file_cmds-220.4.tar.gz
[apple/file_cmds.git] / install / xinstall.c
1 /*
2 * Copyright (c) 1987, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 */
33
34 #ifndef lint
35 static const char copyright[] =
36 "@(#) Copyright (c) 1987, 1993\n\
37 The Regents of the University of California. All rights reserved.\n";
38 #endif /* not lint */
39
40 #ifndef lint
41 #if 0
42 static char sccsid[] = "From: @(#)xinstall.c 8.1 (Berkeley) 7/21/93";
43 #endif
44 static const char rcsid[] =
45 "$FreeBSD: src/usr.bin/xinstall/xinstall.c,v 1.43 2001/05/30 07:08:49 ru Exp $";
46 #endif /* not lint */
47
48 #include <sys/param.h>
49 #include <sys/wait.h>
50 #include <sys/mman.h>
51 #include <sys/stat.h>
52 #include <sys/mount.h>
53
54 #include <ctype.h>
55 #include <err.h>
56 #include <errno.h>
57 #include <fcntl.h>
58 #include <grp.h>
59 #include <paths.h>
60 #include <pwd.h>
61 #include <stdio.h>
62 #include <stdlib.h>
63 #include <string.h>
64 #include <unistd.h>
65 #include <sysexits.h>
66 #include <utime.h>
67 #include <spawn.h>
68
69 #ifdef __APPLE__
70 #include <copyfile.h>
71 #endif /* __APPLE__ */
72
73 #include "pathnames.h"
74
75 /* Bootstrap aid - this doesn't exist in most older releases */
76 #ifndef MAP_FAILED
77 #define MAP_FAILED ((void *)-1) /* from <sys/mman.h> */
78 #endif
79
80 #define DIRECTORY 0x01 /* Tell install it's a directory. */
81 #define SETFLAGS 0x02 /* Tell install to set flags. */
82 #define NOCHANGEBITS (UF_IMMUTABLE | UF_APPEND | SF_IMMUTABLE | SF_APPEND)
83 #define BACKUP_SUFFIX ".old"
84
85 struct passwd *pp;
86 struct group *gp;
87 gid_t gid;
88 uid_t uid;
89 int dobackup, docompare, dodir, dopreserve, dostrip, nommap, safecopy, verbose;
90 mode_t mode = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH;
91 char *suffix = BACKUP_SUFFIX;
92
93 void copy __P((int, char *, int, char *, off_t));
94 int compare __P((int, const char *, size_t, int, const char *, size_t));
95 int create_newfile __P((char *, int, struct stat *));
96 int create_tempfile __P((char *, char *, size_t));
97 void install __P((char *, char *, u_long, u_int));
98 void install_dir __P((char *));
99 u_long numeric_id __P((char *, char *));
100 void strip __P((char *));
101 int trymmap __P((int));
102 void usage __P((void));
103
104 int
105 main(argc, argv)
106 int argc;
107 char *argv[];
108 {
109 struct stat from_sb, to_sb;
110 mode_t *set;
111 u_long fset = 0;
112 int ch, no_target;
113 u_int iflags;
114 char *flags, *group, *owner, *to_name;
115
116 iflags = 0;
117 group = owner = NULL;
118 while ((ch = getopt(argc, argv, "B:bCcdf:g:Mm:o:pSsv")) != -1)
119 switch((char)ch) {
120 case 'B':
121 suffix = optarg;
122 /* FALLTHROUGH */
123 case 'b':
124 dobackup = 1;
125 break;
126 case 'C':
127 docompare = 1;
128 break;
129 case 'c':
130 /* For backwards compatibility. */
131 break;
132 case 'd':
133 dodir = 1;
134 break;
135 case 'f':
136 flags = optarg;
137 if (strtofflags(&flags, &fset, NULL))
138 errx(EX_USAGE, "%s: invalid flag", flags);
139 iflags |= SETFLAGS;
140 break;
141 case 'g':
142 group = optarg;
143 break;
144 case 'M':
145 nommap = 1;
146 break;
147 case 'm':
148 if (!(set = setmode(optarg)))
149 errx(EX_USAGE, "invalid file mode: %s",
150 optarg);
151 mode = getmode(set, 0);
152 free(set);
153 break;
154 case 'o':
155 owner = optarg;
156 break;
157 case 'p':
158 docompare = dopreserve = 1;
159 break;
160 case 'S':
161 safecopy = 1;
162 break;
163 case 's':
164 dostrip = 1;
165 break;
166 case 'v':
167 verbose = 1;
168 break;
169 case '?':
170 default:
171 usage();
172 }
173 argc -= optind;
174 argv += optind;
175
176 /* some options make no sense when creating directories */
177 if ((safecopy || dostrip) && dodir)
178 usage();
179
180 /*
181 * Older versions allowed -d -C combo. Issue a warning
182 * for now, but turn this into an error before 4.5-RELEASE.
183 */
184 if (docompare && dodir)
185 warnx("the -d and -C options may not be specified together");
186
187 /* must have at least two arguments, except when creating directories */
188 if (argc < 2 && !dodir)
189 usage();
190
191 /* need to make a temp copy so we can compare stripped version */
192 if (docompare && dostrip)
193 safecopy = 1;
194
195 /* get group and owner id's */
196 if (group != NULL) {
197 if ((gp = getgrnam(group)) != NULL)
198 gid = gp->gr_gid;
199 else
200 gid = (uid_t)numeric_id(group, "group");
201 } else
202 gid = (gid_t)-1;
203
204 if (owner != NULL) {
205 if ((pp = getpwnam(owner)) != NULL)
206 uid = pp->pw_uid;
207 else
208 uid = (uid_t)numeric_id(owner, "user");
209 } else
210 uid = (uid_t)-1;
211
212 if (dodir) {
213 for (; *argv != NULL; ++argv)
214 install_dir(*argv);
215 exit(EX_OK);
216 /* NOTREACHED */
217 }
218
219 no_target = stat(to_name = argv[argc - 1], &to_sb);
220 if (!no_target && S_ISDIR(to_sb.st_mode)) {
221 for (; *argv != to_name; ++argv)
222 install(*argv, to_name, fset, iflags | DIRECTORY);
223 exit(EX_OK);
224 /* NOTREACHED */
225 }
226
227 /* can't do file1 file2 directory/file */
228 if (argc != 2)
229 usage();
230
231 if (!no_target) {
232 if (stat(*argv, &from_sb))
233 err(EX_OSERR, "%s", *argv);
234 if (!S_ISREG(to_sb.st_mode)) {
235 errno = EFTYPE;
236 err(EX_OSERR, "%s", to_name);
237 }
238 if (to_sb.st_dev == from_sb.st_dev &&
239 to_sb.st_ino == from_sb.st_ino)
240 errx(EX_USAGE,
241 "%s and %s are the same file", *argv, to_name);
242 }
243 install(*argv, to_name, fset, iflags);
244 exit(EX_OK);
245 /* NOTREACHED */
246 }
247
248 u_long
249 numeric_id(name, type)
250 char *name, *type;
251 {
252 u_long val;
253 char *ep;
254
255 /*
256 * XXX
257 * We know that uid_t's and gid_t's are unsigned longs.
258 */
259 errno = 0;
260 val = strtoul(name, &ep, 10);
261 if (errno)
262 err(EX_NOUSER, "%s", name);
263 if (*ep != '\0')
264 errx(EX_NOUSER, "unknown %s %s", type, name);
265 return (val);
266 }
267
268 /*
269 * install --
270 * build a path name and install the file
271 */
272 void
273 install(from_name, to_name, fset, flags)
274 char *from_name, *to_name;
275 u_long fset;
276 u_int flags;
277 {
278 struct stat from_sb, temp_sb, to_sb;
279 struct utimbuf utb;
280 int devnull, files_match, from_fd=0, serrno, target;
281 int tempcopy, temp_fd, to_fd=0;
282 char backup[MAXPATHLEN], *p, pathbuf[MAXPATHLEN], tempfile[MAXPATHLEN];
283
284 files_match = 0;
285
286 /* If try to install NULL file to a directory, fails. */
287 if (flags & DIRECTORY || strcmp(from_name, _PATH_DEVNULL)) {
288 if (stat(from_name, &from_sb))
289 err(EX_OSERR, "%s", from_name);
290 if (!S_ISREG(from_sb.st_mode)) {
291 errno = EFTYPE;
292 err(EX_OSERR, "%s", from_name);
293 }
294 /* Build the target path. */
295 if (flags & DIRECTORY) {
296 (void)snprintf(pathbuf, sizeof(pathbuf), "%s/%s",
297 to_name,
298 (p = strrchr(from_name, '/')) ? ++p : from_name);
299 to_name = pathbuf;
300 }
301 devnull = 0;
302 } else {
303 devnull = 1;
304 }
305
306 target = stat(to_name, &to_sb) == 0;
307
308 /* Only install to regular files. */
309 if (target && !S_ISREG(to_sb.st_mode)) {
310 errno = EFTYPE;
311 warn("%s", to_name);
312 return;
313 }
314
315 /* Only copy safe if the target exists. */
316 tempcopy = safecopy && target;
317
318 if (!devnull && (from_fd = open(from_name, O_RDONLY, 0)) < 0)
319 err(EX_OSERR, "%s", from_name);
320
321 /* If we don't strip, we can compare first. */
322 if (docompare && !dostrip && target) {
323 if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
324 err(EX_OSERR, "%s", to_name);
325 if (devnull)
326 files_match = to_sb.st_size == 0;
