Highlighted
Absent Member.
Absent Member.
940 views

Abend: Kernel detected an attempted context switch when it was notallowed

Hello,

Can anybody make head or tail of this? It happened twice last week, and
once over the weekend. The server has got the Set Auto Restart After
Abend = Off setting applied!

Another abend happened today of an identical type, but this is the last
entry in abend.log.

*********************************************************
Novell Open Enterprise Server, NetWare 6.5
PVER: 6.50.06

Server KEGS_ADMIN halted Friday, 19 January 2007 8:23:12.985 pm
Abend 1 on P00: Server-5.70.06-4348: Kernel detected an attempted
context switch when it was not allowed


Registers:
CS = 0008 DS = 0010 ES = 0010 FS = 0010 GS = 0010 SS = 0010
EAX = 00000000 EBX = 00000001 ECX = 00000000 EDX = FBF24E13
ESI = 947A77C4 EDI = 9465D9F0 EBP = 00000031 ESP = 9465D88C
EIP = 00227108 FLAGS = 00000002
00227108 83C404 ADD ESP, 00000004
EIP in SERVER.NLM at code start +00019368h

The violation occurred while processing the following instruction:
00227108 83C404 ADD ESP, 00000004
0022710B 5D POP EBP
0022710C 5E POP ESI
0022710D 5B POP EBX
0022710E C3 RET
0022710F A19447F0FB MOV EAX, [FBF04794]=FBF26C68
00227114 50 PUSH EAX
00227115 E85709EFFF CALL LOADER.NLM|Abend
0022711A 83C404 ADD ESP, 00000004
0022711D 5D POP EBP



Running process: TSA Open: 89B32580 Process
Thread Owned by NLM: SERVER.NLM
Stack pointer: 9465D610
OS Stack limit: 94656020
CPU 0 (Thread 951EC0A0) is in a NO SLEEP state
Scheduling priority: 67371008
Wait state: 5050100 Delayed
Stack: --FBF24E13 ?
--00000031 (LOADER.NLM|KernelAddressSpace+31)
--947A77C4 ?
--9465D924 ?
00225130 (SERVER.NLM|SchedSwitch+48)
--00000001 (LOADER.NLM|KernelAddressSpace+1)
--00000031 (LOADER.NLM|KernelAddressSpace+31)
--9465D9F0 ?
--947A77C4 ?
--9465D924 ?
0036B7B3 (SERVER.NLM|RescheduleLastWithDelay+F3)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
0021D110 (SERVER.NLM|StartTempHandicappedThreadAgain+0)
--FFFFFFFF ?
--951EC0A0 ?
--88593AD0 ?
--925CA380 ?
--9465D900 ?
0036B69A (SERVER.NLM|CRescheduleLastWithDelay+6)
--00000202 (LOADER.NLM|KernelAddressSpace+202)
8A3BDA91 (THREADS.NLM|ThreadSwitchWithDelay+5)
9217E5B5 (NETSHLD.NLM|REG_Open+B5)
--9465D93C ?
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--0001D900 (LOADER.NLM|BIOSDriveCount+3C6C)
--91D3CE00 ?
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--89D95541 (STREAMS.NLM|u+5525)
--9465D9C4 ?
--9465D92C ?
9217F53B (NETSHLD.NLM|REG_IsSessionStampingDisabled+3B)
--9465D924 ?
--00000002 (LOADER.NLM|KernelAddressSpace+2)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--89D95540 (STREAMS.NLM|u+5524)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--91D3CE00 ?
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--9465D93C ?
921C758D (NETSHLD.NLM|RefreshSessionStampMode+2D)
--00000246 (LOADER.NLM|KernelAddressSpace+246)
--45B128B1 ?
--9465D944 ?
921C75C8 (NETSHLD.NLM|IsSessionStampingEnabled+8)
--9465D960 ?
921A086C (NETSHLD.NLM|ProcessPostOpen+C)
--9465D9C8 ?
--00000001 (LOADER.NLM|KernelAddressSpace+1)
--89D95540 (STREAMS.NLM|u+5524)
--00002000 (LOADER.NLM|KernelAddressSpace+2000)
--9465D9C4 ?
--9465D980 ?
921A0AFD (NETSHLD.NLM|WatchPostOpen+3D)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--00009183 (LOADER.NLM|KernelAddressSpace+9183)
--0000002A (LOADER.NLM|KernelAddressSpace+2A)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--80000001 ?
--FFFFFFD5 ?
--9465DBCC ?
8A3A801C (THREADS.NLM|_DestroyCallBackBlock+260)
--9465D9F0 ?
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--FFFFFFFF ?
--9465DBCC ?
--01043326 ?
--0000002A (LOADER.NLM|KernelAddressSpace+2A)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
8A3A65E1 (THREADS.NLM|__CHK+21)
--925CA380 ?
--9465D9B0 ?
--01043326 ?
--0000002A (LOADER.NLM|KernelAddressSpace+2A)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--9465DBCC ?
85CB870D (LFS.NLM|FSMonitorExit+25)
--9465D9F0 ?
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--01043326 ?
--0000002A (LOADER.NLM|KernelAddressSpace+2A)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--9465DBCC ?
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--927C7000 ?
85CB91C3 (LFS.NLM|OpenFile+C6)
842F1A37 (NWSA.NSS|ZH_OpenFile+607)
--0000002A (LOADER.NLM|KernelAddressSpace+2A)
--FFFFFFD5 ?
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--01043326 ?
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--00000006 (LOADER.NLM|KernelAddressSpace+6)
--80000001 ?
--00000000 (LOADER.NLM|KernelAddressSpace+0)
--9465DCA0 ?

