xref: /titanic_50/usr/src/cmd/mv/mv.c (revision a8c23f9d905fadb090654516236f546ef3f0a1b2)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2013 Nexenta Systems, Inc. All rights reserved.
24  */
25 
26 /*
27  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
28  * Use is subject to license terms.
29  */
30 
31 /*	Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T	*/
32 /*	  All Rights Reserved  	*/
33 
34 /*
35  * University Copyright- Copyright (c) 1982, 1986, 1988
36  * The Regents of the University of California
37  * All Rights Reserved
38  *
39  * University Acknowledgment- Portions of this document are derived from
40  * software developed by the University of California, Berkeley, and its
41  * contributors.
42  */
43 
44 /*
45  * Combined mv/cp/ln command:
46  *	mv file1 file2
47  *	mv dir1 dir2
48  *	mv file1 ... filen dir1
49  */
50 #include <sys/time.h>
51 #include <signal.h>
52 #include <locale.h>
53 #include <stdarg.h>
54 #include <sys/acl.h>
55 #include <libcmdutils.h>
56 #include <aclutils.h>
57 #include "getresponse.h"
58 
59 #define	FTYPE(A)	(A.st_mode)
60 #define	FMODE(A)	(A.st_mode)
61 #define	UID(A)		(A.st_uid)
62 #define	GID(A)		(A.st_gid)
63 #define	IDENTICAL(A, B)	(A.st_dev == B.st_dev && A.st_ino == B.st_ino)
64 #define	ISDIR(A)	((A.st_mode & S_IFMT) == S_IFDIR)
65 #define	ISDOOR(A)	((A.st_mode & S_IFMT) == S_IFDOOR)
66 #define	ISLNK(A)	((A.st_mode & S_IFMT) == S_IFLNK)
67 #define	ISREG(A)	(((A).st_mode & S_IFMT) == S_IFREG)
68 #define	ISDEV(A)	((A.st_mode & S_IFMT) == S_IFCHR || \
69 			(A.st_mode & S_IFMT) == S_IFBLK || \
70 			(A.st_mode & S_IFMT) == S_IFIFO)
71 #define	ISSOCK(A)	((A.st_mode & S_IFMT) == S_IFSOCK)
72 
73 #define	DELIM	'/'
74 #define	EQ(x, y)	(strcmp(x, y) == 0)
75 #define	FALSE	0
76 #define	MODEBITS (S_ISUID|S_ISGID|S_ISVTX|S_IRWXU|S_IRWXG|S_IRWXO)
77 #define	TRUE 1
78 
79 static char		*dname(char *);
80 static int		lnkfil(char *, char *);
81 static int		cpymve(char *, char *);
82 static int		chkfiles(char *, char **);
83 static int		rcopy(char *, char *);
84 static int		chk_different(char *, char *);
85 static int		chg_time(char *, struct stat);
86 static int		chg_mode(char *, uid_t, gid_t, mode_t);
87 static int		copydir(char *, char *);
88 static int		copyspecial(char *);
89 static int		getrealpath(char *, char *);
90 static void		usage(void);
91 static void		Perror(char *);
92 static void		Perror2(char *, char *);
93 static int		use_stdin(void);
94 static int		copyattributes(char *, char *);
95 static int		copy_sysattr(char *, char *);
96 static tree_node_t	*create_tnode(dev_t, ino_t);
97 
98 static struct stat 	s1, s2, s3, s4;
99 static int 		cpy = FALSE;
100 static int 		mve = FALSE;
101 static int 		lnk = FALSE;
102 static char		*cmd;
103 static int		silent = 0;
104 static int		fflg = 0;
105 static int		iflg = 0;
106 static int		pflg = 0;
107 static int		Rflg = 0;	/* recursive copy */
108 static int		rflg = 0;	/* recursive copy */
109 static int		sflg = 0;
110 static int		Hflg = 0;	/* follow cmd line arg symlink to dir */
111 static int		Lflg = 0;	/* follow symlinks */
112 static int		Pflg = 0;	/* do not follow symlinks */
113 static int		atflg = 0;
114 static int		attrsilent = 0;
115 static int		targetexists = 0;
116 static int		cmdarg;		/* command line argument */
117 static avl_tree_t	*stree = NULL;	/* source file inode search tree */
118 static acl_t		*s1acl;
119 static int		saflg = 0;	/* 'cp' extended system attr. */
120 static int		srcfd = -1;
121 static int		targfd = -1;
122 static int		sourcedirfd = -1;
123 static int		targetdirfd = -1;
124 static DIR 		*srcdirp = NULL;
125 static int		srcattrfd = -1;
126 static int		targattrfd = -1;
127 static struct stat 	attrdir;
128 
129 /* Extended system attributes support */
130 
131 static int open_source(char  *);
132 static int open_target_srctarg_attrdirs(char  *, char *);
133 static int open_attrdirp(char *);
134 static int traverse_attrfile(struct dirent *, char *, char *, int);
135 static void rewind_attrdir(DIR *);
136 static void close_all();
137 
138 
139 int
140 main(int argc, char *argv[])
141 {
142 	int c, i, r, errflg = 0;
143 	char target[PATH_MAX];
144 	int (*move)(char *, char *);
145 
146 	/*
147 	 * Determine command invoked (mv, cp, or ln)
148 	 */
149 
150 	if (cmd = strrchr(argv[0], '/'))
151 		++cmd;
152 	else
153 		cmd = argv[0];
154 
155 	/*
156 	 * Set flags based on command.
157 	 */
158 
159 	(void) setlocale(LC_ALL, "");
160 #if !defined(TEXT_DOMAIN)	/* Should be defined by cc -D */
161 #define	TEXT_DOMAIN "SYS_TEST"	/* Use this only if it weren't */
162 #endif
163 	(void) textdomain(TEXT_DOMAIN);
164 	if (init_yes() < 0) {
165 		(void) fprintf(stderr, gettext(ERR_MSG_INIT_YES),
166 		    strerror(errno));
167 		exit(3);
168 	}
169 
170 	if (EQ(cmd, "mv"))
171 		mve = TRUE;
172 	else if (EQ(cmd, "ln"))
173 		lnk = TRUE;
174 	else if (EQ(cmd, "cp"))
175 		cpy = TRUE;
176 	else {
177 		(void) fprintf(stderr,
178 		    gettext("Invalid command name (%s); expecting "
179 		    "mv, cp, or ln.\n"), cmd);
180 		exit(1);
181 	}
182 
183 	/*
184 	 * Check for options:
185 	 * 	cp  -r|-R [-H|-L|-P] [-fip@/] file1 [file2 ...] target
186 	 * 	cp [-fiprR@/] file1 [file2 ...] target
187 	 *	ln [-f] [-n] [-s] file1 [file2 ...] target
188 	 *	ln [-f] [-n] [-s] file1 [file2 ...]
189 	 *	mv [-f|i] file1 [file2 ...] target
190 	 *	mv [-f|i] dir1 target
191 	 */
192 
193 	if (cpy) {
194 		while ((c = getopt(argc, argv, "fHiLpPrR@/")) != EOF)
195 			switch (c) {
196 			case 'f':
197 				fflg++;
198 				break;
199 			case 'i':
200 				iflg++;
201 				break;
202 			case 'p':
203 				pflg++;
204 #ifdef XPG4
205 				attrsilent = 1;
206 				atflg = 0;
207 				saflg = 0;
208 #else
209 				if (atflg == 0)
210 					attrsilent = 1;
211 #endif
212 				break;
213 			case 'H':
214 				/*
215 				 * If more than one of -H, -L, or -P are
216 				 * specified, only the last option specified
217 				 * determines the behavior.
218 				 */
219 				Lflg = Pflg = 0;
220 				Hflg++;
221 				break;
222 			case 'L':
223 				Hflg = Pflg = 0;
224 				Lflg++;
225 				break;
226 			case 'P':
227 				Lflg = Hflg = 0;
228 				Pflg++;
229 				break;
230 			case 'R':
231 				/*
232 				 * The default behavior of cp -R|-r
233 				 * when specified without -H|-L|-P
234 				 * is -L.
235 				 */
236 				Rflg++;
237 				/*FALLTHROUGH*/
238 			case 'r':
239 				rflg++;
240 				break;
241 			case '@':
242 				atflg++;
243 				attrsilent = 0;
244 #ifdef XPG4
245 				pflg = 0;
246 #endif
247 				break;
248 			case '/':
249 				saflg++;
250 				attrsilent = 0;
251 #ifdef XPG4
252 				pflg = 0;
253 #endif
254 				break;
255 			default:
256 				errflg++;
257 			}
258 
259 		/* -R or -r must be specified with -H, -L, or -P */
260 		if ((Hflg || Lflg || Pflg) && !(Rflg || rflg)) {
261 			errflg++;
262 		}
263 
264 	} else if (mve) {
265 		while ((c = getopt(argc, argv, "fis")) != EOF)
266 			switch (c) {
267 			case 'f':
268 				silent++;
269 #ifdef XPG4
270 				iflg = 0;
271 #endif
272 				break;
273 			case 'i':
274 				iflg++;
275 #ifdef XPG4
276 				silent = 0;
277 #endif
278 				break;
279 			default:
280 				errflg++;
281 			}
282 	} else { /* ln */
283 		while ((c = getopt(argc, argv, "fns")) != EOF)
284 			switch (c) {
285 			case 'f':
286 				silent++;
287 				break;
288 			case 'n':
289 				/* silently ignored; this is the default */
290 				break;
291 			case 's':
292 				sflg++;
293 				break;
294 			default:
295 				errflg++;
296 			}
297 	}
298 
299 	/*
300 	 * For BSD compatibility allow - to delimit the end of
301 	 * options for mv.
