Well, I am now not getting the svchost application errors, BUT automatic
updates, or even manual Windows/Microsoft Updates, is causing near 100% CPU
utilization for, well... on my own laptop (1200MHz Pentium M), which has
yet to have had this updates problem thus far, got hit this month (April
2007). The rogue svchost.exe process used 14 minutes of CPU time just to
show me what updates I had ready to install. Of course, during that time,
basically Windows was useless, clicking any application would take anywhere
from 20 seconds to a couple minutes to launch, so I just had to sit it down
and walk away from throw it against the wall. I'm actually even surprised
it eventually did figure itself out, I'd have never guessed it would have
taken 14 minutes for something that normally should only take about 1
minute, at most 2 minutes.
Yes, yes, I've done all the re-registering wua*.dll files, deleting the
%windir%\system32\catroot2 folder, re-installing Windows Installer 3.1 to
let catroot2 re-create itself, and whatnot, and my laptop has the KB927891
MSI.DLL hotfix and I ** STILL ** got hit again by this Microsoft updating
nightmare on a computer that had never had this happen before now, even
though it has been a known issue for going on a year across the large
number of computers I support.
Obviously, this is a problem Microsoft has lost control of and they don't
know what the root cause is. Sure, the application crashing appears to have
been fixed with the January MSI.DLL hotfix, but not the underlying cause
for the 100% CPU utilization and abnormally long updates processing
problem. :(
[Go to Microsoft Update > Click on Change Settings in left pane > Scroll to
bottom of page > To Stop Using Microsoft Update > Disable Microsoft Update
software and let me use Windows Update only (check).]
Try deleting the contents of this folder (or the folder itself) & reboot:
C:\WINDOWS\SoftwareDistribution\DataStore
If no joy, try deleting the contents of this folder (or the folder itself) &
reboot:
C:\WINDOWS\SoftwareDistribution
--
~Robear Dyer (PA Bear)
MS MVP-Windows (IE, OE, Security, Shell/User)
AumHa VSOP & Admin; DTS-L.org
To mitigate the size/integrity issue of the contents of
SoftwareDistribution it is suggested that this folder by excluded from
scans by the installed AV. As of today, there is no known malware that
has used it as an attack vector.
MowGreen [MVP 2003-2007]
===============
*-343-* FDNY
Never Forgotten
===============
K
--
====================================
TaurArian [MS-MVP] 2005-2007 - Australia
====================================
How to make a good post: http://www.dts-l.org/goodpost.htm
Backup and data recovery: http://www.acronis.com.sg/
Enhancing file system performance: http://www.diskeeper.com/defrag.asp
"TaurArian" <Taur...@discussions.microsoft.com> wrote in message
news:C8C2375A-9D82-4C9C...@microsoft.com...
MG
In any case, like I said, I just let the MU scan run at ~100% CPU and had
to walk away. I came back and it had eventually figured out what I needed
to download and install, but the CPU time the process ate up was 14
minutes. Did you wait that long, before giving up?
Using Web-based Newsreaders
http://support.microsoft.com/default.aspx?pr=newswhelp&style=toc#usenewsweb
Using NNTP Newsreaders
http://support.microsoft.com/default.aspx?pr=newswhelp&style=toc#usenewsnntp
You are posting about an issue that has already had a temporary fix
posted for it. Twice in this thread; numerous times in this newsgroup.
MowGreen [MVP 2003-2007]
===============
*-343-* FDNY
Never Forgotten
===============
Miha
MowGreen [MVP] wrote:
> Do any of you see the other posts in this thread ? The answer is right
> in front of you, yet you keep missing it.
> To see the other posts please read this:
>
> Using Web-based Newsreaders
> http://support.microsoft.com/default.aspx?pr=newswhelp&style=toc#usenewsweb
>
> Using NNTP Newsreaders
> http://support.microsoft.com/default.aspx?pr=newswhelp&style=toc#usenewsnntp
>
> You are posting about an issue that has already had a temporary fix
> posted for it. Twice in this thread; numerous times in this newsgroup.
>
"MowGreen [MVP]" <mowg...@nowandzen.com> wrote in
news:#9Anr7if...@TK2MSFTNGP05.phx.gbl:
> Do any of you see the other posts in this thread ? The answer is right
> in front of you, yet you keep missing it.
> To see the other posts please read this:
>
>
I was able to reproduce it on a freshly imaged laptop, and it would
happen after every reboot when Auto Updates were set to any of the
options except for disabled.
I was also able to replicate doing manual updates via "microsoft
updates" where the issue was with "microsoft updates" not with
"windows updates" ....further checking, WUAUCLT.exe and WUAENG.DLL are
the same versions(5.8.0.2469) regardless if you choose the option in
IE to user "WIndows Updates" or "Microsoft Update" so the engine or
database it uses it defective. Where using "MS Updates" would cause
it to scan for about 20minutes to 1hour, where as "Windows Updates"
would take 1minute.
So to get users up again, we've disabled Automatic Updates via GPO to
our 3000 machines...even though it's happening to our laptop
population, at least the users are productive again. I'm hoping to
find an easy way to move the laptops to a seperate OU with Updates
disabled and the rest to enabled as the Desktops seem to be
unaffected.
I sent an email to our MS TAM and he hasn't responded yet..
Hoping to upgrade our SMS server to latest ITMU v3 and test with that
instead of WSUS. This will upgrade WUACLT.exe to version
5.8.0.2694 ...maybe this will help?
Yes, eagerly looking for a fix
How knowledgable about doing things are you? Do you know how to
start and stop services? How to run a .cmd file? If not, you'll need
access to someone who does to avoid problems. The following assumes you're
on Windows XP but will probably work OK for Win2k as well. If you're
confident about what you're doing, then try the
following first - only if it doesn't work, then there's another level of
stuff that can be done following:
1. Stop and Disable Automatic Updates, Background Intelligent Transfer
Service and the Cryptographic Service.
2. Rename the folder %SystemRoot%\SoftwareDistribution to
%SystemRoot%\OldSoftwareDistribution
3. Open Notepad and create a file containing the following:
REGSVR32 WUAPI.DLL
REGSVR32 WUAUENG.DLL
REGSVR32 WUAUENG1.DLL
REGSVR32 ATL.DLL
REGSVR32 WUCLTUI.DLL
REGSVR32 WUPS.DLL
REGSVR32 WUPS2.DLL
REGSVR32 WUWEB.DLL
Save this file as 'Wudll.cmd' (without the quotes) to any convenient
location then exit Notepad and double click on the file you just saved. You
should get a 'Sucess' mesage for each of the .dll's listed above.
4. Now Re-enable to Automatic status and then Start each of the services
you stopped before - Automatic Updates, Background Intelligent Transfer
Service and the Cryptographic Service.
5. Now Reboot. Now Reboot Again. (Yes, twice.)
See if that solves it - give it a couple of days. If so, then you can
delete 'OldSoftwareDistribution'. I would request that you post back with
your results. _Only if the problem does re-occur_, then do the following
_exactly_:
1. Go to http://wiki.djlizard.net/Dial-a-fix and download Dial-a-fix
v0.60.0.24 (2006-10-27)
2. Unzip it to a new folder at root with any name, e.g.
c:\Dial-a-fix-v0.60.0.24
3. Double click on Dial-a-fix.exe in that folder.
4. Click on the following:
Options/tooltips (just to get an idea of what it does in each section.
:) )
Both boxes under Prep
The 'all' (top) box for Sections 2, 3 and 4 (which will automatically
be set when you check 3)
In Section 5, 'Programming cores/runtimes' and
'Explorer/IE/OE/shell/WMP' only.
Click 'Go' . (Some of the re-registrations may take what seems like a
long time for some .dll's - Don't be impatient.)
5. Reboot (if Dial-a-fix doesn't do it automatically at the end). Now
Reboot Again. (Yes, twice.)
See if that does the trick, and, again please post back with your
experience.
MS is well aware of the problem and has provided privately two different
responses:
"I regret to say that I was told that this known issue requires too much
change to be implemented in a hotfix. A change will instead be implemented
in the next Automatic Updates client, which we are planning to release in Q2
this year."
"According to the feedback from Product Development team, this fix will be
published as a security update on the Windows Update site and the relevant
KB article will also be released by us. Therefore, we just need to keep the
system on the network up to date. In addition, the Product Development team
also indicates that the WSUS 3.0 client may contain this patch if this fix
can released timely. At that moment, we can also attempt to upgrade to the
WSUS client 3.0 to test the issue."
