From 780b92ada9afcf1d58085a83a0b9e6bc982203d1 Mon Sep 17 00:00:00 2001
From: Lorry Tar Creator
Date: Tue, 17 Feb 2015 17:25:57 +0000
Subject: Imported from
/home/lorry/working-area/delta_berkeleydb/db-6.1.23.tar.gz.
---
docs/programmer_reference/am_sync.html | 56 +++++++++++++++++++++-------------
1 file changed, 34 insertions(+), 22 deletions(-)
(limited to 'docs/programmer_reference/am_sync.html')
diff --git a/docs/programmer_reference/am_sync.html b/docs/programmer_reference/am_sync.html
index 12ac2310..366cdbfb 100644
--- a/docs/programmer_reference/am_sync.html
+++ b/docs/programmer_reference/am_sync.html
@@ -14,7 +14,7 @@
- The DB->sync() method flushes all modified records from the database
-cache to disk.
-
- It is important to understand that flushing cached information
-to disk only minimizes the window of opportunity for corrupted data, it
-does not eliminate the possibility.
-
-
- While unlikely, it is possible for database corruption to happen if a
-system or application crash occurs while writing data to the database. To
-ensure that database corruption never occurs, applications must either:
+ The DB->sync() method flushes all modified records from the
+ database cache to disk.
+
+
+ It is important to understand that
+ flushing cached information to disk only minimizes the
+ window of opportunity for corrupted data, it does not
+ eliminate the possibility.
+
+
+ While unlikely, it is possible for database corruption to
+ happen if a system or application crash occurs while writing
+ data to the database. To ensure that database corruption never
+ occurs, applications must either:
+
- - Use transactions and logging with automatic recovery.
- - Use logging and application-specific recovery.
- - Edit a copy of the database, and, once all applications
-using the database have successfully called DB->close(), use
-system operations (for example, the POSIX rename system call) to
-atomically replace the original database with the updated copy.
+ -
+ Use transactions and logging with automatic
+ recovery.
+
+ -
+ Use logging and application-specific
+ recovery.
+
+ -
+ Edit a copy of the database, and, once all
+ applications using the database have successfully called
+ DB->close(), use system operations (for example, the POSIX
+ rename system call) to atomically replace the original
+ database with the updated copy.
+
@@ -72,7 +83,8 @@ atomically replace the original database with the updated copy.
Next |
- Database verification and salvage |
+ Database verification and
+ salvage |
Home
|
--
cgit v1.2.1