• 3007964
  • 15-Jun-2006
  • 26-Apr-2012


Novell NetWare 6.5
Novell NetWare 6.5 Support Pack 5
Novell NetWare 6.5 Support Pack 4


The abend was caused by memory corruption.  The BEASTHASH_LookupByZid code was walking a hash bucket container, looking for a beast in the linked list which matches the desired ZID.  In the process of walking the hash bucket linked list, we encountered a pointer to a beast which should have been in memory at address 0x4038E380.  However, that address contains all
"0xFFFFFFFF" bytes.   It appears that our beast is right in the middle of an area which has been stolen by a different 16K chunk of memory, and overwritten. 
Walking the linked list in both directions because it is doubly linked, and following both next and prev pointers, it all ends up referring to this missing beast that has been overwritten by someone.
There were 16K, on a 4k boundary which were re-used by some other process ... and an NSS beast should have been in the middle of that 16K region.


This abend is resolved in SERVER.EXE dated April 11, 2006 or newer. This can be found in NW65OS5a.exe.