xref: /freebsd/usr.bin/xinstall/xinstall.c (revision aa2676824259ce13b07efad397ea379e45fd0cf6)
1 /*
2  * Copyright (c) 1987, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #ifndef lint
35 static const char copyright[] =
36 "@(#) Copyright (c) 1987, 1993\n\
37 	The Regents of the University of California.  All rights reserved.\n";
38 #endif /* not lint */
39 
40 #if 0
41 #ifndef lint
42 static char sccsid[] = "@(#)xinstall.c	8.1 (Berkeley) 7/21/93";
43 #endif /* not lint */
44 #endif
45 
46 #include <sys/cdefs.h>
47 __FBSDID("$FreeBSD$");
48 
49 #include <sys/param.h>
50 #include <sys/mman.h>
51 #include <sys/mount.h>
52 #include <sys/stat.h>
53 #include <sys/wait.h>
54 
55 #include <ctype.h>
56 #include <err.h>
57 #include <errno.h>
58 #include <fcntl.h>
59 #include <grp.h>
60 #include <paths.h>
61 #include <pwd.h>
62 #include <stdio.h>
63 #include <stdlib.h>
64 #include <string.h>
65 #include <sysexits.h>
66 #include <unistd.h>
67 #include <utime.h>
68 
69 #include "pathnames.h"
70 
71 /* Bootstrap aid - this doesn't exist in most older releases */
72 #ifndef MAP_FAILED
73 #define MAP_FAILED ((void *)-1)	/* from <sys/mman.h> */
74 #endif
75 
76 #define MAX_CMP_SIZE	(16 * 1024 * 1024)
77 
78 #define	DIRECTORY	0x01		/* Tell install it's a directory. */
79 #define	SETFLAGS	0x02		/* Tell install to set flags. */
80 #define	NOCHANGEBITS	(UF_IMMUTABLE | UF_APPEND | SF_IMMUTABLE | SF_APPEND)
81 #define	BACKUP_SUFFIX	".old"
82 
83 struct passwd *pp;
84 struct group *gp;
85 gid_t gid;
86 uid_t uid;
87 int dobackup, docompare, dodir, dopreserve, dostrip, nommap, safecopy, verbose;
88 mode_t mode = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH;
89 const char *suffix = BACKUP_SUFFIX;
90 
91 void	copy(int, const char *, int, const char *, off_t);
92 int	compare(int, const char *, size_t, int, const char *, size_t);
93 int	create_newfile(const char *, int, struct stat *);
94 int	create_tempfile(const char *, char *, size_t);
95 void	install(const char *, const char *, u_long, u_int);
96 void	install_dir(char *);
97 u_long	numeric_id(const char *, const char *);
98 void	strip(const char *);
99 int	trymmap(int);
100 void	usage(void);
101 
102 int
103 main(int argc, char *argv[])
104 {
105 	struct stat from_sb, to_sb;
106 	mode_t *set;
107 	u_long fset;
108 	int ch, no_target;
109 	u_int iflags;
110 	char *flags;
111 	const char *group, *owner, *to_name;
112 
113 	iflags = 0;
114 	group = owner = NULL;
115 	while ((ch = getopt(argc, argv, "B:bCcdf:g:Mm:o:pSsv")) != -1)
116 		switch((char)ch) {
117 		case 'B':
118 			suffix = optarg;
119 			/* FALLTHROUGH */
120 		case 'b':
121 			dobackup = 1;
122 			break;
123 		case 'C':
124 			docompare = 1;
125 			break;
126 		case 'c':
127 			/* For backwards compatibility. */
128 			break;
129 		case 'd':
130 			dodir = 1;
131 			break;
132 		case 'f':
133 			flags = optarg;
134 			if (strtofflags(&flags, &fset, NULL))
135 				errx(EX_USAGE, "%s: invalid flag", flags);
136 			iflags |= SETFLAGS;
137 			break;
138 		case 'g':
139 			group = optarg;
140 			break;
141 		case 'M':
142 			nommap = 1;
143 			break;
144 		case 'm':
145 			if (!(set = setmode(optarg)))
146 				errx(EX_USAGE, "invalid file mode: %s",
147 				     optarg);
148 			mode = getmode(set, 0);
149 			free(set);
150 			break;
151 		case 'o':
152 			owner = optarg;
153 			break;
154 		case 'p':
155 			docompare = dopreserve = 1;
156 			break;
157 		case 'S':
158 			safecopy = 1;
159 			break;
160 		case 's':
161 			dostrip = 1;
162 			break;
163 		case 'v':
164 			verbose = 1;
165 			break;
166 		case '?':
167 		default:
168 			usage();
169 		}
170 	argc -= optind;
171 	argv += optind;
172 
173 	/* some options make no sense when creating directories */
174 	if (dostrip && dodir)
175 		usage();
176 
177 	/* must have at least two arguments, except when creating directories */
178 	if (argc < 2 && !dodir)
179 		usage();
180 
181 	/* need to make a temp copy so we can compare stripped version */
182 	if (docompare && dostrip)
183 		safecopy = 1;
184 
185 	/* get group and owner id's */
186 	if (group != NULL) {
187 		if ((gp = getgrnam(group)) != NULL)
188 			gid = gp->gr_gid;
189 		else
190 			gid = (gid_t)numeric_id(group, "group");
191 	} else
192 		gid = (gid_t)-1;
193 
194 	if (owner != NULL) {
195 		if ((pp = getpwnam(owner)) != NULL)
196 			uid = pp->pw_uid;
197 		else
198 			uid = (uid_t)numeric_id(owner, "user");
199 	} else
200 		uid = (uid_t)-1;
201 
202 	if (dodir) {
203 		for (; *argv != NULL; ++argv)
204 			install_dir(*argv);
205 		exit(EX_OK);
206 		/* NOTREACHED */
207 	}
208 
209 	no_target = stat(to_name = argv[argc - 1], &to_sb);
210 	if (!no_target && S_ISDIR(to_sb.st_mode)) {
211 		for (; *argv != to_name; ++argv)
212 			install(*argv, to_name, fset, iflags | DIRECTORY);
213 		exit(EX_OK);
214 		/* NOTREACHED */
215 	}
216 
217 	/* can't do file1 file2 directory/file */
218 	if (argc != 2)
219 		usage();
220 
221 	if (!no_target) {
222 		if (stat(*argv, &from_sb))
223 			err(EX_OSERR, "%s", *argv);
224 		if (!S_ISREG(to_sb.st_mode)) {
225 			errno = EFTYPE;
226 			err(EX_OSERR, "%s", to_name);
227 		}
228 		if (to_sb.st_dev == from_sb.st_dev &&
229 		    to_sb.st_ino == from_sb.st_ino)
230 			errx(EX_USAGE,
231 			    "%s and %s are the same file", *argv, to_name);
232 	}
233 	install(*argv, to_name, fset, iflags);
234 	exit(EX_OK);
235 	/* NOTREACHED */
236 }
237 
238 u_long
239 numeric_id(const char *name, const char *type)
240 {
241 	u_long val;
242 	char *ep;
243 
244 	/*
245 	 * XXX
246 	 * We know that uid_t's and gid_t's are unsigned longs.
247 	 */
248 	errno = 0;
249 	val = strtoul(name, &ep, 10);
250 	if (errno)
251 		err(EX_NOUSER, "%s", name);
252 	if (*ep != '\0')
253 		errx(EX_NOUSER, "unknown %s %s", type, name);
254 	return (val);
255 }
256 
257 /*
258  * install --
259  *	build a path name and install the file
260  */
261 void
262 install(const char *from_name, const char *to_name, u_long fset, u_int flags)
263 {
264 	struct stat from_sb, temp_sb, to_sb;
265 	struct utimbuf utb;
266 	int devnull, files_match, from_fd, serrno, target;
267 	int tempcopy, temp_fd, to_fd;
268 	char backup[MAXPATHLEN], *p, pathbuf[MAXPATHLEN], tempfile[MAXPATHLEN];
269 
270 	files_match = 0;
271 
272 	/* If try to install NULL file to a directory, fails. */
273 	if (flags & DIRECTORY || strcmp(from_name, _PATH_DEVNULL)) {
274 		if (stat(from_name, &from_sb))
275 			err(EX_OSERR, "%s", from_name);
276 		if (!S_ISREG(from_sb.st_mode)) {
277 			errno = EFTYPE;
278 			err(EX_OSERR, "%s", from_name);
279 		}
280 		/* Build the target path. */
281 		if (flags & DIRECTORY) {
282 			(void)snprintf(pathbuf, sizeof(pathbuf), "%s/%s",
283 			    to_name,
284 			    (p = strrchr(from_name, '/')) ? ++p : from_name);
285 			to_name = pathbuf;
286 		}
287 		devnull = 0;
288 	} else {
289 		devnull = 1;
290 	}
291 
292 	target = stat(to_name, &to_sb) == 0;
293 
294 	/* Only install to regular files. */
295 	if (target && !S_ISREG(to_sb.st_mode)) {
296 		errno = EFTYPE;
297 		warn("%s", to_name);
298 		return;
299 	}
300 
301 	/* Only copy safe if the target exists. */
302 	tempcopy = safecopy && target;
303 
304 	if (!devnull && (from_fd = open(from_name, O_RDONLY, 0)) < 0)
305 		err(EX_OSERR, "%s", from_name);
306 
307 	/* If we don't strip, we can compare first. */
308 	if (docompare && !dostrip && target) {
309 		if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
310 			err(EX_OSERR, "%s", to_name);
