使用dbms_transaction來獲得事務ID
一般找出當前事務ID與復原段最常見的方法就是執行以下SQL
SQL> select xidusn, xidslot, xidsqn from v$transaction, v$session where saddr=ses_addr;
XIDUSN XIDSLOT XIDSQN
---------- ---------- ----------
6 27 9338
而最簡單與最容易的方法是使用dbms_transaction PL/SQL包。下面使用一個例子來進行說明如何使用dbms_transaction PL/SQL包來找出當前事務ID,並使用undo header dump資訊來進行驗證。
SQL> select dbms_transaction.local_transaction_id from dual;
LOCAL_TRANSACTION_ID
--------------------------------------------------------------------------------
SQL> set transaction read write;
Transaction set.
SQL> select dbms_transaction.local_transaction_id from dual;
LOCAL_TRANSACTION_ID
--------------------------------------------------------------------------------
6.27.9339
6 --> undo segment number(USN) undo段號
27 --> Transaction slot in the transaction list 事務列表中的事務插槽
9339 --> Sequence number(the number of times the given slot has been used) 序號(給定的事務插槽被使用的次數)
上面的事務ID可以通過undo segment的undo header dump資訊來進行驗證
1.找到復原段名
SQL> select * from v$rollname where USN=6;
USN NAME
---------- ------------------------------
6 _SYSSMU6_3214712007$
2.轉儲復原段header
SQL> alter system dump undo header '_SYSSMU6_3214712007$';
System altered.
SQL> select
2 d.value||'/'||lower(rtrim(i.instance,
3 chr(0)))||'_ora_'||p.spid||'.trc' trace_file_name
4 from ( select p.spid
5 from v$mystat m,
6 v$session s,v$process p
7 where m.statistic# = 1 and s.sid = m.sid and p.addr = s.paddr) p,
8 ( select t.instance from v$thread t,v$parameter v
9 where v.name = 'thread' and
10 (v.value = 0 or t.thread# = to_number(v.value))) i,
11 ( select value from v$parameter
12 where name = 'user_dump_dest') d;
TRACE_FILE_NAME
--------------------------------------------------------------------------------
/u01/app/Oracle/diag/rdbms/jyrac/jyrac1/trace/jyrac1_ora_16785.trc
追蹤檔案資訊如下:
Unix process pid: 16785, image: oracle@jyrac1 (TNS V1-V3)
*** 2016-04-28 09:10:02.380
*** SESSION ID:(147.9205) 2016-04-28 09:10:02.380
*** CLIENT ID:() 2016-04-28 09:10:02.380
*** SERVICE NAME:(SYS$USERS) 2016-04-28 09:10:02.380
*** MODULE NAME:(sqlplus@jyrac1 (TNS V1-V3)) 2016-04-28 09:10:02.380
*** ACTION NAME:() 2016-04-28 09:10:02.380
********************************************************************************
Undo Segment: _SYSSMU6_3214712007$ (6)
********************************************************************************
Extent Control Header
-----------------------------------------------------------------
Extent Header:: spare1: 0 spare2: 0 #extents: 3 #blocks: 143
last map 0x00000000 #maps: 0 offset: 4080
Highwater:: 0x00c00aaa ext#: 2 blk#: 42 ext size: 128
#blocks in seg. hdr's freelists: 0
#blocks below: 0
mapblk 0x00000000 offset: 2
Unlocked
Map Header:: next 0x00000000 #extents: 3 obj#: 0 flag: 0x40000000
Extent Map
-----------------------------------------------------------------
0x00c000d1 length: 7
0x00c00108 length: 8
0x00c00a80 length: 128
Retention Table
-----------------------------------------------------------
Extent Number:0 Commit Time: 1461797986
Extent Number:1 Commit Time: 1461800269
Extent Number:2 Commit Time: 1461796031
TRN CTL:: seq: 0x0c6a chd: 0x001e ctl: 0x001f inc: 0x00000000 nfb: 0x0000
mgc: 0xb000 xts: 0x0068 flg: 0x0001 opt: 2147483646 (0x7ffffffe)
uba: 0x00c00aa6.0c6a.18 scn: 0x0000.014ce06a
Version: 0x01
FREE BLOCK POOL::
uba: 0x00000000.0c6a.17 ext: 0x2 spc: 0x128c
uba: 0x00000000.0c6a.02 ext: 0x2 spc: 0x1ace
uba: 0x00000000.0c6a.14 ext: 0x2 spc: 0x13fe
uba: 0x00000000.0bc3.01 ext: 0x2 spc: 0x1f84
uba: 0x00000000.0000.00 ext: 0x0 spc: 0x0
TRN TBL::
index state cflags wrap# uel scn dba parent-xid nub stmt_num cmt
------------------------------------------------------------------------------------------------
0x00 9 0x00 0x2471 0x001a 0x0000.014ce250 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804655
0x01 9 0x00 0x2479 0x0008 0x0000.014ce7f8 0x00c00aa9 0x0000.000.00000000 0x00000001 0x00000000 1461805256
0x02 9 0x00 0x2476 0x000c 0x0000.014ce44e 0x00c00aa6 0x0000.000.00000000 0x00000001 0x00000000 1461805136
0x03 9 0x00 0x2472 0x000b 0x0000.014ce2d5 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804775
0x04 9 0x00 0x2477 0x0000 0x0000.014ce210 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804595
0x05 9 0x00 0x2478 0x0017 0x0000.014ce3d0 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461805015
0x06 9 0x00 0x2478 0x0018 0x0000.014ce4db 0x00c00aa6 0x0000.000.00000000 0x00000001 0x00000000 1461805245
0x07 9 0x00 0x2479 0x000e 0x0000.014ce353 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804894
0x08 9 0x00 0x2476 0x0016 0x0000.014ce815 0x00c00aa9 0x0000.000.00000000 0x00000001 0x00000000 1461805256
0x09 9 0x00 0x247e 0x0012 0x0000.014ce74b 0x00c00aa9 0x0000.000.00000000 0x00000001 0x00000000 1461805247
0x0a 9 0x00 0x2477 0x001d 0x0000.014ce10d 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804355
0x0b 9 0x00 0x247a 0x0007 0x0000.014ce326 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804835
0x0c 9 0x00 0x2471 0x000f 0x0000.014ce4d9 0x00c00aa9 0x0000.000.00000000 0x00000001 0x00000000 1461805245
0x0d 9 0x00 0x2473 0x001c 0x0000.014ce284 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804715
0x0e 9 0x00 0x2478 0x0011 0x0000.014ce358 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804894
0x0f 9 0x00 0x2470 0x0006 0x0000.014ce4da 0x00c00aaa 0x0000.000.00000000 0x00000003 0x00000000 1461805245
0x10 9 0x00 0x2477 0x0001 0x0000.014ce7e8 0x00c00aa9 0x0000.000.00000000 0x00000001 0x00000000 1461805256
0x11 9 0x00 0x2472 0x0005 0x0000.014ce38a 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804954
0x12 9 0x00 0x2478 0x0010 0x0000.014ce7d8 0x00c00aa9 0x0000.000.00000000 0x00000001 0x00000000 1461805256
0x13 9 0x00 0x2473 0x0003 0x0000.014ce2c0 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804775
0x14 9 0x00 0x247a 0x0004 0x0000.014ce1a2 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804474
0x15 9 0x00 0x2476 0x000a 0x0000.014ce106 0x00000000 0x0000.000.00000000 0x00000000 0x00000000 1461804355
0x16 9 0x00 0x246d 0x001f 0x0000.014ce867 0x00000000 0x0000.000.00000000 0x00000000 0x00000000 1461805315
0x17 9 0x00 0x2473 0x0019 0x0000.014ce3f4 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461805040
0x18 9 0x00 0x247a 0x0009 0x0000.014ce5a4 0x00c00aa9 0x0000.000.00000000 0x00000001 0x00000000 1461805245
0x19 9 0x00 0x2475 0x0002 0x0000.014ce441 0x00c00aa6 0x0000.000.00000000 0x00000002 0x00000000 1461805135
0x1a 9 0x00 0x2478 0x000d 0x0000.014ce254 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804655
0x1b 10 0x80 0x247b 0x0002 0x0000.014ce8fc 0x00000000 0x0000.000.00000000 0x00000000 0x00000000 0
0x1c 9 0x00 0x2477 0x0013 0x0000.014ce2b7 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804775
0x1d 9 0x00 0x2474 0x0014 0x0000.014ce155 0x00c00aa5 0x0000.000.00000000 0x00000001 0x00000000 1461804415
0x1e 9 0x00 0x246d 0x0021 0x0000.014ce079 0x00c00aa3 0x0000.000.00000000 0x00000001 0x00000000 1461804174
0x1f 9 0x00 0x2477 0xffff 0x0000.014ce8de 0x00c00aa6 0x0000.000.00000000 0x00000001 0x00000000 1461805376
0x20 9 0x00 0x2478 0x0015 0x0000.014ce0dc 0x00000000 0x0000.000.00000000 0x00000000 0x00000000 1461804295
0x21 9 0x00 0x2479 0x0020 0x0000.014ce0a7 0x00c00aa3 0x0000.000.00000000 0x00000001 0x00000000 1461804235
EXT TRN CTL::
usn: 6
sp1:0x00000000 sp2:0x00000000 sp3:0x00000000 sp4:0x00000000
sp5:0x00000000 sp6:0x00000000 sp7:0x00000000 sp8:0x00000000
EXT TRN TBL::
index extflag extHash extSpare1 extSpare2
---------------------------------------------------
0x00 0x00000000 0x00000000 0x00000000 0x00000000
0x01 0x00000000 0x00000000 0x00000000 0x00000000
0x02 0x00000000 0x00000000 0x00000000 0x00000000
0x03 0x00000000 0x00000000 0x00000000 0x00000000
0x04 0x00000000 0x00000000 0x00000000 0x00000000
0x05 0x00000000 0x00000000 0x00000000 0x00000000
0x06 0x00000000 0x00000000 0x00000000 0x00000000
0x07 0x00000000 0x00000000 0x00000000 0x00000000
0x08 0x00000000 0x00000000 0x00000000 0x00000000
0x09 0x00000000 0x00000000 0x00000000 0x00000000
0x0a 0x00000000 0x00000000 0x00000000 0x00000000
0x0b 0x00000000 0x00000000 0x00000000 0x00000000
0x0c 0x00000000 0x00000000 0x00000000 0x00000000
0x0d 0x00000000 0x00000000 0x00000000 0x00000000
0x0e 0x00000000 0x00000000 0x00000000 0x00000000
0x0f 0x00000000 0x00000000 0x00000000 0x00000000
0x10 0x00000000 0x00000000 0x00000000 0x00000000
0x11 0x00000000 0x00000000 0x00000000 0x00000000
0x12 0x00000000 0x00000000 0x00000000 0x00000000
0x13 0x00000000 0x00000000 0x00000000 0x00000000
0x14 0x00000000 0x00000000 0x00000000 0x00000000
0x15 0x00000000 0x00000000 0x00000000 0x00000000
0x16 0x00000000 0x00000000 0x00000000 0x00000000
0x17 0x00000000 0x00000000 0x00000000 0x00000000
0x18 0x00000000 0x00000000 0x00000000 0x00000000
0x19 0x00000000 0x00000000 0x00000000 0x00000000
0x1a 0x00000000 0x00000000 0x00000000 0x00000000
0x1b 0x00000000 0x00000000 0x00000000 0x00000000
0x1c 0x00000000 0x00000000 0x00000000 0x00000000
0x1d 0x00000000 0x00000000 0x00000000 0x00000000
0x1e 0x00000000 0x00000000 0x00000000 0x00000000
0x1f 0x00000000 0x00000000 0x00000000 0x00000000
0x20 0x00000000 0x00000000 0x00000000 0x00000000
0x21 0x00000000 0x00000000 0x00000000 0x00000000
從Undo Segment: _SYSSMU6_3214712007$ (6)可以知道復原段號是6,找到 state為10的記錄
index state cflags wrap# uel scn dba parent-xid nub stmt_num cmt
------------------------------------------------------------------------------------------------
0x1b 10 0x80 0x247b 0x0002 0x0000.014ce8fc 0x00000000 0x0000.000.00000000 0x00000000 0x00000000 0
其中0x1b=27
SQL> select to_number('1b','xxx') from dual;
TO_NUMBER('1B','XXX')
---------------------
27
0x247b=9339
SQL> select to_number('247b','xxxx') from dual;
TO_NUMBER('247B','XXXX')
------------------------
9339
從上面的資訊可以看到與我們使用dbms_transaction PL/SQL包所獲得的事務ID資訊一致。
本文永久更新連結地址: