1 /* 2 * Copyright (c) 1987, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 1. Redistributions of source code must retain the above copyright 9 * notice, this list of conditions and the following disclaimer. 10 * 2. Redistributions in binary form must reproduce the above copyright 11 * notice, this list of conditions and the following disclaimer in the 12 * documentation and/or other materials provided with the distribution. 13 * 3. All advertising materials mentioning features or use of this software 14 * must display the following acknowledgement: 15 * This product includes software developed by the University of 16 * California, Berkeley and its contributors. 17 * 4. Neither the name of the University nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 * 33 * @(#) Copyright (c) 1987, 1993 The Regents of the University of California. All rights reserved. 34 * @(#)xinstall.c 8.1 (Berkeley) 7/21/93 35 * $FreeBSD: src/usr.bin/xinstall/xinstall.c,v 1.38.2.8 2002/08/07 16:29:48 ru Exp $ 36 * $DragonFly: src/usr.bin/xinstall/xinstall.c,v 1.7 2008/11/12 00:16:46 dillon Exp $ 37 */ 38 39 #include <sys/param.h> 40 #include <sys/mman.h> 41 #include <sys/mount.h> 42 #include <sys/stat.h> 43 #include <sys/wait.h> 44 45 #include <ctype.h> 46 #include <err.h> 47 #include <errno.h> 48 #include <fcntl.h> 49 #include <grp.h> 50 #include <paths.h> 51 #include <pwd.h> 52 #include <stdio.h> 53 #include <stdlib.h> 54 #include <string.h> 55 #include <sysexits.h> 56 #include <unistd.h> 57 #include <utime.h> 58 59 #include "pathnames.h" 60 61 /* Bootstrap aid - this doesn't exist in most older releases */ 62 #ifndef MAP_FAILED 63 #define MAP_FAILED ((void *)-1) /* from <sys/mman.h> */ 64 #endif 65 #ifndef UF_NOHISTORY 66 #define UF_NOHISTORY 0 67 #endif 68 69 #define MAX_CMP_SIZE (16 * 1024 * 1024) 70 71 #define DIRECTORY 0x01 /* Tell install it's a directory. */ 72 #define SETFLAGS 0x02 /* Tell install to set flags. */ 73 #define NOCHANGEBITS (UF_IMMUTABLE | UF_APPEND | SF_IMMUTABLE | SF_APPEND) 74 #define BACKUP_SUFFIX ".old" 75 76 struct passwd *pp; 77 struct group *gp; 78 gid_t gid; 79 uid_t uid; 80 int dobackup, docompare, dodir, dopreserve, dostrip, nommap, safecopy, verbose; 81 mode_t mode = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH; 82 const char *suffix = BACKUP_SUFFIX; 83 84 static int file_getgroup(const char *etcdir, const char *group, gid_t *gid); 85 static int file_getowner(const char *etcdir, const char *owner, uid_t *uid); 86 87 void copy(int, const char *, int, const char *, off_t); 88 int compare(int, const char *, size_t, int, const char *, size_t); 89 int create_newfile(const char *, int, struct stat *); 90 int create_tempfile(const char *, char *, size_t); 91 void install(const char *, const char *, u_long, u_long, u_int); 92 void install_dir(char *); 93 u_long numeric_id(const char *, const char *); 94 void strip(const char *); 95 int trymmap(int); 96 void usage(void); 97 98 int 99 main(int argc, char **argv) 100 { 101 struct stat from_sb, to_sb; 102 mode_t *set; 103 u_long fset; 104 u_long fclr; 105 int ch, no_target; 106 int trysys; 107 u_int iflags; 108 char *flags; 109 const char *group, *owner, *to_name; 110 const char *etcdir; 111 112 iflags = 0; 113 trysys = 0; 114 group = NULL; 115 owner = NULL; 116 etcdir = NULL; 117 118 while ((ch = getopt(argc, argv, "L:B:bCcdf:g:lMm:o:pSsv")) != -1) 119 switch((char)ch) { 120 case 'L': 121 etcdir = optarg; 122 break; 123 case 'B': 124 suffix = optarg; 125 /* FALLTHROUGH */ 126 case 'b': 127 dobackup = 1; 128 break; 129 case 'C': 130 docompare = 1; 131 break; 132 case 'c': 133 /* For backwards compatibility. */ 134 break; 135 case 'd': 136 dodir = 1; 137 break; 138 case 'f': 139 flags = optarg; 140 if (strtofflags(&flags, &fset, &fclr)) 141 errx(EX_USAGE, "%s: invalid flag", flags); 142 iflags |= SETFLAGS; 143 break; 144 case 'g': 145 group = optarg; 146 break; 147 case 'l': 148 trysys = 1; 149 break; 150 case 'M': 151 nommap = 1; 152 break; 153 case 'm': 154 if (!(set = setmode(optarg))) 155 errx(EX_USAGE, "invalid file mode: %s", 156 optarg); 157 mode = getmode(set, 0); 158 free(set); 159 break; 160 case 'o': 161 owner = optarg; 162 break; 163 case 'p': 164 docompare = dopreserve = 1; 165 break; 166 case 'S': 167 safecopy = 1; 168 break; 169 case 's': 170 dostrip = 1; 171 break; 172 case 'v': 173 verbose = 1; 174 break; 175 case '?': 176 default: 177 usage(); 178 } 179 argc -= optind; 180 argv += optind; 181 182 /* some options make no sense when creating directories */ 183 if (dostrip && dodir) 184 usage(); 185 186 /* must have at least two arguments, except when creating directories */ 187 if (argc < 2 && !dodir) 188 usage(); 189 190 /* need to make a temp copy so we can compare stripped version */ 191 if (docompare && dostrip) 192 safecopy = 1; 193 194 /* no etcdir specified, always try the system */ 195 if (etcdir == NULL) 196 trysys = 1; 197 uid = (uid_t)-1; 198 gid = (gid_t)-1; 199 200 /* get group and owner id's */ 201 if (group != NULL) { 202 if (etcdir && file_getgroup(etcdir, group, &gid)) { 203 ; 204 } else if (trysys && (gp = getgrnam(group)) != NULL) { 205 gid = gp->gr_gid; 206 } else { 207 gid = (gid_t)numeric_id(group, "group"); 208 } 209 } 210 211 if (owner != NULL) { 212 if (etcdir && file_getowner(etcdir, owner, &uid)) { 213 ; 214 } else if (trysys && (pp = getpwnam(owner)) != NULL) { 215 uid = pp->pw_uid; 216 } else { 217 uid = (uid_t)numeric_id(owner, "user"); 218 } 219 } 220 221 if (dodir) { 222 for (; *argv != NULL; ++argv) 223 install_dir(*argv); 224 exit(EX_OK); 225 /* NOTREACHED */ 226 } 227 228 no_target = stat(to_name = argv[argc - 1], &to_sb); 229 if (!no_target && S_ISDIR(to_sb.st_mode)) { 230 for (; *argv != to_name; ++argv) 231 install(*argv, to_name, fset, fclr, iflags | DIRECTORY); 232 exit(EX_OK); 233 /* NOTREACHED */ 234 } 235 236 /* can't do file1 file2 directory/file */ 237 if (argc != 2) 238 usage(); 239 240 if (!no_target) { 241 if (stat(*argv, &from_sb)) 242 err(EX_OSERR, "%s", *argv); 243 if (!S_ISREG(to_sb.st_mode)) { 244 errno = EFTYPE; 245 err(EX_OSERR, "%s", to_name); 246 } 247 if (to_sb.st_dev == from_sb.st_dev && 248 to_sb.st_ino == from_sb.st_ino) 249 errx(EX_USAGE, 250 "%s and %s are the same file", *argv, to_name); 251 } 252 install(*argv, to_name, fset, fclr, iflags); 253 exit(EX_OK); 254 /* NOTREACHED */ 255 } 256 257 u_long 258 numeric_id(const char *name, const char *type) 259 { 260 u_long val; 261 char *ep; 262 263 /* 264 * XXX 265 * We know that uid_t's and gid_t's are unsigned longs. 266 */ 267 errno = 0; 268 val = strtoul(name, &ep, 10); 269 if (errno) 270 err(EX_NOUSER, "%s", name); 271 if (*ep != '\0') 272 errx(EX_NOUSER, "unknown %s %s", type, name); 273 return (val); 274 } 275 276 static 277 int 278 file_getgroup(const char *etcdir, const char *group, gid_t *gid) 279 { 280 FILE *fp; 281 size_t len; 282 size_t grlen; 283 char *path; 284 char *ptr; 285 char *scan; 286 287 grlen = strlen(group); 288 289 if (asprintf(&path, "%s/group", etcdir) < 0) 290 errx(EX_OSERR, "asprintf()"); 291 if ((fp = fopen(path, "r")) != NULL) { 292 while ((ptr = fgetln(fp, &len)) != NULL && len) { 293 ptr[len - 1] = 0; 294 if ((scan = strchr(ptr, ':')) == NULL) 295 continue; 296 if (scan - ptr != grlen) 297 continue; 298 if (strncmp(ptr, group, grlen) != 0) 299 continue; 300 if ((scan = strchr(scan + 1, ':')) == NULL) 301 continue; 302 *gid = strtoul(scan + 1, NULL, 10); 303 break; 304 } 305 fclose(fp); 306 } 307 free(path); 308 return((*gid == (gid_t)-1) ? 0 : 1); 309 } 310 311 static 312 int 313 file_getowner(const char *etcdir, const char *owner, uid_t *uid) 314 { 315 FILE *fp; 316 size_t len; 317 size_t owner_len; 318 char *path; 319 char *ptr; 320 char *scan; 321 322 owner_len = strlen(owner); 323 324 if (asprintf(&path, "%s/master.passwd", etcdir) < 0) 325 errx(EX_OSERR, "asprintf()"); 326 if ((fp = fopen(path, "r")) != NULL) { 327 while ((ptr = fgetln(fp, &len)) != NULL && len) { 328 ptr[len - 1] = 0; 329 if ((scan = strchr(ptr, ':')) == NULL) 330 continue; 331 if (scan - ptr != owner_len) 332 continue; 333 if (strncmp(ptr, owner, owner_len) != 0) 334 continue; 335 if ((scan = strchr(scan + 1, ':')) == NULL) 336 continue; 337 *uid = strtoul(scan + 1, NULL, 10); 338 break; 339 } 340 fclose(fp); 341 } 342 free(path); 343 return((*uid == (uid_t)-1) ? 0 : 1); 344 } 345 346 /* 347 * install -- 348 * build a path name and install the file 349 */ 350 void 351 install(const char *from_name, const char *to_name, u_long fset, u_long fclr, 352 u_int flags) 353 { 354 struct stat from_sb, temp_sb, to_sb; 355 struct utimbuf utb; 356 int devnull, files_match, from_fd, serrno, target; 357 int tempcopy, temp_fd, to_fd; 358 u_long nfset; 359 char backup[MAXPATHLEN], *p, pathbuf[MAXPATHLEN], tempfile[MAXPATHLEN]; 360 361 files_match = 0; 362 363 /* If try to install NULL file to a directory, fails. */ 364 if (flags & DIRECTORY || strcmp(from_name, _PATH_DEVNULL)) { 365 if (stat(from_name, &from_sb)) 366 err(EX_OSERR, "%s", from_name); 367 if (!S_ISREG(from_sb.st_mode)) { 368 errno = EFTYPE; 369 err(EX_OSERR, "%s", from_name); 370 } 371 /* Build the target path. */ 372 if (flags & DIRECTORY) { 373 snprintf(pathbuf, sizeof(pathbuf), "%s/%s", 374 to_name, 375 (p = strrchr(from_name, '/')) ? ++p : from_name); 376 to_name = pathbuf; 377 } 378 devnull = 0; 379 } else { 380 devnull = 1; 381 } 382 383 target = stat(to_name, &to_sb) == 0; 384 385 /* Only install to regular files. */ 386 if (target && !S_ISREG(to_sb.st_mode)) { 387 errno = EFTYPE; 