I made an export from Oracle 9i.
I imported the export into a Oracle 10g RC2 (other system).
Now I have following problem:
In a software I use appear an error. In Oracle Alert log are following
entries:
###############################
begin of the part from alert log
###############################
Current log# 3 seq# 1299 mem# 0: /oraflash/KLEI/redo03.log
Thu Aug 31 12:00:19 2006
Thread 1 cannot allocate new log, sequence 1300
Checkpoint not complete
Current log# 3 seq# 1299 mem# 0: /oraflash/KLEI/redo03.log
Thread 1 advanced to log sequence 1300
Current log# 1 seq# 1300 mem# 0: /oraflash/KLEI/redo01.log
Thu Aug 31 13:00:02 2006
Errors in file /pro/app/oracle/admin/KLEI/udump/klei_ora_16711.trc:
ORA-07445: Exception aufgetreten: CORE Dump [evaopn2()+209] [SIGSEGV]
[Address n
ot mapped to object] [0x0] [] []
###############################
end of the part from alert log
###############################
begin of /pro/app/oracle/admin/KLEI/udump/klei_ora_16711.trc
Oracle Database 10g Enterprise Edition Release 10.2.0.1.0 - Production
With the Partitioning and Data Mining options
ORACLE_HOME = /pro/app/oracle/product/10.2.0/db_2
System name: Linux
Node name: kkoradbs01
Release: 2.6.9-22.0.1.ELsmp
Version: #1 SMP Tue Oct 18 18:39:27 EDT 2005
Machine: i686
Instance name: KLEI
Redo thread mounted by this instance: 1
Oracle process number: 17
Unix process pid: 16711, image: oracleKLEI_at_kkoradbs01
- 2006-08-31 13:00:02.634
- ACTION NAME:( ) 2006-08-31 13:00:02.633
- MODULE NAME:(wfbelpos) 2006-08-31 13:00:02.633
- SERVICE NAME:(KLEI) 2006-08-31 13:00:02.633
- SESSION ID:(151.14063) 2006-08-31 13:00:02.633
Exception signal: 11 (SIGSEGV), code: 1 (Address not mapped to object),
addr: 0x0, PC: [0x95171c3, evaopn2()+209]
Registers:
%eax: 0x00000838 %ebx: 0xb70dff20 %ecx: 0xb6ed6b18
%edx: 0x857ffa5c %edi: 0x09517165 %esi: 0x00000000
%esp: 0xbfff9f8c %ebp: 0xbfffa148 %eip: 0x095171c3
%efl: 0x00210246
evaopn2()+198 (0x95171b8) add $8,%esp
evaopn2()+201 (0x95171bb) mov 0xffffffd8(%ebp),%ebx
evaopn2()+204 (0x95171be) jmp 0x9517156
evaopn2()+206 (0x95171c0) mov 0x28(%edx),%esi
> evaopn2()+209 (0x95171c3) mov (%esi),%edi
evaopn2()+211 (0x95171c5) movzw 0x4(%esi),%esi
evaopn2()+215 (0x95171c9) mov (%edi,%ecx),%edi
evaopn2()+218 (0x95171cc) mov %esi,0xfffffff0(%ebp)
evaopn2()+221 (0x95171cf) mov %edi,0xfffffff8(%ebp)
- 2006-08-31 13:00:02.636
ksedmp: internal or fatal error
ORA-07445: Exception aufgetreten: CORE Dump [evaopn2()+209] [SIGSEGV]
[Address not mapped to object] [0x0] [] []
Current SQL statement for this session:
SELECT STPL_MWST , STPL_VNO , STPL_EKVK1 , STPL_PRAB , STPL_SUM ,
STPL_PLMI , STPL_MWS2 , STPL_EKVK2 , STPL_PRAB2 , STPL_SUM2
, STPL_PLMI2 , STPL_EKBAS , STPL_MINMAX , STPL_RUND , STPL_NO ,
STPL_ZEN , STPL_PBKZ , STPL_HERST FROM SPL WHERE STPL_NO =
:1 AND ( :1 IS NULL OR STPL_ZEN = :1 ) AND ( STPL_PBKZ = :1 OR
STPL_PBKZ = 0 ) AND ( STPL_HERST = :1 OR STPL_HERST
= 0 ) ORDER BY STPL_NO , STPL_ZEN , STPL_PBKZ DESC , STPL_HERST DESC
----- PL/SQL Call Stack -----
object line object
handle number name
0x946d477c 1763 package body UNITRADE.VK_PREIS
0x946d477c 2619 package body UNITRADE.VK_PREIS
0x945dba98 1 anonymous block
----- Call Stack Trace -----
calling call entry argument values in
hex
location type point (? means dubious
value)
-------------------- -------- --------------------
ksedst()+27 call ksedst1() 1 ? 1 ?
ksedmp()+557 call ksedst() 1 ? 8152A10 ?
B72FFEF0 ?
51D650 ? 10 ?
B74A2D38 ?
ssexhd()+863 call ksedmp() 3 ? 95171C3 ?
6F617665 ?
28326E70 ? 30322B29
? 39 ?
__pthread_sighandle call 00000000 B ? B7301C90 ?
B7301D10 ? 0 ?
r_rt()+92 0 ? 0 ?
evaopn2()+209 signal 00000000 B ? B7301C90 ?
B7301D10 ?
expepr()+146 call evaopn2() 857FFA5C ? 5 ?
857FFAF8 ? 0 ?
E2A ? 0 ?
evaiand()+38 call expepr() 857FFAA4 ? 85800320
? 0 ?
BFFFA188 ? 97FA31A ?
857FFAF8 ?
expeal()+22 call evaiand() 857FFAF8 ? BFFFA4D8
?
9EB75A2 ? 857FFAF8 ?
0 ? 0 ?
qertbFetchByRowID() call expeal() 857FFAF8 ? 0 ? 0 ? 1
?
+5710 9F39AEE8 ? 0 ?
opifch2()+5157 call 00000000 858002D8 ? A0DF740 ?
BFFFA730 ? 1 ?
opifch()+56 call opifch2() 89 ? 5 ? BFFFA9A0 ?
opipls()+7449 call opifch() 5 ? 2 ? BFFFABD8 ?
opiodr()+2347 call 00000000 66 ? 6 ? BFFFBD00 ?
rpidrus()+434 call opiodr() 66 ? 6 ? BFFFBD00 ?
8B ?
skgmstack()+210 call 00000000 BFFFB604 ? C6A667C ?
C6A667C ? BFFFB5E8 ?
BFFFBAEC ? BFFFB604
?
rpidru()+98 call skgmstack() BFFFB5E8 ? C6A6340 ?
F618 ?
970BE82 ? BFFFB604 ?
rpiswu2()+1061 call 00000000 BFFFBAEC ? BFFFBBA8
? 4 ? 4 ?
B713C64C ? B7130DD4
?
rpidrv()+1915 call rpiswu2() 9F39AEE8 ? 38 ?
BFFFBAB0 ?
2 ? BFFFBB28 ? 38 ?
BFFFBAB0 ? 0 ?
970C13C ?
970C218 ? BFFFBAEC ?
38 ?
psddr0()+456 call rpidrv() 8B ? 66 ? BFFFBD00 ?
38 ?
psdnal()+310 call psddr0() 8B ? 66 ? BFFFBD00 ?
30 ?
B7040B98 ? 946D477C
?
pevm_BFTCHC()+678 call 00000000 BFFFC3F0 ? BFFFC4EC
?
C6ADD80 ? B7040B98 ?
946D477C ? 4 ?
pfrinstr_FTCHC()+14 call pevm_BFTCHC() B7163C74 ? B6F9F6AC
? 0 ?
1
pfrrun_no_tool()+45 call 00000000 B7163C74 ? 8555C238
?
B7163CB0 ?
pfrrun()+1381 call pfrrun_no_tool() B7163C74 ? 859CCB1C
?
B7163CB0 ?
plsql_run()+1416 call pfrrun() B7163C74 ? C6ADD80 ?
BFFFC3F0 ? 0 ? 0 ?
B714EB08 ?
peicnt()+525 call plsql_run() B7163C74 ? 1 ? 0 ?
kkxexe()+481 call peicnt() BFFFC3F0 ? B7163C74
?
