| 1. | All processes can read the locked file 所有进程有读访问权限。 |
| 2. | We ve examined how to create lock files correctly and alternatives 我们已经分析了如何正确地创建锁文件及其替代者。 |
| 3. | Alternatives to lock files 锁文件的代替者 |
| 4. | Make sure that only programs you can trust can add and remove these lock files 确保只有您可以信任的程序才能添加或者删除锁文件! |
| 5. | In a similar vein , you should place lock files for things like device lock files in var lock 根据同样的思路,您应该将设备锁文件之类的锁文件放置在/ var / lock中。 |
| 6. | Used by the gac cache lock files and the security configuration caching mechanism of the common language runtime 由gac缓存锁文件和公共语言运行库的安全配置缓存机制使用。 |
| 7. | Create files this way , even if the lock file already exists - which means that the lock won t work correctly for root 可以这样创建文件,即便锁文件已经存在,这意味着该锁不能为root正常工作。 |
| 8. | This can be caused by locked files , files in use , or files added to the install directory that were not part of the install 这可能是由于锁定的文件、在用文件或添加到非安装用安装目录的文件导致的。 |
| 9. | Path name to the main storage file . the names for supplemental files , including index and lock files , will be computed from this 主存储文件的路径名。追加的文件名称,其中包括索引和锁文件,都是从这里计算的获得的。 |
| 10. | Finally , the lock file can be erased as part of system start - up , so that if the system suddenly crashes , you won t have a stuck lock later 最后,锁文件的清除可以作为系统启动的一部分(从而使您的锁在系统突然崩溃之后不再处于挂起状态) 。 |