xref: /titanic_50/usr/src/cmd/svc/configd/object.c (revision 1573d361e97690e67db291a1e0dc9a9b58f73fd8)
1 /*
2  * CDDL HEADER START
3  *
4  * The contents of this file are subject to the terms of the
5  * Common Development and Distribution License (the "License").
6  * You may not use this file except in compliance with the License.
7  *
8  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9  * or http://www.opensolaris.org/os/licensing.
10  * See the License for the specific language governing permissions
11  * and limitations under the License.
12  *
13  * When distributing Covered Code, include this CDDL HEADER in each
14  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15  * If applicable, add the following below this CDDL HEADER, with the
16  * fields enclosed by brackets "[]" replaced with your own identifying
17  * information: Portions Copyright [yyyy] [name of copyright owner]
18  *
19  * CDDL HEADER END
20  */
21 
22 /*
23  * Copyright 2008 Sun Microsystems, Inc.  All rights reserved.
24  * Use is subject to license terms.
25  */
26 
27 #pragma ident	"%Z%%M%	%I%	%E% SMI"
28 
29 /*
30  * This file only contains the transaction commit logic.
31  */
32 
33 #include <assert.h>
34 #include <alloca.h>
35 #include <errno.h>
36 #include <stdio.h>
37 #include <stdlib.h>
38 #include <strings.h>
39 #include <sys/sysmacros.h>
40 #include "configd.h"
41 
42 #define	INVALID_OBJ_ID ((uint32_t)-1)
43 #define	INVALID_TYPE ((uint32_t)-1)
44 
45 struct tx_cmd {
46 	const struct rep_protocol_transaction_cmd *tx_cmd;
47 	const char	*tx_prop;
48 	uint32_t	*tx_values;
49 	uint32_t	tx_nvalues;
50 	uint32_t	tx_orig_value_id;
51 	char		tx_found;
52 	char		tx_processed;
53 	char		tx_bad;
54 };
55 
56 static int
57 tx_cmd_compare(const void *key, const void *elem_arg)
58 {
59 	const struct tx_cmd *elem = elem_arg;
60 
61 	return (strcmp((const char *)key, elem->tx_prop));
62 }
63 
64 struct tx_commit_data {
65 	uint32_t	txc_pg_id;
66 	uint32_t	txc_gen;
67 	uint32_t	txc_oldgen;
68 	short		txc_backend;
69 	backend_tx_t	*txc_tx;
70 	backend_query_t	*txc_inserts;
71 	size_t		txc_count;
72 	rep_protocol_responseid_t txc_result;
73 	struct tx_cmd	txc_cmds[1];		/* actually txc_count */
74 };
75 #define	TX_COMMIT_DATA_SIZE(count) \
76 	offsetof(struct tx_commit_data, txc_cmds[count])
77 
78 /*ARGSUSED*/
79 static int
80 tx_check_genid(void *data_arg, int columns, char **vals, char **names)
81 {
82 	tx_commit_data_t *data = data_arg;
83 	assert(columns == 1);
84 	if (atoi(vals[0]) != data->txc_oldgen)
85 		data->txc_result = REP_PROTOCOL_FAIL_NOT_LATEST;
86 	else
87 		data->txc_result = REP_PROTOCOL_SUCCESS;
88 	return (BACKEND_CALLBACK_CONTINUE);
89 }
90 
91 /*
92  * tx_process_property() is called once for each property in current
93  * property group generation.  Its purpose is threefold:
94  *
95  *	1. copy properties not mentioned in the transaction over unchanged.
96  *	2. mark DELETEd properties as seen (they will be left out of the new
97  *	   generation).
98  *	3. consistancy-check NEW, CLEAR, and REPLACE commands.
99  *
100  * Any consistancy problems set tx_bad, and seen properties are marked
101  * tx_found.  These is used later, in tx_process_cmds().
102  */
103 /*ARGSUSED*/
104 static int
105 tx_process_property(void *data_arg, int columns, char **vals, char **names)
106 {
107 	tx_commit_data_t *data = data_arg;
108 	struct tx_cmd *elem;
109 
110 	const char *prop_name = vals[0];
111 	const char *prop_type = vals[1];
112 	const char *lnk_val_id = vals[2];
113 
114 	char *endptr;
115 
116 	assert(columns == 3);
117 
118 	elem = bsearch(prop_name, data->txc_cmds, data->txc_count,
119 	    sizeof (*data->txc_cmds), tx_cmd_compare);
120 
121 	if (elem == NULL) {
122 		backend_query_add(data->txc_inserts,
123 		    "INSERT INTO prop_lnk_tbl"
124 		    "    (lnk_pg_id, lnk_gen_id, lnk_prop_name, lnk_prop_type,"
125 		    "    lnk_val_id) "
126 		    "VALUES ( %d, %d, '%q', '%q', %Q );",
127 		    data->txc_pg_id, data->txc_gen, prop_name, prop_type,
128 		    lnk_val_id);
129 	} else {
130 		assert(!elem->tx_found);
131 		elem->tx_found = 1;
132 
133 		if (lnk_val_id != NULL) {
134 			errno = 0;
135 			elem->tx_orig_value_id =
136 			    strtoul(lnk_val_id, &endptr, 10);
137 			if (elem->tx_orig_value_id == 0 || *endptr != 0 ||
138 			    errno != 0) {
139 				return (BACKEND_CALLBACK_ABORT);
140 			}
141 		} else {
142 			elem->tx_orig_value_id = 0;
143 		}
144 
145 		switch (elem->tx_cmd->rptc_action) {
146 		case REP_PROTOCOL_TX_ENTRY_NEW:
147 			elem->tx_bad = 1;
148 			data->txc_result = REP_PROTOCOL_FAIL_EXISTS;
149 			break;
150 		case REP_PROTOCOL_TX_ENTRY_CLEAR:
151 			if (REP_PROTOCOL_BASE_TYPE(elem->tx_cmd->rptc_type) !=
152 			    prop_type[0] &&
153 			    REP_PROTOCOL_SUBTYPE(elem->tx_cmd->rptc_type) !=
154 			    prop_type[1]) {
155 				elem->tx_bad = 1;
156 				data->txc_result =
157 				    REP_PROTOCOL_FAIL_TYPE_MISMATCH;
158 			}
159 			break;
160 		case REP_PROTOCOL_TX_ENTRY_REPLACE:
161 			break;
162 		case REP_PROTOCOL_TX_ENTRY_DELETE:
163 			elem->tx_processed = 1;
164 			break;
165 		default:
166 			assert(0);
167 			break;
168 		}
169 	}
170 	return (BACKEND_CALLBACK_CONTINUE);
171 }
172 
173 /*
174  * tx_process_cmds() finishes the job tx_process_property() started:
175  *
176  *	1. if tx_process_property() marked a command as bad, we skip it.
177  *	2. if a DELETE, REPLACE, or CLEAR operated on a non-existant property,
178  *	    we mark it as bad.
179  *	3. we complete the work of NEW, REPLACE, and CLEAR, by inserting the
180  *	    appropriate values into the database.
181  *	4. we delete all replaced data, if it is no longer referenced.
182  *
183  * Finally, we check all of the commands, and fail if anything was marked bad.
184  */
185 static int
186 tx_process_cmds(tx_commit_data_t *data)
187 {
188 	int idx;
189 	int r;
190 	int count = data->txc_count;
191 	struct tx_cmd *elem;
192 	uint32_t val_id = 0;
193 	uint8_t type[3];
194 
195 	backend_query_t *q;
196 	int do_delete;
197 	uint32_t nvalues;
198 
199 	/*
200 	 * For persistent pgs, we use backend_fail_if_seen to abort the
201 	 * deletion if there is a snapshot using our current state.
202 	 *
203 	 * All of the deletions in this function are safe, since
204 	 * rc_tx_commit() guarantees that all the data is in-cache.
205 	 */
206 	q = backend_query_alloc();
207 
208 	if (data->txc_backend != BACKEND_TYPE_NONPERSIST) {
209 		backend_query_add(q,
210 		    "SELECT 1 FROM snaplevel_lnk_tbl "
211 		    "    WHERE (snaplvl_pg_id = %d AND snaplvl_gen_id = %d); ",
212 		    data->txc_pg_id, data->txc_oldgen);
213 	}
214 	backend_query_add(q,
215 	    "DELETE FROM prop_lnk_tbl"
216 	    "    WHERE (lnk_pg_id = %d AND lnk_gen_id = %d)",
217 	    data->txc_pg_id, data->txc_oldgen);
218 	r = backend_tx_run(data->txc_tx, q, backend_fail_if_seen, NULL);
219 	backend_query_free(q);
220 
221 	if (r == REP_PROTOCOL_SUCCESS)
222 		do_delete = 1;
223 	else if (r == REP_PROTOCOL_DONE)
224 		do_delete = 0;		/* old gen_id is in use */
225 	else
226 		return (r);
227 
228 	for (idx = 0; idx < count; idx++) {
229 		elem = &data->txc_cmds[idx];
230 
231 		if (elem->tx_bad)
232 			continue;
233 
234 		switch (elem->tx_cmd->rptc_action) {
235 		case REP_PROTOCOL_TX_ENTRY_DELETE:
236 		case REP_PROTOCOL_TX_ENTRY_REPLACE:
237 		case REP_PROTOCOL_TX_ENTRY_CLEAR:
238 			if (!elem->tx_found) {
239 				elem->tx_bad = 1;
240 				continue;
241 			}
242 			break;
243 		case REP_PROTOCOL_TX_ENTRY_NEW:
244 			break;
245 		default:
246 			assert(0);
247 			break;
248 		}
249 
250 		if (do_delete &&
251 		    elem->tx_cmd->rptc_action != REP_PROTOCOL_TX_ENTRY_NEW &&
252 		    elem->tx_orig_value_id != 0) {
253 			/*
254 			 * delete the old values, if they are not in use
255 			 */
256 			q = backend_query_alloc();
257 			backend_query_add(q,
258 			    "SELECT 1 FROM prop_lnk_tbl "
259 			    "    WHERE (lnk_val_id = %d); "
260 			    "DELETE FROM value_tbl"
261 			    "    WHERE (value_id = %d)",
262 			    elem->tx_orig_value_id, elem->tx_orig_value_id);
263 			r = backend_tx_run(data->txc_tx, q,
264 			    backend_fail_if_seen, NULL);
265 			backend_query_free(q);
266 			if (r != REP_PROTOCOL_SUCCESS && r != REP_PROTOCOL_DONE)
267 				return (r);
268 		}
269 
270 		if (elem->tx_cmd->rptc_action == REP_PROTOCOL_TX_ENTRY_DELETE)
271 			continue;		/* no further work to do */
272 
273 		type[0] = REP_PROTOCOL_BASE_TYPE(elem->tx_cmd->rptc_type);
274 		type[1] = REP_PROTOCOL_SUBTYPE(elem->tx_cmd->rptc_type);
275 		type[2] = 0;
276 
277 		if (elem->tx_nvalues == 0) {
278 			r = backend_tx_run_update(data->txc_tx,
279 			    "INSERT INTO prop_lnk_tbl"
280 			    "    (lnk_pg_id, lnk_gen_id, "
281 			    "    lnk_prop_name, lnk_prop_type, lnk_val_id) "
282 			    "VALUES ( %d, %d, '%q', '%q', NULL );",
283 			    data->txc_pg_id, data->txc_gen, elem->tx_prop,
284 			    type);
285 		} else {
286 			uint32_t *v;
287 			const char *str;
288 
289 			val_id = backend_new_id(data->txc_tx, BACKEND_ID_VALUE);
290 			if (val_id == 0)
291 				return (REP_PROTOCOL_FAIL_NO_RESOURCES);
292 			r = backend_tx_run_update(data->txc_tx,
293 			    "INSERT INTO prop_lnk_tbl "
294 			    "    (lnk_pg_id, lnk_gen_id, "
295 			    "    lnk_prop_name, lnk_prop_type, lnk_val_id) "
296 			    "VALUES ( %d, %d, '%q', '%q', %d );",
297 			    data->txc_pg_id, data->txc_gen, elem->tx_prop,
298 			    type, val_id);
299 
300 			v = elem->tx_values;
301 
302 			nvalues = elem->tx_nvalues;
303 			while (r == REP_PROTOCOL_SUCCESS &&
304 			    nvalues--) {
305 				str = (const char *)&v[1];
306 
307 				r = backend_tx_run_update(data->txc_tx,
308 				    "INSERT INTO value_tbl "
309 				    " (value_id, value_type, value_value) "
310 				    "VALUES (%d, '%c', '%q');\n",
311 				    val_id, elem->tx_cmd->rptc_type, str);
312 
313 				/*LINTED alignment*/
314 				v = (uint32_t *)((caddr_t)str + TX_SIZE(*v));
315 			}
316 		}
317 		if (r != REP_PROTOCOL_SUCCESS)
318 			return (REP_PROTOCOL_FAIL_UNKNOWN);
319 		elem->tx_processed = 1;
320 	}
321 
322 	for (idx = 0; idx < count; idx++) {
323 		elem = &data->txc_cmds[idx];
324 
325 		if (elem->tx_bad)
326 			return (REP_PROTOCOL_FAIL_BAD_TX);
327 	}
328 	return (REP_PROTOCOL_SUCCESS);
329 }
330 
331 static boolean_t
332 check_string(uintptr_t loc, uint32_t len, uint32_t sz)
333 {
334 	const char *ptr = (const char *)loc;
335 
336 	if (len == 0 || len > sz || ptr[len - 1] != 0 || strlen(ptr) != len - 1)
337 		return (0);
338 	return (1);
339 }
340 
341 static int
342 tx_check_and_setup(tx_commit_data_t *data, const void *cmds_arg,
343     uint32_t count)
344 {
345 	const struct rep_protocol_transaction_cmd *cmds;
346 	struct tx_cmd *cur;
347 	struct tx_cmd *prev = NULL;
348 
349 	uintptr_t loc;
350 	uint32_t sz, len;
351 	int idx;
352 
353 	loc = (uintptr_t)cmds_arg;
354 
355 	for (idx = 0; idx < count; idx++) {
356 		cur = &data->txc_cmds[idx];
357 
358 		cmds = (struct rep_protocol_transaction_cmd *)loc;
359 		cur->tx_cmd = cmds;
360 
361 		sz = cmds->rptc_size;
362 
363 		loc += REP_PROTOCOL_TRANSACTION_CMD_MIN_SIZE;
364 		sz -= REP_PROTOCOL_TRANSACTION_CMD_MIN_SIZE;
365 
366 		len = cmds->rptc_name_len;
367 		if (len <= 1 || !check_string(loc, len, sz)) {
368 			return (REP_PROTOCOL_FAIL_BAD_REQUEST);
369 		}
370 		cur->tx_prop = (const char *)loc;
371 
372 		len = TX_SIZE(len);
373 		loc += len;
374 		sz -= len;
375 
376 		cur->tx_nvalues = 0;
377 		cur->tx_values = (uint32_t *)loc;
378 
379 		while (sz > 0) {
380 			if (sz < sizeof (uint32_t))
381 				return (REP_PROTOCOL_FAIL_BAD_REQUEST);
382 
383 			cur->tx_nvalues++;
384 
385 			len = *(uint32_t *)loc;
386 			loc += sizeof (uint32_t);
387 			sz -= sizeof (uint32_t);
388 
389 			if (!check_string(loc, len, sz))
390 				return (REP_PROTOCOL_FAIL_BAD_REQUEST);
391 
392 			/*
393 			 * XXX here, we should be checking that the values
394 			 * match the purported type
395 			 */
396 
397 			len = TX_SIZE(len);
398 
399 			if (len > sz)
400 				return (REP_PROTOCOL_FAIL_BAD_REQUEST);
401 
402 			loc += len;
403 			sz -= len;
404 		}
405 
406 		if (prev != NULL && strcmp(prev->tx_prop, cur->tx_prop) >= 0)
407 			return (REP_PROTOCOL_FAIL_BAD_REQUEST);
408 
409 		prev = cur;
410 	}
411 	return (REP_PROTOCOL_SUCCESS);
412 }
413 
414 /*
415  * Free the memory associated with a tx_commit_data structure.
