xref: /dragonfly/usr.bin/xinstall/xinstall.c (revision 02fd838e)
1 /*
2  * Copyright (c) 1987, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. Neither the name of the University nor the names of its contributors
14  *    may be used to endorse or promote products derived from this software
15  *    without specific prior written permission.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  *
29  * @(#) Copyright (c) 1987, 1993 The Regents of the University of California.  All rights reserved.
30  * @(#)xinstall.c	8.1 (Berkeley) 7/21/93
31  * $FreeBSD: src/usr.bin/xinstall/xinstall.c,v 1.38.2.8 2002/08/07 16:29:48 ru Exp $
32  */
33 
34 #include <sys/param.h>
35 #include <sys/mman.h>
36 #include <sys/mount.h>
37 #include <sys/stat.h>
38 #include <sys/wait.h>
39 
40 #include <ctype.h>
41 #include <err.h>
42 #include <errno.h>
43 #include <fcntl.h>
44 #include <grp.h>
45 #include <paths.h>
46 #include <pwd.h>
47 #include <stdio.h>
48 #include <stdlib.h>
49 #include <string.h>
50 #include <sysexits.h>
51 #include <unistd.h>
52 #include <utime.h>
53 
54 /* Bootstrap aid - this doesn't exist in most older releases */
55 #ifndef MAP_FAILED
56 #define MAP_FAILED ((void *)-1)	/* from <sys/mman.h> */
57 #endif
58 #ifndef UF_NOHISTORY
59 #define UF_NOHISTORY	0
60 #endif
61 
62 #define MAX_CMP_SIZE	(16 * 1024 * 1024)
63 
64 #define	DIRECTORY	0x01		/* Tell install it's a directory. */
65 #define	SETFLAGS	0x02		/* Tell install to set flags. */
66 #define	NOCHANGEBITS	(UF_IMMUTABLE | UF_APPEND | SF_IMMUTABLE | SF_APPEND)
67 #define	BACKUP_SUFFIX	".old"
68 
69 static struct passwd *pp;
70 static struct group *gp;
71 static gid_t gid;
72 static uid_t uid;
73 static int dobackup, docompare, dodir, dopreserve, dostrip, dounpriv, nommap,
74     safecopy, verbose;
75 static mode_t mode = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH;
76 static const char *suffix = BACKUP_SUFFIX;
77 static char *destdir, *fflags;
78 
79 static int file_getgroup(const char *etcdir, const char *group, gid_t *gidret);
80 static int file_getowner(const char *etcdir, const char *owner, uid_t *uidret);
81 
82 static int	compare(int, const char *, size_t, int, const char *, size_t);
83 static void	copy(int, const char *, int, const char *, off_t);
84 static int	create_newfile(const char *, int, struct stat *);
85 static int	create_tempfile(const char *, char *, size_t);
86 static void	install(const char *, const char *, u_long, u_long, u_int);
87 static void	install_dir(char *);
88 u_long	numeric_id(const char *, const char *);
89 static void	strip(const char *);
90 static int	trymmap(int);
91 static void	usage(void);
92 
93 int
94 main(int argc, char *argv[])
95 {
96 	struct stat from_sb, to_sb;
97 	mode_t *set;
98 	u_long fset;
99 	u_long fclr;
100 	int ch, no_target;
101 	int trysys;
102 	u_int iflags;
103 	const char *group, *owner, *to_name;
104 	const char *etcdir;
105 
106 	fclr = 0;
107 	fset = 0;
108 	iflags = 0;
109 	trysys = 0;
110 	group = NULL;
111 	owner = NULL;
112 	etcdir = NULL;
113 
114 	while ((ch = getopt(argc, argv, "L:B:bCcD:df:g:lMm:o:pSsUv")) != -1)
115 		switch((char)ch) {
116 		case 'B':
117 			suffix = optarg;
118 			/* FALLTHROUGH */
119 		case 'b':
120 			dobackup = 1;
121 			break;
122 		case 'C':
123 			docompare = 1;
124 			break;
125 		case 'c':
126 			/* For backwards compatibility. */
127 			break;
128 		case 'D':
129 			destdir = optarg;
130 			break;
131 		case 'd':
132 			dodir = 1;
133 			break;
134 		case 'f':
135 			fflags = optarg;
136 			break;
137 		case 'g':
138 			group = optarg;
139 			break;
140 		case 'L':
141 			etcdir = optarg;
142 			break;
143 		case 'l':
144 			trysys = 1;
145 			break;
146 		case 'M':
147 			nommap = 1;
148 			break;
149 		case 'm':
150 			if (!(set = setmode(optarg)))
151 				errx(EX_USAGE, "invalid file mode: %s",
152 				     optarg);
153 			mode = getmode(set, 0);
154 			free(set);
155 			break;
156 		case 'o':
157 			owner = optarg;
158 			break;
159 		case 'p':
160 			docompare = dopreserve = 1;
161 			break;
162 		case 'S':
163 			safecopy = 1;
164 			break;
165 		case 's':
166 			dostrip = 1;
167 			break;
168 		case 'U':
169 			dounpriv = 1;
170 			break;
171 		case 'v':
172 			verbose = 1;
173 			break;
174 		case '?':
175 		default:
176 			usage();
177 		}
178 	argc -= optind;
179 	argv += optind;
180 
181 	/* some options make no sense when creating directories */
182 	if (dostrip && dodir) {
183 		warnx("-d and -s may not be specified together");
184 		usage();
185 	}
186 
187 	if (getenv("DONTSTRIP") != NULL) {
188 		warnx("DONTSTRIP set - will not strip installed binaries");
189 		dostrip = 0;
190 	}
191 
192 	/* must have at least two arguments, except when creating directories */
193 	if (argc < 2 && !dodir)
194 		usage();
195 
196 	/* need to make a temp copy so we can compare stripped version */
197 	if (docompare && dostrip)
198 		safecopy = 1;
199 
200 	/* no etcdir specified, always try the system */
201 	if (etcdir == NULL)
202 		trysys = 1;
203 	uid = (uid_t)-1;
204 	gid = (gid_t)-1;
205 
206 	/* get group and owner id's */
207 	if (group != NULL && !dounpriv) {
208 		if (etcdir && file_getgroup(etcdir, group, &gid)) {
209 			;
210 		} else if (trysys && (gp = getgrnam(group)) != NULL) {
211 			gid = gp->gr_gid;
212 		} else {
213 			gid = (gid_t)numeric_id(group, "group");
214 		}
215 	}
216 
217 	if (owner != NULL && !dounpriv) {
218 		if (etcdir && file_getowner(etcdir, owner, &uid)) {
219 			;
220 		} else if (trysys && (pp = getpwnam(owner)) != NULL) {
221 			uid = pp->pw_uid;
222 		} else {
223 			uid = (uid_t)numeric_id(owner, "user");
224 		}
225 	}
226 
227 	if (fflags != NULL && !dounpriv) {
228 		if (strtofflags(&fflags, &fset, &fclr))
229 			errx(EX_USAGE, "%s: invalid flag", fflags);
230 		iflags |= SETFLAGS;
231 	}
232 
233 	if (dodir) {
234 		for (; *argv != NULL; ++argv)
235 			install_dir(*argv);
236 		exit(EX_OK);
237 		/* NOTREACHED */
238 	}
239 
240 	to_name = argv[argc - 1];
241 	no_target = stat(to_name, &to_sb);
242 	if (!no_target && S_ISDIR(to_sb.st_mode)) {
243 		for (; *argv != to_name; ++argv)
244 			install(*argv, to_name, fset, fclr, iflags | DIRECTORY);
245 		exit(EX_OK);
246 		/* NOTREACHED */
247 	}
248 
249 	/* can't do file1 file2 directory/file */
250 	if (argc != 2) {
251 		if (no_target)
252 			warnx("target directory `%s' does not exist",
253 			    argv[argc - 1]);
254 		else
255 			warnx("target `%s' is not a directory",
256 			    argv[argc - 1]);
257 		usage();
258 	}
259 
260 	if (!no_target) {
261 		if (stat(*argv, &from_sb))
262 			err(EX_OSERR, "%s", *argv);
263 		if (!S_ISREG(to_sb.st_mode)) {
264 			errno = EFTYPE;
265 			err(EX_OSERR, "%s", to_name);
266 		}
267 		if (to_sb.st_dev == from_sb.st_dev &&
268 		    to_sb.st_ino == from_sb.st_ino)
269 			errx(EX_USAGE,
270 			    "%s and %s are the same file", *argv, to_name);
271 	}
272 	install(*argv, to_name, fset, fclr, iflags);
273 	exit(EX_OK);
274 	/* NOTREACHED */
275 }
276 
277 u_long
278 numeric_id(const char *name, const char *type)
279 {
280 	u_long val;
281 	char *ep;
282 
283 	/*
284 	 * XXX
285 	 * We know that uid_t's and gid_t's are unsigned longs.
286 	 */
287 	errno = 0;
288 	val = strtoul(name, &ep, 10);
289 	if (errno)
290 		err(EX_NOUSER, "%s", name);
291 	if (*ep != '\0')
292 		errx(EX_NOUSER, "unknown %s %s", type, name);
293 	return (val);
294 }
295 
296 static
297 int
298 file_getgroup(const char *etcdir, const char *group, gid_t *gidret)
299 {
300 	FILE *fp;
301 	size_t len;
302 	size_t grlen;
303 	char *path;
304 	char *ptr;
305 	char *scan;
306 
307 	grlen = strlen(group);
308 
309 	if (asprintf(&path, "%s/group", etcdir) < 0)
310 		errx(EX_OSERR, "asprintf()");
311 	if ((fp = fopen(path, "r")) != NULL) {
312 		while ((ptr = fgetln(fp, &len)) != NULL && len) {
313 			ptr[len - 1] = 0;
314 			if ((scan = strchr(ptr, ':')) == NULL)
315 				continue;
316 			if ((size_t)(scan - ptr) != grlen)
317 				continue;
318 			if (strncmp(ptr, group, grlen) != 0)
319 				continue;
320 			if ((scan = strchr(scan + 1, ':')) == NULL)
321 				continue;
322 			*gidret = strtoul(scan + 1, NULL, 10);
323 			break;
324 		}
325 		fclose(fp);
326 	}
327 	free(path);
328 	return((*gidret == (gid_t)-1) ? 0 : 1);
329 }
330 
331 static
332 int
333 file_getowner(const char *etcdir, const char *owner, uid_t *uidret)
334 {
335 	FILE *fp;
336 	size_t len;
337 	size_t owner_len;
338 	char *path;
339 	char *ptr;
340 	char *scan;
341 
342 	owner_len = strlen(owner);
343 
344 	if (asprintf(&path, "%s/master.passwd", etcdir) < 0)
345 		errx(EX_OSERR, "asprintf()");
346 	if ((fp = fopen(path, "r")) != NULL) {
347 		while ((ptr = fgetln(fp, &len)) != NULL && len) {
348 			ptr[len - 1] = 0;
349 			if ((scan = strchr(ptr, ':')) == NULL)
350 				continue;
351 			if ((size_t)(scan - ptr) != owner_len)
352 				continue;
353 			if (strncmp(ptr, owner, owner_len) != 0)
354 				continue;
355 			if ((scan = strchr(scan + 1, ':')) == NULL)
356 				continue;
357 			*uidret = strtoul(scan + 1, NULL, 10);
358 			break;
359 		}
360 		fclose(fp);
361 	}
362 	free(path);
363 	return((*uidret == (uid_t)-1) ? 0 : 1);
364 }
365 
366 /*
367  * install --
368  *	build a path name and install the file
369  */
370 static void
371 install(const char *from_name, const char *to_name, u_long fset, u_long fclr,
372 	u_int flags)
373 {
374 	struct stat from_sb, temp_sb, to_sb;
375 	struct utimbuf utb;
376 	int devnull, files_match, from_fd, serrno, target;
377 	int tempcopy, temp_fd, to_fd;
378 	u_long nfset;
379 	char backup[MAXPATHLEN], *p, pathbuf[MAXPATHLEN], tempfile[MAXPATHLEN];
380 
381 	files_match = 0;
382 	from_fd = -1;
383 
384 	/* If try to install NULL file to a directory, fails. */
385 	if (flags & DIRECTORY || strcmp(from_name, _PATH_DEVNULL)) {
386 		if (stat(from_name, &from_sb))
387 			err(EX_OSERR, "%s", from_name);
388 		if (!S_ISREG(from_sb.st_mode)) {
389 			errno = EFTYPE;
390 			err(EX_OSERR, "%s", from_name);
391 		}
392 		/* Build the target path. */
393 		if (flags & DIRECTORY) {
394 			(void)snprintf(pathbuf, sizeof(pathbuf), "%s/%s",
395 			    to_name,
396 			    (p = strrchr(from_name, '/')) ? ++p : from_name);
397 			to_name = pathbuf;
398 		}
399 		devnull = 0;
400 	} else {
401 		devnull = 1;
402 	}
403 
404 	target = stat(to_name, &to_sb) == 0;
405 
406 	/* Only install to regular files. */
407 	if (target && !S_ISREG(to_sb.st_mode)) {
408 		errno = EFTYPE;
409 		warn("%s", to_name);
410 		return;
411 	}
412 
413 	/* Only copy safe if the target exists. */
414 	tempcopy = safecopy && target;
415 
416 	if (!devnull && (from_fd = open(from_name, O_RDONLY, 0)) < 0)
417 		err(EX_OSERR, "%s", from_name);
418 
419 	/* If we don't strip, we can compare first. */
420 	if (docompare && !dostrip && target) {
421 		if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
422 			err(EX_OSERR, "%s", to_name);
423 		if (devnull)
424 			files_match = to_sb.st_size == 0;
425 		else
426 			files_match = !(compare(from_fd, from_name,
427 			    (size_t)from_sb.st_size, to_fd,
428 			    to_name, (size_t)to_sb.st_size));
429 
430 		/* Close "to" file unless we match. */
431 		if (!files_match)
432 			(void)close(to_fd);
433 	}
434 
435 	if (!files_match) {
436 		if (tempcopy) {
437 			to_fd = create_tempfile(to_name, tempfile,
438 			    sizeof(tempfile));
439 			if (to_fd < 0)
440 				err(EX_OSERR, "%s", tempfile);
441 		} else {
442 			if ((to_fd = create_newfile(to_name, target,
443 			    &to_sb)) < 0)
444 				err(EX_OSERR, "%s", to_name);
445 			if (verbose)
446 				(void)printf("install: %s -> %s\n",
447 				    from_name, to_name);
448 		}
449 		if (!devnull)
450 			copy(from_fd, from_name, to_fd,
451 			     tempcopy ? tempfile : to_name, from_sb.st_size);
452 	}
453 
454 	if (dostrip) {
455 		strip(tempcopy ? tempfile : to_name);
456 
457 		/*
458 		 * Re-open our fd on the target, in case we used a strip
459 		 * that does not work in-place -- like GNU binutils strip.
460 		 */
461 		close(to_fd);
462 		to_fd = open(tempcopy ? tempfile : to_name, O_RDONLY, 0);
463 		if (to_fd < 0)
464 			err(EX_OSERR, "stripping %s", to_name);
465 	}
466 
467 	/*
468 	 * Compare the stripped temp file with the target.
469 	 */
470 	if (docompare && dostrip && target) {
471 		temp_fd = to_fd;
472 
473 		/* Re-open to_fd using the real target name. */
474 		if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
475 			err(EX_OSERR, "%s", to_name);
476 
477 		if (fstat(temp_fd, &temp_sb)) {
478 			serrno = errno;
479 			(void)unlink(tempfile);
480 			errno = serrno;
481 			err(EX_OSERR, "%s", tempfile);
482 		}
483 
484 		if (compare(temp_fd, tempfile, (size_t)temp_sb.st_size, to_fd,
485 			    to_name, (size_t)to_sb.st_size) == 0) {
486 			/*
487 			 * If target has more than one link we need to
488 			 * replace it in order to snap the extra links.
489 			 * Need to preserve target file times, though.
490 			 */
491 			if (to_sb.st_nlink != 1) {
492 				utb.actime = to_sb.st_atime;
493 				utb.modtime = to_sb.st_mtime;
494 				utime(tempfile, &utb);
495 			} else {
496 				files_match = 1;
497 				(void)unlink(tempfile);
498 			}
499 			(void) close(temp_fd);
500 		}
501 	}
502 
503 	/*
504 	 * Move the new file into place if doing a safe copy
505 	 * and the files are different (or just not compared).
506 	 */
507 	if (tempcopy && !files_match) {
508 		/* Try to turn off the immutable bits. */
509 		if (to_sb.st_flags & NOCHANGEBITS)
510 			(void)chflags(to_name, to_sb.st_flags & ~NOCHANGEBITS);
511 		if (dobackup) {
512 			if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s", to_name,
513 			    suffix) != strlen(to_name) + strlen(suffix)) {
514 				unlink(tempfile);
515 				errx(EX_OSERR, "%s: backup filename too long",
516 				    to_name);
517 			}
518 			if (verbose)
519 				(void)printf("install: %s -> %s\n", to_name, backup);
520 			if (rename(to_name, backup) < 0) {
521 				serrno = errno;
522 				unlink(tempfile);
523 				errno = serrno;
524 				err(EX_OSERR, "rename: %s to %s", to_name,
525 				     backup);
526 			}
527 		}
528 		if (verbose)
529 			(void)printf("install: %s -> %s\n", from_name, to_name);
530 		if (rename(tempfile, to_name) < 0) {
531 			serrno = errno;
532 			unlink(tempfile);
533 			errno = serrno;
534 			err(EX_OSERR, "rename: %s to %s",
535 			    tempfile, to_name);
536 		}
537 
538 		/* Re-open to_fd so we aren't hosed by the rename(2). */
539 		(void) close(to_fd);
540 		if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
541 			err(EX_OSERR, "%s", to_name);
542 	}
543 
544 	/*
545 	 * Preserve the timestamp of the source file if necessary.
546 	 */
547 	if (dopreserve && !files_match && !devnull) {
548 		utb.actime = from_sb.st_atime;
549 		utb.modtime = from_sb.st_mtime;
550 		utime(to_name, &utb);
551 	}
552 
553 	if (fstat(to_fd, &to_sb) == -1) {
554 		serrno = errno;
555 		(void)unlink(to_name);
556 		errno = serrno;
557 		err(EX_OSERR, "%s", to_name);
558 	}
559 
560 	/*
561 	 * Set owner, group, mode for target; do the chown first,
562 	 * chown may lose the setuid bits.
563 	 */
564 	if (!dounpriv && ((gid != (gid_t)-1 && gid != to_sb.st_gid) ||
565 	    (uid != (uid_t)-1 && uid != to_sb.st_uid) ||
566 	    (mode != to_sb.st_mode))) {
567 		/* Try to turn off the immutable bits. */
568 		if (to_sb.st_flags & NOCHANGEBITS)
569 			(void)fchflags(to_fd, to_sb.st_flags & ~NOCHANGEBITS);
570 	}
571 
572 	if (!dounpriv && (
573 	    (gid != (gid_t)-1 && gid != to_sb.st_gid) ||
574 	    (uid != (uid_t)-1 && uid != to_sb.st_uid)))
575 		if (fchown(to_fd, uid, gid) == -1) {
576 			serrno = errno;
577 			(void)unlink(to_name);
578 			errno = serrno;
579 			err(EX_OSERR,"%s: chown/chgrp", to_name);
580 		}
581 
582 	if (mode != to_sb.st_mode) {
583 		if (fchmod(to_fd,
584 		     dounpriv ? mode & (S_IRWXU|S_IRWXG|S_IRWXO) : mode)) {
585 			serrno = errno;
586 			(void)unlink(to_name);
587 			errno = serrno;
588 			err(EX_OSERR, "%s: chmod", to_name);
589 		}
590 	}
591 
592 	/*
593 	 * If provided a set of flags, set them, otherwise, preserve the
594 	 * flags, except for the dump and history flags.  The dump flag
595 	 * is left clear on the target while the history flag from when
596 	 * the target was created (which is inherited from the target's
597 	 * parent directory) is retained.
