summaryrefslogtreecommitdiffstats
path: root/src/util/db2/man
diff options
context:
space:
mode:
authorKen Raeburn <raeburn@mit.edu>2005-10-04 23:38:37 +0000
committerKen Raeburn <raeburn@mit.edu>2005-10-04 23:38:37 +0000
commit745cddfcd791359ff5ae5c2f33db3b196f6df481 (patch)
tree4a5081d158f5f0e3ec784b1c2190d9870dceaa41 /src/util/db2/man
parenta6759444a5cc94637576e92cf425efda13a791ea (diff)
Move the db2 library to the site of its one use, the kdb-db2 module.
Update configuration scripts, pathname make variables, etc., accordingly. git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@17407 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/util/db2/man')
-rw-r--r--src/util/db2/man/Makefile.inc7
-rw-r--r--src/util/db2/man/db.man.ps2295
-rw-r--r--src/util/db2/man/db_btree.3246
-rw-r--r--src/util/db2/man/db_hash.3138
-rw-r--r--src/util/db2/man/db_lock.3462
-rw-r--r--src/util/db2/man/db_log.3290
-rw-r--r--src/util/db2/man/db_mpool.3403
-rw-r--r--src/util/db2/man/db_open.3574
-rw-r--r--src/util/db2/man/db_recno.3268
-rw-r--r--src/util/db2/man/db_txn.3373
-rw-r--r--src/util/db2/man/spell.ok170
11 files changed, 0 insertions, 5226 deletions
diff --git a/src/util/db2/man/Makefile.inc b/src/util/db2/man/Makefile.inc
deleted file mode 100644
index f85cba1f8..000000000
--- a/src/util/db2/man/Makefile.inc
+++ /dev/null
@@ -1,7 +0,0 @@
-# @(#)Makefile.inc 8.2 (Berkeley) 11/14/94
-
-.PATH: ${.CURDIR}/db/man
-
-MAN3+= db_btree.0 db_hash.0 db_lock.0 db_log.0 db_mpool.0 db_open.0 \
- db_recno.0
-MLINKS+=db_open.3 db.3 db_open.3 dbopen.3
diff --git a/src/util/db2/man/db.man.ps b/src/util/db2/man/db.man.ps
deleted file mode 100644
index 23feea6e5..000000000
--- a/src/util/db2/man/db.man.ps
+++ /dev/null
@@ -1,2295 +0,0 @@
-%!PS-Adobe-3.0
-%%Creator: groff version 1.08
-%%DocumentNeededResources: font Times-Roman
-%%+ font Times-Bold
-%%+ font Times-Italic
-%%DocumentSuppliedResources: procset grops 1.08 0
-%%Pages: 28
-%%PageOrder: Ascend
-%%Orientation: Portrait
-%%EndComments
-%%BeginProlog
-%%BeginResource: procset grops 1.08 0
-/setpacking where{
-pop
-currentpacking
-true setpacking
-}if
-/grops 120 dict dup begin
-/SC 32 def
-/A/show load def
-/B{0 SC 3 -1 roll widthshow}bind def
-/C{0 exch ashow}bind def
-/D{0 exch 0 SC 5 2 roll awidthshow}bind def
-/E{0 rmoveto show}bind def
-/F{0 rmoveto 0 SC 3 -1 roll widthshow}bind def
-/G{0 rmoveto 0 exch ashow}bind def
-/H{0 rmoveto 0 exch 0 SC 5 2 roll awidthshow}bind def
-/I{0 exch rmoveto show}bind def
-/J{0 exch rmoveto 0 SC 3 -1 roll widthshow}bind def
-/K{0 exch rmoveto 0 exch ashow}bind def
-/L{0 exch rmoveto 0 exch 0 SC 5 2 roll awidthshow}bind def
-/M{rmoveto show}bind def
-/N{rmoveto 0 SC 3 -1 roll widthshow}bind def
-/O{rmoveto 0 exch ashow}bind def
-/P{rmoveto 0 exch 0 SC 5 2 roll awidthshow}bind def
-/Q{moveto show}bind def
-/R{moveto 0 SC 3 -1 roll widthshow}bind def
-/S{moveto 0 exch ashow}bind def
-/T{moveto 0 exch 0 SC 5 2 roll awidthshow}bind def
-/SF{
-findfont exch
-[exch dup 0 exch 0 exch neg 0 0]makefont
-dup setfont
-[exch/setfont cvx]cvx bind def
-}bind def
-/MF{
-findfont
-[5 2 roll
-0 3 1 roll
-neg 0 0]makefont
-dup setfont
-[exch/setfont cvx]cvx bind def
-}bind def
-/level0 0 def
-/RES 0 def
-/PL 0 def
-/LS 0 def
-/PLG{
-gsave newpath clippath pathbbox grestore
-exch pop add exch pop
-}bind def
-/BP{
-/level0 save def
-1 setlinecap
-1 setlinejoin
-72 RES div dup scale
-LS{
-90 rotate
-}{
-0 PL translate
-}ifelse
-1 -1 scale
-}bind def
-/EP{
-level0 restore
-showpage
-}bind def
-/DA{
-newpath arcn stroke
-}bind def
-/SN{
-transform
-.25 sub exch .25 sub exch
-round .25 add exch round .25 add exch
-itransform
-}bind def
-/DL{
-SN
-moveto
-SN
-lineto stroke
-}bind def
-/DC{
-newpath 0 360 arc closepath
-}bind def
-/TM matrix def
-/DE{
-TM currentmatrix pop
-translate scale newpath 0 0 .5 0 360 arc closepath
-TM setmatrix
-}bind def
-/RC/rcurveto load def
-/RL/rlineto load def
-/ST/stroke load def
-/MT/moveto load def
-/CL/closepath load def
-/FL{
-currentgray exch setgray fill setgray
-}bind def
-/BL/fill load def
-/LW/setlinewidth load def
-/RE{
-findfont
-dup maxlength 1 index/FontName known not{1 add}if dict begin
-{
-1 index/FID ne{def}{pop pop}ifelse
-}forall
-/Encoding exch def
-dup/FontName exch def
-currentdict end definefont pop
-}bind def
-/DEFS 0 def
-/EBEGIN{
-moveto
-DEFS begin
-}bind def
-/EEND/end load def
-/CNT 0 def
-/level1 0 def
-/PBEGIN{
-/level1 save def
-translate
-div 3 1 roll div exch scale
-neg exch neg exch translate
-0 setgray
-0 setlinecap
-1 setlinewidth
-0 setlinejoin
-10 setmiterlimit
-[]0 setdash
-/setstrokeadjust where{
-pop
-false setstrokeadjust
-}if
-/setoverprint where{
-pop
-false setoverprint
-}if
-newpath
-/CNT countdictstack def
-userdict begin
-/showpage{}def
-}bind def
-/PEND{
-clear
-countdictstack CNT sub{end}repeat
-level1 restore
-}bind def
-end def
-/setpacking where{
-pop
-setpacking
-}if
-%%EndResource
-%%IncludeResource: font Times-Roman
-%%IncludeResource: font Times-Bold
-%%IncludeResource: font Times-Italic
-grops begin/DEFS 1 dict def DEFS begin/u{.001 mul}bind def end/RES 72 def/PL
-792 def/LS false def/ENC0[/asciicircum/asciitilde/Scaron/Zcaron/scaron/zcaron
-/Ydieresis/trademark/quotesingle/.notdef/.notdef/.notdef/.notdef/.notdef
-/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef
-/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/.notdef/space
-/exclam/quotedbl/numbersign/dollar/percent/ampersand/quoteright/parenleft
-/parenright/asterisk/plus/comma/hyphen/period/slash/zero/one/two/three/four
-/five/six/seven/eight/nine/colon/semicolon/less/equal/greater/question/at/A/B/C
-/D/E/F/G/H/I/J/K/L/M/N/O/P/Q/R/S/T/U/V/W/X/Y/Z/bracketleft/backslash
-/bracketright/circumflex/underscore/quoteleft/a/b/c/d/e/f/g/h/i/j/k/l/m/n/o/p/q
-/r/s/t/u/v/w/x/y/z/braceleft/bar/braceright/tilde/.notdef/quotesinglbase
-/guillemotleft/guillemotright/bullet/florin/fraction/perthousand/dagger
-/daggerdbl/endash/emdash/ff/fi/fl/ffi/ffl/dotlessi/dotlessj/grave/hungarumlaut
-/dotaccent/breve/caron/ring/ogonek/quotedblleft/quotedblright/oe/lslash
-/quotedblbase/OE/Lslash/.notdef/exclamdown/cent/sterling/currency/yen/brokenbar
-/section/dieresis/copyright/ordfeminine/guilsinglleft/logicalnot/minus
-/registered/macron/degree/plusminus/twosuperior/threesuperior/acute/mu
-/paragraph/periodcentered/cedilla/onesuperior/ordmasculine/guilsinglright
-/onequarter/onehalf/threequarters/questiondown/Agrave/Aacute/Acircumflex/Atilde
-/Adieresis/Aring/AE/Ccedilla/Egrave/Eacute/Ecircumflex/Edieresis/Igrave/Iacute
-/Icircumflex/Idieresis/Eth/Ntilde/Ograve/Oacute/Ocircumflex/Otilde/Odieresis
-/multiply/Oslash/Ugrave/Uacute/Ucircumflex/Udieresis/Yacute/Thorn/germandbls
-/agrave/aacute/acircumflex/atilde/adieresis/aring/ae/ccedilla/egrave/eacute
-/ecircumflex/edieresis/igrave/iacute/icircumflex/idieresis/eth/ntilde/ograve
-/oacute/ocircumflex/otilde/odieresis/divide/oslash/ugrave/uacute/ucircumflex
-/udieresis/yacute/thorn/ydieresis]def/Times-Italic@0 ENC0/Times-Italic RE
-/Times-Bold@0 ENC0/Times-Bold RE/Times-Roman@0 ENC0/Times-Roman RE
-%%EndProlog
-%%Page: 1 1
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 113.45(DB_BTREE\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 113.45(anual DB_BTREE\(3\))340.17 48 R/F1 9/Times-Bold@0 SF -.18(NA)
-72 84 S(ME).18 E F0(db_btree \255 btree database access method)108 96 Q F1
-(DESCRIPTION)72 112.8 Q F0 .486(The DB library is a f)108 124.8 R .485
-(amily of groups of functions that pro)-.1 F .485
-(vides a modular programming interf)-.15 F .485(ace to trans-)-.1 F .822
-(actions and record-oriented \214le access.)108 136.8 R .822
-(The library includes support for transaction, locking, logging and)5.822 F
-.258(\214le b)108 148.8 R(uf)-.2 E .258(fering functionality)-.25 F 2.758(,a)
--.65 G 2.758(sw)223.214 148.8 S .258(ell as v)237.082 148.8 R .258(arious inde)
--.25 F -.15(xe)-.15 G 2.758(da).15 G .258(ccess methods.)331.434 148.8 R(Man)
-5.258 E 2.758(yo)-.15 G 2.758(ft)427.878 148.8 S .258
-(he functional groups \(e.g.)436.746 148.8 R .528(the memory pool functions\) \
-are useful independently of the rest of the DB functions, although some func-)
-108 160.8 R .306(tional groups are e)108 172.8 R .306
-(xplicitly based on other functional groups \(e.g.)-.15 F .306
-(transactions and logging\).)5.306 F -.15(Fo)5.306 G 2.806(rag).15 G(eneral)
-515.57 172.8 Q .245(description of transactions, see)108 184.8 R/F2 10
-/Times-Italic@0 SF(db_txn)2.745 E F0 2.745(\(3\). F).24 F .245
-(or a general description of the access methods, see)-.15 F F2(db_open)2.745 E
-F0(\(3\)).24 E .308(and then the indi)108 196.8 R .308
-(vidual access method manual pages:)-.25 F F2(db_btr)2.807 E(ee)-.37 E F0
-(\(3\),).18 E F2(db_hash)2.807 E F0(\(3\),).28 E F2(db_lo)2.807 E(g)-.1 E F0
-.307(\(3\) and).22 F F2(db_r)2.807 E(ecno)-.37 E F0(\(3\).).18 E -.15(Fo)108
-208.8 S 3.635(rag).15 G 1.135(eneral description of the lock manager)138.45
-208.8 R 3.635(,s)-.4 G(ee)307.32 208.8 Q F2(db_loc)3.635 E(k)-.2 E F0 3.635
-(\(3\). F).67 F 1.135(or a general description of the memory)-.15 F
-(pool manager)108 220.8 Q 2.5(,s)-.4 G(ee)171.2 220.8 Q F2(db_mpool)2.5 E F0
-(\(3\).).51 E
-(This manual page describes speci\214c details of the btree access method.)108
-237.6 Q 1.518(The btree data structure is a sorted, balanced tree structure st\
-oring associated k)108 254.4 R -.15(ey)-.1 G 1.517(/data pairs.).15 F
-(Searches,)6.517 E .598(insertions, and deletions in the btree will all comple\
-te in O lg base N where base is the a)108 266.4 R -.15(ve)-.2 G .598
-(rage \214ll f).15 F(actor)-.1 E(.)-.55 E .306
-(Often, inserting ordered data into btrees results in a lo)108 278.4 R 2.806
-<778c>-.25 G .305(ll f)341.61 278.4 R(actor)-.1 E 5.305(.T)-.55 G .305
-(his implementation has been modi\214ed)386.56 278.4 R(to mak)108 290.4 Q 2.5
-(eo)-.1 G(rdered insertion the best case, resulting in a much better than norm\
-al page \214ll f)147.34 290.4 Q(actor)-.1 E(.)-.55 E F1 -.495(AC)72 307.2 S
-(CESS METHOD SPECIFIC INFORMA).495 E(TION)-.855 E F0 .175
-(The btree access method speci\214c data structure pro)108 319.2 R .176
-(vided to)-.15 F F2(db_open)2.676 E F0 .176(is typedef)2.676 F 1.176 -.5('d a)
-.55 H .176(nd named BTREEINFO.).5 F 2.638(AB)108 331.2 S .138
-(TREEINFO structure has at least the follo)124.528 331.2 R .137
-(wing \214elds, which may be initialized before calling)-.25 F F2(db_open)2.637
-E F0(:).24 E(u_int cachesize;)108 348 Q 3.743(As)133 360 S 1.243
-(uggested maximum size \(in bytes\) of the memory cache.)147.853 360 R 1.243
-(This v)6.243 F 1.243(alue is)-.25 F/F3 10/Times-Bold@0 SF(only)3.743 E F0
-(advisory)3.743 E 3.744(,a)-.65 G 1.244(nd the)514.036 360 R .017
-(access method will allocate more memory rather than f)133 372 R 2.517
-(ail. Since)-.1 F -2.15 -.25(ev e)2.517 H .016(ry search e).25 F .016
-(xamines the root page)-.15 F 1.319
-(of the tree, caching the most recently used pages substantially impro)133 384
-R -.15(ve)-.15 G 3.82(sa).15 G 1.32(ccess time.)441.05 384 R 1.32(In addition,)
-6.32 F(ph)133 396 Q .911(ysical writes are delayed as long as possible, so a m\
-oderate cache can reduce the number of I/O)-.05 F 1.497
-(operations signi\214cantly)133 408 R 6.497(.O)-.65 G -.15(bv)243.674 408 S
-(iously).15 E 3.997(,u)-.65 G 1.497(sing a cache increases \(b)288.821 408 R
-1.498(ut only increases\) the lik)-.2 F 1.498(elihood of)-.1 F .336(corruption\
- or lost data if the system crashes while a tree is being modi\214ed.)133 420 R
-(If)5.336 E F2(cac)2.836 E(hesize)-.15 E F0 .335(is 0 \(no size)2.835 F
-(is speci\214ed\) a def)133 432 Q(ault cache is used.)-.1 E
-(int \(*compare\)\(const DBT *, const DBT *\);)108 448.8 Q .194
-(Compare is the k)133 460.8 R .494 -.15(ey c)-.1 H .194(omparison function.).15
-F .194(It must return an inte)5.194 F .194
-(ger less than, equal to, or greater than)-.15 F .656(zero if the \214rst k)133
-472.8 R .956 -.15(ey a)-.1 H -.18(rg).15 G .656
-(ument is considered to be respecti).18 F -.15(ve)-.25 G .655
-(ly less than, equal to, or greater than the).15 F .798(second k)133 484.8 R
-1.098 -.15(ey a)-.1 H -.18(rg).15 G 3.298(ument. The).18 F .798
-(same comparison function must be used on a gi)3.298 F -.15(ve)-.25 G 3.298(nt)
-.15 G .799(ree e)462.774 484.8 R -.15(ve)-.25 G .799(ry time it is).15 F 2.79
-(opened. If)133 496.8 R F2(compar)2.79 E(e)-.37 E F0 .29
-(is NULL \(no comparison function is speci\214ed\), the k)2.79 F -.15(ey)-.1 G
-2.79(sa).15 G .29(re compared le)451.08 496.8 R(xically)-.15 E(,)-.65 E
-(with shorter k)133 508.8 Q -.15(ey)-.1 G 2.5(sc).15 G
-(onsidered less than longer k)208.57 508.8 Q -.15(ey)-.1 G(s.).15 E
-(u_long \215ags;)108 525.6 Q(The \215ag v)133 537.6 Q(alue is speci\214ed by)
--.25 E F2(or)2.5 E F0('ing an).73 E 2.5(yo)-.15 G 2.5(ft)302.2 537.6 S
-(he follo)310.81 537.6 Q(wing v)-.25 E(alues:)-.25 E(R_DUP)133 554.4 Q .354
-(Permit duplicate k)158 566.4 R -.15(ey)-.1 G 2.854(si).15 G 2.854(nt)250.752
-566.4 S .355(he tree, i.e. permit insertion if the k)261.386 566.4 R .655 -.15
-(ey t)-.1 H 2.855(ob).15 G 2.855(ei)432.64 566.4 S .355(nserted already e)
-442.715 566.4 R .355(xists in)-.15 F 1.65(the tree.)158 578.4 R 1.65(The def)
-6.65 F 1.65(ault beha)-.1 F(vior)-.2 E 4.149(,a)-.4 G 4.149(sd)295.509 578.4 S
-1.649(escribed in)308.548 578.4 R F2(db_open)4.149 E F0 1.649(\(3\), is to o)
-.24 F -.15(ve)-.15 G 1.649(rwrite a matching k).15 F -.15(ey)-.1 G .783
-(when inserting a ne)158 590.4 R 3.283(wk)-.25 G 1.083 -.15(ey o)253.542 590.4
-T 3.283(rt).15 G 3.283(of)280.508 590.4 S .783(ail if the R_NOO)292.021 590.4 R
-(VER)-.5 E .784(WRITE \215ag is speci\214ed.)-.55 F .784(The R_DUP)5.784 F .129
-(\215ag is o)158 602.4 R -.15(ve)-.15 G .129(rridden by the R_NOO).15 F(VER)-.5
-E .128(WRITE \215ag, and if the R_NOO)-.55 F(VER)-.5 E .128
-(WRITE \215ag is spec-)-.55 F(i\214ed, attempts to insert duplicate k)158 614.4
-Q -.15(ey)-.1 G 2.5(si).15 G(nto the tree will f)314.69 614.4 Q(ail.)-.1 E .835
-(If the database contains duplicate k)158 631.2 R -.15(ey)-.1 G .835
-(s, the order of retrie).15 F -.25(va)-.25 G 3.335(lo).25 G 3.336(fk)414.7
-631.2 S -.15(ey)426.266 631.2 S .836(/data pairs is unde\214ned if).15 F(the)
-158 643.2 Q F2 -.1(ge)3.003 G(t).1 E F0 .503(function is used, ho)3.003 F(we)
--.25 E -.15(ve)-.25 G -.4(r,).15 G F2(seq)3.403 E F0 .502
-(function calls with the R_CURSOR \215ag set will al)3.003 F -.1(wa)-.1 G(ys).1
-E(return the logical `)158 655.2 Q(`\214rst')-.74 E 2.5('o)-.74 G 2.5(fa)263.72
-655.2 S .3 -.15(ny g)273.99 655.2 T(roup of duplicate k).15 E -.15(ey)-.1 G(s.)
-.15 E(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315
-(ution August)-.2 F(1, 1995)2.5 E(1)535 732 Q EP
-%%Page: 2 2
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 113.45(DB_BTREE\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 113.45(anual DB_BTREE\(3\))340.17 48 R(int lorder;)108 84 Q .65
-(The byte order for inte)133 96 R .65(gers in the stored database metadata.)
--.15 F .65(The number should represent the order)5.65 F .749(as an inte)133 108
-R .749(ger; for e)-.15 F .749(xample, big endian order w)-.15 F .749
-(ould be the number 4,321.)-.1 F(If)5.749 E/F1 10/Times-Italic@0 SF(lor)3.249 E
-(der)-.37 E F0 .749(is 0 \(no order is)3.249 F
-(speci\214ed\) the current host order is used.)133 120 Q(int maxk)108 136.8 Q
--.15(ey)-.1 G(page;).15 E .073(The maximum number of k)133 148.8 R -.15(ey)-.1
-G 2.573(sw).15 G .073(hich will be stored on an)266.155 148.8 R 2.574(ys)-.15 G
-.074(ingle page.)376.436 148.8 R .074(This functionality is not cur)5.074 F(-)
--.2 E(rently implemented.)133 160.8 Q(int mink)108 177.6 Q -.15(ey)-.1 G(page;)
-.15 E .532(The minimum number of k)133 189.6 R -.15(ey)-.1 G 3.031(sw).15 G
-.531(hich will be stored on an)266.787 189.6 R 3.031(ys)-.15 G .531
-(ingle page.)379.813 189.6 R .531(This v)5.531 F .531(alue is used to deter)
--.25 F(-)-.2 E .558(mine which k)133 201.6 R -.15(ey)-.1 G 3.058(sw).15 G .558
-(ill be stored on o)211.914 201.6 R -.15(ve)-.15 G(r\215o).15 E 3.058(wp)-.25 G
-.558(ages, i.e. if a k)319.424 201.6 R .859 -.15(ey o)-.1 H 3.059(rd).15 G .559
-(ata item is longer than the page-)408.336 201.6 R .063(size di)133 213.6 R
-.063(vided by the mink)-.25 F -.15(ey)-.1 G .063(page v).15 F .063
-(alue, it will be stored on o)-.25 F -.15(ve)-.15 G(r\215o).15 E 2.563(wp)-.25
-G .062(ages instead of in the page itself.)408.816 213.6 R(If)133 225.6 Q F1
-(mink)2.5 E -.3(ey)-.1 G(pa).3 E -.1(ge)-.1 G F0(is 0 \(no minimum number of k)
-2.6 E -.15(ey)-.1 G 2.5(si).15 G 2.5(ss)332.96 225.6 S(peci\214ed\) a v)343.24
-225.6 Q(alue of 2 is used.)-.25 E
-(size_t \(*pre\214x\)\(const DBT *, const DBT *\);)108 242.4 Q .691
-(Pre\214x is the pre\214x comparison function.)133 254.4 R .692
-(If speci\214ed, this function must return the number of bytes)5.691 F .195
-(of the second k)133 266.4 R .495 -.15(ey a)-.1 H -.18(rg).15 G .195
-(ument which are necessary to determine that it is greater than the \214rst k)
-.18 F .495 -.15(ey a)-.1 H -.18(rg).15 G(u-).18 E 2.994(ment. If)133 278.4 R
-.494(the k)2.994 F -.15(ey)-.1 G 2.994(sa).15 G .494(re equal, the k)211.376
-278.4 R .794 -.15(ey l)-.1 H .494(ength should be returned.).15 F .494
-(Note, the usefulness of this function)5.494 F .327(is v)133 290.4 R .327
-(ery data dependent, b)-.15 F .326(ut, in some data sets can produce signi\214\
-cantly reduced tree sizes and search)-.2 F 2.789(times. If)133 302.4 R F1(pr)
-2.789 E(e\214x)-.37 E F0 .289(is NULL \(no pre\214x function is speci\214ed\),)
-2.789 F/F2 10/Times-Bold@0 SF(and)2.789 E F0 .29
-(no comparison function is speci\214ed, a)2.79 F(def)133 314.4 Q .902(ault le)
--.1 F .902(xical comparison function is used.)-.15 F(If)5.901 E F1(pr)3.401 E
-(e\214x)-.37 E F0 .901(is NULL and a comparison function is speci-)3.401 F
-(\214ed, no pre\214x comparison is done.)133 326.4 Q(u_int psize;)108 343.2 Q
--.15(Pa)133 355.2 S .118
-(ge size is the size \(in bytes\) of the pages used for nodes in the tree.).15
-F .119(The minimum page size is 512)5.119 F .377
-(bytes and the maximum page size is 64K.)133 367.2 R(If)5.376 E F1(psize)2.876
-E F0 .376(is 0 \(no page size is speci\214ed\) a page size is cho-)2.876 F
-(sen based on the underlying \214le system I/O block size.)133 379.2 Q .79
-(If the \214le already e)108 396 R .79(xists \(and the O_TR)-.15 F .79
-(UNC \215ag is not speci\214ed\), the v)-.4 F .79
-(alues speci\214ed for the parameters)-.25 F
-(\215ags, lorder and psize are ignored in f)108 408 Q -.2(avo)-.1 G 2.5(ro).2 G
-2.5(ft)284.4 408 S(he v)293.01 408 Q(alues used when the tree w)-.25 E
-(as created.)-.1 E/F3 9/Times-Bold@0 SF(DB OPERA)72 424.8 Q(TIONS)-.855 E F0
-1.037(The functions returned by)108 436.8 R F1(db_open)3.537 E F0 1.036
-(for the btree access method are as described in)3.536 F F1(db_open)3.536 E F0
-1.036(\(3\), with the).24 F(follo)108 448.8 Q(wing e)-.25 E
-(xceptions and additions:)-.15 E 5.28(type The)108 465.6 R(type is DB_BTREE.)
-2.5 E 10.28(del Space)108 482.4 R 1.681(freed up by deleting k)4.181 F -.15(ey)
--.1 G 1.681(/data pairs from the tree is ne).15 F -.15(ve)-.25 G 4.181(rr).15 G
-1.682(eclaimed, although it is reused)411.342 482.4 R .734(where possible.)133
-494.4 R .734(This means that the btree storage structure is gro)5.734 F(w-only)
--.25 E 5.734(.T)-.65 G .734(he only solutions are to)443.734 494.4 R -.2(avo)
-133 506.4 S(id e).2 E(xcessi)-.15 E .3 -.15(ve d)-.25 H
-(eletions, or to create a fresh tree periodically from a scan of an e).15 E
-(xisting one.)-.15 E 9.72(put The)108 523.2 R F1(put)2.5 E F0(function tak)2.5
-E(es the follo)-.1 E(wing additional \215ags:)-.25 E(R_SETCURSOR)133 540 Q
-(Store the k)158 552 Q -.15(ey)-.1 G(/data pair).15 E 2.5(,s)-.4 G
-(etting or initializing the position of the cursor to reference it.)256.5 552 Q
-9.17(seq F)108 568.8 R(orw)-.15 E
-(ard sequential scans of a tree are from the least k)-.1 E .3 -.15(ey t)-.1 H
-2.5(ot).15 G(he greatest.)373.55 568.8 Q .892(The returned k)133 585.6 R 1.192
--.15(ey f)-.1 H .892(or the).15 F F1(seq)3.393 E F0 .893
-(function is not necessarily an e)3.393 F .893
-(xact match for the speci\214ed k)-.15 F 1.193 -.15(ey i)-.1 H 3.393(nt).15 G
-(he)530.56 585.6 Q .5(btree access method.)133 597.6 R .5(The returned k)5.5 F
-.8 -.15(ey i)-.1 H 3(st).15 G .499(he smallest k)307.04 597.6 R .799 -.15(ey g)
--.1 H .499(reater than or equal to the speci\214ed k).15 F -.15(ey)-.1 G(,)-.5
-E(permitting partial k)133 609.6 Q .3 -.15(ey m)-.1 H
-(atches and range searches.).15 E(The)133 626.4 Q F1(seq)2.5 E F0(function tak)
-2.5 E(es the follo)-.1 E(wing additional \215ags:)-.25 E(R_LAST)133 643.2 Q .04
-(The last k)158 655.2 R -.15(ey)-.1 G .04(/data pair of the database is return\
-ed, and the cursor is set or initialized to reference).15 F(it.)158 667.2 Q
-(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315
-(ution August)-.2 F(1, 1995)2.5 E(2)535 732 Q EP
-%%Page: 3 3
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 113.45(DB_BTREE\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 113.45(anual DB_BTREE\(3\))340.17 48 R(R_PREV)133 84 Q(Retrie)158 96
-Q .59 -.15(ve t)-.25 H .29(he k).15 F -.15(ey)-.1 G .29
-(/data pair immediately before the cursor).15 F 5.29(.I)-.55 G 2.79(ft)395.73
-96 S .29(he cursor is not yet set, this is the)404.63 96 R
-(same as the R_LAST \215ag.)158 108 Q/F1 9/Times-Bold@0 SF(ERR)72 124.8 Q(ORS)
--.27 E F0(The)108 136.8 Q/F2 10/Times-Italic@0 SF(btr)2.541 E(ee)-.37 E F0 .041
-(access method functions may f)2.541 F .041(ail and set)-.1 F F2(errno)2.541 E
-F0 .041(for an)2.541 F 2.541(yo)-.15 G 2.541(ft)376.152 136.8 S .041
-(he errors speci\214ed for the library func-)384.803 136.8 R(tion)108 148.8 Q
-F2(db_open)2.5 E F0(\(3\).).24 E F1(SEE ALSO)72 165.6 Q F2(db_hash)108 177.6 Q
-F0(\(3\),).28 E F2(db_loc)2.5 E(k)-.2 E F0(\(3\),).67 E F2(db_lo)2.5 E(g)-.1 E
-F0(\(3\),).22 E F2(db_mpool)2.5 E F0(\(3\),).51 E F2(db_open)2.5 E F0(\(3\),)
-.24 E F2(db_r)2.5 E(ecno)-.37 E F0(\(3\),).18 E F2(db_txn)2.5 E F0(\(3\)).24 E
-F2(The Ubiquitous B-tr)108 201.6 Q(ee)-.37 E F0 2.5(,D).18 G(ouglas Comer)
-209.47 201.6 Q 2.5(,A)-.4 G(CM Comput. Surv)276.72 201.6 Q 2.5(.1)-.65 G
-(1, 2 \(June 1979\), 121-138.)360.25 201.6 Q F2(Pr)108 225.6 Q 1.588
-(e\214x B-tr)-.37 F(ees)-.37 E F0 4.088(,B).27 G 1.587(ayer and Unterauer)
-177.636 225.6 R 4.087(,A)-.4 G 1.587(CM T)270.447 225.6 R 1.587
-(ransactions on Database Systems, V)-.35 F 1.587(ol. 2, 1 \(March 1977\),)-1.29
-F(11-26.)108 237.6 Q F2(The Art of Computer Pr)108 261.6 Q -.1(og)-.45 G -.15
-(ra).1 G(mming V).15 E(ol. 3: Sorting and Sear)-1.11 E -.15(ch)-.37 G(ing).15 E
-F0 2.5(,D).22 G(.E. Knuth, 1968, pp 471-480.)382 261.6 Q(4.4 Berk)72 732 Q(ele)
--.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315(ution August)-.2 F(1, 1995)2.5 E
-(3)535 732 Q EP
-%%Page: 1 4
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 117.9(DB_HASH\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 117.9(anual DB_HASH\(3\))340.17 48 R/F1 9/Times-Bold@0 SF -.18(NA)72
-84 S(ME).18 E F0(db_hash \255 hash database access method)108 96 Q F1
-(DESCRIPTION)72 112.8 Q F0 .485(The DB library is a f)108 124.8 R .485
-(amily of groups of functions that pro)-.1 F .486
-(vides a modular programming interf)-.15 F .486(ace to trans-)-.1 F .823
-(actions and record-oriented \214le access.)108 136.8 R .822
-(The library includes support for transaction, locking, logging and)5.822 F
-.258(\214le b)108 148.8 R(uf)-.2 E .258(fering functionality)-.25 F 2.758(,a)
--.65 G 2.758(sw)223.214 148.8 S .258(ell as v)237.082 148.8 R .258(arious inde)
--.25 F -.15(xe)-.15 G 2.758(da).15 G .258(ccess methods.)331.434 148.8 R(Man)
-5.258 E 2.758(yo)-.15 G 2.758(ft)427.878 148.8 S .258
-(he functional groups \(e.g.)436.746 148.8 R .528(the memory pool functions\) \
-are useful independently of the rest of the DB functions, although some func-)
-108 160.8 R .306(tional groups are e)108 172.8 R .306
-(xplicitly based on other functional groups \(e.g.)-.15 F .306
-(transactions and logging\).)5.306 F -.15(Fo)5.306 G 2.806(rag).15 G(eneral)
-515.57 172.8 Q .245(description of transactions, see)108 184.8 R/F2 10
-/Times-Italic@0 SF(db_txn)2.745 E F0 2.745(\(3\). F).24 F .245
-(or a general description of the access methods, see)-.15 F F2(db_open)2.745 E
-F0(\(3\)).24 E .307(and then the indi)108 196.8 R .307
-(vidual access method manual pages:)-.25 F F2(db_btr)2.808 E(ee)-.37 E F0
-(\(3\),).18 E F2(db_hash)2.808 E F0(\(3\),).28 E F2(db_lo)2.808 E(g)-.1 E F0
-.308(\(3\) and).22 F F2(db_r)2.808 E(ecno)-.37 E F0(\(3\).).18 E -.15(Fo)108
-208.8 S 3.635(rag).15 G 1.135(eneral description of the lock manager)138.45
-208.8 R 3.635(,s)-.4 G(ee)307.32 208.8 Q F2(db_loc)3.635 E(k)-.2 E F0 3.635
-(\(3\). F).67 F 1.135(or a general description of the memory)-.15 F
-(pool manager)108 220.8 Q 2.5(,s)-.4 G(ee)171.2 220.8 Q F2(db_mpool)2.5 E F0
-(\(3\).).51 E
-(This manual page describes speci\214c details of the hashing access method.)
-108 237.6 Q .59(The hash data structure is an e)108 254.4 R .591
-(xtensible, dynamic hashing scheme.)-.15 F(Backw)5.591 E .591
-(ard compatible interf)-.1 F .591(aces to the)-.1 F .209
-(functions described in)108 266.4 R F2(dbm)2.709 E F0 .209(\(3\), and).32 F F2
-(ndbm)2.709 E F0 .209(\(3\) are pro).32 F .209(vided, ho)-.15 F(we)-.25 E -.15
-(ve)-.25 G 2.708(rt).15 G .208(hese interf)382.71 266.4 R .208
-(aces are not compatible with)-.1 F(pre)108 278.4 Q(vious \214le formats.)-.25
-E F1 -.495(AC)72 295.2 S(CESS METHOD SPECIFIC INFORMA).495 E(TION)-.855 E F0
-.612(The hash access method speci\214c data structure pro)108 307.2 R .612
-(vided to)-.15 F F2(db_open)3.112 E F0 .612(is typedef)3.112 F 1.612 -.5('d a)
-.55 H .613(nd named HASHINFO.).5 F 2.5(AH)108 319.2 S
-(ASHINFO structure has at least the follo)124.94 319.2 Q
-(wing \214elds, which may be initialized before calling)-.25 E F2(db_open)2.5 E
-F0(:).24 E(u_int bsize;)108 336 Q F2(Bsize)133 348 Q F0 2.041
-(de\214nes the hash table b)4.541 F(uck)-.2 E 2.041(et size, and is, by def)-.1
-F 2.04(ault, 256 bytes.)-.1 F 2.04(It may be preferable to)7.04 F
-(increase the page size for disk-resident tables and tables with lar)133 360 Q
-(ge data items.)-.18 E(u_int cachesize;)108 376.8 Q 3.846(As)133 388.8 S 1.347
-(uggested maximum size, in bytes, of the memory cache.)147.956 388.8 R 1.347
-(This v)6.347 F 1.347(alue is)-.25 F/F3 10/Times-Bold@0 SF(only)3.847 E F0
-(advisory)3.847 E 3.847(,a)-.65 G 1.347(nd the)513.933 388.8 R
-(access method will allocate more memory rather than f)133 400.8 Q(ail.)-.1 E
-(u_int f)108 417.6 Q -.1(fa)-.25 G(ctor;).1 E F2(Ffactor)133 429.6 Q F0 1.17
-(indicates a desired density within the hash table.)3.67 F 1.169
-(It is an approximation of the number of)6.169 F -.1(ke)133 441.6 S 1.162
-(ys allo)-.05 F 1.162(wed to accumulate in an)-.25 F 3.662(yo)-.15 G 1.162
-(ne b)284.852 441.6 R(uck)-.2 E 1.162(et, determining when the hash table gro)
--.1 F 1.162(ws or shrinks.)-.25 F(The def)133 453.6 Q(ault v)-.1 E(alue is 8.)
