https://bugs.winehq.org/show_bug.cgi?id=45132
Bug ID: 45132
Summary: CommonObjects tool (.NET app) from Google
sandbox-attacksurface-analysis-tools v1.1.x needs
'ntdll.NtQuerySystemInformation' to support
'SystemExtendedHandleInformation'
Product: Wine
Version: 3.7
Hardware: x86-64
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ntdll
Assignee: wine-bugs(a)winehq.org
Reporter: focht(a)gmx.net
Distribution: ---
Hello folks,
needed by 'CommonObjects' .NET-based app from
https://github.com/google/sandbox-attacksurface-analysis-tools
--- quote ---
sandbox-attacksurface-analysis-tools
(c) Google Inc. 2015, 2016, 2017, 2018
Developed by James Forshaw
This is a small suite of tools to test various properties of sandboxes on
Windows. Many of the checking
tools take a -p flag which is used to specify the PID of a sandboxed process.
The tool will impersonate
the token of that process and determine what access is allowed from that
location. Also it's recommended
to run these tools as an administrator or local system to ensure the system can
be appropriately enumerated.
CheckExeManifest: Check for specific executable manifest flags.
CheckNetworkAccess: Check access to network stack.
NewProcessFromToken: Create a new process based on existing token.
TokenView: View and manipulate various process token values.
NtApiDotNet: A basic managed library to access NT system calls and objects.
NtObjectManager: A powershell module which uses NtApiDotNet to expose the NT
object manager.
ViewSecurityDescriptor: View the security descriptor from an SDDL string or an
inherited object.
--- quote ---
It's actually a pretty neat "testsuite" for native API, Wine could benefit from
it.
Prerequisite:
* 32-bit WINEPREFIX
* .NET Framework 4.5 -> 'winetricks -q dotnet45'
NOTE: needs at least two running processes (Windows pids -> command line)
--- snip ---
Wine-dbg>info process
pid threads executable (all id:s are in hex)
00000033 1 'notepad.exe'
00000013 4 'explorer.exe'
0000000e 5 'services.exe'
00000028 4 \_ 'winedevice.exe'
00000023 3 \_ 'plugplay.exe'
0000001b 4 \_ 'winedevice.exe'
--- snip ---
--- snip ---
$ WINEDEBUG=+seh,+relay,+ntdll wine ./CommonObjects.exe -a 17 51 >> log.txt
2>&1
...
005f:Call ntdll.NtQuerySystemInformation(00000040,00193f20,00001008,0032f2fc)
ret=0409a210
005f:trace:ntdll:NtQuerySystemInformation
(0x00000040,0x193f20,0x00001008,0x32f2fc)
005f:fixme:ntdll:NtQuerySystemInformation
(0x00000040,0x193f20,0x00001008,0x32f2fc) stub
005f:Ret ntdll.NtQuerySystemInformation() retval=c0000003 ret=0409a210
005f:Call KERNEL32.GetLastError() ret=0064af80
005f:Ret KERNEL32.GetLastError() retval=00000078 ret=0064af80
...
005f:Call KERNEL32.RaiseException(e0434352,00000001,00000005,0032f1d4)
ret=00788fdb
005f:trace:seh:raise_exception code=e0434352 flags=1 addr=0x7b446ec7
ip=7b446ec7 tid=005f
005f:trace:seh:raise_exception info[0]=80131600
005f:trace:seh:raise_exception info[1]=00000000
005f:trace:seh:raise_exception info[2]=00000000
005f:trace:seh:raise_exception info[3]=00000000
005f:trace:seh:raise_exception info[4]=00630000
005f:trace:seh:raise_exception eax=7b435589 ebx=00000005 ecx=00000000
edx=0032f180 esi=0032f180 edi=0032f140
005f:trace:seh:raise_exception ebp=0032f118 esp=0032f0b4 cs=f7bc0023 ds=32002b
es=f7be002b fs=f7be0063 gs=f7be006b flags=00000216
005f:trace:seh:call_vectored_handlers calling handler at 0x7ba398 code=e0434352
flags=1
--- snip ---
Managed backtrace:
--- snip ---
NtApiDotNet.NtException: (0xC0000003) - STATUS_INVALID_INFO_CLASS
at NtApiDotNet.NtObjectUtils.ToNtException(NtStatus status, Boolean
throw_on_error)
at
NtApiDotNet.NtSystemInfo.QuerySystemInfoVariable[T](SystemInformationClass
info_class)
at NtApiDotNet.NtSystemInfo.GetHandles(Int32 pid, Boolean allow_query)
at CommonObjects.Program.Main(String[] args)
--- snip ---
Source:
https://github.com/google/sandbox-attacksurface-analysis-tools/blob/master/…https://github.com/google/sandbox-attacksurface-analysis-tools/blob/master/…
Support for this was added here:
https://github.com/google/sandbox-attacksurface-analysis-tools/commit/02a6f…
("Added extended handle information to allow for PIDs larger than 64k.").
