xref: /freebsd/usr.bin/xinstall/xinstall.c (revision 0de89efe5c443f213c7ea28773ef2dc6cf3af2ed)
1 /*
2  * Copyright (c) 1987, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #ifndef lint
35 static const char copyright[] =
36 "@(#) Copyright (c) 1987, 1993\n\
37 	The Regents of the University of California.  All rights reserved.\n";
38 #endif /* not lint */
39 
40 #ifndef lint
41 #if 0
42 static char sccsid[] = "From: @(#)xinstall.c	8.1 (Berkeley) 7/21/93";
43 #endif
44 static const char rcsid[] =
45 	"$Id: xinstall.c,v 1.24 1997/08/27 06:29:23 charnier Exp $";
46 #endif /* not lint */
47 
48 /*-
49  * Todo:
50  * o for -C, compare original files except in -s case.
51  * o for -C, don't change anything if nothing needs be changed.  In
52  *   particular, don't toggle the immutable flags just to allow null
53  *   attribute changes and don't clear the dump flag.  (I think inode
54  *   ctimes are not updated for null attribute changes, but this is a
55  *   bug.)
56  * o independent of -C, if a copy must be made, then copy to a tmpfile,
57  *   set all attributes except the immutable flags, then rename, then
58  *   set the immutable flags.  It's annoying that the immutable flags
59  *   defeat the atomicicity of rename - it seems that there must be
60  * o a window where the target is not immutable.
61  */
62 
63 #include <sys/param.h>
64 #include <sys/wait.h>
65 #include <sys/mman.h>
66 #include <sys/stat.h>
67 #include <sys/mount.h>
68 
69 #include <ctype.h>
70 #include <err.h>
71 #include <errno.h>
72 #include <fcntl.h>
73 #include <grp.h>
74 #include <paths.h>
75 #include <pwd.h>
76 #include <stdio.h>
77 #include <stdlib.h>
78 #include <string.h>
79 #include <unistd.h>
80 #include <sysexits.h>
81 #include <utime.h>
82 
83 #include "pathnames.h"
84 
85 /* Bootstrap aid - this doesn't exist in most older releases */
86 #ifndef MAP_FAILED
87 #define MAP_FAILED ((caddr_t)-1)	/* from <sys/mman.h> */
88 #endif
89 
90 int debug, docompare, docopy, dodir, dopreserve, dostrip, verbose;
91 int mode = S_IRWXU|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH;
92 char *group, *owner, pathbuf[MAXPATHLEN];
93 char pathbuf2[MAXPATHLEN];
94 
95 #define	DIRECTORY	0x01		/* Tell install it's a directory. */
96 #define	SETFLAGS	0x02		/* Tell install to set flags. */
97 #define	NOCHANGEBITS	(UF_IMMUTABLE | UF_APPEND | SF_IMMUTABLE | SF_APPEND)
98 
99 void	copy __P((int, char *, int, char *, off_t));
100 int	compare __P((int, const char *, int, const char *,
101 		     const struct stat *, const struct stat *));
102 void	install __P((char *, char *, u_long, u_int));
103 void	install_dir __P((char *));
104 u_long	string_to_flags __P((char **, u_long *, u_long *));
105 void	strip __P((char *));
106 void	usage __P((void));
107 int	trymmap __P((int));
108 
109 #define ALLOW_NUMERIC_IDS 1
110 #ifdef ALLOW_NUMERIC_IDS
111 
112 uid_t	uid;
113 gid_t	gid;
114 
115 uid_t	resolve_uid __P((char *));
116 gid_t	resolve_gid __P((char *));
117 u_long	numeric_id __P((char *, char *));
118 
119 #else
120 
121 struct passwd *pp;
122 struct group *gp;
123 
124 #endif /* ALLOW_NUMERIC_IDS */
125 
126 int
127 main(argc, argv)
