1 /*
   2  * CDDL HEADER START
   3  *
   4  * The contents of this file are subject to the terms of the
   5  * Common Development and Distribution License (the "License").
   6  * You may not use this file except in compliance with the License.
   7  *
   8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
   9  * or http://www.opensolaris.org/os/licensing.
  10  * See the License for the specific language governing permissions
  11  * and limitations under the License.
  12  *
  13  * When distributing Covered Code, include this CDDL HEADER in each
  14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
  15  * If applicable, add the following below this CDDL HEADER, with the
  16  * fields enclosed by brackets "[]" replaced with your own identifying
  17  * information: Portions Copyright [yyyy] [name of copyright owner]
  18  *
  19  * CDDL HEADER END
  20  */
  21 
  22 /*
  23  * Copyright 2013 Nexenta Systems, Inc. All rights reserved.
  24  */
  25 
  26 /*
  27  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
  28  * Use is subject to license terms.
  29  */
  30 
  31 /*      Copyright (c) 1984, 1986, 1987, 1988, 1989 AT&T     */
  32 /*        All Rights Reserved   */
  33 
  34 /*
  35  * University Copyright- Copyright (c) 1982, 1986, 1988
  36  * The Regents of the University of California
  37  * All Rights Reserved
  38  *
  39  * University Acknowledgment- Portions of this document are derived from
  40  * software developed by the University of California, Berkeley, and its
  41  * contributors.
  42  */
  43 
  44 /*
  45  * Combined mv/cp/ln command:
  46  *      mv file1 file2
  47  *      mv dir1 dir2
  48  *      mv file1 ... filen dir1
  49  */
  50 #include <sys/time.h>
  51 #include <signal.h>
  52 #include <locale.h>
  53 #include <stdarg.h>
  54 #include <sys/acl.h>
  55 #include <libcmdutils.h>
  56 #include <aclutils.h>
  57 #include "getresponse.h"
  58 
  59 #define FTYPE(A)        (A.st_mode)
  60 #define FMODE(A)        (A.st_mode)
  61 #define UID(A)          (A.st_uid)
  62 #define GID(A)          (A.st_gid)
  63 #define IDENTICAL(A, B) (A.st_dev == B.st_dev && A.st_ino == B.st_ino)
  64 #define ISDIR(A)        ((A.st_mode & S_IFMT) == S_IFDIR)
  65 #define ISDOOR(A)       ((A.st_mode & S_IFMT) == S_IFDOOR)
  66 #define ISLNK(A)        ((A.st_mode & S_IFMT) == S_IFLNK)
  67 #define ISREG(A)        (((A).st_mode & S_IFMT) == S_IFREG)
  68 #define ISDEV(A)        ((A.st_mode & S_IFMT) == S_IFCHR || \
  69                         (A.st_mode & S_IFMT) == S_IFBLK || \
  70                         (A.st_mode & S_IFMT) == S_IFIFO)
  71 #define ISSOCK(A)       ((A.st_mode & S_IFMT) == S_IFSOCK)
  72 
  73 #define DELIM   '/'
  74 #define EQ(x, y)        (strcmp(x, y) == 0)
  75 #define FALSE   0
  76 #define MODEBITS (S_ISUID|S_ISGID|S_ISVTX|S_IRWXU|S_IRWXG|S_IRWXO)
  77 #define TRUE 1
  78 
  79 static char             *dname(char *);
  80 static int              lnkfil(char *, char *);
  81 static int              cpymve(char *, char *);
  82 static int              chkfiles(char *, char **);
  83 static int              rcopy(char *, char *);
  84 static int              chk_different(char *, char *);
  85 static int              chg_time(char *, struct stat);
  86 static int              chg_mode(char *, uid_t, gid_t, mode_t);
  87 static int              copydir(char *, char *);
  88 static int              copyspecial(char *);
  89 static int              getrealpath(char *, char *);
  90 static void             usage(void);
  91 static void             Perror(char *);
  92 static void             Perror2(char *, char *);
  93 static int              use_stdin(void);
  94 static int              copyattributes(char *, char *);
  95 static int              copy_sysattr(char *, char *);
  96 static tree_node_t      *create_tnode(dev_t, ino_t);
  97 
  98 static struct stat      s1, s2, s3, s4;
  99 static int              cpy = FALSE;
 100 static int              mve = FALSE;
 101 static int              lnk = FALSE;
 102 static char             *cmd;
 103 static int              silent = 0;
 104 static int              fflg = 0;
 105 static int              iflg = 0;
 106 static int              pflg = 0;
 107 static int              Rflg = 0;       /* recursive copy */
 108 static int              rflg = 0;       /* recursive copy */
 109 static int              sflg = 0;
 110 static int              Hflg = 0;       /* follow cmd line arg symlink to dir */
 111 static int              Lflg = 0;       /* follow symlinks */
 112 static int              Pflg = 0;       /* do not follow symlinks */
 113 static int              atflg = 0;
 114 static int              attrsilent = 0;
 115 static int              targetexists = 0;
 116 static int              cmdarg;         /* command line argument */
 117 static avl_tree_t       *stree = NULL;  /* source file inode search tree */
 118 static acl_t            *s1acl;
 119 static int              saflg = 0;      /* 'cp' extended system attr. */
 120 static int              srcfd = -1;
 121 static int              targfd = -1;
 122 static int              sourcedirfd = -1;
 123 static int              targetdirfd = -1;
 124 static DIR              *srcdirp = NULL;
 125 static int              srcattrfd = -1;
 126 static int              targattrfd = -1;
 127 static struct stat      attrdir;
 128 
 129 /* Extended system attributes support */
 130 
 131 static int open_source(char  *);
 132 static int open_target_srctarg_attrdirs(char  *, char *);
 133 static int open_attrdirp(char *);
 134 static int traverse_attrfile(struct dirent *, char *, char *, int);
 135 static void rewind_attrdir(DIR *);
 136 static void close_all();
 137 
 138 
 139 int
 140 main(int argc, char *argv[])
 141 {
 142         int c, i, r, errflg = 0;
 143         char target[PATH_MAX];
 144         int (*move)(char *, char *);
 145 
 146         /*
 147          * Determine command invoked (mv, cp, or ln)
 148          */
 149 
 150         if (cmd = strrchr(argv[0], '/'))
 151                 ++cmd;
 152         else
 153                 cmd = argv[0];
 154 
 155         /*
 156          * Set flags based on command.
 157          */
 158 
 159         (void) setlocale(LC_ALL, "");
 160 #if !defined(TEXT_DOMAIN)       /* Should be defined by cc -D */
 161 #define TEXT_DOMAIN "SYS_TEST"  /* Use this only if it weren't */
 162 #endif
 163         (void) textdomain(TEXT_DOMAIN);
 164         if (init_yes() < 0) {
 165                 (void) fprintf(stderr, gettext(ERR_MSG_INIT_YES),
 166                     strerror(errno));
 167                 exit(3);
 168         }
 169 
 170         if (EQ(cmd, "mv"))
 171                 mve = TRUE;
 172         else if (EQ(cmd, "ln"))
 173                 lnk = TRUE;
 174         else if (EQ(cmd, "cp"))
 175                 cpy = TRUE;
 176         else {
 177                 (void) fprintf(stderr,
 178                     gettext("Invalid command name (%s); expecting "
 179                     "mv, cp, or ln.\n"), cmd);
 180                 exit(1);
 181         }
 182 
 183         /*
 184          * Check for options:
 185          *      cp  -r|-R [-H|-L|-P] [-fip@/] file1 [file2 ...] target
 186          *      cp [-fiprR@/] file1 [file2 ...] target
 187          *      ln [-f] [-n] [-s] file1 [file2 ...] target
 188          *      ln [-f] [-n] [-s] file1 [file2 ...]
 189          *      mv [-f|i] file1 [file2 ...] target
 190          *      mv [-f|i] dir1 target
 191          */
 192 
 193         if (cpy) {
 194                 while ((c = getopt(argc, argv, "fHiLpPrR@/")) != EOF)
 195                         switch (c) {
 196                         case 'f':
 197                                 fflg++;
 198                                 break;
 199                         case 'i':
 200                                 iflg++;
 201                                 break;
 202                         case 'p':
 203                                 pflg++;
 204 #ifdef XPG4
 205                                 attrsilent = 1;
 206                                 atflg = 0;
 207                                 saflg = 0;
 208 #else
 209                                 if (atflg == 0)
 210                                         attrsilent = 1;
 211 #endif
 212                                 break;
 213                         case 'H':
 214                                 /*
 215                                  * If more than one of -H, -L, or -P are
 216                                  * specified, only the last option specified
 217                                  * determines the behavior.
 218                                  */
 219                                 Lflg = Pflg = 0;
 220                                 Hflg++;
 221                                 break;
 222                         case 'L':
 223                                 Hflg = Pflg = 0;
 224                                 Lflg++;
 225                                 break;
 226                         case 'P':
 227                                 Lflg = Hflg = 0;
 228                                 Pflg++;
 229                                 break;
 230                         case 'R':
 231                                 /*
 232                                  * The default behavior of cp -R|-r
 233                                  * when specified without -H|-L|-P
 234                                  * is -L.
 235                                  */
 236                                 Rflg++;
 237                                 /*FALLTHROUGH*/
 238                         case 'r':
 239                                 rflg++;
 240                                 break;
 241                         case '@':
 242                                 atflg++;
 243                                 attrsilent = 0;
 244 #ifdef XPG4
 245                                 pflg = 0;
 246 #endif
 247                                 break;
 248                         case '/':
 249                                 saflg++;
 250                                 attrsilent = 0;
 251 #ifdef XPG4
 252                                 pflg = 0;
 253 #endif
 254                                 break;
 255                         default:
 256                                 errflg++;
 257                         }
 258 
 259                 /* -R or -r must be specified with -H, -L, or -P */
 260                 if ((Hflg || Lflg || Pflg) && !(Rflg || rflg)) {
 261                         errflg++;
 262                 }
 263 
 264         } else if (mve) {
 265                 while ((c = getopt(argc, argv, "fis")) != EOF)
 266                         switch (c) {
 267                         case 'f':
 268                                 silent++;
 269 #ifdef XPG4
 270                                 iflg = 0;
 271 #endif
 272                                 break;
 273                         case 'i':
 274                                 iflg++;
 275 #ifdef XPG4
 276                                 silent = 0;
 277 #endif
 278                                 break;
 279                         default:
 280                                 errflg++;
 281                         }
 282         } else { /* ln */
 283                 while ((c = getopt(argc, argv, "fns")) != EOF)
 284                         switch (c) {
 285                         case 'f':
 286                                 silent++;
 287                                 break;
 288                         case 'n':
 289                                 /* silently ignored; this is the default */
 290                                 break;
 291                         case 's':
 292                                 sflg++;
 293                                 break;
 294                         default:
 295                                 errflg++;
 296                         }
 297         }
 298 
 299         /*
 300          * For BSD compatibility allow - to delimit the end of
 301          * options for mv.
 302          */
 303         if (mve && optind < argc && (strcmp(argv[optind], "-") == 0))
 304                 optind++;
 305 
 306         /*
 307          * Check for sufficient arguments
 308          * or a usage error.
 309          */
 310 
 311         argc -= optind;
 312         argv  = &argv[optind];
 313 
 314         if ((argc < 2 && lnk != TRUE) || (argc < 1 && lnk == TRUE)) {
 315                 (void) fprintf(stderr,
 316                     gettext("%s: Insufficient arguments (%d)\n"),
 317                     cmd, argc);
 318                 usage();
 319         }
 320 
 321         if (errflg != 0)
 322                 usage();
 323 
 324         /*
 325          * If there is more than a source and target,
 326          * the last argument (the target) must be a directory
 327          * which really exists.
 328          */
 329 
 330         if (argc > 2) {
 331                 if (stat(argv[argc-1], &s2) < 0) {
 332                         (void) fprintf(stderr,
 333                             gettext("%s: %s not found\n"),
 334                             cmd, argv[argc-1]);
 335                         exit(2);
 336                 }
 337 
 338                 if (!ISDIR(s2)) {
 339                         (void) fprintf(stderr,
 340                             gettext("%s: Target %s must be a directory\n"),
 341                             cmd, argv[argc-1]);
 342                         usage();
 343                 }
 344         }
 345 
 346         if (strlen(argv[argc-1]) >= PATH_MAX) {
 347                 (void) fprintf(stderr,
 348                     gettext("%s: Target %s file name length exceeds PATH_MAX"
 349                     " %d\n"), cmd, argv[argc-1], PATH_MAX);
 350                 exit(78);
 351         }
 352 
 353         if (argc == 1) {
 354                 if (!lnk)
 355                         usage();
 356                 (void) strcpy(target, ".");
 357         } else {
 358                 (void) strcpy(target, argv[--argc]);
 359         }
 360 
 361         /*
 362          * Perform a multiple argument mv|cp|ln by
 363          * multiple invocations of cpymve() or lnkfil().
 364          */
 365         if (lnk)
 366                 move = lnkfil;
 367         else
 368                 move = cpymve;
 369 
 370         r = 0;
 371         for (i = 0; i < argc; i++) {
 372                 stree = NULL;
 373                 cmdarg = 1;
 374                 r += move(argv[i], target);
 375         }
 376 
 377         /*
 378          * Show errors by nonzero exit code.
 379          */
 380 
 381         return (r?2:0);
 382 }
 383 
 384 static int
 385 lnkfil(char *source, char *target)
 386 {
 387         char    *buf = NULL;
 388 
 389         if (sflg) {
 390 
 391                 /*
 392                  * If target is a directory make complete
 393                  * name of the new symbolic link within that
 394                  * directory.
 395                  */
 396 
 397                 if ((stat(target, &s2) >= 0) && ISDIR(s2)) {
 398                         size_t len;
 399 
 400                         len = strlen(target) + strlen(dname(source)) + 4;
 401                         if ((buf = (char *)malloc(len)) == NULL) {
 402                                 (void) fprintf(stderr,
 403                                     gettext("%s: Insufficient memory "
 404                                     "to %s %s\n"), cmd, cmd, source);
 405                                 exit(3);
 406                         }
 407                         (void) snprintf(buf, len, "%s/%s",
 408                             target, dname(source));
 409                         target = buf;
 410                 }
 411 
 412                 /*
 413                  * Check to see if the file exists already.
 414                  * In this case we use lstat() instead of stat():
 415                  * unlink(2) and symlink(2) will operate on the file
 416                  * itself, not its reference, if the file is a symlink.
 417                  */
 418 
 419                 if ((lstat(target, &s2) == 0)) {
 420                         /*
 421                          * Check if the silent flag is set ie. the -f option
 422                          * is used.  If so, use unlink to remove the current
 423                          * target to replace with the new target, specified
 424                          * on the command line.  Proceed with symlink.
 425                          */
 426                         if (silent) {
 427                         /*
 428                          * Don't allow silent (-f) removal of an existing
 429                          * directory; could leave unreferenced directory
 430                          * entries.
 431                          */
 432                                 if (ISDIR(s2)) {
 433                                         (void) fprintf(stderr,
 434                                             gettext("%s: cannot create link "
 435                                             "over directory %s\n"), cmd,
 436                                             target);
 437                                         return (1);
 438                                 }
 439                                 if (unlink(target) < 0) {
 440                                         (void) fprintf(stderr,
 441                                             gettext("%s: cannot unlink %s: "),
 442                                             cmd, target);
 443                                         perror("");
 444                                         return (1);
 445                                 }
 446                         }
 447                 }
 448 
 449 
 450                 /*
 451                  * Create a symbolic link to the source.
 452                  */
 453 
 454                 if (symlink(source, target) < 0) {
 455                         (void) fprintf(stderr,
 456                             gettext("%s: cannot create %s: "),
 457                             cmd, target);
 458                         perror("");
 459                         if (buf != NULL)
 460                                 free(buf);
 461                         return (1);
 462                 }
 463                 if (buf != NULL)
 464                         free(buf);
 465                 return (0);
 466         }
 467 
 468         switch (chkfiles(source, &target)) {
 469                 case 1: return (1);
 470                 case 2: return (0);
 471                         /* default - fall through */
 472         }
 473 
 474         /*
 475          * Make sure source file is not a directory,
 476          * we cannot link directories...
 477          */
 478 
 479         if (ISDIR(s1)) {
 480                 (void) fprintf(stderr,
 481                     gettext("%s: %s is a directory\n"), cmd, source);
 482                 return (1);
 483         }
 484 
 485         /*
 486          * hard link, call link() and return.
 487          */
 488 
 489         if (link(source, target) < 0) {
 490                 if (errno == EXDEV)
 491                         (void) fprintf(stderr,
 492                             gettext("%s: %s is on a different file system\n"),
 493                             cmd, target);
 494                 else {
 495                         (void) fprintf(stderr,
 496                             gettext("%s: cannot create link %s: "),
 497                             cmd, target);
 498                         perror("");
 499                 }
 500                 if (buf != NULL)
 501                         free(buf);
 502                 return (1);
 503         } else {
 504                 if (buf != NULL)
 505                         free(buf);
 506                 return (0);
 507         }
 508 }
 509 
 510 static int
 511 cpymve(char *source, char *target)
 512 {
 513         int     n;
 514         int fi, fo;
 515         int ret = 0;
 516         int attret = 0;
 517         int sattret = 0;
 518         int errno_save;
 519         int error = 0;
 520 
 521         switch (chkfiles(source, &target)) {
 522                 case 1: return (1);
 523                 case 2: return (0);
 524                         /* default - fall through */
 525         }
 526 
 527         /*
 528          * If it's a recursive copy and source
 529          * is a directory, then call rcopy (from copydir).
 530          */
 531         if (cpy) {
 532                 if (ISDIR(s1)) {
 533                         int             rc;
 534                         avl_index_t     where = 0;
 535                         tree_node_t     *tnode;
 536                         tree_node_t     *tptr;
 537                         dev_t           save_dev = s1.st_dev;
 538                         ino_t           save_ino = s1.st_ino;
 539 
 540                         /*
 541                          * We will be recursing into the directory so
 542                          * save the inode information to a search tree
 543                          * to avoid getting into an endless loop.
 544                          */
 545                         if ((rc = add_tnode(&stree, save_dev, save_ino)) != 1) {
 546                                 if (rc == 0) {
 547                                         /*
 548                                          * We've already visited this directory.
 549                                          * Don't remove the search tree entry
 550                                          * to make sure we don't get into an
 551                                          * endless loop if revisited from a
 552                                          * different part of the hierarchy.
 553                                          */
 554                                         (void) fprintf(stderr, gettext(
 555                                             "%s: cycle detected: %s\n"),
 556                                             cmd, source);
 557                                 } else {
 558                                         Perror(source);
 559                                 }
 560                                 return (1);
 561                         }
 562 
 563                         cmdarg = 0;
 564                         rc = copydir(source, target);
 565 
 566                         /*
 567                          * Create a tnode to get an index to the matching
 568                          * node (same dev and inode) in the search tree,
 569                          * then use the index to remove the matching node
 570                          * so it we do not wrongly detect a cycle when
 571                          * revisiting this directory from another part of
 572                          * the hierarchy.
 573                          */
 574                         if ((tnode = create_tnode(save_dev,
 575                             save_ino)) == NULL) {
 576                                 Perror(source);
 577                                 return (1);
 578                         }
 579                         if ((tptr = avl_find(stree, tnode, &where)) != NULL) {
 580                                 avl_remove(stree, tptr);
 581                         }
 582                         free(tptr);
 583                         free(tnode);
 584                         return (rc);
 585 
 586                 } else if (ISDEV(s1) && Rflg) {
 587                         return (copyspecial(target));
 588                 } else {
 589                         goto copy;
 590                 }
 591         }
 592 
 593         if (mve) {
 594                 if (rename(source, target) >= 0)
 595                         return (0);
 596                 if (errno != EXDEV) {
 597                         if (errno == ENOTDIR && ISDIR(s1)) {
 598                                 (void) fprintf(stderr,
 599                                     gettext("%s: %s is a directory\n"),
 600                                     cmd, source);
 601                                 return (1);
 602                         }
 603                         (void) fprintf(stderr,
 604                             gettext("%s: cannot rename %s to %s: "),
 605                             cmd, source, target);
 606                         perror("");
 607                         return (1);
 608                 }
 609 
 610                 /*
 611                  * cannot move a non-directory (source) onto an existing
 612                  * directory (target)
 613                  *
 614                  */
 615                 if (targetexists && ISDIR(s2) && (!ISDIR(s1))) {
 616                         (void) fprintf(stderr,
 617                             gettext("%s: cannot mv a non directory %s "
 618                             "over existing directory"
 619                             " %s \n"), cmd, source, target);
 620                         return (1);
 621                 }
 622                 if (ISDIR(s1)) {
 623 #ifdef XPG4
 624                         if (targetexists && ISDIR(s2)) {
 625                                 /* existing target dir must be empty */
 626                                 if (rmdir(target) < 0) {
 627                                         errno_save = errno;
 628                                         (void) fprintf(stderr,
 629                                             gettext("%s: cannot rmdir %s: "),
 630                                             cmd, target);
 631                                         errno = errno_save;
 632                                         perror("");
 633                                         return (1);
 634                                 }
 635                         }
 636 #endif
 637                         if ((n =  copydir(source, target)) == 0)
 638                                 (void) rmdir(source);
 639                         return (n);
 640                 }
 641 
 642                 /* doors cannot be moved across filesystems */
 643                 if (ISDOOR(s1)) {
 644                         (void) fprintf(stderr,
 645                             gettext("%s: %s: cannot move door "
 646                             "across file systems\n"), cmd, source);
 647                         return (1);
 648                 }
 649 
 650                 /* sockets cannot be moved across filesystems */
 651                 if (ISSOCK(s1)) {
 652                         (void) fprintf(stderr,
 653                             gettext("%s: %s: cannot move socket "
 654                             "across file systems\n"), cmd, source);
 655                         return (1);
 656                 }
 657 
 658                 /*
 659                  * File cannot be renamed, try to recreate the symbolic
 660                  * link or special device, or copy the file wholesale
 661                  * between file systems.
 662                  */
 663                 if (ISLNK(s1)) {
 664                         register int    m;
 665                         register mode_t md;
 666                         char symln[PATH_MAX + 1];
 667 
 668                         if (targetexists && unlink(target) < 0) {
 669                                 (void) fprintf(stderr,
 670                                     gettext("%s: cannot unlink %s: "),
 671                                     cmd, target);
 672                                 perror("");
 673                                 return (1);
 674                         }
 675 
 676                         if ((m = readlink(source, symln,
 677                             sizeof (symln) - 1)) < 0) {
 678                                 Perror(source);
 679                                 return (1);
 680                         }
 681                         symln[m] = '\0';
 682 
 683                         md = umask(~(s1.st_mode & MODEBITS));
 684                         if (symlink(symln, target) < 0) {
 685                                 Perror(target);
 686                                 return (1);
 687                         }
 688                         (void) umask(md);
 689                         m = lchown(target, UID(s1), GID(s1));
 690 #ifdef XPG4
 691                         if (m < 0) {
 692                                 (void) fprintf(stderr, gettext("%s: cannot"
 693                                     " change owner and group of"
 694                                     " %s: "), cmd, target);
 695                                 perror("");
 696                         }
 697 #endif
 698                         goto cleanup;
 699                 }
 700                 if (ISDEV(s1)) {
 701 
 702                         if (targetexists && unlink(target) < 0) {
 703                                 (void) fprintf(stderr,
 704                                     gettext("%s: cannot unlink %s: "),
 705                                     cmd, target);
 706                                 perror("");
 707                                 return (1);
 708                         }
 709 
 710                         if (mknod(target, s1.st_mode, s1.st_rdev) < 0) {
 711                                 Perror(target);
 712                                 return (1);
 713                         }
 714 
 715                         (void) chg_mode(target, UID(s1), GID(s1), FMODE(s1));
 716                         (void) chg_time(target, s1);
 717                         goto cleanup;
 718                 }
 719 
 720                 if (ISREG(s1)) {
 721                         if (ISDIR(s2)) {
 722                                 if (targetexists && rmdir(target) < 0) {
 723                                         (void) fprintf(stderr,
 724                                             gettext("%s: cannot rmdir %s: "),
 725                                             cmd, target);
 726                                         perror("");
 727                                         return (1);
 728                                 }
 729                         } else {
 730                                 if (targetexists && unlink(target) < 0) {
 731                                         (void) fprintf(stderr,
 732                                             gettext("%s: cannot unlink %s: "),
 733                                             cmd, target);
 734                                         perror("");
 735                                         return (1);
 736                                 }
 737                         }
 738 
 739 
 740 copy:
 741                         /*
 742                          * If the source file is a symlink, and either
 743                          * -P or -H flag (only if -H is specified and the
 744                          * source file is not a command line argument)
 745                          * were specified, then action is taken on the symlink
 746                          * itself, not the file referenced by the symlink.
 747                          * Note: this is executed for 'cp' only.
 748                          */
 749                         if (cpy && (Pflg || (Hflg && !cmdarg)) && (ISLNK(s1))) {
 750                                 int     m;
 751                                 mode_t  md;
 752                                 char symln[PATH_MAX + 1];
 753 
 754                                 m = readlink(source, symln, sizeof (symln) - 1);
 755 
 756                                 if (m < 0) {
 757                                         Perror(source);
 758                                         return (1);
 759                                 }
 760                                 symln[m] = '\0';
 761 
 762                                 /*
 763                                  * Copy the sym link to the target.
 764                                  * Note: If the target exists, write a
 765                                  * diagnostic message, do nothing more
 766                                  * with the source file, and return to
 767                                  * process any remaining files.
 768                                  */
 769                                 md = umask(~(s1.st_mode & MODEBITS));
 770                                 if (symlink(symln, target) < 0) {
 771                                         Perror(target);
 772                                         return (1);
 773                                 }
 774                                 (void) umask(md);
 775                                 m = lchown(target, UID(s1), GID(s1));
 776 
 777                                 if (m < 0) {
 778                                         (void) fprintf(stderr, gettext(
 779                                             "cp: cannot change owner and "
 780                                             "group of %s:"), target);
 781                                         perror("");
 782                                 }
 783                         } else {
 784                                 /*
 785                                  * Copy the file.  If it happens to be a
 786                                  * symlink, copy the file referenced
 787                                  * by the symlink.
 788                                  */
 789                                 fi = open(source, O_RDONLY);
 790                                 if (fi < 0) {
 791                                         (void) fprintf(stderr,
 792                                             gettext("%s: cannot open %s: "),
 793                                             cmd, source);
 794                                         perror("");
 795                                         return (1);
 796                                 }
 797 
 798                                 fo = creat(target, s1.st_mode & MODEBITS);
 799                                 if (fo < 0) {
 800                                         /*
 801                                          * If -f and creat() failed, unlink
 802                                          * and try again.
 803                                          */
 804                                         if (fflg) {
 805                                                 (void) unlink(target);
 806                                                 fo = creat(target,
 807                                                     s1.st_mode & MODEBITS);
 808                                         }
 809                                 }
 810                                 if (fo < 0) {
 811                                         (void) fprintf(stderr,
 812                                             gettext("%s: cannot create %s: "),
 813                                             cmd, target);
 814                                         perror("");
 815                                         (void) close(fi);
 816                                         return (1);
 817                                 } else {
 818                                         /* stat the new file, its used below */
 819                                         (void) stat(target, &s2);
 820                                 }
 821 
 822                                 /*
 823                                  * Set target's permissions to the source
 824                                  * before any copying so that any partially
 825                                  * copied file will have the source's
 826                                  * permissions (at most) or umask permissions
 827                                  * whichever is the most restrictive.
 828                                  *
 829                                  * ACL for regular files
 830                                  */
 831 
 832                                 if (pflg || mve) {
 833                                         (void) chmod(target, FMODE(s1));
 834                                         if (s1acl != NULL) {
 835                                                 if ((acl_set(target,
 836                                                     s1acl)) < 0) {
 837                                                         error++;
 838                                                         (void) fprintf(stderr,
 839                                                             gettext("%s: "
 840                                                             "Failed to set "
 841                                                             "acl entries "
 842                                                             "on %s\n"), cmd,
 843                                                             target);
 844                                                         acl_free(s1acl);
 845                                                         s1acl = NULL;
 846                                                         /*
 847                                                          * else: silent and
 848                                                          * continue
 849                                                          */
 850                                                 }
 851                                         }
 852                                 }
 853 
 854                                 if (fstat(fi, &s1) < 0) {
 855                                         (void) fprintf(stderr,
 856                                             gettext("%s: cannot access %s\n"),
 857                                             cmd, source);
 858                                         return (1);
 859                                 }
 860                                 if (IDENTICAL(s1, s2)) {
 861                                         (void) fprintf(stderr,
 862                                             gettext(
 863                                             "%s: %s and %s are identical\n"),
 864                                             cmd, source, target);
 865                                         return (1);
 866                                 }
 867 
 868                                 if (writefile(fi, fo, source, target, NULL,
 869                                     NULL, &s1, &s2) != 0) {
 870                                         return (1);
 871                                 }
 872 
 873                                 (void) close(fi);
 874                                 if (close(fo) < 0) {
 875                                         Perror2(target, "write");
 876                                         return (1);
 877                                 }
 878                         }
 879                         /* Copy regular extended attributes */
 880                         if (pflg || atflg || mve || saflg) {
 881                                 attret = copyattributes(source, target);
 882                                 if (attret != 0 && !attrsilent) {
 883                                         (void) fprintf(stderr, gettext(
 884                                             "%s: Failed to preserve"
 885                                             " extended attributes of file"
 886                                             " %s\n"), cmd, source);
 887                                 }
 888                                 /* Copy extended system attributes */
 889                                 if (pflg || mve || saflg)
 890                                         sattret = copy_sysattr(source, target);
 891                                 if (mve && attret != 0) {
 892                                         (void) unlink(target);
 893                                         return (1);
 894                                 }
 895                                 if (attrsilent) {
 896                                         attret = 0;
 897                                 }
 898                         }
 899 
 900                         /*
 901                          * XPG4: the write system call will clear setgid
 902                          * and setuid bits, so set them again.
 903                          */
 904                         if (pflg || mve) {
 905                                 if ((ret = chg_mode(target, UID(s1), GID(s1),
 906                                     FMODE(s1))) > 0)
 907                                         return (1);
 908                                 /*
 909                                  * Reapply ACL, since chmod may have
 910                                  * altered ACL
 911                                  */
 912                                 if (s1acl != NULL) {
 913                                         if ((acl_set(target, s1acl)) < 0) {
 914                                                 error++;
 915                                                 (void) fprintf(stderr,
 916                                                     gettext("%s: Failed to "
 917                                                     "set acl entries "
 918                                                     "on %s\n"), cmd, target);
 919                                                 /*
 920                                                  * else: silent and
 921                                                  * continue
 922                                                  */
 923                                         }
 924                                 }
 925                                 if ((ret = chg_time(target, s1)) > 0)
 926                                         return (1);
 927                         }
 928                         if (cpy) {
 929                                 if (error != 0 || attret != 0 || sattret != 0)
 930                                         return (1);
 931                                 return (0);
 932                         }
 933                         goto cleanup;
 934                 }
 935                 (void) fprintf(stderr,
 936                     gettext("%s: %s: unknown file type 0x%x\n"), cmd,
 937                     source, (s1.st_mode & S_IFMT));
 938                 return (1);
 939 
 940 cleanup:
 941                 if (unlink(source) < 0) {
 942                         (void) unlink(target);
 943                         (void) fprintf(stderr,
 944                             gettext("%s: cannot unlink %s: "),
 945                             cmd, source);
 946                         perror("");
 947                         return (1);
 948                 }
 949                 if (error != 0 || attret != 0 || sattret != 0)
 950                         return (1);
 951                 return (ret);
 952         }
 953         /*NOTREACHED*/
 954         return (ret);
 955 }
 956 
 957 /*
 958  * create_tnode()
 959  *
 960  * Create a node for use with the search tree which contains the
 961  * inode information (device id and inode number).
 962  *
 963  * Input
 964  *      dev     - device id
 965  *      ino     - inode number
 966  *
 967  * Output
 968  *      tnode   - NULL on error, otherwise returns a tnode structure
 969  *                which contains the input device id and inode number.
 970  */
 971 static tree_node_t *
 972 create_tnode(dev_t dev, ino_t ino)
 973 {
 974         tree_node_t     *tnode;
 975 
 976         if ((tnode = (tree_node_t *)malloc(sizeof (tree_node_t))) != NULL) {
 977                 tnode->node_dev = dev;
 978                 tnode->node_ino = ino;
 979         }
 980 
 981         return (tnode);
 982 }
 983 
 984 static int
 985 chkfiles(char *source, char **to)
 986 {
 987         char    *buf = (char *)NULL;
 988         int     (*statf)() = (cpy &&
 989             !(Pflg || (Hflg && !cmdarg))) ? stat : lstat;
 990         char    *target = *to;
 991         int     error;
 992 
 993         /*
 994          * Make sure source file exists.
 995          */
 996         if ((*statf)(source, &s1) < 0) {
 997                 /*
 998                  * Keep the old error message except when someone tries to
 999                  * mv/cp/ln a symbolic link that has a trailing slash and
1000                  * points to a file.
1001                  */
1002                 if (errno == ENOTDIR)
1003                         (void) fprintf(stderr, "%s: %s: %s\n", cmd, source,
1004                             strerror(errno));
1005                 else
1006                         (void) fprintf(stderr,
1007                             gettext("%s: cannot access %s\n"), cmd, source);
1008                 return (1);
1009         }
1010 
1011         /*
1012          * Get ACL info: don't bother with ln or cp/mv'ing symlinks
1013          */
1014         if (!lnk && !ISLNK(s1)) {
1015                 if (s1acl != NULL) {
1016                         acl_free(s1acl);
1017                         s1acl = NULL;
1018                 }
1019                 if ((error = acl_get(source, ACL_NO_TRIVIAL, &s1acl)) != 0) {
1020                         (void) fprintf(stderr,
1021                             "%s: failed to get acl entries: %s\n", source,
1022                             acl_strerror(error));
1023                         return (1);
1024                 }
1025                 /* else: just permission bits */
1026         }
1027 
1028         /*
1029          * If stat fails, then the target doesn't exist,
1030          * we will create a new target with default file type of regular.
1031          */
1032 
1033         FTYPE(s2) = S_IFREG;
1034         targetexists = 0;
1035         if ((*statf)(target, &s2) >= 0) {
1036                 if (ISLNK(s2))
1037                         (void) stat(target, &s2);
1038                 /*
1039                  * If target is a directory,
1040                  * make complete name of new file
1041                  * within that directory.
1042                  */
1043                 if (ISDIR(s2)) {
1044                         size_t len;
1045 
1046                         len = strlen(target) + strlen(dname(source)) + 4;
1047                         if ((buf = (char *)malloc(len)) == NULL) {
1048                                 (void) fprintf(stderr,
1049                                     gettext("%s: Insufficient memory to "
1050                                     "%s %s\n "), cmd, cmd, source);
1051                                 exit(3);
1052                         }
1053                         (void) snprintf(buf, len, "%s/%s",
1054                             target, dname(source));
1055                         *to = target = buf;
1056                 }
1057 
1058                 if ((*statf)(target, &s2) >= 0) {
1059                         int overwrite   = FALSE;
1060                         int override    = FALSE;
1061 
1062                         targetexists++;
1063                         if (cpy || mve) {
1064                                 /*
1065                                  * For cp and mv, it is an error if the
1066                                  * source and target are the same file.
1067                                  * Check for the same inode and file
1068                                  * system, but don't check for the same
1069                                  * absolute pathname because it is an
1070                                  * error when the source and target are
1071                                  * hard links to the same file.
1072                                  */
1073                                 if (IDENTICAL(s1, s2)) {
1074                                         (void) fprintf(stderr,
1075                                             gettext(
1076                                             "%s: %s and %s are identical\n"),
1077                                             cmd, source, target);
1078                                         if (buf != NULL)
1079                                                 free(buf);
1080                                         return (1);
1081                                 }
1082                         }
1083                         if (lnk) {
1084                                 /*
1085                                  * For ln, it is an error if the source and
1086                                  * target are identical files (same inode,
1087                                  * same file system, and filenames resolve
1088                                  * to same absolute pathname).
1089                                  */
1090                                 if (!chk_different(source, target)) {
1091                                         if (buf != NULL)
1092                                                 free(buf);
1093                                         return (1);
1094                                 }
1095                         }
1096                         if (lnk && !silent) {
1097                                 (void) fprintf(stderr,
1098                                     gettext("%s: %s: File exists\n"),
1099                                     cmd, target);
1100                                 if (buf != NULL)
1101                                         free(buf);
1102                                 return (1);
1103                         }
1104 
1105                         /*
1106                          * overwrite:
1107                          * If the user does not have access to
1108                          * the target, ask ----if it is not
1109                          * silent and user invoked command
1110                          * interactively.
1111                          *
1112                          * override:
1113                          * If not silent, and stdin is a terminal, and
1114                          * there's no write access, and the file isn't a
1115                          * symbolic link, ask for permission.
1116                          *
1117                          * XPG4: both overwrite and override:
1118                          * ask only one question.
1119                          *
1120                          * TRANSLATION_NOTE - The following messages will
1121                          * contain the first character of the strings for
1122                          * "yes" and "no" defined in the file
1123                          * "nl_langinfo.po".  After substitution, the
1124                          * message will appear as follows:
1125                          *      <cmd>: overwrite <filename> (y/n)?
1126                          * where <cmd> is the name of the command
1127                          * (cp, mv) and <filename> is the destination file
1128                          */
1129 
1130 
1131                         overwrite = iflg && !silent && use_stdin();
1132                         override = !cpy && (access(target, 2) < 0) &&
1133                             !silent && use_stdin() && !ISLNK(s2);
1134 
1135                         if (overwrite && override) {
1136                                 (void) fprintf(stderr,
1137                                     gettext("%s: overwrite %s and override "
1138                                     "protection %o (%s/%s)? "), cmd, target,
1139                                     FMODE(s2) & MODEBITS, yesstr, nostr);
1140                                 if (yes() == 0) {
1141                                         if (buf != NULL)
1142                                                 free(buf);
1143                                         return (2);
1144                                 }
1145                         } else if (overwrite && ISREG(s2)) {
1146                                 (void) fprintf(stderr,
1147                                     gettext("%s: overwrite %s (%s/%s)? "),
1148                                     cmd, target, yesstr, nostr);
1149                                 if (yes() == 0) {
1150                                         if (buf != NULL)
1151                                                 free(buf);
1152                                         return (2);
1153                                 }
1154                         } else if (override) {
1155                                 (void) fprintf(stderr,
1156                                     gettext("%s: %s: override protection "
1157                                     /*CSTYLED*/
1158                                     "%o (%s/%s)? "),
1159                                     /*CSTYLED*/
1160                                     cmd, target, FMODE(s2) & MODEBITS,
1161                                     yesstr, nostr);
1162                                 if (yes() == 0) {
1163                                         if (buf != NULL)
1164                                                 free(buf);
1165                                         return (2);
1166                                 }
1167                         }
1168 
1169                         if (lnk && unlink(target) < 0) {
1170                                 (void) fprintf(stderr,
1171                                     gettext("%s: cannot unlink %s: "),
1172                                     cmd, target);
1173                                 perror("");
1174                                 return (1);
1175                         }
1176                 }
1177         }
1178         return (0);
1179 }
1180 
1181 /*
1182  * check whether source and target are different
1183  * return 1 when they are different
1184  * return 0 when they are identical, or when unable to resolve a pathname
1185  */
1186 static int
1187 chk_different(char *source, char *target)
1188 {
1189         char    rtarget[PATH_MAX], rsource[PATH_MAX];
1190 
1191         if (IDENTICAL(s1, s2)) {
1192                 /*
1193                  * IDENTICAL will be true for hard links, therefore
1194                  * check whether the filenames are different
1195                  */
1196                 if ((getrealpath(source, rsource) == 0) ||
1197                     (getrealpath(target, rtarget) == 0)) {
1198                         return (0);
1199                 }
1200                 if (strncmp(rsource, rtarget, PATH_MAX) == 0) {
1201                         (void) fprintf(stderr, gettext(
1202                             "%s: %s and %s are identical\n"),
1203                             cmd, source, target);
1204                         return (0);
1205                 }
1206         }
1207         return (1);
1208 }
1209 
1210 /*
1211  * get real path (resolved absolute pathname)
1212  * return 1 on success, 0 on failure
1213  */
1214 static int
1215 getrealpath(char *path, char *rpath)
1216 {
1217         if (realpath(path, rpath) == NULL) {
1218                 int     errno_save = errno;
1219                 (void) fprintf(stderr, gettext(
1220                     "%s: cannot resolve path %s: "), cmd, path);
1221                 errno = errno_save;
1222                 perror("");
1223                 return (0);
1224         }
1225         return (1);
1226 }
1227 
1228 static int
1229 rcopy(char *from, char *to)
1230 {
1231         DIR *fold = opendir(from);
1232         struct dirent *dp;
1233         struct stat statb, s1save;
1234         int errs = 0;
1235         char fromname[PATH_MAX];
1236 
1237         if (fold == 0 || ((pflg || mve) && fstat(fold->dd_fd, &statb) < 0)) {
1238                 Perror(from);
1239                 return (1);
1240         }
1241         if (pflg || mve) {
1242                 /*
1243                  * Save s1 (stat information for source dir) so that
1244                  * mod and access times can be reserved during "cp -p"
1245                  * or mv, since s1 gets overwritten.
1246                  */
1247                 s1save = s1;
1248         }
1249         for (;;) {
1250                 dp = readdir(fold);
1251                 if (dp == 0) {
1252                         (void) closedir(fold);
1253                         if (pflg || mve)
1254                                 return (chg_time(to, s1save) + errs);
1255                         return (errs);
1256                 }
1257                 if (dp->d_ino == 0)
1258                         continue;
1259                 if ((strcmp(dp->d_name, ".") == 0) ||
1260                     (strcmp(dp->d_name, "..") == 0))
1261                         continue;
1262                 if (strlen(from)+1+strlen(dp->d_name) >=
1263                     sizeof (fromname) - 1) {
1264                         (void) fprintf(stderr,
1265                             gettext("%s : %s/%s: Name too long\n"),
1266                             cmd, from, dp->d_name);
1267                         errs++;
1268                         continue;
1269                 }
1270                 (void) snprintf(fromname, sizeof (fromname),
1271                     "%s/%s", from, dp->d_name);
1272                 errs += cpymve(fromname, to);
1273         }
1274 }
1275 
1276 static char *
1277 dname(char *name)
1278 {
1279         register char *p;
1280 
1281         /*
1282          * Return just the file name given the complete path.
1283          * Like basename(1).
1284          */
1285 
1286         p = name;
1287 
1288         /*
1289          * While there are characters left,
1290          * set name to start after last
1291          * delimiter.
1292          */
1293 
1294         while (*p)
1295                 if (*p++ == DELIM && *p)
1296                         name = p;
1297         return (name);
1298 }
1299 
1300 static void
1301 usage(void)
1302 {
1303         /*
1304          * Display usage message.
1305          */
1306 
1307         if (mve) {
1308                 (void) fprintf(stderr, gettext(
1309                     "Usage: mv [-f] [-i] f1 f2\n"
1310                     "       mv [-f] [-i] f1 ... fn d1\n"
1311                     "       mv [-f] [-i] d1 d2\n"));
1312         } else if (lnk) {
1313 #ifdef XPG4
1314                 (void) fprintf(stderr, gettext(
1315                     "Usage: ln [-f] [-s] f1 [f2]\n"
1316                     "       ln [-f] [-s] f1 ... fn d1\n"
1317                     "       ln [-f] -s d1 d2\n"));
1318 #else
1319                 (void) fprintf(stderr, gettext(
1320                     "Usage: ln [-f] [-n] [-s] f1 [f2]\n"
1321                     "       ln [-f] [-n] [-s] f1 ... fn d1\n"
1322                     "       ln [-f] [-n] -s d1 d2\n"));
1323 #endif
1324         } else if (cpy) {
1325                 (void) fprintf(stderr, gettext(
1326                     "Usage: cp [-f] [-i] [-p] [-@] [-/] f1 f2\n"
1327                     "       cp [-f] [-i] [-p] [-@] [-/] f1 ... fn d1\n"
1328                     "       cp -r|-R [-H|-L|-P] [-f] [-i] [-p] [-@] [-/] "
1329                     "d1 ... dn-1 dn\n"));
1330         }
1331         exit(2);
1332 }
1333 
1334 /*
1335  * chg_time()
1336  *
1337  * Try to preserve modification and access time.
1338  * If 1) pflg is not set, or 2) pflg is set and this is the Solaris version,
1339  * don't report a utimensat() failure.
1340  * If this is the XPG4 version and utimensat fails, if 1) pflg is set (cp -p)
1341  * or 2) we are doing a mv, print a diagnostic message; arrange for a non-zero
1342  * exit status only if pflg is set.
1343  * utimensat(2) is being used to achieve granularity in nanoseconds
1344  * (if supported by the underlying file system) while setting file times.
1345  */
1346 static int
1347 chg_time(char *to, struct stat ss)
1348 {
1349         struct timespec times[2];
1350         int rc;
1351 
1352         times[0] = ss.st_atim;
1353         times[1] = ss.st_mtim;
1354 
1355         rc = utimensat(AT_FDCWD, to, times,
1356             ISLNK(s1) ? AT_SYMLINK_NOFOLLOW : 0);
1357 #ifdef XPG4
1358         if ((pflg || mve) && rc != 0) {
1359                 (void) fprintf(stderr,
1360                     gettext("%s: cannot set times for %s: "), cmd, to);
1361                 perror("");
1362                 if (pflg)
1363                         return (1);
1364         }
1365 #endif
1366 
1367         return (0);
1368 
1369 }
1370 
1371 /*
1372  * chg_mode()
1373  *
1374  * This function is called upon "cp -p" or mv across filesystems.
1375  *
1376  * Try to preserve the owner and group id.  If chown() fails,
1377  * only print a diagnostic message if doing a mv in the XPG4 version;
1378  * try to clear S_ISUID and S_ISGID bits in the target.  If unable to clear
1379  * S_ISUID and S_ISGID bits, print a diagnostic message and arrange for a
1380  * non-zero exit status because this is a security violation.
1381  * Try to preserve permissions.
1382  * If this is the XPG4 version and chmod() fails, print a diagnostic message
1383  * and arrange for a non-zero exit status.
1384  * If this is the Solaris version and chmod() fails, do not print a
1385  * diagnostic message or exit with a non-zero value.
1386  */
1387 static int
1388 chg_mode(char *target, uid_t uid, gid_t gid, mode_t mode)
1389 {
1390         int clearflg = 0; /* controls message printed upon chown() error */
1391         struct stat st;
1392 
1393         /* Don't change mode if target is symlink */
1394         if (lstat(target, &st) == 0 && ISLNK(st))
1395                 return (0);
1396 
1397         if (chown(target, uid, gid) != 0) {
1398 #ifdef XPG4
1399                 if (mve) {
1400                         (void) fprintf(stderr, gettext("%s: cannot change"
1401                             " owner and group of %s: "), cmd, target);
1402                         perror("");
1403                 }
1404 #endif
1405                 if (mode & (S_ISUID | S_ISGID)) {
1406                         /* try to clear S_ISUID and S_ISGID */
1407                         mode &= ~S_ISUID & ~S_ISGID;
1408                         ++clearflg;
1409                 }
1410         }
1411         if (chmod(target, mode) != 0) {
1412                 if (clearflg) {
1413                         (void) fprintf(stderr, gettext(
1414                             "%s: cannot clear S_ISUID and S_ISGID bits in"
1415                             " %s: "), cmd, target);
1416                         perror("");
1417                         /* cp -p should get non-zero exit; mv should not */
1418                         if (pflg)
1419                                 return (1);
1420                 }
1421 #ifdef XPG4
1422                 else {
1423                         (void) fprintf(stderr, gettext(
1424                         "%s: cannot set permissions for %s: "), cmd, target);
1425                         perror("");
1426                         /* cp -p should get non-zero exit; mv should not */
1427                         if (pflg)
1428                                 return (1);
1429                 }
1430 #endif
1431         }
1432         return (0);
1433 
1434 }
1435 
1436 static void
1437 Perror(char *s)
1438 {
1439         char buf[PATH_MAX + 10];
1440 
1441         (void) snprintf(buf, sizeof (buf), "%s: %s", cmd, s);
1442         perror(buf);
1443 }
1444 
1445 static void
1446 Perror2(char *s1, char *s2)
1447 {
1448         char buf[PATH_MAX + 20];
1449 
1450         (void) snprintf(buf, sizeof (buf), "%s: %s: %s",
1451             cmd, gettext(s1), gettext(s2));
1452         perror(buf);
1453 }
1454 
1455 /*
1456  * used for cp -R and for mv across file systems
1457  */
1458 static int
1459 copydir(char *source, char *target)
1460 {
1461         int ret, attret = 0;
1462         int sattret = 0;
1463         int pret = 0;           /* need separate flag if -p is specified */
1464         mode_t  fixmode = (mode_t)0;    /* cleanup mode after copy */
1465         struct stat s1save;
1466         acl_t  *s1acl_save;
1467         int error = 0;
1468 
1469         s1acl_save = NULL;
1470 
1471         if (cpy && !rflg) {
1472                 (void) fprintf(stderr,
1473                     gettext("%s: %s: is a directory\n"), cmd, source);
1474                 return (1);
1475         }
1476 
1477         if (stat(target, &s2) < 0) {
1478                 if (mkdir(target, (s1.st_mode & MODEBITS)) < 0) {
1479                         (void) fprintf(stderr, "%s: ", cmd);
1480                         perror(target);
1481                         return (1);
1482                 }
1483                 if (stat(target, &s2) == 0) {
1484                         fixmode = s2.st_mode;
1485                 } else {
1486                         fixmode = s1.st_mode;
1487                 }
1488                 (void) chmod(target, ((fixmode & MODEBITS) | S_IRWXU));
1489         } else if (!(ISDIR(s2))) {
1490                 (void) fprintf(stderr,
1491                     gettext("%s: %s: not a directory.\n"), cmd, target);
1492                 return (1);
1493         }
1494         if (pflg || mve) {
1495                 /*
1496                  * Save s1 (stat information for source dir) and acl info,
1497                  * if any, so that ownership, modes, times, and acl's can
1498                  * be reserved during "cp -p" or mv.
1499                  * s1 gets overwritten when doing the recursive copy.
1500                  */
1501                 s1save = s1;
1502                 if (s1acl != NULL) {
1503                         s1acl_save = acl_dup(s1acl);
1504                         if (s1acl_save == NULL) {
1505                                 (void) fprintf(stderr, gettext("%s: "
1506                                     "Insufficient memory to save acl"
1507                                     " entry\n"), cmd);
1508                                 if (pflg)
1509                                         return (1);
1510 
1511                         }
1512 #ifdef XPG4
1513                         else {
1514                                 (void) fprintf(stderr, gettext("%s: "
1515                                     "Insufficient memory to save acl"
1516                                     " entry\n"), cmd);
1517                                 if (pflg)
1518                                         return (1);
1519                         }
1520 #endif
1521                 }
1522         }
1523 
1524         ret = rcopy(source, target);
1525 
1526         /*
1527          * Once we created a directory, go ahead and set
1528          * its attributes, e.g. acls and time. The info
1529          * may get overwritten if we continue traversing
1530          * down the tree.
1531          *
1532          * ACL for directory
1533          */
1534         if (pflg || mve) {
1535                 if ((pret = chg_mode(target, UID(s1save), GID(s1save),
1536                     FMODE(s1save))) == 0)
1537                         pret = chg_time(target, s1save);
1538                 ret += pret;
1539                 if (s1acl_save != NULL) {
1540                         if (acl_set(target, s1acl_save) < 0) {
1541                                 error++;
1542 #ifdef XPG4
1543                                 if (pflg || mve) {
1544 #else
1545                                 if (pflg) {
1546 #endif
1547                                         (void) fprintf(stderr, gettext(
1548                                             "%s: failed to set acl entries "
1549                                             "on %s\n"), cmd, target);
1550                                         if (pflg) {
1551                                                 acl_free(s1acl_save);
1552                                                 s1acl_save = NULL;
1553                                                 ret++;
1554                                         }
1555                                 }
1556                                 /* else: silent and continue */
1557                         }
1558                         acl_free(s1acl_save);
1559                         s1acl_save = NULL;
1560                 }
1561         } else if (fixmode != (mode_t)0)
1562                 (void) chmod(target, fixmode & MODEBITS);
1563 
1564         if (pflg || atflg || mve || saflg) {
1565                 attret = copyattributes(source, target);
1566                 if (!attrsilent && attret != 0) {
1567                         (void) fprintf(stderr, gettext("%s: Failed to preserve"
1568                             " extended attributes of directory"
1569                             " %s\n"), cmd, source);
1570                 } else {
1571                         /*
1572                          * Otherwise ignore failure.
1573                          */
1574                         attret = 0;
1575                 }
1576                 /* Copy extended system attributes */
1577                 if (pflg || mve || saflg) {
1578                         sattret = copy_sysattr(source, target);
1579                         if (sattret != 0) {
1580                                 (void) fprintf(stderr, gettext(
1581                                     "%s: Failed to preserve "
1582                                     "extended system attributes "
1583                                     "of directory %s\n"), cmd, source);
1584                         }
1585                 }
1586         }
1587         if (attret != 0 || sattret != 0 || error != 0)
1588                 return (1);
1589         return (ret);
1590 }
1591 
1592 static int
1593 copyspecial(char *target)
1594 {
1595         int ret = 0;
1596 
1597         if (mknod(target, s1.st_mode, s1.st_rdev) != 0) {
1598                 (void) fprintf(stderr, gettext(
1599                     "cp: cannot create special file %s: "), target);
1600                 perror("");
1601                 return (1);
1602         }
1603 
1604         if (pflg) {
1605                 if ((ret = chg_mode(target, UID(s1), GID(s1), FMODE(s1))) == 0)
1606                         ret = chg_time(target, s1);
1607         }
1608 
1609         return (ret);
1610 }
1611 
1612 static int
1613 use_stdin(void)
1614 {
1615 #ifdef XPG4
1616         return (1);
1617 #else
1618         return (isatty(fileno(stdin)));
1619 #endif
1620 }
1621 
1622 /* Copy non-system extended attributes */
1623 
1624 static int
1625 copyattributes(char *source, char *target)
1626 {
1627         struct dirent *dp;
1628         int error = 0;
1629         int aclerror;
1630         mode_t mode;
1631         int clearflg = 0;
1632         acl_t *xacl = NULL;
1633         acl_t *attrdiracl = NULL;
1634         struct timespec times[2];
1635 
1636 
1637         if (pathconf(source,  _PC_XATTR_EXISTS) != 1)
1638                 return (0);
1639 
1640         if (pathconf(target, _PC_XATTR_ENABLED) != 1) {
1641                 if (!attrsilent) {
1642                         (void) fprintf(stderr,
1643                             gettext(
1644                             "%s: cannot preserve extended attributes, "
1645                             "operation not supported on file"
1646                             " %s\n"), cmd, target);
1647                 }
1648                 return (1);
1649         }
1650         if (open_source(source) != 0)
1651                 return (1);
1652         if (open_target_srctarg_attrdirs(source, target) !=  0)
1653                 return (1);
1654         if (open_attrdirp(source) != 0)
1655                 return (1);
1656 
1657         if (pflg || mve) {
1658                 if (fchmod(targetdirfd, attrdir.st_mode) == -1) {
1659                         if (!attrsilent) {
1660                                 (void) fprintf(stderr,
1661                                     gettext("%s: failed to set file mode"
1662                                     " correctly on attribute directory of"
1663                                     " file %s: "), cmd, target);
1664                                 perror("");
1665                                 ++error;
1666                         }
1667                 }
1668 
1669                 if (fchown(targetdirfd, attrdir.st_uid, attrdir.st_gid) == -1) {
1670                         if (!attrsilent) {
1671                                 (void) fprintf(stderr,
1672                                     gettext("%s: failed to set file"
1673                                     " ownership correctly on attribute"
1674                                     " directory of file %s: "), cmd, target);
1675                                 perror("");
1676                                 ++error;
1677                         }
1678                 }
1679                 /*
1680                  * Now that we are the owner we can update st_ctime by calling
1681                  * utimensat.
1682                  */
1683                 times[0] = attrdir.st_atim;
1684                 times[1] = attrdir.st_mtim;
1685                 if (utimensat(targetdirfd, ".", times, 0) < 0) {
1686                         if (!attrsilent) {
1687                                 (void) fprintf(stderr,
1688                                     gettext("%s: cannot set attribute times"
1689                                     " for %s: "), cmd, target);
1690                                 perror("");
1691                                 ++error;
1692                         }
1693                 }
1694 
1695                 /*
1696                  * Now set owner and group of attribute directory, implies
1697                  * changing the ACL of the hidden attribute directory first.
1698                  */
1699                 if ((aclerror = facl_get(sourcedirfd,
1700                     ACL_NO_TRIVIAL, &attrdiracl)) != 0) {
1701                         if (!attrsilent) {
1702                                 (void) fprintf(stderr, gettext(
1703                                     "%s: failed to get acl entries of"
1704                                     " attribute directory for"
1705                                     " %s : %s\n"), cmd,
1706                                     source, acl_strerror(aclerror));
1707                                 ++error;
1708                         }
1709                 }
1710 
1711                 if (attrdiracl) {
1712                         if (facl_set(targetdirfd, attrdiracl) != 0) {
1713                                 if (!attrsilent) {
1714                                         (void) fprintf(stderr, gettext(
1715                                         "%s: failed to set acl entries"
1716                                         " on attribute directory "
1717                                         "for %s\n"), cmd, target);
1718                                         ++error;
1719                                 }
1720                                 acl_free(attrdiracl);
1721                                 attrdiracl = NULL;
1722                         }
1723                 }
1724         }
1725 
1726         while ((dp = readdir(srcdirp)) != NULL) {
1727                 int ret;
1728 
1729                 if ((ret = traverse_attrfile(dp, source, target, 1)) == -1)
1730                         continue;
1731                 else if (ret > 0) {
1732                         ++error;
1733                         goto out;
1734                 }
1735 
1736                 if (pflg || mve) {
1737                         if ((aclerror = facl_get(srcattrfd,
1738                             ACL_NO_TRIVIAL, &xacl)) != 0) {
1739                                 if (!attrsilent) {
1740                                         (void) fprintf(stderr, gettext(
1741                                             "%s: failed to get acl entries of"
1742                                             " attribute %s for"
1743                                             " %s: %s"), cmd, dp->d_name,
1744                                             source, acl_strerror(aclerror));
1745                                         ++error;
1746                                 }
1747                         }
1748                 }
1749 
1750                 /*
1751                  * preserve ACL
1752                  */
1753                 if ((pflg || mve) && xacl != NULL) {
1754                         if ((facl_set(targattrfd, xacl)) < 0) {
1755                                 if (!attrsilent) {
1756                                         (void) fprintf(stderr, gettext(
1757                                             "%s: failed to set acl entries on"
1758                                             " attribute %s for"
1759                                             "%s\n"), cmd, dp->d_name, target);
1760                                         ++error;
1761                                 }
1762                                 acl_free(xacl);
1763                                 xacl = NULL;
1764                         }
1765                 }
1766 
1767                 if (writefile(srcattrfd, targattrfd, source, target,
1768                     dp->d_name, dp->d_name, &s3, &s4) != 0) {
1769                         if (!attrsilent) {
1770                                 ++error;
1771                         }
1772                         goto next;
1773                 }
1774 
1775                 if (pflg || mve) {
1776                         mode = FMODE(s3);
1777 
1778                         if (fchown(targattrfd, UID(s3), GID(s3)) != 0) {
1779                                 if (!attrsilent) {
1780                                         (void) fprintf(stderr,
1781                                             gettext("%s: cannot change"
1782                                             " owner and group of"
1783                                             " attribute %s for" " file"
1784                                             " %s: "), cmd, dp->d_name, target);
1785                                         perror("");
1786                                         ++error;
1787                                 }
1788                                 if (mode & (S_ISUID | S_ISGID)) {
1789                                         /* try to clear S_ISUID and S_ISGID */
1790                                         mode &= ~S_ISUID & ~S_ISGID;
1791                                         ++clearflg;
1792                                 }
1793                         }
1794                         times[0] = s3.st_atim;
1795                         times[1] = s3.st_mtim;
1796                         if (utimensat(targetdirfd, dp->d_name, times, 0) < 0) {
1797                                 if (!attrsilent) {
1798                                         (void) fprintf(stderr,
1799                                             gettext("%s: cannot set attribute"
1800                                             " times for %s: "), cmd, target);
1801                                         perror("");
1802                                         ++error;
1803                                 }
1804                         }
1805                         if (fchmod(targattrfd, mode) != 0) {
1806                                 if (clearflg) {
1807                                         (void) fprintf(stderr, gettext(
1808                                             "%s: cannot clear S_ISUID and "
1809                                             "S_ISGID bits in attribute %s"
1810                                             " for file"
1811                                             " %s: "), cmd, dp->d_name, target);
1812                                 } else {
1813                                         if (!attrsilent) {
1814                                                 (void) fprintf(stderr,
1815                                                     gettext(
1816                                 "%s: cannot set permissions of attribute"
1817                                 " %s for %s: "), cmd, dp->d_name, target);
1818                                                 perror("");
1819                                                 ++error;
1820                                         }
1821                                 }
1822                         }
1823                         if (xacl && ((facl_set(targattrfd, xacl)) < 0)) {
1824                                 if (!attrsilent) {
1825                                         (void) fprintf(stderr, gettext(
1826                                             "%s: failed to set acl entries on"
1827                                             " attribute %s for"
1828                                             "%s\n"), cmd, dp->d_name, target);
1829                                         ++error;
1830                                 }
1831                                 acl_free(xacl);
1832                                 xacl = NULL;
1833                         }
1834                 }
1835 next:
1836                 if (xacl != NULL) {
1837                         acl_free(xacl);
1838                         xacl = NULL;
1839                 }
1840                 if (srcattrfd != -1)
1841                         (void) close(srcattrfd);
1842                 if (targattrfd != -1)
1843                         (void) close(targattrfd);
1844                 srcattrfd = targattrfd = -1;
1845         }
1846 out:
1847         if (xacl != NULL) {
1848                 acl_free(xacl);
1849                 xacl = NULL;
1850         }
1851         if (attrdiracl != NULL) {
1852                 acl_free(attrdiracl);
1853                 attrdiracl = NULL;
1854         }
1855 
1856         if (!saflg && !pflg && !mve)
1857                 close_all();
1858         return (error == 0 ? 0 : 1);
1859 }
1860 
1861 /* Copy extended system attributes from source to target */
1862 
1863 static int
1864 copy_sysattr(char *source, char *target)
1865 {
1866         struct dirent   *dp;
1867         nvlist_t        *response;
1868         int             error = 0;
1869         int             target_sa_support = 0;
1870 
1871         if (sysattr_support(source, _PC_SATTR_EXISTS) != 1)
1872                 return (0);
1873 
1874         if (open_source(source) != 0)
1875                 return (1);
1876 
1877         /*
1878          * Gets non default extended system attributes from the
1879          * source file to copy to the target. The target has
1880          * the defaults set when its created and thus  no need
1881          * to copy the defaults.
1882          */
1883         response = sysattr_list(cmd, srcfd, source);
1884 
1885         if (sysattr_support(target, _PC_SATTR_ENABLED) != 1) {
1886                 if (response != NULL) {
1887                         (void) fprintf(stderr,
1888                             gettext(
1889                             "%s: cannot preserve extended system "
1890                             "attribute, operation not supported on file"
1891                             " %s\n"), cmd, target);
1892                         error++;
1893                         goto out;
1894                 }
1895         } else {
1896                 target_sa_support = 1;
1897         }
1898 
1899         if (target_sa_support) {
1900                 if (srcdirp == NULL) {
1901                         if (open_target_srctarg_attrdirs(source,
1902                             target) !=  0) {
1903                                 error++;
1904                                 goto out;
1905                         }
1906                         if (open_attrdirp(source) != 0) {
1907                                 error++;
1908                                 goto out;
1909                         }
1910                 } else {
1911                         rewind_attrdir(srcdirp);
1912                 }
1913                 while ((dp = readdir(srcdirp)) != NULL) {
1914                         nvlist_t        *res;
1915                         int             ret;
1916 
1917                         if ((ret = traverse_attrfile(dp, source, target,
1918                             0)) == -1)
1919                                 continue;
1920                         else if (ret > 0) {
1921                                 ++error;
1922                                 goto out;
1923                         }
1924                         /*
1925                          * Gets non default extended system attributes from the
1926                          * attribute file to copy to the target. The target has
1927                          * the defaults set when its created and thus  no need
1928                          * to copy the defaults.
1929                          */
1930                         if (dp->d_name != NULL) {
1931                                 res = sysattr_list(cmd, srcattrfd, dp->d_name);
1932                                 if (res == NULL)
1933                                         goto next;
1934 
1935                         /*
1936                          * Copy non default extended system attributes of named
1937                          * attribute file.
1938                          */
1939                                 if (fsetattr(targattrfd,
1940                                     XATTR_VIEW_READWRITE, res) != 0) {
1941                                         ++error;
1942                                         (void) fprintf(stderr, gettext("%s: "
1943                                             "Failed to copy extended system "
1944                                             "attributes from attribute file "
1945                                             "%s of %s to %s\n"), cmd,
1946                                             dp->d_name, source, target);
1947                                 }
1948                         }
1949 next:
1950                         if (srcattrfd != -1)
1951                                 (void) close(srcattrfd);
1952                         if (targattrfd != -1)
1953                                 (void) close(targattrfd);
1954                         srcattrfd = targattrfd = -1;
1955                         if (res != NULL)
1956                                 nvlist_free(res);
1957                 }
1958         }
1959         /* Copy source file non default extended system attributes to target */
1960         if (target_sa_support && (response != NULL) &&
1961             (fsetattr(targfd, XATTR_VIEW_READWRITE, response)) != 0) {
1962                 ++error;
1963                 (void) fprintf(stderr, gettext("%s: Failed to "
1964                     "copy extended system attributes from "
1965                     "%s to %s\n"), cmd, source, target);
1966         }
1967 out:
1968         if (response != NULL)
1969                 nvlist_free(response);
1970         close_all();
1971         return (error == 0 ? 0 : 1);
1972 }
1973 
1974 /* Open the source file */
1975 
1976 int
1977 open_source(char  *src)
1978 {
1979         int     error = 0;
1980 
1981         srcfd = -1;
1982         if ((srcfd = open(src, O_RDONLY)) == -1) {
1983                 if (pflg && attrsilent) {
1984                         error++;
1985                         goto out;
1986                 }
1987                 if (!attrsilent) {
1988                         (void) fprintf(stderr,
1989                             gettext("%s: cannot open file"
1990                             " %s: "), cmd, src);
1991                         perror("");
1992                 }
1993                 ++error;
1994         }
1995 out:
1996         if (error)
1997                 close_all();
1998         return (error == 0 ? 0 : 1);
1999 }
2000 
2001 /* Open source attribute dir, target and target attribute dir. */
2002 
2003 int
2004 open_target_srctarg_attrdirs(char  *src, char *targ)
2005 {
2006         int             error = 0;
2007 
2008         targfd = sourcedirfd = targetdirfd = -1;
2009 
2010         if ((targfd = open(targ, O_RDONLY)) == -1) {
2011                 if (pflg && attrsilent) {
2012                         error++;
2013                         goto out;
2014                 }
2015                 if (!attrsilent) {
2016                         (void) fprintf(stderr,
2017                             gettext("%s: cannot open file"
2018                             " %s: "), cmd, targ);
2019                         perror("");
2020                 }
2021                 ++error;
2022                 goto out;
2023         }
2024 
2025         if ((sourcedirfd = openat(srcfd, ".", O_RDONLY|O_XATTR)) == -1) {
2026                 if (pflg && attrsilent) {
2027                         error++;
2028                         goto out;
2029                 }
2030                 if (!attrsilent) {
2031                         (void) fprintf(stderr,
2032                             gettext("%s: cannot open attribute"
2033                             " directory for %s: "), cmd, src);
2034                         perror("");
2035                 }
2036                 ++error;
2037                 goto out;
2038         }
2039 
2040         if (fstat(sourcedirfd, &attrdir) == -1) {
2041                 if (pflg && attrsilent) {
2042                         error++;
2043                         goto out;
2044                 }
2045 
2046                 if (!attrsilent) {
2047                         (void) fprintf(stderr,
2048                             gettext("%s: could not retrieve stat"
2049                             " information for attribute directory"
2050                             "of file %s: "), cmd, src);
2051                         perror("");
2052                 }
2053                 ++error;
2054                 goto out;
2055         }
2056         if ((targetdirfd = openat(targfd, ".", O_RDONLY|O_XATTR)) == -1) {
2057                 if (pflg && attrsilent) {
2058                         error++;
2059                         goto out;
2060                 }
2061                 if (!attrsilent) {
2062                         (void) fprintf(stderr,
2063                             gettext("%s: cannot open attribute"
2064                             " directory for %s: "), cmd, targ);
2065                         perror("");
2066                 }
2067                 ++error;
2068         }
2069 out:
2070         if (error)
2071                 close_all();
2072         return (error == 0 ? 0 : 1);
2073 }
2074 
2075 int
2076 open_attrdirp(char *source)
2077 {
2078         int tmpfd = -1;
2079         int error = 0;
2080 
2081         /*
2082          * dup sourcedirfd for use by fdopendir().
2083          * fdopendir will take ownership of given fd and will close
2084          * it when closedir() is called.
2085          */
2086 
2087         if ((tmpfd = dup(sourcedirfd)) == -1) {
2088                 if (pflg && attrsilent) {
2089                         error++;
2090                         goto out;
2091                 }
2092                 if (!attrsilent) {
2093                         (void) fprintf(stderr,
2094                             gettext(
2095                             "%s: unable to dup attribute directory"
2096                             " file descriptor for %s: "), cmd, source);
2097                         perror("");
2098                         ++error;
2099                 }
2100                 goto out;
2101         }
2102         if ((srcdirp = fdopendir(tmpfd)) == NULL) {
2103                 if (pflg && attrsilent) {
2104                         error++;
2105                         goto out;
2106                 }
2107                 if (!attrsilent) {
2108                         (void) fprintf(stderr,
2109                             gettext("%s: failed to open attribute"
2110                             " directory for %s: "), cmd, source);
2111                         perror("");
2112                         ++error;
2113                 }
2114         }
2115 out:
2116         if (error)
2117                 close_all();
2118         return (error == 0 ? 0 : 1);
2119 }
2120 
2121 /* Skips through ., .., and system attribute 'view' files */
2122 int
2123 traverse_attrfile(struct dirent *dp, char *source, char *target, int  first)
2124 {
2125         int             error = 0;
2126 
2127         srcattrfd = targattrfd = -1;
2128 
2129         if ((dp->d_name[0] == '.' && dp->d_name[1] == '\0') ||
2130             (dp->d_name[0] == '.' && dp->d_name[1] == '.' &&
2131             dp->d_name[2] == '\0') ||
2132             (sysattr_type(dp->d_name) == _RO_SATTR) ||
2133             (sysattr_type(dp->d_name) == _RW_SATTR))
2134                 return (-1);
2135 
2136         if ((srcattrfd = openat(sourcedirfd, dp->d_name,
2137             O_RDONLY)) == -1) {
2138                 if (!attrsilent) {
2139                         (void) fprintf(stderr,
2140                             gettext("%s: cannot open attribute %s on"
2141                             " file %s: "), cmd, dp->d_name, source);
2142                         perror("");
2143                         ++error;
2144                         goto out;
2145                 }
2146         }
2147 
2148         if (fstat(srcattrfd, &s3) < 0) {
2149                 if (!attrsilent) {
2150                         (void) fprintf(stderr,
2151                             gettext("%s: could not stat attribute"
2152                             " %s on file"
2153                             " %s: "), cmd, dp->d_name, source);
2154                         perror("");
2155                         ++error;
2156                 }
2157                 goto out;
2158         }
2159 
2160         if (first) {
2161                 (void) unlinkat(targetdirfd, dp->d_name, 0);
2162                 if ((targattrfd = openat(targetdirfd, dp->d_name,
2163                     O_RDWR|O_CREAT|O_TRUNC, s3.st_mode & MODEBITS)) == -1) {
2164                         if (!attrsilent) {
2165                                 (void) fprintf(stderr,
2166                                     gettext("%s: could not create attribute"
2167                                     " %s on file %s: "), cmd, dp->d_name,
2168                                     target);
2169                                 perror("");
2170                                 ++error;
2171                         }
2172                         goto out;
2173                 }
2174         } else {
2175                 if ((targattrfd = openat(targetdirfd, dp->d_name,
2176                     O_RDONLY)) == -1) {
2177                         if (!attrsilent) {
2178                                 (void) fprintf(stderr,
2179                                     gettext("%s: could not open attribute"
2180                                     " %s on file %s: "), cmd, dp->d_name,
2181                                     target);
2182                                 perror("");
2183                                 ++error;
2184                         }
2185                         goto out;
2186                 }
2187         }
2188 
2189 
2190         if (fstat(targattrfd, &s4) < 0) {
2191                 if (!attrsilent) {
2192                         (void) fprintf(stderr,
2193                             gettext("%s: could not stat attribute"
2194                             " %s on file"
2195                             " %s: "), cmd, dp->d_name, target);
2196                         perror("");
2197                         ++error;
2198                 }
2199         }
2200 
2201 out:
2202         if (error) {
2203                 if (srcattrfd != -1)
2204                         (void) close(srcattrfd);
2205                 if (targattrfd != -1)
2206                         (void) close(targattrfd);
2207                 srcattrfd = targattrfd = -1;
2208         }
2209         return (error == 0 ? 0 :1);
2210 }
2211 
2212 void
2213 rewind_attrdir(DIR * sdp)
2214 {
2215         int pwdfd;
2216 
2217         pwdfd = open(".", O_RDONLY);
2218         if ((pwdfd != -1) && (fchdir(sourcedirfd) == 0)) {
2219                 rewinddir(sdp);
2220                 (void) fchdir(pwdfd);
2221                 (void) close(pwdfd);
2222         } else {
2223                 if (!attrsilent) {
2224                         (void) fprintf(stderr, gettext("%s: "
2225                             "failed to rewind attribute dir\n"),
2226                             cmd);
2227                 }
2228         }
2229 }
2230 
2231 void
2232 close_all()
2233 {
2234         if (srcattrfd != -1)
2235                 (void) close(srcattrfd);
2236         if (targattrfd != -1)
2237                 (void) close(targattrfd);
2238         if (sourcedirfd != -1)
2239                 (void) close(sourcedirfd);
2240         if (targetdirfd != -1)
2241                 (void) close(targetdirfd);
2242         if (srcdirp != NULL) {
2243                 (void) closedir(srcdirp);
2244                 srcdirp = NULL;
2245         }
2246         if (srcfd != -1)
2247                 (void) close(srcfd);
2248         if (targfd != -1)
2249                 (void) close(targfd);
2250 }