327 else
328 files_match = !(compare(from_fd, from_name,
329 (size_t)from_sb.st_size, to_fd,
330 to_name, (size_t)to_sb.st_size));
331
332 /* Close "to" file unless we match. */
333 if (!files_match)
334 (void)close(to_fd);
335 }
336
337 if (!files_match) {
338 if (tempcopy) {
339 to_fd = create_tempfile(to_name, tempfile,
340 sizeof(tempfile));
341 if (to_fd < 0)
342 err(EX_OSERR, "%s", tempfile);
343 } else {
344 if ((to_fd = create_newfile(to_name, target,
345 &to_sb)) < 0)
346 err(EX_OSERR, "%s", to_name);
347 if (verbose)
348 (void)printf("install: %s -> %s\n",
349 from_name, to_name);
350 }
351 if (!devnull)
352 copy(from_fd, from_name, to_fd,
353 tempcopy ? tempfile : to_name, from_sb.st_size);
354 }
355
356 if (dostrip) {
357 strip(tempcopy ? tempfile : to_name);
358
359 /*
360 * Re-open our fd on the target, in case we used a strip
361 * that does not work in-place -- like GNU binutils strip.
362 */
363 close(to_fd);
364 to_fd = open(tempcopy ? tempfile : to_name, O_RDONLY, 0);
365 if (to_fd < 0)
366 err(EX_OSERR, "stripping %s", to_name);
367 }
368
369 /*
370 * Compare the stripped temp file with the target.
371 */
372 if (docompare && dostrip && target) {
373 temp_fd = to_fd;
374
375 /* Re-open to_fd using the real target name. */
376 if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
377 err(EX_OSERR, "%s", to_name);
378
379 if (fstat(temp_fd, &temp_sb)) {
380 serrno = errno;
381 (void)unlink(tempfile);
382 errno = serrno;
383 err(EX_OSERR, "%s", tempfile);
384 }
385
386 if (compare(temp_fd, tempfile, (size_t)temp_sb.st_size, to_fd,
387 to_name, (size_t)to_sb.st_size) == 0) {
388 /*
389 * If target has more than one link we need to
390 * replace it in order to snap the extra links.
391 * Need to preserve target file times, though.
392 */
393 if (to_sb.st_nlink != 1) {
394 utb.actime = to_sb.st_atime;
395 utb.modtime = to_sb.st_mtime;
396 (void)utime(tempfile, &utb);
397 } else {
398 files_match = 1;
399 (void)unlink(tempfile);
400 }
401 (void) close(temp_fd);
402 }
403 }
404
405 /*
406 * Move the new file into place if doing a safe copy
407 * and the files are different (or just not compared).
408 */
409 if (tempcopy && !files_match) {
410 /* Try to turn off the immutable bits. */
411 if (to_sb.st_flags & NOCHANGEBITS)
412 (void)chflags(to_name, to_sb.st_flags & ~NOCHANGEBITS);
413 if (dobackup) {
414 if (snprintf(backup, MAXPATHLEN, "%s%s", to_name,
415 suffix) != strlen(to_name) + strlen(suffix)) {
416 unlink(tempfile);
417 errx(EX_OSERR, "%s: backup filename too long",
418 to_name);
419 }
420 if (verbose)
421 (void)printf("install: %s -> %s\n", to_name, backup);
422 if (rename(to_name, backup) < 0) {
423 serrno = errno;
424 unlink(tempfile);
425 errno = serrno;
426 err(EX_OSERR, "rename: %s to %s", to_name,
427 backup);
428 }
429 }
430 if (verbose)
431 (void)printf("install: %s -> %s\n", from_name, to_name);
432 if (rename(tempfile, to_name) < 0) {
433 serrno = errno;
434 unlink(tempfile);
435 errno = serrno;
436 err(EX_OSERR, "rename: %s to %s",
437 tempfile, to_name);
438 }
439
440 /* Re-open to_fd so we aren't hosed by the rename(2). */
441 (void) close(to_fd);
442 if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
443 err(EX_OSERR, "%s", to_name);
444 }
445
446 #ifdef __APPLE__
447 /* in case mtime is modified */
448 if (!devnull && (S_ISLNK(from_sb.st_mode) || S_ISREG(from_sb.st_mode)) &&
449 fcopyfile(from_fd, to_fd, NULL, COPYFILE_XATTR) < 0) {
450 warn("%s: unable to copy extended attributes from %s", to_name, from_name);
451 }
452 #endif /* __APPLE__ */
453 /*
454 * Preserve the timestamp of the source file if necessary.