--.25 E(u_int32_t \(*hash\)\(const v)108 470.4 Q(oid *, size_t\);)-.2 E F2(Hash)
-133 482.4 Q F0 .788(is a user de\214ned hash function.)3.288 F .787
-(Since no hash function performs equally well on all possible)5.788 F .017
-(data, the user may \214nd that the b)133 494.4 R .018
-(uilt-in hash function does poorly on a particular data set.)-.2 F .018
-(User speci-)5.018 F 1.154(\214ed hash functions must tak)133 506.4 R 3.654(et)
--.1 G 1.354 -.1(wo a)260.61 506.4 T -.18(rg).1 G 1.154
-(uments \(a pointer to a byte string and a length\) and return a).18 F
-(32-bit quantity to be used as the hash v)133 518.4 Q(alue.)-.25 E .665
-(If a hash function is speci\214ed,)133 535.2 R F2(hash_open)3.165 E F0 .666
-(will attempt to determine if the hash function speci\214ed is)3.166 F
-(the same as the one with which the database w)133 547.2 Q
-(as created, and will f)-.1 E(ail if it is not.)-.1 E(int lorder;)108 564 Q .65
-(The byte order for inte)133 576 R .65(gers in the stored database metadata.)
--.15 F .65(The number should represent the order)5.65 F .748(as an inte)133 588
-R .749(ger; for e)-.15 F .749(xample, big endian order w)-.15 F .749
-(ould be the number 4,321.)-.1 F(If)5.749 E F2(lor)3.249 E(der)-.37 E F0 .749
-(is 0 \(no order is)3.249 F .456(speci\214ed\) the current host order is used.)
-133 600 R .456(If the)5.456 F .456(\214le already e)5.456 F .456
-(xists, the speci\214ed v)-.15 F .455(alue is ignored and)-.25 F(the v)133 612
-Q(alue speci\214ed when the tree w)-.25 E(as created is used.)-.1 E
-(u_int nelem;)108 628.8 Q F2(Nelem)133 640.8 Q F0 1.225
-(is an estimate of the \214nal size of the hash table.)3.724 F 1.225
-(If not set or set too lo)6.225 F 2.525 -.65(w, h)-.25 H 1.225(ash tables will)
-.65 F -.15(ex)133 652.8 S 1.294(pand gracefully as k).15 F -.15(ey)-.1 G 3.794
-(sa).15 G 1.294(re entered, although a slight performance de)248.296 652.8 R
-1.293(gradation may be noticed.)-.15 F(The def)133 664.8 Q(ault v)-.1 E
-(alue is 1.)-.25 E .79(If the \214le already e)108 681.6 R .79
-(xists \(and the O_TR)-.15 F .79(UNC \215ag is not speci\214ed\), the v)-.4 F
-.79(alues speci\214ed for the parameters)-.25 F(bsize, f)108 693.6 Q -.1(fa)
--.25 G(ctor).1 E 2.5(,l)-.4 G(order and nelem are ignored and the v)167.23
-693.6 Q(alues speci\214ed when the tree w)-.25 E(as created are used.)-.1 E
-(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315
-(ution August)-.2 F(1, 1995)2.5 E(1)535 732 Q EP
-%%Page: 2 5
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 117.9(DB_HASH\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 117.9(anual DB_HASH\(3\))340.17 48 R/F1 9/Times-Bold@0 SF(DB OPERA)
-72 84 Q(TIONS)-.855 E F0(The functions returned by)108 96 Q/F2 10
-/Times-Italic@0 SF(db_open)2.5 E F0
-(for the hash access method are as described in)2.5 E F2(db_open)2.5 E F0
-(\(3\).).24 E F1(ERR)72 112.8 Q(ORS)-.27 E F0(The)108 124.8 Q F2(hash)2.609 E
-F0 .109(access method functions may f)2.609 F .109(ail and set)-.1 F F2(errno)
-2.609 E F0 .109(for an)2.609 F 2.609(yo)-.15 G 2.609(ft)375.678 124.8 S .109
-(he errors speci\214ed for the library func-)384.397 124.8 R(tion)108 136.8 Q
-F2(db_open)2.5 E F0(\(3\).).24 E F1(SEE ALSO)72 153.6 Q F2(db_btr)108 165.6 Q
-(ee)-.37 E F0(\(3\),).18 E F2(db_loc)2.5 E(k)-.2 E F0(\(3\),).67 E F2(db_lo)2.5
-E(g)-.1 E F0(\(3\),).22 E F2(db_mpool)2.5 E F0(\(3\),).51 E F2(db_open)2.5 E F0
-(\(3\),).24 E F2(db_r)2.5 E(ecno)-.37 E F0(\(3\),).18 E F2(db_txn)2.5 E F0
-(\(3\)).24 E F2(Dynamic Hash T)108 189.6 Q(ables)-.92 E F0 2.5(,P).27 G(er)
-206.79 189.6 Q(-Ak)-.2 E 2.5(eL)-.1 G(arson, Communications of the A)242.86
-189.6 Q(CM, April 1988.)-.4 E F2 2.5(AN)108 213.6 S .3 -.15(ew H)123.28 213.6 T
-(ash P).15 E(ac)-.8 E(ka)-.2 E .2 -.1(ge f)-.1 H(or UNIX).1 E F0 2.5(,M).94 G
-(ar)248.41 213.6 Q(go Seltzer)-.18 E 2.5(,U)-.4 G(SENIX Proceedings, W)308.09
-213.6 Q(inter 1991.)-.4 E(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)
-132.57 732 Q 99.315(ution August)-.2 F(1, 1995)2.5 E(2)535 732 Q EP
-%%Page: 1 6
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 117.9(DB_LOCK\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 117.9(anual DB_LOCK\(3\))340.17 48 R/F1 9/Times-Bold@0 SF -.18(NA)72
-84 S(ME).18 E F0(db_lock \255 general purpose lock manager)108 96 Q F1
-(SYNOPSIS)72 112.8 Q/F2 10/Times-Bold@0 SF(#include <db_lock.h>)108 124.8 Q
-(int)108 148.8 Q(lock_cr)108 160.8 Q(eate\(const char *path, mode_t mode,)-.18
-E(int lock_modes, const int8_t con\215icts[][], u_int maxlocks\);)158 172.8 Q
-(LOCK_T)108 196.8 Q(ABLE_T *)-.9 E(lock_open\(const char *path\);)108 208.8 Q
-(int)108 232.8 Q(lock_v)108 244.8 Q(ec\(LOCK_T)-.1 E(ABLE_T *lt, DBT *lock)-.9
-E(er)-.1 E 2.5(,s)-.92 G(truct timespec *timeout,)308.21 244.8 Q
-(LOCK_REQ_T list[], int nlist, LOCK_REQ_T **elistp, DBT *con\215ict\);)158
-256.8 Q(int)108 280.8 Q(lock_get\(LOCK_T)108 292.8 Q
-(ABLE_T *lt, const DBT *lock)-.9 E(er)-.1 E(,)-.92 E
-(const DBT *obj, const lock_mode_t lock_mode, LOCK_T **lockp\);)158 304.8 Q
-(int)108 328.8 Q(lock_put\(LOCK_T *lockp\);)108 340.8 Q(int)108 364.8 Q
-(lock_close\(LOCK_T)108 376.8 Q(ABLE_T *lt\);)-.9 E(int)108 400.8 Q
-(lock_unlink\(const char *path, int f)108 412.8 Q(or)-.25 E(ce\);)-.18 E F1
-(DESCRIPTION)72 429.6 Q F0 .485(The DB library is a f)108 441.6 R .485
-(amily of groups of functions that pro)-.1 F .486
-(vides a modular programming interf)-.15 F .486(ace to trans-)-.1 F .823
-(actions and record-oriented \214le access.)108 453.6 R .822
-(The library includes support for transaction, locking, logging and)5.822 F
-.258(\214le b)108 465.6 R(uf)-.2 E .258(fering functionality)-.25 F 2.758(,a)
--.65 G 2.758(sw)223.214 465.6 S .258(ell as v)237.082 465.6 R .258(arious inde)
--.25 F -.15(xe)-.15 G 2.758(da).15 G .258(ccess methods.)331.434 465.6 R(Man)
-5.258 E 2.758(yo)-.15 G 2.758(ft)427.878 465.6 S .258
-(he functional groups \(e.g.)436.746 465.6 R .528(the memory pool functions\) \
-are useful independently of the rest of the DB functions, although some func-)
-108 477.6 R .306(tional groups are e)108 489.6 R .306
-(xplicitly based on other functional groups \(e.g.)-.15 F .306
-(transactions and logging\).)5.306 F -.15(Fo)5.306 G 2.806(rag).15 G(eneral)
-515.57 489.6 Q .245(description of transactions, see)108 501.6 R/F3 10
-/Times-Italic@0 SF(db_txn)2.745 E F0 2.745(\(3\). F).24 F .245
-(or a general description of the access methods, see)-.15 F F3(db_open)2.745 E
-F0(\(3\)).24 E .307(and then the indi)108 513.6 R .307
-(vidual access method manual pages:)-.25 F F3(db_btr)2.808 E(ee)-.37 E F0
-(\(3\),).18 E F3(db_hash)2.808 E F0(\(3\),).28 E F3(db_lo)2.808 E(g)-.1 E F0
-.308(\(3\) and).22 F F3(db_r)2.808 E(ecno)-.37 E F0(\(3\).).18 E -.15(Fo)108
-525.6 S 3.635(rag).15 G 1.135(eneral description of the lock manager)138.45
-525.6 R 3.635(,s)-.4 G(ee)307.32 525.6 Q F3(db_loc)3.635 E(k)-.2 E F0 3.635
-(\(3\). F).67 F 1.135(or a general description of the memory)-.15 F
-(pool manager)108 537.6 Q 2.5(,s)-.4 G(ee)171.2 537.6 Q F3(db_mpool)2.5 E F0
-(\(3\).).51 E
-(This manual page describes speci\214c details of the locking interf)108 554.4
-Q(ace.)-.1 E F3(Db_loc)108 571.2 Q(k)-.2 E F0 .346(is the library interf)2.846
-F .346(ace intended to pro)-.1 F .346(vide general-purpose locking.)-.15 F .347
-(While designed to w)5.347 F .347(ork with)-.1 F .946(the other DB functions, \
-these functions are also useful for more general locking purposes.)108 583.2 R
-.946(Locks can be)5.946 F(shared between processes.)108 595.2 Q .682
-(The function)108 612 R F3(loc)3.182 E(k_cr)-.2 E(eate)-.37 E F0 .683
-(creates and initializes the lock table identi\214ed by the)3.182 F F3(path)
-3.183 E F0(directory)3.183 E 5.683(.T)-.65 G .683(his direc-)501.827 612 R .565
-(tory must already e)108 624 R .565(xist when)-.15 F F3(loc)3.065 E(k_cr)-.2 E
-(eate)-.37 E F0 .565(is called.)3.065 F .565(If the lock table identi\214ed by)
-5.565 F F3(path)3.064 E F0 .564(already e)3.064 F .564(xists, then)-.15 F F3
-(loc)108 636 Q(k_cr)-.2 E(eate)-.37 E F0 .974
-(returns success without further action.)3.474 F .974
-(The \214les associated with the lock table are created in)5.974 F 2.017
-(the directory speci\214ed by)108 648 R F3(path)4.517 E F0 7.017(.\().28 G
-2.017(The group of the created \214les is based on the system and directory)
-250.846 648 R(def)108 660 Q .076(aults, and is not further speci\214ed by)-.1 F
-F3(loc)2.576 E(k_cr)-.2 E(eate)-.37 E F0 2.576(.\) All).18 F .076
-(\214les created by)2.576 F F3(loc)2.576 E(k_cr)-.2 E(eate)-.37 E F0 .077
-(are created with mode)2.577 F F3(mode)108 672 Q F0(\(as described in)2.5 E F3
--.15(ch)2.5 G(mod).15 E F0(\(2\)\) and modi\214ed by the process' umask v).77 E
-(alue \(see)-.25 E F3(umask)2.5 E F0(\(2\)\).).67 E .739(The parameter)108
-688.8 R F3(loc)3.239 E(k_modes)-.2 E F0 .739(is the number of lock modes to be\
- recognized by the lock table \(including the)3.239 F(4.4 Berk)72 732 Q(ele)-.1
-E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315(ution August)-.2 F(1, 1995)2.5 E(1)
-535 732 Q EP
-%%Page: 2 7
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 117.9(DB_LOCK\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 117.9(anual DB_LOCK\(3\))340.17 48 R -.74(``)108 84 S(not-granted')
-.74 E 2.5('m)-.74 G 2.5(ode\). The)176.22 84 R(parameter)2.5 E/F1 10
-/Times-Italic@0 SF(con\215icts)2.5 E F0(is an)2.5 E F1(loc)2.5 E(k_modes)-.2 E
-F0(by)2.5 E F1(loc)2.5 E(k_modes)-.2 E F0(array)2.5 E 5(.A)-.65 G(non-0 v)
-467.59 84 Q(alue for:)-.25 E(con\215icts[requested_mode][held_mode])158 108 Q
-.174(indicates that)108 132 R F1 -.37(re)2.674 G(quested_mode).37 E F0(and)
-2.674 E F1(held_mode)2.674 E F0 2.675(con\215ict. The)2.674 F -.74(``)2.675 G
-(not-granted').74 E 2.675('m)-.74 G .175(ode must be represented by 0.)419.705
-132 R(The include \214le <db_lock.h> declares tw)108 148.8 Q 2.5(oc)-.1 G
-(ommonly used con\215ict arrays:)283.87 148.8 Q(int lock_sx_n;)108 165.6 Q
-(const int8_t lock_sx_c[lock_sx_n][lock_sx_n];)108 177.6 Q(These v)133 189.6 Q
-(ariables specify a con\215ict array for a simple scheme using shared and e)
--.25 E(xclusi)-.15 E .3 -.15(ve l)-.25 H(ock modes.).15 E(int lock_g_n;)108
-206.4 Q(const int8_t lock_g_c[lock_g_n][lock_g_n];)108 218.4 Q 1.071(These v)
-133 230.4 R 1.071(ariables specify a con\215ict array that in)-.25 F -.2(vo)-.4
-G(lv).2 E 1.071(es v)-.15 F 1.07
-(arious intent lock modes \(e.g. intent shared\))-.25 F
-(that are used for multigranularity locking.)133 242.4 Q 1.53
-(In addition, <db_lock.h> de\214nes the follo)108 259.2 R 1.531
-(wing macros that name lock modes for use with the standard)-.25 F(tables abo)
-108 271.2 Q -.15(ve)-.15 G(:).15 E(LOCK_IS)144 288 Q(intent shared)169 300 Q
-(LOCK_IX)144 312 Q(intent e)169 324 Q(xclusi)-.15 E -.15(ve)-.25 G(LOCK_NG)144
-336 Q(not granted \(al)169 348 Q -.1(wa)-.1 G(ys 0\)).1 E(LOCK_S)144 360 Q
-(shared)169 372 Q(LOCK_SIX)144 384 Q(shared/intent e)169 396 Q(xclusi)-.15 E
--.15(ve)-.25 G(LOCK_X)144 408 Q -.15(ex)169 420 S(clusi).15 E -.15(ve)-.25 G F1
-(Maxloc)108 436.8 Q(ks)-.2 E F0 .442(is the maximum number of locks to be held\
- or requested in the table, and is used by)2.942 F F1(loc)2.941 E(k_cr)-.2 E
-(eate)-.37 E F0(to estimate ho)108 448.8 Q 2.5(wm)-.25 G
-(uch space to allocate for v)181.36 448.8 Q(arious lock-table data structures.)
--.25 E(The function)108 465.6 Q F1(loc)2.5 E(k_cr)-.2 E(eate)-.37 E F0
-(returns -1 on f)2.5 E(ailure, setting)-.1 E F1(errno)2.5 E F0 2.5(,a).18 G
-(nd 0 on success.)356.07 465.6 Q .202(The function)108 482.4 R F1(loc)2.703 E
-(k_open)-.2 E F0 .203(returns a pointer to the lock table identi\214ed by)2.703
-F F1(path)2.703 E F0 2.703(,w).28 G .203(hich must ha)425.678 482.4 R .503 -.15
-(ve a)-.2 H .203(lready been).15 F 1.162(created by a call to)108 494.4 R F1
-(loc)3.661 E(k_cr)-.2 E(eate)-.37 E F0 6.161(.T).18 G 1.161(he process must ha)
-252.869 494.4 R 1.461 -.15(ve p)-.2 H 1.161
-(ermission to read and write \214les with o).15 F(wners,)-.25 E .06
-(groups and permissions as described for)108 506.4 R F1(loc)2.56 E(k_cr)-.2 E
-(eate)-.37 E F0 5.06(.T).18 G(he)331.04 506.4 Q F1(loc)2.56 E(k_open)-.2 E F0
-.06(function returns NULL on f)2.56 F .06(ailure, set-)-.1 F(ting)108 518.4 Q
-F1(errno)2.5 E F0(.).18 E .986(The function)108 535.2 R F1(loc)3.486 E(k_vec)
--.2 E F0 .986
-(atomically obtains and releases one or more locks from the designated table.)
-3.486 F(The)5.986 E(function)108 547.2 Q F1(loc)4.52 E(k_vec)-.2 E F0 2.02(is \
-intended to support acquisition or trading of multiple locks under one lock ta\
-ble)4.52 F(semaphore, as is needed for lock coupling or in multigranularity lo\
-cking for lock escalation.)108 559.2 Q .746(If an)108 576 R 3.246(yo)-.15 G
-3.246(ft)140.442 576 S .746(he requested locks cannot be acquired or an)149.798
-576 R 3.246(yo)-.15 G 3.246(ft)342.786 576 S .746
-(he locks to be released cannot be released, no)352.142 576 R .117
-(locks are acquired and no locks are released, and)108 588 R F1(loc)2.617 E
-(k_vec)-.2 E F0 .117(returns an error)2.617 F 5.117(.T)-.55 G .117(he function)
-419.211 588 R F1(loc)2.617 E(k_vec)-.2 E F0 .118(returns 0)2.617 F 1.143
-(on success.)108 600 R 1.143(If an error occurs,)6.143 F F1(loc)3.642 E(k_vec)
--.2 E F0 1.142(returns one of the follo)3.642 F 1.142(wing v)-.25 F 3.642
-(alues. In)-.25 F 1.142(addition, if)3.642 F F1(elistp)3.642 E F0 1.142(is not)
-3.642 F(NULL, it is set to point to the LOCK_REQ_T entry which w)108 612 Q
-(as being processed when the error occurred.)-.1 E(LOCK_GET_DEADLOCK)108 628.8
-Q .431(The speci\214ed)133 640.8 R F1(loc)2.931 E -.1(ke)-.2 G(r).1 E F0 -.1
-(wa)2.931 G 2.931(ss).1 G .431(elected as a victim in order to resolv)239.854
-640.8 R 2.932(ead)-.15 G 2.932(eadlock. In)407.718 640.8 R .432
-(this case, if the)2.932 F F1(con-)2.932 E(\215ict)133 652.8 Q F0(ar)2.901 E
-.401(gument is non-NULL, it is set to reference the identity of a lock)-.18 F
-.4(er holding the lock referenced)-.1 F(by)133 664.8 Q F1(elistp)2.585 E F0
-.085(at the time the request w)2.585 F .085(as denied.)-.1 F .086
-(\(This identity resides in static memory and may be o)5.086 F -.15(ve)-.15 G
--.2(r-).15 G(written by subsequent calls to)133 676.8 Q F1(loc)2.5 E(k_vec)-.2
-E F0(\).).31 E(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q
-99.315(ution August)-.2 F(1, 1995)2.5 E(2)535 732 Q EP
-%%Page: 3 8
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 117.9(DB_LOCK\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 117.9(anual DB_LOCK\(3\))340.17 48 R(LOCK_GET_ERR)108 84 Q(OR)-.4 E
-(An error occurred and the e)133 96 Q(xternal v)-.15 E(ariable)-.25 E/F1 10
-/Times-Italic@0 SF(errno)2.5 E F0(has been set to indicate the error)2.5 E(.)
--.55 E(LOCK_GET_NO)108 112.8 Q(THELD)-.4 E
-(The lock cannot be released, as it w)133 124.8 Q(as not held by the)-.1 E F1
-(loc)2.5 E -.1(ke)-.2 G(r).1 E F0(.).73 E(LOCK_GET_RESOURCE)108 141.6 Q 2.311(\
-The lock manager is unable to grant the requested locks because of limited int\
-ernal resources.)133 153.6 R(\(Releasing locks may allo)133 165.6 Q 2.5(wf)-.25
-G(uture calls to)249.4 165.6 Q F1(loc)2.5 E(k_vec)-.2 E F0(to succeed.\))2.5 E
-(LOCK_GET_TIMEOUT)108 182.4 Q 3.204(At)133 194.4 S .704(imeout ar)146.204 194.4
-R .704(gument w)-.18 F .705(as speci\214ed, and the requested locks were not a)
--.1 F -.25(va)-.2 G .705(ilable soon enough.).25 F .705(In this)5.705 F .625
-(case, if the)133 206.4 R F1(con\215ict)3.125 E F0(ar)3.125 E .624
-(gument is non-NULL, it is set to reference the identity of a lock)-.18 F .624
-(er holding the)-.1 F .551(lock referenced by)133 218.4 R F1(elistp)3.052 E F0
-.552(at the time the request w)3.052 F .552(as denied.)-.1 F .552
-(\(This identity resides in static memory)5.552 F(and may be o)133 230.4 Q -.15
-(ve)-.15 G(rwritten by subsequent calls to).15 E F1(loc)2.5 E(k_vec)-.2 E F0
-(\).).31 E(The)108 247.2 Q F1(loc)3.005 E -.1(ke)-.2 G(r).1 E F0(ar)3.005 E
-.504(gument speci\214ed to)-.18 F F1(loc)3.004 E(k_vec)-.2 E F0 .504
-(is a pointer to an untyped byte string which identi\214es the entity)3.004 F
-(requesting or releasing the lock.)108 259.2 Q(If)5 E F1(loc)2.5 E -.1(ke)-.2 G
-(r).1 E F0(is NULL, the calling process' pid is used instead.)2.5 E(The)108 276
-Q F1(timeout)4.628 E F0(ar)4.628 E 2.128(gument pro)-.18 F 2.128(vided to)-.15
-F F1(loc)4.628 E(k_vec)-.2 E F0 2.128(speci\214es a maximum interv)4.628 F
-2.128(al to w)-.25 F 2.128(ait for the locks to be)-.1 F 2.642(granted. If)108
-288 R F1(timeout)2.642 E F0 .142(is NULL, it is ignored, and)2.642 F F1(loc)
-2.642 E(k_vec)-.2 E F0 .141
-(will not return until all of the locks are acquired or)2.642 F
-(an error has occurred.)108 300 Q(The)108 316.8 Q F1(list)4.263 E F0 1.764
-(array pro)4.263 F 1.764(vided to)-.15 F F1(loc)4.264 E(k_vec)-.2 E F0 1.764
-(is typedef)4.264 F 2.764 -.5('d i).55 H 4.264(n<).5 G 1.764
-(db_lock.h> as LOCK_REQ_T)331.114 316.8 R 6.764(.A)-.74 G(LOCK_REQ_T)476.67
-316.8 Q(structure has at least the follo)108 328.8 Q
-(wing \214elds, which must be initialized before calling)-.25 E F1(loc)2.5 E
-(k_vec)-.2 E F0(:).31 E(enum lock)108 345.6 Q(op op;)-.1 E
-(The operation to be performed, which must be set to one of the follo)133 357.6
-Q(wing v)-.25 E(alues:)-.25 E(LOCK_GET)133 374.4 Q .201
-(Get a lock, as de\214ned by the v)158 386.4 R .201(alues of)-.25 F F1(loc)
-2.701 E -.1(ke)-.2 G(r).1 E F0(,).73 E F1(obj)2.701 E F0(and)2.7 E F1(loc)2.7 E
-(k_mode)-.2 E F0 5.2(.U).18 G .2(pon return from)435.99 386.4 R F1(loc)2.7 E
-(k_vec)-.2 E F0(,).31 E .161(if the)158 398.4 R F1(loc)2.661 E(kp)-.2 E F0 .162
-(\214eld is non-NULL, a reference to the acquired lock is stored there.)2.662 F
-.162(\(This reference)5.162 F(is in)158 410.4 Q -.25(va)-.4 G(lidated by an).25
-E 2.5(yc)-.15 G(all to)247.19 410.4 Q F1(loc)2.5 E(k_vec)-.2 E F0(or)2.5 E F1
-(loc)2.5 E(k_put)-.2 E F0(which releases the lock.\))2.5 E(LOCK_PUT)133 427.2 Q
-(The lock referenced by the contents of the)158 439.2 Q F1(loc)2.5 E(kp)-.2 E
-F0(\214eld is released.)2.5 E(LOCK_PUT_ALL)133 456 Q .759
-(All locks held by the)158 468 R F1(loc)3.259 E -.1(ke)-.2 G(r).1 E F0 .759
-(are released.)3.259 F(\(An)5.759 E 3.259(yl)-.15 G .759
-(ocks acquired as a part of the current call to)358.501 468 R F1(loc)158 480 Q
-(k_vec)-.2 E F0(are not considered for this operation\).)2.5 E(LOCK_PUT_OBJ)133
-496.8 Q 1.409(All locks held by the)158 508.8 R F1(loc)3.909 E -.1(ke)-.2 G(r)
-.1 E F0 3.909(,o).73 G 3.909(nt)287.704 508.8 S 1.409(he object)299.393 508.8 R
-F1(obj)3.909 E F0 3.909(,w).48 G 1.41(ith the mode speci\214ed by)367.98 508.8
-R F1(loc)3.91 E(k_mode)-.2 E F0 3.91(,a).18 G(re)532.23 508.8 Q 2.802
-(released. A)158 520.8 R F1(loc)2.802 E(k_mode)-.2 E F0 .301
-(of LOCK_NG indicates that all locks on the object should be released.)2.802 F
-(\(An)158 532.8 Q 3.053(yl)-.15 G .553
-(ocks acquired as a part of the current call to)184.233 532.8 R F1(loc)3.054 E
-(k_vec)-.2 E F0 .554(are not considered for this opera-)3.054 F(tion\).)158
-544.8 Q(const DBT obj;)108 561.6 Q
-(An untyped byte string which speci\214es the object to be lock)133 573.6 Q
-(ed or released.)-.1 E(const lock_mode_t lock_mode;)108 590.4 Q
-(The lock mode, used as an inde)133 602.4 Q 2.5(xi)-.15 G(nto)268.94 602.4 Q F1
-(lt)2.5 E F0 1.1 -.55('s c).68 H(on\215ict array).55 E(.)-.65 E
-(LOCK_T **lockp;)108 619.2 Q 2.5(Ap)133 631.2 S
-(ointer to a pointer to a lock reference.)147.72 631.2 Q(The)108 648 Q F1
-(nlist)2.5 E F0(ar)2.5 E(gument speci\214es the number of elements in the)-.18
-E F1(list)2.5 E F0(array)2.5 E(.)-.65 E 1.229(The function)108 664.8 R F1(loc)
-3.729 E(k_g)-.2 E(et)-.1 E F0 1.228(is a simple interf)3.728 F 1.228
-(ace to the)-.1 F F1(loc)3.728 E(k_vec)-.2 E F0(functionality)3.728 E 3.728(,a)
--.65 G 1.228(nd is equi)416.31 664.8 R -.25(va)-.25 G 1.228
-(lent to calling the).25 F F1(loc)108 676.8 Q(k_vec)-.2 E F0 .123
-(function with the)2.623 F F1(lt)2.623 E F0(and)2.623 E F1(loc)2.623 E -.1(ke)
--.2 G(r).1 E F0(ar)2.623 E .123(guments, NULL)-.18 F F1(timeout)2.623 E F0(,)
-.68 E F1(elistp)2.623 E F0(and)2.623 E F1(con\215ict)2.623 E F0(ar)2.623 E .124
-(guments, and a sin-)-.18 F .944(gle element)108 688.8 R F1(list)3.444 E F0
-(array)3.444 E 3.444(,f)-.65 G .944(or which the)203.606 688.8 R F1(op)3.444 E
-F0 .944(\214eld is LOCK_GET)3.444 F 3.444(,a)-.74 G .944(nd the)365.014 688.8 R
-F1(obj)3.444 E F0(,).48 E F1(loc)3.444 E(k_mode)-.2 E F0(and)3.444 E F1(loc)
-3.444 E(kp)-.2 E F0 .943(\214elds are)3.443 F(4.4 Berk)72 732 Q(ele)-.1 E 2.5
-(yD)-.15 G(istrib)132.57 732 Q 99.315(ution August)-.2 F(1, 1995)2.5 E(3)535
-732 Q EP
-%%Page: 4 9
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 117.9(DB_LOCK\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 117.9(anual DB_LOCK\(3\))340.17 48 R .509(represented by the ar)108
-84 R .509(guments of the same name.)-.18 F .51(Note that the type of the)5.509
-F/F1 10/Times-Italic@0 SF(obj)3.01 E F0(ar)3.01 E .51(gument to)-.18 F F1(loc)
-3.01 E(k_g)-.2 E(et)-.1 E F0 .51(is dif-)3.01 F .765(ferent from the)108 96 R
-F1(obj)3.265 E F0 .765(element found in the LOCK_REQ_T structure.)3.265 F(The)
-5.765 E F1(loc)3.265 E(k_g)-.2 E(et)-.1 E F0 .765(function returns success)
-3.265 F(and f)108 108 Q(ailure as described for the)-.1 E F1(loc)2.5 E(k_vec)
--.2 E F0(function.)2.5 E 1.186(The function)108 124.8 R F1(loc)3.686 E(k_put)
--.2 E F0 1.187(is a simple interf)3.687 F 1.187(ace to the)-.1 F F1(loc)3.687 E
-(k_vec)-.2 E F0(functionality)3.687 E 3.687(,a)-.65 G 1.187(nd is equi)416.515
-124.8 R -.25(va)-.25 G 1.187(lent to calling the).25 F F1(loc)108 136.8 Q
-(k_vec)-.2 E F0 .374(function with a single element)2.874 F F1(list)2.874 E F0
-(array)2.873 E 2.873(,f)-.65 G .373(or which the)314.82 136.8 R F1(op)2.873 E
-F0 .373(\214eld is LOCK_PUT and the)2.873 F F1(loc)2.873 E(kp)-.2 E F0(\214eld)
-2.873 E .631(is represented by the ar)108 148.8 R .631
-(gument of the same name.)-.18 F .632(Note that the type of the)5.632 F F1(loc)
-3.132 E(kp)-.2 E F0(ar)3.132 E .632(gument to)-.18 F F1(loc)3.132 E(k_put)-.2 E
-F0(is)3.132 E(dif)108 160.8 Q .275(ferent from the)-.25 F F1(loc)2.775 E(kp)-.2
-E F0 .274(element found in the LOCK_REQ_T structure.)2.775 F(The)5.274 E F1
-(loc)2.774 E(k_put)-.2 E F0 .274(function returns suc-)2.774 F(cess and f)108
-172.8 Q(ailure as described for the)-.1 E F1(loc)2.5 E(k_vec)-.2 E F0
-(function.)2.5 E .013(The function)108 189.6 R F1(loc)2.513 E(k_close)-.2 E F0
-.013(disassociates the calling process from the lock table)2.513 F F1(lt)2.513
-E F0 2.513(,a).68 G .013(fter releasing all locks held)431.636 189.6 R .228
-(or requested by that process.)108 201.6 R .228(The function)5.228 F F1(loc)
-2.728 E(k_close)-.2 E F0 .228(returns -1 on f)2.728 F .227(ailure, setting)-.1
-F F1(errno)2.727 E F0 2.727(,a).18 G .227(nd 0 on success.)474.329 201.6 R .433
-(The function)108 218.4 R F1(loc)2.933 E(k_unlink)-.2 E F0(destro)2.933 E .433
-(ys the lock table identi\214ed by the directory)-.1 F F1(path)2.933 E F0 2.933
-(,r).28 G(emo)440.636 218.4 Q .433(ving all \214les used to)-.15 F 1.005
-(implement the lock table.)108 230.4 R 1.005(\(The directory)6.005 F F1(path)
-3.505 E F0 1.005(is not remo)3.505 F -.15(ve)-.15 G 3.505(d.\) If).15 F 1.005
-(there are processes which ha)3.505 F 1.305 -.15(ve c)-.2 H(alled).15 E F1(loc)
-108 242.4 Q(k_open)-.2 E F0 .869(without calling)3.369 F F1(loc)3.369 E
-(k_close)-.2 E F0 .869
-(\(i.e., there are processes currently using the lock table\),)3.369 F F1(loc)
-3.37 E(k_unlink)-.2 E F0 .409(will f)108 254.4 R .408
-(ail without further action, unless the force \215ag is set, in which case)-.1
-F F1(loc)2.908 E(k_unlink)-.2 E F0 .408(will attempt to delete)2.908 F .807
-(the lock table \214les re)108 266.4 R -.05(ga)-.15 G .808(rdless of an).05 F
-3.308(yp)-.15 G .808(rocesses still using the lock table.)264.662 266.4 R(An)
-5.808 E 3.308(ya)-.15 G .808(ccesses to a remo)433.208 266.4 R -.15(ve)-.15 G
-3.308(dl).15 G(ock)525.56 266.4 Q .046(table will lik)108 278.4 R .046
-(ely result in une)-.1 F .045(xpected beha)-.15 F(vior)-.2 E 5.045(.T)-.55 G
-.045(he function)304.24 278.4 R F1(loc)2.545 E(k_unlink)-.2 E F0 .045
-(returns -1 on f)2.545 F .045(ailure, setting)-.1 F F1(errno)2.545 E F0(,).18 E
-(and 0 on success.)108 290.4 Q .798(In the case of catastrophic or system f)108
-307.2 R .798(ailure, it is possible to clean up a lock table by remo)-.1 F .799
-(ving all of the)-.15 F .38(\214les in the directory speci\214ed to the)108
-319.2 R F1(loc)2.88 E(k_cr)-.2 E(eate)-.37 E F0 .379
-(function, as lock table \214les are ne)2.88 F -.15(ve)-.25 G 2.879(rc).15 G
-.379(reated in an)461.543 319.2 R 2.879(yd)-.15 G(irec-)521.68 319.2 Q
-(tory other than the one speci\214ed to)108 331.2 Q F1(loc)2.5 E(k_cr)-.2 E
-(eate)-.37 E F0(.).18 E/F2 9/Times-Bold@0 SF(ERR)72 348 Q(ORS)-.27 E F0(The)108
-360 Q F1(loc)4.158 E(k_cr)-.2 E(eate)-.37 E F0 1.658(function may f)4.158 F
-1.658(ail and set)-.1 F F1(errno)4.158 E F0 1.658(for an)4.158 F 4.158(yo)-.15
-G 4.158(ft)353.71 360 S 1.659(he errors speci\214ed for the library routines)
-363.978 360 R F1(mmap)108 372 Q F0(\(2\),).19 E F1(open)2.5 E F0(\(2\) and).24
-E F1(malloc)2.5 E F0(\(3\).).31 E(The)108 388.8 Q F1(loc)4.692 E(k_open)-.2 E
-F0 2.192(function may f)4.692 F 2.192(ail and set)-.1 F F1(errno)4.692 E F0
-2.192(for an)4.692 F 4.692(yo)-.15 G 4.692(ft)353.87 388.8 S 2.191
-(he errors speci\214ed for the library routine)364.672 388.8 R F1(mmap)108
-400.8 Q F0(\(2\) and).19 E F1(open)2.5 E F0(\(2\).).24 E(The)108 417.6 Q F1
-(loc)2.57 E(k_close)-.2 E F0 .07(function may f)2.57 F .07(ail and set)-.1 F F1
-(errno)2.57 E F0 .07(for an)2.57 F 2.57(yo)-.15 G 2.57(ft)333.76 417.6 S .07
-(he errors speci\214ed for the library routine)342.44 417.6 R F1(close)2.57 E
-F0(\(2\)).18 E(and)108 429.6 Q F1(munmap)2.5 E F0(\(2\).).19 E(The)108 446.4 Q
-F1(loc)4.071 E(k_unlink)-.2 E F0 1.571(function may f)4.071 F 1.571
-(ail and set)-.1 F F1(errno)4.071 E F0 1.571(for an)4.071 F 4.071(yo)-.15 G
-4.07(ft)353.22 446.4 S 1.57(he errors speci\214ed for the library function)
-363.4 446.4 R F1(unlink)108 458.4 Q F0(\(2\) or the follo).67 E(wing:)-.25 E
-([EB)108 475.2 Q(USY])-.1 E(The lock table w)133 487.2 Q
-(as in use and the force \215ag w)-.1 E(as not set.)-.1 E F2(SEE ALSO)72 504 Q
-F1(db_btr)108 516 Q(ee)-.37 E F0(\(3\),).18 E F1(db_hash)2.5 E F0(\(3\),).28 E
-F1(db_lo)2.5 E(g)-.1 E F0(\(3\),).22 E F1(db_mpool)2.5 E F0(\(3\),).51 E F1
-(db_open)2.5 E F0(\(3\),).24 E F1(db_r)2.5 E(ecno)-.37 E F0(\(3\),).18 E F1
-(db_txn)2.5 E F0(\(3\)).24 E F2 -.09(BU)72 532.8 S(GS).09 E F0(The)108 544.8 Q
-F1(maxloc)2.656 E(ks)-.2 E F0 .156
-(parameter is a kluge, and should be deleted in f)2.656 F -.2(avo)-.1 G 2.657
-(ro).2 G 2.657(fd)381.055 544.8 S .157(ynamically e)392.042 544.8 R .157
-(xpanding the lock table.)-.15 F(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G
-(istrib)132.57 732 Q 99.315(ution August)-.2 F(1, 1995)2.5 E(4)535 732 Q EP
-%%Page: 1 10
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 124.57(DB_LOG\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 124.57(anual DB_LOG\(3\))340.17 48 R/F1 9/Times-Bold@0 SF -.18(NA)72
-84 S(ME).18 E F0(db_log \255 log-manager access method)108 96 Q F1(DESCRIPTION)
-72 112.8 Q F0 .486(The DB library is a f)108 124.8 R .485
-(amily of groups of functions that pro)-.1 F .485
-(vides a modular programming interf)-.15 F .485(ace to trans-)-.1 F .822
-(actions and record-oriented \214le access.)108 136.8 R .822
-(The library includes support for transaction, locking, logging and)5.822 F
-.258(\214le b)108 148.8 R(uf)-.2 E .258(fering functionality)-.25 F 2.758(,a)
--.65 G 2.758(sw)223.214 148.8 S .258(ell as v)237.082 148.8 R .258(arious inde)
--.25 F -.15(xe)-.15 G 2.758(da).15 G .258(ccess methods.)331.434 148.8 R(Man)
-5.258 E 2.758(yo)-.15 G 2.758(ft)427.878 148.8 S .258
-(he functional groups \(e.g.)436.746 148.8 R .528(the memory pool functions\) \
-are useful independently of the rest of the DB functions, although some func-)
-108 160.8 R .306(tional groups are e)108 172.8 R .306
-(xplicitly based on other functional groups \(e.g.)-.15 F .306
-(transactions and logging\).)5.306 F -.15(Fo)5.306 G 2.806(rag).15 G(eneral)
-515.57 172.8 Q .245(description of transactions, see)108 184.8 R/F2 10
-/Times-Italic@0 SF(db_txn)2.745 E F0 2.745(\(3\). F).24 F .245
-(or a general description of the access methods, see)-.15 F F2(db_open)2.745 E
-F0(\(3\)).24 E .308(and then the indi)108 196.8 R .308
-(vidual access method manual pages:)-.25 F F2(db_btr)2.807 E(ee)-.37 E F0
-(\(3\),).18 E F2(db_hash)2.807 E F0(\(3\),).28 E F2(db_lo)2.807 E(g)-.1 E F0
-.307(\(3\) and).22 F F2(db_r)2.807 E(ecno)-.37 E F0(\(3\).).18 E -.15(Fo)108
-208.8 S 3.635(rag).15 G 1.135(eneral description of the lock manager)138.45
-208.8 R 3.635(,s)-.4 G(ee)307.32 208.8 Q F2(db_loc)3.635 E(k)-.2 E F0 3.635
-(\(3\). F).67 F 1.135(or a general description of the memory)-.15 F
-(pool manager)108 220.8 Q 2.5(,s)-.4 G(ee)171.2 220.8 Q F2(db_mpool)2.5 E F0
-(\(3\).).51 E
-(This manual page describes speci\214c details of the logging access method.)
-108 237.6 Q .03(These functions pro)108 254.4 R .03
-(vide a general-purpose logging f)-.15 F .03(acility suf)-.1 F .03
-(\214cient for transaction management.)-.25 F .03(Logs can)5.03 F
-(be shared by multiple processes.)108 266.4 Q 3.717(Al)108 283.2 S 1.217
-(og is represented by the directory)121.717 283.2 R(,)-.65 E F2 1.217
-(not the \214le)3.717 F F0 3.717(,n).18 G 1.217(amed by the \214rst ar)323
-283.2 R 1.218(gument to)-.18 F F2(db_open)3.718 E F0 3.718(\(3\). The).24 F
-(\214rst)3.718 E(ar)108 295.2 Q .26
-(gument must be non-NULL, and the directory must already e)-.18 F(xist)-.15 E
-F2(db_open)2.76 E F0 .26(is called.)2.76 F .26(In that directory)5.26 F 2.76
-(,t)-.65 G(he)530.56 295.2 Q 3.448
-(log is stored in one or more \214les named in the format `)108 307.2 R
-(`log.YYYY)-.74 E(.MM.DD.HH.MM.SS')-1.29 E 3.448(', where)-.74 F -.74(``)108
-319.2 S(YYYY).74 E(.MM.DD.HH.SS')-1.29 E 2.507('i)-.74 G 2.507(st)220.497 319.2
-S .007(he approximate creation time of the log \214le, and is guaranteed to be\
- unique in)229.674 319.2 R(the directory)108 331.2 Q(.)-.65 E .465
-(The group of the created \214les is based on the system and directory def)108
-348 R .466(aults, and is not further speci\214ed by)-.1 F .073
-(the log access method.)108 360 R .072(All \214les are created with the)5.073 F
-F2(mode)2.572 E F0 .072(speci\214ed to)2.572 F F2(db_open)2.572 E F0 2.572(,\()
-.24 G .072(as described in)435.584 360 R F2 -.15(ch)2.572 G(mod).15 E F0
-(\(2\)\)).77 E(and modi\214ed by the process' umask v)108 372 Q(alue \(see)-.25
-E F2(umask)2.5 E F0(\(2\)\).).67 E(The)108 388.8 Q F2<8d61>2.5 E(gs)-.1 E F0
-(ar)2.5 E(gument to)-.18 E F2(db_open)2.5 E F0(must be 0 for the)2.5 E F2
-(db_lo)2.5 E(g)-.1 E F0(access method.)2.5 E F1 -.495(AC)72 405.6 S
-(CESS METHOD SPECIFIC INFORMA).495 E(TION)-.855 E F0 .571
-(The log access method speci\214c data structure pro)108 417.6 R .571(vided to)
--.15 F F2(db_open)3.071 E F0 .572(is typedef)3.071 F 1.572 -.5('d a).55 H .572
-(nd named LOGINFO.).5 F(A)5.572 E(LOGINFO structure has at least the follo)108
-429.6 Q(wing \214elds, which may be initialized before calling)-.25 E F2
-(db_open)2.5 E F0(:).24 E(of)108 446.4 Q(f_t max_\214le_size;)-.25 E 1.585
-(The maximum size of a single \214le in the log.)133 458.4 R 1.584
-(If not speci\214ed, the maximum size def)6.584 F 1.584(aults to an)-.1 F
-(implementation-speci\214c v)133 470.4 Q(alue.)-.25 E(int lorder;)108 487.2 Q
-.65(The byte order for inte)133 499.2 R .65
-(gers in the stored database metadata.)-.15 F .65
-(The number should represent the order)5.65 F .749(as an inte)133 511.2 R .749
-(ger; for e)-.15 F .749(xample, big endian order w)-.15 F .749
-(ould be the number 4,321.)-.1 F(If)5.749 E F2(lor)3.249 E(der)-.37 E F0 .749
-(is 0 \(no order is)3.249 F(speci\214ed\) the current host order is used.)133
-523.2 Q 1.284(If the log already e)108 540 R 1.284(xists, the v)-.15 F 1.285(a\
-lues speci\214ed for the parameters max_\214le_size and lorder are ignored in)
--.25 F -.1(fa)108 552 S -.2(vo)-.1 G 2.5(ro).2 G 2.5(ft)136.1 552 S(he v)144.71
-552 Q(alues used when the log w)-.25 E(as created.)-.1 E F1(DB OPERA)72 568.8 Q
-(TIONS)-.855 E F0 .687(The data part of the k)108 580.8 R -.15(ey)-.1 G .686(/\
-data pair used by the log access method is the same as for other access method\
-s.).15 F .837(The k)108 592.8 R 1.137 -.15(ey i)-.1 H 3.337(sd).15 G(if)159.421
-592.8 Q 3.337(ferent. Each)-.25 F .837(log record is identi\214ed by a log seq\
-uence number \(LSN\), which is stored in a)3.337 F(DBT)108 604.8 Q 2.702(,a)
--.74 G .202(nd which is used as the)136.902 604.8 R F2 -.1(ke)2.702 G(y)-.2 E
-F0 .202(for all log functions that tak)2.702 F(e)-.1 E F2 -.1(ke)2.701 G(y)-.2
-E F0(ar)2.701 E 2.701(guments. Applications)-.18 F .201(cannot create)2.701 F
-(LSN')108 616.8 Q .539(s, and all LSN')-.55 F 3.039(sp)-.55 G(ro)203.216 616.8
-Q .539(vided to functions as ar)-.15 F .539(guments must \214rst be retrie)-.18
-F -.15(ve)-.25 G 3.04(du).15 G .54(sing the)440.37 616.8 R F2(put)3.04 E F0(or)
-3.04 E F2(seq)3.04 E F0(func-)3.04 E 2.783(tions. T)108 628.8 R 2.783(op)-.8 G
-(ro)153.326 628.8 Q .283(vide a distinguished v)-.15 F .282
-(alue for applications, it is guaranteed that no v)-.25 F .282(alid LSN will e)
--.25 F -.15(ve)-.25 G 2.782(rh).15 G -2.25 -.2(av e)519.248 628.8 T(a)2.982 E
-(size of 0.)108 640.8 Q(Applications can compare LSN')108 657.6 Q 2.5(su)-.55 G
-(sing the)247.98 657.6 Q F2(lo)2.5 E(g_lsn_compar)-.1 E(e)-.37 E F0
-(function \(see belo)2.5 E(w\).)-.25 E .429(Applications can associate LSN')108
-674.4 R 2.929(sw)-.55 G .429(ith speci\214c log \214les.)253.586 674.4 R .429
-(The function)5.429 F F2(lo)2.929 E(g_lsn_\214le)-.1 E F0 .43(\(see belo)2.93 F
-.43(w\), returns the)-.25 F .214
-(name of the log \214le containing the record with a speci\214ed LSN.)108 686.4
-R .214(\(The mapping of LSN to \214le is needed for)5.214 F(4.4 Berk)72 732 Q
-(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315(ution August)-.2 F(3, 1995)
-2.5 E(1)535 732 Q EP
-%%Page: 2 11
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 124.57(DB_LOG\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 124.57(anual DB_LOG\(3\))340.17 48 R .397(database administration.)
-108 84 R -.15(Fo)5.397 G 2.897(re).15 G .398
-(xample, a transaction manager typically records the earliest LSN needed for)
-231.931 84 R .519(restart, and the database administrator may w)108 96 R .519
-(ant to archi)-.1 F .819 -.15(ve l)-.25 H .519(og \214les to tape when the).15
-F 3.018(yc)-.15 G .518(ontain only LSN')465.624 96 R(s)-.55 E
-(before the earliest one needed for restart.\))108 108 Q
-(Applications can truncate the log \214le up to a speci\214c LSN using the)108
-124.8 Q/F1 10/Times-Italic@0 SF(lo)2.5 E(g_trunc)-.1 E F0(function \(see belo)
-2.5 E(w\).)-.25 E .221(The functions returned by)108 141.6 R F1(db_open)2.721 E
-F0 .221(for the log access method are as described in)2.721 F F1(db_open)2.721
-E F0 2.722(,w).24 G .222(ith the follo)482.586 141.6 R(w-)-.25 E(ing e)108
-153.6 Q(xceptions and additions:)-.15 E 5.28(type The)108 170.4 R
-(type is DB_LOG.)2.5 E 10.28(del The)108 187.2 R F1(del)3.505 E F0 1.005
-(function al)3.505 F -.1(wa)-.1 G 1.005
-(ys returns an error for the log-manager access method, setting).1 F F1(errno)
-3.504 E F0 1.004(to EIN-)3.504 F -1.35(VA)133 199.2 S(L.)1.35 E
-(int \(*log_\215ush\)\(const DB *db, const DBT *lsn\);)108 216 Q(The)133 228 Q
-F1(lo)2.866 E(g_\215ush)-.1 E F0 .367
-(function \215ushes the log up to and including the log record)2.866 F F1(lsn)
-2.867 E F0 5.367(.T).24 G .367(he function)454.926 228 R F1(lo)2.867 E
-(g_\215ush)-.1 E F0(returns -1 on f)133 240 Q(ailure, setting)-.1 E F1(errno)
-2.5 E F0 2.5(,a).18 G(nd 0 on success.)278.61 240 Q
-(int \(*log_lsn_compare\)\(const DB *,)108 256.8 Q .255
-(const DBT *lsn1, const DBT *lsn2\); A pointer to a function which is pro)183
-268.8 R .255(vided to permit)-.15 F .312(applications to compare LSN')133 280.8
-R 2.812(s. The)-.55 F F1(lo)2.812 E(g_lsn_compar)-.1 E(e)-.37 E F0 .312
-(function returns an inte)2.812 F .313(ger less than, equal to,)-.15 F .058
-(or greater than zero if the \214rst LSN is considered to be respecti)133 292.8
-R -.15(ve)-.25 G .058(ly less than, equal to, or greater than).15 F
-(the second LSN.)133 304.8 Q(int \(*log_lsn_\214le\)\(const DB *db,)108 321.6 Q
-(const DBT *lsn, char *name\);)183 333.6 Q(The)133 345.6 Q F1(lo)3.21 E
-(g_lsn_\214le)-.1 E F0 .71
-(function stores a pointer to the name of the \214le containing)3.21 F F1(lsn)
-3.211 E F0 .711(in the address refer)3.211 F(-)-.2 E .293(enced by)133 357.6 R
-F1(name)2.793 E(.)-.15 E F0 .293(This pointer is to an internal static object,\
- and subsequent calls to the same function)5.293 F
-(will modify the same object.)133 369.6 Q(The function)133 386.4 Q F1(lo)2.5 E
-(g_lsn_\214le)-.1 E F0(returns -1 on f)2.5 E(ailure, setting)-.1 E F1(errno)2.5
-E F0 2.5(,a).18 G(nd 0 on success.)381.56 386.4 Q
-(int \(*log_unlink\)\(const char *path, int force\);)108 403.2 Q(The)133 415.2
-Q F1(lo)3.275 E(g_unlink)-.1 E F0 .775(function destro)3.275 F .775
-(ys the log represented by)-.1 F F1(path)3.275 E F0 5.775(.I).28 G 3.275(ft)
-394.745 415.2 S(he)404.13 415.2 Q F1(for)3.275 E(ce)-.37 E F0 .776
-(parameter is not set to 1)3.275 F .725
-(and there are other processes using the log, then)133 427.2 R F1(lo)3.224 E
-(g_unlink)-.1 E F0 .724(will return -1, setting)3.224 F F1(errno)3.224 E F0
-.724(to EB)3.224 F(USY)-.1 E(.)-1.29 E(If)133 439.2 Q F1(for)2.831 E .331
-(ce is not set or ther)-.37 F 2.831(ea)-.37 G 1.071 -.37(re n)244.287 439.2 T
-2.831(op).37 G -.45(ro)272.909 439.2 S .331(cesses using the lo).45 F .532 -.1
-(g, t)-.1 H .332(hen all \214les).1 F F0 .332(used by the log are destro)2.832
-F(yed.)-.1 E F1(lo)133 451.2 Q(g_unlink)-.1 E F0(will return -1 on f)2.5 E
-(ailure, setting)-.1 E F1(errno)2.5 E F0 2.5(,a).18 G(nd 0 on success.)337.96
-451.2 Q(int \(*log_trunc\)\(const DB *db, const DBT *lsn\);)108 468 Q(The)133
-480 Q F1(lo)2.601 E(g_trunc)-.1 E F0 .101
-(function truncates the log up to an LSN which is less than)2.601 F F1(lsn)2.6
-E F0 5.1(.T).24 G .1(he function)453.24 480 R F1(lo)2.6 E(g_trunc)-.1 E F0
-(returns -1 on f)133 492 Q(ailure, setting)-.1 E F1(errno)2.5 E F0 2.5(,a).18 G
-(nd 0 on success.)278.61 492 Q 9.72(put A)108 508.8 R .339
-(log record containing)2.839 F F1(data)2.839 E F0 .339(is appended to the log.)
-2.839 F(Unlik)5.339 E 2.84(et)-.1 G(he)382.44 508.8 Q F1(put)2.84 E F0 .34
-(functions for other access meth-)2.84 F .789(ods, the k)133 520.8 R 1.089 -.15
-(ey p)-.1 H .788(arameter is not initialized by the application, instead, the \
-LSN assigned to the data is).15 F(returned in the)133 532.8 Q F1 -.1(ke)2.5 G
-(y)-.2 E F0(parameter)2.5 E(.)-.55 E 1.157(The caller is responsible for pro)
-133 549.6 R 1.157(viding an)-.15 F 3.657(yn)-.15 G 1.157(ecessary structure to)
-318.267 549.6 R F1 1.157(data .)3.657 F F0(\(F)6.157 E 1.157(or e)-.15 F 1.157
-(xample, in a write-)-.15 F .267
-(ahead logging protocol, the application must understand what part of)133 561.6
-R F1(data)2.767 E F0 .266(is an operation code, what)2.766 F .622
-(part is redo information, and what part is undo information.)133 573.6 R .622
-(In addition, most transaction managers)5.622 F .985(will store in)133 585.6 R
-F1(data)3.485 E F0 .985(the LSN of the pre)3.485 F .984
-(vious log record for the same transaction, to support chaining)-.25 F
-(back through the transaction')133 597.6 Q 2.5(sl)-.55 G
-(og records during undo.\))258.54 597.6 Q(The parameter)133 614.4 Q F1<8d61>2.5
-E(g)-.1 E F0(must be set to 0 or e)2.5 E(xactly one of the follo)-.15 E(wing v)
--.25 E(alues:)-.25 E(R_CHECKPOINT)133 631.2 Q .5(Specify the k)158 643.2 R -.15
-(ey)-.1 G .5(/data pair of the current call as the one to be returned when the)
-.15 F F1(seq)3 E F0 .5(function is)3 F(ne)158 655.2 Q
-(xt called with the R_CHECKPOINT \215ag.)-.15 E(4.4 Berk)72 732 Q(ele)-.1 E 2.5
-(yD)-.15 G(istrib)132.57 732 Q 99.315(ution August)-.2 F(3, 1995)2.5 E(2)535
-732 Q EP
-%%Page: 3 12
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 124.57(DB_LOG\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 124.57(anual DB_LOG\(3\))340.17 48 R(R_FLUSH)133 84 Q
-(Flush immediately \(ignoring an)158 96 Q 2.5(yp)-.15 G
-(ossibility for group commit\).)296.74 96 Q 9.17(seq The)108 112.8 R/F1 10
-/Times-Italic@0 SF(seq)2.5 E F0(function tak)2.5 E(es the follo)-.1 E
-(wing additional \215ag:)-.25 E(R_CHECKPOINT)133 129.6 Q .184(The last k)158
-141.6 R -.15(ey)-.1 G .184(/data pair stored by the).15 F F1(put)2.684 E F0
-.183(function \(using the R_CHECKPOINT \215ag\) is returned,)2.684 F .216
-(and the cursor is set or initialized to reference it.)158 153.6 R .216(The e)
-5.216 F .216(xpected use of this \215ag is during restart)-.15 F .801
-(and to determine what part of the log must be a)158 165.6 R -.25(va)-.2 G .801
-(ilable for restart.).25 F .801(Therefore, the log record)5.801 F(retrie)158
-177.6 Q -.15(ve)-.25 G 3.352(dw).15 G .853
-(ith R_CHECKPOINT should contain all the information that the transaction man-)
-203.712 177.6 R(ager will need for this purpose.)158 189.6 Q 4.17(sync The)108
-206.4 R F1(sync)3.135 E F0 .635(function al)3.135 F -.1(wa)-.1 G .635
-(ys returns an error for the log-manager access method, setting).1 F F1(errno)
-3.134 E F0 .634(to EIN-)3.134 F -1.35(VA)133 218.4 S(L.)1.35 E/F2 9
-/Times-Bold@0 SF(SEE ALSO)72 235.2 Q F1(db_btr)108 247.2 Q(ee)-.37 E F0(\(3\),)
-.18 E F1(db_hash)2.5 E F0(\(3\),).28 E F1(db_loc)2.5 E(k)-.2 E F0(\(3\),).67 E
-F1(db_mpool)2.5 E F0(\(3\),).51 E F1(db_open)2.5 E F0(\(3\),).24 E F1(db_r)2.5
-E(ecno)-.37 E F0(\(3\),).18 E F1(db_txn)2.5 E F0(\(3\)).24 E(4.4 Berk)72 732 Q
-(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315(ution August)-.2 F(3, 1995)
-2.5 E(3)535 732 Q EP
-%%Page: 1 13
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 110.12(DB_MPOOL\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 110.12(anual DB_MPOOL\(3\))340.17 48 R/F1 9/Times-Bold@0 SF -.18(NA)
-72 84 S(ME).18 E F0(db_mpool \255 general purpose shared memory b)108 96 Q(uf)
--.2 E(fer pool)-.25 E F1(SYNOPSIS)72 112.8 Q/F2 10/Times-Bold@0 SF
-(#include <db)108 124.8 Q(.h>)-.4 E(#include <mpool.h>)108 136.8 Q(int)108
-160.8 Q(mpool_cr)108 172.8 Q
-(eate\(char *path, mode_t mode, size_t cachesize, u_long \215ags\);)-.18 E
-(MPOOL *)108 196.8 Q(mpool_open\(char *path\);)108 208.8 Q(int)108 232.8 Q
-(mpool_close\(MPOOL *mp\);)108 244.8 Q(MPOOLFILE *)108 268.8 Q(mpool_f)108
-280.8 Q(open\(MPOOL *mp, char *path, size_t pagesize, v)-.25 E(oid *pgcookie,)
--.1 E(int \(*pgin\)\(MPOOLFILE *mpf)158 292.8 Q(,)-.15 E(pgno_t pgno, v)188
-304.8 Q(oid *pgaddr)-.1 E 2.5(,v)-.92 G(oid *pgcookie\),)311.91 304.8 Q
-(int \(*pgout\)\(MPOOLFILE *mpf)158 316.8 Q(,)-.15 E(pgno_t pgno, v)188 328.8 Q
-(oid *pgaddr)-.1 E 2.5(,v)-.92 G(oid *pgcookie\);)311.91 328.8 Q(int)108 352.8
-Q(mpool_fclose\(MPOOLFILE *mpf\);)108 364.8 Q -.1(vo)108 388.8 S(id *).1 E
-(mpool_get\(MPOOLFILE *mpf)108 400.8 Q 2.5(,p)-.15 G(gno_t *pgnoaddr)252.02
-400.8 Q 2.5(,u)-.92 G(_long \215ags,)334.73 400.8 Q
-(int \(*callback\)\(MPOOLFILE *mpf)158 412.8 Q 2.5(,p)-.15 G(gno_t pgno\)\);)
-318.97 412.8 Q(int)108 436.8 Q(mpool_put\(MPOOLFILE *mpf)108 448.8 Q 2.5(,v)
--.15 G(oid *pgaddr)253.04 448.8 Q 2.5(,u)-.92 G(_long \215ags\);)314.64 448.8 Q
-(int)108 472.8 Q(mpool_sync\(MPOOLFILE *mpf\);)108 484.8 Q(int)108 508.8 Q
-(mpool_unlink\(const char *path, int f)108 520.8 Q(or)-.25 E(ce\);)-.18 E -.1
-(vo)108 544.8 S(id).1 E(mpool_stat\(MPOOL *mp, FILE *fp\);)108 556.8 Q F1
-(DESCRIPTION)72 573.6 Q F0 .485(The DB library is a f)108 585.6 R .485
-(amily of groups of functions that pro)-.1 F .486
-(vides a modular programming interf)-.15 F .486(ace to trans-)-.1 F .823
-(actions and record-oriented \214le access.)108 597.6 R .822
-(The library includes support for transaction, locking, logging and)5.822 F
-.258(\214le b)108 609.6 R(uf)-.2 E .258(fering functionality)-.25 F 2.758(,a)
--.65 G 2.758(sw)223.214 609.6 S .258(ell as v)237.082 609.6 R .258(arious inde)
--.25 F -.15(xe)-.15 G 2.758(da).15 G .258(ccess methods.)331.434 609.6 R(Man)
-5.258 E 2.758(yo)-.15 G 2.758(ft)427.878 609.6 S .258
-(he functional groups \(e.g.)436.746 609.6 R .528(the memory pool functions\) \
-are useful independently of the rest of the DB functions, although some func-)
-108 621.6 R .306(tional groups are e)108 633.6 R .306
-(xplicitly based on other functional groups \(e.g.)-.15 F .306
-(transactions and logging\).)5.306 F -.15(Fo)5.306 G 2.806(rag).15 G(eneral)
-515.57 633.6 Q .245(description of transactions, see)108 645.6 R/F3 10
-/Times-Italic@0 SF(db_txn)2.745 E F0 2.745(\(3\). F).24 F .245
-(or a general description of the access methods, see)-.15 F F3(db_open)2.745 E
-F0(\(3\)).24 E .307(and then the indi)108 657.6 R .307
-(vidual access method manual pages:)-.25 F F3(db_btr)2.808 E(ee)-.37 E F0
-(\(3\),).18 E F3(db_hash)2.808 E F0(\(3\),).28 E F3(db_lo)2.808 E(g)-.1 E F0
-.308(\(3\) and).22 F F3(db_r)2.808 E(ecno)-.37 E F0(\(3\).).18 E -.15(Fo)108
-669.6 S 3.635(rag).15 G 1.135(eneral description of the lock manager)138.45
-669.6 R 3.635(,s)-.4 G(ee)307.32 669.6 Q F3(db_loc)3.635 E(k)-.2 E F0 3.635
-(\(3\). F).67 F 1.135(or a general description of the memory)-.15 F
-(pool manager)108 681.6 Q 2.5(,s)-.4 G(ee)171.2 681.6 Q F3(db_mpool)2.5 E F0
-(\(3\).).51 E(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q
-99.315(ution August)-.2 F(1, 1995)2.5 E(1)535 732 Q EP
-%%Page: 2 14
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 110.12(DB_MPOOL\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 110.12(anual DB_MPOOL\(3\))340.17 48 R
-(This manual page describes speci\214c details of the memory pool interf)108 84
-Q(ace.)-.1 E(The)108 100.8 Q/F1 10/Times-Italic@0 SF(db_mpool)3.682 E F0 1.182
-(function is the library interf)3.682 F 1.183(ace intended to pro)-.1 F 1.183
-(vide general-purpose, page-oriented b)-.15 F(uf)-.2 E(fer)-.25 E .16
-(management of one or more \214les.)108 112.8 R .16(While designed to w)5.16 F
-.16(ork with the other DB functions, these functions are)-.1 F .604
-(also useful for more general purposes.)108 124.8 R .604
-(The memory pools \(MPOOL)5.604 F -.55('s)-.92 G 3.104(\)a).55 G .605
-(re referred to in this document as)404.18 124.8 R .985(simply `)108 136.8 R
-(`pools')-.74 E 3.485('. Pools)-.74 F .985(may be shared between processes.)
-3.485 F .985(Pools are usually \214lled by pages from one or)5.985 F .673
-(more \214les \(MPOOLFILE')108 148.8 R 3.173(s\). P)-.55 F .674
-(ages in the pool are replaced in LR)-.15 F 3.174(U\()-.4 G .674
-(least-recently-used\) order)392.318 148.8 R 3.174(,w)-.4 G .674(ith each)
-507.946 148.8 R(ne)108 160.8 Q 4.243(wp)-.25 G 1.743
-(age replacing the page which has been unused the longest.)133.653 160.8 R -.15
-(Pa)6.742 G 1.742(ges retrie).15 F -.15(ve)-.25 G 4.242(df).15 G 1.742
-(rom the pool using)459.494 160.8 R F1(mpool_g)108 172.8 Q(et)-.1 E F0 1.255
-(are `)3.755 F(`pinned')-.74 E 3.755('i)-.74 G 3.755(nm)215.435 172.8 S(emory)
-231.97 172.8 Q 3.755(,b)-.65 G 3.755(yd)268.125 172.8 S(ef)281.88 172.8 Q 1.256
-(ault, until the)-.1 F 3.756(ya)-.15 G 1.256(re returned to the pool using the)
-358.168 172.8 R F1(mpool_put)3.756 E F0(function.)108 184.8 Q .934
-(The function)108 201.6 R F1(mpool_cr)3.434 E(eate)-.37 E F0 .934
-(creates and initializes the memory pool identi\214ed by the)3.434 F F1(path)
-3.433 E F0(directory)3.433 E 5.933(.T)-.65 G(his)528.33 201.6 Q .931
-(directory must already e)108 213.6 R .931(xist when)-.15 F F1(mpool_cr)3.431 E
-(eate)-.37 E F0 .931(is called.)3.431 F .932
-(If the memory pool identi\214ed by)5.931 F F1(path)3.432 E F0(already)3.432 E
--.15(ex)108 225.6 S .045(ists, then).15 F F1(mpool_cr)2.545 E(eate)-.37 E F0
-.045(returns success without further action.)2.545 F .045
-(The \214les associated with the memory pool)5.045 F .87
-(are created in the directory speci\214ed by)108 237.6 R F1(path)3.37 E F0 5.87
-(.\().28 G .87(The group of the created \214les is based on the system and)
-304.08 237.6 R .258(directory def)108 249.6 R .258
-(aults, and is not further speci\214ed by)-.1 F F1(mpool_cr)2.758 E(eate)-.37 E
-F0 2.758(.\) All).18 F .258(\214les created by)2.758 F F1(mpool_cr)2.758 E
-(eate)-.37 E F0 .258(are cre-)2.758 F .048(ated with mode)108 261.6 R F1(mode)
-2.548 E F0 .049(\(as described in)2.548 F F1 -.15(ch)2.549 G(mod).15 E F0 .049
-(\(2\)\) and modi\214ed by the process' umask v).77 F .049(alue \(see)-.25 F F1
-(umask)2.549 E F0(\(2\)\).).67 E(The)108 278.4 Q F1(cac)2.544 E(hesize)-.15 E
-F0(ar)2.544 E .044(gument speci\214es the size of the pool in bytes, and shoul\
-d be the size of the normal w)-.18 F(orking)-.1 E .509(set of the application \
-with some small amount of additional memory for unusual situations.)108 290.4 R
-.509(If the number)5.509 F .362(of bytes currently `)108 302.4 R(`pinned')-.74
-E 2.862('i)-.74 G 2.862(nm)226.828 302.4 S .362(emory e)242.47 302.4 R(xceeds)
--.15 E F1(cac)2.861 E(hesize)-.15 E F0 2.861(,t).18 G(he)351.734 302.4 Q F1
-(db_mpool)2.861 E F0 .361(functions will attempt to allocate)2.861 F
-(more memory and do not necessarily f)108 314.4 Q(ail, although the)-.1 E 2.5
-(ym)-.15 G(ay suf)341.61 314.4 Q(fer performance de)-.25 E(gradation.)-.15 E
-(The)108 331.2 Q F1<8d61>2.5 E(gs)-.1 E F0(ar)2.5 E(gument is set by)-.18 E F1
-(or)2.5 E F0('ing an).73 E 2.5(yo)-.15 G 2.5(ft)272.73 331.2 S(he follo)281.34
-331.2 Q(wing v)-.25 E(alues:)-.25 E(MPOOL_PRIV)108 348 Q -1.11(AT)-1.35 G(E)
-1.11 E(The pool is not shared by other processes or threads, so no locking of \
-pool resources is required.)144 360 Q .115(The function)108 376.8 R F1
-(mpool_open)2.615 E F0 .115
-(returns a pointer to the memory pool identi\214ed by)2.615 F F1(path)2.615 E
-F0 2.615(,w).28 G .115(hich must ha)447.525 376.8 R .415 -.15(ve a)-.2 H
-(lready).15 E .036(been created by a call to)108 388.8 R F1(mpool_cr)2.536 E
-(eate)-.37 E F0 5.036(.T).18 G .036(he process must ha)276.074 388.8 R .336
--.15(ve p)-.2 H .036(ermission to read and write \214les with o).15 F(wn-)-.25
-E 1.157(ers, groups and permissions as described for)108 400.8 R F1(mpool_cr)
-3.657 E(eate)-.37 E F0 6.157(.T).18 G(he)365.075 400.8 Q F1(mpool_open)3.657 E
-F0 1.157(function returns NULL on)3.657 F -.1(fa)108 412.8 S(ilure, setting).1
-E F1(errno)2.5 E F0(.).18 E(The)108 429.6 Q F1(mpool_close)6.383 E F0 3.883
-(function closes the pool indicated by the MPOOL pointer)6.383 F F1(mp)6.383 E
-F0 6.383(,a).19 G 6.382(sr)480.026 429.6 S 3.882(eturned by)493.628 429.6 R F1
-(mpool_open)108 441.6 Q F0 5.047(.T).24 G .047(his function does)171.337 441.6
-R/F2 10/Times-Bold@0 SF(not)2.547 E F0 .047(imply a call to)2.547 F F1
-(mpool_sync)2.547 E F0 .047(\(or to)2.547 F F1(mpool_fclose)2.547 E F0 2.547
-(\)i).18 G .047(.e. no pages are writ-)455.951 441.6 R .404
-(ten to the source \214le as as a result of calling)108 453.6 R F1(mpool_close)
-2.904 E F0 5.404(.T).18 G .404(he function)354.658 453.6 R F1(mpool_close)2.904
-E F0 .403(returns -1 on f)2.904 F(ailure,)-.1 E(setting)108 465.6 Q F1(errno)
-2.5 E F0 2.5(,a).18 G(nd 0 on success.)169.01 465.6 Q .827(The function)108
-482.4 R F1(mpool_fopen)3.327 E F0 .827(opens a \214le for b)3.327 F(uf)-.2 E
-.828(fering in the pool speci\214ed by the MPOOL ar)-.25 F 3.328(gument. The)
--.18 F F1(path)108 494.4 Q F0(ar)2.85 E .349
-(gument is the name of the \214le to be opened.)-.18 F(The)5.349 E F1(pa)2.849
-E -.1(ge)-.1 G(size).1 E F0(ar)2.849 E .349
-(gument is the size, in bytes, of the unit)-.18 F .738(of transfer between the\
- application and the pool, although not necessarily the unit of transfer betwe\
-en the)108 506.4 R .12(pool and the source \214le.)108 518.4 R .12
-(Applications not kno)5.12 F .12
-(wing the page size of the source \214le should retrie)-.25 F .42 -.15(ve t)
--.25 H .12(he meta-).15 F .234(data from the \214le using a page size that is \
-correct for the metadata, then close and reopen the \214le, or)108 530.4 R
-2.735(,o)-.4 G(ther)521.32 530.4 Q(-)-.2 E
-(wise determine the page size before calling)108 542.4 Q F1(mpool_fopen)2.5 E
-F0(.).24 E .416(If the)108 559.2 R F1(pgin)2.916 E F0 .416(function is speci\
-\214ed, it is called each time a page is read into the memory pool from the so\
-urce)2.916 F 2.835(\214le. If)108 571.2 R(the)2.835 E F1(pgout)2.835 E F0 .336
-(function is speci\214ed, it is called each time a page is written to the sour\
-ce \214le.)2.835 F .336(Both func-)5.336 F .834
-(tions are called with the MPOOLFILE pointer returned from)108 583.2 R F1
-(mpool_fopen)3.333 E F0 3.333(,t).24 G .833(he page number)421.815 583.2 R
-3.333(,ap)-.4 G .833(ointer to)505.557 583.2 R .014
-(the page being read or written, and the ar)108 595.2 R(gument)-.18 E F1
-(pgcookie)2.515 E F0 5.015(.I).18 G 2.515(fe)351.695 595.2 S .015
-(ither function f)361.98 595.2 R .015(ails, it should return non-zero)-.1 F
-(and set)108 607.2 Q F1(errno)2.5 E F0 2.5(,i).18 G 2.5(nw)168.73 607.2 S
-(hich case the)183.45 607.2 Q F1(db_mpool)2.5 E F0
-(function calling it will also f)2.5 E(ail, lea)-.1 E(ving)-.2 E F1(errno)2.5 E
-F0(intact.)2.5 E(The)108 624 Q F1(mpool_fclose)2.705 E F0 .204
-(function closes the source \214le indicated by the MPOOLFILE pointer)2.705 F
-F1(mpf)2.704 E F0 5.204(.T)1.96 G .204(his function)492.296 624 R(does)108 636
-Q F2(not)3.615 E F0 1.115(imply a call to)3.615 F F1(mpool_sync)3.615 E F0
-3.615(,i).31 G 1.115
-(.e. no pages are written to the source \214le as as a result of calling)
-268.885 636 R F1(mpool_fclose)108 648 Q F0 5(.T).18 G(he function)175.12 648 Q
-F1(mpool_fclose)2.5 E F0(returns -1 on f)2.5 E(ailure, setting)-.1 E F1(errno)
-2.5 E F0 2.5(,a).18 G(nd 0 on success.)424.33 648 Q .019(The function)108 664.8
-R F1(mpool_g)2.519 E(et)-.1 E F0 .019
-(returns a pointer to the page with the page number speci\214ed by)2.519 F F1
-(pgnoaddr)2.518 E F0 2.518(,f).73 G .018(rom the)509.152 664.8 R .986
-(source \214le speci\214ed by the MPOOLFILE pointer)108 676.8 R F1(mpf)3.486 E
-F0 5.986(.I)1.96 G 3.486(ft)342.268 676.8 S .987(he page does not e)351.864
-676.8 R .987(xist or cannot be retrie)-.15 F -.15(ve)-.25 G(d,).15 E F1
-(mpool_g)108 688.8 Q(et)-.1 E F0(returns NULL and sets errno.)2.5 E(4.4 Berk)72
-732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315(ution August)-.2 F
-(1, 1995)2.5 E(2)535 732 Q EP
-%%Page: 3 15
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 110.12(DB_MPOOL\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 110.12(anual DB_MPOOL\(3\))340.17 48 R(The)108 84 Q/F1 10
-/Times-Italic@0 SF<8d61>2.5 E(gs)-.1 E F0(ar)2.5 E(gument is set by)-.18 E F1
-(or)2.5 E F0('ing an).73 E 2.5(yo)-.15 G 2.5(ft)272.73 84 S(he follo)281.34 84
-Q(wing v)-.25 E(alues:)-.25 E(MPOOL_CALLB)108 100.8 Q -.4(AC)-.35 G(K).4 E 1.04
-(After the page number has been determined, b)133 112.8 R 1.04(ut before an)-.2
-F 3.54(yo)-.15 G 1.04(ther process or thread can access the)388.26 112.8 R .471
-(page, the function speci\214ed by the)133 124.8 R F1(callbac)2.971 E(k)-.2 E
-F0(ar)2.971 E .471(gument is called.)-.18 F .471(If the function f)5.471 F .472
-(ails, it should return)-.1 F 1.11(non-zero and set)133 136.8 R F1(errno)3.61 E
-F0 3.61(,i).18 G 3.61(nw)236.21 136.8 S 1.11(hich case)252.04 136.8 R F1
-(mpool_g)3.61 E(et)-.1 E F0 1.11(will also f)3.61 F 1.11(ail, lea)-.1 F(ving)
--.2 E F1(errno)3.61 E F0 3.61(intact. The)3.61 F F1(callbac)3.61 E(k)-.2 E F0
-1.012(function is called with the MPOOLFILE pointer returned from)133 148.8 R
-F1(mpool_fopen)3.512 E F0 1.013(and the page number)3.513 F(.)-.55 E .228
-(This functionality is commonly used when page locking is required, b)133 160.8
-R .227(ut the page number of the page)-.2 F(being retrie)133 172.8 Q -.15(ve)
--.25 G 2.5(di).15 G 2.5(sn)198.14 172.8 S(ot kno)209.53 172.8 Q(wn.)-.25 E
-(MPOOL_CREA)108 189.6 Q(TE)-1.11 E(If the speci\214ed page does not e)133 201.6
-Q(xist, create it.)-.15 E(MPOOL_LAST)108 218.4 Q 2.105
-(Return the last page of the source \214le and cop)133 230.4 R 4.605(yi)-.1 G
-2.106(ts page number to the location referenced by)347.25 230.4 R F1(pgnoaddr)
-133 242.4 Q F0(.).73 E(MPOOL_NEW)108 259.2 Q(Create a ne)133 271.2 Q 2.5(wp)
--.25 G(age in the \214le and cop)192.45 271.2 Q 2.5(yi)-.1 G
-(ts page number to the location referenced by)290.67 271.2 Q F1(pgnoaddr)2.5 E
-F0(.).73 E(MPOOL_NOPIN)108 288 Q(Don')133 300 Q 2.918(tp)-.18 G .418
-(in the page into memory)164.068 300 R 5.418(.\()-.65 G .417
-(This \215ag is intended for deb)274.108 300 R .417(ugging purposes, when it')
--.2 F 2.917(so)-.55 G .417(ften use-)504.873 300 R .972(ful to e)133 312 R .972
-(xamine pages which are currently held by other parts of the application.)-.15
-F -.15(Pa)5.973 G .973(ges retrie).15 F -.15(ve)-.25 G 3.473(di).15 G(n)535 312
-Q .529(this manner don')133 324 R 3.029(tn)-.18 G .528
-(eed to be returned to the memory pool, i.e. the)212.457 324 R 3.028(ys)-.15 G
-(hould)413.95 324 Q/F2 10/Times-Bold@0 SF(not)3.028 E F0 .528
-(be speci\214ed as ar)3.028 F(gu-)-.18 E(ments to the)133 336 Q F1(mpool_put)
-2.5 E F0(routine.\))2.5 E(Created pages ha)108 352.8 Q .3 -.15(ve a)-.2 H
-(ll their bytes set to 0.).15 E 2.078(All pages returned by)108 369.6 R F1
-(mpool_g)4.578 E(et)-.1 E F0 2.079
-(\(unless the MPOOL_NOPIN \215ag is speci\214ed\), will be retained \(i.e.)
-4.578 F -.74(``)108 381.6 S(pinned').74 E
-('\) in the pool until a subsequent call to)-.74 E F1(mpool_put)2.5 E F0(.).68
-E .077(The function)108 398.4 R F1(mpool_put)2.577 E F0 .076
-(indicates that the page referenced by)2.577 F F1(pgaddr)2.576 E F0 .076
-(can be e)2.576 F .076(victed from the pool.)-.25 F F1(Pgaddr)5.076 E F0
-(must be an address pre)108 410.4 Q(viously returned by)-.25 E F1(mpool_g)2.5 E
-(et)-.1 E F0(.).68 E(The \215ag v)108 427.2 Q(alue is speci\214ed by)-.25 E F1
-(or)2.5 E F0('ing an).73 E 2.5(yo)-.15 G 2.5(ft)277.2 427.2 S(he follo)285.81
-427.2 Q(wing v)-.25 E(alues:)-.25 E(MPOOL_DIR)108 444 Q(TY)-.6 E .052(The page\
- has been modi\214ed and must be written to the source \214le before being e)
-133 456 R .052(victed from the pool.)-.25 F(MPOOL_DISCARD)108 472.8 Q .145
-(The page is unlik)133 484.8 R .144(ely to be useful in the near future, and s\
-hould be discarded before other pages in the)-.1 F(pool.)133 496.8 Q
-(The function)108 513.6 Q F1(mpool_put)2.5 E F0(returns -1 on f)2.5 E
-(ailure, setting)-.1 E F1(errno)2.5 E F0 2.5(,a).18 G(nd 0 on success.)352.77
-513.6 Q .027(The function)108 530.4 R F1(mpool_sync)2.527 E F0 .028
-(writes all pages associated with the MPOOLFILE pointer)2.528 F F1(mpf)2.528 E
-F0 2.528(,w)1.96 G .028(hich were speci-)474.414 530.4 R .431(\214ed as ar)108
-542.4 R .431(guments to the)-.18 F F1(mpool_put)2.931 E F0 .431
-(function with an associated \215ag of MPOOL_DIR)2.931 F(TY)-.6 E 2.93(,t)-1.29
-G 2.93(ot)472.61 542.4 S .43(he source \214le.)483.32 542.4 R(The function)108
-554.4 Q F1(mpool_sync)2.5 E F0(returns -1 on f)2.5 E(ailure, setting)-.1 E F1
-(errno)2.5 E F0 2.5(,a).18 G(nd 0 on success.)357.76 554.4 Q 1.075
-(The function)108 571.2 R F1(mpool_unlink)3.575 E F0(destro)3.575 E 1.075
-(ys the memory pool identi\214ed by the directory)-.1 F F1(path)3.575 E F0
-3.575(,r).28 G(emo)471.33 571.2 Q 1.075(ving all \214les)-.15 F 1.121
-(used to implement the memory pool.)108 583.2 R 1.121(\(The directory)6.121 F
-F1(path)3.621 E F0 1.121(is not remo)3.621 F -.15(ve)-.15 G 3.62(d.\) If).15 F
-1.12(there are processes which)3.62 F(ha)108 595.2 Q .871 -.15(ve c)-.2 H
-(alled).15 E F1(mpool_open)3.071 E F0 .571(without calling)3.071 F F1
-(mpool_close)3.071 E F0 .572
-(\(i.e., there are processes currently using the memory)3.071 F(pool\),)108
-607.2 Q F1(mpool_unlink)2.652 E F0 .152(will f)2.652 F .151
-(ail without further action, unless the force \215ag is set, in which case)-.1
-F F1(mpool_unlink)2.651 E F0 .524
-(will attempt to delete the memory pool \214les re)108 619.2 R -.05(ga)-.15 G
-.525(rdless of an).05 F 3.025(yp)-.15 G .525
-(rocesses still using the memory pool.)366.45 619.2 R(An)5.525 E(y)-.15 E .598
-(accesses to a remo)108 631.2 R -.15(ve)-.15 G 3.097(dm).15 G .597
-(emory pool will lik)208.95 631.2 R .597(ely result in une)-.1 F .597
-(xpected beha)-.15 F(vior)-.2 E 5.597(.T)-.55 G .597(he function)436.036 631.2
-R F1(mpool_unlink)3.097 E F0(returns -1 on f)108 643.2 Q(ailure, setting)-.1 E
-F1(errno)2.5 E F0 2.5(,a).18 G(nd 0 on success.)253.61 643.2 Q .11
-(In the case of catastrophic or system f)108 660 R .11
-(ailure, it is possible to clean up a memory pool by remo)-.1 F .11
-(ving all of the)-.15 F .569(\214les in the directory speci\214ed to the)108
-672 R F1(mpool_cr)3.068 E(eate)-.37 E F0 .568
-(function, as memory pool \214les are ne)3.068 F -.15(ve)-.25 G 3.068(rc).15 G
-.568(reated in an)487.364 672 R(y)-.15 E
-(directory other than the one speci\214ed to)108 684 Q F1(mpool_cr)2.5 E(eate)
--.37 E F0(.).18 E(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q
-99.315(ution August)-.2 F(1, 1995)2.5 E(3)535 732 Q EP
-%%Page: 4 16
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 110.12(DB_MPOOL\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 110.12(anual DB_MPOOL\(3\))340.17 48 R .025(The function)108 84 R/F1
-10/Times-Italic@0 SF(mpool_stat)2.525 E F0 .026
-(writes statistics for the memory pool)2.526 F F1(mp)2.526 E F0 .026
-(to the \214le speci\214ed by)2.526 F F1(fp)2.526 E F0 5.026(.T).19 G .026
-(hese statistics)485.254 84 R .829
-(include the number of \214les participating in the pool, the acti)108 96 R
-1.129 -.15(ve p)-.25 H .829(ages in the pool, and numbers as to ho).15 F(w)-.25
-E(ef)108 108 Q(fecti)-.25 E .3 -.15(ve t)-.25 H(he cache has been.).15 E/F2 9
-/Times-Bold@0 SF(ERR)72 124.8 Q(ORS)-.27 E F0(The)108 136.8 Q F1(mpool_cr)3.852
-E(eate)-.37 E F0(,).18 E F1(mpool_open)3.852 E F0(and)3.852 E F1(mpool_fopen)
-3.852 E F0 1.353(functions may f)3.852 F 1.353(ail and set)-.1 F F1(errno)3.853
-E F0 1.353(for an)3.853 F 3.853(yo)-.15 G 3.853(ft)493.424 136.8 S 1.353
-(he errors)503.387 136.8 R(speci\214ed for the library functions)108 148.8 Q F1
-(open)2.5 E F0(\(2\),).24 E F1 -.37(re)2.5 G(ad).37 E F0(\(2\), and).77 E F1
-(malloc)2.5 E F0(\(3\).).31 E(The)108 165.6 Q F1(mpool_close)3.144 E F0(and)
-3.144 E F1(mpool_fclose)3.144 E F0 .644(functions may f)3.144 F .644
-(ail and set)-.1 F F1(errno)3.144 E F0 .643(for an)3.143 F 3.143(yo)-.15 G
-3.143(ft)425.985 165.6 S .643(he errors speci\214ed for the)435.238 165.6 R
-(library functions)108 177.6 Q F1(close)2.5 E F0(\(2\) and).18 E F1(fr)2.5 E
-(ee)-.37 E F0(\(3\).).18 E(The)108 194.4 Q F1(mpool_g)4.097 E(et)-.1 E F0 1.597
-(function may f)4.097 F 1.597(ail and set)-.1 F F1(errno)4.097 E F0 1.597
-(for an)4.097 F 4.097(yo)-.15 G 4.097(ft)349.14 194.4 S 1.597
-(he errors speci\214ed for the library functions)359.347 194.4 R F1 -.37(re)108
-206.4 S(ad).37 E F0(\(2\),).77 E F1(write)2.5 E F0(\(2\), and).18 E F1(malloc)
-2.5 E F0(\(3\) or the follo).31 E(wing:)-.25 E([EINV)108 223.2 Q(AL])-1.35 E
-(The requested page does not e)133 235.2 Q(xist and MPOOL_CREA)-.15 E(TE w)
--1.11 E(as not set.)-.1 E(The)108 252 Q F1(mpool_put)4.288 E F0 1.787
-(function may f)4.287 F 1.787(ail and set)-.1 F F1(errno)4.287 E F0 1.787
-(for an)4.287 F 4.287(yo)-.15 G 4.287(ft)351.701 252 S 1.787
-(he errors speci\214ed for the library function)362.098 252 R F1(write)108 264
-Q F0(\(2\) or the follo).18 E(wing:)-.25 E([EA)108 280.8 Q(CCES])-.4 E
-(The source \214le w)133 292.8 Q(as not opened for writing.)-.1 E(The)108 309.6
-Q F1(mpool_sync)3.993 E F0 1.493(function may f)3.993 F 1.493(ail and set)-.1 F
-F1(errno)3.993 E F0 1.494(for an)3.993 F 3.994(yo)-.15 G 3.994(ft)353.752 309.6
-S 1.494(he errors speci\214ed for the library function)363.856 309.6 R F1
-(write)108 321.6 Q F0(\(2\).).18 E(The)108 338.4 Q F1(mpool_unlink)3.569 E F0
-1.069(function may f)3.569 F 1.068(ail and set)-.1 F F1(errno)3.568 E F0 1.068
-(for an)3.568 F 3.568(yo)-.15 G 3.568(ft)356.734 338.4 S 1.068
-(he errors speci\214ed for the library function)366.412 338.4 R F1(unlink)108
-350.4 Q F0(\(2\) or the follo).67 E(wing:)-.25 E([EB)108 367.2 Q(USY])-.1 E
-(The memory pool w)133 379.2 Q(as in use and the force \215ag w)-.1 E
-(as not set.)-.1 E F2(SEE ALSO)72 396 Q F1(db_btr)108 408 Q(ee)-.37 E F0
-(\(3\),).18 E F1(db_hash)2.5 E F0(\(3\),).28 E F1(db_loc)2.5 E(k)-.2 E F0
-(\(3\),).67 E F1(db_lo)2.5 E(g)-.1 E F0(\(3\),).22 E F1(db_open)2.5 E F0
-(\(3\),).24 E F1(db_r)2.5 E(ecno)-.37 E F0(\(3\),).18 E F1(db_txn)2.5 E F0
-(\(3\)).24 E(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q
-99.315(ution August)-.2 F(1, 1995)2.5 E(4)535 732 Q EP
-%%Page: 1 17
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 119.01(DB_OPEN\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 119.01(anual DB_OPEN\(3\))340.17 48 R/F1 9/Times-Bold@0 SF -.18(NA)
-72 84 S(ME).18 E F0(db_open \255 database access methods)108 96 Q F1(SYNOPSIS)
-72 112.8 Q/F2 10/Times-Bold@0 SF(#include <db)108 124.8 Q(.h>)-.4 E(DB *)108
-148.8 Q(db_open\(const char *\214le, int \215ags, int mode,)108 160.8 Q
-(DBTYPE type, DBINFO *dbinf)158 172.8 Q(o, const v)-.25 E(oid *openinf)-.1 E
-(o\);)-.25 E F1(DESCRIPTION)72 189.6 Q F0 .485(The DB library is a f)108 201.6
-R .485(amily of groups of functions that pro)-.1 F .486
-(vides a modular programming interf)-.15 F .486(ace to trans-)-.1 F .823
-(actions and record-oriented \214le access.)108 213.6 R .822
-(The library includes support for transaction, locking, logging and)5.822 F
-.258(\214le b)108 225.6 R(uf)-.2 E .258(fering functionality)-.25 F 2.758(,a)
--.65 G 2.758(sw)223.214 225.6 S .258(ell as v)237.082 225.6 R .258(arious inde)
--.25 F -.15(xe)-.15 G 2.758(da).15 G .258(ccess methods.)331.434 225.6 R(Man)
-5.258 E 2.758(yo)-.15 G 2.758(ft)427.878 225.6 S .258
-(he functional groups \(e.g.)436.746 225.6 R .528(the memory pool functions\) \
-are useful independently of the rest of the DB functions, although some func-)
-108 237.6 R .306(tional groups are e)108 249.6 R .306
-(xplicitly based on other functional groups \(e.g.)-.15 F .306
-(transactions and logging\).)5.306 F -.15(Fo)5.306 G 2.806(rag).15 G(eneral)
-515.57 249.6 Q .245(description of transactions, see)108 261.6 R/F3 10
-/Times-Italic@0 SF(db_txn)2.745 E F0 2.745(\(3\). F).24 F .245
-(or a general description of the access methods, see)-.15 F F3(db_open)2.745 E
-F0(\(3\)).24 E .307(and then the indi)108 273.6 R .307
-(vidual access method manual pages:)-.25 F F3(db_btr)2.808 E(ee)-.37 E F0
-(\(3\),).18 E F3(db_hash)2.808 E F0(\(3\),).28 E F3(db_lo)2.808 E(g)-.1 E F0
-.308(\(3\) and).22 F F3(db_r)2.808 E(ecno)-.37 E F0(\(3\).).18 E -.15(Fo)108
-285.6 S 3.635(rag).15 G 1.135(eneral description of the lock manager)138.45
-285.6 R 3.635(,s)-.4 G(ee)307.32 285.6 Q F3(db_loc)3.635 E(k)-.2 E F0 3.635
-(\(3\). F).67 F 1.135(or a general description of the memory)-.15 F
-(pool manager)108 297.6 Q 2.5(,s)-.4 G(ee)171.2 297.6 Q F3(db_mpool)2.5 E F0
-(\(3\).).51 E(This manual page describes the o)108 314.4 Q -.15(ve)-.15 G
-(rall structure of the a).15 E -.25(va)-.2 G(ilable access methods.).25 E .457
-(The currently supported \214le formats are btree, hashed, log and recno \(i.e\
-. \215at-\214le oriented\).)108 331.2 R .457(The btree for)5.457 F(-)-.2 E .974
-(mat is a representation of a sorted, balanced tree structure.)108 343.2 R .973
-(The hashed format is an e)5.974 F .973(xtensible, dynamic)-.15 F .801
-(hashing scheme.)108 355.2 R .802
-(The log format is a general-purpose logging f)5.801 F(acility)-.1 E 5.802(.T)
--.65 G .802(he recno format is a byte stream)406.888 355.2 R .415
-(\214le with \214x)108 367.2 R .415(ed or v)-.15 F .415
-(ariable length records.)-.25 F .415(The formats and other)5.415 F 2.914(,f)-.4
-G .414(ormat speci\214c information are described)376.714 367.2 R
-(in detail in their respecti)108 379.2 Q .3 -.15(ve m)-.25 H(anual pages:).15 E
-F3(db_btr)2.5 E(ee)-.37 E F0(\(3\),).18 E F3(db_hash)2.5 E F0(\(3\),).28 E F3
-(db_lo)2.5 E(g)-.1 E F0(\(3\), and).22 E F3(db_r)2.5 E(ecno)-.37 E F0(\(3\).)
-.18 E .138(Db_open opens)108 396 R F3(\214le)2.638 E F0 .139
-(for reading and/or writing.)2.638 F .139(Files ne)5.139 F -.15(ve)-.25 G 2.639
-(ri).15 G .139(ntended to be preserv)349.088 396 R .139
-(ed on disk may be created)-.15 F .423
-(by setting the \214le parameter to NULL.)108 408 R .423
-(\(Note, while most of the access methods use)5.423 F F3(\214le)2.923 E F0 .423
-(as the name of an)2.923 F .429
-(underlying \214le on disk, this is not guaranteed.)108 420 R .43
-(See the manual pages for the indi)5.429 F .43(vidual access methods for)-.25 F
-(more information.\))108 432 Q(The)108 448.8 Q F3<8d61>4.328 E(gs)-.1 E F0(and)
-4.328 E F3 1.828(mode ar)4.328 F(guments)-.37 E F0 1.828
-(are as speci\214ed to the)4.328 F F3(open)4.328 E F0 1.828(\(2\) function, ho)
-.24 F(we)-.25 E -.15(ve)-.25 G 2.628 -.4(r, o).15 H 1.828(nly the O_CREA).4 F
--.74(T,)-1.11 G .127(O_EXCL, O_EXLOCK, O_NONBLOCK, O_RDONL)108 460.8 R 2.708
--1.29(Y, O)-1 H(_RD)1.29 E .128(WR, O_SHLOCK and O_TR)-.3 F .128
-(UNC \215ags are)-.4 F 2.5(meaningful. \(Note,)108 472.8 R
-(opening a database \214le O_WR)2.5 E(ONL)-.4 E 2.5(Yi)-1 G 2.5(sn)342.67 472.8
-S(ot possible.\))354.06 472.8 Q(The)108 489.6 Q F3(type)5.338 E F0(ar)5.338 E
-2.837(gument is of type DBTYPE \(as de\214ned in the <db)-.18 F 2.837
-(.h> include \214le\) and may be set to)-.4 F
-(DB_BTREE, DB_HASH, DB_LOG or DB_RECNO.)108 501.6 Q(The)108 518.4 Q F3(dbinfo)
-3.279 E F0(ar)3.279 E .779(gument is a pointer to a structure containing refer\
-ences to locking, logging, transaction, and)-.18 F 1.242(shared-memory b)108
-530.4 R(uf)-.2 E 1.242(fer pool information.)-.25 F(If)6.242 E F3(dbinfo)3.742
-E F0 1.241(is NULL, then the access method may still use these)3.741 F .667
-(subsystems, b)108 542.4 R .667(ut the usage will be pri)-.2 F -.25(va)-.25 G
-.668(te to the application and managed by DB.).25 F(If)5.668 E F3(dbinfo)3.168
-E F0 .668(is non-NULL,)3.168 F .481(then the module referenced by each of the \
-non-NULL \214elds is used by DB as necessary)108 554.4 R 5.48(.T)-.65 G .48
-(he \214elds of the)479.4 554.4 R(DBINFO structure are de\214ned as follo)108
-566.4 Q(ws:)-.25 E(const char *errpfx;)108 583.2 Q 2.5(Ap)133 595.2 S
-(re\214x to prepend to error messages; used only if)147.72 595.2 Q F3
-(err\214le)2.5 E F0(is non-NULL.)2.5 E(FILE *err\214le;)108 612 Q(The)133 624 Q
-F3(stdio)2.5 E F0(\(3\) \214le stream to which error messages are logged.).18 E
-.147(When an)133 648 R 2.647(ye)-.15 G .147(rror occurs in the)180.904 648 R F3
-(db_open)2.648 E F0 .148(function, or in an)2.648 F 2.648(yf)-.15 G .148
-(unction called using a \214eld of the returned)369.824 648 R .234
-(DB structure, an error v)133 660 R .234
-(alue is returned by the function, and the global v)-.25 F(ariable)-.25 E F3
-(errno)2.733 E F0 .233(is set appropri-)2.733 F(ately)133 672 Q 5.415(.I)-.65 G
-2.915(ns)163.035 672 S .416(ome cases, ho)174.84 672 R(we)-.25 E -.15(ve)-.25 G
-1.216 -.4(r, t).15 H(he).4 E F3(errno)2.916 E F0 -.25(va)2.916 G .416
-(lue may be insuf).25 F .416(\214cient to describe the cause of the error)-.25
-F(.)-.55 E .137(In these cases, if)133 684 R F3(err\214le)2.637 E F0 .137(is n\
-on-NULL, additional error information will be written to the \214le stream it)
-2.637 F(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315
-(ution August)-.2 F(1, 1995)2.5 E(1)535 732 Q EP
-%%Page: 2 18
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 119.01(DB_OPEN\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 119.01(anual DB_OPEN\(3\))340.17 48 R .643
-(represents, preceded by the string, if an)133 84 R 1.943 -.65(y, s)-.15 H .643
-(peci\214ed by).65 F/F1 10/Times-Italic@0 SF(errpfx)3.143 E F0 5.643(.T).53 G
-.644(his error logging f)394.94 84 R .644(acility should not)-.1 F
-(be required for normal operation, b)133 96 Q(ut may be useful in deb)-.2 E
-(ugging applications.)-.2 E(char *errb)108 112.8 Q(uf;)-.2 E .03(The b)133
-124.8 R(uf)-.2 E .03(fer to which error messages are copied.)-.25 F .029
-(If non-NULL,)5.029 F F1(errb)2.529 E(uf)-.2 E F0(beha)2.529 E -.15(ve)-.2 G
-2.529(sa).15 G 2.529(sd)451.423 124.8 S .029(escribed for)462.842 124.8 R F1
-(err\214le)2.529 E F0(,).18 E -.15(ex)133 136.8 S .173(cept that the).15 F F1
-(errpfx)2.673 E F0 .174
-(\214eld is ignored and the error message is copied into the speci\214ed b)
-2.673 F(uf)-.2 E .174(fer instead)-.25 F 1.014
-(of being written to the FILE stream.)133 148.8 R 1.013
-(The DB routines assume that the associated b)6.014 F(uf)-.2 E 1.013
-(fer is at least)-.25 F(1024 bytes in length.)133 160.8 Q(LOCK_T)108 177.6 Q
-(ABLE_T *lockinfo;)-.93 E .265
-(If locking is required for the \214le being opened \(as in the case of b)133
-189.6 R(uf)-.2 E .266(fers being maintained in a shared)-.25 F 1.794(memory b)
-133 201.6 R(uf)-.2 E 1.794(fer pool\), the)-.25 F F1(loc)4.294 E(kinfo)-.2 E F0
-1.794(\214eld contains a return v)4.294 F 1.793(alue from the function)-.25 F
-F1(loc)4.293 E(k_open)-.2 E F0(that)4.293 E(should be used \(see)133 213.6 Q F1
-(db_loc)2.5 E(k)-.2 E F0 2.5(\(3\)\). If).67 F F1(loc)2.5 E(kinfo)-.2 E F0
-(is NULL, no locking is done.)2.5 E(DB *loginfo;)108 230.4 Q .93
-(If modi\214cations to the \214le being opened should be logged, the)133 242.4
-R F1(lo)3.43 E(ginfo)-.1 E F0 .93(\214eld contains a return v)3.43 F(alue)-.25
-E .063(from the function)133 254.4 R F1(dbopen)2.563 E F0 2.563(,w).24 G .062
-(hen opening a DB \214le of type DB_LOG.)247.642 254.4 R(If)5.062 E F1(lo)2.562
-E(ginfo)-.1 E F0 .062(is NULL, no logging)2.562 F(is done.)133 266.4 Q
-(MPOOL *mpoolinfo;)108 283.2 Q 1.129
-(If the cache for the \214le being opened should be maintained in a shared b)
-133 295.2 R(uf)-.2 E 1.129(fer pool, the)-.25 F F1(mpoolinfo)3.629 E F0 .102
-(\214eld contains a return v)133 307.2 R .102(alue from the function)-.25 F F1
-(mpool_open)2.602 E F0 .102(that should be used \(see)2.602 F F1(db_mpool)2.602
-E F0 2.602(\(3\)\). If).51 F F1(mpoolinfo)133 319.2 Q F0 .429
-(is NULL, a memory pool may still be created, b)2.929 F .43(ut it will be pri)
--.2 F -.25(va)-.25 G .43(te to the application and).25 F(managed by DB.)133
-331.2 Q(TXNMGR *txninfo;)108 348 Q 1.161
-(If the accesses to the \214le being opened should tak)133 360 R 3.661(ep)-.1 G
-1.161(lace in the conte)354.474 360 R 1.161(xt of transactions \(pro)-.15 F
-(viding)-.15 E 1.239(atomicity and complete error reco)133 372 R -.15(ve)-.15 G
-1.239(ry\), the).15 F F1(txninfo)3.739 E F0 1.239(\214eld contains a return v)
-3.739 F 1.24(alue from the function)-.25 F F1(txn_open)133 384 Q F0(\(see)2.599
-E F1(db_txn)2.599 E F0 2.599(\(3\)\). If).24 F .098
-(transactions are speci\214ed, the application is responsible for making suit-)
-2.599 F 1.27(able calls to)133 396 R F1(txn_be)3.77 E(gin)-.4 E F0(,).24 E F1
-(txn_abort)3.77 E F0 3.77(,a).68 G(nd)282.91 396 Q F1(txn_commit)3.77 E F0 6.27
-(.I).68 G(f)356.12 396 Q F1(txninfo)3.77 E F0 1.27
-(is NULL, no transaction support is)3.77 F(done.)133 408 Q(The)108 424.8 Q F1
-(openinfo)2.85 E F0(ar)2.85 E .349(gument is a pointer to an access method spe\
-ci\214c structure described in the access method')-.18 F(s)-.55 E .03
-(manual page.)108 436.8 R(If)5.03 E F1(openinfo)2.53 E F0 .031
-(is NULL, each access method will use def)2.53 F .031
-(aults appropriate for the system and the)-.1 F(access method.)108 448.8 Q/F2 9
-/Times-Bold@0 SF(KEY/D)72 465.6 Q -1.35 -.855(AT A)-.315 H -.666(PA)3.105 G
-(IRS).666 E F0 .313(Access to all access methods is based on k)108 477.6 R -.15
-(ey)-.1 G .312(/data pairs.).15 F .312(Both k)5.312 F -.15(ey)-.1 G 2.812(sa)
-.15 G .312(nd data are represented by the follo)386.758 477.6 R(w-)-.25 E
-(ing data structure:)108 489.6 Q(typedef struct {)108 506.4 Q -.2(vo)144 518.4
-S(id *data;).2 E(size_t size;)144 530.4 Q 2.5(}D)108 542.4 S(BT)122.52 542.4 Q
-(;)-.55 E(The elements of the DBT structure are de\214ned as follo)108 559.2 Q
-(ws:)-.25 E 5.84(data A)108 576 R(pointer to a byte string.)2.5 E 6.95
-(size The)108 592.8 R(length of)2.5 E F1(data)2.5 E F0 2.5(,i).26 G 2.5(nb)
-215.2 592.8 S(ytes.)227.7 592.8 Q -2.15 -.25(Ke y)108 609.6 T .672(and data by\
-te strings may reference strings of essentially unlimited length, although an)
-3.422 F 3.173(yt)-.15 G .873 -.1(wo o)493.204 609.6 T 3.173(ft).1 G(hem)522.78
-609.6 Q(must \214t into a)108 621.6 Q -.25(va)-.2 G
-(ilable memory at the same time.).25 E .14(The access methods pro)108 638.4 R
-.139(vide no guarantees about byte string alignment, and applications are resp\
-onsible for)-.15 F(maintaining an)108 650.4 Q 2.5(yn)-.15 G
-(ecessary alignment.)180.07 650.4 Q F2(DB OPERA)72 667.2 Q(TIONS)-.855 E F1
-(Db_open)108 679.2 Q F0 .56
-(returns a pointer to a DB structure \(as de\214ned in the <db)3.06 F .56
