ORA-00600[qmxtriCheckAndRewriteQb0]

联系:手机/微信(+86 17813235971) QQ(107644445)

标题:ORA-00600[qmxtriCheckAndRewriteQb0]

作者:惜分飞©版权所有[未经本人同意,不得以任何形式转载,否则有进一步追究法律责任的权利.]

数据库报ORA-00600[qmxtriCheckAndRewriteQb0]

Oracle Database 10g Enterprise Edition Release 10.2.0.4.0 - 64bit Production
With the Partitioning, Real Application Clusters, OLAP, Data Mining
and Real Application Testing options
ORACLE_HOME = /u01/oracle/product/10.2.0
System name:	AIX
Node name:	abc
Release:	3
Version:	5
Machine:	00C58A644C00
Instance name: XFF2
Redo thread mounted by this instance: 2
Oracle process number: 434
Unix process pid: 492340, image: oracle@abc
*** ACTION NAME:() 2012-11-12 08:46:47.132
*** MODULE NAME:() 2012-11-12 08:46:47.132
*** SERVICE NAME:(ORCL) 2012-11-12 08:46:47.132
*** CLIENT ID:() 2012-11-12 08:46:47.132
*** SESSION ID:(870.58602) 2012-11-12 08:46:47.132
*** 2012-11-12 08:46:47.132
ksedmp: internal or fatal error
ORA-00600: internal error code, arguments: [qmxtriCheckAndRewriteQb0], [], [], [], [], [], [], []
Current SQL statement for this session:
SELECT EXTRACTVALUE(配置,'//SYSTEM[@XTH="'||:B1 ||'"]/FILE') ,
WHERE EXTRACTVALUE(配置,'//SYSTEM[@XTH="'||:B1 ||'"]/BM')=:B2  AND ROWNUM<2
----- PL/SQL Call Stack -----
  object      line  object
  handle    number  name
70000021d535f70        25  procedure ZLTOOLS.ZL_MBRUNLOG_INSERT
7000002b6819368         1  anonymous block
----- Call Stack Trace -----
calling              call     entry                argument values in hex
location             type     point                (? means dubious value)
-------------------- -------- -------------------- ----------------------------
ksedst+001c          bl       ksedst1              000000000 ? 000000000 ?
ksedmp+0290          bl       ksedst               104A2C690 ?
ksfdmp+0018          bl       03F26C3C
kgerinv+00dc         bl       _ptrgl
kgeasnmierr+004c     bl       kgerinv              7000002F735A838 ? 000000000 ?
                                                   000000000 ? 000000000 ?
                                                   0FFFFBFFF ?
IPRA.$qmxtriCheckAn  bl       03F25970
dRewriteQb_rec+0194
IPRA.$qmxtriCheckAn  bl       IPRA.$qmxtriCheckAn  1000881EC ? 000000000 ?
dRewriteQb_rec+006c           dRewriteQb_rec       000000000 ?
IPRA.$qmxtriCheckAn  bl       IPRA.$qmxtriCheckAn  FFFFFFFFFFF07E0 ? 000000033 ?
dRewriteQb_rec+006c           dRewriteQb_rec       1056037F8 ?
qmxtriCheckAndRewri  bcl      dmqlKMlod+00c0       000000000 ? 110421CB0 ?
teQb+0094                                          FFFFFFFFFFE87C0 ?
qmxtrxq+0210         bl       03F252EC
qmxtrxop+00a4        bl       qmxtrxq              FFFFFFFFFFF25B8 ?
                                                   700000282F66DD0 ? 110195E98 ?
koksspend+02b0       bl       qmxtrxop             100346AB4 ?
kkmdrvend+01a8       bl       koksspend            000000001 ? 104B3A8A8 ?
                                                   000000000 ?
kkmdrv+004c          bl       kkmdrvend            FFFFFFFFFFE8BE0 ?
                                                   883843401048F2F8 ?
opiSem+13c0          bl       kkmdrv               000000000 ? 000000000 ?
                                                   000000000 ? 11022AC50 ?
opiDeferredSem+0234  bl       opiSem               FFFFFFFFFFE9CE0 ?
                                                   7000001E327CCE0 ? 000000111 ?
                                                   100000001 ?
opitca+01e8          bl       opiDeferredSem
kksFullTypeCheck+00  bl       03F25230
1c
rpiswu2+034c         bl       _ptrgl
kksSetBindType+0d28  bl       rpiswu2              70000030850C178 ?
                                                   3300000033 ?
