----- Original Message -----
Sent: Friday, August 25, 2000 2:13
PM
Subject: [java-list] Problemas com JDBC
!!!
Tenho um programa instalado
com conecção via JDBC, o programa estava funcionando OK, mas o Driver JDBC
está gerando alguns traces no banco Oracle, gostaria de saber se uma Há
alguma versão mais recente deste do JDBC que não estaja dando probremas, e
se a simples troca (substituição) deste Driver póderia ser feita sem fazer
mudanças no programa.
Infelismante o DBA do banco
não consegue identificar a versão do driver , ele não sebe como
fazer.
Ai está um pedaço do Trace
gerado :
Obrigado
Marcos Reis
Dump file /u00/app/oracle8/admin/MAXIMO/udump/ora_10690_maximo.trc
Thu Jul 20 17:20:35 2000
Oracle8 Enterprise Edition Release 8.0.5.0.0 - Production
With the Partitioning and Objects options
PL/SQL Release 8.0.5.0.0 - Production
ORACLE_HOME = /u00/app/oracle8/product/8.0.5
System name: AIX
Node name: tmn
Release: 1
Version: 4
Machine: 00982964A600
Instance name: MAXIMO
Redo thread mounted by this instance: 1
Oracle process number: 30
Unix process pid: 10690, image:
*** SESSION ID:(108.608) 2000.07.20.17.20.35.000
Exception signal: 11, code = 0
sc_onstack: 0000000000000000, sc_mask 0000000000000000
0x10001068 (10001068) 7ca0242a
Registers:
iar: 10001068, msr: 0000d030, cr: 44225801, lr: 1042490c
r00: 00000004, r01: 2ff201c0, r02: 200537e8, r03: fffff9c2,
r04: 2ff22fe8, r05: deadbeef, r06: deadbeef, r07: 100001f0,
r08: 2ff22e48, r09: 00000000, r10: 2ff22ff8, r11: deadbeef,
r12: deadbeef, r13: 00000000, r14: 2ff212a8, r15: 2ff215a0,
r16: 20020060, r17: 2ff21420, r18: 2ff20df8, r19: 20048ef8,
r20: 2ff21320, r21: 20008bd0, r22: 2ff211b0, r23: 00000000,
r24: 10dff6e0, r25: 00000000, r26: 202d2040, r27: 2ff20848,
r28: 84245084, r29: 20008bd0, r30: 2ff20848, r31: 00000000,
----- Call Stack Trace -----
calling call entry argument values in hex
location type point (? means dubious value)
-------------------- -------- --------------------
----------------------------
10001074 bc 0c011068
----- Argument/Register Address Dump -----
----- End of Call Stack Trace -----
*** 2000.07.20.17.20.35.000
ksedmp: internal or fatal error
ORA-07445: exception encountered: core dump [11] [0] [0] [] [] []
----- Call Stack Trace -----
calling call entry argument values in hex
location type point (? means dubious value)
-------------------- -------- --------------------
----------------------------
ksedmp+00c4 bl ksedst 10FABDDC ?
ssexhd+02f8 bl ksedmp 10FB3A36 ?
00003CE8 ? 00000000
"0 7è+XXXX ? 00000000
----- Argument/Register Address Dump -----
Argument/Register addr=10fabddc. Dump of memory from 10FABD9C to
10FABEDC
10FABD80 2F526567
10FABDA0 69737465 72206164 64723D25 782E2020 0049424D 0A0A2D2D 2D2D2D20
456E6420
10FABDC0 6F662043 616C6C20 53746163 6B205472 61636520 2D2D2D2D 2D0A0A00
6B736564
10FABDE0 6D703A20 696E7465 726E616C 206F7220 66617461 6C206572 726F720A
0049424D
10FABE00 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D
3D3D3D3D
10FABE20 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D3D 3D3D3D0A 0049424D 46696C65
73206375
10FABE40 7272656E 746C7920 6F70656E 65642062 79207468 69732070 726F6365
73733A0A
10FABE60 0049424D 6B736564 6D703A20 6E6F2063 75727265 6E742063 6F6E7465
78742061
10FABE80 7265610A 0049424D 6B736570 6F700000 5244424D 53000000 4F524100
414D4552
10FABEA0 4943414E 5F414D45 52494341 2E555337 41534349 49000000 6B736667
6C740000
10FABEC0 6B736666 6C740049 6B736667 6C740049 6B736666 6C740000 4B474C20
Argument/Register addr=10fb3a36. Dump of memory from 10FB39F6 to
10FB3B36
10FB39E0 3A202538 2E38782C 206D7372
10FB3A00 3A202538 2E38782C 20206372 3A202538 2E38782C 20206C72 3A202538
2E38780A
10FB3A20 0049424D 7225322E 32643A20 25382E38 782C2563 00490A00 01FF01FE
01FC01F8
10FB3A40 01F001E0 01C00180 01000000 00000000 00000000 00000000 00000000
00000000
10FB3A60 00436869 6C642000 00000000 00000000 00005061 72656E74 20000000
00000000
