Criteria are defined for determining when additional stack dumps would be
saved and presented (e.g., to the developer). This provides more
information for the developer to use for debugging, and yet does not
overburden the developer with irrelevant information. Suspicious activity
worthy of an additional stack dumps may be defined as a thread accessing
an already suspicious location that is different than the original
thread, a write access being made and no write access having yet been
made to the target location, or if the lockset being held by the thread
accessing the location is omitted from the intersection of all locksets
involved in stack dumps for the location.