June 2001
Intermediate to advanced
688 pages
19h 18m
English
It is possible to use the Locking, Logging and Transaction subsystems of Berkeley DB to provide transaction semantics on objects other than those described by the Berkeley DB access methods. In these cases, the application will need more explicit customization of the subsystems, as well as the development of appropriate data-structure-specific recovery functions.
For example, consider an application that provides transaction semantics on data stored in plain UNIX files accessed using the POSIX read and write system calls. The operations for which transaction protection is desired are bracketed by calls to txn_begin and txn_commit.
Before data are referenced, the application must make a call to the ...