xref: /dragonfly/usr.bin/xinstall/xinstall.c (revision 49781055)
1 /*
2  * Copyright (c) 1987, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  *
33  * @(#) Copyright (c) 1987, 1993 The Regents of the University of California.  All rights reserved.
34  * @(#)xinstall.c	8.1 (Berkeley) 7/21/93
35  * $FreeBSD: src/usr.bin/xinstall/xinstall.c,v 1.38.2.8 2002/08/07 16:29:48 ru Exp $
36  * $DragonFly: src/usr.bin/xinstall/xinstall.c,v 1.5 2004/09/23 19:13:51 dillon Exp $
37  */
38 
39 #include <sys/param.h>
40 #include <sys/mman.h>
41 #include <sys/mount.h>
42 #include <sys/stat.h>
43 #include <sys/wait.h>
44 
45 #include <ctype.h>
46 #include <err.h>
47 #include <errno.h>
48 #include <fcntl.h>
49 #include <grp.h>
50 #include <paths.h>
51 #include <pwd.h>
52 #include <stdio.h>
53 #include <stdlib.h>
54 #include <string.h>
55 #include <sysexits.h>
56 #include <unistd.h>
57 #include <utime.h>
58 
59 #include "pathnames.h"
60 
61 /* Bootstrap aid - this doesn't exist in most older releases */
62 #ifndef MAP_FAILED
63 #define MAP_FAILED ((void *)-1)	/* from <sys/mman.h> */
64 #endif
65 
66 #define MAX_CMP_SIZE	(16 * 1024 * 1024)
67 
68 #define	DIRECTORY	0x01		/* Tell install it's a directory. */
69 #define	SETFLAGS	0x02		/* Tell install to set flags. */
70 #define	NOCHANGEBITS	(UF_IMMUTABLE | UF_APPEND | SF_IMMUTABLE | SF_APPEND)
71 #define	BACKUP_SUFFIX	".old"
72 
73 struct passwd *pp;
74 struct group *gp;
75 gid_t gid;
76 uid_t uid;
77 int dobackup, docompare, dodir, dopreserve, dostrip, nommap, safecopy, verbose;
78 mode_t mode = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH;
79 const char *suffix = BACKUP_SUFFIX;
80 
81 static int file_getgroup(const char *etcdir, const char *group, gid_t *gid);
82 static int file_getowner(const char *etcdir, const char *owner, uid_t *uid);
83 
84 void	copy(int, const char *, int, const char *, off_t);
85 int	compare(int, const char *, size_t, int, const char *, size_t);
86 int	create_newfile(const char *, int, struct stat *);
87 int	create_tempfile(const char *, char *, size_t);
88 void	install(const char *, const char *, u_long, u_int);
89 void	install_dir(char *);
90 u_long	numeric_id(const char *, const char *);
91 void	strip(const char *);
92 int	trymmap(int);
93 void	usage(void);
94 
95 int
96 main(int argc, char **argv)
97 {
98 	struct stat from_sb, to_sb;
99 	mode_t *set;
100 	u_long fset;
101 	int ch, no_target;
102 	int trysys;
103 	u_int iflags;
104 	char *flags;
105 	const char *group, *owner, *to_name;
106 	const char *etcdir;
107 
108 	iflags = 0;
109 	trysys = 0;
110 	group = NULL;
111 	owner = NULL;
112 	etcdir = NULL;
113 
114 	while ((ch = getopt(argc, argv, "L:B:bCcdf:g:lMm:o:pSsv")) != -1)
115 		switch((char)ch) {
116 		case 'L':
117 			etcdir = optarg;
118 			break;
119 		case 'B':
120 			suffix = optarg;
121 			/* FALLTHROUGH */
122 		case 'b':
123 			dobackup = 1;
124 			break;
125 		case 'C':
126 			docompare = 1;
127 			break;
128 		case 'c':
129 			/* For backwards compatibility. */
130 			break;
131 		case 'd':
132 			dodir = 1;
133 			break;
134 		case 'f':
