问题描述
客户的测试环境中出现这个错误。
信息如下:
2012-03-22 11:10:24.991000 +08:00 Beginning crash recovery OF 1 threads parallel recovery started WITH 15 processes Started redo scan Hex dump OF (file 2, block 130960) IN trace file /oracle11r2/app/diag/rdbms/orcl/orcl/trace/orcl_ora_8087.trc Reading datafile '/oradata/orcl/sysaux01.dbf' FOR corruption at rdba: 0x0081ff90 (file 2, block 130960) Reread (file 2, block 130960) found same corrupt DATA (logically corrupt) WRITE verification failed FOR File 2 Block 130960 (rdba 0x81ff90) 2012-03-22 11:10:27.155000 +08:00 Errors IN file /oracle11r2/app/diag/rdbms/orcl/orcl/trace/orcl_ora_8087.trc (incident=92961): ORA-00600: internal error code, arguments: [kcratr_scan_lastbwr], [], [], [], [], [], [], [], [], [], [], [] Incident details IN: /oracle11r2/app/diag/rdbms/orcl/orcl/incident/incdir_92961/orcl_ora_8087_i92961.trc 2012-03-22 11:10:28.505000 +08:00 Dumping diagnostic DATA IN directory=[cdmp_20120322111028], requested BY (instance=1, osid=8087), summary=[incident=92961]. USE ADRCI OR Support Workbench TO package the incident. See Note 411.1 at My Oracle Support FOR error AND packaging details. Aborting crash recovery due TO error 600 Errors IN file /oracle11r2/app/diag/rdbms/orcl/orcl/trace/orcl_ora_8087.trc: ORA-00600: internal error code, arguments: [kcratr_scan_lastbwr], [], [], [], [], [], [], [], [], [], [], [] Errors IN file /oracle11r2/app/diag/rdbms/orcl/orcl/trace/orcl_ora_8087.trc: ORA-00600: internal error code, arguments: [kcratr_scan_lastbwr], [], [], [], [], [], [], [], [], [], [], [] ORA-600 signalled during: ALTER DATABASE OPEN...复制
专家解答
对应的详细TRACE内容为:
*** 2012-03-22 11:10:27.207 *** SESSION ID:(66.3) 2012-03-22 11:10:27.207 *** CLIENT ID:() 2012-03-22 11:10:27.207 *** SERVICE NAME:() 2012-03-22 11:10:27.207 *** MODULE NAME:(sqlplus@localhost.localdomain (TNS V1-V3)) 2012-03-22 11:10:27.207 *** ACTION NAME:() 2012-03-22 11:10:27.207 Dump continued FROM file: /oracle11r2/app/diag/rdbms/orcl/orcl/trace/orcl_ora_8087.trc ORA-00600: internal error code, arguments: [kcratr_scan_lastbwr], [], [], [], [], [], [], [], [], [], [], [] ========= Dump FOR incident 92961 (ORA 600 [kcratr_scan_lastbwr]) ======== *** 2012-03-22 11:10:27.208 dbkedDefDump(): Starting incident DEFAULT dumps (flags=0x2, level=3, mask=0x0) ----- Current SQL Statement for this session (sql_id=1h50ks4ncswfn) ----- ALTER DATABASE OPEN ----- Call Stack Trace ----- calling CALL entry argument VALUES IN hex location TYPE point (? means dubious VALUE) -------------------- -------- -------------------- ---------------------------- skdstdst()+36 CALL kgdsdst() 000000000 ? 000000000 ? 7FFF37DFBF48 ? 000000001 ? 000000001 ? 000000002 ? ksedst1()+98 CALL skdstdst() 000000000 ? 000000000 ? 7FFF37DFBF48 ? 000000001 ? 000000000 ? 000000002 ? ksedst()+34 CALL ksedst1() 000000000 ? 000000001 ? 7FFF37DFBF48 ? 000000001 ? 000000000 ? 000000002 ? dbkedDefDump()+2741 CALL ksedst() 000000000 ? 000000001 ? 7FFF37DFBF48 ? 000000001 ? 000000000 ? 000000002 ? ksedmp()+36 CALL dbkedDefDump() 000000003 ? 000000002 ? 7FFF37DFBF48 ? 000000001 ? 000000000 ? 000000002 ? ksfdmp()+64 CALL ksedmp() 000000003 ? 000000002 ? 7FFF37DFBF48 ? 000000001 ? 000000000 ? 000000002 ? dbgexPhaseII()+1764 CALL ksfdmp() 000000003 ? 000000002 ? 7FFF37DFBF48 ? 000000001 ? 000000000 ? 000000002 ? dbgexProcessError() CALL dbgexPhaseII() 7F23BF34D710 ? 7F23BF34E410 ? +2675 7FFF37E082C0 ? 000000001 ? 000000000 ? 000000002 ? dbgeExecuteForError CALL dbgexProcessError() 7F23BF34D710 ? 7F23BF34E410 ? ()+83 000000001 ? 000000000 ? 100000000 ? 000000002 ? dbgePostErrorKGE()+ CALL dbgeExecuteForError 7F23BF34D710 ? 7F23BF34E410 ? 2138 () 000000001 ? 000000001 ? 000000000 ? 000000002 ? dbkePostKGE_kgsf()+ CALL dbgePostErrorKGE() 00BAF3FA0 ? 7F23BEE20040 ? 66 000000258 ? 7F23BF34E410 ? 100000000 ? 000000002 ? kgeadse()+390 CALL dbkePostKGE_kgsf() 00BAF3FA0 ? 7F23BEE20040 ? 000000258 ? 7F23BF34E410 ? 100000000 ? 000000002 ? kgerinv_internal()+ CALL kgeadse() 00BAF3FA0 ? 7F23BEE20040 ? 45 000000258 ? 100000000 ? 000000000 ? 000000002 ? kgerinv()+33 CALL kgerinv_internal() 00BAF3FA0 ? 7F23BEE20040 ? 7FFF37DF8780 ? 000000258 ? 000000000 ? 000000002 ? kgeasnmierr()+143 CALL kgerinv() 00BAF3FA0 ? 7F23BEE20040 ? 7FFF37DF8780 ? 000000002 ? 000000000 ? 000000002 ? kcratr_scan()+1732 CALL kgeasnmierr() 00BAF3FA0 ? 7F23BEE20040 ? 7FFF37DF8780 ? 000000002 ? 000005C18 ? 7F23BD9DE020 ? kcratr()+758 CALL kcratr_scan() 7FFF37E0B810 ? 7FFF37E09554 ? 7FFF37DF8780 ? 000000002 ? 000005C18 ? 7F23BD9DE020 ? kctrec()+4513 CALL kcratr() 7FFF37E0B810 ? 7FFF37E14670 ? 000000000 ? 000000002 ? 000005C18 ? 7F23BD9DE020 ? kcvcrv()+5693 CALL kctrec() 7FFF37E15C70 ? 000000000 ? 7F23BF0F8598 ? 7F23BF0F8C00 ? 7F23BED95E00 ? 000000000 ? kcfopd()+1055 CALL kcvcrv() 7FFF37E16A10 ? 000000000 ? 000000020 ? 7F23BF0F8C00 ? 7F23BED95E00 ? 000000000 ? adbdrv()+51829 CALL kcfopd() 000000000 ? 000000000 ? 000000000 ? 000000000 ? 7FFF37E1CE28 ? 192F25CA8 ? opiexe()+18379 CALL adbdrv() 000000000 ? 180FFF8F8 ? 000000000 ? 000000000 ? 7FFF37E1CE28 ? 000000000 ? opiosq0()+3865 CALL opiexe() 000000004 ? 000000000 ? 7FFF37E1E490 ? 000000000 ? 7FFF37E1CE28 ? 000000000 ? kpooprx()+269 CALL opiosq0() 000000003 ? 00000000E ? 7FFF37E1E780 ? 0000000A4 ? 000000000 ? 7FFF37E1E490 ? kpoal8()+824 CALL kpooprx() 7FFF37E21B74 ? 7FFF37E1FBD8 ? 000000013 ? 000000001 ? 000000000 ? 7FFF37E1E490 ? opiodr()+916 CALL kpoal8() 00000005E ? 00000001C ? 7FFF37E21B70 ? 000000001 ? 000000000 ? 