- 最后登录
- 2023-8-16
- 在线时间
- 1686 小时
- 威望
- 2135
- 金钱
- 50532
- 注册时间
- 2011-10-12
- 阅读权限
- 200
- 帖子
- 5207
- 精华
- 39
- 积分
- 2135
- UID
- 2
|
3#
发表于 2012-4-6 20:35:02
ODM DATA:
Oracle Database 10g Enterprise Edition Release 10.2.0.4.0 - Production
Windows Server 2003 Version V5.2 Service Pack 2
ORA-07445: 出现异常错误: 核心转储 [ACCESS_VIOLATION] [_kgghstfel+15] [PC:0x401FA67] [ADDR:0x14] [UNABLE_TO_READ] []
Current SQL statement for this session:
select count(*) from user$ u, xdb.xdb$schema s where u.user# = :1 and u.name = s.xmldata.schema_owner and (xdb.xdb$Extname2Intname(s.xmldata.schema_url, s.xmldata.schema_owner) = :2)
----- PL/SQL Call Stack -----
object line object
handle number name
3D97AF30 1 function XDB.XDB$EXTNAME2INTNAME
3838B24C 1 anonymous block
4784089C 17 package body SYS.XML_SCHEMA_NAME_PRESENT
check trace file d:\oracle\product\10.2.0\db_2\rdbms\trace\gdeip_ora_0.trc for preloading .sym file messages
----- Call Stack Trace -----
calling call entry argument values in hex
location type point (? means dubious value)
-------------------- -------- -------------------- ----------------------------
_kgghstfel+15 00000000
_qmtLookup+41 CALLrel _kgghstfel+0 0 37DB134
_qmtAddRef+28 CALLrel _qmtLookup+0
_qmeInitUGA+81 CALLrel _qmtAddRef+0
_qm_init_uga_helper CALLrel _qmeInitUGA+0
+624
_qm_run_as_ksys+201 CALLreg 00000000 572A90BC
_qm_init_uga+13 CALLrel _qm_run_as_ksys+0 572A90BC 19AC834
_qmeGetResRelByHdl+ CALLrel _qm_init_uga+0
1465
_qmtkLookupSchemaOI CALLrel _qmeGetResRelByHdl+ 572A91A8 0 522A0190 35 0 0
DPath+547 0
_qmtkLookupSchemaOI CALLrel _qmtkLookupSchemaOI 578CE300 56B691E0 24 56B691DC
D+153 DPath+0 3 572A937C 0 0 0 0
_qmtsExtName2IntNam CALLreg 00000000 578CE300 56B691B8 4C 572A937C
e+875
__VInfreq__spefcpfa CALLreg 00000000 572A9F4C 56B77F88 56B77F68
+84 56B7E19C
_spefmccallstd+464 CALLrel _spefcpfa+0 572A9BF4 4 56B7E168 572A9654
572A9670 0
_pextproc+58 CALLrel _spefmccallstd+0 572A9ED4 572A9D88 572A9C64
572A9BF4 0
__PGOSF327__peftrus CALLrel _pextproc+0
ted+115
__PGOSF348__psdexsp CALLreg 00000000 572A9ED4
+192
_rpiswu2+426 CALLreg 00000000 572A9B14
_psdextp+629 CALLrel _rpiswu2+0 471A3068 0 471A3094 2
572A9B30 0 471A3114 0 310A21C
0 572A9B14 1
_pefccal+631 CALLreg 00000000 572AA338 572A9D88 572A9C64 0
20003 572A9ED4 4646564
_pefcal+174 CALLrel _pefccal+0 572A9ED4
_pevm_FCAL+75 CALLrel _pefcal+0
_pfrinstr_FCAL+55 CALLrel _pevm_FCAL+0 522E9458 34E0F4B0
_pfrrun_no_tool+56 CALL??? 00000000 522E9458 34E0F3BE 522E9494
_pfrrun+781 CALLrel _pfrrun_no_tool+0 522E9458 34CDC372 522E9494
_plsql_run+1382 CALLrel _pfrrun+0 522E9458
_peicnt+506 CALLrel _plsql_run+0 522E9458 1 0
_kkxuexe+805 CALLrel _peicnt+0
_kkxmpsexe+1203 CALLrel _kkxuexe+0 572AA4AC 5230E1CC 5230E1C8
_kgmexwi+469 CALLreg 00000000 578CE300 0 0 0 0 5230E1CC
5230E1EC
_kgmexec+2435 CALLrel _kgmexwi+0 578CE300 1 572AA7E4 0 0 0 0 0
5230E1CC 572AA72C
_evapls+1425 CALLrel _kgmexec+0 578CE300 1 572AA7E4 3838B24C
34CDC680 5230E2AC 5230E1CC 0
5230E298 0 0
_evaopn2+405 CALLreg 00000000 3B30C16C
_evareo+110 CALLreg 00000000 3B30C16C
_expepr+73 CALL??? 00000000 3B30C1C8
_expeal+17 CALLrel _expepr+0 3B30C1C8
_kdstf0100100km+440 CALLrel _expeal+0 3B30C1C8
8
_kdsttgr+26253 CALLrel _kdstf0100100km+0
_qertbFetch+698 CALLrel _kdsttgr+0 56535120 0 3B30C2F4 565350B8
3B30C33C 0 0 1
_qerjotFetch+254 CALL??? 00000000 3B1F7DB4 267778A 3B30C2F4 0
_qergsFetch+2013 CALL??? 00000000 3B1F7C60 23339FC 57432FEC
7FFF
_opifch2+5808 CALL??? 00000000 3B1F7BE4 2413634 572AB190 2
_opiefn0+360 CALLrel _opifch2+0 89 6 572AB340
_opipls+9595 CALLrel _opiefn0+0 4E 6 572AB3FC 0 0 0 0 0 0 0
_opiodr+1286 CALLreg 00000000 66 6 572ABF78
_rpidrus+178 CALLrel _opiodr+0 66 6 572ABF78 4
_rpidru+88 CALLrel _rpidrus+0 572ABA4C
_rpiswu2+426 CALLreg 00000000 572ABE14
_rpidrv+1461 CALLrel _rpiswu2+0 471A3068 0 572ABDE8 2
572ABE08 0 572ABDE8 0 914910
9149D0 572ABE14 38
_psddr0+449 CALLrel _rpidrv+0 4 66 572ABF78 38
_psdnal+328 CALLrel _psddr0+0
_pevm_EXIM+153 CALLreg 00000000
_pfrinstr_EXIM+34 CALLrel _pevm_EXIM+0 5230FC28 522B6150
_pfrrun_no_tool+56 CALL??? 00000000 5230FC28 3B1F9198 5230FC64
_pfrrun+781 CALLrel _pfrrun_no_tool+0 5230FC28 3B1F913E 5230FC64
_plsql_run+1382 CALLrel _pfrrun+0 5230FC28
_peidxr_run+456 CALLrel _plsql_run+0 5230FC28 1 522D9C48
_peidxexe+101 CALLrel _peidxr_run+0
_kkxdexe+710 CALLrel _peidxexe+0
_kkxmpexe+435 CALLrel _kkxdexe+0 5230FADC 522E620C 5230E814
_kgmexwi+469 CALLreg 00000000 578CE300 3B23BB6C 522EABB4
5230FADC 4784089C 5230E814
5230E834
_kgmexec+2435 CALLrel _kgmexwi+0 578CE300 1 572AC714 3B23BB6C
522EABB4 5230DD88 1 4784089C
5230E814 572AC65C
_evapls+1425 CALLrel _kgmexec+0 578CE300 1 572AC714 3AF32634
34DCAA60 5230E8F4 5230E814 0
5230E8E0 0 1F9
_evaopnc+11 CALLreg 00000000 3B300904
_rpiswu2+426 CALLreg 00000000 572ACAC4
_evaopn2+1769 CALLrel _rpiswu2+0 471A3068 0 572ACAA4 2
572ACAD4 0 572ACAA4 0 138C540
0 572ACAC4 0
_subsr1+277 CALL??? 00000000 3B300904
_subsr3+252 CALLrel _subsr1+0 3B300974
_evaopn2+2749 CALL??? 00000000 3B300974
_evareo+61 CALLrel _evaopn2+0 3B300600
_expepr+73 CALL??? 00000000 34F6C88C
_evaiand+33 CALLrel _expepr+0 34F6C88C
_expepr+73 CALL??? 00000000 34F6C98C
_evaior+33 CALLrel _expepr+0 34F6C98C
_expepr+73 CALL??? 00000000 34D9E15C
_evaiand+33 CALLrel _expepr+0 34D9E15C
_expeal+28 CALLrel _evaiand+0 3B3DB034
_qerflFetchOutside+ CALLrel _expeal+0 3B3DB034
108
_qervwFetch+126 CALL??? 00000000
_rwsfcd+95 CALL??? 00000000 3B15AB68 1AE2D50 572ACEC8 64
_qerhjFetch+969 CALL??? 00000000
_kpofrws+235 CALL??? 00000000 3B15A4A8 138F47C 572AD178 64
_opifch2+5748 CALLrel _kpofrws+0 522D9314 3B2CB2A8 138F47C
572AD178 64
_opifch+51 CALLrel _opifch2+0 89 5 572AD2C8
_opiodr+1286 CALLreg 00000000 5 2 572AF68C
_ttcpip+2512 CALLreg 00000000 5 2 572AF68C 1
_opitsk+1107 CALL??? 00000000
_opiino+1087 CALLrel _opitsk+0 0 0
_opiodr+1286 CALLreg 00000000 3C 4 572AFC28
_opidrv+819 CALLrel _opiodr+0 3C 4 572AFC28 0
_sou2o+45 CALLrel _opidrv+0 3C 4 572AFC28
_opimai_real+204 CALLrel _sou2o+0 572AFC1C 3C 4 572AFC28
_opimai+92 CALLrel _opimai_real+0 2 572AFC54
_OracleThreadStart@ CALLrel _opimai+0
4+2023
7C82482C CALLreg 00000000
SO: 471A3068, type: 4, owner: 4764FEC4, flag: INIT/-/-/0x00
(session) sid: 535 trans: 00000000, creator: 4764FEC4, flag: (8000041) USR/- BSY/-/-/-/-/-
DID: 0001-00A3-0000034D, short-term DID: 0000-0000-00000000
txn branch: 00000000
oct: 3, prv: 0, sql: 2DADCE7C, psql: 3835419C, user: 0/SYS
service name: gdeip
O/S info: user: Administrator, term: YUAN-PC, ospid: 2640:3028, machine: WORKGROUP\YUAN-PC
program: plsqldev.exe
application name: plsqldev.exe, hash value=2126984564
last wait for 'db file sequential read' blocking sess=0x00000000 seq=369 wait_time=5458 seconds since wait started=0
file#=3, block#=2815, blocks=1
SO: 43FA50C0, type: 53, owner: 471A3068, flag: INIT/-/-/0x00
LIBRARY OBJECT LOCK: lock=43fa50c0 handle=2dadce7c mode=N
call pin=00000000 session pin=00000000 hpc=0000 hlc=0000
htl=43FA5110[352AAB3C,3530BF64] htb=352AAB3C ssga=352AA3F0
user=471a3068 session=471a3068 count=1 flags=[0000] savepoint=0x4f7e69bd
LIBRARY OBJECT HANDLE: handle=2dadce7c mtx=2DADCF30(1) cdp=1
name=
select s.synonym_name object_name, o.object_type
from sys.all_synonyms s,
sys.all_objects o
where s.owner in ('PUBLIC', user)
and o.owner = s.table_owner
and o.object_name = s.table_name
and o.object_type in ('TABLE', 'VIEW', 'PACKAGE','TYPE', 'PROCEDURE', 'FUNCTION', 'SEQUENCE')
hash=9f9294dcb908862ceb4eb393ae6adbd2 timestamp=04-06-2012 11:57:50 |
|