598 	 */
599 	if (flags & SETFLAGS) {
600 		nfset = (to_sb.st_flags | fset) & ~fclr;
601 	} else {
602 		nfset = (from_sb.st_flags & ~(UF_NODUMP | UF_NOHISTORY)) |
603 			(to_sb.st_flags & UF_NOHISTORY);
604 	}
605 
606 	/*
607 	 * NFS does not support flags.  Ignore EOPNOTSUPP flags if we're just
608 	 * trying to turn off UF_NODUMP.  If we're trying to set real flags,
609 	 * then warn if the fs doesn't support it, otherwise fail.
610 	 */
611 	if (!dounpriv && !devnull && fchflags(to_fd, nfset)) {
612 		if (flags & SETFLAGS) {
613 			if (errno == EOPNOTSUPP)
614 				warn("%s: chflags", to_name);
615 			else {
616 				serrno = errno;
617 				(void)unlink(to_name);
618 				errno = serrno;
619 				err(EX_OSERR, "%s: chflags", to_name);
620 			}
621 		}
622 	}
623 
624 	(void)close(to_fd);
625 	if (!devnull)
626 		(void)close(from_fd);
627 }
628 
629 /*
630  * compare --
631  *	compare two files; non-zero means files differ
632  */
633 static int
634 compare(int from_fd, const char *from_name __unused, size_t from_len,
635 	int to_fd, const char *to_name __unused, size_t to_len)
636 {
637 	char *p, *q;
638 	int rv;
639 	int done_compare;
640 
641 	rv = 0;
642 	if (from_len != to_len)
643 		return 1;
644 
645 	if (from_len <= MAX_CMP_SIZE) {
646 		done_compare = 0;
647 		if (trymmap(from_fd) && trymmap(to_fd)) {
648 			p = mmap(NULL, from_len, PROT_READ, MAP_SHARED, from_fd, (off_t)0);
649 			if (p == (char *)MAP_FAILED)
650 				goto out;
651 			q = mmap(NULL, from_len, PROT_READ, MAP_SHARED, to_fd, (off_t)0);
652 			if (q == (char *)MAP_FAILED) {
653 				munmap(p, from_len);
654 				goto out;
655 			}
656 
657 			rv = memcmp(p, q, from_len);
658 			munmap(p, from_len);
659 			munmap(q, from_len);
660 			done_compare = 1;
661 		}
662 	out:
663 		if (!done_compare) {
664 			char buf1[MAXBSIZE];
665 			char buf2[MAXBSIZE];
666 			int n1, n2;
667 
668 			rv = 0;
669 			lseek(from_fd, 0, SEEK_SET);
670 			lseek(to_fd, 0, SEEK_SET);
671 			while (rv == 0) {
672 				n1 = read(from_fd, buf1, sizeof(buf1));
673 				if (n1 == 0)
674 					break;		/* EOF */
675 				else if (n1 > 0) {
676 					n2 = read(to_fd, buf2, n1);
677 					if (n2 == n1)
678 						rv = memcmp(buf1, buf2, n1);
679 					else
680 						rv = 1;	/* out of sync */
681 				} else
682 					rv = 1;		/* read failure */
683 			}
684 			lseek(from_fd, 0, SEEK_SET);
685 			lseek(to_fd, 0, SEEK_SET);
686 		}
687 	} else
688 		rv = 1;	/* don't bother in this case */
689 
690 	return rv;
691 }
692 
693 /*
694  * create_tempfile --
695  *	create a temporary file based on path and open it
696  */
697 static int
698 create_tempfile(const char *path, char *temp, size_t tsize)
699 {
700 	char *p;
701 
702 	(void)strncpy(temp, path, tsize);
703 	temp[tsize - 1] = '\0';
704 	if ((p = strrchr(temp, '/')) != NULL)
705 		p++;
706 	else
707 		p = temp;
708 	(void)strncpy(p, "INS@XXXX", &temp[tsize - 1] - p);
709 	temp[tsize - 1] = '\0';
710 	return (mkstemp(temp));
711 }
712 
713 /*
714  * create_newfile --
715  *	create a new file, overwriting an existing one if necessary
716  */
717 static int
718 create_newfile(const char *path, int target, struct stat *sbp)
719 {
720 	char backup[MAXPATHLEN];
721 
722 	if (target) {
723 		/*
724 		 * Unlink now... avoid ETXTBSY errors later.  Try to turn
725 		 * off the append/immutable bits -- if we fail, go ahead,
726 		 * it might work.