416  */
417 void
418 tx_commit_data_free(tx_commit_data_t *tx_data)
419 {
420 	uu_free(tx_data);
421 }
422 
423 /*
424  * Parse the data of a REP_PROTOCOL_PROPERTYGRP_TX_COMMIT message into a
425  * more useful form.  The data in the message will be represented by a
426  * tx_commit_data_t structure which is allocated by this function.  The
427  * address of the allocated structure is returned to *tx_data and must be
428  * freed by calling tx_commit_data_free().
429  *
430  * Parameters:
431  *	cmds_arg	Address of the commands in the
432  *			REP_PROTOCOL_PROPERTYGRP_TX_COMMIT message.
433  *
434  *	cmds_sz		Number of message bytes at cmds_arg.
435  *
436  *	tx_data		Points to the place to receive the address of the
437  *			allocated memory.
438  *
439  * Fails with
440  *	_BAD_REQUEST
441  *	_NO_RESOURCES
442  */
443 int
444 tx_commit_data_new(const void *cmds_arg, size_t cmds_sz,
445     tx_commit_data_t **tx_data)
446 {
447 	const struct rep_protocol_transaction_cmd *cmds;
448 	tx_commit_data_t *data;
449 	uintptr_t loc;
450 	uint32_t count;
451 	uint32_t sz;
452 	int ret;
453 
454 	/*
455 	 * First, verify that the reported sizes make sense, and count
456 	 * the number of commands.
457 	 */
458 	count = 0;
459 	loc = (uintptr_t)cmds_arg;
460 
461 	while (cmds_sz > 0) {
462 		cmds = (struct rep_protocol_transaction_cmd *)loc;
463 
464 		if (cmds_sz <= REP_PROTOCOL_TRANSACTION_CMD_MIN_SIZE)
465 			return (REP_PROTOCOL_FAIL_BAD_REQUEST);
466 
467 		sz = cmds->rptc_size;
468 		if (sz <= REP_PROTOCOL_TRANSACTION_CMD_MIN_SIZE)
469 			return (REP_PROTOCOL_FAIL_BAD_REQUEST);
470 
471 		sz = TX_SIZE(sz);
472 		if (sz > cmds_sz)
473 			return (REP_PROTOCOL_FAIL_BAD_REQUEST);
474 
475 		loc += sz;
476 		cmds_sz -= sz;
477 		count++;
478 	}
479 
480 	data = uu_zalloc(TX_COMMIT_DATA_SIZE(count));
481 	if (data == NULL)
482 		return (REP_PROTOCOL_FAIL_NO_RESOURCES);
483 
484 	/*
485 	 * verify that everything looks okay, and set up our command
486 	 * datastructures.
487 	 */
488 	data->txc_count = count;
489 	ret = tx_check_and_setup(data, cmds_arg, count);
490 	if (ret == REP_PROTOCOL_SUCCESS) {
491 		*tx_data = data;
492 	} else {
493 		*tx_data = NULL;
494 		uu_free(data);
495 	}
496 	return (ret);
497 }
498 
499 /*
500  * The following are a set of accessor functions to retrieve data from a
501  * tx_commit_data_t that has been allocated by tx_commit_data_new().
502  */
503 
504 /*
505  * Return the action of the transaction command whose command number is
506  * cmd_no.  The action is placed at *action.
507  *
508  * Returns:
509  *	_FAIL_BAD_REQUEST	cmd_no is out of range.
510  */
511 int
512 tx_cmd_action(tx_commit_data_t *tx_data, size_t cmd_no,
513     enum rep_protocol_transaction_action *action)
514 {
515 	struct tx_cmd *cur;
516 
517 	assert(cmd_no < tx_data->txc_count);
518 	if (cmd_no >= tx_data->txc_count)
519 		return (REP_PROTOCOL_FAIL_BAD_REQUEST);
520 
521 	cur = &tx_data->txc_cmds[cmd_no];
522 	*action = cur->tx_cmd->rptc_action;
523 	return (REP_PROTOCOL_SUCCESS);
524 }
525 
526 /*
527  * Return the number of transaction commands held in tx_data.
528  */
529 size_t
530 tx_cmd_count(tx_commit_data_t *tx_data)
531 {
532 	return (tx_data->txc_count);
533 }
534 
535 /*
536  * Return the number of property values that are associated with the
537  * transaction command whose number is cmd_no.  The number of values is
538  * returned to *nvalues.
539  *
540  * Returns:
541  *	_FAIL_BAD_REQUEST	cmd_no is out of range.
542  */
543 int
544 tx_cmd_nvalues(tx_commit_data_t *tx_data, size_t cmd_no, uint32_t *nvalues)
545 {
546 	struct tx_cmd *cur;
547 
548 	assert(cmd_no < tx_data->txc_count);
549 	if (cmd_no >= tx_data->txc_count)
550 		return (REP_PROTOCOL_FAIL_BAD_REQUEST);
551 
552 	cur = &tx_data->txc_cmds[cmd_no];
553 	*nvalues = cur->tx_nvalues;
554 	return (REP_PROTOCOL_SUCCESS);
555 }
556 
557 /*
558  * Return a pointer to the property name of the command whose number is
559  * cmd_no.  The property name pointer is returned to *pname.
560  *
561  * Returns:
562  *	_FAIL_BAD_REQUEST	cmd_no is out of range.
563  */
564 int
565 tx_cmd_prop(tx_commit_data_t *tx_data, size_t cmd_no, const char **pname)
566 {
567 	struct tx_cmd *cur;
568 
569 	assert(cmd_no < tx_data->txc_count);
570 	if (cmd_no >= tx_data->txc_count)
571 		return (REP_PROTOCOL_FAIL_BAD_REQUEST);
572 
573 	cur = &tx_data->txc_cmds[cmd_no];
574 	*pname = cur->tx_prop;
575 	return (REP_PROTOCOL_SUCCESS);
576 }
577 
578 /*
579  * Return the property type of the property whose command number is
580  * cmd_no.  The property type is returned to *ptype.
581  *
582  * Returns:
583  *	_FAIL_BAD_REQUEST	cmd_no is out of range.
584  */
585 int
586 tx_cmd_prop_type(tx_commit_data_t *tx_data, size_t cmd_no, uint32_t *ptype)
587 {
588 	struct tx_cmd *cur;
589 
590 	assert(cmd_no < tx_data->txc_count);
591 	if (cmd_no >= tx_data->txc_count)
592 		return (REP_PROTOCOL_FAIL_BAD_REQUEST);
593 
594 	cur = &tx_data->txc_cmds[cmd_no];
595 	*ptype = cur->tx_cmd->rptc_type;
596 	return (REP_PROTOCOL_SUCCESS);
597 }
598 
599 /*
600  * This function is used to retrieve a property value from the transaction
601  * data.  val_no specifies which value is to be retrieved from the
602  * transaction command whose number is cmd_no.  A pointer to the specified
603  * value is placed in *val.
604  *
605  * Returns:
606  *	_FAIL_BAD_REQUEST	cmd_no or val_no is out of range.
