https://git.reactos.org/?p=reactos.git;a=commitdiff;h=a804ba3200190c1405d4a…
commit a804ba3200190c1405d4af93ef53d9623797ddbb
Author: George Bișoc <george.bisoc(a)reactos.org>
AuthorDate: Mon Mar 6 20:03:44 2023 +0100
Commit: George Bișoc <george.bisoc(a)reactos.org>
CommitDate: Mon Mar 6 20:03:44 2023 +0100
[NTOS:SE] Print debug output only if NDEBUG is not defined
This mutes a lot of debug spam that fills up the debugger when an access
check fails because a requestor doesn't have enough privileges to access
an object.
---
ntoskrnl/se/debug.c | 12 ++++++++++++
1 file changed, 12 insertions(+)
diff --git a/ntoskrnl/se/debug.c b/ntoskrnl/se/debug.c
index da5e35a160e..f21d5400938 100644
--- a/ntoskrnl/se/debug.c
+++ b/ntoskrnl/se/debug.c
@@ -13,6 +13,7 @@
/* PRIVATE FUNCTIONS **********************************************************/
+#ifndef NDEBUG
/**
* @brief
* Converts an Access Control Entry (ACE) type to a string.
@@ -204,6 +205,7 @@ SepDumpSidsOfToken(
RtlFreeUnicodeString(&SidString);
}
}
+#endif
/* PUBLIC FUNCTIONS ***********************************************************/
@@ -215,9 +217,11 @@ VOID
SepDumpSdDebugInfo(
_In_opt_ PISECURITY_DESCRIPTOR SecurityDescriptor)
{
+#ifndef NDEBUG
UNICODE_STRING SidString;
PSID OwnerSid, GroupSid;
PACL Dacl, Sacl;
+#endif
/* Don't dump anything if no SD was provided */
if (!SecurityDescriptor)
@@ -225,6 +229,7 @@ SepDumpSdDebugInfo(
return;
}
+#ifndef NDEBUG
/* Cache the necessary security buffers to dump info from */
OwnerSid = SepGetOwnerFromDescriptor(SecurityDescriptor);
GroupSid = SepGetGroupFromDescriptor(SecurityDescriptor);
@@ -264,6 +269,7 @@ SepDumpSdDebugInfo(
{
SepDumpAclInfo(Dacl, FALSE);
}
+#endif
}
/**
@@ -274,7 +280,9 @@ VOID
SepDumpTokenDebugInfo(
_In_opt_ PTOKEN Token)
{
+#ifndef NDEBUG
UNICODE_STRING SidString;
+#endif
/* Don't dump anything if no token was provided */
if (!Token)
@@ -282,6 +290,7 @@ SepDumpTokenDebugInfo(
return;
}
+#ifndef NDEBUG
/* Dump relevant token info */
DbgPrint("================== ACCESS TOKEN DUMP INFO
==================\n");
DbgPrint("Token -> 0x%p\n", Token);
@@ -305,6 +314,7 @@ SepDumpTokenDebugInfo(
DbgPrint("Token restricted SIDs:\n");
SepDumpSidsOfToken(Token->RestrictedSids, Token->RestrictedSidCount);
}
+#endif
}
/**
@@ -321,10 +331,12 @@ SepDumpAccessRightsStats(
return;
}
+#ifndef NDEBUG
DbgPrint("================== ACCESS CHECK RIGHTS STATISTICS
==================\n");
DbgPrint("Remaining access rights -> 0x%08lx\n",
AccessRights->RemainingAccessRights);
DbgPrint("Granted access rights -> 0x%08lx\n",
AccessRights->GrantedAccessRights);
DbgPrint("Denied access rights -> 0x%08lx\n",
AccessRights->DeniedAccessRights);
+#endif
}
/* EOF */