build - install should not complain if the mkdir() races
[dragonfly.git] / usr.bin / xinstall / xinstall.c
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1987, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
1de703da
MD
32 *
33 * @(#) Copyright (c) 1987, 1993 The Regents of the University of California. All rights reserved.
34 * @(#)xinstall.c 8.1 (Berkeley) 7/21/93
35 * $FreeBSD: src/usr.bin/xinstall/xinstall.c,v 1.38.2.8 2002/08/07 16:29:48 ru Exp $
984263bc
MD
36 */
37
984263bc
MD
38#include <sys/param.h>
39#include <sys/mman.h>
40#include <sys/mount.h>
41#include <sys/stat.h>
42#include <sys/wait.h>
43
44#include <ctype.h>
45#include <err.h>
46#include <errno.h>
47#include <fcntl.h>
48#include <grp.h>
49#include <paths.h>
50#include <pwd.h>
51#include <stdio.h>
52#include <stdlib.h>
53#include <string.h>
54#include <sysexits.h>
55#include <unistd.h>
56#include <utime.h>
57
58#include "pathnames.h"
59
60/* Bootstrap aid - this doesn't exist in most older releases */
61#ifndef MAP_FAILED
62#define MAP_FAILED ((void *)-1) /* from <sys/mman.h> */
63#endif
349c725b
MD
64#ifndef UF_NOHISTORY
65#define UF_NOHISTORY 0
66#endif
984263bc
MD
67
68#define MAX_CMP_SIZE (16 * 1024 * 1024)
69
70#define DIRECTORY 0x01 /* Tell install it's a directory. */
71#define SETFLAGS 0x02 /* Tell install to set flags. */
72#define NOCHANGEBITS (UF_IMMUTABLE | UF_APPEND | SF_IMMUTABLE | SF_APPEND)
73#define BACKUP_SUFFIX ".old"
74
75struct passwd *pp;
76struct group *gp;
77gid_t gid;
78uid_t uid;
79int dobackup, docompare, dodir, dopreserve, dostrip, nommap, safecopy, verbose;
80mode_t mode = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH;
81const char *suffix = BACKUP_SUFFIX;
a2bc4e56 82char *destdir;
984263bc 83
2d3086b4
SW
84static int file_getgroup(const char *etcdir, const char *group, gid_t *gidret);
85static int file_getowner(const char *etcdir, const char *owner, uid_t *uidret);
4e72d2de 86
984263bc
MD
87void copy(int, const char *, int, const char *, off_t);
88int compare(int, const char *, size_t, int, const char *, size_t);
89int create_newfile(const char *, int, struct stat *);
90int create_tempfile(const char *, char *, size_t);
c7a88692 91void install(const char *, const char *, u_long, u_long, u_int);
984263bc
MD
92void install_dir(char *);
93u_long numeric_id(const char *, const char *);
94void strip(const char *);
95int trymmap(int);
96void usage(void);
97
98int
1d1731fa 99main(int argc, char **argv)
984263bc
MD
100{
101 struct stat from_sb, to_sb;
102 mode_t *set;
103 u_long fset;
c7a88692 104 u_long fclr;
984263bc 105 int ch, no_target;
4e72d2de 106 int trysys;
984263bc
MD
107 u_int iflags;
108 char *flags;
109 const char *group, *owner, *to_name;
4e72d2de 110 const char *etcdir;
984263bc
MD
111
112 iflags = 0;
4e72d2de
MD
113 trysys = 0;
114 group = NULL;
115 owner = NULL;
116 etcdir = NULL;
117
a2bc4e56 118 while ((ch = getopt(argc, argv, "L:B:bCcdf:g:lMm:o:pSsv:D:")) != -1)
984263bc 119 switch((char)ch) {
4e72d2de
MD
120 case 'L':
121 etcdir = optarg;
122 break;
984263bc
MD
123 case 'B':
124 suffix = optarg;
125 /* FALLTHROUGH */
126 case 'b':
127 dobackup = 1;
128 break;
129 case 'C':
130 docompare = 1;
131 break;
132 case 'c':
133 /* For backwards compatibility. */
134 break;
135 case 'd':
136 dodir = 1;
137 break;
a2bc4e56
FT
138 case 'D':
139 destdir = optarg;
140 break;
984263bc
MD
141 case 'f':
142 flags = optarg;
c7a88692 143 if (strtofflags(&flags, &fset, &fclr))
984263bc
MD
144 errx(EX_USAGE, "%s: invalid flag", flags);
145 iflags |= SETFLAGS;
146 break;
147 case 'g':
148 group = optarg;
149 break;
4e72d2de
MD
150 case 'l':
151 trysys = 1;
152 break;
984263bc
MD
153 case 'M':
154 nommap = 1;
155 break;
156 case 'm':
157 if (!(set = setmode(optarg)))
158 errx(EX_USAGE, "invalid file mode: %s",
159 optarg);
160 mode = getmode(set, 0);
161 free(set);
162 break;
163 case 'o':
164 owner = optarg;
165 break;
166 case 'p':
167 docompare = dopreserve = 1;
168 break;
169 case 'S':
170 safecopy = 1;
171 break;
172 case 's':
173 dostrip = 1;
174 break;
175 case 'v':
176 verbose = 1;
177 break;
178 case '?':
179 default:
180 usage();
181 }
182 argc -= optind;
183 argv += optind;
184
185 /* some options make no sense when creating directories */
186 if (dostrip && dodir)
187 usage();
188
189 /* must have at least two arguments, except when creating directories */
190 if (argc < 2 && !dodir)
191 usage();
192
193 /* need to make a temp copy so we can compare stripped version */
194 if (docompare && dostrip)
195 safecopy = 1;
196
4e72d2de
MD
197 /* no etcdir specified, always try the system */
198 if (etcdir == NULL)
199 trysys = 1;
200 uid = (uid_t)-1;
201 gid = (gid_t)-1;
202
984263bc
MD
203 /* get group and owner id's */
204 if (group != NULL) {
4e72d2de
MD
205 if (etcdir && file_getgroup(etcdir, group, &gid)) {
206 ;
207 } else if (trysys && (gp = getgrnam(group)) != NULL) {
984263bc 208 gid = gp->gr_gid;
4e72d2de 209 } else {
984263bc 210 gid = (gid_t)numeric_id(group, "group");
4e72d2de
MD
211 }
212 }
984263bc
MD
213
214 if (owner != NULL) {
4e72d2de
MD
215 if (etcdir && file_getowner(etcdir, owner, &uid)) {
216 ;
217 } else if (trysys && (pp = getpwnam(owner)) != NULL) {
984263bc 218 uid = pp->pw_uid;
4e72d2de 219 } else {
984263bc 220 uid = (uid_t)numeric_id(owner, "user");
4e72d2de
MD
221 }
222 }
984263bc
MD
223
224 if (dodir) {
225 for (; *argv != NULL; ++argv)
226 install_dir(*argv);
227 exit(EX_OK);
228 /* NOTREACHED */
229 }
230
231 no_target = stat(to_name = argv[argc - 1], &to_sb);
232 if (!no_target && S_ISDIR(to_sb.st_mode)) {
233 for (; *argv != to_name; ++argv)
c7a88692 234 install(*argv, to_name, fset, fclr, iflags | DIRECTORY);
984263bc
MD
235 exit(EX_OK);
236 /* NOTREACHED */
237 }
238
239 /* can't do file1 file2 directory/file */
240 if (argc != 2)
241 usage();
242
243 if (!no_target) {
244 if (stat(*argv, &from_sb))
245 err(EX_OSERR, "%s", *argv);
246 if (!S_ISREG(to_sb.st_mode)) {
247 errno = EFTYPE;
248 err(EX_OSERR, "%s", to_name);
249 }
250 if (to_sb.st_dev == from_sb.st_dev &&
251 to_sb.st_ino == from_sb.st_ino)
252 errx(EX_USAGE,
253 "%s and %s are the same file", *argv, to_name);
254 }
c7a88692 255 install(*argv, to_name, fset, fclr, iflags);
984263bc
MD
256 exit(EX_OK);
257 /* NOTREACHED */
258}
259
260u_long
1d1731fa 261numeric_id(const char *name, const char *type)
984263bc
MD
262{
263 u_long val;
264 char *ep;
265
266 /*
267 * XXX
268 * We know that uid_t's and gid_t's are unsigned longs.
269 */
270 errno = 0;
271 val = strtoul(name, &ep, 10);
272 if (errno)
273 err(EX_NOUSER, "%s", name);
274 if (*ep != '\0')
275 errx(EX_NOUSER, "unknown %s %s", type, name);
276 return (val);
277}
278
4e72d2de
MD
279static
280int
2d3086b4 281file_getgroup(const char *etcdir, const char *group, gid_t *gidret)
4e72d2de
MD
282{
283 FILE *fp;
284 size_t len;
285 size_t grlen;
286 char *path;
287 char *ptr;
288 char *scan;
289
290 grlen = strlen(group);
291
292 if (asprintf(&path, "%s/group", etcdir) < 0)
293 errx(EX_OSERR, "asprintf()");
294 if ((fp = fopen(path, "r")) != NULL) {
295 while ((ptr = fgetln(fp, &len)) != NULL && len) {
296 ptr[len - 1] = 0;
297 if ((scan = strchr(ptr, ':')) == NULL)
298 continue;
2d3086b4 299 if ((size_t)(scan - ptr) != grlen)
4e72d2de
MD
300 continue;
301 if (strncmp(ptr, group, grlen) != 0)
302 continue;
303 if ((scan = strchr(scan + 1, ':')) == NULL)
304 continue;
2d3086b4 305 *gidret = strtoul(scan + 1, NULL, 10);
4e72d2de
MD
306 break;
307 }
308 fclose(fp);
309 }
310 free(path);
2d3086b4 311 return((*gidret == (gid_t)-1) ? 0 : 1);
4e72d2de
MD
312}
313
314static
315int
2d3086b4 316file_getowner(const char *etcdir, const char *owner, uid_t *uidret)
4e72d2de
MD
317{
318 FILE *fp;
319 size_t len;
320 size_t owner_len;
321 char *path;
322 char *ptr;
323 char *scan;
324
325 owner_len = strlen(owner);
326
327 if (asprintf(&path, "%s/master.passwd", etcdir) < 0)
328 errx(EX_OSERR, "asprintf()");
329 if ((fp = fopen(path, "r")) != NULL) {
330 while ((ptr = fgetln(fp, &len)) != NULL && len) {
331 ptr[len - 1] = 0;
332 if ((scan = strchr(ptr, ':')) == NULL)
333 continue;
2d3086b4 334 if ((size_t)(scan - ptr) != owner_len)
4e72d2de
MD
335 continue;
336 if (strncmp(ptr, owner, owner_len) != 0)
337 continue;
338 if ((scan = strchr(scan + 1, ':')) == NULL)
339 continue;
2d3086b4 340 *uidret = strtoul(scan + 1, NULL, 10);
4e72d2de
MD
341 break;
342 }
343 fclose(fp);
344 }
345 free(path);
2d3086b4 346 return((*uidret == (uid_t)-1) ? 0 : 1);
4e72d2de
MD
347}
348
984263bc
MD
349/*
350 * install --
351 * build a path name and install the file
352 */
353void
c7a88692
MD
354install(const char *from_name, const char *to_name, u_long fset, u_long fclr,
355 u_int flags)
984263bc
MD
356{
357 struct stat from_sb, temp_sb, to_sb;
358 struct utimbuf utb;
359 int devnull, files_match, from_fd, serrno, target;
360 int tempcopy, temp_fd, to_fd;
c7a88692 361 u_long nfset;
984263bc
MD
362 char backup[MAXPATHLEN], *p, pathbuf[MAXPATHLEN], tempfile[MAXPATHLEN];
363
364 files_match = 0;
2d3086b4 365 from_fd = -1;
984263bc
MD
366
367 /* If try to install NULL file to a directory, fails. */
368 if (flags & DIRECTORY || strcmp(from_name, _PATH_DEVNULL)) {
369 if (stat(from_name, &from_sb))
370 err(EX_OSERR, "%s", from_name);
