1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494
|
.ds TYPE C
.\"
.\" See the file LICENSE for redistribution information.
.\"
.\" Copyright (c) 1996, 1997
.\" Sleepycat Software. All rights reserved.
.\"
.\" @(#)db_intro.so 10.34 (Sleepycat) 12/2/97
.\"
.\"
.\" See the file LICENSE for redistribution information.
.\"
.\" Copyright (c) 1997
.\" Sleepycat Software. All rights reserved.
.\"
.\" @(#)macros.so 10.38 (Sleepycat) 1/18/98
.\"
.\" We don't want hyphenation for any HTML documents.
.ie '\*[HTML]'YES'\{\
.nh
\}
.el\{\
.ds Hy
.hy
..
.ds Nh
.nh
..
\}
.\" The alternative text macro
.\" This macro takes two arguments:
.\" + the text produced if this is a "C" manpage
.\" + the text produced if this is a "CXX" or "JAVA" manpage
.\"
.de Al
.ie '\*[TYPE]'C'\{\\$1
\}
.el\{\\$2
\}
..
.\" Scoped name macro.
.\" Produces a_b, a::b, a.b depending on language
.\" This macro takes two arguments:
.\" + the class or prefix (without underscore)
.\" + the name within the class or following the prefix
.de Sc
.ie '\*[TYPE]'C'\{\\$1_\\$2
\}
.el\{\
.ie '\*[TYPE]'CXX'\{\\$1::\\$2
\}
.el\{\\$1.\\$2
\}
\}
..
.\" Scoped name for Java.
.\" Produces Db.b, for Java, otherwise just b. This macro is used for
.\" constants that must be scoped in Java, but are global otherwise.
.\" This macro takes two arguments:
.\" + the class
.\" + the name within the class or following the prefix
.de Sj
.ie '\*[TYPE]'JAVA'\{\
.TP 5
Db.\\$1\}
.el\{\
.TP 5
\\$2\}
..
.\" The general information text macro.
.de Gn
.ie '\*[TYPE]'C'\{The DB library is a family of groups of functions that provides a modular
programming interface to transactions and record-oriented file access.
The library includes support for transactions, locking, logging and file
page caching, as well as various indexed access methods.
Many of the functional groups (e.g., the file page caching functions)
are useful independent of the other DB functions,
although some functional groups are explicitly based on other functional
groups (e.g., transactions and logging).
\}
.el\{The DB library is a family of classes that provides a modular
programming interface to transactions and record-oriented file access.
The library includes support for transactions, locking, logging and file
page caching, as well as various indexed access methods.
Many of the classes (e.g., the file page caching class)
are useful independent of the other DB classes,
although some classes are explicitly based on other classes
(e.g., transactions and logging).
\}
For a general description of the DB package, see
.IR db_intro (3).
..
.\" The library error macro, the local error macro.
.\" These macros take one argument:
.\" + the function name.
.de Ee
The
.I \\$1
.ie '\*[TYPE]'C'\{function may fail and return
.I errno
\}
.el\{method may fail and throw a
.IR DbException (3)
.if '\*[TYPE]'CXX'\{
or return
.I errno
\}
\}
for any of the errors specified for the following DB and library functions:
..
.de Ec
In addition, the
.I \\$1
.ie '\*[TYPE]'C'\{function may fail and return
.I errno
\}
.el\{method may fail and throw a
.IR DbException (3)
.ie '\*[TYPE]'CXX'\{or return
.I errno
\}
.el\{encapsulating an
.I errno
\}
\}
for the following conditions:
..
.de Ea
[EAGAIN]
A lock was unavailable.
..
.de Eb
[EBUSY]
The shared memory region was in use and the force flag was not set.
..
.de Em
[EAGAIN]
The shared memory region was locked and (repeatedly) unavailable.
..
.de Ei
[EINVAL]
An invalid flag value or parameter was specified.
..
.de Es
[EACCES]
An attempt was made to modify a read-only database.
..
.de Et
The DB_THREAD flag was specified and spinlocks are not implemented for
this architecture.
..
.de Ep
[EPERM]
Database corruption was detected.
All subsequent database calls (other than
.ie '\*[TYPE]'C'\{\
.IR DB->close )
\}
.el\{\
.IR Db::close )
\}
will return EPERM.
..
.de Ek
.if '\*[TYPE]'CXX'\{\
Methods marked as returning
.I errno
will, by default, throw an exception that encapsulates the error information.
The default error behavior can be changed, see
.IR DbException (3).
\}
..
.\" The SEE ALSO text macro
.de Sa
.\" make the line long for nroff.
.if n .ll 72
.nh
.na
.IR db_archive (1),
.IR db_checkpoint (1),
.IR db_deadlock (1),
.IR db_dump (1),
.IR db_load (1),
.IR db_recover (1),
.IR db_stat (1),
.IR db_intro (3),
.ie '\*[TYPE]'C'\{\
.IR db_appinit (3),
.IR db_cursor (3),
.IR db_dbm (3),
.IR db_internal (3),
.IR db_lock (3),
.IR db_log (3),
.IR db_mpool (3),
.IR db_open (3),
.IR db_thread (3),
.IR db_txn (3)
\}
.el\{\
.IR db_internal (3),
.IR db_thread (3),
.IR Db (3),
.IR Dbc (3),
.IR DbEnv (3),
.IR DbException (3),
.IR DbInfo (3),
.IR DbLock (3),
.IR DbLockTab (3),
.IR DbLog (3),
.IR DbLsn (3),
.IR DbMpool (3),
.IR DbMpoolFile (3),
.IR Dbt (3),
.IR DbTxn (3),
.IR DbTxnMgr (3)
\}
.ad
.Hy
..
.\" The function header macro.
.\" This macro takes one argument:
.\" + the function name.
.de Fn
.in 2
.I \\$1
.in
..
.\" The XXX_open function text macro, for merged create/open calls.
.\" This macro takes two arguments:
.\" + the interface, e.g., "transaction region"
.\" + the prefix, e.g., "txn" (or the class name for C++, e.g., "DbTxn")
.de Co
.ie '\*[TYPE]'C'\{\
.Fn \\$2_open
The
.I \\$2_open
function copies a pointer, to the \\$1 identified by the
.B directory
.IR dir ,
into the memory location referenced by
.IR regionp .
.PP
If the
.I dbenv
argument to
.I \\$2_open
was initialized using
.IR db_appinit ,
.I dir
is interpreted as described by
.IR db_appinit (3).
\}
.el\{\
.Fn \\$2::open
The
.I \\$2::open
.ie '\*[TYPE]'CXX'\{\
method copies a pointer, to the \\$1 identified by the
.B directory
.IR dir ,
into the memory location referenced by
.IR regionp .
\}
.el\{\
method returns a \\$1 identified by the
.B directory
.IR dir .
\}
.PP
If the
.I dbenv
argument to
.I \\$2::open
was initialized using
.IR DbEnv::appinit ,
.I dir
is interpreted as described by
.IR DbEnv (3).
\}
.PP
Otherwise,
if
.I dir
is not NULL,
it is interpreted relative to the current working directory of the process.
If
.I dir
is NULL,
the following environment variables are checked in order:
``TMPDIR'', ``TEMP'', and ``TMP''.
If one of them is set,
\\$1 files are created relative to the directory it specifies.
If none of them are set, the first possible one of the following
directories is used:
.IR /var/tmp ,
.IR /usr/tmp ,
.IR /temp ,
.IR /tmp ,
.I C:/temp
and
.IR C:/tmp .
.PP
All files associated with the \\$1 are created in this directory.
This directory must already exist when
.ie '\*[TYPE]'C'\{
\\$1_open
\}
.el\{\
\\$2::open
\}
is called.
If the \\$1 already exists,
the process must have permission to read and write the existing files.
If the \\$1 does not already exist,
it is optionally created and initialized.
..
.\" The common close language macro, for discarding created regions
.\" This macro takes one argument:
.\" + the function prefix, e.g., txn (the class name for C++, e.g., DbTxn)
.de Cc
In addition, if the
.I dir
argument to
.ie '\*[TYPE]'C'\{\
.ds Va db_appinit
.ds Vo \\$1_open
.ds Vu \\$1_unlink
\}
.el\{\
.ds Va DbEnv::appinit
.ds Vo \\$1::open
.ds Vu \\$1::unlink
\}
.I \\*(Vo
was NULL
and
.I dbenv
was not initialized using
.IR \\*(Va ,
.if '\\$1'memp'\{\
or the DB_MPOOL_PRIVATE flag was set,
\}
all files created for this shared region will be removed,
as if
.I \\*(Vu
were called.
.rm Va
.rm Vo
.rm Vu
..
.\" The DB_ENV information macro.
.\" This macro takes two arguments:
.\" + the function called to open, e.g., "txn_open"
.\" + the function called to close, e.g., "txn_close"
.de En
.ie '\*[TYPE]'C'\{\
based on the
.I dbenv
argument to
.IR \\$1 ,
which is a pointer to a structure of type DB_ENV (typedef'd in <db2/db.h>).
It is expected that applications will use a single DB_ENV structure as the
argument to all of the subsystems in the DB package.
In order to ensure compatibility with future releases of DB, all fields of
the DB_ENV structure that are not explicitly set should be initialized to 0
before the first time the structure is used.
Do this by declaring the structure external or static, or by calling the C
library routine
.IR bzero (3)
or
.IR memset (3).
.PP
The fields of the DB_ENV structure used by
.I \\$1
are described below.
.if '\*[TYPE]'CXX'\{\
As references to the DB_ENV structure may be maintained by
.IR \\$1 ,
it is necessary that the DB_ENV structure and memory it references be valid
until the
.I \\$2
function is called.
\}
.ie '\\$1'db_appinit'\{The
.I dbenv
argument may not be NULL.
If any of the fields of the
.I dbenv
are set to 0,
defaults appropriate for the system are used where possible.
\}
.el\{If
.I dbenv
is NULL
or any of its fields are set to 0,
defaults appropriate for the system are used where possible.
\}
.PP
The following fields in the DB_ENV structure may be initialized before calling
.IR \\$1 :
\}
.el\{\
based on which set methods have been used.
It is expected that applications will use a single DbEnv object as the
argument to all of the subsystems in the DB package.
The fields of the DbEnv object used by
.I \\$1
are described below.
As references to the DbEnv object may be maintained by
.IR \\$1 ,
it is necessary that the DbEnv object and memory it references be valid
until the object is destroyed.
.ie '\\$1'appinit'\{\
The
.I dbenv
argument may not be NULL.
If any of the fields of the
.I dbenv
are set to 0,
defaults appropriate for the system are used where possible.
\}
.el\{\
Any of the DbEnv fields that are not explicitly set will default to
appropriate values.
\}
.PP
The following fields in the DbEnv object may be initialized, using the
appropriate set method, before calling
.IR \\$1 :
\}
..
.\" The DB_ENV common fields macros.
.de Se
.ie '\*[TYPE]'JAVA'\{\
.TP 5
DbErrcall db_errcall;
.ns
.TP 5
String db_errpfx;
.ns
.TP 5
int db_verbose;
The error fields of the DbEnv behave as described for
.IR DbEnv (3).
\}
.el\{\
.ie '\*[TYPE]'CXX'\{\
.TP 5
void *(*db_errcall)(char *db_errpfx, char *buffer);
.ns
.TP 5
FILE *db_errfile;
.ns
.TP 5
const char *db_errpfx;
.ns
.TP 5
class ostream *db_error_stream;
.ns
.TP 5
int db_verbose;
The error fields of the DbEnv behave as described for
.IR DbEnv (3).
\}
.el\{\
void *(*db_errcall)(char *db_errpfx, char *buffer);
.ns
.TP 5
FILE *db_errfile;
.ns
.TP 5
const char *db_errpfx;
.ns
.TP 5
int db_verbose;
The error fields of the DB_ENV behave as described for
.IR db_appinit (3).
\}
\}
..
.\" The open flags.
.de Fm
The
.I flags
and
.I mode
arguments specify how files will be opened and/or created when they
don't already exist.
The flags value is specified by
.BR or 'ing
together one or more of the following values:
.Sj DB_CREATE
Create any underlying files, as necessary.
If the files do not already exist and the DB_CREATE flag is not specified,
the call will fail.
..
.\" DB_THREAD open flag macro.
.\" This macro takes two arguments:
.\" + the open function name
.\" + the object it returns.
.de Ft
.TP 5
.Sj DB_THREAD
Cause the \\$2 handle returned by the
.I \\$1
.Al function method
to be useable by multiple threads within a single address space,
i.e., to be ``free-threaded''.
.if '\*[TYPE]'JAVA'\{\
Threading is assumed in the Java API,
so no special flags are required,
and DB functions will always behave as if the DB_THREAD flag was specified.
\}
..
.\" The mode macro.
.\" This macro takes one argument:
.\" + the subsystem name.
.de Mo
All files created by the \\$1 are created with mode
.I mode
(as described in
.IR chmod (2))
and modified by the process' umask value at the time of creation (see
.IR umask (2)).
The group ownership of created files is based on the system and directory
defaults, and is not further specified by DB.
..
.\" The application exits macro.
.\" This macro takes one argument:
.\" + the application name.
.de Ex
The
.I \\$1
utility exits 0 on success, and >0 if an error occurs.
..
.\" The application -h section.
.\" This macro takes one argument:
.\" + the application name
.de Dh
DB_HOME
If the
.B \-h
option is not specified and the environment variable
.I DB_HOME
is set, it is used as the path of the database home, as described in
.IR db_appinit (3).
..
.\" The function DB_HOME ENVIRONMENT VARIABLES section.
.\" This macro takes one argument:
.\" + the open function name
.de Eh
DB_HOME
If the
.I dbenv
argument to
.I \\$1
was initialized using
.IR db_appinit ,
the environment variable DB_HOME may be used as the path of the database
home for the interpretation of the
.I dir
argument to
.IR \\$1 ,
as described in
.IR db_appinit (3).
.if \\n(.$>1 \{Specifically,
.I \\$1
is affected by the configuration string value of \\$2.\}
..
.\" The function TMPDIR ENVIRONMENT VARIABLES section.
.\" This macro takes two arguments:
.\" + the interface, e.g., "transaction region"
.\" + the prefix, e.g., "txn" (or the class name for C++, e.g., "DbTxn")
.de Ev
TMPDIR
If the
.I dbenv
argument to
.ie '\*[TYPE]'C'\{\
.ds Vo \\$2_open
\}
.el\{\
.ds Vo \\$2::open
\}
.I \\*(Vo
was NULL or not initialized using
.IR db_appinit ,
the environment variable TMPDIR may be used as the directory in which to
create the \\$1,
as described in the
.I \\*(Vo
section above.
.rm Vo
..
.\" The unused flags macro.
.de Fl
The
.I flags
parameter is currently unused, and must be set to 0.
..
.\" The no-space TP macro.
.de Nt
.br
.ns
.TP 5
..
.\" The return values of the functions macros.