388 warn("%s", to_name); 389 return; 390 } 391 392 /* Only copy safe if the target exists. */ 393 tempcopy = safecopy && target; 394 395 if (!devnull && (from_fd = open(from_name, O_RDONLY, 0)) < 0) 396 err(EX_OSERR, "%s", from_name); 397 398 /* If we don't strip, we can compare first. */ 399 if (docompare && !dostrip && target) { 400 if ((to_fd = open(to_name, O_RDONLY, 0)) < 0) 401 err(EX_OSERR, "%s", to_name); 402 if (devnull) 403 files_match = to_sb.st_size == 0; 404 else 405 files_match = !(compare(from_fd, from_name, 406 (size_t)from_sb.st_size, to_fd, 407 to_name, (size_t)to_sb.st_size)); 408 409 /* Close "to" file unless we match. */ 410 if (!files_match) 411 close(to_fd); 412 } 413 414 if (!files_match) { 415 if (tempcopy) { 416 to_fd = create_tempfile(to_name, tempfile, 417 sizeof(tempfile)); 418 if (to_fd < 0) 419 err(EX_OSERR, "%s", tempfile); 420 } else { 421 if ((to_fd = create_newfile(to_name, target, 422 &to_sb)) < 0) 423 err(EX_OSERR, "%s", to_name); 424 if (verbose) 425 printf("install: %s -> %s\n", 426 from_name, to_name); 427 } 428 if (!devnull) 429 copy(from_fd, from_name, to_fd, 430 tempcopy ? tempfile : to_name, from_sb.st_size); 431 } 432 433 if (dostrip) { 434 strip(tempcopy ? tempfile : to_name); 435 436 /* 437 * Re-open our fd on the target, in case we used a strip 438 * that does not work in-place -- like GNU binutils strip. 439 */ 440 close(to_fd); 441 to_fd = open(tempcopy ? tempfile : to_name, O_RDONLY, 0); 442 if (to_fd < 0) 443 err(EX_OSERR, "stripping %s", to_name); 444 } 445 446 /* 447 * Compare the stripped temp file with the target. 448 */ 449 if (docompare && dostrip && target) { 450 temp_fd = to_fd; 451 452 /* Re-open to_fd using the real target name. */ 453 if ((to_fd = open(to_name, O_RDONLY, 0)) < 0) 454 err(EX_OSERR, "%s", to_name); 455 456 if (fstat(temp_fd, &temp_sb)) { 457 serrno = errno; 458 unlink(tempfile); 459 errno = serrno; 460 err(EX_OSERR, "%s", tempfile); 461 } 462 463 if (compare(temp_fd, tempfile, (size_t)temp_sb.st_size, to_fd, 464 to_name, (size_t)to_sb.st_size) == 0) { 465 /* 466 * If target has more than one link we need to 467 * replace it in order to snap the extra links. 468 * Need to preserve target file times, though. 469 */ 470 if (to_sb.st_nlink != 1) { 471 utb.actime = to_sb.st_atime; 472 utb.modtime = to_sb.st_mtime; 473 utime(tempfile, &utb); 474 } else { 475 files_match = 1; 476 unlink(tempfile); 477 } 478 close(temp_fd); 479 } 480 } 481 482 /* 483 * Move the new file into place if doing a safe copy 484 * and the files are different (or just not compared). 485 */ 486 if (tempcopy && !files_match) { 487 /* Try to turn off the immutable bits. */ 488 if (to_sb.st_flags & NOCHANGEBITS) 489 chflags(to_name, to_sb.st_flags & ~NOCHANGEBITS); 490 if (dobackup) { 491 if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s", to_name, 492 suffix) != strlen(to_name) + strlen(suffix)) { 493 unlink(tempfile); 494 errx(EX_OSERR, "%s: backup filename too long", 495 to_name); 496 } 497 if (verbose) 498 printf("install: %s -> %s\n", to_name, backup); 499 if (rename(to_name, backup) < 0) { 500 serrno = errno; 501 unlink(tempfile); 502 errno = serrno; 503 