727 		 */
728 		if (sbp->st_flags & NOCHANGEBITS)
729 			(void)chflags(path, sbp->st_flags & ~NOCHANGEBITS);
730 
731 		if (dobackup) {
732 			if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s",
733 			    path, suffix) != strlen(path) + strlen(suffix))
734 				errx(EX_OSERR, "%s: backup filename too long",
735 				    path);
736 			(void)snprintf(backup, MAXPATHLEN, "%s%s",
737 			    path, suffix);
738 			if (verbose)
739 				(void)printf("install: %s -> %s\n",
740 				    path, backup);
741 			if (rename(path, backup) < 0)
742 				err(EX_OSERR, "rename: %s to %s", path, backup);
743 		} else
744 			unlink(path);
745 	}
746 
747 	return (open(path, O_CREAT | O_RDWR | O_TRUNC, S_IRUSR | S_IWUSR));
748 }
749 
750 /*
751  * copy --
752  *	copy from one file to another
753  */
754 static void
755 copy(int from_fd, const char *from_name, int to_fd,
756      const char *to_name, off_t size)
757 {
758 	int nr, nw;
759 	int serrno;
760 	char *p;
761 	char buf[MAXBSIZE];
762 	int done_copy;
763 
764 	/* Rewind file descriptors. */
765 	if (lseek(from_fd, (off_t)0, SEEK_SET) == (off_t)-1)
766 		err(EX_OSERR, "lseek: %s", from_name);
767 	if (lseek(to_fd, (off_t)0, SEEK_SET) == (off_t)-1)
768 		err(EX_OSERR, "lseek: %s", to_name);
769 
770 	/*
771 	 * Mmap and write if less than 8M (the limit is so we don't totally
772 	 * trash memory on big files.  This is really a minor hack, but it
773 	 * wins some CPU back.
774 	 */
775 	done_copy = 0;
776 	if (size <= 8 * 1048576 && trymmap(from_fd) &&
777 	    (p = mmap(NULL, (size_t)size, PROT_READ, MAP_SHARED,
778 		    from_fd, (off_t)0)) != (char *)MAP_FAILED) {
779 		if ((nw = write(to_fd, p, size)) != size) {
780 			serrno = errno;
781 			(void)unlink(to_name);
782 			errno = nw > 0 ? EIO : serrno;
783 			err(EX_OSERR, "%s", to_name);
784 		}
785 		done_copy = 1;
786 	}
787 	if (!done_copy) {
788 		while ((nr = read(from_fd, buf, sizeof(buf))) > 0) {
789 			if ((nw = write(to_fd, buf, nr)) != nr) {
790 				serrno = errno;
791 				(void)unlink(to_name);
792 				errno = nw > 0 ? EIO : serrno;
793 				err(EX_OSERR, "%s", to_name);
794 			}
795 		}
796 		if (nr != 0) {
797 			serrno = errno;
798 			(void)unlink(to_name);
799 			errno = serrno;
800 			err(EX_OSERR, "%s", from_name);
801 		}
802 	}
803 }
804 
805 /*
806  * strip --
807  *	use strip(1) to strip the target file
808  */
809 static void
810 strip(const char *to_name)
811 {
812 	const char *stripbin;
813 	int serrno, status;
814 
815 	switch (fork()) {
816 	case -1:
817 		serrno = errno;
818 		(void)unlink(to_name);
819 		errno = serrno;
820 		err(EX_TEMPFAIL, "fork");
821 	case 0:
822 		stripbin = getenv("STRIPBIN");
823 		if (stripbin == NULL)
824 			stripbin = "strip";
825 		execlp(stripbin, stripbin, to_name, NULL);
826 		err(EX_OSERR, "exec(%s)", stripbin);
827 	default:
828 		if (wait(&status) == -1 || status) {
829 			serrno = errno;
830 			(void)unlink(to_name);
831 			errc(EX_SOFTWARE, serrno, "wait");
832 			/* NOTREACHED */
833 		}
834 	}
835 }
836 
837 /*
838  * When doing a concurrent make -j N multiple install's can race the mkdir.
