targact = TA_PROMPT; #else if (targact != TA_OVERWRITE) { targact = TA_PROMPT; } #endif break; case 'n': targact = TA_SKIP; break; default: errflg++; } } else { /* ln */ while ((c = getopt(argc, argv, "fins")) != EOF) switch (c) { case 'f': targact = TA_OVERWRITE; break; case 'i': targact = TA_PROMPT; break; case 'n': /* silently ignored; this is the default */ break; case 's': sflg++; break; default: errflg++; } } /* * For BSD compatibility allow - to delimit the end of * options for mv. */ if (mve && optind < argc && (strcmp(argv[optind], "-") == 0)) optind++; /* * Check for sufficient arguments * or a usage error. */ argc -= optind; argv = &argv[optind]; if ((argc < 2 && lnk != TRUE) || (argc < 1 && lnk == TRUE)) { (void) fprintf(stderr, gettext("%s: Insufficient arguments (%d)\n"), cmd, argc); usage(); } if (errflg != 0) usage(); /* * If there is more than a source and target, * the last argument (the target) must be a directory * which really exists. */ if (argc > 2) { if (stat(argv[argc-1], &s2) < 0) { (void) fprintf(stderr, gettext("%s: %s not found\n"), cmd, argv[argc-1]); exit(2); } if (!ISDIR(s2)) { (void) fprintf(stderr, gettext("%s: Target %s must be a directory\n"), cmd, argv[argc-1]); usage(); } } if (strlen(argv[argc-1]) >= PATH_MAX) { (void) fprintf(stderr, gettext("%s: Target %s file name length exceeds PATH_MAX" " %d\n"), cmd, argv[argc-1], PATH_MAX); exit(78); } if (argc == 1) { if (!lnk) usage(); (void) strcpy(target, "."); } else { (void) strcpy(target, argv[--argc]); } /* * Perform a multiple argument mv|cp|ln by * multiple invocations of cpymve() or lnkfil(). */ if (lnk) move = lnkfil; else move = cpymve; r = 0; for (i = 0; i < argc; i++) { stree = NULL; cmdarg = 1; r += move(argv[i], target); } /* * Show errors by nonzero exit code. */ return (r ? 2 : 0); } static int lnkfil(const char *source, char *target) { char *buf = NULL; if (sflg) { /* * If target is a directory make complete * name of the new symbolic link within that * directory. */ if ((stat(target, &s2) >= 0) && ISDIR(s2)) { size_t len; len = strlen(target) + strlen(dname(source)) + 4; if ((buf = (char *)malloc(len)) == NULL) { (void) fprintf(stderr, gettext("%s: Insufficient memory " "to %s %s\n"), cmd, cmd, source); exit(3); } (void) snprintf(buf, len, "%s/%s", target, dname(source)); target = buf; } /* * Check to see if the file exists already. * In this case we use lstat() instead of stat(): * unlink(2) and symlink(2) will operate on the file * itself, not its reference, if the file is a symlink. */ if ((lstat(target, &s2) == 0)) { /* * Check what our current overwrite behavior is i.e. the * -f or -n options. If prompting is set (-i), ask the * user. If overwrite is set (-n) then we attempt to * remove it. In both cases if the target is a directory * then we refuse to remove this. Once this is done, the * program will proceed with creating the symlink. */ switch (targact) { case TA_OVERWRITE: case TA_PROMPT: if (ISDIR(s2)) { (void) fprintf(stderr, gettext("%s: cannot create link " "over directory %s\n"), cmd, target); return (1); } /* * See the longer discussion in chkfiles about * the use of use_stdin() while prompting. */ if (targact == TA_PROMPT && use_stdin()) { (void) fprintf(stderr, gettext("%s: overwrite %s " "(%s/%s)? "), cmd, target, yesstr, nostr); if (yes() == 0) { return (0); } } if (unlink(target) < 0) { (void) fprintf(stderr, gettext("%s: cannot unlink %s: "), cmd, target); perror(""); return (1); } case TA_DEFAULT: break; case TA_SKIP: /* * This shouldn't be selectable. */ abort(); } } /* * Create a symbolic link to the source. */ if (symlink(source, target) < 0) { (void) fprintf(stderr, gettext("%s: cannot create %s: "), cmd, target); perror(""); if (buf != NULL) free(buf); return (1); } if (buf != NULL) free(buf); return (0); } switch (chkfiles(source, &target)) { case CHK_ERROR: return (1); case CHK_SKIP: return (0); case CHK_CONT: break; } /* * Make sure source file is not a directory, * we cannot link directories... */ if (ISDIR(s1)) { (void) fprintf(stderr, gettext("%s: %s is a directory\n"), cmd, source); return (1); } /* * hard link, call link() and return. */ if (link(source, target) < 0) { if (errno == EXDEV) (void) fprintf(stderr, gettext("%s: %s is on a different file system\n"), cmd, target); else { (void) fprintf(stderr, gettext("%s: cannot create link %s: "), cmd, target); perror(""); } if (buf != NULL) free(buf); return (1); } else { if (buf != NULL) free(buf); return (0); } } static int cpymve(const char *source, char *target) { int n; int fi, fo; int ret = 0; int attret = 0; int sattret = 0; int errno_save; int error = 0; switch (chkfiles(source, &target)) { case CHK_ERROR: return (1); case CHK_SKIP: return (0); case CHK_CONT: break; } /* * If it's a recursive copy and source * is a directory, then call rcopy (from copydir). */ if (cpy) { if (ISDIR(s1)) { int rc; avl_index_t where = 0; tree_node_t *tnode; tree_node_t *tptr; dev_t save_dev = s1.st_dev; ino_t save_ino = s1.st_ino; /* * We will be recursing into the directory so * save the inode information to a search tree * to avoid getting into an endless loop. */ if ((rc = add_tnode(&stree, save_dev, save_ino)) != 1) { if (rc == 0) { /* * We've already visited this directory. * Don't remove the search tree entry * to make sure we don't get into an * endless loop if revisited from a * different part of the hierarchy. */ (void) fprintf(stderr, gettext( "%s: cycle detected: %s\n"), cmd, source); } else { Perror(source); } return (1); } cmdarg = 0; rc = copydir(source, target); /* * Create a tnode to get an index to the matching * node (same dev and inode) in the search tree, * then use the index to remove the matching node * so it we do not wrongly detect a cycle when * revisiting this directory from another part of * the hierarchy. */ if ((tnode = create_tnode(save_dev, save_ino)) == NULL) { Perror(source); return (1); } if ((tptr = avl_find(stree, tnode, &where)) != NULL) { avl_remove(stree, tptr); } free(tptr); free(tnode); return (rc); } else if (ISDEV(s1) && Rflg) { return (copyspecial(target)); } else { goto copy; } } if (mve) { if (rename(source, target) >= 0) return (0); if (errno != EXDEV) { if (errno == ENOTDIR && ISDIR(s1)) { (void) fprintf(stderr, gettext("%s: %s is a directory\n"), cmd, source); return (1); } (void) fprintf(stderr, gettext("%s: cannot rename %s to %s: "), cmd, source, target); perror(""); return (1); } /* * cannot move a non-directory (source) onto an existing * directory (target) * */ if (targetexists && ISDIR(s2) && (!ISDIR(s1))) { (void) fprintf(stderr, gettext("%s: cannot mv a non directory %s " "over existing directory" " %s \n"), cmd, source, target); return (1); } if (ISDIR(s1)) { #ifdef XPG4 if (targetexists && ISDIR(s2)) { /* existing target dir must be empty */ if (rmdir(target) < 0) { errno_save = errno; (void) fprintf(stderr, gettext("%s: cannot rmdir %s: "), cmd, target); errno = errno_save; perror(""); return (1); } } #endif if ((n = copydir(source, target)) == 0) (void) rmdir(source); return (n); } /* doors cannot be moved across filesystems */ if (ISDOOR(s1)) { (void) fprintf(stderr, gettext("%s: %s: cannot move door " "across file systems\n"), cmd, source); return (1); } /* sockets cannot be moved across filesystems */ if (ISSOCK(s1)) { (void) fprintf(stderr, gettext("%s: %s: cannot move socket " "across file systems\n"), cmd, source); return (1); } /* * File cannot be renamed, try to recreate the symbolic * link or special device, or copy the file wholesale * between file systems. */ if (ISLNK(s1)) { register int m; register mode_t md; char symln[PATH_MAX + 1]; if (targetexists && unlink(target) < 0) { (void) fprintf(stderr, gettext("%s: cannot unlink %s: "), cmd, target); perror(""); return (1); } if ((m = readlink(source, symln, sizeof (symln) - 1)) < 0) { Perror(source); return (1); } symln[m] = '\0'; md = umask(~(s1.st_mode & MODEBITS)); if (symlink(symln, target) < 0) { Perror(target); return (1); } (void) umask(md); m = lchown(target, UID(s1), GID(s1)); #ifdef XPG4 if (m < 0) { (void) fprintf(stderr, gettext("%s: cannot" " change owner and group of" " %s: "), cmd, target); perror(""); } #endif goto cleanup; } if (ISDEV(s1)) { if (targetexists && unlink(target) < 0) { (void) fprintf(stderr, gettext("%s: cannot unlink %s: "), cmd, target); perror(""); return (1); } if (mknod(target, s1.st_mode, s1.st_rdev) < 0) { Perror(target); return (1); } (void) chg_mode(target, UID(s1), GID(s1), FMODE(s1)); (void) chg_time(target, s1); goto cleanup; } if (ISREG(s1)) { if (ISDIR(s2)) { if (targetexists && rmdir(target) < 0) { (void) fprintf(stderr, gettext("%s: cannot rmdir %s: "), cmd, target); perror(""); return (1); } } else { if (targetexists && unlink(target) < 0) { (void) fprintf(stderr, gettext("%s: cannot unlink %s: "), cmd, target); perror(""); return (1); } } copy: /* * If the source file is a symlink, and either * -P or -H flag (only if -H is specified and the * source file is not a command line argument) * were specified, then action is taken on the symlink * itself, not the file referenced by the symlink. * Note: this is executed for 'cp' only. */ if (cpy && (Pflg || (Hflg && !cmdarg)) && (ISLNK(s1))) { int m; mode_t md; char symln[PATH_MAX + 1]; m = readlink(source, symln, sizeof (symln) - 1); if (m < 0) { Perror(source); return (1); } symln[m] = '\0'; /* * Copy the sym link to the target. * Note: If the target exists, write a * diagnostic message, do nothing more * with the source file, and return to * process any remaining files. */ md = umask(~(s1.st_mode & MODEBITS)); if (symlink(symln, target) < 0) { Perror(target); return (1); } (void) umask(md); m = lchown(target, UID(s1), GID(s1)); if (m < 0) { (void) fprintf(stderr, gettext( "cp: cannot change owner and " "group of %s:"), target); perror(""); } } else { /* * Copy the file. If it happens to be a * symlink, copy the file referenced * by the symlink. */ fi = open(source, O_RDONLY); if (fi < 0) { (void) fprintf(stderr, gettext("%s: cannot open %s: "), cmd, source); perror(""); return (1); } fo = creat(target, s1.st_mode & MODEBITS); if (fo < 0) { /* * If -f and creat() failed, unlink * and try again. */ if (fflg) { (void) unlink(target); fo = creat(target, s1.st_mode & MODEBITS); } } if (fo < 0) { (void) fprintf(stderr, gettext("%s: cannot create %s: "), cmd, target); perror(""); (void) close(fi); return (1); } else { /* stat the new file, its used below */ (void) stat(target, &s2); } /* * Set target's permissions to the source * before any copying so that any partially * copied file will have the source's * permissions (at most) or umask permissions * whichever is the most restrictive. * * ACL for regular files */ if (pflg || mve) { (void) chmod(target, FMODE(s1)); if (s1acl != NULL) { if ((acl_set(target, s1acl)) < 0) { error++; (void) fprintf(stderr, gettext("%s: " "Failed to set " "acl entries " "on %s\n"), cmd, target); acl_free(s1acl); s1acl = NULL; /* * else: silent and * continue */ } } } if (fstat(fi, &s1) < 0) { (void) fprintf(stderr, gettext("%s: cannot access %s\n"), cmd, source); return (1); } if (IDENTICAL(s1, s2)) { (void) fprintf(stderr, gettext( "%s: %s and %s are identical\n"), cmd, source, target); return (1); } if (writefile(fi, fo, source, target, NULL, NULL, &s1, &s2) != 0) { return (1); } (void) close(fi); if (close(fo) < 0) { Perror2(target, "write"); return (1); } } /* Copy regular extended attributes */ if (pflg || atflg || mve || saflg) { attret = copyattributes(source, target); if (attret != 0 && !attrsilent) { (void) fprintf(stderr, gettext( "%s: Failed to preserve" " extended attributes of file" " %s\n"), cmd, source); } /* Copy extended system attributes */ if (pflg || mve || saflg) sattret = copy_sysattr(source, target); if (mve && attret != 0) { (void) unlink(target); return (1); } if (attrsilent) { attret = 0; } } /* * XPG4: the write system call will clear setgid * and setuid bits, so set them again. */ if (pflg || mve) { if ((ret = chg_mode(target, UID(s1), GID(s1), FMODE(s1))) > 0) return (1); /* * Reapply ACL, since chmod may have * altered ACL */ if (s1acl != NULL) { if ((acl_set(target, s1acl)) < 0) { error++; (void) fprintf(stderr, gettext("%s: Failed to " "set acl entries " "on %s\n"), cmd, target); /* * else: silent and * continue */ } } if ((ret = chg_time(target, s1)) > 0) return (1); } if (cpy) { if (error != 0 || attret != 0 || sattret != 0) return (1); return (0); } goto cleanup; } (void) fprintf(stderr, gettext("%s: %s: unknown file type 0x%x\n"), cmd, source, (s1.st_mode & S_IFMT)); return (1); cleanup: if (unlink(source) < 0) { (void) unlink(target); (void) fprintf(stderr, gettext("%s: cannot unlink %s: "), cmd, source); perror(""); return (1); } if (error != 0 || attret != 0 || sattret != 0) return (1); return (ret); } /*NOTREACHED*/ return (ret); } /* * create_tnode() * * Create a node for use with the search tree which contains the * inode information (device id and inode number). * * Input * dev - device id * ino - inode number * * Output * tnode - NULL on error, otherwise returns a tnode structure * which contains the input device id and inode number. */ static tree_node_t * create_tnode(dev_t dev, ino_t ino) { tree_node_t *tnode; if ((tnode = (tree_node_t *)malloc(sizeof (tree_node_t))) != NULL) { tnode->node_dev = dev; tnode->node_ino = ino; } return (tnode); } static chkfiles_t chkfiles(const char *source, char **to) { char *buf = (char *)NULL; int (*statf)() = (cpy && !(Pflg || (Hflg && !cmdarg))) ? stat : lstat; char *target = *to; int error; /* * Make sure source file exists. */ if ((*statf)(source, &s1) < 0) { /* * Keep the old error message except when someone tries to * mv/cp/ln a symbolic link that has a trailing slash and * points to a file. */ if (errno == ENOTDIR) (void) fprintf(stderr, "%s: %s: %s\n", cmd, source, strerror(errno)); else (void) fprintf(stderr, gettext("%s: cannot access %s\n"), cmd, source); return (CHK_ERROR); } /* * Get ACL info: don't bother with ln or cp/mv'ing symlinks */ if (!lnk && !ISLNK(s1)) { if (s1acl != NULL) { acl_free(s1acl); s1acl = NULL; } if ((error = acl_get(source, ACL_NO_TRIVIAL, &s1acl)) != 0) { (void) fprintf(stderr, "%s: failed to get acl entries: %s\n", source, acl_strerror(error)); return (CHK_ERROR); } /* else: just permission bits */ } /* * If stat fails, then the target doesn't exist, * we will create a new target with default file type of regular. */ FTYPE(s2) = S_IFREG; targetexists = 0; if ((*statf)(target, &s2) >= 0) { if (ISLNK(s2)) (void) stat(target, &s2); /* * If target is a directory, * make complete name of new file * within that directory. */ if (ISDIR(s2)) { size_t len; len = strlen(target) + strlen(dname(source)) + 4; if ((buf = (char *)malloc(len)) == NULL) { (void) fprintf(stderr, gettext("%s: Insufficient memory to " "%s %s\n "), cmd, cmd, source); exit(3); } (void) snprintf(buf, len, "%s/%s", target, dname(source)); *to = target = buf; } if ((*statf)(target, &s2) >= 0) { boolean_t prompt = B_FALSE; boolean_t overwrite = B_FALSE; boolean_t override = B_FALSE; targetexists++; if (cpy || mve) { /* * For cp and mv, it is an error if the * source and target are the same file. * Check for the same inode and file * system, but don't check for the same * absolute pathname because it is an * error when the source and target are * hard links to the same file. */ if (IDENTICAL(s1, s2)) { (void) fprintf(stderr, gettext( "%s: %s and %s are identical\n"), cmd, source, target); if (buf != NULL) free(buf); return (CHK_ERROR); } } if (lnk) { /* * For ln, it is an error if the source and * target are identical files (same inode, * same file system, and filenames resolve * to same absolute pathname). */ if (!chk_different(source, target)) { if (buf != NULL) free(buf); return (CHK_ERROR); } } /* * Determine if we need to prompt for overwriting the * file or for overriding its permissions. There is a * lot of thorny history here. * * The action we take depends on targact, which is the * user's selection or the command's default behavior. * If the user has explicitly opted into prompting, * explicitly asked invoked a force option, or said to * ignore things when there is a file here, then our * options are straightforward. When we're with the * program defaults, things get a bit more nuanced and * vary by program: * * ln: by default always fail with an error if target * exists, regardless of what kind of entity it is. * * cp: overwriting is allowed by default, overriding is * not. To override the -f flag will be specified which * will force removal. * * mv: overwriting is allowed by default, overriding * requires prompting if on stdin, otherwise it * proceeds. Note, "on stdin" varies based on XPG4 or * not. * * The history here is messy. Logically speaking the way * that overwriting and overriding was checked in the * past was the following rough logic: * * 1) Overwriting is considered if -i is set, -f (mv * only) wasn't set, and use_stdin() was true (always * true for XPG4, otherwise only if it was a tty). * * 2) Overriding is considered if it was mv, the file * was not write accessible, -f wasn't specified and the * target wasn't a symbolic link. * * 3) If both overwrite and override were set, it would * always prompt. If just override was set, it would * always prompt. However, if only overwrite was set, it * would only prompt if the target was a regular file! * * Based on this, you can see that cp/mv -i didn't * actually prompt for any number of cases as it didn't * consider if -i had been specified, which is * definitely against the spirit of -i (and POSIX). If * -i is specified we will **always** consider the * prompt based on use_stdin() because of history. If we * are looking at defaults, then we will honor the * historical conditions that were used to check for * overwriting and overriding. */ switch (targact) { case TA_SKIP: if (buf != NULL) free(buf); return (CHK_SKIP); case TA_OVERWRITE: break; case TA_PROMPT: if (use_stdin()) { prompt = B_TRUE; overwrite = B_TRUE; if (mve && access(target, W_OK) < 0 && !ISLNK(s2)) { override = B_TRUE; } } break; case TA_DEFAULT: if (lnk) { (void) fprintf(stderr, gettext("%s: %s: File exists\n"), cmd, target); if (buf != NULL) free(buf); return (CHK_ERROR); } /* * Now we have to figure out what we're going to * do here. Determine if this meets the * traditional prompting guidelines. */ if (mve && access(target, W_OK) < 0 && use_stdin() && !ISLNK(s2)) { prompt = B_TRUE; override = B_TRUE; } break; } /* * We've been asked to prompt. Determine the appropriate * message for the command and the type of action that * is going on. */ if (prompt) { assert(overwrite || override); if (overwrite && override) { (void) fprintf(stderr, gettext("%s: " "overwrite %s and override " "protection %o (%s/%s)? "), cmd, target, FMODE(s2) & MODEBITS, yesstr, nostr); } else if (overwrite) { (void) fprintf(stderr, gettext("%s: " "overwrite %s (%s/%s)? "), cmd, target, yesstr, nostr); } else if (override) { (void) fprintf(stderr, gettext("%s: " "%s: override protection %o " "(%s/%s)? "), cmd, target, FMODE(s2) & MODEBITS, yesstr, nostr); } if (yes() == 0) { if (buf != NULL) free(buf); return (CHK_SKIP); } } if (lnk && unlink(target) < 0) { (void) fprintf(stderr, gettext("%s: cannot unlink %s: "), cmd, target); perror(""); return (CHK_ERROR); } } } return (CHK_CONT); } /* * check whether source and target are different * return 1 when they are different * return 0 when they are identical, or when unable to resolve a pathname */ static int chk_different(const char *source, const char *target) { char rtarget[PATH_MAX], rsource[PATH_MAX]; if (IDENTICAL(s1, s2)) { /* * IDENTICAL will be true for hard links, therefore * check whether the filenames are different */ if ((getrealpath(source, rsource) == 0) || (getrealpath(target, rtarget) == 0)) { return (0); } if (strncmp(rsource, rtarget, PATH_MAX) == 0) { (void) fprintf(stderr, gettext( "%s: %s and %s are identical\n"), cmd, source, target); return (0); } } return (1); } /* * get real path (resolved absolute pathname) * return 1 on success, 0 on failure */ static int getrealpath(const char *path, char *rpath) { if (realpath(path, rpath) == NULL) { int