                                                   FFFFFFFFFFF0570 ?
                                                   FFFFFFFFFFF0578 ?
                                                   7000002F6F0C700 ?
                                                   33104027D8 ?
                                                   FFFFFFFFFFF1F48 ? 000000000 ?
kksfbc+1054          bl       kksSetBindType       70000030F58F400 ? 1107CB418 ?
                                                   70000001003B800 ?
                                                   10200003000 ? 110000FF8 ?
                                                   7000000100ECAB8 ?
                                                   FFFFFFFFFFF1480 ?
                                                   481A408400003000 ?
opiexe+098c          bl       01F960BC
opipls+185c          bl       opiexe               FFFFFFFFFFF3900 ?
                                                   FFFFFFFFFFF39E8 ?
                                                   FFFFFFFFFFF38A0 ?
opiodr+0ae0          bl       _ptrgl
rpidrus+01bc         bl       opiodr               66FFFF54B0 ? 608736A20 ?
                                                   FFFFFFFFFFF67C0 ?
                                                   1510195E98 ?
skgmstack+00c8       bl       _ptrgl
rpidru+0088          bl       skgmstack            102320840 ? 000000000 ?
                                                   000000002 ? 000000000 ?
                                                   FFFFFFFFFFF5F88 ?
rpiswu2+034c         bl       _ptrgl
rpidrv+095c          bl       rpiswu2              70000030850C178 ? 110469C28 ?
                                                   11044AA58 ? 000000000 ?
                                                   FFFFFFFFFFF5D60 ?
                                                   3300000000 ? 000000000 ?
                                                   000000000 ?
psddr0+02bc          bl       03F266D4
psdnal+01d0          bl       psddr0               1500000000 ? 6600000000 ?
                                                   FFFFFFFFFFF67C0 ?
                                                   30100BACC8 ?
pevm_EXECC+01f8      bl       _ptrgl
pfrinstr_EXECC+0070  bl       pevm_EXECC           10147B2A4 ? 000000000 ?
                                                   700000262828B72 ?
pfrrun_no_tool+005c  bl       _ptrgl
pfrrun+1014          bl       pfrrun_no_tool       FFFFFFFFFFF6B20 ?
                                                   7000002B6819368 ? 3100ECBB0 ?
plsql_run+06b4       bl       pfrrun               1107D84A8 ?
peicnt+0224          bl       plsql_run            1107D84A8 ? 10001102676F8 ?
                                                   000000000 ?
kkxexe+0250          bl       peicnt               FFFFFFFFFFF7E38 ? 1107D84A8 ?
opiexe+2ef8          bl       kkxexe               11047E1C8 ?
kpoal8+0edc          bl       opiexe               FFFFFFFFFFFB454 ?
                                                   FFFFFFFFFFFB1A8 ?
                                                   FFFFFFFFFFF9628 ?
opiodr+0ae0          bl       _ptrgl
ttcpip+1020          bl       _ptrgl
opitsk+1124          bl       01F96AC8
opiino+0990          bl       opitsk               0FFFFD490 ? 000000000 ?
opiodr+0ae0          bl       _ptrgl
opidrv+0484          bl       01F95914
sou2o+0090           bl       opidrv               3C02D99B7C ? 4A076D928 ?
                                                   FFFFFFFFFFFF390 ?
opimai_real+01bc     bl       01F93294
main+0098            bl       opimai_real          000000000 ? 000000000 ?
__start+0098         bl       main                 000000000 ? 000000000 ?
--------------------- Binary Stack Dump ---------------------

