From 780b92ada9afcf1d58085a83a0b9e6bc982203d1 Mon Sep 17 00:00:00 2001
From: Lorry Tar Creator
Date: Tue, 17 Feb 2015 17:25:57 +0000
Subject: Imported from
/home/lorry/working-area/delta_berkeleydb/db-6.1.23.tar.gz.
---
docs/installation/build_win_notes.html | 110 ++++++++++++++++++++-------------
1 file changed, 68 insertions(+), 42 deletions(-)
(limited to 'docs/installation/build_win_notes.html')
diff --git a/docs/installation/build_win_notes.html b/docs/installation/build_win_notes.html
index ccc4efde..9aa16fca 100644
--- a/docs/installation/build_win_notes.html
+++ b/docs/installation/build_win_notes.html
@@ -14,7 +14,7 @@
-
If a system memory environment is closed by all processes, subsequent
-attempts to open it will return an error. To successfully open a
-transactional environment in this state, recovery must be run by the
-next process to open the environment. For non-transactional
-environments, applications should remove the existing environment and
-then create a new database environment.
+
+ If a system memory environment is closed by all
+ processes, subsequent attempts to open it will return an
+ error. To successfully open a transactional environment in
+ this state, recovery must be run by the next process to
+ open the environment. For non-transactional environments,
+ applications should remove the existing environment and
+ then create a new database environment.
+
- - Berkeley DB does not support the Windows/95, Windows/98 or
- Windows/ME platforms.
- - On Windows, system paging file memory is freed on last close. For this
-reason, multiple processes sharing a database environment created using
-the DB_SYSTEM_MEM flag must arrange for at least one process to
-always have the environment open, or alternatively that any process
-joining the environment be prepared to re-create it.
- - When using the DB_SYSTEM_MEM flag, Berkeley DB shared regions are
-created without ACLs, which means that the regions are only accessible
-to a single user. If wider sharing is appropriate (for example, both
-user applications and Windows/NT service applications need to access
-the Berkeley DB regions), the Berkeley DB code will need to be modified to create
-the shared regions with the correct ACLs. Alternatively, by not
-specifying the DB_SYSTEM_MEM flag, filesystem-backed regions
-will be created instead, and the permissions on those files may be
-directly specified through the DB_ENV->open() method.
- - Applications that operate on wide character strings can use the
-Windows function WideCharToMultiByte with the code page CP_UTF8 to
-convert paths to the form expected by Berkeley DB. Internally, Berkeley DB calls
-MultiByteToWideChar on paths before calling Windows functions.
- - Various Berkeley DB methods take a mode argument, which is intended
-to specify the underlying file permissions for created files. Berkeley DB
-currently ignores this argument on Windows systems.
-
It would be possible to construct a set of security attributes to pass to
-CreateFile that accurately represents the mode. In the worst
-case, this would involve looking up user and all group names, and creating
-an entry for each. Alternatively, we could call the _chmod
-(partial emulation) function after file creation, although this leaves us
-with an obvious race.
Practically speaking, however, these efforts would be largely meaningless
-on a FAT file system, which only has a "readable" and "writable" flag,
-applying to all users.
+ -
+ Berkeley DB does not support the Windows XP,
+ Windows 2003 or earlier Windows platforms.
+
+ -
+ On Windows, system paging file memory is freed on
+ last close. For this reason, multiple processes sharing a
+ database environment created using the DB_SYSTEM_MEM
+ flag must arrange for at least one process to always have
+ the environment open, or alternatively that any process
+ joining the environment be prepared to re-create it.
+
+ -
+ When using the DB_SYSTEM_MEM flag, Berkeley DB
+ shared regions are created without ACLs, which means that
+ the regions are only accessible to a single user. If wider
+ sharing is appropriate (for example, both user
+ applications and Windows/NT service applications need to
+ access the Berkeley DB regions), the Berkeley DB code will
+ need to be modified to create the shared regions with the
+ correct ACLs. Alternatively, by not specifying the
+ DB_SYSTEM_MEM flag, filesystem-backed regions will be
+ created instead, and the permissions on those files may be
+ directly specified through the DB_ENV->open() method.
+
+ -
+ Applications that operate on wide character strings
+ can use the Windows function WideCharToMultiByte with the
+ code page CP_UTF8 to convert paths to the form expected by
+ Berkeley DB. Internally, Berkeley DB calls
+ MultiByteToWideChar on paths before calling Windows
+ functions.
+
+ -
+ Various Berkeley DB methods take a mode argument, which is
+ intended to specify the underlying file permissions for
+ created files. Berkeley DB currently ignores this argument
+ on Windows systems.
+
+ It would be possible to
+ construct a set of security attributes to pass to
+ CreateFile that
+ accurately represents the mode. In the worst case,
+ this would involve looking up user and all group
+ names, and creating an entry for each. Alternatively,
+ we could call the _chmod
+ (partial emulation) function
+ after file creation, although this leaves us with an
+ obvious race.
+
+ Practically speaking, however, these efforts would
+ be largely meaningless on a FAT file system, which
+ only has a "readable" and "writable" flag, applying to
+ all users.
+
@@ -91,7 +116,8 @@ applying to all users.
Next |
- Running the test suite under Windows |
+ Running the test suite under
+ Windows |
Home
|
--
cgit v1.2.1