135 			flags = optarg;
136 			if (strtofflags(&flags, &fset, NULL))
137 				errx(EX_USAGE, "%s: invalid flag", flags);
138 			iflags |= SETFLAGS;
139 			break;
140 		case 'g':
141 			group = optarg;
142 			break;
143 		case 'l':
144 			trysys = 1;
145 			break;
146 		case 'M':
147 			nommap = 1;
148 			break;
149 		case 'm':
150 			if (!(set = setmode(optarg)))
151 				errx(EX_USAGE, "invalid file mode: %s",
152 				     optarg);
153 			mode = getmode(set, 0);
154 			free(set);
155 			break;
156 		case 'o':
157 			owner = optarg;
158 			break;
159 		case 'p':
160 			docompare = dopreserve = 1;
161 			break;
162 		case 'S':
163 			safecopy = 1;
164 			break;
165 		case 's':
166 			dostrip = 1;
167 			break;
168 		case 'v':
169 			verbose = 1;
170 			break;
171 		case '?':
172 		default:
173 			usage();
174 		}
175 	argc -= optind;
176 	argv += optind;
177 
178 	/* some options make no sense when creating directories */
179 	if (dostrip && dodir)
180 		usage();
181 
182 	/* must have at least two arguments, except when creating directories */
183 	if (argc < 2 && !dodir)
184 		usage();
185 
186 	/* need to make a temp copy so we can compare stripped version */
187 	if (docompare && dostrip)
188 		safecopy = 1;
189 
190 	/* no etcdir specified, always try the system */
191 	if (etcdir == NULL)
192 		trysys = 1;
193 	uid = (uid_t)-1;
194 	gid = (gid_t)-1;
195 
196 	/* get group and owner id's */
197 	if (group != NULL) {
198 		if (etcdir && file_getgroup(etcdir, group, &gid)) {
199 			;
200 		} else if (trysys && (gp = getgrnam(group)) != NULL) {
201 			gid = gp->gr_gid;
202 		} else {
203 			gid = (gid_t)numeric_id(group, "group");
204 		}
205 	}
206 
207 	if (owner != NULL) {
208 		if (etcdir && file_getowner(etcdir, owner, &uid)) {
209 			;
210 		} else if (trysys && (pp = getpwnam(owner)) != NULL) {
211 			uid = pp->pw_uid;
212 		} else {
213 			uid = (uid_t)numeric_id(owner, "user");
214 		}
215 	}
216 
217 	if (dodir) {
218 		for (; *argv != NULL; ++argv)
219 			install_dir(*argv);
220 		exit(EX_OK);
221 		/* NOTREACHED */
222 	}
223 
224 	no_target = stat(to_name = argv[argc - 1], &to_sb);
225 	if (!no_target && S_ISDIR(to_sb.st_mode)) {
226 		for (; *argv != to_name; ++argv)
227 			install(*argv, to_name, fset, iflags | DIRECTORY);
228 		exit(EX_OK);
229 		/* NOTREACHED */
230 	}
231 
232 	/* can't do file1 file2 directory/file */
233 	if (argc != 2)
234 		usage();
235 
236 	if (!no_target) {
237 		if (stat(*argv, &from_sb))
238 			err(EX_OSERR, "%s", *argv);
239 		if (!S_ISREG(to_sb.st_mode)) {
240 			errno = EFTYPE;
241 			err(EX_OSERR, "%s", to_name);
242 		}
243 		if (to_sb.st_dev == from_sb.st_dev &&
244 		    to_sb.st_ino == from_sb.st_ino)
245 			errx(EX_USAGE,
246 			    "%s and %s are the same file", *argv, to_name);
247 	}
248 	install(*argv, to_name, fset, iflags);
249 	exit(EX_OK);
250 	/* NOTREACHED */
251 }
252 
253 u_long
254 numeric_id(const char *name, const char *type)
255 {
256 	u_long val;
257 	char *ep;
258 
259 	/*
260 	 * XXX
261 	 * We know that uid_t's and gid_t's are unsigned longs.
262 	 */
263 	errno = 0;
264 	val = strtoul(name, &ep, 10);
265 	if (errno)
266 		err(EX_NOUSER, "%s", name);
267 	if (*ep != '\0')
268 		errx(EX_NOUSER, "unknown %s %s", type, name);
269 	return (val);
270 }
271 
272 static
273 int
274 file_getgroup(const char *etcdir, const char *group, gid_t *gid)
275 {
276 	FILE *fp;
277 	size_t len;
278 	size_t grlen;
279 	char *path;
280 	char *ptr;
281 	char *scan;
282 
283 	grlen = strlen(group);
284 
285 	if (asprintf(&path, "%s/group", etcdir) < 0)
286 		errx(EX_OSERR, "asprintf()");
287 	if ((fp = fopen(path, "r")) != NULL) {
288 		while ((ptr = fgetln(fp, &len)) != NULL && len) {
289 			ptr[len - 1] = 0;
290 			if ((scan = strchr(ptr, ':')) == NULL)
291 				continue;
292 			if (scan - ptr != grlen)
293 				continue;
294 			if (strncmp(ptr, group, grlen) != 0)
295 				continue;
296 			if ((scan = strchr(scan + 1, ':')) == NULL)
297 				continue;
298 			*gid = strtoul(scan + 1, NULL, 10);
299 			break;
300 		}
301 		fclose(fp);
302 	}
303 	free(path);
304 	return((*gid == (gid_t)-1) ? 0 : 1);
305 }
306 
307 static
308 int
309 file_getowner(const char *etcdir, const char *owner, uid_t *uid)
310 {
311 	FILE *fp;
312 	size_t len;
313 	size_t owner_len;
314 	char *path;
315 	char *ptr;
316 	char *scan;
317 
318 	owner_len = strlen(owner);
319 
320 	if (asprintf(&path, "%s/master.passwd", etcdir) < 0)
321 		errx(EX_OSERR, "asprintf()");
322 	if ((fp = fopen(path, "r")) != NULL) {
323 		while ((ptr = fgetln(fp, &len)) != NULL && len) {
324 			ptr[len - 1] = 0;
325 			if ((scan = strchr(ptr, ':')) == NULL)
326 				continue;
327 			if (scan - ptr != owner_len)
328 				continue;
329 			if (strncmp(ptr, owner, owner_len) != 0)
330 				continue;
331 			if ((scan = strchr(scan + 1, ':')) == NULL)
332 				continue;
333 			*uid = strtoul(scan + 1, NULL, 10);
334 			break;
335 		}
336 		fclose(fp);
337 	}
338 	free(path);
339 	return((*uid == (uid_t)-1) ? 0 : 1);
340 }
341 
342 /*
343  * install --
344  *	build a path name and install the file
345  */
346 void
347 install(const char *from_name, const char *to_name, u_long fset, u_int flags)
348 {
349 	struct stat from_sb, temp_sb, to_sb;
350 	struct utimbuf utb;
351 	int devnull, files_match, from_fd, serrno, target;
352 	int tempcopy, temp_fd, to_fd;
353 	char backup[MAXPATHLEN], *p, pathbuf[MAXPATHLEN], tempfile[MAXPATHLEN];
354 
355 	files_match = 0;
356 
357 	/* If try to install NULL file to a directory, fails. */
358 	if (flags & DIRECTORY || strcmp(from_name, _PATH_DEVNULL)) {
359 		if (stat(from_name, &from_sb))
360 			err(EX_OSERR, "%s", from_name);
361 		if (!S_ISREG(from_sb.st_mode)) {
362 			errno = EFTYPE;
363 			err(EX_OSERR, "%s", from_name);
364 		}
365 		/* Build the target path. */
366 		if (flags & DIRECTORY) {
367 			snprintf(pathbuf, sizeof(pathbuf), "%s/%s",
368 			    to_name,
369 			    (p = strrchr(from_name, '/')) ? ++p : from_name);
370 			to_name = pathbuf;
371 		}
372 		devnull = 0;
373 	} else {
374 		devnull = 1;
375 	}
376 
377 	target = stat(to_name, &to_sb) == 0;
378 
379 	/* Only install to regular files. */
380 	if (target && !S_ISREG(to_sb.st_mode)) {
381 		errno = EFTYPE;
382 		warn("%s", to_name);
383 		return;
384 	}
385 
386 	/* Only copy safe if the target exists. */
387 	tempcopy = safecopy && target;
388 
389 	if (!devnull && (from_fd = open(from_name, O_RDONLY, 0)) < 0)
390 		err(EX_OSERR, "%s", from_name);
391 
392 	/* If we don't strip, we can compare first. */
393 	if (docompare && !dostrip && target) {
394 		if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
395 			err(EX_OSERR, "%s", to_name);
396 		if (devnull)
397 			files_match = to_sb.st_size == 0;