--
Regards, Jim Byrd,
My Blog, Defending Your Machine,
http://defendingyourmachine2.blogspot.com/
In news:1177019899.3...@y80g2000hsf.googlegroups.com,
alle...@gmail.com <alle...@gmail.com> typed:
1. Go to http://wiki.djlizard.net/Dial-a-fix ; and download Dial-a-fix
v0.60.0.24 (2006-10-27)
From the website :
Dial-a-fix
From TechWiki
Jump to: navigation, search
There is currently no text in this page, you can search for this page title
in other pages or edit this page.
--
Regards, Jim Byrd,
My Blog, Defending Your Machine,
http://defendingyourmachine2.blogspot.com/
In news:EA2D90CC-3306-4A22...@microsoft.com,
M.J. <M...@discussions.microsoft.com> typed:
responses concerning a fix:
"I regret to say that I was told that this known issue requires too much
change to be implemented in a hotfix. A change will instead be implemented
in the next Automatic Updates client, which we are planning to release in Q2
this year."
"According to the feedback from Product Development team, this fix will be
published as a security update on the Windows Update site and the relevant
KB article will also be released by us. Therefore, we just need to keep the
system on the network up to date. In addition, the Product Development team
also indicates that the WSUS 3.0 client may contain this patch if this fix
can released timely. At that moment, we can also attempt to upgrade to the
WSUS client 3.0 to test the issue."
--
Regards, Jim Byrd,
My Blog, Defending Your Machine,
http://defendingyourmachine2.blogspot.com/
In news:B932148A-5F20-4CC2...@microsoft.com,
Kelly <Ke...@discussions.microsoft.com> typed:
Questions has to be raised about the quality of Microsoft's team working
on this - they suck as much as their programs suck cpu. This dog pile
certainly doesn't belong on any machine.
Or could this be part of a strategy to force users to upgrade to Vista?
I'll search around on the newsgroup some more as I've basically turned
off AutoUpdates via GPO so users can work and I can research while
also working on other things.
Allen
On Apr 20, 12:15 am, "Jim Byrd" <jrb...@spamless.roadrunner.com>
wrote:
> 1. Go tohttp://wiki.djlizard.net/Dial-a-fix and download Dial-a-fix
> allenm...@gmail.com <allenm...@gmail.com> typed:
The newly released 'standalone' version of Windows Update Agent 3.0, v.
7.0.6000.374, for 32 bit machines is available here:
http://download.windowsupdate.com/v7/windowsupdate/redist/standalone/WindowsUpdateAgent30-x86.exe
You will also need to install or re-install KB927891, here:
http://support.microsoft.com/?kbid=927891 for a complete fix.
For those using Windows Server - Courtesy of Bobby Harter, Program Manager,
WSUS, Microsoft, WSUS 3.0 was released on April 30th and is avaialble now on
the Microsoft Download Center. Full information, documentation, samples and
links to the bits can be found here: http://www.microsoft.com/wsus. WSUS
3.0 RC will be supported until May 31st 2007 - WSUS 3.0 supports upgrade of
WSUS 2.0 SP1 and WSUS 3.0 RC.
The MS WSUS team believes that this solves all three 'svchost' problems that
folks have been experiencing. See here:
http://blogs.technet.com/wsus/archive/2007/04/28/update-on.aspx
--
Regards, Jim Byrd,
My Blog, Defending Your Machine,
http://defendingyourmachine2.blogspot.com/
In news:1178138700....@l77g2000hsb.googlegroups.com,
alle...@gmail.com <alle...@gmail.com> typed:
For the Hotfix: can that be applied to machines not affected? We
aren't sure who's really affected as our user base is 3,000, and I'd
like to push the hotfix via SMS to XP machines to make things
simpler.
Any harm in doing that?
thanks
Allen
Yes.
> Any harm in doing that?
No.
Bye,
Freudi
--
Regards, Jim Byrd,
My Blog, Defending Your Machine,
http://defendingyourmachine2.blogspot.com/
In news:1178218454.3...@p77g2000hsh.googlegroups.com,
alle...@gmail.com <alle...@gmail.com> typed: