Commit | Line | Data |
---|---|---|
32424d04 C |
1 | CP(1) BSD Reference Manual CP(1) |
2 | ||
3 | N\bNA\bAM\bME\bE | |
4 | c\bcp\bp - copy files | |
5 | ||
6 | S\bSY\bYN\bNO\bOP\bPS\bSI\bIS\bS | |
7 | c\bcp\bp [-\b-R\bR [-\b-H\bH | -\b-L\bL | -\b-P\bP]] [-\b-f\bfi\bip\bp] _\bs_\bo_\bu_\br_\bc_\be_\b__\bf_\bi_\bl_\be _\bt_\ba_\br_\bg_\be_\bt_\b__\bf_\bi_\bl_\be | |
8 | c\bcp\bp [-\b-R\bR [-\b-H\bH | -\b-L\bL | -\b-P\bP]] [-\b-f\bfi\bip\bp] _\bs_\bo_\bu_\br_\bc_\be_\b__\bf_\bi_\bl_\be _\b._\b._\b. _\bt_\ba_\br_\bg_\be_\bt_\b__\bd_\bi_\br_\be_\bc_\bt_\bo_\br_\by | |
9 | ||
10 | D\bDE\bES\bSC\bCR\bRI\bIP\bPT\bTI\bIO\bON\bN | |
11 | In the first synopsis form, the c\bcp\bp utility copies the contents of the | |
12 | _\bs_\bo_\bu_\br_\bc_\be_\b__\bf_\bi_\bl_\be to the _\bt_\ba_\br_\bg_\be_\bt_\b__\bf_\bi_\bl_\be. In the second synopsis form, the contents | |
13 | of each named _\bs_\bo_\bu_\br_\bc_\be_\b__\bf_\bi_\bl_\be is copied to the destination _\bt_\ba_\br_\bg_\be_\bt_\b__\bd_\bi_\br_\be_\bc_\bt_\bo_\br_\by. | |
14 | The names of the files themselves are not changed. If c\bcp\bp detects an at- | |
15 | tempt to copy a file to itself, the copy will fail. | |
16 | ||
17 | The following options are available: | |
18 | ||
19 | -\b-H\bH If the -\b-R\bR option is specified, symbolic links on the command line | |
20 | are followed. (Symbolic links encountered in the tree traversal | |
21 | are not followed.) | |
22 | ||
23 | -\b-L\bL If the -\b-R\bR option is specified, all symbolic links are followed. | |
24 | ||
25 | -\b-P\bP If the -\b-R\bR option is specified, no symbolic links are followed. | |
26 | ||
27 | -\b-R\bR If _\bs_\bo_\bu_\br_\bc_\be_\b__\bf_\bi_\bl_\be designates a directory, c\bcp\bp copies the directory and | |
28 | the entire subtree connected at that point. This option also caus- | |
29 | es symbolic links to be copied, rather than indirected through, and | |
30 | for c\bcp\bp to create special files rather than copying them as normal | |
31 | files. Created directories have the same mode as the corresponding | |
32 | source directory, unmodified by the process' umask. | |
33 | ||
34 | -\b-f\bf For each existing destination pathname, remove it and create a new | |
35 | file, without prompting for confirmation regardless of its permis- | |
36 | sions. (The -\b-i\bi option is ignored if the -\b-f\bf option is specified.) | |
37 | ||
38 | -\b-i\bi Causes c\bcp\bp to write a prompt to the standard error output before | |
39 | copying a file that would overwrite an existing file. If the re- | |
40 | sponse from the standard input begins with the character `y', the | |
41 | file copy is attempted. | |
42 | ||
43 | -\b-p\bp Causes c\bcp\bp to preserve in the copy as many of the modification time, | |
44 | access time, file flags, file mode, user ID, and group ID as al- | |
45 | lowed by permissions. | |
46 | ||
47 | If the user ID and group ID cannot be preserved, no error message | |
48 | is displayed and the exit value is not altered. | |
49 | ||
50 | If the source file has its set user ID bit on and the user ID can- | |
51 | not be preserved, the set user ID bit is not preserved in the | |
52 | copy's permissions. If the source file has its set group ID bit on | |
53 | and the group ID cannot be preserved, the set group ID bit is not | |
54 | preserved in the copy's permissions. If the source file has both | |
55 | its set user ID and set group ID bits on, and either the user ID or | |
56 | group ID cannot be preserved, neither the set user ID or set group | |
57 | ID bits are preserved in the copy's permissions. | |
58 | ||
59 | For each destination file that already exists, its contents are overwrit- | |
60 | ten if permissions allow, but its mode, user ID, and group ID are un- | |
61 | changed. | |
62 | ||
63 | In the second synopsis form, _\bt_\ba_\br_\bg_\be_\bt_\b__\bd_\bi_\br_\be_\bc_\bt_\bo_\br_\by must exist unless there is | |
64 | only one named _\bs_\bo_\bu_\br_\bc_\be_\b__\bf_\bi_\bl_\be which is a directory and the -\b-R\bR flag is speci- | |
65 | fied. | |
66 | ||
67 | If the destination file does not exist, the mode of the source file is | |
68 | used as modified by the file mode creation mask (u\bum\bma\bas\bsk\bk, see csh(1)). If | |
69 | the source file has its set user ID bit on, that bit is removed unless | |
70 | both the source file and the destination file are owned by the same user. | |
71 | If the source file has its set group ID bit on, that bit is removed un- | |
72 | less both the source file and the destination file are in the same group | |
73 | and the user is a member of that group. If both the set user ID and set | |
74 | group ID bits are set, all of the above conditions must be fulfilled or | |
75 | both bits are removed. | |
76 | ||
77 | Appropriate permissions are required for file creation or overwriting. | |
78 | ||
79 | Symbolic links are always followed unless the -\b-R\bR flag is set, in which | |
80 | case symbolic links are not followed, by default. The -\b-H\bH or -\b-L\bL flags (in | |
81 | conjunction with the -\b-R\bR flag) cause symbolic links to be followed as de- | |
82 | scribed above. The -\b-H\bH, -\b-L\bL and -\b-P\bP options are ignored unless the -\b-R\bR op- | |
83 | tion is specified. In addition, these options override each other and | |
84 | the command's actions are determined by the last one specified. | |
85 | ||
86 | C\bCp\bp exits 0 on success, >0 if an error occurred. | |
87 | ||
88 | C\bCO\bOM\bMP\bPA\bAT\bTI\bIB\bBI\bIL\bLI\bIT\bTY\bY | |
89 | Historic versions of the c\bcp\bp utility had a -\b-r\br option. This implementation | |
90 | supports that option, however, its use is strongly discouraged, as it | |
91 | does not correctly copy special files, symbolic links or fifo's. | |
92 | ||
93 | S\bSE\bEE\bE A\bAL\bLS\bSO\bO | |
94 | mv(1), rcp(1), umask(2), fts(3), symlink(7) | |
95 | ||
96 | H\bHI\bIS\bST\bTO\bOR\bRY\bY | |
97 | The c\bcp\bp command is expected to be IEEE Std1003.2 (``POSIX'') compatible. | |
98 | ||
99 | 4th Berkeley Distribution April 18, 1994 2 |