Uploaded image for project: 'Core ReactOS'
  1. Core ReactOS
  2. CORE-9172

Major debug log spam with "HACK: RemainingAccess = XXXXXXXX DesiredAccess = XXXXXXXX" messages

    XMLWordPrintable

    Details

    • Type: Bug
    • Status: Resolved
    • Priority: Major
    • Resolution: Fixed
    • Fix Version/s: 0.4.0
    • Component/s: NTCore, Services, Wine
    • Labels:
      None

      Description

      At this point the debug spam is so extensive that it triggers sysreg's infinite loop detection – and that is set to fire only after 2000 repetitions of the same message.
      This means there's a significant impact on testbot runs (see CORE-9167), so we need to fix it.

      The three most common reasons for this message as listed by me on IRC:

      • rpcrt4 does not specify a security descriptor when creating pipes. When running as SYSTEM, the default descriptor will allow Administrators read access, but not write, which is useless for a pipe. Windows's rpcrt4 specifies a descriptor to fix this
      • dhcpcsvc creates its own pipe. Windows's version uses RPC; since ours doesn't, it needs the same fix – specify an SD when creating the pipe
      • For some reason our default permission for device objects is borked. The default is full access for both SYSTEM and Administrators on Windows. Ours, again, only has read access for Administrators. In particular this means Administrators don't have access to all IoCtls on \Device\Tcp, which is causing a lot of these messages. I've not yet been able to find out where this different default permission comes from on Windows.

        Attachments

          Issue Links

            Activity

              People

              • Assignee:
                bug zilla Bug Zilla
                Reporter:
                ThFabba ThFabba
              • Votes:
                1 Vote for this issue
                Watchers:
                1 Start watching this issue

                Dates

                • Created:
                  Updated:
                  Resolved: