Tenho um programa instalado com
conecção via JDBC, o programa estava funcionando OK, mas o Driver JDBC está
gerando alguns traces no banco Oracle, gostaria de saber se uma Há alguma versão
mais recente deste do JDBC que não estaja dando probremas, e se a simples troca
(substituição) deste Driver póderia ser feita sem fazer mudanças no programa.
Infelismante o DBA do banco não
consegue identificar a versão do driver , ele não sebe como fazer.
Ai está um pedaço do Trace
gerado :
Obrigado
Marcos Reis
Dump file /u00/app/oracle8/admin/MAXIMO/udump/ora_10690_maximo.trc Thu Jul 20 17:20:35 2000 Oracle8 Enterprise Edition Release 8.0.5.0.0 - Production With the Partitioning and Objects options PL/SQL Release 8.0.5.0.0 - Production ORACLE_HOME = /u00/app/oracle8/product/8.0.5 System name: AIX Node name: tmn Release: 1 Version: 4 Machine: 00982964A600 Instance name: MAXIMO Redo thread mounted by this instance: 1 Oracle process number: 30 Unix process pid: 10690, image: *** SESSION ID:(108.608) 2000.07.20.17.20.35.000 Exception signal: 11, code = 0 sc_onstack: 0000000000000000, sc_mask 0000000000000000 0x10001068 (10001068) 7ca0242a Registers: iar: 10001068, msr: 0000d030, cr: 44225801, lr: 1042490c r00: 00000004, r01: 2ff201c0, r02: 200537e8, r03: fffff9c2, r04: 2ff22fe8, r05: deadbeef, r06: deadbeef, r07: 100001f0, r08: 2ff22e48, r09: 00000000, r10: 2ff22ff8, r11: deadbeef, r12: deadbeef, r13: 00000000, r14: 2ff212a8, r15: 2ff215a0, r16: 20020060, r17: 2ff21420, r18: 2ff20df8, r19: 20048ef8, r20: 2ff21320, r21: 20008bd0, r22: 2ff211b0, r23: 00000000, r24: 10dff6e0, r25: 00000000, r26: 202d2040, r27: 2ff20848, r28: 84245084, r29: 20008bd0, r30: 2ff20848, r31: 00000000, ----- Call Stack Trace ----- calling call entry argument values in hex location type point (? means dubious value) -------------------- -------- -------------------- ---------------------------- 10001074 bc 0c011068 ----- Argument/Register Address Dump ----- ----- End of Call Stack Trace ----- *** 2000.07.20.17.20.35.000 ksedmp: internal or fatal error ORA-07445: exception encountered: core dump [11] [0] [0] [] [] [] ----- Call Stack Trace ----- calling call entry argument values in hex location type point (? means dubious value) -------------------- -------- -------------------- ---------------------------- ksedmp+00c4 bl ksedst 10FABDDC ? ssexhd+02f8 bl ksedmp 10FB3A36 ? 00003CE8 ? 00000000 "0 7è+XXXX ? 00000000 ----- Argument/Register Address Dump ----- Argument/Register addr=10fabddc. Dump of memory from 10FABD9C to 10FABEDC 10FABD80 2F526567 10FABDA0 69737465 72206164 64723D25 782E2020 0049424D 0A0A2D2D 2D2D2D20 456E6420 10FABDC0 6F662043 616C6C20 53746163 6B205472 61636520 2D2D2D2D 2D0A0A00 6B736564 10FABDE0 6D703A20 696E7465 726E616C 206F7220 66617461 6C206572 726F720A 0049424D 10FABE00 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 10FABE20 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D0A 0049424D 46696C65 73206375 10FABE40 7272656E 746C7920 6F70656E 65642062 79207468 69732070 726F6365 73733A0A 10FABE60 0049424D 6B736564 6D703A20 6E6F2063 75727265 6E742063 6F6E7465 78742061 10FABE80 7265610A 0049424D 6B736570 6F700000 5244424D 53000000 4F524100 414D4552 10FABEA0 4943414E 5F414D45 52494341 2E555337 41534349 49000000 6B736667 6C740000 10FABEC0 6B736666 6C740049 6B736667 6C740049 6B736666 6C740000 4B474C20 Argument/Register addr=10fb3a36. Dump of memory from 10FB39F6 to 10FB3B36 10FB39E0 3A202538 2E38782C 206D7372 10FB3A00 3A202538 2E38782C 20206372 3A202538 2E38782C 20206C72 3A202538 2E38780A 10FB3A20 0049424D 7225322E 32643A20 25382E38 782C2563 00490A00 01FF01FE 01FC01F8 10FB3A40 01F001E0 01C00180 01000000 00000000 00000000 00000000 00000000 00000000 10FB3A60 00436869 6C642000 00000000 00000000 00005061 72656E74 20000000 00000000 10FB3A80 00000050 6172656E 