100000001 ? ttcpip()+2242 CALL opiodr() 00000005E ? 00000001C ? 7FFF37E21B70 ? 000000000 ? 009B91670 ? 100000001 ? opitsk()+1668 CALL ttcpip() 00BB09C30 ? 0094D6E30 ? 7FFF37E21B70 ? 000000000 ? 7FFF37E215C8 ? 7FFF37E21D64 ? opiino()+961 CALL opitsk() 00BB09C30 ? 000000001 ? 7FFF37E21B70 ? 000000000 ? 7FFF37E215C8 ? 7FFF37E21D64 ? opiodr()+916 CALL opiino() 00000003C ? 000000004 ? 7FFF37E232E8 ? 000000000 ? 7FFF37E215C8 ? 7FFF37E21D64 ? opidrv()+565 CALL opiodr() 00000003C ? 000000004 ? 7FFF37E232E8 ? 000000000 ? 009B91120 ? 7FFF37E21D64 ? sou2o()+98 CALL opidrv() 00000003C ? 000000004 ? 7FFF37E232E8 ? 000000000 ? 009B91120 ? 7FFF37E21D64 ? opimai_real()+128 CALL sou2o() 7FFF37E232C0 ? 00000003C ? 000000004 ? 7FFF37E232E8 ? 009B91120 ? 7FFF37E21D64 ? ssthrdmain()+252 CALL opimai_real() 000000002 ? 7FFF37E234B0 ? 000000004 ? 7FFF37E232E8 ? 009B91120 ? 7FFF37E21D64 ? main()+196 CALL ssthrdmain() 000000002 ? 7FFF37E234B0 ? 000000001 ? 000000000 ? 009B91120 ? 7FFF37E21D64 ? __libc_start_main() CALL main() 000000002 ? 7FFF37E23658 ? +253 000000001 ? 000000000 ? 009B91120 ? 7FFF37E21D64 ? _start()+36 CALL __libc_start_main() 000A0AF54 ? 000000002 ? 7FFF37E23648 ? 000000000 ? 009B91120 ? 7FFF37E21D64 ?复制
根据MOS上描述,这个问题属于Bug 9584943 Crash / recovery failure due to lost write even if mirror has a good image。导致错误的原因是Oracle检查文件头的时候发现了逻辑坏块。不过这个bug应该在11.2.0.2中被解决,而当前版本是11.2.0.3,莫非这个bug在11.2.0.3中被重新引入。
如果出现这个问题,最有效的办法就是通过备份进行恢复,而且一般BLOCK级的恢复就可以了。
「喜欢这篇文章,您的关注和赞赏是给作者最好的鼓励」
关注作者
【版权声明】本文为墨天轮用户原创内容,转载时必须标注文章的来源(墨天轮),文章链接,文章作者等基本信息,否则作者和墨天轮有权追究责任。如果您发现墨天轮中有涉嫌抄袭或者侵权的内容,欢迎发送邮件至:contact@modb.pro进行举报,并提供相关证据,一经查实,墨天轮将立刻删除相关内容。
评论
相关阅读
【专家有话说第五期】在不同年龄段,DBA应该怎样规划自己的职业发展?
墨天轮编辑部
1296次阅读
2025-03-13 11:40:53
Oracle RAC ASM 磁盘组满了,无法扩容怎么在线处理?
Lucifer三思而后行
782次阅读
2025-03-17 11:33:53
Oracle+Deepseek+Dify 实现数据库数据实时分析
bicewow
705次阅读
2025-03-06 09:41:49
【ORACLE】ORACLE19C在19.13版本前的一个严重BUG-24761824
DarkAthena
570次阅读
2025-03-04 14:33:31
Oracle避坑指南|同名表导出难题:如何精准排除指定用户下的表?
szrsu
535次阅读
2025-03-05 00:42:34
2月“墨力原创作者计划”获奖名单公布
墨天轮编辑部
458次阅读
2025-03-13 14:38:19
Ogg23ai高手必看-MySQL Innodb Cluster跟oracle的亲密接触
曹海峰
455次阅读
2025-03-04 21:56:13
【ORACLE】char类型和sql优化器发生的“错误”反应
DarkAthena
406次阅读
2025-03-04 23:05:01
Oracle 如何修改 db_unique_name?强迫症福音!
Lucifer三思而后行
348次阅读
2025-03-12 21:27:56
Oracle DataGuard高可用性解决方案详解
孙莹
307次阅读
2025-03-26 23:27:33
TA的专栏
Java中间件
收录0篇内容
热门文章
一次Connection reset by peer的问题排查
2021-12-07 33612浏览
Java8-Stream: no instance(s) of type variable(s) R exist so that void conforms to R
2021-02-19 32247浏览
nginx: [emerg] "user" directive is not allowed here in /etc/nginx/conf.d/nginx.conf:1
2022-02-15 24150浏览
ORA-00904: "POLTYP": invalid identifier
2019-06-19 12914浏览
PageHelper排坑,处理排序失败: net.sf.jsqlparser.JSQLParserException
2022-05-19 12670浏览