In this way, data and file system are guaranteed consistent after a recovery.
这样就可以保证系统恢复后数据和文件系统的一致性。
2
To maintain the integrity of a recovery log file, only a single client process can access the log at a time; this access can be assured using the exclusive network file locks discussed previously.