The program tha acquires the lock could probably write a human-readable name as meta-information on the lock file itself, so other instances could use that on their error messages.
The program tha acquires the lock could probably write a human-readable name as meta-information on the lock file itself, so other instances could use that on their error messages.