311 		if (devnull)
312 			files_match = to_sb.st_size == 0;
313 		else
314 			files_match = !(compare(from_fd, from_name,
315 			    (size_t)from_sb.st_size, to_fd,
316 			    to_name, (size_t)to_sb.st_size));
317 
318 		/* Close "to" file unless we match. */
319 		if (!files_match)
320 			(void)close(to_fd);
321 	}
322 
323 	if (!files_match) {
324 		if (tempcopy) {
325 			to_fd = create_tempfile(to_name, tempfile,
326 			    sizeof(tempfile));
327 			if (to_fd < 0)
328 				err(EX_OSERR, "%s", tempfile);
329 		} else {
330 			if ((to_fd = create_newfile(to_name, target,
331 			    &to_sb)) < 0)
332 				err(EX_OSERR, "%s", to_name);
333 			if (verbose)
334 				(void)printf("install: %s -> %s\n",
335 				    from_name, to_name);
336 		}
337 		if (!devnull)
338 			copy(from_fd, from_name, to_fd,
339 			     tempcopy ? tempfile : to_name, from_sb.st_size);
340 	}
341 
342 	if (dostrip) {
343 		strip(tempcopy ? tempfile : to_name);
344 
345 		/*
346 		 * Re-open our fd on the target, in case we used a strip
347 		 * that does not work in-place -- like GNU binutils strip.
348 		 */
349 		close(to_fd);
350 		to_fd = open(tempcopy ? tempfile : to_name, O_RDONLY, 0);
351 		if (to_fd < 0)
352 			err(EX_OSERR, "stripping %s", to_name);
353 	}
354 
355 	/*
356 	 * Compare the stripped temp file with the target.
357 	 */
358 	if (docompare && dostrip && target) {
359 		temp_fd = to_fd;
360 
361 		/* Re-open to_fd using the real target name. */
362 		if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
363 			err(EX_OSERR, "%s", to_name);
364 
365 		if (fstat(temp_fd, &temp_sb)) {
366 			serrno = errno;
367 			(void)unlink(tempfile);
368 			errno = serrno;
369 			err(EX_OSERR, "%s", tempfile);
370 		}
371 
372 		if (compare(temp_fd, tempfile, (size_t)temp_sb.st_size, to_fd,
373 			    to_name, (size_t)to_sb.st_size) == 0) {
374 			/*
375 			 * If target has more than one link we need to
376 			 * replace it in order to snap the extra links.
377 			 * Need to preserve target file times, though.
378 			 */
379 			if (to_sb.st_nlink != 1) {
380 				utb.actime = to_sb.st_atime;
381 				utb.modtime = to_sb.st_mtime;
382 				(void)utime(tempfile, &utb);
383 			} else {
384 				files_match = 1;
385 				(void)unlink(tempfile);
386 			}
387 			(void) close(temp_fd);
388 		}
389 	}
390 
391 	/*
392 	 * Move the new file into place if doing a safe copy
393 	 * and the files are different (or just not compared).
394 	 */
395 	if (tempcopy && !files_match) {
396 		/* Try to turn off the immutable bits. */
397 		if (to_sb.st_flags & NOCHANGEBITS)
398 			(void)chflags(to_name, to_sb.st_flags & ~NOCHANGEBITS);
399 		if (dobackup) {
400 			if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s", to_name,
401 			    suffix) != strlen(to_name) + strlen(suffix)) {
402 				unlink(tempfile);
403 				errx(EX_OSERR, "%s: backup filename too long",
404 				    to_name);
405 			}
406 			if (verbose)
407 				(void)printf("install: %s -> %s\n", to_name, backup);
408 			if (rename(to_name, backup) < 0) {
409 				serrno = errno;
410 				unlink(tempfile);
411 				errno = serrno;
412 				err(EX_OSERR, "rename: %s to %s", to_name,
413 				     backup);
414 			}
415 		}
416 		if (verbose)
417 			(void)printf("install: %s -> %s\n", from_name, to_name);
418 		if (rename(tempfile, to_name) < 0) {
419 			serrno = errno;
420 			unlink(tempfile);
421 			errno = serrno;
422 			err(EX_OSERR, "rename: %s to %s",
423 			    tempfile, to_name);
424 		}
425 
426 		/* Re-open to_fd so we aren't hosed by the rename(2). */
427 		(void) close(to_fd);
428 		if ((to_fd = open(to_name, O_RDONLY, 0)) < 0)
429 			err(EX_OSERR, "%s", to_name);
430 	}
431 
432 	/*
433 	 * Preserve the timestamp of the source file if necessary.
