1 .\" Copyright (c) 1987, 1990, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" From: @(#)install.1 8.1 (Berkeley) 6/6/93
57 .Ar file1 ... fileN directory
66 The file(s) are copied
67 to the target file or directory.
68 If the destination is a directory, then the
72 with its original filename.
73 If the target file already exists, it is
81 An alternate backup suffix may be specified via the
85 The options are as follows:
86 .Bl -tag -width indent
88 Back up any existing files before overwriting them by renaming
93 for specifying a different backup suffix.
97 as the backup suffix if
102 If the target file already exists and the files are the same,
103 then do not change the modification time of the target.
104 If the target's file flags and mode need not to be changed,
105 the target's inode change time is also unchanged.
108 This is actually the default.
111 option is only included for backwards compatibility.
114 Missing parent directories are created as required.
116 Specify the target's file flags; see
118 for a list of possible flags and their meanings.
121 A numeric GID is allowed.
126 Specify an alternate mode.
127 The default mode is set to rwxr-xr-x (0755).
128 The specified mode may be either an octal or symbolic value; see
130 for a description of possible mode values.
133 A numeric UID is allowed.
135 Preserve the access and modification times.
136 Copy the file, as if the
138 (compare and copy) option is specified,
139 except if the target file does not already exist or is different,
140 then preserve the access and modification times of the source file.
145 unlinks an existing target before installing the new file.
148 flag a temporary file is used and then renamed to be
150 The reason this is safer is that if the copy or
151 rename fails, the existing target is left untouched.
156 to strip binaries so that
158 can be portable over a large
159 number of systems and binary types.
162 can be instructed to use another program to strip binaries.
167 showing files as they are installed or backed up.
172 preserves all file flags, with the exception of the
178 utility attempts to prevent moving a file onto itself.
182 creates an empty file.
186 utility checks for the presence of the
188 environment variable and if present,
189 uses the assigned value as the program to run if and when the
191 option has been specified.
195 environment variable is present,
197 will ignore any specification of the
200 This is mainly for use in debugging the
204 .Bl -tag -width ".Pa INS@XXXX" -compact
208 option is specified, or the
212 option is used in conjunction with the
214 option, temporary files named
220 are created in the target directory.
227 moved files by default.
228 The default was changed to copy in
245 Temporary files may be left in the target directory if
249 File flags cannot be set by
251 over a NFS file system.
252 Other file systems do not have a concept of flags.
255 utility will only warn when flags could not be set on a file system
256 that does not support them.
262 falsely says a file is copied when