- 最后登录
- 2023-8-16
- 在线时间
- 1686 小时
- 威望
- 2135
- 金钱
- 50532
- 注册时间
- 2011-10-12
- 阅读权限
- 200
- 帖子
- 5207
- 精华
- 39
- 积分
- 2135
- UID
- 2
|
2#
发表于 2017-5-16 15:58:11
Dump file d:\oracle\diag\rdbms\nrmsdb\nrmsdb\incident\incdir_418164\nrmsdb_ora_3016_i418164.trc
Oracle Database 11g Enterprise Edition Release 11.2.0.1.0 - 64bit Production
With the Partitioning, OLAP, Data Mining and Real Application Testing options
Windows NT Version V6.1
CPU : 8 - type 8664, 8 Physical Cores
Process Affinity : 0x0x0000000000000000
Memory (Avail/Total): Ph:6214M/16375M, Ph+PgF:22413M/32748M
Instance name: nrmsdb
Redo thread mounted by this instance: 1
Oracle process number: 117
Windows thread id: 3016, image: ORACLE.EXE (SHAD)
*** 2017-05-16 15:12:19.025
*** SESSION ID:(962.148) 2017-05-16 15:12:19.025
*** CLIENT ID:() 2017-05-16 15:12:19.025
*** SERVICE NAME:(nrmsdb) 2017-05-16 15:12:19.025
*** MODULE NAME:(PL/SQL Developer) 2017-05-16 15:12:19.025
*** ACTION NAME:(SQL Window - select * from (sele) 2017-05-16 15:12:19.025
Dump continued from file: d:\oracle\diag\rdbms\nrmsdb\nrmsdb\trace\nrmsdb_ora_3016.trc
ORA-07445: 出现异常错误: 核心转储 [kkonlcac()+208] [ACCESS_VIOLATION] [ADDR:0x8] [PC:0x529E4A8] [UNABLE_TO_READ] []
========= Dump for incident 418164 (ORA 7445 [kkonlcac()+208]) ========
----- Beginning of Customized Incident Dump(s) -----
Exception [type: ACCESS_VIOLATION, UNABLE_TO_READ] [ADDR:0x8] [PC:0x529E4A8, kkonlcac()+208]
Oracle Database 11g Enterprise Edition Release 11.2.0.1.0 - 64bit Production
Process Id: 0x00000f64 Thread Id : 0x00000bc8 Time : Tue May 16 15:12:19
Excp. Code: 0xc0000005 Excp. Type: ACCESS_VIO Flags: 0x00000000
------------------- Registers ----------------------------
ip=000000000529E4A8 sp=0000000052322030 rp=0000000000000004
r1=00000000361C78F8 r2=0000000000000000 r3=00000000361D71F8
r4=0000000000000000 r5=0000000052322030 r6=0000000000000004 r7=0000000000000000
r8=0000000034D58CB8 r9=000000035E7B8ED0 r10=0000000052322CE0 r11=0000000052322CE0
r12=0000000000000000 r13=0000000034D46008 r14=0000000034D5CB50 r15=0000000034D5C058
------------------- End of Registers ---------------------
*** 2017-05-16 15:12:19.025
dbkedDefDump(): Starting a non-incident diagnostic dump (flags=0x3, level=3, mask=0x0)
----- Current SQL Statement for this session (sql_id=c0xnxsyn3py1m) -----
select *
from (select a_box.*, rownum row_num
from (select a0.time_slot_type_id as a0_time_slot_type_id,
a0.up_slot_id as a0_up_slot_id,
a4.time_solt_name as a4_time_solt_name,
a0.vc12number as a0_vc12number,
a0.time_slot_id as a0_time_slot_id,
a0.time_solt_name as a0_time_solt_name,
a2.name as a2_name,
a3.name as a3_name,
a0.related_port_id as a0_related_port_id,
a0.user_mode as a0_user_mode,
a1.port_name as a1_port_name,
a0.scattered_type_id as a0_scattered_type_id,
a0.scattered_state as a0_scattered_state,
a0.vc3number as a0_vc3number,
a0.vc4number as a0_vc4number
from irmus_tps_port_time_slot a0,
irmus_tps_port a1,
irmus_basecode_type a2,
irmus_basecode_type a3,
irmus_tps_port_time_slot a4
where 1 = 1
and a0.related_port_id = a1.port_id(+)
and a0.time_slot_type_id = a2.type_id(+)
and a0.scattered_type_id = a3.type_id(+)
and a0.up_slot_id = a4.time_slot_id(+)
and a1.port_name = '郑州市中牟黄河鸡场网元测试1SDH-端口4'
