ORA-3137(12333)错误

又是一个内部错误,而这个错误在9i以前似乎并不常见。

 

 

alert中错误信息如下:

Errors in file /db/oracle/app/oracle/diag/rdbms/ora00/ora001/trace/ora001_ora_4262.trc:
ORA-03137: TTC
协议内部错误: [12333] [5] [113] [105] [] [] [] []

而对应的trace文件中包含的信息为:

Trace file /db/oracle/app/oracle/diag/rdbms/ora00/ora001/trace/ora001_ora_4262.trc
Oracle Database 11g Enterprise Edition Release 11.1.0.6.0 - 64bit Production
With the Partitioning, Real Application Clusters, OLAP, Data Mining
and Real Application Testing options
ORACLE_HOME = /db/oracle/app/oracle/11.1.0
System name: SunOS
Node name: f232
Release: 5.10
Version: Generic_141414-07
Machine: sun4u
Instance name: ora001
Redo thread mounted by this instance: 1
Oracle process number: 266
Unix process pid: 4262, image: oracle@f232


*** 2010-12-01 17:14:11.542
*** SESSION ID:(567.54793) 2010-12-01 17:14:11.542
*** CLIENT ID:() 2010-12-01 17:14:11.542
*** SERVICE NAME:(ora00) 2010-12-01 17:14:11.542
*** MODULE NAME:(JDBC Thin Client) 2010-12-01 17:14:11.542
*** ACTION NAME:() 2010-12-01 17:14:11.542
 
--- PROTOCOL VIOLATION DETECTED ---
----- Dump Cursor sql_id=47uwpqb1dfj2k xsc=0xffffffff7d0570c0 cur=0xffffffff7d041b10 -----
Dump Parent Cursor sql_id=47uwpqb1dfj2k phd=0x44773c678 plk=0x445a4ca68
 sqltxt(0x44773c678)=select A.dataObjectId,A.relation ObjectIdRelation,B.dataObjectName,B.deptId,B.relation DimensionRelation,B.typeId,B.systemId from t_DataObjectOfUserPermission A,t_DataObject B where A.userId=:1 and A.permissionId=:2 and A.dataObjectId=B.dataObjectId
  hash=1161a686a228a7e243eb95b2c2d74452
  parent=0x420b95408 maxchild=256 plk=0x445a4ca68 ppn=n
cursor instantiation=0xffffffff7d0570c0 used=1291194851 exec_id=16976012 exec=7
 child#255(0x445130ec8) pcs=0x42128feb0
  clk=0x445a4c8e0 ci=0x42128fb80 pn=0x445e990b8 ctx=0x4b3ad46f8
 kgsccflg=1 llk[0xffffffff7d0570c8,0xffffffff7d0570c8] idx=53
 xscflg=c0110676 fl2=5d000009 fl3=42222008 fl4=180
 sharing failure(s)=100004000
----- Bind Info (kkscoacd) -----
 Bind#0
  acdty=01 mxl=32(10) mxlc=00 mal=00 scl=00 pre=00
  acflg=03 fl2=1000010 frm=01 csi=852 siz=64 ff=0
  kxsbbbfp=ffffffff7ddb1b90  bln=32  avl=00  flg=05
 Bind#1
  acdty=01 mxl=32(24) mxlc=00 mal=00 scl=00 pre=00
  acflg=03 fl2=1000010 frm=01 csi=852 siz=0 ff=32
  kxsbbbfp=ffffffff7ddb1bb0  bln=32  avl=00  flg=01
 Frames pfr 0xffffffff7ddb1f78 siz=112928 efr 0xffffffff7ddb1e58 siz=112912
 kxscphp=0xffffffff7d0507e8 siz=984 inu=488 nps=424
 kxscbhp=0xffffffff7d050248 siz=984 inu=240 nps=88
 kxscwhp=0xffffffff7d050338 siz=4056 inu=880 nps=72
Starting SQL statement dump
SQL Information
user_id=92 user_name=RBAC module=JDBC Thin Client action=
sql_id=47uwpqb1dfj2k plan_hash_value=-500536361 problem_type=4
----- Current SQL Statement for this session (sql_id=47uwpqb1dfj2k) -----
select A.dataObjectId,A.relation ObjectIdRelation,B.dataObjectName,B.deptId,B.relation DimensionRelation,B.typeId,B.systemId from t_DataObjectOfUserPermission A,t_DataObject B where A.userId=:1 and A.permissionId=:2 and A.dataObjectId=B.dataObjectId
sql_text_length=251
sql=select A.dataObjectId,A.relation ObjectIdRelation,B.dataObjectName,B.deptId,B.relation DimensionRelation,B.typeId,B.systemId from t_DataObjectOfUserPermission A,t_DataObject B where A.userId=:1 and A.permissionId=:2 and A.dataObjectId=B.dataObjectId
====================== END SQL Statement Dump ======================
ttcdrvdmp: msg-5 ln-971 reporting 12333

--------------------
 PROTOCOL VIOLATION
--------------------
-----Page before-----
109B37180 11 69 00 01 01 01 01 03 03 5E 00 02 80 29 00 01  [.i.......^...)..]
109B37190 01 FA 01 01 0D 00 00 00 00 04 7F FF FF FF 01 01  [................]
109B371A0 02 00 00 00 00 00 00 00 FE 40 73 65 6C 65 63 74  [.........@select]
109B371B0 20 41 2E 64 61 74 61 4F 62 6A 65 63 74 49 64 2C  [ A.dataObjectId,]
109B371C0 41 2E 72 65 6C 61 74 69 6F 6E 20 4F 62 6A 65 63  [A.relation Objec]
109B371D0 74 49 64 52 65 6C 61 74 69 6F 6E 2C 42 2E 64 61  [tIdRelation,B.da]
109B371E0 74 61 4F 62 6A 65 63 74 4E 61 40 6D 65 2C 42 2E  [taObjectNa@me,B.]
109B371F0 64 65 70 74 49 64 2C 42 2E 72 65 6C 61 74 69 6F  [deptId,B.relatio]
109B37200 6E 20 44 69 6D 65 6E 73 69 6F 6E 52 65 6C 61 74  [n DimensionRelat]
109B37210 69 6F 6E 2C 42 2E 74 79 70 65 49 64 2C 42 2E 73  [ion,B.typeId,B.s]
109B37220 79 73 74 65 6D 49 64 20 66 72 6F 40 6D 20 74 5F  [ystemId fro@m t_]
109B37230 44 61 74 61 4F 62 6A 65 63 74 4F 66 55 73 65 72  [DataObjectOfUser]
109B37240 50 65 72 6D 69 73 73 69 6F 6E 20 41 2C 74 5F 44  [Permission A,t_D]
109B37250 61 74 61 4F 62 6A 65 63 74 20 42 20 77 68 65 72  [ataObject B wher]
109B37260 65 20 41 2E 75 73 65 72 49 64 3D 3A 3A 31 20 61  [e A.userId=::1 a]
109B37270 6E 64 20 41 2E 70 65 72 6D 69 73 73 69 6F 6E 49  [nd A.permissionI]
109B37280 64 3D 3A 32 20 61 6E 64 20 41 2E 64 61 74 61 4F  [d=:2 and A.dataO]
109B37290 62 6A 65 63 74 49 64 3D 42 2E 64 61 74 61 4F 62  [bjectId=B.dataOb]
109B372A0 6A 65 63 74 49 64 20 00 01 01 00 00 00 00 00 00  [jectId .........]
109B372B0 01 01 00 00 00 00 00 01 03 00 00 01 0A 00 01 10  [................]
109B372C0 00 00 02 03 54 01 00 01 03 00 00 01 18 00 01 10  [....T...........]
109B372D0 00 00 02 03 54 01 00 07 05 71 69                 [....T....qi]    
-----Current Page-----
nsbfdbpt 0x109b37180
ifccrcp = 0x109b372db, ifccrcl = 0x109b372eb
buffer length = 16
109B372D0                                  61 6E 71 0C 31             [anq.1]
109B372E0 31 5F 30 30 30 35 5F 30 30 31 36                 [1_0005_0016]    
hstflg:  0x40002d91
hstcflg: 0x00000000
hstpro:  6
hstccs:  (DESCRIPTION=(address=(protocol=tcp)(host=10.1.4.203)(port=1521))(CONNECT_DATA=(CID=(PROGRAM=)(HOST=__jdbc__)(USER=))(server=dedicated)(service_name=ora00)))
--- dump of hsttti ---
109936A60                         00 04 01 0C 0E 09 0B 0F          [........]
109936A70 04 0A 03 03 01 00 00 0A 00 00 00 00 00 00 00 01  [................]
109936A80 01 05 05 05 05 05 05 05 06 06 00 00 00 00 00 07  [................]
109936A90 03 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00  [................]
109936AA0 00 00 13 00 00 00 00 00 00 00 00 00 0C 00 00 00  [................]
109936AB0 00 00 14 00 00 00 00 00 00 00 00 00 00 00 00 00  [................]
109936AC0 00 00 00 0D 00 00 11 11 04 09 00 00 01 01 05 00  [................]
109936AD0 22 00 12 00 13 13 15 15 17 17 17 17 21 03 00 00  ["...........!...]
109936AE0 03 13 13 13 00 00 00 00 00 00 00 00 00 00 00 00  [................]
109936AF0 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00  [................]
109936B00 0F 0F 0F 1F 20 00 00 00 00 00 00 00 00 00 00 00  [.... ...........]
109936B10 00 00 00 00 0F 00 00 00 00 00 00 00 01 01 01 01  [................]
109936B20 2A 00 00 2A 2A 2B 2B 00 00 00 00 23 23 23 00 00  [*..**++....###..]
109936B30 00 00 00 00 00 00 00 00 22 00 00 00 00 00 00 00  [........".......]
109936B40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35  [...............5]
109936B50 2A 05 00 00 00 00 00 00 00 13 00 00 00 00 00 00  [*...............]
109936B60 00 00 00 00 00 00 00 36 00 00 00 00 00 00 00 00  [.......6........]
109936B70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  [................]
109936B80 00 00 00 00 00 00 00 00 00 00 03 01 03 03 03 00  [................]
109936B90 00 00 03 03 03 03 03 03 03 03 03 03 03 03 03 03  [................]
109936BA0 03 03 00 03 03 03 03 03 03 03 03 03 00 00 00 03  [................]
109936BB0 03 03 00 03 00 03 03 03 03 03 03 03 03 03 03 01  [................]
109936BC0 00 03 03 00 03 03 00 00 00 00 03 03 00 00 00 03  [................]
109936BD0 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00  [................]
109936BE0 00 00 00 00 03 03 03 03 03 03 03 03 03 03 03 03  [................]
109936BF0 00 03 03 03 03 03 03 03 03 03 00 00 03 03 03 03  [................]
109936C00 00 00 00 00 00 03 03 03 03 03 03 03 03 03 03 03  [................]
109936C10 03 03 03 03 00 03 03 03 03 03 00 00 00 00 00 00  [................]
109936C20 00 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00  [................]
109936C30 00 00 24 25 26 27 28 1E 00 00 00 03 00 00 00 00  [..$%&'(.........]
109936C40 00 00 00 00 00 00 00 00 00 00 00 2C 00 00 00 00  [...........,....]
109936C50 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00  [................]
109936C60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  [................]
109936C70 00 00 00 00 00 00 00 00 00 00 00 00 1A 00 00 00  [................]
109936C80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  [................]
109936C90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  [................]
109936CA0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  [................]
109936CB0 00 00                                            [..]             
ttclxlccst:     852
ttclxrccst:     871
ttclxlncst:     2000
ttclxrncst:     2000
ttclxccl2nr:    3
ttclxccn2lr:    2
ttclxncl2nr:    1
ttclxncn2lr:    1
ttclxrccminbpc: 1
ttclxrccmaxbpc: 3
ttclxrncminbpc: 2
ttclxrncmaxbpc: 2
ttclxflags:     0x03
prev funcode: 0x5e

*** 2010-12-01 17:14:11.544
----- Error Stack Dump -----
ORA-03137: TTC
协议内部错误: [12333] [5] [113] [105] [] [] [] []
----- Current SQL Statement for this session (sql_id=47uwpqb1dfj2k) -----
select A.dataObjectId,A.relation ObjectIdRelation,B.dataObjectName,B.deptId,B.relation DimensionRelation,B.typeId,B.systemId from t_DataObjectOfUserPermission A,t_DataObject B where A.userId=:1 and A.permissionId=:2 and A.dataObjectId=B.dataObjectId

----- Call Stack Trace -----
calling              call     entry                argument values in hex     
location             type     point                (? means dubious value)    
-------------------- -------- -------------------- ----------------------------
ksedst1()+96         CALL     skdstdst()           FFFFFFFF7FFFA940 ?
                                                   000335800 ?
                                                   FFFFFFFF7FFD24C8 ?
                                                   000000000 ?
                                                   FFFFFFFF7FFD24C8 ?
                                                   1095E7FB0 ?
ksedst()+56          CALL     ksedst1()            000000000 ? 000000001 ?
                                                   00010992B ? 000109800 ?
                                                   109923000 ? 000109923 ?
dbkedDefDump()+1388  CALL     ksedst()             000000000 ? 000000000 ?
                                                   000000000 ? 000000000 ?
                                                   10992B000 ? 00010992B ?
opiierr()+316        CALL     ksedmp()             00010887F ? 000109800 ?
                                                   10992B000 ? 10887F000 ?
                                                   000108800 ? 10993D000 ?
opitsk()+10440       CALL     opiierr()            000000000 ? 000000001 ?
                                                   00010915B ? 000000001 ?
                                                   00000229C ? 000000005 ?
opiino()+992         CALL     opitsk()             000000000 ? 00000005E ?
                                                   10858C89C ? 00000000A ?
                                                   109936718 ? 10915A1B0 ?
opiodr()+1344        PTR_CALL 0000000000000000     000380000 ? 109936788 ?
                                                   000000000 ? 000A54563 ?
                                                   00000009D ?
                                                   FFFFFFFF7FFFF158 ?
opidrv()+1060        CALL     opiodr()             1085A8000 ? 000000004 ?
                                                   000000000 ? 000109800 ?
                                                   1085A7000 ? 109936000 ?
sou2o()+76           CALL     opidrv()             000000000 ? 1099242E8 ?
                                                   00000003C ? 000109800 ?
                                                   000000000 ? 109924498 ?
main()+648           CALL     sou2o()              FFFFFFFF7FFFF130 ?
                                                   00000003C ? 000000004 ?
                                                   FFFFFFFF7FFFF158 ?
                                                   10928B000 ? 00010928B ?
_start()+380         CALL     main()               000108E71 ?
                                                   FFFFFFFF7FFFF288 ?
                                                   000000000 ? 000000000 ?
                                                   FFFFFFFF7FFFF298 ?
                                                   000000002 ?
 

--------------------- Binary Stack Dump ---------------------

这是11.1.0.6上的一个bugID 752297.1metalink文档ID 752297.1描述了这个,利用11.1.0.6JDBC瘦客户端驱动访问11.1.0.6数据库可能导致这个错误。

解决这个问题需要将数据库版本升级到11.1.0.7,但是Oracle也提到,即使升级到11.1.0.7也不能完全避免这个错误,除非升级到11.2以上的版本,否则在错误日志中仍然可以偶尔发现这个错误信息。

 

来自 “ ITPUB博客 ” ,链接:http://blog.itpub.net/4227/viewspace-680930/,如需转载,请注明出处,否则将追究法律责任。

转载于:http://blog.itpub.net/4227/viewspace-680930/

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值