pg soft All these capabilities are meant to be accustomed to lock software-outlined assets, which can be determined both by a single sixty four-bit essential benefit or two 32-bit crucial values (Observe that these two key Areas tend not to overlap). If A different session currently holds a conflicting lock on precisely the same resource identif