err(EX_OSERR, "rename: %s to %s", to_name, 504 backup); 505 } 506 } 507 if (verbose) 508 printf("install: %s -> %s\n", from_name, to_name); 509 if (rename(tempfile, to_name) < 0) { 510 serrno = errno; 511 unlink(tempfile); 512 errno = serrno; 513 err(EX_OSERR, "rename: %s to %s", 514 tempfile, to_name); 515 } 516 517 /* Re-open to_fd so we aren't hosed by the rename(2). */ 518 close(to_fd); 519 if ((to_fd = open(to_name, O_RDONLY, 0)) < 0) 520 err(EX_OSERR, "%s", to_name); 521 } 522 523 /* 524 * Preserve the timestamp of the source file if necessary. 525 */ 526 if (dopreserve && !files_match && !devnull) { 527 utb.actime = from_sb.st_atime; 528 utb.modtime = from_sb.st_mtime; 529 utime(to_name, &utb); 530 } 531 532 if (fstat(to_fd, &to_sb) == -1) { 533 serrno = errno; 534 unlink(to_name); 535 errno = serrno; 536 err(EX_OSERR, "%s", to_name); 537 } 538 539 /* 540 * Set owner, group, mode for target; do the chown first, 541 * chown may lose the setuid bits. 542 */ 543 if ((gid != (gid_t)-1 && gid != to_sb.st_gid) || 544 (uid != (uid_t)-1 && uid != to_sb.st_uid) || 545 (mode != to_sb.st_mode)) { 546 /* Try to turn off the immutable bits. */ 547 if (to_sb.st_flags & NOCHANGEBITS) 548 fchflags(to_fd, to_sb.st_flags & ~NOCHANGEBITS); 549 } 550 551 if ((gid != (gid_t)-1 && gid != to_sb.st_gid) || 552 (uid != (uid_t)-1 && uid != to_sb.st_uid)) 553 if (fchown(to_fd, uid, gid) == -1) { 554 serrno = errno; 555 unlink(to_name); 556 errno = serrno; 557 err(EX_OSERR,"%s: chown/chgrp", to_name); 558 } 559 560 if (mode != to_sb.st_mode) 561 if (fchmod(to_fd, mode)) { 562 serrno = errno; 563 unlink(to_name); 564 errno = serrno; 565 err(EX_OSERR, "%s: chmod", to_name); 566 } 567 568 /* 569 * If provided a set of flags, set them, otherwise, preserve the 570 * flags, except for the dump and history flags. The dump flag 571 * is left clear on the target while the history flag from when 572 * the target was created (which is inherited from the target's 573 * parent directory) is retained. 574 */ 575 if (flags & SETFLAGS) { 576 nfset = (to_sb.st_flags | fset) & ~fclr; 577 } else { 578 nfset = from_sb.st_flags & ~(UF_NODUMP | UF_NOHISTORY) | 579 (to_sb.st_flags & UF_NOHISTORY); 580 } 581 582 /* 583 * NFS does not support flags. Ignore EOPNOTSUPP flags if we're just 584 * trying to turn off UF_NODUMP. If we're trying to set real flags, 585 * then warn if the the fs doesn't support it, otherwise fail. 586 */ 587 if (!devnull && fchflags(to_fd, nfset)) { 588 if (flags & SETFLAGS) { 589 if (errno == EOPNOTSUPP) 590 warn("%s: chflags", to_name); 591 else { 592 serrno = errno; 593 unlink(to_name); 594 errno = serrno; 595 err(EX_OSERR, "%s: chflags", to_name); 596 } 597 } 598 } 599 600 close(to_fd); 601 if (!devnull) 602 close(from_fd); 603 } 604 605 /* 606 * compare -- 607 * compare two files; non-zero means files differ 608 */ 609 int 610 compare(int from_fd, const char *from_name __unused, size_t from_len, 611 int to_fd, const char *to_name __unused, size_t to_len) 612 { 613 char *p, *q; 614 int rv; 615 int done_compare; 616 617 rv = 0; 618 if (from_len != to_len) 619 return 1; 620 621 if (from_len <= MAX_CMP_SIZE) { 622 done_compare = 0; 623 