Created
February 14, 2023 17:17
-
-
Save xtender/2518cfde24f580970898682306579621 to your computer and use it in GitHub Desktop.
trace 'alter table' by callstack
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
SQL> alter session set events 'sql_trace {callstack: fprefix atb} errorstack(1)'; | |
Session altered. | |
SQL> begin execute immediate 'alter table dd add b int';end; | |
2 / | |
PL/SQL procedure successfully completed. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
dbkedDefDump(): Starting a non-incident diagnostic dump (flags=0x0, level=1, mask=0x0) | |
----- Error Stack Dump ----- | |
<error barrier> at 0x7ffe52ad1db0 placed dbkda.c@296 | |
----- Current SQL Statement for this session (sql_id=ggx91ms9duqbz) ----- | |
alter table dd add b int | |
----- PL/SQL Stack ----- | |
----- PL/SQL Call Stack ----- | |
object line object | |
handle number name | |
0x7977d758 1 anonymous block | |
----- Call Stack Trace ----- | |
calling call entry argument values in hex | |
location type point (? means dubious value) | |
-------------------- -------- -------------------- ---------------------------- |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment