ORA-7445(kjbcrcomplete)错误

客户10.2.0.5 RAC在验证表的逻辑结构是出现ORA-7445错误。

[@more@]

错误信息如下:

Sun Mar 31 03:45:16 EAT 2013
Errors in file /oracle/app/admin/orcl/udump/orcl2_ora_4039.trc:
ORA-07445:
出现异常错误: 核心转储 [kjbcrcomplete()+5521] [SIGSEGV] [Invalid permissions for mapped object] [0x00000002A] [] []

详细TRACE信息为:

Ioctl ASYNC_CONFIG error, errno = 1
*** 2013-03-31 02:20:45.846
*** ACTION NAME:() 2013-03-31 02:20:45.846
*** MODULE NAME:(sqlplus@db2 (TNS V1-V3)) 2013-03-31 02:20:45.846
*** SERVICE NAME:(SYS$USERS) 2013-03-31 02:20:45.846
*** SESSION ID:(2053.926) 2013-03-31 02:20:45.846
WARNING:Could not increase the asynch I/O limit to 32 for SQL direct I/O. It is set to 0
*** 2013-03-31 03:45:16.545
Exception signal: 11 (SIGSEGV), code: 2 (Invalid permissions for mapped object), addr: 0x2a, PC: [0x40000000053973d1, kjbcrcomplete()+5521]
r1: 60000000000ba268 r20: 0 br5: 0
r2: c0000030f2636d20 r21: 21 br6: c00000000042a870
r3: c000000028da7000 r22: 0 br7: c00000000043d720
r4: 0 r23: 5c3412c0 ip: 40000000053973d1
r5: c000000000000408 r24: c0000030f598d9e8 iipa: 0
r6: c0000000000443e0 r25: 60000000000ac688 cfm: 14b1
r7: 9fffffffbf7f8de8 r26: 60000000000ca6b8 um: 1a
r8: 0 r27: 1 rsc: 1f
r9: c00000145dfc536c r28: 60000000000ac650 bsp: 9fffffffbf801600
r10: 60000000000ca6c0 r29: c0000030f6695ec8 bspstore: 9fffffffbf801600
r11: 20 r30: 9fffffffbf372318 rnat: 0
r12: 9ffffffffffd9360 r31: 20 ccv: 2000000000000030
r13: 9fffffffbf3fd4b0 NaTs: 0 unat: 0
r14: 60000000000ac650 PRs: c000000000398309 fpsr: 9804c8a76433f
r15: 5c3412cd br0: 40000000053964e0 pfs: c0000000000014b1
r16: 0 br1: c000000000299260 lc: 0
r17: 60000000000ca6c0 br2: c00000000029ba60 ec: 0
r18: 20 br3: 0 isr: 9fffffffbf801600
r19: 9ffffffffffd9330 br4: 0 ifa: 0
Reason code: 0053
*** 2013-03-31 03:45:16.590
ksedmp: internal or fatal error
ORA-07445:
出现异常错误: 核心转储 [kjbcrcomplete()+5521] [SIGSEGV] [Invalid permissions for mapped object] [0x00000002A] [] []
Current SQL statement for this session:
analyze table c_inter VALIDATE STRUCTURE CASCADE
----- Call Stack Trace -----
calling call entry argument values in hex
location type point (? means dubious value)
-------------------- -------- -------------------- ----------------------------
ksedst()+64 call ksedst1() 000000001 ? 000000001 ?
ksedmp()+2176 call ksedst() 000000001 ?
C000000000000D20 ?
4000000004032B40 ?
000000000 ? 000000000 ?
000000000 ?
ssexhd()+1264 call ksedmp() 000000003 ?
6000000000247DA0 ?
60000000000BA268 ?
6000000000248370 ?
C000000000000B9F ?
4000000006C1DF80 ?
C00000000039B6CD ?
60000000000C7420 ?
call ssexhd() C0000030F54A95F0 ?
60000000000C9570 ?
C000000028DAE8C8 ?
60000000000BA268 ?
kjbcrcomplete()+552 call 600000000024C200 ?
1 20000000B ?
600000000024C010 ?
000000000 ? 000000000 ?
000000000 ? 000000000 ?
000000000 ?
kclwcrs()+69392 call kjbcrcomplete() 0001703A6 ? 0001F0000 ?
0000188C5 ?
C0000030F0307B48 ?
000000001 ?
C0000030F0307B48 ?
000000000 ?
9FFFFFFFFFFD9390 ?
kclgclk()+21824 call kclwcrs() C00000145DFC537A ?
000000800 ?
60000000000CAA68 ?
60000000000C6F68 ?
9FFFFFFFFFFE0A10 ?
9FFFFFFFFFFE0958 ?
9FFFFFFFFFFE0D10 ?
9FFFFFFFFFFE2460 ?
$cold_kcbzib()+8640 call kclgclk() 9FFFFFFFFFFDBDD8 ?
000000800 ?
60000000000CAA68 ?
60000000000C8A38 ?
000000040 ?
9FFFFFFFFFFE0D10 ?
00000026D ?
9FFFFFFFFFFE0A10 ?
kcbgtcr()+9536 call $cold_kcbzib() C00000308A416408 ?
9FFFFFFFFFFE0D10 ?
9FFFFFFFFFFE0A10 ?
000000004 ? 000000003 ?
00000026D ? 000000000 ?
000000000 ?
ktrgtc()+1120 call kcbgtcr() 9FFFFFFFFFFE0D10 ?
9FFFFFFFFFFE0A10 ?
00000026D ? 000000000 ?
60000000000BA268 ?
kdifbk()+6608 call ktrgtc() 9FFFFFFFFFFE0D00 ?
9FFFFFFFFFFE2430 ?
4000000001CA99C0 ?
9FFFFFFFFFFE0C20 ?
00000026D ? 000100000 ?
4000000001CA99E0 ?
kdgvsp()+15888 call kdifbk() 9FFFFFFFFFFE0C44 ?
9FFFFFFFFFFE0D2C ?
000000001 ?
9FFFFFFFFFFE0DE8 ?
000000000 ? 000000000 ?
000000000 ?
9FFFFFFFFFFE1320 ?
kdgvss()+432 call kdgvsp() 9FFFFFFFFFFE8DB8 ?
000000000 ?
9FFFFFFFFFFE2468 ?
000000000 ? 00C100000 ?
C0000030FA5CBF20 ?
kdavls()+6624 call kdgvss() 9FFFFFFFBF2F3780 ?
000000001 ?
9FFFFFFFFFFE9C80 ?
9FFFFFFFFFFE9170 ?
4000000001CAB230 ?
C0000030FA5CBF20 ?
9FFFFFFFBF2F3780 ?
000000001 ?
kkndgd()+2960 call kdavls() 9FFFFFFFFFFEB4C0 ?
4000000006557450 ?
C000000000390061 ?
9FFFFFFFFFFE8FB4 ?
000000001 ?
60000000000AE7A8 ?
000000001 ?
9FFFFFFFBF2F3BB4 ?
kknpat()+1648 call kkndgd() C000002F2B449B18 ?
0000142B9 ? 000000002 ?
00000000A ?
C000002F2B4498DE ?
000000014 ?
C000002F2B4498A6 ?
9FFFFFFFFFFEBE40 ?
kknpob()+448 call kknpat() C000002F2B449B18 ?
9FFFFFFFFFFEBE40 ?
000000001 ?
C000002F2B6BC670 ?
9FFFFFFFFFFF2F10 ?
9FFFFFFFFFFEBD60 ?
C000000000001838 ?
400000000655AF30 ?
kknls()+1872 call kknpob() C000002F2B449B18 ?
9FFFFFFFFFFEBE40 ?
9FFFFFFFFFFEC1B0 ?
FFFFFFFFFFFFFFFF ?
000100000 ? 000100000 ?
60000000000BA268 ?
C0000029B20453AF ?
kkndrv()+64 call kknls() 000000000 ?
$cold_opiexe()+7600 call kkndrv() C000000000002450 ?
4000000003637C80 ?
60000000000CAA68 ?
60000000000C8A38 ?
000000040 ?
9FFFFFFFFFFE0D10 ?
00000026D ?
9FFFFFFFFFFE0A10 ?
opiosq0()+8144 call $cold_opiexe() 9FFFFFFFFFFF6130 ?
4000000002F89200 ?
00002821B ?
9FFFFFFFFFFF44B0 ?
60000000000BA268 ?
C000000000001838 ?
9FFFFFFFFFFF44B4 ?
60000000000C6CA0 ?
kpooprx()+416 call opiosq0() 000000003 ?
9FFFFFFFFFFF6D90 ?
4000000002AEB2A0 ?
00002F21B ?
C000000000000815 ?
kpoal8()+1152 call kpooprx() 000000003 ?
9FFFFFFFFFFF9AD0 ?
000000048 ?
9FFFFFFFFFFF6DD0 ?
000000001 ? 0000000A4 ?
60000000000BA268 ?
60000000000A7E20 ?
opiodr()+2144 call kpoal8() 9FFFFFFFFFFF7590 ?
C0000000000018B7 ?
9FFFFFFFFFFF9C70 ?
9FFFFFFFFFFF6EB0 ?
60000000000BA268 ?
4000000002F33E40 ?
ttcpip()+1680 call opiodr() 00000005E ? 000000017 ?
4000000001BF80B0 ?
0000046C0 ?
9FFFFFFFFFFF75A0 ?
opitsk()+2368 call ttcpip() 600000000003DF40 ?
000000001 ?
9FFFFFFFFFFF9C70 ?
000000001 ?
9FFFFFFFFFFF9DE0 ?
9FFFFFFFFFFF9BD4 ?
4000000001CE0810 ?
000000000 ?
opiino()+1664 call opitsk() 000000000 ? 000000000 ?
60000000000BA268 ?
400000000293B500 ?
000028089 ?
4000000001BF80C8 ?
opiodr()+2144 call opiino() 00000003C ?
9FFFFFFFFFFFC630 ?
9FFFFFFFFFFFEDD0 ?
9FFFFFFFFFFFBAF0 ?
60000000000BA268 ?
C0000000000018B7 ?
opidrv()+1248 call opiodr() 00000003C ? 000000004 ?
4000000001BF7B60 ?
0000046C0 ?
9FFFFFFFFFFFC640 ?
60000000000BA268 ?
sou2o()+240 call opidrv() 00000003C ?
60000000000C6C98 ?
9FFFFFFFFFFFEDD0 ?
opimai_real()+496 call sou2o() 9FFFFFFFFFFFEDF0 ?
00000003C ? 000000004 ?
9FFFFFFFFFFFEDD0 ?
main()+240 call opimai_real() 000000000 ?
9FFFFFFFFFFFEE20 ?
main_opd_entry()+80 call main() 000000002 ?
9FFFFFFFFFFFF2D8 ?
60000000000BA268 ?
C000000000000004 ?

--------------------- Binary Stack Dump ---------------------

MOS中找不到这个ORA-7445[kjbcrcomplete]错误的记录,但是从详细的TRACE可以判断,问题导致的原因是验证表的结构时出现了异常。显然是表或索引上存在逻辑坏块,导致Oracle在验证其逻辑结构时发现异常。

解决这个问题的方式是通过逻辑方式重建表和索引。

来自 “ ITPUB博客 ” ,链接:http://blog.itpub.net/4227/viewspace-1060762/,如需转载,请注明出处,否则将追究法律责任。

转载于:http://blog.itpub.net/4227/viewspace-1060762/

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值