Generated a multi_page search output.  Went down that listing,
clicking on those links that looked interesting (and after
having looked at such a site, clicked on 'Back' to return to
the search output listing).  After looking at quite a few:

07-04-2001  21:36:35  SYS3175  PID 0861  TID 0001  Slot 00a3
E:\APP\MOW\MOZILLA.EXE
c0000005
000027cc
P1=00000001  P2=000027cc  P3=XXXXXXXX  P4=XXXXXXXX
EAX=019e66f0  EBX=001317a8  ECX=018c41c4  EDX=00131740
ESI=00000000  EDI=80004005
DS=0053  DSACC=d0f3  DSLIM=bfffffff
ES=0053  ESACC=d0f3  ESLIM=bfffffff
FS=150b  FSACC=00f3  FSLIM=00000030
GS=1353  GSACC=10f3  GSLIM=00003fff
CS:EIP=005b:000027cc  CSACC=d0df  CSLIM=bfffffff
SS:ESP=0053:0013172c  SSACC=d0f3  SSLIM=bfffffff
EBP=00131750  FLG=00212216

mikus


-------- beg some more info --------

IBM OS/2 Process Dump Formatter for retail uni kernel
Formatter is --> Internal revision 14.072a_UNI
Dump file is --> Internal revision 14.072a_W4

Current slot number: 00a3

 Slot  Pid  Ppid Csid Ord  Sta Pri  pTSD     pPTDA    pTCB     Disp SG Name
*00a3# 0861 0020 0861 0001 run 073f fa059000 fefc3f24 fef40b94 0920 27 MOZILLA

eax=019e66f0 ebx=001317a8 ecx=018c41c4 edx=00131740 esi=00000000 edi=80004005
eip=000027cc esp=0013172c ebp=00131750 iopl=2 rf -- -- nv up ei pl nz ac pe nc
cs=005b ss=0053 ds=0053 es=0053 fs=150b gs=1353  cr2=00000000  cr3=00000000

Invalid linear address: 005b:000027cc
#

**********Loading Process Information**********

PROCESS slot:a3 Pid:0861 Ord:0001
PTDA    handle=0fe8 address=%fefc3f24
MTE     handle=0fb5 address=%fde68abc (MOZILLA)
SMTE    address=%fc71d768
LDT     handle=13de address=%f4a27000
CODE:   user (cs:eip)#005b:000027cc cbargs=
STACKS: user (ss:esp)#0053:001314a8(active)
        ring2(ss:esp)#00b6:0000f000(bottom)
        ring0 tcbframe=%fa059f3c bottom=%f9fd920a
#

  Base Ptr   Parameters                                Caller
  --------   ----------------                          ------

  %00131750  1d14 d520 01cc 0820 1d16 17e4 0013 0001   Unknown 17f8 0013 f363 1d14
  %001317f8  1d14 2ea0 00e8 b480 01f4 3d90 01a9 d520   Unknown 1868 0013 c9be 1d14
  %00131868  1d7e 3070 01a9 dbf0 018a 4688 0242 dc00   Unknown 1888 0013 52a2 1d7e
  %00131888  1d7c dbf0 018a dc00 00ae 18b0 0013 90cc   Unknown 1910 0013 0f5f 1d7c
  %00131910  1db6 dc00 00ae 0001 0000 a150 00e3 4c3d   Unknown 196c 0013 1f02 1db6
  %0013196c  1d88 0000 0000 a150 00e3 1954 0013 19b8   Unknown 1bfc 0013 09b8 1d88
  %00131bfc  0001 0001 0000 6180 00ae 7020 00ae 0000   Unknown 1c44 0013 013a 0001
  %00131c44  0001 0001 0000 6180 00ae 851e 0001 0000   Unknown 1c88 0013 8537 0001
  %00131c88  0fb5 0000 0000 0000 0000 0014 0a1f 0014   DOSCALL1 DOS32R3EXITADDR

                               Ring Three Stack Trace
 Location    Address       Symbol                         Description
 --------    -------       ------                         -----------
 %1318d4   %1fd82254 PMMERGE WIN32PEEKMSG + 72e
 %131924   %1fd84b48 PMMERGE WIN32DISPATCHMSG + f5
#

Unwinding Stack Frame Address fa059f3c ... please wait
 Location    Address       Symbol                         Description
 --------    -------       ------                         -----------
 %fa059a74   %fff66516     _TKProbeBuff + 5d
 %fa059a80   %fff6654f     _TKProbeBuff + 96
 %fa059a9c   %fff66516     _TKProbeBuff + 5d
 %fa059ab8   %fffa2117     PDWRITE + 46
 %fa059acc   fde7:000000b8 PMVIOP THAIFONTWINPROC + a8
 %fa059adc   %fff966d7     _PLD_WriteDumpRec + 30
 %fa059afc   %fff96b35     _PLD_WriteMem + 190
 %fa059b4c   fde7:00000000 PMVIOP THAIDLG
 %fa059b54   %fff98321     _PLD_WriteTK + 151
 %fa059b84   %fff96bfc     _PLD_WriteMem + 257
 %fa059b9c   %ffecf87c OS2KRNL _BufHashTable + 784
 %fa059ba8   %fff1e64b     KernelPageFault + 17
 %fa059bbc   %fff1dadc     KernelFaultEntry + c4
 %fa059bf4   %fff9799f     _PLD_WriteRequired + 1f
 %fa059c04   %fff92130     _PLD32ApiDump + 54f
 %fa059c0c   %fff9210e     _PLD32ApiDump + 52d
 %fa059c54   %fff91a4f     _PLD_Ring3Trap + 98
 %fa059c9c   %fff9140c     _xcptFatalDispatchError + 3c1
 %fa059cc8   %ffed4128 OS2KRNL _criSEF
 %fa059d28   %fff731b3     _xcptDefaultAction + 2fc
 %fa059d84   %fff63f55     DOS32EXCEPTIONCALLBACK + 8
 %fa059d90   %1ffc9cec DOSCALL1 DOS32R3EXCEPTIONDISPATCHER + 142
 %fa059d98   %fff41a44     _TKFuBuff + e4
 %fa059da8   %fff41a4c     _TKFuBuff + ec
 %fa059dc0   %fff419c6     _TKFuBuff + 66
 %fa059e18   %fff7367d     _xcptExceptionCallBack + 158
 %fa059e40   %fff73487     _VR32ExceptionCallBack + 77
 %fa059e60   %fff73410     _VR32ExceptionCallBack
 %fa059e6c   %fff49b90     _PGPageFault + 34b
 %fa059f38   %fff63f66     DOS32EXCEPTIONCALLBACK + 19
  Stack Frame Address fa059f3c reached
#

There appeared to be 17 threads dumped.

-------- end some more info --------

Reply via email to