IBM OS/2 Dump Formatter for a retail or an hstrict UNI kernel. Formatter is --> Internal revision 14.106_W4 Dump file is --> Internal revision 14.106_W4 (process dump) Symbol (d:\devtools\pmdf\14_106_w4_slamain\os2krnlr.sym) linked Current slot number: 00ca Slot Pid Ppid Csid Ord Sta Pri pTSD pPTDA pTCB Disp SG Name *00ca# 2320 231f 2320 0001 blk 0300 f995c000 f9d5d600 f9cb7ec0 0eb4 13 MYSQLD eax=00000000 ebx=0000efc0 ecx=00eb0053 edx=00000000 esi=00e7f68c edi=297a0000 eip=1ffca259 esp=00ebeb38 ebp=00ebec64 iopl=2 -- -- -- nv up ei pl nz ac po cy cs=005b ss=0053 ds=0053 es=0053 fs=150b gs=0000 cr2=00000000 cr3=00000000 005b:1ffca259 83c410 add esp,+10 # .p Slot Pid Ppid Csid Ord Sta Pri pTSD pPTDA pTCB Disp SG Name *00ca# 2320 231f 2320 0001 blk 0300 f995c000 f9d5d600 f9cb7ec0 0eb4 13 MYSQLD 0061 2320 231f 2320 0002 run 0300 f98f3000 f9d5d600 f9ca48ac 0af8 13 MYSQLD Slot 61 (i.e. ord 2) should have exited by the time the main thread complained # Checking call gates for all slots Slot MYSQLD 61: is in a call to: %1ffc6eac DOSCALL1 DOS32DUMPPROCESS Slot MYSQLD ca: is in a call to: %1ffc6f5c DOSCALL1 DOS32EXCEPTIONCALLBACK # %findsym esp l1000 Finding from 00ebeb38 to 00ebfb38 EBEC68: 1ffca692 = DOS32UNWINDEXCEPTION + 5a EBECA4: 1ffca2aa = _xcptExecuteUserExceptionHandler + 46 EBECA8: 1ffc1b27 = DOS32UNSETEXCEPTIONHANDLER + 3b EBECB0: 1ffca2c9 = _xcptExecuteUserExceptionHandler + 65 EBECC4: 1ffca2ec = _xcptR3ExceptionHandler EBECE0: 1ffc9f56 = _xcptR3ExceptionDispatcher + 10e EBED18: 1ffc9e26 = DOS32R3EXCEPTIONDISPATCHER + 12e EBED30: 1ffc9e26 = DOS32R3EXCEPTIONDISPATCHER + 12e EBED4C: 1fb965d2 = CharRect32 + 5be EBED80: 1ffc1b27 = DOS32UNSETEXCEPTIONHANDLER + 3b EBED84: 1cd49a5c = ulAvioFontMaxHeight + 40 EBED88: 1fc230f9 = PRF32QUERYPROFILESTRING + 1ad EBED9C: 1fbacd30 = ShlExceptionHandler EBEDB4: 1fc22f72 = PRF32QUERYPROFILESTRING + 26 EBEE80: fff52c04 = _vmFreeMemCtxtOd + 404 EBEEC0: fff53643 = _VMFreeMemOd + 2a3 EBEEC4: ffed0004 = _BufHashTable + 788 EBEEE8: fff6d314 = _VMFreeMem + 164 EBEF40: 1fb9ef4c = AlwaysSBCS Invalid address type: 409 - 0053:00ebf000 Scan stopped at EBFB39 stopaddr EBFB38 # %k EBEC68-4 00ebec64: Frame 00ebed2c Ret DOS32UNWINDEXCEPTION + 5a 00ebed2c: Frame 00ebee4c Ret DOS32R3EXCEPTIONDISPATCHER + 12e 00ebee4c: Frame 00e7f67c Ret 00000000 00e7f67c: Frame 00e7f69c Ret __exit + 37 00e7f69c: Frame 00e7f6bc Ret _exit + f 00e7f6bc: Frame 00e7f71c Ret _handle_fatal_signal + 21e 00e7f71c: Frame 00e7f7fc Ret __libc_back_signalRaiseInternal + e0c 00e7f7fc: Frame 00e7f88c Ret __libc_Back_signalRaise + 147 00e7f88c: Frame 00e7f90c Ret _libc_Back_exceptionHandler + 103 00e7f90c: Frame 00e7f93c Ret _xcptExecuteUserExceptionHandler + 46 00e7f93c: Frame 00e7f99c Ret _xcptR3ExceptionDispatcher + 88 00e7f99c: Frame 00e7fab8 Ret DOS32R3EXCEPTIONDISPATCHER + 5c 00e7fab8: Frame 00e7fc48 Ret 00000000 00e7fc48: Frame 00e7fe78 Ret _my_end + 47 00e7fe78: Frame 00e7ff80 Ret main + 9d8 00e7ff80: Frame 00e7ffe0 Ret __text + 21 00e7ffe0: Frame 00000000 Ret __init_app + b Can not access 0 - giving up # %xcpt Exception report record at 0328fbd8 ExceptNum c0010002 fHandlerFags 00000000 NestedExceptionReportRecord 00000000 ExceptionAddress 1d0eefa3 cParameters 00000001 P0 00000001 Context record at 0328fbfc ctxflags 00000007 eax 0000005f ebx 0328fd40 ecx 00000000 edx 00010009 edi 00000000 esi 00007530 esp 0328fd2c ebp 0328fd54 ss 00000053 eip 1d0eefa3 cs 0000005b gs 00000000 fs 0000150b es 00000053 ds 00000053 eflags 00002246 Exception registration record at 0328ff94 prev ffffffff handler 17441270 Found 1 report records on stack # .s61 (thread that did not exit) Current slot number: 0061 # %findsym esp l1000 Finding from 0328f9f0 to 032909f0 328FA1C: 1ffca2aa = _xcptExecuteUserExceptionHandler + 46 328FA3C: 1ffca2ec = _xcptR3ExceptionHandler 328FA4C: 1ffc9ed0 = _xcptR3ExceptionDispatcher + 88 328FA60: 1ffca2ec = _xcptR3ExceptionHandler 328FA88: 1d0cacf2 = _um_lump_alloc + 30a 328FA9C: 1ffc77c1 = HT32_Exit + 5 328FAAC: 1ffc9d54 = DOS32R3EXCEPTIONDISPATCHER + 5c 328FAF4: fff53643 = _VMFreeMemOd + 2a3 328FAF8: ffed0004 = _BufHashTable + 788 328FB1C: fff6d314 = _VMFreeMem + 164 328FB60: 1d0eefa3 = __libc_back_signalWait + be 328FB78: 1d0eab1a = __libc_Back_ioFileOpen + 356 328FBE4: 1d0eefa3 = __libc_back_signalWait + be 328FC2C: fff53643 = _VMFreeMemOd + 2a3 328FC30: ffed0004 = _BufHashTable + 788 328FC54: fff6d314 = _VMFreeMem + 164 328FC98: 1d0eefa3 = __libc_back_signalWait + be 328FCF8: 1d14e280 = __libc_Back_safesemMtxUnlock + 38 328FD28: 1d0eefa3 = __libc_back_signalWait + be 328FD58: 1d0f013e = __libc_Back_signalWait + 17e 328FE08: 1d11c5cd = _std_sigtimedwait + 1d 328FE18: 1d126cee = _um_free_maybe_lock + b2 328FE2C: 1ffc5df9 = DOS32WRITE + 29 328FE38: 1d14dcf4 = __libc_Back_safesemMtxLock + 54 328FE48: 1d14e280 = __libc_Back_safesemMtxUnlock + 38 328FE58: 1d0c8573 = __fmutex_release_internal_must_complete + 33 328FE78: 1d0ef254 = __libc_back_signalSemRelease + 10 328FE7C: 18fdcf68 = __libc_gSignalPending + 438 328FE98: 1d11c6d7 = _std_sigwait + 27 328FF98: 17441270 = MYHANDLER 328FFB8: 1d0f9dd3 = _endthread + 7f 328FFD8: 1d106550 = _libc_Back_exceptionHandler Scan stopped at 3290A00 stopaddr 32909F0 # %k 328FB60-4 0328fb5c: Frame 0328fd54 Ret __libc_back_signalWait + be 0328fd54: Frame 0328fe04 Ret __libc_Back_signalWait + 17e 0328fe04: Frame 0328fe94 Ret _std_sigtimedwait + 1d 0328fe94: Frame 0328ff04 Ret _std_sigwait + 27 0328ff04: Frame 0328ff64 Ret _signal_hand + 197 0328ff64: Frame 0328ffb4 Ret _pthread_exit + 25b 0328ffb4: Frame 0328fff4 Ret _endthread + 7f 0328fff4: Frame 00000000 Ret 1ffec188 Can not access 0 - giving up