371 if (!S_ISREG(from_sb.st_mode)) {
372 errno = EFTYPE;
373 err(EX_OSERR, "%s", from_name);
374 }
375 /* Build the target path. */
376 if (flags & DIRECTORY) {
739246af 377 snprintf(pathbuf, sizeof(pathbuf), "%s/%s",
984263bc
MD
378 to_name,
379 (p = strrchr(from_name, '/')) ? ++p : from_name);
380 to_name = pathbuf;
381 }
382 devnull = 0;
383 } else {
384 devnull = 1;
385 }
386
387 target = stat(to_name, &to_sb) == 0;
388
389 /* Only install to regular files. */
390 if (target && !S_ISREG(to_sb.st_mode)) {
391 errno = EFTYPE;
392 warn("%s", to_name);
393 return;
394 }
395
396 /* Only copy safe if the target exists. */
397 tempcopy = safecopy && target;
398
399 if (!devnull && (from_fd = open(from_name, O_RDONLY, 0)) < 0)
400 err(EX_OSERR, "%s", from_name);
401
402 /* If we don't strip, we can compare first. */
403 if (docompare && !dostrip && target) {
404 if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
405 err(EX_OSERR, "%s", to_name);
406 if (devnull)
407 files_match = to_sb.st_size == 0;
408 else
409 files_match = !(compare(from_fd, from_name,
410 (size_t)from_sb.st_size, to_fd,
411 to_name, (size_t)to_sb.st_size));
412
413 /* Close "to" file unless we match. */
414 if (!files_match)
739246af 415 close(to_fd);
984263bc
MD
416 }
417
418 if (!files_match) {
419 if (tempcopy) {
420 to_fd = create_tempfile(to_name, tempfile,
421 sizeof(tempfile));
422 if (to_fd < 0)
423 err(EX_OSERR, "%s", tempfile);
424 } else {
425 if ((to_fd = create_newfile(to_name, target,
426 &to_sb)) < 0)
427 err(EX_OSERR, "%s", to_name);
428 if (verbose)
739246af 429 printf("install: %s -> %s\n",
984263bc
MD
430 from_name, to_name);
431 }
432 if (!devnull)
433 copy(from_fd, from_name, to_fd,
434 tempcopy ? tempfile : to_name, from_sb.st_size);
435 }
436
437 if (dostrip) {
438 strip(tempcopy ? tempfile : to_name);
439
440 /*
441 * Re-open our fd on the target, in case we used a strip
442 * that does not work in-place -- like GNU binutils strip.
443 */
444 close(to_fd);
445 to_fd = open(tempcopy ? tempfile : to_name, O_RDONLY, 0);
446 if (to_fd < 0)
447 err(EX_OSERR, "stripping %s", to_name);
448 }
449
450 /*
451 * Compare the stripped temp file with the target.
452 */
453 if (docompare && dostrip && target) {
454 temp_fd = to_fd;
455
456 /* Re-open to_fd using the real target name. */
457 if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
458 err(EX_OSERR, "%s", to_name);
459
460 if (fstat(temp_fd, &temp_sb)) {
461 serrno = errno;
739246af 462 unlink(tempfile);
984263bc
MD
463 errno = serrno;
464 err(EX_OSERR, "%s", tempfile);
465 }
466
467 if (compare(temp_fd, tempfile, (size_t)temp_sb.st_size, to_fd,
468 to_name, (size_t)to_sb.st_size) == 0) {
469 /*
470 * If target has more than one link we need to
471 * replace it in order to snap the extra links.
472 * Need to preserve target file times, though.
473 */
474 if (to_sb.st_nlink != 1) {
475 utb.actime = to_sb.st_atime;
476 utb.modtime = to_sb.st_mtime;
739246af 477 utime(tempfile, &utb);
984263bc
MD
478 } else {
479 files_match = 1;
739246af 480 unlink(tempfile);
984263bc 481 }
739246af 482 close(temp_fd);
984263bc
MD
483 }
484 }
485
486 /*
487 * Move the new file into place if doing a safe copy
488 * and the files are different (or just not compared).
489 */
490 if (tempcopy && !files_match) {
491 /* Try to turn off the immutable bits. */
492 if (to_sb.st_flags & NOCHANGEBITS)
739246af 493 chflags(to_name, to_sb.st_flags & ~NOCHANGEBITS);
984263bc
MD
494 if (dobackup) {
495 if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s", to_name,
496 suffix) != strlen(to_name) + strlen(suffix)) {
497 unlink(tempfile);
498 errx(EX_OSERR, "%s: backup filename too long",
499 to_name);
500 }
501 if (verbose)
739246af 502 printf("install: %s -> %s\n", to_name, backup);
984263bc
MD
503 if (rename(to_name, backup) < 0) {
504 serrno = errno;
505 unlink(tempfile);
506 errno = serrno;
507 err(EX_OSERR, "rename: %s to %s", to_name,
508 backup);
509 }
510 }
511 if (verbose)
739246af 512 printf("install: %s -> %s\n", from_name, to_name);
984263bc
MD
513 if (rename(tempfile, to_name) < 0) {
514 serrno = errno;
515 unlink(tempfile);
516 errno = serrno;
517 err(EX_OSERR, "rename: %s to %s",
518 tempfile, to_name);
519 }
520
521 /* Re-open to_fd so we aren't hosed by the rename(2). */
739246af 522 close(to_fd);
984263bc
MD
523 if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
524 err(EX_OSERR, "%s", to_name);
525 }
526
527 /*
528 * Preserve the timestamp of the source file if necessary.
529 */
530 if (dopreserve && !files_match && !devnull) {
531 utb.actime = from_sb.st_atime;
532 utb.modtime = from_sb.st_mtime;
739246af 533 utime(to_name, &utb);
984263bc
MD
534 }
535
536 if (fstat(to_fd, &to_sb) == -1) {
537 serrno = errno;
739246af 538 unlink(to_name);
984263bc
MD
539 errno = serrno;
540 err(EX_OSERR, "%s", to_name);
541 }
542
543 /*
544 * Set owner, group, mode for target; do the chown first,
545 * chown may lose the setuid bits.
546 */
547 if ((gid != (gid_t)-1 && gid != to_sb.st_gid) ||
548 (uid != (uid_t)-1 && uid != to_sb.st_uid) ||
549 (mode != to_sb.st_mode)) {
550 /* Try to turn off the immutable bits. */
551 if (to_sb.st_flags & NOCHANGEBITS)
739246af 552 fchflags(to_fd, to_sb.st_flags & ~NOCHANGEBITS);
984263bc
MD
553 }
554
555 if ((gid != (gid_t)-1 && gid != to_sb.st_gid) ||
556 (uid != (uid_t)-1 && uid != to_sb.st_uid))
557 if (fchown(to_fd, uid, gid) == -1) {
558 serrno = errno;
739246af 559 unlink(to_name);
984263bc
MD
560 errno = serrno;
561 err(EX_OSERR,"%s: chown/chgrp", to_name);
562 }
563
564 if (mode != to_sb.st_mode)
565 if (fchmod(to_fd, mode)) {
566 serrno = errno;
739246af 567 unlink(to_name);
984263bc
MD
568 errno = serrno;
569 err(EX_OSERR, "%s: chmod", to_name);
570 }
571
572 /*
573 * If provided a set of flags, set them, otherwise, preserve the
c7a88692
MD
574 * flags, except for the dump and history flags. The dump flag
575 * is left clear on the target while the history flag from when
576 * the target was created (which is inherited from the target's
577 * parent directory) is retained.
