0

ORA-600: [723]

老杨 2019-03-26
93
摘要:又是一个内存泄漏的问题。这个错误号723与ORA-600[729]错误十分接近。而且二者都是内存泄漏相关的错误。错误信息为:SatJun0...

问题描述

又是一个内存泄漏的问题。
这个错误号723与ORA-600[729]错误十分接近。而且二者都是内存泄漏相关的错误。错误信息为:

Sat Jun 09 16:35:19 2012
Errors IN file c:\app\oracle\product\10.2.0\admin\cam\udump\cam1_ora_6392.trc:
ORA-00600: internal error code, arguments: [723], [47560], [47560], [memory leak], [], [], [], []


专家解答

详细错误信息摘录如下:

*** 2012-06-09 16:35:18.274
*** ACTION NAME:() 2012-06-09 16:35:18.227
*** MODULE NAME:() 2012-06-09 16:35:18.227
*** SERVICE NAME:() 2012-06-09 16:35:18.227
*** SESSION ID:(42.35) 2012-06-09 16:35:18.227
******** ERROR: PGA memory leak detected 47560 > 35792 ********
******************************************************
HEAP DUMP heap name="pga heap"  DESC=000000005EF9B060
 extent sz=0x20c0 alt=184 het=32767 rec=0 flg=3 opc=3
 parent=0000000000000000 owner=0000000000000000 nex=0000000000000000 xsz=0xfff0
EXTENT 0 addr=0000000059E00010
  Chunk        059e00020 sz=    65504    free      "               "
EXTENT 1 addr=0000000059DF0010
  Chunk        059df0020 sz=    65504    free      "               "
EXTENT 2 addr=0000000059DE0010
  Chunk        059de0020 sz=    65504    free      "               "
EXTENT 3 addr=0000000059DD0010
  Chunk        059dd0020 sz=    65504    free      "               "
EXTENT 4 addr=0000000059DC0010
  Chunk        059dc0020 sz=    65504    free      "               "
EXTENT 5 addr=0000000059DB0010
  Chunk        059db0020 sz=    65504    free      "               "
EXTENT 6 addr=0000000059DA0010
  Chunk        059da0020 sz=    65504    free      "               "
EXTENT 7 addr=0000000059D80010
  Chunk        059d80020 sz=   131040    free      "               "
EXTENT 8 addr=0000000059D60010
  Chunk        059d60020 sz=   131040    free      "               "
EXTENT 9 addr=0000000059D40010
  Chunk        059d40020 sz=   131040    free      "               "
EXTENT 10 addr=0000000059D20010
  Chunk        059d20020 sz=   131040    free      "               "
EXTENT 11 addr=0000000059D00010
  Chunk        059d00020 sz=   131040    free      "               "
EXTENT 12 addr=0000000059CE0010
  Chunk        059ce0020 sz=   131040    free      "               "
EXTENT 13 addr=0000000059CC0010
  Chunk        059cc0020 sz=   131040    free      "               "
EXTENT 14 addr=0000000059CA0010
  Chunk        059ca0020 sz=   131040    free      "               "
EXTENT 15 addr=0000000059C80010
  Chunk        059c80020 sz=   131040    free      "               "
EXTENT 16 addr=0000000059C60010
  Chunk        059c60020 sz=   131040    free      "               "
EXTENT 17 addr=0000000059C40010
  Chunk        059c40020 sz=   131040    free      "               "
EXTENT 18 addr=0000000059C20010
  Chunk        059c20020 sz=   131040    free      "               "
EXTENT 19 addr=0000000059C00010
  Chunk        059c00020 sz=   131040    free      "               "
EXTENT 20 addr=0000000059BE0010
  Chunk        059be0020 sz=   131040    free      "               "
EXTENT 21 addr=0000000059BC0010
  Chunk        059bc0020 sz=   131040    free      "               "
EXTENT 22 addr=0000000059BA0010
  Chunk        059ba0020 sz=   131040    free      "               "
EXTENT 23 addr=0000000059B90010
  Chunk        059b90020 sz=    65504    free      "               "
EXTENT 24 addr=0000000059B80010
  Chunk        059b80020 sz=    29848    free      "               "
  Chunk        059b874b8 sz=     1720    freeable  "krvxhds        "
Dump OF memory FROM 0x0000000059B874B8 TO 0x0000000059B87B70
.
.
.
*** 2012-06-09 16:35:19.100
ksedmp: internal OR fatal error
ORA-00600: internal error code, arguments: [723], [47560], [47560], [memory leak], [], [], [], []
CURRENT SQL information unavailable - no SGA.
CHECK trace file c:\app\oracle\product\10.2.0\db_1\rdbms\trace\cam1_ora_0.trc FOR preloading .sym file messages
----- Call Stack Trace -----
calling              CALL     entry                argument VALUES IN hex      
location             TYPE     point                (? means dubious VALUE)     
-------------------- -------- -------------------- ----------------------------
ksedmp+663           CALL???  ksedst+55            003C878B8 000000000 01DD6DAC8
                                                   000000000
ksfdmp+19            CALL???  ksedmp+663           000000003 05EF9B360 000000000
                                                   003CACC80
kgeriv+184           CALL???  ksfdmp+19            07FFFFFFF 05EF9EC20 000000000
                                                   05EF9B360
kgesiv+102           CALL???  kgeriv+184           05EF9B360 00001E650 003C8735C
                                                   000000000
ksesic3+125          CALL???  kgesiv+102           05EF9AD20 00000B9C8 00001F758
                                                   0004349F1
ksmdpg+1233          CALL???  ksesic3+125          0000002D3 000000000 00000B9C8
                                                   000000000
opidcl+515           CALL???  ksmdpg+1233          01B757AB8 01B745A58 01B759C10
                                                   004C2E706
opidrv+983           CALL???  opidcl+515           05EFAFF20 000000000 01DD6FB00
                                                   000000000
sou2o+52             CALL???  opidrv+983           00000003C 000000004 01DD6FB00
                                                   7FEFF3079D0
opimai_real+131      CALL???  sou2o+52             000000000 0774FB144 01DD6FB70
                                                   01DD6FC20
opimai+96            CALL???  opimai_real+131      7FFFFF6B258 01DD6FCA0
                                                   01DD6FC00 7FE00000034
OracleThreadStart+6  CALL???  opimai+96            000000000 003C874C4 000000050
40                                                 00000601C
00000000773A495D     CALL???  OracleThreadStart+6  01D56FF1C 000000000 000000000
                              40                   000000000
00000000774D8791     CALL???  00000000773A495D     000000000 000000000 000000000
                                                   000000000
--------------------- Binary Stack Dump ---------------------

Oracle有记录的关于ORA-600 [723]的bug有很多,不过当前的错误信息无法定位到已知的bug。
和729错误一样,如果这个内存泄漏不是非常频繁,可以忽略掉。否则可能需要通过升级来解决。
Oracle提供了10262事件来屏蔽这个错误,不过个人不推荐设置该事件。

「喜欢文章,快来给作者赞赏墨值吧」

评论

0
0
最新发布
暂无内容,敬请期待...
数据库资讯
最新 热门 更多
本月热门
近期活动
全部
暂无活动,敬请期待...
相关课程
全部
暂无课程,敬请期待...