455 */
456 if (dopreserve && !files_match && !devnull) {
457 utb.actime = from_sb.st_atime;
458 utb.modtime = from_sb.st_mtime;
459 (void)utime(to_name, &utb);
460 }
461
462 if (fstat(to_fd, &to_sb) == -1) {
463 serrno = errno;
464 (void)unlink(to_name);
465 errno = serrno;
466 err(EX_OSERR, "%s", to_name);
467 }
468
469 /*
470 * Set owner, group, mode for target; do the chown first,
471 * chown may lose the setuid bits.
472 */
473 if ((gid != (gid_t)-1 && gid != to_sb.st_gid) ||
474 (uid != (uid_t)-1 && uid != to_sb.st_uid) ||
475 (mode != to_sb.st_mode)) {
476 /* Try to turn off the immutable bits. */
477 if (to_sb.st_flags & NOCHANGEBITS)
478 (void)fchflags(to_fd, to_sb.st_flags & ~NOCHANGEBITS);
479 }
480
481 if ((gid != (gid_t)-1 && gid != to_sb.st_gid) ||
482 (uid != (uid_t)-1 && uid != to_sb.st_uid))
483 if (fchown(to_fd, uid, gid) == -1) {
484 serrno = errno;
485 (void)unlink(to_name);
486 errno = serrno;
487 err(EX_OSERR,"%s: chown/chgrp", to_name);
488 }
489
490 if (mode != to_sb.st_mode)
491 if (fchmod(to_fd, mode)) {
492 serrno = errno;
493 (void)unlink(to_name);
494 errno = serrno;
495 err(EX_OSERR, "%s: chmod", to_name);
496 }
497
498 /*
499 * If provided a set of flags, set them, otherwise, preserve the
500 * flags, except for the dump flag.
501 * NFS does not support flags. Ignore ENOTSUP flags if we're just
502 * trying to turn off UF_NODUMP. If we're trying to set real flags,
503 * then warn if the the fs doesn't support it, otherwise fail.
504 */
505 if (!devnull && fchflags(to_fd,
506 flags & SETFLAGS ? fset : from_sb.st_flags & ~UF_NODUMP)) {
507 if (flags & SETFLAGS) {
508 if (errno == ENOTSUP)
509 warn("%s: chflags", to_name);
510 else {
511 serrno = errno;
512 (void)unlink(to_name);
513 errno = serrno;
514 err(EX_OSERR, "%s: chflags", to_name);
515 }
516 }
517 }
518 #ifdef __APPLE__
519 /* the ACL could prevent credential/permission system calls later on... */
520 if (!devnull && (S_ISLNK(from_sb.st_mode) || S_ISREG(from_sb.st_mode)) &&
521 (fcopyfile(from_fd, to_fd, NULL, COPYFILE_ACL) < 0)) {
522 warn("%s: unable to copy ACL from %s", to_name, from_name);
523 }
524 #endif /* __APPLE__ */
525
526 (void)close(to_fd);
527 if (!devnull)
528 (void)close(from_fd);
529 }
530 #if TARGET_OS_EMBEDDED
531 #define BUFFER_SIZE 128*1024
532 #else /* !TARGET_OS_EMBEDDED */
533 #define BUFFER_SIZE MAXBSIZE
534 #endif /* TARGET_OS_EMBEDDED */
535 /*
536 * compare --
537 * compare two files; non-zero means files differ
538 */
539 int
540 compare(int from_fd, const char *from_name, size_t from_len,
541 int to_fd, const char *to_name, size_t to_len)
542 {
543 char *p, *q;
544 int rv;
545 int done_compare;
546
547 rv = 0;
548 if (from_len != to_len)
549 return 1;
550
551 if (from_len <= 8 * 1024 * 1024) {
552 done_compare = 0;
553 if (trymmap(from_fd) && trymmap(to_fd)) {
554 p = mmap(NULL, from_len, PROT_READ, MAP_SHARED, from_fd, (off_t)0);
555 if (p == (char *)MAP_FAILED)
556 goto out;
557 q = mmap(NULL, from_len, PROT_READ, MAP_SHARED, to_fd, (off_t)0);
558 if (q == (char *)MAP_FAILED) {
