[OpenAFS] Roaming Profiles on AFS
Christos Triantafyllidis
ctria@physics.auth.gr
Sun, 09 Jan 2005 01:59:25 +0200
This is a cryptographically signed message in MIME format.
--------------ms020008090608070506000109
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
I had already enabled the user profile diagnosis
Here is the part of logoff of it (i hope that doesn't flood the list):
USERENV(43c.b2c) 14:13:16:889 LibMain: Process Name:
C:\WINDOWS\system32\userinit.exe
USERENV(170.174) 14:13:22:578 UnloadUserProfile: Entering, hProfile =
<0x788>
USERENV(170.174) 14:13:22:578 UnloadUserProfile: In console winlogon process
USERENV(170.174) 14:13:22:578 UnloadUserProfileP: Entering, hProfile =
<0x788>
USERENV(170.174) 14:13:22:578 GetExclusionListFromRegistry: Policy list
is empty, returning user list = <Local Settings;Temporary Internet
Files;History;Temp>
USERENV(170.174) 14:13:22:578 CSyncManager::EnterLock
<S-1-5-21-1004336348-1547161642-1417001333-4532>
USERENV(170.174) 14:13:22:588 CSyncManager::EnterLock: No existing entry
found
USERENV(170.174) 14:13:22:588 CSyncManager::EnterLock: New entry created
USERENV(170.174) 14:13:22:588 CHashTable::HashAdd:
S-1-5-21-1004336348-1547161642-1417001333-4532 added in bucket 14
USERENV(170.174) 14:13:22:588 UnloadUserProfileP: Wait succeeded. In
critical section.
USERENV(170.174) 14:13:23:349 MyRegUnLoadKey: Failed to unmount hive
00000005
USERENV(170.174) 14:13:23:349 MyRegUnLoadKey: Returning 0.
USERENV(170.174) 14:13:23:359 DumpOpenRegistryHandle: 5 user registry
Handles leaked from
\Registry\User\S-1-5-21-1004336348-1547161642-1417001333-4532
USERENV(170.174) 14:13:23:359 UnloadUserProfileP: Didn't unload user
profile <err = 5>
USERENV(170.174) 14:13:23:359 MyRegUnLoadKey: Returning 1.
USERENV(170.174) 14:13:23:359 UnLoadClassHive: Successfully unmounted
S-1-5-21-1004336348-1547161642-1417001333-4532_Classes
USERENV(170.174) 14:13:23:359 UnloadUserProfileP: Successfully unloaded
user classes
USERENV(170.174) 14:13:23:359 HandleRegKeyLeak: RtlAdjustPrivilege
succeeded!
USERENV(170.174) 14:13:24:531 HandleRegKeyLeak: RegSaveKey succeeded!
USERENV(170.174) 14:13:24:531 HandleRegKeyLeak: RtlAdjustPrivilege
succeeded!
USERENV(170.174) 14:13:24:531 HandleRegKeyLeak: hkCurrentUser closed
USERENV(170.174) 14:13:24:541 Entering CUserProfile::WatchHiveRefCount:
S-1-5-21-1004336348-1547161642-1417001333-4532, 1
USERENV(170.174) 14:13:24:541 CUserProfile::WatchHiveRefCount: In
critical section
USERENV(170.174) 14:13:24:541 CUserProfile::WatchHiveRefCount:
NtUnloadKeyEx succeeded for
\Registry\User\S-1-5-21-1004336348-1547161642-1417001333-4532
USERENV(170.174) 14:13:24:541 Entering CUserProfile::AddWorkItem:
S-1-5-21-1004336348-1547161642-1417001333-4532
USERENV(170.174) 14:13:24:541 CHashTable::HashAdd:
S-1-5-21-1004336348-1547161642-1417001333-4532 added in bucket 14
USERENV(170.174) 14:13:24:541 CUserProfile::AddWorkItem: No thread
available, create a new one.
USERENV(170.174) 14:13:24:541 CUserProfile::AddWorkItem: Signal event
item inserted
USERENV(170.174) 14:13:24:541 CUserProfile::AddWorkItem: New thread created
USERENV(170.4cc) 14:13:24:541 Entering CUserProfile::WorkerThreadMain
USERENV(170.174) 14:13:24:541 CUserProfile::AddWorkItem: Work Item inserted
USERENV(170.174) 14:13:24:541 CUserProfile::AddWorkItem: thread woken up
USERENV(170.174) 14:13:24:541 Exiting CUserProfile::AddWorkItem with
00000000
USERENV(170.174) 14:13:24:541 HandleRegKeyLeak: Calling
WatchHiveRefCount (S-1-5-21-1004336348-1547161642-1417001333-4532) succeeded
USERENV(170.4cc) 14:13:24:541 CUserProfile::WorkerThreadMain: In
critical section
USERENV(170.4cc) 14:13:24:551 CUserProfile::WorkerThreadMain: Leave
critical section
USERENV(170.174) 14:13:24:551 UnloadUserProfileP: Impersonated user
USERENV(170.4cc) 14:13:24:551 CUserProfile::WorkerThreadMain: Back to
waiting...
USERENV(170.174) 14:13:24:551 UnloadUserProfileP: Copying profile back
to N:\cell\path\to\profile
USERENV(170.174) 14:13:24:631 UnloadUserProfileP: Roaming profile
directory does not exist.
USERENV(170.174) 14:13:24:641 CreateSecureDirectory: Entering with
<N:\cell\path\to\profile>
USERENV(170.174) 14:13:24:641 CreateNestedDirectory: CreateDirectory
failed with 5.
USERENV(170.174) 14:13:24:641 CreateSecureDirectory: Failed to created
the directory <N:\cell\path\to\profile>
USERENV(170.174) 14:13:24:641 UnloadUserProfileP: CreateSecureDirectory
failed to create roaming profile directory.
USERENV(170.174) 14:13:24:651 UnloadUserProfileP: CopyProfileDirectory
returned FALSE for primary profile. Error = 5
USERENV(170.174) 14:13:24:651 ReportError: Impersonating user.
USERENV(170.174) 14:13:24:661 ReportError: Logging Error <Windows cannot
update your roaming profile. Possible causes of this error include
network problems or insufficient security rights. If this problem
persists, contact your network administrator.
DETAIL - Access is denied.
>
USERENV(170.174) 14:13:24:661 ErrorDialogEx: Calling DialogBoxParam
USERENV(170.174) 14:13:24:671 ErrorDlgProc:: DialogBoxParam
USERENV(170.174) 14:13:27:115 UnloadUserProfileP: Writing local ini file
USERENV(170.174) 14:13:27:115 UnloadUserProfileP: Reverting to Self
USERENV(170.174) 14:13:27:115 UnloadUserProfileP: exitting without
cleaning up due to hive unloading failure
USERENV(170.174) 14:13:27:115 CSyncManager::LeaveLock
<S-1-5-21-1004336348-1547161642-1417001333-4532>
USERENV(170.174) 14:13:27:115 CSyncManager::LeaveLock: Lock released
USERENV(170.174) 14:13:27:115 CHashTable::HashDelete:
S-1-5-21-1004336348-1547161642-1417001333-4532 deleted
USERENV(170.174) 14:13:27:115 CSyncManager::LeaveLock: Lock deleted
USERENV(170.174) 14:13:27:115 UnloadUserProfileP: Leave critical section.
USERENV(170.174) 14:13:27:115 UnloadUserProfileP: Leaving with a return
value of 0
USERENV(170.174) 14:13:27:115 UnloadUserProfile: UnloadUserProfileP
failed with 0
USERENV(170.174) 14:13:27:115 UnloadUserProfile: returning 0
For this i had:
1) n: mounted to \\afs\all (n: is created at machine startup)
2) my profile path = n:\cell\path\to\profile
3) i also redirected all folders available in group policy to a share on
windows server (just in case it was a file in these folder that was
using unicode name)
Is there any way to make windows use 8-bit character set names?
should i do this?
can i somehow check if my profile folder has such names?
Christos Triantafyllidis,
Aristotles University of Thessaloniki, Greece
Department Of Physics
PS: i deleted roaming profile directory on afs. it was recreated at
logon. and it wasn't found at logoff (as i can see in log) i think that
proves that there was no tokens at logoff (because the folder was (and
it is still) there)
Rodney M Dyer wrote:
> Christos,
>
> For further diagnosis of your profile problem it may be necessary to
> find out why Windows is having trouble writing your profile to AFS. We
> are assuming your token is disappearing, but as Jeffrey Altman suggests
> it may be something wrong with a filename.
>
> To enable user profile diagnosis on Windows the following articles are
> instructive...