-(.h> include \214le\) on success, and NULL)-.4 F 1.02(on error)108 691.2 R 6.02
-(.T)-.55 G 1.02(he DB structure describes a database type, and includes a set \
-of functions to perform v)155.03 691.2 R(arious)-.25 E(4.4 Berk)72 732 Q(ele)
--.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315(ution August)-.2 F(1, 1995)2.5 E
-(2)535 732 Q EP
-%%Page: 3 19
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 119.01(DB_OPEN\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 119.01(anual DB_OPEN\(3\))340.17 48 R .241
-(actions, as described belo)108 84 R 4.041 -.65(w. E)-.25 H .241
-(ach of these functions tak).65 F .241
-(es a pointer to a DB structure, and may tak)-.1 F 2.741(eo)-.1 G .242(ne or)
-519.488 84 R .889(more DBT *')108 96 R 3.389(sa)-.55 G .889(nd a \215ag v)
-174.827 96 R .889(alue as well.)-.25 F(Indi)5.889 E .888
-(vidual access methods specify additional functions and \215ags)-.25 F
-(which are speci\214c to the method.)108 108 Q
-(The \214elds of the DB structure are as follo)5 E(ws:)-.25 E(DBTYPE type;)108
-124.8 Q(The type of the underlying access method \(and \214le format\).)133
-136.8 Q(int \(*close\)\(const DB *db\);)108 153.6 Q 3.863(Ap)133 165.6 S 1.363
-(ointer to a function to \215ush an)149.083 165.6 R 3.864(yc)-.15 G 1.364
-(ached information to disk, free an)290.968 165.6 R 3.864(ya)-.15 G 1.364
-(llocated resources, and)445.912 165.6 R .878(close an)133 177.6 R 3.378(yu)
--.15 G .878(nderlying \214les.)179.596 177.6 R .878(Since k)5.878 F -.15(ey)-.1
-G .878(/data pairs are cached in memory).15 F 3.377(,f)-.65 G .877
-(ailing to sync the \214le with)431.445 177.6 R(the)133 189.6 Q/F1 10
-/Times-Italic@0 SF(close)2.5 E F0(or)2.5 E F1(sync)2.5 E F0
-(function may result in inconsistent or lost information.)2.5 E(The)133 206.4 Q
-F1(close)2.5 E F0(functions return -1 on f)2.5 E(ailure, setting)-.1 E F1
-(errno)2.5 E F0 2.5(,a).18 G(nd 0 on success.)355.54 206.4 Q
-(int \(*del\)\(const DB *db, TXN *txnid,)108 223.2 Q(const DBT *k)183 235.2 Q
--.15(ey)-.1 G 2.5(,u)-.5 G(_int \215ags\);)257.65 235.2 Q 2.541(Ap)133 247.2 S
-.041(ointer to a function to remo)147.761 247.2 R .341 -.15(ve k)-.15 H -.15
-(ey).05 G .041(/data pairs from the database.).15 F .042(The k)5.041 F -.15(ey)
--.1 G .042(/data pair associated with).15 F(the speci\214ed)133 259.2 Q F1 -.1
-(ke)2.5 G(y)-.2 E F0(are discarded from the database.)2.5 E(The)133 276 Q F1
-(txnid)3.317 E F0 .817(parameter contains a transaction ID returned from)3.317
-F F1(txn_be)3.317 E(gin)-.4 E F0 3.317(,i).24 G 3.316(ft)431.22 276 S .816
-(he \214le is being accessed)440.646 276 R
-(under transaction protection, or NULL if transactions are not in ef)133 288 Q
-(fect.)-.25 E(The parameter)133 304.8 Q F1<8d61>2.5 E(g)-.1 E F0
-(must be set to 0 or e)2.5 E(xactly one of the follo)-.15 E(wing v)-.25 E
-(alues:)-.25 E(R_CURSOR)133 321.6 Q(Delete the record referenced by the cursor)
-158 333.6 Q 5(.T)-.55 G(he cursor must ha)339.32 333.6 Q .3 -.15(ve p)-.2 H(re)
-.15 E(viously been initialized.)-.25 E(The)133 350.4 Q F1(delete)2.934 E F0
-.434(functions return -1 on error)2.934 F 2.934(,s)-.4 G(etting)297.818 350.4 Q
-F1(errno)2.934 E F0 2.934(,0o).18 G 2.934(ns)364.3 350.4 S .434
-(uccess, and 1 if the speci\214ed)376.124 350.4 R F1 -.1(ke)2.935 G(y)-.2 E F0
-.435(did not)2.935 F -.15(ex)133 362.4 S(ist in the \214le.).15 E
-(int \(*fd\)\(const DB *db\);)108 379.2 Q 3.351(Ap)133 391.2 S .851
-(ointer to a function which returns a \214le descriptor representati)148.571
-391.2 R 1.15 -.15(ve o)-.25 H 3.35(ft).15 G .85(he underlying database.)430.53
-391.2 R(A)5.85 E .338(\214le descriptor referencing the same \214le will be re\
-turned to all processes which call)133 403.2 R F1(db_open)2.838 E F0 .339
-(with the)2.839 F(same)133 415.2 Q F1(\214le)3.376 E F0 3.376(name. This)3.376
-F .876(\214le descriptor may be safely used as an ar)3.376 F .876
-(gument to the)-.18 F F1(fcntl)3.376 E F0 .875(\(2\) and).51 F F1(\215oc)3.375
-E(k)-.2 E F0(\(2\)).67 E .99(locking functions.)133 427.2 R .99
-(The \214le descriptor is not necessarily associated with an)5.99 F 3.49(yo)
--.15 G 3.49(ft)453.98 427.2 S .99(he underlying \214les)463.58 427.2 R
-(used by the access method.)133 439.2 Q(No \214le descriptor is a)5 E -.25(va)
--.2 G(ilable for in memory databases.).25 E(The)133 456 Q F1(fd)2.5 E F0
-(functions return -1 on error)2.5 E 2.5(,s)-.4 G(etting)278.68 456 Q F1(errno)
-2.5 E F0 2.5(,a).18 G(nd the \214le descriptor on success.)335.8 456 Q
-(int \(*get\)\(const DB *db, TXN *txnid,)108 472.8 Q(const DBT *k)183 484.8 Q
--.15(ey)-.1 G 2.5(,D)-.5 G(BT *data, u_int \215ags\);)259.87 484.8 Q 2.854(Ap)
-133 496.8 S .354(ointer to a function which is the interf)148.074 496.8 R .354
-(ace for k)-.1 F -.15(ey)-.1 G .353(ed retrie).15 F -.25(va)-.25 G 2.853(lf).25
-G .353(rom the database.)397.995 496.8 R .353(The address and)5.353 F
-(length of the data associated with the speci\214ed)133 508.8 Q F1 -.1(ke)2.5 G
-(y)-.2 E F0(are returned in the structure referenced by)2.5 E F1(data)2.5 E F0
-(.).26 E(The)133 525.6 Q F1(txnid)3.316 E F0 .816
-(parameter contains a transaction ID returned from)3.316 F F1(txn_be)3.317 E
-(gin)-.4 E F0 3.317(,i).24 G 3.317(ft)431.215 525.6 S .817
-(he \214le is being accessed)440.642 525.6 R
-(under transaction protection, or NULL if transactions are not in ef)133 537.6
-Q(fect.)-.25 E(The)133 554.4 Q F1 -.1(ge)2.5 G(t).1 E F0
-(functions return -1 on error)2.5 E 2.5(,s)-.4 G(etting)283.02 554.4 Q F1
-(errno)2.5 E F0 2.5(,0o).18 G 2.5(ns)348.2 554.4 S(uccess, and 1 if the)359.59
-554.4 Q F1 -.1(ke)2.5 G(y)-.2 E F0 -.1(wa)2.5 G 2.5(sn).1 G(ot found.)476.83
-554.4 Q(int \(*put\)\(const DB *db, TXN *txnid,)108 571.2 Q(DBT *k)183 583.2 Q
--.15(ey)-.1 G 2.5(,c)-.5 G(onst DBT *data, u_int \215ags\);)233.48 583.2 Q 2.5
-(Ap)133 595.2 S(ointer to a function to store k)147.72 595.2 Q -.15(ey)-.1 G
-(/data pairs in the database.).15 E(The)133 612 Q F1(txnid)3.317 E F0 .817
-(parameter contains a transaction ID returned from)3.317 F F1(txn_be)3.317 E
-(gin)-.4 E F0 3.317(,i).24 G 3.316(ft)431.22 612 S .816
-(he \214le is being accessed)440.646 612 R
-(under transaction protection, or NULL if transactions are not in ef)133 624 Q
-(fect.)-.25 E(The parameter)133 640.8 Q F1<8d61>2.5 E(g)-.1 E F0
-(must be set to 0 or e)2.5 E(xactly one of the follo)-.15 E(wing v)-.25 E
-(alues:)-.25 E(R_CURSOR)133 657.6 Q .448(Replace the k)158 669.6 R -.15(ey)-.1
-G .448(/data pair referenced by the cursor).15 F 5.449(.T)-.55 G .449
-(he cursor must ha)375.156 669.6 R .749 -.15(ve p)-.2 H(re).15 E .449
-(viously been ini-)-.25 F(tialized.)158 681.6 Q(4.4 Berk)72 732 Q(ele)-.1 E 2.5
-(yD)-.15 G(istrib)132.57 732 Q 99.315(ution August)-.2 F(1, 1995)2.5 E(3)535
-732 Q EP
-%%Page: 4 20
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 119.01(DB_OPEN\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 119.01(anual DB_OPEN\(3\))340.17 48 R(R_NOO)133 84 Q(VER)-.5 E
-(WRITE)-.55 E(Enter the ne)158 96 Q 2.5(wk)-.25 G -.15(ey)220.69 96 S
-(/data pair only if the k).15 E .3 -.15(ey d)-.1 H(oes not pre).15 E(viously e)
--.25 E(xist.)-.15 E .664(The def)133 112.8 R .664(ault beha)-.1 F .664
-(vior of the)-.2 F/F1 10/Times-Italic@0 SF(put)3.164 E F0 .664
-(functions is to enter the ne)3.164 F 3.164(wk)-.25 G -.15(ey)387.498 112.8 S
-.663(/data pair).15 F 3.163(,r)-.4 G .663(eplacing an)443.534 112.8 R 3.163(yp)
--.15 G(re)503.03 112.8 Q(viously)-.25 E -.15(ex)133 124.8 S(isting k).15 E -.15
-(ey)-.1 G(.)-.5 E(The)133 141.6 Q F1(put)3.558 E F0 1.058
-(functions return -1 on error)3.558 F 3.559(,s)-.4 G(etting)291.089 141.6 Q F1
-(errno)3.559 E F0 3.559(,0o).18 G 3.559(ns)359.446 141.6 S 1.059
-(uccess, and 1 if the R_NOO)371.895 141.6 R(VER)-.5 E(WRITE)-.55 E F1<8d61>133
-153.6 Q(g)-.1 E F0 -.1(wa)2.5 G 2.5(ss).1 G(et and the k)172.24 153.6 Q .3 -.15
-(ey a)-.1 H(lready e).15 E(xists in the \214le.)-.15 E
-(int \(*seq\)\(const DB *db, TXN *txnid,)108 170.4 Q(DBT *k)183 182.4 Q -.15
-(ey)-.1 G 2.5(,D)-.5 G(BT *data, u_int \215ags\);)236.26 182.4 Q 2.877(Ap)133
-194.4 S .377(ointer to a function which is the interf)148.097 194.4 R .377
-(ace for sequential retrie)-.1 F -.25(va)-.25 G 2.877(lf).25 G .377
-(rom the database.)415.194 194.4 R .376(The address)5.376 F .012
-(and length of the k)133 206.4 R .312 -.15(ey a)-.1 H .012
-(re returned in the structure referenced by).15 F F1 -.1(ke)2.512 G(y)-.2 E F0
-2.512(,a).32 G .012(nd the address and length of the)412.726 206.4 R
-(data are returned in the structure referenced by)133 218.4 Q F1(data)2.5 E F0
-(.).26 E(The)133 235.2 Q F1(txnid)3.317 E F0 .817
-(parameter contains a transaction ID returned from)3.317 F F1(txn_be)3.317 E
-(gin)-.4 E F0 3.317(,i).24 G 3.316(ft)431.22 235.2 S .816
-(he \214le is being accessed)440.646 235.2 R
-(under transaction protection, or NULL if transactions are not in ef)133 247.2
-Q(fect.)-.25 E .721(Sequential k)133 264 R -.15(ey)-.1 G .721
-(/data pair retrie).15 F -.25(va)-.25 G 3.221(lm).25 G .721(ay be)277.884 264 R
-.721(gin at an)-.15 F 3.221(yt)-.15 G .721
-(ime, and the logical position of the `)346.568 264 R(`cursor')-.74 E 3.222('i)
--.74 G(s)536.11 264 Q .947(not af)133 276 R .947(fected by calls to the)-.25 F
-F1(del)3.447 E F0(,).51 E F1 -.1(ge)3.447 G(t).1 E F0(,).68 E F1(put)3.447 E F0
-3.446(,o).68 G(r)308.572 276 Q F1(sync)3.446 E F0 3.446
-(functions. Modi\214cations)3.446 F .946(to the database during a)3.446 F 2.091
-(sequential scan will be re\215ected in the scan, i.e. records inserted behind\
- the cursor will not be)133 288 R
-(returned while records inserted in front of the cursor will be returned.)133
-300 Q(The parameter)133 316.8 Q F1<8d61>2.5 E(g)-.1 E F0(must be set to 0 or e)
-2.5 E(xactly one of the follo)-.15 E(wing v)-.25 E(alues:)-.25 E(R_CURSOR)133
-333.6 Q .937(The data associated with the speci\214ed k)158 345.6 R 1.237 -.15
-(ey i)-.1 H 3.437(sr).15 G 3.437(eturned. This)348.546 345.6 R(dif)3.437 E .936
-(fers from the)-.25 F F1 -.1(ge)3.436 G(t).1 E F0 .936(functions in)3.436 F
-(that it sets or initializes the cursor to the location of the k)158 357.6 Q .3
--.15(ey a)-.1 H 2.5(sw).15 G(ell.)415.5 357.6 Q(R_FIRST)133 374.4 Q .835
-(The \214rst k)158 386.4 R -.15(ey)-.1 G .835(/data pair of the database is re\
-turned, and the cursor is set or initialized to refer).15 F(-)-.2 E(ence it.)
-158 398.4 Q(R_NEXT)133 415.2 Q(Retrie)158 427.2 Q 1.015 -.15(ve t)-.25 H .715
-(he k).15 F -.15(ey)-.1 G .715(/data pair immediately after the cursor).15 F
-5.715(.I)-.55 G 3.215(ft)391.91 427.2 S .714
-(he cursor is not yet set, this is the)401.235 427.2 R
-(same as the R_FIRST \215ag.)158 439.2 Q(The)133 456 Q F1(seq)3.014 E F0 .514
-(functions return -1 on error)3.014 F 3.015(,s)-.4 G(etting)287.83 456 Q F1
-(errno)3.015 E F0 3.015(,0o).18 G 3.015(ns)354.555 456 S .515
-(uccess, and 1 if there are no k)366.46 456 R -.15(ey)-.1 G .515(/data pairs)
-.15 F(less than or greater than the speci\214ed or current k)133 468 Q -.15(ey)
--.1 G(.)-.5 E(int \(*sync\)\(const DB *db, u_int \215ags\);)108 484.8 Q 3.291
-(Ap)133 496.8 S .791(ointer to a function to \215ush an)148.511 496.8 R 3.291
-(yc)-.15 G .791(ached information to disk.)286.388 496.8 R .79
-(If the database is in memory only)5.79 F(,)-.65 E(the)133 508.8 Q F1(sync)2.5
-E F0(function has no ef)2.5 E(fect and will al)-.25 E -.1(wa)-.1 G(ys succeed.)
-.1 E(The parameter)133 525.6 Q F1<8d61>2.5 E(g)-.1 E F0
-(must be set to 0 or a v)2.5 E
-(alue speci\214ed by an access method speci\214c manual page.)-.25 E(The)133
-542.4 Q F1(sync)2.5 E F0(functions return -1 on f)2.5 E(ailure, setting)-.1 E
-F1(errno)2.5 E F0 2.5(,a).18 G(nd 0 on success.)352.76 542.4 Q/F2 9
-/Times-Bold@0 SF(ERR)72 559.2 Q(ORS)-.27 E F0(The)108 571.2 Q F1(db_open)4.548
-E F0 2.048(function may f)4.548 F 2.049(ail and set)-.1 F F1(errno)4.549 E F0
-2.049(for an)4.549 F 4.549(yo)-.15 G 4.549(ft)345.977 571.2 S 2.049
-(he errors speci\214ed for the library functions)356.636 571.2 R F1(open)108
-583.2 Q F0(\(2\),).24 E F1(malloc)2.5 E F0(\(3\) or the follo).31 E(wing:)-.25
-E([EFTYPE])108 600 Q 2.5<418c>133 612 S(le is incorrectly formatted.)148.28 612
-Q([EINV)108 628.8 Q(AL])-1.35 E 2.557(Ap)133 640.8 S .056
-(arameter has been speci\214ed \(hash function, recno pad byte etc.\))147.777
-640.8 R .056(that is incompatible with the cur)5.056 F(-)-.2 E .725
-(rent \214le speci\214cation or)133 652.8 R 3.225(,a\215)-.4 G .725
-(ag to a function which is not meaningful for the function \(for e)248.435
-652.8 R(xample,)-.15 E .763(use of the cursor without prior initialization\) o\
-r there is a mismatch between the v)133 664.8 R .763(ersion number of)-.15 F
-(\214le and the softw)133 676.8 Q(are.)-.1 E(The)108 693.6 Q F1(close)2.913 E
-F0 .413(functions may f)2.913 F .413(ail and set)-.1 F F1(errno)2.913 E F0 .413
-(for an)2.913 F 2.913(yo)-.15 G 2.913(ft)319.62 693.6 S .414
-(he errors speci\214ed for the library functions)328.643 693.6 R F1(close)2.914
-E F0(\(2\),).18 E(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q
-99.315(ution August)-.2 F(1, 1995)2.5 E(4)535 732 Q EP
-%%Page: 5 21
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 119.01(DB_OPEN\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 119.01(anual DB_OPEN\(3\))340.17 48 R/F1 10/Times-Italic@0 SF -.37
-(re)108 84 S(ad).37 E F0(\(2\),).77 E F1(write)2.5 E F0(\(2\),).18 E F1(fr)2.5
-E(ee)-.37 E F0(\(3\), or).18 E F1(fsync)2.5 E F0(\(2\).).31 E(The)108 100.8 Q
-F1(del)2.52 E F0(,).51 E F1 -.1(ge)2.52 G(t).1 E F0(,).68 E F1(put)2.52 E F0
-(and)2.52 E F1(seq)2.52 E F0 .02(functions may f)2.52 F .02(ail and set)-.1 F
-F1(errno)2.52 E F0 .02(for an)2.52 F 2.52(yo)-.15 G 2.52(ft)376.3 100.8 S .02
-(he errors speci\214ed for the library func-)384.93 100.8 R(tions)108 112.8 Q
-F1 -.37(re)2.5 G(ad).37 E F0(\(2\),).77 E F1(write)2.5 E F0(\(2\),).18 E F1(fr)
-2.5 E(ee)-.37 E F0(\(3\) or).18 E F1(malloc)2.5 E F0(\(3\).).31 E(The)108 129.6
-Q F1(fd)2.5 E F0(functions will f)2.5 E(ail and set)-.1 E F1(errno)2.5 E F0
-(to ENOENT for in memory databases.)2.5 E(The)108 146.4 Q F1(sync)2.5 E F0
-(functions may f)2.5 E(ail and set)-.1 E F1(errno)2.5 E F0(for an)2.5 E 2.5(yo)
--.15 G 2.5(ft)312.71 146.4 S(he errors speci\214ed for the library function)
-321.32 146.4 Q F1(fsync)2.5 E F0(\(2\).).31 E/F2 9/Times-Bold@0 SF(SEE ALSO)72
-163.2 Q F1(db_btr)108 175.2 Q(ee)-.37 E F0(\(3\),).18 E F1(db_hash)2.5 E F0
-(\(3\),).28 E F1(db_loc)2.5 E(k)-.2 E F0(\(3\),).67 E F1(db_lo)2.5 E(g)-.1 E F0
-(\(3\),).22 E F1(db_mpool)2.5 E F0(\(3\),).51 E F1(db_r)2.5 E(ecno)-.37 E F0
-(\(3\),).18 E F1(db_txn)2.5 E F0(\(3\)).24 E F2 -.09(BU)72 192 S(GS).09 E F0
-.106(The name DBT is a mnemonic for `)108 204 R .106(`data base thang')-.74 F
-.106(', and w)-.74 F .107(as used because noone could think of a reason-)-.1 F
-(able name that w)108 216 Q(asn')-.1 E 2.5(ta)-.18 G(lready in use some)202.14
-216 Q(where else.)-.25 E(The)108 232.8 Q F1(fd)2.5 E F0(function interf)2.5 E
-(ace is a kluge, and will be deleted in a future v)-.1 E(ersion of the interf)
--.15 E(ace.)-.1 E(Only big and little endian byte order is supported.)108 249.6
-Q(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315
-(ution August)-.2 F(1, 1995)2.5 E(5)535 732 Q EP
-%%Page: 1 22
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 111.23(DB_RECNO\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 111.23(anual DB_RECNO\(3\))340.17 48 R/F1 9/Times-Bold@0 SF -.18(NA)
-72 84 S(ME).18 E F0(db_recno \255 record number database access method)108 96 Q
-F1(DESCRIPTION)72 112.8 Q F0(speci\214c details of the recno access method.)108
-124.8 Q F1 -.495(AC)72 141.6 S(CESS METHOD SPECIFIC INFORMA).495 E(TION)-.855 E
-F0 2.497(The recno access method speci\214c data structure pro)108 153.6 R
-2.497(vided to)-.15 F/F2 10/Times-Italic@0 SF(db_open)4.997 E F0 2.497
-(is typedef)4.997 F 3.497 -.5('d a).55 H 2.497(nd named REC-).5 F 2.765
-(NOINFO. A)108 165.6 R .265(RECNOINFO structure has at least the follo)2.765 F
-.266(wing \214elds, which may be initialized before call-)-.25 F(ing)108 177.6
-Q F2(db_open)2.5 E F0(:).24 E(u_int8_t b)108 194.4 Q -.25(va)-.15 G(l;).25 E
-.793(The delimiting byte to be used to mark the end of a record for v)133 206.4
-R .793(ariable-length records, and the pad)-.25 F .386(character for \214x)133
-218.4 R .387(ed-length records.)-.15 F .387(If no v)5.387 F .387
-(alue is speci\214ed, ne)-.25 F .387(wlines \(`)-.25 F(`\\n')-.74 E .387
-('\) are used to mark the end)-.74 F(of v)133 230.4 Q
-(ariable-length records and \214x)-.25 E
-(ed-length records are padded with spaces.)-.15 E(char *bfname;)108 247.2 Q
-1.152(The recno access method stores the in-memory copies of its records in a \
-btree.)133 259.2 R 1.152(If bfname is non-)6.152 F .35(NULL, it speci\214es th\
-e name of the btree \214le, as if speci\214ed as the \214le name for a)133
-271.2 R F2(db_open)2.851 E F0 .351(of a btree)2.851 F(\214le.)133 283.2 Q
-(u_int cachesize;)108 300 Q 3.847(As)133 312 S 1.347
-(uggested maximum size, in bytes, of the memory cache.)147.957 312 R 1.347
-(This v)6.347 F 1.347(alue is)-.25 F/F3 10/Times-Bold@0 SF(only)3.847 E F0
-(advisory)3.847 E 3.846(,a)-.65 G 1.346(nd the)513.934 312 R .693
-(access method will allocate more memory rather than f)133 324 R 3.193(ail. If)
--.1 F F2(cac)3.193 E(hesize)-.15 E F0 3.193(is 0)3.193 F .693
-(\(no size is speci\214ed\) a)3.193 F(def)133 336 Q(ault size is used.)-.1 E
-(u_long \215ags;)108 352.8 Q(The \215ag v)133 364.8 Q(alue is speci\214ed by)
--.25 E F2(or)2.5 E F0('ing an).73 E 2.5(yo)-.15 G 2.5(ft)302.2 364.8 S
-(he follo)310.81 364.8 Q(wing v)-.25 E(alues:)-.25 E(R_FIXEDLEN)133 381.6 Q
-1.49(The records are \214x)158 393.6 R 1.489(ed-length, not byte delimited.)
--.15 F 1.489(The structure element)6.489 F F2 -.37(re)3.989 G(clen).37 E F0
-1.489(speci\214es the)3.989 F .487
-(length of the record, and the structure element)158 405.6 R F2(bval)2.987 E F0
-.488(is used as the pad character)2.988 F 5.488(.A)-.55 G .788 -.15(ny r)
-495.232 405.6 T(ecords,).15 E(inserted into the database, that are less than)
-158 417.6 Q F2 -.37(re)2.5 G(clen).37 E F0
-(bytes long are automatically padded.)2.5 E(R_NOKEY)133 434.4 Q 1.146
-(In the interf)158 446.4 R 1.146(ace speci\214ed by)-.1 F F2(db_open)3.646 E F0
-3.646(,t).24 G 1.146(he sequential record retrie)320.816 446.4 R -.25(va)-.25 G
-3.646<6c8c>.25 G 1.145(lls in both the caller')449.31 446.4 R(s)-.55 E -.1(ke)
-158 458.4 S 4.795(ya)-.05 G 2.295(nd data structures.)181.425 458.4 R 2.295
-(If the R_NOKEY \215ag is speci\214ed, the)7.295 F F2(cur)4.795 E(sor)-.1 E F0
-2.295(functions are not)4.795 F .621(required to \214ll in the k)158 470.4 R
-.921 -.15(ey s)-.1 H 3.121(tructure. This).15 F .621
-(permits applications to retrie)3.121 F .92 -.15(ve r)-.25 H .62
-(ecords at the end of).15 F(\214les without reading all of the interv)158 482.4
-Q(ening records.)-.15 E(R_SN)133 499.2 Q(APSHO)-.35 E(T)-.4 E .029
-(This \215ag requires that a snapshot of the \214le be tak)158 511.2 R .029
-(en when)-.1 F F2(db_open)2.529 E F0 .029(is called, instead of permit-)2.529 F
-(ting an)158 523.2 Q 2.5(yu)-.15 G
-(nmodi\214ed records to be read from the original \214le.)197.85 523.2 Q
-(int lorder;)108 540 Q .65(The byte order for inte)133 552 R .65
-(gers in the stored database metadata.)-.15 F .65
-(The number should represent the order)5.65 F .748(as an inte)133 564 R .749
-(ger; for e)-.15 F .749(xample, big endian order w)-.15 F .749
-(ould be the number 4,321.)-.1 F(If)5.749 E F2(lor)3.249 E(der)-.37 E F0 .749
-(is 0 \(no order is)3.249 F(speci\214ed\) the current host order is used.)133
-576 Q(u_int psize;)108 592.8 Q .284(The recno access method stores the in-memo\
-ry copies of its records in a btree.)133 604.8 R .284(This v)5.284 F .283
-(alue is the size)-.25 F .297
-(\(in bytes\) of the pages used for nodes in that tree.)133 616.8 R(If)5.297 E
-F2(psize)2.797 E F0 .297(is 0 \(no page size is speci\214ed\) a page size)2.797
-F(is chosen based on the underlying \214le system I/O block size.)133 628.8 Q
-(See)5 E F2(btr)2.5 E(ee)-.37 E F0(\(3\) for more information.).18 E
-(size_t reclen;)108 645.6 Q(The length of a \214x)133 657.6 Q
-(ed-length record.)-.15 E(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)
-132.57 732 Q 99.315(ution August)-.2 F(1, 1995)2.5 E(1)535 732 Q EP
-%%Page: 2 23
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 111.23(DB_RECNO\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 111.23(anual DB_RECNO\(3\))340.17 48 R/F1 9/Times-Bold@0 SF
-(DB OPERA)72 84 Q(TIONS)-.855 E F0 .972(The data part of the k)108 96 R -.15
-(ey)-.1 G .971(/data pair used by the recno access method is the same as other\
- access methods.).15 F .198(The k)108 108 R .498 -.15(ey i)-.1 H 2.698(sd).15 G
-(if)157.504 108 Q 2.698(ferent. The)-.25 F/F2 10/Times-Italic@0 SF(data)2.698 E
-F0 .198(\214eld of the k)2.698 F .499 -.15(ey s)-.1 H .199
-(hould be a pointer to a memory location of type).15 F F2 -.37(re)2.699 G
-(cno_t).37 E F0 2.699(,a).68 G(s)536.11 108 Q .506(de\214ned in the <db)108 120
-R .506(.h> include \214le.)-.4 F .506(This type is normally the lar)5.506 F
-.506(gest unsigned inte)-.18 F .506(gral type a)-.15 F -.25(va)-.2 G .505
-(ilable to the).25 F 2.5(implementation. The)108 132 R F2(size)2.5 E F0
-(\214eld of the k)2.5 E .3 -.15(ey s)-.1 H(hould be the size of that type.).15
-E 1.944(The record number data structure is either v)108 148.8 R 1.944
-(ariable or \214x)-.25 F 1.944
-(ed-length records stored in a \215at-\214le format,)-.15 F 1.856
-(accessed by the logical record number)108 160.8 R 6.856(.T)-.55 G 1.856(he e)
-285.206 160.8 R 1.856(xistence of record number \214v)-.15 F 4.356(er)-.15 G
-1.856(equires the e)440.442 160.8 R 1.856(xistence of)-.15 F .875
-(records one through four)108 172.8 R 3.375(,a)-.4 G .875
-(nd the deletion of record number one causes record number \214v)219.68 172.8 R
-3.376(et)-.15 G 3.376(ob)489.928 172.8 S 3.376(er)503.304 172.8 S(enum-)514.45
-172.8 Q .283(bered to record number four)108 184.8 R 2.783(,a)-.4 G 2.783(sw)
-231.195 184.8 S .283(ell as the cursor)245.088 184.8 R 2.783(,i)-.4 G 2.783(fp)
-316.64 184.8 S .282(ositioned after record number one, to shift do)327.753
-184.8 R .282(wn one)-.25 F 3.18(record. The)108 196.8 R .68
-(creation of record number \214v)3.18 F 3.18(ew)-.15 G .681
-(hen records one through four do not e)295.05 196.8 R .681
-(xist causes the logical)-.15 F(creation of them with zero-length data.)108
-208.8 Q .372(Because there is no meta-data associated with the underlying recn\
-o access method \214les, an)108 225.6 R 2.872(yc)-.15 G .372(hanges made)
-487.698 225.6 R .191(to the def)108 237.6 R .191(ault v)-.1 F .191
-(alues \(e.g. \214x)-.25 F .192(ed record length or byte separator v)-.15 F
-.192(alue\) must be e)-.25 F .192(xplicitly speci\214ed each time)-.15 F
-(the \214le is opened.)108 249.6 Q 1.037(The functions returned by)108 266.4 R
-F2(db_open)3.537 E F0 1.036(for the btree access method are as described in)
-3.536 F F2(db_open)3.536 E F0 1.036(\(3\), with the).24 F(follo)108 278.4 Q
-(wing e)-.25 E(xceptions and additions:)-.15 E 5.28(type The)108 295.2 R
-(type is DB_RECNO.)2.5 E 9.72(put Using)108 312 R(the)2.558 E F2(put)2.558 E F0
-(interf)2.559 E .059(ace to create a ne)-.1 F 2.559(wr)-.25 G .059
-(ecord will cause the creation of multiple, empty records if the)293.07 312 R
-(record number is more than one greater than the lar)133 324 Q
-(gest record currently in the database.)-.18 E(The)133 340.8 Q F2(put)2.5 E F0
-(function tak)2.5 E(es the follo)-.1 E(wing additional \215ags:)-.25 E
-(R_IAFTER)133 357.6 Q 1.225
-(Append the data immediately after the data referenced by)158 369.6 R F2 -.1
-(ke)3.724 G(y)-.2 E F0 3.724(,c).32 G 1.224(reating a ne)425.354 369.6 R 3.724
-(wk)-.25 G -.15(ey)490.046 369.6 S 1.224(/data pair).15 F(.)-.55 E
-(The record number of the appended k)158 381.6 Q -.15(ey)-.1 G
-(/data pair is returned in the).15 E F2 -.1(ke)2.5 G(y)-.2 E F0(structure.)2.5
-E(R_IBEFORE)133 398.4 Q 1.343
-(Insert the data immediately before the data referenced by)158 410.4 R F2 -.1
-(ke)3.844 G(y)-.2 E F0 3.844(,c).32 G 1.344(reating a ne)424.874 410.4 R 3.844
-(wk)-.25 G -.15(ey)489.926 410.4 S 1.344(/data pair).15 F(.)-.55 E
-(The record number of the inserted k)158 422.4 Q -.15(ey)-.1 G
-(/data pair is returned in the).15 E F2 -.1(ke)2.5 G(y)-.2 E F0(structure.)2.5
-E(R_SETCURSOR)133 439.2 Q(Store the k)158 451.2 Q -.15(ey)-.1 G(/data pair).15
-E 2.5(,s)-.4 G
-(etting or initializing the position of the cursor to reference it.)256.5 451.2
-Q 9.17(seq The)108 468 R F2(seq)2.5 E F0(function tak)2.5 E(es the follo)-.1 E
-(wing additional \215ags:)-.25 E(R_LAST)133 484.8 Q .04(The last k)158 496.8 R
--.15(ey)-.1 G .04(/data pair of the database is returned, and the cursor is se\
-t or initialized to reference).15 F(it.)158 508.8 Q(R_PREV)133 525.6 Q(Retrie)
-158 537.6 Q .59 -.15(ve t)-.25 H .29(he k).15 F -.15(ey)-.1 G .29
-(/data pair immediately before the cursor).15 F 5.29(.I)-.55 G 2.79(ft)395.73
-537.6 S .29(he cursor is not yet set, this is the)404.63 537.6 R
-(same as the R_LAST \215ag.)158 549.6 Q .749
-(If the database \214le is a character special \214le and no complete k)133
-566.4 R -.15(ey)-.1 G .748(/data pairs are currently a).15 F -.25(va)-.2 G
-(ilable,).25 E(the)133 578.4 Q F2(seq)2.5 E F0(function returns 2.)2.5 E 4.17
-(sync The)108 595.2 R F2(sync)2.5 E F0(function tak)2.5 E(es the follo)-.1 E
-(wing additional \215ag:)-.25 E(R_RECNOSYNC)133 612 Q .643
-(This \215ag causes the)158 624 R F2(sync)3.143 E F0 .644
-(function to apply to the btree \214le which underlies the recno \214le, not)
-3.143 F .09(the recno \214le itself.)158 636 R .09(\(See the)5.09 F F2(bfname)
-2.59 E F0 .09(\214eld of RECNOINFO structure, abo)2.59 F -.15(ve)-.15 G 2.59
-(,f).15 G .09(or more informa-)470.95 636 R(tion.\))158 648 Q F1(ERR)72 664.8 Q
-(ORS)-.27 E F0(The)108 676.8 Q F2 -.37(re)3.731 G(cno).37 E F0 1.231
-(access method functions may f)3.731 F 1.231(ail and set)-.1 F F2(errno)3.731 E
-F0 1.231(for an)3.731 F 3.731(yo)-.15 G 3.731(ft)392.652 676.8 S 1.231
-(he errors speci\214ed for the library)402.493 676.8 R(function)108 688.8 Q F2
-(db_open)2.5 E F0(\(3\) or the follo).24 E(wing:)-.25 E(4.4 Berk)72 732 Q(ele)
--.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315(ution August)-.2 F(1, 1995)2.5 E
-(2)535 732 Q EP
-%%Page: 3 24
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 111.23(DB_RECNO\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 111.23(anual DB_RECNO\(3\))340.17 48 R([EINV)108 84 Q(AL])-1.35 E
-(An attempt w)133 96 Q(as made to add a record to a \214x)-.1 E
-(ed-length database that w)-.15 E(as too lar)-.1 E(ge to \214t.)-.18 E/F1 9
-/Times-Bold@0 SF(SEE ALSO)72 112.8 Q/F2 10/Times-Italic@0 SF(db_btr)108 124.8 Q
-(ee)-.37 E F0(\(3\),).18 E F2(db_hash)2.5 E F0(\(3\),).28 E F2(db_loc)2.5 E(k)
--.2 E F0(\(3\),).67 E F2(db_lo)2.5 E(g)-.1 E F0(\(3\),).22 E F2(db_mpool)2.5 E
-F0(\(3\),).51 E F2(db_open)2.5 E F0(\(3\),).24 E F2(db_txn)2.5 E F0(\(3\)).24 E
-F2 2.755(Document Pr)108 148.8 R 2.755
-(ocessing in a Relational Database System)-.45 F F0 5.254(,M).32 G 2.754
-(ichael Stonebrak)362.134 148.8 R(er)-.1 E 5.254(,H)-.4 G 2.754(eidi Stettner)
-454.062 148.8 R 5.254(,J)-.4 G(oseph)516.67 148.8 Q
-(Kalash, Antonin Guttman, Nadene L)108 160.8 Q
-(ynn, Memorandum No. UCB/ERL M82/32, May 1982.)-.55 E F1 -.09(BU)72 177.6 S(GS)
-.09 E F0(The)108 189.6 Q F2(sync)3.616 E F0(function')3.616 E 3.616(sR)-.55 G
-1.116(_RECNOSYNC interf)198.838 189.6 R 1.117
-(ace is a kluge, and will be deleted in a future v)-.1 F 1.117(ersion of the)
--.15 F(interf)108 201.6 Q(ace.)-.1 E(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G
-(istrib)132.57 732 Q 99.315(ution August)-.2 F(1, 1995)2.5 E(3)535 732 Q EP
-%%Page: 1 25
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 124.57(DB_TXN\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 124.57(anual DB_TXN\(3\))340.17 48 R/F1 9/Times-Bold@0 SF -.18(NA)72
-84 S(ME).18 E F0(db_txn \255 transaction management functions)108 96 Q F1
-(SYNOPSIS)72 112.8 Q/F2 10/Times-Bold@0 SF(#include <db)108 124.8 Q(.h>)-.4 E
-(#include <db_lock.h>)108 136.8 Q(int)108 160.8 Q(txn_cr)108 172.8 Q
-(eate\(const char *path, mode_t mode, u_int maxtxns, u_int \215ags\);)-.18 E
-(TXNMGR *)108 196.8 Q(txn_open\(const char *path, DBT *logp, LOCK_T)108 208.8 Q
-(ABLE_T *lockp,)-.9 E(int \(*r)158 220.8 Q(eco)-.18 E -.1(ve)-.1 G
-(r\)\(DBT *lsn, DBT *log_entry).1 E 2.5(,i)-.55 G(nt isundo\)\);)340.11 220.8 Q
-(TXN *)108 244.8 Q(txn_begin\(TXNMGR *txnp\);)108 256.8 Q(int)108 280.8 Q
-(txn_commit\(TXN *tid\);)108 292.8 Q(int)108 316.8 Q(txn_pr)108 328.8 Q(epar)
--.18 E(e\(TXN *tid\);)-.18 E(int)108 352.8 Q(txn_abort\(TXN *tid\);)108 364.8 Q
-(int)108 388.8 Q(txn_close\(TXNMGR *txnp\);)108 400.8 Q(int)108 424.8 Q
-(txn_unlink\(const char *path, int f)108 436.8 Q(or)-.25 E(ce\);)-.18 E F1
-(DESCRIPTION)72 453.6 Q F0(speci\214c details of the transaction support.)108
-465.6 Q/F3 10/Times-Italic@0 SF(Db_txn)108 482.4 Q F0 .034
-(is the library interf)2.534 F .034(ace that pro)-.1 F .034
-(vides transaction semantics.)-.15 F .034(Full transaction support is pro)5.034
-F .034(vided by a)-.15 F .722(collection of modules that pro)108 494.4 R .723
-(vide well de\214ned interf)-.15 F .723
-(aces to the services required for transaction process-)-.1 F 3.488(ing. These)
-108 506.4 R .988(services are reco)3.488 F -.15(ve)-.15 G .988(ry \(see).15 F
-F3(db_lo)3.488 E(g)-.1 E F0 .988(\(3\)\), concurrenc).22 F 3.488(yc)-.15 G .988
-(ontrol \(see)371.864 506.4 R F3(db_loc)3.487 E(k)-.2 E F0 .987
-(\(3\)\), and the manage-).67 F 2.201(ment of shared data \(see)108 518.4 R F3
-(db_mpool)4.701 E F0 4.701(\(3\)\). T).51 F 2.202
-(ransaction semantics can be applied to the access methods)-.35 F(described in)
-108 530.4 Q F3(db)2.5 E F0(\(3\) through function call parameters.).23 E .629(\
-The model intended for transactional use \(and that is used by the access meth\
-ods\) is that write-ahead log-)108 547.2 R .047(ging is pro)108 559.2 R .047
-(vided by)-.15 F F3(db_lo)2.547 E(g)-.1 E F0 .047
-(\(3\) to record both before- and after).22 F .048(-image logging.)-.2 F .048
-(Locking follo)5.048 F .048(ws a tw)-.25 F(o-phase)-.1 E
-(protocol and is implemented by)108 571.2 Q F3(db_loc)2.5 E(k)-.2 E F0(\(3\).)
-.67 E .549(The function)108 588 R F3(txn_cr)3.049 E(eate)-.37 E F0 .549
-(creates and initializes the transaction re)3.049 F .548
-(gion identi\214ed by the)-.15 F F3(path)3.048 E F0(directory)3.048 E 5.548(.T)
--.65 G(his)528.33 588 Q .572(directory must already e)108 600 R .572(xist when)
--.15 F F3(txn_cr)3.072 E(eate)-.37 E F0 .572(is called.)3.072 F .572
-(If the transaction re)5.572 F .572(gion identi\214ed by)-.15 F F3(path)3.072 E
-F0(already)3.072 E -.15(ex)108 612 S 1.78(ists, then).15 F F3(txn_cr)4.28 E
-(eate)-.37 E F0 1.78(returns success without further action.)4.28 F 1.78
-(The \214les associated with the transaction)6.78 F(re)108 624 Q .293
-(gion are created in the directory speci\214ed by)-.15 F F3(path)2.793 E F0
-5.293(.\().28 G .293(The group of the created \214les is based on the system)
-327.657 624 R .781(and directory def)108 636 R .781
-(aults, and is not further speci\214ed by)-.1 F F3(txn_cr)3.281 E(eate)-.37 E
-F0 3.281(.\) All).18 F .78(\214les created by)3.28 F F3(txn_cr)3.28 E(eate)-.37
-E F0 .78(are cre-)3.28 F .048(ated with mode)108 648 R F3(mode)2.548 E F0 .049
-(\(as described in)2.548 F F3 -.15(ch)2.549 G(mod).15 E F0 .049
-(\(2\)\) and modi\214ed by the process' umask v).77 F .049(alue \(see)-.25 F F3
-(umask)2.549 E F0(\(2\)\).).67 E(An)108 660 Q 2.5(yn)-.15 G(ecessary)132.57 660
-Q 2.5(,a)-.65 G(ssociated log and lock re)175.23 660 Q
-(gions are created as well \(see)-.15 E F3(db_lo)2.5 E(g)-.1 E F0(\(3\) and).22
-E F3(db_loc)2.5 E(k)-.2 E F0(\(3\)\).).67 E(The)108 676.8 Q F3(maxtxns)4.191 E
-F0(ar)4.191 E 1.691(gument speci\214es the maximum number of simultaneous tran\
-sactions that are supported.)-.18 F .229
-(This bounds the size of backing \214les and is used to deri)108 688.8 R .529
--.15(ve l)-.25 H .229(imits for the size of the lock re).15 F .229
-(gion and log\214les.)-.15 F(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)
-132.57 732 Q 99.315(ution August)-.2 F(1, 1995)2.5 E(1)535 732 Q EP
-%%Page: 2 26
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 124.57(DB_TXN\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 124.57(anual DB_TXN\(3\))340.17 48 R(When there are more than)108 84
-Q/F1 10/Times-Italic@0 SF(maxtxns)2.5 E F0(concurrent transactions, calls to)
-2.5 E F1(txn_be)2.5 E(gin)-.4 E F0(may f)2.5 E(ail.)-.1 E(Def)108 100.8 Q .847
-(ault locking and logging protocols are pro)-.1 F .846
-(vided only if the backing \214les e)-.15 F 3.346(xist. If)-.15 F .846
-(the backing \214les do)3.346 F 1.433(not e)108 112.8 R 1.433(xist, the)-.15 F
-F1<8d61>3.933 E(gs)-.1 E F0 1.434
-(parameter must indicate both a logging mode and locking mode speci\214ed by)
-3.933 F F1(or)3.934 E F0('ing).73 E(together at most one \215ag from each of t\
-he TXN_LOCK and TXN_LOG classes as follo)108 124.8 Q(ws:)-.25 E(TXN_LOCK_2PL)
-108 141.6 Q(Use tw)133 153.6 Q(o-phase locking.)-.1 E(TXN_LOCK_OPTIMISTIC)108
-170.4 Q(Use optimistic locking \(not currently implemented\).)133 182.4 Q
-(TXN_LOG_REDO)108 199.2 Q(Pro)133 211.2 Q
-(vide redo-only logging \(not currently implemented\).)-.15 E(TXN_LOG_UNDO)108
-228 Q(Pro)133 240 Q(vide undo-only logging \(not currently implemented\).)-.15
-E(TXN_LOG_UNDOREDO)108 256.8 Q(Pro)133 268.8 Q
-(vide undo/redo write-ahead logging.)-.15 E(The function)108 285.6 Q F1(txn_cr)
-2.5 E(eate)-.37 E F0(returns -1 on f)2.5 E(ailure, setting)-.1 E F1(errno)2.5 E
-F0 2.5(,a).18 G(nd 0 on success.)351.83 285.6 Q 1.892(The function)108 302.4 R
-F1(txn_open)4.392 E F0 1.892(returns a pointer to the transaction re)4.392 F
-1.892(gion identi\214ed by)-.15 F F1(path)4.392 E F0 4.392(,w).28 G 1.892
-(hich must ha)476.016 302.4 R -.15(ve)-.2 G .239
-(already been created by a call to)108 314.4 R F1(txn_cr)2.739 E(eate)-.37 E F0
-5.239(.T).18 G .239(he process must ha)296.88 314.4 R .539 -.15(ve p)-.2 H .239
-(ermission to read and write \214les with).15 F -.25(ow)108 326.4 S .327
-(ners, groups and permissions as described for).25 F F1(txn_cr)2.826 E(eate)
--.37 E F0 5.326(.T).18 G(he)362.624 326.4 Q F1(txn_open)2.826 E F0 .326
-(function returns NULL on f)2.826 F(ail-)-.1 E(ure, setting)108 338.4 Q F1
-(errno)2.5 E F0(.).18 E(The)108 355.2 Q F1 -.37(re)3.181 G(co).37 E(ver)-.1 E
-F0(ar)3.181 E .681(gument speci\214es a function that is called by)-.18 F F1
-(txn_abort)3.181 E F0 .682(during transaction abort.)3.182 F .682(This func-)
-5.682 F(tion tak)108 367.2 Q(es three ar)-.1 E(guments:)-.18 E 10.83(lsn A)108
-384 R(log sequence number \(LSN\).)2.5 E(log_entry)108 400.8 Q 2.5(Al)133 412.8
-S(og record.)145.5 412.8 Q(isundo)108 429.6 Q(An undo \215ag set to 0 if the o\
-peration is a redo and set to 1 if the operation an undo.)133 441.6 Q 1.498
-(As discussed in the)108 458.4 R F1(db_lo)3.998 E 3.998(g\()-.1 G(3\))228.44
-458.4 Q F0 1.497(manual page, the application is responsible for pro)3.997 F
-1.497(viding an)-.15 F 3.997(yn)-.15 G(ecessary)506.13 458.4 Q .486
-(structure to the log record.)108 470.4 R -.15(Fo)5.486 G 2.986(re).15 G .487
-(xample, the application must understand what part of the log record is an)
-242.256 470.4 R(operation code, what part is redo information, and what part i\
-s undo information.)108 482.4 Q(The)108 499.2 Q F1(txn_be)2.785 E(gin)-.4 E F0
-.285(function creates a ne)2.785 F 2.784(wt)-.25 G .284
-(ransaction in the designated transaction manager)264.018 499.2 R 2.784(,r)-.4
-G .284(eturning a pointer)468.332 499.2 R
-(to a TXN that uniquely identi\214es it.)108 511.2 Q(The)108 528 Q F1
-(txn_commit)2.615 E F0 .115(function ends the transaction speci\214ed by the)
-2.615 F F1(tid)2.615 E F0(ar)2.615 E 2.615(gument. An)-.18 F 2.615(yl)-.15 G
-.115(ocks held by the transac-)440.12 528 R(tion are released.)108 540 Q
-(If logging is enabled, a commit log record is written and \215ushed to disk.)5
-E(The)108 556.8 Q F1(txn_abort)2.889 E F0 .389
-(function causes an abnormal termination of the transaction.)2.889 F .388
-(If logging is enabled, the log is)5.389 F 2.312(played backw)108 568.8 R 2.312
-(ards and an)-.1 F 4.812(yr)-.15 G(eco)228.628 568.8 Q -.15(ve)-.15 G 2.312
-(ry operations are initiated through the).15 F F1 -.37(re)4.813 G(co).37 E(ver)
--.1 E F0 2.313(function speci\214ed to)4.813 F F1(txn_open)108 580.8 Q F0 5(.A)
-.24 G(fter reco)159.62 580.8 Q -.15(ve)-.15 G
-(ry is completed, all locks held by the transaction are released.).15 E(The)108
-597.6 Q F1(txn_close)3.824 E F0 1.323
-(function detaches a process from the transaction en)3.823 F 1.323
-(vironment speci\214ed by the TXNMGR)-.4 F(pointer)108 609.6 Q 5.261(.A)-.55 G
-.261(ll mapped re)150.761 609.6 R .261(gions are unmapped and an)-.15 F 2.761
-(ya)-.15 G .262(llocated resources are freed.)323.638 609.6 R(An)5.262 E 2.762
-(yu)-.15 G .262(ncommitted trans-)466.688 609.6 R(actions are aborted.)108
-621.6 Q .69(The function)108 638.4 R F1(txn_unlink)3.19 E F0(destro)3.19 E .69
-(ys the transaction re)-.1 F .69(gion identi\214ed by the directory)-.15 F F1
-(path)3.19 E F0 3.19(,r).28 G(emo)472.1 638.4 Q .69(ving all \214les)-.15 F
-1.78(used to implement the transaction re)108 650.4 R 4.28(gion. \(The)-.15 F
-(directory)4.28 E F1(path)4.28 E F0 1.78(is not remo)4.28 F -.15(ve)-.15 G 4.28
-(d.\) If).15 F 1.78(there are processes)4.28 F .553(which ha)108 662.4 R .853
--.15(ve c)-.2 H(alled).15 E F1(txn_open)3.052 E F0 .552(without calling)3.052 F
-F1(txn_close)3.052 E F0 .552
-(\(i.e., there are processes currently using the transac-)3.052 F .135(tion re)
-108 674.4 R(gion\),)-.15 E F1(txn_unlink)2.635 E F0 .135(will f)2.635 F .135
-(ail without further action, unless the force \215ag is set, in which case)-.1
-F F1(txn_unlink)2.636 E F0 1.67(will attempt to delete the transaction re)108
-686.4 R 1.67(gion \214les re)-.15 F -.05(ga)-.15 G 1.67(rdless of an).05 F 4.17
-(yp)-.15 G 1.67(rocesses still using the transaction)397.22 686.4 R(4.4 Berk)72
-732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315(ution August)-.2 F
-(1, 1995)2.5 E(2)535 732 Q EP
-%%Page: 3 27
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 124.57(DB_TXN\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 124.57(anual DB_TXN\(3\))340.17 48 R(re)108 84 Q 2.996(gion. An)-.15
-F 2.996(ya)-.15 G .496(ccesses to a remo)165.902 84 R -.15(ve)-.15 G 2.997(dt)
-.15 G .497(ransaction re)257.007 84 R .497(gion will lik)-.15 F .497
-(ely result in une)-.1 F .497(xpected beha)-.15 F(vior)-.2 E 5.497(.T)-.55 G
-.497(he func-)506.463 84 R(tion)108 96 Q/F1 10/Times-Italic@0 SF(txn_unlink)2.5
-E F0(returns -1 on f)2.5 E(ailure, setting)-.1 E F1(errno)2.5 E F0 2.5(,a).18 G
-(nd 0 on success.)316.39 96 Q .51(In the case of catastrophic or system f)108
-112.8 R .51(ailure, it is possible to clean up a transaction re)-.1 F .51
-(gion by remo)-.15 F .51(ving all)-.15 F .34
-(of the \214les in the directory speci\214ed to the)108 124.8 R F1(txn_cr)2.841
-E(eate)-.37 E F0 .341(function, as transaction re)2.841 F .341
-(gion \214les are ne)-.15 F -.15(ve)-.25 G 2.841(rc).15 G(reated)515.57 124.8 Q
-(in an)108 136.8 Q 2.5(yd)-.15 G(irectory other than the one speci\214ed to)
-140.07 136.8 Q F1(txn_cr)2.5 E(eate)-.37 E F0(.).18 E(The)108 153.6 Q F1
-(txn_pr)3.42 E(epar)-.37 E(e)-.37 E F0 .92(function initiates the be)3.42 F
-.919(ginning of a tw)-.15 F 3.419(op)-.1 G .919(hase commit.)352.206 153.6 R
-.919(In a distrib)5.919 F .919(uted transaction, the)-.2 F .185
-(prepare directi)108 165.6 R .485 -.15(ve s)-.25 H .185
-(hould be issued to all participating transaction managers.).15 F .185
-(Each manager must tak)5.185 F 2.685(ew)-.1 G(hat-)524.45 165.6 Q -2.15 -.25
-(ev e)108 177.6 T 2.5(ra).25 G
-(ction is necessary to guarantee that a future call to)131.75 177.6 Q F1
-(txn_commit)2.5 E F0(on the speci\214ed)2.5 E F1(tid)2.5 E F0(will succeed.)2.5
-E/F2 9/Times-Bold@0 SF(SYSTEM INTEGRA)72 194.4 Q(TION)-.855 E F0 .28
-(This model can be applied to data bases other than the pro)108 206.4 R .279
-(vided access methods.)-.15 F -.15(Fo)5.279 G 2.779(re).15 G .279
-(xample, consider an)459.182 206.4 R .15(application that pro)108 218.4 R .15
-(vides transaction semantics to data stored in re)-.15 F .15
-(gular \214les accessed using the)-.15 F F1 -.37(re)2.65 G(ad).37 E F0 .15
-(\(2\) and).77 F F1(write)108 230.4 Q F0 .708(\(2\) system calls.).18 F .707
-(The operations for which transaction protection is desired are brack)5.708 F
-.707(eted by calls to)-.1 F F1(txn_be)108 242.4 Q(gin)-.4 E F0(and)2.5 E F1
-(txn_commit)2.5 E F0(.).68 E .606
-(Before data are referenced, a call is made to the lock manager)108 259.2 R(,)
--.4 E F1(db_loc)3.106 E(k)-.2 E F0 3.106(,f).67 G .606
-(or a lock of the appropriate type)408.064 259.2 R .719
-(\(e.g. read\) on the object being lock)108 271.2 R 3.218(ed. The)-.1 F .718
-(object might be a page in the \214le, a byte, a range of bytes, or)3.218 F
-.572(some k)108 283.2 R -.15(ey)-.1 G 5.572(.B)-.5 G .573
-(efore a write is performed, the application mak)160.464 283.2 R .573
-(es a call to the log manager)-.1 F(,)-.4 E F1(db_lo)3.073 E(g)-.1 E F0 3.073
-(,t).22 G 3.073(or)506.387 283.2 S(ecord)517.79 283.2 Q .522
-(enough information to redo the operation in case of f)108 295.2 R .522
-(ailure after commit and to undo the operation in case)-.1 F .609(of abort.)108
-307.2 R .609
-(After the log message is written, the write system calls are issued.)5.609 F
-.61(After all requests are issued,)5.61 F .518(the application calls)108 319.2
-R F1(txn_commit)3.017 E F0 5.517(.W).68 G(hen)256.84 319.2 Q F1(txn_commit)
-3.017 E F0 .517(returns, the caller is guaranteed that all necessary log)3.017
-F(writes ha)108 331.2 Q .3 -.15(ve b)-.2 H(een written to disk.).15 E 1.081
-(At an)108 348 R 3.581(yt)-.15 G 1.081(ime, the application may call)142.232
-348 R F1(txn_abort)3.581 E F0 3.581(,w).68 G 1.081
-(hich will result in the appropriate calls to the)318.828 348 R F1 -.37(re)
-3.582 G(co).37 E(ver)-.1 E F0 .278(routine to restore the `)108 360 R
-(`database')-.74 E 2.778('t)-.74 G 2.778(oac)246.48 360 S .278
-(onsistent pre-transaction state.)265.916 360 R .277(\(The reco)5.277 F -.15
-(ve)-.15 G 2.777(rr).15 G .277(outine must be able to)450.562 360 R
-(either reapply or undo the update depending on the conte)108 372 Q
-(xt, for each dif)-.15 E(ferent type of log record.\))-.25 E .746
-(If the application should crash, the reco)108 388.8 R -.15(ve)-.15 G .746
-(ry process uses the).15 F F1(db_lo)3.246 E(g)-.1 E F0(interf)3.246 E .746
-(ace to read the log and call the)-.1 F F1 -.37(re)108 400.8 S(co).37 E(ver)-.1
-E F0(routine to restore the database to a consistent state.)2.5 E(The)108 417.6
-Q F1(txn_pr)3.098 E(epar)-.37 E(e)-.37 E F0 .598(function pro)3.098 F .598
-(vides the core functionality to implement distrib)-.15 F .597
-(uted transactions, b)-.2 F .597(ut it does)-.2 F .36
-(not actually manage the noti\214cation of distrib)108 429.6 R .36
-(uted transaction managers.)-.2 F .36(The caller is responsible for issu-)5.36
-F(ing)108 441.6 Q F1(txn_pr)2.82 E(epar)-.37 E(e)-.37 E F0 .32
-(calls to all sites participating in the transaction.)2.82 F .319
-(If all responses are positi)5.319 F -.15(ve)-.25 G 2.819(,t).15 G .319
-(he caller can)488.832 441.6 R .822(issue a)108 453.6 R F1(txn_commit)3.322 E
-F0 5.822(.I).68 G 3.322(fa)198.076 453.6 S 1.122 -.15(ny o)209.168 453.6 T
-3.322(ft).15 G .822(he responses are ne)236.772 453.6 R -.05(ga)-.15 G(ti).05 E
--.15(ve)-.25 G 3.322(,t).15 G .823(he caller should issue a)349.15 453.6 R F1
-(txn_abort)3.323 E F0 5.823(.I).68 G 3.323(ng)499.747 453.6 S(eneral,)513.07
-453.6 Q(the)108 465.6 Q F1(txn_pr)2.5 E(epar)-.37 E(e)-.37 E F0
-(call requires that the transaction log be \215ushed to disk.)2.5 E .821
-(The structure of the transaction support allo)108 482.4 R .821
-(ws application designers to trade of)-.25 F 3.32(fp)-.25 G .82
-(erformance and protec-)445.07 482.4 R 3.948(tion. Since)108 494.4 R 1.448
-(DB manages man)3.948 F 3.948(ys)-.15 G 1.448(tructures in shared memory)245.36
-494.4 R 3.948(,i)-.65 G 1.448(ts information is subject to corruption by)
-367.982 494.4 R 1.306(applications when the library is link)108 506.4 R 1.306
-(ed directly with the application.)-.1 F -.15(Fo)6.306 G 3.805(rt).15 G 1.305
-(his reason, DB is designed to)416.815 506.4 R(allo)108 518.4 Q 3.367(wc)-.25 G
-.867(ompilation into a separate serv)137.777 518.4 R .868
-(er process that may be accessed via a sock)-.15 F .868(et interf)-.1 F 3.368
-(ace. In)-.1 F .868(this w)3.368 F(ay)-.1 E(DB')108 530.4 Q 2.828(sd)-.55 G
-.328(ata structures are protected from application code, b)136.388 530.4 R .328
-(ut communication o)-.2 F -.15(ve)-.15 G .327(rhead is increased.).15 F(When)
-5.327 E(applications are trusted, DB may be compiled directly into the applica\
-tion for increased performance.)108 542.4 Q F2(ERR)72 559.2 Q(ORS)-.27 E F0
-(The)108 571.2 Q F1(txn_cr)4.113 E(eate)-.37 E F0 1.613(function may f)4.113 F
-1.613(ail and set)-.1 F F1(errno)4.113 E F0 1.614(for an)4.113 F 4.114(yo)-.15
-G 4.114(ft)349.022 571.2 S 1.614
-(he errors speci\214ed for the library functions)359.246 571.2 R F1(open)108
-583.2 Q F0(\(2\),).24 E F1(write)2.5 E F0(\(2\),).18 E F1(malloc)2.5 E F0
-(\(3\),).31 E F1(loc)2.5 E(k_cr)-.2 E(eate)-.37 E F0(\(3\), and).18 E F1(lo)2.5
-E(g_cr)-.1 E(eate)-.37 E F0(\(3\).).18 E(The)108 600 Q F1(txn_open)2.509 E F0
-.009(function may f)2.509 F .009(ail and set)-.1 F F1(errno)2.508 E F0 .008
-(to an)2.508 F 2.508(yo)-.15 G 2.508(ft)323.916 600 S .008
-(he errors speci\214ed for the library functions)332.534 600 R F1(open)2.508 E
-F0(\(2\),).24 E F1(write)108 612 Q F0(\(2\),).18 E F1(malloc)2.5 E F0(\(3\),)
-.31 E F1(loc)2.5 E(k_open)-.2 E F0(\(3\), and).24 E F1(lo)2.5 E(g_open)-.1 E F0
-(\(3\).).24 E(The)108 628.8 Q F1(txn_be)2.671 E(gin)-.4 E F0 .171
-(function may f)2.671 F .171(ail and set)-.1 F F1(errno)2.671 E F0 .171
-(to ENOSPC indicating that the maximum number of concur)2.671 F(-)-.2 E
-(rent transactions has been reached.)108 640.8 Q(The)108 657.6 Q F1(txn_commit)
-2.5 E F0(function may f)2.5 E(ail and set)-.1 E F1(errno)2.5 E F0(to EINV)2.5 E
-(AL indicating that the transaction w)-1.35 E(as aborted.)-.1 E(The)108 674.4 Q
-F1(txn_close)4.582 E F0 2.082(function may f)4.582 F 2.081(ail and set)-.1 F F1
-(errno)4.581 E F0 2.081(to an)4.581 F 4.581(yo)-.15 G 4.581(ft)345.753 674.4 S
-2.081(he errors speci\214ed for the library functions)356.444 674.4 R F1(close)
-108 686.4 Q F0(\(2\),).18 E F1 -.37(re)2.5 G(ad).37 E F0(\(2\),).77 E F1(write)
-2.5 E F0(\(2\),).18 E F1(fr)2.5 E(ee)-.37 E F0(\(3\),).18 E F1(fsync)2.5 E F0
-(\(2\),).31 E F1(loc)2.5 E(k_close)-.2 E F0(\(3\) or).18 E F1(lo)2.5 E(g_close)
--.1 E F0(\(3\).).18 E(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57
-732 Q 99.315(ution August)-.2 F(1, 1995)2.5 E(3)535 732 Q EP
-%%Page: 4 28
-%%BeginPageSetup
-BP
-%%EndPageSetup
-/F0 10/Times-Roman@0 SF 124.57(DB_TXN\(3\) BSD)72 48 R(Programmer')2.5 E 2.5
-(sM)-.55 G 124.57(anual DB_TXN\(3\))340.17 48 R(The)108 84 Q/F1 10
-/Times-Italic@0 SF(txn_unlink)4.319 E F0 1.819(function may f)4.319 F 1.819
-(ail and set)-.1 F F1(errno)4.319 E F0 1.819(to an)4.319 F 4.319(yo)-.15 G 4.32
-(ft)347.58 84 S 1.82(he errors speci\214ed for the library functions)358.01 84
-R F1(unlink)108 96 Q F0(\(2\),).67 E F1(loc)2.5 E(k_unlink)-.2 E F0(\(3\), and)
-.67 E F1(lo)2.5 E(g_unlink)-.1 E F0(\(3\), or the follo).67 E(wing:)-.25 E([EB)
-108 112.8 Q(USY])-.1 E(The transaction re)133 124.8 Q(gion w)-.15 E
-(as in use and the force \215ag w)-.1 E(as not set.)-.1 E/F2 9/Times-Bold@0 SF
-(SEE ALSO)72 141.6 Q F1(db_btr)108 153.6 Q(ee)-.37 E F0(\(3\),).18 E F1
-(db_hash)2.5 E F0(\(3\),).28 E F1(db_loc)2.5 E(k)-.2 E F0(\(3\),).67 E F1
-(db_lo)2.5 E(g)-.1 E F0(\(3\),).22 E F1(db_mpool)2.5 E F0(\(3\),).51 E F1
-(db_open)2.5 E F0(\(3\),).24 E F1(db_r)2.5 E(ecno)-.37 E F0(\(3\)).18 E F1 .904
-(LIBTP: P)108 177.6 R(ortable)-.8 E 3.404(,M)-.1 G .904(odular T)189.738 177.6
-R -.15(ra)-.55 G .904(nsactions for UNIX).15 F F0 3.404(,M).94 G(ar)328.884
-177.6 Q .904(go Seltzer)-.18 F 3.403(,M)-.4 G .903
-(ichael Olson, USENIX proceedings,)392.041 177.6 R -.4(Wi)108 189.6 S
-(nter 1992.).4 E F2 -.09(BU)72 206.4 S(GS).09 E F0(The)108 218.4 Q F1(maxtxns)
-2.792 E F0 .292(parameter is a kluge, and should be deleted in f)2.792 F -.2
-(avo)-.1 G 2.793(ro).2 G 2.793(fd)378.448 218.4 S .293(ynamically e)389.571
-218.4 R .293(xpanding the transaction)-.15 F(re)108 230.4 Q(gion.)-.15 E
-(4.4 Berk)72 732 Q(ele)-.1 E 2.5(yD)-.15 G(istrib)132.57 732 Q 99.315
-(ution August)-.2 F(1, 1995)2.5 E(4)535 732 Q EP
-%%Trailer
-end
-%%EOF
diff --git a/src/util/db2/man/db_btree.3 b/src/util/db2/man/db_btree.3
deleted file mode 100644
index 25e289f3c..000000000
--- a/src/util/db2/man/db_btree.3
+++ /dev/null
@@ -1,246 +0,0 @@
-.\" Copyright (c) 1990, 1993, 1994, 1995
-.\" The Regents of the University of California. All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. All advertising materials mentioning features or use of this software
-.\" must display the following acknowledgement:
-.\" This product includes software developed by the University of
-.\" California, Berkeley and its contributors.
-.\" 4. Neither the name of the University nor the names of its contributors
-.\" may be used to endorse or promote products derived from this software
-.\" without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" @(#)db_btree.3 8.11 (Berkeley) 8/1/95
-.\"
-.TH DB_BTREE 3 "August 1, 1995"
-.UC 7
-.SH NAME
-db_btree \- btree database access method
-.SH DESCRIPTION
-.so db.so
-.GN
-specific details of the btree access method.
-.PP
-The btree data structure is a sorted, balanced tree structure storing
-associated key/data pairs.
-Searches, insertions, and deletions in the btree will all complete in
-O lg base N where base is the average fill factor.
-Often, inserting ordered data into btrees results in a low fill factor.
-This implementation has been modified to make ordered insertion the best
-case, resulting in a much better than normal page fill factor.
-.SH "ACCESS METHOD SPECIFIC INFORMATION"
-The btree access method specific data structure provided to
-.I db_open
-is typedef'd and named BTREEINFO.
-A BTREEINFO structure has at least the following fields,
-which may be initialized before calling
-.IR db_open :
-.TP 5
-u_int cachesize;
-A suggested maximum size (in bytes) of the memory cache.
-This value is
-.B only
-advisory, and the access method will allocate more memory rather than fail.
-Since every search examines the root page of the tree, caching the most
-recently used pages substantially improves access time.
-In addition, physical writes are delayed as long as possible, so a moderate
-cache can reduce the number of I/O operations significantly.
-Obviously, using a cache increases (but only increases) the likelihood of
-corruption or lost data if the system crashes while a tree is being modified.
-If
-.I cachesize
-is 0 (no size is specified) a default cache is used.
-.TP 5
-int (*compare)(const DBT *, const DBT *);
-Compare is the key comparison function.
-It must return an integer less than, equal to, or greater than zero if the
-first key argument is considered to be respectively less than, equal to,
-or greater than the second key argument.
-The same comparison function must be used on a given tree every time it
-is opened.
-If
-.I compare
-is NULL (no comparison function is specified), the keys are compared
-lexically, with shorter keys considered less than longer keys.
-.TP 5
-u_long flags;
-The flag value is specified by
-.IR or 'ing
-any of the following values:
-.RS
-.TP 5
-R_DUP
-Permit duplicate keys in the tree, i.e. permit insertion if the key to be
-inserted already exists in the tree.
-The default behavior, as described in
-.IR db_open (3),
-is to overwrite a matching key when inserting a new key or to fail if
-the R_NOOVERWRITE flag is specified.
-The R_DUP flag is overridden by the R_NOOVERWRITE flag, and if the
-R_NOOVERWRITE flag is specified, attempts to insert duplicate keys into
-the tree will fail.
-.IP
-If the database contains duplicate keys, the order of retrieval of
-key/data pairs is undefined if the
-.I get
-function is used, however,
-.I seq
-function calls with the R_CURSOR flag set will always return the logical
-``first'' of any group of duplicate keys.
-.RE
-.TP 5
-int lorder;
-The byte order for integers in the stored database metadata.
-The number should represent the order as an integer; for example,
-big endian order would be the number 4,321.
-If
-.I lorder
-is 0 (no order is specified) the current host order is used.
-.TP 5
-int maxkeypage;
-The maximum number of keys which will be stored on any single page.
-This functionality is not currently implemented.
-.\" The maximum number of keys which will be stored on any single page.
-.\" Because of the way the btree data structure works,
-.\" .I maxkeypage
-.\" must always be greater than or equal to 2.
-.\" If
-.\" .I maxkeypage
-.\" is 0 (no maximum number of keys is specified) the page fill factor is
-.\" made as large as possible (which is almost invariably what is wanted).
-.TP 5
-int minkeypage;
-The minimum number of keys which will be stored on any single page.
-This value is used to determine which keys will be stored on overflow
-pages, i.e. if a key or data item is longer than the pagesize divided
-by the minkeypage value, it will be stored on overflow pages instead
-of in the page itself.
-If
-.I minkeypage
-is 0 (no minimum number of keys is specified) a value of 2 is used.
-.TP 5
-size_t (*prefix)(const DBT *, const DBT *);
-Prefix is the prefix comparison function.
-If specified, this function must return the number of bytes of the second key
-argument which are necessary to determine that it is greater than the first
-key argument.
-If the keys are equal, the key length should be returned.
-Note, the usefulness of this function is very data dependent, but, in some
-data sets can produce significantly reduced tree sizes and search times.
-If
-.I prefix
-is NULL (no prefix function is specified),
-.B and
-no comparison function is specified, a default lexical comparison function
-is used.
-If
-.I prefix
-is NULL and a comparison function is specified, no prefix comparison is
-done.
-.TP 5
-u_int psize;
-Page size is the size (in bytes) of the pages used for nodes in the tree.
-The minimum page size is 512 bytes and the maximum page size is 64K.
-If
-.I psize
-is 0 (no page size is specified) a page size is chosen based on the
-underlying file system I/O block size.
-.PP
-If the file already exists (and the O_TRUNC flag is not specified), the
-values specified for the parameters flags, lorder and psize are ignored
-in favor of the values used when the tree was created.
-.SH "DB OPERATIONS"
-The functions returned by
-.I db_open
-for the btree access method are as described in
-.IR db_open (3),
-with the following exceptions and additions:
-.TP 5
-type
-The type is DB_BTREE.
-.TP 5
-del
-Space freed up by deleting key/data pairs from the tree is never reclaimed,
-although it is reused where possible.
-This means that the btree storage structure is grow-only.
-The only solutions are to avoid excessive deletions, or to create a fresh
-tree periodically from a scan of an existing one.
-.TP 5
-put
-The
-.I put
-function takes the following additional flags:
-.RS
-.TP 5
-R_SETCURSOR
-Store the key/data pair, setting or initializing the position of the
-cursor to reference it.
-.RE
-.TP 5
-seq
-Forward sequential scans of a tree are from the least key to the greatest.
-.IP
-The returned key for the
-.I seq
-function is not necessarily an exact match for the specified key in
-the btree access method.
-The returned key is the smallest key greater than or equal to the
-specified key, permitting partial key matches and range searches.
-.IP
-The
-.I seq
-function takes the following additional flags:
-.RS
-.TP 5
-R_LAST
-The last key/data pair of the database is returned, and the cursor
-is set or initialized to reference it.
-.TP 5
-R_PREV
-Retrieve the key/data pair immediately before the cursor.
-If the cursor is not yet set, this is the same as the R_LAST flag.
-.RE
-.SH ERRORS
-The
-.I btree
-access method functions may fail and set
-.I errno
-for any of the errors specified for the library function
-.IR db_open (3).
-.SH "SEE ALSO"
-.IR db_hash (3),
-.IR db_lock (3),
-.IR db_log (3),
-.IR db_mpool (3),
-.IR db_open (3),
-.IR db_recno (3),
-.IR db_txn (3)
-.sp
-.IR "The Ubiquitous B-tree" ,
-Douglas Comer, ACM Comput. Surv. 11, 2 (June 1979), 121-138.
-.sp
-.IR "Prefix B-trees" ,
-Bayer and Unterauer, ACM Transactions on Database Systems, Vol. 2, 1
-(March 1977), 11-26.
-.sp
-.IR "The Art of Computer Programming Vol. 3: Sorting and Searching" ,
-D.E. Knuth, 1968, pp 471-480.
diff --git a/src/util/db2/man/db_hash.3 b/src/util/db2/man/db_hash.3
deleted file mode 100644
index adb88fca7..000000000
--- a/src/util/db2/man/db_hash.3
+++ /dev/null
@@ -1,138 +0,0 @@
-.\" Copyright (c) 1990, 1993, 1994, 1995
-.\" The Regents of the University of California. All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. All advertising materials mentioning features or use of this software
-.\" must display the following acknowledgement:
-.\" This product includes software developed by the University of
-.\" California, Berkeley and its contributors.
-.\" 4. Neither the name of the University nor the names of its contributors
-.\" may be used to endorse or promote products derived from this software
-.\" without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" @(#)db_hash.3 8.13 (Berkeley) 8/1/95
-.\"
-.TH DB_HASH 3 "August 1, 1995"
-.UC 7
-.SH NAME
-db_hash \- hash database access method
-.SH DESCRIPTION
-.so db.so
-.GN
-specific details of the hashing access method.
-.PP
-The hash data structure is an extensible, dynamic hashing scheme.
-Backward compatible interfaces to the functions described in
-.IR dbm (3),
-and
-.IR ndbm (3)
-are provided, however these interfaces are not compatible with
-previous file formats.
-.SH "ACCESS METHOD SPECIFIC INFORMATION"
-The hash access method specific data structure provided to
-.I db_open
-is typedef'd and named HASHINFO.
-A HASHINFO structure has at least the following fields,
-which may be initialized before calling
-.IR db_open :
-.TP 5
-u_int bsize;
-.I Bsize
-defines the hash table bucket size, and is, by default, 256 bytes.
-It may be preferable to increase the page size for disk-resident tables
-and tables with large data items.
-.TP 5
-u_int cachesize;
-A suggested maximum size, in bytes, of the memory cache.
-This value is
-.B only
-advisory, and the access method will allocate more memory rather
-than fail.
-.TP 5
-u_int ffactor;
-.I Ffactor
-indicates a desired density within the hash table.
-It is an approximation of the number of keys allowed to accumulate in any
-one bucket, determining when the hash table grows or shrinks.
-The default value is 8.
-.TP 5
-u_int32_t (*hash)(const void *, size_t);
-.I Hash
-is a user defined hash function.
-Since no hash function performs equally well on all possible data, the
-user may find that the built-in hash function does poorly on a particular
-data set.
-User specified hash functions must take two arguments (a pointer to a byte
-string and a length) and return a 32-bit quantity to be used as the hash
-value.
-.IP
-If a hash function is specified,
-.I hash_open
-will attempt to determine if the hash function specified is the same as
-the one with which the database was created, and will fail if it is not.
-.TP 5
-int lorder;
-The byte order for integers in the stored database metadata.
-The number should represent the order as an integer; for example,
-big endian order would be the number 4,321.
-If
-.I lorder
-is 0 (no order is specified) the current host order is used.
-If the file already exists, the specified value is ignored and the
-value specified when the tree was created is used.
-.TP 5
-u_int nelem;
-.I Nelem
-is an estimate of the final size of the hash table.
-If not set or set too low, hash tables will expand gracefully as keys
-are entered, although a slight performance degradation may be noticed.
-The default value is 1.
-.PP
-If the file already exists (and the O_TRUNC flag is not specified), the
-values specified for the parameters bsize, ffactor, lorder and nelem are
-ignored and the values specified when the tree was created are used.
-.SH "DB OPERATIONS"
-The functions returned by
-.I db_open
-for the hash access method are as described in
-.IR db_open (3).
-.SH ERRORS
-The
-.I hash
-access method functions may fail and set
-.I errno
-for any of the errors specified for the library function
-.IR db_open (3).
-.SH "SEE ALSO"
-.IR db_btree (3),
-.IR db_lock (3),
-.IR db_log (3),
-.IR db_mpool (3),
-.IR db_open (3),
-.IR db_recno (3),
-.IR db_txn (3)
-.sp
-.IR "Dynamic Hash Tables" ,
-Per-Ake Larson, Communications of the ACM, April 1988.
-.sp
-.IR "A New Hash Package for UNIX" ,
-Margo Seltzer, USENIX Proceedings, Winter 1991.
diff --git a/src/util/db2/man/db_lock.3 b/src/util/db2/man/db_lock.3
deleted file mode 100644
index b18a38c60..000000000
--- a/src/util/db2/man/db_lock.3
+++ /dev/null
@@ -1,462 +0,0 @@
-.\" Copyright (c) 1994, 1995
-.\" The Regents of the University of California. All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. All advertising materials mentioning features or use of this software
-.\" must display the following acknowledgement:
-.\" This product includes software developed by the University of
-.\" California, Berkeley and its contributors.
-.\" 4. Neither the name of the University nor the names of its contributors
-.\" may be used to endorse or promote products derived from this software
-.\" without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" @(#)db_lock.3 8.14 (Berkeley) 8/1/95
-.\"
-.TH DB_LOCK 3 "August 1, 1995"
-.UC 7
-.SH NAME
-db_lock \- general purpose lock manager
-.SH SYNOPSIS
-.nf
-.ft B
-#include <db_lock.h>
-
-int
-lock_create(const char *path, mode_t mode,
-.ti +5
-int lock_modes, const int8_t conflicts[][], u_int maxlocks);
-
-LOCK_TABLE_T *
-lock_open(const char *path);
-
-int
-lock_vec(LOCK_TABLE_T *lt, DBT *locker, struct timespec *timeout,
-.ti +5
-LOCK_REQ_T list[], int nlist, LOCK_REQ_T **elistp, DBT *conflict);
-
-int
-lock_get(LOCK_TABLE_T *lt, const DBT *locker,
-.ti +5
-const DBT *obj, const lock_mode_t lock_mode, LOCK_T **lockp);
-
-int
-lock_put(LOCK_T *lockp);
-
-int
-lock_close(LOCK_TABLE_T *lt);
-
-int
-lock_unlink(const char *path, int force);
-.ft R
-.fi
-.SH DESCRIPTION
-.so db.so
-.GN
-specific details of the locking interface.
-.PP
-.I Db_lock
-is the library interface intended to provide general-purpose locking.
-While designed to work with the other DB functions, these functions are
-also useful for more general locking purposes.
-Locks can be shared between processes.
-.PP
-.CR "lock table" lock
-.PP
-The parameter
-.I lock_modes
-is the number of lock modes to be recognized by the lock table
-(including the ``not-granted'' mode).
-The parameter
-.I conflicts
-is an
-.I lock_modes
-by
-.I lock_modes
-array.
-A non-0 value for:
-.sp
-.ti +5
-conflicts[requested_mode][held_mode]
-.sp
-indicates that
-.I requested_mode
-and
-.I held_mode
-conflict.
-The ``not-granted'' mode must be represented by 0.
-.PP
-The include file <db_lock.h> declares two commonly used conflict arrays:
-.TP 5
-int lock_sx_n;
-.br
-.ns
-.TP 5
-const int8_t lock_sx_c[lock_sx_n][lock_sx_n];
-These variables specify a conflict array
-for a simple scheme using shared and exclusive lock modes.
-.TP 5
-int lock_g_n;
-.br
-.ns
-.TP 5
-const int8_t lock_g_c[lock_g_n][lock_g_n];
-These variables specify a conflict array that involves various intent
-lock modes (e.g. intent shared) that are used for multigranularity locking.
-.PP
-In addition,
-<db_lock.h> defines the following macros that name lock modes for use with
-the standard tables above:
-.RS
-.TP 5
-LOCK_IS
-intent shared
-.br
-.ns
-.TP 5
-LOCK_IX
-intent exclusive
-.br
-.ns
-.TP 5
-LOCK_NG
-not granted (always 0)
-.br
-.ns
-.TP 5
-LOCK_S
-shared
-.br
-.ns
-.TP 5
-LOCK_SIX
-shared/intent exclusive
-.br
-.ns
-.TP 5
-LOCK_X
-exclusive
-.RE
-.PP
-.I Maxlocks
-is the maximum number of locks to be held or requested in the table,
-and is used by
-.I lock_create
-to estimate how much space to allocate for various lock-table data
-structures.
-.PP
-.RT lock_create
-.PP
-.OP "lock table" lock
-.PP
-The function
-.I lock_vec
-atomically obtains and releases one or more locks from the designated
-table.
-The function
-.I lock_vec
-is intended to support acquisition or trading of multiple locks
-under one lock table semaphore, as is needed for lock coupling or
-in multigranularity locking for lock escalation.
-.PP
-If any of the requested locks cannot be acquired
-or any of the locks to be released cannot be released,
-no locks are acquired and no locks are released, and
-.I lock_vec
-returns an error.
-The function
-.I lock_vec
-returns 0 on success.
-If an error occurs,
-.I lock_vec
-returns one of the following values.
-In addition, if
-.I elistp
-is not NULL, it is set to point to the LOCK_REQ_T entry which
-was being processed when the error occurred.
-.TP 5
-LOCK_GET_DEADLOCK
-The specified
-.I locker
-was selected as a victim in order to resolve a deadlock.
-In this case, if the
-.I conflict
-argument is non-NULL, it is set to reference the identity of a
-locker holding the lock referenced by
-.I elistp
-at the time the request was denied.
-(This identity resides in static memory and may be overwritten by
-subsequent calls to
-.IR lock_vec ).
-.TP 5
-LOCK_GET_ERROR
-An error occurred and the external variable
-.I errno
-has been set to indicate the error.
-.TP 5
-LOCK_GET_NOTHELD
-The lock cannot be released, as it was not held by the
-.IR locker .
-.TP 5
-LOCK_GET_RESOURCE
-The lock manager is unable to grant the requested locks because of
-limited internal resources.
-(Releasing locks may allow future calls to
-.I lock_vec
-to succeed.)
-.TP 5
-LOCK_GET_TIMEOUT
-A timeout argument was specified, and the requested locks were not
-available soon enough.
-In this case, if the
-.I conflict
-argument is non-NULL, it is set to reference the identity of a
-locker holding the lock referenced by
-.I elistp
-at the time the request was denied.
-(This identity resides in static memory and may be overwritten by
-subsequent calls to
-.IR lock_vec ).
-.PP
-The
-.I locker
-argument specified to
-.I lock_vec
-is a pointer to an untyped byte string which identifies the entity
-requesting or releasing the lock.
-If
-.I locker
-is NULL, the calling process' pid is used instead.
-.PP
-The
-.I timeout
-argument provided to
-.I lock_vec
-specifies a maximum interval to wait for the locks to be granted.
-If
-.I timeout
-is NULL, it is ignored, and
-.I lock_vec
-will not return until all of the locks are acquired or an error has
-occurred.
-.PP
-The
-.I list
-array provided to
-.I lock_vec
-is typedef'd in <db_lock.h> as LOCK_REQ_T.
-A LOCK_REQ_T structure has at least the following fields,
-which must be initialized before calling
-.IR lock_vec :
-.TP 5
-enum lockop op;
-The operation to be performed, which must be set to one of the
-following values:
-.RS
-.TP 5
-LOCK_GET
-Get a lock, as defined by the values of
-.IR locker ,
-.I obj
-and
-.IR lock_mode .
-Upon return from
-.IR lock_vec ,
-if the
-.I lockp
-field is non-NULL, a reference to the acquired lock is stored there.
-(This reference is invalidated by any call to
-.I lock_vec
-or
-.I lock_put
-which releases the lock.)
-.TP 5
-LOCK_PUT
-The lock referenced by the contents of the
-.I lockp
-field is released.
-.TP 5
-LOCK_PUT_ALL
-All locks held by the
-.I locker
-are released.
-(Any locks acquired as a part of the current call to
-.I lock_vec
-are not considered for this operation).
-.TP 5
-LOCK_PUT_OBJ
-All locks held by the
-.IR locker ,
-on the object
-.IR obj ,
-with the mode specified by
-.IR lock_mode ,
-are released.
-A
-.I lock_mode
-of LOCK_NG indicates that all locks on the object should be released.
-(Any locks acquired as a part of the current call to
-.I lock_vec
-are not considered for this operation).
-.RE
-.TP 5
-const DBT obj;
-An untyped byte string which specifies the object to be locked or
-released.
-.TP 5
-const lock_mode_t lock_mode;
-The lock mode, used as an index into
-.IR lt 's
-conflict array.
-.TP 5
-LOCK_T **lockp;
-A pointer to a pointer to a lock reference.
-.PP
-The
-.I nlist
-argument specifies the number of elements in the
-.I list
-array.
-.PP
-The function
-.I lock_get
-is a simple interface to the
-.I lock_vec
-functionality, and is equivalent to calling the
-.I lock_vec
-function with the
-.I lt
-and
-.I locker
-arguments, NULL
-.IR timeout ,
-.I elistp
-and
-.I conflict
-arguments, and a single element
-.I list
-array, for which the
-.I op
-field is LOCK_GET, and the
-.IR obj ,
-.I lock_mode
-and
-.I lockp
-fields are represented by the arguments of the same name.
-Note that the type of the
-.I obj
-argument to
-.I lock_get
-is different from the
-.I obj
-element found in the LOCK_REQ_T structure.
-The
-.I lock_get
-function returns success and failure as described for the
-.I lock_vec
-function.
-.PP
-The function
-.I lock_put
-is a simple interface to the
-.I lock_vec
-functionality, and is equivalent to calling the
-.I lock_vec
-function with a single element
-.I list
-array, for which the
-.I op
-field is LOCK_PUT and the
-.I lockp
-field is represented by the argument of the same name.
-Note that the type of the
-.I lockp
-argument to
-.I lock_put
-is different from the
-.I lockp
-element found in the LOCK_REQ_T structure.
-The
-.I lock_put
-function returns success and failure as described for the
-.I lock_vec
-function.
-.PP
-The function
-.I lock_close
-disassociates the calling process from the lock table
-.IR lt ,
-after releasing all locks held or requested by that process.
-.RT lock_close
-.PP
-.UN "lock table" lock
-.SH "ERRORS"
-The
-.I lock_create
-function may fail and set
-.I errno
-for any of the errors specified for the library routines
-.IR mmap (2),
-.IR open (2)
-and
-.IR malloc (3).
-.PP
-The
-.I lock_open
-function may fail and set
-.I errno
-for any of the errors specified for the library routine
-.IR mmap (2)
-and
-.IR open (2).
-.PP
-The
-.I lock_close
-function may fail and set
-.I errno
-for any of the errors specified for the library routine
-.IR close (2)
-and
-.IR munmap (2).
-.PP
-The
-.I lock_unlink
-function may fail and set
-.I errno
-for any of the errors specified for the library function
-.IR unlink (2)
-or the following:
-.TP 5
-[EBUSY]
-The lock table was in use and the force flag was not set.
-.SH "SEE ALSO"
-.IR db_btree (3),
-.IR db_hash (3),
-.IR db_log (3),
-.IR db_mpool (3),
-.IR db_open (3),
-.IR db_recno (3),
-.IR db_txn (3)
-.SH BUGS
-The
-.I maxlocks
-parameter is a kluge, and should be deleted in favor of dynamically
-expanding the lock table.
diff --git a/src/util/db2/man/db_log.3 b/src/util/db2/man/db_log.3
deleted file mode 100644
index 34c4d1f5d..000000000
--- a/src/util/db2/man/db_log.3
+++ /dev/null
@@ -1,290 +0,0 @@
-.\" Copyright (c) 1990, 1993, 1994, 1995
-.\" The Regents of the University of California. All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. All advertising materials mentioning features or use of this software
-.\" must display the following acknowledgement:
-.\" This product includes software developed by the University of
-.\" California, Berkeley and its contributors.
-.\" 4. Neither the name of the University nor the names of its contributors
-.\" may be used to endorse or promote products derived from this software
-.\" without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" @(#)db_log.3 8.15 (Berkeley) 8/3/95
-.\"
-.TH DB_LOG 3 "August 3, 1995"
-.UC 7
-.SH NAME
-db_log \- log-manager access method
-.SH DESCRIPTION
-.so db.so
-.GN
-specific details of the logging access method.
-.PP
-These functions provide a general-purpose logging facility sufficient
-for transaction management.
-Logs can be shared by multiple processes.
-.PP
-A log is represented by the directory,
-.IR "not the file" ,
-named by the first argument to
-.IR db_open (3).
-The first argument must be non-NULL,
-and the directory must already exist
-.I db_open
-is called.
-In that directory, the log is stored in one or more files named
-in the format ``log.YYYY.MM.DD.HH.MM.SS'', where ``YYYY.MM.DD.HH.SS''
-is the approximate creation time of the log file, and is guaranteed
-to be unique in the directory.
-.PP
-The group of the created files is based on the system and directory
-defaults, and is not further specified by the log access method.
-All files are created with the
-.I mode
-specified to
-.IR db_open ,
-(as described in
-.IR chmod (2))
-and modified by the process' umask value (see
-.IR umask (2)).
-.PP
-The
-.I flags
-argument to
-.I db_open
-must be 0 for the
-.I db_log
-access method.
-.SH "ACCESS METHOD SPECIFIC INFORMATION"
-The log access method specific data structure provided to
-.I db_open
-is typedef'd and named LOGINFO.
-A LOGINFO structure has at least the following fields,
-which may be initialized before calling
-.IR db_open :
-.TP 5
-off_t max_file_size;
-The maximum size of a single file in the log.
-If not specified, the maximum size defaults to an implementation-specific
-value.
-.TP 5
-int lorder;
-The byte order for integers in the stored database metadata.
-The number should represent the order as an integer; for example,
-big endian order would be the number 4,321.
-If
-.I lorder
-is 0 (no order is specified) the current host order is used.
-.PP
-If the log already exists, the values specified for the parameters
-max_file_size and lorder are ignored in favor of the values used
-when the log was created.
-.SH "DB OPERATIONS"
-The data part of the key/data pair used by the log access method
-is the same as for other access methods.
-The key is different.
-Each log record is identified by a log sequence number (LSN),
-which is stored in a DBT, and which is used as the
-.I key
-for all log functions that take
-.I key
-arguments.
-Applications cannot create LSN's, and all LSN's provided to functions
-as arguments must first be retrieved using the
-.I put
-or
-.I seq
-functions.
-To provide a distinguished value for applications, it is guaranteed that
-no valid LSN will ever have a size of 0.
-.PP
-Applications can compare LSN's using the
-.I log_lsn_compare
-function (see below).
-.PP
-Applications can associate LSN's with specific log files.
-The function
-.I log_lsn_file
-(see below), returns the name of the log file containing the
-record with a specified LSN.
-(The mapping of LSN to file is needed for database administration.
-For example, a transaction manager typically records the earliest LSN
-needed for restart, and the database administrator may want to archive
-log files to tape when they contain only LSN's before the earliest one
-needed for restart.)
-.PP
-Applications can truncate the log file up to a specific LSN using the
-.I log_trunc
-function (see below).
-.PP
-The functions returned by
-.I db_open
-for the log access method are as described in
-.IR db_open ,
-with the following exceptions and additions:
-.TP 5
-type
-The type is DB_LOG.
-.TP 5
-del
-The
-.I del
-function always returns an error for the log-manager access method,
-setting
-.I errno
-to EINVAL.
-.TP 5
-int (*log_flush)(const DB *db, const DBT *lsn);
-The
-.I log_flush
-function flushes the log up to and including the log record
-.IR lsn .
-.RT log_flush
-.TP 5
-int (*log_lsn_compare)(const DB *,
-.ti +5
-const DBT *lsn1, const DBT *lsn2);
-A pointer to a function which is provided to permit applications to
-compare LSN's.
-The
-.I log_lsn_compare
-function returns an integer less than, equal to, or greater than zero
-if the first LSN is considered to be respectively less than, equal to,
-or greater than the second LSN.
-.TP 5
-int (*log_lsn_file)(const DB *db,
-.ti +5
-const DBT *lsn, char *name);
-.br
-The
-.I log_lsn_file
-function stores a pointer to the name of the file containing
-.I lsn
-in the address referenced by
-.IR name.
-This pointer is to an internal static object, and subsequent calls to
-the same function will modify the same object.
-.IP
-.RT log_lsn_file
-.TP 5
-int (*log_unlink)(const char *path, int force);
-The
-.I log_unlink
-function destroys the log represented by
-.IR path .
-If the
-.I force
-parameter is not set to 1 and there are other processes using the
-log, then
-.I log_unlink
-will return -1, setting
-.IR errno
-to EBUSY.
-If
-.I force is not set or there are no processes using the log, then all files
-used by the log are destroyed.
-.I log_unlink
-will return -1 on failure, setting
-.IR errno ,
-and 0 on success.
-.TP 5
-int (*log_trunc)(const DB *db, const DBT *lsn);
-The
-.I log_trunc
-function truncates the log up to an LSN which is less than
-.IR lsn .
-.RT log_trunc
-.TP 5
-put
-A log record containing
-.I data
-is appended to the log.
-Unlike the
-.I put
-functions for other access methods, the key parameter is not initialized
-by the application, instead, the LSN assigned to the data is returned in
-the
-.I key
-parameter.
-.IP
-The caller is responsible for providing any necessary structure to
-.I data .
-(For example, in a write-ahead logging protocol, the application must
-understand what part of
-.I data
-is an operation code, what part is redo information, and what part is
-undo information.
-In addition, most transaction managers will store in
-.I data
-the LSN of the previous log record for the same transaction,
-to support chaining back through the transaction's log records
-during undo.)
-.IP
-The parameter
-.I flag
-must be set to 0 or exactly one of the following values:
-.RS
-.TP 5
-R_CHECKPOINT
-Specify the key/data pair of the current call as the one to be returned
-when the
-.I seq
-function is next called with the R_CHECKPOINT flag.
-.TP 5
-R_FLUSH
-Flush immediately (ignoring any possibility for group commit).
-.RE
-.TP 5
-seq
-The
-.I seq
-function takes the following additional flag:
-.RS
-.TP 5
-R_CHECKPOINT
-The last key/data pair stored by the
-.I put
-function (using the R_CHECKPOINT flag) is returned,
-and the cursor is set or initialized to reference it.
-The expected use of this flag is during restart and to determine what
-part of the log must be available for restart.
-Therefore, the log record retrieved with R_CHECKPOINT should contain
-all the information that the transaction manager will need for this
-purpose.
-.RE
-.TP 5
-sync
-The
-.I sync
-function always returns an error for the log-manager access method,
-setting
-.I errno
-to EINVAL.
-.SH "SEE ALSO"
-.IR db_btree (3),
-.IR db_hash (3),
-.IR db_lock (3),
-.IR db_mpool (3),
-.IR db_open (3),
-.IR db_recno (3),
-.IR db_txn (3)
diff --git a/src/util/db2/man/db_mpool.3 b/src/util/db2/man/db_mpool.3
deleted file mode 100644
index 4b683b618..000000000
--- a/src/util/db2/man/db_mpool.3
+++ /dev/null
@@ -1,403 +0,0 @@
-.\" Copyright (c) 1990, 1993, 1994, 1995
-.\" The Regents of the University of California. All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. All advertising materials mentioning features or use of this software
-.\" must display the following acknowledgement:
-.\" This product includes software developed by the University of
-.\" California, Berkeley and its contributors.
-.\" 4. Neither the name of the University nor the names of its contributors
-.\" may be used to endorse or promote products derived from this software
-.\" without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" @(#)db_mpool.3 8.14 (Berkeley) 8/1/95
-.\"
-.TH DB_MPOOL 3 "August 1, 1995"
-.UC 7
-.SH NAME
-db_mpool \- general purpose shared memory buffer pool
-.SH SYNOPSIS
-.nf
-.ft B
-#include <db.h>
-#include <mpool.h>
-
-int
-mpool_create(char *path, mode_t mode, size_t cachesize, u_long flags);
-
-MPOOL *
-mpool_open(char *path);
-
-int
-mpool_close(MPOOL *mp);
-
-MPOOLFILE *
-mpool_fopen(MPOOL *mp, char *path, size_t pagesize, void *pgcookie,
-.ti +5
-int (*pgin)(MPOOLFILE *mpf,
-.ti +8
-pgno_t pgno, void *pgaddr, void *pgcookie),
-.ti +5
-int (*pgout)(MPOOLFILE *mpf,
-.ti +8
-pgno_t pgno, void *pgaddr, void *pgcookie);
-
-int
-mpool_fclose(MPOOLFILE *mpf);
-
-void *
-mpool_get(MPOOLFILE *mpf, pgno_t *pgnoaddr, u_long flags,
-.ti +5
-int (*callback)(MPOOLFILE *mpf, pgno_t pgno));
-
-int
-mpool_put(MPOOLFILE *mpf, void *pgaddr, u_long flags);
-
-int
-mpool_sync(MPOOLFILE *mpf);
-
-int
-mpool_unlink(const char *path, int force);
-
-void
-mpool_stat(MPOOL *mp, FILE *fp);
-.ft R
-.fi
-.SH DESCRIPTION
-.so db.so
-.GN
-specific details of the memory pool interface.
-.PP
-The
-.I db_mpool
-function is the library interface intended to provide general-purpose,
-page-oriented buffer management of one or more files.
-While designed to work with the other DB functions, these functions are
-also useful for more general purposes.
-The memory pools (MPOOL's) are referred to in this document as
-simply ``pools''.
-Pools may be shared between processes.
-Pools are usually filled by pages from one or more files (MPOOLFILE's).
-Pages in the pool are replaced in LRU (least-recently-used) order,
-with each new page replacing the page which has been unused the longest.
-Pages retrieved from the pool using
-.I mpool_get
-are ``pinned'' in memory, by default,
-until they are returned to the pool using the
-.I mpool_put
-function.
-.PP
-.CR "memory pool" mpool
-.PP
-The
-.I cachesize
-argument specifies the size of the pool in bytes,
-and should be the size of the normal working set of the application with
-some small amount of additional memory for unusual situations.
-If the number of bytes currently ``pinned'' in memory exceeds
-.IR cachesize ,
-the
-.I db_mpool
-functions will attempt to allocate more memory and do not necessarily fail,
-although they may suffer performance degradation.
-.PP
-The
-.I flags
-argument is set by
-.IR or 'ing
-any of the following values:
-.TP
-MPOOL_PRIVATE
-The pool is not shared by other processes or threads,
-so no locking of pool resources is required.
-.PP
-.OP "memory pool" mpool
-.PP
-The
-.I mpool_close
-function closes the pool indicated by the MPOOL pointer
-.IR mp ,
-as returned by
-.IR mpool_open .
-This function does
-.B not
-imply a call to
-.I mpool_sync
-(or to
-.IR mpool_fclose )
-i.e. no pages are written to the source file as as a result of calling
-.IR mpool_close .
-.RT mpool_close
-.PP
-The function
-.I mpool_fopen
-opens a file for buffering in the pool specified by the MPOOL
-argument.
-The
-.I path
-argument is the name of the file to be opened.
-The
-.I pagesize
-argument is the size, in bytes, of the unit of transfer between the
-application and the pool, although not necessarily the unit of transfer
-between the pool and the source file.
-Applications not knowing the page size of the source file should
-retrieve the metadata from the file using a page size that is correct
-for the metadata, then close and reopen the file, or,
-otherwise determine the page size before calling
-.IR mpool_fopen .
-.PP
-If the
-.I pgin
-function is specified, it is called each time a page is read into
-the memory pool from the source file.
-If the
-.I pgout
-function is specified, it is called each time a page is written
-to the source file.
-Both functions are called with the MPOOLFILE pointer returned from
-.IR mpool_fopen ,
-the page number, a pointer to the page being read or written, and
-the argument
-.IR pgcookie .
-If either function fails, it should return non-zero and set
-.IR errno ,
-in which case the
-.I db_mpool
-function calling it will also fail, leaving
-.I errno
-intact.
-.PP
-The
-.I mpool_fclose
-function closes the source file indicated by the MPOOLFILE pointer
-.IR mpf .
-This function does
-.B not
-imply a call to
-.IR mpool_sync ,
-i.e. no pages are written to the source file as as a result of calling
-.IR mpool_fclose .
-.RT mpool_fclose
-.\"
-.\".PP
-.\"int
-.\"mpool_fd (MPOOLFILE *mpf);
-.\"
-.\".PP
-.\"The function
-.\".I mpool_fd
-.\"takes an MPOOLFILE pointer and returns the file descriptor being
-.\"used to read/write that file
-.\"to/from the pool.
-.PP
-The function
-.I mpool_get
-returns a pointer to the page with the page number specified by
-.IR pgnoaddr ,
-from the source file specified by the MPOOLFILE pointer
-.IR mpf .
-If the page does not exist or cannot be retrieved,
-.I mpool_get
-returns NULL and sets errno.
-.PP
-The
-.I flags
-argument is set by
-.IR or 'ing
-any of the following values:
-.TP 5
-MPOOL_CALLBACK
-After the page number has been determined, but before any other
-process or thread can access the page, the function specified by
-the
-.I callback
-argument is called.
-If the function fails, it should return non-zero and set
-.IR errno ,
-in which case
-.I mpool_get
-will also fail, leaving
-.I errno
-intact.
-The
-.I callback
-function is called with the MPOOLFILE pointer returned from
-.I mpool_fopen
-and the page number.
-This functionality is commonly used when page locking is required,
-but the page number of the page being retrieved is not known.
-.TP 5
-MPOOL_CREATE
-If the specified page does not exist, create it.
-.TP 5
-MPOOL_LAST
-Return the last page of the source file and copy its page number
-to the location referenced by
-.IR pgnoaddr .
-.TP 5
-MPOOL_NEW
-Create a new page in the file and copy its page number to the location
-referenced by
-.IR pgnoaddr .
-.TP 5
-MPOOL_NOPIN
-Don't pin the page into memory.
-(This flag is intended for debugging purposes, when it's often useful
-to examine pages which are currently held by other parts of the
-application.
-Pages retrieved in this manner don't need to be returned to the
-memory pool, i.e. they should
-.B not
-be specified as arguments to the
-.IR mpool_put
-routine.)
-.PP
-Created pages have all their bytes set to 0.
-.PP
-All pages returned by
-.I mpool_get
-(unless the MPOOL_NOPIN flag is specified),
-will be retained (i.e. ``pinned'') in the pool until a subsequent
-call to
-.IR mpool_put .
-.PP
-The function
-.I mpool_put
-indicates that the page referenced by
-.I pgaddr
-can be evicted from the pool.
-.I Pgaddr
-must be an address previously returned by
-.IR mpool_get .
-.PP
-The flag value is specified by
-.IR or 'ing
-any of the following values:
-.TP 5
-MPOOL_DIRTY
-The page has been modified and must be written to the source file
-before being evicted from the pool.
-.TP 5
-MPOOL_DISCARD
-The page is unlikely to be useful in the near future, and should be
-discarded before other pages in the pool.
-.PP
-.RT mpool_put
-.PP
-The function
-.I mpool_sync
-writes all pages associated with the MPOOLFILE pointer
-.IR mpf ,
-which were specified as arguments to the
-.I mpool_put
-function with an associated flag of
-MPOOL_DIRTY,
-to the source file.
-.RT mpool_sync
-.PP
-.UN "memory pool" mpool
-.PP
-The function
-.I mpool_stat
-writes statistics for the memory pool
-.I mp
-to the file specified by
-.IR fp .
-These statistics include the number of files participating in the pool,
-the active pages in the pool, and numbers as to how effective the cache
-has been.
-.SH ERRORS
-The
-.IR mpool_create ,
-.I mpool_open
-and
-.I mpool_fopen
-functions may fail and set
-.I errno
-for any of the errors specified for the library functions
-.IR open (2),
-.IR read (2),
-and
-.IR malloc (3).
-.PP
-The
-.I mpool_close
-and
-.I mpool_fclose
-functions may fail and set
-.I errno
-for any of the errors specified for the library functions
-.IR close (2)
-and
-.IR free (3).
-.PP
-The
-.I mpool_get
-function may fail and set
-.I errno
-for any of the errors specified for the library functions
-.IR read (2),
-.IR write (2),
-and
-.IR malloc (3)
-or the following:
-.TP 5
-[EINVAL]
-The requested page does not exist and MPOOL_CREATE was not set.
-.PP
-The
-.I mpool_put
-function may fail and set
-.I errno
-for any of the errors specified for the library function
-.IR write (2)
-or the following:
-.TP 5
-[EACCES]
-The source file was not opened for writing.
-.PP
-The
-.I mpool_sync
-function may fail and set
-.I errno
-for any of the errors specified for the library function
-.IR write (2).