通过这个trace的部分信息可以得到:
1.操作系统版本AIX x64(5.3)
2.数据库版本10.2.0.4
3.sql语句调用EXTRACTVALUE函数
4.Call Stack Trace信息

查询MOS[ID 467350.1]发现匹配信息

Cause
Bug 6030982 ORA-600 [QMXTRICHECKANDREWRITEQB0] WITH QUERY USING EXTRACTVALUE FUNCTION
Solution
This bug is going to be fixed in furture 10.2.0.5.0 and 11g
At the mean time , user can workaround by
set
event = "19027 trace name context forever, level 1"
within init.ora or spfile file then bounce database.
or
SQL> alter session set events ='19027 trace name context forever, level 1';
SQL> Alter system flush shared_pool;
-- Execute affected query

通过mos可以确定:
1.是因为数据库执行EXTRACTVALUE函数遇到该bug
2.在11g和10.2.0.5中修复该bug
3.可以通过设置event = “19027 trace name context forever, level 1″来临时解决该问题

个人处理建议
1.如果数据库方便升级,那建议升级处理
2.如果数据库不便立马升级,建议在业务低估时设置session event 19027,然后 flush shared_pool,执行报错sql,如果问题解决,在合适时间设置system event来临时屏蔽该问题.

One thought on “ORA-00600[qmxtriCheckAndRewriteQb0]

  1. Bug 6030982 : ORA-600 [QMXTRICHECKANDREWRITEQB0] WITH QUERY USING EXTRACTVALUE FUNCTION

    Hdr: 6030982 10.2.0.3.0 XDB 10.2.0.3.0 PRODID-5 PORTID-226 ORA-600 5391636
    Abstract: ORA-600 [QMXTRICHECKANDREWRITEQB0] WITH QUERY USING EXTRACTVALUE FUNCTION
    *** 05/03/07 03:37 am ***
    TAR:
    ----
    PROBLEM:
    --------
    1. Clear description of the problem encountered
       Since upgrading to 10.2.0.3.0 query fails with ORA-600
    [qmxtriCheckAndRewriteQb0].
    2. Indication of the frequency and predictability of the problem
       Permanently reproducible.
    DIAGNOSTIC ANALYSIS:
    --------------------
    ORA-600: internal error code, arguments: [qmxtriCheckAndRewriteQb0], [],
    [], [], [], [], [], []
    Current SQL statement for this session:
    select ig.samba_client i
    from dms$industry_map_support im, dms$industry_group ig,dms$instruments di
    where di.id = 744724
    and ig.code =  extractvalue(di.characteristics,trim(im.xmltag))
    WORKAROUND:
    -----------
    -
    RELATED BUGS:
    -------------
    -
    REPRODUCIBILITY:
    ----------------
    - Permanently reproducible on 10.2.0.3.0
    - Not reproducible on 10.2.0.2.0
    TEST CASE:
    ----------
    -- Create test user
    sqlplus /nolog @tc_create_user.sql
    -- Create test objects
    sqlplus dmsadm/dmsadm @tc_create_objects.sql
    -- Reproduce the error
    sqlplus dmsadm/dmsadm @tc_query.sql
    STACK TRACE:
    ------------
    ksedst()+27          call     ksedst1()            0 ? 1 ?
    ksedmp()+557         call     ksedst()             0 ? 0 ? 0 ? 0 ? 0 ? 0 ?
    ksfdmp()+19          call     ksedmp()             3 ? BFFF3914 ? AD55985 ?
                                                       CD989E0 ? 3 ? CD48AF8 ?
    kgerinv()+177        call     00000000             CD989E0 ? 3 ?
    kgeasnmierr()+40     call     kgerinv()            CD989E0 ? B72A0020 ?
                                                       C7B16CC ? 0 ? BFFF394C ?
    qmxtriCheckAndRewri  call     kgeasnmierr()        CD989E0 ? B72A0020 ?
    teQb_rec()+242                                     C7B16CC ? 0 ?
    qmxtriCheckAndRewri  call     qmxtriCheckAndRewri  B7296808 ? BFFF3DF8 ?
    teQb_rec()+61                 teQb_rec()           B7297008 ?
    qmxtriCheckAndRewri  call     qmxtriCheckAndRewri  B7296808 ? BFFF3DF8 ?
    teQb_rec()+61                 teQb_rec()           B72960AC ?
    qmxtriCheckAndRewri  call     qmxtriCheckAndRewri  B7296808 ? BFFF3DF8 ?
    teQb()+67                     teQb_rec()           B7296040 ?
    qmxtrxq()+278        call     qmxtriCheckAndRewri  B7296808 ? BFFF3DF8 ?
                                  teQb()               30DB3E08 ? 30DB3E08 ?
                                                       30DB3E08 ? 0 ?
    qmxtrxop()+129       call     qmxtrxq()            B7296808 ? BFFF3DF8 ? 1 ?
                                                       30DB3E08 ? BFFF3DF8 ? 0 ?
    koksspend()+182      call     qmxtrxop()           30DB3E08 ? BFFF9640 ?
                                                       30DB3E08 ?
    kkmdrvend()+102      call     koksspend()          BFFF9640 ? 30DB3E08 ? 0 ?
                                                       B7296808 ? B7296808 ? C ?
    kkmdrv()+70          call     kkmdrvend()          BFFF3EE0 ? B7296808 ?
                                                       BFFF3EE0 ? CD989E0 ?
                                                       B7296808 ? BFFF3EE0 ?
                                                       B7296808 ? BFFF3EE0 ?
                                                       BFFF9640 ? 0 ? 0 ? 0 ?
    opiSem()+1044        call     kkmdrv()             BFFF9640 ? B7296808 ? 0 ?
    0 ?
    opiDeferredSem()+28  call     opiSem()             BFFF9640 ? 32DD9AD0 ? B8 ?
    3                                                  1 ?
    opitca()+275         call     opiDeferredSem()     41C ? CD48AF8 ? CD989E0 ?
    0 ?
                                                       1BC76C ? 0 ?
    __PGOSF302_kksFullT  call     opitca()             B72C9EC8 ? 30DB3E08 ?
    ypeCheck()+20
    rpiswu2()+334        call     00000000             BFFFA674 ? BFFF9DB8 ?
                                                       97B340F ? 0 ? BFFF9D38 ?
                                                       BFFF9DA4 ?
    ...
    

发表评论

邮箱地址不会被公开。 必填项已用*标注

14 − 4 =