http://bugs.winehq.org/show_bug.cgi?id=27739
Summary: NVIDIA D3D SDK 10 Sparkles Sample needs unimplemented
function d3dx10_43.dll.D3DX10CreateEffectFromFileW
Product: Wine
Version: 1.3.23
Platform: x86-64
URL: http://developer.download.nvidia.com/SDK/10/direct3d/s
amples.html#Sparkles
OS/Version: Linux
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: directx-d3dx10
AssignedTo: wine-bugs(a)winehq.org
ReportedBy: the.ideals(a)gmail.com
Sparkles.zip
MD5 Sum: 3e9185b45694d32061d4408cc55de91b
SHA1 Sum: 213b359d2cc65ce44a65d44f28b0046a6804ccfd
wine: Call from 0x7b839db2 to unimplemented function
d3dx10_43.dll.D3DX10CreateEffectFromFileW, aborting
--
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
Do not reply to this email, post in Bugzilla using the
above URL to reply.
------- You are receiving this mail because: -------
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=45120
Bug ID: 45120
Summary: Multiple applications from Google
sandbox-attacksurface-analysis-tools v1.1.x (targeting
native API) need 'ntdll.RtlXXXBoundaryDescriptor'
implementation
Product: Wine
Version: 3.7
Hardware: x86-64
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ntdll
Assignee: wine-bugs(a)winehq.org
Reporter: focht(a)gmx.net
Distribution: ---
Hello folks,
required by various .NET-based apps from
https://github.com/google/sandbox-attacksurface-analysis-tools
--- quote ---
sandbox-attacksurface-analysis-tools
(c) Google Inc. 2015, 2016, 2017, 2018
Developed by James Forshaw
This is a small suite of tools to test various properties of sandboxes on
Windows. Many of the checking
tools take a -p flag which is used to specify the PID of a sandboxed process.
The tool will impersonate
the token of that process and determine what access is allowed from that
location. Also it's recommended
to run these tools as an administrator or local system to ensure the system can
be appropriately enumerated.
CheckExeManifest: Check for specific executable manifest flags.
CheckNetworkAccess: Check access to network stack.
NewProcessFromToken: Create a new process based on existing token.
TokenView: View and manipulate various process token values.
NtApiDotNet: A basic managed library to access NT system calls and objects.
NtObjectManager: A powershell module which uses NtApiDotNet to expose the NT
object manager.
ViewSecurityDescriptor: View the security descriptor from an SDDL string or an
inherited object.
--- quote ---
It's actually a pretty neat "testsuite" for native API, Wine could benefit from
it. I've already found 20+ bugs within one hour of playing with this (missing
exports, stubs, incomplete + incorrect impl. etc.).
Will create more tickets as time/mood permits ;-)
Prerequisite:
* 32-bit WINEPREFIX
* .NET Framework 4.5 -> 'winetricks -q dotnet45'
--- snip ---
$ wine ./ObjectList.exe -r "c:\\"
...
Unhandled Exception: System.EntryPointNotFoundException: Unable to find an
entry point named 'RtlDeleteBoundaryDescriptor' in DLL 'ntdll.dll'.
at NtApiDotNet.NtRtl.RtlDeleteBoundaryDescriptor(IntPtr BoundaryDescriptor)
at NtApiDotNet.BoundaryDescriptor.Finalize()
--- snip ---
https://github.com/google/sandbox-attacksurface-analysis-tools/blob/master/…
--- snip ---
public static partial class NtRtl
{
[DllImport("ntdll.dll")]
public static extern IntPtr RtlCreateBoundaryDescriptor([In]
UnicodeString Name, BoundaryDescriptorFlags Flags);
[DllImport("ntdll.dll")]
public static extern NtStatus RtlAddSIDToBoundaryDescriptor(ref IntPtr
BoundaryDescriptor, SafeSidBufferHandle RequiredSid);
[DllImport("ntdll.dll")]
public static extern NtStatus
RtlAddIntegrityLabelToBoundaryDescriptor(ref IntPtr BoundaryDescriptor,
SafeSidBufferHandle RequiredSid);
[DllImport("ntdll.dll")]
public static extern bool RtlDeleteBoundaryDescriptor(IntPtr
BoundaryDescriptor);
}
--- snip ---
https://github.com/processhacker/processhacker/blob/master/phnt/include/ntr…
--- snip ---
#if (PHNT_VERSION >= PHNT_VISTA)
// begin_private
NTSYSAPI
PVOID
NTAPI
RtlCreateBoundaryDescriptor(
_In_ PUNICODE_STRING Name,
_In_ ULONG Flags
);
NTSYSAPI
VOID
NTAPI
RtlDeleteBoundaryDescriptor(
_In_ PVOID BoundaryDescriptor
);
NTSYSAPI
NTSTATUS
NTAPI
RtlAddSIDToBoundaryDescriptor(
_Inout_ PVOID *BoundaryDescriptor,
_In_ PSID RequiredSid
);
#if (PHNT_VERSION >= PHNT_WIN7)
// rev
NTSYSAPI
NTSTATUS
NTAPI
RtlAddIntegrityLabelToBoundaryDescriptor(
_Inout_ PVOID *BoundaryDescriptor,
_In_ PSID IntegrityLabel
);
#endif
--- snip ---
Later various components could forward to ntdll (when implemented).
--- snip ---
$ grep -Hrn BoundaryDescriptor
dlls/kernel32/kernel32.spec:144:# @ stub AddIntegrityLabelToBoundaryDescriptor
dlls/kernel32/kernel32.spec:148:# @ stub AddSIDToBoundaryDescriptor
dlls/kernel32/kernel32.spec:269:# @ stub CreateBoundaryDescriptorA
dlls/kernel32/kernel32.spec:270:# @ stub CreateBoundaryDescriptorW
dlls/kernel32/kernel32.spec:363:# @ stub DeleteBoundaryDescriptor
dlls/api-ms-win-core-namespace-l1-1-0/api-ms-win-core-namespace-l1-1-0.spec:1:@
stub AddSIDToBoundaryDescriptor
dlls/api-ms-win-core-namespace-l1-1-0/api-ms-win-core-namespace-l1-1-0.spec:3:@
stub CreateBoundaryDescriptorW
dlls/api-ms-win-core-namespace-l1-1-0/api-ms-win-core-namespace-l1-1-0.spec:5:@
stub DeleteBoundaryDescriptor
dlls/kernelbase/kernelbase.spec:26:# @ stub AddSIDToBoundaryDescriptor
dlls/kernelbase/kernelbase.spec:176:# @ stub CreateBoundaryDescriptorW
dlls/kernelbase/kernelbase.spec:250:# @ stub DeleteBoundaryDescriptor
--- snip ---
$ sha1sum Release-v1.1.14.7z
8cd7991e675a995a3d67ef0aca2a8bf0e1512f6a Release-v1.1.14.7z
$ du -sh Release-v1.1.14.7z
384K Release-v1.1.14.7z
$ wine --version
wine-3.7-50-g8dca6c35e1
Regards
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=45119
Bug ID: 45119
Summary: Multiple applications from Google
sandbox-attacksurface-analysis-tools (targeting native
API) need 'ntdll.NtGetNextProcess' implementation
Product: Wine
Version: 3.7
Hardware: x86-64
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ntdll
Assignee: wine-bugs(a)winehq.org
Reporter: focht(a)gmx.net
Distribution: ---
Hello folks,
required by various .NET-based apps from
https://github.com/google/sandbox-attacksurface-analysis-tools
--- quote ---
sandbox-attacksurface-analysis-tools
(c) Google Inc. 2015, 2016, 2017, 2018
Developed by James Forshaw
This is a small suite of tools to test various properties of sandboxes on
Windows. Many of the checking
tools take a -p flag which is used to specify the PID of a sandboxed process.
The tool will impersonate
the token of that process and determine what access is allowed from that
location. Also it's recommended
to run these tools as an administrator or local system to ensure the system can
be appropriately enumerated.
CheckExeManifest: Check for specific executable manifest flags.
CheckNetworkAccess: Check access to network stack.
NewProcessFromToken: Create a new process based on existing token.
TokenView: View and manipulate various process token values.
NtApiDotNet: A basic managed library to access NT system calls and objects.
NtObjectManager: A powershell module which uses NtApiDotNet to expose the NT
object manager.
ViewSecurityDescriptor: View the security descriptor from an SDDL string or an
inherited object.
--- quote ---
It's actually a pretty neat "testsuite" for native API, Wine could benefit from
it. I've already found 20+ bugs within one hour of playing with this (missing
exports, stubs, incomplete + incorrect impl. etc.).
Will create more tickets as time/mood permits ;-)
Prerequisite:
* 32-bit WINEPREFIX
* .NET Framework 4.5 -> 'winetricks -q dotnet45'
--- snip ---
$ wine ./TokenViewer.exe
...
Unhandled Exception: System.EntryPointNotFoundException: Unable to find an
entry point named 'NtGetNextProcess' in DLL 'ntdll.dll'.
at NtApiDotNet.NtSystemCalls.NtGetNextProcess(SafeKernelObjectHandle
ProcessHandle, ProcessAccessRights DesiredAccess, AttributeFlags
HandleAttributes, Int32 Flags, SafeKernelObjectHandle& NewProcessHandle)
at NtApiDotNet.NtProcess.GetFirstProcess(ProcessAccessRights desired_access)
at NtApiDotNet.NtProcess.GetProcesses(ProcessAccessRights desired_access,
Boolean from_system_info)
at TokenViewer.MainForm.RefreshProcessList(String filter, Boolean
hideUnrestricted)
at TokenViewer.MainForm..ctor()
at TokenViewer.Program.Main(String[] args)
--- snip ---
https://github.com/mirror/processhacker/blob/master/2.x/trunk/phlib/include…
--- snip ---
#if !(PHNT_VERSION >= PHNT_WS03)
typedef NTSTATUS (NTAPI *_NtGetNextProcess)(
_In_ HANDLE ProcessHandle,
_In_ ACCESS_MASK DesiredAccess,
_In_ ULONG HandleAttributes,
_In_ ULONG Flags,
_Out_ PHANDLE NewProcessHandle
);
...
--- snip ---
$ sha1sum Release-v1.1.14.7z
8cd7991e675a995a3d67ef0aca2a8bf0e1512f6a Release-v1.1.14.7z
$ du -sh Release-v1.1.14.7z
384K Release-v1.1.14.7z
$ wine --version
wine-3.7-50-g8dca6c35e1
Regards
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
http://bugs.winehq.org/show_bug.cgi?id=11970
Summary: graphic bug with 0.9.57 in serius sam - the second
encounter
Product: Wine
Version: 0.9.57.
Platform: Other
OS/Version: other
Status: UNCONFIRMED
Severity: enhancement
Priority: P2
Component: -unknown
AssignedTo: wine-bugs(a)winehq.org
ReportedBy: jb.faq(a)gmx.de
Created an attachment (id=11299)
--> (http://bugs.winehq.org/attachment.cgi?id=11299)
graphic bug: a look throug hills
Hi,
with the new version 0.9.57 of wine the graphic rendering in Serious Sam - The
Second encounter breaks. You can look through hills, walls or the earth. I'll
upload a screeshot in some few minutes, because it describe the error in the
best way.
Greetings
Jan
--
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
Do not reply to this email, post in Bugzilla using the
above URL to reply.
------- You are receiving this mail because: -------
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=42904
Bug ID: 42904
Summary: Wine Internet Explorer - Ctrl+A does not work in the
address bar
Product: Wine
Version: 2.6
Hardware: x86-64
OS: Linux
Status: UNCONFIRMED
Severity: enhancement
Priority: P2
Component: ieframe
Assignee: wine-bugs(a)winehq.org
Reporter: arnfranke(a)yahoo.com
Distribution: ---
Steps to reproduce:
1. Open C:\Program Files\Internet Explorer\iexplore.exe or C:\Program Files
(x86)\Internet Explorer\iexplore.exe with Wine.
2. Click on the address bar
3. Press Ctrl+A
Expected behavior: All text in the address bar would be selected.
Observed behavior: Nothing happens.
Work-around: Select the text manually with the mouse.
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
http://bugs.winehq.org/show_bug.cgi?id=24641
Summary: ProPresenter 4.0.0.1 for Windows doesn't startup -
continued
Product: Wine
Version: 1.3.4
Platform: x86-64
OS/Version: Linux
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: -unknown
AssignedTo: wine-bugs(a)winehq.org
ReportedBy: puk007(a)gmail.com
Created an attachment (id=31144)
--> (http://bugs.winehq.org/attachment.cgi?id=31144)
console-20101005.txt
it all began with Bug 24627: http://bugs.winehq.org/show_bug.cgi?id=24627
when trying to run ProPresenter 4.0.0.1, it crashes on startup.
steps to reproduce:
- clean wine compiled from sources of 20100404 (with patch from bug 24627, so
that I could continue installation:
http://bugs.winehq.org/attachment.cgi?id=31130)
- install using winetricks:
winetricks winxp dotnet30
- download ProPresenter & install it from:
http://www.renewedvision.com/downloads/pc/ProPresenter_Windows_4.0.0.1.zip
when trying to run from console, it crashes (want's to send notification to M$)
see attached console output in file console-20101005.txt
--
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
Do not reply to this email, post in Bugzilla using the
above URL to reply.
------- You are receiving this mail because: -------
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=37620
Bug ID: 37620
Summary: MySims: Unable to pick up building blocks
Product: Wine
Version: 1.7.31
Hardware: x86
OS: Linux
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: -unknown
Assignee: wine-bugs(a)winehq.org
Reporter: daniel.attard120201(a)icloud.com
Distribution: ---
Created attachment 50068
--> https://bugs.winehq.org/attachment.cgi?id=50068
MySims Wine log
MySims is fully working but when you are going to pick up a block to build your
first house, the blocks/items can't be picked up. The cursor just ignores them.
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.