128 	int argc;
129 	char *argv[];
130 {
131 	struct stat from_sb, to_sb;
132 	mode_t *set;
133 	u_long fset;
134 	u_int iflags;
135 	int ch, no_target;
136 	char *flags, *to_name;
137 
138 	iflags = 0;
139 	while ((ch = getopt(argc, argv, "CcdDf:g:m:o:psv")) != -1)
140 		switch((char)ch) {
141 		case 'C':
142 			docompare = docopy = 1;
143 			break;
144 		case 'c':
145 			docopy = 1;
146 			break;
147 		case 'D':
148 			debug++;
149 			break;
150 		case 'd':
151 			dodir = 1;
152 			break;
153 		case 'f':
154 			flags = optarg;
155 			if (string_to_flags(&flags, &fset, NULL))
156 				errx(EX_USAGE, "%s: invalid flag", flags);
157 			iflags |= SETFLAGS;
158 			break;
159 		case 'g':
160 			group = optarg;
161 			break;
162 		case 'm':
163 			if (!(set = setmode(optarg)))
164 				errx(EX_USAGE, "invalid file mode: %s",
165 				     optarg);
166 			mode = getmode(set, 0);
167 			break;
168 		case 'o':
169 			owner = optarg;
170 			break;
171 		case 'p':
172 			docompare = docopy = dopreserve = 1;
173 			break;
174 		case 's':
175 			dostrip = 1;
176 			break;
177 		case 'v':
178 			verbose = 1;
179 			break;
180 		case '?':
181 		default:
182 			usage();
183 		}
184 	argc -= optind;
185 	argv += optind;
186 
187 	/* some options make no sense when creating directories */
188 	if ((docompare || dostrip) && dodir)
189 		usage();
190 
191 	/* must have at least two arguments, except when creating directories */
192 	if (argc < 2 && !dodir)
193 		usage();
194 
195 #ifdef ALLOW_NUMERIC_IDS
196 
197 	if (owner)
198 		uid = resolve_uid(owner);
199 	if (group)
200 		gid = resolve_gid(group);
201 
202 #else
203 
204 	/* get group and owner id's */
205 	if (owner && !(pp = getpwnam(owner)))
206 		errx(EX_NOUSER, "unknown user %s", owner);
207 	if (group && !(gp = getgrnam(group)))
208 		errx(EX_NOUSER, "unknown group %s", group);
209 
210 #endif /* ALLOW_NUMERIC_IDS */
211 
212 	if (dodir) {
213 		for (; *argv != NULL; ++argv)
214 			install_dir(*argv);
215 		exit(EX_OK);
216 		/* NOTREACHED */
217 	}
218 
219 	no_target = stat(to_name = argv[argc - 1], &to_sb);
220 	if (!no_target && (to_sb.st_mode & S_IFMT) == S_IFDIR) {
221 		for (; *argv != to_name; ++argv)
222 			install(*argv, to_name, fset, iflags | DIRECTORY);
223 		exit(EX_OK);
224 		/* NOTREACHED */
225 	}
226 
227 	/* can't do file1 file2 directory/file */
228 	if (argc != 2)
229 		usage();
230 
231 	if (!no_target) {
232 		if (stat(*argv, &from_sb))
233 			err(EX_OSERR, "%s", *argv);
234 		if (!S_ISREG(to_sb.st_mode)) {
235 			errno = EFTYPE;
236 			err(EX_OSERR, "%s", to_name);
237 		}
238 		if (to_sb.st_dev == from_sb.st_dev &&
239 		    to_sb.st_ino == from_sb.st_ino)
240 			errx(EX_USAGE,
241 			    "%s and %s are the same file", *argv, to_name);
242 /*
243  * XXX - It's not at all clear why this code was here, since it completely
244  * duplicates code install().  The version in install() handles the -C flag
245  * correctly, so we'll just disable this for now.
246  */
247 #if 0
248 		/*
249 		 * Unlink now... avoid ETXTBSY errors later.  Try and turn
250 		 * off the append/immutable bits -- if we fail, go ahead,
251 		 * it might work.
252 		 */
253 		if (to_sb.st_flags & NOCHANGEBITS)
254 			(void)chflags(to_name,
255 			    to_sb.st_flags & ~(NOCHANGEBITS));
256 		(void)unlink(to_name);
257 #endif
258 	}
259 	install(*argv, to_name, fset, iflags);
260 	exit(EX_OK);
261 	/* NOTREACHED */
262 }
263 
264 #ifdef ALLOW_NUMERIC_IDS
265 
266 uid_t
267 resolve_uid(s)
268 	char *s;
269 {
270 	struct passwd *pw;
271 
272 	return ((pw = getpwnam(s)) == NULL) ?
273 		(uid_t) numeric_id(s, "user") : pw->pw_uid;
274 }
275 
276 gid_t
277 resolve_gid(s)
278 	char *s;
279 {
280 	struct group *gr;
281 
282 	return ((gr = getgrnam(s)) == NULL) ?
283 		(gid_t) numeric_id(s, "group") : gr->gr_gid;
284 }
285 
286 u_long
287 numeric_id(name, type)
288 	char *name, *type;
289 {
290 	u_long val;
291 	char *ep;
292 
293 	/*
294 	 * XXX
295 	 * We know that uid_t's and gid_t's are unsigned longs.
296 	 */
297 	errno = 0;
298 	val = strtoul(name, &ep, 10);
299 	if (errno)
300 		err(EX_NOUSER, "%s", name);
301 	if (*ep != '\0')
302 		errx(EX_NOUSER, "unknown %s %s", type, name);
303 	return (val);
304 }
305 
306 #endif /* ALLOW_NUMERIC_IDS */
307 
308 /*
309  * install --
310  *	build a path name and install the file
311  */
312 void
313 install(from_name, to_name, fset, flags)
314 	char *from_name, *to_name;
315 	u_long fset;
316 	u_int flags;
317 {
318 	struct stat from_sb, to_sb;
319 	int devnull, from_fd, to_fd, serrno;
320 	char *p, *old_to_name = 0;
321 
322 	if (debug >= 2 && !docompare)
323 		fprintf(stderr, "install: invoked without -C for %s to %s\n",
324 			from_name, to_name);
325 
326 	/* If try to install NULL file to a directory, fails. */
327 	if (flags & DIRECTORY || strcmp(from_name, _PATH_DEVNULL)) {
328 		if (stat(from_name, &from_sb))
329 			err(EX_OSERR, "%s", from_name);
330 		if (!S_ISREG(from_sb.st_mode)) {
331 			errno = EFTYPE;
332 			err(EX_OSERR, "%s", from_name);
333 		}
334 		/* Build the target path. */
335 		if (flags & DIRECTORY) {
336 			(void)snprintf(pathbuf, sizeof(pathbuf), "%s/%s",
337 			    to_name,
338 			    (p = strrchr(from_name, '/')) ? ++p : from_name);
339 			to_name = pathbuf;
340 		}
341 		devnull = 0;
342 	} else {
343 		from_sb.st_flags = 0;	/* XXX */
344 		devnull = 1;
345 	}
346 
347 	if (docompare) {
348 		old_to_name = to_name;
349 		/*
350 		 * Make a new temporary file in the same file system
351 		 * (actually, in in the same directory) as the target so
352 		 * that the temporary file can be renamed to the target.
353 		 */
354 		snprintf(pathbuf2, sizeof pathbuf2, "%s", to_name);
355 		p = strrchr(pathbuf2, '/');
356 		p = (p == NULL ? pathbuf2 : p + 1);
357 		snprintf(p, &pathbuf2[sizeof pathbuf2] - p, "INS@XXXX");
358 		to_fd = mkstemp(pathbuf2);
359 		if (to_fd < 0)
360 			/* XXX should fall back to not comparing. */
361 			err(EX_OSERR, "mkstemp: %s for %s", pathbuf2, to_name);
362 		to_name = pathbuf2;
363 	} else {
364 		/*
365 		 * Unlink now... avoid errors later.  Try to turn off the
366 		 * append/immutable bits -- if we fail, go ahead, it might
367 		 * work.
