eygle.com   eygle.com
eygle.com eygle
eygle.com  
 

« ORA-00600 3020 错误案例一则 | Blog首页 | ACOUG - All China Oracle User Group Start »

kcbgtcr 错误小记
modb.pro

在很久以前遇到过一次kcbgtcr_13号错误,那次错误在数据库恢复时出现,最后导致数据库不能够完成恢复。

最近又遇到类似错误,错误出现在INSERT操作时,错误出现,进程crash,任务失败,重新执行可以通过。
kcbgtcr 是Oracle数据库最重要的函数之一,其含义为:Kernal Cache Buffer GeT Cosistents Read,也就是数据库的一致性读操作,后面的代码有很多种,代表在不同的层面上出现问题。
Metalink 的 Note 415773.1 - Diagnostics and Solutions for kcbgtcr() Related Internal Errors记录了与此相关的很多问题。

 不讨论具体的问题,根据代码的含义实际上可以知道,出现这类错误,基本上都是由于CR读异常导致的,CR读涉及的各个层面出现问题,如DataBlock,Undo Header,Undo Block出问题,都可能导致异常。

kcbgtcr_13号错误是指在构造一个CR读时,检查Buffer时发现其SCN不可用,判断出错导致代码异常,进程Crash掉,这类错误可能是Buffer过小,重用过快导致的,也可能是数据变更过于频繁导致。

这类错误极其少见,一旦出现要非常慎重的处理,有些Bug与此有关,需要通过Metalink确认,数据库在部署时最好应用最新的PSU。
下面是这次故障的错误堆栈摘要:

*** 2010-03-03 14:15:04.436
ksedmp: internal or fatal error
ORA-00600: internal error code, arguments: [kcbgtcr_13], [], [], [], [], [], [], []
Current SQL statement for this session:
INSERT INTO CT_INFO (RPT_DATE, RGN_CODE, .......
----- PL/SQL Call Stack -----
  object      line  object
  handle    number  name
700000206d666a0       338  procedure CT_INFO_S
7000001a89a3f30         3  anonymous block
----- Call Stack Trace -----
calling              call     entry                argument values in hex     
location             type     point                (? means dubious value)    
-------------------- -------- -------------------- ----------------------------
ksedst+001c          bl       ksedst1              FFFFFFFFFFED73C ? 000000006 ?
ksedmp+0290          bl       ksedst               104A48040 ?
ksfdmp+0018          bl       03F326DC            
kgerinv+00dc         bl       _ptrgl              
kgeasnmierr+004c     bl       kgerinv              000000000 ? 10566823C ?
                                                   100000013 ? 225D0C00130000 ?
                                                   000000000 ?
kcbassertbd+0074     bl       kgeasnmierr          1101955E0 ? 110450040 ?
                                                   105668AC4 ? 000000000 ?
                                                   000000000 ? 700000206F807C0 ?
                                                   000000000 ? 000000051 ?
kcbgtcr+2a68         bl       kcbassertbd          105668AC0 ? FFFFFFFFFFEC608 ?
ktspgfbs+0144        bl       kcbgtcr              102147B38 ? 000000000 ?
                                                   70000002EB3F448 ? 000000001 ?
ktspfsrch+00b8       bl       ktspgfbs             FFFFFFFFFFEE028 ? 000000000 ?
                                                   000000000 ? 000000000 ?
                                                   1101FFEF8 ? FFFFFFFFFFEDA78 ?
                                                   000000000 ?
ktspscan_bmb+021c    bl       ktspfsrch            700000010018078 ?
                                                   FFFFFFFFFFEE028 ?
ktspgsp_cbk1+07c4    bl       ktspscan_bmb         1FE800000001 ?
ktspgsp_cbk+00a8     bl       ktspgsp_cbk1         1130D0A00 ? 000000000 ?
                                                   1028F3668 ? FFFFFFFFFFEDF40 ?
                                                   11022A548 ? 110266D40 ?
                                                   000000000 ? 000000014 ?
kdtgsp+0504          bl       ktspgsp_cbk          000000000 ? 000000000 ?
                                                   000000000 ? 000000000 ?
                                                   000000000 ? 000000000 ?
                                                   000000000 ? 000000000 ?
kdtgsph+02f8         bl       kdtgsp               10500E820 ? 110195760 ?
kdtFlushBuf+0288     bl       kdtgsph              1105F8E40 ? 000000000 ?
insflush+0348        bl       kdtFlushBuf          1105F8E40 ?
insrow+0384          bl       insflush             1105F8E40 ? 000000000 ?
                                                   1101BECF0 ? FFFFFFFFFFF13E0 ?
                                                   2C000100000004 ?
insdrv+0428          bl       insrow               1105F8E40 ? FFFFFFFFFFF13E0 ?
                                                   000000000 ?
inscovexe+02b8       bl       insdrv               1105F8E40 ?
insExecStmtExecIniE  bl       01FA0954            
ngine+005c                                        
insexe+02f8          bl       insExecStmtExecIniE  FFFFFFFFFFF2318 ?
                              ngine                FFFFFFFFFFF2310 ? 110527020 ?
opiexe+2738          bl       insexe               1105942B8 ? FFFFFFFFFFF2978 ?
opipls+185c          bl       opiexe               FFFFFFFFFFF3CC0 ?
                                                   FFFFFFFFFFF3DA8 ?
                                                   FFFFFFFFFFF3C60 ?
opiodr+0ae0          bl       _ptrgl              
rpidrus+01bc         bl       opiodr               66FFFF5A80 ? 6025E14E0 ?
                                                   FFFFFFFFFFF6B80 ? CE9A84B20 ?
skgmstack+00c8       bl       _ptrgl              
rpidru+0088          bl       skgmstack            10233AE20 ? 000000000 ?
                                                   000000002 ? 000000000 ?
                                                   FFFFFFFFFFF6348 ?
rpiswu2+034c         bl       _ptrgl              
rpidrv+095c          bl       rpiswu2              70000020458E188 ? 11052E3A0 ?
                                                   11046AA58 ? 000000000 ?
                                                   FFFFFFFFFFF6120 ?
                                                   3C00000000 ? 000000000 ?
                                                   000000000 ?
psddr0+02bc          bl       03F32174            
psdnal+01d0          bl       psddr0               CFFFF6DB8 ? 6600000000 ?
                                                   FFFFFFFFFFF6B80 ?
                                                   30100BA3A8 ?
pevm_EXECC+01f8      bl       _ptrgl              
pfrinstr_EXECC+0070  bl       pevm_EXECC           70000019DB5AC60 ? 000000000 ?
                                                   7000001C12D897A ?
pfrrun_no_tool+005c  bl       _ptrgl              
pfrrun+1014          bl       pfrrun_no_tool       FFFFFFFFFFF6EE0 ?
                                                   7000001A89A3F30 ? 3100EAA30 ?
plsql_run+06b4       bl       pfrrun               11048A228 ?
peicnt+0224          bl       plsql_run            11048A228 ? 1000000000418 ?
                                                   000000000 ?
kkxexe+0250          bl       peicnt               FFFFFFFFFFF81F8 ? 11048A228 ?
opiexe+2ef8          bl       kkxexe               110483218 ?
kpoal8+0edc          bl       opiexe               FFFFFFFFFFFB814 ?
                                                   FFFFFFFFFFFB588 ?
                                                   FFFFFFFFFFF99E8 ?
opiodr+0ae0          bl       _ptrgl              
ttcpip+1020          bl       _ptrgl              
opitsk+1124          bl       01FA3344            
opiino+0990          bl       opitsk               000000000 ? 000000000 ?
opiodr+0ae0          bl       _ptrgl              
opidrv+0484          bl       01FA2198            
sou2o+0090           bl       opidrv               3C02DB56BC ? 44065F000 ?
                                                   FFFFFFFFFFFF750 ?
opimai_real+01bc     bl       01F9FAB4            
main+0098            bl       opimai_real          000000000 ? 000000000 ?
__start+0098         bl       main                 000000000 ? 000000000 ?
 
--------------------- Binary Stack Dump ---------------------


-The End-


历史上的今天...
    >> 2011-03-04文章:
    >> 2008-03-04文章:
    >> 2007-03-04文章:
           姓氏、染色体与传统文化
    >> 2005-03-04文章:
           如何重建UNDO TABLESPACE
           Gmail的Pop支持

By eygle on 2010-03-04 13:37 | Comments (1) | Backup&Recovery | Internal | 2510 |

1 Comment

kcbgtcr 像这种oracle数据库的函数全称说明,是否有相关的书籍或是文章可查阅?一直来碰到很多这样600 , 7445错误,只能在metalink查相关文章,但没有理解这些具体在作什么,所以不能很好地去处理这样的问题,只能依metalink的文章画瓢.
有没好的介绍?


CopyRight © 2004~2020 云和恩墨,成就未来!, All rights reserved.
数据恢复·紧急救援·性能优化 云和恩墨 24x7 热线电话:400-600-8755 业务咨询:010-59007017-7040 or 7037 业务合作: marketing@enmotech.com