errno_save = errno; (void) fprintf(stderr, gettext( "%s: cannot resolve path %s: "), cmd, path); errno = errno_save; perror(""); return (0); } return (1); } static int rcopy(const char *from, char *to) { DIR *fold = opendir(from); struct dirent *dp; struct stat statb, s1save; int errs = 0; char fromname[PATH_MAX]; if (fold == 0 || ((pflg || mve) && fstat(fold->dd_fd, &statb) < 0)) { Perror(from); return (1); } if (pflg || mve) { /* * Save s1 (stat information for source dir) so that * mod and access times can be reserved during "cp -p" * or mv, since s1 gets overwritten. */ s1save = s1; } for (;;) { dp = readdir(fold); if (dp == 0) { (void) closedir(fold); if (pflg || mve) return (chg_time(to, s1save) + errs); return (errs); } if (dp->d_ino == 0) continue; if ((strcmp(dp->d_name, ".") == 0) || (strcmp(dp->d_name, "..") == 0)) continue; if (strlen(from)+1+strlen(dp->d_name) >= sizeof (fromname) - 1) { (void) fprintf(stderr, gettext("%s : %s/%s: Name too long\n"), cmd, from, dp->d_name); errs++; continue; } (void) snprintf(fromname, sizeof (fromname), "%s/%s", from, dp->d_name); errs += cpymve(fromname, to); } } static const char * dname(const char *name) { const char *p; /* * Return just the file name given the complete path. * Like basename(1). */ p = name; /* * While there are characters left, * set name to start after last * delimiter. */ while (*p) if (*p++ == DELIM && *p) name = p; return (name); } static void usage(void) { /* * Display usage message. */ if (mve) { (void) fprintf(stderr, gettext( "Usage: mv [-fin] f1 f2\n" " mv [-fin] f1 ... fn d1\n" " mv [-fin] d1 d2\n")); } else if (lnk) { #ifdef XPG4 (void) fprintf(stderr, gettext( "Usage: ln [-fi] [-s] f1 [f2]\n" " ln [-fi] [-s] f1 ... fn d1\n" " ln [-fi] -s d1 d2\n")); #else (void) fprintf(stderr, gettext( "Usage: ln [-fi] [-n] [-s] f1 [f2]\n" " ln [-fi] [-n] [-s] f1 ... fn d1\n" " ln [-fi] [-n] -s d1 d2\n")); #endif } else if (cpy) { (void) fprintf(stderr, gettext( "Usage: cp [-afinp@/] f1 f2\n" " cp [-afinp@/] f1 ... fn d1\n" " cp [-r|-R [-H|-L|-P]] [-afinp@/] " "d1 ... dn-1 dn\n")); } exit(2); } /* * chg_time() * * Try to preserve modification and access time. * If 1) pflg is not set, or 2) pflg is set and this is the Solaris version, * don't report a utimensat() failure. * If this is the XPG4 version and utimensat fails, if 1) pflg is set (cp -p) * or 2) we are doing a mv, print a diagnostic message; arrange for a non-zero * exit status only if pflg is set. * utimensat(2) is being used to achieve granularity in nanoseconds * (if supported by the underlying file system) while setting file times. */ static int chg_time(const char *to, struct stat ss) { struct timespec times[2]; #ifdef XPG4 int rc; #endif times[0] = ss.st_atim; times[1] = ss.st_mtim; #ifdef XPG4 rc = utimensat(AT_FDCWD, to, times, ISLNK(s1) ? AT_SYMLINK_NOFOLLOW : 0); if ((pflg || mve) && rc != 0) { (void) fprintf(stderr, gettext("%s: cannot set times for %s: "), cmd, to); perror(""); if (pflg) return (1); } #else (void) utimensat(AT_FDCWD, to, times, ISLNK(s1) ? AT_SYMLINK_NOFOLLOW : 0); #endif return (0); } /* * chg_mode() * * This function is called upon "cp -p" or mv across filesystems. * * Try to preserve the owner and group id. If chown() fails, * only print a diagnostic message if doing a mv in the XPG4 version; * try to clear S_ISUID and S_ISGID bits in the target. If unable to clear * S_ISUID and S_ISGID bits, print a diagnostic message and arrange for a * non-zero exit status because this is a security violation. * Try to preserve permissions. * If this is the XPG4 version and chmod() fails, print a diagnostic message * and arrange for a non-zero exit status. * If this is the Solaris version and chmod() fails, do not print a * diagnostic message or exit with a non-zero value. */ static int chg_mode(const char *target, uid_t uid, gid_t gid, mode_t mode) { int clearflg = 0; /* controls message printed upon chown() error */ struct stat st; /* Don't change mode if target is symlink */ if (lstat(target, &st) == 0 && ISLNK(st)) return (0); if (chown(target, uid, gid) != 0) { #ifdef XPG4 if (mve) { (void) fprintf(stderr, gettext("%s: cannot change" " owner and group of %s: "), cmd, target); perror(""); } #endif if (mode & (S_ISUID | S_ISGID)) { /* try to clear S_ISUID and S_ISGID */ mode &= ~S_ISUID & ~S_ISGID; ++clearflg; } } if (chmod(target, mode) != 0) { if (clearflg) { (void) fprintf(stderr, gettext( "%s: cannot clear S_ISUID and S_ISGID bits in" " %s: "), cmd, target); perror(""); /* cp -p should get non-zero exit; mv should not */ if (pflg) return (1); } #ifdef XPG4 else { (void) fprintf(stderr, gettext( "%s: cannot set permissions for %s: "), cmd, target); perror(""); /* cp -p should get non-zero exit; mv should not */ if (pflg) return (1); } #endif } return (0); } static void Perror(const char *s) { char buf[PATH_MAX + 10]; (void) snprintf(buf, sizeof (buf), "%s: %s", cmd, s); perror(buf); } static void Perror2(const char *s1, const char *s2) { char buf[PATH_MAX + 20]; (void) snprintf(buf, sizeof (buf), "%s: %s: %s", cmd, gettext(s1), gettext(s2)); perror(buf); } /* * used for cp -R and for mv across file systems */ static int copydir(const char *source, char *target) { int ret, attret = 0; int sattret = 0; int pret = 0; /* need separate flag if -p is specified */ mode_t fixmode = (mode_t)0; /* cleanup mode after copy */ struct stat s1save; acl_t *s1acl_save; int error = 0; s1acl_save = NULL; if (cpy && !rflg) { (void) fprintf(stderr, gettext("%s: %s: is a directory\n"), cmd, source); return (1); } if (stat(target, &s2) < 0) { if (mkdir(target, (s1.st_mode & MODEBITS)) < 0) { (void) fprintf(stderr, "%s: ", cmd); perror(target); return (1); } if (stat(target, &s2) == 0) { fixmode = s2.st_mode; } else { fixmode = s1.st_mode; } (void) chmod(target, ((fixmode & MODEBITS) | S_IRWXU)); } else if (!(ISDIR(s2))) { (void) fprintf(stderr, gettext("%s: %s: not a directory.\n"), cmd, target); return (1); } if (pflg || mve) { /* * Save s1 (stat information for source dir) and acl info, * if any, so that ownership, modes, times, and acl's can * be reserved during "cp -p" or mv. * s1 gets overwritten when doing the recursive copy. */ s1save = s1; if (s1acl != NULL) { s1acl_save = acl_dup(s1acl); if (s1acl_save == NULL) { (void) fprintf(stderr, gettext("%s: " "Insufficient memory to save acl" " entry\n"), cmd); if (pflg) return (1); } #ifdef XPG4 else { (void) fprintf(stderr, gettext("%s: " "Insufficient memory to save acl" " entry\n"), cmd); if (pflg) return (1); } #endif } } ret = rcopy(source, target); /* * Once we created a directory, go ahead and set * its attributes, e.g. acls and time. The info * may get overwritten if we continue traversing * down the tree. * * ACL for directory */ if (pflg || mve) { if ((pret = chg_mode(target, UID(s1save), GID(s1save), FMODE(s1save))) == 0) pret = chg_time(target, s1save); ret += pret; if (s1acl_save != NULL) { if (acl_set(target, s1acl_save) < 0) { error++; #ifdef XPG4 if (pflg || mve) { #else if (pflg) { #endif (void) fprintf(stderr, gettext( "%s: failed to set acl entries " "on %s\n"), cmd, target); if (pflg) { acl_free(s1acl_save); s1acl_save = NULL; ret++; } } /* else: silent and continue */ } acl_free(s1acl_save); s1acl_save = NULL; } } else if (fixmode != (mode_t)0) (void) chmod(target, fixmode & MODEBITS); if (pflg || atflg || mve || saflg) { attret = copyattributes(source, target); if (!attrsilent && attret != 0) { (void) fprintf(stderr, gettext("%s: Failed to preserve" " extended attributes of directory" " %s\n"), cmd, source); } else { /* * Otherwise ignore failure. */ attret = 0; } /* Copy extended system attributes */ if (pflg || mve || saflg) { sattret = copy_sysattr(source, target); if (sattret != 0) { (void) fprintf(stderr, gettext( "%s: Failed to preserve " "extended system attributes " "of directory %s\n"), cmd, source); } } } if (attret != 0 || sattret != 0 || error != 0) return (1); return (ret); } static int copyspecial(const char *target) { int ret = 0; if (mknod(target, s1.st_mode, s1.st_rdev) != 0) { (void) fprintf(stderr, gettext( "cp: cannot create special file %s: "), target); perror(""); return (1); } if (pflg) { if ((ret = chg_mode(target, UID(s1), GID(s1), FMODE(s1))) == 0) ret = chg_time(target, s1); } return (ret); } static int use_stdin(void) { #ifdef XPG4 return (1); #else return (isatty(fileno(stdin))); #endif } /* Copy non-system extended attributes */ static int copyattributes(const char *source, const char *target) { struct dirent *dp; int error = 0; int aclerror; mode_t mode; int clearflg = 0; acl_t *xacl = NULL; acl_t *attrdiracl = NULL; struct timespec times[2]; if (pathconf(source, _PC_XATTR_EXISTS) != 1) return (0); if (pathconf(target, _PC_XATTR_ENABLED) != 1) { if (!attrsilent) { (void) fprintf(stderr, gettext( "%s: cannot preserve extended attributes, " "operation not supported on file" " %s\n"), cmd, target); } return (1); } if (open_source(source) != 0) return (1); if (open_target_srctarg_attrdirs(source, target) != 0) return (1); if (open_attrdirp(source) != 0) return (1); if (pflg || mve) { if (fchmod(targetdirfd, attrdir.st_mode) == -1) { if (!attrsilent) { (void) fprintf(stderr, gettext("%s: failed to set file mode" " correctly on attribute directory of" " file %s: "), cmd, target); perror(""); ++error; } } if (fchown(targetdirfd, attrdir.st_uid, attrdir.st_gid) == -1) { if (!attrsilent) { (void) fprintf(stderr, gettext("%s: failed to set file" " ownership correctly on attribute" " directory of file %s: "), cmd, target); perror(""); ++error; } } /* * Now that we are the owner we can update st_ctime by calling * utimensat. */ times[0] = attrdir.st_atim; times[1] = attrdir.st_mtim; if (utimensat(targetdirfd, ".", times, 0) < 0) { if (!attrsilent) { (void) fprintf(stderr, gettext("%s: cannot set attribute times" " for %s: "), cmd, target); perror(""); ++error; } } /* * Now set owner and group of attribute directory, implies * changing the ACL of the hidden attribute directory first. */ if ((aclerror = facl_get(sourcedirfd, ACL_NO_TRIVIAL, &attrdiracl)) != 0) { if (!attrsilent) { (void) fprintf(stderr, gettext( "%s: failed to get acl entries of" " attribute directory for" " %s : %s\n"), cmd, source, acl_strerror(aclerror)); ++error; } } if (attrdiracl) { if (facl_set(targetdirfd, attrdiracl) != 0) { if (!attrsilent) { (void) fprintf(stderr, gettext( "%s: failed to set acl entries" " on attribute directory " "for %s\n"), cmd, target); ++error; } acl_free(attrdiracl); attrdiracl = NULL; } } } while ((dp = readdir(srcdirp)) != NULL) { int ret; if ((ret = traverse_attrfile(dp, source, target, 1)) == -1) continue; else if (ret > 0) { ++error; goto out; } if (pflg || mve) { if ((aclerror = facl_get(srcattrfd, ACL_NO_TRIVIAL, &xacl)) != 0) { if (!attrsilent) { (void) fprintf(stderr, gettext( "%s: failed to get acl entries of" " attribute %s for" " %s: %s"), cmd, dp->d_name, source, acl_strerror(aclerror)); ++error; } } } /* * preserve ACL */ if ((pflg || mve) && xacl != NULL) { if ((facl_set(targattrfd, xacl)) < 0) { if (!attrsilent) { (void) fprintf(stderr, gettext( "%s: failed to set acl entries on" " attribute %s for" "%s\n"), cmd, dp->d_name, target); ++error; } acl_free(xacl); xacl = NULL; } } if (writefile(srcattrfd, targattrfd, source, target, dp->d_name, dp->d_name, &s3, &s4) != 0) { if (!attrsilent) { ++error; } goto next; } if (pflg || mve) { mode = FMODE(s3); if (fchown(targattrfd, UID(s3), GID(s3)) != 0) { if (!attrsilent) { (void) fprintf(stderr, gettext("%s: cannot change" " owner and group of" " attribute %s for" " file" " %s: "), cmd, dp->d_name, target); perror(""); ++error; } if (mode & (S_ISUID | S_ISGID)) { /* try to clear S_ISUID and S_ISGID */ mode &= ~S_ISUID & ~S_ISGID; ++clearflg; } } times[0] = s3.st_atim; times[1] = s3.st_mtim; if (utimensat(targetdirfd, dp->d_name, times, 0) < 0) { if (!attrsilent) { (void) fprintf(stderr, gettext("%s: cannot set attribute" " times for %s: "), cmd, target); perror(""); ++error; } } if (fchmod(targattrfd, mode) != 0) { if (clearflg) { (void) fprintf(stderr, gettext( "%s: cannot clear S_ISUID and " "S_ISGID bits in attribute %s" " for file" " %s: "), cmd, dp->d_name, target); } else { if (!attrsilent) { (void) fprintf(stderr, gettext( "%s: cannot set permissions of attribute" " %s for %s: "), cmd, dp->d_name, target); perror(""); ++error; } } } if (xacl && ((facl_set(targattrfd, xacl)) < 0)) { if (!attrsilent) { (void) fprintf(stderr, gettext( "%s: failed to set acl entries on" " attribute %s for" "%s\n"), cmd, dp->d_name, target); ++error; } acl_free(xacl); xacl = NULL; } } next: if (xacl != NULL) { acl_free(xacl); xacl = NULL; } if (srcattrfd != -1) (void) close(srcattrfd); if (targattrfd != -1) (void) close(targattrfd); srcattrfd = targattrfd = -1; } out: if (xacl != NULL) { acl_free(xacl); xacl = NULL; } if (attrdiracl != NULL) { acl_free(attrdiracl); attrdiracl = NULL; } if (!saflg && !pflg && !mve) close_all(); return (error == 0 ? 0 : 1); } /* Copy extended system attributes from source to target */ static int copy_sysattr(const char *source, const char *target) { struct dirent *dp; nvlist_t *response; int error = 0; int target_sa_support = 0; if (sysattr_support(source, _PC_SATTR_EXISTS) != 1) return (0); if (open_source(source) != 0) return (1); /* * Gets non default extended system attributes from the * source file to copy to the target. The target has * the defaults set when its created and thus no need * to copy the defaults. */ response = sysattr_list(cmd, srcfd, source); if (sysattr_support(target, _PC_SATTR_ENABLED) != 1) { if (response != NULL) { (void) fprintf(stderr, gettext( "%s: cannot preserve extended system " "attribute, operation not supported on file" " %s\n"), cmd, target); error++; goto out; } } else { target_sa_support = 1; } if (target_sa_support) { if (srcdirp == NULL) { if (open_target_srctarg_attrdirs(source, target) != 0) { error++; goto out; } if (open_attrdirp(source) != 0) { error++; goto out; } } else { rewind_attrdir(srcdirp); } while ((dp = readdir(srcdirp)) != NULL) { nvlist_t *res; int ret; if ((ret = traverse_attrfile(dp, source, target, 0)) == -1) continue; else if (ret > 0) { ++error; goto out; } /* * Gets non default extended system attributes from the * attribute file to copy to the target. The target has * the defaults set when its created and thus no need * to copy the defaults. */ res = sysattr_list(cmd, srcattrfd, dp->d_name); if (res == NULL) goto next; /* * Copy non default extended system attributes of named * attribute file. */ if (fsetattr(targattrfd, XATTR_VIEW_READWRITE, res) != 0) { ++error; (void) fprintf(stderr, gettext("%s: " "Failed to copy extended system " "attributes from attribute file " "%s of %s to %s\n"), cmd, dp->d_name, source, target); } next: if (srcattrfd != -1) (void) close(srcattrfd); if (targattrfd != -1) (void) close(targattrfd); srcattrfd = targattrfd = -1; nvlist_free(res); } } /* Copy source file non default extended system attributes to target */ if (target_sa_support && (response != NULL) && (fsetattr(targfd, XATTR_VIEW_READWRITE, response)) != 0) { ++error; (void) fprintf(stderr, gettext("%s: Failed to " "copy extended system attributes from " "%s to %s\n"), cmd, source, target); } out: nvlist_free(response); close_all(); return (error == 0 ? 0 : 1); } /* Open the source file */ static int open_source(const char *src) { int error = 0; srcfd = -1; if ((srcfd = open(src, O_RDONLY)) == -1) { if (pflg && attrsilent) { error++; goto out; } if (!attrsilent) { (void) fprintf(stderr, gettext("%s: cannot open file" " %s: "), cmd, src); perror(""); } ++error; } out: if (error) close_all(); return (error == 0 ? 0 : 1); } /* Open source attribute dir, target and target attribute dir. */ static int open_target_srctarg_attrdirs(const char *src, const char *targ) { int error = 0; targfd = sourcedirfd = targetdirfd = -1; if ((targfd = open(targ, O_RDONLY)) == -1) { if (pflg && attrsilent) { error++; goto out; } if (!attrsilent) { (void) fprintf(stderr, gettext("%s: cannot open file" " %s: "), cmd, targ); perror(""); } ++error; goto out; } if ((sourcedirfd = openat(srcfd, ".", O_RDONLY|O_XATTR)) == -1) { if (pflg && attrsilent) { error++; goto out; } if (!attrsilent) { (void) fprintf(stderr, gettext("%s: cannot open attribute" " directory for %s: "), cmd, src); perror(""); } ++error; goto out; } if (fstat(sourcedirfd, &attrdir) == -1) { if (pflg && attrsilent) { error++; goto out; } if (!attrsilent) { (void) fprintf(stderr, gettext("%s: could not retrieve stat" " information for attribute directory" "of file %s: "), cmd, src); perror(""); } ++error; goto out; } if ((targetdirfd = openat(targfd, ".", O_RDONLY|O_XATTR)) == -1) { if (pflg && attrsilent) { error++; goto out; } if (!attrsilent) { (void) fprintf(stderr, gettext("%s: cannot open attribute" " directory for %s: "), cmd, targ); perror(""); } ++error; } out: if (error) close_all(); return (error == 0 ? 0 : 1); } static int open_attrdirp(const char *source) { int tmpfd = -1; int error = 0; /* * dup sourcedirfd for use by fdopendir(). * fdopendir will take ownership of given fd and will close * it when closedir() is called. */ if ((tmpfd = dup(sourcedirfd)) == -1) { if (pflg && attrsilent) { error++; goto out; } if (!attrsilent) { (void) fprintf(stderr, gettext( "%s: unable to dup attribute directory" " file descriptor for %s: "), cmd, source); perror(""); ++error; } goto out; } if ((srcdirp = fdopendir(tmpfd)) == NULL) { if (pflg && attrsilent) { error++; goto out; } if (!attrsilent) { (void) fprintf(stderr, gettext("%s: failed to open attribute" " directory for %s: "), cmd, source); perror(""); ++error; } } out: if (error) close_all(); return (error == 0 ? 0 : 1); } /* Skips through ., .., and system attribute 'view' files */ static int traverse_attrfile(struct dirent *dp, const char *source, const char *target, int first) { int error = 0; srcattrfd = targattrfd = -1; if ((dp->d_name[0] == '.' && dp->d_name[1] == '\0') || (dp->d_name[0] == '.' && dp->d_name[1] == '.' && dp->d_name[2] == '\0') || (sysattr_type(dp->d_name) == _RO_SATTR) || (sysattr_type(dp->d_name) == _RW_SATTR)) return (-1); if ((srcattrfd = openat(sourcedirfd, dp->d_name, O_RDONLY)) == -1) { if (!attrsilent) { (void) fprintf(stderr, gettext("%s: cannot open attribute %s on" " file %s: "), cmd, dp->d_name, source); perror(""); ++error; goto out; } } if (fstat(srcattrfd, &s3) < 0) { if (!attrsilent) { (void) fprintf(stderr, gettext("%s: could not stat attribute" " %s on file" " %s: "), cmd, dp->d_name, source); perror(""); ++error; } goto out; } if (first) { (void) unlinkat(targetdirfd, dp->d_name, 0); if ((targattrfd = openat(targetdirfd, dp->d_name, O_RDWR|O_CREAT|O_TRUNC, s3.st_mode & MODEBITS)) == -1) { if (!attrsilent) { (void) fprintf(stderr, gettext("%s: could not create attribute" " %s on file %s: "), cmd, dp->d_name, target); perror(""); ++error; } goto out; } } else { if ((targattrfd = openat(targetdirfd, dp->d_name, O_RDONLY)) == -1) { if (!attrsilent) { (void) fprintf(stderr, gettext("%s: could not open attribute" " %s on file %s: "), cmd, dp->d_name, target); perror(""); ++error; } goto out; } } if (fstat(targattrfd, &s4) < 0) { if (!attrsilent) { (void) fprintf(stderr, gettext("%s: could not stat attribute" " %s on file" " %s: "), cmd, dp->d_name, target); perror(""); ++error; } } out: if (error) { if (srcattrfd != -1) (void) close(srcattrfd); if (targattrfd != -1) (void) close(targattrfd); srcattrfd = targattrfd = -1; } return (error == 0 ? 0 :1); } static void rewind_attrdir(DIR * sdp) { int pwdfd; pwdfd = open(".", O_RDONLY); if ((pwdfd != -1) && (fchdir(sourcedirfd) == 0)) { rewinddir(sdp); (void) fchdir(pwdfd); (void) close(pwdfd); } else { if (!attrsilent) { (void) fprintf(stderr, gettext("%s: " "failed to rewind attribute dir\n"), cmd); } } } static void close_all(void) { if (srcattrfd != -1) (void) close(srcattrfd); if (targattrfd != -1) (void) close(targattrfd); if (sourcedirfd != -1) (void) close(sourcedirfd); if (targetdirfd != -1) (void) close(targetdirfd); if (srcdirp != NULL) { (void) closedir(srcdirp); srcdirp = NULL; } if (srcfd != -1) (void) close(srcfd); if (targfd != -1) (void) close(targfd); }