if (trymmap(from_fd) && trymmap(to_fd)) { 624 p = mmap(NULL, from_len, PROT_READ, MAP_SHARED, from_fd, (off_t)0); 625 if (p == (char *)MAP_FAILED) 626 goto out; 627 q = mmap(NULL, from_len, PROT_READ, MAP_SHARED, to_fd, (off_t)0); 628 if (q == (char *)MAP_FAILED) { 629 munmap(p, from_len); 630 goto out; 631 } 632 633 rv = memcmp(p, q, from_len); 634 munmap(p, from_len); 635 munmap(q, from_len); 636 done_compare = 1; 637 } 638 out: 639 if (!done_compare) { 640 char buf1[MAXBSIZE]; 641 char buf2[MAXBSIZE]; 642 int n1, n2; 643 644 rv = 0; 645 lseek(from_fd, 0, SEEK_SET); 646 lseek(to_fd, 0, SEEK_SET); 647 while (rv == 0) { 648 n1 = read(from_fd, buf1, sizeof(buf1)); 649 if (n1 == 0) 650 break; /* EOF */ 651 else if (n1 > 0) { 652 n2 = read(to_fd, buf2, n1); 653 if (n2 == n1) 654 rv = memcmp(buf1, buf2, n1); 655 else 656 rv = 1; /* out of sync */ 657 } else 658 rv = 1; /* read failure */ 659 } 660 lseek(from_fd, 0, SEEK_SET); 661 lseek(to_fd, 0, SEEK_SET); 662 } 663 } else 664 rv = 1; /* don't bother in this case */ 665 666 return rv; 667 } 668 669 /* 670 * create_tempfile -- 671 * create a temporary file based on path and open it 672 */ 673 int 674 create_tempfile(const char *path, char *temp, size_t tsize) 675 { 676 char *p; 677 678 strncpy(temp, path, tsize); 679 temp[tsize - 1] = '\0'; 680 if ((p = strrchr(temp, '/')) != NULL) 681 p++; 682 else 683 p = temp; 684 strncpy(p, "INS@XXXX", &temp[tsize - 1] - p); 685 temp[tsize - 1] = '\0'; 686 return (mkstemp(temp)); 687 } 688 689 /* 690 * create_newfile -- 691 * create a new file, overwriting an existing one if necessary 692 */ 693 int 694 create_newfile(const char *path, int target, struct stat *sbp) 695 { 696 char backup[MAXPATHLEN]; 697 698 if (target) { 699 /* 700 * Unlink now... avoid ETXTBSY errors later. Try to turn 701 * off the append/immutable bits -- if we fail, go ahead, 702 * it might work. 703 */ 704 if (sbp->st_flags & NOCHANGEBITS) 705 chflags(path, sbp->st_flags & ~NOCHANGEBITS); 706 707 if (dobackup) { 708 if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s", 709 path, suffix) != strlen(path) + strlen(suffix)) 710 errx(EX_OSERR, "%s: backup filename too long", 711 path); 712 snprintf(backup, MAXPATHLEN, "%s%s", 713 path, suffix); 714 if (verbose) 715 printf("install: %s -> %s\n", 716 path, backup); 717 if (rename(path, backup) < 0) 718 err(EX_OSERR, "rename: %s to %s", path, backup); 719 } else 720 unlink(path); 721 } 722 723 return (open(path, O_CREAT | O_RDWR | O_TRUNC, S_IRUSR | S_IWUSR)); 724 } 725 726 /* 727 * copy -- 728 * copy from one file to another 729 */ 730 void 731 copy(int from_fd, const char *from_name, int to_fd, 732 const char *to_name, off_t size) 733 { 734 int nr, nw; 735 int serrno; 736 char *p, buf[MAXBSIZE]; 737 int done_copy; 738 739 /* Rewind file descriptors. */ 740 if (lseek(from_fd, (off_t)0, SEEK_SET) == (off_t)-1) 741 err(EX_OSERR, "lseek: %s", from_name); 742 if (lseek(to_fd, (off_t)0, SEEK_SET) == (off_t)-1) 743 err(EX_OSERR, "lseek: %s", to_name); 744 745 /* 746 * Mmap and write if less than 8M (the limit is so we don't totally 747 * trash memory on big files. This is really a minor hack, but it 748 * wins some