302 	 */
303 	if (mve && optind < argc && (strcmp(argv[optind], "-") == 0))
304 		optind++;
305 
306 	/*
307 	 * Check for sufficient arguments
308 	 * or a usage error.
309 	 */
310 
311 	argc -= optind;
312 	argv  = &argv[optind];
313 
314 	if ((argc < 2 && lnk != TRUE) || (argc < 1 && lnk == TRUE)) {
315 		(void) fprintf(stderr,
316 		    gettext("%s: Insufficient arguments (%d)\n"),
317 		    cmd, argc);
318 		usage();
319 	}
320 
321 	if (errflg != 0)
322 		usage();
323 
324 	/*
325 	 * If there is more than a source and target,
326 	 * the last argument (the target) must be a directory
327 	 * which really exists.
328 	 */
329 
330 	if (argc > 2) {
331 		if (stat(argv[argc-1], &s2) < 0) {
332 			(void) fprintf(stderr,
333 			    gettext("%s: %s not found\n"),
334 			    cmd, argv[argc-1]);
335 			exit(2);
336 		}
337 
338 		if (!ISDIR(s2)) {
339 			(void) fprintf(stderr,
340 			    gettext("%s: Target %s must be a directory\n"),
341 			    cmd, argv[argc-1]);
342 			usage();
343 		}
344 	}
345 
346 	if (strlen(argv[argc-1]) >= PATH_MAX) {
347 		(void) fprintf(stderr,
348 		    gettext("%s: Target %s file name length exceeds PATH_MAX"
349 		    " %d\n"), cmd, argv[argc-1], PATH_MAX);
350 		exit(78);
351 	}
352 
353 	if (argc == 1) {
354 		if (!lnk)
355 			usage();
356 		(void) strcpy(target, ".");
357 	} else {
358 		(void) strcpy(target, argv[--argc]);
359 	}
360 
361 	/*
362 	 * Perform a multiple argument mv|cp|ln by
363 	 * multiple invocations of cpymve() or lnkfil().
364 	 */
365 	if (lnk)
366 		move = lnkfil;
367 	else
368 		move = cpymve;
369 
370 	r = 0;
371 	for (i = 0; i < argc; i++) {
372 		stree = NULL;
373 		cmdarg = 1;
374 		r += move(argv[i], target);
375 	}
376 
377 	/*
378 	 * Show errors by nonzero exit code.
379 	 */
380 
381 	return (r?2:0);
382 }
383 
384 static int
385 lnkfil(char *source, char *target)
386 {
387 	char	*buf = NULL;
388 
389 	if (sflg) {
390 
391 		/*
392 		 * If target is a directory make complete
393 		 * name of the new symbolic link within that
394 		 * directory.
395 		 */
396 
397 		if ((stat(target, &s2) >= 0) && ISDIR(s2)) {
398 			size_t len;
399 
400 			len = strlen(target) + strlen(dname(source)) + 4;
401 			if ((buf = (char *)malloc(len)) == NULL) {
402 				(void) fprintf(stderr,
403 				    gettext("%s: Insufficient memory "
404 				    "to %s %s\n"), cmd, cmd, source);
405 				exit(3);
406 			}
407 			(void) snprintf(buf, len, "%s/%s",
408 			    target, dname(source));
409 			target = buf;
410 		}
411 
412 		/*
413 		 * Check to see if the file exists already.
414 		 * In this case we use lstat() instead of stat():
415 		 * unlink(2) and symlink(2) will operate on the file
416 		 * itself, not its reference, if the file is a symlink.
417 		 */
418 
419 		if ((lstat(target, &s2) == 0)) {
420 			/*
421 			 * Check if the silent flag is set ie. the -f option
422 			 * is used.  If so, use unlink to remove the current
423 			 * target to replace with the new target, specified
424 			 * on the command line.  Proceed with symlink.
425 			 */
426 			if (silent) {
427 			/*
428 			 * Don't allow silent (-f) removal of an existing
429 			 * directory; could leave unreferenced directory
430 			 * entries.
431 			 */
432 				if (ISDIR(s2)) {
433 					(void) fprintf(stderr,
434 					    gettext("%s: cannot create link "
435 					    "over directory %s\n"), cmd,
436 					    target);
437 					return (1);
438 				}
439 				if (unlink(target) < 0) {
440 					(void) fprintf(stderr,
441 					    gettext("%s: cannot unlink %s: "),
442 					    cmd, target);
443 					perror("");
444 					return (1);
445 				}
446 			}
447 		}
448 
449 
450 		/*
451 		 * Create a symbolic link to the source.
452 		 */
453 
454 		if (symlink(source, target) < 0) {
455 			(void) fprintf(stderr,
456 			    gettext("%s: cannot create %s: "),
457 			    cmd, target);
458 			perror("");
459 			if (buf != NULL)
460 				free(buf);
461 			return (1);
462 		}
463 		if (buf != NULL)
464 			free(buf);
465 		return (0);
466 	}
467 
468 	switch (chkfiles(source, &target)) {
469 		case 1: return (1);
470 		case 2: return (0);
471 			/* default - fall through */
472 	}
473 
474 	/*
475 	 * Make sure source file is not a directory,
476 	 * we cannot link directories...
477 	 */
478 
479 	if (ISDIR(s1)) {
480 		(void) fprintf(stderr,
481 		    gettext("%s: %s is a directory\n"), cmd, source);
482 		return (1);
483 	}
484 
485 	/*
486 	 * hard link, call link() and return.
487 	 */
488 
489 	if (link(source, target) < 0) {
490 		if (errno == EXDEV)
491 			(void) fprintf(stderr,
492 			    gettext("%s: %s is on a different file system\n"),
493 			    cmd, target);
494 		else {
495 			(void) fprintf(stderr,
496 			    gettext("%s: cannot create link %s: "),
497 			    cmd, target);
498 			perror("");
499 		}
500 		if (buf != NULL)
501 			free(buf);
502 		return (1);
503 	} else {
504 		if (buf != NULL)
505 			free(buf);
506 		return (0);
507 	}
508 }
509 
510 static int
511 cpymve(char *source, char *target)
512 {
513 	int	n;
514 	int fi, fo;
515 	int ret = 0;
516 	int attret = 0;
517 	int sattret = 0;
518 	int errno_save;
519 	int error = 0;
520 
521 	switch (chkfiles(source, &target)) {
522 		case 1: return (1);
523 		case 2: return (0);
524 			/* default - fall through */
525 	}
526 
527 	/*
528 	 * If it's a recursive copy and source
529 	 * is a directory, then call rcopy (from copydir).
530 	 */
531 	if (cpy) {
532 		if (ISDIR(s1)) {
533 			int		rc;
534 			avl_index_t	where = 0;
535 			tree_node_t	*tnode;
536 			tree_node_t	*tptr;
537 			dev_t		save_dev = s1.st_dev;
538 			ino_t		save_ino = s1.st_ino;
539 
540 			/*
541 			 * We will be recursing into the directory so
542 			 * save the inode information to a search tree
543 			 * to avoid getting into an endless loop.
544 			 */
545 			if ((rc = add_tnode(&stree, save_dev, save_ino)) != 1) {
546 				if (rc == 0) {
547 					/*
548 					 * We've already visited this directory.
549 					 * Don't remove the search tree entry
550 					 * to make sure we don't get into an
551 					 * endless loop if revisited from a
552 					 * different part of the hierarchy.
553 					 */
554 					(void) fprintf(stderr, gettext(
555 					    "%s: cycle detected: %s\n"),
556 					    cmd, source);
557 				} else {
558 					Perror(source);
559 				}
560 				return (1);
561 			}
562 
563 			cmdarg = 0;
564 			rc = copydir(source, target);
565 
566 			/*
567 			 * Create a tnode to get an index to the matching
568 			 * node (same dev and inode) in the search tree,
569 			 * then use the index to remove the matching node
570 			 * so it we do not wrongly detect a cycle when
571 			 * revisiting this directory from another part of
572 			 * the hierarchy.
573 			 */
574 			if ((tnode = create_tnode(save_dev,
575 			    save_ino)) == NULL) {
576 				Perror(source);
577 				return (1);
578 			}
579 			if ((tptr = avl_find(stree, tnode, &where)) != NULL) {
580 				avl_remove(stree, tptr);
581 			}
582 			free(tptr);
583 			free(tnode);
584 			return (rc);
585 
586 		} else if (ISDEV(s1) && Rflg) {
587 			return (copyspecial(target));
588 		} else {
589 			goto copy;
590 		}
591 	}
592 
593 	if (mve) {
594 		if (rename(source, target) >= 0)
595 			return (0);
596 		if (errno != EXDEV) {
597 			if (errno == ENOTDIR && ISDIR(s1)) {
598 				(void) fprintf(stderr,
599 				    gettext("%s: %s is a directory\n"),
600 				    cmd, source);
601 				return (1);
602 			}
603 			(void) fprintf(stderr,
604 			    gettext("%s: cannot rename %s to %s: "),
605 			    cmd, source, target);
606 			perror("");
607 			return (1);
608 		}
609 
610 		/*
611 		 * cannot move a non-directory (source) onto an existing
612 		 * directory (target)
613 		 *
614 		 */
615 		if (targetexists && ISDIR(s2) && (!ISDIR(s1))) {
616 			(void) fprintf(stderr,
617 			    gettext("%s: cannot mv a non directory %s "
618 			    "over existing directory"
619 			    " %s \n"), cmd, source, target);
620 			return (1);
621 		}
622 		if (ISDIR(s1)) {
623 #ifdef XPG4
624 			if (targetexists && ISDIR(s2)) {
625 				/* existing target dir must be empty */
626 				if (rmdir(target) < 0) {
627 					errno_save = errno;
628 					(void) fprintf(stderr,
629 					    gettext("%s: cannot rmdir %s: "),
630 					    cmd, target);
631 					errno = errno_save;
632 					perror("");
633 					return (1);
634 				}
635 			}
636 #endif
637 			if ((n =  copydir(source, target)) == 0)
638 				(void) rmdir(source);
639 			return (n);
640 		}
641 
642 		/* doors cannot be moved across filesystems */
643 		if (ISDOOR(s1)) {
644 			(void) fprintf(stderr,
645 			    gettext("%s: %s: cannot move door "
646 			    "across file systems\n"), cmd, source);
647 			return (1);
648 		}
649 
650 		/* sockets cannot be moved across filesystems */
651 		if (ISSOCK(s1)) {
652 			(void) fprintf(stderr,
653 			    gettext("%s: %s: cannot move socket "
654 			    "across file systems\n"), cmd, source);
655 			return (1);
656 		}
657 
658 		/*
659 		 * File cannot be renamed, try to recreate the symbolic
660 		 * link or special device, or copy the file wholesale
661 		 * between file systems.
662 		 */
663 		if (ISLNK(s1)) {
664 			register int	m;
665 			register mode_t md;
666 			char symln[PATH_MAX + 1];
667 
668 			if (targetexists && unlink(target) < 0) {
669 				(void) fprintf(stderr,
670 				    gettext("%s: cannot unlink %s: "),
671 				    cmd, target);
672 				perror("");
673 				return (1);
674 			}
675 
676 			if ((m = readlink(source, symln,
677 			    sizeof (symln) - 1)) < 0) {
678 				Perror(source);
679 				return (1);
680 			}
681 			symln[m] = '\0';
682 
683 			md = umask(~(s1.st_mode & MODEBITS));
684 			if (symlink(symln, target) < 0) {
685 				Perror(target);
686 				return (1);
687 			}
688 			(void) umask(md);
689 			m = lchown(target, UID(s1), GID(s1));
690 #ifdef XPG4
691 			if (m < 0) {
692 				(void) fprintf(stderr, gettext("%s: cannot"
693 				    " change owner and group of"
694 				    " %s: "), cmd, target);
695 				perror("");
696 			}
697 #endif
698 			goto cleanup;
699 		}
700 		if (ISDEV(s1)) {
701 
702 			if (targetexists && unlink(target) < 0) {
703 				(void) fprintf(stderr,
704 				    gettext("%s: cannot unlink %s: "),
705 				    cmd, target);
706 				perror("");
707 				return (1);
708 			}
709 
710 			if (mknod(target, s1.st_mode, s1.st_rdev) < 0) {
711 				Perror(target);
712 				return (1);
713 			}
714 
715 			(void) chg_mode(target, UID(s1), GID(s1), FMODE(s1));
716 			(void) chg_time(target, s1);
717 			goto cleanup;
718 		}
719 
720 		if (ISREG(s1)) {
721 			if (ISDIR(s2)) {
722 				if (targetexists && rmdir(target) < 0) {
723 					(void) fprintf(stderr,
724 					    gettext("%s: cannot rmdir %s: "),
725 					    cmd, target);
726 					perror("");
727 					return (1);
728 				}
729 			} else {
730 				if (targetexists && unlink(target) < 0) {
731 					(void) fprintf(stderr,
732 					    gettext("%s: cannot unlink %s: "),
733 					    cmd, target);
734 					perror("");
735 					return (1);
736 				}
737 			}
738 
739 
740 copy:
741 			/*
742 			 * If the source file is a symlink, and either
743 			 * -P or -H flag (only if -H is specified and the
744 			 * source file is not a command line argument)
745 			 * were specified, then action is taken on the symlink
746 			 * itself, not the file referenced by the symlink.
747 			 * Note: this is executed for 'cp' only.
748 			 */
749 			if (cpy && (Pflg || (Hflg && !cmdarg)) && (ISLNK(s1))) {
750 				int	m;
751 				mode_t	md;
752 				char symln[PATH_MAX + 1];
753 
754 				m = readlink(source, symln, sizeof (symln) - 1);
755 
756 				if (m < 0) {
757 					Perror(source);
758 					return (1);
759 				}
760 				symln[m] = '\0';
761 
762 				/*
763 				 * Copy the sym link to the target.
764 				 * Note: If the target exists, write a
765 				 * diagnostic message, do nothing more
766 				 * with the source file, and return to
767 				 * process any remaining files.
768 				 */
769 				md = umask(~(s1.st_mode & MODEBITS));
770 				if (symlink(symln, target) < 0) {
771 					Perror(target);
772 					return (1);
773 				}
774 				(void) umask(md);
775 				m = lchown(target, UID(s1), GID(s1));
776 
777 				if (m < 0) {
778 					(void) fprintf(stderr, gettext(
779 					    "cp: cannot change owner and "
780 					    "group of %s:"), target);
781 					perror("");
782 				}
783 			} else {
784 				/*
785 				 * Copy the file.  If it happens to be a
786 				 * symlink, copy the file referenced
787 				 * by the symlink.
788 				 */
789 				fi = open(source, O_RDONLY);
790 				if (fi < 0) {
791 					(void) fprintf(stderr,
792 					    gettext("%s: cannot open %s: "),
793 					    cmd, source);
794 					perror("");
795 					return (1);
796 				}
797 
798 				fo = creat(target, s1.st_mode & MODEBITS);
799 				if (fo < 0) {
800 					/*
801 					 * If -f and creat() failed, unlink
802 					 * and try again.
803 					 */
804 					if (fflg) {
805 						(void) unlink(target);
806 						fo = creat(target,
807 						    s1.st_mode & MODEBITS);
808 					}
809 				}
810 				if (fo < 0) {
811 					(void) fprintf(stderr,
812 					    gettext("%s: cannot create %s: "),
813 					    cmd, target);
814 					perror("");
815 					(void) close(fi);
816 					return (1);
817 				} else {
818 					/* stat the new file, its used below */
819 					(void) stat(target, &s2);
820 				}
821 
822 				/*
823 				 * Set target's permissions to the source
824 				 * before any copying so that any partially
825 				 * copied file will have the source's
826 				 * permissions (at most) or umask permissions
827 				 * whichever is the most restrictive.
828 				 *
829 				 * ACL for regular files
830 				 */
831 
832 				if (pflg || mve) {
833 					(void) chmod(target, FMODE(s1));
834 					if (s1acl != NULL) {
835 						if ((acl_set(target,
836 						    s1acl)) < 0) {
837 							error++;
838 							(void) fprintf(stderr,
839 							    gettext("%s: "
840 							    "Failed to set "
841 							    "acl entries "
842 							    "on %s\n"), cmd,
843 							    target);
844 							acl_free(s1acl);
845 							s1acl = NULL;
846 							/*
847 							 * else: silent and
848 							 * continue
849 							 */
850 						}
851 					}
852 				}
853 
854 				if (fstat(fi, &s1) < 0) {
855 					(void) fprintf(stderr,
856 					    gettext("%s: cannot access %s\n"),
857 					    cmd, source);
858 					return (1);
859 				}
860 				if (IDENTICAL(s1, s2)) {
861 					(void) fprintf(stderr,
862 					    gettext(
863 					    "%s: %s and %s are identical\n"),
864 					    cmd, source, target);
865 					return (1);
866 				}
867 
868 				if (writefile(fi, fo, source, target, NULL,
869 				    NULL, &s1, &s2) != 0) {
870 					return (1);
871 				}
872 
873 				(void) close(fi);
874 				if (close(fo) < 0) {
875 					Perror2(target, "write");
876 					return (1);
877 				}
878 			}
879 			/* Copy regular extended attributes */
880 			if (pflg || atflg || mve || saflg) {
881 				attret = copyattributes(source, target);
882 				if (attret != 0 && !attrsilent) {
883 					(void) fprintf(stderr, gettext(
884 					    "%s: Failed to preserve"
885 					    " extended attributes of file"
886 					    " %s\n"), cmd, source);
887 				}
888 				/* Copy extended system attributes */
889 				if (pflg || mve || saflg)
890 					sattret = copy_sysattr(source, target);
891 				if (mve && attret != 0) {
892 					(void) unlink(target);
893 					return (1);
894 				}
895 				if (attrsilent) {
896 					attret = 0;
897 				}
898 			}
899 
900 			/*
901 			 * XPG4: the write system call will clear setgid
902 			 * and setuid bits, so set them again.
903 			 */
904 			if (pflg || mve) {
905 				if ((ret = chg_mode(target, UID(s1), GID(s1),
906 				    FMODE(s1))) > 0)
907 					return (1);
908 				/*
909 				 * Reapply ACL, since chmod may have
910 				 * altered ACL
911 				 */
912 				if (s1acl != NULL) {
913 					if ((acl_set(target, s1acl)) < 0) {
914 						error++;
915 						(void) fprintf(stderr,
916 						    gettext("%s: Failed to "
917 						    "set acl entries "
918 						    "on %s\n"), cmd, target);
919 						/*
920 						 * else: silent and
921 						 * continue
922 						 */
923 					}
924 				}
925 				if ((ret = chg_time(target, s1)) > 0)
926 					return (1);
927 			}
928 			if (cpy) {
929 				if (error != 0 || attret != 0 || sattret != 0)
930 					return (1);
931 				return (0);
932 			}
933 			goto cleanup;
934 		}
935 		(void) fprintf(stderr,
936 		    gettext("%s: %s: unknown file type 0x%x\n"), cmd,
937 		    source, (s1.st_mode & S_IFMT));
938 		return (1);
939 
940 cleanup:
941 		if (unlink(source) < 0) {
942 			(void) unlink(target);
943 			(void) fprintf(stderr,
944 			    gettext("%s: cannot unlink %s: "),
945 			    cmd, source);
946 			perror("");
947 			return (1);
948 		}
949 		if (error != 0 || attret != 0 || sattret != 0)
950 			return (1);
951 		return (ret);
952 	}
953 	/*NOTREACHED*/
954 	return (ret);
955 }
956 
957 /*
958  * create_tnode()
959  *
960  * Create a node for use with the search tree which contains the
961  * inode information (device id and inode number).
962  *
963  * Input
964  *	dev	- device id
965  *	ino	- inode number
966  *
967  * Output
968  *	tnode	- NULL on error, otherwise returns a tnode structure
969  *		  which contains the input device id and inode number.
970  */
971 static tree_node_t *
972 create_tnode(dev_t dev, ino_t ino)
973 {
974 	tree_node_t	*tnode;
975 
976 	if ((tnode = (tree_node_t *)malloc(sizeof (tree_node_t))) != NULL) {
977 		tnode->node_dev = dev;
978 		tnode->node_ino = ino;
979 	}
980 
981 	return (tnode);
982 }
983 
984 static int
985 chkfiles(char *source, char **to)
986 {
987 	char	*buf = (char *)NULL;
988 	int	(*statf)() = (cpy &&
989 	    !(Pflg || (Hflg && !cmdarg))) ? stat : lstat;
990 	char    *target = *to;
991 	int	error;
992 
993 	/*
994 	 * Make sure source file exists.
995 	 */
996 	if ((*statf)(source, &s1) < 0) {
997 		/*
998 		 * Keep the old error message except when someone tries to
999 		 * mv/cp/ln a symbolic link that has a trailing slash and
1000 		 * points to a file.
1001 		 */
1002 		if (errno == ENOTDIR)
1003 			(void) fprintf(stderr, "%s: %s: %s\n", cmd, source,
1004 			    strerror(errno));
1005 		else
1006 			(void) fprintf(stderr,
1007 			    gettext("%s: cannot access %s\n"), cmd, source);
1008 		return (1);
1009 	}
1010 
1011 	/*
1012 	 * Get ACL info: don't bother with ln or cp/mv'ing symlinks
1013 	 */
1014 	if (!lnk && !ISLNK(s1)) {
1015 		if (s1acl != NULL) {
1016 			acl_free(s1acl);
1017 			s1acl = NULL;
1018 		}
1019 		if ((error = acl_get(source, ACL_NO_TRIVIAL, &s1acl)) != 0) {
1020 			(void) fprintf(stderr,
1021 			    "%s: failed to get acl entries: %s\n", source,
1022 			    acl_strerror(error));
1023 			return (1);
1024 		}
1025 		/* else: just permission bits */
1026 	}
1027 
1028 	/*
1029 	 * If stat fails, then the target doesn't exist,
1030 	 * we will create a new target with default file type of regular.
1031 	 */
1032 
1033 	FTYPE(s2) = S_IFREG;
1034 	targetexists = 0;
1035 	if ((*statf)(target, &s2) >= 0) {
1036 		if (ISLNK(s2))
1037 			(void) stat(target, &s2);
1038 		/*
1039 		 * If target is a directory,
1040 		 * make complete name of new file
1041 		 * within that directory.
1042 		 */
1043 		if (ISDIR(s2)) {
1044 			size_t len;
1045 
1046 			len = strlen(target) + strlen(dname(source)) + 4;
1047 			if ((buf = (char *)malloc(len)) == NULL) {
1048 				(void) fprintf(stderr,
1049 				    gettext("%s: Insufficient memory to "
1050 				    "%s %s\n "), cmd, cmd, source);
1051 				exit(3);
1052 			}
1053 			(void) snprintf(buf, len, "%s/%s",
1054 			    target, dname(source));
1055 			*to = target = buf;
1056 		}
1057 
1058 		if ((*statf)(target, &s2) >= 0) {
1059 			int overwrite	= FALSE;
1060 			int override	= FALSE;
1061 
1062 			targetexists++;
1063 			if (cpy || mve) {
1064 				/*
1065 				 * For cp and mv, it is an error if the
1066 				 * source and target are the same file.
1067 				 * Check for the same inode and file
1068 				 * system, but don't check for the same
1069 				 * absolute pathname because it is an
1070 				 * error when the source and target are
1071 				 * hard links to the same file.
1072 				 */
1073 				if (IDENTICAL(s1, s2)) {
1074 					(void) fprintf(stderr,
1075 					    gettext(
1076 					    "%s: %s and %s are identical\n"),
1077 					    cmd, source, target);
1078 					if (buf != NULL)
1079 						free(buf);
1080 					return (1);
1081 				}
1082 			}
1083 			if (lnk) {
1084 				/*
1085 				 * For ln, it is an error if the source and
1086 				 * target are identical files (same inode,
1087 				 * same file system, and filenames resolve
1088 				 * to same absolute pathname).
1089 				 */
1090 				if (!chk_different(source, target)) {
1091 					if (buf != NULL)
1092 						free(buf);
1093 					return (1);
1094 				}
1095 			}
1096 			if (lnk && !silent) {
1097 				(void) fprintf(stderr,
1098 				    gettext("%s: %s: File exists\n"),
1099 				    cmd, target);
1100 				if (buf != NULL)
1101 					free(buf);
1102 				return (1);
1103 			}
1104 
1105 			/*
1106 			 * overwrite:
1107 			 * If the user does not have access to
1108 			 * the target, ask ----if it is not
1109 			 * silent and user invoked command
1110 			 * interactively.
1111 			 *
1112 			 * override:
1113 			 * If not silent, and stdin is a terminal, and
1114 			 * there's no write access, and the file isn't a
1115 			 * symbolic link, ask for permission.
1116 			 *
1117 			 * XPG4: both overwrite and override:
1118 			 * ask only one question.
1119 			 *
1120 			 * TRANSLATION_NOTE - The following messages will
1121 			 * contain the first character of the strings for
1122 			 * "yes" and "no" defined in the file
1123 			 * "nl_langinfo.po".  After substitution, the
1124 			 * message will appear as follows:
1125 			 *	<cmd>: overwrite <filename> (y/n)?
1126 			 * where <cmd> is the name of the command
1127 			 * (cp, mv) and <filename> is the destination file
1128 			 */
1129 
1130 
1131 			overwrite = iflg && !silent && use_stdin();
1132 			override = !cpy && (access(target, 2) < 0) &&
1133 			    !silent && use_stdin() && !ISLNK(s2);
1134 
1135 			if (overwrite && override) {
1136 				(void) fprintf(stderr,
1137 				    gettext("%s: overwrite %s and override "
1138 				    "protection %o (%s/%s)? "), cmd, target,
1139 				    FMODE(s2) & MODEBITS, yesstr, nostr);
1140 				if (yes() == 0) {
1141 					if (buf != NULL)
1142 						free(buf);
1143 					return (2);
1144 				}
1145 			} else if (overwrite && ISREG(s2)) {
1146 				(void) fprintf(stderr,
1147 				    gettext("%s: overwrite %s (%s/%s)? "),
1148 				    cmd, target, yesstr, nostr);
1149 				if (yes() == 0) {
1150 					if (buf != NULL)
1151 						free(buf);
1152 					return (2);
1153 				}
1154 			} else if (override) {
1155 				(void) fprintf(stderr,
1156 				    gettext("%s: %s: override protection "
1157 				    /*CSTYLED*/
1158 				    "%o (%s/%s)? "),
1159 				    /*CSTYLED*/
1160 				    cmd, target, FMODE(s2) & MODEBITS,
1161 				    yesstr, nostr);
1162 				if (yes() == 0) {
1163 					if (buf != NULL)
1164 						free(buf);
1165 					return (2);
1166 				}
1167 			}
1168 
1169 			if (lnk && unlink(target) < 0) {
1170 				(void) fprintf(stderr,
1171 				    gettext("%s: cannot unlink %s: "),
1172 				    cmd, target);
1173 				perror("");
1174 				return (1);
1175 			}
1176 		}
1177 	}
1178 	return (0);
1179 }
1180 
1181 /*
1182  * check whether source and target are different
1183  * return 1 when they are different
1184  * return 0 when they are identical, or when unable to resolve a pathname
1185  */
1186 static int
1187 chk_different(char *source, char *target)
1188 {
1189 	char	rtarget[PATH_MAX], rsource[PATH_MAX];
1190 
1191 	if (IDENTICAL(s1, s2)) {
1192 		/*
1193 		 * IDENTICAL will be true for hard links, therefore
1194 		 * check whether the filenames are different
1195 		 */
1196 		if ((getrealpath(source, rsource) == 0) ||
1197 		    (getrealpath(target, rtarget) == 0)) {
1198 			return (0);
1199 		}
1200 		if (strncmp(rsource, rtarget, PATH_MAX) == 0) {
1201 			(void) fprintf(stderr, gettext(
1202 			    "%s: %s and %s are identical\n"),
1203 			    cmd, source, target);
1204 			return (0);
1205 		}
1206 	}
1207 	return (1);
1208 }
1209 
1210 /*
1211  * get real path (resolved absolute pathname)
1212  * return 1 on success, 0 on failure
1213  */
1214 static int
1215 getrealpath(char *path, char *rpath)
1216 {
1217 	if (realpath(path, rpath) == NULL) {
1218 		int	errno_save = errno;
1219 		(void) fprintf(stderr, gettext(
1220 		    "%s: cannot resolve path %s: "), cmd, path);
1221 		errno = errno_save;
1222 		perror("");
1223 		return (0);
1224 	}
1225 	return (1);
1226 }
1227 
1228 static int
1229 rcopy(char *from, char *to)
1230 {
1231 	DIR *fold = opendir(from);
1232 	struct dirent *dp;
1233 	struct stat statb, s1save;
1234 	int errs = 0;
1235 	char fromname[PATH_MAX];
1236 
1237 	if (fold == 0 || ((pflg || mve) && fstat(fold->dd_fd, &statb) < 0)) {
1238 		Perror(from);
1239 		return (1);
1240 	}
1241 	if (pflg || mve) {
1242 		/*
1243 		 * Save s1 (stat information for source dir) so that
1244 		 * mod and access times can be reserved during "cp -p"
1245 		 * or mv, since s1 gets overwritten.
1246 		 */
1247 		s1save = s1;
1248 	}
1249 	for (;;) {
1250 		dp = readdir(fold);
1251 		if (dp == 0) {
1252 			(void) closedir(fold);
1253 			if (pflg || mve)
1254 				return (chg_time(to, s1save) + errs);
1255 			return (errs);
1256 		}
1257 		if (dp->d_ino == 0)
1258 			continue;
1259 		if ((strcmp(dp->d_name, ".") == 0) ||
1260 		    (strcmp(dp->d_name, "..") == 0))
1261 			continue;
1262 		if (strlen(from)+1+strlen(dp->d_name) >=
1263 		    sizeof (fromname) - 1) {
1264 			(void) fprintf(stderr,
1265 			    gettext("%s : %s/%s: Name too long\n"),
1266 			    cmd, from, dp->d_name);
1267 			errs++;
1268 			continue;
1269 		}
1270 		(void) snprintf(fromname, sizeof (fromname),
1271 		    "%s/%s", from, dp->d_name);
1272 		errs += cpymve(fromname, to);
1273 	}
1274 }
1275 
1276 static char *
1277 dname(char *name)
1278 {
1279 	register char *p;
1280 
1281 	/*
1282 	 * Return just the file name given the complete path.
1283 	 * Like basename(1).
1284 	 */
1285 
1286 	p = name;
1287 
1288 	/*
1289 	 * While there are characters left,
1290 	 * set name to start after last
1291 	 * delimiter.
1292 	 */
1293 
1294 	while (*p)
1295 		if (*p++ == DELIM && *p)
1296 			name = p;
1297 	return (name);
1298 }
1299 
1300 static void
1301 usage(void)
1302 {
1303 	/*
1304 	 * Display usage message.
1305 	 */
1306 
1307 	if (mve) {
1308 		(void) fprintf(stderr, gettext(
1309 		    "Usage: mv [-f] [-i] f1 f2\n"
1310 		    "       mv [-f] [-i] f1 ... fn d1\n"
1311 		    "       mv [-f] [-i] d1 d2\n"));
1312 	} else if (lnk) {
1313 #ifdef XPG4
1314 		(void) fprintf(stderr, gettext(
1315 		    "Usage: ln [-f] [-s] f1 [f2]\n"
1316 		    "       ln [-f] [-s] f1 ... fn d1\n"
1317 		    "       ln [-f] -s d1 d2\n"));
1318 #else
1319 		(void) fprintf(stderr, gettext(
1320 		    "Usage: ln [-f] [-n] [-s] f1 [f2]\n"
1321 		    "       ln [-f] [-n] [-s] f1 ... fn d1\n"
1322 		    "       ln [-f] [-n] -s d1 d2\n"));
1323 #endif
1324 	} else if (cpy) {
1325 		(void) fprintf(stderr, gettext(
1326 		    "Usage: cp [-f] [-i] [-p] [-@] [-/] f1 f2\n"
1327 		    "       cp [-f] [-i] [-p] [-@] [-/] f1 ... fn d1\n"
1328 		    "       cp -r|-R [-H|-L|-P] [-f] [-i] [-p] [-@] [-/] "
1329 		    "d1 ... dn-1 dn\n"));
1330 	}
1331 	exit(2);
1332 }
1333 
1334 /*
1335  * chg_time()
1336  *
1337  * Try to preserve modification and access time.
1338  * If 1) pflg is not set, or 2) pflg is set and this is the Solaris version,
1339  * don't report a utimensat() failure.
1340  * If this is the XPG4 version and utimensat fails, if 1) pflg is set (cp -p)
1341  * or 2) we are doing a mv, print a diagnostic message; arrange for a non-zero
1342  * exit status only if pflg is set.
1343  * utimensat(2) is being used to achieve granularity in nanoseconds
1344  * (if supported by the underlying file system) while setting file times.
1345  */
1346 static int
1347 chg_time(char *to, struct stat ss)
1348 {
1349 	struct timespec times[2];
1350 	int rc;
1351 
1352 	times[0] = ss.st_atim;
1353 	times[1] = ss.st_mtim;
1354 
1355 	rc = utimensat(AT_FDCWD, to, times,
1356 	    ISLNK(s1) ? AT_SYMLINK_NOFOLLOW : 0);
1357 #ifdef XPG4
1358 	if ((pflg || mve) && rc != 0) {
1359 		(void) fprintf(stderr,
1360 		    gettext("%s: cannot set times for %s: "), cmd, to);
1361 		perror("");
1362 		if (pflg)
1363 			return (1);
1364 	}
1365 #endif
1366 
1367 	return (0);
1368 
1369 }
1370 
1371 /*
1372  * chg_mode()
1373  *
1374  * This function is called upon "cp -p" or mv across filesystems.
1375  *
1376  * Try to preserve the owner and group id.  If chown() fails,
1377  * only print a diagnostic message if doing a mv in the XPG4 version;
1378  * try to clear S_ISUID and S_ISGID bits in the target.  If unable to clear
1379  * S_ISUID and S_ISGID bits, print a diagnostic message and arrange for a
1380  * non-zero exit status because this is a security violation.
1381  * Try to preserve permissions.
1382  * If this is the XPG4 version and chmod() fails, print a diagnostic message
1383  * and arrange for a non-zero exit status.
1384  * If this is the Solaris version and chmod() fails, do not print a
1385  * diagnostic message or exit with a non-zero value.
1386  */
1387 static int
1388 chg_mode(char *target, uid_t uid, gid_t gid, mode_t mode)
1389 {
1390 	int clearflg = 0; /* controls message printed upon chown() error */
1391 	struct stat st;
1392 
1393 	/* Don't change mode if target is symlink */
1394 	if (lstat(target, &st) == 0 && ISLNK(st))
1395 		return (0);
1396 
1397 	if (chown(target, uid, gid) != 0) {
1398 #ifdef XPG4
1399 		if (mve) {
1400 			(void) fprintf(stderr, gettext("%s: cannot change"
1401 			    " owner and group of %s: "), cmd, target);
1402 			perror("");
1403 		}
1404 #endif
1405 		if (mode & (S_ISUID | S_ISGID)) {
1406 			/* try to clear S_ISUID and S_ISGID */
1407 			mode &= ~S_ISUID & ~S_ISGID;
1408 			++clearflg;
1409 		}
1410 	}
1411 	if (chmod(target, mode) != 0) {
1412 		if (clearflg) {
1413 			(void) fprintf(stderr, gettext(
1414 			    "%s: cannot clear S_ISUID and S_ISGID bits in"
1415 			    " %s: "), cmd, target);
1416 			perror("");
1417 			/* cp -p should get non-zero exit; mv should not */
1418 			if (pflg)
1419 				return (1);
1420 		}
1421 #ifdef XPG4
1422 		else {
1423 			(void) fprintf(stderr, gettext(
1424 			"%s: cannot set permissions for %s: "), cmd, target);
1425 			perror("");
1426 			/* cp -p should get non-zero exit; mv should not */
1427 			if (pflg)
1428 				return (1);
1429 		}
1430 #endif
1431 	}
1432 	return (0);
1433 
1434 }
1435 
1436 static void
1437 Perror(char *s)
1438 {
1439 	char buf[PATH_MAX + 10];
1440 
1441 	(void) snprintf(buf, sizeof (buf), "%s: %s", cmd, s);
1442 	perror(buf);
1443 }
1444 
1445 static void
1446 Perror2(char *s1, char *s2)
1447 {
1448 	char buf[PATH_MAX + 20];
1449 
1450 	(void) snprintf(buf, sizeof (buf), "%s: %s: %s",
1451 	    cmd, gettext(s1), gettext(s2));
1452 	perror(buf);
1453 }
1454 
1455 /*
1456  * used for cp -R and for mv across file systems
1457  */
1458 static int
1459 copydir(char *source, char *target)
1460 {
1461 	int ret, attret = 0;
1462 	int sattret = 0;
1463 	int pret = 0;		/* need separate flag if -p is specified */
1464 	mode_t	fixmode = (mode_t)0;	/* cleanup mode after copy */
1465 	struct stat s1save;
1466 	acl_t  *s1acl_save;
1467 	int error = 0;
1468 
1469 	s1acl_save = NULL;
1470 
1471 	if (cpy && !rflg) {
1472 		(void) fprintf(stderr,
1473 		    gettext("%s: %s: is a directory\n"), cmd, source);
1474 		return (1);
1475 	}
1476 
1477 	if (stat(target, &s2) < 0) {
1478 		if (mkdir(target, (s1.st_mode & MODEBITS)) < 0) {
1479 			(void) fprintf(stderr, "%s: ", cmd);
1480 			perror(target);
1481 			return (1);
1482 		}
1483 		if (stat(target, &s2) == 0) {
1484 			fixmode = s2.st_mode;
1485 		} else {
1486 			fixmode = s1.st_mode;
1487 		}
1488 		(void) chmod(target, ((fixmode & MODEBITS) | S_IRWXU));
1489 	} else if (!(ISDIR(s2))) {
1490 		(void) fprintf(stderr,
1491 		    gettext("%s: %s: not a directory.\n"), cmd, target);
1492 		return (1);
1493 	}
1494 	if (pflg || mve) {
1495 		/*
1496 		 * Save s1 (stat information for source dir) and acl info,
1497 		 * if any, so that ownership, modes, times, and acl's can
1498 		 * be reserved during "cp -p" or mv.
1499 		 * s1 gets overwritten when doing the recursive copy.
1500 		 */
1501 		s1save = s1;
1502 		if (s1acl != NULL) {
1503 			s1acl_save = acl_dup(s1acl);
1504 			if (s1acl_save == NULL) {
1505 				(void) fprintf(stderr, gettext("%s: "
1506 				    "Insufficient memory to save acl"
1507 				    " entry\n"), cmd);
1508 				if (pflg)
1509 					return (1);
1510 
1511 			}
1512 #ifdef XPG4
1513 			else {
1514 				(void) fprintf(stderr, gettext("%s: "
1515 				    "Insufficient memory to save acl"
1516 				    " entry\n"), cmd);
1517 				if (pflg)
1518 					return (1);
1519 			}
1520 #endif
1521 		}
1522 	}
1523 
1524 	ret = rcopy(source, target);
1525 
1526 	/*
1527 	 * Once we created a directory, go ahead and set
1528 	 * its attributes, e.g. acls and time. The info
1529 	 * may get overwritten if we continue traversing
1530 	 * down the tree.
1531 	 *
1532 	 * ACL for directory
1533 	 */
1534 	if (pflg || mve) {
1535 		if ((pret = chg_mode(target, UID(s1save), GID(s1save),
1536 		    FMODE(s1save))) == 0)
1537 			pret = chg_time(target, s1save);
1538 		ret += pret;
1539 		if (s1acl_save != NULL) {
1540 			if (acl_set(target, s1acl_save) < 0) {
1541 				error++;
1542 #ifdef XPG4
1543 				if (pflg || mve) {
1544 #else
1545 				if (pflg) {
1546 #endif
1547 					(void) fprintf(stderr, gettext(
1548 					    "%s: failed to set acl entries "
1549 					    "on %s\n"), cmd, target);
1550 					if (pflg) {
1551 						acl_free(s1acl_save);
1552 						s1acl_save = NULL;
1553 						ret++;
1554 					}
1555 				}
1556 				/* else: silent and continue */
1557 			}
1558 			acl_free(s1acl_save);
1559 			s1acl_save = NULL;
1560 		}
1561 	} else if (fixmode != (mode_t)0)
1562 		(void) chmod(target, fixmode & MODEBITS);
1563 
1564 	if (pflg || atflg || mve || saflg) {
1565 		attret = copyattributes(source, target);
1566 		if (!attrsilent && attret != 0) {
1567 			(void) fprintf(stderr, gettext("%s: Failed to preserve"
1568 			    " extended attributes of directory"
1569 			    " %s\n"), cmd, source);
1570 		} else {
1571 			/*
1572 			 * Otherwise ignore failure.
1573 			 */
1574 			attret = 0;
1575 		}
1576 		/* Copy extended system attributes */
1577 		if (pflg || mve || saflg) {
1578 			sattret = copy_sysattr(source, target);
1579 			if (sattret != 0) {
1580 				(void) fprintf(stderr, gettext(
1581 				    "%s: Failed to preserve "
1582 				    "extended system attributes "
1583 				    "of directory %s\n"), cmd, source);
1584 			}
1585 		}
1586 	}
1587 	if (attret != 0 || sattret != 0 || error != 0)
1588 		return (1);
1589 	return (ret);
1590 }
1591 
1592 static int
1593 copyspecial(char *target)
1594 {
1595 	int ret = 0;
1596 
1597 	if (mknod(target, s1.st_mode, s1.st_rdev) != 0) {
1598 		(void) fprintf(stderr, gettext(
1599 		    "cp: cannot create special file %s: "), target);
1600 		perror("");
1601 		return (1);
1602 	}
1603 
1604 	if (pflg) {
1605 		if ((ret = chg_mode(target, UID(s1), GID(s1), FMODE(s1))) == 0)
1606 			ret = chg_time(target, s1);
1607 	}
1608 
1609 	return (ret);
1610 }
1611 
1612 static int
1613 use_stdin(void)
1614 {
1615 #ifdef XPG4
1616 	return (1);
1617 #else
1618 	return (isatty(fileno(stdin)));
1619 #endif
1620 }
1621 
1622 /* Copy non-system extended attributes */
1623 
1624 static int
1625 copyattributes(char *source, char *target)
1626 {
1627 	struct dirent *dp;
1628 	int error = 0;
1629 	int aclerror;
1630 	mode_t mode;
1631 	int clearflg = 0;
1632 	acl_t *xacl = NULL;
1633 	acl_t *attrdiracl = NULL;
1634 	struct timespec times[2];
1635 
1636 
1637 	if (pathconf(source,  _PC_XATTR_EXISTS) != 1)
1638 		return (0);
1639 
1640 	if (pathconf(target, _PC_XATTR_ENABLED) != 1) {
1641 		if (!attrsilent) {
1642 			(void) fprintf(stderr,
1643 			    gettext(
1644 			    "%s: cannot preserve extended attributes, "
1645 			    "operation not supported on file"
1646 			    " %s\n"), cmd, target);
1647 		}
1648 		return (1);
1649 	}
1650 	if (open_source(source) != 0)
1651 		return (1);
1652 	if (open_target_srctarg_attrdirs(source, target) !=  0)
1653 		return (1);
1654 	if (open_attrdirp(source) != 0)
1655 		return (1);
1656 
1657 	if (pflg || mve) {
1658 		if (fchmod(targetdirfd, attrdir.st_mode) == -1) {
1659 			if (!attrsilent) {
1660 				(void) fprintf(stderr,
1661 				    gettext("%s: failed to set file mode"
1662 				    " correctly on attribute directory of"
1663 				    " file %s: "), cmd, target);
1664 				perror("");
1665 				++error;
1666 			}
1667 		}
1668 
1669 		if (fchown(targetdirfd, attrdir.st_uid, attrdir.st_gid) == -1) {
1670 			if (!attrsilent) {
1671 				(void) fprintf(stderr,
1672 				    gettext("%s: failed to set file"
1673 				    " ownership correctly on attribute"
1674 				    " directory of file %s: "), cmd, target);
1675 				perror("");
1676 				++error;
1677 			}
1678 		}
1679 		/*
1680 		 * Now that we are the owner we can update st_ctime by calling
1681 		 * utimensat.
1682 		 */
1683 		times[0] = attrdir.st_atim;
1684 		times[1] = attrdir.st_mtim;
1685 		if (utimensat(targetdirfd, ".", times, 0) < 0) {
1686 			if (!attrsilent) {
1687 				(void) fprintf(stderr,
1688 				    gettext("%s: cannot set attribute times"
1689 				    " for %s: "), cmd, target);
1690 				perror("");
1691 				++error;
1692 			}
1693 		}
1694 
1695 		/*
1696 		 * Now set owner and group of attribute directory, implies
1697 		 * changing the ACL of the hidden attribute directory first.
1698 		 */
1699 		if ((aclerror = facl_get(sourcedirfd,
1700 		    ACL_NO_TRIVIAL, &attrdiracl)) != 0) {
1701 			if (!attrsilent) {
1702 				(void) fprintf(stderr, gettext(
1703 				    "%s: failed to get acl entries of"
1704 				    " attribute directory for"
1705 				    " %s : %s\n"), cmd,
1706 				    source, acl_strerror(aclerror));
1707 				++error;
1708 			}
1709 		}
1710 
1711 		if (attrdiracl) {
1712 			if (facl_set(targetdirfd, attrdiracl) != 0) {
1713 				if (!attrsilent) {
1714 					(void) fprintf(stderr, gettext(
1715 					"%s: failed to set acl entries"
1716 					" on attribute directory "
1717 					"for %s\n"), cmd, target);
1718 					++error;
1719 				}
1720 				acl_free(attrdiracl);
1721 				attrdiracl = NULL;
1722 			}
1723 		}
1724 	}
1725 
1726 	while ((dp = readdir(srcdirp)) != NULL) {
1727 		int ret;
1728 
1729 		if ((ret = traverse_attrfile(dp, source, target, 1)) == -1)
1730 			continue;
1731 		else if (ret > 0) {
1732 			++error;
1733 			goto out;
1734 		}
1735 
1736 		if (pflg || mve) {
1737 			if ((aclerror = facl_get(srcattrfd,
1738 			    ACL_NO_TRIVIAL, &xacl)) != 0) {
1739 				if (!attrsilent) {
1740 					(void) fprintf(stderr, gettext(
1741 					    "%s: failed to get acl entries of"
1742 					    " attribute %s for"
1743 					    " %s: %s"), cmd, dp->d_name,
1744 					    source, acl_strerror(aclerror));
1745 					++error;
1746 				}
1747 			}
1748 		}
1749 
1750 		/*
1751 		 * preserve ACL
1752 		 */
1753 		if ((pflg || mve) && xacl != NULL) {
1754 			if ((facl_set(targattrfd, xacl)) < 0) {
1755 				if (!attrsilent) {
1756 					(void) fprintf(stderr, gettext(
1757 					    "%s: failed to set acl entries on"
1758 					    " attribute %s for"
1759 					    "%s\n"), cmd, dp->d_name, target);
1760 					++error;
1761 				}
1762 				acl_free(xacl);
1763 				xacl = NULL;
1764 			}
1765 		}
1766 
1767 		if (writefile(srcattrfd, targattrfd, source, target,
1768 		    dp->d_name, dp->d_name, &s3, &s4) != 0) {
1769 			if (!attrsilent) {
1770 				++error;
1771 			}
1772 			goto next;
1773 		}
1774 
1775 		if (pflg || mve) {
1776 			mode = FMODE(s3);
1777 
1778 			if (fchown(targattrfd, UID(s3), GID(s3)) != 0) {
1779 				if (!attrsilent) {
1780 					(void) fprintf(stderr,
1781 					    gettext("%s: cannot change"
1782 					    " owner and group of"
1783 					    " attribute %s for" " file"
1784 					    " %s: "), cmd, dp->d_name, target);
1785 					perror("");
1786 					++error;
1787 				}
1788 				if (mode & (S_ISUID | S_ISGID)) {
1789 					/* try to clear S_ISUID and S_ISGID */
1790 					mode &= ~S_ISUID & ~S_ISGID;
1791 					++clearflg;
1792 				}
1793 			}
1794 			times[0] = s3.st_atim;
1795 			times[1] = s3.st_mtim;
1796 			if (utimensat(targetdirfd, dp->d_name, times, 0) < 0) {
1797 				if (!attrsilent) {
1798 					(void) fprintf(stderr,
1799 					    gettext("%s: cannot set attribute"
1800 					    " times for %s: "), cmd, target);
1801 					perror("");
1802 					++error;
1803 				}
1804 			}
1805 			if (fchmod(targattrfd, mode) != 0) {
1806 				if (clearflg) {
1807 					(void) fprintf(stderr, gettext(
1808 					    "%s: cannot clear S_ISUID and "
1809 					    "S_ISGID bits in attribute %s"
1810 					    " for file"
1811 					    " %s: "), cmd, dp->d_name, target);
1812 				} else {
1813 					if (!attrsilent) {
1814 						(void) fprintf(stderr,
1815 						    gettext(
1816 				"%s: cannot set permissions of attribute"
1817 				" %s for %s: "), cmd, dp->d_name, target);
1818 						perror("");
1819 						++error;
1820 					}
1821 				}
1822 			}
1823 			if (xacl && ((facl_set(targattrfd, xacl)) < 0)) {
1824 				if (!attrsilent) {
1825 					(void) fprintf(stderr, gettext(
1826 					    "%s: failed to set acl entries on"
1827 					    " attribute %s for"
1828 					    "%s\n"), cmd, dp->d_name, target);
1829 					++error;
1830 				}
1831 				acl_free(xacl);
1832 				xacl = NULL;
1833 			}
1834 		}
1835 next:
1836 		if (xacl != NULL) {
1837 			acl_free(xacl);
1838 			xacl = NULL;
1839 		}
1840 		if (srcattrfd != -1)
1841 			(void) close(srcattrfd);
1842 		if (targattrfd != -1)
1843 			(void) close(targattrfd);
1844 		srcattrfd = targattrfd = -1;
1845 	}
1846 out:
1847 	if (xacl != NULL) {
1848 		acl_free(xacl);
1849 		xacl = NULL;
1850 	}
1851 	if (attrdiracl != NULL) {
1852 		acl_free(attrdiracl);
1853 		attrdiracl = NULL;
1854 	}
1855 
1856 	if (!saflg && !pflg && !mve)
1857 		close_all();
1858 	return (error == 0 ? 0 : 1);
1859 }
1860 
1861 /* Copy extended system attributes from source to target */
1862 
1863 static int
1864 copy_sysattr(char *source, char *target)
1865 {
1866 	struct dirent	*dp;
1867 	nvlist_t	*response;
1868 	int		error = 0;
1869 	int		target_sa_support = 0;
1870 
1871 	if (sysattr_support(source, _PC_SATTR_EXISTS) != 1)
1872 		return (0);
1873 
1874 	if (open_source(source) != 0)
1875 		return (1);
1876 
1877 	/*
1878 	 * Gets non default extended system attributes from the
1879 	 * source file to copy to the target. The target has
1880 	 * the defaults set when its created and thus  no need
1881 	 * to copy the defaults.
1882 	 */
1883 	response = sysattr_list(cmd, srcfd, source);
1884 
1885 	if (sysattr_support(target, _PC_SATTR_ENABLED) != 1) {
1886 		if (response != NULL) {
1887 			(void) fprintf(stderr,
1888 			    gettext(
1889 			    "%s: cannot preserve extended system "
1890 			    "attribute, operation not supported on file"
1891 			    " %s\n"), cmd, target);
1892 			error++;
1893 			goto out;
1894 		}
1895 	} else {
1896 		target_sa_support = 1;
1897 	}
1898 
1899 	if (target_sa_support) {
1900 		if (srcdirp == NULL) {
1901 			if (open_target_srctarg_attrdirs(source,
1902 			    target) !=  0) {
1903 				error++;
1904 				goto out;
1905 			}
1906 			if (open_attrdirp(source) != 0) {
1907 				error++;
1908 				goto out;
1909 			}
1910 		} else {
1911 			rewind_attrdir(srcdirp);
1912 		}
1913 		while ((dp = readdir(srcdirp)) != NULL) {
1914 			nvlist_t	*res;
1915 			int		ret;
1916 
1917 			if ((ret = traverse_attrfile(dp, source, target,
1918 			    0)) == -1)
1919 				continue;
1920 			else if (ret > 0) {
1921 				++error;
1922 				goto out;
1923 			}
1924 			/*
1925 			 * Gets non default extended system attributes from the
1926 			 * attribute file to copy to the target. The target has
1927 			 * the defaults set when its created and thus  no need
1928 			 * to copy the defaults.
1929 			 */
1930 			if (dp->d_name != NULL) {
1931 				res = sysattr_list(cmd, srcattrfd, dp->d_name);
1932 				if (res == NULL)
1933 					goto next;
1934 
1935 			/*
1936 			 * Copy non default extended system attributes of named
1937 			 * attribute file.
1938 			 */
1939 				if (fsetattr(targattrfd,
1940 				    XATTR_VIEW_READWRITE, res) != 0) {
1941 					++error;
1942 					(void) fprintf(stderr, gettext("%s: "
1943 					    "Failed to copy extended system "
1944 					    "attributes from attribute file "
1945 					    "%s of %s to %s\n"), cmd,
1946 					    dp->d_name, source, target);
1947 				}
1948 			}
1949 next:
1950 			if (srcattrfd != -1)
1951 				(void) close(srcattrfd);
1952 			if (targattrfd != -1)
1953 				(void) close(targattrfd);
1954 			srcattrfd = targattrfd = -1;
1955 			if (res != NULL)
1956 				nvlist_free(res);
1957 		}
1958 	}
1959 	/* Copy source file non default extended system attributes to target */
1960 	if (target_sa_support && (response != NULL) &&
1961 	    (fsetattr(targfd, XATTR_VIEW_READWRITE, response)) != 0) {
1962 		++error;
1963 		(void) fprintf(stderr, gettext("%s: Failed to "
1964 		    "copy extended system attributes from "
1965 		    "%s to %s\n"), cmd, source, target);
1966 	}
1967 out:
1968 	if (response != NULL)
1969 		nvlist_free(response);
1970 	close_all();
1971 	return (error == 0 ? 0 : 1);
1972 }
1973 
1974 /* Open the source file */
1975 
1976 int
1977 open_source(char  *src)
1978 {
1979 	int	error = 0;
1980 
1981 	srcfd = -1;
1982 	if ((srcfd = open(src, O_RDONLY)) == -1) {
1983 		if (pflg && attrsilent) {
1984 			error++;
1985 			goto out;
1986 		}
1987 		if (!attrsilent) {
1988 			(void) fprintf(stderr,
1989 			    gettext("%s: cannot open file"
1990 			    " %s: "), cmd, src);
1991 			perror("");
1992 		}
1993 		++error;
1994 	}
1995 out:
1996 	if (error)
1997 		close_all();
1998 	return (error == 0 ? 0 : 1);
1999 }
2000 
2001 /* Open source attribute dir, target and target attribute dir. */
2002 
2003 int
2004 open_target_srctarg_attrdirs(char  *src, char *targ)
2005 {
2006 	int		error = 0;
2007 
2008 	targfd = sourcedirfd = targetdirfd = -1;
2009 
2010 	if ((targfd = open(targ, O_RDONLY)) == -1) {
2011 		if (pflg && attrsilent) {
2012 			error++;
2013 			goto out;
2014 		}
2015 		if (!attrsilent) {
2016 			(void) fprintf(stderr,
2017 			    gettext("%s: cannot open file"
2018 			    " %s: "), cmd, targ);
2019 			perror("");
2020 		}
2021 		++error;
2022 		goto out;
2023 	}
2024 
2025 	if ((sourcedirfd = openat(srcfd, ".", O_RDONLY|O_XATTR)) == -1) {
2026 		if (pflg && attrsilent) {
2027 			error++;
2028 			goto out;
2029 		}
2030 		if (!attrsilent) {
2031 			(void) fprintf(stderr,
2032 			    gettext("%s: cannot open attribute"
2033 			    " directory for %s: "), cmd, src);
2034 			perror("");
2035 		}
2036 		++error;
2037 		goto out;
2038 	}
2039 
2040 	if (fstat(sourcedirfd, &attrdir) == -1) {
2041 		if (pflg && attrsilent) {
2042 			error++;
2043 			goto out;
2044 		}
2045 
2046 		if (!attrsilent) {
2047 			(void) fprintf(stderr,
2048 			    gettext("%s: could not retrieve stat"
2049 			    " information for attribute directory"
2050 			    "of file %s: "), cmd, src);
2051 			perror("");
2052 		}
2053 		++error;
2054 		goto out;
2055 	}
2056 	if ((targetdirfd = openat(targfd, ".", O_RDONLY|O_XATTR)) == -1) {
2057 		if (pflg && attrsilent) {
2058 			error++;
2059 			goto out;
2060 		}
2061 		if (!attrsilent) {
2062 			(void) fprintf(stderr,
2063 			    gettext("%s: cannot open attribute"
2064 			    " directory for %s: "), cmd, targ);
2065 			perror("");
2066 		}
2067 		++error;
2068 	}
2069 out:
2070 	if (error)
2071 		close_all();
2072 	return (error == 0 ? 0 : 1);
2073 }
2074 
2075 int
2076 open_attrdirp(char *source)
2077 {
2078 	int tmpfd = -1;
2079 	int error = 0;
2080 
2081 	/*
2082 	 * dup sourcedirfd for use by fdopendir().
2083 	 * fdopendir will take ownership of given fd and will close
2084 	 * it when closedir() is called.
2085 	 */
2086 
2087 	if ((tmpfd = dup(sourcedirfd)) == -1) {
2088 		if (pflg && attrsilent) {
2089 			error++;
2090 			goto out;
2091 		}
2092 		if (!attrsilent) {
2093 			(void) fprintf(stderr,
2094 			    gettext(
2095 			    "%s: unable to dup attribute directory"
2096 			    " file descriptor for %s: "), cmd, source);
2097 			perror("");
2098 			++error;
2099 		}
2100 		goto out;
2101 	}
2102 	if ((srcdirp = fdopendir(tmpfd)) == NULL) {
2103 		if (pflg && attrsilent) {
2104 			error++;
2105 			goto out;
2106 		}
2107 		if (!attrsilent) {
2108 			(void) fprintf(stderr,
2109 			    gettext("%s: failed to open attribute"
2110 			    " directory for %s: "), cmd, source);
2111 			perror("");
2112 			++error;
2113 		}
2114 	}
2115 out:
2116 	if (error)
2117 		close_all();
2118 	return (error == 0 ? 0 : 1);
2119 }
2120 
2121 /* Skips through ., .., and system attribute 'view' files */
2122 int
2123 traverse_attrfile(struct dirent *dp, char *source, char *target, int  first)
2124 {
2125 	int		error = 0;
2126 
2127 	srcattrfd = targattrfd = -1;
2128 
2129 	if ((dp->d_name[0] == '.' && dp->d_name[1] == '\0') ||
2130 	    (dp->d_name[0] == '.' && dp->d_name[1] == '.' &&
2131 	    dp->d_name[2] == '\0') ||
2132 	    (sysattr_type(dp->d_name) == _RO_SATTR) ||
2133 	    (sysattr_type(dp->d_name) == _RW_SATTR))
2134 		return (-1);
2135 
2136 	if ((srcattrfd = openat(sourcedirfd, dp->d_name,
2137 	    O_RDONLY)) == -1) {
2138 		if (!attrsilent) {
2139 			(void) fprintf(stderr,
2140 			    gettext("%s: cannot open attribute %s on"
2141 			    " file %s: "), cmd, dp->d_name, source);
2142 			perror("");
2143 			++error;
2144 			goto out;
2145 		}
2146 	}
2147 
2148 	if (fstat(srcattrfd, &s3) < 0) {
2149 		if (!attrsilent) {
2150 			(void) fprintf(stderr,
2151 			    gettext("%s: could not stat attribute"
2152 			    " %s on file"
2153 			    " %s: "), cmd, dp->d_name, source);
2154 			perror("");
2155 			++error;
2156 		}
2157 		goto out;
2158 	}
2159 
2160 	if (first) {
2161 		(void) unlinkat(targetdirfd, dp->d_name, 0);
2162 		if ((targattrfd = openat(targetdirfd, dp->d_name,
2163 		    O_RDWR|O_CREAT|O_TRUNC, s3.st_mode & MODEBITS)) == -1) {
2164 			if (!attrsilent) {
2165 				(void) fprintf(stderr,
2166 				    gettext("%s: could not create attribute"
2167 				    " %s on file %s: "), cmd, dp->d_name,
2168 				    target);
2169 				perror("");
2170 				++error;
2171 			}
2172 			goto out;
2173 		}
2174 	} else {
2175 		if ((targattrfd = openat(targetdirfd, dp->d_name,
2176 		    O_RDONLY)) == -1) {
2177 			if (!attrsilent) {
2178 				(void) fprintf(stderr,
2179 				    gettext("%s: could not open attribute"
2180 				    " %s on file %s: "), cmd, dp->d_name,
2181 				    target);
2182 				perror("");
2183 				++error;
2184 			}
2185 			goto out;
2186 		}
2187 	}
2188 
2189 
2190 	if (fstat(targattrfd, &s4) < 0) {
2191 		if (!attrsilent) {
2192 			(void) fprintf(stderr,
2193 			    gettext("%s: could not stat attribute"
2194 			    " %s on file"
2195 			    " %s: "), cmd, dp->d_name, target);
2196 			perror("");
2197 			++error;
2198 		}
2199 	}
2200 
2201 out:
2202 	if (error) {
2203 		if (srcattrfd != -1)
2204 			(void) close(srcattrfd);
2205 		if (targattrfd != -1)
2206 			(void) close(targattrfd);
2207 		srcattrfd = targattrfd = -1;
2208 	}
2209 	return (error == 0 ? 0 :1);
2210 }
2211 
2212 void
2213 rewind_attrdir(DIR * sdp)
2214 {
2215 	int pwdfd;
2216 
2217 	pwdfd = open(".", O_RDONLY);
2218 	if ((pwdfd != -1) && (fchdir(sourcedirfd) == 0)) {
2219 		rewinddir(sdp);
2220 		(void) fchdir(pwdfd);
2221 		(void) close(pwdfd);
2222 	} else {
2223 		if (!attrsilent) {
2224 			(void) fprintf(stderr, gettext("%s: "
2225 			    "failed to rewind attribute dir\n"),
2226 			    cmd);
2227 		}
2228 	}
2229 }
2230 
2231 void
2232 close_all()
2233 {
2234 	if (srcattrfd != -1)
2235 		(void) close(srcattrfd);
2236 	if (targattrfd != -1)
2237 		(void) close(targattrfd);
2238 	if (sourcedirfd != -1)
2239 		(void) close(sourcedirfd);
2240 	if (targetdirfd != -1)
2241 		(void) close(targetdirfd);
2242 	if (srcdirp != NULL) {
2243 		(void) closedir(srcdirp);
2244 		srcdirp = NULL;
2245 	}
2246 	if (srcfd != -1)
2247 		(void) close(srcfd);
2248 	if (targfd != -1)
2249 		(void) close(targfd);
2250 }
2251