[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] Make xenstored use tdb, transactions can soft-fail (EAGAIN)



# HG changeset patch
# User Rusty Russell <rusty@xxxxxxxxxxxxxxx>
# Node ID 76af1a1df67cd8958fc40b1c574a8bd26d5026c2
# Parent  6aef7d1062bb6035a2a84603d9f054b24e14c9b2
Make xenstored use tdb, transactions can soft-fail (EAGAIN)
Transactions no longer take root dir, no longer lock & block: commit can fail 
spuriously with EAGAIN, not ETIMEDOUT.
Speeds up transactions by over 1000 times, should be NFS safe.
New program: xs_tdb_dump to dump raw TDB contents.
Don't do failure testing: we are no longer robust against all ENOMEM 8(
Introduce "struct node" which contains perms, children and data.
Make struct xs_permissions unpadded, so we can write to tdb w/o valgrind 
complaints.
Gently modify TDB to use talloc, not do alloc on tdb_delete.

Signed-off-by: Rusty Russell <rusty@xxxxxxxxxxxxxxx>

diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/Makefile
--- a/tools/xenstore/Makefile   Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/Makefile   Fri Sep 23 13:25:01 2005
@@ -28,11 +28,11 @@
 CLIENTS += xenstore-write
 CLIENTS_OBJS := $(patsubst xenstore-%,xenstore_%.o,$(CLIENTS))
 
-all: libxenstore.so xenstored $(CLIENTS)
+all: libxenstore.so xenstored $(CLIENTS) xs_tdb_dump
 
 testcode: xs_test xenstored_test xs_random xs_dom0_test
 
-xenstored: xenstored_core.o xenstored_watch.o xenstored_domain.o 
xenstored_transaction.o xs_lib.o talloc.o utils.o
+xenstored: xenstored_core.o xenstored_watch.o xenstored_domain.o 
xenstored_transaction.o xs_lib.o talloc.o utils.o tdb.o
        $(LINK.o) $^ $(LOADLIBES) $(LDLIBS) -lxenctrl -o $@
 
 $(CLIENTS): libxenstore.so
@@ -42,7 +42,10 @@
 $(CLIENTS_OBJS): xenstore_%.o: xenstore_client.c
        $(COMPILE.c) -DCLIENT_$(*F) -o $@ $<
 
-xenstored_test: xenstored_core_test.o xenstored_watch_test.o 
xenstored_domain_test.o xenstored_transaction_test.o xs_lib.o talloc_test.o 
fake_libxc.o utils.o
+xenstored_test: xenstored_core_test.o xenstored_watch_test.o 
xenstored_domain_test.o xenstored_transaction_test.o xs_lib.o talloc_test.o 
fake_libxc.o utils.o tdb.o
+       $(LINK.o) $^ $(LOADLIBES) $(LDLIBS) -o $@
+
+xs_tdb_dump: xs_tdb_dump.o utils.o tdb.o talloc.o
        $(LINK.o) $^ $(LOADLIBES) $(LDLIBS) -o $@
 
 xs_test: xs_test.o xs_lib.o utils.o
@@ -103,7 +106,7 @@
 randomcheck: xs_random xenstored_test $(TESTDIR)
        $(TESTENV) ./xs_random --simple --fast /tmp/xs_random 200000 
$(RANDSEED) && echo
        $(TESTENV) ./xs_random --fast /tmp/xs_random 100000 $(RANDSEED) && echo
-       $(TESTENV) ./xs_random --fail /tmp/xs_random 10000 $(RANDSEED)
+#      $(TESTENV) ./xs_random --fail /tmp/xs_random 10000 $(RANDSEED)
 
 crashme:  xs_crashme xenstored_test $(TESTDIR)
        rm -rf $(TESTDIR)/store $(TESTDIR)/transactions /tmp/xs_crashme.vglog* 
/tmp/trace
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/testsuite/04rm.test
--- a/tools/xenstore/testsuite/04rm.test        Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/testsuite/04rm.test        Fri Sep 23 13:25:01 2005
@@ -6,6 +6,8 @@
 # Create file and remove it
 write /test contents
 rm /test
+expect tool
+dir /
 
 # Create directory and remove it.
 mkdir /dir
@@ -15,3 +17,4 @@
 mkdir /dir
 write /dir/test contents
 rm /dir
+
diff -r 6aef7d1062bb -r 76af1a1df67c 
tools/xenstore/testsuite/08transaction.slowtest
--- a/tools/xenstore/testsuite/08transaction.slowtest   Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/testsuite/08transaction.slowtest   Fri Sep 23 13:25:01 2005
@@ -1,21 +1,43 @@
-# Test transaction timeouts.  Take a second each.
+# Test transaction clashes.
 
 mkdir /test
 write /test/entry1 contents
 
-# Transactions can take as long as the want...
-start /test
-sleep 1100
-rm /test/entry1
+# Start transaction, do read-only op, transaction succeeds
+1 start
+1 write /test/entry1 contents2
+expect contents
+read /test/entry1
+1 commit
+expect contents2
+read /test/entry1
+
+# Start transaction, abort other transaction, transaction succeeds.
+1 start
+1 write /test/entry1 contents3
+start
+write /test/entry1 contents
+abort
+1 commit
+expect contents3
+read /test/entry1
+
+# Start transaction, do write op, transaction fails
+1 start
+1 write /test/entry1 contents4
+write /test/entry1 contents
+expect 1: commit failed: Resource temporarily unavailable
+1 commit
+expect contents
+read /test/entry1
+
+# Start transaction, do other transaction, transaction fails
+1 start
+1 write /test/entry1 contents4
+start
+write /test/entry1 contents5
 commit
-dir /test
-
-# ... as long as noone is waiting.
-1 start /test
-notimeout
-2 mkdir /test/dir
-1 mkdir /test/dir
-expect 1:dir
-1 dir /test
-expect 1: commit failed: Connection timed out
+expect 1: commit failed: Resource temporarily unavailable
 1 commit
+expect contents5
+read /test/entry1
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/testsuite/08transaction.test
--- a/tools/xenstore/testsuite/08transaction.test       Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/testsuite/08transaction.test       Fri Sep 23 13:25:01 2005
@@ -3,7 +3,7 @@
 mkdir /test
 
 # Simple transaction: create a file inside transaction.
-1 start /test
+1 start
 1 write /test/entry1 contents
 2 dir /test
 expect 1:entry1
@@ -15,7 +15,7 @@
 rm /test/entry1
 
 # Create a file and abort transaction.
-1 start /test
+1 start
 1 write /test/entry1 contents
 2 dir /test
 expect 1:entry1
@@ -25,7 +25,7 @@
 
 write /test/entry1 contents
 # Delete in transaction, commit
-1 start /test
+1 start
 1 rm /test/entry1
 expect 2:entry1
 2 dir /test
@@ -35,7 +35,7 @@
 
 # Delete in transaction, abort.
 write /test/entry1 contents
-1 start /test
+1 start
 1 rm /test/entry1
 expect 2:entry1
 2 dir /test
@@ -47,7 +47,7 @@
 # Events inside transactions don't trigger watches until (successful) commit.
 mkdir /test/dir
 1 watch /test token
-2 start /test
+2 start
 2 mkdir /test/dir/sub
 expect 1: waitwatch failed: Connection timed out
 1 waitwatch
@@ -55,7 +55,7 @@
 1 close
 
 1 watch /test token
-2 start /test
+2 start
 2 mkdir /test/dir/sub
 2 abort
 expect 1: waitwatch failed: Connection timed out
@@ -63,7 +63,7 @@
 1 close
 
 1 watch /test token
-2 start /test
+2 start
 2 mkdir /test/dir/sub
 2 commit
 expect 1:/test/dir/sub:token
@@ -73,7 +73,7 @@
 
 # Rm inside transaction works like rm outside: children get notified.
 1 watch /test/dir/sub token
-2 start /test
+2 start
 2 rm /test/dir
 2 commit
 expect 1:/test/dir/sub:token
@@ -83,7 +83,7 @@
 
 # Multiple events from single transaction don't trigger assert
 1 watch /test token
-2 start /test
+2 start
 2 write /test/1 contents
 2 write /test/2 contents
 2 commit
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/testsuite/12readonly.test
--- a/tools/xenstore/testsuite/12readonly.test  Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/testsuite/12readonly.test  Fri Sep 23 13:25:01 2005
@@ -13,23 +13,23 @@
 getperm /test
 watch /test token
 unwatch /test token 
-start /
+start
 commit
-start /
+start
 abort
 
 # These don't work
-expect write failed: Read-only file system
+expect write failed: Permission denied
 write /test2 contents
-expect write failed: Read-only file system
+expect write failed: Permission denied
 write /test contents
-expect setperm failed: Read-only file system
+expect setperm failed: Permission denied
 setperm /test 100 NONE
-expect setperm failed: Read-only file system
+expect setperm failed: Permission denied
 setperm /test 100 NONE
-expect shutdown failed: Read-only file system
+expect shutdown failed: Permission denied
 shutdown
-expect introduce failed: Read-only file system
+expect introduce failed: Permission denied
 introduce 1 100 7 /home
 
 # Check that watches work like normal.
diff -r 6aef7d1062bb -r 76af1a1df67c 
tools/xenstore/testsuite/14complexperms.test
--- a/tools/xenstore/testsuite/14complexperms.test      Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/testsuite/14complexperms.test      Fri Sep 23 13:25:01 2005
@@ -33,14 +33,6 @@
 expect *No such file or directory
 unwatch /dir/file token 
 expect *Permission denied
-start /dir/file
-expect *No such file or directory
-abort
-expect *Permission denied
-start /dir/file
-expect *No such file or directory
-commit
-expect *Permission denied
 introduce 2 100 7 /dir/file
 
 # Now it exists
@@ -73,12 +65,4 @@
 expect *No such file or directory
 unwatch /dir/file token 
 expect *Permission denied
-start /dir/file
-expect *No such file or directory
-abort
-expect *Permission denied
-start /dir/file
-expect *No such file or directory
-commit
-expect *Permission denied
 introduce 2 100 7 /dir/file
diff -r 6aef7d1062bb -r 76af1a1df67c 
tools/xenstore/testsuite/16block-watch-crash.test
--- a/tools/xenstore/testsuite/16block-watch-crash.test Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/testsuite/16block-watch-crash.test Fri Sep 23 13:25:01 2005
@@ -1,13 +1,14 @@
 # Test case where blocked connection gets sent watch.
 
-mkdir /test
-watch /test token
-1 start /test
-# This will block on above
-noackwrite /test/entry contents
-1 write /test/entry2 contents
-1 commit
-readack
-expect /test/entry2:token
-waitwatch
-ackwatch token
+# FIXME: We no longer block connections 
+# mkdir /test
+# watch /test token
+# 1 start
+# # This will block on above
+# noackwrite /test/entry contents
+# 1 write /test/entry2 contents
+# 1 commit
+# readack
+# expect /test/entry2:token
+# waitwatch
+# ackwatch token
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xenstored.h
--- a/tools/xenstore/xenstored.h        Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xenstored.h        Fri Sep 23 13:25:01 2005
@@ -75,7 +75,7 @@
        XSD_ERROR(ENOSYS),
        XSD_ERROR(EROFS),
        XSD_ERROR(EBUSY),
-       XSD_ERROR(ETIMEDOUT),
+       XSD_ERROR(EAGAIN),
        XSD_ERROR(EISCONN),
 };
 struct xsd_sockmsg
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xenstored_core.c
--- a/tools/xenstore/xenstored_core.c   Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xenstored_core.c   Fri Sep 23 13:25:01 2005
@@ -50,10 +50,12 @@
 #include "xenstored_transaction.h"
 #include "xenstored_domain.h"
 #include "xenctrl.h"
+#include "tdb.h"
 
 static bool verbose;
 LIST_HEAD(connections);
 static int tracefd = -1;
+static TDB_CONTEXT *tdb_ctx;
 
 #ifdef TESTING
 static bool failtest = false;
@@ -124,6 +126,23 @@
               "xenstored corruption: connection id %i: err %s: %s",
               conn ? (int)conn->id : -1, strerror(saved_errno), str);
        _exit(2);
+}
+
+TDB_CONTEXT *tdb_context(struct connection *conn)
+{
+       /* conn = NULL used in manual_node at setup. */
+       if (!conn || !conn->transaction)
+               return tdb_ctx;
+       return tdb_transaction_context(conn->transaction);
+}
+
+bool replace_tdb(const char *newname, TDB_CONTEXT *newtdb)
+{
+       if (rename(newname, xs_daemon_tdb()) != 0)
+               return false;
+       tdb_close(tdb_ctx);
+       tdb_ctx = talloc_steal(talloc_autofree_context(), newtdb);
+       return true;
 }
 
 static char *sockmsg_string(enum xsd_sockmsg_type type)
@@ -202,37 +221,6 @@
        write(tracefd, string, strlen(string));
 }
 
-void trace_watch_timeout(const struct connection *conn, const char *node, 
const char *token)
-{
-       char string[64];
-       if (tracefd < 0)
-               return;
-       write(tracefd, "WATCH_TIMEOUT ", strlen("WATCH_TIMEOUT "));
-       sprintf(string, " %p ", conn);
-       write(tracefd, string, strlen(string));
-       write(tracefd, " (", 2);
-       write(tracefd, node, strlen(node));
-       write(tracefd, " ", 1);
-       write(tracefd, token, strlen(token));
-       write(tracefd, ")\n", 2);
-}
-
-static void trace_blocked(const struct connection *conn,
-                         const struct buffered_data *data)
-{
-       char string[64];
-
-       if (tracefd < 0)
-               return;
-
-       write(tracefd, "BLOCKED", strlen("BLOCKED"));
-       sprintf(string, " %p (", conn);
-       write(tracefd, string, strlen(string));
-       write(tracefd, sockmsg_string(data->hdr.msg.type),
-             strlen(sockmsg_string(data->hdr.msg.type)));
-       write(tracefd, ")\n", 2);
-}
-
 void trace(const char *fmt, ...)
 {
        va_list arglist;
@@ -253,7 +241,6 @@
        int ret;
        struct buffered_data *out = conn->out;
 
-       assert(conn->state != BLOCKED);
        if (out->inhdr) {
                if (verbose)
                        xprintf("Writing msg %s (%s) out to %p\n",
@@ -351,24 +338,6 @@
        return max;
 }
 
-/* Read everything from a talloc_open'ed fd. */
-void *read_all(int *fd, unsigned int *size)
-{
-       unsigned int max = 4;
-       int ret;
-       void *buffer = talloc_size(fd, max);
-
-       *size = 0;
-       while ((ret = read(*fd, buffer + *size, max - *size)) > 0) {
-               *size += ret;
-               if (*size == max)
-                       buffer = talloc_realloc_size(fd, buffer, max *= 2);
-       }
-       if (ret < 0)
-               return NULL;
-       return buffer;
-}
-
 static int destroy_fd(void *_fd)
 {
        int *fd = _fd;
@@ -409,42 +378,167 @@
        return child[len] == '/' || child[len] == '\0';
 }
 
-/* Answer never ends in /. */
-char *node_dir_outside_transaction(const char *node)
-{
-       if (streq(node, "/"))
-               return talloc_strdup(node, xs_daemon_store());
-       return talloc_asprintf(node, "%s%s", xs_daemon_store(), node);
-}
-
-static char *node_dir(struct transaction *trans, const char *node)
-{
-       if (!trans || !within_transaction(trans, node))
-               return node_dir_outside_transaction(node);
-       return node_dir_inside_transaction(trans, node);
-}
-
-static char *datafile(const char *dir)
-{
-       return talloc_asprintf(dir, "%s/.data", dir);
-}
-
-static char *node_datafile(struct transaction *trans, const char *node)
-{
-       return datafile(node_dir(trans, node));
-}
-
-static char *permfile(const char *dir)
-{
-       return talloc_asprintf(dir, "%s/.perms", dir);
-}
-
-static char *node_permfile(struct transaction *trans, const char *node)
-{
-       return permfile(node_dir(trans, node));
-}
-
-struct buffered_data *new_buffer(void *ctx)
+/* If it fails, returns NULL and sets errno. */
+static struct node *read_node(struct connection *conn, const char *name)
+{
+       TDB_DATA key, data;
+       u32 *p;
+       struct node *node;
+
+       key.dptr = (void *)name;
+       key.dsize = strlen(name);
+       data = tdb_fetch(tdb_context(conn), key);
+
+       if (data.dptr == NULL) {
+               if (tdb_error(tdb_context(conn)) == TDB_ERR_NOEXIST)
+                       errno = ENOENT;
+               else
+                       errno = EIO;
+               return NULL;
+       }
+
+       node = talloc(name, struct node);
+       node->name = talloc_strdup(node, name);
+       node->parent = NULL;
+       node->tdb = tdb_context(conn);
+       talloc_steal(node, data.dptr);
+
+       /* Datalen, childlen, number of permissions */
+       p = (u32 *)data.dptr;
+       node->num_perms = p[0];
+       node->datalen = p[1];
+       node->childlen = p[2];
+
+       /* Permissions are struct xs_permissions. */
+       node->perms = (void *)&p[3];
+       /* Data is binary blob (usually ascii, no nul). */
+       node->data = node->perms + node->num_perms;
+       /* Children is strings, nul separated. */
+       node->children = node->data + node->datalen;
+
+       return node;
+}
+
+static bool write_node(struct connection *conn, const struct node *node)
+{
+       TDB_DATA key, data;
+       void *p;
+
+       key.dptr = (void *)node->name;
+       key.dsize = strlen(node->name);
+
+       data.dsize = 3*sizeof(u32)
+               + node->num_perms*sizeof(node->perms[0])
+               + node->datalen + node->childlen;
+       data.dptr = talloc_size(node, data.dsize);
+       ((u32 *)data.dptr)[0] = node->num_perms;
+       ((u32 *)data.dptr)[1] = node->datalen;
+       ((u32 *)data.dptr)[2] = node->childlen;
+       p = data.dptr + 3 * sizeof(u32);
+
+       memcpy(p, node->perms, node->num_perms*sizeof(node->perms[0]));
+       p += node->num_perms*sizeof(node->perms[0]);
+       memcpy(p, node->data, node->datalen);
+       p += node->datalen;
+       memcpy(p, node->children, node->childlen);
+
+       /* TDB should set errno, but doesn't even set ecode AFAICT. */
+       if (tdb_store(tdb_context(conn), key, data, TDB_REPLACE) != 0) {
+               errno = ENOSPC;
+               return false;
+       }
+       return true;
+}
+
+static enum xs_perm_type perm_for_conn(struct connection *conn,
+                                      struct xs_permissions *perms,
+                                      unsigned int num)
+{
+       unsigned int i;
+       enum xs_perm_type mask = XS_PERM_READ|XS_PERM_WRITE|XS_PERM_OWNER;
+
+       if (!conn->can_write)
+               mask &= ~XS_PERM_WRITE;
+
+       /* Owners and tools get it all... */
+       if (!conn->id || perms[0].id == conn->id)
+               return (XS_PERM_READ|XS_PERM_WRITE|XS_PERM_OWNER) & mask;
+
+       for (i = 1; i < num; i++)
+               if (perms[i].id == conn->id)
+                       return perms[i].perms & mask;
+
+       return perms[0].perms & mask;
+}
+
+static char *get_parent(const char *node)
+{
+       char *slash = strrchr(node + 1, '/');
+       if (!slash)
+               return talloc_strdup(node, "/");
+       return talloc_asprintf(node, "%.*s", (int)(slash - node), node);
+}
+
+/* What do parents say? */
+static enum xs_perm_type ask_parents(struct connection *conn, const char *name)
+{
+       struct node *node;
+
+       do {
+               name = get_parent(name);
+               node = read_node(conn, name);
+               if (node)
+                       break;
+       } while (!streq(name, "/"));
+
+       /* No permission at root?  We're in trouble. */
+       if (!node)
+               corrupt(conn, "No permissions file at root");
+
+       return perm_for_conn(conn, node->perms, node->num_perms);
+}
+
+/* We have a weird permissions system.  You can allow someone into a
+ * specific node without allowing it in the parents.  If it's going to
+ * fail, however, we don't want the errno to indicate any information
+ * about the node. */
+static int errno_from_parents(struct connection *conn, const char *node,
+                             int errnum, enum xs_perm_type perm)
+{
+       /* We always tell them about memory failures. */
+       if (errnum == ENOMEM)
+               return errnum;
+
+       if (ask_parents(conn, node) & perm)
+               return errnum;
+       return EACCES;
+}
+
+/* If it fails, returns NULL and sets errno. */
+struct node *get_node(struct connection *conn,
+                     const char *name,
+                     enum xs_perm_type perm)
+{
+       struct node *node;
+
+       if (!name || !is_valid_nodename(name)) {
+               errno = EINVAL;
+               return NULL;
+       }
+       node = read_node(conn, name);
+       /* If we don't have permission, we don't have node. */
+       if (node) {
+               if ((perm_for_conn(conn, node->perms, node->num_perms) & perm)
+                   != perm)
+                       node = NULL;
+       }
+       /* Clean up errno if they weren't supposed to know. */
+       if (!node) 
+               errno = errno_from_parents(conn, name, errno, perm);
+       return node;
+}
+
+static struct buffered_data *new_buffer(void *ctx)
 {
        struct buffered_data *data;
 
@@ -457,7 +551,8 @@
 }
 
 /* Return length of string (including nul) at this offset. */
-unsigned int get_string(const struct buffered_data *data, unsigned int offset)
+static unsigned int get_string(const struct buffered_data *data,
+                              unsigned int offset)
 {
        const char *nul;
 
@@ -508,7 +603,6 @@
                conn->waiting_reply = bdata;
        } else
                conn->out = bdata;
-       assert(conn->state != BLOCKED);
        conn->state = BUSY;
 }
 
