Solved

library cache load lock

Posted on 2002-06-05
3
1,464 Views
Last Modified: 2012-05-04
I want to find the object that cause an "library cache load lock" event on v$session_wait.

How do you use the "object address" in the event (p2raw) to find the command or object that cause the event?

0
Comment
Question by:Santunes
3 Comments
 
LVL 3

Accepted Solution

by:
UsamaMunir earned 125 total points
ID: 7057427
The wait parameters of library cache lock & pin waits

are
p1 The address in the memory of the libraray cache handle

p2 The memory address of the lock and pin structure

p3 is encoded as 10*mode+namespace
                  mode = 3 shared, 5 exclusive
                  The namespaces are
                  0 cursor
                  1 Table, procedure & others
                  2 package body
                  3 trigger
                  4 index
                  5 cluster
                  6 object
                  7 pipe

i am looking into how can u get the exact name of the Object, lets see..watching and learning

Peace
UsamaMunir        
0
 
LVL 7

Assisted Solution

by:waynezhu
waynezhu earned 125 total points
ID: 7057536

The X$KGLLK maybe what you need.

Pay special attention to the columns:

KGLLKADR
KGLLKSES
KGLLKHDL
USER_NAME
KGLNAOBJ

where KGLLKHDL is the handle address (
or in another word object address) which
is related to the p1/p1raw; KGLLKADR may
be related to lock address p2/p2raw (I
am not sure on this); KGLNAOBJ is
the name of the state object; KGLLKSES
can be joined with SADDR of V$SESSION.

You may try the following for more information:

Join v$session and v$session_wait to find the
session of your interest, and
"select * from v$kgllk" for the session(s).

Do more research as necessary.

Good luck.

0
 
LVL 5

Expert Comment

by:jpkemp
ID: 9025045
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
Split between UsamaMunir & waynezhu
Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
jpkemp
EE Cleanup Volunteer
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Why doesn't the Oracle optimizer use my index? Querying too much data Most Oracle developers know that an index is useful when you can use it to restrict your result set to a small number of the total rows in a table. So, the obvious side…
Checking the Alert Log in AWS RDS Oracle can be a pain through their user interface.  I made a script to download the Alert Log, look for errors, and email me the trace files.  In this article I'll describe what I did and share my script.
This video explains at a high level about the four available data types in Oracle and how dates can be manipulated by the user to get data into and out of the database.
This video shows how to configure and send email from and Oracle database using both UTL_SMTP and UTL_MAIL, as well as comparing UTL_SMTP to a manual SMTP conversation with a mail server.

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now