| 1 | /* |
| 2 | * Copyright (c) 1987, 1993 |
| 3 | * The Regents of the University of California. All rights reserved. |
| 4 | * |
| 5 | * Redistribution and use in source and binary forms, with or without |
| 6 | * modification, are permitted provided that the following conditions |
| 7 | * are met: |
| 8 | * 1. Redistributions of source code must retain the above copyright |
| 9 | * notice, this list of conditions and the following disclaimer. |
| 10 | * 2. Redistributions in binary form must reproduce the above copyright |
| 11 | * notice, this list of conditions and the following disclaimer in the |
| 12 | * documentation and/or other materials provided with the distribution. |
| 13 | * 3. All advertising materials mentioning features or use of this software |
| 14 | * must display the following acknowledgement: |
| 15 | * This product includes software developed by the University of |
| 16 | * California, Berkeley and its contributors. |
| 17 | * 4. Neither the name of the University nor the names of its contributors |
| 18 | * may be used to endorse or promote products derived from this software |
| 19 | * without specific prior written permission. |
| 20 | * |
| 21 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
| 22 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 23 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 24 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
| 25 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| 26 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| 27 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 28 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| 29 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 30 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 31 | * SUCH DAMAGE. |
| 32 | * |
| 33 | * @(#) Copyright (c) 1987, 1993 The Regents of the University of California. All rights reserved. |
| 34 | * @(#)xinstall.c 8.1 (Berkeley) 7/21/93 |
| 35 | * $FreeBSD: src/usr.bin/xinstall/xinstall.c,v 1.38.2.8 2002/08/07 16:29:48 ru Exp $ |
| 36 | * $DragonFly: src/usr.bin/xinstall/xinstall.c,v 1.7 2008/11/12 00:16:46 dillon Exp $ |
| 37 | */ |
| 38 | |
| 39 | #include <sys/param.h> |
| 40 | #include <sys/mman.h> |
| 41 | #include <sys/mount.h> |
| 42 | #include <sys/stat.h> |
| 43 | #include <sys/wait.h> |
| 44 | |
| 45 | #include <ctype.h> |
| 46 | #include <err.h> |
| 47 | #include <errno.h> |
| 48 | #include <fcntl.h> |
| 49 | #include <grp.h> |
| 50 | #include <paths.h> |
| 51 | #include <pwd.h> |
| 52 | #include <stdio.h> |
| 53 | #include <stdlib.h> |
| 54 | #include <string.h> |
| 55 | #include <sysexits.h> |
| 56 | #include <unistd.h> |
| 57 | #include <utime.h> |
| 58 | |
| 59 | #include "pathnames.h" |
| 60 | |
| 61 | /* Bootstrap aid - this doesn't exist in most older releases */ |
| 62 | #ifndef MAP_FAILED |
| 63 | #define MAP_FAILED ((void *)-1) /* from <sys/mman.h> */ |
| 64 | #endif |
| 65 | #ifndef UF_NOHISTORY |
| 66 | #define UF_NOHISTORY 0 |
| 67 | #endif |
| 68 | |
| 69 | #define MAX_CMP_SIZE (16 * 1024 * 1024) |
| 70 | |
| 71 | #define DIRECTORY 0x01 /* Tell install it's a directory. */ |
| 72 | #define SETFLAGS 0x02 /* Tell install to set flags. */ |
| 73 | #define NOCHANGEBITS (UF_IMMUTABLE | UF_APPEND | SF_IMMUTABLE | SF_APPEND) |
| 74 | #define BACKUP_SUFFIX ".old" |
| 75 | |
| 76 | struct passwd *pp; |
| 77 | struct group *gp; |
| 78 | gid_t gid; |
| 79 | uid_t uid; |
| 80 | int dobackup, docompare, dodir, dopreserve, dostrip, nommap, safecopy, verbose; |