Shouldn't be very hard to add. Wine already has the non-ex
'SystemHandleInformation' and 'SYSTEM_HANDLE_ENTRY'.
https://www.geoffchappell.com/studies/windows/km/ntoskrnl/api/ex/sysinfo/qu…
SYSTEM_HANDLE_INFORMATION_EX:
http://www.geoffchappell.com/studies/windows/km/ntoskrnl/api/ex/sysinfo/han…
SYSTEM_HANDLE_TABLE_ENTRY_INFO_EX
http://www.geoffchappell.com/studies/windows/km/ntoskrnl/api/ex/sysinfo/han…
$ sha1sum Release-v1.1.14.7z
8cd7991e675a995a3d67ef0aca2a8bf0e1512f6a Release-v1.1.14.7z
$ du -sh Release-v1.1.14.7z
384K Release-v1.1.14.7z
$ wine --version
wine-3.7-65-ge637a6f0bf
Regards
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=50486
Bug ID: 50486
Summary: The Sims 3 launcher hangs
Product: Wine
Version: 6.0-rc5
Hardware: x86-64
OS: Linux
Status: NEW
Keywords: patch
Severity: normal
Priority: P2
Component: gdi32
Assignee: wine-bugs(a)winehq.org
Reporter: z.figura12(a)gmail.com
Distribution: ---
Created attachment 69130
--> https://bugs.winehq.org/attachment.cgi?id=69130
gdi32: Do not compare face file names in insert_face_in_family_list() if either
is NULL.
When run from steam (win32 version; needs workarounds for bugs 32342 and
44985). The terminal shows a thread deadlocked on font_cs. Actually this is a
crash in disguise—one thread passes NULL to msvcrt wcsicmp, which raises an
exception, which is caught by the program but leaves font_cs acquired.
The attached patch fixes it.
I haven't checked whether this is a regression. It's not obvious to me why it
would be, but on the other hand I've seen bug reports for The Sims 3 that would
preclude this bug...
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=50123
Bug ID: 50123
Summary: The Elder Scrolls V: Skyrim SE has rendering glitches
with vulkan renderer
Product: Wine
Version: 5.21
Hardware: x86-64
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: directx-d3d
Assignee: wine-bugs(a)winehq.org
Reporter: andrey.goosev(a)gmail.com
Distribution: ---
Created attachment 68617
--> https://bugs.winehq.org/attachment.cgi?id=68617
screenshot
0348:fixme:d3d:wined3d_texture_vk_download_data Unhandled multi-aspect format
WINED3DFMT_R24G8_TYPELESS.
0348:fixme:d3d:wined3d_texture_vk_upload_data Unhandled multi-aspect format
WINED3DFMT_R24G8_TYPELESS.
0348:err:d3d:wined3d_context_vk_allocate_vram_chunk_memory Failed to allocate
memory, vr VK_ERROR_OUT_OF_DEVICE_MEMORY.
0348:err:d3d:wined3d_context_vk_create_bo Failed to allocate buffer memory.