10FB3A80 00000050 6172656E 742B6368 696C6472 656E2000 6B736C63 6C6E2D65
72726F72
10FB3AA0 00000000 62757379 00000000 66726565 00000000 62757379 28736861
72656429
10FB3AC0 0049424D 57414954 20232564 3A206E61 6D3D2725 73272065 6C613D20
256C6420
10FB3AE0 70313D25 6C642070 323D256C 64207033 3D256C64 0A004942 252A7325
7320256C
10FB3B00 78202573 2573206C 6576656C 3D256420 00004942 6368696C 64233D25
64200049
10FB3B20 6765745F 636F6D6D 656E743D 25732000 0A202020 20202020
----- End of Call Stack Trace -----
===================================================
Files currently opened by this process:
===================================================
PROCESS STATE
-------------
Process global information:
process: 300a4da4, call: 3099012c, xact: 0, curses: 300fac44, usrses:
300fac44
----------------------------------------
SO: 300a4da4, type: 1, owner: 0, flag: INIT/-/-/0x00
(process) Oracle pid=30, calls cur/top: 3099012c/3099012c, flag: (0)
-
int error: 0, call error: 0, sess error: 0, txn error 0
(post info) last post received: 0 0 0
last post received-location: No post
last process to post me: none
last post sent: 0 0 0
last post sent-location: No post
last process posted by me: none
(latch info) wait_event=0 bits=0
O/S info: user: oracle8, term: pts/4, ospid: 10690
OSD pid info: Unix process pid: 10690, image:
----------------------------------------
SO: 300fac44, type: 3, owner: 300a4da4, flag: INIT/-/-/0x00
(session) trans: 0, creator: 300a4da4, flag: (41) USR/- BSY/-/-/-/-/-
DID: 0000-0000-00000000, short-term DID: 0000-0000-00000000
txn branch: 0
oct: 0, prv: 0, user: 0/SYS
O/S info: user: jdbcuser, term: unknown, ospid: , machine: jdbcclient
program: JDBC-1.0-Client
----------------------------------------
SO: 3099012c, type: 2, owner: 300a4da4, flag: INIT/-/-/0x00
(call) sess: cur 300fac44, rec 0, usr 300fac44; depth: 0
===================================================
CURRENT SESSION'S INSTANTIATION STATE
-------------------------------------
current session=300fac44
-------------------------------------
INSTANTIATION OBJECT: object=202c9bd8
type="KOKA open cursor"[2] lock=0 handle=0 body=0 level=0
flags=FST[20] executions=0
REST OF INSTANTIATION OBJECT:
address=202c9c24 size=12
00000000 00000005 0000000a
-------------------------------------
INSTANTIATION OBJECT: object=202c9b74
type="KOKA pseudo cursor"[3] lock=0 handle=0 body=0 level=0
flags=FST[20] executions=0
REST OF INSTANTIATION OBJECT:
address=202c9bc0 size=12
00000000 00000005 0000000a
******************** Cursor Dump ************************
Current cursor: 0, pgadep: 0
Cursor Dump:
End of cursor dump
END OF PROCESS STATE
******************** Cursor Dump ************************
Current cursor: 0, pgadep: 0
Cursor Dump:
End of cursor dump
ksedmp: no current context area
----- Dump of the Fixed PGA -----
word ksmpgf_ [200069F8, 200069FC) = 00000000
word ksmmpd_ [20000390, 20000394) = 00000001
skgm_cx ksmskgmctx_ [20006A00, 20006A78) = 20041AD0 20006B68 00000007
...
Dump of memory from 20006A0C to 20006A78
20006A00 00000003 00001000 00001000 00001000 00001000
20006A20 00000000 C0000000 00000000 00400000 00000000 C0000000 00000000
FFFFFFFF
20006A40 000001A0 202A95D8 ACC01ADE 00000000 00000000 00000000 00000000
00000000
20006A60 00000000 00000000 00000000 00000000 00000000 00000000
skgmrhandle * ksmrealm_ [20006A78, 20006A7C) = 202A95D8
Dump of memory from 202A95D8 to 202A9618
202A95C0 2F753030 2F617070
202A95E0 2F6F7261 636C6538 2F70726F 64756374 2F382E30 2E354D41 58494D4F
00000000
202A9600 00000000 00000000 00000000 00000000 00000000 00000000
kgsmp * ksmgpp_ [2000075C, 20000760) = 20006B68
Dump of memory from 20006B68 to 20006BA8
20006B60 3000056C 202D3178 20006A80 00000000 202D04F0 202D2B64
20006B80 2000A250 00000000 00000000 00000000 00000000 00000000 00000000
00000000
20006BA0 00000000 00000000
ksmpy ksmpgh_ [20006A80, 20006B54) = 00000000 0000213C 00000000 202D367C
...
Dump of memory from 20006A90 to 20006B54
20006A80 202D1534 00000000 00000000 00020C02
20006AA0 00000000 0000213C 70676120 68656170 00000000 00000000 00287FFF
7FFF7FFF
20006AC0 00000000 0000002C 20006AC8 20006AC8 0000004C 202D1FB0 202D1FB0
0000008C
20006AE0 20006AE0 20006AE0 000000EC 20006AEC 20006AEC 0000010C 20006AF8
20006AF8
20006B00 0000020C 20006B04 20006B04 0000040C 20006B10 20006B10 0000080C
20006B1C
20006B20 20006B1C 0000100C 202D368C 202D368C 0000200C 20006B34 20006B34
0000400C
20006B40 20006B40 20006B40 0000800C 20006B4C 20006B4C
struct ksmug * ksmugp_ [20006B54, 20006B58) = 202D3098
Dump of memory from 202D3098 to 202D30D8
202D3080 0000ABAB 202D30A0
202D30A0 20006A80 0000108C 300FAC44 202D472C 202D4734 00000000 00000000
00020C02
202D30C0 00000000 0000108C 73657373 696F6E20 68656170 00000000
ub1 * ksmkcu_ [20006B58, 20006B5C) = 202CB16C
Dump of memory from 202CB16C to 202CB1AC
202CB160 00000005 00000000 10FABF08 00000000 00000000
202CB180 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
202CB1A0 00000000 00000000 00000000
ub1 * ksmken_ [20006B5C, 20006B60) = 202CF3C8
Dump of memory from 202CF3C8 to 202CF408
202CF3C0 00000000 00000000 202AE5F0 00002140 00002140 20006A80
202CF3E0 202CB14C 44001DE9 00000000 202C9014 00001DE8 00000000 00000000
00000000
202CF400 00000000 00000000
ub1 * ksmkpr_ [20006B60, 20006B64) = 00000000
Dump of memory from 0 to 40
00 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
Repeat 1 times
kgsmp ksmgpg_ [20006B68, 20007B18) = 3000056C 202D3178 20006A80 00000000
...
Dump of memory from 20006B78 to 20007B18
20006B60 202D04F0 202D2B64
20006B80 2000A250 00000000 00000000 00000000 00000000 00000000 00000000
00000000
20006BA0 00000000 00000000 10D7B254 00001000 00000000 00000000 00000000
0000000C
20006BC0 00000010 00000000 202D1544 202D10A4 2FF20578 00000000 202D1544
02000000
20006BE0 00001D15 2000705C 00000003 00000013 00000000 00000000 00000000
00000000
20006C00 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
Repeat 33 times
20007040 00000000 00000000 00000000 00000000 00000000 00000000 00000001
01000000
20007060 02313101 00000001 30010000 00013000 00000000 00000000 00000000
00000000
20007080 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
Repeat 61 times
20007840 00000000 00000000 00000000 00000000 00000000 00000000 00000000
2000706F
20007860 2000785C 00000004 202D1544 00000000 00000000 00000003 202D04AC
00000000
20007880 00000004 00000084 504C2F53 514C0000 00000000 00000000 00000000
00000000
200078A0 00000000 00000000 2004849C 200484A8 200484B4 200484C0 200484CC
20048490
200078C0 00000000 00000000 00000190 63757273 6F720000 00000000 00000000
00000000
200078E0 00000000 00000000 00000000 20044878 20044884 00000000 00000000
00000000
20007900 00000000 00000000 00000000 00000058 4B4F4B41 206F7065 6E206375
72736F72
20007920 00000000 00000000 00000000 00000000 20052A74 00000000 20052A80
20052A8C
20007940 00000000 00000000 00000000 00000000 00000058 4B4F4B41 20707365
75646F20
20007960 63757273 6F720000 00000000 00000000 00000000 20052A98 00000000
20052AA4
20007980 20052AB0 00000000 00000000 00000000 00000000 00000000 00000000
00000000
200079A0 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
Repeat 7 times
20007AA0 00000000 00000000 00000000 00000000 00000000 20007B2C 20041B00
20053440
20007AC0 20046AEC 20047824 20053440 00000000 200005B8 200005C4 200005C0
200005BC
20007AE0 200005E8 20008F00 00000000 202C9024 00000000 202D0F90 202D0F9C
00000000
20007B00 00000000 202D0EE4 202C9CC8 00000000 202C95A4 00000000
ksdeg ksdpeg_ [20007B18, 20007B28) = 00000000 00000000 202C958C
20006A80
ub1 ksdein_ [20007B28, 20007B2C) = 03000000
word ksdtfg_ [20007B2C, 20007B30) = 00000000
ksdbv ksdpbv_ [20007B30, 20007BB0) = 00000000 00000000 00000000 00000000
...
