2 * Copyright (c) 1987, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * @(#) Copyright (c) 1987, 1993 The Regents of the University of California. All rights reserved.
34 * @(#)xinstall.c 8.1 (Berkeley) 7/21/93
35 * $FreeBSD: src/usr.bin/xinstall/xinstall.c,v 1.38.2.8 2002/08/07 16:29:48 ru Exp $
36 * $DragonFly: src/usr.bin/xinstall/xinstall.c,v 1.5 2004/09/23 19:13:51 dillon Exp $
39 #include <sys/param.h>
41 #include <sys/mount.h>
59 #include "pathnames.h"
61 /* Bootstrap aid - this doesn't exist in most older releases */
63 #define MAP_FAILED ((void *)-1) /* from <sys/mman.h> */
66 #define MAX_CMP_SIZE (16 * 1024 * 1024)
68 #define DIRECTORY 0x01 /* Tell install it's a directory. */
69 #define SETFLAGS 0x02 /* Tell install to set flags. */
70 #define NOCHANGEBITS (UF_IMMUTABLE | UF_APPEND | SF_IMMUTABLE | SF_APPEND)
71 #define BACKUP_SUFFIX ".old"
77 int dobackup, docompare, dodir, dopreserve, dostrip, nommap, safecopy, verbose;
78 mode_t mode = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH;
79 const char *suffix = BACKUP_SUFFIX;
81 static int file_getgroup(const char *etcdir, const char *group, gid_t *gid);
82 static int file_getowner(const char *etcdir, const char *owner, uid_t *uid);
84 void copy(int, const char *, int, const char *, off_t);
85 int compare(int, const char *, size_t, int, const char *, size_t);
86 int create_newfile(const char *, int, struct stat *);
87 int create_tempfile(const char *, char *, size_t);
88 void install(const char *, const char *, u_long, u_int);
89 void install_dir(char *);
90 u_long numeric_id(const char *, const char *);
91 void strip(const char *);
96 main(int argc, char **argv)
98 struct stat from_sb, to_sb;
105 const char *group, *owner, *to_name;
114 while ((ch = getopt(argc, argv, "L:B:bCcdf:g:lMm:o:pSsv")) != -1)
129 /* For backwards compatibility. */
136 if (strtofflags(&flags, &fset, NULL))
137 errx(EX_USAGE, "%s: invalid flag", flags);
150 if (!(set = setmode(optarg)))
151 errx(EX_USAGE, "invalid file mode: %s",
153 mode = getmode(set, 0);
160 docompare = dopreserve = 1;
178 /* some options make no sense when creating directories */
179 if (dostrip && dodir)
182 /* must have at least two arguments, except when creating directories */
183 if (argc < 2 && !dodir)
186 /* need to make a temp copy so we can compare stripped version */
187 if (docompare && dostrip)
190 /* no etcdir specified, always try the system */
196 /* get group and owner id's */
198 if (etcdir && file_getgroup(etcdir, group, &gid)) {
200 } else if (trysys && (gp = getgrnam(group)) != NULL) {
203 gid = (gid_t)numeric_id(group, "group");
208 if (etcdir && file_getowner(etcdir, owner, &uid)) {
210 } else if (trysys && (pp = getpwnam(owner)) != NULL) {
213 uid = (uid_t)numeric_id(owner, "user");
218 for (; *argv != NULL; ++argv)
224 no_target = stat(to_name = argv[argc - 1], &to_sb);
225 if (!no_target && S_ISDIR(to_sb.st_mode)) {
226 for (; *argv != to_name; ++argv)
227 install(*argv, to_name, fset, iflags | DIRECTORY);
232 /* can't do file1 file2 directory/file */
237 if (stat(*argv, &from_sb))
238 err(EX_OSERR, "%s", *argv);
239 if (!S_ISREG(to_sb.st_mode)) {
241 err(EX_OSERR, "%s", to_name);
243 if (to_sb.st_dev == from_sb.st_dev &&
244 to_sb.st_ino == from_sb.st_ino)
246 "%s and %s are the same file", *argv, to_name);
248 install(*argv, to_name, fset, iflags);
254 numeric_id(const char *name, const char *type)
261 * We know that uid_t's and gid_t's are unsigned longs.
264 val = strtoul(name, &ep, 10);
266 err(EX_NOUSER, "%s", name);
268 errx(EX_NOUSER, "unknown %s %s", type, name);
274 file_getgroup(const char *etcdir, const char *group, gid_t *gid)
283 grlen = strlen(group);
285 if (asprintf(&path, "%s/group", etcdir) < 0)
286 errx(EX_OSERR, "asprintf()");
287 if ((fp = fopen(path, "r")) != NULL) {
288 while ((ptr = fgetln(fp, &len)) != NULL && len) {
290 if ((scan = strchr(ptr, ':')) == NULL)
292 if (scan - ptr != grlen)
294 if (strncmp(ptr, group, grlen) != 0)
296 if ((scan = strchr(scan + 1, ':')) == NULL)
298 *gid = strtoul(scan + 1, NULL, 10);
304 return((*gid == (gid_t)-1) ? 0 : 1);
309 file_getowner(const char *etcdir, const char *owner, uid_t *uid)
318 owner_len = strlen(owner);
320 if (asprintf(&path, "%s/master.passwd", etcdir) < 0)
321 errx(EX_OSERR, "asprintf()");
322 if ((fp = fopen(path, "r")) != NULL) {
323 while ((ptr = fgetln(fp, &len)) != NULL && len) {
325 if ((scan = strchr(ptr, ':')) == NULL)
327 if (scan - ptr != owner_len)
329 if (strncmp(ptr, owner, owner_len) != 0)
331 if ((scan = strchr(scan + 1, ':')) == NULL)
333 *uid = strtoul(scan + 1, NULL, 10);
339 return((*uid == (uid_t)-1) ? 0 : 1);
344 * build a path name and install the file
347 install(const char *from_name, const char *to_name, u_long fset, u_int flags)
349 struct stat from_sb, temp_sb, to_sb;
351 int devnull, files_match, from_fd, serrno, target;
352 int tempcopy, temp_fd, to_fd;
353 char backup[MAXPATHLEN], *p, pathbuf[MAXPATHLEN], tempfile[MAXPATHLEN];
357 /* If try to install NULL file to a directory, fails. */
358 if (flags & DIRECTORY || strcmp(from_name, _PATH_DEVNULL)) {
359 if (stat(from_name, &from_sb))
360 err(EX_OSERR, "%s", from_name);
361 if (!S_ISREG(from_sb.st_mode)) {
363 err(EX_OSERR, "%s", from_name);
365 /* Build the target path. */
366 if (flags & DIRECTORY) {
367 snprintf(pathbuf, sizeof(pathbuf), "%s/%s",
369 (p = strrchr(from_name, '/')) ? ++p : from_name);
377 target = stat(to_name, &to_sb) == 0;
379 /* Only install to regular files. */
380 if (target && !S_ISREG(to_sb.st_mode)) {
386 /* Only copy safe if the target exists. */
387 tempcopy = safecopy && target;
389 if (!devnull && (from_fd = open(from_name, O_RDONLY, 0)) < 0)
390 err(EX_OSERR, "%s", from_name);
392 /* If we don't strip, we can compare first. */
393 if (docompare && !dostrip && target) {
394 if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
395 err(EX_OSERR, "%s", to_name);
397 files_match = to_sb.st_size == 0;
399 files_match = !(compare(from_fd, from_name,
400 (size_t)from_sb.st_size, to_fd,
401 to_name, (size_t)to_sb.st_size));
403 /* Close "to" file unless we match. */
410 to_fd = create_tempfile(to_name, tempfile,
413 err(EX_OSERR, "%s", tempfile);
415 if ((to_fd = create_newfile(to_name, target,
417 err(EX_OSERR, "%s", to_name);
419 printf("install: %s -> %s\n",
423 copy(from_fd, from_name, to_fd,
424 tempcopy ? tempfile : to_name, from_sb.st_size);
428 strip(tempcopy ? tempfile : to_name);
431 * Re-open our fd on the target, in case we used a strip
432 * that does not work in-place -- like GNU binutils strip.
435 to_fd = open(tempcopy ? tempfile : to_name, O_RDONLY, 0);
437 err(EX_OSERR, "stripping %s", to_name);
441 * Compare the stripped temp file with the target.
443 if (docompare && dostrip && target) {
446 /* Re-open to_fd using the real target name. */
447 if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
448 err(EX_OSERR, "%s", to_name);
450 if (fstat(temp_fd, &temp_sb)) {
454 err(EX_OSERR, "%s", tempfile);
457 if (compare(temp_fd, tempfile, (size_t)temp_sb.st_size, to_fd,
458 to_name, (size_t)to_sb.st_size) == 0) {
460 * If target has more than one link we need to
461 * replace it in order to snap the extra links.
462 * Need to preserve target file times, though.
