cwpofYQ6DTSiCwM/ApMMSoduqlvh!j6OXPZw+4ws+LCRcUqQyhPcuClXsVrkOpUU   
   nbWowJYz7FATiWmezzeJd6uzgcSeeU/eJSlZh+jd!euiC0ItLrHI9gS31jWI3M1M   
   VwFdW7Bq+ZLSANk=   
   properly   
   From: "Steven Levine"    
      
   On Sun, 6 Feb 2011 20:31:05 UTC, James Moe    
    wrote:   
      
   Hi James,   
      
   > Usually entries in look like:   
   > 04-08-2010 14:10:03 SYS3171 PID 04b4 TID 0018 Slot 00ab   
   > G:\C\VOICE\PMMDEV\TESTCASE\BIN\PMMAIL.EXE   
   > c0000005   
   > 000b3d0a   
   > P1=00000002 P2=04b1fffc P3=XXXXXXXX P4=XXXXXXXX   
      
   This is your typical access violation report. I'd have to see the    
   registers, but it could be a stack overflow.   
      
   > 02-05-2011 21:32:41 SYS3170 PID 12cf TID 0001 Slot 00d1   
   > W:\APPS\PMMAIL\BIN\PMMAIL.EXE   
   > 6104c483   
   > c3000000   
   > P1=84e85110 P2=830003cc P3=55c306c4 P4=ec8bca8b   
   > [...]   
      
   This does not look valid to me. I have to suspect that the stack was    
   sufficiently corrupted to result in a somewhat bogus exception report.   
    If you can capture an process dump, I'll look at it and see if I can    
   figure out how the code got to this point.   
      
   Steven   
      
   --    
   ---------------------------------------------------------------------   
   Steven Levine    
   eCS/Warp/DIY etc. www.scoug.com www.ecomstation.com   
   ---------------------------------------------------------------------   
      
   --- Internet Rex 2.31   
    * Origin: The gateway at Omicron Theta (1:261/20.999)   
|