| 81 | mode_t mode = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH; |
| 82 | const char *suffix = BACKUP_SUFFIX; |
| 83 | |
| 84 | static int file_getgroup(const char *etcdir, const char *group, gid_t *gid); |
| 85 | static int file_getowner(const char *etcdir, const char *owner, uid_t *uid); |
| 86 | |
| 87 | void copy(int, const char *, int, const char *, off_t); |
| 88 | int compare(int, const char *, size_t, int, const char *, size_t); |
| 89 | int create_newfile(const char *, int, struct stat *); |
| 90 | int create_tempfile(const char *, char *, size_t); |
| 91 | void install(const char *, const char *, u_long, u_long, u_int); |
| 92 | void install_dir(char *); |
| 93 | u_long numeric_id(const char *, const char *); |
| 94 | void strip(const char *); |
| 95 | int trymmap(int); |
| 96 | void usage(void); |
| 97 | |
| 98 | int |
| 99 | main(int argc, char **argv) |
| 100 | { |
| 101 | struct stat from_sb, to_sb; |
| 102 | mode_t *set; |
| 103 | u_long fset; |
| 104 | u_long fclr; |
| 105 | int ch, no_target; |
| 106 | int trysys; |
| 107 | u_int iflags; |
| 108 | char *flags; |
| 109 | const char *group, *owner, *to_name; |
| 110 | const char *etcdir; |
| 111 | |
| 112 | iflags = 0; |
| 113 | trysys = 0; |
| 114 | group = NULL; |
| 115 | owner = NULL; |
| 116 | etcdir = NULL; |
| 117 | |
| 118 | while ((ch = getopt(argc, argv, "L:B:bCcdf:g:lMm:o:pSsv")) != -1) |
| 119 | switch((char)ch) { |
| 120 | case 'L': |
| 121 | etcdir = optarg; |
| 122 | break; |
| 123 | case 'B': |
| 124 | suffix = optarg; |
| 125 | /* FALLTHROUGH */ |
| 126 | case 'b': |
| 127 | dobackup = 1; |
| 128 | break; |
| 129 | case 'C': |
| 130 | docompare = 1; |
| 131 | break; |
| 132 | case 'c': |
| 133 | /* For backwards compatibility. */ |
| 134 | break; |
| 135 | case 'd': |
| 136 | dodir = 1; |
| 137 | break; |
| 138 | case 'f': |
| 139 | flags = optarg; |
| 140 | if (strtofflags(&flags, &fset, &fclr)) |
| 141 | errx(EX_USAGE, "%s: invalid flag", flags); |
| 142 | iflags |= SETFLAGS; |
| 143 | break; |
| 144 | case 'g': |
| 145 | group = optarg; |
| 146 | break; |
| 147 | case 'l': |
| 148 | trysys = 1; |
| 149 | break; |
| 150 | case 'M': |
| 151 | nommap = 1; |
| 152 | break; |
| 153 | case 'm': |
| 154 | if (!(set = setmode(optarg))) |
| 155 | errx(EX_USAGE, "invalid file mode: %s", |
| 156 | optarg); |
| 157 | mode = getmode(set, 0); |
| 158 | free(set); |
| 159 | break; |
| 160 | case 'o': |
| 161 | owner = optarg; |
| 162 | break; |
| 163 | case 'p': |
| 164 | docompare = dopreserve = 1; |
| 165 | break; |
| 166 | case 'S': |
| 167 | safecopy = 1; |
| 168 | break; |
| 169 | case 's': |
| 170 | dostrip = 1; |
| 171 | break; |
| 172 | case 'v': |
| 173 | verbose = 1; |
| 174 | break; |
| 175 | case '?': |
| 176 | default: |
| 177 | usage(); |
| 178 | } |
| 179 | argc -= optind; |
| 180 | argv += optind; |
| 181 | |
| 182 | /* some options make no sense when creating directories */ |
| 183 | if (dostrip && dodir) |
| 184 | usage(); |
| 185 | |
| 186 | /* must have at least two arguments, except when creating directories */ |
| 187 | if (argc < 2 && !dodir) |
| 188 | usage(); |
| 189 | |
| 190 | /* need to make a temp copy so we can compare stripped version */ |
| 191 | if (docompare && dostrip) |
| 192 | safecopy = 1; |
| 193 | |
| 194 | /* no etcdir specified, always try the system */ |
| 195 | if (etcdir == NULL) |
| 196 | trysys = 1; |
| 197 | uid = (uid_t)-1; |
| 198 | gid = (gid_t)-1; |
| 199 | |
| 200 | /* get group and owner id's */ |
| 201 | if (group != NULL) { |
| 202 | if (etcdir && file_getgroup(etcdir, group, &gid)) { |
