分享一下我老师大神的人工智能教程!零基础,通俗易懂!http://blog.csdn.net/jiangjunshow
也欢迎大家转载本篇文章。分享知识,造福人民,实现我们中华民族伟大复兴!
(Doc ID 445076.1),
Solution
Acquiring a lock is a series of steps from getting an index number to identify the hash bucket in the hash table to releasing free resource structures and lock data structures.
Here are the steps:
1. Identifying the Hash Chain and Allocating the Resource Structure
Oracle finds the resource structure associated with the named resource using a hashing algorithm.
In the hashing algorithm Oracle uses a hash table (array of hash buckets), which is controlled by
the parameter _ENQUEUE_HASH. The size of the hash table depends upon the value of this parameter.
The Hash chain contains the resource structures for that hash value. When a session tries to
acquire an enqueue, Oracle applies a hash function to convert the resource name to an index number
in the array of hash buckets. Each hash bucket has one linked list attached to it, which is called
a hash chain. Before accessing the hash bucket, the session acquires an enqueue hash chain latch.
After the session acquires an enqueue hash chain latch it moves down the hash chain attached