742B6368 696C6472 656E2000 6B736C63 6C6E2D65 72726F72 10FB3AA0 00000000 62757379 00000000 66726565 00000000 62757379 28736861 72656429 10FB3AC0 0049424D 57414954 20232564 3A206E61 6D3D2725 73272065 6C613D20 256C6420 10FB3AE0 70313D25 6C642070 323D256C 64207033 3D256C64 0A004942 252A7325 7320256C 10FB3B00 78202573 2573206C 6576656C 3D256420 00004942 6368696C 64233D25 64200049 10FB3B20 6765745F 636F6D6D 656E743D 25732000 0A202020 20202020 ----- End of Call Stack Trace ----- =================================================== Files currently opened by this process: =================================================== PROCESS STATE ------------- Process global information: process: 300a4da4, call: 3099012c, xact: 0, curses: 300fac44, usrses: 300fac44 ---------------------------------------- SO: 300a4da4, type: 1, owner: 0, flag: INIT/-/-/0x00 (process) Oracle pid=30, calls cur/top: 3099012c/3099012c, flag: (0) - int error: 0, call error: 0, sess error: 0, txn error 0 (post info) last post received: 0 0 0 last post received-location: No post last process to post me: none last post sent: 0 0 0 last post sent-location: No post last process posted by me: none (latch info) wait_event=0 bits=0 O/S info: user: oracle8, term: pts/4, ospid: 10690 OSD pid info: Unix process pid: 10690, image: ---------------------------------------- SO: 300fac44, type: 3, owner: 300a4da4, flag: INIT/-/-/0x00 (session) trans: 0, creator: 300a4da4, flag: (41) USR/- BSY/-/-/-/-/- DID: 0000-0000-00000000, short-term DID: 0000-0000-00000000 txn branch: 0 oct: 0, prv: 0, user: 0/SYS O/S info: user: jdbcuser, term: unknown, ospid: , machine: jdbcclient program: JDBC-1.0-Client ---------------------------------------- SO: 3099012c, type: 2, owner: 300a4da4, flag: INIT/-/-/0x00 (call) sess: cur 300fac44, rec 0, usr 300fac44; depth: 0 =================================================== CURRENT SESSION'S INSTANTIATION STATE ------------------------------------- current session=300fac44 ------------------------------------- INSTANTIATION OBJECT: object=202c9bd8 type="KOKA open cursor"[2] lock=0 handle=0 body=0 level=0 flags=FST[20] executions=0 REST OF INSTANTIATION OBJECT: address=202c9c24 size=12 00000000 00000005 0000000a ------------------------------------- INSTANTIATION OBJECT: object=202c9b74 type="KOKA pseudo cursor"[3] lock=0 handle=0 body=0 level=0 flags=FST[20] executions=0 REST OF INSTANTIATION OBJECT: address=202c9bc0 size=12 00000000 00000005 0000000a ******************** Cursor Dump ************************ Current cursor: 0, pgadep: 0 Cursor Dump: End of cursor dump END OF PROCESS STATE ******************** Cursor Dump ************************ Current cursor: 0, pgadep: 0 Cursor Dump: End of cursor dump ksedmp: no current context area ----- Dump of the Fixed PGA ----- word ksmpgf_ [200069F8, 200069FC) = 00000000 word ksmmpd_ [20000390, 20000394) = 00000001 skgm_cx ksmskgmctx_ [20006A00, 20006A78) = 20041AD0 20006B68 00000007 ... Dump of memory from 20006A0C to 20006A78 20006A00 00000003 00001000 00001000 00001000 00001000 20006A20 00000000 C0000000 00000000 00400000 00000000 C0000000 00000000 FFFFFFFF 20006A40 000001A0 202A95D8 ACC01ADE 00000000 00000000 00000000 00000000 00000000 20006A60 00000000 00000000 00000000 00000000 00000000 00000000 skgmrhandle * ksmrealm_ [20006A78, 20006A7C) = 202A95D8 Dump of memory from 202A95D8 to 202A9618 202A95C0 2F753030 2F617070 202A95E0 2F6F7261 636C6538 2F70726F 64756374 2F382E30 2E354D41 58494D4F 00000000 202A9600 00000000 00000000 00000000 00000000 00000000 00000000 kgsmp * ksmgpp_ [2000075C, 20000760) = 20006B68 Dump of memory from 20006B68 to 20006BA8 20006B60 3000056C 202D3178 20006A80 00000000 202D04F0 202D2B64 20006B80 2000A250 00000000 00000000 00000000 00000000 00000000 00000000 00000000 20006BA0 00000000 00000000 ksmpy ksmpgh_ [20006A80, 20006B54) = 00000000 0000213C 00000000 202D367C ... Dump of memory from 20006A90 to 20006B54 20006A80 202D1534 00000000 00000000 00020C02 20006AA0 00000000 0000213C 70676120 68656170 00000000 00000000 00287FFF 7FFF7FFF 20006AC0 00000000 0000002C 20006AC8 20006AC8 0000004C 202D1FB0 202D1FB0 0000008C 20006AE0 20006AE0 20006AE0 000000EC 20006AEC 20006AEC 0000010C 20006AF8 20006AF8 20006B00 0000020C 20006B04 20006B04 0000040C 20006B10 20006B10 0000080C 20006B1C 20006B20 20006B1C 0000100C 202D368C 202D368C 0000200C 20006B34 20006B34 0000400C 20006B40 20006B40 20006B40 0000800C 20006B4C 20006B4C struct ksmug * ksmugp_ [20006B54, 20006B58) = 202D3098 Dump of memory from 202D3098 to 202D30D8 202D3080 0000ABAB 202D30A0 202D30A0 20006A80 0000108C 300FAC44 202D472C 202D4734 00000000 00000000 00020C02 202D30C0 00000000 0000108C 73657373 696F6E20 68656170 00000000 ub1 * ksmkcu_ [20006B58, 20006B5C) = 202CB16C Dump of memory from 202CB16C to 202CB1AC 202CB160 00000005 00000000 10FABF08 00000000 00000000 202CB180 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 202CB1A0 00000000 00000000 00000000 ub1 * ksmken_ [20006B5C, 20006B60) = 202CF3C8 Dump of memory from 202CF3C8 to 202CF408 202CF3C0 00000000 00000000 202AE5F0 00002140 00002140 20006A80 202CF3E0 202CB14C 44001DE9 00000000 202C9014 00001DE8 00000000 00000000 00000000 202CF400 00000000 00000000 ub1 * ksmkpr_ [20006B60, 20006B64) = 00000000 Dump of memory from 0 to 40 00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Repeat 1 times kgsmp ksmgpg_ [20006B68, 20007B18) = 3000056C 202D3178 20006A80 00000000 ... Dump of memory from 20006B78 to 20007B18 20006B60 202D04F0 202D2B64 20006B80 2000A250 00000000 00000000 00000000 00000000 00000000 00000000 00000000 20006BA0 00000000 00000000 10D7B254 00001000 00000000 00000000 00000000 0000000C 20006BC0 00000010 00000000 202D1544 202D10A4 2FF20578 00000000 202D1544 02000000 20006BE0 00001D15 2000705C 00000003 00000013 00000000 00000000 00000000 00000000 20006C00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Repeat 33 times 20007040 00000000 00000000 00000000 00000000 00000000 00000000 00000001 01000000 20007060 02313101 00000001 30010000 00013000 00000000 00000000 00000000 00000000 20007080 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Repeat 61 times 20007840 00000000 00000000 00000000 00000000 00000000 00000000 00000000 2000706F 20007860 2000785C 00000004 202D1544 00000000 00000000 00000003 202D04AC 00000000 20007880 00000004 00000084 504C2F53 514C0000 00000000 00000000 00000000 00000000 200078A0 00000000 00000000 2004849C 200484A8 200484B4 200484C0 200484CC 20048490 200078C0 00000000 00000000 00000190 63757273 6F720000 00000000 00000000 00000000 200078E0 00000000 00000000 00000000 20044878 20044884 00000000 00000000 00000000 20007900 00000000 00000000 00000000 00000058 4B4F4B41 206F7065 6E206375 72736F72 20007920 00000000 00000000 00000000 00000000 20052A74 00000000 20052A80 20052A8C 20007940 00000000 00000000 00000000 00000000 00000058 4B4F4B41 20707365 75646F20 20007960 63757273 6F720000 00000000 00000000 00000000 20052A98 00000000 20052AA4 20007980 20052AB0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 200079A0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Repeat 7 times 20007AA0 00000000 00000000 00000000 00000000 00000000 20007B2C 20041B00 20053440 20007AC0 20046AEC 20047824 20053440 00000000 200005B8 200005C4 200005C0 200005BC 20007AE0 200005E8 20008F00 00000000 202C9024 00000000 202D0F90 202D0F9C 00000000 20007B00 00000000 202D0EE4 202C9CC8 00000000 202C95A4 00000000 ksdeg ksdpeg_ [20007B18, 20007B28) = 00000000 00000000 202C958C 20006A80 ub1 ksdein_ [20007B28, 20007B2C) = 03000000 word ksdtfg_ [20007B2C, 20007B30) = 00000000 ksdbv ksdpbv_ [20007B30, 20007BB0) = 00000000 00000000 00000000 00000000 ... Dump of memory from 20007B40 to 20007BB0 20007B40 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Repeat 2 times 20007BA0 00000000 00000000 00000000 00000000 ksdep ksdepn_ [20007BB0, 20007BD4) = 00000000 00000000 00000000 00000000 ... Dump of memory from 20007BC0 to 20007BD4 20007BC0 00000000 00000000 00000000 00000000 00000000 ksdbf ksdbuf_ [20007BD8, 20007C5C) = 6B736462 66206B73 64627566 5F20206B ... Dump of memory from 20007BE8 to 20007C5C 20007BE0 736D7567 705F2020 30612030 2C207573 65723A20 302F2073 20007C00 686F7274 2D746572 6D204449 443A2030 3030302D 30303030 2D303030 30303030 20007C20 30000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 20007C40 00000000 00000000 00000000 00000000 00000000 00000000 00000000 size_t ksdbfl_ [20007C5C, 20007C60) = 0000000F ub4 ksdftm_ [20007C60, 20007C64) = 7036A04A eword ksdfin_ [20007C64, 20007C68) = 00000001 ub4 ksdfbs_ [20007C68, 20007C6C) = 00000000 text * ksdfbp_ [20007C6C, 20007C70) = 00000000 Dump of memory from 0 to 40 00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Repeat 1 times ub4 ksdfbo_ [20007C70, 20007C74) = 00000000 ub4 ksdfbw_ [20007C74, 20007C78) = 00000000 ub2 ksdsid_ [20007C78, 20007C7C) = 006C0000 ub2 ksdser_ [20007C7C, 20007C80) = 02600000 word ksdsch_ [20007C80, 20007C84) = 00000000 word ksdtfp_ [20007C84, 20007C88) = 00000001 lrmctx * ksppgs_ [20000754, 20000758) = 00000000 Dump of memory from 0 to 40 00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Repeat 1 times size_t ksppsz_ [20007C88, 20007C8C) = 00000000 ksppst * ksppvt_ [20005EF8, 20005EFC) = 30F90CC0 Dump of memory from 30F90CC0 to 30F90D00 30F90CC0 00000000 00010000 000007D0 00010000 00000000 00010000 00000004 00010000 30F90CE0 00000000 00010000 00000001 00010000 0000005A 00010000 00000000 00010000 text * kspmsg_ [20007C8C, 20007C90) = 00000000 Dump of memory from 0 to 40 00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Repeat 1 times struct lxhnd ksplxhnd_ [20007C90, 20007DAC) = 00000000 00000000 00000000 ... Dump of memory from 20007C9C to 20007DAC 20007C80 00000000 20007CA0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Repeat 7 times 20007DA0 00000000 00000000 00000000 struct kspvsrc * ksppstbl_ [20007DAC, 20007DB0) = 00000000 Dump of memory from 0 to 40 00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Repeat 1 times struct ksupr * kslrov_ [20007DB0, 20007DB4) = 00000000 Dump of memory from 0 to 40 00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Repeat 1 times ub4 kslbwt_ [20007DB4, 20007DB8) = 00000000 word ksllsp_ [20005EF0, 20005EF4) = 00000001 struct ksltr * ksltri_ [20007DB8, 20007DBC) = 00000000 Dump of memory from 0 to 40 00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Repeat 1 times ub1 ksldbg_ [20007DBC, 20007DC0) = 00000000 const char * kslcmt_ [20007DC0, 20007DC4) = 10FABEC0 Dump of memory from 10FABEC0 to 10FABF00 10FABEC0 6B736666 6C740049 6B736667 6C740049 6B736666 6C740000 4B474C20 68616E64 10FABEE0 6C657300 66697865 6420616C 6C6F6361 74696F6E 00000000 726F7720 63616368 struct skgslctx kslctx_ [20007DC4, 20007DC8) = 00000000 word kslspc_ [20007DC8, 20007DCC) = 00000002 word kslsst_ [20007DCC, 20007DD0) = 00000003 word kslmxs_ [20007DD0, 20007DD4) = 00000004 word kslmes_ [20007DD4, 20007DD8) = 00000005 word kslpsw_ [20007DD8, 20007DDC) = 00000006 word kslrpp_ [20007DDC, 20007DE0) = 00000007 word kslvpst_ [20007DE0, 20007DE4) = 00000008 |
- [java-list] Problemas com JDBC !!! Marcos Reis
- Re: [java-list] Problemas com JDBC !!! Marcos Reis
- Re: [java-list] Problemas com JDBC !!! Starch Melo de Souza
- Re: [java-list] Problemas com JDBC !!! Giuliano Diniz
- [java-list] Probl. Copilar com JDBC !!! Marcos Reis
- Re: [java-list] Probl. Copilar com J... Starch Melo de Souza
- Re: [java-list] Probl. Copilar com J... aemq