464 if (to_sb.st_nlink != 1) {
465 utb.actime = to_sb.st_atime;
466 utb.modtime = to_sb.st_mtime;
467 utime(tempfile, &utb);
477 * Move the new file into place if doing a safe copy
478 * and the files are different (or just not compared).
480 if (tempcopy && !files_match) {
481 /* Try to turn off the immutable bits. */
482 if (to_sb.st_flags & NOCHANGEBITS)
483 chflags(to_name, to_sb.st_flags & ~NOCHANGEBITS);
485 if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s", to_name,
486 suffix) != strlen(to_name) + strlen(suffix)) {
488 errx(EX_OSERR, "%s: backup filename too long",
492 printf("install: %s -> %s\n", to_name, backup);
493 if (rename(to_name, backup) < 0) {
497 err(EX_OSERR, "rename: %s to %s", to_name,
502 printf("install: %s -> %s\n", from_name, to_name);
503 if (rename(tempfile, to_name) < 0) {
507 err(EX_OSERR, "rename: %s to %s",
511 /* Re-open to_fd so we aren't hosed by the rename(2). */
513 if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
514 err(EX_OSERR, "%s", to_name);
518 * Preserve the timestamp of the source file if necessary.
520 if (dopreserve && !files_match && !devnull) {
521 utb.actime = from_sb.st_atime;
522 utb.modtime = from_sb.st_mtime;
523 utime(to_name, &utb);
526 if (fstat(to_fd, &to_sb) == -1) {
530 err(EX_OSERR, "%s", to_name);
534 * Set owner, group, mode for target; do the chown first,
535 * chown may lose the setuid bits.
537 if ((gid != (gid_t)-1 && gid != to_sb.st_gid) ||
538 (uid != (uid_t)-1 && uid != to_sb.st_uid) ||
539 (mode != to_sb.st_mode)) {
540 /* Try to turn off the immutable bits. */
541 if (to_sb.st_flags & NOCHANGEBITS)
542 fchflags(to_fd, to_sb.st_flags & ~NOCHANGEBITS);
545 if ((gid != (gid_t)-1 && gid != to_sb.st_gid) ||
546 (uid != (uid_t)-1 && uid != to_sb.st_uid))
547 if (fchown(to_fd, uid, gid) == -1) {
551 err(EX_OSERR,"%s: chown/chgrp", to_name);
554 if (mode != to_sb.st_mode)
555 if (fchmod(to_fd, mode)) {
559 err(EX_OSERR, "%s: chmod", to_name);
563 * If provided a set of flags, set them, otherwise, preserve the
564 * flags, except for the dump flag.
565 * NFS does not support flags. Ignore EOPNOTSUPP flags if we're just
566 * trying to turn off UF_NODUMP. If we're trying to set real flags,
567 * then warn if the the fs doesn't support it, otherwise fail.
569 if (!devnull && fchflags(to_fd,
570 flags & SETFLAGS ? fset : from_sb.st_flags & ~UF_NODUMP)) {
571 if (flags & SETFLAGS) {
572 if (errno == EOPNOTSUPP)
573 warn("%s: chflags", to_name);
578 err(EX_OSERR, "%s: chflags", to_name);
590 * compare two files; non-zero means files differ
593 compare(int from_fd, const char *from_name __unused, size_t from_len,
594 int to_fd, const char *to_name __unused, size_t to_len)
601 if (from_len != to_len)
604 if (from_len <= MAX_CMP_SIZE) {
606 if (trymmap(from_fd) && trymmap(to_fd)) {
607 p = mmap(NULL, from_len, PROT_READ, MAP_SHARED, from_fd, (off_t)0);
608 if (p == (char *)MAP_FAILED)
610 q = mmap(NULL, from_len, PROT_READ, MAP_SHARED, to_fd, (off_t)0);
611 if (q == (char *)MAP_FAILED) {
616 rv = memcmp(p, q, from_len);
628 lseek(from_fd, 0, SEEK_SET);
629 lseek(to_fd, 0, SEEK_SET);
631 n1 = read(from_fd, buf1, sizeof(buf1));
635 n2 = read(to_fd, buf2, n1);
637 rv = memcmp(buf1, buf2, n1);
639 rv = 1; /* out of sync */
641 rv = 1; /* read failure */
643 lseek(from_fd, 0, SEEK_SET);
644 lseek(to_fd, 0, SEEK_SET);
647 rv = 1; /* don't bother in this case */
654 * create a temporary file based on path and open it
657 create_tempfile(const char *path, char *temp, size_t tsize)
661 strncpy(temp, path, tsize);