607  */
608 int
609 tx_cmd_value(tx_commit_data_t *tx_data, size_t cmd_no, uint32_t val_no,
610     const char **val)
611 {
612 	const char *bp;
613 	struct tx_cmd *cur;
614 	uint32_t i;
615 	uint32_t value_len;
616 
617 	assert(cmd_no < tx_data->txc_count);
618 	if (cmd_no >= tx_data->txc_count)
619 		return (REP_PROTOCOL_FAIL_BAD_REQUEST);
620 
621 	cur = &tx_data->txc_cmds[cmd_no];
622 	assert(val_no < cur->tx_nvalues);
623 	if (val_no >= cur->tx_nvalues)
624 		return (REP_PROTOCOL_FAIL_BAD_REQUEST);
625 
626 	/* Find the correct value */
627 	bp = (char *)cur->tx_values;
628 	for (i = 0; i < val_no; i++) {
629 		/* LINTED alignment */
630 		value_len = *(uint32_t *)bp;
631 		bp += sizeof (uint32_t) + TX_SIZE(value_len);
632 	}
633 
634 	/* Bypass the count & return pointer to value. */
635 	bp += sizeof (uint32_t);
636 	*val = bp;
637 	return (REP_PROTOCOL_SUCCESS);
638 }
639 
640 int
641 object_tx_commit(rc_node_lookup_t *lp, tx_commit_data_t *data, uint32_t *gen)
642 {
643 	uint32_t new_gen;
644 	int ret;
645 	rep_protocol_responseid_t r;
646 	backend_tx_t *tx;
647 	backend_query_t *q;
648 	int backend = lp->rl_backend;
649 
650 	ret = backend_tx_begin(backend, &tx);
651 	if (ret != REP_PROTOCOL_SUCCESS)
652 		return (ret);
653 
654 	/* Make sure the pg is up-to-date. */
655 	data->txc_oldgen = *gen;
656 	data->txc_backend = backend;
657 	data->txc_result = REP_PROTOCOL_FAIL_NOT_FOUND;
658 
659 	q = backend_query_alloc();
660 	backend_query_add(q, "SELECT pg_gen_id FROM pg_tbl WHERE (pg_id = %d);",
661 	    lp->rl_main_id);
662 	r = backend_tx_run(tx, q, tx_check_genid, data);
663 	backend_query_free(q);
664 
665 	if (r != REP_PROTOCOL_SUCCESS ||
666 	    (r = data->txc_result) != REP_PROTOCOL_SUCCESS) {
667 		backend_tx_rollback(tx);
668 		goto end;
669 	}
670 
671 	/* If the transaction is empty, cut out early. */
672 	if (data->txc_count == 0) {
673 		backend_tx_rollback(tx);
674 		r = REP_PROTOCOL_DONE;
675 		goto end;
676 	}
677 
678 	new_gen = backend_new_id(tx, BACKEND_ID_GENERATION);
679 	if (new_gen == 0) {
680 		backend_tx_rollback(tx);
681 		return (REP_PROTOCOL_FAIL_NO_RESOURCES);
682 	}
683 
684 	data->txc_pg_id = lp->rl_main_id;
685 	data->txc_gen = new_gen;
686 	data->txc_tx = tx;
687 
688 	r = backend_tx_run_update(tx,
689 	    "UPDATE pg_tbl SET pg_gen_id = %d "
690 	    "    WHERE (pg_id = %d AND pg_gen_id = %d);",
691 	    new_gen, lp->rl_main_id, *gen);
692 
693 	if (r != REP_PROTOCOL_SUCCESS) {
694 		backend_tx_rollback(tx);
695 		goto end;
696 	}
697 
698 	q = backend_query_alloc();
699 
700 	backend_query_add(q,
701 	    "SELECT lnk_prop_name, lnk_prop_type, lnk_val_id "
702 	    "FROM prop_lnk_tbl "
703 	    "WHERE (lnk_pg_id = %d AND lnk_gen_id = %d)",
704 	    lp->rl_main_id, *gen);
705 
706 	data->txc_inserts = backend_query_alloc();
707 	r = backend_tx_run(tx, q, tx_process_property, data);
708 	backend_query_free(q);
709 
710 	if (r == REP_PROTOCOL_DONE)
711 		r = REP_PROTOCOL_FAIL_UNKNOWN;		/* corruption */
712 
713 	if (r != REP_PROTOCOL_SUCCESS ||
714 	    (r = data->txc_result) != REP_PROTOCOL_SUCCESS) {
715 		backend_query_free(data->txc_inserts);
716 		backend_tx_rollback(tx);
717 		goto end;
718 	}
719 
720 	r = backend_tx_run(tx, data->txc_inserts, NULL, NULL);
721 	backend_query_free(data->txc_inserts);
722 
723 	if (r != REP_PROTOCOL_SUCCESS) {
724 		backend_tx_rollback(tx);
725 		goto end;
726 	}
727 
728 	r = tx_process_cmds(data);
729 	if (r != REP_PROTOCOL_SUCCESS) {
730 		backend_tx_rollback(tx);
731 		goto end;
732 	}
733 	r = backend_tx_commit(tx);
734 
735 	if (r == REP_PROTOCOL_SUCCESS)
736 		*gen = new_gen;
737 end:
738 	return (r);
739 }
740