码迷,mamicode.com
首页 > 其他好文 > 详细

dump文件的初体验

时间:2016-06-23 12:59:58      阅读:159      评论:0      收藏:0      [点我收藏+]

标签:

create table dxmy (id number,name varchar2(100));
insert into dxmy values(1,'dxmy');
insert into dxmy values(2,'dxmy');
insert into dxmy values(3,'dxmy');
insert into dxmy values(4,'dxmy');
commit;

SQL> select extent_id, file_id, block_id, blocks from dba_extents where segment_name = 'DXMY' order by extent_id;
SQL> 
 
 EXTENT_ID    FILE_ID   BLOCK_ID     BLOCKS
---------- ---------- ---------- ----------
         0          4        456          8


SQL> alter system dump datafile 4 block 456;
 
System altered
 
SQL> show parameter user
 
NAME                                 TYPE        VALUE
------------------------------------ ----------- ------------------------------
license_max_users                    integer     0
parallel_adaptive_multi_user         boolean     TRUE
redo_transport_user                  string      
user_dump_dest                       string      D:\app\liming\diag\rdbms\orcl\orcl\trace

生成的dump文件简单示例:

Trace file D:\APP\LIMING\diag\rdbms\orcl\orcl\trace\orcl_ora_7708.trc
Oracle Database 11g Enterprise Edition Release 11.2.0.4.0 - 64bit Production
With the Partitioning, OLAP, Data Mining and Real Application Testing options
Windows NT Version V6.2  
CPU                 : 4 - type 8664, 2 Physical Cores
Process Affinity    : 0x0x0000000000000000
Memory (Avail/Total): Ph:11222M/16118M, Ph+PgF:8045M/17142M 
Instance name: orcl
Redo thread mounted by this instance: 1
Oracle process number: 30
Windows thread id: 7708, image: ORACLE.EXE (SHAD)


*** 2016-06-23 10:39:31.117
*** SESSION ID:(1144.569) 2016-06-23 10:39:31.117
*** CLIENT ID:() 2016-06-23 10:39:31.117
*** SERVICE NAME:(orcl) 2016-06-23 10:39:31.117
*** MODULE NAME:(PL/SQL Developer) 2016-06-23 10:39:31.117
*** ACTION NAME:(Command Window - New) 2016-06-23 10:39:31.117
 
Start dump data blocks tsn: 4 file#:4 minblk 456 maxblk 456
Block dump from cache:
Dump of buffer cache at level 4 for tsn=4 rdba=16777672
BH (0x00007FFEBEFB2018) file#: 4 rdba: 0x010001c8 (4/456) class: 8 ba: 0x00007FFEBE802000
  set: 10 pool: 3 bsz: 8192 bsi: 0 sflg: 2 pwc: 188,28
  dbwrid: 0 obj: 88017 objn: 88017 tsn: 4 afn: 4 hint: f
  hash: [0x00007FFEC8FC85E8,0x00007FFEF933C020] lru: [0x00007FFEBEFB2240,0x00007FFEBEFB1FD0]
  ckptq: [NULL] fileq: [NULL] objq: [0x00007FFEEEFB8940,0x00007FFEBEFB1EC0] objaq: [0x00007FFEEEFB8930,0x00007FFEBEFB1ED0]
  st: XCURRENT md: NULL fpin: 'ktspfwh6: ktspffbmb' tch: 1
  flags: block_written_once redo_since_read
  LRBA: [0x0.0.0] LSCN: [0x0.0] HSCN: [0xffff.ffffffff] HSUB: [3]
BH (0x00007FFEC8FC8530) file#: 4 rdba: 0x010001c8 (4/456) class: 8 ba: 0x00007FFEC8A4C000
  set: 12 pool: 3 bsz: 8192 bsi: 0 sflg: 2 pwc: 201,28
  dbwrid: 0 obj: 88005 objn: 88005 tsn: 4 afn: 4 hint: f
  hash: [0x00007FFEF933C020,0x00007FFEBEFB20D0] lru: [0x00007FFECAF798B8,0x00007FFEC8FC7C60]
  lru-flags: on_auxiliary_list
  ckptq: [NULL] fileq: [NULL] objq: [NULL] objaq: [NULL]
  st: FREE md: NULL fpin: 'ktspfwh6: ktspffbmb' tch: 0 lfb: 33
  flags:
Block dump from disk:
buffer tsn: 4 rdba: 0x010001c8 (4/456)
scn: 0x0000.0024c385 seq: 0x02 flg: 0x04 tail: 0xc3852002
frmt: 0x02 chkval: 0xf07d type: 0x20=FIRST LEVEL BITMAP BLOCK
Hex dump of block: st=0, typ_found=1
Dump of memory from 0x00000000174F4400 to 0x00000000174F6400
0174F4400 0000A220 010001C8 0024C385 04020000  [ .........$.....]
0174F4410 0000F07D 00000000 00000000 00000000  [}...............]
0174F4420 00000000 00000000 00000000 00000000  [................]
        Repeat 1 times
0174F4440 00000000 00000000 00000000 00000004  [................]
0174F4450 FFFFFFFF 00000000 00000003 00000008  [................]
0174F4460 00010001 00000000 00000000 00000000  [................]
0174F4470 00000005 00000003 576B463B 576B463B  [........;FkW;FkW]
0174F4480 00000000 00000000 00000000 00000000  [................]
0174F4490 010001C9 00000000 00000000 00000008  [................]
0174F44A0 00000008 010001D0 00000000 00000000  [................]
0174F44B0 00000000 00000005 00000000 00000001  [................]
0174F44C0 000157D1 002461D5 00000000 010001C8  [.W...a$.........]
0174F44D0 00000008 00000000 00000000 00000000  [................]
0174F44E0 00000000 00000000 00000000 00000000  [................]
        Repeat 9 times
0174F4580 00000000 00000000 00000000 55551511  [..............UU]
0174F4590 00000000 00000000 00000000 00000000  [................]
        Repeat 485 times
0174F63F0 00000000 00000000 00000000 C3852002  [............. ..]
Dump of First Level Bitmap Block
 --------------------------------
   nbits : 4 nranges: 1         parent dba:  0x010001c9   poffset: 0     
   unformatted: 0       total: 8         first useful block: 3      
   owning instance : 1
   instance ownership changed at 06/23/2016 10:15:23
   Last successful Search 06/23/2016 10:15:23
   Freeness Status:  nf1 0      nf2 0      nf3 0      nf4 5      
 
   Extent Map Block Offset: 4294967295 
   First free datablock : 3      
   Bitmap block lock opcode 0
   Locker xid:     :  0x0000.000.00000000
   Dealloc scn: 2384341.0 
   Flag: 0x00000001 (-/-/-/-/-/HWM)
   Inc #: 0 Objd: 88017 
  HWM Flag: HWM Set
      Highwater::  0x010001d0  ext#: 0      blk#: 8      ext size: 8     
  #blocks in seg. hdr's freelists: 0     
  #blocks below: 5     
  mapblk  0x00000000  offset: 0     
  --------------------------------------------------------
  DBA Ranges :
  --------------------------------------------------------
   0x010001c8  Length: 8      Offset: 0      
  
   0:Metadata   1:Metadata   2:Metadata   3:75-100% free
   4:75-100% free   5:75-100% free   6:75-100% free   7:75-100% free
  --------------------------------------------------------
End dump data blocks tsn: 4 file#: 4 minblk 456 maxblk 456


dump文件的初体验

标签:

原文地址:http://blog.csdn.net/ghostliming/article/details/51741619

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!