@@ -567,29 +661,6 @@
        return in->buffer;
 }
 
-/* If it fails, returns NULL and sets errno. */
-static struct xs_permissions *get_perms(const char *dir, unsigned int *num)
-{
-       unsigned int size;
-       char *strings;
-       struct xs_permissions *ret;
-       int *fd;
-
-       fd = talloc_open(permfile(dir), O_RDONLY, 0);
-       if (!fd)
-               return NULL;
-       strings = read_all(fd, &size);
-       if (!strings)
-               return NULL;
-
-       *num = xs_count_strings(strings, size);
-       ret = talloc_array(dir, struct xs_permissions, *num);
-       if (!xs_strings_to_perms(ret, *num, strings))
-               corrupt(NULL, "Permissions corrupt for %s", dir);
-
-       return ret;
-}
-
 static char *perms_to_strings(const void *ctx,
                              struct xs_permissions *perms, unsigned int num,
                              unsigned int *len)
@@ -608,173 +679,6 @@
                *len += strlen(buffer) + 1;
        }
        return strings;
-}
-
-/* Destroy this, and its children, and its children's children. */
-int destroy_path(void *path)
-{
-       DIR *dir;
-       struct dirent *dirent;
-
-       dir = opendir(path);
-       if (!dir) {
-               if (unlink(path) == 0 || errno == ENOENT)
-                       return 0;
-               corrupt(NULL, "Destroying path %s", path);
-       }
-
-       while ((dirent = readdir(dir)) != NULL) {
-               char fullpath[strlen(path) + 1 + strlen(dirent->d_name) + 1];
-               sprintf(fullpath, "%s/%s", (char *)path, dirent->d_name);
-               if (!streq(dirent->d_name,".") && !streq(dirent->d_name,".."))
-                       destroy_path(fullpath);
-       }
-       closedir(dir);
-       if (rmdir(path) != 0)
-               corrupt(NULL, "Destroying directory %s", path);
-       return 0;
-}
-
-/* Create a self-destructing temporary path */
-static char *temppath(const char *path)
-{
-       char *tmppath = talloc_asprintf(path, "%s.tmp", path);
-       talloc_set_destructor(tmppath, destroy_path);
-       return tmppath;
-}
-
-/* Create a self-destructing temporary file */
-static char *tempfile(const char *path, void *contents, unsigned int len)
-{
-       int *fd;
-       char *tmppath = temppath(path);
-
-       fd = talloc_open(tmppath, O_WRONLY|O_CREAT|O_EXCL, 0640);
-       if (!fd)
-               return NULL;
-       if (!xs_write_all(*fd, contents, len))
-               return NULL;
-
-       return tmppath;
-}
-
-static int destroy_opendir(void *_dir)
-{
-       DIR **dir = _dir;
-       closedir(*dir);
-       return 0;
-}
-
-/* Return a pointer to a DIR*, self-closing and attached to this pathname. */
-DIR **talloc_opendir(const char *pathname)
-{
-       DIR **dir;
-
-       dir = talloc(pathname, DIR *);
-       *dir = opendir(pathname);
-       if (!*dir) {
-               int saved_errno = errno;
-               talloc_free(dir);
-               errno = saved_errno;
-               return NULL;
-       }
-       talloc_set_destructor(dir, destroy_opendir);
-       return dir;
-}
-
-/* We assume rename() doesn't fail on moves in same dir. */
-static void commit_tempfile(const char *path)
-{
-       char realname[strlen(path) + 1];
-       unsigned int len = strrchr(path, '.') - path;
-
-       memcpy(realname, path, len);
-       realname[len] = '\0';
-       if (rename(path, realname) != 0)
-               corrupt(NULL, "Committing %s", realname);
-       talloc_set_destructor(path, NULL);
-}
-
-static bool set_perms(struct transaction *transaction,
-                     const char *node,
-                     struct xs_permissions *perms, unsigned int num)
-{
-       unsigned int len;
-       char *permpath, *strings;
-
-       strings = perms_to_strings(node, perms, num, &len);
-       if (!strings)
-               return false;
-
-       /* Create then move. */
-       permpath = tempfile(node_permfile(transaction, node), strings, len);
-       if (!permpath)
-               return false;
-
-       commit_tempfile(permpath);
-       return true;
-}
-
-static char *get_parent(const char *node)
-{
-       char *slash = strrchr(node + 1, '/');
-       if (!slash)
-               return talloc_strdup(node, "/");
-       return talloc_asprintf(node, "%.*s", (int)(slash - node), node);
-}
-
-static enum xs_perm_type perm_for_id(domid_t id,
-                                    struct xs_permissions *perms,
-                                    unsigned int num)
-{
-       unsigned int i;
-
-       /* Owners and tools get it all... */
-       if (!id || perms[0].id == id)
-               return XS_PERM_READ|XS_PERM_WRITE|XS_PERM_OWNER;
-
-       for (i = 1; i < num; i++)
-               if (perms[i].id == id)
-                       return perms[i].perms;
-
-       return perms[0].perms;
-}
-
-/* What do parents say? */
-static enum xs_perm_type ask_parents(struct connection *conn,
-                                    const char *node)
-{
-       struct xs_permissions *perms;
-       unsigned int num;
-
-       do {
-               node = get_parent(node);
-               perms = get_perms(node_dir(conn->transaction, node), &num);
-               if (perms)
-                       break;
-       } while (!streq(node, "/"));
-
-       /* No permission at root?  We're in trouble. */
-       if (!perms)
-               corrupt(conn, "No permissions file at root");
-
-       return perm_for_id(conn->id, perms, num);
-}
-
-/* We have a weird permissions system.  You can allow someone into a
- * specific node without allowing it in the parents.  If it's going to
- * fail, however, we don't want the errno to indicate any information
- * about the node. */
-static int errno_from_parents(struct connection *conn, const char *node,
-                             int errnum)
-{
-       /* We always tell them about memory failures. */
-       if (errnum == ENOMEM)
-               return errnum;
-
-       if (ask_parents(conn, node) & XS_PERM_READ)
-               return errnum;
-       return EACCES;
 }
 
 char *canonicalize(struct connection *conn, const char *node)
@@ -789,46 +693,6 @@
        return (char *)node;
 }
 
-bool check_node_perms(struct connection *conn, const char *node,
-                     enum xs_perm_type perm)
-{
-       struct xs_permissions *perms;
-       unsigned int num;
-
-       if (!node || !is_valid_nodename(node)) {
-               errno = EINVAL;
-               return false;
-       }
-
-       if (!conn->can_write && (perm & XS_PERM_WRITE)) {
-               errno = EROFS;
-               return false;
-       }
-
-       perms = get_perms(node_dir(conn->transaction, node), &num);
-
-       if (perms) {
-               if (perm_for_id(conn->id, perms, num) & perm)
-                       return true;
-               errno = EACCES;
-               return false;
-       }
-
-       /* If it's OK not to exist, we consult parents. */
-       if (errno == ENOENT && (perm & XS_PERM_ENOENT_OK)) {
-               if (ask_parents(conn, node) & perm)
-                       return true;
-               /* Parents say they should not know. */
-               errno = EACCES;
-               return false;
-       }
-
-       /* They might not have permission to even *see* this node, in
-        * which case we return EACCES even if it's ENOENT or EIO. */
-       errno = errno_from_parents(conn, node, errno);
-       return false;
-}
-
 bool check_event_node(const char *node)
 {
        if (!node || !strstarts(node, "@")) {
@@ -838,142 +702,144 @@
        return true;
 }
 
-static void send_directory(struct connection *conn, const char *node)
-{
-       char *path, *reply;
-       unsigned int reply_len = 0;
-       DIR **dir;
-       struct dirent *dirent;
-
-       node = canonicalize(conn, node);
-       if (!check_node_perms(conn, node, XS_PERM_READ)) {
+static void send_directory(struct connection *conn, const char *name)
+{
+       struct node *node;
+
+       name = canonicalize(conn, name);
+       node = get_node(conn, name, XS_PERM_READ);
+       if (!node) {
                send_error(conn, errno);
                return;
        }
 
-       path = node_dir(conn->transaction, node);
-       dir = talloc_opendir(path);
-       if (!dir) {
+       send_reply(conn, XS_DIRECTORY, node->children, node->childlen);
+}
+
+static void do_read(struct connection *conn, const char *name)
+{
+       struct node *node;
+
+       name = canonicalize(conn, name);
+       node = get_node(conn, name, XS_PERM_READ);
+       if (!node) {
                send_error(conn, errno);
                return;
        }
 
-       reply = talloc_strdup(node, "");
-       while ((dirent = readdir(*dir)) != NULL) {
-               int len = strlen(dirent->d_name) + 1;
-
-               if (!valid_chars(dirent->d_name))
-                       continue;
-
-               reply = talloc_realloc(path, reply, char, reply_len + len);
-               strcpy(reply + reply_len, dirent->d_name);
-               reply_len += len;
-       }
-
-       send_reply(conn, XS_DIRECTORY, reply, reply_len);
-}
-
-static void do_read(struct connection *conn, const char *node)
-{
-       char *value;
-       unsigned int size;
-       int *fd;
-
-       node = canonicalize(conn, node);
-       if (!check_node_perms(conn, node, XS_PERM_READ)) {
-               send_error(conn, errno);
-               return;
-       }
-
-       fd = talloc_open(node_datafile(conn->transaction, node), O_RDONLY, 0);
-       if (!fd) {
-               /* Data file doesn't exist?  We call that a directory */
-               if (errno == ENOENT)
-                       errno = EISDIR;
-               send_error(conn, errno);
-               return;
-       }
-
-       value = read_all(fd, &size);
-       if (!value)
-               send_error(conn, errno);
-       else
-               send_reply(conn, XS_READ, value, size);
-}
-
-/* Commit this directory, eg. comitting a/b.tmp/c causes a/b.tmp -> a.b */
-static bool commit_dir(char *dir)
-{
-       char *dot, *slash, *dest;
-
-       dot = strrchr(dir, '.');
-       slash = strchr(dot, '/');
-       if (slash)
-               *slash = '\0';
-
-       dest = talloc_asprintf(dir, "%.*s", (int)(dot - dir), dir);
-       return rename(dir, dest) == 0;
-}
-
-/* Create a temporary directory.  Put data in it (if data != NULL) */
-static char *tempdir(struct connection *conn,
-                    const char *node, void *data, unsigned int datalen)
-{
-       struct xs_permissions *perms;
-       char *permstr;
-       unsigned int num, len;
-       int *fd;
-       char *dir;
-
-       dir = temppath(node_dir(conn->transaction, node));
-       if (mkdir(dir, 0750) != 0) {
-               if (errno != ENOENT)
+       send_reply(conn, XS_READ, node->data, node->datalen);
+}
+
+static void delete_node_single(struct connection *conn, struct node *node)
+{
+       TDB_DATA key;
+
+       key.dptr = (void *)node->name;
+       key.dsize = strlen(node->name);
+
+       if (tdb_delete(tdb_context(conn), key) != 0)
+               corrupt(conn, "Could not delete '%s'", node->name);
+}
+
+/* Must not be / */
+static char *basename(const char *name)
+{
+       return strrchr(name, '/') + 1;
+}
+
+static struct node *construct_node(struct connection *conn, const char *name)
+{
+       const char *base;
+       unsigned int baselen;
+       struct node *parent, *node;
+       char *children, *parentname = get_parent(name);
+
+       /* If parent doesn't exist, create it. */
+       parent = read_node(conn, parentname);
+       if (!parent)
+               parent = construct_node(conn, parentname);
+       if (!parent)
+               return NULL;
+       
+       /* Add child to parent. */
+       base = basename(name);
+       baselen = strlen(base) + 1;
+       children = talloc_array(name, char, parent->childlen + baselen);
+       memcpy(children, parent->children, parent->childlen);
+       memcpy(children + parent->childlen, base, baselen);
+       parent->children = children;
+       parent->childlen += baselen;
+
+       /* Allocate node */
+       node = talloc(name, struct node);
+       node->tdb = tdb_context(conn);
+       node->name = talloc_strdup(node, name);
+
+       /* Inherit permissions, except domains own what they create */
+       node->num_perms = parent->num_perms;
+       node->perms = talloc_memdup(node, parent->perms,
+                                   node->num_perms * sizeof(node->perms[0]));
+       if (conn->id)
+               node->perms[0].id = conn->id;
+
+       /* No children, no data */
+       node->children = node->data = NULL;
+       node->childlen = node->datalen = 0;
+       node->parent = parent;
+       return node;
+}
+
+static int destroy_node(void *_node)
+{
+       struct node *node = _node;
+       TDB_DATA key;
+
+       if (streq(node->name, "/"))
+               corrupt(NULL, "Destroying root node!");
+
+       key.dptr = (void *)node->name;
+       key.dsize = strlen(node->name);
+
+       tdb_delete(node->tdb, key);
+       return 0;
+}
+
+/* Be careful: create heirarchy, put entry in existing parent *last*.
+ * This helps fsck if we die during this. */
+static struct node *create_node(struct connection *conn, 
+                               const char *name,
+                               void *data, unsigned int datalen)
+{
+       struct node *node, *i;
+
+       node = construct_node(conn, name);
+       if (!node)
+               return NULL;
+
+       node->data = data;
+       node->datalen = datalen;
+
+       /* We write out the nodes down, setting destructor in case
+        * something goes wrong. */
+       for (i = node; i; i = i->parent) {
+               if (!write_node(conn, i))
                        return NULL;
-
-               dir = tempdir(conn, get_parent(node), NULL, 0);
-               if (!dir)
-                       return NULL;
-
-               dir = talloc_asprintf(dir, "%s%s", dir, strrchr(node, '/'));
-               if (mkdir(dir, 0750) != 0)
-                       return NULL;
-               talloc_set_destructor(dir, destroy_path);
-       }
-
-       perms = get_perms(get_parent(dir), &num);
-       assert(perms);
-       /* Domains own what they create. */
-       if (conn->id)
-               perms->id = conn->id;
-
-       permstr = perms_to_strings(dir, perms, num, &len);
-       fd = talloc_open(permfile(dir), O_WRONLY|O_CREAT|O_EXCL, 0640);
-       if (!fd || !xs_write_all(*fd, permstr, len))
-               return NULL;
-
-       if (data) {
-               char *datapath = datafile(dir);
-
-               fd = talloc_open(datapath, O_WRONLY|O_CREAT|O_EXCL, 0640);
-               if (!fd || !xs_write_all(*fd, data, datalen))
-                       return NULL;
-       }
-       return dir;
-}
-
-static bool node_exists(struct connection *conn, const char *node)
-{
-       struct stat st;
-
-       return lstat(node_dir(conn->transaction, node), &st) == 0;
+               talloc_set_destructor(i, destroy_node);
+       }
+
+       /* OK, now remove destructors so they stay around */
+       for (i = node; i; i = i->parent)
+               talloc_set_destructor(i, NULL);
+       return node;
 }
 
 /* path, data... */
 static void do_write(struct connection *conn, struct buffered_data *in)
 {
        unsigned int offset, datalen;
+       struct node *node;
        char *vec[1] = { NULL }; /* gcc4 + -W + -Werror fucks code. */
-       char *node, *tmppath;
+       char *name;
 
        /* Extra "strings" can be created by binary data. */
        if (get_strings(in, vec, ARRAY_SIZE(vec)) < ARRAY_SIZE(vec)) {
@@ -981,99 +847,115 @@
                return;
        }
 
-       node = canonicalize(conn, vec[0]);
-       if (!within_transaction(conn->transaction, node)) {
-               send_error(conn, EROFS);
-               return;
-       }
-
-       if (transaction_block(conn, node))
-               return;
-
        offset = strlen(vec[0]) + 1;
        datalen = in->used - offset;
 
-       if (!check_node_perms(conn, node, XS_PERM_WRITE|XS_PERM_ENOENT_OK)) {
-               send_error(conn, errno);
-               return;
-       }
-
-       if (!node_exists(conn, node)) {
-               char *dir;
-
-               /* Does not exist... */
+       name = canonicalize(conn, vec[0]);
+       node = get_node(conn, name, XS_PERM_WRITE);
+       if (!node) {
+               /* No permissions, invalid input? */
                if (errno != ENOENT) {
                        send_error(conn, errno);
                        return;
                }
-
-               dir = tempdir(conn, node, in->buffer + offset, datalen);
-               if (!dir || !commit_dir(dir)) {
+               node = create_node(conn, name, in->buffer + offset, datalen);
+               if (!node) {
                        send_error(conn, errno);
                        return;
                }
-               
        } else {
-               /* Exists... */
-               tmppath = tempfile(node_datafile(conn->transaction, node),
-                                  in->buffer + offset, datalen);
-               if (!tmppath) {
+               node->data = in->buffer + offset;
+               node->datalen = datalen;
+               if (!write_node(conn, node)){
                        send_error(conn, errno);
                        return;
                }
-
-               commit_tempfile(tmppath);
-       }
-
-       add_change_node(conn->transaction, node, false);
-       fire_watches(conn, node, false);
+       }
+
+       add_change_node(conn->transaction, name, false);
+       fire_watches(conn, name, false);
        send_ack(conn, XS_WRITE);
 }
 
-static void do_mkdir(struct connection *conn, const char *node)
-{
-       char *dir;
-
-       node = canonicalize(conn, node);
-       if (!check_node_perms(conn, node, XS_PERM_WRITE|XS_PERM_ENOENT_OK)) {
-               send_error(conn, errno);
-               return;
-       }
-
-       if (!within_transaction(conn->transaction, node)) {
-               send_error(conn, EROFS);
-               return;
-       }
-
-       if (transaction_block(conn, node))
-               return;
+static void do_mkdir(struct connection *conn, const char *name)
+{
+       struct node *node;
+
+       name = canonicalize(conn, name);
+       node = get_node(conn, name, XS_PERM_WRITE);
 
        /* If it already exists, fine. */
-       if (node_exists(conn, node)) {
-               send_ack(conn, XS_MKDIR);
-               return;
-       }
-
-       dir = tempdir(conn, node, NULL, 0);
-       if (!dir || !commit_dir(dir)) {
-               send_error(conn, errno);
-               return;
-       }
-
-       add_change_node(conn->transaction, node, false);
-       fire_watches(conn, node, false);
+       if (!node) {
+               /* No permissions? */
+               if (errno != ENOENT) {
+                       send_error(conn, errno);
+                       return;
+               }
+               node = create_node(conn, name, NULL, 0);
+               if (!node) {
+                       send_error(conn, errno);
+                       return;
+               }
+               add_change_node(conn->transaction, name, false);
+               fire_watches(conn, name, false);
+       }
        send_ack(conn, XS_MKDIR);
 }
 
-static void do_rm(struct connection *conn, const char *node)
-{
-       char *tmppath, *path;
-
-       node = canonicalize(conn, node);
-       if (!check_node_perms(conn, node, XS_PERM_WRITE)) {
+static void delete_node(struct connection *conn, struct node *node)
+{
+       unsigned int i;
+
+       /* Delete self, then delete children.  If something goes wrong,
+        * consistency check will clean up this way. */
+       delete_node_single(conn, node);
+
+       /* Delete children, too. */
+       for (i = 0; i < node->childlen; i += strlen(node->children+i) + 1) {
+               struct node *child;
+
+               child = read_node(conn, 
+                                 talloc_asprintf(node, "%s/%s", node->name,
+                                                 node->children + i));
+               if (!child)
+                       corrupt(conn, "No child '%s' found", child);
+               delete_node(conn, child);
+       }
+}
+
+/* Delete memory using memmove. */
+static void memdel(void *mem, unsigned off, unsigned len, unsigned total)
+{
+       memmove(mem + off, mem + off + len, total - off - len);
+}
+
+static bool delete_child(struct connection *conn,
+                        struct node *node, const char *childname)
+{
+       unsigned int i;
+
+       for (i = 0; i < node->childlen; i += strlen(node->children+i) + 1) {
+               if (streq(node->children+i, childname)) {
+                       memdel(node->children, i, strlen(childname) + 1,
+                              node->childlen);
+                       node->childlen -= strlen(childname) + 1;
+                       return write_node(conn, node);
+               }
+       }
+       corrupt(conn, "Can't find child '%s' in %s", childname, node->name);
+}
+
+static void do_rm(struct connection *conn, const char *name)
+{
+       struct node *node, *parent;
+
+       name = canonicalize(conn, name);
+       node = get_node(conn, name, XS_PERM_WRITE);
+       if (!node) {
                /* Didn't exist already?  Fine, if parent exists. */
                if (errno == ENOENT) {
-                       if (node_exists(conn, get_parent(node))) {
+                       node = read_node(conn, get_parent(name));
+                       if (node) {
                                send_ack(conn, XS_RM);
                                return;
                        }
@@ -1084,53 +966,43 @@
                return;
        }
 
-       if (!within_transaction(conn->transaction, node)) {
-               send_error(conn, EROFS);
-               return;
-       }
-
-       if (transaction_block(conn, node))
-               return;
-
-       if (streq(node, "/")) {
+       if (streq(name, "/")) {
                send_error(conn, EINVAL);
                return;
        }
 
-       /* We move the directory to temporary name, destructor cleans up. */
-       path = node_dir(conn->transaction, node);
-       tmppath = talloc_asprintf(node, "%s.tmp", path);
-       talloc_set_destructor(tmppath, destroy_path);
-
-       if (rename(path, tmppath) != 0) {
+       /* Delete from parent first, then if something explodes fsck cleans. */
+       parent = read_node(conn, get_parent(name));
+       if (!parent) {
+               send_error(conn, EINVAL);
+               return;
+       }
+
+       if (!delete_child(conn, parent, basename(name))) {
+               send_error(conn, EINVAL);
+               return;
+       }
+
+       delete_node(conn, node);
+       add_change_node(conn->transaction, name, true);
+       fire_watches(conn, name, true);
+       send_ack(conn, XS_RM);
+}
+
+static void do_get_perms(struct connection *conn, const char *name)
+{
+       struct node *node;
+       char *strings;
+       unsigned int len;
+
+       name = canonicalize(conn, name);
+       node = get_node(conn, name, XS_PERM_READ);
+       if (!node) {
                send_error(conn, errno);
                return;
        }
 
-       add_change_node(conn->transaction, node, true);
-       fire_watches(conn, node, true);
-       send_ack(conn, XS_RM);
-}
-
-static void do_get_perms(struct connection *conn, const char *node)
-{
-       struct xs_permissions *perms;
-       char *strings;
-       unsigned int len, num;
-
-       node = canonicalize(conn, node);
-       if (!check_node_perms(conn, node, XS_PERM_READ)) {
-               send_error(conn, errno);
-               return;
-       }
-
-       perms = get_perms(node_dir(conn->transaction, node), &num);
-       if (!perms) {
-               send_error(conn, errno);
-               return;
-       }
-
-       strings = perms_to_strings(node, perms, num, &len);
+       strings = perms_to_strings(node, node->perms, node->num_perms, &len);
        if (!strings)
                send_error(conn, errno);
        else
@@ -1140,8 +1012,8 @@
 static void do_set_perms(struct connection *conn, struct buffered_data *in)
 {
        unsigned int num;
-       char *node, *permstr;
-       struct xs_permissions *perms;
+       char *name, *permstr;
+       struct node *node;
 
        num = xs_count_strings(in->buffer, in->used);
        if (num < 2) {
@@ -1150,37 +1022,30 @@
        }
 
        /* First arg is node name. */
-       node = canonicalize(conn, in->buffer);
+       name = canonicalize(conn, in->buffer);
        permstr = in->buffer + strlen(in->buffer) + 1;
        num--;
 
-       if (!within_transaction(conn->transaction, node)) {
-               send_error(conn, EROFS);
-               return;
-       }
-
-       if (transaction_block(conn, node))
-               return;
-
        /* We must own node to do this (tools can do this too). */
-       if (!check_node_perms(conn, node, XS_PERM_WRITE|XS_PERM_OWNER)) {
+       node = get_node(conn, name, XS_PERM_WRITE|XS_PERM_OWNER);
+       if (!node) {
                send_error(conn, errno);
                return;
        }
 
-       perms = talloc_array(node, struct xs_permissions, num);
-       if (!xs_strings_to_perms(perms, num, permstr)) {
+       node->perms = talloc_array(node, struct xs_permissions, num);
+       node->num_perms = num;
+       if (!xs_strings_to_perms(node->perms, num, permstr)) {
                send_error(conn, errno);
                return;
        }
-
-       if (!set_perms(conn->transaction, node, perms, num)) {
+       if (!write_node(conn, node)) {
                send_error(conn, errno);
                return;
        }
 
