At this point the debug spam is so extensive that it triggers sysreg's infinite loop detection – and that is set to fire only after 2000 repetitions of the same message.
This means there's a significant impact on testbot runs (see
CORE-9167), so we need to fix it.
The three most common reasons for this message as listed by me on IRC:
- rpcrt4 does not specify a security descriptor when creating pipes. When running as SYSTEM, the default descriptor will allow Administrators read access, but not write, which is useless for a pipe. Windows's rpcrt4 specifies a descriptor to fix this
- dhcpcsvc creates its own pipe. Windows's version uses RPC; since ours doesn't, it needs the same fix – specify an SD when creating the pipe
- For some reason our default permission for device objects is borked. The default is full access for both SYSTEM and Administrators on Windows. Ours, again, only has read access for Administrators. In particular this means Administrators don't have access to all IoCtls on \Device\Tcp, which is causing a lot of these messages. I've not yet been able to find out where this different default permission comes from on Windows.