Additional Information:
The NetWare OS detected a problem with the system while executing a
process owned by SERVER.NLM. It may be the source of the problem or
there may have been a memory corruption.

Loaded Modules:
BECLIENT.NLM Backup Exec - Administration Console
Version 9.10 29 July 2005
Code Address: 9597B000h Length: 000D74B9h
Data Address: 948F6000h Length: 000476C0h
JNET.NLM Java jnet (based on 1.4.2_09)
Version 1.42.07 14 September 2006
Code Address: 948EE000h Length: 0000653Eh
Data Address: 9535F000h Length: 00001110h
BESRVR.NLM Backup Exec - Job Server
Version 9.10 12 January 2006
Code Address: 94D2B000h Length: 0011D253h
Data Address: 94191000h Length: 0004C510h
BEPSVR.NLM Backup Exec - NCPE Server
Version 9.10 12 January 2006
Code Address: 94678000h Length: 000D99A4h
Data Address: 94E54000h Length: 00035840h
TNRLTCP.NLM Backup Exec - Peer TCP Support
Version 9.10 12 January 2006
Code Address: 94C97000h Length: 00002AE7h
Data Address: 94C9B000h Length: 00001100h
TNRLSPX.NLM Backup Exec - Peer SPX Support
Version 9.10 12 January 2006
Code Address: 94C91000h Length: 000021A5h
Data Address: 94C95000h Length: 00000940h
COMDAT.NLM Backup Exec - Common DAT Target Handler
Version 7.50 26 July 2005
Code Address: 94C47000h Length: 00003133h
Data Address: 94C4C000h Length: 00000048h
NDMPD.NLM VERITAS Backup Exec NDMP Server Module
Version 9.10 12 January 2006
Code Address: 9420F000h Length: 0005B1C3h
Data Address: 94BFB000h Length: 00018D10h
AD_ASPI.NLM Backup Exec ASPI Device Driver for NetWare
Version 7.50 17 February 2006
Code Address: 94BC1000h Length: 000140B8h
Data Address: 94BD7000h Length: 00008F9Fh
NRLTLI.NLM Backup Exec - Remote Workstation Backup Software
Version 9.10 12 January 2006
Code Address: 94B8E000h Length: 0000240Fh
Data Address: 94B92000h Length: 00000BE0h
OFMCDM.CDM Open File Manager(TM) CDM
Version 95.01 8 December 2005
Code Address: 94B0B000h Length: 000359C1h
Data Address: 0D3DE000h Length: 0000AF3Ch
OFMHAM.HAM Open File Manager(TM) HAM
Version 95.01 8 December 2005
Code Address: 942F1000h Length: 000057A1h
Data Address: 0D3DC000h Length: 00001B40h
OFM.NLM St. Bernard Software Open File Manager (TM)
Version 95.01 8 December 2005
Code Address: 94477000h Length: 0005AABAh
Data Address: 94A69000h Length: 0000E8AEh
B2D.NLM Symantec Backup To Disk Device Driver
Version 7.50 10 August 2005
Code Address: 942C9000h Length: 00005A1Fh
Data Address: 942D0000h Length: 00004C30h
TSANDS.NLM TSA for Novell eDirectory 7.x, 8.x
Version 10551.71 19 July 2005
Code Addr
Labels (1)
0 Likes
1 Reply
Highlighted
Absent Member.
Absent Member.

Re: Abend: Kernel detected an attempted context switch when it was not allowed

On Mon, 22 Jan 2007 09:13:44 -0800, Chris Malton
<chrism@cjsoftuk.dyndns.org> wrote:

> 9217F53B (NETSHLD.NLM|REG_IsSessionStampingDisabled+3B)
> 921C758D (NETSHLD.NLM|RefreshSessionStampMode+2D)
> 921C75C8 (NETSHLD.NLM|IsSessionStampingEnabled+8)
> 921A086C (NETSHLD.NLM|ProcessPostOpen+C)
> 921A0AFD (NETSHLD.NLM|WatchPostOpen+3D)


This looks like a Net Shield issue -- there have been several posts that
seem to have similar issues, but you'll have to talk to the vendor about
fixes. I don't think I've seen a report back of a Net Shield update ....

/dps


--
Using Opera's revolutionary e-mail client: http://www.opera.com/m2/
0 Likes
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.