tables.h revision 1.7 1 1.7 agc /* $NetBSD: tables.h,v 1.7 2003/08/07 09:05:22 agc Exp $ */
2 1.3 cgd
3 1.1 jtc /*-
4 1.1 jtc * Copyright (c) 1992, 1993
5 1.1 jtc * The Regents of the University of California. All rights reserved.
6 1.7 agc *
7 1.7 agc * This code is derived from software contributed to Berkeley by
8 1.7 agc * Keith Muller of the University of California, San Diego.
9 1.7 agc *
10 1.7 agc * Redistribution and use in source and binary forms, with or without
11 1.7 agc * modification, are permitted provided that the following conditions
12 1.7 agc * are met:
13 1.7 agc * 1. Redistributions of source code must retain the above copyright
14 1.7 agc * notice, this list of conditions and the following disclaimer.
15 1.7 agc * 2. Redistributions in binary form must reproduce the above copyright
16 1.7 agc * notice, this list of conditions and the following disclaimer in the
17 1.7 agc * documentation and/or other materials provided with the distribution.
18 1.7 agc * 3. Neither the name of the University nor the names of its contributors
19 1.7 agc * may be used to endorse or promote products derived from this software
20 1.7 agc * without specific prior written permission.
21 1.7 agc *
22 1.7 agc * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 1.7 agc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 1.7 agc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 1.7 agc * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 1.7 agc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.7 agc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 1.7 agc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.7 agc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.7 agc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.7 agc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.7 agc * SUCH DAMAGE.
33 1.7 agc *
34 1.7 agc * @(#)tables.h 8.1 (Berkeley) 5/31/93
35 1.7 agc */
36 1.7 agc
37 1.7 agc /*-
38 1.7 agc * Copyright (c) 1992 Keith Muller.
39 1.1 jtc *
40 1.1 jtc * This code is derived from software contributed to Berkeley by
41 1.1 jtc * Keith Muller of the University of California, San Diego.
42 1.1 jtc *
43 1.1 jtc * Redistribution and use in source and binary forms, with or without
44 1.1 jtc * modification, are permitted provided that the following conditions
45 1.1 jtc * are met:
46 1.1 jtc * 1. Redistributions of source code must retain the above copyright
47 1.1 jtc * notice, this list of conditions and the following disclaimer.
48 1.1 jtc * 2. Redistributions in binary form must reproduce the above copyright
49 1.1 jtc * notice, this list of conditions and the following disclaimer in the
50 1.1 jtc * documentation and/or other materials provided with the distribution.
51 1.1 jtc * 3. All advertising materials mentioning features or use of this software
52 1.1 jtc * must display the following acknowledgement:
53 1.1 jtc * This product includes software developed by the University of
54 1.1 jtc * California, Berkeley and its contributors.
55 1.1 jtc * 4. Neither the name of the University nor the names of its contributors
56 1.1 jtc * may be used to endorse or promote products derived from this software
57 1.1 jtc * without specific prior written permission.
58 1.1 jtc *
59 1.1 jtc * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
60 1.1 jtc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
61 1.1 jtc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
62 1.1 jtc * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
63 1.1 jtc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
64 1.1 jtc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
65 1.1 jtc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
66 1.1 jtc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
67 1.1 jtc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
68 1.1 jtc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
69 1.1 jtc * SUCH DAMAGE.
70 1.1 jtc *
71 1.3 cgd * @(#)tables.h 8.1 (Berkeley) 5/31/93
72 1.1 jtc */
73 1.1 jtc
74 1.1 jtc /*
75 1.1 jtc * data structures and constants used by the different databases kept by pax
76 1.1 jtc */
77 1.1 jtc
78 1.1 jtc /*
79 1.1 jtc * Hash Table Sizes MUST BE PRIME, if set too small performance suffers.
80 1.1 jtc * Probably safe to expect 500000 inodes per tape. Assuming good key
81 1.1 jtc * distribution (inodes) chains of under 50 long (worse case) is ok.
82 1.1 jtc */
83 1.1 jtc #define L_TAB_SZ 2503 /* hard link hash table size */
84 1.1 jtc #define F_TAB_SZ 50503 /* file time hash table size */
85 1.1 jtc #define N_TAB_SZ 541 /* interactive rename hash table */
86 1.1 jtc #define D_TAB_SZ 317 /* unique device mapping table */
87 1.1 jtc #define A_TAB_SZ 317 /* ftree dir access time reset table */
88 1.1 jtc #define MAXKEYLEN 64 /* max number of chars for hash */
89 1.1 jtc
90 1.1 jtc /*
91 1.1 jtc * file hard link structure (hashed by dev/ino and chained) used to find the
92 1.1 jtc * hard links in a file system or with some archive formats (cpio)
93 1.1 jtc */
94 1.1 jtc typedef struct hrdlnk {
95 1.1 jtc char *name; /* name of first file seen with this ino/dev */
96 1.1 jtc dev_t dev; /* files device number */
97 1.1 jtc ino_t ino; /* files inode number */
98 1.1 jtc u_long nlink; /* expected link count */
99 1.1 jtc struct hrdlnk *fow;
100 1.1 jtc } HRDLNK;
101 1.1 jtc
102 1.1 jtc /*
103 1.1 jtc * Archive write update file time table (the -u, -C flag), hashed by filename.
104 1.1 jtc * Filenames are stored in a scratch file at seek offset into the file. The
105 1.1 jtc * file time (mod time) and the file name length (for a quick check) are
106 1.1 jtc * stored in a hash table node. We were forced to use a scratch file because
107 1.1 jtc * with -u, the mtime for every node in the archive must always be available
108 1.1 jtc * to compare against (and this data can get REALLY large with big archives).
109 1.1 jtc * By being careful to read only when we have a good chance of a match, the
110 1.1 jtc * performance loss is not measurable (and the size of the archive we can
111 1.1 jtc * handle is greatly increased).
112 1.1 jtc */
113 1.1 jtc typedef struct ftm {
114 1.1 jtc int namelen; /* file name length */
115 1.1 jtc time_t mtime; /* files last modification time */
116 1.1 jtc off_t seek; /* loacation in scratch file */
117 1.1 jtc struct ftm *fow;
118 1.1 jtc } FTM;
119 1.1 jtc
120 1.1 jtc /*
121 1.1 jtc * Interactive rename table (-i flag), hashed by orig filename.
122 1.1 jtc * We assume this will not be a large table as this mapping data can only be
123 1.1 jtc * obtained through interactive input by the user. Nobody is going to type in
124 1.1 jtc * changes for 500000 files? We use chaining to resolve collisions.
125 1.1 jtc */
126 1.1 jtc
127 1.1 jtc typedef struct namt {
128 1.1 jtc char *oname; /* old name */
129 1.1 jtc char *nname; /* new name typed in by the user */
130 1.1 jtc struct namt *fow;
131 1.1 jtc } NAMT;
132 1.1 jtc
133 1.1 jtc /*
134 1.1 jtc * Unique device mapping tables. Some protocols (e.g. cpio) require that the
135 1.1 jtc * <c_dev,c_ino> pair will uniquely identify a file in an archive unless they
136 1.1 jtc * are links to the same file. Appending to archives can break this. For those
137 1.1 jtc * protocols that have this requirement we map c_dev to a unique value not seen
138 1.1 jtc * in the archive when we append. We also try to handle inode truncation with
139 1.1 jtc * this table. (When the inode field in the archive header are too small, we
140 1.1 jtc * remap the dev on writes to remove accidental collisions).
141 1.1 jtc *
142 1.5 itohy * The list is hashed by device number using chain collision resolution. Off of
143 1.1 jtc * each DEVT are linked the various remaps for this device based on those bits
144 1.1 jtc * in the inode which were truncated. For example if we are just remapping to
145 1.1 jtc * avoid a device number during an update append, off the DEVT we would have
146 1.1 jtc * only a single DLIST that has a truncation id of 0 (no inode bits were
147 1.1 jtc * stripped for this device so far). When we spot inode truncation we create
148 1.1 jtc * a new mapping based on the set of bits in the inode which were stripped off.
149 1.1 jtc * so if the top four bits of the inode are stripped and they have a pattern of
150 1.1 jtc * 0110...... (where . are those bits not truncated) we would have a mapping
151 1.1 jtc * assigned for all inodes that has the same 0110.... pattern (with this dev
152 1.1 jtc * number of course). This keeps the mapping sparse and should be able to store
153 1.1 jtc * close to the limit of files which can be represented by the optimal
154 1.1 jtc * combination of dev and inode bits, and without creating a fouled up archive.
155 1.1 jtc * Note we also remap truncated devs in the same way (an exercise for the
156 1.1 jtc * dedicated reader; always wanted to say that...:)
157 1.1 jtc */
158 1.1 jtc
159 1.1 jtc typedef struct devt {
160 1.1 jtc dev_t dev; /* the orig device number we now have to map */
161 1.1 jtc struct devt *fow; /* new device map list */
162 1.1 jtc struct dlist *list; /* map list based on inode truncation bits */
163 1.1 jtc } DEVT;
164 1.1 jtc
165 1.1 jtc typedef struct dlist {
166 1.1 jtc ino_t trunc_bits; /* truncation pattern for a specific map */
167 1.1 jtc dev_t dev; /* the new device id we use */
168 1.1 jtc struct dlist *fow;
169 1.1 jtc } DLIST;
170 1.1 jtc
171 1.1 jtc /*
172 1.1 jtc * ftree directory access time reset table. When we are done with with a
173 1.1 jtc * subtree we reset the access and mod time of the directory when the tflag is
174 1.1 jtc * set. Not really explicitly specified in the pax spec, but easy and fast to
175 1.1 jtc * do (and this may have even been intended in the spec, it is not clear).
176 1.1 jtc * table is hashed by inode with chaining.
177 1.1 jtc */
178 1.1 jtc
179 1.1 jtc typedef struct atdir {
180 1.1 jtc char *name; /* name of directory to reset */
181 1.1 jtc dev_t dev; /* dev and inode for fast lookup */
182 1.1 jtc ino_t ino;
183 1.1 jtc time_t mtime; /* access and mod time to reset to */
184 1.1 jtc time_t atime;
185 1.1 jtc struct atdir *fow;
186 1.1 jtc } ATDIR;
187 1.1 jtc
188 1.1 jtc /*
189 1.1 jtc * created directory time and mode storage entry. After pax is finished during
190 1.1 jtc * extraction or copy, we must reset directory access modes and times that
191 1.1 jtc * may have been modified after creation (they no longer have the specified
192 1.1 jtc * times and/or modes). We must reset time in the reverse order of creation,
193 1.1 jtc * because entries are added from the top of the file tree to the bottom.
194 1.1 jtc * We MUST reset times from leaf to root (it will not work the other
195 1.1 jtc * direction). Entries are recorded into a spool file to make reverse
196 1.1 jtc * reading faster.
197 1.1 jtc */
198 1.1 jtc
199 1.1 jtc typedef struct dirdata {
200 1.6 thorpej #ifdef DIRS_USE_FILE
201 1.1 jtc int nlen; /* length of the directory name (includes \0) */
202 1.1 jtc off_t npos; /* position in file where this dir name starts */
203 1.6 thorpej #else
204 1.6 thorpej char *name; /* file name */
205 1.6 thorpej struct dirdata *next;
206 1.6 thorpej #endif
207 1.1 jtc mode_t mode; /* file mode to restore */
208 1.1 jtc time_t mtime; /* mtime to set */
209 1.1 jtc time_t atime; /* atime to set */
210 1.4 mrg long fflags; /* file flags to set */
211 1.1 jtc int frc_mode; /* do we force mode settings? */
212 1.1 jtc } DIRDATA;
213