| 203 | ; |
| 204 | } else if (trysys && (gp = getgrnam(group)) != NULL) { |
| 205 | gid = gp->gr_gid; |
| 206 | } else { |
| 207 | gid = (gid_t)numeric_id(group, "group"); |
| 208 | } |
| 209 | } |
| 210 | |
| 211 | if (owner != NULL) { |
| 212 | if (etcdir && file_getowner(etcdir, owner, &uid)) { |
| 213 | ; |
| 214 | } else if (trysys && (pp = getpwnam(owner)) != NULL) { |
| 215 | uid = pp->pw_uid; |
| 216 | } else { |
| 217 | uid = (uid_t)numeric_id(owner, "user"); |
| 218 | } |
| 219 | } |
| 220 | |
| 221 | if (dodir) { |
| 222 | for (; *argv != NULL; ++argv) |
| 223 | install_dir(*argv); |
| 224 | exit(EX_OK); |
| 225 | /* NOTREACHED */ |
| 226 | } |
| 227 | |
| 228 | no_target = stat(to_name = argv[argc - 1], &to_sb); |
| 229 | if (!no_target && S_ISDIR(to_sb.st_mode)) { |
| 230 | for (; *argv != to_name; ++argv) |
| 231 | install(*argv, to_name, fset, fclr, iflags | DIRECTORY); |
| 232 | exit(EX_OK); |
| 233 | /* NOTREACHED */ |
| 234 | } |
| 235 | |
| 236 | /* can't do file1 file2 directory/file */ |
| 237 | if (argc != 2) |
| 238 | usage(); |
| 239 | |
| 240 | if (!no_target) { |
| 241 | if (stat(*argv, &from_sb)) |
| 242 | err(EX_OSERR, "%s", *argv); |
| 243 | if (!S_ISREG(to_sb.st_mode)) { |
| 244 | errno = EFTYPE; |
| 245 | err(EX_OSERR, "%s", to_name); |
| 246 | } |
| 247 | if (to_sb.st_dev == from_sb.st_dev && |
| 248 | to_sb.st_ino == from_sb.st_ino) |
| 249 | errx(EX_USAGE, |
| 250 | "%s and %s are the same file", *argv, to_name); |
| 251 | } |
| 252 | install(*argv, to_name, fset, fclr, iflags); |
| 253 | exit(EX_OK); |
| 254 | /* NOTREACHED */ |
| 255 | } |
| 256 | |
| 257 | u_long |
| 258 | numeric_id(const char *name, const char *type) |
| 259 | { |
| 260 | u_long val; |
| 261 | char *ep; |
| 262 | |
| 263 | /* |
| 264 | * XXX |
| 265 | * We know that uid_t's and gid_t's are unsigned longs. |
| 266 | */ |
| 267 | errno = 0; |
| 268 | val = strtoul(name, &ep, 10); |
| 269 | if (errno) |
| 270 | err(EX_NOUSER, "%s", name); |
| 271 | if (*ep != '\0') |
| 272 | errx(EX_NOUSER, "unknown %s %s", type, name); |
| 273 | return (val); |
| 274 | } |
| 275 | |
| 276 | static |
| 277 | int |
| 278 | file_getgroup(const char *etcdir, const char *group, gid_t *gid) |
| 279 | { |
| 280 | FILE *fp; |
| 281 | size_t len; |
| 282 | size_t grlen; |
| 283 | char *path; |
| 284 | char *ptr; |
| 285 | char *scan; |
| 286 | |
| 287 | grlen = strlen(group); |
| 288 | |
| 289 | if (asprintf(&path, "%s/group", etcdir) < 0) |
| 290 | errx(EX_OSERR, "asprintf()"); |
| 291 | if ((fp = fopen(path, "r")) != NULL) { |
| 292 | while ((ptr = fgetln(fp, &len)) != NULL && len) { |
| 293 | ptr[len - 1] = 0; |
| 294 | if ((scan = strchr(ptr, ':')) == NULL) |
| 295 | continue; |
| 296 | if (scan - ptr != grlen) |
| 297 | continue; |
| 298 | if (strncmp(ptr, group, grlen) != 0) |
| 299 | continue; |
| 300 | if ((scan = strchr(scan + 1, ':')) == NULL) |
| 301 | continue; |
| 302 | *gid = strtoul(scan + 1, NULL, 10); |
| 303 | break; |
| 304 | } |
| 305 | fclose(fp); |
| 306 | } |
| 307 | free(path); |
| 308 | return((*gid == (gid_t)-1) ? 0 : 1); |
| 309 | } |
| 310 | |
| 311 | static |
| 312 | int |
| 313 | file_getowner(const char *etcdir, const char *owner, uid_t *uid) |
| 314 | { |
| 315 | FILE *fp; |
| 316 | size_t len; |
| 317 | size_t owner_len; |
| 318 | char *path; |
| 319 | char *ptr; |
| 320 | char *scan; |
| 321 | |
| 322 | owner_len = strlen(owner); |
| 323 | |
| 324 | if (asprintf(&path, "%s/master.passwd", etcdir) < 0) |
| 325 | errx(EX_OSERR, "asprintf()"); |
