de que tipo são esses drivers? 2,3 ou 4 ?  (estou falando do Oracle 8i)
 
Obrigado
 
    Giuliano
 
----- Original Message -----
Sent: Segunda-feira, 28 de Agosto de 2000 08:15
Subject: Re: [java-list] Problemas com JDBC !!!

geralmente no próprio oracle (pelo menos 8i) tem um jdk, e um diretório jdbc onde você poderá pegar os drivers do seu banco
starch
----- Original Message -----
Sent: Friday, August 25, 2000 2:13 PM
Subject: [java-list] Problemas com JDBC !!!

    Tenho um programa instalado com conecção via JDBC, o programa estava funcionando OK, mas o Driver JDBC está gerando alguns traces no banco Oracle, gostaria de saber se uma Há alguma versão mais recente deste do JDBC que não estaja dando probremas, e se a simples troca (substituição) deste Driver póderia ser feita sem fazer mudanças no programa.
    Infelismante o DBA do banco não consegue identificar a versão do driver , ele não sebe como fazer.
 
    Ai está um pedaço do Trace gerado :
 
    Obrigado  
    Marcos Reis

Dump file /u00/app/oracle8/admin/MAXIMO/udump/ora_10690_maximo.trc

Thu Jul 20 17:20:35 2000

Oracle8 Enterprise Edition Release 8.0.5.0.0 - Production

With the Partitioning and Objects options

PL/SQL Release 8.0.5.0.0 - Production

ORACLE_HOME = /u00/app/oracle8/product/8.0.5

System name: AIX

Node name: tmn

Release: 1

Version: 4

Machine: 00982964A600

Instance name: MAXIMO

Redo thread mounted by this instance: 1

Oracle process number: 30

Unix process pid: 10690, image:

*** SESSION ID:(108.608) 2000.07.20.17.20.35.000

Exception signal: 11, code = 0

sc_onstack: 0000000000000000, sc_mask 0000000000000000

0x10001068 (10001068) 7ca0242a

Registers:

iar: 10001068, msr: 0000d030, cr: 44225801, lr: 1042490c

r00: 00000004, r01: 2ff201c0, r02: 200537e8, r03: fffff9c2,

r04: 2ff22fe8, r05: deadbeef, r06: deadbeef, r07: 100001f0,

r08: 2ff22e48, r09: 00000000, r10: 2ff22ff8, r11: deadbeef,

r12: deadbeef, r13: 00000000, r14: 2ff212a8, r15: 2ff215a0,

r16: 20020060, r17: 2ff21420, r18: 2ff20df8, r19: 20048ef8,

r20: 2ff21320, r21: 20008bd0, r22: 2ff211b0, r23: 00000000,

r24: 10dff6e0, r25: 00000000, r26: 202d2040, r27: 2ff20848,

r28: 84245084, r29: 20008bd0, r30: 2ff20848, r31: 00000000,

----- Call Stack Trace -----

calling call entry argument values in hex

location type point (? means dubious value)

-------------------- -------- -------------------- ----------------------------

10001074 bc 0c011068

----- Argument/Register Address Dump -----

----- End of Call Stack Trace -----

*** 2000.07.20.17.20.35.000

ksedmp: internal or fatal error

ORA-07445: exception encountered: core dump [11] [0] [0] [] [] []

----- Call Stack Trace -----

calling call entry argument values in hex

location type point (? means dubious value)

-------------------- -------- -------------------- ----------------------------

ksedmp+00c4 bl ksedst 10FABDDC ?

ssexhd+02f8 bl ksedmp 10FB3A36 ?

00003CE8 ? 00000000

"0 7è+XXXX ? 00000000

----- Argument/Register Address Dump -----

Argument/Register addr=10fabddc. Dump of memory from 10FABD9C to 10FABEDC

10FABD80 2F526567

10FABDA0 69737465 72206164 64723D25 782E2020 0049424D 0A0A2D2D 2D2D2D20 456E6420

10FABDC0 6F662043 616C6C20 53746163 6B205472 61636520 2D2D2D2D 2D0A0A00 6B736564

10FABDE0 6D703A20 696E7465 726E616C 206F7220 66617461 6C206572 726F720A 0049424D

10FABE00 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D

10FABE20 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D0A 0049424D 46696C65 73206375

10FABE40 7272656E 746C7920 6F70656E 65642062 79207468 69732070 726F6365 73733A0A

10FABE60 0049424D 6B736564 6D703A20 6E6F2063 75727265 6E742063 6F6E7465 78742061

10FABE80 7265610A 0049424D 6B736570 6F700000 5244424D 53000000 4F524100 414D4552

10FABEA0 4943414E 5F414D45 52494341 2E555337 41534349 49000000 6B736667 6C740000

10FABEC0 6B736666 6C740049 6B736667 6C740049 6B736666 6C740000 4B474C20

Argument/Register addr=10fb3a36. Dump of memory from 10FB39F6 to 10FB3B36

10FB39E0 3A202538 2E38782C 206D7372

10FB3A00 3A202538 2E38782C 20206372 3A202538 2E38782C 20206C72 3A202538 2E38780A

10FB3A20 0049424D 7225322E 32643A20 25382E38 782C2563 00490A00 01FF01FE 01FC01F8

10FB3A40 01F001E0 01C00180 01000000 00000000 00000000 00000000 00000000 00000000

10FB3A60 00436869 6C642000 00000000 00000000 00005061 72656E74 20000000 00000000

10FB3A80 00000050 6172656E 742B6368 696C6472 656E2000 6B736C63 6C6E2D65 72726F72

10FB3AA0 00000000 62757379 00000000 66726565 00000000 62757379 28736861 72656429

10FB3AC0 0049424D 57414954 20232564 3A206E61 6D3D2725 73272065 6C613D20 256C6420

10FB3AE0 70313D25 6C642070 323D256C 64207033 3D256C64 0A004942 252A7325 7320256C

10FB3B00 78202573 2573206C 6576656C 3D256420 00004942 6368696C 64233D25 64200049

10FB3B20 6765745F 636F6D6D 656E743D 25732000 0A202020 20202020

----- End of Call Stack Trace -----

===================================================

Files currently opened by this process:

===================================================

PROCESS STATE

-------------

Process global information:

process: 300a4da4, call: 3099012c, xact: 0, curses: 300fac44, usrses: 300fac44

----------------------------------------

SO: 300a4da4, type: 1, owner: 0, flag: INIT/-/-/0x00

(process) Oracle pid=30, calls cur/top: 3099012c/3099012c, flag: (0) -

int error: 0, call error: 0, sess error: 0, txn error 0

(post info) last post received: 0 0 0

last post received-location: No post

last process to post me: none

last post sent: 0 0 0

last post sent-location: No post

last process posted by me: none

(latch info) wait_event=0 bits=0

O/S info: user: oracle8, term: pts/4, ospid: 10690

OSD pid info: Unix process pid: 10690, image:

----------------------------------------

SO: 300fac44, type: 3, owner: 300a4da4, flag: INIT/-/-/0x00

(session) trans: 0, creator: 300a4da4, flag: (41) USR/- BSY/-/-/-/-/-

DID: 0000-0000-00000000, short-term DID: 0000-0000-00000000

txn branch: 0

oct: 0, prv: 0, user: 0/SYS

O/S info: user: jdbcuser, term: unknown, ospid: , machine: jdbcclient

program: JDBC-1.0-Client

----------------------------------------

SO: 3099012c, type: 2, owner: 300a4da4, flag: INIT/-/-/0x00

(call) sess: cur 300fac44, rec 0, usr 300fac44; depth: 0

===================================================

CURRENT SESSION'S INSTANTIATION STATE

-------------------------------------

current session=300fac44

-------------------------------------

INSTANTIATION OBJECT: object=202c9bd8

type="KOKA open cursor"[2] lock=0 handle=0 body=0 level=0

flags=FST[20] executions=0

REST OF INSTANTIATION OBJECT:

address=202c9c24 size=12

00000000 00000005 0000000a

-------------------------------------

INSTANTIATION OBJECT: object=202c9b74

type="KOKA pseudo cursor"[3] lock=0 handle=0 body=0 level=0

flags=FST[20] executions=0

REST OF INSTANTIATION OBJECT:

address=202c9bc0 size=12

00000000 00000005 0000000a

******************** Cursor Dump ************************

Current cursor: 0, pgadep: 0

Cursor Dump:

End of cursor dump

END OF PROCESS STATE

******************** Cursor Dump ************************

Current cursor: 0, pgadep: 0

Cursor Dump:

End of cursor dump

ksedmp: no current context area

----- Dump of the Fixed PGA -----

word ksmpgf_ [200069F8, 200069FC) = 00000000

word ksmmpd_ [20000390, 20000394) = 00000001

skgm_cx ksmskgmctx_ [20006A00, 20006A78) = 20041AD0 20006B68 00000007 ...

Dump of memory from 20006A0C to 20006A78

20006A00 00000003 00001000 00001000 00001000 00001000

20006A20 00000000 C0000000 00000000 00400000 00000000 C0000000 00000000 FFFFFFFF

20006A40 000001A0 202A95D8 ACC01ADE 00000000 00000000 00000000 00000000 00000000

20006A60 00000000 00000000 00000000 00000000 00000000 00000000

skgmrhandle * ksmrealm_ [20006A78, 20006A7C) = 202A95D8

Dump of memory from 202A95D8 to 202A9618

202A95C0 2F753030 2F617070

202A95E0 2F6F7261 636C6538 2F70726F 64756374 2F382E30 2E354D41 58494D4F 00000000

202A9600 00000000 00000000 00000000 00000000 00000000 00000000

kgsmp * ksmgpp_ [2000075C, 20000760) = 20006B68

Dump of memory from 20006B68 to 20006BA8

20006B60 3000056C 202D3178 20006A80 00000000 202D04F0 202D2B64

20006B80 2000A250 00000000 00000000 00000000 00000000 00000000 00000000 00000000

20006BA0 00000000 00000000

ksmpy ksmpgh_ [20006A80, 20006B54) = 00000000 0000213C 00000000 202D367C ...

Dump of memory from 20006A90 to 20006B54

20006A80 202D1534 00000000 00000000 00020C02

20006AA0 00000000 0000213C 70676120 68656170 00000000 00000000 00287FFF 7FFF7FFF

20006AC0 00000000 0000002C 20006AC8 20006AC8 0000004C 202D1FB0 202D1FB0 0000008C

20006AE0 20006AE0 20006AE0 000000EC 20006AEC 20006AEC 0000010C 20006AF8 20006AF8

20006B00 0000020C 20006B04 20006B04 0000040C 20006B10 20006B10 0000080C 20006B1C

20006B20 20006B1C 0000100C 202D368C 202D368C 0000200C 20006B34 20006B34 0000400C

20006B40 20006B40 20006B40 0000800C 20006B4C 20006B4C

struct ksmug * ksmugp_ [20006B54, 20006B58) = 202D3098

Dump of memory from 202D3098 to 202D30D8

202D3080 0000ABAB 202D30A0

202D30A0 20006A80 0000108C 300FAC44 202D472C 202D4734 00000000 00000000 00020C02

202D30C0 00000000 0000108C 73657373 696F6E20 68656170 00000000

ub1 * ksmkcu_ [20006B58, 20006B5C) = 202CB16C

Dump of memory from 202CB16C to 202CB1AC

202CB160 00000005 00000000 10FABF08 00000000 00000000

202CB180 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

202CB1A0 00000000 00000000 00000000

ub1 * ksmken_ [20006B5C, 20006B60) = 202CF3C8

Dump of memory from 202CF3C8 to 202CF408

202CF3C0 00000000 00000000 202AE5F0 00002140 00002140 20006A80

202CF3E0 202CB14C 44001DE9 00000000 202C9014 00001DE8 00000000 00000000 00000000

202CF400 00000000 00000000

ub1 * ksmkpr_ [20006B60, 20006B64) = 00000000

Dump of memory from 0 to 40

00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 1 times

kgsmp ksmgpg_ [20006B68, 20007B18) = 3000056C 202D3178 20006A80 00000000 ...

Dump of memory from 20006B78 to 20007B18

20006B60 202D04F0 202D2B64

20006B80 2000A250 00000000 00000000 00000000 00000000 00000000 00000000 00000000

20006BA0 00000000 00000000 10D7B254 00001000 00000000 00000000 00000000 0000000C

20006BC0 00000010 00000000 202D1544 202D10A4 2FF20578 00000000 202D1544 02000000

20006BE0 00001D15 2000705C 00000003 00000013 00000000 00000000 00000000 00000000

20006C00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 33 times

20007040 00000000 00000000 00000000 00000000 00000000 00000000 00000001 01000000

20007060 02313101 00000001 30010000 00013000 00000000 00000000 00000000 00000000

20007080 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 61 times

20007840 00000000 00000000 00000000 00000000 00000000 00000000 00000000 2000706F

20007860 2000785C 00000004 202D1544 00000000 00000000 00000003 202D04AC 00000000

20007880 00000004 00000084 504C2F53 514C0000 00000000 00000000 00000000 00000000

200078A0 00000000 00000000 2004849C 200484A8 200484B4 200484C0 200484CC 20048490

200078C0 00000000 00000000 00000190 63757273 6F720000 00000000 00000000 00000000

200078E0 00000000 00000000 00000000 20044878 20044884 00000000 00000000 00000000

20007900 00000000 00000000 00000000 00000058 4B4F4B41 206F7065 6E206375 72736F72

20007920 00000000 00000000 00000000 00000000 20052A74 00000000 20052A80 20052A8C

20007940 00000000 00000000 00000000 00000000 00000058 4B4F4B41 20707365 75646F20

20007960 63757273 6F720000 00000000 00000000 00000000 20052A98 00000000 20052AA4

20007980 20052AB0 00000000 00000000 00000000 00000000 00000000 00000000 00000000

200079A0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 7 times

20007AA0 00000000 00000000 00000000 00000000 00000000 20007B2C 20041B00 20053440

20007AC0 20046AEC 20047824 20053440 00000000 200005B8 200005C4 200005C0 200005BC

20007AE0 200005E8 20008F00 00000000 202C9024 00000000 202D0F90 202D0F9C 00000000

20007B00 00000000 202D0EE4 202C9CC8 00000000 202C95A4 00000000

ksdeg ksdpeg_ [20007B18, 20007B28) = 00000000 00000000 202C958C 20006A80

ub1 ksdein_ [20007B28, 20007B2C) = 03000000

word ksdtfg_ [20007B2C, 20007B30) = 00000000

ksdbv ksdpbv_ [20007B30, 20007BB0) = 00000000 00000000 00000000 00000000 ...

Dump of memory from 20007B40 to 20007BB0

20007B40 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 2 times

20007BA0 00000000 00000000 00000000 00000000

ksdep ksdepn_ [20007BB0, 20007BD4) = 00000000 00000000 00000000 00000000 ...

Dump of memory from 20007BC0 to 20007BD4

20007BC0 00000000 00000000 00000000 00000000 00000000

ksdbf ksdbuf_ [20007BD8, 20007C5C) = 6B736462 66206B73 64627566 5F20206B ...

Dump of memory from 20007BE8 to 20007C5C

20007BE0 736D7567 705F2020 30612030 2C207573 65723A20 302F2073

20007C00 686F7274 2D746572 6D204449 443A2030 3030302D 30303030 2D303030 30303030

20007C20 30000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

20007C40 00000000 00000000 00000000 00000000 00000000 00000000 00000000

size_t ksdbfl_ [20007C5C, 20007C60) = 0000000F

ub4 ksdftm_ [20007C60, 20007C64) = 7036A04A

eword ksdfin_ [20007C64, 20007C68) = 00000001

ub4 ksdfbs_ [20007C68, 20007C6C) = 00000000

text * ksdfbp_ [20007C6C, 20007C70) = 00000000

Dump of memory from 0 to 40

00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 1 times

ub4 ksdfbo_ [20007C70, 20007C74) = 00000000

ub4 ksdfbw_ [20007C74, 20007C78) = 00000000

ub2 ksdsid_ [20007C78, 20007C7C) = 006C0000

ub2 ksdser_ [20007C7C, 20007C80) = 02600000

word ksdsch_ [20007C80, 20007C84) = 00000000

word ksdtfp_ [20007C84, 20007C88) = 00000001

lrmctx * ksppgs_ [20000754, 20000758) = 00000000

Dump of memory from 0 to 40

00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 1 times

size_t ksppsz_ [20007C88, 20007C8C) = 00000000

ksppst * ksppvt_ [20005EF8, 20005EFC) = 30F90CC0

Dump of memory from 30F90CC0 to 30F90D00

30F90CC0 00000000 00010000 000007D0 00010000 00000000 00010000 00000004 00010000

30F90CE0 00000000 00010000 00000001 00010000 0000005A 00010000 00000000 00010000

text * kspmsg_ [20007C8C, 20007C90) = 00000000

Dump of memory from 0 to 40

00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 1 times

struct lxhnd ksplxhnd_ [20007C90, 20007DAC) = 00000000 00000000 00000000 ...

Dump of memory from 20007C9C to 20007DAC

20007C80 00000000

20007CA0 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 7 times

20007DA0 00000000 00000000 00000000

struct kspvsrc * ksppstbl_ [20007DAC, 20007DB0) = 00000000

Dump of memory from 0 to 40

00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 1 times

struct ksupr * kslrov_ [20007DB0, 20007DB4) = 00000000

Dump of memory from 0 to 40

00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 1 times

ub4 kslbwt_ [20007DB4, 20007DB8) = 00000000

word ksllsp_ [20005EF0, 20005EF4) = 00000001

struct ksltr * ksltri_ [20007DB8, 20007DBC) = 00000000

Dump of memory from 0 to 40

00 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 1 times

ub1 ksldbg_ [20007DBC, 20007DC0) = 00000000

const char * kslcmt_ [20007DC0, 20007DC4) = 10FABEC0

Dump of memory from 10FABEC0 to 10FABF00

10FABEC0 6B736666 6C740049 6B736667 6C740049 6B736666 6C740000 4B474C20 68616E64

10FABEE0 6C657300 66697865 6420616C 6C6F6361 74696F6E 00000000 726F7720 63616368

struct skgslctx kslctx_ [20007DC4, 20007DC8) = 00000000

word kslspc_ [20007DC8, 20007DCC) = 00000002

word kslsst_ [20007DCC, 20007DD0) = 00000003

word kslmxs_ [20007DD0, 20007DD4) = 00000004

word kslmes_ [20007DD4, 20007DD8) = 00000005

word kslpsw_ [20007DD8, 20007DDC) = 00000006

word kslrpp_ [20007DDC, 20007DE0) = 00000007

word kslvpst_ [20007DE0, 20007DE4) = 00000008

Reply via email to