662 temp[tsize - 1] = '\0';
663 if ((p = strrchr(temp, '/')) != NULL)
667 strncpy(p, "INS@XXXX", &temp[tsize - 1] - p);
668 temp[tsize - 1] = '\0';
669 return (mkstemp(temp));
674 * create a new file, overwriting an existing one if necessary
677 create_newfile(const char *path, int target, struct stat *sbp)
679 char backup[MAXPATHLEN];
683 * Unlink now... avoid ETXTBSY errors later. Try to turn
684 * off the append/immutable bits -- if we fail, go ahead,
687 if (sbp->st_flags & NOCHANGEBITS)
688 chflags(path, sbp->st_flags & ~NOCHANGEBITS);
691 if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s",
692 path, suffix) != strlen(path) + strlen(suffix))
693 errx(EX_OSERR, "%s: backup filename too long",
695 snprintf(backup, MAXPATHLEN, "%s%s",
698 printf("install: %s -> %s\n",
700 if (rename(path, backup) < 0)
701 err(EX_OSERR, "rename: %s to %s", path, backup);
706 return (open(path, O_CREAT | O_RDWR | O_TRUNC, S_IRUSR | S_IWUSR));
711 * copy from one file to another
714 copy(int from_fd, const char *from_name, int to_fd,
715 const char *to_name, off_t size)
719 char *p, buf[MAXBSIZE];
722 /* Rewind file descriptors. */
723 if (lseek(from_fd, (off_t)0, SEEK_SET) == (off_t)-1)
724 err(EX_OSERR, "lseek: %s", from_name);
725 if (lseek(to_fd, (off_t)0, SEEK_SET) == (off_t)-1)
726 err(EX_OSERR, "lseek: %s", to_name);
729 * Mmap and write if less than 8M (the limit is so we don't totally
730 * trash memory on big files. This is really a minor hack, but it
731 * wins some CPU back.
734 if (size <= 8 * 1048576 && trymmap(from_fd) &&
735 (p = mmap(NULL, (size_t)size, PROT_READ, MAP_SHARED,
736 from_fd, (off_t)0)) != (char *)MAP_FAILED) {
737 if ((nw = write(to_fd, p, size)) != size) {
740 errno = nw > 0 ? EIO : serrno;
741 err(EX_OSERR, "%s", to_name);
746 while ((nr = read(from_fd, buf, sizeof(buf))) > 0)
747 if ((nw = write(to_fd, buf, nr)) != nr) {
750 errno = nw > 0 ? EIO : serrno;
751 err(EX_OSERR, "%s", to_name);
757 err(EX_OSERR, "%s", from_name);
764 * use strip(1) to strip the target file
767 strip(const char *to_name)
769 const char *stripbin;
777 err(EX_TEMPFAIL, "fork");
779 stripbin = getenv("STRIPBIN");
780 if (stripbin == NULL)
782 execlp(stripbin, stripbin, to_name, (char *)NULL);
783 err(EX_OSERR, "exec(%s)", stripbin);
785 if (wait(&status) == -1 || status) {
788 errc(EX_SOFTWARE, serrno, "wait");
796 * build directory hierarchy
799 install_dir(char *path)
806 if (!*p || (p != path && *p == '/')) {
809 if (stat(path, &sb)) {
810 if (errno != ENOENT || mkdir(path, 0755) < 0) {
811 err(EX_OSERR, "mkdir %s", path);
814 printf("install: mkdir %s\n",
816 } else if (!S_ISDIR(sb.st_mode))
817 errx(EX_OSERR, "%s exists but is not a directory", path);
822 if ((gid != (gid_t)-1 || uid != (uid_t)-1) && chown(path, uid, gid))
823 warn("chown %u:%u %s", uid, gid, path);
824 if (chmod(path, mode))
825 warn("chmod %o %s", mode, path);
830 * print a usage message and die
836 usage: install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]\n\
837 [-o owner] file1 file2\n\
838 install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]\n\
839 [-o owner] file1 ... fileN directory\n\
840 install -d [-v] [-g group] [-m mode] [-o owner] directory ...\n");
847 * return true (1) if mmap should be tried, false (0) if not.
853 * The ifdef is for bootstrapping - f_fstypename doesn't exist in
854 * pre-Lite2-merge systems.
859 if (nommap || fstatfs(fd, &stfs) != 0)
861 if (strcmp(stfs.f_fstypename, "ufs") == 0 ||
862 strcmp(stfs.f_fstypename, "cd9660") == 0)