追踪trace文件发现:
dbkedDefDump(): Starting a non-incident diagnostic dump (flags=0x3, level=3, mask=0x0)
----- Current SQL Statement for this session (sql_id=3c8xkyc5n3967) -----
CREATE PACKAGE BODY sqlab_trace_parse wrapped
0
abcd
abcd
abcd
abcd
abcd
abcd
abcd
.....
----- Call Stack Trace -----
calling call entry argument values in hex
location type point (? means dubious value)
-------------------- -------- -------------------- ----------------------------
*** 2012-08-16 14:51:45.430
skdstdst()+36 call kgdsdst() 000000000 ? 000000000 ?
7F6FDFF5C118 ? 000000001 ?
7F6FDFF60618 ? 000000000 ?
ksedst1()+98 call skdstdst() 000000000 ? 000000000 ?
7F6FDFF5C118 ? 000000001 ?
000000000 ? 000000000 ?
ksedst()+34 call ksedst1() 000000001 ? 000000001 ?
7F6FDFF5C118 ? 000000001 ?
000000000 ? 000000000 ?
dbkedDefDump()+2736 call ksedst() 000000001 ? 000000001 ?
7F6FDFF5C118 ? 000000001 ?
000000000 ? 000000000 ?
ksedmp()+36 call dbkedDefDump() 000000003 ? 000000003 ?
7F6FDFF5C118 ? 000000001 ?
000000000 ? 000000000 ?
ssexhd()+2326 call ksedmp() 000000003 ? 000000003 ?
7F6FDFF5C118 ? 000000001 ?
000000000 ? 000000000 ?
__restore_rt() call ssexhd() 00000000B ? 7F6FDFF64D70 ?
7F6FDFF64C68 ? 000000001 ?
000000000 ? 000000000 ?
ptgend24()+239 signal __restore_rt() 7F6FDF9102F8 ? 000000248 ?
085F6C558 ? 000000002 ?
000000292 ? 7F6FDF9102F8 ?
pkvub2edit()+890 call ptgend24() 7FFF282451D8 ? 000000248 ?
080000292 ? 00000016D ?
000000292 ? 7F6FDF9102F8 ?
pkvinflatepidl()+27 call pkvub2edit() 7FFF282451D8 ? 000000248 ?
3 000000000 ? 000000000 ?
080000292 ? 7F6FDF9102F8 ?
pkvdYZ()+655 call pkvinflatepidl() 7FFF282451D8 ? 085F6C558 ?
00955E940 ? 7F6FDFC09440 ?
000000000 ? 00955F480 ?