CP(1) | General Commands Manual | CP(1) |
cp | [-R [-H | -L | -P]] [-f | -i] [-alNpv] source_file target_file |
cp | [-R [-H | -L | -P]] [-f | -i] [-alNpv] source_file ... target_directory |
The following options are available:
y
', the file copy is attempted.If the user ID and group ID cannot be preserved, no error message is displayed and the exit value is not altered.
If the source file has its set user ID bit on and the user ID cannot be preserved, the set user ID bit is not preserved in the copy's permissions. If the source file has its set group ID bit on and the group ID cannot be preserved, the set group ID bit is not preserved in the copy's permissions. If the source file has both its set user ID and set group ID bits on, and either the user ID or group ID cannot be preserved, neither the set user ID or set group ID bits are preserved in the copy's permissions.
Extended attributes from all accessible namespaces are copied; others are ignored. If an error occurs during this copy, a message is displayed and cp skips the other extended attributes for that file.
For each destination file that already exists, its contents are overwritten if permissions allow, but its mode, user ID, and group ID are unchanged.
In the second synopsis form, target_directory must exist unless there is only one named source_file which is a directory and the -R flag is specified.
If the destination file does not exist, the mode of the source file is used as modified by the file mode creation mask (umask, see csh(1)). If the source file has its set user ID bit on, that bit is removed unless both the source file and the destination file are owned by the same user. If the source file has its set group ID bit on, that bit is removed unless both the source file and the destination file are in the same group and the user is a member of that group. If both the set user ID and set group ID bits are set, all of the above conditions must be fulfilled or both bits are removed.
Appropriate permissions are required for file creation or overwriting.
Symbolic links are always followed unless the -R flag is set, in which case symbolic links are not followed, by default. The -H or -L flags (in conjunction with the -R flag), as well as the -P flag cause symbolic links to be followed as described above. The -H and -L options are ignored unless the -R option is specified. In addition, these options override each other and the command's actions are determined by the last one specified.
The -a and -l flags are non-standard extensions. They are intended to be compatible with the same options which other implementations, namely GNU coreutils and FreeBSD, of this utility have.
The -v option is an extension to IEEE Std 1003.2 (“POSIX.2”).
August 3, 2011 | NetBSD 6.1 |