398 		else
399 			files_match = !(compare(from_fd, from_name,
400 			    (size_t)from_sb.st_size, to_fd,
401 			    to_name, (size_t)to_sb.st_size));
402 
403 		/* Close "to" file unless we match. */
404 		if (!files_match)
405 			close(to_fd);
406 	}
407 
408 	if (!files_match) {
409 		if (tempcopy) {
410 			to_fd = create_tempfile(to_name, tempfile,
411 			    sizeof(tempfile));
412 			if (to_fd < 0)
413 				err(EX_OSERR, "%s", tempfile);
414 		} else {
415 			if ((to_fd = create_newfile(to_name, target,
416 			    &to_sb)) < 0)
417 				err(EX_OSERR, "%s", to_name);
418 			if (verbose)
419 				printf("install: %s -> %s\n",
420 				    from_name, to_name);
421 		}
422 		if (!devnull)
423 			copy(from_fd, from_name, to_fd,
424 			     tempcopy ? tempfile : to_name, from_sb.st_size);
425 	}
426 
427 	if (dostrip) {
428 		strip(tempcopy ? tempfile : to_name);
429 
430 		/*
431 		 * Re-open our fd on the target, in case we used a strip
432 		 * that does not work in-place -- like GNU binutils strip.
433 		 */
434 		close(to_fd);
435 		to_fd = open(tempcopy ? tempfile : to_name, O_RDONLY, 0);
436 		if (to_fd < 0)
437 			err(EX_OSERR, "stripping %s", to_name);
438 	}
439 
440 	/*
441 	 * Compare the stripped temp file with the target.
442 	 */
443 	if (docompare && dostrip && target) {
444 		temp_fd = to_fd;
445 
446 		/* Re-open to_fd using the real target name. */
447 		if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
448 			err(EX_OSERR, "%s", to_name);
449 
450 		if (fstat(temp_fd, &temp_sb)) {
451 			serrno = errno;
452 			unlink(tempfile);
453 			errno = serrno;
454 			err(EX_OSERR, "%s", tempfile);
455 		}
456 
457 		if (compare(temp_fd, tempfile, (size_t)temp_sb.st_size, to_fd,
458 			    to_name, (size_t)to_sb.st_size) == 0) {
459 			/*
460 			 * If target has more than one link we need to
461 			 * replace it in order to snap the extra links.
462 			 * Need to preserve target file times, though.
463 			 */
464 			if (to_sb.st_nlink != 1) {
465 				utb.actime = to_sb.st_atime;
466 				utb.modtime = to_sb.st_mtime;
467 				utime(tempfile, &utb);
468 			} else {
469 				files_match = 1;
470 				unlink(tempfile);
471 			}
472 			close(temp_fd);
473 		}
474 	}
475 
476 	/*
477 	 * Move the new file into place if doing a safe copy
478 	 * and the files are different (or just not compared).
479 	 */
480 	if (tempcopy && !files_match) {
481 		/* Try to turn off the immutable bits. */
482 		if (to_sb.st_flags & NOCHANGEBITS)
483 			chflags(to_name, to_sb.st_flags & ~NOCHANGEBITS);
484 		if (dobackup) {
485 			if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s", to_name,
486 			    suffix) != strlen(to_name) + strlen(suffix)) {
487 				unlink(tempfile);
488 				errx(EX_OSERR, "%s: backup filename too long",
489 				    to_name);
490 			}
491 			if (verbose)
492 				printf("install: %s -> %s\n", to_name, backup);
493 			if (rename(to_name, backup) < 0) {
494 				serrno = errno;
495 				unlink(tempfile);
496 				errno = serrno;
497 				err(EX_OSERR, "rename: %s to %s", to_name,
498 				     backup);
499 			}
500 		}
501 		if (verbose)
502 			printf("install: %s -> %s\n", from_name, to_name);
503 		if (rename(tempfile, to_name) < 0) {
504 			serrno = errno;
505 			unlink(tempfile);
506 			errno = serrno;
507 			err(EX_OSERR, "rename: %s to %s",
508 			    tempfile, to_name);
509 		}
510 
511 		/* Re-open to_fd so we aren't hosed by the rename(2). */
512 		close(to_fd);
513 		if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
514 			err(EX_OSERR, "%s", to_name);
515 	}
516 
517 	/*
518 	 * Preserve the timestamp of the source file if necessary.