| 326 | if ((fp = fopen(path, "r")) != NULL) { |
| 327 | while ((ptr = fgetln(fp, &len)) != NULL && len) { |
| 328 | ptr[len - 1] = 0; |
| 329 | if ((scan = strchr(ptr, ':')) == NULL) |
| 330 | continue; |
| 331 | if (scan - ptr != owner_len) |
| 332 | continue; |
| 333 | if (strncmp(ptr, owner, owner_len) != 0) |
| 334 | continue; |
| 335 | if ((scan = strchr(scan + 1, ':')) == NULL) |
| 336 | continue; |
| 337 | *uid = strtoul(scan + 1, NULL, 10); |
| 338 | break; |
| 339 | } |
| 340 | fclose(fp); |
| 341 | } |
| 342 | free(path); |
| 343 | return((*uid == (uid_t)-1) ? 0 : 1); |
| 344 | } |
| 345 | |
| 346 | /* |
| 347 | * install -- |
| 348 | * build a path name and install the file |
| 349 | */ |
| 350 | void |
| 351 | install(const char *from_name, const char *to_name, u_long fset, u_long fclr, |
| 352 | u_int flags) |
| 353 | { |
| 354 | struct stat from_sb, temp_sb, to_sb; |
| 355 | struct utimbuf utb; |
| 356 | int devnull, files_match, from_fd, serrno, target; |
| 357 | int tempcopy, temp_fd, to_fd; |
| 358 | u_long nfset; |
| 359 | char backup[MAXPATHLEN], *p, pathbuf[MAXPATHLEN], tempfile[MAXPATHLEN]; |
| 360 | |
| 361 | files_match = 0; |
| 362 | |
| 363 | /* If try to install NULL file to a directory, fails. */ |
| 364 | if (flags & DIRECTORY || strcmp(from_name, _PATH_DEVNULL)) { |
| 365 | if (stat(from_name, &from_sb)) |
| 366 | err(EX_OSERR, "%s", from_name); |
| 367 | if (!S_ISREG(from_sb.st_mode)) { |
| 368 | errno = EFTYPE; |
| 369 | err(EX_OSERR, "%s", from_name); |
| 370 | } |
| 371 | /* Build the target path. */ |
| 372 | if (flags & DIRECTORY) { |
| 373 | snprintf(pathbuf, sizeof(pathbuf), "%s/%s", |
| 374 | to_name, |
| 375 | (p = strrchr(from_name, '/')) ? ++p : from_name); |
| 376 | to_name = pathbuf; |
| 377 | } |
| 378 | devnull = 0; |
| 379 | } else { |
| 380 | devnull = 1; |
| 381 | } |
| 382 | |
| 383 | target = stat(to_name, &to_sb) == 0; |
| 384 | |
| 385 | /* Only install to regular files. */ |
| 386 | if (target && !S_ISREG(to_sb.st_mode)) { |
| 387 | errno = EFTYPE; |
| 388 | warn("%s", to_name); |
| 389 | return; |
| 390 | } |
| 391 | |
| 392 | /* Only copy safe if the target exists. */ |
| 393 | tempcopy = safecopy && target; |
| 394 | |
| 395 | if (!devnull && (from_fd = open(from_name, O_RDONLY, 0)) < 0) |
| 396 | err(EX_OSERR, "%s", from_name); |
| 397 | |
| 398 | /* If we don't strip, we can compare first. */ |
| 399 | if (docompare && !dostrip && target) { |
| 400 | if ((to_fd = open(to_name, O_RDONLY, 0)) < 0) |
| 401 | err(EX_OSERR, "%s", to_name); |
| 402 | if (devnull) |
| 403 | files_match = to_sb.st_size == 0; |
| 404 | else |
| 405 | files_match = !(compare(from_fd, from_name, |
| 406 | (size_t)from_sb.st_size, to_fd, |
| 407 | to_name, (size_t)to_sb.st_size)); |
| 408 | |
| 409 | /* Close "to" file unless we match. */ |
| 410 | if (!files_match) |
| 411 | close(to_fd); |
| 412 | } |
| 413 | |
| 414 | if (!files_match) { |
| 415 | if (tempcopy) { |
| 416 | to_fd = create_tempfile(to_name, tempfile, |
| 417 | sizeof(tempfile)); |
| 418 | if (to_fd < 0) |
| 419 | err(EX_OSERR, "%s", tempfile); |
| 420 | } else { |
| 421 | if ((to_fd = create_newfile(to_name, target, |
| 422 | &to_sb)) < 0) |
| 423 | err(EX_OSERR, "%s", to_name); |
| 424 | if (verbose) |
| 425 | printf("install: %s -> %s\n", |
| 426 | from_name, to_name); |
| 427 | } |
| 428 | if (!devnull) |
| 429 | copy(from_fd, from_name, to_fd, |
| 430 | tempcopy ? tempfile : to_name, from_sb.st_size); |
| 431 | } |
| 432 | |
| 433 | if (dostrip) { |
| 434 | strip(tempcopy ? tempfile : to_name); |
| 435 | |
| 436 | /* |
| 437 | * Re-open our fd on the target, in case we used a strip |
| 438 | * that does not work in-place -- like GNU binutils strip. |
| 439 | */ |
| 440 | close(to_fd); |
| 441 | to_fd = open(tempcopy ? tempfile : to_name, O_RDONLY, 0); |
| 442 | if (to_fd < 0) |
| 443 | err(EX_OSERR, "stripping %s", to_name); |
| 444 | } |
| 445 | |
| 446 | /* |
| 447 | * Compare the stripped temp file with the target. |
| 448 | */ |
| 449 | if (docompare && dostrip && target) { |
| 450 | temp_fd = to_fd; |
| 451 | |
| 452 | /* Re-open to_fd using the real target name. */ |
| 453 | if ((to_fd = open(to_name, O_RDONLY, 0)) < 0) |
| 454 | err(EX_OSERR, "%s", to_name); |
| 455 | |
| 456 | if (fstat(temp_fd, &temp_sb)) { |
| 457 | serrno = errno; |
| 458 | unlink(tempfile); |
| 459 | errno = serrno; |
| 460 | err(EX_OSERR, "%s", tempfile); |
| 461 | } |
| 462 | |
| 463 | if (compare(temp_fd, tempfile, (size_t)temp_sb.st_size, to_fd, |
| 464 | to_name, (size_t)to_sb.st_size) == 0) { |
| 465 | /* |
| 466 | * If target has more than one link we need to |
| 467 | * replace it in order to snap the extra links. |
| 468 | * Need to preserve target file times, though. |
| 469 | */ |
| 470 | if (to_sb.st_nlink != 1) { |
| 471 | utb.actime = to_sb.st_atime; |
| 472 | utb.modtime = to_sb.st_mtime; |
| 473 | utime(tempfile, &utb); |
| 474 | } else { |
| 475 | files_match = 1; |
| 476 | unlink(tempfile); |
| 477 | } |
| 478 | close(temp_fd); |
| 479 | } |
| 480 | } |
| 481 | |
| 482 | /* |
| 483 | * Move the new file into place if doing a safe copy |
| 484 | * and the files are different (or just not compared). |
| 485 | */ |
| 486 | if (tempcopy && !files_match) { |
| 487 | /* Try to turn off the immutable bits. */ |
| 488 | if (to_sb.st_flags & NOCHANGEBITS) |
| 489 | chflags(to_name, to_sb.st_flags & ~NOCHANGEBITS); |
| 490 | if (dobackup) { |
| 491 | if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s", to_name, |
| 492 | suffix) != strlen(to_name) + strlen(suffix)) { |
| 493 | unlink(tempfile); |
| 494 | errx(EX_OSERR, "%s: backup filename too long", |
| 495 | to_name); |
| 496 | } |
| 497 | if (verbose) |
| 498 | printf("install: %s -> %s\n", to_name, backup); |
| 499 | if (rename(to_name, backup) < 0) { |
| 500 | serrno = errno; |
| 501 | unlink(tempfile); |
| 502 | errno = serrno; |
| 503 | err(EX_OSERR, "rename: %s to %s", to_name, |
| 504 | backup); |
| 505 | } |
| 506 | } |
| 507 | if (verbose) |
| 508 | printf("install: %s -> %s\n", from_name, to_name); |
| 509 | if (rename(tempfile, to_name) < 0) { |
| 510 | serrno = errno; |
| 511 | unlink(tempfile); |
| 512 | errno = serrno; |
| 513 | err(EX_OSERR, "rename: %s to %s", |
| 514 | tempfile, to_name); |
| 515 | } |
| 516 | |
| 517 | /* Re-open to_fd so we aren't hosed by the rename(2). */ |
| 518 | close(to_fd); |
| 519 | if ((to_fd = open(to_name, O_RDONLY, 0)) < 0) |
| 520 | err(EX_OSERR, "%s", to_name); |
| 521 | } |
| 522 | |
| 523 | /* |
| 524 | * Preserve the timestamp of the source file if necessary. |
| 525 | */ |
| 526 | if (dopreserve && !files_match && !devnull) { |
| 527 | utb.actime = from_sb.st_atime; |
| 528 | utb.modtime = from_sb.st_mtime; |
| 529 | utime(to_name, &utb); |
| 530 | } |
| 531 | |
| 532 | if (fstat(to_fd, &to_sb) == -1) { |
| 533 | serrno = errno; |
| 534 | unlink(to_name); |
| 535 | errno = serrno; |
| 536 | err(EX_OSERR, "%s", to_name); |
| 537 | } |
| 538 | |
| 539 | /* |
| 540 | * Set owner, group, mode for target; do the chown first, |