559 munmap(p, from_len);
560 goto out;
561 }
562
563 rv = memcmp(p, q, from_len);
564 munmap(p, from_len);
565 munmap(q, from_len);
566 done_compare = 1;
567 }
568 out:
569 if (!done_compare) {
570 char buf1[BUFFER_SIZE];
571 char buf2[BUFFER_SIZE];
572 int n1, n2;
573
574 rv = 0;
575 lseek(from_fd, 0, SEEK_SET);
576 lseek(to_fd, 0, SEEK_SET);
577 while (rv == 0) {
578 n1 = read(from_fd, buf1, sizeof(buf1));
579 if (n1 == 0)
580 break; /* EOF */
581 else if (n1 > 0) {
582 n2 = read(to_fd, buf2, n1);
583 if (n2 == n1)
584 rv = memcmp(buf1, buf2, n1);
585 else
586 rv = 1; /* out of sync */
587 } else
588 rv = 1; /* read failure */
589 }
590 lseek(from_fd, 0, SEEK_SET);
591 lseek(to_fd, 0, SEEK_SET);
592 }
593 } else
594 rv = 1; /* don't bother in this case */
595
596 return rv;
597 }
598
599 /*
600 * create_tempfile --
601 * create a temporary file based on path and open it
602 */
603 int
604 create_tempfile(path, temp, tsize)
605 char *path;
606 char *temp;
607 size_t tsize;
608 {
609 char *p;
610
611 (void)strncpy(temp, path, tsize);
612 temp[tsize - 1] = '\0';
613 if ((p = strrchr(temp, '/')) != NULL)
614 p++;
615 else
616 p = temp;
617 (void)strncpy(p, "INS@XXXX", &temp[tsize - 1] - p);
618 temp[tsize - 1] = '\0';
619 return (mkstemp(temp));
620 }
621
622 /*
623 * create_newfile --
624 * create a new file, overwriting an existing one if necessary
625 */
626 int
627 create_newfile(path, target, sbp)
628 char *path;
629 int target;
630 struct stat *sbp;
631 {
632 char backup[MAXPATHLEN];
633
634 if (target) {
635 /*
636 * Unlink now... avoid ETXTBSY errors later. Try to turn
637 * off the append/immutable bits -- if we fail, go ahead,
638 * it might work.
639 */
640 if (sbp->st_flags & NOCHANGEBITS)
641 (void)chflags(path, sbp->st_flags & ~NOCHANGEBITS);
642
643 if (dobackup) {
644 if (snprintf(backup, MAXPATHLEN, "%s%s",
645 path, suffix) != strlen(path) + strlen(suffix))
646 errx(EX_OSERR, "%s: backup filename too long",
647 path);
648 (void)snprintf(backup, MAXPATHLEN, "%s%s",
649 path, suffix);
650 if (verbose)
651 (void)printf("install: %s -> %s\n",
652 path, backup);
653 if (rename(path, backup) < 0)
654 err(EX_OSERR, "rename: %s to %s", path, backup);
655 } else
656 (void)unlink(path);
657 }
658
659 return (open(path, O_CREAT | O_RDWR | O_TRUNC, S_IRUSR | S_IWUSR));
660 }
661
662 /*
663 * copy --
664 * copy from one file to another
665 */
666 void
667 copy(from_fd, from_name, to_fd, to_name, size)
668 register int from_fd, to_fd;
669 char *from_name, *to_name;
670 off_t size;
671 {
672 register int nr, nw;
673 int serrno;
674 char *p, buf[BUFFER_SIZE];
675 int done_copy;
676
677 /* Rewind file descriptors. */
678 if (lseek(from_fd, (off_t)0, SEEK_SET) == (off_t)-1)
679 err(EX_OSERR, "lseek: %s", from_name);
680 if (lseek(to_fd, (off_t)0, SEEK_SET) == (off_t)-1)
681 err(EX_OSERR, "lseek: %s", to_name);
682
683 /*
684 * Mmap and write if less than 8M (the limit is so we don't totally
685 * trash memory on big files. This is really a minor hack, but it
686 * wins some CPU back.