-       add_change_node(conn->transaction, node, false);
-       fire_watches(conn, node, false);
+       add_change_node(conn->transaction, name, false);
+       fire_watches(conn, name, false);
        send_ack(conn, XS_SET_PERMS);
 }
 
@@ -1221,12 +1086,8 @@
        case XS_SHUTDOWN:
                /* FIXME: Implement gentle shutdown too. */
                /* Only tools can do this. */
-               if (conn->id != 0) {
+               if (conn->id != 0 || !conn->can_write) {
                        send_error(conn, EACCES);
-                       break;
-               }
-               if (!conn->can_write) {
-                       send_error(conn, EROFS);
                        break;
                }
                send_ack(conn, XS_SHUTDOWN);
@@ -1263,7 +1124,7 @@
                break;
 
        case XS_TRANSACTION_START:
-               do_transaction_start(conn, onearg(in));
+               do_transaction_start(conn, in);
                break;
 
        case XS_TRANSACTION_END:
@@ -1309,6 +1170,8 @@
        /* For simplicity, we kill the connection on OOM. */
        talloc_set_fail_handler(out_of_mem, &talloc_fail);
        if (setjmp(talloc_fail)) {
+               /* Free in before conn, in case it needs something. */
+               talloc_free(in);
                talloc_free(conn);
                goto end;
        }
@@ -1330,16 +1193,8 @@
        conn->in = new_buffer(conn);
        process_message(conn, in);
 
-       if (conn->state == BLOCKED) {
-               /* Blocked by transaction: queue for re-xmit. */
-               talloc_free(conn->in);
-               conn->in = in;
-               in = NULL;
-               trace_blocked(conn, conn->in);
-       }
-
+       talloc_free(in);
 end:
-       talloc_free(in);
        talloc_set_fail_handler(NULL, NULL);
        if (talloc_total_blocks(NULL)
            != talloc_total_blocks(talloc_autofree_context()) + 1) {
@@ -1350,7 +1205,7 @@
 
 /* Errors in reading or allocating here mean we get out of sync, so we
  * drop the whole client connection. */
-void handle_input(struct connection *conn)
+static void handle_input(struct connection *conn)
 {
        int bytes;
        struct buffered_data *in;
@@ -1402,39 +1257,10 @@
        talloc_free(conn);
 }
 
-void handle_output(struct connection *conn)
+static void handle_output(struct connection *conn)
 {
        if (!write_message(conn))
                talloc_free(conn);
-}
-
-/* If a transaction has ended, see if we can unblock any connections. */
-static void unblock_connections(void)
-{
-       struct connection *i, *tmp;
-
-       list_for_each_entry_safe(i, tmp, &connections, list) {
-               switch (i->state) {
-               case BLOCKED:
-                       if (!transaction_covering_node(i->blocked_by)) {
-                               talloc_free(i->blocked_by);
-                               i->blocked_by = NULL;
-                               i->state = OK;
-                               consider_message(i);
-                       }
-                       break;
-               case BUSY:
-               case OK:
-                       break;
-               }
-       }
-
-       /* To balance bias, move first entry to end. */
-       if (!list_empty(&connections)) {
-               i = list_top(&connections, struct connection, list);
-               list_del(&i->list);
-               list_add_tail(&i->list, &connections);
-       }
 }
 
 struct connection *new_connection(connwritefn_t *write, connreadfn_t *read)
@@ -1451,7 +1277,6 @@
                return NULL;
 
        new->state = OK;
-       new->blocked_by = NULL;
        new->out = new->waiting_reply = NULL;
        new->waiting_for_ack = NULL;
        new->fd = -1;
@@ -1504,25 +1329,9 @@
                close(fd);
 }
 
-/* Calc timespan from now to absolute time. */
-static void time_relative_to_now(struct timeval *tv)
-{
-       struct timeval now;
-
-       gettimeofday(&now, NULL);
-       if (timercmp(&now, tv, >))
-               timerclear(tv);
-       else {
-               tv->tv_sec -= now.tv_sec;
-               if (now.tv_usec > tv->tv_usec) {
-                       tv->tv_sec--;
-                       tv->tv_usec += 1000000;
-               }
-               tv->tv_usec -= now.tv_usec;
-       }
-}
-
 #ifdef TESTING
+/* Valgrind can check our writes better if we don't use mmap */
+#define TDB_FLAGS TDB_NOMMAP
 /* Useful for running under debugger. */
 void dump_connection(void)
 {
@@ -1532,13 +1341,10 @@
                printf("Connection %p:\n", i);
                printf("    state = %s\n",
                       i->state == OK ? "OK"
-                      : i->state == BLOCKED ? "BLOCKED"
                       : i->state == BUSY ? "BUSY"
                       : "INVALID");
                if (i->id)
                        printf("    id = %i\n", i->id);
-               if (i->blocked_by)
-                       printf("    blocked on = %s\n", i->blocked_by);
                if (!i->in->inhdr || i->in->used)
                        printf("    got %i bytes of %s\n",
                               i->in->used, i->in->inhdr ? "header" : "data");
@@ -1559,44 +1365,53 @@
                dump_watches(i);
        }
 }
+#else
+#define TDB_FLAGS 0
 #endif
 
+/* We create initial nodes manually. */
+static void manual_node(const char *name, const char *child)
+{
+       struct node *node;
+       struct xs_permissions perms = { .id = 0, .perms = XS_PERM_READ };
+
+       node = talloc(NULL, struct node);
+       node->name = name;
+       node->perms = &perms;
+       node->num_perms = 1;
+       node->data = NULL;
+       node->datalen = 0;
+       node->children = (char *)child;
+       if (child)
+               node->childlen = strlen(child) + 1;
+       else
+               node->childlen = 0;
+
+       if (!write_node(NULL, node))
+               barf_perror("Could not create initial node %s", name);
+       talloc_free(node);
+}
+
+#
+
 static void setup_structure(void)
 {
-       struct xs_permissions perms = { .id = 0, .perms = XS_PERM_READ };
-       char *root, *dir, *permfile;
-
-       /* Create root directory, with permissions. */
-       if (mkdir(xs_daemon_store(), 0750) != 0) {
-               if (errno != EEXIST)
-                       barf_perror("Could not create root %s",
-                                   xs_daemon_store());
-               return;
-       }
-       root = talloc_strdup(talloc_autofree_context(), "/");
-       if (!set_perms(NULL, root, &perms, 1))
-               barf_perror("Could not create permissions in root");
-
-       /* Create tool directory, with xenstored subdir. */
-       dir = talloc_asprintf(root, "%s/%s", xs_daemon_store(), "tool");
-       if (mkdir(dir, 0750) != 0)
-               barf_perror("Making dir %s", dir);
-       
-       permfile = talloc_strdup(root, "/tool");
-       if (!set_perms(NULL, permfile, &perms, 1))
-               barf_perror("Could not create permissions on %s", permfile);
-
-       dir = talloc_asprintf(root, "%s/%s", dir, "xenstored");
-       if (mkdir(dir, 0750) != 0)
-               barf_perror("Making dir %s", dir);
-       
-       permfile = talloc_strdup(root, "/tool/xenstored");
-       if (!set_perms(NULL, permfile, &perms, 1))
-               barf_perror("Could not create permissions on %s", permfile);
-       talloc_free(root);
-       if (mkdir(xs_daemon_transactions(), 0750) != 0)
-               barf_perror("Could not create transaction dir %s",
-                           xs_daemon_transactions());
+       char *tdbname;
+       tdbname = talloc_strdup(talloc_autofree_context(), xs_daemon_tdb());
+       tdb_ctx = tdb_open(tdbname, 0, TDB_FLAGS, O_RDWR, 0);
+
+       if (!tdb_ctx) {
+               tdb_ctx = tdb_open(tdbname, 7919, TDB_FLAGS, O_RDWR|O_CREAT,
+                                  0640);
+               if (!tdb_ctx)
+                       barf_perror("Could not create tdb file %s", tdbname);
+
+               manual_node("/", "tool");
+               manual_node("/tool", "xenstored");
+               manual_node("/tool/xenstored", NULL);
+       }
+
+       /* FIXME: Fsck */
 }
 
 static void write_pidfile(const char *pidfile)
@@ -1759,17 +1574,8 @@
        /* FIXME: Rewrite so noone can starve. */
        for (;;) {
                struct connection *i;
-               struct timeval *tvp = NULL, tv;
-
-               timerclear(&tv);
-               shortest_transaction_timeout(&tv);
-               shortest_watch_ack_timeout(&tv);
-               if (timerisset(&tv)) {
-                       time_relative_to_now(&tv);
-                       tvp = &tv;
-               }
-
-               if (select(max+1, &inset, &outset, NULL, tvp) < 0) {
+
+               if (select(max+1, &inset, &outset, NULL, NULL) < 0) {
                        if (errno == EINTR)
                                continue;
                        barf_perror("Select failed");
@@ -1818,14 +1624,6 @@
                        }
                }
 
-               if (tvp) {
-                       check_transaction_timeout();
-                       check_watch_ack_timeout();
-               }
-
-               /* If transactions ended, we might be able to do more work. */
-               unblock_connections();
-
                max = initialize_set(&inset, &outset, *sock, *ro_sock,
                                     event_fd);
        }
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xenstored_core.h
--- a/tools/xenstore/xenstored_core.h   Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xenstored_core.h   Fri Sep 23 13:25:01 2005
@@ -28,6 +28,7 @@
 #include "xs_lib.h"
 #include "xenstored.h"
 #include "list.h"
+#include "tdb.h"
 
 struct buffered_data
 {
@@ -49,8 +50,6 @@
 
 enum state
 {
-       /* Blocked by transaction. */
-       BLOCKED,
        /* Doing action, not listening */
        BUSY,
        /* Completed */
@@ -69,9 +68,6 @@
 
        /* Blocked on transaction?  Busy? */
        enum state state;
-
-       /* Node we are waiting for (if state == BLOCKED) */
-       char *blocked_by;
 
        /* Is this a read-only connection? */
        bool can_write;
@@ -103,9 +99,27 @@
 };
 extern struct list_head connections;
 
-/* Return length of string (including nul) at this offset. */
-unsigned int get_string(const struct buffered_data *data,
-                       unsigned int offset);
+struct node {
+       const char *name;
+
+       /* Database I came from */
+       TDB_CONTEXT *tdb;
+
+       /* Parent (optional) */
+       struct node *parent;
+
+       /* Permissions. */
+       unsigned int num_perms;
+       struct xs_permissions *perms;
+
+       /* Contents. */
+       unsigned int datalen;
+       void *data;
+
+       /* Children, each nul-terminated. */
+       unsigned int childlen;
+       char *children;
+};
 
 /* Break input into vectors, return the number, fill in up to num of them. */
 unsigned int get_strings(struct buffered_data *data,
@@ -113,9 +127,6 @@
 
 /* Is child node a child or equal to parent node? */
 bool is_child(const char *child, const char *parent);
-
-/* Create a new buffer with lifetime of context. */
-struct buffered_data *new_buffer(void *ctx);
 
 void send_reply(struct connection *conn, enum xsd_sockmsg_type type,
                const void *data, unsigned int len);
@@ -129,15 +140,22 @@
 /* Canonicalize this path if possible. */
 char *canonicalize(struct connection *conn, const char *node);
 
-/* Check permissions on this node. */
-bool check_node_perms(struct connection *conn, const char *node,
-                     enum xs_perm_type perm);
-
 /* Check if node is an event node. */
 bool check_event_node(const char *node);
 
-/* Path to this node outside transaction. */
-char *node_dir_outside_transaction(const char *node);
+/* Get this node, checking we have permissions. */
+struct node *get_node(struct connection *conn,
+                     const char *name,
+                     enum xs_perm_type perm);
+
+/* Get TDB context for this connection */
+TDB_CONTEXT *tdb_context(struct connection *conn);
+
+/* Destructor for tdbs: required for transaction code */
+int destroy_tdb(void *_tdb);
+
+/* Replace the tdb: required for transaction code */
+bool replace_tdb(const char *newname, TDB_CONTEXT *newtdb);
 
 /* Fail due to excessive corruption, capitalist pigdogs! */
 void __attribute__((noreturn)) corrupt(struct connection *conn,
@@ -145,23 +163,9 @@
 
 struct connection *new_connection(connwritefn_t *write, connreadfn_t *read);
 
-void handle_input(struct connection *conn);
-void handle_output(struct connection *conn);
-
 /* Is this a valid node name? */
 bool is_valid_nodename(const char *node);
 
-/* Return a pointer to an open dir, self-closig and attached to pathname. */
-DIR **talloc_opendir(const char *pathname);
-
-/* Return a pointer to an fd, self-closing and attached to this pathname. */
-int *talloc_open(const char *pathname, int flags, int mode);
-
-/* Convenient talloc-style destructor for paths. */
-int destroy_path(void *path);
-
-/* Read entire contents of a talloced fd. */
-void *read_all(int *fd, unsigned int *size);
 
 /* Tracing infrastructure. */
 void trace_create(const void *data, const char *type);
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xenstored_domain.c
--- a/tools/xenstore/xenstored_domain.c Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xenstored_domain.c Fri Sep 23 13:25:01 2005
@@ -309,13 +309,8 @@
                return;
        }
 
-       if (conn->id != 0) {
+       if (conn->id != 0 || !conn->can_write) {
                send_error(conn, EACCES);
-               return;
-       }
-
-       if (!conn->can_write) {
-               send_error(conn, EROFS);
                return;
        }
 
@@ -386,7 +381,7 @@
 
        talloc_free(domain->conn);
 
-       fire_watches(NULL, "@releaseDomain", false);
+       fire_watches(conn, "@releaseDomain", false);
 
        send_ack(conn, XS_RELEASE);
 }
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xenstored_transaction.c
--- a/tools/xenstore/xenstored_transaction.c    Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xenstored_transaction.c    Fri Sep 23 13:25:01 2005
@@ -26,6 +26,7 @@
 #include <stdarg.h>
 #include <stdlib.h>
 #include <fcntl.h>
+#include <unistd.h>
 #include "talloc.h"
 #include "list.h"
 #include "xenstored_transaction.h"
@@ -51,74 +52,26 @@
        /* Global list of transactions. */
        struct list_head list;
 
+       /* Generation when transaction started. */
+       unsigned int generation;
+
        /* My owner (conn->transaction == me). */
        struct connection *conn;
 
-       /* Subtree this transaction covers */
-       char *node;
-
-       /* Base for this transaction. */
-       char *divert;
+       /* TDB to work on, and filename */
+       TDB_CONTEXT *tdb;
+       char *tdb_name;
 
        /* List of changed nodes. */
        struct list_head changes;
-
-       /* Someone's waiting: time limit. */
-       struct timeval timeout;
-
-       /* We've timed out. */
-       bool destined_to_fail;
 };
 static LIST_HEAD(transactions);
+static unsigned int generation;
 
-bool within_transaction(struct transaction *trans, const char *node)
+/* Return tdb context to use for this connection. */
+TDB_CONTEXT *tdb_transaction_context(struct transaction *trans)
 {
-       if (!trans)
-               return true;
-       return is_child(node, trans->node);
-}
-
-/* You are on notice: this transaction is blocking someone. */
-static void start_transaction_timeout(struct transaction *trans)
-{
-       if (timerisset(&trans->timeout))
-               return;
-
-       /* One second timeout. */
-       gettimeofday(&trans->timeout, NULL);
-       trans->timeout.tv_sec += 1;
-}
-
-struct transaction *transaction_covering_node(const char *node)
-{
-       struct transaction *i;
-
-       list_for_each_entry(i, &transactions, list) {
-               if (i->destined_to_fail)
-                       continue;
-               if (is_child(i->node, node) || is_child(node, i->node))
-                       return i;
-       }
-       return NULL;
-}
-
-bool transaction_block(struct connection *conn, const char *node)
-{
-       struct transaction *trans;
-
-       /* Transactions don't overlap, so we can't be blocked by
-        * others if we're in one. */
-       if (conn->transaction)
-               return false;
-
-       trans = transaction_covering_node(node);
-       if (trans) {
-               start_transaction_timeout(trans);
-               conn->state = BLOCKED;
-               conn->blocked_by = talloc_strdup(conn, node);
-               return true;
-       }
-       return false;
+       return trans->tdb;
 }
 
 /* Callers get a change node (which can fail) and only commit after they've
@@ -127,8 +80,11 @@
 {
        struct changed_node *i;
 
-       if (!trans)
+       if (!trans) {
+               /* They're changing the global database. */
+               generation++;
                return;
+       }
 
        list_for_each_entry(i, &trans->changes, list)
                if (streq(i->node, node))
@@ -140,167 +96,47 @@
        list_add_tail(&i->list, &trans->changes);
 }
 
-char *node_dir_inside_transaction(struct transaction *trans, const char *node)
-{
-       return talloc_asprintf(node, "%s/%s", trans->divert,
-                              node + strlen(trans->node));
-}
-
-void shortest_transaction_timeout(struct timeval *tv)
-{
-       struct transaction *i;
-
-       list_for_each_entry(i, &transactions, list) {
-               if (!timerisset(&i->timeout))
-                       continue;
-
-               if (!timerisset(tv) || timercmp(&i->timeout, tv, <))
-                       *tv = i->timeout;
-       }
-}      
-
-void check_transaction_timeout(void)
-{
-       struct transaction *i;
-       struct timeval now;
-
-       gettimeofday(&now, NULL);
-
-       list_for_each_entry(i, &transactions, list) {
-               if (!timerisset(&i->timeout))
-                       continue;
-
-               if (timercmp(&i->timeout, &now, <))
-                       i->destined_to_fail = true;
-       }
-}
-
 static int destroy_transaction(void *_transaction)
 {
        struct transaction *trans = _transaction;
 
        list_del(&trans->list);
        trace_destroy(trans, "transaction");
-       return destroy_path(trans->divert);
+       if (trans->tdb)
+               tdb_close(trans->tdb);
+       unlink(trans->tdb_name);
+       return 0;
 }
 
-static bool copy_file(const char *src, const char *dst)
+void do_transaction_start(struct connection *conn, struct buffered_data *in)
 {
-       int *infd, *outfd;
-       void *data;
-       unsigned int size;
-
-       infd = talloc_open(src, O_RDONLY, 0);
-       if (!infd)
-               return false;
-       outfd = talloc_open(dst, O_WRONLY|O_CREAT|O_EXCL, 0640);
-       if (!outfd)
-               return false;
-       data = read_all(infd, &size);
-       if (!data)
-               return false;
-       return xs_write_all(*outfd, data, size);
-}
-
-static bool copy_dir(const char *src, const char *dst)
-{
-       DIR **dir;
-       struct dirent *dirent;
-
-       if (mkdir(dst, 0750) != 0)
-               return false;
-
-       dir = talloc_opendir(src);
-       if (!dir)
-               return false;
-
-       while ((dirent = readdir(*dir)) != NULL) {
-               struct stat st;
-               char *newsrc, *newdst;
-
-               if (streq(dirent->d_name, ".") || streq(dirent->d_name, ".."))
-                       continue;
-
-               newsrc = talloc_asprintf(src, "%s/%s", src, dirent->d_name);
-               newdst = talloc_asprintf(src, "%s/%s", dst, dirent->d_name);
-               if (stat(newsrc, &st) != 0)
-                       return false;
-               
-               if (S_ISDIR(st.st_mode)) {
-                       if (!copy_dir(newsrc, newdst))
-                               return false;
-               } else {
-                       if (!copy_file(newsrc, newdst))
-                               return false;
-               }
-               /* Free now so we don't run out of file descriptors */
-               talloc_free(newsrc);
-               talloc_free(newdst);
-       }
-       return true;
-}
-
-void do_transaction_start(struct connection *conn, const char *node)
-{
-       struct transaction *transaction;
-       char *dir;
+       struct transaction *trans;
 
        if (conn->transaction) {
                send_error(conn, EBUSY);
                return;
        }
 
-       node = canonicalize(conn, node);
-       if (!check_node_perms(conn, node, XS_PERM_READ)) {
+       /* Attach transaction to input for autofree until it's complete */
+       trans = talloc(in, struct transaction);
+       INIT_LIST_HEAD(&trans->changes);
+       trans->conn = conn;
+       trans->generation = generation;
+       trans->tdb_name = talloc_asprintf(trans, "%s.%p",
+                                         xs_daemon_tdb(), trans);
+       trans->tdb = tdb_copy(tdb_context(conn), trans->tdb_name);
+       if (!trans->tdb) {
                send_error(conn, errno);
                return;
        }
+       /* Make it close if we go away. */
+       talloc_steal(trans, trans->tdb);
 
-       if (transaction_block(conn, node))
-               return;
-
-       dir = node_dir_outside_transaction(node);
-
-       /* Attach transaction to node for autofree until it's complete */
-       transaction = talloc(node, struct transaction);
-       transaction->node = talloc_strdup(transaction, node);
-       transaction->divert = talloc_asprintf(transaction, "%s/%p", 
-                                             xs_daemon_transactions(),
-                                             transaction);
-       INIT_LIST_HEAD(&transaction->changes);
-       transaction->conn = conn;
-       timerclear(&transaction->timeout);
-       transaction->destined_to_fail = false;
-       list_add_tail(&transaction->list, &transactions);
-       talloc_set_destructor(transaction, destroy_transaction);
-       trace_create(transaction, "transaction");
-
-       if (!copy_dir(dir, transaction->divert)) {
-               send_error(conn, errno);
-               return;
-       }
-
-       talloc_steal(conn, transaction);
-       conn->transaction = transaction;
-       send_ack(transaction->conn, XS_TRANSACTION_START);
-}
-
-static bool commit_transaction(struct transaction *trans)
-{
-       char *tmp, *dir;
-
-       /* Move: orig -> .old, repl -> orig.  Cleanup deletes .old. */
-       dir = node_dir_outside_transaction(trans->node);
-       tmp = talloc_asprintf(trans, "%s.old", dir);
-
-       if (rename(dir, tmp) != 0)
-               return false;
-       if (rename(trans->divert, dir) != 0)
-               corrupt(trans->conn, "Failed rename %s to %s",
-                       trans->divert, dir);
-
-       trans->divert = tmp;
-       return true;
+       /* Now we own it. */
+       conn->transaction = talloc_steal(conn, trans);
+       list_add_tail(&trans->list, &transactions);
+       talloc_set_destructor(trans, destroy_transaction);
+       send_ack(conn, XS_TRANSACTION_START);
 }
 
 void do_transaction_end(struct connection *conn, const char *arg)
@@ -318,25 +154,29 @@
                return;
        }
 
-       /* Set to NULL so fire_watches sends events. */
+       /* Set to NULL so fire_watches sends events, tdb_context works. */
        trans = conn->transaction;
        conn->transaction = NULL;
        /* Attach transaction to arg for auto-cleanup */
        talloc_steal(arg, trans);
 
        if (streq(arg, "T")) {
-               if (trans->destined_to_fail) {
-                       send_error(conn, ETIMEDOUT);
+               /* FIXME: Merge, rather failing on any change. */
+               if (trans->generation != generation) {
+                       send_error(conn, EAGAIN);
                        return;
                }
-               if (!commit_transaction(trans)) {
+               if (!replace_tdb(trans->tdb_name, trans->tdb)) {
                        send_error(conn, errno);
                        return;
                }
+               /* Don't close this: we won! */
+               trans->tdb = NULL;
 