434 	 */
435 	if (dopreserve && !files_match && !devnull) {
436 		utb.actime = from_sb.st_atime;
437 		utb.modtime = from_sb.st_mtime;
438 		(void)utime(to_name, &utb);
439 	}
440 
441 	if (fstat(to_fd, &to_sb) == -1) {
442 		serrno = errno;
443 		(void)unlink(to_name);
444 		errno = serrno;
445 		err(EX_OSERR, "%s", to_name);
446 	}
447 
448 	/*
449 	 * Set owner, group, mode for target; do the chown first,
450 	 * chown may lose the setuid bits.
451 	 */
452 	if ((gid != (gid_t)-1 && gid != to_sb.st_gid) ||
453 	    (uid != (uid_t)-1 && uid != to_sb.st_uid) ||
454 	    (mode != (to_sb.st_mode & ALLPERMS))) {
455 		/* Try to turn off the immutable bits. */
456 		if (to_sb.st_flags & NOCHANGEBITS)
457 			(void)fchflags(to_fd, to_sb.st_flags & ~NOCHANGEBITS);
458 	}
459 
460 	if ((gid != (gid_t)-1 && gid != to_sb.st_gid) ||
461 	    (uid != (uid_t)-1 && uid != to_sb.st_uid))
462 		if (fchown(to_fd, uid, gid) == -1) {
463 			serrno = errno;
464 			(void)unlink(to_name);
465 			errno = serrno;
466 			err(EX_OSERR,"%s: chown/chgrp", to_name);
467 		}
468 
469 	if (mode != (to_sb.st_mode & ALLPERMS))
470 		if (fchmod(to_fd, mode)) {
471 			serrno = errno;
472 			(void)unlink(to_name);
473 			errno = serrno;
474 			err(EX_OSERR, "%s: chmod", to_name);
475 		}
476 
477 	/*
478 	 * If provided a set of flags, set them, otherwise, preserve the
479 	 * flags, except for the dump flag.
480 	 * NFS does not support flags.  Ignore EOPNOTSUPP flags if we're just
481 	 * trying to turn off UF_NODUMP.  If we're trying to set real flags,
482 	 * then warn if the the fs doesn't support it, otherwise fail.
483 	 */
484 	if (!devnull && (flags & SETFLAGS ||
485 	    (from_sb.st_flags & ~UF_NODUMP) != to_sb.st_flags) &&
486 	    fchflags(to_fd,
487 	    flags & SETFLAGS ? fset : from_sb.st_flags & ~UF_NODUMP)) {
488 		if (flags & SETFLAGS) {
489 			if (errno == EOPNOTSUPP)
490 				warn("%s: chflags", to_name);
491 			else {
492 				serrno = errno;
493 				(void)unlink(to_name);
494 				errno = serrno;
495 				err(EX_OSERR, "%s: chflags", to_name);
496 			}
497 		}
498 	}
499 
500 	(void)close(to_fd);
501 	if (!devnull)
502 		(void)close(from_fd);
503 }
504 
505 /*
506  * compare --
507  *	compare two files; non-zero means files differ
508  */
509 int
510 compare(int from_fd, const char *from_name __unused, size_t from_len,
511 	int to_fd, const char *to_name __unused, size_t to_len)
512 {
513 	char *p, *q;
514 	int rv;
515 	int done_compare;
516 
517 	rv = 0;
518 	if (from_len != to_len)
519 		return 1;
520 
521 	if (from_len <= MAX_CMP_SIZE) {
522 		done_compare = 0;
523 		if (trymmap(from_fd) && trymmap(to_fd)) {
524 			p = mmap(NULL, from_len, PROT_READ, MAP_SHARED, from_fd, (off_t)0);
525 			if (p == (char *)MAP_FAILED)
526 				goto out;
527 			q = mmap(NULL, from_len, PROT_READ, MAP_SHARED, to_fd, (off_t)0);
528 			if (q == (char *)MAP_FAILED) {
529 				munmap(p, from_len);
530 				goto out;
531 			}
532 
533 			rv = memcmp(p, q, from_len);
534 			munmap(p, from_len);
535 			munmap(q, from_len);