-.PP
-The
-.I mpool_unlink
-function may fail and set
-.I errno
-for any of the errors specified for the library function
-.IR unlink (2)
-or the following:
-.TP 5
-[EBUSY]
-The memory pool was in use and the force flag was not set.
-.SH "SEE ALSO"
-.IR db_btree (3),
-.IR db_hash (3),
-.IR db_lock (3),
-.IR db_log (3),
-.IR db_open (3),
-.IR db_recno (3),
-.IR db_txn (3)
diff --git a/src/util/db2/man/db_open.3 b/src/util/db2/man/db_open.3
deleted file mode 100644
index f988ef924..000000000
--- a/src/util/db2/man/db_open.3
+++ /dev/null
@@ -1,574 +0,0 @@
-.\" Copyright (c) 1990, 1993, 1994, 1995
-.\" The Regents of the University of California. All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. All advertising materials mentioning features or use of this software
-.\" must display the following acknowledgement:
-.\" This product includes software developed by the University of
-.\" California, Berkeley and its contributors.
-.\" 4. Neither the name of the University nor the names of its contributors
-.\" may be used to endorse or promote products derived from this software
-.\" without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" @(#)db_open.3 8.15 (Berkeley) 8/1/95
-.\"
-.TH DB_OPEN 3 "August 1, 1995"
-.UC 7
-.SH NAME
-db_open \- database access methods
-.SH SYNOPSIS
-.nf
-.ft B
-#include <db.h>
-
-DB *
-db_open(const char *file, int flags, int mode,
-.ti +5
-DBTYPE type, DBINFO *dbinfo, const void *openinfo);
-.ft R
-.fi
-.SH DESCRIPTION
-.so db.so
-.GN
-the overall structure of the available access methods.
-.PP
-The currently supported file formats are btree, hashed, log and recno
-(i.e. flat-file oriented).
-The btree format is a representation of a sorted, balanced tree structure.
-The hashed format is an extensible, dynamic hashing scheme.
-The log format is a general-purpose logging facility.
-The recno format is a byte stream file with fixed or variable length
-records.
-The formats and other, format specific information are described in detail
-in their respective manual pages:
-.IR db_btree (3),
-.IR db_hash (3),
-.IR db_log (3),
-and
-.IR db_recno (3).
-.PP
-Db_open opens
-.I file
-for reading and/or writing.
-Files never intended to be preserved on disk may be created by setting
-the file parameter to NULL.
-(Note, while most of the access methods use
-.I file
-as the name of an underlying file on disk, this is not guaranteed.
-See the manual pages for the individual access methods for more
-information.)
-.PP
-The
-.I flags
-and
-.I mode arguments
-are as specified to the
-.IR open (2)
-function, however, only the O_CREAT, O_EXCL, O_EXLOCK, O_NONBLOCK,
-O_RDONLY, O_RDWR, O_SHLOCK and O_TRUNC flags are meaningful.
-(Note, opening a database file O_WRONLY is not possible.)
-.\"Three additional options may be specified by
-.\".IR or 'ing
-.\"them into the
-.\".I flags
-.\"argument.
-.\".TP
-.\"DB_LOCK
-.\"Do the necessary locking in the database to support concurrent access.
-.\"If concurrent access isn't needed or the database is read-only this
-.\"flag should not be set, as it tends to have an associated performance
-.\"penalty.
-.\".TP
-.\"DB_SHMEM
-.\"Place the underlying memory pool used by the database in shared
-.\"memory.
-.\"Necessary for concurrent access.
-.\".TP
-.\"DB_TXN
-.\"Support transactions in the database.
-.\"The DB_LOCK and DB_SHMEM flags must be set as well.
-.PP
-The
-.I type
-argument is of type DBTYPE (as defined in the <db.h> include file) and
-may be set to DB_BTREE, DB_HASH, DB_LOG or DB_RECNO.
-.PP
-The
-.I dbinfo
-argument is a pointer to a structure containing references to locking,
-logging, transaction, and shared-memory buffer pool information.
-If
-.I dbinfo
-is NULL, then the access method may still use these subsystems,
-but the usage will be private to the application and managed by DB.
-If
-.I dbinfo
-is non-NULL,
-then the module referenced by each of the non-NULL fields is used by DB
-as necessary.
-The fields of the DBINFO structure are defined as follows:
-.TP 5
-const char *errpfx;
-A prefix to prepend to error messages; used only if
-.I errfile
-is non-NULL.
-.TP 5
-FILE *errfile;
-The
-.IR stdio (3)
-file stream to which error messages are logged.
-.sp
-When any error occurs in the
-.I db_open
-function, or in any function called using a field of the returned DB
-structure, an error value is returned by the function,
-and the global variable
-.I errno
-is set appropriately.
-In some cases, however, the
-.I errno
-value may be insufficient to describe the cause of the error.
-In these cases, if
-.I errfile
-is non-NULL, additional error information will be written to the file
-stream it represents, preceded by the string, if any, specified by
-.IR errpfx .
-This error logging facility should not be required for normal operation,
-but may be useful in debugging applications.
-.TP 5
-char *errbuf;
-The buffer to which error messages are copied.
-If non-NULL,
-.I errbuf
-behaves as described for
-.IR errfile ,
-except that the
-.I errpfx
-field is ignored and the error message is copied into the specified
-buffer instead of being written to the FILE stream.
-The DB routines assume that the associated buffer is at least 1024 bytes
-in length.
-.TP 5
-LOCK_TABLE_T *lockinfo;
-If locking is required for the file being opened (as in the case of
-buffers being maintained in a shared memory buffer pool),
-the
-.I lockinfo
-field contains a return value from the function
-.I lock_open
-that should be used
-(see
-.IR db_lock (3)).
-If
-.I lockinfo
-is NULL, no locking is done.
-.TP 5
-DB *loginfo;
-If modifications to the file being opened should be logged, the
-.I loginfo
-field contains a return value from the function
-.IR dbopen ,
-when opening a DB file of type DB_LOG.
-If
-.I loginfo
-is NULL, no logging is done.
-.TP 5
-MPOOL *mpoolinfo;
-If the cache for the file being opened should be maintained in a shared
-buffer pool, the
-.I mpoolinfo
-field contains a return value from the function
-.I mpool_open
-that should be used
-(see
-.IR db_mpool (3)).
-If
-.I mpoolinfo
-is NULL, a memory pool may still be created,
-but it will be private to the application and managed by DB.
-.TP 5
-TXNMGR *txninfo;
-If the accesses to the file being opened should take place in the context
-of transactions (providing atomicity and complete error recovery), the
-.I txninfo
-field contains a return value from the function
-.I txn_open
-(see
-.IR db_txn (3)).
-If transactions are specified,
-the application is responsible for making suitable calls to
-.IR txn_begin ,
-.IR txn_abort ,
-and
-.IR txn_commit .
-If
-.I txninfo
-is NULL, no transaction support is done.
-.PP
-The
-.I openinfo
-argument is a pointer to an access method specific structure described
-in the access method's manual page.
-If
-.I openinfo
-is NULL, each access method will use defaults appropriate for the system
-and the access method.
-.SH "KEY/DATA PAIRS"
-Access to all access methods is based on key/data pairs.
-Both keys and data are represented by the following data structure:
-.PP
-typedef struct {
-.RS
-void *data;
-.br
-size_t size;
-.RE
-} DBT;
-.PP
-The elements of the DBT structure are defined as follows:
-.TP 5
-data
-A pointer to a byte string.
-.ns
-.br
-.TP 5
-size
-The length of
-.IR data ,
-in bytes.
-.PP
-Key and data byte strings may reference strings of essentially unlimited
-length, although any two of them must fit into available memory at the
-same time.
-.PP
-The access methods provide no guarantees about byte string alignment,
-and applications are responsible for maintaining any necessary alignment.
-.SH "DB OPERATIONS"
-.I Db_open
-returns a pointer to a DB structure (as defined in the <db.h> include file)
-on success, and NULL on error.
-The DB structure describes a database type, and includes a set of functions
-to perform various actions, as described below.
-Each of these functions takes a pointer to a DB structure, and may take
-one or more DBT *'s and a flag value as well.
-Individual access methods specify additional functions and flags which
-are specific to the method.
-The fields of the DB structure are as follows:
-.TP 5
-DBTYPE type;
-The type of the underlying access method (and file format).
-.TP 5
-int (*close)(const DB *db);
-A pointer to a function to flush any cached information to disk,
-free any allocated resources, and close any underlying files.
-Since key/data pairs are cached in memory, failing to sync the
-file with the
-.I close
-or
-.I sync
-function may result in inconsistent or lost information.
-.IP
-The
-.I close
-functions return -1 on failure, setting
-.IR errno ,
-and 0 on success.
-.TP 5
-int (*del)(const DB *db, TXN *txnid,
-.ti +5
-const DBT *key, u_int flags);
-.br
-A pointer to a function to remove key/data pairs from the database.
-The key/data pair associated with the specified
-.I key
-are discarded from the database.
-.IP
-The
-.I txnid
-parameter contains a transaction ID returned from
-.IR txn_begin ,
-if the file is being accessed under transaction protection,
-or NULL if transactions are not in effect.
-.IP
-The parameter
-.I flag
-must be set to 0 or exactly one of the following values:
-.RS
-.TP 5
-R_CURSOR
-Delete the record referenced by the cursor.
-The cursor must have previously been initialized.
-.RE
-.IP
-The
-.I delete
-functions return -1 on error, setting
-.IR errno ,
-0 on success, and 1 if the specified
-.I key
-did not exist in the file.
-.TP 5
-int (*fd)(const DB *db);
-A pointer to a function which returns a file descriptor representative
-of the underlying database.
-A file descriptor referencing the same file will be returned to all
-processes which call
-.I db_open
-with the same
-.I file
-name.
-This file descriptor may be safely used as an argument to the
-.IR fcntl (2)
-and
-.IR flock (2)
-locking functions.
-The file descriptor is not necessarily associated with any of the
-underlying files used by the access method.
-No file descriptor is available for in memory databases.
-.IP
-The
-.I fd
-functions return -1 on error, setting
-.IR errno ,
-and the file descriptor on success.
-.TP 5
-int (*get)(const DB *db, TXN *txnid,
-.ti +5
-const DBT *key, DBT *data, u_int flags);
-.br
-A pointer to a function which is the interface for keyed retrieval from
-the database.
-The address and length of the data associated with the specified
-.I key
-are returned in the structure referenced by
-.IR data .
-.IP
-The
-.I txnid
-parameter contains a transaction ID returned from
-.IR txn_begin ,
-if the file is being accessed under transaction protection,
-or NULL if transactions are not in effect.
-.IP
-The
-.I get
-functions return -1 on error, setting
-.IR errno ,
-0 on success, and 1 if the
-.I key
-was not found.
-.TP 5
-int (*put)(const DB *db, TXN *txnid,
-.ti +5
-DBT *key, const DBT *data, u_int flags);
-.br
-A pointer to a function to store key/data pairs in the database.
-.IP
-The
-.I txnid
-parameter contains a transaction ID returned from
-.IR txn_begin ,
-if the file is being accessed under transaction protection,
-or NULL if transactions are not in effect.
-.IP
-The parameter
-.I flag
-must be set to 0 or exactly one of the following values:
-.RS
-.TP 5
-R_CURSOR
-Replace the key/data pair referenced by the cursor.
-The cursor must have previously been initialized.
-.TP 5
-R_NOOVERWRITE
-Enter the new key/data pair only if the key does not previously exist.
-.RE
-.IP
-The default behavior of the
-.I put
-functions is to enter the new key/data pair, replacing any previously
-existing key.
-.IP
-The
-.I put
-functions return -1 on error, setting
-.IR errno ,
-0 on success, and 1 if the R_NOOVERWRITE
-.I flag
-was set and the key already exists in the file.
-.TP 5
-int (*seq)(const DB *db, TXN *txnid,
-.ti +5
-DBT *key, DBT *data, u_int flags);
-.br
-A pointer to a function which is the interface for sequential
-retrieval from the database.
-The address and length of the key are returned in the structure
-referenced by
-.IR key ,
-and the address and length of the data are returned in the
-structure referenced
-by
-.IR data .
-.IP
-The
-.I txnid
-parameter contains a transaction ID returned from
-.IR txn_begin ,
-if the file is being accessed under transaction protection,
-or NULL if transactions are not in effect.
-.IP
-Sequential key/data pair retrieval may begin at any time, and the
-logical position of the ``cursor'' is not affected by calls to the
-.IR del ,
-.IR get ,
-.IR put ,
-or
-.I sync
-functions.
-Modifications to the database during a sequential scan will be reflected
-in the scan, i.e. records inserted behind the cursor will not be returned
-while records inserted in front of the cursor will be returned.
-.IP
-The parameter
-.I flag
-must be set to 0 or exactly one of the following values:
-.RS
-.TP 5
-R_CURSOR
-The data associated with the specified key is returned.
-This differs from the
-.I get
-functions in that it sets or initializes the cursor to the location of
-the key as well.
-.TP 5
-R_FIRST
-The first key/data pair of the database is returned, and the cursor
-is set or initialized to reference it.
-.TP 5
-R_NEXT
-Retrieve the key/data pair immediately after the cursor.
-If the cursor is not yet set, this is the same as the R_FIRST flag.
-.RE
-.IP
-The
-.I seq
-functions return -1 on error, setting
-.IR errno ,
-0 on success,
-and 1 if there are no key/data pairs less than or greater than the
-specified or current key.
-.TP 5
-int (*sync)(const DB *db, u_int flags);
-A pointer to a function to flush any cached information to disk.
-If the database is in memory only, the
-.I sync
-function has no effect and will always succeed.
-.IP
-The parameter
-.I flag
-must be set to 0 or a value specified by an access method specific
-manual page.
-.IP
-The
-.I sync
-functions return -1 on failure, setting
-.IR errno ,
-and 0 on success.
-.SH ERRORS
-The
-.I db_open
-function may fail and set
-.I errno
-for any of the errors specified for the library functions
-.IR open (2),
-.IR malloc (3)
-or the following:
-.TP 5
-[EFTYPE]
-A file is incorrectly formatted.
-.TP 5
-[EINVAL]
-A parameter has been specified (hash function, recno pad byte etc.)
-that is incompatible with the current file specification or, a flag
-to a function which is not meaningful for the function (for example,
-use of the cursor without prior initialization) or there is a mismatch
-between the version number of file and the software.
-.PP
-The
-.I close
-functions may fail and set
-.I errno
-for any of the errors specified for the library functions
-.IR close (2),
-.IR read (2),
-.IR write (2),
-.IR free (3),
-or
-.IR fsync (2).
-.PP
-The
-.IR del ,
-.IR get ,
-.I put
-and
-.I seq
-functions may fail and set
-.I errno
-for any of the errors specified for the library functions
-.IR read (2),
-.IR write (2),
-.IR free (3)
-or
-.IR malloc (3).
-.PP
-The
-.I fd
-functions will fail and set
-.I errno
-to ENOENT for in memory databases.
-.PP
-The
-.I sync
-functions may fail and set
-.I errno
-for any of the errors specified for the library function
-.IR fsync (2).
-.SH "SEE ALSO"
-.IR db_btree (3),
-.IR db_hash (3),
-.IR db_lock (3),
-.IR db_log (3),
-.IR db_mpool (3),
-.IR db_recno (3),
-.IR db_txn (3)
-.SH BUGS
-The name DBT is a mnemonic for ``data base thang'', and was used
-because noone could think of a reasonable name that wasn't already
-in use somewhere else.
-.PP
-The
-.I fd
-function interface is a kluge,
-and will be deleted in a future version of the interface.
-.PP
-Only big and little endian byte order is supported.
diff --git a/src/util/db2/man/db_recno.3 b/src/util/db2/man/db_recno.3
deleted file mode 100644
index 6b93b3f5a..000000000
--- a/src/util/db2/man/db_recno.3
+++ /dev/null
@@ -1,268 +0,0 @@
-.\" Copyright (c) 1990, 1993, 1994, 1995
-.\" The Regents of the University of California. All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. All advertising materials mentioning features or use of this software
-.\" must display the following acknowledgement:
-.\" This product includes software developed by the University of
-.\" California, Berkeley and its contributors.
-.\" 4. Neither the name of the University nor the names of its contributors
-.\" may be used to endorse or promote products derived from this software
-.\" without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" @(#)db_recno.3 8.12 (Berkeley) 8/1/95
-.\"
-.TH DB_RECNO 3 "August 1, 1995"
-.UC 7
-.SH NAME
-db_recno \- record number database access method
-.SH DESCRIPTION
-.so db.so
-specific details of the recno access method.
-.SH "ACCESS METHOD SPECIFIC INFORMATION"
-The recno access method specific data structure provided to
-.I db_open
-is typedef'd and named RECNOINFO.
-A RECNOINFO structure has at least the following fields,
-which may be initialized before calling
-.IR db_open :
-.TP 5
-u_int8_t bval;
-The delimiting byte to be used to mark the end of a record for
-variable-length records, and the pad character for fixed-length
-records.
-If no value is specified, newlines (``\en'') are used to mark the end
-of variable-length records and fixed-length records are padded with
-spaces.
-.TP 5
-char *bfname;
-The recno access method stores the in-memory copies of its records
-in a btree.
-If bfname is non-NULL, it specifies the name of the btree file,
-as if specified as the file name for a
-.I db_open
-of a btree file.
-.TP 5
-u_int cachesize;
-A suggested maximum size, in bytes, of the memory cache.
-This value is
-.B only
-advisory, and the access method will allocate more memory rather than fail.
-If
-.I cachesize
-is 0 (no size is specified) a default size is used.
-.TP 5
-u_long flags;
-The flag value is specified by
-.IR or 'ing
-any of the following values:
-.RS
-.TP 5
-R_FIXEDLEN
-The records are fixed-length, not byte delimited.
-The structure element
-.I reclen
-specifies the length of the record, and the structure element
-.I bval
-is used as the pad character.
-Any records, inserted into the database, that are less than
-.I reclen
-bytes long are automatically padded.
-.TP 5
-R_NOKEY
-In the interface specified by
-.IR db_open ,
-the sequential record retrieval fills in both the caller's key and
-data structures.
-If the R_NOKEY flag is specified, the
-.I cursor
-functions are not required to fill in the key structure.
-This permits applications to retrieve records at the end of files without
-reading all of the intervening records.
-.TP 5
-R_SNAPSHOT
-This flag requires that a snapshot of the file be taken when
-.I db_open
-is called, instead of permitting any unmodified records to be read from
-the original file.
-.RE
-.TP 5
-int lorder;
-The byte order for integers in the stored database metadata.
-The number should represent the order as an integer; for example,
-big endian order would be the number 4,321.
-If
-.I lorder
-is 0 (no order is specified) the current host order is used.
-.TP 5
-u_int psize;
-The recno access method stores the in-memory copies of its records
-in a btree.
-This value is the size (in bytes) of the pages used for nodes in that tree.
-If
-.I psize
-is 0 (no page size is specified) a page size is chosen based on the
-underlying file system I/O block size.
-See
-.IR btree (3)
-for more information.
-.TP 5
-size_t reclen;
-The length of a fixed-length record.
-.SH "DB OPERATIONS"
-The data part of the key/data pair used by the recno access method
-is the same as other access methods.
-The key is different.
-The
-.I data
-field of the key should be a pointer to a memory location of type
-.IR recno_t ,
-as defined in the <db.h> include file.
-This type is normally the largest unsigned integral type available to
-the implementation.
-The
-.I size
-field of the key should be the size of that type.
-.PP
-The record number data structure is either variable or fixed-length
-records stored in a flat-file format, accessed by the logical record
-number.
-The existence of record number five requires the existence of records
-one through four, and the deletion of record number one causes
-record number five to be renumbered to record number four, as well
-as the cursor, if positioned after record number one, to shift down
-one record.
-The creation of record number five when records one through four do
-not exist causes the logical creation of them with zero-length data.
-.PP
-Because there is no meta-data associated with the underlying recno access
-method files, any changes made to the default values (e.g. fixed record
-length or byte separator value) must be explicitly specified each time the
-file is opened.
-.PP
-The functions returned by
-.I db_open
-for the btree access method are as described in
-.IR db_open (3),
-with the following exceptions and additions:
-.TP 5
-type
-The type is DB_RECNO.
-.TP 5
-put
-Using the
-.I put
-interface to create a new record will cause the creation of multiple,
-empty records if the record number is more than one greater than the
-largest record currently in the database.
-.IP
-The
-.I put
-function takes the following additional flags:
-.RS
-.TP 5
-R_IAFTER
-Append the data immediately after the data referenced by
-.IR key ,
-creating a new key/data pair.
-The record number of the appended key/data pair is returned in the
-.I key
-structure.
-.TP 5
-R_IBEFORE
-Insert the data immediately before the data referenced by
-.IR key ,
-creating a new key/data pair.
-The record number of the inserted key/data pair is returned in the
-.I key
-structure.
-.TP 5
-R_SETCURSOR
-Store the key/data pair, setting or initializing the position of the
-cursor to reference it.
-.RE
-.TP 5
-seq
-The
-.I seq
-function takes the following additional flags:
-.RS
-.TP 5
-R_LAST
-The last key/data pair of the database is returned, and the cursor
-is set or initialized to reference it.
-.TP 5
-R_PREV
-Retrieve the key/data pair immediately before the cursor.
-If the cursor is not yet set, this is the same as the R_LAST flag.
-.RE
-.IP
-If the database file is a character special file and no complete
-key/data pairs are currently available, the
-.I seq
-function returns 2.
-.TP 5
-sync
-The
-.I sync
-function takes the following additional flag:
-.RS
-.TP 5
-R_RECNOSYNC
-This flag causes the
-.I sync
-function to apply to the btree file which underlies the recno file,
-not the recno file itself.
-(See the
-.I bfname
-field of RECNOINFO
-structure, above, for more information.)
-.RE
-.SH ERRORS
-The
-.I recno
-access method functions may fail and set
-.I errno
-for any of the errors specified for the library function
-.IR db_open (3)
-or the following:
-.TP 5
-[EINVAL]
-An attempt was made to add a record to a fixed-length database that
-was too large to fit.
-.SH "SEE ALSO"
-.IR db_btree (3),
-.IR db_hash (3),
-.IR db_lock (3),
-.IR db_log (3),
-.IR db_mpool (3),
-.IR db_open (3),
-.IR db_txn (3)
-.sp
-.IR "Document Processing in a Relational Database System" ,
-Michael Stonebraker, Heidi Stettner, Joseph Kalash, Antonin Guttman,
-Nadene Lynn, Memorandum No. UCB/ERL M82/32, May 1982.
-.SH BUGS
-The
-.I sync
-function's R_RECNOSYNC interface is a kluge,
-and will be deleted in a future version of the interface.
diff --git a/src/util/db2/man/db_txn.3 b/src/util/db2/man/db_txn.3
deleted file mode 100644
index 18ad64692..000000000
--- a/src/util/db2/man/db_txn.3
+++ /dev/null
@@ -1,373 +0,0 @@
-.\" Copyright (c) 1994, 1995
-.\" The President and Fellows of Harvard University. All rights reserved.
-.\" Copyright (c) 1994, 1995
-.\" Margo I. Selzer. All rights reserved.
-.\"
-.\" Redistribution and use in source and binary forms, with or without
-.\" modification, are permitted provided that the following conditions
-.\" are met:
-.\" 1. Redistributions of source code must retain the above copyright
-.\" notice, this list of conditions and the following disclaimer.
-.\" 2. Redistributions in binary form must reproduce the above copyright
-.\" notice, this list of conditions and the following disclaimer in the
-.\" documentation and/or other materials provided with the distribution.
-.\" 3. All advertising materials mentioning features or use of this software
-.\" must display the following acknowledgement:
-.\" This product includes software developed by the University of
-.\" California, Berkeley and its contributors.
-.\" 4. Neither the name of the University nor the names of its contributors
-.\" may be used to endorse or promote products derived from this software
-.\" without specific prior written permission.
-.\"
-.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
-.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
-.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
-.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
-.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
-.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
-.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
-.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
-.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
-.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
-.\" SUCH DAMAGE.
-.\"
-.\" @(#)db_txn.3 8.8 (Harvard) 8/1/95
-.\"
-.TH DB_TXN 3 "August 1, 1995"
-.UC 7
-.SH NAME
-db_txn \- transaction management functions
-.SH SYNOPSIS
-.nf
-.ft B
-#include <db.h>
-#include <db_lock.h>
-
-int
-txn_create(const char *path, mode_t mode, u_int maxtxns, u_int flags);
-
-TXNMGR *
-txn_open(const char *path, DBT *logp, LOCK_TABLE_T *lockp,
-.ti +5
-int (*recover)(DBT *lsn, DBT *log_entry, int isundo));
-
-TXN *
-txn_begin(TXNMGR *txnp);
-
-int
-txn_commit(TXN *tid);
-
-int
-txn_prepare(TXN *tid);
-
-int
-txn_abort(TXN *tid);
-
-int
-txn_close(TXNMGR *txnp);
-
-int
-txn_unlink(const char *path, int force);
-.ft R
-.fi
-.SH DESCRIPTION
-.so db.so
-specific details of the transaction support.
-.PP
-.I Db_txn
-is the library interface that provides transaction semantics.
-Full transaction support is provided by a collection of modules
-that provide well defined interfaces to the services required for
-transaction processing.
-These services are recovery (see
-.IR db_log (3)),
-concurrency control (see
-.IR db_lock (3)),
-and the management of shared data (see
-.IR db_mpool (3)).
-Transaction semantics can be applied to the access methods described in
-.IR db (3)
-through function call parameters.
-.PP
-The model intended for transactional use (and that is used by the
-access methods) is that write-ahead logging is provided by
-.IR db_log (3)
-to record both before- and after-image logging.
-Locking follows a two-phase protocol and is implemented by
-.IR db_lock (3).
-.PP
-.CR "transaction region" txn
-Any necessary,
-associated log and lock regions are created as well (see
-.IR db_log (3)
-and
-.IR db_lock (3)).
-.PP
-The
-.I maxtxns
-argument specifies the maximum number of simultaneous transactions that
-are supported.
-This bounds the size of backing files and is used to derive limits for
-the size of the lock region and logfiles.
-When there are more than
-.I maxtxns
-concurrent transactions, calls to
-.I txn_begin
-may fail.
-.PP
-Default locking and logging protocols are provided only if the
-backing files exist.
-If the backing files do not exist, the
-.I flags
-parameter must indicate both a logging mode and locking mode specified by
-.IR or 'ing
-together at most one flag from each of the TXN_LOCK and TXN_LOG classes
-as follows:
-.TP 5
-TXN_LOCK_2PL
-Use two-phase locking.
-.TP 5
-TXN_LOCK_OPTIMISTIC
-Use optimistic locking (not currently implemented).
-.TP 5
-TXN_LOG_REDO
-Provide redo-only logging (not currently implemented).
-.TP 5
-TXN_LOG_UNDO
-Provide undo-only logging (not currently implemented).
-.TP 5
-TXN_LOG_UNDOREDO
-Provide undo/redo write-ahead logging.
-.PP
-.RT txn_create
-.PP
-.OP "transaction region" txn
-.PP
-The
-.I recover
-argument specifies a function that is called by
-.I txn_abort
-during transaction abort.
-This function takes three arguments:
-.TP 5
-lsn
-A log sequence number (LSN).
-.TP 5
-log_entry
-A log record.
-.TP 5
-isundo
-An undo flag set to 0 if the operation is a redo and set to 1 if the
-operation an undo.
-.PP
-As discussed in the
-.I db_log (3)
-manual page,
-the application is responsible for providing any necessary structure
-to the log record.
-For example, the application must understand what part of the log
-record is an operation code, what part is redo information, and what
-part is undo information.
-.PP
-The
-.I txn_begin
-function creates a new transaction in the designated transaction
-manager, returning a pointer to a TXN that uniquely identifies it.
-.PP
-The
-.I txn_commit
-function ends the transaction specified by the
-.I tid
-argument.
-Any locks held by the transaction are released.
-If logging is enabled, a commit log record is written and flushed to disk.
-.PP
-The
-.I txn_abort
-function causes an abnormal termination of the transaction.
-If logging is enabled, the log is played backwards and any recovery
-operations are initiated through the
-.I recover
-function specified to
-.IR txn_open .
-After recovery is completed, all locks held by the transaction are released.
-.PP
-The
-.I txn_close
-function detaches a process from the transaction environment specified
-by the TXNMGR pointer.
-All mapped regions are unmapped and any allocated resources are freed.
-Any uncommitted transactions are aborted.
-.PP
-.UN "transaction region" txn
-.PP
-The
-.I txn_prepare
-function initiates the beginning of a two phase commit.
-In a distributed transaction,
-the prepare directive should be issued to all participating
-transaction managers.
-Each manager must take whatever action is necessary to guarantee
-that a future call to
-.I txn_commit
-on the specified
-.I tid
-will succeed.
-.SH "SYSTEM INTEGRATION"
-This model can be applied to data bases other than the provided access
-methods.
-For example, consider an application that provides transaction semantics
-to data stored in regular files accessed using the
-.IR read (2)
-and
-.IR write (2)
-system calls.
-The operations for which transaction protection is desired are bracketed
-by calls to
-.I txn_begin
-and
-.IR txn_commit .
-.PP
-Before data are referenced, a call is made to the lock manager,
-.IR db_lock ,
-for a lock of the appropriate type (e.g. read)
-on the object being locked.
-The object might be a page in the file, a byte, a range of bytes,
-or some key.
-Before a write is performed, the application makes a call to the
-log manager,
-.IR db_log ,
-to record enough information to redo the operation in case of
-failure after commit and to undo the operation in case of abort.
-After the log message is written, the write system calls are issued.
-After all requests are issued, the application calls
-.IR txn_commit .
-When
-.I txn_commit
-returns, the caller is guaranteed that all necessary log writes have
-been written to disk.
-.PP
-At any time, the application may call
-.IR txn_abort ,
-which will result in the appropriate calls to the
-.I recover
-routine to restore the ``database'' to a consistent pre-transaction
-state.
-(The recover routine must be able to either reapply or undo the update
-depending on the context, for each different type of log record.)
-.PP
-If the application should crash, the recovery process uses the
-.I db_log
-interface to read the log and call the
-.I recover
-routine to restore the database to a consistent state.
-.PP
-The
-.I txn_prepare
-function provides the core functionality to implement distributed
-transactions,
-but it does not actually manage the notification of distributed
-transaction managers.
-The caller is responsible for issuing
-.I txn_prepare
-calls to all sites participating in the transaction.
-If all responses are positive, the caller can issue a
-.IR txn_commit .
-If any of the responses are negative, the caller should issue a
-.IR txn_abort .
-In general, the
-.I txn_prepare
-call requires that the transaction log be flushed to disk.
-.PP
-The structure of the transaction support allows application designers
-to trade off performance and protection.
-Since DB manages many structures in shared memory,
-its information is subject to corruption by applications when the library
-is linked directly with the application.
-For this reason, DB is designed to allow compilation into a separate
-server process that may be accessed via a socket interface.
-In this way DB's data structures are protected from application code,
-but communication overhead is increased.
-When applications are trusted, DB may be compiled directly into the
-application for increased performance.
-.SH ERRORS
-The
-.I txn_create
-function may fail and set
-.I errno
-for any of the errors specified for the library functions
-.IR open (2),
-.IR write (2),
-.IR malloc (3),
-.IR lock_create (3),
-and
-.IR log_create (3).
-.PP
-The
-.I txn_open
-function may fail and set
-.I errno
-to any of the errors specified for the library functions
-.IR open (2),
-.IR write (2),
-.IR malloc (3),
-.IR lock_open (3),
-and
-.IR log_open (3).
-.PP
-The
-.I txn_begin
-function may fail and set
-.I errno
-to ENOSPC indicating that the maximum number of concurrent
-transactions has been reached.
-.PP
-The
-.I txn_commit
-function may fail and set
-.I errno
-to EINVAL indicating that the transaction was aborted.
-.PP
-The
-.I txn_close
-function may fail and set
-.I errno
-to any of the errors specified for the library functions
-.IR close (2),
-.IR read (2),
-.IR write (2),
-.IR free (3),
-.IR fsync (2),
-.IR lock_close (3)
-or
-.IR log_close (3).
-.PP
-The
-.I txn_unlink
-function may fail and set
-.I errno
-to any of the errors specified for the library functions
-.IR unlink (2),
-.IR lock_unlink (3),
-and
-.IR log_unlink (3),
-or the following:
-.TP 5
-[EBUSY]
-The transaction region was in use and the force flag was not set.
-.SH "SEE ALSO"
-.IR db_btree (3),
-.IR db_hash (3),
-.IR db_lock (3),
-.IR db_log (3),
-.IR db_mpool (3),
-.IR db_open (3),
-.IR db_recno (3)
-.sp
-.IR "LIBTP: Portable, Modular Transactions for UNIX" ,
-Margo Seltzer, Michael Olson, USENIX proceedings, Winter 1992.
-.SH BUGS
-The
-.I maxtxns
-parameter is a kluge, and should be deleted in favor of dynamically
-expanding the transaction region.
diff --git a/src/util/db2/man/spell.ok b/src/util/db2/man/spell.ok
deleted file mode 100644
index 794b00bf8..000000000
--- a/src/util/db2/man/spell.ok
+++ /dev/null
@@ -1,170 +0,0 @@
-Ake
-Antonin
-BTREE
-BTREEINFO
-Bsize
-CALLBACK
-Comput
-D.E
-DB
-DB's
-DBINFO
-DBT
-DBTYPE
-Db
-EACCES
-EBUSY
-EFTYPE
-EINVAL
-ENOENT
-ENOSPC
-ERL
-EXCL
-EXLOCK
-FIXEDLEN
-Ffactor
-Guttman
-HASHINFO
-Heidi
-IAFTER
-IBEFORE
-Kalash
-Knuth
-LIBTP
-LOGINFO
-LRU
-LSN
-LSN's
-MPOOL
-MPOOL's
-MPOOLFILE
-MPOOLFILE's
-Maxlocks
-Mpool
-NG
-NOKEY
-NOOVERWRITE
-NOPIN
-NOTHELD
-Nadene
-Nelem
-Nelems
-OBJ
-Pgaddr
-RDONLY
-RDWR
-RECNO
-RECNOINFO
-RECNOSYNC
-REQ
-SETCURSOR
-SHLOCK
-Stettner
-Stonebraker
-Surv
-TMPDIR
-TRUNC
-TXN
-TXNMGR
-Txn
-UCB
-UNDOREDO
-USENIX
-Unterauer
-Vol
-WAL
-WRONLY
-XACT
-YYYY.MM.DD.HH.SS
-al
-bfname
-bsize
-btree
-btrees
-bval
-cachesize
-callback
-const
-db
-db.h
-dbinfo
-dbopen
-del
-elistp
-endian
-enum
-errbuf
-errfile
-errno
-errpfx
-fd
-ffactor
-getv
-ing
-int
-int32
-int8
-isundo
-kluge
-lastlsn
-lg
-lock.h
-lockinfo
-lockop
-lockp
-log.YYYY.MM.DD.HH.MM.SS
-logfiles
-loginfo
-logp
-lreq
-lsn
-lsn1
-lsn2
-lt
-maxcache
-maxkeypage
-maxlocks
-maxtxns
-meta
-minkeypage
-mmap
-mpf
-mpool
-mpool.h
-mpoolinfo
-munmap
-nacquire
-nelem
-nelems
-nmodes
-noone
-nrelease
-obj
-op
-openinfo
-pathname
-pgaddr
-pgcookie
-pgin
-pgno
-pgnoaddr
-pgout
-pid
-pp
-psize
-queue.h
-reclen
-recno
-sx
-thang
-timespec
-tmp
-trunc
-txn
-txnid
-txninfo
-txnp
-typedef
-typedef'd
-vec
-writeable