设为首页 加入收藏

TOP

Oracle事务原理探究2--读书笔记五(七)
2015-07-24 11:48:20 来源: 作者: 【 】 浏览:21
Tags:Oracle 事务 原理 探究 2-- 读书 笔记
mp of buffer cache at level 4 for tsn=0, rdba=4284777 Itl Xid Uba Flag Lck Scn/Fsc 0x01 0x0003.015.0000065c 0x00c009af.01e8.1c C--- 0 scn 0x0000.0035e07c --标记被清除了 0x02 0x0004.00b.00000595 0x00c02694.0109.1d ---- 1 fsc 0x0000.00000000 --锁住了修改的行 bdba: 0x00416169 data_block_dump,data header at 0x1ce9705c undo块转储结果

?

?

*** 2015-01-04 22:53:40.834
===================
Undo Segment Header
===================
Start dump data blocks tsn: 2 file#:3 minblk 176 maxblk 176
Block dump from cache:
Dump of buffer cache at level 4 for tsn=2, rdba=12583088
.....
TRN TBL::
 
  index  state cflags  wrap#    uel         scn            dba            parent-xid    nub     stmt_num    cmt
  ------------------------------------------------------------------------------------------------
   0x00    9    0x00  0x0593  0x000c  0x0000.0035df6c  0x00c02693  0x0000.000.00000000  0x00000002   0x00000000  1420382305
   0x01    9    0x00  0x056d  0x001e  0x0000.0035dcd1  0x00c02692  0x0000.000.00000000  0x00000001   0x00000000  1420381360
   0x02    9    0x00  0x0591  0x0005  0x0000.0035de9e  0x00c02692  0x0000.000.00000000  0x00000001   0x00000000  1420381960
   0x03    9    0x00  0x0594  0x0018  0x0000.0035e16f  0x00c02694  0x0000.000.00000000  0x00000001   0x00000000  1420382905
   0x04    9    0x00  0x0594  0x001f  0x0000.0035e189  0x00c02694  0x0000.000.00000000  0x00000001   0x00000000  1420382905
   0x05    9    0x00  0x0594  0x0009  0x0000.0035deed  0x00c02692  0x0000.000.00000000  0x00000001   0x00000000  1420382080
   0x06    9    0x00  0x0594  0x0019  0x0000.0035e080  0x00c02694  0x0000.000.00000000  0x00000001   0x00000000  1420382629
   0x07    9    0x00  0x0593  0x0002  0x0000.0035de5e  0x00c02692  0x0000.000.00000000  0x00000001   0x00000000  1420381815
   0x08    9    0x00  0x0594  0x000a  0x0000.0035e089  0x00c02693  0x0000.000.00000000  0x00000001   0x00000000  1420382629
   0x09    9    0x00  0x0592  0x001d  0x0000.0035df03  0x00c02692  0x0000.000.00000000  0x00000001   0x00000000  1420382080
   0x0a    9    0x00  0x0593  0x0011  0x0000.0035e0b8  0x00c02694  0x0000.000.00000000  0x00000001   0x00000000  1420382639
   0x0b   10    0x80  0x0595  0x0003  0x0000.00000000  0x00c02694  0x0000.000.00000000  0x00000001   0x00000000  0 --跟数据块的事务槽对上了
   0x0c    9    0x00  0x0594  0x001c  0x0000.0035dfad  0x00c02693  0x0000.000.00000000  0x00000001   0x00000000  1420382440
   0x0d    9    0x00  0x0592  0x0014  0x0000.0035ddac  0x00c02692  0x0000.000.00000000  0x00000001   0x00000000  1420381705
 .....
*-----------------------------
* Rec #0x1d ?slt: 0x0b ?objn: 77560(0x00012ef8) ?objd: 77560 ?tblspc: 0(0x00000000)
* ? ? ? Layer: ?11 (Row) ? opc: 1 ? rci 0x00 ??
Undo type: ?Regular undo ? ?Begin trans ? ?Last buffer split: ?No?
Temp Object: ?No?
Tablespace Undo: ?No?
rdba: 0x00000000Ext idx: 0
flg2: 0
*-----------------------------
uba: 0x00c02694.0109.1c ctl max scn: 0x0000.0035dc32 prv tx scn: 0x0000.0035dc72
txn start scn: scn: 0x0000.0035e1d6 logon user: 0
?prev brb: 12592785 prev bcl: 0
KDO undo record:
KTB Redo?
op: 0x03 ?ver: 0x01 ?
compat bit: 4 (post-11) padding: 0
op: Z
KDO Op code: URP row dependencies Disabled
? xtype: XA flags: 0x00000000 ?bdba: 0x00416169 ?hdba: 0x00416168
itli: 2 ?ispac: 0 ?maxfr: 4863
tabn: 0 slot: 0(0x0) flag: 0x2c lock: 0 ckix: 0
ncol: 2 nnew: 1 size: -1
col ?1: [ 2] ?c1 02-- 这是数据块事务槽uba的地址指向的undo记录,c1 02 代表着1,说明修改前是1.

?

序号3执行完后

数据块转储结果

*** 2015-01-04 23:06:25.105
Block dump from cache:
Dump of buffer cache at level 4 for tsn=0, rdba=4284777
.....
Itl           Xid                  Uba         Flag  Lck        Scn/Fsc
0x01   0x0003.015.0000065c  0x00c0
首页 上一页 4 5 6 7 8 9 下一页 尾页 7/9/9
】【打印繁体】【投稿】【收藏】 【推荐】【举报】【评论】 【关闭】 【返回顶部
分享到: 
上一篇oracle建立索引常用的规则 下一篇Oracle中deferred_segment_creati..

评论

帐  号: 密码: (新用户注册)
验 证 码:
表  情:
内  容:

·C++ 语言社区-CSDN社 (2025-12-24 17:48:24)
·CSDN问答专区社区-CS (2025-12-24 17:48:22)
·C++中`a = b = c`与` (2025-12-24 17:48:19)
·C语言结构体怎么直接 (2025-12-24 17:19:44)
·为什么指针作为c语言 (2025-12-24 17:19:41)