519 	 */
520 	if (dopreserve && !files_match && !devnull) {
521 		utb.actime = from_sb.st_atime;
522 		utb.modtime = from_sb.st_mtime;
523 		utime(to_name, &utb);
524 	}
525 
526 	if (fstat(to_fd, &to_sb) == -1) {
527 		serrno = errno;
528 		unlink(to_name);
529 		errno = serrno;
530 		err(EX_OSERR, "%s", to_name);
531 	}
532 
533 	/*
534 	 * Set owner, group, mode for target; do the chown first,
535 	 * chown may lose the setuid bits.
536 	 */
537 	if ((gid != (gid_t)-1 && gid != to_sb.st_gid) ||
538 	    (uid != (uid_t)-1 && uid != to_sb.st_uid) ||
539 	    (mode != to_sb.st_mode)) {
540 		/* Try to turn off the immutable bits. */
541 		if (to_sb.st_flags & NOCHANGEBITS)
542 			fchflags(to_fd, to_sb.st_flags & ~NOCHANGEBITS);
543 	}
544 
545 	if ((gid != (gid_t)-1 && gid != to_sb.st_gid) ||
546 	    (uid != (uid_t)-1 && uid != to_sb.st_uid))
547 		if (fchown(to_fd, uid, gid) == -1) {
548 			serrno = errno;
549 			unlink(to_name);
550 			errno = serrno;
551 			err(EX_OSERR,"%s: chown/chgrp", to_name);
552 		}
553 
554 	if (mode != to_sb.st_mode)
555 		if (fchmod(to_fd, mode)) {
556 			serrno = errno;
557 			unlink(to_name);
558 			errno = serrno;
559 			err(EX_OSERR, "%s: chmod", to_name);
560 		}
561 
562 	/*
563 	 * If provided a set of flags, set them, otherwise, preserve the
564 	 * flags, except for the dump flag.
565 	 * NFS does not support flags.  Ignore EOPNOTSUPP flags if we're just
566 	 * trying to turn off UF_NODUMP.  If we're trying to set real flags,
567 	 * then warn if the the fs doesn't support it, otherwise fail.
568 	 */
569 	if (!devnull && fchflags(to_fd,
570 	    flags & SETFLAGS ? fset : from_sb.st_flags & ~UF_NODUMP)) {
571 		if (flags & SETFLAGS) {
572 			if (errno == EOPNOTSUPP)
573 				warn("%s: chflags", to_name);
574 			else {
575 				serrno = errno;
576 				unlink(to_name);
577 				errno = serrno;
578 				err(EX_OSERR, "%s: chflags", to_name);
579 			}
580 		}
581 	}
582 
583 	close(to_fd);
584 	if (!devnull)
585 		close(from_fd);
586 }
587 
588 /*
589  * compare --
590  *	compare two files; non-zero means files differ
591  */
592 int
593 compare(int from_fd, const char *from_name __unused, size_t from_len,
594 	int to_fd, const char *to_name __unused, size_t to_len)
595 {
596 	char *p, *q;
597 	int rv;
598 	int done_compare;
599 
600 	rv = 0;
601 	if (from_len != to_len)
602 		return 1;
603 
604 	if (from_len <= MAX_CMP_SIZE) {
605 		done_compare = 0;
606 		if (trymmap(from_fd) && trymmap(to_fd)) {
607 			p = mmap(NULL, from_len, PROT_READ, MAP_SHARED, from_fd, (off_t)0);
608 			if (p == (char *)MAP_FAILED)
609 				goto out;
610 			q = mmap(NULL, from_len, PROT_READ, MAP_SHARED, to_fd, (off_t)0);
611 			if (q == (char *)MAP_FAILED) {
612 				munmap(p, from_len);
613 				goto out;
614 			}
615 
616 			rv = memcmp(p, q, from_len);
617 			munmap(p, from_len);
618 			munmap(q, from_len);
619 			done_compare = 1;
620 		}
621 	out:
622 		if (!done_compare) {