.\" Rc is the standard two-value return with a suffix for more values.
.\" Ro is the standard two-value return but there were previous values.
.\" Rt is the standard two-value return, returning errno, 0, or < 0.
.\" These macros take one argument:
.\" + the routine name
.de Rc
The
.I \\$1
.ie '\*[TYPE]'C'\{function returns the value of
.I errno
on failure,
0 on success,
\}
.el\{method throws a
.IR DbException (3)
.ie '\*[TYPE]'CXX'\{or returns the value of
.I errno
on failure,
0 on success,
\}
.el\{that encapsulates an
.I errno
on failure,
\}
\}
..
.de Ro
Otherwise, the
.I \\$1
.ie '\*[TYPE]'C'\{function returns the value of
.I errno
on failure and 0 on success.
\}
.el\{method throws a
.IR DbException (3)
.ie '\*[TYPE]'CXX'\{or returns the value of
.I errno
on failure and 0 on success.
\}
.el\{that encapsulates an
.I errno
on failure,
\}
\}
..
.de Rt
The
.I \\$1
.ie '\*[TYPE]'C'\{function returns the value of
.I errno
on failure and 0 on success.
\}
.el\{method throws a
.IR DbException (3)
.ie '\*[TYPE]'CXX'\{or returns the value of
.I errno
on failure and 0 on success.
\}
.el\{that encapsulates an
.I errno
on failure.
\}
\}
..
.\" The TXN id macro.
.de Tx
.IP
If the file is being accessed under transaction protection,
the
.I txnid
parameter is a transaction ID returned from
.IR txn_begin ,
otherwise, NULL.
..
.\" The XXX_unlink function text macro.
.\" This macro takes two arguments:
.\" + the interface, e.g., "transaction region"
.\" + the prefix (for C++, this is the class name)
.de Un
.ie '\*[TYPE]'C'\{\
.ds Va db_appinit
.ds Vc \\$2_close
.ds Vo \\$2_open
.ds Vu \\$2_unlink
\}
.el\{\
.ds Va DbEnv::appinit
.ds Vc \\$2::close
.ds Vo \\$2::open
.ds Vu \\$2::unlink
\}
.Fn \\*(Vu
The
.I \\*(Vu
.Al function method
destroys the \\$1 identified by the directory
.IR dir ,
removing all files used to implement the \\$1.
.ie '\\$2'log' \{(The log files themselves and the directory
.I dir
are not removed.)\}
.el \{(The directory
.I dir
is not removed.)\}
If there are processes that have called
.I \\*(Vo
without calling
.I \\*(Vc
(i.e., there are processes currently using the \\$1),
.I \\*(Vu
will fail without further action,
unless the force flag is set,
in which case
.I \\*(Vu
will attempt to remove the \\$1 files regardless of any processes
still using the \\$1.
.PP
The result of attempting to forcibly destroy the region when a process
has the region open is unspecified.
Processes using a shared memory region maintain an open file descriptor
for it.
On UNIX systems, the region removal should succeed
and processes that have already joined the region should continue to
run in the region without change,
however processes attempting to join the \\$1 will either fail or
attempt to create a new region.
On other systems, e.g., WNT, where the
.IR unlink (2)
system call will fail if any process has an open file descriptor
for the file,
the region removal will fail.
.PP
In the case of catastrophic or system failure,
database recovery must be performed (see
.IR db_recover (1)
or the DB_RECOVER flags to
.IR \\*(Va (3)).
Alternatively, if recovery is not required because no database state is
maintained across failures,
it is possible to clean up a \\$1 by removing all of the
files in the directory specified to the
.I \\*(Vo
.Al function, method,
as \\$1 files are never created in any directory other than the one
specified to
.IR \\*(Vo .
Note, however,
that this has the potential to remove files created by the other DB
subsystems in this database environment.
.PP
.Rt \\*(Vu
.rm Va
.rm Vo
.rm Vu
.rm Vc
..
.\" Signal paragraph for standard utilities.
.\" This macro takes one argument:
.\" + the utility name.
.de Si
The
.I \\$1
utility attaches to DB shared memory regions.
In order to avoid region corruption,
it should always be given the chance to detach and exit gracefully.
To cause
.I \\$1
to clean up after itself and exit,
send it an interrupt signal (SIGINT).
..
.\" Logging paragraph for standard utilities.
.\" This macro takes one argument:
.\" + the utility name.
.de Pi
.B \-L
Log the execution of the \\$1 utility to the specified file in the
following format, where ``###'' is the process ID, and the date is
the time the utility starting running.
.sp
\\$1: ### Wed Jun 15 01:23:45 EDT 1995
.sp
This file will be removed if the \\$1 utility exits gracefully.
..
.\" Malloc paragraph.
.\" This macro takes one argument:
.\" + the allocated object
.de Ma
.if !'\*[TYPE]'JAVA'\{\
\\$1 are created in allocated memory.
If
.I db_malloc
is non-NULL,
it is called to allocate the memory,
otherwise,
the library function
.IR malloc (3)
is used.
The function
.I db_malloc
must match the calling conventions of the
.IR malloc (3)
library routine.
Regardless,
the caller is responsible for deallocating the returned memory.
To deallocate the returned memory,
free each returned memory pointer;
pointers inside the memory do not need to be individually freed.
\}
..
.\" Underlying function paragraph.
.\" This macro takes two arguments:
.\" + the function name
.\" + the utility name
.de Uf
The
.I \\$1
.Al function method
is the underlying function used by the
.IR \\$2 (1)
utility.
See the source code for the
.I \\$2
utility for an example of using
.I \\$1
in a UNIX environment.
..
.\" Underlying function paragraph, for C++.
.\" This macro takes three arguments:
.\" + the C++ method name
.\" + the function name for C
.\" + the utility name
.de Ux
The
.I \\$1
method is based on the C
.I \\$2
function, which
is the underlying function used by the
.IR \\$3 (1)
utility.
See the source code for the
.I \\$3
utility for an example of using
.I \\$2
in a UNIX environment.
..
.TH DB_INTRO 3 "December 2, 1997"
.UC 7
.SH "NAME
db \- the DB library overview and introduction
.SH "DESCRIPTION
.Gn
.PP
The DB library does not provide user interfaces,
data entry GUI's,
SQL support or any of the other standard user-level database interfaces.
What it does provide are the programmatic building blocks that allow you
to easily embed database-style functionality and support into other objects
or interfaces.
.SH "ARCHITECTURE
The DB library supports two different models of applications: client-server
and embedded.
.PP
In the client-server model,
a database server is created by writing an application that accepts requests
via some form of IPC and issues calls to the DB functions based on those
queries.
In this model,
applications are client programs that attach to the server and issue queries.
The client-server model trades performance for protection,
as it does not require that the applications share a protection domain with
the server,
but IPC/RPC is generally slower than a function call.
In addition,
this model simplifies the creation of network client-server applications.
.PP
In the embedded model,
an application links the DB library directly into its address space.
This provides for faster access to database functionality,
but means that the applications sharing log files, lock manager,
transaction manager or memory pool manager have the ability to read,
write, and corrupt each other's data.
.PP
It is the application designer's responsibility to select the appropriate
model for their application.
.PP
Applications require a single include file,
.IR <db2/db.h> ,
which must be installed in an appropriate location on the system.
.SH "C++
The C++ classes provide a thin wrapper around the C API,
with the major advantages being improved encapsulation and an optional
exception mechanism for errors.
.PP
The classes and methods are named in a fashion that directly corresponds
to structures and functions in the C interface.
Likewise, arguments to methods appear in the same order as the C interface,
except to remove the explicit ``this'' pointer.
The #defines used for flags are identical between the C and C++ interfaces.
.PP
As a rule, each C++ object has exactly one structure from the underlying C
API associated with it.
The C structure is allocated with each constructor call and deallocated
with each destructor call.
Thus, the rules the user needs to follow in allocating and deallocating
structures are the same between the C and C++ interfaces.
.PP
To ensure portability to many platforms, both new and old, we make few
assumptions about the C++ compiler and library.
For example, we do not expect STL, templates or namespaces to be available.
The newest C++ feature used is exceptions, which are used liberally to
transmit error information.
Even the use of exceptions can be disabled at runtime, by using
.IR DbEnv::set_error_model ()
(see
.IR DbEnv (3)).
For a discussion of the exception mechanism, see
.IR DbException (3).
.PP
For the rest of this manual page, C interfaces are listed as the primary
reference, and C++ interfaces following parenthetically, e.g.,
.I db_open
(\c
.IR Db::open ).
.SH "JAVA
The Java classes provide a layer around the C API that is almost
identical to the C++ layer.
The classes and methods are, for the most part identical to the C++
layer. Db constants and #defines are represented as "static final int"
values. Errors conditions appear as Java exceptions.
.PP
As in C++, each Java object has exactly one structure from the underlying C
API associated with it. The Java structure is allocated with each constructor
or open call, but is deallocated only when the Java GC does so. Because
the timing or ordering of GC is not predictable, the user should take
care to do a close() when finished with any object that has such a method.
.PP
.SH SUBSYSTEMS
The DB library is made up of five major subsystems, as follows:
.TP 5
Access methods
The access methods subsystem is made up of general-purpose support for
creating and accessing files formatted as B+tree's, hashed files, and
fixed and variable length records.
These modules are useful in the absence of transactions for processes
that need fast, formatted file support.
See
.IR db_open (3)
and
.IR db_cursor (3)
(\c
.IR Db (3)
and
.IR Dbc (3))
for more information.
.TP 5
Locking
The locking subsystem is a general-purpose lock manager used by DB.
This module is useful in the absence of the rest of the DB package for
processes that require
a fast, configurable lock manager.
See
.IR db_lock (3)
(\c
.IR DbLockTab (3)
and
.IR DbLock (3))
for more information.
.TP 5
Logging
The logging subsystem is the logging support used to support the DB
transaction model.
It is largely specific to the DB package,
and unlikely to be used elsewhere.
See
.IR db_log (3)
(\c
.IR DbLog (3))
for more information.
.TP 5
Memory Pool
The memory pool subsystem is the general-purpose shared memory buffer pool
used by DB.
This module is useful outside of the DB package for processes that require
page-oriented, cached, shared file access.
See
.IR db_mpool (3)
(\c
.IR DbMpool (3)
and
.IR DbMpoolFile (3))
for more information.
.TP 5
Transactions
The transaction subsystem implements the DB transaction model.
It is largely specific to the DB package.
See
.IR db_txn (3)
(\c
.IR DbTxnMgr (3)
and
.IR DbTxn (3))
for more information.
.PP
There are several stand-alone utilities that support the DB environment.
They are as follows:
.TP 5
db_archive
The
.I db_archive
utility supports database backup, archival and log file administration.
See
.IR db_archive (1)
for more information.
.TP 5
db_recover
The
.I db_recover
utility runs after an unexpected DB or system failure to restore the
database to a consistent state.
See
.IR db_recover (1)
for more information.
.TP 5
db_checkpoint
The
.I db_checkpoint
utility runs as a daemon process,
monitoring the database log and periodically issuing checkpoints.
See
.IR db_checkpoint (1)
for more information.
.TP 5
db_deadlock
The
.I db_deadlock
utility runs as a daemon process,
periodically traversing the database lock structures and aborting transactions
when it detects a deadlock.
See
.IR db_deadlock (1)
for more information.
.TP 5
db_dump
The
.I db_dump
utility writes a copy of the database to a flat-text file in a portable
format.
See
.IR db_dump (1)
for more information.
.TP 5
db_load
The
.I db_load
utility reads the flat-text file produced by
.IR db_dump ,
and loads it into a database file.
See
.IR db_load (1)
for more information.
.TP 5
db_stat
The
.I db_stat
utility displays statistics for databases and database environments.
See
.IR db_stat (1)
for more information.
.SH "NAMING AND THE DB ENVIRONMENT
The DB application environment is described by the
.IR db_appinit (3)
(\c
.IR DbEnv (3))
manual page.
The
.I db_appinit
(\c
.IR DbEnv::appinit )
function is used to create a consistent naming scheme for all of the
subsystems sharing a DB environment.
If
.I db_appinit
(\c
.IR DbEnv::appinit )
is not called by a DB application,
naming is performed as specified by the manual page for the specific
subsystem.
.PP
DB applications that run with additional privilege should always call the
.I db_appinit
(\c
.IR DbEnv::appinit )
function to initialize DB naming for their application.
This ensures that the environment variables DB_HOME and TMPDIR will only
be used if the application explicitly specifies that they are safe.
.SH "ADMINISTERING THE DB ENVIRONMENT
A DB environment consists of a database home directory and all the
long-running daemons necessary to ensure continued functioning of
DB and its applications.
In the presence of transactions, the checkpoint daemon,
.IR db_checkpoint ,
must be run as long as there are applications present (see
.IR db_checkpoint (1)
for details).
When locking is being used, the deadlock detection daemon,
.IR db_deadlock ,
must be run as long as there are applications present (see
.IR db_deadlock (1)
for details).
The
.I db_archive
utility provides information to facilitate log reclamation and
creation of database snapshots (see
.IR db_archive (1)
for details).
After application or system failure, the
.I db_recover
utility must be run before any applications are restarted
to return the database to a consistent state (see
.IR db_recover (1)
for details).
.PP
The simplest way to administer a DB application environment is to create a
single ``home'' directory that houses all the files for the applications
that are sharing the DB environment.
In this model,
the shared memory regions (i.e., the locking, logging, memory pool, and
transaction regions) and log files will be stored in the specified directory
hierarchy.
In addition,
all data files specified using relative pathnames will be named relative
to this home directory.
When recovery needs to be run (e.g., after system or application failure),
this directory is specified as the home directory to
.IR db_recover (1),
and the system is restored to a consistent state,
ready for the applications to be restarted.
.PP
In situations where further customization is desired,
such as placing the log files on a separate device,
it is recommended that the application installation process create a
configuration file named ``DB_CONFIG'' in the database home directory,
specifying the customization.
See
.IR db_appinit (3)
(\c
.IR DbEnv (3))
for details on this procedure.
.PP
The DB architecture does not support placing the shared memory regions on
remote filesystems, e.g.,
the Network File System (NFS) and the Andrew File System (AFS).
For this reason, the database home directory must reside on a local
filesystem.
Databases,
log files and temporary files may be placed on remote filesystems,
although the application may incur a performance penalty for doing so.
.PP
It is important to realize that all applications sharing a single home
directory implicitly trust each other.
They have access to each other's data as it resides in the shared memory
buffer pool and will share resources such as buffer space and locks.
At the same time,
any applications that access the same files
.B must
share an environment if consistency is to be maintained across the
different applications.
.SH "ERROR RETURNS
Except for the historic
.I dbm
and
.I hsearch
interfaces (see
.IR db_dbm (3)
and
.IR db_hsearch (3)),
DB does not use the global variable
.I errno
to return error values.
