About Virtualization, VDI, SBC, Application Compatibility and anything else I feel like
I was deploying an unattended installation of Citrix XenApp 5.0 with Altiris Deployment Server. The installation consists of several prerequisites, the installation of XenApp and finally the Citrix Management Consoles.
The installation is performed with a special account and not the Local System account because the install packages are located on the network.
When testing the deployment on a Windows Server 2008 I noticed that sometimes MSI based installations would fail with error code 1603 or 1601.
MSI Errors are defined in the Product SDK, specifically in WinError.h, so I looked up the error codes:
// MessageId: ERROR_INSTALL_SERVICE_FAILURE
// The Windows Installer Service could not be accessed. This can occur if the Windows Installer is not correctly installed. Contact your support personnel for assistance.
#define ERROR_INSTALL_SERVICE_FAILURE 1601L
// MessageId: ERROR_INSTALL_FAILURE
// Fatal error during installation.
#define ERROR_INSTALL_FAILURE 1603L
Then I looked in the logfiles and that showed the following errors:
MSI (c) (5C:8C) [19:34:33:864]: Windows Installer proxy information not correctly registered
MSI (c) (5C:8C) [19:34:33:864]: Failed to connect to server. Error: 0x80004005
Searching on these errors didn’t give me any good solutions, most results suggested to reregister msiexec but since most MSI’s were installed without errors this was not the solution.
A trace with Process Monitor revealed this:
I looked up this error code (0xC0000425) and it is defined in ntstatus.h:
// MessageId: STATUS_HIVE_UNLOADED
// Illegal operation attempted on a registry key which has already been unloaded.
#define STATUS_HIVE_UNLOADED ((NTSTATUS)0xC0000425L)
That gave the clue that the profile of the installation account was forcefully unloaded by the User Profile Service. The Event Log confirmed this:
Windows detected your registry file is still in use by other applications or services. The file will be unloaded now. The applications or services that hold your registry file may not function properly afterwards.
1 user registry handles leaked from \Registry\User\S-1-5-21-1556653526-4280407051-3911480998-1615_Classes:
Process 1512 (\Device\HarddiskVolume1\Windows\System32\msiexec.exe) has opened key \REGISTRY\USER\S-1-5-21-1556653526-4280407051-3911480998-1615_CLASSES
I am not sure if this happens because of bug in the User Profile Service, an Altiris bug of simply because the installation does many logons and logoffs in a short time period. Anyway I decided that I would need to prevent the User Profile Service from unloading the profile. My first guess was there would be an exclusion list somewhere in the registry so I disassembled the User Profile Service with Ida Pro but didn’t find any evidence that such a key exists. I did find 2 interesting functions though: CUserProfile::IncrementRefCount and CUserProfile::DecrementRefCount. Not surprisingly IncrementRefCount is called when a profile is loaded (CUserProfile::Load) and DecrementRefCount is called when a profile is unloaded (CUserProfile::UnLoad).
This RefCount is stored in the registry under HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\Current Version\ProfileList\<User’s SID> as a REG_DWORD value with the name RefCount:
I figured that this RefCount is used to determine if open handles should be forcefully closed. This made me believe we could prevent this by writing a program that manually loads the User Profile with the LoadUserProfile function and simply never unloads it (with the UnloadUserProfile function).
The program proved I was right and all works fine now and since it might be useful for other people I decided to write this article and publish the tool. The Delphi source code is included if you are interested in it.
If you are going to use it (with or without Altiris) it’s usage is very simple, just run it under the account that you use to install. The output will look similar to this screenshot:
Download: LoadProfile.zip (1630)
If this tool or it’s source is useful please leave a comment, donations are although appreciated not required.
.NET .NET FrameWork Active Directory Altiris Apple Automation Manager Citrix Dell Delphi Excel Exchange Exchange2003 Exchange2010 Hack HP iOS Java LinkedIn Linux Lync MSI Office Office 2010 Passat Password PowerPoint PowerShell RES RNS510 SasLibEx SCOM Security Terminal Server ThinApp TSAdminEx VBS VCDS Visual Basic Visual Studio VMWare Volkswagen VW Windows PE Wordpress XenApp