0348:err:d3d:adapter_vk_map_bo_address Failed to create new buffer object.
wine-5.21-69-gb940c5e7c91
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=44629
Bug ID: 44629
Summary: Process Hacker can't enumerate handles
Product: Wine
Version: 3.2
Hardware: x86
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ntdll
Assignee: wine-bugs(a)winehq.org
Reporter: z.figura12(a)gmail.com
Distribution: ---
Easily reproducible: go to any process, right-click and select "Properties",
open the "Handles" tab. Running under Wine yields "Unable to query handle
information: Unknown error."
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=50379
Bug ID: 50379
Summary: The Witcher 3 has broken rendering with Vulkan
renderer
Product: Wine
Version: 6.0-rc3
Hardware: x86-64
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: directx-d3d
Assignee: wine-bugs(a)winehq.org
Reporter: andrey.goosev(a)gmail.com
Distribution: ---
Created attachment 68984
--> https://bugs.winehq.org/attachment.cgi?id=68984
example
In addition all bright parts are blinking.
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=50386
Bug ID: 50386
Summary: Sniper Elite V2 some objects aren't rendered with
Vulkan renderer
Product: Wine
Version: 6.0-rc3
Hardware: x86-64
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: directx-d3d
Assignee: wine-bugs(a)winehq.org
Reporter: andrey.goosev(a)gmail.com
Distribution: ---
Created attachment 68996
--> https://bugs.winehq.org/attachment.cgi?id=68996
examples
fixme:d3d:wined3d_context_vk_update_descriptors NULL constant buffer views not
implemented.
err:d3d:wined3d_context_vk_apply_draw_state Failed to update shader
descriptors.
err:d3d:adapter_vk_draw_primitive Failed to apply draw state.
wine-6.0-rc3-24-g3d2b4233288
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=48618
Bug ID: 48618
Summary: Wargaming.net Game Center shows black screen on launch
since Wine 5.0
Product: Wine
Version: 5.0
Hardware: x86
OS: Linux
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: -unknown
Assignee: wine-bugs(a)winehq.org
Reporter: chris(a)cjwatts.com
Distribution: ---
Created attachment 66463
--> https://bugs.winehq.org/attachment.cgi?id=66463
Wine stdout log
Confirmed on two different Ubuntu 19.10 machines.
Able to launch World of Tanks directly without much issue, but the Game Center
is just a black screen.
Tried wine-stable 5.0 and wine-staging 5.1 with the same results.
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
https://bugs.winehq.org/show_bug.cgi?id=50424
Bug ID: 50424
Summary: std::mutex crashes on creation
Product: Wine
Version: 4.12.1
Hardware: arm
OS: Linux
Status: UNCONFIRMED
Severity: major
Priority: P2
Component: msvcp
Assignee: wine-bugs(a)winehq.org
Reporter: david.paradis(a)us.abb.com
Distribution: ---
Created attachment 69041
--> https://bugs.winehq.org/attachment.cgi?id=69041
Test Project File
I have spent the better half of the last month tracking down a crash in my
application related to the creation of the std::mutex object in my code. After
putting many debugging messages into the Wine code I have finally found what
the issue is. Here is what I have found:
1) In the dlls/msvcp90/msvcp_main.c:init_cxx_funcs() the code is calling
GetProcAddress() for the critical_section methods for ctor, dtor, lock, ... but
never checks to see if we found a valid address for the functions. Later on in
the _Mtx_init_in_situ() a call is made to the critical section ctor and throws
null pointer exceptions because the function pointer is null.
2) In the dlls/concrt140/concrt140.spec there are NO definitions for any ARM
architecture method exports. In the dlls/msvcp90/msvcp90.spec there are
definitions but they are missing in concrt library.
After playing with the concrt140.spec file I was able add the 5 critical
section method exports to the file and was able to verify that I can now create
a std::mutex object and call lock, unlock and other methods on it successfully.
At this point I have no idea how many other ARM methods are missing from the
concrt140.spec list, but the distribution package does not have ANY ARM
definitions in that file.
I am attaching a very simple test CPP file that I was using to verify that the
code is now working for my usage but not completely fixed. With the test code
and the shipping source code you will not get past the point of seeing the
second printf statement after creating the test class, it will crash on the
"test t1;" line.
Thank you
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.