578 */
579 if (flags & SETFLAGS) {
580 nfset = (to_sb.st_flags | fset) & ~fclr;
581 } else {
2d3086b4 582 nfset = (from_sb.st_flags & ~(UF_NODUMP | UF_NOHISTORY)) |
c7a88692
MD
583 (to_sb.st_flags & UF_NOHISTORY);
584 }
585
586 /*
984263bc
MD
587 * NFS does not support flags. Ignore EOPNOTSUPP flags if we're just
588 * trying to turn off UF_NODUMP. If we're trying to set real flags,
589 * then warn if the the fs doesn't support it, otherwise fail.
590 */
c7a88692 591 if (!devnull && fchflags(to_fd, nfset)) {
984263bc
MD
592 if (flags & SETFLAGS) {
593 if (errno == EOPNOTSUPP)
594 warn("%s: chflags", to_name);
595 else {
596 serrno = errno;
739246af 597 unlink(to_name);
984263bc
MD
598 errno = serrno;
599 err(EX_OSERR, "%s: chflags", to_name);
600 }
601 }
602 }
603
739246af 604 close(to_fd);
984263bc 605 if (!devnull)
739246af 606 close(from_fd);
984263bc
MD
607}
608
609/*
610 * compare --
611 * compare two files; non-zero means files differ
612 */
613int
614compare(int from_fd, const char *from_name __unused, size_t from_len,
615 int to_fd, const char *to_name __unused, size_t to_len)
616{
617 char *p, *q;
618 int rv;
619 int done_compare;
620
621 rv = 0;
622 if (from_len != to_len)
623 return 1;
624
625 if (from_len <= MAX_CMP_SIZE) {
626 done_compare = 0;
627 if (trymmap(from_fd) && trymmap(to_fd)) {
628 p = mmap(NULL, from_len, PROT_READ, MAP_SHARED, from_fd, (off_t)0);
629 if (p == (char *)MAP_FAILED)
630 goto out;
631 q = mmap(NULL, from_len, PROT_READ, MAP_SHARED, to_fd, (off_t)0);
632 if (q == (char *)MAP_FAILED) {
633 munmap(p, from_len);
634 goto out;
635 }
636
637 rv = memcmp(p, q, from_len);
638 munmap(p, from_len);
639 munmap(q, from_len);
640 done_compare = 1;
641 }
642 out:
643 if (!done_compare) {
644 char buf1[MAXBSIZE];
645 char buf2[MAXBSIZE];
646 int n1, n2;
647
648 rv = 0;
649 lseek(from_fd, 0, SEEK_SET);
650 lseek(to_fd, 0, SEEK_SET);
651 while (rv == 0) {
652 n1 = read(from_fd, buf1, sizeof(buf1));
653 if (n1 == 0)
654 break; /* EOF */
655 else if (n1 > 0) {
656 n2 = read(to_fd, buf2, n1);
657 if (n2 == n1)
658 rv = memcmp(buf1, buf2, n1);
659 else
660 rv = 1; /* out of sync */
661 } else
662 rv = 1; /* read failure */
663 }
664 lseek(from_fd, 0, SEEK_SET);
665 lseek(to_fd, 0, SEEK_SET);
666 }
667 } else
668 rv = 1; /* don't bother in this case */
669
670 return rv;
671}
672
673/*
674 * create_tempfile --
675 * create a temporary file based on path and open it
676 */
677int
1d1731fa 678create_tempfile(const char *path, char *temp, size_t tsize)
984263bc
MD
679{
680 char *p;
681
739246af 682 strncpy(temp, path, tsize);
984263bc
MD
683 temp[tsize - 1] = '\0';
684 if ((p = strrchr(temp, '/')) != NULL)
685 p++;
686 else
687 p = temp;
739246af 688 strncpy(p, "INS@XXXX", &temp[tsize - 1] - p);
984263bc
MD
689 temp[tsize - 1] = '\0';
690 return (mkstemp(temp));
691}
692
693/*
694 * create_newfile --
695 * create a new file, overwriting an existing one if necessary
696 */
697int
1d1731fa 698create_newfile(const char *path, int target, struct stat *sbp)
984263bc
MD
699{
700 char backup[MAXPATHLEN];
701
702 if (target) {
703 /*
704 * Unlink now... avoid ETXTBSY errors later. Try to turn
705 * off the append/immutable bits -- if we fail, go ahead,
706 * it might work.
