mirror of
git://git.sv.gnu.org/coreutils.git
synced 2026-04-10 14:13:31 +02:00
NULL is best for C as discussed at: https://bugs.gnu.org/66221#53 * bootstrap.conf: Remove dependency on nullptr. * s/nullptr/NULL/.
1274 lines
41 KiB
C
1274 lines
41 KiB
C
/* cp.c -- file copying (main routines)
|
|
Copyright (C) 1989-2026 Free Software Foundation, Inc.
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
Written by Torbjörn Granlund, David MacKenzie, and Jim Meyering. */
|
|
|
|
#include <config.h>
|
|
#include <stdio.h>
|
|
#include <sys/types.h>
|
|
#include <getopt.h>
|
|
#include <selinux/label.h>
|
|
|
|
#include "system.h"
|
|
#include "argmatch.h"
|
|
#include "assure.h"
|
|
#include "backupfile.h"
|
|
#include "copy.h"
|
|
#include "cp-hash.h"
|
|
#include "filenamecat.h"
|
|
#include "ignore-value.h"
|
|
#include "quote.h"
|
|
#include "stat-time.h"
|
|
#include "targetdir.h"
|
|
#include "utimens.h"
|
|
#include "acl.h"
|
|
|
|
/* The official name of this program (e.g., no 'g' prefix). */
|
|
#define PROGRAM_NAME "cp"
|
|
|
|
#define AUTHORS \
|
|
proper_name_lite ("Torbjorn Granlund", "Torbj\303\266rn Granlund"), \
|
|
proper_name ("David MacKenzie"), \
|
|
proper_name ("Jim Meyering")
|
|
|
|
/* Used by do_copy, make_dir_parents_private, and re_protect
|
|
to keep a list of leading directories whose protections
|
|
need to be fixed after copying. */
|
|
struct dir_attr
|
|
{
|
|
struct stat st;
|
|
bool restore_mode;
|
|
size_t slash_offset;
|
|
struct dir_attr *next;
|
|
};
|
|
|
|
/* For long options that have no equivalent short option, use a
|
|
non-character as a pseudo short option, starting with CHAR_MAX + 1. */
|
|
enum
|
|
{
|
|
ATTRIBUTES_ONLY_OPTION = CHAR_MAX + 1,
|
|
COPY_CONTENTS_OPTION,
|
|
DEBUG_OPTION,
|
|
NO_PRESERVE_ATTRIBUTES_OPTION,
|
|
PARENTS_OPTION,
|
|
PRESERVE_ATTRIBUTES_OPTION,
|
|
REFLINK_OPTION,
|
|
SPARSE_OPTION,
|
|
STRIP_TRAILING_SLASHES_OPTION,
|
|
UNLINK_DEST_BEFORE_OPENING,
|
|
KEEP_DIRECTORY_SYMLINK_OPTION
|
|
};
|
|
|
|
/* True if the kernel is SELinux enabled. */
|
|
static bool selinux_enabled;
|
|
|
|
/* If true, the command "cp x/e_file e_dir" uses "e_dir/x/e_file"
|
|
as its destination instead of the usual "e_dir/e_file." */
|
|
static bool parents_option = false;
|
|
|
|
/* Remove any trailing slashes from each SOURCE argument. */
|
|
static bool remove_trailing_slashes;
|
|
|
|
static char const *const sparse_type_string[] =
|
|
{
|
|
"never", "auto", "always", NULL
|
|
};
|
|
static enum Sparse_type const sparse_type[] =
|
|
{
|
|
SPARSE_NEVER, SPARSE_AUTO, SPARSE_ALWAYS
|
|
};
|
|
ARGMATCH_VERIFY (sparse_type_string, sparse_type);
|
|
|
|
static char const *const reflink_type_string[] =
|
|
{
|
|
"auto", "always", "never", NULL
|
|
};
|
|
static enum Reflink_type const reflink_type[] =
|
|
{
|
|
REFLINK_AUTO, REFLINK_ALWAYS, REFLINK_NEVER
|
|
};
|
|
ARGMATCH_VERIFY (reflink_type_string, reflink_type);
|
|
|
|
static char const *const update_type_string[] =
|
|
{
|
|
"all", "none", "none-fail", "older", NULL
|
|
};
|
|
static enum Update_type const update_type[] =
|
|
{
|
|
UPDATE_ALL, UPDATE_NONE, UPDATE_NONE_FAIL, UPDATE_OLDER,
|
|
};
|
|
ARGMATCH_VERIFY (update_type_string, update_type);
|
|
|
|
static struct option const long_opts[] =
|
|
{
|
|
{"archive", no_argument, NULL, 'a'},
|
|
{"attributes-only", no_argument, NULL, ATTRIBUTES_ONLY_OPTION},
|
|
{"backup", optional_argument, NULL, 'b'},
|
|
{"copy-contents", no_argument, NULL, COPY_CONTENTS_OPTION},
|
|
{"debug", no_argument, NULL, DEBUG_OPTION},
|
|
{"dereference", no_argument, NULL, 'L'},
|
|
{"force", no_argument, NULL, 'f'},
|
|
{"interactive", no_argument, NULL, 'i'},
|
|
{"link", no_argument, NULL, 'l'},
|
|
{"no-clobber", no_argument, NULL, 'n'}, /* Deprecated. */
|
|
{"no-dereference", no_argument, NULL, 'P'},
|
|
{"no-preserve", required_argument, NULL, NO_PRESERVE_ATTRIBUTES_OPTION},
|
|
{"no-target-directory", no_argument, NULL, 'T'},
|
|
{"one-file-system", no_argument, NULL, 'x'},
|
|
{"parents", no_argument, NULL, PARENTS_OPTION},
|
|
{"path", no_argument, NULL, PARENTS_OPTION}, /* Deprecated. */
|
|
{"preserve", optional_argument, NULL, PRESERVE_ATTRIBUTES_OPTION},
|
|
{"recursive", no_argument, NULL, 'R'},
|
|
{"remove-destination", no_argument, NULL, UNLINK_DEST_BEFORE_OPENING},
|
|
{"sparse", required_argument, NULL, SPARSE_OPTION},
|
|
{"reflink", optional_argument, NULL, REFLINK_OPTION},
|
|
{"strip-trailing-slashes", no_argument, NULL,
|
|
STRIP_TRAILING_SLASHES_OPTION},
|
|
{"suffix", required_argument, NULL, 'S'},
|
|
{"symbolic-link", no_argument, NULL, 's'},
|
|
{"target-directory", required_argument, NULL, 't'},
|
|
{"update", optional_argument, NULL, 'u'},
|
|
{"verbose", no_argument, NULL, 'v'},
|
|
{"keep-directory-symlink", no_argument, NULL,
|
|
KEEP_DIRECTORY_SYMLINK_OPTION},
|
|
{GETOPT_SELINUX_CONTEXT_OPTION_DECL},
|
|
{GETOPT_HELP_OPTION_DECL},
|
|
{GETOPT_VERSION_OPTION_DECL},
|
|
{NULL, 0, NULL, 0}
|
|
};
|
|
|
|
void
|
|
usage (int status)
|
|
{
|
|
if (status != EXIT_SUCCESS)
|
|
emit_try_help ();
|
|
else
|
|
{
|
|
printf (_("\
|
|
Usage: %s [OPTION]... [-T] SOURCE DEST\n\
|
|
or: %s [OPTION]... SOURCE... DIRECTORY\n\
|
|
or: %s [OPTION]... -t DIRECTORY SOURCE...\n\
|
|
"),
|
|