368 		 */
369 		if (stat(to_name, &to_sb) == 0 && to_sb.st_flags & NOCHANGEBITS)
370 			(void)chflags(to_name, to_sb.st_flags & ~NOCHANGEBITS);
371 		unlink(to_name);
372 
373 		/* Create target. */
374 		to_fd = open(to_name,
375 			     O_CREAT | O_RDWR | O_TRUNC, S_IRUSR | S_IWUSR);
376 		if (to_fd < 0)
377 			err(EX_OSERR, "%s", to_name);
378 	}
379 
380 	if (!devnull) {
381 		if ((from_fd = open(from_name, O_RDONLY, 0)) < 0) {
382 			serrno = errno;
383 			(void)unlink(to_name);
384 			errno = serrno;
385 			err(EX_OSERR, "%s", from_name);
386 		}
387 		copy(from_fd, from_name, to_fd, to_name, from_sb.st_size);
388 		(void)close(from_fd);
389 	}
390 
391 	if (dostrip) {
392 		(void)close(to_fd);
393 
394 		strip(to_name);
395 
396 		/* Reopen target. */
397 		to_fd = open(to_name, O_RDWR, 0);
398 		if (to_fd < 0)
399 			err(EX_OSERR, "%s", to_name);
400 	}
401 
402 	/*
403 	 * Unfortunately, because we strip the installed file and not the
404 	 * original one, it is impossible to do the comparison without
405 	 * first laboriously copying things over and then comparing.
406 	 * It may be possible to better optimize the !dostrip case, however.
407 	 * For further study.
408 	 */
409 	if (docompare) {
410 		struct stat old_sb, new_sb, timestamp_sb;
411 		int old_fd;
412 		struct utimbuf utb;
413 
414 		old_fd = open(old_to_name, O_RDONLY, 0);
415 		if (old_fd < 0 && errno == ENOENT)
416 			goto different;
417 		if (old_fd < 0)
418 			err(EX_OSERR, "%s", old_to_name);
419 		fstat(old_fd, &old_sb);
420 		if (old_sb.st_flags & NOCHANGEBITS)
421 			(void)fchflags(old_fd, old_sb.st_flags & ~NOCHANGEBITS);
422 		fstat(to_fd, &new_sb);
423 		if (compare(old_fd, old_to_name, to_fd, to_name, &old_sb,
424 			    &new_sb)) {
425 different:
426 			if (debug != 0)
427 				fprintf(stderr,
428 					"install: renaming for %s: %s to %s\n",
429 					from_name, to_name, old_to_name);
430 			if (dopreserve && stat(from_name, &timestamp_sb) == 0) {
431 				utb.actime = from_sb.st_atime;
432 				utb.modtime = from_sb.st_mtime;
433 				(void)utime(to_name, &utb);
434 			}
435 moveit:
436 			if (verbose) {
437 				printf("install: %s -> %s\n",
438 					from_name, old_to_name);
439 			}
440 			if (rename(to_name, old_to_name) < 0) {
441 				serrno = errno;
442 				unlink(to_name);
443 				unlink(old_to_name);
444 				errno = serrno;
445 				err(EX_OSERR, "rename: %s to %s", to_name,
446 				    old_to_name);
447 			}
448 			close(old_fd);
449 		} else {
450 			if (old_sb.st_nlink != 1) {
451 				/*
452 				 * Replace the target, although it hasn't
453 				 * changed, to snap the extra links.  But
454 				 * preserve the target file times.
455 				 */
456 				if (fstat(old_fd, &timestamp_sb) == 0) {
457 					utb.actime = timestamp_sb.st_atime;
458 					utb.modtime = timestamp_sb.st_mtime;
459 					(void)utime(to_name, &utb);
460 				}
461 				goto moveit;
462 			}
463 			if (unlink(to_name) < 0)
464 				err(EX_OSERR, "unlink: %s", to_name);
465 			close(to_fd);
466 			to_fd = old_fd;
467 		}
468 		to_name = old_to_name;
469 	}
470 
471 	/*
472 	 * Set owner, group, mode for target; do the chown first,
473 	 * chown may lose the setuid bits.