536 			done_compare = 1;
537 		}
538 	out:
539 		if (!done_compare) {
540 			char buf1[MAXBSIZE];
541 			char buf2[MAXBSIZE];
542 			int n1, n2;
543 
544 			rv = 0;
545 			lseek(from_fd, 0, SEEK_SET);
546 			lseek(to_fd, 0, SEEK_SET);
547 			while (rv == 0) {
548 				n1 = read(from_fd, buf1, sizeof(buf1));
549 				if (n1 == 0)
550 					break;		/* EOF */
551 				else if (n1 > 0) {
552 					n2 = read(to_fd, buf2, n1);
553 					if (n2 == n1)
554 						rv = memcmp(buf1, buf2, n1);
555 					else
556 						rv = 1;	/* out of sync */
557 				} else
558 					rv = 1;		/* read failure */
559 			}
560 			lseek(from_fd, 0, SEEK_SET);
561 			lseek(to_fd, 0, SEEK_SET);
562 		}
563 	} else
564 		rv = 1;	/* don't bother in this case */
565 
566 	return rv;
567 }
568 
569 /*
570  * create_tempfile --
571  *	create a temporary file based on path and open it
572  */
573 int
574 create_tempfile(const char *path, char *temp, size_t tsize)
575 {
576 	char *p;
577 
578 	(void)strncpy(temp, path, tsize);
579 	temp[tsize - 1] = '\0';
580 	if ((p = strrchr(temp, '/')) != NULL)
581 		p++;
582 	else
583 		p = temp;
584 	(void)strncpy(p, "INS@XXXX", &temp[tsize - 1] - p);
585 	temp[tsize - 1] = '\0';
586 	return (mkstemp(temp));
587 }
588 
589 /*
590  * create_newfile --
591  *	create a new file, overwriting an existing one if necessary
592  */
593 int
594 create_newfile(const char *path, int target, struct stat *sbp)
595 {
596 	char backup[MAXPATHLEN];
597 
598 	if (target) {
599 		/*
600 		 * Unlink now... avoid ETXTBSY errors later.  Try to turn
601 		 * off the append/immutable bits -- if we fail, go ahead,
602 		 * it might work.
603 		 */
604 		if (sbp->st_flags & NOCHANGEBITS)
605 			(void)chflags(path, sbp->st_flags & ~NOCHANGEBITS);
606 
607 		if (dobackup) {
608 			if ((size_t)snprintf(backup, MAXPATHLEN, "%s%s",
609 			    path, suffix) != strlen(path) + strlen(suffix))
610 				errx(EX_OSERR, "%s: backup filename too long",
611 				    path);
612 			(void)snprintf(backup, MAXPATHLEN, "%s%s",
613 			    path, suffix);
614 			if (verbose)
615 				(void)printf("install: %s -> %s\n",
616 				    path, backup);
617 			if (rename(path, backup) < 0)
618 				err(EX_OSERR, "rename: %s to %s", path, backup);
619 		} else
620 			(void)unlink(path);
621 	}
622 
623 	return (open(path, O_CREAT | O_RDWR | O_TRUNC, S_IRUSR | S_IWUSR));
624 }
625 
626 /*
627  * copy --
628  *	copy from one file to another
629  */
630 void
631 copy(int from_fd, const char *from_name, int to_fd, const char *to_name,
632     off_t size)
633 {
634 	int nr, nw;
635 	int serrno;
636 	char *p, buf[MAXBSIZE];
637 	int done_copy;
638 
639 	/* Rewind file descriptors. */
640 	if (lseek(from_fd, (off_t)0, SEEK_SET) == (off_t)-1)
641 		err(EX_OSERR, "lseek: %s", from_name);
642 	if (lseek(to_fd, (off_t)0, SEEK_SET) == (off_t)-1)
643 		err(EX_OSERR, "lseek: %s", to_name);
644 
645 	/*
646 	 * Mmap and write if less than 8M (the limit is so we don't totally
647 	 * trash memory on big files.  This is really a minor hack, but it
648 	 * wins some CPU back.
649 	 */
650 	done_copy = 0;
651 	if (size <= 8 * 1048576 && trymmap(from_fd) &&
652 	    (p = mmap(NULL, (size_t)size, PROT_READ, MAP_SHARED,
653 		    from_fd, (off_t)0)) != (char *)MAP_FAILED) {
654 		if ((nw = write(to_fd, p, size)) != size) {
655 			serrno = errno;
656 			(void)unlink(to_name);
657 			errno = nw > 0 ? EIO : serrno;
658 			err(EX_OSERR, "%s", to_name);
659 		}
660 		done_copy = 1;
661 	}
662 	if (!done_copy) {
663 		while ((nr = read(from_fd, buf, sizeof(buf))) > 0)
664 			if ((nw = write(to_fd, buf, nr)) != nr) {
665 				serrno = errno;
666 				(void)unlink(to_name);
667 				errno = nw > 0 ? EIO : serrno;
668 				err(EX_OSERR, "%s", to_name);
669 			}
670 		if (nr != 0) {
671 			serrno = errno;
672 			(void)unlink(to_name);
673 			errno = serrno;
674 			err(EX_OSERR, "%s", from_name);
675 		}
676 	}
677 }
678 
679 /*
680  * strip --
681  *	use strip(1) to strip the target file
682  */
683 void
684 strip(const char *to_name)
685 {
686 	const char *stripbin;
687 	int serrno, status;
688 
689 	switch (fork()) {
690 	case -1:
691 		serrno = errno;
692 		(void)unlink(to_name);
693 		errno = serrno;
694 		err(EX_TEMPFAIL, "fork");
695 	case 0:
696 		stripbin = getenv("STRIPBIN");
697 		if (stripbin == NULL)
698 			stripbin = "strip";
699 		execlp(stripbin, stripbin, to_name, (char *)NULL);
700 		err(EX_OSERR, "exec(%s)", stripbin);
701 	default:
702 		if (wait(&status) == -1 || status) {
703 			serrno = errno;
704 			(void)unlink(to_name);
705 			errc(EX_SOFTWARE, serrno, "wait");
706 			/* NOTREACHED */
707 		}
708 	}
709 }
710 
711 /*
712  * install_dir --
713  *	build directory heirarchy
714  */
715 void
716 install_dir(char *path)
717 {
718 	char *p;
719 	struct stat sb;
720 	int ch;
721 
722 	for (p = path;; ++p)
723 		if (!*p || (p != path && *p  == '/')) {
724 			ch = *p;
725 			*p = '\0';
726 			if (stat(path, &sb)) {
727 				if (errno != ENOENT || mkdir(path, 0755) < 0) {
728 					err(EX_OSERR, "mkdir %s", path);
729 					/* NOTREACHED */
730 				} else if (verbose)
731 					(void)printf("install: mkdir %s\n",
732 						     path);
733 			} else if (!S_ISDIR(sb.st_mode))
734 				errx(EX_OSERR, "%s exists but is not a directory", path);
735 			if (!(*p = ch))
736 				break;
737  		}
738 
739 	if ((gid != (gid_t)-1 || uid != (uid_t)-1) && chown(path, uid, gid))
740 		warn("chown %u:%u %s", uid, gid, path);
741 	if (chmod(path, mode))
742 		warn("chmod %o %s", mode, path);
743 }
744 
745 /*
746  * usage --
747  *	print a usage message and die
748  */
749 void
750 usage(void)
751 {
752 	(void)fprintf(stderr, "\
753 usage: install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]\n\
754                [-o owner] file1 file2\n\
755        install [-bCcpSsv] [-B suffix] [-f flags] [-g group] [-m mode]\n\
756                [-o owner] file1 ... fileN directory\n\
757        install -d [-v] [-g group] [-m mode] [-o owner] directory ...\n");
758 	exit(EX_USAGE);
759 	/* NOTREACHED */
760 }
761 
762 /*
763  * trymmap --
764  *	return true (1) if mmap should be tried, false (0) if not.
765  */
766 int
767 trymmap(int fd)
768 {
769 /*
770  * The ifdef is for bootstrapping - f_fstypename doesn't exist in
771  * pre-Lite2-merge systems.
772  */
773 #ifdef MFSNAMELEN
774 	struct statfs stfs;
775 
776 	if (nommap || fstatfs(fd, &stfs) != 0)
777 		return (0);
778 	if (strcmp(stfs.f_fstypename, "ufs") == 0 ||
779 	    strcmp(stfs.f_fstypename, "cd9660") == 0)
780 		return (1);
781 #endif
782 	return (0);
783 }
784