Dump of memory from 20007B40 to 20007BB0
20007B40 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
Repeat 2 times
20007BA0 00000000 00000000 00000000 00000000
ksdep ksdepn_ [20007BB0, 20007BD4) = 00000000 00000000 00000000 00000000
...
Dump of memory from 20007BC0 to 20007BD4
20007BC0 00000000 00000000 00000000 00000000 00000000
ksdbf ksdbuf_ [20007BD8, 20007C5C) = 6B736462 66206B73 64627566 5F20206B
...
Dump of memory from 20007BE8 to 20007C5C
20007BE0 736D7567 705F2020 30612030 2C207573 65723A20 302F2073
20007C00 686F7274 2D746572 6D204449 443A2030 3030302D 30303030 2D303030
30303030
20007C20 30000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
20007C40 00000000 00000000 00000000 00000000 00000000 00000000 00000000
size_t ksdbfl_ [20007C5C, 20007C60) = 0000000F
ub4 ksdftm_ [20007C60, 20007C64) = 7036A04A
eword ksdfin_ [20007C64, 20007C68) = 00000001
ub4 ksdfbs_ [20007C68, 20007C6C) = 00000000
text * ksdfbp_ [20007C6C, 20007C70) = 00000000
Dump of memory from 0 to 40
00 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
Repeat 1 times
ub4 ksdfbo_ [20007C70, 20007C74) = 00000000
ub4 ksdfbw_ [20007C74, 20007C78) = 00000000
ub2 ksdsid_ [20007C78, 20007C7C) = 006C0000
ub2 ksdser_ [20007C7C, 20007C80) = 02600000
word ksdsch_ [20007C80, 20007C84) = 00000000
word ksdtfp_ [20007C84, 20007C88) = 00000001
lrmctx * ksppgs_ [20000754, 20000758) = 00000000
Dump of memory from 0 to 40
00 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
Repeat 1 times
size_t ksppsz_ [20007C88, 20007C8C) = 00000000
ksppst * ksppvt_ [20005EF8, 20005EFC) = 30F90CC0
Dump of memory from 30F90CC0 to 30F90D00
30F90CC0 00000000 00010000 000007D0 00010000 00000000 00010000 00000004
00010000
30F90CE0 00000000 00010000 00000001 00010000 0000005A 00010000 00000000
00010000
text * kspmsg_ [20007C8C, 20007C90) = 00000000
Dump of memory from 0 to 40
00 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
Repeat 1 times
struct lxhnd ksplxhnd_ [20007C90, 20007DAC) = 00000000 00000000 00000000
...
Dump of memory from 20007C9C to 20007DAC
20007C80 00000000
20007CA0 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
Repeat 7 times
20007DA0 00000000 00000000 00000000
struct kspvsrc * ksppstbl_ [20007DAC, 20007DB0) = 00000000
Dump of memory from 0 to 40
00 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
Repeat 1 times
struct ksupr * kslrov_ [20007DB0, 20007DB4) = 00000000
Dump of memory from 0 to 40
00 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
Repeat 1 times
ub4 kslbwt_ [20007DB4, 20007DB8) = 00000000
word ksllsp_ [20005EF0, 20005EF4) = 00000001
struct ksltr * ksltri_ [20007DB8, 20007DBC) = 00000000
Dump of memory from 0 to 40
00 00000000 00000000 00000000 00000000 00000000 00000000 00000000
00000000
Repeat 1 times
ub1 ksldbg_ [20007DBC, 20007DC0) = 00000000
const char * kslcmt_ [20007DC0, 20007DC4) = 10FABEC0
Dump of memory from 10FABEC0 to 10FABF00
10FABEC0 6B736666 6C740049 6B736667 6C740049 6B736666 6C740000 4B474C20
68616E64
10FABEE0 6C657300 66697865 6420616C 6C6F6361 74696F6E 00000000 726F7720
63616368
struct skgslctx kslctx_ [20007DC4, 20007DC8) = 00000000
word kslspc_ [20007DC8, 20007DCC) = 00000002
word kslsst_ [20007DCC, 20007DD0) = 00000003
word kslmxs_ [20007DD0, 20007DD4) = 00000004
word kslmes_ [20007DD4, 20007DD8) = 00000005
word kslpsw_ [20007DD8, 20007DDC) = 00000006
word kslrpp_ [20007DDC, 20007DE0) = 00000007
word kslvpst_ [20007DE0, 20007DE4) =
00000008