>
> http://support.microsoft.com/kb/221833
>
> http://www.jsiinc.com/SUBE/tip2100/rh2185.htm
>
> Or further, search Google for: "\debug\usermode\userenv.log"
>
> Rodney
>
> Rodney M. Dyer
> Windows Systems Programmer
> Mosaic Computing Group
> William States Lee College of Engineering
> University of North Carolina at Charlotte
> Email: rmdyer@uncc.edu
> Web: http://www.coe.uncc.edu/~rmdyer
> Phone: (704)687-3518
> Help Desk Line: (704)687-3150
> FAX: (704)687-2352
> Office: 267 Smith Building
--------------ms020008090608070506000109
Content-Type: application/x-pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIII2jCC
BGkwggNRoAMCAQICAXkwDQYJKoZIhvcNAQEFBQAwOjELMAkGA1UEBhMCR1IxEzARBgNVBAoT
CkhlbGxhc0dyaWQxFjAUBgNVBAMTDUhlbGxhc0dyaWQgQ0EwHhcNMDQxMjE0MTY1MTQ5WhcN
MDUxMjE0MTY1MTQ5WjBgMQswCQYDVQQGEwJHUjETMBEGA1UEChMKSGVsbGFzR3JpZDEYMBYG
A1UECxMPcGh5c2ljcy5hdXRoLmdyMSIwIAYDVQQDExlUcmlhbnRpYWZpbGxpZGlzIENocmlz
dG9zMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDDxroacvgqMWnnCvlPswU5pcgjFKAX
p3JURCiaVTM/vTV2w+Cdcn/UYIG3laQmOJ36i3zTdTqh8sIY+WFUb9aHtO4mMhJX6h+lBhFQ
ZQdg0WwM/gxd2wmJpw/oE7PzqdOK8Ft/MNet05y8yviBDnJ4BWTVDcMGXuVKhu8Z8DMhLQID
AQABo4IB1jCCAdIwDAYDVR0TAQH/BAIwADARBglghkgBhvhCAQEEBAMCBaAwDgYDVR0PAQH/
BAQDAgTwMB0GA1UdDgQWBBRDHhIEDJD1vlcAsxawfR8SWItBMTBiBgNVHSMEWzBZgBQ2JrZf
N/CM+XHHrtwWXOVkKCEc7qE+pDwwOjELMAkGA1UEBhMCR1IxEzARBgNVBAoTCkhlbGxhc0dy
aWQxFjAUBgNVBAMTDUhlbGxhc0dyaWQgQ0GCAQAwTwYDVR0fBEgwRjBEoEKgQIY+aHR0cDov
L3BraS5waHlzaWNzLmF1dGguZ3IvaGVsbGFzZ3JpZC1jYS9DUkwvaGVsbGFzZ3JpZC12Mi5j
cmwwVQYDVR0gBE4wTDBKBgwrBgEEAeYhAgEKAQQwOjA4BggrBgEFBQcCARYsaHR0cDovL3Br
aS5waHlzaWNzLmF1dGguZ3IvaGVsbGFzZ3JpZC1jYS9DUFMwUgYDVR0SBEswSYEdaGVsbGFz
Z3JpZC1jYUBwaHlzaWNzLmF1dGguZ3KGKGh0dHA6Ly9wa2kucGh5c2ljcy5hdXRoLmdyL2hl
bGxhc2dyaWQtY2EwIAYDVR0RBBkwF4EVY3RyaWFAcGh5c2ljcy5hdXRoLmdyMA0GCSqGSIb3
DQEBBQUAA4IBAQC/ZHbm6520sK08NXHPCZ35uv7MQfwfBCal8SyHZ2oaG8HTOidL6hdnB076
bYDYzJBvLWPDGNkHPb4XcPuWUpK9sSt+GakFSZJ+g09bGPLqhwGvFAPCQ8+gEjecy4IL2Ldf
tSV32F2OGXPAMYy9IPrZfK7jH6vtehMG3ssCMJKBvbLufb69Cy8V9vjzfKyw6zCccW5tkvtO
tAgk0Qc68VoANX0Xt0vVYbznkuO2mBo9McsW4yT3pHwrTQx1y7CviJ5oVcJXiGuPIGSlWHgK
/sbnHaNL2P0SURdZ19UD1ytHX7SOZwCfhY7TftlyqIrjk5+sOpRfjS5gbiU0ESg18YARMIIE
aTCCA1GgAwIBAgIBeTANBgkqhkiG9w0BAQUFADA6MQswCQYDVQQGEwJHUjETMBEGA1UEChMK
SGVsbGFzR3JpZDEWMBQGA1UEAxMNSGVsbGFzR3JpZCBDQTAeFw0wNDEyMTQxNjUxNDlaFw0w
NTEyMTQxNjUxNDlaMGAxCzAJBgNVBAYTAkdSMRMwEQYDVQQKEwpIZWxsYXNHcmlkMRgwFgYD
VQQLEw9waHlzaWNzLmF1dGguZ3IxIjAgBgNVBAMTGVRyaWFudGlhZmlsbGlkaXMgQ2hyaXN0
b3MwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMPGuhpy+CoxaecK+U+zBTmlyCMUoBen
clREKJpVMz+9NXbD4J1yf9RggbeVpCY4nfqLfNN1OqHywhj5YVRv1oe07iYyElfqH6UGEVBl
B2DRbAz+DF3bCYmnD+gTs/Op04rwW38w163TnLzK+IEOcngFZNUNwwZe5UqG7xnwMyEtAgMB
AAGjggHWMIIB0jAMBgNVHRMBAf8EAjAAMBEGCWCGSAGG+EIBAQQEAwIFoDAOBgNVHQ8BAf8E
BAMCBPAwHQYDVR0OBBYEFEMeEgQMkPW+VwCzFrB9HxJYi0ExMGIGA1UdIwRbMFmAFDYmtl83
8Iz5cceu3BZc5WQoIRzuoT6kPDA6MQswCQYDVQQGEwJHUjETMBEGA1UEChMKSGVsbGFzR3Jp
ZDEWMBQGA1UEAxMNSGVsbGFzR3JpZCBDQYIBADBPBgNVHR8ESDBGMESgQqBAhj5odHRwOi8v
cGtpLnBoeXNpY3MuYXV0aC5nci9oZWxsYXNncmlkLWNhL0NSTC9oZWxsYXNncmlkLXYyLmNy
bDBVBgNVHSAETjBMMEoGDCsGAQQB5iECAQoBBDA6MDgGCCsGAQUFBwIBFixodHRwOi8vcGtp
LnBoeXNpY3MuYXV0aC5nci9oZWxsYXNncmlkLWNhL0NQUzBSBgNVHRIESzBJgR1oZWxsYXNn
cmlkLWNhQHBoeXNpY3MuYXV0aC5ncoYoaHR0cDovL3BraS5waHlzaWNzLmF1dGguZ3IvaGVs
bGFzZ3JpZC1jYTAgBgNVHREEGTAXgRVjdHJpYUBwaHlzaWNzLmF1dGguZ3IwDQYJKoZIhvcN
AQEFBQADggEBAL9kdubrnbSwrTw1cc8Jnfm6/sxB/B8EJqXxLIdnahobwdM6J0vqF2cHTvpt
gNjMkG8tY8MY2Qc9vhdw+5ZSkr2xK34ZqQVJkn6DT1sY8uqHAa8UA8JDz6ASN5zLggvYt1+1
JXfYXY4Zc8AxjL0g+tl8ruMfq+16EwbeywIwkoG9su59vr0LLxX2+PN8rLDrMJxxbm2S+060
CCTRBzrxWgA1fRe3S9VhvOeS47aYGj0xyxbjJPekfCtNDHXLsK+InmhVwleIa48gZKVYeAr+
xucdo0vY/RJRF1nX1QPXK0dftI5nAJ+FjtN+2XKoiuOTn6w6lF+NLmBuJTQRKDXxgBExggI8
MIICOAIBATA/MDoxCzAJBgNVBAYTAkdSMRMwEQYDVQQKEwpIZWxsYXNHcmlkMRYwFAYDVQQD
Ew1IZWxsYXNHcmlkIENBAgF5MAkGBSsOAwIaBQCgggFTMBgGCSqGSIb3DQEJAzELBgkqhkiG
9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTA1MDEwODIzNTkyNVowIwYJKoZIhvcNAQkEMRYEFOGX
n6qj52rx49FAh2dscWKUjaQbME4GCSsGAQQBgjcQBDFBMD8wOjELMAkGA1UEBhMCR1IxEzAR
BgNVBAoTCkhlbGxhc0dyaWQxFjAUBgNVBAMTDUhlbGxhc0dyaWQgQ0ECAXkwUAYLKoZIhvcN
AQkQAgsxQaA/MDoxCzAJBgNVBAYTAkdSMRMwEQYDVQQKEwpIZWxsYXNHcmlkMRYwFAYDVQQD
Ew1IZWxsYXNHcmlkIENBAgF5MFIGCSqGSIb3DQEJDzFFMEMwCgYIKoZIhvcNAwcwDgYIKoZI
hvcNAwICAgCAMA0GCCqGSIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgEoMA0GCSqG
SIb3DQEBAQUABIGAhqzHP3g7FLD1zKZ9UiRNcBLPs35Ovk8mJVQ97xKdQbkrtVrDyyRCMbX5
uR2FDG8GPV/aEe9PkeAljRkQl4VnT8nv2PBf7HLJOsqJplYC6vCZEhXMgMLVigm2bY8osRk8
EWe0I8L+1IP+h+8PkSilJVHS1bHDCXMnTinieubZmNMAAAAAAAA=
--------------ms020008090608070506000109--