                /* Fire off the watches for everything that changed. */
                list_for_each_entry(i, &trans->changes, list)
                        fire_watches(conn, i->node, i->recurse);
+               generation++;
        }
        send_ack(conn, XS_TRANSACTION_END);
 }
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xenstored_transaction.h
--- a/tools/xenstore/xenstored_transaction.h    Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xenstored_transaction.h    Fri Sep 23 13:25:01 2005
@@ -22,29 +22,14 @@
 
 struct transaction;
 
-void do_transaction_start(struct connection *conn, const char *node);
+void do_transaction_start(struct connection *conn, struct buffered_data *node);
 void do_transaction_end(struct connection *conn, const char *arg);
 
-/* Is node covered by this transaction? */
-bool within_transaction(struct transaction *trans, const char *node);
-
-/* If a write op on this node blocked by another connections' transaction,
- * mark conn, setup transaction timeout and return true.
- */
-bool transaction_block(struct connection *conn, const char *node);
-
-/* Return transaction which covers this node. */
-struct transaction *transaction_covering_node(const char *node);
-
-/* Return directory of node within transaction t. */
-char *node_dir_inside_transaction(struct transaction *t, const char *node);
+bool transaction_block(struct connection *conn);
 
 /* This node was changed: can fail and longjmp. */
 void add_change_node(struct transaction *trans, const char *node, bool 
recurse);
 
-/* Get shortest timeout: leave tv unset if none. */
-void shortest_transaction_timeout(struct timeval *tv);
-
-/* Have any transactions timed out yet? */
-void check_transaction_timeout(void);
+/* Return tdb context to use for this connection. */
+TDB_CONTEXT *tdb_transaction_context(struct transaction *trans);
 #endif /* _XENSTORED_TRANSACTION_H */
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xenstored_watch.c
--- a/tools/xenstore/xenstored_watch.c  Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xenstored_watch.c  Fri Sep 23 13:25:01 2005
@@ -96,36 +96,38 @@
 }
 
 static void add_event(struct connection *conn,
-                     struct watch *watch, const char *node)
-{
-       struct watch_event *event;
-
-       /* Check read permission: no permission, no watch event.
-        * If it doesn't exist, we need permission to read parent.
-        */
-       if (!check_node_perms(conn, node, XS_PERM_READ|XS_PERM_ENOENT_OK) &&
-           !check_event_node(node)) {
-               return;
+                     struct watch *watch,
+                     const char *name)
+{
+       struct watch_event *event;
+
+       if (!check_event_node(name)) {
+               /* Can this conn load node, or see that it doesn't exist? */
+               struct node *node;
+
+               node = get_node(conn, name, XS_PERM_READ);
+               if (!node && errno != ENOENT)
+                       return;
        }
 
        if (watch->relative_path) {
-               node += strlen(watch->relative_path);
-               if (*node == '/') /* Could be "" */
-                       node++;
+               name += strlen(watch->relative_path);
+               if (*name == '/') /* Could be "" */
+                       name++;
        }
 
        event = talloc(watch, struct watch_event);
-       event->len = strlen(node) + 1 + strlen(watch->token) + 1;
+       event->len = strlen(name) + 1 + strlen(watch->token) + 1;
        event->data = talloc_array(event, char, event->len);
-       strcpy(event->data, node);
-       strcpy(event->data + strlen(node) + 1, watch->token);
+       strcpy(event->data, name);
+       strcpy(event->data + strlen(name) + 1, watch->token);
        talloc_set_destructor(event, destroy_watch_event);
        list_add_tail(&event->list, &watch->events);
        trace_create(event, "watch_event");
 }
 
 /* FIXME: we fail to fire on out of memory.  Should drop connections. */
-void fire_watches(struct connection *conn, const char *node, bool recurse)
+void fire_watches(struct connection *conn, const char *name, bool recurse)
 {
        struct connection *i;
        struct watch *watch;
@@ -137,9 +139,9 @@
        /* Create an event for each watch. */
        list_for_each_entry(i, &connections, list) {
                list_for_each_entry(watch, &i->watches, list) {
-                       if (is_child(node, watch->node))
-                               add_event(i, watch, node);
-                       else if (recurse && is_child(watch->node, node))
+                       if (is_child(name, watch->node))
+                               add_event(i, watch, name);
+                       else if (recurse && is_child(watch->node, name))
                                add_event(i, watch, watch->node);
                        else
                                continue;
@@ -154,49 +156,6 @@
 {
        trace_destroy(_watch, "watch");
        return 0;
-}
-
-void shortest_watch_ack_timeout(struct timeval *tv)
-{
-       (void)tv;
-#if 0 /* FIXME */
-       struct watch *watch;
-
-       list_for_each_entry(watch, &watches, list) {
-               struct watch_event *i;
-               list_for_each_entry(i, &watch->events, list) {
-                       if (!timerisset(&i->timeout))
-                               continue;
-                       if (!timerisset(tv) || timercmp(&i->timeout, tv, <))
-                               *tv = i->timeout;
-               }
-       }
-#endif
-}      
-
-void check_watch_ack_timeout(void)
-{
-#if 0
-       struct watch *watch;
-       struct timeval now;
-
-       gettimeofday(&now, NULL);
-       list_for_each_entry(watch, &watches, list) {
-               struct watch_event *i, *tmp;
-               list_for_each_entry_safe(i, tmp, &watch->events, list) {
-                       if (!timerisset(&i->timeout))
-                               continue;
-                       if (timercmp(&i->timeout, &now, <)) {
-                               xprintf("Warning: timeout on watch event %s"
-                                       " token %s\n",
-                                       i->node, watch->token);
-                               trace_watch_timeout(watch->conn, i->node,
-                                                   watch->token);
-                               timerclear(&i->timeout);
-                       }
-               }
-       }
-#endif
 }
 
 void do_watch(struct connection *conn, struct buffered_data *in)
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xenstored_watch.h
--- a/tools/xenstore/xenstored_watch.h  Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xenstored_watch.h  Fri Sep 23 13:25:01 2005
@@ -32,15 +32,9 @@
 /* Look through our watches: if any of them have an event, queue it. */
 void queue_next_event(struct connection *conn);
 
-/* Fire all watches: recurse means all the children are effected (ie. rm).
+/* Fire all watches: recurse means all the children are affected (ie. rm).
  */
-void fire_watches(struct connection *conn, const char *node, bool recurse);
-
-/* Find shortest timeout: if any, reduce tv (may already be set). */
-void shortest_watch_ack_timeout(struct timeval *tv);
-
-/* Check for watches which may have timed out. */
-void check_watch_ack_timeout(void);
+void fire_watches(struct connection *conn, const char *name, bool recurse);
 
 void dump_watches(struct connection *conn);
 
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xs.c
--- a/tools/xenstore/xs.c       Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xs.c       Fri Sep 23 13:25:01 2005
@@ -497,13 +497,12 @@
 
 /* Start a transaction: changes by others will not be seen during this
  * transaction, and changes will not be visible to others until end.
- * Transaction only applies to the given subtree.
  * You can only have one transaction at any time.
  * Returns false on failure.
  */
-bool xs_transaction_start(struct xs_handle *h, const char *subtree)
-{
-       return xs_bool(xs_single(h, XS_TRANSACTION_START, subtree, NULL));
+bool xs_transaction_start(struct xs_handle *h)
+{
+       return xs_bool(xs_single(h, XS_TRANSACTION_START, "", NULL));
 }
 
 /* End a transaction.
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xs.h
--- a/tools/xenstore/xs.h       Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xs.h       Fri Sep 23 13:25:01 2005
@@ -109,11 +109,10 @@
 
 /* Start a transaction: changes by others will not be seen during this
  * transaction, and changes will not be visible to others until end.
- * Transaction only applies to the given subtree.
  * You can only have one transaction at any time.
  * Returns false on failure.
  */
-bool xs_transaction_start(struct xs_handle *h, const char *subtree);
+bool xs_transaction_start(struct xs_handle *h);
 
 /* End a transaction.
  * If abandon is true, transaction is discarded instead of committed.
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xs_lib.c
--- a/tools/xenstore/xs_lib.c   Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xs_lib.c   Fri Sep 23 13:25:01 2005
@@ -50,6 +50,13 @@
        return buf;
 }
 
+const char *xs_daemon_tdb(void)
+{
+       static char buf[PATH_MAX];
+       sprintf(buf, "%s/tdb", xs_daemon_rootdir());
+       return buf;
+}
+
 const char *xs_daemon_socket(void)
 {
        return xs_daemon_path();
@@ -62,24 +69,6 @@
        if (s == NULL)
                return NULL;
        if (snprintf(buf, PATH_MAX, "%s_ro", s) >= PATH_MAX)
-               return NULL;
-       return buf;
-}
-
-const char *xs_daemon_store(void)
-{
-       static char buf[PATH_MAX];
-       if (snprintf(buf, PATH_MAX, "%s/store",
-                    xs_daemon_rootdir()) >= PATH_MAX)
-               return NULL;
-       return buf;
-}
-
-const char *xs_daemon_transactions(void)
-{
-       static char buf[PATH_MAX];
-       if (snprintf(buf, PATH_MAX, "%s/transactions",
-                    xs_daemon_rootdir()) >= PATH_MAX)
                return NULL;
        return buf;
 }
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xs_lib.h
--- a/tools/xenstore/xs_lib.h   Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xs_lib.h   Fri Sep 23 13:25:01 2005
@@ -36,7 +36,7 @@
 
 struct xs_permissions
 {
-       domid_t id;
+       unsigned int id;
        enum xs_perm_type perms;
 };
 
@@ -46,9 +46,8 @@
 /* Path for various daemon things: env vars can override. */
 const char *xs_daemon_socket(void);
 const char *xs_daemon_socket_ro(void);
-const char *xs_daemon_store(void);
-const char *xs_daemon_transactions(void);
 const char *xs_domain_dev(void);
+const char *xs_daemon_tdb(void);
 
 /* Simple write function: loops for you. */
 bool xs_write_all(int fd, const void *data, unsigned int len);
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xs_random.c
--- a/tools/xenstore/xs_random.c        Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xs_random.c        Fri Sep 23 13:25:01 2005
@@ -41,7 +41,7 @@
                          struct xs_permissions *perms,
                          unsigned int num);
 
-       bool (*transaction_start)(void *h, const char *subtree);
+       bool (*transaction_start)(void *h);
        bool (*transaction_end)(void *h, bool abort);
 
        /* Create and destroy a new handle. */
@@ -53,7 +53,6 @@
 {
        const char *base;
        char *transact_base;
-       char *transact;
 };
 
 static void convert_to_dir(const char *dirname)
@@ -95,31 +94,6 @@
        maybe_convert_to_directory(filename);
        return filename;
 }
-
-/* Is child a subnode of parent, or equal? */
-static bool is_child(const char *child, const char *parent)
-{
-       unsigned int len = strlen(parent);
-
-       /* / should really be "" for this algorithm to work, but that's a
-        * usability nightmare. */
-       if (streq(parent, "/"))
-               return true;
-
-       if (strncmp(child, parent, len) != 0)
-               return false;
-
-       return child[len] == '/' || child[len] == '\0';
-}
-
-static bool write_ok(struct file_ops_info *info, const char *path)
-{
-       if (info->transact && !is_child(path, info->transact)) {
-               errno = EROFS;
-               return false;
-       }
-       return true;
-}      
 
 static char **file_directory(struct file_ops_info *info,
                             const char *path, unsigned int *num)
@@ -184,8 +158,10 @@
 
        ret = grab_file(filename, &size);
        /* Directory exists, .DATA doesn't. */
-       if (!ret && errno == ENOENT && strends(filename, ".DATA"))
-               errno = EISDIR;
+       if (!ret && errno == ENOENT && strends(filename, ".DATA")) {
+               ret = strdup("");
+               size = 0;
+       }
        *len = size;
        return ret;
 }
@@ -270,9 +246,6 @@
                return false;
        }
 
-       if (!write_ok(info, path))
-               return false;
-
        /* Check non-perm file exists/ */
        if (lstat(filename, &st) != 0)
                return false;
@@ -338,9 +311,6 @@
        char *filename = filename_to_data(path_to_name(info, path));
        int fd;
 
-       if (!write_ok(info, path))
-               return false;
-
        make_dirs(parent_filename(filename));
        fd = open(filename, O_CREAT|O_TRUNC|O_WRONLY, 0600);
        if (fd < 0)
@@ -358,9 +328,6 @@
 {
        char *dirname = path_to_name(info, path);
 
-       if (!write_ok(info, path))
-               return false;
-
        make_dirs(parent_filename(dirname));
        if (mkdir(dirname, 0700) != 0)
                return (errno == EEXIST);
@@ -373,11 +340,6 @@
 {
        char *filename = path_to_name(info, path);
        struct stat st;
-
-       if (info->transact && streq(info->transact, path)) {
-               errno = EINVAL;
-               return false;
-       }
 
        if (lstat(filename, &st) != 0) {
                if (lstat(parent_filename(filename), &st) != 0)
@@ -385,9 +347,6 @@
                return true;
        }
 
-       if (!write_ok(info, path))
-               return false;
-
        if (streq(path, "/")) {
                errno = EINVAL;
                return false;
@@ -398,28 +357,20 @@
        return true;
 }
 
-static bool file_transaction_start(struct file_ops_info *info,
-                                  const char *subtree)
+static bool file_transaction_start(struct file_ops_info *info)
 {
        char *cmd;
-       char *filename = path_to_name(info, subtree);
-       struct stat st;
-
-       if (info->transact) {
+
+       if (info->transact_base) {
                errno = EBUSY;
                return false;
        }
 
-       if (lstat(filename, &st) != 0)
-               return false;
-
-       cmd = talloc_asprintf(NULL, "cp -r %s %s.transact",
-                             info->base, info->base);
+       info->transact_base = talloc_asprintf(NULL, "%s.transact", info->base);
+       cmd = talloc_asprintf(NULL, "cp -r %s %s",
+                             info->base, info->transact_base);
        do_command(cmd);
        talloc_free(cmd);
-
-       info->transact_base = talloc_asprintf(NULL, "%s.transact", info->base);
-       info->transact = talloc_strdup(NULL, subtree);
        return true;
 }
 
@@ -427,7 +378,7 @@
 {
        char *old, *cmd;
 
-       if (!info->transact) {
+       if (!info->transact_base) {
                errno = ENOENT;
                return false;
        }
@@ -448,9 +399,7 @@
 
 success:
        talloc_free(cmd);
-       talloc_free(info->transact);
        talloc_free(info->transact_base);
-       info->transact = NULL;
        info->transact_base = NULL;
        return true;
 }
@@ -461,7 +410,6 @@
 
        info->base = dir;
        info->transact_base = NULL;
-       info->transact = NULL;
        return info;
 }
 
@@ -898,11 +846,10 @@
        case 7: {
                if (verbose)
                        printf("START %s\n", name);
-               ret = bool_to_errstring(ops->transaction_start(h, name));
+               ret = bool_to_errstring(ops->transaction_start(h));
                if (streq(ret, "OK")) {
                        talloc_free(ret);
-                       ret = talloc_asprintf(NULL, "OK:START-TRANSACT:%s",
-                                             name);
+                       ret = talloc_asprintf(NULL, "OK:START-TRANSACT");
                }
 
                break;
@@ -978,6 +925,8 @@
                barf_perror("Creating directory %s/tool", dir);
        if (!file_set_perms(h, talloc_strdup(h, "/"), &perm, 1))
                barf_perror("Setting root perms in %s", dir);
+       if (!file_set_perms(h, talloc_strdup(h, "/tool"), &perm, 1))
+               barf_perror("Setting root perms in %s/tool", dir);
        file_close(h);
 }
 
@@ -1071,7 +1020,7 @@
                        goto out;
 
                if (!data->fast) {
-                       if (strstarts(ret, "OK:START-TRANSACT:")) {
+                       if (streq(ret, "OK:START-TRANSACT")) {
                                void *pre = data->ops->handle(data->dir);
 
                                snapshot = dump(data->ops, pre);
@@ -1303,7 +1252,7 @@
                             void *_data)
 {
        void *fileh, *xsh;
-       char *transact = NULL;
+       bool transact = false;
        struct ops *fail;
        struct diff_data *data = _data;
        unsigned int i, print;
@@ -1348,13 +1297,9 @@
                        goto out;
 
                if (strstarts(file, "OK:START-TRANSACT:"))
-                       transact = talloc_strdup(NULL,
-                                                file +
-                                                strlen("OK:START-TRANSACT:"));
-               else if (streq(file, "OK:STOP-TRANSACT")) {
-                       talloc_free(transact);
-                       transact = NULL;
-               }
+                       transact = true;
+               else if (streq(file, "OK:STOP-TRANSACT"))
+                       transact = false;
 
                talloc_free(file);
                talloc_free(xs);
@@ -1379,7 +1324,7 @@
 
                        fail = NULL;
                        if (!ops_equal(&xs_ops, xsh_pre, &file_ops, fileh_pre,
-                                      transact, &fail)) {
+                                      "/", &fail)) {
                                if (fail)
                                        barf("%s failed during transact\n",
                                             fail->name);
@@ -1455,9 +1400,6 @@
 
        fileh = file_handle(data->dir);
        xsh = xs_handle(data->dir);
-
-       sprintf(seed, "%i", data->seed);
-       free(xs_debug_command(xsh, "failtest", seed, strlen(seed)+1));
 
        print = number / 76;
        if (!print)
@@ -1491,8 +1433,12 @@
                if (trymap && !trymap[i])
                        continue;
 
-               if (verbose)
-                       printf("(%i) ", i);
+               /* Turn on failure. */
+               sprintf(seed, "%i", data->seed + i);
+               free(xs_debug_command(xsh, "failtest",seed,strlen(seed)+1));
+
+               if (verbose)
+                       printf("(%i) seed %s ", i, seed);
                ret = do_next_op(&xs_ops, xsh, i + data->seed, verbose);
                if (streq(ret, "FAILED:Connection reset by peer")
                    || streq(ret, "FAILED:Bad file descriptor")
@@ -1549,8 +1495,6 @@
                fail = NULL;
                if (!ops_equal(&xs_ops, tmpxsh, &file_ops, tmpfileh, "/",
                               &fail)) {
-                       xs_close(tmpxsh);
-                       file_close(tmpfileh);
                        if (fail) {
                                if (verbose)
                                        printf("%s failed\n", fail->name);
@@ -1561,10 +1505,16 @@
                                failed = 0;
                                if (verbose)
                                        printf("(Looks like it succeeded)\n");
+                               xs_close(tmpxsh);
+                               file_close(tmpfileh);
                                goto try_applying;
                        }
                        if (verbose)
-                               printf("Two backends not equal\n");
+                               printf("Trees differ:\nXS:%s\nFILE:%s\n",
+                                      dump(&xs_ops, tmpxsh),
+                                      dump(&file_ops, tmpfileh));
+                       xs_close(tmpxsh);
+                       file_close(tmpfileh);
                        goto out;
                }
 
@@ -1572,8 +1522,6 @@
                if (!xsh)
                        file_transaction_end(fileh, true);
 
-               /* Turn failures back on. */
-               free(xs_debug_command(tmpxsh, "failtest",  NULL, 0));
                xs_close(tmpxsh);
                file_close(tmpfileh);
        }
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xs_stress.c
--- a/tools/xenstore/xs_stress.c        Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xs_stress.c        Fri Sep 23 13:25:01 2005
@@ -8,6 +8,7 @@
 #include <sys/stat.h>
 #include <fcntl.h>
 #include <unistd.h>
+#include <errno.h>
 
 #define NUM_HANDLES 2
 #define DIR_FANOUT 3
@@ -36,24 +37,18 @@
 
        srandom(childnum);
        for (i = 0; i < cycles; i++) {
-               unsigned int lockdepth, j, len;
-               char file[100] = "", lockdir[100];
+               unsigned int j, len;
+               char file[100] = "";
                char *contents, tmp[100];
                struct xs_handle *h = handles[random() % NUM_HANDLES];
 
-               lockdepth = random() % DIR_DEPTH;
-               for (j = 0; j < DIR_DEPTH; j++) {
-                       if (j == lockdepth)
-                               strcpy(lockdir, file);
+               for (j = 0; j < DIR_DEPTH; j++)
                        sprintf(file + strlen(file), "/%li",
                                random()%DIR_FANOUT);
-               }
-               if (streq(lockdir, ""))
-                       strcpy(lockdir, "/");
-
-               if (!xs_transaction_start(h, lockdir))
-                       barf_perror("%i: starting transaction %i on %s",
-                                   childnum, i, lockdir);
+
+               if (!xs_transaction_start(h))
+                       barf_perror("%i: starting transaction %i",
+                                   childnum, i);
 
                sprintf(file + strlen(file), "/count");
                contents = xs_read(h, file, &len);
@@ -68,18 +63,23 @@
                /* Abandon 1 in 10 */
                if (random() % 10 == 0) {
                        if (!xs_transaction_end(h, true))
-                               barf_perror("%i: can't abort transact %s",
-                                           childnum, lockdir);
+                               barf_perror("%i: can't abort transact",
+                                           childnum);
                        i--;
                } else {
-                       if (!xs_transaction_end(h, false))
-                               barf_perror("%i: can't commit transact %s",
-                                           childnum, lockdir);
-
-                       /* Offset when we print . so kids don't all
-                        * print at once. */
-                       if ((i + print/(childnum+1)) % print == 0)
-                               write(STDOUT_FILENO, &id, 1);
+                       if (!xs_transaction_end(h, false)) {
+                               if (errno == EAGAIN) {
+                                       write(STDOUT_FILENO, "!", 1);
+                                       i--;
+                               } else
+                                       barf_perror("%i: can't commit trans",
+                                                   childnum);
+                       } else {
+                               /* Offset when we print . so kids don't all
+                                * print at once. */
+                               if ((i + print/(childnum+1)) % print == 0)
+                                       write(STDOUT_FILENO, &id, 1);
+                       }
                }
        }
 }
@@ -201,7 +201,7 @@
        printf("\nCounting results...\n");
        i = tally_counts();
        if (i != (unsigned)atoi(argv[1]))
-               barf("Total counts %i not %s", i, atoi(argv[1]));
+               barf("Total counts %i not %s", i, argv[1]);
        printf("Success!\n");
        exit(0);
 }
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xs_test.c
--- a/tools/xenstore/xs_test.c  Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xs_test.c  Fri Sep 23 13:25:01 2005
@@ -562,9 +562,9 @@
                failed(handle);
 }
 
-static void do_start(unsigned int handle, const char *node)
-{
-       if (!xs_transaction_start(handles[handle], node))
+static void do_start(unsigned int handle)
+{
+       if (!xs_transaction_start(handles[handle]))
                failed(handle);
 }
 
@@ -791,7 +791,7 @@
                xs_daemon_close(handles[handle]);
                handles[handle] = NULL;
        } else if (streq(command, "start"))
-               do_start(handle, arg(line, 1));
+               do_start(handle);
        else if (streq(command, "commit"))
                do_end(handle, false);
        else if (streq(command, "abort"))
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/tdb.c
--- /dev/null   Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/tdb.c      Fri Sep 23 13:25:01 2005
@@ -0,0 +1,2151 @@
+ /* 
+   Unix SMB/CIFS implementation.
+
+   trivial database library
+
+   Copyright (C) Andrew Tridgell              1999-2004
+   Copyright (C) Paul `Rusty' Russell             2000
+   Copyright (C) Jeremy Allison                           2000-2003
+   
+     ** NOTE! The following LGPL license applies to the tdb
+     ** library. This does NOT imply that all of Samba is released
+     ** under the LGPL
+   
+   This library is free software; you can redistribute it and/or
+   modify it under the terms of the GNU Lesser General Public
+   License as published by the Free Software Foundation; either
+   version 2 of the License, or (at your option) any later version.
+
+   This library is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+   Lesser General Public License for more details.
+
+   You should have received a copy of the GNU Lesser General Public
+   License along with this library; if not, write to the Free Software
+   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
+*/
+
+
+#ifndef _SAMBA_BUILD_
+#if HAVE_CONFIG_H
+#include <config.h>
+#endif
+
+#include <stdlib.h>
+#include <stdio.h>
+#include <stdint.h>
+#include <fcntl.h>
+#include <unistd.h>
+#include <string.h>
+#include <fcntl.h>
+#include <errno.h>
+#include <sys/mman.h>
+#include <sys/stat.h>
+#include "tdb.h"
+#include <stdarg.h>
+#include "talloc.h"
+#define HAVE_MMAP
+#else
+#include "includes.h"
+#include "lib/tdb/include/tdb.h"
+#include "system/time.h"
+#include "system/shmem.h"
+#include "system/filesys.h"
+#endif
+
+#define TDB_MAGIC_FOOD "TDB file\n"
+#define TDB_VERSION (0x26011967 + 6)
+#define TDB_MAGIC (0x26011999U)
+#define TDB_FREE_MAGIC (~TDB_MAGIC)
+#define TDB_DEAD_MAGIC (0xFEE1DEAD)
+#define TDB_ALIGNMENT 4
+#define MIN_REC_SIZE (2*sizeof(struct list_struct) + TDB_ALIGNMENT)
+#define DEFAULT_HASH_SIZE 131
+#define TDB_PAGE_SIZE 0x2000
+#define FREELIST_TOP (sizeof(struct tdb_header))
+#define TDB_ALIGN(x,a) (((x) + (a)-1) & ~((a)-1))
+#define TDB_BYTEREV(x) 
(((((x)&0xff)<<24)|((x)&0xFF00)<<8)|(((x)>>8)&0xFF00)|((x)>>24))
+#define TDB_DEAD(r) ((r)->magic == TDB_DEAD_MAGIC)
+#define TDB_BAD_MAGIC(r) ((r)->magic != TDB_MAGIC && !TDB_DEAD(r))
+#define TDB_HASH_TOP(hash) (FREELIST_TOP + (BUCKET(hash)+1)*sizeof(tdb_off))
+#define TDB_DATA_START(hash_size) (TDB_HASH_TOP(hash_size-1))
+
+
+/* NB assumes there is a local variable called "tdb" that is the
+ * current context, also takes doubly-parenthesized print-style
+ * argument. */
+#define TDB_LOG(x) tdb->log_fn x
+
+/* lock offsets */
+#define GLOBAL_LOCK 0
+#define ACTIVE_LOCK 4
+
+#ifndef MAP_FILE
+#define MAP_FILE 0
+#endif
+
+#ifndef MAP_FAILED
+#define MAP_FAILED ((void *)-1)
+#endif
+
+#ifndef discard_const_p
+# if defined(__intptr_t_defined) || defined(HAVE_INTPTR_T)
+#  define discard_const(ptr) ((void *)((intptr_t)(ptr)))
+# else
+#  define discard_const(ptr) ((void *)(ptr))
+# endif
+# define discard_const_p(type, ptr) ((type *)discard_const(ptr))
+#endif
+
+/* free memory if the pointer is valid and zero the pointer */
+#ifndef SAFE_FREE
+#define SAFE_FREE(x) do { if ((x) != NULL) {talloc_free(discard_const_p(void 
*, (x))); (x)=NULL;} } while(0)
+#endif
+
+#define BUCKET(hash) ((hash) % tdb->header.hash_size)
+TDB_DATA tdb_null;
+
+/* all contexts, to ensure no double-opens (fcntl locks don't nest!) */
+static TDB_CONTEXT *tdbs = NULL;
+
+static int tdb_munmap(TDB_CONTEXT *tdb)
+{
+       if (tdb->flags & TDB_INTERNAL)
+               return 0;
+
+#ifdef HAVE_MMAP
+       if (tdb->map_ptr) {
+               int ret = munmap(tdb->map_ptr, tdb->map_size);
+               if (ret != 0)
+                       return ret;
+       }
+#endif
+       tdb->map_ptr = NULL;
+       return 0;
+}
+
+static void tdb_mmap(TDB_CONTEXT *tdb)
+{
+       if (tdb->flags & TDB_INTERNAL)
+               return;
+
+#ifdef HAVE_MMAP
+       if (!(tdb->flags & TDB_NOMMAP)) {
+               tdb->map_ptr = mmap(NULL, tdb->map_size, 
+                                   PROT_READ|(tdb->read_only? 0:PROT_WRITE), 
+                                   MAP_SHARED|MAP_FILE, tdb->fd, 0);
+
+               /*
+                * NB. When mmap fails it returns MAP_FAILED *NOT* NULL !!!!
+                */
+
+               if (tdb->map_ptr == MAP_FAILED) {
+                       tdb->map_ptr = NULL;
+                       TDB_LOG((tdb, 2, "tdb_mmap failed for size %d (%s)\n", 
+                                tdb->map_size, strerror(errno)));
+               }
+       } else {
+               tdb->map_ptr = NULL;
+       }
+#else
+       tdb->map_ptr = NULL;
+#endif
+}
+
+/* Endian conversion: we only ever deal with 4 byte quantities */
+static void *convert(void *buf, u32 size)
+{
+       u32 i, *p = buf;
+       for (i = 0; i < size / 4; i++)
+               p[i] = TDB_BYTEREV(p[i]);
+       return buf;
+}
+#define DOCONV() (tdb->flags & TDB_CONVERT)
+#define CONVERT(x) (DOCONV() ? convert(&x, sizeof(x)) : &x)
+
+/* the body of the database is made of one list_struct for the free space
+   plus a separate data list for each hash value */
+struct list_struct {
+       tdb_off next; /* offset of the next record in the list */
+       tdb_len rec_len; /* total byte length of record */
+       tdb_len key_len; /* byte length of key */
+       tdb_len data_len; /* byte length of data */
+       u32 full_hash; /* the full 32 bit hash of the key */
+       u32 magic;   /* try to catch errors */
+       /* the following union is implied:
+               union {
+                       char record[rec_len];
+                       struct {
+                               char key[key_len];
+                               char data[data_len];
+                       }
+                       u32 totalsize; (tailer)
+               }
+       */
+};
+
+/* a byte range locking function - return 0 on success
+   this functions locks/unlocks 1 byte at the specified offset.
+
+   On error, errno is also set so that errors are passed back properly
+   through tdb_open(). */
+static int tdb_brlock(TDB_CONTEXT *tdb, tdb_off offset, 
+                     int rw_type, int lck_type, int probe)
+{
+       struct flock fl;
+       int ret;
+
+       if (tdb->flags & TDB_NOLOCK)
+               return 0;
+       if ((rw_type == F_WRLCK) && (tdb->read_only)) {
+               errno = EACCES;
+               return -1;
+       }
+
+       fl.l_type = rw_type;
+       fl.l_whence = SEEK_SET;
+       fl.l_start = offset;
+       fl.l_len = 1;
+       fl.l_pid = 0;
+
+       do {
+               ret = fcntl(tdb->fd,lck_type,&fl);
+       } while (ret == -1 && errno == EINTR);
+
+       if (ret == -1) {
+               if (!probe && lck_type != F_SETLK) {
+                       /* Ensure error code is set for log fun to examine. */
+                       tdb->ecode = TDB_ERR_LOCK;
+                       TDB_LOG((tdb, 5,"tdb_brlock failed (fd=%d) at offset %d 
rw_type=%d lck_type=%d\n", 
+                                tdb->fd, offset, rw_type, lck_type));
+               }
+               /* Generic lock error. errno set by fcntl.
+                * EAGAIN is an expected return from non-blocking
+                * locks. */
+               if (errno != EAGAIN) {
+               TDB_LOG((tdb, 5, "tdb_brlock failed (fd=%d) at offset %d 
rw_type=%d lck_type=%d: %s\n", 
+                                tdb->fd, offset, rw_type, lck_type, 
+                                strerror(errno)));
+               }
+               return TDB_ERRCODE(TDB_ERR_LOCK, -1);
+       }
+       return 0;
+}
+
+/* lock a list in the database. list -1 is the alloc list */
+static int tdb_lock(TDB_CONTEXT *tdb, int list, int ltype)
+{
+       if (list < -1 || list >= (int)tdb->header.hash_size) {
+               TDB_LOG((tdb, 0,"tdb_lock: invalid list %d for ltype=%d\n", 
+                          list, ltype));
+               return -1;
+       }
+       if (tdb->flags & TDB_NOLOCK)
+               return 0;
+
+       /* Since fcntl locks don't nest, we do a lock for the first one,
+          and simply bump the count for future ones */
+       if (tdb->locked[list+1].count == 0) {
+               if (tdb_brlock(tdb,FREELIST_TOP+4*list,ltype,F_SETLKW, 0)) {
+                       TDB_LOG((tdb, 0,"tdb_lock failed on list %d ltype=%d 
(%s)\n", 
+                                          list, ltype, strerror(errno)));
+                       return -1;
+               }
+               tdb->locked[list+1].ltype = ltype;
+       }
+       tdb->locked[list+1].count++;
+       return 0;
+}
+
+/* unlock the database: returns void because it's too late for errors. */
+       /* changed to return int it may be interesting to know there
+          has been an error  --simo */
+static int tdb_unlock(TDB_CONTEXT *tdb, int list,
+                     int ltype __attribute__((unused)))
+{
+       int ret = -1;
+
+       if (tdb->flags & TDB_NOLOCK)
+               return 0;
+
+       /* Sanity checks */
+       if (list < -1 || list >= (int)tdb->header.hash_size) {
+               TDB_LOG((tdb, 0, "tdb_unlock: list %d invalid (%d)\n", list, 
tdb->header.hash_size));
+               return ret;
+       }
+
+       if (tdb->locked[list+1].count==0) {
+               TDB_LOG((tdb, 0, "tdb_unlock: count is 0\n"));
+               return ret;
+       }
+
+       if (tdb->locked[list+1].count == 1) {
+               /* Down to last nested lock: unlock underneath */
+               ret = tdb_brlock(tdb, FREELIST_TOP+4*list, F_UNLCK, F_SETLKW, 
0);
+       } else {
+               ret = 0;
+       }
+       tdb->locked[list+1].count--;
+
+       if (ret)
+               TDB_LOG((tdb, 0,"tdb_unlock: An error occurred unlocking!\n")); 
+       return ret;
+}
+
+/* This is based on the hash algorithm from gdbm */
+static u32 default_tdb_hash(TDB_DATA *key)
+{
+       u32 value;      /* Used to compute the hash value.  */
+       u32   i;        /* Used to cycle through random values. */
+
+       /* Set the initial value from the key size. */
+       for (value = 0x238F13AF * key->dsize, i=0; i < key->dsize; i++)
+               value = (value + (key->dptr[i] << (i*5 % 24)));
+
+       return (1103515243 * value + 12345);  
+}
+
+/* check for an out of bounds access - if it is out of bounds then
+   see if the database has been expanded by someone else and expand
+   if necessary 
+   note that "len" is the minimum length needed for the db
+*/
+static int tdb_oob(TDB_CONTEXT *tdb, tdb_off len, int probe)
+{
+       struct stat st;
+       if (len <= tdb->map_size)
+               return 0;
+       if (tdb->flags & TDB_INTERNAL) {
+               if (!probe) {
+                       /* Ensure ecode is set for log fn. */
+                       tdb->ecode = TDB_ERR_IO;
+                       TDB_LOG((tdb, 0,"tdb_oob len %d beyond internal malloc 
size %d\n",
+                                (int)len, (int)tdb->map_size));
+               }
+               return TDB_ERRCODE(TDB_ERR_IO, -1);
+       }
+
+       if (fstat(tdb->fd, &st) == -1)
+               return TDB_ERRCODE(TDB_ERR_IO, -1);
+
+       if (st.st_size < (off_t)len) {
+               if (!probe) {
+                       /* Ensure ecode is set for log fn. */
+                       tdb->ecode = TDB_ERR_IO;
+                       TDB_LOG((tdb, 0,"tdb_oob len %d beyond eof at %d\n",
+                                (int)len, (int)st.st_size));
+               }
+               return TDB_ERRCODE(TDB_ERR_IO, -1);
+       }
+
+       /* Unmap, update size, remap */
+       if (tdb_munmap(tdb) == -1)
+               return TDB_ERRCODE(TDB_ERR_IO, -1);
+       tdb->map_size = st.st_size;
+       tdb_mmap(tdb);
+       return 0;
+}
+
+/* write a lump of data at a specified offset */
+static int tdb_write(TDB_CONTEXT *tdb, tdb_off off, void *buf, tdb_len len)
+{
+       if (tdb_oob(tdb, off + len, 0) != 0)
+               return -1;
+
+       if (tdb->map_ptr)
+               memcpy(off + (char *)tdb->map_ptr, buf, len);
+#ifdef HAVE_PWRITE
+       else if (pwrite(tdb->fd, buf, len, off) != (ssize_t)len) {
+#else
+       else if (lseek(tdb->fd, off, SEEK_SET) != (off_t)off
+                || write(tdb->fd, buf, len) != (off_t)len) {
+#endif
+               /* Ensure ecode is set for log fn. */
+               tdb->ecode = TDB_ERR_IO;
+               TDB_LOG((tdb, 0,"tdb_write failed at %d len=%d (%s)\n",
+                          off, len, strerror(errno)));
+               return TDB_ERRCODE(TDB_ERR_IO, -1);
+       }
+       return 0;
+}
+
+/* read a lump of data at a specified offset, maybe convert */
+static int tdb_read(TDB_CONTEXT *tdb,tdb_off off,void *buf,tdb_len len,int cv)
+{
+       if (tdb_oob(tdb, off + len, 0) != 0)
+               return -1;
+
+       if (tdb->map_ptr)
+               memcpy(buf, off + (char *)tdb->map_ptr, len);
+#ifdef HAVE_PREAD
+       else if (pread(tdb->fd, buf, len, off) != (off_t)len) {
+#else
+       else if (lseek(tdb->fd, off, SEEK_SET) != (off_t)off
+                || read(tdb->fd, buf, len) != (off_t)len) {
+#endif
+               /* Ensure ecode is set for log fn. */
+               tdb->ecode = TDB_ERR_IO;
+               TDB_LOG((tdb, 0,"tdb_read failed at %d len=%d (%s)\n",
+                          off, len, strerror(errno)));
+               return TDB_ERRCODE(TDB_ERR_IO, -1);
+       }
+       if (cv)
+               convert(buf, len);
+       return 0;
+}
+
+/* don't allocate memory: used in tdb_delete path. */
+static int tdb_key_eq(TDB_CONTEXT *tdb, tdb_off off, TDB_DATA key)
+{
+       char buf[64];
+       u32 len;
+
+       if (tdb_oob(tdb, off + key.dsize, 0) != 0)
+               return -1;
+
+       if (tdb->map_ptr)
+               return !memcmp(off + (char*)tdb->map_ptr, key.dptr, key.dsize);
+
+       while (key.dsize) {
+               len = key.dsize;
+               if (len > sizeof(buf))
+                       len = sizeof(buf);
+               if (tdb_read(tdb, off, buf, len, 0) != 0)
+                       return -1;
+               if (memcmp(buf, key.dptr, len) != 0)
+                       return 0;
+               key.dptr += len;
+               key.dsize -= len;
+               off += len;
+       }
+       return 1;
+}
+
+/* read a lump of data, allocating the space for it */
+static char *tdb_alloc_read(TDB_CONTEXT *tdb, tdb_off offset, tdb_len len)
+{
+       char *buf;
+
+       if (!(buf = talloc_size(tdb, len))) {
+               /* Ensure ecode is set for log fn. */
+               tdb->ecode = TDB_ERR_OOM;
+               TDB_LOG((tdb, 0,"tdb_alloc_read malloc failed len=%d (%s)\n",
+                          len, strerror(errno)));
+               return TDB_ERRCODE(TDB_ERR_OOM, buf);
+       }
+       if (tdb_read(tdb, offset, buf, len, 0) == -1) {
+               SAFE_FREE(buf);
+               return NULL;
+       }
+       return buf;
+}
+
+/* read/write a tdb_off */
+static int ofs_read(TDB_CONTEXT *tdb, tdb_off offset, tdb_off *d)
+{
+       return tdb_read(tdb, offset, (char*)d, sizeof(*d), DOCONV());
+}
+static int ofs_write(TDB_CONTEXT *tdb, tdb_off offset, tdb_off *d)
+{
+       tdb_off off = *d;
+       return tdb_write(tdb, offset, CONVERT(off), sizeof(*d));
+}
+
+/* read/write a record */
+static int rec_read(TDB_CONTEXT *tdb, tdb_off offset, struct list_struct *rec)
+{
+       if (tdb_read(tdb, offset, rec, sizeof(*rec),DOCONV()) == -1)
+               return -1;
+       if (TDB_BAD_MAGIC(rec)) {
+               /* Ensure ecode is set for log fn. */
+               tdb->ecode = TDB_ERR_CORRUPT;
+               TDB_LOG((tdb, 0,"rec_read bad magic 0x%x at offset=%d\n", 
rec->magic, offset));
+               return TDB_ERRCODE(TDB_ERR_CORRUPT, -1);
+       }
+       return tdb_oob(tdb, rec->next+sizeof(*rec), 0);
+}
+static int rec_write(TDB_CONTEXT *tdb, tdb_off offset, struct list_struct *rec)
+{
+       struct list_struct r = *rec;
+       return tdb_write(tdb, offset, CONVERT(r), sizeof(r));
+}
+
+/* read a freelist record and check for simple errors */
+static int rec_free_read(TDB_CONTEXT *tdb, tdb_off off, struct list_struct 
*rec)
+{
+       if (tdb_read(tdb, off, rec, sizeof(*rec),DOCONV()) == -1)
+               return -1;
+
+       if (rec->magic == TDB_MAGIC) {
+               /* this happens when a app is showdown while deleting a record 
- we should
+                  not completely fail when this happens */
+               TDB_LOG((tdb, 0,"rec_free_read non-free magic 0x%x at offset=%d 
- fixing\n", 
+                        rec->magic, off));
+               rec->magic = TDB_FREE_MAGIC;
+               if (tdb_write(tdb, off, rec, sizeof(*rec)) == -1)
+                       return -1;
+       }
+
+       if (rec->magic != TDB_FREE_MAGIC) {
+               /* Ensure ecode is set for log fn. */
+               tdb->ecode = TDB_ERR_CORRUPT;
+               TDB_LOG((tdb, 0,"rec_free_read bad magic 0x%x at offset=%d\n", 
+                          rec->magic, off));
+               return TDB_ERRCODE(TDB_ERR_CORRUPT, -1);
+       }
+       if (tdb_oob(tdb, rec->next+sizeof(*rec), 0) != 0)
+               return -1;
+       return 0;
+}
+
+/* update a record tailer (must hold allocation lock) */
+static int update_tailer(TDB_CONTEXT *tdb, tdb_off offset,
+                        const struct list_struct *rec)
+{
+       tdb_off totalsize;
+
+       /* Offset of tailer from record header */
+       totalsize = sizeof(*rec) + rec->rec_len;
+       return ofs_write(tdb, offset + totalsize - sizeof(tdb_off),
+                        &totalsize);
+}
+
+static tdb_off tdb_dump_record(TDB_CONTEXT *tdb, tdb_off offset)
+{
+       struct list_struct rec;
+       tdb_off tailer_ofs, tailer;
+
+       if (tdb_read(tdb, offset, (char *)&rec, sizeof(rec), DOCONV()) == -1) {
+               printf("ERROR: failed to read record at %u\n", offset);
+               return 0;
+       }
+
+       printf(" rec: offset=0x%08x next=0x%08x rec_len=%d key_len=%d 
data_len=%d full_hash=0x%x magic=0x%x\n",
+              offset, rec.next, rec.rec_len, rec.key_len, rec.data_len, 
rec.full_hash, rec.magic);
+
+       tailer_ofs = offset + sizeof(rec) + rec.rec_len - sizeof(tdb_off);
+       if (ofs_read(tdb, tailer_ofs, &tailer) == -1) {
+               printf("ERROR: failed to read tailer at %u\n", tailer_ofs);
+               return rec.next;
+       }
+
+       if (tailer != rec.rec_len + sizeof(rec)) {
+               printf("ERROR: tailer does not match record! tailer=%u 
totalsize=%u\n",
+                               (unsigned int)tailer, (unsigned 
int)(rec.rec_len + sizeof(rec)));
+       }
+       return rec.next;
+}
+
+static int tdb_dump_chain(TDB_CONTEXT *tdb, int i)
+{
+       tdb_off rec_ptr, top;
+
+       top = TDB_HASH_TOP(i);
+
+       if (tdb_lock(tdb, i, F_WRLCK) != 0)
+               return -1;
+
+       if (ofs_read(tdb, top, &rec_ptr) == -1)
+               return tdb_unlock(tdb, i, F_WRLCK);
+
+       if (rec_ptr)
+               printf("hash=%d\n", i);
+
+       while (rec_ptr) {
+               rec_ptr = tdb_dump_record(tdb, rec_ptr);
+       }
+
+       return tdb_unlock(tdb, i, F_WRLCK);
+}
+
+void tdb_dump_all(TDB_CONTEXT *tdb)
+{
+       unsigned int i;
+       for (i=0;i<tdb->header.hash_size;i++) {
+               tdb_dump_chain(tdb, i);
+       }
+       printf("freelist:\n");
+       tdb_dump_chain(tdb, -1);
+}
+
+int tdb_printfreelist(TDB_CONTEXT *tdb)
+{
+       int ret;
+       long total_free = 0;
+       tdb_off offset, rec_ptr;
+       struct list_struct rec;
+
+       if ((ret = tdb_lock(tdb, -1, F_WRLCK)) != 0)
+               return ret;
+
+       offset = FREELIST_TOP;
+
+       /* read in the freelist top */
+       if (ofs_read(tdb, offset, &rec_ptr) == -1) {
+               tdb_unlock(tdb, -1, F_WRLCK);
+               return 0;
+       }
+
+       printf("freelist top=[0x%08x]\n", rec_ptr );
+       while (rec_ptr) {
+               if (tdb_read(tdb, rec_ptr, (char *)&rec, sizeof(rec), DOCONV()) 
== -1) {
+                       tdb_unlock(tdb, -1, F_WRLCK);
+                       return -1;
+               }
+
+               if (rec.magic != TDB_FREE_MAGIC) {
+                       printf("bad magic 0x%08x in free list\n", rec.magic);
+                       tdb_unlock(tdb, -1, F_WRLCK);
+                       return -1;
+               }
+
+               printf("entry offset=[0x%08x], rec.rec_len = [0x%08x (%d)] (end 
= 0x%08x)\n", 
+                      rec_ptr, rec.rec_len, rec.rec_len, rec_ptr + 
rec.rec_len);
+               total_free += rec.rec_len;
+
+               /* move to the next record */
+               rec_ptr = rec.next;
+       }
+       printf("total rec_len = [0x%08x (%d)]\n", (int)total_free, 
+               (int)total_free);
+
+       return tdb_unlock(tdb, -1, F_WRLCK);
+}
+
+/* Remove an element from the freelist.  Must have alloc lock. */
+static int remove_from_freelist(TDB_CONTEXT *tdb, tdb_off off, tdb_off next)
+{
+       tdb_off last_ptr, i;
+
+       /* read in the freelist top */
+       last_ptr = FREELIST_TOP;
+       while (ofs_read(tdb, last_ptr, &i) != -1 && i != 0) {
+               if (i == off) {
+                       /* We've found it! */
+                       return ofs_write(tdb, last_ptr, &next);
+               }
+               /* Follow chain (next offset is at start of record) */
+               last_ptr = i;
+       }
+       TDB_LOG((tdb, 0,"remove_from_freelist: not on list at off=%d\n", off));
+       return TDB_ERRCODE(TDB_ERR_CORRUPT, -1);
+}
+
+/* Add an element into the freelist. Merge adjacent records if
+   neccessary. */
+static int tdb_free(TDB_CONTEXT *tdb, tdb_off offset, struct list_struct *rec)
+{
+       tdb_off right, left;
+
+       /* Allocation and tailer lock */
+       if (tdb_lock(tdb, -1, F_WRLCK) != 0)
+               return -1;
+
+       /* set an initial tailer, so if we fail we don't leave a bogus record */
+       if (update_tailer(tdb, offset, rec) != 0) {
+               TDB_LOG((tdb, 0, "tdb_free: upfate_tailer failed!\n"));
+               goto fail;
+       }
+
+       /* Look right first (I'm an Australian, dammit) */
+       right = offset + sizeof(*rec) + rec->rec_len;
+       if (right + sizeof(*rec) <= tdb->map_size) {
+               struct list_struct r;
+
+               if (tdb_read(tdb, right, &r, sizeof(r), DOCONV()) == -1) {
+                       TDB_LOG((tdb, 0, "tdb_free: right read failed at %u\n", 
right));
+                       goto left;
+               }
+
+               /* If it's free, expand to include it. */
+               if (r.magic == TDB_FREE_MAGIC) {
+                       if (remove_from_freelist(tdb, right, r.next) == -1) {
+                               TDB_LOG((tdb, 0, "tdb_free: right free failed 
at %u\n", right));
+                               goto left;
+                       }
+                       rec->rec_len += sizeof(r) + r.rec_len;
+               }
+       }
+
+left:
+       /* Look left */
+       left = offset - sizeof(tdb_off);
+       if (left > TDB_DATA_START(tdb->header.hash_size)) {
+               struct list_struct l;
+               tdb_off leftsize;
+               
+               /* Read in tailer and jump back to header */
+               if (ofs_read(tdb, left, &leftsize) == -1) {
+                       TDB_LOG((tdb, 0, "tdb_free: left offset read failed at 
%u\n", left));
+                       goto update;
+               }
+               left = offset - leftsize;
+
+               /* Now read in record */
+               if (tdb_read(tdb, left, &l, sizeof(l), DOCONV()) == -1) {
+                       TDB_LOG((tdb, 0, "tdb_free: left read failed at %u 
(%u)\n", left, leftsize));
+                       goto update;
+               }
+
+               /* If it's free, expand to include it. */
+               if (l.magic == TDB_FREE_MAGIC) {
+                       if (remove_from_freelist(tdb, left, l.next) == -1) {
+                               TDB_LOG((tdb, 0, "tdb_free: left free failed at 
%u\n", left));
+                               goto update;
+                       } else {
+                               offset = left;
+                               rec->rec_len += leftsize;
+                       }
+               }
+       }
+
+update:
+       if (update_tailer(tdb, offset, rec) == -1) {
+               TDB_LOG((tdb, 0, "tdb_free: update_tailer failed at %u\n", 
offset));
+               goto fail;
+       }
+
+       /* Now, prepend to free list */
+       rec->magic = TDB_FREE_MAGIC;
+
+       if (ofs_read(tdb, FREELIST_TOP, &rec->next) == -1 ||
+           rec_write(tdb, offset, rec) == -1 ||
+           ofs_write(tdb, FREELIST_TOP, &offset) == -1) {
+               TDB_LOG((tdb, 0, "tdb_free record write failed at offset=%d\n", 
offset));
+               goto fail;
+       }
+
+       /* And we're done. */
+       tdb_unlock(tdb, -1, F_WRLCK);
+       return 0;
+
+ fail:
+       tdb_unlock(tdb, -1, F_WRLCK);
+       return -1;
+}
+
+
+/* expand a file.  we prefer to use ftruncate, as that is what posix
+  says to use for mmap expansion */
+static int expand_file(TDB_CONTEXT *tdb, tdb_off size, tdb_off addition)
+{
+       char buf[1024];
+#if HAVE_FTRUNCATE_EXTEND
+       if (ftruncate(tdb->fd, size+addition) != 0) {
+               TDB_LOG((tdb, 0, "expand_file ftruncate to %d failed (%s)\n", 
+                          size+addition, strerror(errno)));
+               return -1;
+       }
+#else
+       char b = 0;
+
+#ifdef HAVE_PWRITE
+       if (pwrite(tdb->fd,  &b, 1, (size+addition) - 1) != 1) {
+#else
+       if (lseek(tdb->fd, (size+addition) - 1, SEEK_SET) != 
(off_t)(size+addition) - 1 || 
+           write(tdb->fd, &b, 1) != 1) {
+#endif
+               TDB_LOG((tdb, 0, "expand_file to %d failed (%s)\n", 
+                          size+addition, strerror(errno)));
+               return -1;
+       }
+#endif
+
+       /* now fill the file with something. This ensures that the file isn't 
sparse, which would be
+          very bad if we ran out of disk. This must be done with write, not 
via mmap */
+       memset(buf, 0x42, sizeof(buf));
+       while (addition) {
+               int n = addition>sizeof(buf)?sizeof(buf):addition;
+#ifdef HAVE_PWRITE
+               int ret = pwrite(tdb->fd, buf, n, size);
+#else
+               int ret;
+               if (lseek(tdb->fd, size, SEEK_SET) != (off_t)size)
+                       return -1;
+               ret = write(tdb->fd, buf, n);
+#endif
+               if (ret != n) {
+                       TDB_LOG((tdb, 0, "expand_file write of %d failed 
(%s)\n", 
+                                  n, strerror(errno)));
+                       return -1;
+               }
+               addition -= n;
+               size += n;
+       }
+       return 0;
+}
+
+
+/* expand the database at least size bytes by expanding the underlying
+   file and doing the mmap again if necessary */
+static int tdb_expand(TDB_CONTEXT *tdb, tdb_off size)
+{
+       struct list_struct rec;
+       tdb_off offset;
+
+       if (tdb_lock(tdb, -1, F_WRLCK) == -1) {
+               TDB_LOG((tdb, 0, "lock failed in tdb_expand\n"));
+               return -1;
+       }
+
+       /* must know about any previous expansions by another process */
+       tdb_oob(tdb, tdb->map_size + 1, 1);
+
+       /* always make room for at least 10 more records, and round
+           the database up to a multiple of TDB_PAGE_SIZE */
+       size = TDB_ALIGN(tdb->map_size + size*10, TDB_PAGE_SIZE) - 
tdb->map_size;
+
+       if (!(tdb->flags & TDB_INTERNAL))
+               tdb_munmap(tdb);
+
+       /*
+        * We must ensure the file is unmapped before doing this
+        * to ensure consistency with systems like OpenBSD where
+        * writes and mmaps are not consistent.
+        */
+
+       /* expand the file itself */
+       if (!(tdb->flags & TDB_INTERNAL)) {
+               if (expand_file(tdb, tdb->map_size, size) != 0)
+                       goto fail;
+       }
+
+       tdb->map_size += size;
+
+       if (tdb->flags & TDB_INTERNAL) {
+               char *new_map_ptr = talloc_realloc_size(tdb, tdb->map_ptr,
+                                                       tdb->map_size);
+               if (!new_map_ptr) {
+                       tdb->map_size -= size;
+                       goto fail;
+               }
+               tdb->map_ptr = new_map_ptr;
+       } else {
+               /*
+                * We must ensure the file is remapped before adding the space
+                * to ensure consistency with systems like OpenBSD where
+                * writes and mmaps are not consistent.
+                */
+
+               /* We're ok if the mmap fails as we'll fallback to read/write */
+               tdb_mmap(tdb);
+       }
+
+       /* form a new freelist record */
+       memset(&rec,'\0',sizeof(rec));
+       rec.rec_len = size - sizeof(rec);
+
+       /* link it into the free list */
+       offset = tdb->map_size - size;
+       if (tdb_free(tdb, offset, &rec) == -1)
+               goto fail;
+
+       tdb_unlock(tdb, -1, F_WRLCK);
+       return 0;
+ fail:
+       tdb_unlock(tdb, -1, F_WRLCK);
+       return -1;
+}
+
+
+/* 
+   the core of tdb_allocate - called when we have decided which
+   free list entry to use
+ */
+static tdb_off tdb_allocate_ofs(TDB_CONTEXT *tdb, tdb_len length, tdb_off 
rec_ptr,
+                               struct list_struct *rec, tdb_off last_ptr)
+{
+       struct list_struct newrec;
+       tdb_off newrec_ptr;
+
+       memset(&newrec, '\0', sizeof(newrec));
+
+       /* found it - now possibly split it up  */
+       if (rec->rec_len > length + MIN_REC_SIZE) {
+               /* Length of left piece */
+               length = TDB_ALIGN(length, TDB_ALIGNMENT);
+               
+               /* Right piece to go on free list */
+               newrec.rec_len = rec->rec_len - (sizeof(*rec) + length);
+               newrec_ptr = rec_ptr + sizeof(*rec) + length;
+               
+               /* And left record is shortened */
+               rec->rec_len = length;
+       } else {
+               newrec_ptr = 0;
+       }
+       
+       /* Remove allocated record from the free list */
+       if (ofs_write(tdb, last_ptr, &rec->next) == -1) {
+               return 0;
+       }
+       
+       /* Update header: do this before we drop alloc
+          lock, otherwise tdb_free() might try to
+          merge with us, thinking we're free.
+          (Thanks Jeremy Allison). */
+       rec->magic = TDB_MAGIC;
+       if (rec_write(tdb, rec_ptr, rec) == -1) {
+               return 0;
+       }
+       
+       /* Did we create new block? */
+       if (newrec_ptr) {
+               /* Update allocated record tailer (we
+                  shortened it). */
+               if (update_tailer(tdb, rec_ptr, rec) == -1) {
+                       return 0;
+               }
+               
+               /* Free new record */
+               if (tdb_free(tdb, newrec_ptr, &newrec) == -1) {
+                       return 0;
+               }
+       }
+       
+       /* all done - return the new record offset */
+       return rec_ptr;
+}
+
+/* allocate some space from the free list. The offset returned points
+   to a unconnected list_struct within the database with room for at
+   least length bytes of total data
+
+   0 is returned if the space could not be allocated
+ */
+static tdb_off tdb_allocate(TDB_CONTEXT *tdb, tdb_len length,
+                           struct list_struct *rec)
+{
+       tdb_off rec_ptr, last_ptr, newrec_ptr;
+       struct {
+               tdb_off rec_ptr, last_ptr;
+               tdb_len rec_len;
+       } bestfit = { 0, 0, 0 };
+
+       if (tdb_lock(tdb, -1, F_WRLCK) == -1)
+               return 0;
+
+       /* Extra bytes required for tailer */
+       length += sizeof(tdb_off);
+
+ again:
+       last_ptr = FREELIST_TOP;
+
+       /* read in the freelist top */
+       if (ofs_read(tdb, FREELIST_TOP, &rec_ptr) == -1)
+               goto fail;
+
+       bestfit.rec_ptr = 0;
+
+       /* 
+          this is a best fit allocation strategy. Originally we used
+          a first fit strategy, but it suffered from massive fragmentation
+          issues when faced with a slowly increasing record size.
+        */
+       while (rec_ptr) {
+               if (rec_free_read(tdb, rec_ptr, rec) == -1) {
+                       goto fail;
+               }
+
+               if (rec->rec_len >= length) {
+                       if (bestfit.rec_ptr == 0 ||
+                           rec->rec_len < bestfit.rec_len) {
+                               bestfit.rec_len = rec->rec_len;
+                               bestfit.rec_ptr = rec_ptr;
+                               bestfit.last_ptr = last_ptr;
+                               /* consider a fit to be good enough if we 
aren't wasting more than half the space */
+                               if (bestfit.rec_len < 2*length) {
+                                       break;
+                               }
+                       }
+               }
+
+               /* move to the next record */
+               last_ptr = rec_ptr;
+               rec_ptr = rec->next;
+       }
+
+       if (bestfit.rec_ptr != 0) {
+               if (rec_free_read(tdb, bestfit.rec_ptr, rec) == -1) {
+                       goto fail;
+               }
+
+               newrec_ptr = tdb_allocate_ofs(tdb, length, bestfit.rec_ptr, 
rec, bestfit.last_ptr);
+               tdb_unlock(tdb, -1, F_WRLCK);
+               return newrec_ptr;
+       }
+
+       /* we didn't find enough space. See if we can expand the
+          database and if we can then try again */
+       if (tdb_expand(tdb, length + sizeof(*rec)) == 0)
+               goto again;
+ fail:
+       tdb_unlock(tdb, -1, F_WRLCK);
+       return 0;
+}
+
+/* initialise a new database with a specified hash size */
+static int tdb_new_database(TDB_CONTEXT *tdb, int hash_size)
+{
+       struct tdb_header *newdb;
+       int size, ret = -1;
+
+       /* We make it up in memory, then write it out if not internal */
+       size = sizeof(struct tdb_header) + (hash_size+1)*sizeof(tdb_off);
+       if (!(newdb = talloc_zero_size(tdb, size)))
+               return TDB_ERRCODE(TDB_ERR_OOM, -1);
+
+       /* Fill in the header */
+       newdb->version = TDB_VERSION;
+       newdb->hash_size = hash_size;
+       if (tdb->flags & TDB_INTERNAL) {
+               tdb->map_size = size;
+               tdb->map_ptr = (char *)newdb;
+               memcpy(&tdb->header, newdb, sizeof(tdb->header));
+               /* Convert the `ondisk' version if asked. */
+               CONVERT(*newdb);
+               return 0;
+       }
+       if (lseek(tdb->fd, 0, SEEK_SET) == -1)
+               goto fail;
+
+       if (ftruncate(tdb->fd, 0) == -1)
+               goto fail;
+
+       /* This creates an endian-converted header, as if read from disk */
+       CONVERT(*newdb);
+       memcpy(&tdb->header, newdb, sizeof(tdb->header));
+       /* Don't endian-convert the magic food! */
+       memcpy(newdb->magic_food, TDB_MAGIC_FOOD, strlen(TDB_MAGIC_FOOD)+1);
+       if (write(tdb->fd, newdb, size) != size)
+               ret = -1;
+       else
+               ret = 0;
+
+  fail:
+       SAFE_FREE(newdb);
+       return ret;
+}
+
+/* Returns 0 on fail.  On success, return offset of record, and fills
+   in rec */
+static tdb_off tdb_find(TDB_CONTEXT *tdb, TDB_DATA key, u32 hash,
+                       struct list_struct *r)
+{
+       tdb_off rec_ptr;
+       
+       /* read in the hash top */
+       if (ofs_read(tdb, TDB_HASH_TOP(hash), &rec_ptr) == -1)
+               return 0;
+
+       /* keep looking until we find the right record */
+       while (rec_ptr) {
+               if (rec_read(tdb, rec_ptr, r) == -1)
+                       return 0;
+
+               if (!TDB_DEAD(r) && hash==r->full_hash && 
key.dsize==r->key_len) {
+                       /* a very likely hit - read the key */
+                       int cmp = tdb_key_eq(tdb, rec_ptr + sizeof(*r), key);
+                       if (cmp < 0)
+                               return 0;
+                       else if (cmp > 0)
+                               return rec_ptr;
+               }
+               rec_ptr = r->next;
+       }
+       return TDB_ERRCODE(TDB_ERR_NOEXIST, 0);
+}
+
+/* As tdb_find, but if you succeed, keep the lock */
+static tdb_off tdb_find_lock_hash(TDB_CONTEXT *tdb, TDB_DATA key, u32 hash, 
int locktype,
+                            struct list_struct *rec)
+{
+       u32 rec_ptr;
+
+       if (tdb_lock(tdb, BUCKET(hash), locktype) == -1)
+               return 0;
+       if (!(rec_ptr = tdb_find(tdb, key, hash, rec)))
+               tdb_unlock(tdb, BUCKET(hash), locktype);
+       return rec_ptr;
+}
+
+enum TDB_ERROR tdb_error(TDB_CONTEXT *tdb)
+{
+       return tdb->ecode;
+}
+
+static struct tdb_errname {
+       enum TDB_ERROR ecode; const char *estring;
+} emap[] = { {TDB_SUCCESS, "Success"},
+            {TDB_ERR_CORRUPT, "Corrupt database"},
+            {TDB_ERR_IO, "IO Error"},
+            {TDB_ERR_LOCK, "Locking error"},
+            {TDB_ERR_OOM, "Out of memory"},
+            {TDB_ERR_EXISTS, "Record exists"},
+            {TDB_ERR_NOLOCK, "Lock exists on other keys"},
+            {TDB_ERR_NOEXIST, "Record does not exist"} };
+
+/* Error string for the last tdb error */
+const char *tdb_errorstr(TDB_CONTEXT *tdb)
+{
+       u32 i;
+       for (i = 0; i < sizeof(emap) / sizeof(struct tdb_errname); i++)
+               if (tdb->ecode == emap[i].ecode)
+                       return emap[i].estring;
+       return "Invalid error code";
+}
+
+/* update an entry in place - this only works if the new data size
+   is <= the old data size and the key exists.
+   on failure return -1.
+*/
+
+static int tdb_update_hash(TDB_CONTEXT *tdb, TDB_DATA key, u32 hash, TDB_DATA 
dbuf)
+{
+       struct list_struct rec;
+       tdb_off rec_ptr;
+
+       /* find entry */
+       if (!(rec_ptr = tdb_find(tdb, key, hash, &rec)))
+               return -1;
+
+       /* must be long enough key, data and tailer */
+       if (rec.rec_len < key.dsize + dbuf.dsize + sizeof(tdb_off)) {
+               tdb->ecode = TDB_SUCCESS; /* Not really an error */
+               return -1;
+       }
+
+       if (tdb_write(tdb, rec_ptr + sizeof(rec) + rec.key_len,
+                     dbuf.dptr, dbuf.dsize) == -1)
+               return -1;
+
+       if (dbuf.dsize != rec.data_len) {
+               /* update size */
+               rec.data_len = dbuf.dsize;
+               return rec_write(tdb, rec_ptr, &rec);
+       }
+ 
+       return 0;
+}
+
+/* find an entry in the database given a key */
+/* If an entry doesn't exist tdb_err will be set to
+ * TDB_ERR_NOEXIST. If a key has no data attached
+ * then the TDB_DATA will have zero length but
+ * a non-zero pointer
+ */
+
+TDB_DATA tdb_fetch(TDB_CONTEXT *tdb, TDB_DATA key)
+{
+       tdb_off rec_ptr;
+       struct list_struct rec;
+       TDB_DATA ret;
+       u32 hash;
+
+       /* find which hash bucket it is in */
+       hash = tdb->hash_fn(&key);
+       if (!(rec_ptr = tdb_find_lock_hash(tdb,key,hash,F_RDLCK,&rec)))
+               return tdb_null;
+
+       ret.dptr = tdb_alloc_read(tdb, rec_ptr + sizeof(rec) + rec.key_len,
+                                 rec.data_len);
+       ret.dsize = rec.data_len;
+       tdb_unlock(tdb, BUCKET(rec.full_hash), F_RDLCK);
+       return ret;
+}
+
+/* check if an entry in the database exists 
+
+   note that 1 is returned if the key is found and 0 is returned if not found
+   this doesn't match the conventions in the rest of this module, but is
+   compatible with gdbm
+*/
+static int tdb_exists_hash(TDB_CONTEXT *tdb, TDB_DATA key, u32 hash)
+{
+       struct list_struct rec;
+       
+       if (tdb_find_lock_hash(tdb, key, hash, F_RDLCK, &rec) == 0)
+               return 0;
+       tdb_unlock(tdb, BUCKET(rec.full_hash), F_RDLCK);
+       return 1;
+}
+
+int tdb_exists(TDB_CONTEXT *tdb, TDB_DATA key)
+{
+       u32 hash = tdb->hash_fn(&key);
+       return tdb_exists_hash(tdb, key, hash);
+}
+
+/* record lock stops delete underneath */
+static int lock_record(TDB_CONTEXT *tdb, tdb_off off)
+{
+       return off ? tdb_brlock(tdb, off, F_RDLCK, F_SETLKW, 0) : 0;
+}
+/*
+  Write locks override our own fcntl readlocks, so check it here.
+  Note this is meant to be F_SETLK, *not* F_SETLKW, as it's not
+  an error to fail to get the lock here.
+*/
+ 
+static int write_lock_record(TDB_CONTEXT *tdb, tdb_off off)
+{
+       struct tdb_traverse_lock *i;
+       for (i = &tdb->travlocks; i; i = i->next)
+               if (i->off == off)
+                       return -1;
+       return tdb_brlock(tdb, off, F_WRLCK, F_SETLK, 1);
+}
+
+/*
+  Note this is meant to be F_SETLK, *not* F_SETLKW, as it's not
+  an error to fail to get the lock here.
+*/
+
+static int write_unlock_record(TDB_CONTEXT *tdb, tdb_off off)
+{
+       return tdb_brlock(tdb, off, F_UNLCK, F_SETLK, 0);
+}
+/* fcntl locks don't stack: avoid unlocking someone else's */
+static int unlock_record(TDB_CONTEXT *tdb, tdb_off off)
+{
+       struct tdb_traverse_lock *i;
+       u32 count = 0;
+
+       if (off == 0)
+               return 0;
+       for (i = &tdb->travlocks; i; i = i->next)
+               if (i->off == off)
+                       count++;
+       return (count == 1 ? tdb_brlock(tdb, off, F_UNLCK, F_SETLKW, 0) : 0);
+}
+
+/* actually delete an entry in the database given the offset */
+static int do_delete(TDB_CONTEXT *tdb, tdb_off rec_ptr, struct list_struct*rec)
+{
+       tdb_off last_ptr, i;
+       struct list_struct lastrec;
+
+       if (tdb->read_only) return -1;
+
+       if (write_lock_record(tdb, rec_ptr) == -1) {
+               /* Someone traversing here: mark it as dead */
+               rec->magic = TDB_DEAD_MAGIC;
+               return rec_write(tdb, rec_ptr, rec);
+       }
+       if (write_unlock_record(tdb, rec_ptr) != 0)
+               return -1;
+
+       /* find previous record in hash chain */
+       if (ofs_read(tdb, TDB_HASH_TOP(rec->full_hash), &i) == -1)
+               return -1;
+       for (last_ptr = 0; i != rec_ptr; last_ptr = i, i = lastrec.next)
+               if (rec_read(tdb, i, &lastrec) == -1)
+                       return -1;
+
+       /* unlink it: next ptr is at start of record. */
+       if (last_ptr == 0)
+               last_ptr = TDB_HASH_TOP(rec->full_hash);
+       if (ofs_write(tdb, last_ptr, &rec->next) == -1)
+               return -1;
+
+       /* recover the space */
+       if (tdb_free(tdb, rec_ptr, rec) == -1)
+               return -1;
+       return 0;
+}
+
+/* Uses traverse lock: 0 = finish, -1 = error, other = record offset */
+static int tdb_next_lock(TDB_CONTEXT *tdb, struct tdb_traverse_lock *tlock,
+                        struct list_struct *rec)
+{
+       int want_next = (tlock->off != 0);
+
+       /* Lock each chain from the start one. */
+       for (; tlock->hash < tdb->header.hash_size; tlock->hash++) {
+
+               /* this is an optimisation for the common case where
+                  the hash chain is empty, which is particularly
+                  common for the use of tdb with ldb, where large
+                  hashes are used. In that case we spend most of our
+                  time in tdb_brlock(), locking empty hash chains.
+
+                  To avoid this, we do an unlocked pre-check to see
+                  if the hash chain is empty before starting to look
+                  inside it. If it is empty then we can avoid that
+                  hash chain. If it isn't empty then we can't believe
+                  the value we get back, as we read it without a
+                  lock, so instead we get the lock and re-fetch the
+                  value below.
+
+                  Notice that not doing this optimisation on the
+                  first hash chain is critical. We must guarantee
+                  that we have done at least one fcntl lock at the
+                  start of a search to guarantee that memory is
+                  coherent on SMP systems. If records are added by
+                  others during the search then thats OK, and we
+                  could possibly miss those with this trick, but we
+                  could miss them anyway without this trick, so the
+                  semantics don't change.
+
+                  With a non-indexed ldb search this trick gains us a
+                  factor of around 80 in speed on a linux 2.6.x
+                  system (testing using ldbtest).
+                */
+               if (!tlock->off && tlock->hash != 0) {
+                       u32 off;
+                       if (tdb->map_ptr) {
+                               for (;tlock->hash < 
tdb->header.hash_size;tlock->hash++) {
+                                       if (0 != *(u32 
*)(TDB_HASH_TOP(tlock->hash) + (unsigned char *)tdb->map_ptr)) {
+                                               break;
+                                       }
+                               }
+                               if (tlock->hash == tdb->header.hash_size) {
+                                       continue;
+                               }
+                       } else {
+                               if (ofs_read(tdb, TDB_HASH_TOP(tlock->hash), 
&off) == 0 &&
+                                   off == 0) {
+                                       continue;
+                               }
+                       }
+               }
+
+               if (tdb_lock(tdb, tlock->hash, F_WRLCK) == -1)
+                       return -1;
+
+               /* No previous record?  Start at top of chain. */
+               if (!tlock->off) {
+                       if (ofs_read(tdb, TDB_HASH_TOP(tlock->hash),
+                                    &tlock->off) == -1)
+                               goto fail;
+               } else {
+                       /* Otherwise unlock the previous record. */
+                       if (unlock_record(tdb, tlock->off) != 0)
+                               goto fail;
+               }
+
+               if (want_next) {
+                       /* We have offset of old record: grab next */
+                       if (rec_read(tdb, tlock->off, rec) == -1)
+                               goto fail;
+                       tlock->off = rec->next;
+               }
+
+               /* Iterate through chain */
+               while( tlock->off) {
+                       tdb_off current;
+                       if (rec_read(tdb, tlock->off, rec) == -1)
+                               goto fail;
+
+                       /* Detect infinite loops. From "Shlomi Yaakobovich" 
<Shlomi@xxxxxxxxxx>. */
+                       if (tlock->off == rec->next) {
+                               TDB_LOG((tdb, 0, "tdb_next_lock: loop 
detected.\n"));
+                               goto fail;
+                       }
+
+                       if (!TDB_DEAD(rec)) {
+                               /* Woohoo: we found one! */
+                               if (lock_record(tdb, tlock->off) != 0)
+                                       goto fail;
+                               return tlock->off;
+                       }
+
+                       /* Try to clean dead ones from old traverses */
+                       current = tlock->off;
+                       tlock->off = rec->next;
+                       if (!tdb->read_only && 
+                           do_delete(tdb, current, rec) != 0)
+                               goto fail;
+               }
+               tdb_unlock(tdb, tlock->hash, F_WRLCK);
+               want_next = 0;
+       }
+       /* We finished iteration without finding anything */
+       return TDB_ERRCODE(TDB_SUCCESS, 0);
+
+ fail:
+       tlock->off = 0;
+       if (tdb_unlock(tdb, tlock->hash, F_WRLCK) != 0)
+               TDB_LOG((tdb, 0, "tdb_next_lock: On error unlock failed!\n"));
+       return -1;
+}
+
+/* traverse the entire database - calling fn(tdb, key, data) on each element.
+   return -1 on error or the record count traversed
+   if fn is NULL then it is not called
+   a non-zero return value from fn() indicates that the traversal should stop
+  */
+int tdb_traverse(TDB_CONTEXT *tdb, tdb_traverse_func fn, void *private)
+{
+       TDB_DATA key, dbuf;
+       struct list_struct rec;
+       struct tdb_traverse_lock tl = { NULL, 0, 0 };
+       int ret, count = 0;
+
+       /* This was in the initializaton, above, but the IRIX compiler
+        * did not like it.  crh
+        */
+       tl.next = tdb->travlocks.next;
+
+       /* fcntl locks don't stack: beware traverse inside traverse */
+       tdb->travlocks.next = &tl;
+
+       /* tdb_next_lock places locks on the record returned, and its chain */
+       while ((ret = tdb_next_lock(tdb, &tl, &rec)) > 0) {
+               count++;
+               /* now read the full record */
+               key.dptr = tdb_alloc_read(tdb, tl.off + sizeof(rec), 
+                                         rec.key_len + rec.data_len);
+               if (!key.dptr) {
+                       ret = -1;
+                       if (tdb_unlock(tdb, tl.hash, F_WRLCK) != 0)
+                               goto out;
+                       if (unlock_record(tdb, tl.off) != 0)
+                               TDB_LOG((tdb, 0, "tdb_traverse: key.dptr == 
NULL and unlock_record failed!\n"));
+                       goto out;
+               }
+               key.dsize = rec.key_len;
+               dbuf.dptr = key.dptr + rec.key_len;
+               dbuf.dsize = rec.data_len;
+
+               /* Drop chain lock, call out */
+               if (tdb_unlock(tdb, tl.hash, F_WRLCK) != 0) {
+                       ret = -1;
+                       goto out;
+               }
+               if (fn && fn(tdb, key, dbuf, private)) {
+                       /* They want us to terminate traversal */
+                       ret = count;
+                       if (unlock_record(tdb, tl.off) != 0) {
+                               TDB_LOG((tdb, 0, "tdb_traverse: unlock_record 
failed!\n"));;
+                               ret = -1;
+                       }
+                       tdb->travlocks.next = tl.next;
+                       SAFE_FREE(key.dptr);
+                       return count;
+               }
+               SAFE_FREE(key.dptr);
+       }
+out:
+       tdb->travlocks.next = tl.next;
+       if (ret < 0)
+               return -1;
+       else
+               return count;
+}
+
+/* find the first entry in the database and return its key */
+TDB_DATA tdb_firstkey(TDB_CONTEXT *tdb)
+{
+       TDB_DATA key;
+       struct list_struct rec;
+
+       /* release any old lock */
+       if (unlock_record(tdb, tdb->travlocks.off) != 0)
+               return tdb_null;
+       tdb->travlocks.off = tdb->travlocks.hash = 0;
+
+       if (tdb_next_lock(tdb, &tdb->travlocks, &rec) <= 0)
+               return tdb_null;
+       /* now read the key */
+       key.dsize = rec.key_len;
+       key.dptr =tdb_alloc_read(tdb,tdb->travlocks.off+sizeof(rec),key.dsize);
+       if (tdb_unlock(tdb, BUCKET(tdb->travlocks.hash), F_WRLCK) != 0)
+               TDB_LOG((tdb, 0, "tdb_firstkey: error occurred while 
tdb_unlocking!\n"));
+       return key;
+}
+
+/* find the next entry in the database, returning its key */
+TDB_DATA tdb_nextkey(TDB_CONTEXT *tdb, TDB_DATA oldkey)
+{
+       u32 oldhash;
+       TDB_DATA key = tdb_null;
+       struct list_struct rec;
+       char *k = NULL;
+
+       /* Is locked key the old key?  If so, traverse will be reliable. */
+       if (tdb->travlocks.off) {
+               if (tdb_lock(tdb,tdb->travlocks.hash,F_WRLCK))
+                       return tdb_null;
+               if (rec_read(tdb, tdb->travlocks.off, &rec) == -1
+                   || !(k = tdb_alloc_read(tdb,tdb->travlocks.off+sizeof(rec),
+                                           rec.key_len))
+                   || memcmp(k, oldkey.dptr, oldkey.dsize) != 0) {
+                       /* No, it wasn't: unlock it and start from scratch */
+                       if (unlock_record(tdb, tdb->travlocks.off) != 0)
+                               return tdb_null;
+                       if (tdb_unlock(tdb, tdb->travlocks.hash, F_WRLCK) != 0)
+                               return tdb_null;
+                       tdb->travlocks.off = 0;
+               }
+
+               SAFE_FREE(k);
+       }
+
+       if (!tdb->travlocks.off) {
+               /* No previous element: do normal find, and lock record */
+               tdb->travlocks.off = tdb_find_lock_hash(tdb, oldkey, 
tdb->hash_fn(&oldkey), F_WRLCK, &rec);
+               if (!tdb->travlocks.off)
+                       return tdb_null;
+               tdb->travlocks.hash = BUCKET(rec.full_hash);
+               if (lock_record(tdb, tdb->travlocks.off) != 0) {
+                       TDB_LOG((tdb, 0, "tdb_nextkey: lock_record failed 
(%s)!\n", strerror(errno)));
+                       return tdb_null;
+               }
+       }
+       oldhash = tdb->travlocks.hash;
+
+       /* Grab next record: locks chain and returned record,
+          unlocks old record */
+       if (tdb_next_lock(tdb, &tdb->travlocks, &rec) > 0) {
+               key.dsize = rec.key_len;
+               key.dptr = tdb_alloc_read(tdb, tdb->travlocks.off+sizeof(rec),
+                                         key.dsize);
+               /* Unlock the chain of this new record */
+               if (tdb_unlock(tdb, tdb->travlocks.hash, F_WRLCK) != 0)
+                       TDB_LOG((tdb, 0, "tdb_nextkey: WARNING tdb_unlock 
failed!\n"));
+       }
+       /* Unlock the chain of old record */
+       if (tdb_unlock(tdb, BUCKET(oldhash), F_WRLCK) != 0)
+               TDB_LOG((tdb, 0, "tdb_nextkey: WARNING tdb_unlock failed!\n"));
+       return key;
+}
+
+/* delete an entry in the database given a key */
+static int tdb_delete_hash(TDB_CONTEXT *tdb, TDB_DATA key, u32 hash)
+{
+       tdb_off rec_ptr;
+       struct list_struct rec;
+       int ret;
+
+       if (!(rec_ptr = tdb_find_lock_hash(tdb, key, hash, F_WRLCK, &rec)))
+               return -1;
+       ret = do_delete(tdb, rec_ptr, &rec);
+       if (tdb_unlock(tdb, BUCKET(rec.full_hash), F_WRLCK) != 0)
+               TDB_LOG((tdb, 0, "tdb_delete: WARNING tdb_unlock failed!\n"));
+       return ret;
+}
+
+int tdb_delete(TDB_CONTEXT *tdb, TDB_DATA key)
+{
+       u32 hash = tdb->hash_fn(&key);
+       return tdb_delete_hash(tdb, key, hash);
+}
+
+/* store an element in the database, replacing any existing element
+   with the same key 
+
+   return 0 on success, -1 on failure
+*/
+int tdb_store(TDB_CONTEXT *tdb, TDB_DATA key, TDB_DATA dbuf, int flag)
+{
+       struct list_struct rec;
+       u32 hash;
+       tdb_off rec_ptr;
+       char *p = NULL;
+       int ret = 0;
+
+       /* find which hash bucket it is in */
+       hash = tdb->hash_fn(&key);
+       if (tdb_lock(tdb, BUCKET(hash), F_WRLCK) == -1)
+               return -1;
+
+       /* check for it existing, on insert. */
+       if (flag == TDB_INSERT) {
+               if (tdb_exists_hash(tdb, key, hash)) {
+                       tdb->ecode = TDB_ERR_EXISTS;
+                       goto fail;
+               }
+       } else {
+               /* first try in-place update, on modify or replace. */
+               if (tdb_update_hash(tdb, key, hash, dbuf) == 0)
+                       goto out;
+               if (tdb->ecode == TDB_ERR_NOEXIST &&
+                   flag == TDB_MODIFY) {
+                       /* if the record doesn't exist and we are in TDB_MODIFY 
mode then
+                        we should fail the store */
+                       goto fail;
+               }
+       }
+       /* reset the error code potentially set by the tdb_update() */
+       tdb->ecode = TDB_SUCCESS;
+
+       /* delete any existing record - if it doesn't exist we don't
+           care.  Doing this first reduces fragmentation, and avoids
+           coalescing with `allocated' block before it's updated. */
+       if (flag != TDB_INSERT)
+               tdb_delete_hash(tdb, key, hash);
+
+       /* Copy key+value *before* allocating free space in case malloc
+          fails and we are left with a dead spot in the tdb. */
+
+       if (!(p = (char *)talloc_size(tdb, key.dsize + dbuf.dsize))) {
+               tdb->ecode = TDB_ERR_OOM;
+               goto fail;
+       }
+
+       memcpy(p, key.dptr, key.dsize);
+       if (dbuf.dsize)
+               memcpy(p+key.dsize, dbuf.dptr, dbuf.dsize);
+
+       /* we have to allocate some space */
+       if (!(rec_ptr = tdb_allocate(tdb, key.dsize + dbuf.dsize, &rec)))
+               goto fail;
+
+       /* Read hash top into next ptr */
+       if (ofs_read(tdb, TDB_HASH_TOP(hash), &rec.next) == -1)
+               goto fail;
+
+       rec.key_len = key.dsize;
+       rec.data_len = dbuf.dsize;
+       rec.full_hash = hash;
+       rec.magic = TDB_MAGIC;
+
+       /* write out and point the top of the hash chain at it */
+       if (rec_write(tdb, rec_ptr, &rec) == -1
+           || tdb_write(tdb, rec_ptr+sizeof(rec), p, key.dsize+dbuf.dsize)==-1
+           || ofs_write(tdb, TDB_HASH_TOP(hash), &rec_ptr) == -1) {
+               /* Need to tdb_unallocate() here */
+               goto fail;
+       }
+ out:
+       SAFE_FREE(p); 
+       tdb_unlock(tdb, BUCKET(hash), F_WRLCK);
+       return ret;
+fail:
+       ret = -1;
+       goto out;
+}
+
+/* Attempt to append data to an entry in place - this only works if the new 
data size
+   is <= the old data size and the key exists.
+   on failure return -1. Record must be locked before calling.
+*/
+static int tdb_append_inplace(TDB_CONTEXT *tdb, TDB_DATA key, u32 hash, 
TDB_DATA new_dbuf)
+{
+       struct list_struct rec;
+       tdb_off rec_ptr;
+
+       /* find entry */
+       if (!(rec_ptr = tdb_find(tdb, key, hash, &rec)))
+               return -1;
+
+       /* Append of 0 is always ok. */
+       if (new_dbuf.dsize == 0)
+               return 0;
+
+       /* must be long enough for key, old data + new data and tailer */
+       if (rec.rec_len < key.dsize + rec.data_len + new_dbuf.dsize + 
sizeof(tdb_off)) {
+               /* No room. */
+               tdb->ecode = TDB_SUCCESS; /* Not really an error */
+               return -1;
+       }
+
+       if (tdb_write(tdb, rec_ptr + sizeof(rec) + rec.key_len + rec.data_len,
+                     new_dbuf.dptr, new_dbuf.dsize) == -1)
+               return -1;
+
+       /* update size */
+       rec.data_len += new_dbuf.dsize;
+       return rec_write(tdb, rec_ptr, &rec);
+}
+
+/* Append to an entry. Create if not exist. */
+
+int tdb_append(TDB_CONTEXT *tdb, TDB_DATA key, TDB_DATA new_dbuf)
+{
+       struct list_struct rec;
+       u32 hash;
+       tdb_off rec_ptr;
+       char *p = NULL;
+       int ret = 0;
+       size_t new_data_size = 0;
+
+       /* find which hash bucket it is in */
+       hash = tdb->hash_fn(&key);
+       if (tdb_lock(tdb, BUCKET(hash), F_WRLCK) == -1)
+               return -1;
+
+       /* first try in-place. */
+       if (tdb_append_inplace(tdb, key, hash, new_dbuf) == 0)
+               goto out;
+
+       /* reset the error code potentially set by the tdb_append_inplace() */
+       tdb->ecode = TDB_SUCCESS;
+
+       /* find entry */
+       if (!(rec_ptr = tdb_find(tdb, key, hash, &rec))) {
+               if (tdb->ecode != TDB_ERR_NOEXIST)
+                       goto fail;
+
+               /* Not found - create. */
+
+               ret = tdb_store(tdb, key, new_dbuf, TDB_INSERT);
+               goto out;
+       }
+
+       new_data_size = rec.data_len + new_dbuf.dsize;
+
+       /* Copy key+old_value+value *before* allocating free space in case 
malloc
+          fails and we are left with a dead spot in the tdb. */
+
+       if (!(p = (char *)talloc_size(tdb, key.dsize + new_data_size))) {
+               tdb->ecode = TDB_ERR_OOM;
+               goto fail;
+       }
+
+       /* Copy the key in place. */
+       memcpy(p, key.dptr, key.dsize);
+
+       /* Now read the old data into place. */
+       if (rec.data_len &&
+               tdb_read(tdb, rec_ptr + sizeof(rec) + rec.key_len, p + 
key.dsize, rec.data_len, 0) == -1)
+                       goto fail;
+
+       /* Finally append the new data. */
+       if (new_dbuf.dsize)
+               memcpy(p+key.dsize+rec.data_len, new_dbuf.dptr, new_dbuf.dsize);
+
+       /* delete any existing record - if it doesn't exist we don't
+           care.  Doing this first reduces fragmentation, and avoids
+           coalescing with `allocated' block before it's updated. */
+
+       tdb_delete_hash(tdb, key, hash);
+
+       if (!(rec_ptr = tdb_allocate(tdb, key.dsize + new_data_size, &rec)))
+               goto fail;
+
+       /* Read hash top into next ptr */
+       if (ofs_read(tdb, TDB_HASH_TOP(hash), &rec.next) == -1)
+               goto fail;
+
+       rec.key_len = key.dsize;
+       rec.data_len = new_data_size;
+       rec.full_hash = hash;
+       rec.magic = TDB_MAGIC;
+
+       /* write out and point the top of the hash chain at it */
+       if (rec_write(tdb, rec_ptr, &rec) == -1
+           || tdb_write(tdb, rec_ptr+sizeof(rec), p, 
key.dsize+new_data_size)==-1
+           || ofs_write(tdb, TDB_HASH_TOP(hash), &rec_ptr) == -1) {
+               /* Need to tdb_unallocate() here */
+               goto fail;
+       }
+
+ out:
+       SAFE_FREE(p); 
+       tdb_unlock(tdb, BUCKET(hash), F_WRLCK);
+       return ret;
+
+fail:
+       ret = -1;
+       goto out;
+}
+
+static int tdb_already_open(dev_t device,
+                           ino_t ino)
+{
+       TDB_CONTEXT *i;
+       
+       for (i = tdbs; i; i = i->next) {
+               if (i->device == device && i->inode == ino) {
+                       return 1;
+               }
+       }
+
+       return 0;
+}
+
+/* open the database, creating it if necessary 
+
+   The open_flags and mode are passed straight to the open call on the
+   database file. A flags value of O_WRONLY is invalid. The hash size
+   is advisory, use zero for a default value.
+
+   Return is NULL on error, in which case errno is also set.  Don't 
+   try to call tdb_error or tdb_errname, just do strerror(errno).
+
+   @param name may be NULL for internal databases. */
+TDB_CONTEXT *tdb_open(const char *name, int hash_size, int tdb_flags,
+                     int open_flags, mode_t mode)
+{
+       return tdb_open_ex(name, hash_size, tdb_flags, open_flags, mode, NULL, 
NULL);
+}
+
