该问题可以查看以下文档:
LIBRARY CACHE LOCKS DUE TO INVALID LOGIN ATTEMPTS [ID 1309738.1]
In this Document
Symptoms
Changes
Cause
Solution
References
Applies to:
Oracle Server - Enterprise Edition - Version: 11.2.0.2 and later [Release: 11.2 and later ]Information in this document applies to any platform.
Symptoms
'Library cache lock' can be observed when concurrent users login with wrong password to the database.
Changes
Concurrent users with wrong password try to login to the database.Cause
The following call stack is in the blocking process in the system state dump:kglLockWait kgllkal kglLock kglget kziasfc
The above call stack functions closely matches the below Bug:
Bug:11742803 LOTS OF 'LIBRARY CACHE LOCK' DURING USER LOGON AUTENTICATION
Also:
Bug 7715339 - Logon failures causes "row cache lock" waits -
Document:7715339.8Allow disable of logon delay
@
Solution
Please set the below event in the init.ora file and restart the database.
EVENT="28401 TRACE NAME CONTEXT FOREVER, LEVEL 1"
After setting the above event, the "Library Cache Lock" issue during login with wrong password should disappear.
@
References
BUG:11742803 - LOTS OF 'LIBRARY CACHE LOCK' DURING USER LOGON AUTHENTICATION
###########################################################################################
Bug 11742803 : LOTS OF 'LIBRARY CACHE LOCK' DURING USER LOGON AUTHENTICATION
|
类型 | B - Defect | 已在产品版本中修复 | |
严重性 | 2 - Severe Loss of Service | 产品版本 | 11.2.0.2.0 |
状态 | 32 - Not a Bug. To Filer | 平台 | 226 - Linux x86-64 |
创建时间 | 2011-2-12 | 平台版本 | RED HAT ENTERPRISE LINUX 5 |
更新时间 | 2011-3-1 | 基本 Bug | N/A |
数据库版本 | 11.2.0.2.0 | 影响平台 | Generic |
产品源 | Oracle |
Hdr: 11742803 11.2.0.2.0 RDBMS 11.2.0.2.0 SECURITY PRODID-5 PORTID-226 Abstract: LOTS OF 'LIBRARY CACHE LOCK' DURING USER LOGON AUTHENTICATION *** 02/11/11 11:33 am *** ---- 3-2908278451 PROBLEM: -------- When application sessions try to connect to a 11gR2 database, sessions hung on "library cache lock" for short period of time DIAGNOSTIC ANALYSIS: -------------------- see below WORKAROUND: ----------- n/a RELATED BUGS: ------------- bug 9720182, but it's fixed in 11.2.0.2 REPRODUCIBILITY: ---------------- at customer site TEST CASE: ---------- n/a STACK TRACE: ------------ ksedsts()+461<-ksdxfstk()+32<-ksdxcb()+1900<-sspuser()+112<-__sighandler()<-se sfwaitctx()+14<-kglLockWait()+861<-kgllkal()+1025<-kglLock()+1242<-kglget()+34 7<-kziavua()+299<-kpolnb()+1457<-kpoauth()+622<-opiodr()+910<-ttcpip()+2289<-o pitsk()+1670<-opiino()+966<-opiodr()+910<-opidrv()+570<-sou2o()+103<-opimai_re al()+133<-ssthrdmain()+252<-main()+201<-__libc_start_main()+244<-_start()+37 SUPPORTING INFORMATION: ----------------------- 24 HOUR CONTACT INFORMATION FOR P1 BUGS: ---------------------------------------- n/a DIAL-IN INFORMATION: -------------------- n/a IMPACT DATE: ------------ currently on ct's production *** 02/11/11 11:51 am *** *** 02/11/11 11:52 am *** (CHG: Sta->11 Asg->BIYAN SubComp->SECURITY) *** 02/11/11 11:58 am *** *** 02/11/11 11:58 am *** *** 02/11/11 11:58 am *** *** 02/11/11 04:59 pm *** ESCALATED *** 02/21/11 04:12 pm *** *** 02/21/11 04:13 pm *** *** 02/21/11 08:35 pm *** *** 02/21/11 09:37 pm *** *** 02/21/11 09:37 pm *** (CHG: Sta->30) *** 02/21/11 09:37 pm *** *** 02/25/11 10:55 am *** *** 02/26/11 06:20 pm *** (CHG: Sta->32) *** 02/26/11 06:20 pm *** *** 02/28/11 11:11 pm ***