program_name, program_name, program_name);
|
|
fputs (_("\
|
|
Copy SOURCE to DEST, or multiple SOURCE(s) to DIRECTORY.\n\
|
|
"), stdout);
|
|
|
|
emit_mandatory_arg_note ();
|
|
|
|
fputs (_("\
|
|
-a, --archive same as -dR --preserve=all\n\
|
|
--attributes-only don't copy the file data, just the attributes\n\
|
|
--backup[=CONTROL] make a backup of each existing destination file\
|
|
\n\
|
|
-b like --backup but does not accept an argument\n\
|
|
--copy-contents copy contents of special files when recursive\n\
|
|
-d same as --no-dereference --preserve=links\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
--debug explain how a file is copied. Implies -v\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
-f, --force if an existing destination file cannot be\n\
|
|
opened, remove it and try again (this option\n\
|
|
is ignored when the -n option is also used)\n\
|
|
-i, --interactive prompt before overwrite (overrides a previous -n\
|
|
\n\
|
|
option)\n\
|
|
-H follow command-line symbolic links in SOURCE\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
-l, --link hard link files instead of copying\n\
|
|
-L, --dereference always follow symbolic links in SOURCE\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
-n, --no-clobber (deprecated) silently skip existing files.\n\
|
|
See also --update\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
-P, --no-dereference never follow symbolic links in SOURCE\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
-p same as --preserve=mode,ownership,timestamps\n\
|
|
--preserve[=ATTR_LIST] preserve the specified attributes\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
--no-preserve=ATTR_LIST don't preserve the specified attributes\n\
|
|
--parents use full source file name under DIRECTORY\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
-R, -r, --recursive copy directories recursively\n\
|
|
--reflink[=WHEN] control clone/CoW copies. See below\n\
|
|
--remove-destination remove each existing destination file before\n\
|
|
attempting to open it (contrast with --force)\
|
|
\n"), stdout);
|
|
fputs (_("\
|
|
--sparse=WHEN control creation of sparse files. See below\n\
|
|
--strip-trailing-slashes remove any trailing slashes from each SOURCE\n\
|
|
argument\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
-s, --symbolic-link make symbolic links instead of copying\n\
|
|
-S, --suffix=SUFFIX override the usual backup suffix\n\
|
|
-t, --target-directory=DIRECTORY copy all SOURCE arguments into DIRECTORY\n\
|
|
-T, --no-target-directory treat DEST as a normal file\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
--update[=UPDATE] control which existing files are updated;\n\
|
|
UPDATE={all,none,none-fail,older(default)}\n\
|
|
-u equivalent to --update[=older]. See below\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
-v, --verbose explain what is being done\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
--keep-directory-symlink follow existing symlinks to directories\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
-x, --one-file-system stay on this file system\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
-Z set SELinux security context of destination\n\
|
|
file to default type\n\
|
|
--context[=CTX] like -Z, or if CTX is specified then set the\n\
|
|
SELinux or SMACK security context to CTX\n\
|
|
"), stdout);
|
|
fputs (HELP_OPTION_DESCRIPTION, stdout);
|
|
fputs (VERSION_OPTION_DESCRIPTION, stdout);
|
|
fputs (_("\
|
|
\n\
|
|
ATTR_LIST is a comma-separated list of attributes. Attributes are 'mode' for\n\
|
|
permissions (including any ACL and xattr permissions), 'ownership' for user\n\
|
|
and group, 'timestamps' for file timestamps, 'links' for hard links, 'context'\
|
|
\nfor security context, 'xattr' for extended attributes, and 'all' for all\n\
|
|
attributes.\n\
|
|
"), stdout);
|
|
fputs (_("\
|
|
\n\
|
|
By default, sparse SOURCE files are detected by a crude heuristic and the\n\
|
|
corresponding DEST file is made sparse as well. That is the behavior\n\
|
|
selected by --sparse=auto. Specify --sparse=always to create a sparse DEST\n\
|
|
file whenever the SOURCE file contains a long enough sequence of zero bytes.\n\
|
|
Use --sparse=never to inhibit creation of sparse files.\n\
|
|
"), stdout);
|
|
emit_update_parameters_note ();
|
|
fputs (_("\
|
|
\n\
|
|
By default or with --reflink=auto, cp will try a lightweight copy, where the\n\
|
|
data blocks are copied only when modified, falling back to a standard copy\n\
|
|
if this is not possible. With --reflink[=always] cp will fail if CoW is not\n\
|
|
supported, while --reflink=never ensures a standard copy is performed.\n\
|
|
"), stdout);
|
|
emit_backup_suffix_note ();
|
|
fputs (_("\
|
|
\n\
|
|
As a special case, cp makes a backup of SOURCE when the force and backup\n\
|
|
options are given and SOURCE and DEST are the same name for an existing,\n\
|
|
regular file.\n\
|
|
"), stdout);
|
|
emit_ancillary_info (PROGRAM_NAME);
|
|
}
|
|
exit (status);
|
|
}
|
|
|
|
/* Ensure that parents of CONST_DST_NAME have correct protections, for
|
|
the --parents option. This is done after all copying has been
|
|
completed, to allow permissions that don't include user write/execute.
|
|
|
|
DST_SRC_NAME is the suffix of CONST_DST_NAME that is the source file name,
|
|
DST_DIRFD+DST_RELNAME is equivalent to CONST_DST_NAME, and
|
|
DST_RELNAME equals DST_SRC_NAME after skipping any leading '/'s.
|
|
|
|
ATTR_LIST is a null-terminated linked list of structures that
|
|
indicates the end of the filename of each intermediate directory
|
|
in CONST_DST_NAME that may need to have its attributes changed.
|
|
The command 'cp --parents --preserve a/b/c d/e_dir' changes the
|
|
attributes of the directories d/e_dir/a and d/e_dir/a/b to match
|
|
the corresponding source directories regardless of whether they
|
|
existed before the 'cp' command was given.
|
|
|
|
Return true if the parent of CONST_DST_NAME and any intermediate
|
|
directories specified by ATTR_LIST have the proper permissions
|
|
when done. */
|
|
|
|
static bool
|
|
re_protect (char const *const_dst_name, char const *dst_src_name,
|
|
int dst_dirfd, char const *dst_relname,
|
|
struct dir_attr *attr_list, const struct cp_options *x)
|
|
{
|
|
char *dst_name; /* A copy of CONST_DST_NAME we can change. */
|
|
|
|
ASSIGN_STRDUPA (dst_name, const_dst_name);
|
|
|
|
/* The suffix of DST_NAME that is a copy of the source file name,
|
|
possibly truncated to name a parent directory. */
|
|
char const *src_name = dst_name + (dst_src_name - const_dst_name);
|
|
|
|
/* Likewise, but with any leading '/'s skipped. */
|
|
char const *relname = dst_name + (dst_relname - const_dst_name);
|
|
|
|
for (struct dir_attr *p = attr_list; p; p = p->next)
|
|
{
|
|
dst_name[p->slash_offset] = '\0';
|
|
|
|
/* Adjust the times (and if possible, ownership) for the copy.
|
|
chown turns off set[ug]id bits for non-root,
|
|
so do the chmod last. */
|
|
|
|
if (x->preserve_timestamps)
|
|
{
|
|
struct timespec timespec[2] = { get_stat_atime (&p->st),
|
|
get_stat_mtime (&p->st) };
|
|
|
|
if (utimensat (dst_dirfd, relname, timespec, 0))
|
|
{
|
|
error (0, errno, _("failed to preserve times for %s"),
|
|
quoteaf (dst_name));
|
|
return false;
|
|
}
|
|
}
|
|
|
|
if (x->preserve_ownership)
|
|
{
|
|
if (lchownat (dst_dirfd, relname, p->st.st_uid, p->st.st_gid)
|
|
!= 0)
|
|
{
|
|
if (! chown_failure_ok (x))
|
|
{
|
|
error (0, errno, _("failed to preserve ownership for %s"),
|
|
quoteaf (dst_name));
|
|
return false;
|
|
}
|
|
/* Failing to preserve ownership is OK. Still, try to preserve
|
|
the group, but ignore the possible error. */
|
|
ignore_value (lchownat (dst_dirfd, relname, -1, p->st.st_gid));
|
|
}
|
|
}
|
|
|
|
if (x->preserve_mode)
|
|
{
|
|
if (xcopy_acl (src_name, -1, dst_name, -1, p->st.st_mode) != 0)
|
|
return false;
|
|
}
|
|
else if (p->restore_mode)
|
|
{
|
|
if (lchmodat (dst_dirfd, relname, p->st.st_mode) != 0)
|
|
{
|
|
error (0, errno, _("failed to preserve permissions for %s"),
|
|
quoteaf (dst_name));
|
|
return false;
|
|
}
|
|
}
|
|
|
|
dst_name[p->slash_offset] = '/';
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/* Ensure that the parent directory of CONST_DIR exists, for
|
|
the --parents option.
|
|
|
|
SRC_OFFSET is the index in CONST_DIR (which is a destination
|
|
directory) of the beginning of the source directory name.
|
|
Create any leading directories that don't already exist.
|
|
DST_DIRFD is a file descriptor for the target directory.
|
|
If VERBOSE_FMT_STRING is nonzero, use it as a printf format
|
|
string for printing a message after successfully making a directory.
|
|
The format should take two string arguments: the names of the
|
|
source and destination directories.
|
|
Creates a linked list of attributes of intermediate directories,
|
|
*ATTR_LIST, for re_protect to use after calling copy.
|
|
Sets *NEW_DST if this function creates parent of CONST_DIR.
|
|
|
|
Return true if parent of CONST_DIR exists as a directory with the proper
|
|
permissions when done. */
|
|
|
|
/* FIXME: Synch this function with the one in ../lib/mkdir-p.c. */
|
|
|
|
static bool
|
|
make_dir_parents_private (char const *const_dir, size_t src_offset,
|
|
int dst_dirfd,
|
|
char const *verbose_fmt_string,
|
|
struct dir_attr **attr_list, bool *new_dst,
|
|
const struct cp_options *x)
|
|
{
|
|
idx_t dirlen = dir_len (const_dir);
|
|
|
|
*attr_list = NULL;
|
|
|
|
/* Succeed immediately if the parent of CONST_DIR must already exist,
|
|
as the target directory has already been checked. */
|
|
if (dirlen <= src_offset)
|
|
return true;
|
|
|
|
/* A copy of CONST_DIR we can change. */
|
|
char *dir;
|
|
ASSIGN_STRDUPA (dir, const_dir);
|
|
|
|
/* Source name in DIR. */
|
|
char *src = dir + src_offset;
|
|
|
|
/* Leading directory of DIR. */
|
|
char *dst_dir = alloca (dirlen + 1);
|
|
memcpy (dst_dir, dir, dirlen);
|
|
dst_dir[dirlen] = '\0';
|
|
char const *dst_reldir = dst_dir + src_offset;
|
|
while (*dst_reldir == '/')
|
|
dst_reldir++;
|
|
|
|
/* XXX: If all dirs are present at the destination,
|
|
no permissions or security contexts will be updated. */
|
|
struct stat stats;
|
|
if (fstatat (dst_dirfd, dst_reldir, &stats, 0) != 0)
|
|
{
|
|
/* A parent of CONST_DIR does not exist.
|
|
Make all missing intermediate directories. */
|
|
char *slash = src;
|
|
|
|
while (*slash == '/')
|
|
slash++;
|
|
dst_reldir = slash;
|
|
|
|
while ((slash = strchr (slash, '/')))
|
|
{
|
|
struct dir_attr *new;
|
|
|
|
*slash = '\0';
|
|
bool missing_dir = fstatat (dst_dirfd, dst_reldir, &stats, 0) != 0;
|
|
|
|
if (missing_dir || x->preserve_ownership || x->preserve_mode
|
|
|| x->preserve_timestamps)
|
|
{
|
|
/* Add this directory to the list of directories whose
|
|
modes might need fixing later. */
|
|
struct stat src_st;
|
|
int src_errno = (stat (src, &src_st) != 0
|
|
? errno
|
|
: S_ISDIR (src_st.st_mode)
|
|
? 0
|
|
: ENOTDIR);
|
|
if (src_errno)
|
|
{
|
|
error (0, src_errno, _("failed to get attributes of %s"),
|
|
quoteaf (src));
|
|
return false;
|
|
}
|
|
|
|
new = xmalloc (sizeof *new);
|
|
new->st = src_st;
|
|
new->slash_offset = slash - dir;
|
|
new->restore_mode = false;
|
|
new->next = *attr_list;
|
|
*attr_list = new;
|
|
}
|
|
|
|
/* If required set the default context for created dirs. */
|
|
if (! set_process_security_ctx (src, dir,
|
|
missing_dir ? new->st.st_mode : 0,
|
|
missing_dir, x))
|
|
return false;
|
|
|
|
if (missing_dir)
|
|
{
|
|
/* This component does not exist. We must set
|
|
*new_dst and new->st.st_mode inside this loop because,
|
|
for example, in the command 'cp --parents ../a/../b/c e_dir',
|
|
make_dir_parents_private creates only e_dir/../a if
|
|
./b already exists. */
|
|
*new_dst = true;
|
|
mode_t src_mode = new->st.st_mode;
|
|
|
|
/* If the ownership or special mode bits might change,
|
|
omit some permissions at first, so unauthorized users
|
|
cannot nip in before the file is ready. */
|
|
mode_t omitted_permissions = (src_mode
|
|
& (x->preserve_ownership
|
|
? S_IRWXG | S_IRWXO
|
|
: x->preserve_mode
|
|
? S_IWGRP | S_IWOTH
|
|
: 0));
|
|
|
|
/* POSIX says mkdir's behavior is implementation-defined when
|
|
(src_mode & ~S_IRWXUGO) != 0. However, common practice is
|
|
to ask mkdir to copy all the CHMOD_MODE_BITS, letting mkdir
|
|
decide what to do with S_ISUID | S_ISGID | S_ISVTX. */
|
|
mode_t mkdir_mode = (x->explicit_no_preserve_mode
|
|
? S_IRWXUGO : src_mode);
|
|
mkdir_mode &= CHMOD_MODE_BITS & ~omitted_permissions;
|
|
if (mkdirat (dst_dirfd, dst_reldir, mkdir_mode) != 0)
|
|
{
|
|
error (0, errno, _("cannot make directory %s"),
|
|
quoteaf (dir));
|
|
return false;
|
|
}
|
|
else
|
|
{
|
|
if (verbose_fmt_string != NULL)
|
|
printf (verbose_fmt_string, src, dir);
|
|
}
|
|
|
|
/* We need search and write permissions to the new directory
|
|
for writing the directory's contents. Check if these
|
|
permissions are there. */
|
|
|
|
if (fstatat (dst_dirfd, dst_reldir, &stats, AT_SYMLINK_NOFOLLOW))
|
|
{
|
|
error (0, errno, _("failed to get attributes of %s"),
|
|
quoteaf (dir));
|
|
return false;
|
|
}
|
|
|
|
|
|
if (! x->preserve_mode)
|
|
{
|
|
if (omitted_permissions & ~stats.st_mode)
|
|
omitted_permissions &= ~ cached_umask ();
|
|
if (omitted_permissions & ~stats.st_mode
|
|
|| (stats.st_mode & S_IRWXU) != S_IRWXU)
|
|
{
|
|
new->st.st_mode = stats.st_mode | omitted_permissions;
|
|
new->restore_mode = true;
|
|
}
|
|
}
|
|
|
|
mode_t accessible = stats.st_mode | S_IRWXU;
|
|
if (stats.st_mode != accessible)
|
|
{
|
|
/* Make the new directory searchable and writable.
|
|
The original permissions will be restored later. */
|
|
|
|
if (lchmodat (dst_dirfd, dst_reldir, accessible) != 0)
|
|
{
|
|
error (0, errno, _("setting permissions for %s"),
|
|
quoteaf (dir));
|
|
return false;
|
|
}
|
|
}
|
|
}
|
|
else if (!S_ISDIR (stats.st_mode))
|
|
{
|
|
error (0, 0, _("%s exists but is not a directory"),
|
|
quoteaf (dir));
|
|
return false;
|
|
}
|
|
else
|
|
*new_dst = false;
|
|
|
|
/* For existing dirs, set the security context as per that already
|
|
set for the process global context. */
|
|
if (! *new_dst
|
|
&& (x->set_security_context || x->preserve_security_context))
|
|
{
|
|
if (! set_file_security_ctx (dir, false, x)
|
|
&& x->require_preserve_context)
|
|
return false;
|
|
}
|
|
|
|
*slash++ = '/';
|
|
|
|
/* Avoid unnecessary calls to 'stat' when given
|
|
file names containing multiple adjacent slashes. */
|
|
while (*slash == '/')
|
|
slash++;
|
|
}
|
|
}
|
|
|
|
/* We get here if the parent of DIR already exists. */
|
|
|
|
else if (!S_ISDIR (stats.st_mode))
|
|
{
|
|
error (0, 0, _("%s exists but is not a directory"), quoteaf (dst_dir));
|
|
return false;
|
|
}
|
|
else
|
|
{
|
|
*new_dst = false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/* Scan the arguments, and copy each by calling copy.
|
|
Return true if successful. */
|
|
|
|
static bool
|
|
do_copy (int n_files, char **file, char const *target_directory,
|
|
bool no_target_directory, struct cp_options *x)
|
|
{
|
|
if (n_files <= !target_directory)
|
|
{
|
|
if (n_files <= 0)
|
|
error (0, 0, _("missing file operand"));
|
|
else
|
|
error (0, 0, _("missing destination file operand after %s"),
|
|
quoteaf (file[0]));
|
|
usage (EXIT_FAILURE);
|
|
}
|
|
|
|
struct stat sb;
|
|
sb.st_mode = 0;
|
|
int target_dirfd = AT_FDCWD;
|
|
bool new_dst = false;
|
|
bool ok = true;
|
|
if (no_target_directory)
|
|
{
|
|
if (target_directory)
|
|
error (EXIT_FAILURE, 0,
|
|
_("cannot combine --target-directory (-t) "
|
|
"and --no-target-directory (-T)"));
|
|
if (2 < n_files)
|
|
{
|
|
error (0, 0, _("extra operand %s"), quoteaf (file[2]));
|
|
usage (EXIT_FAILURE);
|
|
}
|
|
}
|
|
else if (target_directory)
|
|
{
|
|
target_dirfd = target_directory_operand (target_directory, &sb);
|
|
if (! target_dirfd_valid (target_dirfd))
|
|
error (EXIT_FAILURE, errno, _("target directory %s"),
|
|
quoteaf (target_directory));
|
|
}
|
|
else
|
|
{
|
|
char const *lastfile = file[n_files - 1];
|
|
int fd = target_directory_operand (lastfile, &sb);
|
|
if (target_dirfd_valid (fd))
|
|
{
|
|
target_dirfd = fd;
|
|
target_directory = lastfile;
|
|
n_files--;
|
|
}
|
|
else
|
|
{
|
|
int err = errno;
|
|
if (err == ENOENT)
|
|
new_dst = true;
|
|
|
|
/* The last operand LASTFILE cannot be opened as a directory.
|
|
If there are more than two operands, report an error.
|
|
|
|
Also, report an error if LASTFILE is known to be a directory
|
|
even though it could not be opened, which can happen if
|
|
opening failed with EACCES on a platform lacking O_PATH.
|
|
In this case use stat to test whether LASTFILE is a
|
|
directory, in case opening a non-directory with (O_SEARCH
|
|
| O_DIRECTORY) failed with EACCES not ENOTDIR. */
|
|
if (2 < n_files
|
|
|| (O_PATHSEARCH == O_SEARCH && err == EACCES
|
|
&& (sb.st_mode || stat (lastfile, &sb) == 0)
|
|
&& S_ISDIR (sb.st_mode)))
|
|
error (EXIT_FAILURE, err, _("target %s"), quoteaf (lastfile));
|
|
}
|
|
}
|
|
|
|
if (target_directory)
|
|
{
|
|
/* cp file1...filen edir
|
|
Copy the files 'file1' through 'filen'
|
|
to the existing directory 'edir'. */
|
|
|
|
/* Initialize these hash tables only if we'll need them.
|
|
The problems they're used to detect can arise only if
|
|
there are two or more files to copy. */
|
|
if (2 <= n_files)
|
|
{
|
|
dest_info_init (x);
|
|
src_info_init (x);
|
|
}
|
|
|
|
for (int i = 0; i < n_files; i++)
|
|
{
|
|
char *dst_name;
|
|
bool parent_exists = true; /* True if dir_name (dst_name) exists. */
|
|
struct dir_attr *attr_list;
|
|
char *arg_in_concat;
|
|
char *arg = file[i];
|
|
|
|
/* Trailing slashes are meaningful (i.e., maybe worth preserving)
|
|
only in the source file names. */
|
|
if (remove_trailing_slashes)
|
|
strip_trailing_slashes (arg);
|
|
|
|
if (parents_option)
|
|
{
|
|
char *arg_no_trailing_slash;
|
|
|
|
/* Use 'arg' without trailing slashes in constructing destination
|
|
file names. Otherwise, we can end up trying to create a
|
|
directory using a name with trailing slash, which fails on
|
|
NetBSD 1.[34] systems. */
|
|
ASSIGN_STRDUPA (arg_no_trailing_slash, arg);
|
|
strip_trailing_slashes (arg_no_trailing_slash);
|
|
|
|
/* Append all of 'arg' (minus any trailing slash) to 'dest'. */
|
|
dst_name = file_name_concat (target_directory,
|
|
arg_no_trailing_slash,
|
|
&arg_in_concat);
|
|
|
|
/* For --parents, we have to make sure that the directory
|
|
dir_name (dst_name) exists. We may have to create a few
|
|
leading directories. */
|
|
parent_exists =
|
|
(make_dir_parents_private
|
|
(dst_name, arg_in_concat - dst_name, target_dirfd,
|
|
(x->verbose ? "%s -> %s\n" : NULL),
|
|
&attr_list, &new_dst, x));
|
|
}
|
|
else
|
|
{
|
|
char *arg_base;
|
|
/* Append the last component of 'arg' to 'target_directory'. */
|
|
ASSIGN_STRDUPA (arg_base, last_component (arg));
|
|
strip_trailing_slashes (arg_base);
|
|
/* For 'cp -R source/.. dest', don't copy into 'dest/..'. */
|
|
arg_base += streq (arg_base, "..");
|
|
dst_name = file_name_concat (target_directory, arg_base,
|
|
&arg_in_concat);
|
|
}
|
|
|
|
if (!parent_exists)
|
|
{
|
|
/* make_dir_parents_private failed, so don't even
|
|
attempt the copy. */
|
|
ok = false;
|
|
}
|
|
else
|
|
{
|
|
char const *dst_relname = arg_in_concat;
|
|
while (*dst_relname == '/')
|
|
dst_relname++;
|
|
|
|
bool copy_into_self;
|
|
ok &= copy (arg, dst_name, target_dirfd, dst_relname,
|
|
new_dst, x, ©_into_self, NULL);
|
|
|
|
if (parents_option)
|
|
ok &= re_protect (dst_name, arg_in_concat, target_dirfd,
|
|
dst_relname, attr_list, x);
|
|
}
|
|
|
|
if (parents_option)
|
|
{
|
|
while (attr_list)
|
|
{
|
|
struct dir_attr *p = attr_list;
|
|
attr_list = attr_list->next;
|
|
free (p);
|
|
}
|
|
}
|
|
|
|
free (dst_name);
|
|
}
|
|
}
|
|
else /* !target_directory */
|
|
{
|
|
if (parents_option)
|
|
{
|
|
error (0, 0,
|
|
_("with --parents, the destination must be a directory"));
|
|
usage (EXIT_FAILURE);
|
|
}
|
|
|
|
/* When the force and backup options have been specified and
|
|
the source and destination are the same name for an existing
|
|
regular file, convert the user's command, e.g.,
|
|
'cp --force --backup foo foo' to 'cp --force foo fooSUFFIX'
|
|
where SUFFIX is determined by any version control options used. */
|
|
|
|
char const *source = file[0];
|
|
char const *dest = file[1];
|
|
if (x->unlink_dest_after_failed_open
|
|
&& x->backup_type != no_backups
|
|
&& streq (source, dest)
|
|
&& !new_dst
|
|
&& (sb.st_mode != 0 || stat (dest, &sb) == 0) && S_ISREG (sb.st_mode))
|
|
{
|
|
static struct cp_options x_tmp;
|
|
|
|
dest = find_backup_file_name (AT_FDCWD, dest, x->backup_type);
|
|
/* Set x->backup_type to 'no_backups' so that the normal backup
|
|
mechanism is not used when performing the actual copy.
|
|
backup_type must be set to 'no_backups' only *after* the above
|
|
call to find_backup_file_name -- that function uses
|
|
backup_type to determine the suffix it applies. */
|
|
x_tmp = *x;
|
|
x_tmp.backup_type = no_backups;
|
|
x = &x_tmp;
|
|
}
|
|
|
|
bool unused;
|
|
ok = copy (source, dest, AT_FDCWD, dest, -new_dst, x, &unused, NULL);
|
|
}
|
|
|
|
return ok;
|
|
}
|
|
|
|
static void
|
|
cp_option_init (struct cp_options *x)
|
|
{
|
|
cp_options_default (x);
|
|
x->copy_as_regular = true;
|
|
x->dereference = DEREF_UNDEFINED;
|
|
x->unlink_dest_before_opening = false;
|
|
x->unlink_dest_after_failed_open = false;
|
|
x->hard_link = false;
|
|
x->interactive = I_UNSPECIFIED;
|
|
x->move_mode = false;
|
|
x->install_mode = false;
|
|
x->one_file_system = false;
|
|
x->reflink_mode = REFLINK_AUTO;
|
|
|
|
x->preserve_ownership = false;
|
|
x->preserve_links = false;
|
|
x->preserve_mode = false;
|
|
x->preserve_timestamps = false;
|
|
x->explicit_no_preserve_mode = false;
|
|
x->preserve_security_context = false; /* -a or --preserve=context. */
|
|
x->require_preserve_context = false; /* --preserve=context. */
|
|
x->set_security_context = NULL; /* -Z, set sys default context. */
|
|
x->preserve_xattr = false;
|
|
x->reduce_diagnostics = false;
|
|
x->require_preserve_xattr = false;
|
|
|
|
x->data_copy_required = true;
|
|
x->require_preserve = false;
|
|
x->recursive = false;
|
|
x->sparse_mode = SPARSE_AUTO;
|
|
x->symbolic_link = false;
|
|
x->set_mode = false;
|
|
x->mode = 0;
|
|
|
|
/* Not used. */
|
|
x->stdin_tty = false;
|
|
|
|
x->update = UPDATE_ALL;
|
|
x->verbose = false;
|
|
x->keep_directory_symlink = false;
|
|
|
|
/* By default, refuse to open a dangling destination symlink, because
|
|
in general one cannot do that safely, give the current semantics of
|
|
open's O_EXCL flag, (which POSIX doesn't even allow cp to use, btw).
|
|
But POSIX requires it. */
|
|
x->open_dangling_dest_symlink = getenv ("POSIXLY_CORRECT") != NULL;
|
|
|
|
x->dest_info = NULL;
|
|
x->src_info = NULL;
|
|
}
|
|
|
|
/* Given a string, ARG, containing a comma-separated list of arguments
|
|
to the --preserve option, set the appropriate fields of X to ON_OFF. */
|
|
static void
|
|
decode_preserve_arg (char const *arg, struct cp_options *x, bool on_off)
|
|
{
|
|
enum File_attribute
|
|
{
|
|
PRESERVE_MODE,
|
|
PRESERVE_TIMESTAMPS,
|
|
PRESERVE_OWNERSHIP,
|
|
PRESERVE_LINK,
|
|
PRESERVE_CONTEXT,
|
|
PRESERVE_XATTR,
|
|
PRESERVE_ALL
|
|
};
|
|
static enum File_attribute const preserve_vals[] =
|
|
{
|
|
PRESERVE_MODE, PRESERVE_TIMESTAMPS,
|
|
PRESERVE_OWNERSHIP, PRESERVE_LINK, PRESERVE_CONTEXT, PRESERVE_XATTR,
|
|
PRESERVE_ALL
|
|
};
|
|
/* Valid arguments to the '--preserve' option. */
|
|
static char const *const preserve_args[] =
|
|
{
|
|
"mode", "timestamps",
|
|
"ownership", "links", "context", "xattr", "all", NULL
|
|
};
|
|
ARGMATCH_VERIFY (preserve_args, preserve_vals);
|
|
|
|
char *arg_writable = xstrdup (arg);
|
|
char *s = arg_writable;
|
|
do
|
|
{
|
|
/* find next comma */
|
|
char *comma = strchr (s, ',');
|
|
enum File_attribute val;
|
|
|
|
/* If we found a comma, put a NUL in its place and advance. */
|
|
if (comma)
|
|
*comma++ = 0;
|
|
|
|
/* process S. */
|
|
val = XARGMATCH (on_off ? "--preserve" : "--no-preserve",
|
|
s, preserve_args, preserve_vals);
|
|
switch (val)
|
|
{
|
|
case PRESERVE_MODE:
|
|
x->preserve_mode = on_off;
|
|
x->explicit_no_preserve_mode = !on_off;
|
|
break;
|
|
|
|
case PRESERVE_TIMESTAMPS:
|
|
x->preserve_timestamps = on_off;
|
|
break;
|
|
|
|
case PRESERVE_OWNERSHIP:
|
|
x->preserve_ownership = on_off;
|
|
break;
|
|
|
|
case PRESERVE_LINK:
|
|
x->preserve_links = on_off;
|
|
break;
|
|
|
|
case PRESERVE_CONTEXT:
|
|
x->require_preserve_context = on_off;
|
|
x->preserve_security_context = on_off;
|
|
break;
|
|
|
|
case PRESERVE_XATTR:
|
|
x->preserve_xattr = on_off;
|
|
x->require_preserve_xattr = on_off;
|
|
break;
|
|
|
|
case PRESERVE_ALL:
|
|
x->preserve_mode = on_off;
|
|
x->preserve_timestamps = on_off;
|
|
x->preserve_ownership = on_off;
|
|
x->preserve_links = on_off;
|
|
x->explicit_no_preserve_mode = !on_off;
|
|
if (selinux_enabled)
|
|
x->preserve_security_context = on_off;
|
|
x->preserve_xattr = on_off;
|
|
break;
|
|
|
|
default:
|
|
affirm (false);
|
|
}
|
|
s = comma;
|
|
}
|
|
while (s);
|
|
|
|
free (arg_writable);
|
|
}
|
|
|
|
int
|
|
main (int argc, char **argv)
|
|
{
|
|
bool make_backups = false;
|
|
char const *backup_suffix = NULL;
|
|
char *version_control_string = NULL;
|
|
struct cp_options x;
|
|
bool copy_contents = false;
|
|
char *target_directory = NULL;
|
|
bool no_target_directory = false;
|
|
char const *scontext = NULL;
|
|
|
|
initialize_main (&argc, &argv);
|
|
set_program_name (argv[0]);
|
|
setlocale (LC_ALL, "");
|
|
bindtextdomain (PACKAGE, LOCALEDIR);
|
|
textdomain (PACKAGE);
|
|
|
|
atexit (close_stdin);
|
|
|
|
selinux_enabled = (0 < is_selinux_enabled ());
|
|
cp_option_init (&x);
|
|
|
|
int c;
|
|
while ((c = getopt_long (argc, argv, "abdfHilLnprst:uvxPRS:TZ",
|
|
long_opts, NULL))
|
|
!= -1)
|
|
{
|
|
switch (c)
|
|
{
|
|
case SPARSE_OPTION:
|
|
x.sparse_mode = XARGMATCH ("--sparse", optarg,
|
|
sparse_type_string, sparse_type);
|
|
break;
|
|
|
|
case REFLINK_OPTION:
|
|
if (optarg == NULL)
|
|
x.reflink_mode = REFLINK_ALWAYS;
|
|
else
|
|
x.reflink_mode = XARGMATCH ("--reflink", optarg,
|
|
reflink_type_string, reflink_type);
|
|
break;
|
|
|
|
case 'a':
|
|
/* Like -dR --preserve=all with reduced failure diagnostics. */
|
|
x.dereference = DEREF_NEVER;
|
|
x.preserve_links = true;
|
|
x.preserve_ownership = true;
|
|
x.preserve_mode = true;
|
|
x.preserve_timestamps = true;
|
|
x.require_preserve = true;
|
|
if (selinux_enabled)
|
|
x.preserve_security_context = true;
|
|
x.preserve_xattr = true;
|
|
x.reduce_diagnostics = true;
|
|
x.recursive = true;
|
|
break;
|
|
|
|
case 'b':
|
|
make_backups = true;
|
|
if (optarg)
|
|
version_control_string = optarg;
|
|
break;
|
|
|
|
case ATTRIBUTES_ONLY_OPTION:
|
|
x.data_copy_required = false;
|
|
break;
|
|
|
|
case DEBUG_OPTION:
|
|
x.debug = x.verbose = true;
|
|
break;
|
|
|
|
case COPY_CONTENTS_OPTION:
|
|
copy_contents = true;
|
|
break;
|
|
|
|
case 'd':
|
|
x.preserve_links = true;
|
|
x.dereference = DEREF_NEVER;
|
|
break;
|
|
|
|
case 'f':
|
|
x.unlink_dest_after_failed_open = true;
|
|
break;
|
|
|
|
case 'H':
|
|
x.dereference = DEREF_COMMAND_LINE_ARGUMENTS;
|
|
break;
|
|
|
|
case 'i':
|
|
x.interactive = I_ASK_USER;
|
|
break;
|
|
|
|
case 'l':
|
|
x.hard_link = true;
|
|
break;
|
|
|
|
case 'L':
|
|
x.dereference = DEREF_ALWAYS;
|
|
break;
|
|
|
|
case 'n':
|
|
x.interactive = I_ALWAYS_SKIP;
|
|
break;
|
|
|
|
case 'P':
|
|
x.dereference = DEREF_NEVER;
|
|
break;
|
|
|
|
case NO_PRESERVE_ATTRIBUTES_OPTION:
|
|
decode_preserve_arg (optarg, &x, false);
|
|
break;
|
|
|
|
case PRESERVE_ATTRIBUTES_OPTION:
|
|
if (optarg == NULL)
|
|
{
|
|
/* Fall through to the case for 'p' below. */
|
|
}
|
|
else
|
|
{
|
|
decode_preserve_arg (optarg, &x, true);
|
|
x.require_preserve = true;
|
|
break;
|
|
}
|
|
FALLTHROUGH;
|
|
|
|
case 'p':
|
|
x.preserve_ownership = true;
|
|
x.preserve_mode = true;
|
|
x.preserve_timestamps = true;
|
|
x.require_preserve = true;
|
|
break;
|
|
|
|
case PARENTS_OPTION:
|
|
parents_option = true;
|
|
break;
|
|
|
|
case 'r':
|
|
case 'R':
|
|
x.recursive = true;
|
|
break;
|
|
|
|
case UNLINK_DEST_BEFORE_OPENING:
|
|
x.unlink_dest_before_opening = true;
|
|
break;
|
|
|
|
case STRIP_TRAILING_SLASHES_OPTION:
|
|
remove_trailing_slashes = true;
|
|
break;
|
|
|
|
case 's':
|
|
x.symbolic_link = true;
|
|
break;
|
|
|
|
case 't':
|
|
if (target_directory)
|
|
error (EXIT_FAILURE, 0,
|
|
_("multiple target directories specified"));
|
|
target_directory = optarg;
|
|
break;
|
|
|
|
case 'T':
|
|
no_target_directory = true;
|
|
break;
|
|
|
|
case 'u':
|
|
x.update = UPDATE_OLDER;
|
|
if (optarg)
|
|
x.update = XARGMATCH ("--update", optarg,
|
|
update_type_string, update_type);
|
|
break;
|
|
|
|
case 'v':
|
|
x.verbose = true;
|
|
break;
|
|
|
|
case KEEP_DIRECTORY_SYMLINK_OPTION:
|
|
x.keep_directory_symlink = true;
|
|
break;
|
|
|
|
case 'x':
|
|
x.one_file_system = true;
|
|
break;
|
|
|
|
case 'Z':
|
|
/* politely decline if we're not on a selinux-enabled kernel. */
|
|
if (selinux_enabled)
|
|
{
|
|
if (optarg)
|
|
scontext = optarg;
|
|
else
|
|
{
|
|
x.set_security_context = selabel_open (SELABEL_CTX_FILE,
|
|
NULL, 0);
|
|
if (! x.set_security_context)
|
|
error (0, errno, _("warning: ignoring --context"));
|
|
}
|
|
}
|
|
else if (optarg)
|
|
{
|
|
error (0, 0,
|
|
_("warning: ignoring --context; "
|
|
"it requires an SELinux-enabled kernel"));
|
|
}
|
|
break;
|
|
|
|
case 'S':
|
|
make_backups = true;
|
|
backup_suffix = optarg;
|
|
break;
|
|
|
|
case_GETOPT_HELP_CHAR;
|
|
|
|
case_GETOPT_VERSION_CHAR (PROGRAM_NAME, AUTHORS);
|
|
|
|
default:
|
|
usage (EXIT_FAILURE);
|
|
}
|
|
}
|
|
|
|
/* With --sparse=never, disable reflinking so we create a non sparse copy.
|
|
This will also have the effect of disabling copy offload as that may
|
|
propagate holes. For e.g. FreeBSD documents that copy_file_range()
|
|
will try to propagate holes. */
|
|
if (x.reflink_mode == REFLINK_AUTO && x.sparse_mode == SPARSE_NEVER)
|
|
x.reflink_mode = REFLINK_NEVER;
|
|
|
|
if (x.hard_link && x.symbolic_link)
|
|
{
|
|
error (0, 0, _("cannot make both hard and symbolic links"));
|
|
usage (EXIT_FAILURE);
|
|
}
|
|
|
|
if (x.interactive == I_ALWAYS_SKIP)
|
|
x.update = UPDATE_NONE;
|
|
|
|
if (make_backups
|
|
&& (x.update == UPDATE_NONE
|
|
|| x.update == UPDATE_NONE_FAIL))
|
|
{
|
|
error (0, 0,
|
|
_("--backup is mutually exclusive with -n or --update=none-fail"));
|
|
usage (EXIT_FAILURE);
|
|
}
|
|
|
|
if (x.reflink_mode == REFLINK_ALWAYS && x.sparse_mode != SPARSE_AUTO)
|
|
{
|
|
error (0, 0, _("--reflink can be used only with --sparse=auto"));
|
|
usage (EXIT_FAILURE);
|
|
}
|
|
|
|
x.backup_type = (make_backups
|
|
? xget_version (_("backup type"),
|
|
version_control_string)
|
|
: no_backups);
|
|
set_simple_backup_suffix (backup_suffix);
|
|
|
|
if (x.dereference == DEREF_UNDEFINED)
|
|
{
|
|
if (x.recursive && ! x.hard_link)
|
|
/* This is compatible with FreeBSD. */
|
|
x.dereference = DEREF_NEVER;
|
|
else
|
|
x.dereference = DEREF_ALWAYS;
|
|
}
|
|
|
|
if (x.recursive)
|
|
x.copy_as_regular = copy_contents;
|
|
|
|
/* Ensure -Z overrides -a. */
|
|
if ((x.set_security_context || scontext)
|
|
&& ! x.require_preserve_context)
|
|
x.preserve_security_context = false;
|
|
|
|
if (x.preserve_security_context && (x.set_security_context || scontext))
|
|
error (EXIT_FAILURE, 0,
|
|
_("cannot set target context and preserve it"));
|
|
|
|
if (x.require_preserve_context && ! selinux_enabled)
|
|
error (EXIT_FAILURE, 0,
|
|
_("cannot preserve security context "
|
|
"without an SELinux-enabled kernel"));
|
|
|
|
/* FIXME: This handles new files. But what about existing files?
|
|
I.e., if updating a tree, new files would have the specified context,
|
|
but shouldn't existing files be updated for consistency like this?
|
|
if (scontext && !restorecon (NULL, dst_path, 0))
|
|
error (...);
|
|
*/
|
|
if (scontext && setfscreatecon (scontext) < 0)
|
|
error (EXIT_FAILURE, errno,
|
|
_("failed to set default file creation context to %s"),
|
|
quote (scontext));
|
|
|
|
#if !USE_XATTR
|
|
if (x.require_preserve_xattr)
|
|
error (EXIT_FAILURE, 0, _("cannot preserve extended attributes, cp is "
|
|
"built without xattr support"));
|
|
#endif
|
|
|
|
/* Allocate space for remembering copied and created files. */
|
|
|
|
hash_init ();
|
|
|
|
bool ok = do_copy (argc - optind, argv + optind,
|
|
target_directory, no_target_directory, &x);
|
|
|
|
main_exit (ok ? EXIT_SUCCESS : EXIT_FAILURE);
|
|
}
|