[ python-Bugs-1013418 ] Win XP DEP prevents Python call to 'C' DLL
SourceForge.net
noreply at sourceforge.net
Sat Aug 21 21:08:17 CEST 2004
Bugs item #1013418, was opened at 2004-08-21 10:05
Message generated for change (Comment added) made by ajhewitt
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=105470&aid=1013418&group_id=5470
Category: Extension Modules
Group: Python 2.3
Status: Open
Resolution: None
Priority: 5
Submitted By: ajhewitt (ajhewitt)
Assigned to: Nobody/Anonymous (nobody)
Summary: Win XP DEP prevents Python call to 'C' DLL
Initial Comment:
Following Mark Hammond's description in "Python
Programming on Win32" I built his sample 'C' program,
Hello.c which is called from Hellouse.py. The environment
in which the DLL file was built is Visual Studio 2003 .NET
and Windows XP SP2. When an attempt was made to
run the example program hellouse.py, the program
aborted with a "Data buffer overflow - program is
corrupt" message from XP. I then moved the program
files to Windows 2000 (just moved the library and
python file) and the program executed correctly (as
shown in Mark's book)! I then moved the program to a
Windows XP SP1 based system and the program again
executed as expected. I then poked around on the XP
SP2 box and discovered a new "feature" called Data
Execution Prevention. You can see this feature by right
clicking on the "My Computer" icon and then clicking
on "Properties" and "Advanced". I tried adding Python
2.3 (python and pythonw) to the exceptions list but
that didn't help. I don't see any problem executing pure
Python programs on the XP SP2 system.
-Alex
----------------------------------------------------------------------
>Comment By: ajhewitt (ajhewitt)
Date: 2004-08-21 14:08
Message:
Logged In: YES
user_id=1108513
The problem will definitely need to be resolved. I did find a
workaround - disabling XP SP2's "Data Execution Prevention"
by editing the boot.ini file and changing "noexecute:XXXX"
to "execute". This will degrade XP's security but only to the
extent that it was vulnerable prior to SP2.
----------------------------------------------------------------------
Comment By: Martin v. Löwis (loewis)
Date: 2004-08-21 10:25
Message:
Logged In: YES
user_id=21627
Do you want us to resolve the problem somehow? If so, please
attach the sample code, so we can reproduce it.
----------------------------------------------------------------------
You can respond by visiting:
https://sourceforge.net/tracker/?func=detail&atid=105470&aid=1013418&group_id=5470
More information about the Python-bugs-list
mailing list