标签云
asm恢复 bbed bootstrap$ dul kcbzib_kcrsds_1 kccpb_sanity_check_2 kcratr_nab_less_than_odr MySQL恢复 ORA-00312 ORA-00704 ORA-00742 ORA-01110 ORA-01200 ORA-01555 ORA-01578 ORA-01595 ORA-600 2662 ORA-600 2663 ORA-600 3020 ORA-600 4000 ORA-600 4137 ORA-600 4193 ORA-600 4194 ORA-600 16703 ORA-600 kcbzib_kcrsds_1 ORA-600 KCLCHKBLK_4 ORA-600 kcratr_nab_less_than_odr ORA-600 kdsgrp1 ORA-15042 ORA-15196 ORACLE 12C oracle dul ORACLE PATCH Oracle Recovery Tools oracle加密恢复 oracle勒索 oracle勒索恢复 oracle异常恢复 ORACLE恢复 Oracle 恢复 ORACLE数据库恢复 oracle 比特币 OSD-04016 YOUR FILES ARE ENCRYPTED 比特币加密文章分类
- Others (2)
- 中间件 (2)
- WebLogic (2)
- 操作系统 (112)
- 数据库 (1,841)
- DB2 (22)
- MySQL (81)
- Oracle (1,669)
- Data Guard (53)
- EXADATA (8)
- GoldenGate (24)
- ORA-xxxxx (168)
- ORACLE 12C (72)
- ORACLE 18C (6)
- ORACLE 19C (15)
- ORACLE 21C (3)
- Oracle 23ai (8)
- Oracle ASM (69)
- Oracle Bug (8)
- Oracle RAC (55)
- Oracle 安全 (6)
- Oracle 开发 (28)
- Oracle 监听 (29)
- Oracle备份恢复 (632)
- Oracle安装升级 (103)
- Oracle性能优化 (62)
- 专题索引 (5)
- 勒索恢复 (89)
- PostgreSQL (37)
- pdu工具 (7)
- PostgreSQL恢复 (13)
- SQL Server (34)
- SQL Server恢复 (14)
- TimesTen (7)
- 达梦数据库 (4)
- 达梦恢复 (2)
- 生活娱乐 (2)
- 至理名言 (11)
- 虚拟化 (2)
- VMware (2)
- 软件开发 (47)
- Asp.Net (9)
- JavaScript (12)
- PHP (2)
- 小工具 (30)
-
最近发表
- aix环境rac 私网直连导致haip启动异常
- 又一例TRIM导致asm磁盘数据丢失的故障
- 一次运气好的ORA-600 kcratr_nab_less_than_odr故障处理
- OraFHR快速open被勒索加密破坏的Oracle数据库
- obet一键恢复offline数据文件
- 记录一次win删除数据文件完美恢复案例
- Oracle典型故障:The controlfile header block returned by the OS has a sequence number that is too old
- 国产信创库fio破坏主备库以及备份故障处理
- .wman扩展名勒索mysql数据库恢复
- Oracle数据库被勒索加密一键open工具–OraFHR
- 通过alert日志回顾其他dba oracle异常恢复故障处理以及后续open数据库操作
- 年前几例Oracle数据库被加密为.wman的数据库故障恢复
- 文件系统损坏导致数据库异常故障处理
- expdp导出xml列报ORA-22924故障处理
- obet处理ORA-704 ORA-604 ORA-1578故障
- obet修复csc higher than block scn类型坏块
- ORA-600 kcratr_nab_less_than_odr和ORA-600 4193故障处理
- aix环境10g由于控制器异常导致ORA-600 4000故障处理
- ORA-600 3716故障处理
- 不当恢复truncate数据导致数据库不能open处理
标签归档:shell extents
shell脚本获得extents分布
比较深入看过dba_extents视图的朋友都知道,它得到extent的信息不是通过普通的存储在数据库中的基表获得,而是x$相关的表获得(x$表是数据库启动时候在内存中创建,不存在数据文件中),因为当数据库未正常启动,我们无法直接确定某个block是否在某个对象中.其实关于extent的信息都已经记录在了segment header的block中,通过dump该block记录的rdba信息,未转化为file_id和block_id,这里写shell脚本实现把segment header dump 内容转化为类似dba_extents记录,方便在某些不能open的库中分析某个异常block是否属于某个表
#! /bin/bash
dec2bin(){
val_16=$1
((num=$val_16));
val=`echo $num`
local base=$2
[ $val -eq 0 ] && bin=0
if [ $val -ge $base ]; then
dec2bin $val $((base*2))
if [ $val -ge $base ]; then
val=$(($val-$base))
bin=${bin}1
else
bin=${bin}0
fi
fi
[ $base -eq 1 ] && printf $bin
}
for i in `grep "length:" $1 |awk '{print $1 $3}'`;
do
rdba=`echo ${i:0:10}`
blocks=`echo ${i:10}`
echo -n "rdba:"$rdba" "
bin2=`dec2bin $rdba 1`
len=`expr length $bin2`
len_gd=22
len_jg=`expr $len - $len_gd`
file_no_2=`echo ${bin2:0:$len_jg}`
((file_no=2#$file_no_2))
echo -n "file_id:"$file_no" "
block_no_2=`echo ${bin2:$len_jg}`
((block_no=2#$block_no_2))
echo -n "block_id:"$block_no" "
echo "blocks:"$blocks
done;
trace文件中部分信息
----------------------------------------------------------------- 0x00400901 length: 7 0x00402e10 length: 8 0x00402e60 length: 8 0x00402e68 length: 8 0x00402ea0 length: 8 0x00402f20 length: 8 0x00402f48 length: 8 0x00403050 length: 8 0x00403180 length: 8 0x00403b38 length: 8 0x00404c48 length: 8 0x00404c78 length: 8 0x00404cf8 length: 8 0x00404da8 length: 8 0x00404db8 length: 8 0x00404de8 length: 8 0x00404e80 length: 128 0x00405900 length: 128 0x00406500 length: 128 0x00406980 length: 128 0x00407480 length: 128 0x00407500 length: 128 0x00407680 length: 128 0x00407800 length: 128 0x00407880 length: 128 0x00407a00 length: 128 0x00407a80 length: 128 0x00407c80 length: 128 …………
执行结果
[oracle@xifenfei tmp]$ ./get_extent.sh /u01/app/oracle/diag/rdbms/cdb/cdb/trace/cdb_ora_29565.trc rdba:0x00400901 file_id:1 block_id:2305 blocks:7 rdba:0x00402e10 file_id:1 block_id:11792 blocks:8 rdba:0x00402e60 file_id:1 block_id:11872 blocks:8 rdba:0x00402e68 file_id:1 block_id:11880 blocks:8 rdba:0x00402ea0 file_id:1 block_id:11936 blocks:8 rdba:0x00402f20 file_id:1 block_id:12064 blocks:8 rdba:0x00402f48 file_id:1 block_id:12104 blocks:8 rdba:0x00403050 file_id:1 block_id:12368 blocks:8 rdba:0x00403180 file_id:1 block_id:12672 blocks:8 rdba:0x00403b38 file_id:1 block_id:15160 blocks:8 rdba:0x00404c48 file_id:1 block_id:19528 blocks:8 rdba:0x00404c78 file_id:1 block_id:19576 blocks:8 rdba:0x00404cf8 file_id:1 block_id:19704 blocks:8 rdba:0x00404da8 file_id:1 block_id:19880 blocks:8 rdba:0x00404db8 file_id:1 block_id:19896 blocks:8 rdba:0x00404de8 file_id:1 block_id:19944 blocks:8 rdba:0x00404e80 file_id:1 block_id:20096 blocks:128 rdba:0x00405900 file_id:1 block_id:22784 blocks:128 rdba:0x00406500 file_id:1 block_id:25856 blocks:128 rdba:0x00406980 file_id:1 block_id:27008 blocks:128 rdba:0x00407480 file_id:1 block_id:29824 blocks:128 rdba:0x00407500 file_id:1 block_id:29952 blocks:128 rdba:0x00407680 file_id:1 block_id:30336 blocks:128 rdba:0x00407800 file_id:1 block_id:30720 blocks:128 …………

加我微信(17813235971)
加我QQ(107644445)

