Author: fireball Date: Tue Oct 23 23:19:06 2007 New Revision: 29834
URL: http://svn.reactos.org/svn/reactos?rev=29834&view=rev Log: - Revert 29702 (IopParseDeviceHack is still required in 1st stage, and the Real Bug is at some other place, so no need in masking it away by doing calls which avoid buggy operation).
Modified: trunk/reactos/ntoskrnl/fstub/disksup.c trunk/reactos/ntoskrnl/io/iomgr/file.c
Modified: trunk/reactos/ntoskrnl/fstub/disksup.c URL: http://svn.reactos.org/svn/reactos/trunk/reactos/ntoskrnl/fstub/disksup.c?re... ============================================================================== --- trunk/reactos/ntoskrnl/fstub/disksup.c (original) +++ trunk/reactos/ntoskrnl/fstub/disksup.c Tue Oct 23 23:19:06 2007 @@ -481,7 +481,7 @@ NULL);
Status = ZwOpenFile(&FileHandle, - FILE_READ_ATTRIBUTES | SYNCHRONIZE, + FILE_READ_DATA | SYNCHRONIZE, &ObjectAttributes, &StatusBlock, FILE_SHARE_READ,
Modified: trunk/reactos/ntoskrnl/io/iomgr/file.c URL: http://svn.reactos.org/svn/reactos/trunk/reactos/ntoskrnl/io/iomgr/file.c?re... ============================================================================== --- trunk/reactos/ntoskrnl/io/iomgr/file.c (original) +++ trunk/reactos/ntoskrnl/io/iomgr/file.c Tue Oct 23 23:19:06 2007 @@ -404,9 +404,6 @@
/* FIXME: Small hack still exists, have to check why... * This is triggered multiple times by usetup and then once per boot. - * TMN: NOTE: It might have been fixed now, by changing the requested - * openmode in xHalIoAssignDriveLetters from FILE_READ_DATA to - * FILE_READ_ATTRIBUTES. If verified, this hack should be removed. */ if (!(DirectOpen) && !(RemainingName->Length) &&