623 			char buf1[MAXBSIZE];
624 			char buf2[MAXBSIZE];
625 			int n1, n2;
626 
627 			rv = 0;
628 			lseek(from_fd, 0, SEEK_SET);
629 			lseek(to_fd, 0, SEEK_SET);
630 			while (rv == 0) {
631 				n1 = read(from_fd, buf1, sizeof(buf1));
632 				if (n1 == 0)
633 					break;		/* EOF */
634 				else if (n1 > 0) {
635 					n2 = read(to_fd, buf2, n1);
636 					if (n2 == n1)
637 						rv = memcmp(buf1, buf2, n1);
638 					else
639 						rv = 1;	/* out of sync */
640 				} else
641 					rv = 1;		/* read failure */
642 			}
643 			lseek(from_fd, 0, SEEK_SET);
644 			lseek(to_fd, 0, SEEK_SET);
645 		}
646 	} else
647 		rv = 1;	/* don't bother in this case */
648 
649 	return rv;
650 }
651 
652 /*
653  * create_tempfile --
654  *	create a temporary file based on path and open it
655  */
656 int
657 create_tempfile(const char *path, char *temp, size_t tsize)
658 {
659 	char *p;
660 
661 	strncpy(temp, path, tsize);
662 	temp[tsize - 1] = '\0';
663 	if ((p = strrchr(temp, '/')) != NULL)
664 		p++;
665 	else
666 		p = temp;
667 	strncpy(p, "INS@XXXX", &temp[tsize - 1] - p);
668 	temp[tsize - 1] = '\0';
669 	return (mkstemp(temp));
670 }
671 
672 /*
673  * create_newfile --
674  *	create a new file, overwriting an existing one if necessary
675  */
676 int
677 create_newfile(const char *path, int target, struct stat *sbp)
678 {
679 	char backup[MAXPATHLEN];
680 
681 	if (target) {
682 		/*
683 		 * Unlink now... avoid ETXTBSY errors later.  Try to turn
684 		 * off the append/immutable bits -- if we fail, go ahead,
685 		 * it might work.
686 		 */
687 		if (sbp->st_flags & NOCHANGEBITS)
688 			chflags(path, sbp->st_flags & ~NOCHANGEBITS);
689 
690 		if (dobackup) {
691 			if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s",
692 			    path, suffix) != strlen(path) + strlen(suffix))
693 				errx(EX_OSERR, "%s: backup filename too long",
694 				    path);
695 			snprintf(backup, MAXPATHLEN, "%s%s",
696 			    path, suffix);
697 			if (verbose)
698 				printf("install: %s -> %s\n",
699 				    path, backup);
700 			if (rename(path, backup) < 0)
701 				err(EX_OSERR, "rename: %s to %s", path, backup);
702 		} else
703 			unlink(path);
704 	}
705 
706 	return (open(path, O_CREAT | O_RDWR | O_TRUNC, S_IRUSR | S_IWUSR));
707 }
708 
709 /*
710  * copy --
711  *	copy from one file to another
712  */
713 void
714 copy(int from_fd, const char *from_name, int to_fd,
715      const char *to_name, off_t size)
716 {
717 	int nr, nw;
718 	int serrno;
719 	char *p, buf[MAXBSIZE];
720 	int done_copy;
721 
722 	/* Rewind file descriptors. */
723 	if (lseek(from_fd, (off_t)0, SEEK_SET) == (off_t)-1)
724 		err(EX_OSERR, "lseek: %s", from_name);
725 	if (lseek(to_fd, (off_t)0, SEEK_SET) == (off_t)-1)
726 		err(EX_OSERR, "lseek: %s", to_name);
727 
728 	/*
729 	 * Mmap and write if less than 8M (the limit is so we don't totally
730 	 * trash memory on big files.  This is really a minor hack, but it
731 	 * wins some CPU back.