+/* a default logging function */
+static void null_log_fn(TDB_CONTEXT *tdb __attribute__((unused)),
+                       int level __attribute__((unused)),
+                       const char *fmt __attribute__((unused)), ...)
+{
+}
+
+
+TDB_CONTEXT *tdb_open_ex(const char *name, int hash_size, int tdb_flags,
+                        int open_flags, mode_t mode,
+                        tdb_log_func log_fn,
+                        tdb_hash_func hash_fn)
+{
+       TDB_CONTEXT *tdb;
+       struct stat st;
+       int rev = 0, locked = 0;
+       uint8_t *vp;
+       u32 vertest;
+
+       if (!(tdb = talloc_zero(name, TDB_CONTEXT))) {
+               /* Can't log this */
+               errno = ENOMEM;
+               goto fail;
+       }
+       tdb->fd = -1;
+       tdb->name = NULL;
+       tdb->map_ptr = NULL;
+       tdb->flags = tdb_flags;
+       tdb->open_flags = open_flags;
+       tdb->log_fn = log_fn?log_fn:null_log_fn;
+       tdb->hash_fn = hash_fn ? hash_fn : default_tdb_hash;
+
+       if ((open_flags & O_ACCMODE) == O_WRONLY) {
+               TDB_LOG((tdb, 0, "tdb_open_ex: can't open tdb %s write-only\n",
+                        name));
+               errno = EINVAL;
+               goto fail;
+       }
+       
+       if (hash_size == 0)
+               hash_size = DEFAULT_HASH_SIZE;
+       if ((open_flags & O_ACCMODE) == O_RDONLY) {
+               tdb->read_only = 1;
+               /* read only databases don't do locking or clear if first */
+               tdb->flags |= TDB_NOLOCK;
+               tdb->flags &= ~TDB_CLEAR_IF_FIRST;
+       }
+
+       /* internal databases don't mmap or lock, and start off cleared */
+       if (tdb->flags & TDB_INTERNAL) {
+               tdb->flags |= (TDB_NOLOCK | TDB_NOMMAP);
+               tdb->flags &= ~TDB_CLEAR_IF_FIRST;
+               if (tdb_new_database(tdb, hash_size) != 0) {
+                       TDB_LOG((tdb, 0, "tdb_open_ex: tdb_new_database 
failed!"));
+                       goto fail;
+               }
+               goto internal;
+       }
+
+       if ((tdb->fd = open(name, open_flags, mode)) == -1) {
+               TDB_LOG((tdb, 5, "tdb_open_ex: could not open file %s: %s\n",
+                        name, strerror(errno)));
+               goto fail;      /* errno set by open(2) */
+       }
+
+       /* ensure there is only one process initialising at once */
+       if (tdb_brlock(tdb, GLOBAL_LOCK, F_WRLCK, F_SETLKW, 0) == -1) {
+               TDB_LOG((tdb, 0, "tdb_open_ex: failed to get global lock on %s: 
%s\n",
+                        name, strerror(errno)));
+               goto fail;      /* errno set by tdb_brlock */
+       }
+
+       /* we need to zero database if we are the only one with it open */
+       if ((tdb_flags & TDB_CLEAR_IF_FIRST) &&
+               (locked = (tdb_brlock(tdb, ACTIVE_LOCK, F_WRLCK, F_SETLK, 0) == 
0))) {
+               open_flags |= O_CREAT;
+               if (ftruncate(tdb->fd, 0) == -1) {
+                       TDB_LOG((tdb, 0, "tdb_open_ex: "
+                                "failed to truncate %s: %s\n",
+                                name, strerror(errno)));
+                       goto fail; /* errno set by ftruncate */
+               }
+       }
+
+       if (read(tdb->fd, &tdb->header, sizeof(tdb->header)) != 
sizeof(tdb->header)
+           || strcmp(tdb->header.magic_food, TDB_MAGIC_FOOD) != 0
+           || (tdb->header.version != TDB_VERSION
+               && !(rev = (tdb->header.version==TDB_BYTEREV(TDB_VERSION))))) {
+               /* its not a valid database - possibly initialise it */
+               if (!(open_flags & O_CREAT) || tdb_new_database(tdb, hash_size) 
== -1) {
+                       errno = EIO; /* ie bad format or something */
+                       goto fail;
+               }
+               rev = (tdb->flags & TDB_CONVERT);
+       }
+       vp = (uint8_t *)&tdb->header.version;
+       vertest = (((u32)vp[0]) << 24) | (((u32)vp[1]) << 16) |
+                 (((u32)vp[2]) << 8) | (u32)vp[3];
+       tdb->flags |= (vertest==TDB_VERSION) ? TDB_BIGENDIAN : 0;
+       if (!rev)
+               tdb->flags &= ~TDB_CONVERT;
+       else {
+               tdb->flags |= TDB_CONVERT;
+               convert(&tdb->header, sizeof(tdb->header));
+       }
+       if (fstat(tdb->fd, &st) == -1)
+               goto fail;
+
+       /* Is it already in the open list?  If so, fail. */
+       if (tdb_already_open(st.st_dev, st.st_ino)) {
+               TDB_LOG((tdb, 2, "tdb_open_ex: "
+                        "%s (%d,%d) is already open in this process\n",
+                        name, (int)st.st_dev, (int)st.st_ino));
+               errno = EBUSY;
+               goto fail;
+       }
+
+       if (!(tdb->name = (char *)talloc_strdup(tdb, name))) {
+               errno = ENOMEM;
+               goto fail;
+       }
+
+       tdb->map_size = st.st_size;
+       tdb->device = st.st_dev;
+       tdb->inode = st.st_ino;
+       tdb->locked = talloc_zero_array(tdb, struct tdb_lock_type,
+                                       tdb->header.hash_size+1);
+       if (!tdb->locked) {
+               TDB_LOG((tdb, 2, "tdb_open_ex: "
+                        "failed to allocate lock structure for %s\n",
+                        name));
+               errno = ENOMEM;
+               goto fail;
+       }
+       tdb_mmap(tdb);
+       if (locked) {
+               if (tdb_brlock(tdb, ACTIVE_LOCK, F_UNLCK, F_SETLK, 0) == -1) {
+                       TDB_LOG((tdb, 0, "tdb_open_ex: "
+                                "failed to take ACTIVE_LOCK on %s: %s\n",
+                                name, strerror(errno)));
+                       goto fail;
+               }
+
+       }
+
+       /* We always need to do this if the CLEAR_IF_FIRST flag is set, even if
+          we didn't get the initial exclusive lock as we need to let all other
+          users know we're using it. */
+
+       if (tdb_flags & TDB_CLEAR_IF_FIRST) {
+       /* leave this lock in place to indicate it's in use */
+       if (tdb_brlock(tdb, ACTIVE_LOCK, F_RDLCK, F_SETLKW, 0) == -1)
+               goto fail;
+       }
+
+
+ internal:
+       /* Internal (memory-only) databases skip all the code above to
+        * do with disk files, and resume here by releasing their
+        * global lock and hooking into the active list. */
+       if (tdb_brlock(tdb, GLOBAL_LOCK, F_UNLCK, F_SETLKW, 0) == -1)
+               goto fail;
+       tdb->next = tdbs;
+       tdbs = tdb;
+       return tdb;
+
+ fail:
+       { int save_errno = errno;
+
+       if (!tdb)
+               return NULL;
+       
+       if (tdb->map_ptr) {
+               if (tdb->flags & TDB_INTERNAL)
+                       SAFE_FREE(tdb->map_ptr);
+               else
+                       tdb_munmap(tdb);
+       }
+       SAFE_FREE(tdb->name);
+       if (tdb->fd != -1)
+               if (close(tdb->fd) != 0)
+                       TDB_LOG((tdb, 5, "tdb_open_ex: failed to close tdb->fd 
on error!\n"));
+       SAFE_FREE(tdb->locked);
+       SAFE_FREE(tdb);
+       errno = save_errno;
+       return NULL;
+       }
+}
+
+/**
+ * Close a database.
+ *
+ * @returns -1 for error; 0 for success.
+ **/
+int tdb_close(TDB_CONTEXT *tdb)
+{
+       TDB_CONTEXT **i;
+       int ret = 0;
+
+       if (tdb->map_ptr) {
+               if (tdb->flags & TDB_INTERNAL)
+                       SAFE_FREE(tdb->map_ptr);
+               else
+                       tdb_munmap(tdb);
+       }
+       SAFE_FREE(tdb->name);
+       if (tdb->fd != -1)
+               ret = close(tdb->fd);
+       SAFE_FREE(tdb->locked);
+
+       /* Remove from contexts list */
+       for (i = &tdbs; *i; i = &(*i)->next) {
+               if (*i == tdb) {
+                       *i = tdb->next;
+                       break;
+               }
+       }
+
+       memset(tdb, 0, sizeof(*tdb));
+       SAFE_FREE(tdb);
+
+       return ret;
+}
+
+/* lock/unlock entire database */
+int tdb_lockall(TDB_CONTEXT *tdb)
+{
+       u32 i;
+
+       /* There are no locks on read-only dbs */
+       if (tdb->read_only)
+               return TDB_ERRCODE(TDB_ERR_LOCK, -1);
+       for (i = 0; i < tdb->header.hash_size; i++) 
+               if (tdb_lock(tdb, i, F_WRLCK))
+                       break;
+
+       /* If error, release locks we have... */
+       if (i < tdb->header.hash_size) {
+               u32 j;
+
+               for ( j = 0; j < i; j++)
+                       tdb_unlock(tdb, j, F_WRLCK);
+               return TDB_ERRCODE(TDB_ERR_NOLOCK, -1);
+       }
+
+       return 0;
+}
+void tdb_unlockall(TDB_CONTEXT *tdb)
+{
+       u32 i;
+       for (i=0; i < tdb->header.hash_size; i++)
+               tdb_unlock(tdb, i, F_WRLCK);
+}
+
+/* lock/unlock one hash chain. This is meant to be used to reduce
+   contention - it cannot guarantee how many records will be locked */
+int tdb_chainlock(TDB_CONTEXT *tdb, TDB_DATA key)
+{
+       return tdb_lock(tdb, BUCKET(tdb->hash_fn(&key)), F_WRLCK);
+}
+
+int tdb_chainunlock(TDB_CONTEXT *tdb, TDB_DATA key)
+{
+       return tdb_unlock(tdb, BUCKET(tdb->hash_fn(&key)), F_WRLCK);
+}
+
+int tdb_chainlock_read(TDB_CONTEXT *tdb, TDB_DATA key)
+{
+       return tdb_lock(tdb, BUCKET(tdb->hash_fn(&key)), F_RDLCK);
+}
+
+int tdb_chainunlock_read(TDB_CONTEXT *tdb, TDB_DATA key)
+{
+       return tdb_unlock(tdb, BUCKET(tdb->hash_fn(&key)), F_RDLCK);
+}
+
+
+/* register a loging function */
+void tdb_logging_function(TDB_CONTEXT *tdb, void (*fn)(TDB_CONTEXT *, int , 
const char *, ...))
+{
+       tdb->log_fn = fn?fn:null_log_fn;
+}
+
+
+/* reopen a tdb - this can be used after a fork to ensure that we have an 
independent
+   seek pointer from our parent and to re-establish locks */
+int tdb_reopen(TDB_CONTEXT *tdb)
+{
+       struct stat st;
+
+       if (tdb->flags & TDB_INTERNAL)
+               return 0; /* Nothing to do. */
+       if (tdb_munmap(tdb) != 0) {
+               TDB_LOG((tdb, 0, "tdb_reopen: munmap failed (%s)\n", 
strerror(errno)));
+               goto fail;
+       }
+       if (close(tdb->fd) != 0)
+               TDB_LOG((tdb, 0, "tdb_reopen: WARNING closing tdb->fd 
failed!\n"));
+       tdb->fd = open(tdb->name, tdb->open_flags & ~(O_CREAT|O_TRUNC), 0);
+       if (tdb->fd == -1) {
+               TDB_LOG((tdb, 0, "tdb_reopen: open failed (%s)\n", 
strerror(errno)));
+               goto fail;
+       }
+       if (fstat(tdb->fd, &st) != 0) {
+               TDB_LOG((tdb, 0, "tdb_reopen: fstat failed (%s)\n", 
strerror(errno)));
+               goto fail;
+       }
+       if (st.st_ino != tdb->inode || st.st_dev != tdb->device) {
+               TDB_LOG((tdb, 0, "tdb_reopen: file dev/inode has changed!\n"));
+               goto fail;
+       }
+       tdb_mmap(tdb);
+       if ((tdb->flags & TDB_CLEAR_IF_FIRST) && (tdb_brlock(tdb, ACTIVE_LOCK, 
F_RDLCK, F_SETLKW, 0) == -1)) {
+               TDB_LOG((tdb, 0, "tdb_reopen: failed to obtain active lock\n"));
+               goto fail;
+       }
+
+       return 0;
+
+fail:
+       tdb_close(tdb);
+       return -1;
+}
+
+/* Not general: only works if single writer. */
+TDB_CONTEXT *tdb_copy(TDB_CONTEXT *tdb, const char *outfile)
+{
+       int fd, saved_errno;
+       TDB_CONTEXT *copy;
+
+       fd = open(outfile, O_TRUNC|O_CREAT|O_WRONLY, 0640);
+       if (fd < 0)
+               return NULL;
+       if (tdb->map_ptr) {
+               if (write(fd,tdb->map_ptr,tdb->map_size) != (int)tdb->map_size)
+                       goto fail;
+       } else {
+               char buf[65536];
+               int r;
+
+               lseek(tdb->fd, 0, SEEK_SET);
+               while ((r = read(tdb->fd, buf, sizeof(buf))) > 0) {
+                       if (write(fd, buf, r) != r)
+                               goto fail;
+               }
+               if (r < 0)
+                       goto fail;
+       }
+       copy = tdb_open(outfile, 0, 0, O_RDWR, 0);
+       if (!copy)
+               goto fail;
+       close(fd);
+       return copy;
+
+fail:
+       saved_errno = errno;
+       close(fd);
+       unlink(outfile);
+       errno = saved_errno;
+       return NULL;
+}
+
+/* reopen all tdb's */
+int tdb_reopen_all(void)
+{
+       TDB_CONTEXT *tdb;
+
+       for (tdb=tdbs; tdb; tdb = tdb->next) {
+               /* Ensure no clear-if-first. */
+               tdb->flags &= ~TDB_CLEAR_IF_FIRST;
+               if (tdb_reopen(tdb) != 0)
+                       return -1;
+       }
+
+       return 0;
+}
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/tdb.h
--- /dev/null   Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/tdb.h      Fri Sep 23 13:25:01 2005
@@ -0,0 +1,157 @@
+#ifndef __TDB_H__
+#define __TDB_H__
+
+/* 
+   Unix SMB/CIFS implementation.
+
+   trivial database library
+
+   Copyright (C) Andrew Tridgell 1999-2004
+   
+     ** NOTE! The following LGPL license applies to the tdb
+     ** library. This does NOT imply that all of Samba is released
+     ** under the LGPL
+   
+   This library is free software; you can redistribute it and/or
+   modify it under the terms of the GNU Lesser General Public
+   License as published by the Free Software Foundation; either
+   version 2 of the License, or (at your option) any later version.
+
+   This library is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+   Lesser General Public License for more details.
+
+   You should have received a copy of the GNU Lesser General Public
+   License along with this library; if not, write to the Free Software
+   Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
+*/
+
+#ifdef  __cplusplus
+extern "C" {
+#endif
+
+
+/* flags to tdb_store() */
+#define TDB_REPLACE 1
+#define TDB_INSERT 2
+#define TDB_MODIFY 3
+
+/* flags for tdb_open() */
+#define TDB_DEFAULT 0 /* just a readability place holder */
+#define TDB_CLEAR_IF_FIRST 1
+#define TDB_INTERNAL 2 /* don't store on disk */
+#define TDB_NOLOCK   4 /* don't do any locking */
+#define TDB_NOMMAP   8 /* don't use mmap */
+#define TDB_CONVERT 16 /* convert endian (internal use) */
+#define TDB_BIGENDIAN 32 /* header is big-endian (internal use) */
+
+#define TDB_ERRCODE(code, ret) ((tdb->ecode = (code)), ret)
+
+/* error codes */
+enum TDB_ERROR {TDB_SUCCESS=0, TDB_ERR_CORRUPT, TDB_ERR_IO, TDB_ERR_LOCK, 
+               TDB_ERR_OOM, TDB_ERR_EXISTS, TDB_ERR_NOLOCK, 
TDB_ERR_LOCK_TIMEOUT,
+               TDB_ERR_NOEXIST};
+
+#ifndef u32
+#define u32 unsigned
+#endif
+
+typedef struct TDB_DATA {
+       char *dptr;
+       size_t dsize;
+} TDB_DATA;
+
+typedef u32 tdb_len;
+typedef u32 tdb_off;
+
+/* this is stored at the front of every database */
+struct tdb_header {
+       char magic_food[32]; /* for /etc/magic */
+       u32 version; /* version of the code */
+       u32 hash_size; /* number of hash entries */
+       tdb_off rwlocks;
+       tdb_off reserved[31];
+};
+
+struct tdb_lock_type {
+       u32 count;
+       u32 ltype;
+};
+
+struct tdb_traverse_lock {
+       struct tdb_traverse_lock *next;
+       u32 off;
+       u32 hash;
+};
+
+#ifndef PRINTF_ATTRIBUTE
+#define PRINTF_ATTRIBUTE(a,b)
+#endif
+
+/* this is the context structure that is returned from a db open */
+typedef struct tdb_context {
+       char *name; /* the name of the database */
+       void *map_ptr; /* where it is currently mapped */
+       int fd; /* open file descriptor for the database */
+       tdb_len map_size; /* how much space has been mapped */
+       int read_only; /* opened read-only */
+       struct tdb_lock_type *locked; /* array of chain locks */
+       enum TDB_ERROR ecode; /* error code for last tdb error */
+       struct tdb_header header; /* a cached copy of the header */
+       u32 flags; /* the flags passed to tdb_open */
+       struct tdb_traverse_lock travlocks; /* current traversal locks */
+       struct tdb_context *next; /* all tdbs to avoid multiple opens */
+       dev_t device;   /* uniquely identifies this tdb */
+       ino_t inode;    /* uniquely identifies this tdb */
+       void (*log_fn)(struct tdb_context *tdb, int level, const char *, ...) 
PRINTF_ATTRIBUTE(3,4); /* logging function */
+       u32 (*hash_fn)(TDB_DATA *key);
+       int open_flags; /* flags used in the open - needed by reopen */
+} TDB_CONTEXT;
+
+typedef int (*tdb_traverse_func)(TDB_CONTEXT *, TDB_DATA, TDB_DATA, void *);
+typedef void (*tdb_log_func)(TDB_CONTEXT *, int , const char *, ...);
+typedef u32 (*tdb_hash_func)(TDB_DATA *key);
+
+TDB_CONTEXT *tdb_open(const char *name, int hash_size, int tdb_flags,
+                     int open_flags, mode_t mode);
+TDB_CONTEXT *tdb_open_ex(const char *name, int hash_size, int tdb_flags,
+                        int open_flags, mode_t mode,
+                        tdb_log_func log_fn,
+                        tdb_hash_func hash_fn);
+
+int tdb_reopen(TDB_CONTEXT *tdb);
+int tdb_reopen_all(void);
+void tdb_logging_function(TDB_CONTEXT *tdb, tdb_log_func);
+enum TDB_ERROR tdb_error(TDB_CONTEXT *tdb);
+const char *tdb_errorstr(TDB_CONTEXT *tdb);
+TDB_DATA tdb_fetch(TDB_CONTEXT *tdb, TDB_DATA key);
+int tdb_delete(TDB_CONTEXT *tdb, TDB_DATA key);
+int tdb_store(TDB_CONTEXT *tdb, TDB_DATA key, TDB_DATA dbuf, int flag);
+int tdb_append(TDB_CONTEXT *tdb, TDB_DATA key, TDB_DATA new_dbuf);
+int tdb_close(TDB_CONTEXT *tdb);
+TDB_DATA tdb_firstkey(TDB_CONTEXT *tdb);
+TDB_DATA tdb_nextkey(TDB_CONTEXT *tdb, TDB_DATA key);
+int tdb_traverse(TDB_CONTEXT *tdb, tdb_traverse_func fn, void *);
+int tdb_exists(TDB_CONTEXT *tdb, TDB_DATA key);
+int tdb_lockall(TDB_CONTEXT *tdb);
+void tdb_unlockall(TDB_CONTEXT *tdb);
+
+/* Low level locking functions: use with care */
+int tdb_chainlock(TDB_CONTEXT *tdb, TDB_DATA key);
+int tdb_chainunlock(TDB_CONTEXT *tdb, TDB_DATA key);
+int tdb_chainlock_read(TDB_CONTEXT *tdb, TDB_DATA key);
+int tdb_chainunlock_read(TDB_CONTEXT *tdb, TDB_DATA key);
+TDB_CONTEXT *tdb_copy(TDB_CONTEXT *tdb, const char *outfile);
+
+/* Debug functions. Not used in production. */
+void tdb_dump_all(TDB_CONTEXT *tdb);
+int tdb_printfreelist(TDB_CONTEXT *tdb);
+
+extern TDB_DATA tdb_null;
+
+#ifdef  __cplusplus
+}
+#endif
+
+#endif /* tdb.h */
diff -r 6aef7d1062bb -r 76af1a1df67c tools/xenstore/xs_tdb_dump.c
--- /dev/null   Fri Sep 23 13:24:58 2005
+++ b/tools/xenstore/xs_tdb_dump.c      Fri Sep 23 13:25:01 2005
@@ -0,0 +1,81 @@
+/* Simple program to dump out all records of TDB */
+#include <stdint.h>
+#include <stdlib.h>
+#include <fcntl.h>
+#include <stdio.h>
+
+#include "xs_lib.h"
+#include "tdb.h"
+#include "talloc.h"
+#include "utils.h"
+
+struct record_hdr {
+       u32 num_perms;
+       u32 datalen;
+       u32 childlen;
+       struct xs_permissions perms[0];
+};
+
+static u32 total_size(struct record_hdr *hdr)
+{
+       return sizeof(*hdr) + hdr->num_perms * sizeof(struct xs_permissions) 
+               + hdr->datalen + hdr->childlen;
+}
+
+static char perm_to_char(enum xs_perm_type perm)
+{
+       return perm == XS_PERM_READ ? 'r' :
+               perm == XS_PERM_WRITE ? 'w' :
+               perm == XS_PERM_NONE ? '-' :
+               perm == (XS_PERM_READ|XS_PERM_WRITE) ? 'b' :
+               '?';
+}
+
+int main(int argc, char *argv[])
+{
+       TDB_DATA key;
+       TDB_CONTEXT *tdb;
+
+       if (argc != 2)
+               barf("Usage: xs_tdb_dump <tdbfile>");
+
+       tdb = tdb_open(talloc_strdup(NULL, argv[1]), 0, 0, O_RDONLY, 0);
+       if (!tdb)
+               barf_perror("Could not open %s", argv[1]);
+
+       key = tdb_firstkey(tdb);
+       while (key.dptr) {
+               TDB_DATA data;
+               struct record_hdr *hdr;
+
+               data = tdb_fetch(tdb, key);
+               hdr = (void *)data.dptr;
+               if (data.dsize < sizeof(*hdr))
+                       fprintf(stderr, "%.*s: BAD truncated\n",
+                               key.dsize, key.dptr);
+               else if (data.dsize != total_size(hdr))
+                       fprintf(stderr, "%.*s: BAD length %i for %i/%i/%i 
(%i)\n",
+                               key.dsize, key.dptr, data.dsize,
+                               hdr->num_perms, hdr->datalen,
+                               hdr->childlen, total_size(hdr));
+               else {
+                       unsigned int i;
+                       char *p;
+
+                       printf("%.*s: ", key.dsize, key.dptr);
+                       for (i = 0; i < hdr->num_perms; i++)
+                               printf("%s%c%i",
+                                      i == 0 ? "" : ",",
+                                      perm_to_char(hdr->perms[i].perms),
+                                      hdr->perms[i].id);
+                       p = (void *)&hdr->perms[hdr->num_perms];
+                       printf(" %.*s\n", hdr->datalen, p);
+                       p += hdr->datalen;
+                       for (i = 0; i < hdr->childlen; i += strlen(p+i)+1)
+                               printf("\t-> %s\n", p+i);
+               }
+               key = tdb_nextkey(tdb, key);
+       }
+       return 0;
+}
+

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.