C6A6580 ? 0 ?
BFFFC4EC ? 0 ?
opiexe()+9215 call kkxexe() B70BA030 ? 10A12A ?
0 ?
58647DC0 ? 403A4 ? 0
?
opiodr()+2347 call 00000000 4 ? 4 ? BFFFECD4 ?
ttcpip()+4227 call 00000000 4 ? 4 ? BFFFECD4 ?
12B ?
C70D6E6 ? 11 ?
opitsk()+1991 call ttcpip() C6ADD80 ? 4 ?
BFFFECD4 ? 0 ?
BFFFE1B4 ? BFFFEDF8
?
opiino()+1387 call opitsk() 0 ? 0 ?
opiodr()+2347 call 00000000 3C ? 4 ? BFFFF8C0 ?
opidrv()+915 call opiodr() 3C ? 4 ? BFFFF8C0 ?
0 ?
sou2o()+113 call opidrv() 3C ? 4 ? BFFFF8C0 ?
opimai_real()+212 call sou2o() BFFFF8A4 ? 3C ? 4 ?
BFFFF8C0 ?
main()+111 call opimai_real() 2 ? BFFFF8F0 ?
__libc_start_main() call 00000000 2 ? BFFFF974 ?
BFFFF980 ?
+161 51CFD4 ? 2 ? 8286EF8
?
- Binary Stack Dump ---------------------
- FRAME [1] (ksedst()+27 -> ksedst1()) ==========
Dump of memory from 0xB72FFE4C to 0xB72FFE5C
B72FFE40 B72FFE5C [\./.]
B72FFE50 082B5AFD 00000001 00000001 [.Z+.........]
- FRAME [2] (ksedmp()+557 -> ksedst()) ==========
Dump of memory from 0xB72FFE5C to 0xB72FFFB4
B72FFE50 B72FFFB4 [../.]
B72FFE60 082B46CB 00000001 08152A10 B72FFEF0 [.F+......*..../.]
B72FFE70 0051D650 00000010 B74A2D38 00000001 [P.Q.....8-J.....]
B72FFE80 00000000 00000001 00000000 00000000 [................]
B72FFE90 00000003 0051D650 0C6A667C 00000004 [....P.Q.|fj.....]
B72FFEA0 B72FFEF0 00000000 00000000 B72FFEC4 [../.........../.]
B72FFEB0 B72FFF30 B73BBCD6 00000003 B72FFEC4 [0./...;......./.]
B72FFEC0 B72FFF44 00000815 00000000 00000000 [D./.............]
B72FFED0 00133DE3 000081A0 00000001 000001F4 [.=..............]
B72FFEE0 000001F6 00000000 00000000 00000000 [................]
B72FFEF0 0002307D 00000000 00001000 00000128 [}0..........(...]
B72FFF00 00000000 44F6C116 00000000 44731BC6 [.......D......sD]
B72FFF10 00000000 4486EDC5 00000000 00133DE3 [.......D.....=..]
B72FFF20 00000000 0C669358 B7301C90 9F2E4630 [....X.f...0.0F..]
B72FFF30 B72FFFB0 0AC3B915 00000003 9F2E4648 [../.........HF..]
B72FFF40 B72FFF44 00000815 00000000 00000000 [D./.............]
B72FFF50 00000000 00000000 00000000 00000000 [................]
B72FFF60 000001F6 00000000 00000000 B7300000 [..............0.]
B72FFF70 0002307D 00001000 00000128 44F6C116 [}0......(......D]
B72FFF80 00000000 44731BC6 00000001 00000001 [......sD........]
B72FFF90 00000001 00000000 00000000 00000001 [................]
B72FFFA0 00000000 0BE0A1CC B7301C90 B7301D24 [..........0.$.0.]
B72FFFB0 B7301C2C [,.0.]
- FRAME [3] (ssexhd()+863 -> ksedmp()) ==========
Dump of memory from 0xB72FFFB4 to 0xB73003B4
B72FFFB0 B7301C2C 094933D7 00000003 [,.0..3I.....]
B72FFFC0 095171C3 6F617665 28326E70 30322B29 [.qQ.evaopn2()+20]
B72FFFD0 00000039 00000000 00000000 00000000 [9...............]
B72FFFE0 00000000 00000000 00000000 00000000 [................]
Repeat 2 times
B7300010 00000000 00000001 00000000 00000000 [................]
B7300020 00000000 00001000 00000000 00000000 [................]
B7300030 00000000 00000000 00000000 00000000 [................]
Repeat 55 times
B73003B0 00000000 [....]
- FRAME [4] (__pthread_sighandler_rt()+92 -> 00000000)
Dump of memory from 0xB7301C2C to 0xB7301C7C
B7301C20 B7301C7C [|.0.]
B7301C30 B743923C 0000000B B7301C90 B7301D10 [<.C.......0...0.]
B7301C40 00000000 00000000 00000000 00000000 [................]
Repeat 2 times
B7301C70 B70DFF20 00000000 09517165 [ .......eqQ.]
- FRAME [5] (evaopn2()+209 -> 00000000) ==========
%eax 00000838 %ebx B70DFF20 %ecx B6ED6B18 %edx 857FFA5C
%edi 09517165 %esi 00000000 %esp BFFF9F8C %ebp BFFFA148
%eip 095171C3
Dump of memory from 0xB7301C7C to 0xB730207C
B7301C70 BFFFA148 [H...]
B7301C80 B732C890 0000000B B7301C90 B7301D10 [..2.......0...0.]
B7301C90 0000000B 00000000 00000001 00000000 [................]
B7301CA0 00000000 00000000 00000000 00000000 [................]
Repeat 6 times
B7301D10 00000000 00000000 B7202000 00000000 [......... .....]
B7301D20 00100000 00000033 00000000 0000007B [....3.......{...]
B7301D30 C02D007B 09517165 00000000 BFFFA148 [{.-.eqQ.....H...]
B7301D40 BFFF9F8C B70DFF20 857FFA5C B6ED6B18 [.... ...\....k..]
B7301D50 00000838 0000000E 00000004 095171C3 [8............qQ.]
B7301D60 00000073 00210246 BFFF9F8C 0000007B [s...F.!.....{...]
B7301D70 B7301D84 80000000 00000000 80000000 [..0.............]
B7301D80 00000000 FFFF027F FFFF0030 FFFFFFFF [........0.......]
B7301D90 09EB5FD8 01C90073 BFFFA39C 0000007B [._..s.......{...]
B7301DA0 00000000 00000000 00000000 00000000 [................]
B7301DB0 00000000 00000000 00000000 70000000 [...............p]
B7301DC0 5AE3788D 40008015 00000000 80000000 [.x.Z...@........]
B7301DD0 00004000 00000000 00000000 00000000 [.@..............]
B7301DE0 80000000 88004005 AD688DC7 3FF7ADA9 [.....@....h....?]
B7301DF0 00000030 0030027F 01C90000 09EB5FD8 [0.....0......_..]
B7301E00 00000073 BFFFA39C 0000007B 00009FC0 [s.......{.......]
B7301E10 0000FFFF 00000000 00000000 00000000 [................]
B7301E20 00000000 00000000 00000000 00000000 [................]
Repeat 1 times
B7301E40 00000000 788D7000 80155AE3 00004000 [.....p.x.Z...@..]
B7301E50 00000000 00000000 80000000 00004000 [.............@..]
B7301E60 00000000 00000000 00000000 00000000 [................]
B7301E70 00000000 00000000 80000000 00004005 [.............@..]
B7301E80 00000000 8DC78800 ADA9AD68 00003FF7 [........h....?..]
B7301E90 00000000 00000000 00000000 00000000 [................]
Repeat 21 times
B7301FF0 00000000 0000ADB8 0080CD00 00000000 [................]
B7302000 00000000 00000000 00000000 00000000 [................]
Repeat 6 times
B7302070 00000000 00000000 00000000 [............]
- FRAME [6] (expepr()+146 -> evaopn2()) ==========
Dump of memory from 0xBFFFA148 to 0xBFFFA168
the complete file is 3 MByte
thx for help
Received on Thu Aug 31 2006 - 06:17:00 CDT