[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Condor-users] ntdll.dll access_violation on windows xp sp2 + dataexecution prevention



Hello,

Thank you for your reply.

>From Microsoft's description of DEP ( see:
http://support.microsoft.com/kb/875352 ) I gather that the (default) OptIn
policy setting checks "essential windows programs and services only",
which is a bit vague but unfortunately seems to include the condor
service. This is supported by the fact that listing the condor daemons as
exceptions in an OptOut policy situation fixes the problem.

I suppose I could set the DEP policy to AlwaysOff (which is, incidentally,
only possibly by manually editing the boot.ini entry you mentioned) but if
at all possible I'd like to fix this on the condor / kerberos side rather
than have to disable windows' DEP for it to work. Plus, I don't think it
would sit very well with the IT security officer. :)

Regards,

Rob de Graaf

On Fri, May 11, 2007 7:59 pm, Michael McClenahan wrote:
> I don't know how DEP affects condor but we had issues with DEP in other
> areas on both our 2003 servers and our XP workstations. You can change DEP
> to be OptIn instead of OptOut. Easiest way to do this is to change
> c:\boot.ini
>
>
> Look for the bit that says "/noexecute=optout" and change it to
> "/noexecute=optin", then reboot.
>
>
> I automated this easily using a regex within a perl script, just make
> sure that the regex is NOT case sensitive as I have seen the optin/optout
> often occur in mixed case as well as all lowercase.
>
> 1) take a backup of the boot.ini
> 2) attrib -s -h -r $bootIniFile
> 3) regex boot .ini ->  s/noexecute=optout/noexecute=OptIn/i
> 4) attrib +s +h -a $bootIniFile
> 5) Reboot
>
>
> Remember, always be careful when editing boot.ini.
>
>
> Should work for XP/2003
>
>
> Michael McClenahan
>
>
> -----Original Message-----
> From: condor-users-bounces@xxxxxxxxxxx
> [mailto:condor-users-bounces@xxxxxxxxxxx] On Behalf Of Rob de Graaf
> Sent: 11 May 2007 18:31
> To: condor-users@xxxxxxxxxxx
> Subject: [Condor-users] ntdll.dll access_violation on windows xp sp2 +
> dataexecution prevention
>
> Hello,
>
>
> I've set up a test environment including a central manager running
> Slackware linux and an execute only node running Windows XP service pack
> 2, both using condor 6.8.4. Both machines authenticate using kerberos
> and I have successfully run some test jobs.
>
> However, on the Windows execute node, the condor daemons don't always
> start properly. Sometimes the condor_master will fail, sometimes the
> condor_startd will fail, sometimes they both fail. When they go down they
> leave a core file in the log directory. This one is from when the
> condor_master failed to start:
>
> core.MASTER.win32 //=====================================================
> Exception code: C0000005 ACCESS_VIOLATION
> Fault address:  7C93426D 01:0003326D C:\WINDOWS\system32\ntdll.dll
>
>
> Registers:
> EAX:FFFFFFFF
> EBX:00000362
> ECX:000320F0
> EDX:00000000
> ESI:000303A8
> EDI:000305D8
> CS:EIP:001B:7C93426D
> SS:ESP:0023:00CDF154  EBP:00CDF374
> DS:0023  ES:0023  FS:003B  GS:0000
> Flags:00010246
>
>
> Call stack:
> Address   Frame     Logical addr  Module
> 7C93426D  00CDF374  0001:0003326D C:\WINDOWS\system32\ntdll.dll
> 77C2C3C9  00CDF3B4  0001:0001B3C9 C:\WINDOWS\system32\msvcrt.dll
> 77C2C3E7  00CDF3C0  0001:0001B3E7 C:\WINDOWS\system32\msvcrt.dll
> 77C2C42E  00CDF3D0  0001:0001B42E C:\WINDOWS\system32\msvcrt.dll
> 0034E510  00CDF3EC  0001:0000D510 C:\condor\bin\krb5_32.dll
> 00342FD2  00CDF420  0001:00001FD2 C:\condor\bin\krb5_32.dll
> 003824C7  00CDF638  0001:000414C7 C:\condor\bin\krb5_32.dll
> 00464C76  00CDF684  0001:00063C76 C:\condor\bin\condor_master.exe
> 0046440F  00CDF698  0001:0006340F C:\condor\bin\condor_master.exe
> 0045FDCC  00CDF70C  0001:0005EDCC C:\condor\bin\condor_master.exe
> 0045FB45  00CDF728  0001:0005EB45 C:\condor\bin\condor_master.exe
> 00458951  00CDF758  0001:00057951 C:\condor\bin\condor_master.exe
> 004589A7  00CDF9F8  0001:000579A7 C:\condor\bin\condor_master.exe
> 00439747  00CDFE58  0001:00038747 C:\condor\bin\condor_master.exe
>
>
> The core file the condor_startd creates on failure has the same entries.
>
>
> The condor log files show nothing unusual.
>
>
> After some digging I learned about the existence of something called
> Data Execution Prevention (system properties -> advanced -> performance
> settings -> data execution prevention) which was apparently added to
> Windows XP with service pack 2. Adding the condor daemons to the
> exception list appears to solve the problem, however I would prefer not to
> have to do that.
>
> As far as I can tell, the problem only occurs when condor is configured
> to use kerberos authentication. The central manager is, for testing
> purposes, also the KDC, using MIT kerberos version krb5-1.6.1. The execute
> node runs a fully patched Windows XP SP2 and MIT kerberos for windows
> version kfw-3.2.0. Both use condor-6.8.4.
>
> Has anyone encountered this problem? What could be triggering windows'
> data execution prevention? How can I avoid adding the condor daemons to the
> exception list?
>
> Thanks in advance,
>
>
> Rob de Graaf
> _______________________________________________
> Condor-users mailing list
> To unsubscribe, send a message to condor-users-request@xxxxxxxxxxx with
> asubject: Unsubscribe
> You can also unsubscribe by visiting
> https://lists.cs.wisc.edu/mailman/listinfo/condor-users
>
>
> The archives can be found at either
> https://lists.cs.wisc.edu/archive/condor-users/
> http://www.opencondor.org/spaces/viewmailarchive.action?key=CONDOR
>
>
> ----
> Gloucester Research Limited believes the information provided herein is
> reliable. While every care has been taken to ensure accuracy, the
> information is furnished to the recipients with no warranty as to the
> completeness and accuracy of its contents and on condition that any
> errors or omissions shall not be made the basis for any claim, demand or
> cause for action. The information in this email is intended only for the
> named recipient.  If you are not the intended recipient please notify us
> immediately and do not copy, distribute or take action based on this
> e-mail. All messages sent to and from this email address will be logged by
> Gloucester Research Ltd and are subject to archival storage, monitoring,
> review and disclosure. Gloucester Research Limited, 5th Floor, Whittington
> House, 19-30 Alfred Place, London WC1E 7EA.
> Gloucester Research Limited is a company registered in England and Wales
> with company number 04267560. ----
>
>
>
> _______________________________________________
> Condor-users mailing list
> To unsubscribe, send a message to condor-users-request@xxxxxxxxxxx with a
> subject: Unsubscribe
> You can also unsubscribe by visiting
> https://lists.cs.wisc.edu/mailman/listinfo/condor-users
>
>
> The archives can be found at either
> https://lists.cs.wisc.edu/archive/condor-users/
> http://www.opencondor.org/spaces/viewmailarchive.action?key=CONDOR