数据库无法启动 win10+11.2.0.1 ORA-07445
数据库无法启动 win10+11.2.0.1 ORA-07445
收藏
复制链接
微信扫码分享
在小程序上查看
分享
4条回答
默认
最新
评论
有用 0alert报错如下:
Exception [type: ACCESS_VIOLATION, UNABLE_TO_READ] [ADDR:0x0] [PC:0xB476E1A, lmebucp()+30] ERROR: Unable to normalize symbol name for the following short stack (at offset 199): dbgexProcessError()+193<-dbgeExecuteForError()+65<-dbgePostErrorKGE()+1726<-dbkePostKGE_kgsf()+75<-kgeade()+560<-kgerev()+125<-kgerec5()+60<-sss_xcpt_EvalFilterEx()+1869<-sss_xcpt_EvalFilter()+174<-.1.6_8+59<-00007FFE53401D86<-00007FFE534133FD<-00007FFE533D4847<-00007FFE5341258A<-lmebucp()+30<-kqlbebs()+1714<-kqlblfc()+222<-adbdrv()+44244<-opiexe()+20842<-opiosq0()+5129<-kpooprx()+357<-kpoal8()+940<-opiodr()+1662<-ttcpip()+1325<-opitsk()+2040<-opiino()+1258<-opiodr()+1662<-opidrv()+864<-sou2o()+98<-opimai_real()+158<-opimai()+191<-OracleThreadStart()+724<-00007FFE5157168D<-00007FFE533954E4 Errors in file d:\app\administrator\diag\rdbms\regent\regent\trace\regent_ora_2548.trc (incident=3014333): ORA-07445: ??????: ???? [lmebucp()+30] [ACCESS_VIOLATION] [ADDR:0x0] [PC:0xB476E1A] [UNABLE_TO_READ] [] Incident details in: d:\app\administrator\diag\rdbms\regent\regent\incident\incdir_3014333\regent_ora_2548_i3014333.trc Trace dumping is performing id=[cdmp_20190110081922] PMON (ospid: 2860): terminating the instance due to error 397 Thu Jan 10 08:19:28 2019 Instance terminated by PMON, pid = 2860
主要报错和Call Stack
Dump continued from file: d:\app\administrator\diag\rdbms\regent\regent\trace\regent_ora_2548.trc ORA-07445: ??????: ???? [lmebucp()+30] [ACCESS_VIOLATION] [ADDR:0x0] [PC:0xB476E1A] [UNABLE_TO_READ] [] ========= Dump for incident 3014333 (ORA 7445 [lmebucp()+30]) ======== ----- Beginning of Customized Incident Dump(s) ----- Exception [type: ACCESS_VIOLATION, UNABLE_TO_READ] [ADDR:0x0] [PC:0xB476E1A, lmebucp()+30] Oracle Database 11g Enterprise Edition Release 11.2.0.1.0 - 64bit Production Process Id: 0x00001b54 Thread Id : 0x000009f4 Time : Thu Jan 10 08:19:20 Excp. Code: 0xc0000005 Excp. Type: ACCESS_VIO Flags: 0x00000000 ------------------- Registers ---------------------------- ip=000000000B476E1A sp=000000003D913140 rp=0000000000000000 r1=0000000000000009 r2=0000000000000000 r3=0000000000003440 r4=0000000000400000 r5=000000003D913140 r6=0000000000000000 r7=0000000011FA4760 r8=0000000000000009 r9=000000003D9132A0 r10=0000000000000009 r11=0000000000000000 r12=000000003D9132A0 r13=000000000F7B04F8 r14=0000000000020C78 r15=0000000000000002 ------------------- End of Registers --------------------- *** 2019-01-10 08:19:20.819 dbkedDefDump(): Starting a non-incident diagnostic dump (flags=0x3, level=3, mask=0x0) ----- Current SQL Statement for this session (sql_id=a01hp0psv0rrh) ----- alter database open ----- Call Stack Trace ----- calling call entry argument values in hex location type point (? means dubious value) -------------------- -------- -------------------- ---------------------------- lmebucp()+30 0000000000000000 009882700 00988270C 000000000 03D8F59A0 kqlbebs()+1714 CALL??? lmebucp()+25 000000002 000000002 03E0B0000 000000FA0 kqlblfc()+222 CALL??? kqlbebs() 1A51003FA0 000000000 000000000 011FA4760 adbdrv()+44244 CALL??? kqlblfc() 000000000 03D9190A8 000000000 000000000 opiexe()+20842 CALL??? adbdrv() 000000023 000000003 1A00000102 000000000 opiosq0()+5129 CALL??? opiexe()+16981 000000004 000000000 03D91A8C0 B20010001010354 kpooprx()+357 CALL??? opiosq0() 000000003 00000000E 03D91AB90 0000000A4 kpoal8()+940 CALL??? kpooprx() 03D91ACE0 000000001 000060000 000000001 opiodr()+1662 CALL??? kpoal8() 00000005E 00000001C 03D91E100 00ABAF224 ttcpip()+1325 CALL??? opiodr() 480000000000005E 49004D000000001C 03D91E100 4100200000000001 opitsk()+2040 CALL??? ttcpip() 011FBEA40 000000000 000000000 000000000 opiino()+1258 CALL??? opitsk() 00000001E 000000000 000000000 03D91F9F8 opiodr()+1662 CALL??? opiino() 00000003C 000000004 03D91FAB0 000000000 opidrv()+864 CALL??? opiodr() 00000003C 000000004 03D91FAB0 615C3A6400000000 sou2o()+98 CALL??? opidrv()+150 00000003C 000000004 03D91FAB0 000000000 opimai_real()+158 CALL??? sou2o() 05C368F82 000000000 000000000 03D91FBA4 opimai()+191 CALL??? opimai_real() 0001F0003 7FFE509282EE 000000000 00887C9B0 OracleThreadStart() CALL??? opimai() 7FFE51571680 000000002 +724 0085DFE20 0000009F4 00007FFE5157168D CALL??? OracleThreadStart() 012DBFF18 000000000 000000000 000000000 00007FFE533954E4 CALL??? 00007FFE51571680 000000000 000000000 000000000 000000000 --------------------- Binary Stack Dump ---------------------
根据经验基本上可以判断是主机异常关机导致bootstrap$数据异常,从mount到open是无法读取bootstrap$,从而报错ORA-07445[lmebucp()+30]。
1、使用bbed将主库好的bootstrap$表块恢复
2、DBCA重建,恢复备份
评论
有用 0回答交流
提交
问题信息
请登录之后查看
附件列表
请登录之后查看
邀请回答
暂无人订阅该标签,敬请期待~~
墨值悬赏