707 */
708 if (sbp->st_flags & NOCHANGEBITS)
739246af 709 chflags(path, sbp->st_flags & ~NOCHANGEBITS);
984263bc
MD
710
711 if (dobackup) {
712 if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s",
713 path, suffix) != strlen(path) + strlen(suffix))
714 errx(EX_OSERR, "%s: backup filename too long",
715 path);
739246af 716 snprintf(backup, MAXPATHLEN, "%s%s",
984263bc
MD
717 path, suffix);
718 if (verbose)
739246af 719 printf("install: %s -> %s\n",
984263bc
MD
720 path, backup);
721 if (rename(path, backup) < 0)
722 err(EX_OSERR, "rename: %s to %s", path, backup);
723 } else
739246af 724 unlink(path);
984263bc
MD
725 }
726
727 return (open(path, O_CREAT | O_RDWR | O_TRUNC, S_IRUSR | S_IWUSR));
728}
729
730/*
731 * copy --
732 * copy from one file to another
733 */
734void
739246af 735copy(int from_fd, const char *from_name, int to_fd,
1d1731fa 736 const char *to_name, off_t size)
984263bc 737{
739246af 738 int nr, nw;
984263bc
MD
739 int serrno;
740 char *p, buf[MAXBSIZE];
741 int done_copy;
742
743 /* Rewind file descriptors. */
744 if (lseek(from_fd, (off_t)0, SEEK_SET) == (off_t)-1)
745 err(EX_OSERR, "lseek: %s", from_name);
746 if (lseek(to_fd, (off_t)0, SEEK_SET) == (off_t)-1)
747 err(EX_OSERR, "lseek: %s", to_name);
748
749 /*
750 * Mmap and write if less than 8M (the limit is so we don't totally
751 * trash memory on big files. This is really a minor hack, but it
752 * wins some CPU back.
753 */
754 done_copy = 0;
755 if (size <= 8 * 1048576 && trymmap(from_fd) &&
756 (p = mmap(NULL, (size_t)size, PROT_READ, MAP_SHARED,
757 from_fd, (off_t)0)) != (char *)MAP_FAILED) {
758 if ((nw = write(to_fd, p, size)) != size) {
759 serrno = errno;
739246af 760 unlink(to_name);
984263bc
MD
761 errno = nw > 0 ? EIO : serrno;
762 err(EX_OSERR, "%s", to_name);
763 }
764 done_copy = 1;
765 }
766 if (!done_copy) {
767 while ((nr = read(from_fd, buf, sizeof(buf))) > 0)
768 if ((nw = write(to_fd, buf, nr)) != nr) {
769 serrno = errno;
739246af 770 unlink(to_name);
984263bc
MD
771 errno = nw > 0 ? EIO : serrno;
772 err(EX_OSERR, "%s", to_name);
773 }
774 if (nr != 0) {
775 serrno = errno;
739246af 776 unlink(to_name);
984263bc
MD
777 errno = serrno;
778 err(EX_OSERR, "%s", from_name);
779 }
780 }
781}
782
783/*
784 * strip --
785 * use strip(1) to strip the target file
786 */
787void
1d1731fa 788strip(const char *to_name)
984263bc
MD
789{
790 const char *stripbin;
791 int serrno, status;
792
793 switch (fork()) {
794 case -1:
795 serrno = errno;
739246af 796 unlink(to_name);
984263bc
MD
797 errno = serrno;
798 err(EX_TEMPFAIL, "fork");
799 case 0:
800 stripbin = getenv("STRIPBIN");
801 if (stripbin == NULL)
802 stripbin = "strip";
2038fb68 803 execlp(stripbin, stripbin, to_name, NULL);
984263bc
MD
804 err(EX_OSERR, "exec(%s)", stripbin);
805 default:
806 if (wait(&status) == -1 || status) {
807 serrno = errno;
739246af 808 unlink(to_name);
984263bc
MD
809 errc(EX_SOFTWARE, serrno, "wait");
810 /* NOTREACHED */
811 }
812 }
813}
814
815/*
0e6b9ee8
MD
816 * When doing a concurrent make -j N multiple install's can race the mkdir.
817 */
818static
819int
820mkdir_race(const char *path, int nmode)
821{
822 int res;
823 struct stat sb;
824
825 res = mkdir(path, nmode);
826 if (res < 0 && errno == EEXIST) {
827 if (stat(path, &sb) == 0 && S_ISDIR(sb.st_mode))
828 return(0);
829 res = mkdir(path, mode);
830 }
831 return (res);
832}
833
834/*
984263bc 835 * install_dir --
739246af 836 * build directory hierarchy
984263bc
MD
837 */
838void
1d1731fa 839install_dir(char *path)
984263bc 840{
739246af 841 char *p;
984263bc
MD
842 struct stat sb;
843 int ch;
844
845 for (p = path;; ++p)
846 if (!*p || (p != path && *p == '/')) {
847 ch = *p;
848 *p = '\0';
849 if (stat(path, &sb)) {
0e6b9ee8
MD
850 if (errno != ENOENT ||
851 mkdir_race(path, 0755) < 0) {
984263bc
MD
852 err(EX_OSERR, "mkdir %s", path);
853 /* NOTREACHED */
854 } else if (verbose)
739246af 855 printf("install: mkdir %s\n",
984263bc
MD
856 path);
857 } else if (!S_ISDIR(sb.st_mode))
858 errx(EX_OSERR, "%s exists but is not a directory", path);
859 if (!(*p = ch))
860 break;
861 }
862
863 if ((gid != (gid_t)-1 || uid != (uid_t)-1) && chown(path, uid, gid))
864 warn("chown %u:%u %s", uid, gid, path);
865 if (chmod(path, mode))
866 warn("chmod %o %s", mode, path);
867}
868
869/*
870 * usage --
871 * print a usage message and die
872 */
873void
1d1731fa 874usage(void)
984263bc 875{
739246af 876 fprintf(stderr, "\
a2bc4e56 877usage: install [-bCcpSsv] [-B suffix] [-D dest] [-f flags] [-g group] [-m mode]\n\
984263bc 878 [-o owner] file1 file2\n\
a2bc4e56 879 install [-bCcpSsv] [-B suffix] [-D dest] [-f flags] [-g group] [-m mode]\n\
984263bc 880 [-o owner] file1 ... fileN directory\n\
a2bc4e56 881 install -d [-v] [-D dest] [-g group] [-m mode] [-o owner] directory ...\n");
984263bc
MD
882 exit(EX_USAGE);
883 /* NOTREACHED */
884}
885
886/*
887 * trymmap --
888 * return true (1) if mmap should be tried, false (0) if not.
889 */
890int
1d1731fa 891trymmap(int fd)
984263bc
MD
892{
893/*
894 * The ifdef is for bootstrapping - f_fstypename doesn't exist in
895 * pre-Lite2-merge systems.
896 */
897#ifdef MFSNAMELEN
898 struct statfs stfs;
899
900 if (nommap || fstatfs(fd, &stfs) != 0)
901 return (0);
902 if (strcmp(stfs.f_fstypename, "ufs") == 0 ||
903 strcmp(stfs.f_fstypename, "cd9660") == 0)
904 return (1);
905#endif
906 return (0);
907}