*** 2023-04-21 17:29:42.077 *** SESSION ID:(898.359) 2023-04-21 17:29:42.077 *** CLIENT ID:() 2023-04-21 17:29:42.077 *** SERVICE NAME:(SYS$USERS) 2023-04-21 17:29:42.077 *** MODULE NAME:(sqlplus.exe) 2023-04-21 17:29:42.077 *** ACTION NAME:() 2023-04-21 17:29:42.077 Dump continued from file : e:\app\administrator\diag\rdbms\orcl\orcl\trace\orcl_ora_9648.trc ORA-07445: 出现异常错误: 核心转储 [kglsget()+547] [ACCESS_VIOLATION] [ADDR:0x12] [PC:0x9138BE9] [UNABLE_TO_READ] [] ========= Dump for incident 444285 (ORA 7445 [kglsget()+547]) ======== ----- Beginning of Customized Incident Dump(s) ----- Exception [ type : ACCESS_VIOLATION, UNABLE_TO_READ] [ADDR:0x12] [PC:0x9138BE9, kglsget()+547] Oracle Database 11g Enterprise Edition Release 11.2.0.1.0 - 64bit Production Process Id: 0x00000a8c Thread Id : 0x000025b0 Time : Fri Apr 21 17:29:42 Excp. Code: 0xc0000005 Excp. Type: ACCESS_VIO Flags: 0x00000000 ------------------- Registers ---------------------------- ip=0000000009138BE9 sp=00000000276FA470 rp=0000000A0BF280D0 r1=000000001089AFE0 r2=0000000000000000 r3=0000000000000101 r4=00000009BDFE40B0 r5=00000000276FA470 r6=0000000A0BF280D0 r7=00000000000005C0 r8=00000009B9DC4F48 r9=0000000A0BF280D0 r10=0000000000000200 r11=00000000276FA590 r12=00000009ED85F4C0 r13=000000000CB3C070 r14=0000000000000001 r15=0000000000000001 ------------------- End of Registers --------------------- *** 2023-04-21 17:29:42.077 dbkedDefDump(): Starting a non-incident diagnostic dump (flags=0x3, level=3, mask=0x0) ----- Current SQL Statement for this session (sql_id=gtf6tgc2ycgxx) ----- select count(*) from XDB.XDB$SCHEMA s where s.xmldata.schema_url = 'http://xmlns.oracle.com/xdb/XDBSchema.xsd' ----- Call Stack Trace ----- calling call entry argument values in hex location type point (? means dubious value) -------------------- -------- -------------------- ---------------------------- kglsget()+547 0000000000000000 009962700 00996270C 000000000 0276DCCA0 qcdolci()+80 CALL??? kglsget()+347 9C5F9E7D0 009138AE2 000000018 000000001 qcdoloi()+167 CALL??? qcdolci() 00000DC7E 008D52DEF 000000006 00CB5BEE8 qcdlgcd()+940 CALL??? qcdoloi() 000000000 000000000 000000000 000000000 kkdlgcd()+129 CALL??? qcdlgcd() 000000000 9B9DC6C78 000000000 01089AA20 __PGOSF158_kkmfbtcn CALL??? kkdlgcd() 01089AFE0 00CB5BEE8 000000000 ()+17 000000000 qcsIsColInFro()+474 CALL??? __PGOSF158_kkmfbtcn 000000001 9BDFE41E0 000000000 () 000000001 qcsRslvColWithinQbc CALL??? qcsIsColInFro() 900000000 01089AFE0 0276FCFC0 ()+304 742E204F1B71 qcsStrongColRslv()+ CALL??? qcsRslvColWithinQbc 000000010 27F00000000 632 ()+73 000000000 000000000 qcsRslvName()+212 CALL??? qcsStrongColRslv()+ 0276FA9E0 9C3F136C0 00764E4E0 516 0093A505B qcsridn()+104 CALL??? qcsRslvName() 101000000000000 000000000 000000000 0276FAE90 qcsraic()+736 CALL??? qcsridn() 0276FACB0 0276FACB0 000000000 000000001 qcspqbDescendents() CALL??? qcsraic() 0276FAE90 01089AFE0 00CB5D030 +485 00CB5CEE8 qcspqb()+154 CALL??? qcspqbDescendents() 00000002A 008D53029 01089AFE0 000000000 kkmdrv()+200 CALL??? qcspqb() 000000029 00895C700 0276FAF90 00895C700 opiSem()+2560 CALL??? kkmdrv() 00CB31730 0108B7820 000000001 9C3F13730 opiDeferredSem()+56 CALL??? opiSem() 0276FCFC0 A09FA3D68 00000006E 5 000000001 opitca()+391 CALL??? opiDeferredSem() 000000001 000000000 006F7AC18 000000000 __PGOSF525_kksFullT CALL??? opitca() 037615F10 9C3F138D0 0277000A0 ypeCheck()+27 00895C700 rpiswu2()+2757 CALL??? __PGOSF525_kksFullT 0276FEB98 000004018 0108A04E0 ypeCheck() 0108A0700 kksLoadChild()+9357 CALL??? rpiswu2() 9F86A81C8 000000000 9C5F9D1E4 000000002 kxsGetRuntimeLock() CALL??? kksLoadChild() 01089AFE0 A09FA39D8 0276FF400 +2320 A09FA39D8 kksfbc()+15225 CALL??? kxsGetRuntimeLock() 01089AFE0 037615F10 0276FF400 000000103 kkspsc0()+2117 CALL??? kksfbc() 037615F10 000000003 A00000108 0076D1C80 kksParseCursor()+18 CALL??? kkspsc0() 00CAD1DA8 0076D1C80 00000006F 1 000000003 opiosq0()+2538 CALL??? kksParseCursor() 00CACF990 000000000 00895C700 027700940 opiall0()+6705 CALL??? opiosq0() 000000003 00000000E 0277010C0 000000020 opikpr()+699 CALL??? opiall0() 000000065 000000022 0277018C8 000000000 opiodr()+1662 CALL??? opikpr() 000000065 90000001C 027703208 01089AA20 rpidrus()+862 CALL??? opiodr() 000000065 00000001C 027703208 000000000 rpidru()+154 CALL??? rpidrus() 0277027F8 000000000 000000000 000000000 rpiswu2()+2757 CALL??? rpidru() 027703030 000000000 000000000 000000000 kprball()+1610 CALL??? rpiswu2() 9F86A81C8 000000000 027702E50 000000002 qmCheckIfXdbInstall CALL??? kprball() 027703208 000000100 000000002 ed()+1059 00CAEC188 qm_open_db()+11 CALL??? qmCheckIfXdbInstall 000000000 000000000 000000000 ed() 00895C700 kscnfy()+778 CALL??? qm_open_db() 657FC5CD00000019 000000000 000000000 100000000 adbdrv()+45489 CALL??? kscnfy() 000000019 000000000 000000000 000000000 opiexe()+20842 CALL??? adbdrv() 000000023 000000003 A00000102 000000000 opiosq0()+5129 CALL??? opiexe()+16981 000000004 000000000 02770A8C0 009121AB3 kpooprx()+357 CALL??? opiosq0() 000000003 00000000E 02770AB90 0000000A4 kpoal8()+940 CALL??? kpooprx() 01089AFE0 0090CC0A8 01089AFE0 000000001 opiodr()+1662 CALL??? kpoal8() 00000005E 00000001C 02770E100 00ABBF224 ttcpip()+1325 CALL??? opiodr() 00000005E 00000001C 02770E100 4100200000000000 opitsk()+2040 CALL??? ttcpip() 0108B4D00 000000000 000000000 000000000 opiino()+1258 CALL??? opitsk() 00000001E 000000000 000000000 02770F9F8 opiodr()+1662 CALL??? opiino() 00000003C 000000004 02770FAB0 000000000 opidrv()+864 CALL??? opiodr() 00000003C 000000004 02770FAB0 615C3A6500000000 sou2o()+98 CALL??? opidrv()+150 00000003C 000000004 02770FAB0 000000000 opimai_real()+158 CALL??? sou2o() 064425745 000000000 000000000 02770FBA4 opimai()+191 CALL??? opimai_real() 7FFA241388C0 7FFA24138A49 000000000 00895C700 *** 2023-04-21 17:29:42.343 OracleThreadStart() CALL??? opimai() 000401452 000000002 0085DFE20 +724 0000025B0 00007FFA246713D2 CALL??? OracleThreadStart() 00FCAFF18 000000000 000000000 000000000 00007FFA26D403C4 CALL??? 00007FFA246713B0 7FFA246713B0 000000000 000000000 000000000 --------------------- Binary Stack Dump --------------------- |