CPU back. 749 */ 750 done_copy = 0; 751 if (size <= 8 * 1048576 && trymmap(from_fd) && 752 (p = mmap(NULL, (size_t)size, PROT_READ, MAP_SHARED, 753 from_fd, (off_t)0)) != (char *)MAP_FAILED) { 754 if ((nw = write(to_fd, p, size)) != size) { 755 serrno = errno; 756 unlink(to_name); 757 errno = nw > 0 ? EIO : serrno; 758 err(EX_OSERR, "%s", to_name); 759 } 760 done_copy = 1; 761 } 762 if (!done_copy) { 763 while ((nr = read(from_fd, buf, sizeof(buf))) > 0) 764 if ((nw = write(to_fd, buf, nr)) != nr) { 765 serrno = errno; 766 unlink(to_name); 767 errno = nw > 0 ? EIO : serrno; 768 err(EX_OSERR, "%s", to_name); 769 } 770 if (nr != 0) { 771 serrno = errno; 772 unlink(to_name); 773 errno = serrno; 774 err(EX_OSERR, "%s", from_name); 775 } 776 } 777 } 778 779 /* 780 * strip -- 781 * use strip(1) to strip the target file 782 */ 783 void 784 strip(const char *to_name) 785 { 786 const char *stripbin; 787 int serrno, status; 788 789 switch (fork()) { 790 case -1: 791 serrno = errno; 792 unlink(to_name); 793 errno = serrno; 794 err(EX_TEMPFAIL, "fork"); 795 case 0: 796 stripbin = getenv("STRIPBIN"); 797 if (stripbin == NULL) 798 stripbin = "strip"; 799 execlp(stripbin, stripbin, to_name, NULL); 800 err(EX_OSERR, "exec(%s)", stripbin); 801 default: 802 if (wait(&status) == -1 || status) { 803 serrno = errno; 804 unlink(to_name); 805 errc(EX_SOFTWARE, serrno, "wait"); 806 /* NOTREACHED */ 807 } 808 } 809 } 810 811 /* 812 * install_dir -- 813 * build directory hierarchy 814 */ 815 void 816 install_dir(char *path) 817 { 818 char *p; 819 struct stat sb; 820 int ch; 821 822 for (p = path;; ++p) 823 if (!*p || (p != path && *p == '/')) { 824 ch = *p; 825 *p = '\0'; 826 if (stat(path, &sb)) { 827 if (errno != ENOENT || mkdir(path, 0755) < 0) { 828 err(EX_OSERR, "mkdir %s", path); 829 /* NOTREACHED */ 830 } else if (verbose) 831 printf("install: mkdir %s\n", 832 path); 833 } else if (!S_ISDIR(sb.st_mode)) 834 errx(EX_OSERR, "%s exists but is not a directory", path); 835 if (!(*p = ch)) 836 break; 837 } 838 839 if ((gid != (gid_t)-1 || uid != (uid_t)-1) && chown(path, uid, gid)) 840 warn("chown %u:%u %s", uid, gid, path); 841 if (chmod(path, mode)) 842 warn("chmod %o %s", mode, path); 843 } 844 845 /* 846 * usage -- 847 * print a usage message and die 848 */ 849 void 850 usage(void) 851 { 852 fprintf(stderr, "\ 853 usage: install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]\n\ 854 [-o owner] file1 file2\n\ 855 install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]\n\ 856 [-o owner] file1 ... fileN directory\n\ 857 install -d [-v] [-g group] [-m mode] [-o owner] directory ...\n"); 858 exit(EX_USAGE); 859 /* NOTREACHED */ 860 } 861 862 /* 863 * trymmap -- 864 * return true (1) if mmap should be tried, false (0) if not. 865 */ 866 int 867 trymmap(int fd) 868 { 869 /* 870 * The ifdef is for bootstrapping - f_fstypename doesn't exist in 871 * pre-Lite2-merge systems. 872 */ 873 #ifdef MFSNAMELEN 874 struct statfs stfs; 875 876 if (nommap || fstatfs(fd, &stfs) != 0) 877 return (0); 878 if (strcmp(stfs.f_fstypename, "ufs") == 0 || 879 strcmp(stfs.f_fstypename, "cd9660") == 0) 880 return (1); 881 #endif 882 return (0); 883 } 884