839  */
840 static
841 int
842 mkdir_race(const char *path, int nmode)
843 {
844 	int res;
845 	struct stat sb;
846 
847 	res = mkdir(path, nmode);
848 	if (res < 0 && errno == EEXIST) {
849 		if (stat(path, &sb) == 0 && S_ISDIR(sb.st_mode))
850 			return(0);
851 		res = mkdir(path, nmode);
852 	}
853 	return (res);
854 }
855 
856 /*
857  * install_dir --
858  *	build directory hierarchy
859  */
860 static void
861 install_dir(char *path)
862 {
863 	char *p;
864 	struct stat sb;
865 	int ch;
866 
867 	for (p = path;; ++p)
868 		if (!*p || (p != path && *p  == '/')) {
869 			ch = *p;
870 			*p = '\0';
871 			if (stat(path, &sb)) {
872 				if (errno != ENOENT ||
873 				    mkdir_race(path, 0755) < 0) {
874 					err(EX_OSERR, "mkdir %s", path);
875 					/* NOTREACHED */
876 				} else if (verbose)
877 					(void)printf("install: mkdir %s\n",
878 						     path);
879 			} else if (!S_ISDIR(sb.st_mode))
880 				errx(EX_OSERR, "%s exists but is not a directory", path);
881 			if (!(*p = ch))
882 				break;
883 		}
884 
885 	if (!dounpriv) {
886 		if ((gid != (gid_t)-1 || uid != (uid_t)-1) &&
887 		    chown(path, uid, gid))
888 			warn("chown %u:%u %s", uid, gid, path);
889 		/* XXXBED: should we do the chmod in the dounpriv case? */
890 		if (chmod(path, mode))
891 			warn("chmod %o %s", mode, path);
892 	}
893 }
894 
895 /*
896  * usage --
897  *	print a usage message and die
898  */
899 static void
900 usage(void)
901 {
902 	fprintf(stderr,
903 "usage: install [-bCcpSsUv] [-B suffix] [-D dest] [-f flags] [-g group]\n"
904 "               [-m mode] [-o owner] file1 file2\n"
905 "       install [-bCcpSsUv] [-B suffix] [-D dest] [-f flags] [-g group]\n"
906 "               [-m mode] [-o owner] file1 ... fileN directory\n"
907 "       install -d [-lUv] [-D dest] [-g group] [-m mode] [-o owner]\n"
908 "               directory ...\n");
909 	exit(EX_USAGE);
910 	/* NOTREACHED */
911 }
912 
913 /*
914  * trymmap --
915  *	return true (1) if mmap should be tried, false (0) if not.
916  */
917 static int
918 trymmap(int fd)
919 {
920 /*
921  * The ifdef is for bootstrapping - f_fstypename doesn't exist in
922  * pre-Lite2-merge systems.
923  */
924 #ifdef MFSNAMELEN
925 	struct statfs stfs;
926 
927 	if (nommap || fstatfs(fd, &stfs) != 0)
928 		return (0);
929 	if (strcmp(stfs.f_fstypename, "ufs") == 0 ||
930 	    strcmp(stfs.f_fstypename, "cd9660") == 0)
931 		return (1);
932 #endif
933 	return (0);
934 }
935