732 	 */
733 	done_copy = 0;
734 	if (size <= 8 * 1048576 && trymmap(from_fd) &&
735 	    (p = mmap(NULL, (size_t)size, PROT_READ, MAP_SHARED,
736 		    from_fd, (off_t)0)) != (char *)MAP_FAILED) {
737 		if ((nw = write(to_fd, p, size)) != size) {
738 			serrno = errno;
739 			unlink(to_name);
740 			errno = nw > 0 ? EIO : serrno;
741 			err(EX_OSERR, "%s", to_name);
742 		}
743 		done_copy = 1;
744 	}
745 	if (!done_copy) {
746 		while ((nr = read(from_fd, buf, sizeof(buf))) > 0)
747 			if ((nw = write(to_fd, buf, nr)) != nr) {
748 				serrno = errno;
749 				unlink(to_name);
750 				errno = nw > 0 ? EIO : serrno;
751 				err(EX_OSERR, "%s", to_name);
752 			}
753 		if (nr != 0) {
754 			serrno = errno;
755 			unlink(to_name);
756 			errno = serrno;
757 			err(EX_OSERR, "%s", from_name);
758 		}
759 	}
760 }
761 
762 /*
763  * strip --
764  *	use strip(1) to strip the target file
765  */
766 void
767 strip(const char *to_name)
768 {
769 	const char *stripbin;
770 	int serrno, status;
771 
772 	switch (fork()) {
773 	case -1:
774 		serrno = errno;
775 		unlink(to_name);
776 		errno = serrno;
777 		err(EX_TEMPFAIL, "fork");
778 	case 0:
779 		stripbin = getenv("STRIPBIN");
780 		if (stripbin == NULL)
781 			stripbin = "strip";
782 		execlp(stripbin, stripbin, to_name, (char *)NULL);
783 		err(EX_OSERR, "exec(%s)", stripbin);
784 	default:
785 		if (wait(&status) == -1 || status) {
786 			serrno = errno;
787 			unlink(to_name);
788 			errc(EX_SOFTWARE, serrno, "wait");
789 			/* NOTREACHED */
790 		}
791 	}
792 }
793 
794 /*
795  * install_dir --
796  *	build directory hierarchy
797  */
798 void
799 install_dir(char *path)
800 {
801 	char *p;
802 	struct stat sb;
803 	int ch;
804 
805 	for (p = path;; ++p)
806 		if (!*p || (p != path && *p  == '/')) {
807 			ch = *p;
808 			*p = '\0';
809 			if (stat(path, &sb)) {
810 				if (errno != ENOENT || mkdir(path, 0755) < 0) {
811 					err(EX_OSERR, "mkdir %s", path);
812 					/* NOTREACHED */
813 				} else if (verbose)
814 					printf("install: mkdir %s\n",
815 						     path);
816 			} else if (!S_ISDIR(sb.st_mode))
817 				errx(EX_OSERR, "%s exists but is not a directory", path);
818 			if (!(*p = ch))
819 				break;
820  		}
821 
822 	if ((gid != (gid_t)-1 || uid != (uid_t)-1) && chown(path, uid, gid))
823 		warn("chown %u:%u %s", uid, gid, path);
824 	if (chmod(path, mode))
825 		warn("chmod %o %s", mode, path);
826 }
827 
828 /*
829  * usage --
830  *	print a usage message and die
831  */
832 void
833 usage(void)
834 {
835 	fprintf(stderr, "\
836 usage: install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]\n\
837                [-o owner] file1 file2\n\
838        install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]\n\
839                [-o owner] file1 ... fileN directory\n\
840        install -d [-v] [-g group] [-m mode] [-o owner] directory ...\n");
841 	exit(EX_USAGE);
842 	/* NOTREACHED */
843 }
844 
845 /*
846  * trymmap --
847  *	return true (1) if mmap should be tried, false (0) if not.
848  */
849 int
850 trymmap(int fd)
851 {
852 /*
853  * The ifdef is for bootstrapping - f_fstypename doesn't exist in
854  * pre-Lite2-merge systems.
855  */
856 #ifdef MFSNAMELEN
857 	struct statfs stfs;
858 
859 	if (nommap || fstatfs(fd, &stfs) != 0)
860 		return (0);
861 	if (strcmp(stfs.f_fstypename, "ufs") == 0 ||
862 	    strcmp(stfs.f_fstypename, "cd9660") == 0)
863 		return (1);
864 #endif
865 	return (0);
866 }
867