The return values for all DB functions can be grouped into three categories:
.TP 5
0
A return value of 0 indicates that the operation was successful.
.TP 5
>0
A return value that is greater than 0 indicates that there was a system
error.
The
.I errno
value returned by the system is returned by the function, e.g.,
when a DB function is unable to allocate memory,
the return value from the function will be ENOMEM.
.TP 5
<0
A return value that is less than 0 indicates a condition that was not
a system failure,
but was not an unqualified success, either.
For example,
a routine to retrieve a key/data pair from the database may return
DB_NOTFOUND when the key/data pair does not appear in the database,
as opposed to the value of 0, which would be returned if the key/data
pair were found in the database.
All such special values returned by DB functions are less than 0 in
order to avoid conflict with possible values of
.IR errno .
.PP
There are two special return values that are somewhat similar in meaning,
are returned in similar situations,
and therefore might be confused: DB_NOTFOUND and DB_KEYEMPTY.
The DB_NOTFOUND error return indicates that the requested key/data pair did
not exist in the database or that start- or end-of-file has been reached.
The DB_KEYEMPTY error return indicates that the requested key/data pair
logically exists but was never explicitly created by the application (the
recno access method will automatically create key/data pairs under some
circumstances, see
.IR db_open (3)
(\c
.IR Db (3))
for more information),
or that the requested key/data pair was deleted and is currently in a deleted
state.
.SH "SIGNALS
When applications using DB receive signals,
it is important that they exit gracefully,
discarding any DB locks that they may hold.
This is normally done by setting a flag when a signal arrives,
and then checking for that flag periodically within the application.
Specifically, the signal handler should not attempt to release locks
and/or close the database handles itself.
This is not guaranteed to work correctly and the results are undefined.
.PP
If an application exits holding a lock,
the situation is no different than if the application crashed,
and all applications participating in the database environment
must be shutdown, and then recovery must be performed.
If this is not done, the locks that the application held can cause
unresolvable deadlocks inside the database,
and applications may then hang.
.SH "MULTI-THREADING
See
.IR db_thread (3)
for information on using DB in threaded applications.
.SH "DATABASE AND PAGE SIZES
DB stores database file page numbers as unsigned 32-bit numbers
and database file page sizes as unsigned 16-bit numbers.
This results in a maximum database size of 2^48.
The minimum database page size is 512 bytes,
resulting in a minimum maximum database size of 2^41.
.PP
DB is potentially further limited if the host system does not have
filesystem support for files larger than 2^32,
including seeking to absolute offsets within such files.
.PP
The maximum btree depth is 255.
.SH "BYTE ORDERING
The database files created by DB can be created in either little or
big-endian formats.
By default, the native format of the machine on which the database
is created will be used.
Any format database can be used on a machine with a different native
format,
although it is possible that the application will incur a performance
penalty for the run-time conversion.
.SH "EXTENDING DB
DB includes tools to simplify the development of application-specific
logging and recovery.
Specifically,
given a description of the information to be logged,
these tools will automatically create logging functions (functions that take
the values as parameters and construct a single record that is written to
the log), read functions (functions that read a log record and unmarshall the
values into a structure that maps onto the values you chose to log),
a print function (for debugging),
templates for the recovery functions,
and automatic dispatching to your recovery functions.
.SH "EXAMPLES
There are a number of examples included with the DB library distribution,
intended to demonstrate various ways of using the DB library.
.PP
Some applications require the use of formatted files to store data,
but do not require concurrent access and can cope with the loss of
data due to catastrophic failure.
Generally,
these applications create short-lived databases that are discarded or
recreated when the system fails.
Such applications need only use the DB access methods.
The DB access methods will use the memory pool subsystem,
but the application is unlikely to do so explicitly.
See the files
.IR examples/ex_access.c ,
.IR examples/ex_btrec.c ,
.I examples_cxx/AccessExample.cpp
and
.I java/src/com/sleepycat/examples/AccessExample.java
in the DB source distribution for C, C++, and Java language code examples of
how such applications might use the DB library.
.PP
Some applications require the use formatted files to store data,
but also need to use
.IR db_appinit (3)
(\c
.IR DbEnv::appinit (3))
for environment initialization.
See the files
.IR examples/ex_appinit.c ,
.I examples_cxx/AppinitExample.cpp
or
.I java/src/com/sleepycat/examples/AppinitExample.java
in the DB source distribution for C, C++ and Java language code examples of how
such an application might use the DB library.
.\".PP
.\"Applications that wish to transaction protect structures other than
.\"the DB access methods.
.\"See the file
.\".I examples/ex_trans.c
.\"in the DB source distribution for a C language code example of how such
.\"an application might use the DB library.
.PP
Some applications use the DB access methods,
but are also concerned about catastrophic failure,
and therefore need to transaction protect the underlying DB files.
See the files
.IR examples/ex_tpcb.c ,
.I examples_cxx/TpcbExample.cpp
or
.I java/src/com/sleepycat/examples/TpcbExample.java
in the DB source distribution for C, C++ and Java language code examples of how
such an application might use the DB library.
.PP
Some applications will benefit from the ability to buffer input files
other than the underlying
DB access method files.
See the files
.I examples/ex_mpool.c
or
.I examples_cxx/MpoolExample.cpp
in the DB source distribution for C and C++ language code examples of how
such an application might use the DB library.
.PP
Some applications need a general-purpose lock manager separate from
locking support for the DB access methods.
See the files
.IR examples/ex_lock.c ,
.I examples_cxx/LockExample.cpp
or
.I java/src/com/sleepycat/examples/LockExample.java
in the DB source distribution for C, C++ and Java language code examples of how
such an application might use the DB library.
.PP
Some applications will use the DB access methods in a threaded fashion,
including trickle flushing of the underlying buffer pool and deadlock
detection.
See the file
.I examples/ex_thread.c
in the DB source distribution for a C language code example of how
such an application might use the DB library.
Note that the Java API assumes a threaded environment and performs
all thread-specific initialization automatically.
.SH "COMPATIBILITY
The DB 2.0 library provides backward compatible interfaces for the
historic UNIX
.IR dbm (3),
.IR ndbm (3)
and
.IR hsearch (3)
interfaces.
See
.IR db_dbm (3)
and
.IR db_hsearch (3)
for further information on these interfaces.
It also provides a backward compatible interface for the historic DB 1.85
release.
.ft B
DB 2.0 does not provide database compatibility for any of the above
interfaces,
and existing databases must be converted manually.
.ft R
To convert existing databases from the DB 1.85 format to the DB 2.0 format,
review the
.IR db_dump185 (1)
and
.IR db_load (1)
manual pages.
.PP
The name space in DB 2.0 has been changed from that of previous DB versions,
notably version 1.85, for portability and consistency reasons.
The only name collisions in the two libraries are the names used by the
.IR dbm (3),
.IR ndbm (3),
.IR hsearch (3)
and the DB 1.85 compatibility interfaces.
To include both DB 1.85 and DB 2.0 in a single library,
remove the
.IR dbm (3),
.IR ndbm (3)
and
.IR hsearch (3)
interfaces from either of the two libraries,
and the DB 1.85 compatibility interface from the DB 2.0 library.
This can be done by editing the library Makefiles and reconfiguring
and rebuilding the DB 2.0 library.
Obviously, if you use the historic interfaces, you will get the version
in the library from which you did not remove it.
Similarly, you will not be able to access DB 2.0 files using the DB 1.85
compatibility interface, since you have removed that from the library
as well.
.PP
It is possible to simply relink applications written to the DB 1.85 interface
against the DB 2.0 library.
Recompilation of such applications is slightly more complex.
When the DB 2.0 library is installed,
it installs two include files,
.I db2/db.h
and
.IR db2/db_185.h .
The former file is likely to replace the DB 1.85 version's include file
which had the same name.
If this did not happen,
recompiling DB 1.85 applications to use the DB 2.0 library is simple:
recompile as done historically, and load against the DB 2.0 library
instead of the DB 1.85 library.
If,
however,
the DB 2.0 installation process has replaced the system's
.I db.h
include file, replace the application's include of
.I db.h
with inclusion of
.IR db2/db_185.h ,
recompile as done historically,
and then load against the DB 2.0 library.
.PP
Applications written using the historic interfaces of the DB library should
not require significant effort to port to the DB 2.0 interfaces.
While the functionality has been greatly enhanced in DB 2.0,
the historic interface and functionality and is largely unchanged.
Reviewing the application's calls into the DB library and updating those
calls to the new names,
flags and return values should be sufficient.
.PP
While
loading applications that use the DB 1.85 interfaces against the DB 2.0
library,
or converting DB 1.85 function calls to DB 2.0 function calls will work,
reconsidering your application's interface to the DB database library in
light of the additional functionality in DB 2.0 is recommended,
as it is likely to result in enhanced application performance.
.SH "SEE ALSO: ADMINISTRATIVE AND OTHER UTILITIES
.\" make the line long for nroff.
.if n .ll 72
.na
.IR db_archive (1),
.IR db_checkpoint (1),
.IR db_deadlock (1),
.IR db_dump (1),
.IR db_load (1),
.IR db_recover (1),
.IR db_stat (1)
.SH "SEE ALSO: C API
.IR db_appinit (3),
.IR db_cursor (3),
.IR db_dbm (3),
.IR db_lock (3),
.IR db_log (3),
.IR db_mpool (3),
.IR db_open (3),
.IR db_txn (3)
.SH "SEE ALSO: C++ and Java API
.IR Db (3),
.IR Dbc (3),
.IR DbEnv (3),
.IR DbException (3),
.IR DbInfo (3),
.IR DbLock (3),
.IR DbLockTab (3),
.IR DbLog (3),
.IR DbLsn (3),
.IR DbMpool (3),
.IR DbMpoolFile (3),
.IR Dbt (3),
.IR DbTxn (3),
.IR DbTxnMgr (3)
.SH "SEE ALSO: ADDITIONAL REFERENCES
.IR "LIBTP: Portable, Modular Transactions for UNIX" ,
Margo Seltzer, Michael Olson, USENIX proceedings, Winter 1992.
|