暂无图片
暂无图片
1
暂无图片
暂无图片
暂无图片

ORA-7445 opipls()

老杨 2019-03-25
629

问题描述

客户的9206数据库出现ORA-7445错误。
错误信息:

Fri Apr 17 09:11:24 2009
Errors IN file /opt/app/admin/orcl/udump/orcl1_ora_15039.trc:
ORA-07445: exception encountered: core dump [000000010102BD1C] [SIGSEGV] [Address NOT mapped TO object] [0x000000004] [] []
Fri Apr 17 09:11:25 2009
Trace dumping IS performing id=[cdmp_20090417091125]


专家解答

导致该错误详细信息:

*** 2009-04-17 09:11:24.746
*** SESSION ID:(107.25) 2009-04-17 09:11:24.738
Exception signal: 11 (SIGSEGV), code: 1 (Address NOT mapped TO object), addr: 0x4, PC: [0x10102bd1c, 000000010102BD1C]
*** 2009-04-17 09:11:24.746
ksedmp: internal OR fatal error
ORA-07445: exception encountered: core dump [000000010102BD1C] [SIGSEGV] [Address NOT mapped TO object] [0x000000004] [] []
CURRENT SQL statement FOR this SESSION:
SELECT /*+ USE_NL(store) USE_NL(dn) INDEX(store EI_ATTRSTORE) ORDERED */ store.eid,AttrName,NVL(AttrVal,' '),attrkind,NVL(attrstype, ' '),NVL(AttrVer,' ') FROM C_D dn, ds_attr store WHERE (dn.rdn = :szName AND dn.parentdn = :szDomain) AND store.eid = dn.eid
----- PL/SQL Call Stack -----
  object      line  object
  handle    NUMBER  name
5dbc4a990       244  package body ODS.OLADD
5df8530c0         1  anonymous block
----- Call Stack Trace -----
calling              CALL     entry                argument VALUES IN hex      
location             TYPE     point                (? means dubious VALUE)     
-------------------- -------- -------------------- ----------------------------
ksedmp()+328         CALL     ksedst()             00000000B ? 000000000 ?
                                                   000000000 ? 00000004A ?
                                                   FFFFFFFF7FFF00F8 ?
                                                   1032E18E8 ?
ssexhd()+676         CALL     ksedmp()             000103705 ? 103705000 ?
                                                   103705468 ? 10370A000 ?
                                                   000102C00 ? 000000000 ?
sigacthandler()+44   PTR_CALL 0000000000000000     00010370D ?
                                                   FFFFFFFF7FFF7190 ?
                                                   10370D000 ? 10370A620 ?
                                                   000000000 ? 10370D578 ?
opipls()+1180        PTR_CALL 0000000000000000     00000000B ?
                                                   FFFFFFFF7FFF7190 ?
                                                   FFFFFFFF7FFF6EB0 ?
                                                   10382B700 ? 000000000 ?
                                                   FFFFFFFFFFFFFF4A ?
opiodr()+1688        PTR_CALL 0000000000000000     000000000 ? 000000001 ?
                                                   FFFFFFFF7C94EE98 ?
                                                   000000005 ? 000000002 ?
                                                   103705808 ?
rpidrus()+144        CALL     opiodr()             000103400 ? 10102B880 ?
                                                   102EB849A ? 103705808 ?
                                                   103707D40 ?
                                                   FFFFFFFF7FFF7FA0 ?
skgmstack()+156      PTR_CALL 0000000000000000     00000000B ? 000000066 ?
                                                   103705808 ?
                                                   FFFFFFFF7CA6A7E0 ?
                                                   FFFFFFFF7FFF81B0 ?
                                                   000103400 ?
rpidru()+160         CALL     skgmstack()          FFFFFFFF7FFF83D8 ?
                                                   1037051F0 ? 00000F618 ?
                                                   10022A300 ?
                                                   FFFFFFFF7FFF8400 ?
                                                   00193EAA4 ?
rpiswu2()+384        PTR_CALL 0000000000000000     FFFFFFFF7FFF8AD8 ?
                                                   FFFFFFFF7FFF8D70 ?
                                                   00000000C ? 000000410 ?
                                                   000103705 ? 00010022A ?
rpidrv()+1432        CALL     rpiswu2()            5C42DBC48 ? 000103705 ?
                                                   103705690 ? 1037056C8 ?
                                                   000000000 ? 10329F000 ?
psddr0()+156         CALL     rpidrv()             000100000 ? 000110424 ?
                                                   FFFFFFFF7FFF89DC ?
                                                   00000003A ? 5C42DBC48 ?
                                                   000100000 ?
psdnal()+344         CALL     psddr0()             103705468 ? 102EBA518 ?
                                                   FFFFFFFF7FFF8D70 ?
                                                   1037056C8 ? 000000140 ?
                                                   103705808 ?
pevm_EXECC()+324     PTR_CALL 0000000000000000     FFFFFFFF7FFFB100 ?
                                                   FFFFFFFF7FFFB278 ?
                                                   000001B58 ?
                                                   FFFFFFFF7C94EE98 ?
                                                   5DBC4A990 ? 000000001 ?
pfrrun()+3244        CALL     pevm_EXECC()         000000000 ? 103814EC8 ?
                                                   000000000 ?
                                                   FFFFFFFF7CA6A778 ?
                                                   000000000 ?
                                                   FFFFFFFF7C94EE98 ?
peicnt()+268         CALL     pfrrun()             00000122C ?
                                                   FFFFFFFF7FFFB100 ?
                                                   FFFFFFFF7CA6A778 ?
                                                   FFFFFFFF7CA6A7E0 ?
                                                   5C42DC6A8 ? 103705808 ?
kkxexe()+524         CALL     peicnt()             FFFFFFFF7FFFB100 ?
                                                   FFFFFFFF7CA6A778 ?
                                                   000000009 ? 103829160 ?
                                                   000102C00 ?
                                                   FFFFFFFF7FFFAF78 ?
opiexe()+9256        CALL     kkxexe()             000103400 ? 000000000 ?
                                                   00000FFFB ?
                                                   FFFFFFFF7CA6A778 ?
                                                   000000000 ? 103705468 ?
opiall0()+1776       CALL     opiexe()             00000002E ? 10370D808 ?
                                                   FFFFFFFF7CA60680 ?
                                                   10370D800 ?
                                                   FFFFFFFF7C953850 ?
                                                   103705808 ?
kpoal8()+1040        CALL     opiall0()            000000000 ? 00000005E ?
                                                   FFFFFFFF7FFFC218 ?
                                                   103705808 ?
                                                   FFFFFFFF7C953850 ?
                                                   FFFFFFFF7FFFC5A8 ?
opiodr()+1688        PTR_CALL 0000000000000000     000000000 ? 000000000 ?
                                                   FFFFFFFF7FFFEA60 ?
                                                   000000024 ? 000000000 ?
                                                   0000022B0 ?
ttcpip()+1556        PTR_CALL 0000000000000000     000103400 ? 100FBBFC0 ?
                                                   10370D808 ? 103705808 ?
                                                   103707D40 ?
                                                   FFFFFFFF7FFFCC00 ?
opitsk()+984         CALL     ttcpip()             10370D800 ? 000000014 ?
                                                   FFFFFFFF7FFFEA60 ?
                                                   000000000 ? 000000000 ?
                                                   FFFFFFFF7FFFDD4C ?
opiino()+1572        CALL     opitsk()             000000000 ? 000000000 ?
                                                   000000000 ? 000000000 ?
                                                   103707D28 ?
                                                   FFFFFFFF7FFFEBB4 ?
opiodr()+1688        PTR_CALL 0000000000000000     000380007 ? 10370C658 ?
                                                   1037F9458 ?
                                                   FFFFFFFF7FFFF8F0 ?
                                                   000000000 ? 5C1447BA0 ?
opidrv()+736         CALL     opiodr()             000103400 ? 10100C380 ?
                                                   10370D808 ? 103705808 ?
                                                   103707D40 ?
                                                   FFFFFFFF7FFFF410 ?
sou2o()+16           CALL     opidrv()             000000000 ? 000000004 ?
                                                   1037051EC ? 00000003C ?
                                                   1037056C8 ? 000103400 ?
main()+184           CALL     sou2o()              FFFFFFFF7FFFF910 ?
                                                   00000003C ? 000000004 ?
                                                   FFFFFFFF7FFFF8F0 ?
                                                   000039E70 ? 000000000 ?
_start()+380         CALL     main()               000000002 ?
                                                   FFFFFFFF7FFFFA58 ?
                                                   FFFFFFFF7FFFFA70 ?
                                                   000000000 ? 000000000 ?
                                                   100000000 ?
--------------------- Binary Stack Dump ---------------------

分析错误信息,这个错误与Bug 2662683 – Heap corruption from schema name overwriting memory in PLSQL [ID 2662683.8]描述的问题比较类似,尤其是会话DUMP部分,似乎也存在问题描述的名称覆盖的问题:

Argument/Register addr=0x0000000103824760.
Dump OF memory FROM 0x0000000103824720 TO 0x0000000103824860
103824720 00000000 000028D1 00000000 00000000  [......(.........]
103824730 000028D0 00000000 00000001 03705470  [..(..........pTp]
103824740 00000001 03820698 10B38F00 000028B9  [..............(.]
103824750 00000000 00000000 00000001 032FF0B0  [............./..]
103824760 0000ABAB 00000000 00000001 03824770  [..............Gp]
103824770 00000001 03708CF0 0000FF80 00000000  [.....p..........]
103824780 00000005 C42DBC48 FFFFFFFF 7C950080  [.....-.H....|...]
103824790 FFFFFFFF 7C952E68 00000000 00000000  [....|..h........]
1038247A0 00000000 00000000 00021203 00000000  [................]
1038247B0 00000000 00000000 0000FF80 73657373  [............sess]
1038247C0 696F6E20 68656170 00000000 7FFF7FFF  [ion heap........]
1038247D0 7FFF0098 00000000 00000000 00000000  [................]
1038247E0 00000000 00000038 FFFFFFFF 7C93EBD0  [.......8....|...]
1038247F0 FFFFFFFF 7CA6A368 00000000 00000058  [....|..h.......X]
103824800 FFFFFFFF 7C953648 FFFFFFFF 7C953648  [....|.6H....|.6H]
103824810 00000000 00000098 00000001 03824818  [..............H.]
103824820 00000001 03824818 00000000 000000A8  [......H.........]
103824830 00000001 03824830 00000001 03824830  [......H0......H0]
103824840 00000000 00000118 00000001 03824848  [..............HH]
103824850 00000001 03824848 00000000 000001B0  [......HH........]
Argument/Register addr=0x00000005DBC4AAB0.
Dump OF memory FROM 0x00000005DBC4AA70 TO 0x00000005DBC4ABB0
5DBC4AA70 00000001 00000000 0000000A 00000000  [................]
5DBC4AA80 00000005 DBC4AA80 00000005 DBC4AA80  [................]
5DBC4AA90 00000024 00000000 00000005 DBC4AA98  [...$............]
5DBC4AAA0 00000005 DBC4AA98 00000000 00000000  [................]
5DBC4AAB0 F61D1590 4C434E43 3839494F EC7F614B  [....LCNC89IO..aK]
5DBC4AAC0 01000000 00000000 00786806 1013312A  [.........xh...1*]
5DBC4AAD0 00000000 00000000 00000000 00000005  [................]
5DBC4AAE0 03000000 00000000 00000000 00000000  [................]
5DBC4AAF0 4F4C4144 444F4453 00000000 00000000  [OLADDODS........]
5DBC4AB00 00000000 00000000 00000000 00000000  [................]

这个BUG在9.2.0.3中被FIXED,但是不排除在9206中重新引入,低于10.1.0.2版本都可能碰到这个错误。Oracle在个别平台和版本上提供了单独的补丁,此外只能通过升级到10.1.0.2以上才能避免这个错误。

最后修改时间:2019-04-14 10:55:00
「喜欢这篇文章,您的关注和赞赏是给作者最好的鼓励」
关注作者
【版权声明】本文为墨天轮用户原创内容,转载时必须标注文章的来源(墨天轮),文章链接,文章作者等基本信息,否则作者和墨天轮有权追究责任。如果您发现墨天轮中有涉嫌抄袭或者侵权的内容,欢迎发送邮件至:contact@modb.pro进行举报,并提供相关证据,一经查实,墨天轮将立刻删除相关内容。

评论