474 	 */
475 	if ((group || owner) &&
476 #ifdef ALLOW_NUMERIC_IDS
477 	    fchown(to_fd, owner ? uid : -1, group ? gid : -1)) {
478 #else
479 	    fchown(to_fd, owner ? pp->pw_uid : -1, group ? gp->gr_gid : -1)) {
480 #endif
481 		serrno = errno;
482 		(void)unlink(to_name);
483 		errno = serrno;
484 		err(EX_OSERR,"%s: chown/chgrp", to_name);
485 	}
486 	if (fchmod(to_fd, mode)) {
487 		serrno = errno;
488 		(void)unlink(to_name);
489 		errno = serrno;
490 		err(EX_OSERR, "%s: chmod", to_name);
491 	}
492 
493 	/*
494 	 * If provided a set of flags, set them, otherwise, preserve the
495 	 * flags, except for the dump flag.
496 	 */
497 	if (fchflags(to_fd,
498 	    flags & SETFLAGS ? fset : from_sb.st_flags & ~UF_NODUMP)) {
499 		serrno = errno;
500 		(void)unlink(to_name);
501 		errno = serrno;
502 		err(EX_OSERR, "%s: chflags", to_name);
503 	}
504 
505 	(void)close(to_fd);
506 	if (!docopy && !devnull && unlink(from_name))
507 		err(EX_OSERR, "%s", from_name);
508 }
509 
510 /*
511  * compare --
512  *	compare two files; non-zero means files differ
513  */
514 int
515 compare(int from_fd, const char *from_name, int to_fd, const char *to_name,
516 	const struct stat *from_sb, const struct stat *to_sb)
517 {
518 	char *p, *q;
519 	int rv;
520 	size_t tsize;
521 	int done_compare;
522 
523 	if (from_sb->st_size != to_sb->st_size)
524 		return 1;
525 
526 	tsize = (size_t)from_sb->st_size;
527 
528 	if (tsize <= 8 * 1024 * 1024) {
529 		done_compare = 0;
530 		if (trymmap(from_fd) && trymmap(to_fd)) {
531 			p = mmap(NULL, tsize, PROT_READ, MAP_SHARED, from_fd, (off_t)0);
532 			if (p == (char *)MAP_FAILED)
533 				goto out;
534 			q = mmap(NULL, tsize, PROT_READ, MAP_SHARED, to_fd, (off_t)0);
535 			if (q == (char *)MAP_FAILED) {
536 				munmap(p, tsize);
537 				goto out;
538 			}
539 
540 			rv = memcmp(p, q, tsize);
541 			munmap(p, tsize);
542 			munmap(q, tsize);
543 			done_compare = 1;
544 		}
545 	out:
546 		if (!done_compare) {
547 			char buf1[MAXBSIZE];
548 			char buf2[MAXBSIZE];
549 			int n1, n2;
550 
551 			rv = 0;
552 			lseek(from_fd, 0, SEEK_SET);
553 			lseek(to_fd, 0, SEEK_SET);
554 			while (rv == 0) {
555 				n1 = read(from_fd, buf1, sizeof(buf1));
556 				if (n1 == 0)
557 					break;		/* EOF */
558 				else if (n1 > 0) {
559 					n2 = read(to_fd, buf2, n1);
560 					if (n2 == n1)
561 						rv = memcmp(buf1, buf2, n1);
562 					else
563 						rv = 1;	/* out of sync */
564 				} else
565 					rv = 1;		/* read failure */
566 			}
567 			lseek(from_fd, 0, SEEK_SET);
568 			lseek(to_fd, 0, SEEK_SET);
569 		}
570 	} else
571 		rv = 1;	/* don't bother in this case */
572 
573 	return rv;
574 }
575 
576 /*
577  * copy --
578  *	copy from one file to another
579  */
580 void
581 copy(from_fd, from_name, to_fd, to_name, size)
582 	register int from_fd, to_fd;
583 	char *from_name, *to_name;
584 	off_t size;
585 {
586 	register int nr, nw;
587 	int serrno;
588 	char *p, buf[MAXBSIZE];
589 	int done_copy;
590 
591 	/*
592 	 * Mmap and write if less than 8M (the limit is so we don't totally
593 	 * trash memory on big files.  This is really a minor hack, but it
594 	 * wins some CPU back.
595 	 */
596 	done_copy = 0;
597 	if (size <= 8 * 1048576 && trymmap(from_fd)) {
598 		if ((p = mmap(NULL, (size_t)size, PROT_READ,
599 				MAP_SHARED, from_fd, (off_t)0)) == (char *)MAP_FAILED)
600 			goto out;
601 		if ((nw = write(to_fd, p, size)) != size) {
602 			serrno = errno;
603 			(void)unlink(to_name);
604 			errno = nw > 0 ? EIO : serrno;
605 			err(EX_OSERR, "%s", to_name);
606 		}
607 		done_copy = 1;
608 	out:
609 	}
610 	if (!done_copy) {
611 		while ((nr = read(from_fd, buf, sizeof(buf))) > 0)
612 			if ((nw = write(to_fd, buf, nr)) != nr) {
613 				serrno = errno;
614 				(void)unlink(to_name);
615 				errno = nw > 0 ? EIO : serrno;
616 				err(EX_OSERR, "%s", to_name);
617 			}
618 		if (nr != 0) {
619 			serrno = errno;
620 			(void)unlink(to_name);
621 			errno = serrno;
622 			err(EX_OSERR, "%s", from_name);
623 		}
624 	}
625 }
626 
627 /*
628  * strip --
629  *	use strip(1) to strip the target file
630  */
631 void
632 strip(to_name)
633 	char *to_name;
634 {
635 	int serrno, status;
636 
637 	switch (vfork()) {
638 	case -1:
639 		serrno = errno;
640 		(void)unlink(to_name);
641 		errno = serrno;
642 		err(EX_TEMPFAIL, "fork");
643 	case 0:
644 		execlp("strip", "strip", to_name, NULL);
645 		err(EX_OSERR, "exec(strip)");
646 	default:
647 		if (wait(&status) == -1 || status) {
648 			(void)unlink(to_name);
649 			exit(EX_SOFTWARE);
650 			/* NOTREACHED */
651 		}
652 	}
653 }
654 
655 /*
656  * install_dir --
657  *	build directory heirarchy
658  */
659 void
660 install_dir(path)
661         char *path;
662 {
663 	register char *p;
664 	struct stat sb;
665 	int ch;
666 
667 	for (p = path;; ++p)
668 		if (!*p || (p != path && *p  == '/')) {
669 			ch = *p;
670 			*p = '\0';
671 			if (stat(path, &sb)) {
672 				if (errno != ENOENT || mkdir(path, 0777) < 0) {
673 					err(EX_OSERR, "%s", path);
674 					/* NOTREACHED */
675 				}
676 			}
677 			if (!(*p = ch))
678 				break;
679  		}
680 
681 	if (((gid != (gid_t)-1 || uid != (uid_t)-1) && chown(path, uid, gid)) ||
682 	    chmod(path, mode)) {
683 		warn("%s", path);
684 	}
685 }
686 
687 /*
688  * usage --
689  *	print a usage message and die
690  */
691 void
692 usage()
693 {
694 	(void)fprintf(stderr,"\
695 usage: install [-CcDps] [-f flags] [-g group] [-m mode] [-o owner] file1 file2\n\
696        install [-CcDps] [-f flags] [-g group] [-m mode] [-o owner] file1 ...\n\
697              fileN directory\n\
698        install -d [-g group] [-m mode] [-o owner] directory ...\n");
699 	exit(EX_USAGE);
700 	/* NOTREACHED */
701 }
702 
703 /*
704  * trymmap --
705  *	return true (1) if mmap should be tried, false (0) if not.
706  */
707 int
708 trymmap(fd)
709 	int fd;
710 {
711 	struct statfs stfs;
712 
713 	if (fstatfs(fd, &stfs) < 0)
714 		return 0;
715 	switch(stfs.f_type) {
716 	case MOUNT_UFS:		/* should be safe.. */
717 	case MOUNT_CD9660:	/* should be safe.. */
718 		return 1;
719 	}
720 	return 0;
721 }
722