| File: | src/bin/cp/cp.c |
| Warning: | line 461, column 4 Value stored to 'cval' is never read |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* $OpenBSD: cp.c,v 1.53 2019/06/28 13:34:58 deraadt Exp $ */ |
| 2 | /* $NetBSD: cp.c,v 1.14 1995/09/07 06:14:51 jtc Exp $ */ |
| 3 | |
| 4 | /* |
| 5 | * Copyright (c) 1988, 1993, 1994 |
| 6 | * The Regents of the University of California. All rights reserved. |
| 7 | * |
| 8 | * This code is derived from software contributed to Berkeley by |
| 9 | * David Hitz of Auspex Systems Inc. |
| 10 | * |
| 11 | * Redistribution and use in source and binary forms, with or without |
| 12 | * modification, are permitted provided that the following conditions |
| 13 | * are met: |
| 14 | * 1. Redistributions of source code must retain the above copyright |
| 15 | * notice, this list of conditions and the following disclaimer. |
| 16 | * 2. Redistributions in binary form must reproduce the above copyright |
| 17 | * notice, this list of conditions and the following disclaimer in the |
| 18 | * documentation and/or other materials provided with the distribution. |
| 19 | * 3. Neither the name of the University nor the names of its contributors |
| 20 | * may be used to endorse or promote products derived from this software |
| 21 | * without specific prior written permission. |
| 22 | * |
| 23 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
| 24 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 25 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 26 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
| 27 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| 28 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| 29 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 30 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| 31 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 32 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 33 | * SUCH DAMAGE. |
| 34 | */ |
| 35 | |
| 36 | /* |
| 37 | * Cp copies source files to target files. |
| 38 | * |
| 39 | * The global PATH_T structure "to" always contains the path to the |
| 40 | * current target file. Since fts(3) does not change directories, |
| 41 | * this path can be either absolute or dot-relative. |
| 42 | * |
| 43 | * The basic algorithm is to initialize "to" and use fts(3) to traverse |
| 44 | * the file hierarchy rooted in the argument list. A trivial case is the |
| 45 | * case of 'cp file1 file2'. The more interesting case is the case of |
| 46 | * 'cp file1 file2 ... fileN dir' where the hierarchy is traversed and the |
| 47 | * path (relative to the root of the traversal) is appended to dir (stored |
| 48 | * in "to") to form the final target path. |
| 49 | */ |
| 50 | |
| 51 | #include <sys/types.h> |
| 52 | #include <sys/stat.h> |
| 53 | #include <sys/mman.h> |
| 54 | #include <sys/time.h> |
| 55 | |
| 56 | #include <dirent.h> |
| 57 | #include <err.h> |
| 58 | #include <errno(*__errno()).h> |
| 59 | #include <fcntl.h> |
| 60 | #include <fts.h> |
| 61 | #include <limits.h> |
| 62 | #include <stdio.h> |
| 63 | #include <stdlib.h> |
| 64 | #include <string.h> |
| 65 | #include <unistd.h> |
| 66 | |
| 67 | #include "extern.h" |
| 68 | |
| 69 | #define fts_dne(_x)(_x->fts_pointer != ((void *)0)) (_x->fts_pointer != NULL((void *)0)) |
| 70 | |
| 71 | PATH_T to = { to.p_path, "" }; |
| 72 | |
| 73 | uid_t myuid; |
| 74 | int Rflag, fflag, iflag, pflag, rflag, vflag; |
| 75 | mode_t myumask; |
| 76 | |
| 77 | enum op { FILE_TO_FILE, FILE_TO_DIR, DIR_TO_DNE }; |
| 78 | |
| 79 | int copy(char *[], enum op, int); |
| 80 | char *find_last_component(char *); |
| 81 | |
| 82 | int |
| 83 | main(int argc, char *argv[]) |
| 84 | { |
| 85 | struct stat to_stat, tmp_stat; |
| 86 | enum op type; |
| 87 | int Hflag, Lflag, Pflag, ch, fts_options, r; |
| 88 | char *target; |
| 89 | |
| 90 | Hflag = Lflag = Pflag = Rflag = 0; |
| 91 | while ((ch = getopt(argc, argv, "HLPRafiprv")) != -1) |
| 92 | switch (ch) { |
| 93 | case 'H': |
| 94 | Hflag = 1; |
| 95 | Lflag = Pflag = 0; |
| 96 | break; |
| 97 | case 'L': |
| 98 | Lflag = 1; |
| 99 | Hflag = Pflag = 0; |
| 100 | break; |
| 101 | case 'P': |
| 102 | Pflag = 1; |
| 103 | Hflag = Lflag = 0; |
| 104 | break; |
| 105 | case 'R': |
| 106 | Rflag = 1; |
| 107 | break; |
| 108 | case 'a': |
| 109 | Rflag = 1; |
| 110 | pflag = 1; |
| 111 | Pflag = 1; |
| 112 | Hflag = Lflag = 0; |
| 113 | break; |
| 114 | case 'f': |
| 115 | fflag = 1; |
| 116 | iflag = 0; |
| 117 | break; |
| 118 | case 'i': |
| 119 | iflag = 1; |
| 120 | fflag = 0; |
| 121 | break; |
| 122 | case 'p': |
| 123 | pflag = 1; |
| 124 | break; |
| 125 | case 'r': |
| 126 | rflag = 1; |
| 127 | break; |
| 128 | case 'v': |
| 129 | vflag = 1; |
| 130 | break; |
| 131 | default: |
| 132 | usage(); |
| 133 | break; |
| 134 | } |
| 135 | argc -= optind; |
| 136 | argv += optind; |
| 137 | |
| 138 | /* |
| 139 | * Unfortunately, -R will use mkfifo & mknod; |
| 140 | * -p will use fchown, fchmod, lchown, fchflags.. |
| 141 | */ |
| 142 | if (Rflag == 0 && pflag == 0) |
| 143 | if (pledge("stdio rpath wpath cpath fattr", NULL((void *)0)) == -1) |
| 144 | err(1, "pledge"); |
| 145 | |
| 146 | if (argc < 2) |
| 147 | usage(); |
| 148 | |
| 149 | fts_options = FTS_NOCHDIR0x0004 | FTS_PHYSICAL0x0010; |
| 150 | if (rflag) { |
| 151 | if (Rflag) |
| 152 | errx(1, |
| 153 | "the -R and -r options may not be specified together."); |
| 154 | if (Hflag || Lflag || Pflag) |
| 155 | errx(1, |
| 156 | "the -H, -L, and -P options may not be specified with the -r option."); |
| 157 | fts_options &= ~FTS_PHYSICAL0x0010; |
| 158 | fts_options |= FTS_LOGICAL0x0002; |
| 159 | } |
| 160 | if (Rflag) { |
| 161 | if (Hflag) |
| 162 | fts_options |= FTS_COMFOLLOW0x0001; |
| 163 | if (Lflag) { |
| 164 | fts_options &= ~FTS_PHYSICAL0x0010; |
| 165 | fts_options |= FTS_LOGICAL0x0002; |
| 166 | } |
| 167 | } else { |
| 168 | fts_options &= ~FTS_PHYSICAL0x0010; |
| 169 | fts_options |= FTS_LOGICAL0x0002; |
| 170 | } |
| 171 | |
| 172 | myuid = getuid(); |
| 173 | |
| 174 | /* Copy the umask for explicit mode setting. */ |
| 175 | myumask = umask(0); |
| 176 | (void)umask(myumask); |
| 177 | |
| 178 | /* Save the target base in "to". */ |
| 179 | target = argv[--argc]; |
| 180 | if (strlcpy(to.p_path, target, sizeof to.p_path) >= sizeof(to.p_path)) |
| 181 | errx(1, "%s: name too long", target); |
| 182 | to.p_end = to.p_path + strlen(to.p_path); |
| 183 | if (to.p_path == to.p_end) { |
| 184 | *to.p_end++ = '.'; |
| 185 | *to.p_end = '\0'; |
| 186 | } |
| 187 | to.target_end = to.p_end; |
| 188 | |
| 189 | /* Set end of argument list for fts(3). */ |
| 190 | argv[argc] = NULL((void *)0); |
| 191 | |
| 192 | /* |
| 193 | * Cp has two distinct cases: |
| 194 | * |
| 195 | * cp [-R] source target |
| 196 | * cp [-R] source1 ... sourceN directory |
| 197 | * |
| 198 | * In both cases, source can be either a file or a directory. |
| 199 | * |
| 200 | * In (1), the target becomes a copy of the source. That is, if the |
| 201 | * source is a file, the target will be a file, and likewise for |
| 202 | * directories. |
| 203 | * |
| 204 | * In (2), the real target is not directory, but "directory/source". |
| 205 | */ |
| 206 | r = stat(to.p_path, &to_stat); |
| 207 | if (r == -1 && errno(*__errno()) != ENOENT2) |
| 208 | err(1, "%s", to.p_path); |
| 209 | if (r == -1 || !S_ISDIR(to_stat.st_mode)((to_stat.st_mode & 0170000) == 0040000)) { |
| 210 | /* |
| 211 | * Case (1). Target is not a directory. |
| 212 | */ |
| 213 | if (argc > 1) |
| 214 | usage(); |
| 215 | /* |
| 216 | * Need to detect the case: |
| 217 | * cp -R dir foo |
| 218 | * Where dir is a directory and foo does not exist, where |
| 219 | * we want pathname concatenations turned on but not for |
| 220 | * the initial mkdir(). |
| 221 | */ |
| 222 | if (r == -1) { |
| 223 | if (rflag || (Rflag && (Lflag || Hflag))) |
| 224 | stat(*argv, &tmp_stat); |
| 225 | else |
| 226 | lstat(*argv, &tmp_stat); |
| 227 | |
| 228 | if (S_ISDIR(tmp_stat.st_mode)((tmp_stat.st_mode & 0170000) == 0040000) && (Rflag || rflag)) |
| 229 | type = DIR_TO_DNE; |
| 230 | else |
| 231 | type = FILE_TO_FILE; |
| 232 | } else |
| 233 | type = FILE_TO_FILE; |
| 234 | } else { |
| 235 | /* |
| 236 | * Case (2). Target is a directory. |
| 237 | */ |
| 238 | type = FILE_TO_DIR; |
| 239 | } |
| 240 | |
| 241 | return (copy(argv, type, fts_options)); |
| 242 | } |
| 243 | |
| 244 | char * |
| 245 | find_last_component(char *path) |
| 246 | { |
| 247 | char *p; |
| 248 | |
| 249 | if ((p = strrchr(path, '/')) == NULL((void *)0)) |
| 250 | p = path; |
| 251 | else { |
| 252 | /* Special case foo/ */ |
| 253 | if (!*(p+1)) { |
| 254 | while ((p >= path) && *p == '/') |
| 255 | p--; |
| 256 | |
| 257 | while ((p >= path) && *p != '/') |
| 258 | p--; |
| 259 | } |
| 260 | |
| 261 | p++; |
| 262 | } |
| 263 | |
| 264 | return (p); |
| 265 | } |
| 266 | |
| 267 | int |
| 268 | copy(char *argv[], enum op type, int fts_options) |
| 269 | { |
| 270 | struct stat to_stat; |
| 271 | FTS *ftsp; |
| 272 | FTSENT *curr; |
| 273 | int base, cval, nlen, rval; |
| 274 | char *p, *target_mid; |
| 275 | base = 0; |
| 276 | |
| 277 | if ((ftsp = fts_open(argv, fts_options, NULL((void *)0))) == NULL((void *)0)) |
| 278 | err(1, NULL((void *)0)); |
| 279 | for (rval = 0; (curr = fts_read(ftsp)) != NULL((void *)0);) { |
| 280 | switch (curr->fts_info) { |
| 281 | case FTS_NS10: |
| 282 | case FTS_DNR4: |
| 283 | case FTS_ERR7: |
| 284 | warnx("%s: %s", |
| 285 | curr->fts_path, strerror(curr->fts_errno)); |
| 286 | rval = 1; |
| 287 | continue; |
| 288 | case FTS_DC2: |
| 289 | warnx("%s: directory causes a cycle", curr->fts_path); |
| 290 | rval = 1; |
| 291 | continue; |
| 292 | } |
| 293 | |
| 294 | /* |
| 295 | * If we are in case (2) or (3) above, we need to append the |
| 296 | * source name to the target name. |
| 297 | */ |
| 298 | if (type != FILE_TO_FILE) { |
| 299 | /* |
| 300 | * Need to remember the roots of traversals to create |
| 301 | * correct pathnames. If there's a directory being |
| 302 | * copied to a non-existent directory, e.g. |
| 303 | * cp -R a/dir noexist |
| 304 | * the resulting path name should be noexist/foo, not |
| 305 | * noexist/dir/foo (where foo is a file in dir), which |
| 306 | * is the case where the target exists. |
| 307 | * |
| 308 | * Also, check for "..". This is for correct path |
| 309 | * concatenation for paths ending in "..", e.g. |
| 310 | * cp -R .. /tmp |
| 311 | * Paths ending in ".." are changed to ".". This is |
| 312 | * tricky, but seems the easiest way to fix the problem. |
| 313 | * |
| 314 | * XXX |
| 315 | * Since the first level MUST be FTS_ROOTLEVEL, base |
| 316 | * is always initialized. |
| 317 | */ |
| 318 | if (curr->fts_level == FTS_ROOTLEVEL0) { |
| 319 | if (type != DIR_TO_DNE) { |
| 320 | p = find_last_component(curr->fts_path); |
| 321 | base = p - curr->fts_path; |
| 322 | |
| 323 | if (!strcmp(&curr->fts_path[base], |
| 324 | "..")) |
| 325 | base += 1; |
| 326 | } else |
| 327 | base = curr->fts_pathlen; |
| 328 | } |
| 329 | |
| 330 | p = &curr->fts_path[base]; |
| 331 | nlen = curr->fts_pathlen - base; |
| 332 | target_mid = to.target_end; |
| 333 | if (*p != '/' && target_mid[-1] != '/') |
| 334 | *target_mid++ = '/'; |
| 335 | *target_mid = '\0'; |
| 336 | if (target_mid - to.p_path + nlen >= PATH_MAX1024) { |
| 337 | warnx("%s%s: name too long (not copied)", |
| 338 | to.p_path, p); |
| 339 | rval = 1; |
| 340 | continue; |
| 341 | } |
| 342 | (void)strncat(target_mid, p, nlen); |
| 343 | to.p_end = target_mid + nlen; |
| 344 | *to.p_end = '\0'; |
| 345 | } |
| 346 | |
| 347 | /* Not an error but need to remember it happened */ |
| 348 | if (stat(to.p_path, &to_stat) == -1) { |
| 349 | if (curr->fts_info == FTS_DP6) |
| 350 | continue; |
| 351 | /* |
| 352 | * We use fts_pointer as a boolean to indicate that |
| 353 | * we created this directory ourselves. We'll use |
| 354 | * this later on via the fts_dne macro to decide |
| 355 | * whether or not to set the directory mode during |
| 356 | * the post-order pass. |
| 357 | */ |
| 358 | curr->fts_pointer = (void *)1; |
| 359 | } else { |
| 360 | /* |
| 361 | * Set directory mode/user/times on the post-order |
| 362 | * pass. We can't do this earlier because the mode |
| 363 | * may not allow us write permission. Furthermore, |
| 364 | * if we set the times during the pre-order pass, |
| 365 | * they will get changed later when the directory |
| 366 | * is populated. |
| 367 | */ |
| 368 | if (curr->fts_info == FTS_DP6) { |
| 369 | if (!S_ISDIR(to_stat.st_mode)((to_stat.st_mode & 0170000) == 0040000)) |
| 370 | continue; |
| 371 | /* |
| 372 | * If not -p and directory didn't exist, set |
| 373 | * it to be the same as the from directory, |
| 374 | * unmodified by the umask; arguably wrong, |
| 375 | * but it's been that way forever. |
| 376 | */ |
| 377 | if (pflag && setfile(curr->fts_statp, -1)) |
| 378 | rval = 1; |
| 379 | else if (fts_dne(curr)(curr->fts_pointer != ((void *)0))) |
| 380 | (void)chmod(to.p_path, |
| 381 | curr->fts_statp->st_mode); |
| 382 | continue; |
| 383 | } |
| 384 | if (to_stat.st_dev == curr->fts_statp->st_dev && |
| 385 | to_stat.st_ino == curr->fts_statp->st_ino) { |
| 386 | warnx("%s and %s are identical (not copied).", |
| 387 | to.p_path, curr->fts_path); |
| 388 | rval = 1; |
| 389 | if (S_ISDIR(curr->fts_statp->st_mode)((curr->fts_statp->st_mode & 0170000) == 0040000)) |
| 390 | (void)fts_set(ftsp, curr, FTS_SKIP4); |
| 391 | continue; |
| 392 | } |
| 393 | if (!S_ISDIR(curr->fts_statp->st_mode)((curr->fts_statp->st_mode & 0170000) == 0040000) && |
| 394 | S_ISDIR(to_stat.st_mode)((to_stat.st_mode & 0170000) == 0040000)) { |
| 395 | warnx("cannot overwrite directory %s with non-directory %s", |
| 396 | to.p_path, curr->fts_path); |
| 397 | rval = 1; |
| 398 | continue; |
| 399 | } |
| 400 | } |
| 401 | |
| 402 | switch (curr->fts_statp->st_mode & S_IFMT0170000) { |
| 403 | case S_IFLNK0120000: |
| 404 | if ((cval = copy_link(curr, !fts_dne(curr)(curr->fts_pointer != ((void *)0)))) == 1) |
| 405 | rval = 1; |
| 406 | if (!cval && vflag) |
| 407 | (void)fprintf(stdout(&__sF[1]), "%s -> %s\n", |
| 408 | curr->fts_path, to.p_path); |
| 409 | break; |
| 410 | case S_IFDIR0040000: |
| 411 | if (!Rflag && !rflag) { |
| 412 | warnx("%s is a directory (not copied).", |
| 413 | curr->fts_path); |
| 414 | (void)fts_set(ftsp, curr, FTS_SKIP4); |
| 415 | rval = 1; |
| 416 | break; |
| 417 | } |
| 418 | /* |
| 419 | * If the directory doesn't exist, create the new |
| 420 | * one with the from file mode plus owner RWX bits, |
| 421 | * modified by the umask. Trade-off between being |
| 422 | * able to write the directory (if from directory is |
| 423 | * 555) and not causing a permissions race. If the |
| 424 | * umask blocks owner writes, we fail.. |
| 425 | */ |
| 426 | if (fts_dne(curr)(curr->fts_pointer != ((void *)0))) { |
| 427 | if (mkdir(to.p_path, |
| 428 | curr->fts_statp->st_mode | S_IRWXU0000700) == -1) |
| 429 | err(1, "%s", to.p_path); |
| 430 | else if (vflag) |
| 431 | (void)fprintf(stdout(&__sF[1]), "%s -> %s\n", |
| 432 | curr->fts_path, to.p_path); |
| 433 | } else if (!S_ISDIR(to_stat.st_mode)((to_stat.st_mode & 0170000) == 0040000)) |
| 434 | errc(1, ENOTDIR20, "%s", to.p_path); |
| 435 | break; |
| 436 | case S_IFBLK0060000: |
| 437 | case S_IFCHR0020000: |
| 438 | if (Rflag) { |
| 439 | if ((cval = copy_special(curr->fts_statp, |
| 440 | !fts_dne(curr)(curr->fts_pointer != ((void *)0)))) == 1) |
| 441 | rval = 1; |
| 442 | } else |
| 443 | if ((cval = copy_file(curr, !fts_dne(curr)(curr->fts_pointer != ((void *)0)))) == 1) |
| 444 | rval = 1; |
| 445 | if (!cval && vflag) |
| 446 | (void)fprintf(stdout(&__sF[1]), "%s -> %s\n", |
| 447 | curr->fts_path, to.p_path); |
| 448 | cval = 0; |
| 449 | break; |
| 450 | case S_IFIFO0010000: |
| 451 | if (Rflag) { |
| 452 | if ((cval = copy_fifo(curr->fts_statp, |
| 453 | !fts_dne(curr)(curr->fts_pointer != ((void *)0)))) == 1) |
| 454 | rval = 1; |
| 455 | } else |
| 456 | if ((cval = copy_file(curr, !fts_dne(curr)(curr->fts_pointer != ((void *)0)))) == 1) |
| 457 | rval = 1; |
| 458 | if (!cval && vflag) |
| 459 | (void)fprintf(stdout(&__sF[1]), "%s -> %s\n", |
| 460 | curr->fts_path, to.p_path); |
| 461 | cval = 0; |
Value stored to 'cval' is never read | |
| 462 | break; |
| 463 | case S_IFSOCK0140000: |
| 464 | warnc(EOPNOTSUPP45, "%s", curr->fts_path); |
| 465 | break; |
| 466 | default: |
| 467 | if ((cval = copy_file(curr, !fts_dne(curr)(curr->fts_pointer != ((void *)0)))) == 1) |
| 468 | rval = 1; |
| 469 | if (!cval && vflag) |
| 470 | (void)fprintf(stdout(&__sF[1]), "%s -> %s\n", |
| 471 | curr->fts_path, to.p_path); |
| 472 | cval = 0; |
| 473 | break; |
| 474 | } |
| 475 | } |
| 476 | if (errno(*__errno())) |
| 477 | err(1, "fts_read"); |
| 478 | (void)fts_close(ftsp); |
| 479 | return (rval); |
| 480 | } |