| 541 | * chown may lose the setuid bits. |
| 542 | */ |
| 543 | if ((gid != (gid_t)-1 && gid != to_sb.st_gid) || |
| 544 | (uid != (uid_t)-1 && uid != to_sb.st_uid) || |
| 545 | (mode != to_sb.st_mode)) { |
| 546 | /* Try to turn off the immutable bits. */ |
| 547 | if (to_sb.st_flags & NOCHANGEBITS) |
| 548 | fchflags(to_fd, to_sb.st_flags & ~NOCHANGEBITS); |
| 549 | } |
| 550 | |
| 551 | if ((gid != (gid_t)-1 && gid != to_sb.st_gid) || |
| 552 | (uid != (uid_t)-1 && uid != to_sb.st_uid)) |
| 553 | if (fchown(to_fd, uid, gid) == -1) { |
| 554 | serrno = errno; |
| 555 | unlink(to_name); |
| 556 | errno = serrno; |
| 557 | err(EX_OSERR,"%s: chown/chgrp", to_name); |
| 558 | } |
| 559 | |
| 560 | if (mode != to_sb.st_mode) |
| 561 | if (fchmod(to_fd, mode)) { |
| 562 | serrno = errno; |
| 563 | unlink(to_name); |
| 564 | errno = serrno; |
| 565 | err(EX_OSERR, "%s: chmod", to_name); |
| 566 | } |
| 567 | |
| 568 | /* |
| 569 | * If provided a set of flags, set them, otherwise, preserve the |
| 570 | * flags, except for the dump and history flags. The dump flag |
| 571 | * is left clear on the target while the history flag from when |
| 572 | * the target was created (which is inherited from the target's |
| 573 | * parent directory) is retained. |
| 574 | */ |
| 575 | if (flags & SETFLAGS) { |
| 576 | nfset = (to_sb.st_flags | fset) & ~fclr; |
| 577 | } else { |
| 578 | nfset = from_sb.st_flags & ~(UF_NODUMP | UF_NOHISTORY) | |
| 579 | (to_sb.st_flags & UF_NOHISTORY); |
| 580 | } |
| 581 | |
| 582 | /* |
| 583 | * NFS does not support flags. Ignore EOPNOTSUPP flags if we're just |
| 584 | * trying to turn off UF_NODUMP. If we're trying to set real flags, |
| 585 | * then warn if the the fs doesn't support it, otherwise fail. |
| 586 | */ |
| 587 | if (!devnull && fchflags(to_fd, nfset)) { |
| 588 | if (flags & SETFLAGS) { |
| 589 | if (errno == EOPNOTSUPP) |
| 590 | warn("%s: chflags", to_name); |
| 591 | else { |
| 592 | serrno = errno; |
| 593 | unlink(to_name); |
| 594 | errno = serrno; |
| 595 | err(EX_OSERR, "%s: chflags", to_name); |
| 596 | } |
| 597 | } |
| 598 | } |
| 599 | |
| 600 | close(to_fd); |
| 601 | if (!devnull) |
| 602 | close(from_fd); |
| 603 | } |
| 604 | |
| 605 | /* |
| 606 | * compare -- |
| 607 | * compare two files; non-zero means files differ |
| 608 | */ |
| 609 | int |
| 610 | compare(int from_fd, const char *from_name __unused, size_t from_len, |
| 611 | int to_fd, const char *to_name __unused, size_t to_len) |
| 612 | { |
| 613 | char *p, *q; |
| 614 | int rv; |
| 615 | int done_compare; |
| 616 | |
| 617 | rv = 0; |
| 618 | if (from_len != to_len) |
| 619 | return 1; |
| 620 | |
| 621 | if (from_len <= MAX_CMP_SIZE) { |
| 622 | done_compare = 0; |
| 623 | if (trymmap(from_fd) && trymmap(to_fd)) { |
| 624 | p = mmap(NULL, from_len, PROT_READ, MAP_SHARED, from_fd, (off_t)0); |
| 625 | if (p == (char *)MAP_FAILED) |
| 626 | goto out; |
| 627 | q = mmap(NULL, from_len, PROT_READ, MAP_SHARED, to_fd, (off_t)0); |
| 628 | if (q == (char *)MAP_FAILED) { |
| 629 | munmap(p, from_len); |
| 630 | goto out; |
| 631 | } |
| 632 | |
| 633 | rv = memcmp(p, q, from_len); |
| 634 | munmap(p, from_len); |
| 635 | munmap(q, from_len); |
| 636 | done_compare = 1; |
| 637 | } |
| 638 | out: |
| 639 | if (!done_compare) { |
| 640 | char buf1[MAXBSIZE]; |
| 641 | char buf2[MAXBSIZE]; |
| 642 | int n1, n2; |
| 643 | |
| 644 | rv = 0; |
| 645 | lseek(from_fd, 0, SEEK_SET); |
| 646 | lseek(to_fd, 0, SEEK_SET); |
| 647 | while (rv == 0) { |
| 648 | n1 = read(from_fd, buf1, sizeof(buf1)); |