and a0.limit_province = '001'
order by a0.time_slot_id desc) a_box
where rownum < 21) b_box
where row_num >= 1
----- Call Stack Trace -----
calling call entry argument values in hex
location type point (? means dubious value)
-------------------- -------- -------------------- ----------------------------
kkonlcac()+208 0000000000000000 203C206D0031203D
6F625F6220293132
695F746F6C730078
2029637365642064
kkonxc()+1397 CALL??? kkonlcac() 7B9221BC00000000 000000000
37CDF6330 348C382E8
kkotap()+1026 CALL??? kkonxc()+534 4045AA6B29ACA6B3 000000000
000000000 000000000
kkojnp()+3370 CALL??? kkotap() 000000000 000000000 000000000
000000000
kkocnp()+526 CALL??? kkojnp()+2309 036B24B20 000000005 0523253B0
034D5C058
kkooqb()+1624 CALL??? kkocnp() 000000000 034D4BC18 034D4BC18
0000002E0
kkoqbc()+2474 CALL??? kkooqb()+1295 000002188 034D33520 000000000
35E7BA778
apakkoqb()+200 CALL??? kkoqbc() 36EC616E8 000020B78 036B24B20
0523268E0
apaqbdDescendents() CALL??? apakkoqb() 35E7BA778 000000001 0523271A0
+496 0343BB7F0
apaqbdList()+79 CALL??? apaqbdDescendents() 02D5E2250 02D5E1340 02D5E12E8
02D5E1270
apaqbdDescendents() CALL??? apaqbdList()+41 35E7BA778 000000001 0523271A0
+296 0343B1640
apaqbdList()+79 CALL??? apaqbdDescendents() 02D5E2250 02D5E1318 02D5E12E8
02D5E1270
apaqbdDescendents() CALL??? apaqbdList()+41 35E7BA778 000000001 0000221E0
+296 036B24B20
apaqbdList()+79 CALL??? apaqbdDescendents() 036B24B20 35E7BA778 0343B1640
0343B1640
apaqbd()+17 CALL??? apaqbdList()+41 000000000 000020B78
CDCA109D7B3F 000024A84
apadrv()+818 CALL??? apaqbd() 000000000 000000004 000000000
000000000
opitca()+2518 CALL??? apadrv() 036B250E0 000000000 036B250E0
348D14608
kksLoadChild()+9008 CALL??? opitca() 034D00B10 35E7BA778 052329C60
000000016
kxsGetRuntimeLock() CALL??? kksLoadChild() 036B250E0 364C233A0 052328FC0
+2320 364C233A0
kksfbc()+15225 CALL??? kxsGetRuntimeLock() 036B250E0 034D00B10 052328FC0
000000103
kkspsc0()+2117 CALL??? kksfbc() 034D00B10 000000003 000000108
0343D5A70
kksParseCursor()+18 CALL??? kkspsc0() 034CE1BF0 0343D5A70 0000006DA
1 000000003
opiosq0()+2538 CALL??? kksParseCursor() 00B06D578 27F00001FA0
009B6F3B4 036B250E0
kpooprx()+357 CALL??? opiosq0() 000000003 00000000E 05232AB90
0000000A4
kpoal8()+940 CALL??? kpooprx() 036B250E0 00927C0A8 036B250E0
000000001
opiodr()+1662 CALL??? kpoal8() 00000005E 00000001C 05232E100
00A43F224
ttcpip()+1325 CALL??? opiodr() 00000005E 00000001C 05232E100
000000000
opitsk()+2040 CALL??? ttcpip() 036B3EE00 000000000 000000000
000000000
opiino()+1258 CALL??? opitsk() 000000000 000000000 000000000
05232F9F8
opiodr()+1662 CALL??? opiino() 00000003C 000000004 05232FAB0
000000000
opidrv()+864 CALL??? opiodr() 00000003C 000000004 05232FAB0
6F5C3A6400000000
sou2o()+98 CALL??? opidrv()+150 00000003C 000000004 05232FAB0
000000000
opimai_real()+158 CALL??? sou2o() 1D2CE13C103B27D 000000000
F0010000507E1 201FF0012000C
opimai()+191 CALL??? opimai_real() 000000000 05232FC68 022FB59D0
05232FC68
OracleThreadStart() CALL??? opimai() 000000000 006DF0B34 0000000DC
+724 000000370
000000007738F56D CALL??? OracleThreadStart() 04F62FF18 000000000 000000000
000000000
00000000775C3281 CALL??? 000000007738F560 000000000 000000000 000000000
000000000
|
|