https://bugs.winehq.org/show_bug.cgi?id=48239
Bug ID: 48239
Summary: MTGA Launcher fails to download the game (regression)
Product: Wine
Version: 4.21
Hardware: x86
OS: Linux
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: kernel32
Assignee: wine-bugs(a)winehq.org
Reporter: sashok.olen(a)gmail.com
Distribution: ---
How to reproduce:
- create a 32-bit prefix
- download winetricks with new powershell verb
(https://github.com/Winetricks/winetricks/pull/1440)
- install these verbs into the prefix: powershell arial d3dcompiler_47
dotnet472
- set Windows version to 10
- install Magic: The Gathering Arena
- Launch MTGALauncher.exe
The launcher will try to download the game but then return "Oops! Something
went wrong while updating".
Seeing how this wasn't an issue before, I've run a bisect and found that
2c68c530afbe704698f5a38674e7c72806c7c07a (kernel32: Move file time functions to
kernelbase.) was the cause of the regression. Reverting that commit against
Wine 4.17 fixes the issue.
Should note that this doesn't happen with version set to "Windows 7".
Let me know if any logs will be needed from me with any specific debug
channels.
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=46174
Bug ID: 46174
Summary: Fix for Bug 46066 in Wine 3.20 Breaks Voice Chat
Feature in Halo Online
Product: Wine-staging
Version: 3.20
Hardware: x86
OS: Linux
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: -unknown
Assignee: wine-bugs(a)winehq.org
Reporter: rstrube(a)gmail.com
CC: leslie_alistair(a)hotmail.com, z.figura12(a)gmail.com
Distribution: ---
Created attachment 62832
--> https://bugs.winehq.org/attachment.cgi?id=62832
Output when running Halo Online and crash occurs.
After upgrading to Wine Staging 3.20 I noticed that Halo Online would hang as
soon as a I joined any multiplayer match. After some investigation, I noticed
that disabling the voice chat feature would cause the game to function
correctly.
With Wine Staging 3.19 the voice chat feature worked correctly.
I noticed in the release notes for 3.20 a stub DLL (qwave.dll) was added. This
was to fix Bug 46066. I believe this is causing the crash / hang with Halo
Online. It might also affect other games with in game voice chat
functionality.
I've attached the output from wine when running the game and when the crash
occurs.
The key line is:
wine: Call from 0x7b43e10c to unimplemented function qwave.dll.QOSCreateHandle,
aborting
Which then calls Audio Read timeouts, which cause the entire game to crash.
Thanks!
Rob
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=41212
Bug ID: 41212
Summary: Alt-Tab in full-screen on resolutions other than
native causes a crash
Product: Wine
Version: 1.9.17
Hardware: x86
OS: Linux
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: -unknown
Assignee: wine-bugs(a)winehq.org
Reporter: mackle9(a)hotmail.com
Distribution: ---
In Starcraft II, an Alt-Tab in full-screen mode on a resolution lower than
native will cause the application to crash. Apparently Warcraft is also
affected (unconfirmed).
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=41469
Bug ID: 41469
Summary: 'Ski Racing 2005 featuring Hermann Maier' crashes on
startup
Product: Wine
Version: 1.9.20
Hardware: x86-64
OS: Linux
Status: UNCONFIRMED
Severity: major
Priority: P2
Component: -unknown
Assignee: wine-bugs(a)winehq.org
Reporter: bugzilla(a)z3ntu.xyz
Distribution: ---
Created attachment 55850
--> https://bugs.winehq.org/attachment.cgi?id=55850
backtrace
The game 'Ski Racing 2005 featuring Hermann Maier' (Demo version) from an old
game DVD crashes on startup. The installation went fine. I can send you the
installer if you need it for reproducing the issue.
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
http://bugs.winehq.org/show_bug.cgi?id=33034
Bug #: 33034
Summary: DiRT 3 fails at launch
Product: Wine
Version: 1.5.24
Platform: x86
OS/Version: Linux
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: -unknown
AssignedTo: wine-bugs(a)winehq.org
ReportedBy: andrey.goosev(a)gmail.com
Classification: Unclassified
Created attachment 43663
--> http://bugs.winehq.org/attachment.cgi?id=43663
log
Tried to run with native DX, GFWL (for xlive.dll ask) and OpenAL.
--
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
Do not reply to this email, post in Bugzilla using the
above URL to reply.
------- You are receiving this mail because: -------
You are watching all bug changes.
http://bugs.winehq.org/show_bug.cgi?id=27739
Summary: NVIDIA D3D SDK 10 Sparkles Sample needs unimplemented
function d3dx10_43.dll.D3DX10CreateEffectFromFileW
Product: Wine
Version: 1.3.23
Platform: x86-64
URL: http://developer.download.nvidia.com/SDK/10/direct3d/s
amples.html#Sparkles
OS/Version: Linux
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: directx-d3dx10
AssignedTo: wine-bugs(a)winehq.org
ReportedBy: the.ideals(a)gmail.com
Sparkles.zip
MD5 Sum: 3e9185b45694d32061d4408cc55de91b
SHA1 Sum: 213b359d2cc65ce44a65d44f28b0046a6804ccfd
wine: Call from 0x7b839db2 to unimplemented function
d3dx10_43.dll.D3DX10CreateEffectFromFileW, aborting
--
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
Do not reply to this email, post in Bugzilla using the
above URL to reply.
------- You are receiving this mail because: -------
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=45120
Bug ID: 45120
Summary: Multiple applications from Google
sandbox-attacksurface-analysis-tools v1.1.x (targeting
native API) need 'ntdll.RtlXXXBoundaryDescriptor'
implementation
Product: Wine
Version: 3.7
Hardware: x86-64
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ntdll
Assignee: wine-bugs(a)winehq.org
Reporter: focht(a)gmx.net
Distribution: ---
Hello folks,
required by various .NET-based apps from
https://github.com/google/sandbox-attacksurface-analysis-tools
--- quote ---
sandbox-attacksurface-analysis-tools
(c) Google Inc. 2015, 2016, 2017, 2018
Developed by James Forshaw
This is a small suite of tools to test various properties of sandboxes on
Windows. Many of the checking
tools take a -p flag which is used to specify the PID of a sandboxed process.
The tool will impersonate
the token of that process and determine what access is allowed from that
location. Also it's recommended
to run these tools as an administrator or local system to ensure the system can
be appropriately enumerated.
CheckExeManifest: Check for specific executable manifest flags.
CheckNetworkAccess: Check access to network stack.
NewProcessFromToken: Create a new process based on existing token.
TokenView: View and manipulate various process token values.
NtApiDotNet: A basic managed library to access NT system calls and objects.
NtObjectManager: A powershell module which uses NtApiDotNet to expose the NT
object manager.
ViewSecurityDescriptor: View the security descriptor from an SDDL string or an
inherited object.
--- quote ---
It's actually a pretty neat "testsuite" for native API, Wine could benefit from
it. I've already found 20+ bugs within one hour of playing with this (missing
exports, stubs, incomplete + incorrect impl. etc.).
Will create more tickets as time/mood permits ;-)
Prerequisite:
* 32-bit WINEPREFIX
* .NET Framework 4.5 -> 'winetricks -q dotnet45'
--- snip ---
$ wine ./ObjectList.exe -r "c:\\"
...
Unhandled Exception: System.EntryPointNotFoundException: Unable to find an
entry point named 'RtlDeleteBoundaryDescriptor' in DLL 'ntdll.dll'.
at NtApiDotNet.NtRtl.RtlDeleteBoundaryDescriptor(IntPtr BoundaryDescriptor)
at NtApiDotNet.BoundaryDescriptor.Finalize()
--- snip ---
https://github.com/google/sandbox-attacksurface-analysis-tools/blob/master/…
--- snip ---
public static partial class NtRtl
{
[DllImport("ntdll.dll")]
public static extern IntPtr RtlCreateBoundaryDescriptor([In]
UnicodeString Name, BoundaryDescriptorFlags Flags);
[DllImport("ntdll.dll")]
public static extern NtStatus RtlAddSIDToBoundaryDescriptor(ref IntPtr
BoundaryDescriptor, SafeSidBufferHandle RequiredSid);
[DllImport("ntdll.dll")]
public static extern NtStatus
RtlAddIntegrityLabelToBoundaryDescriptor(ref IntPtr BoundaryDescriptor,
SafeSidBufferHandle RequiredSid);
[DllImport("ntdll.dll")]
public static extern bool RtlDeleteBoundaryDescriptor(IntPtr
BoundaryDescriptor);
}
--- snip ---
https://github.com/processhacker/processhacker/blob/master/phnt/include/ntr…
--- snip ---
#if (PHNT_VERSION >= PHNT_VISTA)
// begin_private
NTSYSAPI
PVOID
NTAPI
RtlCreateBoundaryDescriptor(
_In_ PUNICODE_STRING Name,
_In_ ULONG Flags
);
NTSYSAPI
VOID
NTAPI
RtlDeleteBoundaryDescriptor(
_In_ PVOID BoundaryDescriptor
);
NTSYSAPI
NTSTATUS
NTAPI
RtlAddSIDToBoundaryDescriptor(
_Inout_ PVOID *BoundaryDescriptor,
_In_ PSID RequiredSid
);
#if (PHNT_VERSION >= PHNT_WIN7)
// rev
NTSYSAPI
NTSTATUS
NTAPI
RtlAddIntegrityLabelToBoundaryDescriptor(
_Inout_ PVOID *BoundaryDescriptor,
_In_ PSID IntegrityLabel
);
#endif
--- snip ---
Later various components could forward to ntdll (when implemented).
--- snip ---
$ grep -Hrn BoundaryDescriptor
dlls/kernel32/kernel32.spec:144:# @ stub AddIntegrityLabelToBoundaryDescriptor
dlls/kernel32/kernel32.spec:148:# @ stub AddSIDToBoundaryDescriptor
dlls/kernel32/kernel32.spec:269:# @ stub CreateBoundaryDescriptorA
dlls/kernel32/kernel32.spec:270:# @ stub CreateBoundaryDescriptorW
dlls/kernel32/kernel32.spec:363:# @ stub DeleteBoundaryDescriptor
dlls/api-ms-win-core-namespace-l1-1-0/api-ms-win-core-namespace-l1-1-0.spec:1:@
stub AddSIDToBoundaryDescriptor
dlls/api-ms-win-core-namespace-l1-1-0/api-ms-win-core-namespace-l1-1-0.spec:3:@
stub CreateBoundaryDescriptorW
dlls/api-ms-win-core-namespace-l1-1-0/api-ms-win-core-namespace-l1-1-0.spec:5:@
stub DeleteBoundaryDescriptor
dlls/kernelbase/kernelbase.spec:26:# @ stub AddSIDToBoundaryDescriptor
dlls/kernelbase/kernelbase.spec:176:# @ stub CreateBoundaryDescriptorW
dlls/kernelbase/kernelbase.spec:250:# @ stub DeleteBoundaryDescriptor
--- snip ---
$ sha1sum Release-v1.1.14.7z
8cd7991e675a995a3d67ef0aca2a8bf0e1512f6a Release-v1.1.14.7z
$ du -sh Release-v1.1.14.7z
384K Release-v1.1.14.7z
$ wine --version
wine-3.7-50-g8dca6c35e1
Regards
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=45119
Bug ID: 45119
Summary: Multiple applications from Google
sandbox-attacksurface-analysis-tools (targeting native
API) need 'ntdll.NtGetNextProcess' implementation
Product: Wine
Version: 3.7
Hardware: x86-64
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ntdll
Assignee: wine-bugs(a)winehq.org
Reporter: focht(a)gmx.net
Distribution: ---
Hello folks,
required by various .NET-based apps from
https://github.com/google/sandbox-attacksurface-analysis-tools
--- quote ---
sandbox-attacksurface-analysis-tools
(c) Google Inc. 2015, 2016, 2017, 2018
Developed by James Forshaw
This is a small suite of tools to test various properties of sandboxes on
Windows. Many of the checking
tools take a -p flag which is used to specify the PID of a sandboxed process.
The tool will impersonate
the token of that process and determine what access is allowed from that
location. Also it's recommended
to run these tools as an administrator or local system to ensure the system can
be appropriately enumerated.
CheckExeManifest: Check for specific executable manifest flags.
CheckNetworkAccess: Check access to network stack.
NewProcessFromToken: Create a new process based on existing token.
TokenView: View and manipulate various process token values.
NtApiDotNet: A basic managed library to access NT system calls and objects.
NtObjectManager: A powershell module which uses NtApiDotNet to expose the NT
object manager.
ViewSecurityDescriptor: View the security descriptor from an SDDL string or an
inherited object.
--- quote ---
It's actually a pretty neat "testsuite" for native API, Wine could benefit from
it. I've already found 20+ bugs within one hour of playing with this (missing
exports, stubs, incomplete + incorrect impl. etc.).
Will create more tickets as time/mood permits ;-)
Prerequisite:
* 32-bit WINEPREFIX
* .NET Framework 4.5 -> 'winetricks -q dotnet45'
--- snip ---
$ wine ./TokenViewer.exe
...
Unhandled Exception: System.EntryPointNotFoundException: Unable to find an
entry point named 'NtGetNextProcess' in DLL 'ntdll.dll'.
at NtApiDotNet.NtSystemCalls.NtGetNextProcess(SafeKernelObjectHandle
ProcessHandle, ProcessAccessRights DesiredAccess, AttributeFlags
HandleAttributes, Int32 Flags, SafeKernelObjectHandle& NewProcessHandle)
at NtApiDotNet.NtProcess.GetFirstProcess(ProcessAccessRights desired_access)
at NtApiDotNet.NtProcess.GetProcesses(ProcessAccessRights desired_access,
Boolean from_system_info)
at TokenViewer.MainForm.RefreshProcessList(String filter, Boolean
hideUnrestricted)
at TokenViewer.MainForm..ctor()
at TokenViewer.Program.Main(String[] args)
--- snip ---
https://github.com/mirror/processhacker/blob/master/2.x/trunk/phlib/include…
--- snip ---
#if !(PHNT_VERSION >= PHNT_WS03)
typedef NTSTATUS (NTAPI *_NtGetNextProcess)(
_In_ HANDLE ProcessHandle,
_In_ ACCESS_MASK DesiredAccess,
_In_ ULONG HandleAttributes,
_In_ ULONG Flags,
_Out_ PHANDLE NewProcessHandle
);
...
--- snip ---
$ sha1sum Release-v1.1.14.7z
8cd7991e675a995a3d67ef0aca2a8bf0e1512f6a Release-v1.1.14.7z
$ du -sh Release-v1.1.14.7z
384K Release-v1.1.14.7z
$ wine --version
wine-3.7-50-g8dca6c35e1
Regards
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.