https://bugs.winehq.org/show_bug.cgi?id=36327
Bug ID: 36327 Summary: Dameware Mini Remote Control 10.x licensing tool fails during post-install step (needs support for registry objects in GetSecurityInfo) Product: Wine Version: 1.7.18 Hardware: x86 OS: Linux Status: NEW Severity: normal Priority: P2 Component: advapi32 Assignee: wine-bugs@winehq.org Reporter: focht@gmx.net
Hello folks,
as the summary says.
Prerequisite: 'winetricks -q dotnet20' (or let the installer just install it)
--- snip --- 0036:Call KERNEL32.CreateProcessW(00000000,008fb7d8 L""C:\Program Files\SolarWinds\DameWare Mini Remote Control 10.0\SolarWinds.MRC.Licensor.exe"",00000000,00000000,00000000,00000000,00000000,008eeb28 L"C:\Program Files\SolarWinds\DameWare Mini Remote Control 10.0\",0033ec0c,0033ebfc) ret=7d5982ba ... 0047: init_process_done() = 0 ... 0036:Ret KERNEL32.CreateProcessW() retval=00000001 ret=7d5982ba ... 0047:Call advapi32.RegCreateKeyExW(00000274,008ef4c0 L"{15119A76-31E3-4C58-AD65-5BCCF704B5C5}",00000000,00000000,00000000,0002001f,00000000,0033f028,0033f0b8) ret=0037be6f 0047: create_key( parent=0274, access=0002001f, attributes=00000000, options=00000000, namelen=76, name=L"{15119A76-31E3-4C58-AD65-5BCCF704B5C5}", class=L"" ) 0047: create_key() = 0 { hkey=0278, created=1 } 0047:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=0037be6f ... 0047:Call advapi32.GetSecurityInfo(00000278,00000004,0000000f,0033efbc,0033efb8,0033efb4,0033efb0,0033efac) ret=0037ba68 0047:trace:ntdll:NtQuerySecurityObject (0x278,0x0000000f,(nil),0x00000000,0x33ee94) 0047: get_security_object( handle=0278, security_info=0000000f ) 0047: get_security_object() = ACCESS_DENIED { sd_len=00000000, sd={} } 0047:Ret advapi32.GetSecurityInfo() retval=00000005 ret=0037ba68 0047:Call KERNEL32.GetLastError() ret=0037ba6e 0047:Ret KERNEL32.GetLastError() retval=00000000 ret=0037ba6e ... 0047:Call KERNEL32.RaiseException(e0434f4d,00000001,00000001,0033eea8) ret=79f97065 0047:trace:seh:raise_exception code=e0434f4d flags=1 addr=0x7b83ac57 ip=7b83ac57 tid=0047 0047:trace:seh:raise_exception info[0]=80070005 0047:trace:seh:raise_exception eax=7b826c7d ebx=7b8bb000 ecx=80070005 edx=0033ede4 esi=0033ee88 edi=0033ee50 0047:trace:seh:raise_exception ebp=0033ee28 esp=0033edc4 cs=0023 ds=002b es=002b fs=0063 gs=006b flags=00000283 0047:trace:seh:call_stack_handlers calling handler at 0x79f9a3c8 code=e0434f4d flags=1 --- snip ---
Managed backtrace:
--- snip --- System.UnauthorizedAccessException: Attempted to perform an unauthorized operation. at System.Security.AccessControl.Win32.GetSecurityInfo(ResourceType resourceType, String name, SafeHandle handle, AccessControlSections accessControlSections, RawSecurityDescriptor& resultSd) at System.Security.AccessControl.NativeObjectSecurity.CreateInternal(ResourceType resourceType, Boolean isContainer, String name, SafeHandle handle, AccessControlSections includeSections, Boolean createByName, ExceptionFromErrorCode exceptionFromErrorCode, Object exceptionContext) at System.Security.AccessControl.NativeObjectSecurity..ctor(Boolean isContainer, ResourceType resourceType, SafeHandle handle, AccessControlSections includeSections, ExceptionFromErrorCode exceptionFromErrorCode, Object exceptionContext) at System.Security.AccessControl.RegistrySecurity..ctor(SafeRegistryHandle hKey, String name, AccessControlSections includeSections) at Microsoft.Win32.RegistryKey.GetAccessControl(AccessControlSections includeSections) at SolarWinds.Licensing.Framework.RegistryUtil.SetRegistryRights(RegistryKey swKey, AccessControlSections section) at SolarWinds.Licensing.Framework.RegistryUtil.SetRegistryRights(RegistryKey swKey) at SolarWinds.Licensing.Framework.RegistryUtil.GetRegistryKey(Boolean writable) at SolarWinds.Licensing.Framework.RegistryUtil.GetDefaultSymmetricAlgorithm() at SolarWinds.Licensing.Framework.Store.LicenseStoreDAL.GetSymmetricAlgorithm(String& defaultAlgo) at SolarWinds.Licensing.Framework.Store.LicenseStoreDAL.InitializeStore() at SolarWinds.Licensing.Framework.Store.LicenseStoreDAL..ctor() at SolarWinds.Licensing.Framework.Store.SingletonLicenseStoreFactory.get_StoreInstance() at SolarWinds.Licensing.Framework.LicenseManager..ctor(ILicenseStore store, IOnlineLicenseManager onlineManager) at SolarWinds.Licensing.Framework.LicenseManager.GetInstance() at SolarWinds.MRC.Licensor.Program.RunLicensingWindow(Boolean silentInstallation, Dictionary`2 activationArguments, Boolean forceOnlineCheck) at SolarWinds.MRC.Licensor.Program.Main(String[] args) --- snip ---
Source: http://source.winehq.org/git/wine.git/blob/929d9fb9f79b9ba0b7392215e51a152ec...
--- snip --- 3116 DWORD WINAPI GetSecurityInfo( 3117 HANDLE hObject, SE_OBJECT_TYPE ObjectType, 3118 SECURITY_INFORMATION SecurityInfo, PSID *ppsidOwner, 3119 PSID *ppsidGroup, PACL *ppDacl, PACL *ppSacl, 3120 PSECURITY_DESCRIPTOR *ppSecurityDescriptor 3121 ) 3122 { ... 3139 switch (ObjectType) 3140 { 3141 case SE_SERVICE: 3142 status = SERV_QueryServiceObjectSecurity(hObject, SecurityInfo, NULL, 0, &n1); 3143 break; 3144 default: 3145 status = NtQuerySecurityObject(hObject, SecurityInfo, NULL, 0, &n1); 3146 break; 3147 } ... --- snip ---
Erich Hoover worked on this some time ago, adding support for registry objects to [Get|Set]NamedSecurityInfo().
For GetSecurityInfo() he provided a patchset too ... it never went in?
$ sha1sum DameWare-MRC32-Eval-v10.0.0.exe 5181070b3c13720a14072dc50c1aa1f4b82b7e3a DameWare-MRC32-Eval-v10.0.0.exe
$ du -sh DameWare-MRC32-Eval-v10.0.0.exe 58M DameWare-MRC32-Eval-v10.0.0.exe
$ wine --version wine-1.7.18-10-ge5d69df
Regards
https://bugs.winehq.org/show_bug.cgi?id=36327
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Keywords| |dotnet, download URL| |http://downloads.solarwinds | |.com/solarwinds/Release/Dam | |eWare/v10/DameWare-MRC32-Ev | |al-v10.0.0.exe
https://bugs.winehq.org/show_bug.cgi?id=36327
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Summary|Dameware Mini Remote |Dameware Mini Remote |Control 10.x licensing tool |Control 10.x licensing tool |fails during post-install |fails during post-install |step (needs support for |step |registry objects in | |GetSecurityInfo) |
--- Comment #1 from Anastasius Focht focht@gmx.net --- Hello folks,
hmm it seems I was mistaken, the support is present.
SACL_SECURITY_INFORMATION seems to be the culprit and the caller doesn't have the proper privileges (SeSecurityPrivilege) to retrieve this info?
Regards
https://bugs.winehq.org/show_bug.cgi?id=36327
super_man@post.com changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |super_man@post.com
--- Comment #2 from super_man@post.com --- still fails wine-1.7.54-152-gbfb845f
https://bugs.winehq.org/show_bug.cgi?id=36327
--- Comment #3 from super_man@post.com --- Still an issue 1.8.rc3
https://bugs.winehq.org/show_bug.cgi?id=36327
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- Component|advapi32 |wineserver Summary|Dameware Mini Remote |Dameware Mini Remote |Control 10.x licensing tool |Control 10.x licensing tool |fails during post-install |(.NET 2.0 app) fails during |step |post-install step | |(SE_SECURITY_NAME privilege | |of calling thread access | |token not respected when | |retrieving SACL via | |GetSecurityInfo) URL|http://downloads.solarwinds |https://web.archive.org/web |.com/solarwinds/Release/Dam |/20190317110303/https://dow |eWare/v10/DameWare-MRC32-Ev |nloads.solarwinds.com/solar |al-v10.0.0.exe |winds/Release/DameWare/v10/ | |DameWare-MRC32-Eval-v10.0.0 | |.exe
--- Comment #4 from Anastasius Focht focht@gmx.net --- Hello folks,
revisiting, still present.
Adding stable download from Internet archive:
https://web.archive.org/web/20190317110303/https://downloads.solarwinds.com/...
The installer currently suffers from a regression -> bug 46833 Working around that it yields the same problem as years ago.
--- snip --- $ pwd /home/focht/.wine/drive_c/ProgramData/SolarWinds/DameWare Development/MrcEXEs
$ WINEDEBUG=+seh,+relay,+msi,+server wine ./DWMRC10x_32.exe >>log.txt 2>&1 ... 004a:trace:msi:HANDLE_CustomType34 cmd L""C:\Program Files\SolarWinds\DameWare Mini Remote Control 10.0\SolarWinds.MRC.Licensor.exe"" dir L"C:\Program Files\SolarWinds\DameWare Mini Remote Control 10.0\" 004a:Call KERNEL32.CreateProcessW(00000000,008bcd48 L""C:\Program Files\SolarWinds\DameWare Mini Remote Control 10.0\SolarWinds.MRC.Licensor.exe"",00000000,00000000,00000000,00000000,00000000,008b40e0 L"C:\Program Files\SolarWinds\DameWare Mini Remote Control 10.0\",0032e9ac,0032e99c) ret=7badcd44 ... 0060:Call advapi32.RegOpenKeyExW(000001fc,00919ff8 L"{15119A76-31E3-4C58-AD65-5BCCF704B5C5}",00000000,0002001f,0032f0ac) ret=0036bd4b 0060: open_key( parent=01fc, access=0002001f, attributes=00000000, name=L"{15119A76-31E3-4C58-AD65-5BCCF704B5C5}" ) 0060: open_key() = OBJECT_NAME_NOT_FOUND { hkey=0000 } 0060:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=0036bd4b ... 0060:Call advapi32.RegCreateKeyExW(000001fc,00919ff8 L"{15119A76-31E3-4C58-AD65-5BCCF704B5C5}",00000000,00000000,00000000,0002001f,00000000,0032f0b8,0032f148) ret=0036be6f 0060: create_key( access=0002001f, options=00000000, objattr={rootdir=01fc,attributes=00000000,sd={},name=L"{15119A76-31E3-4C58-AD65-5BCCF704B5C5}"}, class=L"" ) 0060: create_key() = 0 { hkey=0200, created=1 } 0060:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=0036be6f ... 0060:Call advapi32.OpenProcessToken(ffffffff,00000002,0032ef24) ret=0036a592 0060: open_token( handle=ffffffff, access=00000002, attributes=00000000, flags=00000000 ) 0060: open_token() = 0 { token=0208 } 0060:Ret advapi32.OpenProcessToken() retval=00000001 ret=0036a592 0060:Call KERNEL32.GetLastError() ret=0036a598 0060:Ret KERNEL32.GetLastError() retval=00000000 ret=0036a598 ... 0060:Call advapi32.OpenThreadToken(fffffffe,00000028,00000001,0032ef4c) ret=79f30451 0060: open_token( handle=fffffffe, access=00000028, attributes=00000000, flags=00000003 ) 0060: open_token() = NO_TOKEN { token=0000 } 0060:Ret advapi32.OpenThreadToken() retval=00000000 ret=79f30451 0060:Call KERNEL32.GetLastError() ret=79f061ff 0060:Ret KERNEL32.GetLastError() retval=000003f0 ret=79f061ff ... 0060:Call advapi32.DuplicateTokenEx(00000208,0000002c,00000000,00000002,00000002,0032ef14) ret=0408019e 0060: duplicate_token( handle=0208, access=0000002c, primary=0, impersonation_level=2, objattr={rootdir=0000,attributes=00000000,sd={},name=L""} ) 0060: duplicate_token() = 0 { new_handle=020c } 0060:Ret advapi32.DuplicateTokenEx() retval=00000001 ret=0408019e 0060:Call KERNEL32.GetLastError() ret=040801a4 0060:Ret KERNEL32.GetLastError() retval=000003f0 ret=040801a4 ... 0060:Call advapi32.SetThreadToken(00000000,0000020c) ret=7a02c163 0060: set_thread_info( handle=fffffffe, mask=4, priority=0, affinity=00000000, entry_point=00000000, token=020c ) 0060: set_thread_info() = 0 0060:Ret advapi32.SetThreadToken() retval=00000001 ret=7a02c163 ... 0060:Call advapi32.AdjustTokenPrivileges(0000020c,00000000,0032efe4,00000010,0032efd4,0032efd0) ret=0036b972 0060: adjust_token_privileges( handle=020c, disable_all=0, get_modified_state=1, privileges={{luid=0000000000000008,attr=2}} ) 0060: adjust_token_privileges() = 0 { len=0000000c, privileges={{luid=0000000000000008,attr=0}} } 0060:Ret advapi32.AdjustTokenPrivileges() retval=00000001 ret=0036b972 0060:Call KERNEL32.GetLastError() ret=0036b978 0060:Ret KERNEL32.GetLastError() retval=00000000 ret=0036b978 ... 0060:Call advapi32.GetSecurityInfo(00000200,00000004,0000000f,0032f04c,0032f048,0032f044,0032f040,0032f03c) ret=0036ba68 0060: get_security_object( handle=0200, security_info=0000000f ) 0060: get_security_object() = ACCESS_DENIED { sd_len=00000000, sd={} } 0060:Ret advapi32.GetSecurityInfo() retval=00000005 ret=0036ba68 0060:Call KERNEL32.GetLastError() ret=0036ba6e 0060:Ret KERNEL32.GetLastError() retval=00000000 ret=0036ba6e ... 0060:Call KERNEL32.RaiseException(e0434f4d,00000001,00000001,0032ef38) ret=79f97065 0060:trace:seh:raise_exception code=e0434f4d flags=1 addr=0x7b44c03b ip=7b44c03b tid=0060 0060:trace:seh:raise_exception info[0]=80070005 0060:trace:seh:raise_exception eax=7b43a48d ebx=0015d9c8 ecx=00000000 edx=0032ef18 esi=0032ef18 edi=0032eee0 0060:trace:seh:raise_exception ebp=0032eeb8 esp=0032ee54 cs=320023 ds=32002b es=f7c6002b fs=f7c60063 gs=f7c6006b flags=00200212 0060:trace:seh:call_stack_handlers calling handler at 0x79f9a3c8 code=e0434f4d flags=1 0060:Call msvcr80._except_handler4_common(7a381240,79e717fb,0032ee60,0032ef50,0032eb7c,0032ea4c) ret=79f9a3e7 ... System.UnauthorizedAccessException: Attempted to perform an unauthorized operation. at System.Security.AccessControl.Win32.GetSecurityInfo(ResourceType resourceType, String name, SafeHandle handle, AccessControlSections accessControlSections, RawSecurityDescriptor& resultSd) at System.Security.AccessControl.NativeObjectSecurity.CreateInternal(ResourceType resourceType, Boolean isContainer, String name, SafeHandle handle, AccessControlSections includeSections, Boolean createByName, ExceptionFromErrorCode exceptionFromErrorCode, Object exceptionContext) at System.Security.AccessControl.NativeObjectSecurity..ctor(Boolean isContainer, ResourceType resourceType, SafeHandle handle, AccessControlSections includeSections, ExceptionFromErrorCode exceptionFromErrorCode, Object exceptionContext) at System.Security.AccessControl.RegistrySecurity..ctor(SafeRegistryHandle hKey, String name, AccessControlSections includeSections) at Microsoft.Win32.RegistryKey.GetAccessControl(AccessControlSections includeSections) at SolarWinds.Licensing.Framework.RegistryUtil.SetRegistryRights(RegistryKey swKey, AccessControlSections section) at SolarWinds.Licensing.Framework.RegistryUtil.SetRegistryRights(RegistryKey swKey) at SolarWinds.Licensing.Framework.RegistryUtil.GetRegistryKey(Boolean writable) at SolarWinds.Licensing.Framework.RegistryUtil.GetDefaultSymmetricAlgorithm() at SolarWinds.Licensing.Framework.Store.LicenseStoreDAL.GetSymmetricAlgorithm(String& defaultAlgo) at SolarWinds.Licensing.Framework.Store.LicenseStoreDAL.InitializeStore() at SolarWinds.Licensing.Framework.Store.LicenseStoreDAL..ctor() at SolarWinds.Licensing.Framework.Store.SingletonLicenseStoreFactory.get_StoreInstance() at SolarWinds.Licensing.Framework.LicenseManager..ctor(ILicenseStore store, IOnlineLicenseManager onlineManager) at SolarWinds.Licensing.Framework.LicenseManager.GetInstance() at SolarWinds.MRC.Licensor.Program.RunLicensingWindow(Boolean silentInstallation, Dictionary`2 activationArguments, Boolean forceOnlineCheck) at SolarWinds.MRC.Licensor.Program.Main(String[] args) ... 0060:trace:seh:start_debugger Starting debugger "winedbg --auto 95 528" --- snip ---
Microsoft Core CLR:
https://github.com/dotnet/corefx/blob/master/src/System.Security.AccessContr...
https://github.com/dotnet/corefx/blob/a10890f4ffe0fadf090c922578ba0e606ebdd1...
App managed code:
--- snip --- ... public static bool SetRegistryRights(RegistryKey swKey) { if (!Utility.IsAnAdministrator()) return false; try { RegistryUtil.SetRegistryRights(swKey, AccessControlSections.All); } catch (PrivilegeNotHeldException ex) { Logger.Log.Info((object) "Caught expected PrivilegeNotHeldException:", (Exception) ex); Logger.Log.Info((object) "Attempting to set privs with reduced control sections."); RegistryUtil.SetRegistryRights(swKey, AccessControlSections.Access); } return true; } ... private static void SetRegistryRights(RegistryKey swKey, AccessControlSections section) { AuthorizationRuleCollection accessRules = swKey.GetAccessControl(section).GetAccessRules(true, false, typeof (SecurityIdentifier)); RegistrySecurity registrySecurity = new RegistrySecurity(); foreach (AuthorizationRule authorizationRule in (ReadOnlyCollectionBase) accessRules) registrySecurity.AddAccessRule((RegistryAccessRule) authorizationRule); RegistryAccessRule rule = new RegistryAccessRule((IdentityReference) new SecurityIdentifier(WellKnownSidType.AuthenticatedUserSid, (SecurityIdentifier) null), RegistryRights.FullControl, InheritanceFlags.ContainerInherit | InheritanceFlags.ObjectInherit, PropagationFlags.None, AccessControlType.Allow); registrySecurity.AddAccessRule(rule); swKey.SetAccessControl(registrySecurity); } --- snip ---
Microsoft docs:
https://docs.microsoft.com/en-us/windows/desktop/secauthz/sacl-access-right
--- quote --- SACL Access Right
The ACCESS_SYSTEM_SECURITY access right controls the ability to get or set the SACL in an object's security descriptor. The system grants this access right only if the SE_SECURITY_NAME privilege is enabled in the access token of the requesting thread.
To access an object's SACL
1. Call the AdjustTokenPrivileges function to enable the SE_SECURITY_NAME privilege. 2. Request the ACCESS_SYSTEM_SECURITY access right when you open a handle to the object. 3. Get or set the object's SACL by using a function such as GetSecurityInfo or SetSecurityInfo. 4. Call AdjustTokenPrivileges to disable the SE_SECURITY_NAME privilege.
To access a SACL using the GetNamedSecurityInfo or SetNamedSecurityInfo functions, enable the SE_SECURITY_NAME privilege. The function internally requests the access right.
The ACCESS_SYSTEM_SECURITY access right is not valid in a DACL because DACLs do not control access to a SACL. However, you can use the ACCESS_SYSTEM_SECURITY access right in a SACL to audit attempts to use the access right. --- quote ---
Apparently wineserver doesn't honour SE_SECURITY_NAME privilege from calling thread's access token when checking the access rights on the registry key. It just compares the registry key access rights from the creation of the key (0x2001f) with the get_security_object SACL_SECURITY_INFORMATION implied one (0x1020000 -> READ_CONTROL | ACCESS_SYSTEM_SECURITY) which obviously fails.