| 649 | if (n1 == 0) |
| 650 | break; /* EOF */ |
| 651 | else if (n1 > 0) { |
| 652 | n2 = read(to_fd, buf2, n1); |
| 653 | if (n2 == n1) |
| 654 | rv = memcmp(buf1, buf2, n1); |
| 655 | else |
| 656 | rv = 1; /* out of sync */ |
| 657 | } else |
| 658 | rv = 1; /* read failure */ |
| 659 | } |
| 660 | lseek(from_fd, 0, SEEK_SET); |
| 661 | lseek(to_fd, 0, SEEK_SET); |
| 662 | } |
| 663 | } else |
| 664 | rv = 1; /* don't bother in this case */ |
| 665 | |
| 666 | return rv; |
| 667 | } |
| 668 | |
| 669 | /* |
| 670 | * create_tempfile -- |
| 671 | * create a temporary file based on path and open it |
| 672 | */ |
| 673 | int |
| 674 | create_tempfile(const char *path, char *temp, size_t tsize) |
| 675 | { |
| 676 | char *p; |
| 677 | |
| 678 | strncpy(temp, path, tsize); |
| 679 | temp[tsize - 1] = '\0'; |
| 680 | if ((p = strrchr(temp, '/')) != NULL) |
| 681 | p++; |
| 682 | else |
| 683 | p = temp; |
| 684 | strncpy(p, "INS@XXXX", &temp[tsize - 1] - p); |
| 685 | temp[tsize - 1] = '\0'; |
| 686 | return (mkstemp(temp)); |
| 687 | } |
| 688 | |
| 689 | /* |
| 690 | * create_newfile -- |
| 691 | * create a new file, overwriting an existing one if necessary |
| 692 | */ |
| 693 | int |
| 694 | create_newfile(const char *path, int target, struct stat *sbp) |
| 695 | { |
| 696 | char backup[MAXPATHLEN]; |
| 697 | |
| 698 | if (target) { |
| 699 | /* |
| 700 | * Unlink now... avoid ETXTBSY errors later. Try to turn |
| 701 | * off the append/immutable bits -- if we fail, go ahead, |
| 702 | * it might work. |
| 703 | */ |
| 704 | if (sbp->st_flags & NOCHANGEBITS) |
| 705 | chflags(path, sbp->st_flags & ~NOCHANGEBITS); |
| 706 | |
| 707 | if (dobackup) { |
| 708 | if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s", |
| 709 | path, suffix) != strlen(path) + strlen(suffix)) |
| 710 | errx(EX_OSERR, "%s: backup filename too long", |
| 711 | path); |
| 712 | snprintf(backup, MAXPATHLEN, "%s%s", |
| 713 | path, suffix); |
| 714 | if (verbose) |
| 715 | printf("install: %s -> %s\n", |
| 716 | path, backup); |
| 717 | if (rename(path, backup) < 0) |
| 718 | err(EX_OSERR, "rename: %s to %s", path, backup); |
| 719 | } else |
| 720 | unlink(path); |
| 721 | } |
| 722 | |
| 723 | return (open(path, O_CREAT | O_RDWR | O_TRUNC, S_IRUSR | S_IWUSR)); |
| 724 | } |
| 725 | |
| 726 | /* |
| 727 | * copy -- |
| 728 | * copy from one file to another |
| 729 | */ |
| 730 | void |
| 731 | copy(int from_fd, const char *from_name, int to_fd, |
| 732 | const char *to_name, off_t size) |
| 733 | { |
| 734 | int nr, nw; |
| 735 | int serrno; |
| 736 | char *p, buf[MAXBSIZE]; |
| 737 | int done_copy; |
| 738 | |
| 739 | /* Rewind file descriptors. */ |
| 740 | if (lseek(from_fd, (off_t)0, SEEK_SET) == (off_t)-1) |
| 741 | err(EX_OSERR, "lseek: %s", from_name); |
| 742 | if (lseek(to_fd, (off_t)0, SEEK_SET) == (off_t)-1) |
| 743 | err(EX_OSERR, "lseek: %s", to_name); |
| 744 | |
| 745 | /* |
| 746 | * Mmap and write if less than 8M (the limit is so we don't totally |
| 747 | * trash memory on big files. This is really a minor hack, but it |
| 748 | * wins some CPU back. |
| 749 | */ |
| 750 | done_copy = 0; |
| 751 | if (size <= 8 * 1048576 && trymmap(from_fd) && |
| 752 | (p = mmap(NULL, (size_t)size, PROT_READ, MAP_SHARED, |
| 753 | from_fd, (off_t)0)) != (char *)MAP_FAILED) { |
| 754 | if ((nw = write(to_fd, p, size)) != size) { |
| 755 | serrno = errno; |
| 756 | unlink(to_name); |
| 757 | errno = nw > 0 ? EIO : serrno; |
| 758 | err(EX_OSERR, "%s", to_name); |
| 759 | } |
| 760 | done_copy = 1; |
| 761 | } |
| 762 | if (!done_copy) { |
| 763 | while ((nr = read(from_fd, buf, sizeof(buf))) > 0) |
| 764 | if ((nw = write(to_fd, buf, nr)) != nr) { |
| 765 | serrno = errno; |
| 766 | unlink(to_name); |
| 767 | errno = nw > 0 ? EIO : serrno; |
| 768 | err(EX_OSERR, "%s", to_name); |
| 769 | } |
| 770 | if (nr != 0) { |
| 771 | serrno = errno; |
| 772 | unlink(to_name); |
| 773 | errno = serrno; |
| 774 | err(EX_OSERR, "%s", from_name); |
| 775 | } |
| 776 | } |
| 777 | } |
| 778 | |
| 779 | /* |
| 780 | * strip -- |
| 781 | * use strip(1) to strip the target file |
| 782 | */ |
| 783 | void |
| 784 | strip(const char *to_name) |
| 785 | { |
| 786 | const char *stripbin; |
| 787 | int serrno, status; |
| 788 | |
| 789 | switch (fork()) { |
| 790 | case -1: |
| 791 | serrno = errno; |
| 792 | unlink(to_name); |
| 793 | errno = serrno; |
| 794 | err(EX_TEMPFAIL, "fork"); |
| 795 | case 0: |
| 796 | stripbin = getenv("STRIPBIN"); |
| 797 | if (stripbin == NULL) |
| 798 | stripbin = "strip"; |
| 799 | execlp(stripbin, stripbin, to_name, NULL); |
| 800 | err(EX_OSERR, "exec(%s)", stripbin); |
| 801 | default: |
| 802 | if (wait(&status) == -1 || status) { |
| 803 | serrno = errno; |
| 804 | unlink(to_name); |
| 805 | errc(EX_SOFTWARE, serrno, "wait"); |
| 806 | /* NOTREACHED */ |
| 807 | } |
| 808 | } |
| 809 | } |
| 810 | |
| 811 | /* |
| 812 | * install_dir -- |
| 813 | * build directory hierarchy |
| 814 | */ |
| 815 | void |
| 816 | install_dir(char *path) |
| 817 | { |
| 818 | char *p; |
| 819 | struct stat sb; |
| 820 | int ch; |
| 821 | |
| 822 | for (p = path;; ++p) |
| 823 | if (!*p || (p != path && *p == '/')) { |
| 824 | ch = *p; |
| 825 | *p = '\0'; |
| 826 | if (stat(path, &sb)) { |
| 827 | if (errno != ENOENT || mkdir(path, 0755) < 0) { |
| 828 | err(EX_OSERR, "mkdir %s", path); |
| 829 | /* NOTREACHED */ |
| 830 | } else if (verbose) |
| 831 | printf("install: mkdir %s\n", |
| 832 | path); |
| 833 | } else if (!S_ISDIR(sb.st_mode)) |
| 834 | errx(EX_OSERR, "%s exists but is not a directory", path); |
| 835 | if (!(*p = ch)) |
| 836 | break; |
| 837 | } |
| 838 | |
| 839 | if ((gid != (gid_t)-1 || uid != (uid_t)-1) && chown(path, uid, gid)) |
| 840 | warn("chown %u:%u %s", uid, gid, path); |
| 841 | if (chmod(path, mode)) |
| 842 | warn("chmod %o %s", mode, path); |
| 843 | } |
| 844 | |
| 845 | /* |
| 846 | * usage -- |
| 847 | * print a usage message and die |
| 848 | */ |
| 849 | void |
| 850 | usage(void) |
| 851 | { |
| 852 | fprintf(stderr, "\ |
| 853 | usage: install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]\n\ |
| 854 | [-o owner] file1 file2\n\ |
| 855 | install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]\n\ |
| 856 | [-o owner] file1 ... fileN directory\n\ |
| 857 | install -d [-v] [-g group] [-m mode] [-o owner] directory ...\n"); |
| 858 | exit(EX_USAGE); |
| 859 | /* NOTREACHED */ |
| 860 | } |
| 861 | |
| 862 | /* |
| 863 | * trymmap -- |
| 864 | * return true (1) if mmap should be tried, false (0) if not. |
| 865 | */ |
| 866 | int |
| 867 | trymmap(int fd) |
| 868 | { |
| 869 | /* |
| 870 | * The ifdef is for bootstrapping - f_fstypename doesn't exist in |
| 871 | * pre-Lite2-merge systems. |
| 872 | */ |
| 873 | #ifdef MFSNAMELEN |
| 874 | struct statfs stfs; |
| 875 | |
| 876 | if (nommap || fstatfs(fd, &stfs) != 0) |
| 877 | return (0); |
| 878 | if (strcmp(stfs.f_fstypename, "ufs") == 0 || |
| 879 | strcmp(stfs.f_fstypename, "cd9660") == 0) |
| 880 | return (1); |
| 881 | #endif |
| 882 | return (0); |
| 883 | } |