1 .\" Copyright (c) 1987, 1990, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 4. Neither the name of the University nor the names of its contributors
13 .\" may be used to endorse or promote products derived from this software
14 .\" without specific prior written permission.
16 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
17 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
20 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28 .\" From: @(#)install.1 8.1 (Berkeley) 6/6/93
53 .Ar file1 ... fileN directory
62 The file(s) are copied
63 to the target file or directory.
64 If the destination is a directory, then the
68 with its original filename.
69 If the target file already exists, it is
77 An alternate backup suffix may be specified via the
81 The options are as follows:
82 .Bl -tag -width indent
84 Back up any existing files before overwriting them by renaming
89 for specifying a different backup suffix.
93 as the backup suffix if
98 If the target file already exists and the files are the same,
99 then do not change the modification time of the target.
100 If the target's file flags and mode need not to be changed,
101 the target's inode change time is also unchanged.
104 This is actually the default.
107 option is only included for backwards compatibility.
110 Missing parent directories are created as required.
112 Specify the target's file flags; see
114 for a list of possible flags and their meanings.
117 A numeric GID is allowed.
122 Specify an alternate mode.
123 The default mode is set to rwxr-xr-x (0755).
124 The specified mode may be either an octal or symbolic value; see
126 for a description of possible mode values.
129 A numeric UID is allowed.
131 Preserve the access and modification times.
132 Copy the file, as if the
134 (compare and copy) option is specified,
135 except if the target file does not already exist or is different,
136 then preserve the access and modification times of the source file.
141 unlinks an existing target before installing the new file.
144 flag a temporary file is used and then renamed to be
146 The reason this is safer is that if the copy or
147 rename fails, the existing target is left untouched.
152 to strip binaries so that
154 can be portable over a large
155 number of systems and binary types.
158 can be instructed to use another program to strip binaries.
163 showing files as they are installed or backed up.
168 preserves all file flags, with the exception of the
174 utility attempts to prevent moving a file onto itself.
178 creates an empty file.
182 utility checks for the presence of the
184 environment variable and if present,
185 uses the assigned value as the program to run if and when the
187 option has been specified.
191 environment variable is present,
193 will ignore any specification of the
196 This is mainly for use in debugging the
200 .Bl -tag -width ".Pa INS@XXXX" -compact
204 option is specified, or the
208 option is used in conjunction with the
210 option, temporary files named
216 are created in the target directory.
223 moved files by default.
224 The default was changed to copy in
241 Temporary files may be left in the target directory if
245 File flags cannot be set by
247 over a NFS file system.
248 Other file systems do not have a concept of flags.
251 utility will only warn when flags could not be set on a file system
252 that does not support them.
258 falsely says a file is copied when