$ sha1sum DameWare-MRC32-Eval-v10.0.0.exe 5181070b3c13720a14072dc50c1aa1f4b82b7e3a DameWare-MRC32-Eval-v10.0.0.exe
$ du -sh DameWare-MRC32-Eval-v10.0.0.exe 58M DameWare-MRC32-Eval-v10.0.0.exe
$ wine --version wine-4.4
Regards
https://bugs.winehq.org/show_bug.cgi?id=36327
Fabian Maurer dark.shadow4@web.de changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |dark.shadow4@web.de
--- Comment #5 from Fabian Maurer dark.shadow4@web.de --- I can't reproduce the issue, even when running 4.5 (where the regression is fixed). Either it got fixed in 4.5 already, or I might be doing something wrong. Could you please re-test with 8.11?
https://bugs.winehq.org/show_bug.cgi?id=36327
--- Comment #6 from Anastasius Focht focht@gmx.net --- Hello folks,
revisiting, still present.
--- snip --- ... 023c:trace:msi:HANDLE_CustomType34 cmd L""C:\Program Files\SolarWinds\DameWare Mini Remote Control 10.0\SolarWinds.MRC.Licensor.exe"" dir L"C:\Program Files\SolarWinds\DameWare Mini Remote Control 10.0\" 023c:Call KERNEL32.CreateProcessW(00000000,01403e68 L""C:\Program Files\SolarWinds\DameWare Mini Remote Control 10.0\SolarWinds.MRC.Licensor.exe"",00000000,00000000,00000000,00000000,00000000,014193a0 L"C:\Program Files\SolarWinds\DameWare Mini Remote Control 10.0\",0031eb30,0031eb74) ret=79f51def ... 023c:Ret KERNEL32.CreateProcessW() retval=00000001 ret=79f51def ... 02e0:Call advapi32.AdjustTokenPrivileges(0000022c,00000000,0031f054,00000010,0031f044,0031f040) ret=00c0bd42 02e0:Call ntdll.NtAdjustPrivilegesToken(0000022c,00000000,0031f054,00000010,0031f044,0031f040) ret=7bca35b2 02e0: adjust_token_privileges( handle=022c, disable_all=0, get_modified_state=1, privileges={{luid=0000000000000008,attrs=2}} ) 02e0: adjust_token_privileges() = 0 { len=0000000c, privileges={{luid=0000000000000008,attrs=0}} } 02e0:Ret ntdll.NtAdjustPrivilegesToken() retval=00000000 ret=7bca35b2 02e0:Call ntdll.RtlNtStatusToDosError(00000000) ret=7bca35bb 02e0:Ret ntdll.RtlNtStatusToDosError() retval=00000000 ret=7bca35bb 02e0:Ret advapi32.AdjustTokenPrivileges() retval=00000001 ret=00c0bd42 02e0:Call KERNEL32.GetLastError() ret=00c0bd48 02e0:Ret KERNEL32.GetLastError() retval=00000000 ret=00c0bd48 ... 02e0:Call advapi32.GetSecurityInfo(00000220,00000004,0000000f,0031f0bc,0031f0b8,0031f0b4,0031f0b0,0031f0ac) ret=00c0be38 02e0: get_security_object( handle=0220, security_info=0000000f ) 02e0: get_security_object() = ACCESS_DENIED { sd_len=00000000, sd={} } 02e0:Ret advapi32.GetSecurityInfo() retval=00000005 ret=00c0be38 ... 02e0:Call msvcr80.wcsncpy_s(004fd310,0000085c,00f82c34 L"System.UnauthorizedAccessException: Attempted to perform an unauthorized operation.\r\n at System.Security.AccessControl.Win32.GetSecurityInfo(ResourceType resourceType, String name, SafeHandle handle, AccessControlSections accessControlSections, RawSecurityDescriptor& resultSd)\r\n a"...,0000085b) ret=79f09454 02e0:Ret msvcr80.wcsncpy_s() retval=00000000 ret=79f09454 --- snip ---
$ wine --version wine-9.9
Regards