687 */
688 done_copy = 0;
689 if (size <= 8 * 1048576 && trymmap(from_fd) &&
690 (p = mmap(NULL, (size_t)size, PROT_READ, MAP_SHARED,
691 from_fd, (off_t)0)) != (char *)MAP_FAILED) {
692 if ((nw = write(to_fd, p, size)) != size) {
693 serrno = errno;
694 (void)unlink(to_name);
695 errno = nw > 0 ? EIO : serrno;
696 err(EX_OSERR, "%s", to_name);
697 }
698 done_copy = 1;
699 }
700 if (!done_copy) {
701 while ((nr = read(from_fd, buf, sizeof(buf))) > 0)
702 if ((nw = write(to_fd, buf, nr)) != nr) {
703 serrno = errno;
704 (void)unlink(to_name);
705 errno = nw > 0 ? EIO : serrno;
706 err(EX_OSERR, "%s", to_name);
707 }
708 if (nr != 0) {
709 serrno = errno;
710 (void)unlink(to_name);
711 errno = serrno;
712 err(EX_OSERR, "%s", from_name);
713 }
714 }
715 }
716
717 /*
718 * strip --
719 * use strip(1) to strip the target file
720 */
721 void
722 strip(to_name)
723 char *to_name;
724 {
725 pid_t pid;
726 int error;
727 extern char** environ;
728 char *const argv[] = { "xcrun", "strip", "-", to_name, NULL };
729
730 if (0 == (error = posix_spawnp(&pid, "xcrun", NULL, NULL, argv, environ))) {
731 int status = 0;
732 pid_t child = waitpid(pid, &status, 0);
733 if ((child == -1) || status) {
734 unlink(to_name);
735 errx(EX_SOFTWARE, "child process failed: xcrun strip - %s", to_name);
736 }
737 } else {
738 errno = error;
739 err(EX_OSERR, "xcrun strip - %s", to_name);
740 }
741 }
742
743 /*
744 * install_dir --
745 * build directory heirarchy
746 */
747 void
748 install_dir(path)
749 char *path;
750 {
751 register char *p;
752 struct stat sb;
753 int ch;
754
755 for (p = path;; ++p)
756 if (!*p || (p != path && *p == '/')) {
757 ch = *p;
758 *p = '\0';
759 if (stat(path, &sb)) {
760 if (errno != ENOENT || mkdir(path, 0755) < 0) {
761 err(EX_OSERR, "mkdir %s", path);
762 /* NOTREACHED */
763 } else if (verbose)
764 (void)printf("install: mkdir %s\n",
765 path);
766 } else if (!S_ISDIR(sb.st_mode))
767 errx(EX_OSERR, "%s exists but is not a directory", path);
768 if (!(*p = ch))
769 break;
770 }
771
772 if ((gid != (gid_t)-1 || uid != (uid_t)-1) && chown(path, uid, gid))
773 warn("chown %u:%u %s", uid, gid, path);
774 if (chmod(path, mode))
775 warn("chmod %o %s", mode, path);
776 }
777
778 /*
779 * usage --
780 * print a usage message and die
781 */
782 void
783 usage()
784 {
785 (void)fprintf(stderr, "\
786 usage: install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]\n\
787 [-o owner] file1 file2\n\
788 install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]\n\
789 [-o owner] file1 ... fileN directory\n\
790 install -d [-v] [-g group] [-m mode] [-o owner] directory ...\n");
791 exit(EX_USAGE);
792 /* NOTREACHED */
793 }
794
795 /*
796 * trymmap --
797 * return true (1) if mmap should be tried, false (0) if not.
798 */
799 int
800 trymmap(fd)
801 int fd;
802 {
803 /*
804 * The ifdef is for bootstrapping - f_fstypename doesn't exist in
805 * pre-Lite2-merge systems.
806 */
807 #ifdef MFSNAMELEN
808 struct statfs stfs;
809
810 if (nommap || fstatfs(fd, &stfs) != 0)
811 return (0);
812 if (strcmp(stfs.f_fstypename, "ufs") == 0 ||
813 strcmp(stfs.f_fstypename, "cd9660") == 0)
814 return (1);
815 #endif
816 return (0);
817 }