[Bug 45063] New: win64 / 64-bit .NET 4.0 - c0000005 from ntdll: RtlGetDaclSecurityDescriptor

wine-bugs at winehq.org wine-bugs at winehq.org
Tue Apr 24 22:33:20 CDT 2018


https://bugs.winehq.org/show_bug.cgi?id=45063

            Bug ID: 45063
           Summary: win64 / 64-bit .NET 4.0 - c0000005 from
                    ntdll:RtlGetDaclSecurityDescriptor
           Product: Wine
           Version: 3.6
          Hardware: x86-64
                OS: Mac OS X
            Status: UNCONFIRMED
          Severity: normal
          Priority: P2
         Component: ntdll
          Assignee: wine-bugs at winehq.org
          Reporter: pembertona at gmail.com

After fighting for some to get .NET 4.0 running on 64 bit (great progress here
after overcoming multiple msi/msiexec/installer issues), I've hit an access
violation exception running a very basic 'hello world' 64-bit console app. This
is on `portable-winehq-staging-3.6-osx64` - but almost certainly the devel and
stable branches as well.

136984.882:0008:0041:Call
advapi32.ConvertStringSecurityDescriptorToSecurityDescriptorW(19e1f7f8
L"D:P(A;;GRGW;;;BA)(A;;GRGW;;;S-1-5-21-0-0-0-1000)",00000001,19e1f780,19e1f7c8)
ret=6447f2c4d3e
136984.884:0008:0041:trace:advapi:ConvertStringSecurityDescriptorToSecurityDescriptorW
L"D:P(A;;GRGW;;;BA)(A;;GRGW;;;S-1-5-21-0-0-0-1000)", 1, 0x19e1f780, 0x19e1f7c8
136984.884:0008:0041:trace:heap:RtlAllocateHeap (0x10000,70000062,00000062):
returning 0xf60b0
136984.885:0008:0041:trace:advapi:ParseStringAclToAcl
L"P(A;;GRGW;;;BA)(A;;GRGW;;;S-1-5-21-0-0-0-1000)"
136984.885:0008:0041:trace:advapi:ParseStringSidToSid
L"BA)(A;;GRGW;;;S-1-5-21-0-0-0-1000)", 0x0, 0x19e1f514
136984.885:0008:0041:trace:advapi:ParseStringSidToSid only size requested,
returning TRUE with 16
136984.885:0008:0041:trace:advapi:ParseStringSidToSid L"S-1-5-21-0-0-0-1000)",
0x0, 0x19e1f514
136984.885:0008:0041:trace:advapi:ParseStringSidToSid only size requested,
returning TRUE with 28
136984.885:0008:0041:trace:heap:RtlFreeHeap (0x10000,70000062,0xf60b0):
returning TRUE
136984.886:0008:0041:trace:heap:RtlAllocateHeap (0x10000,7000006a,00000058):
returning 0x46340
136984.886:0008:0041:trace:heap:LocalAlloc (flags=0040) returning 0x46340
136984.886:0008:0041:trace:heap:RtlAllocateHeap (0x10000,70000062,00000062):
returning 0x46420
136984.886:0008:0041:trace:advapi:ParseStringAclToAcl
L"P(A;;GRGW;;;BA)(A;;GRGW;;;S-1-5-21-0-0-0-1000)"
136984.886:0008:0041:trace:advapi:ParseStringSidToSid
L"BA)(A;;GRGW;;;S-1-5-21-0-0-0-1000)", 0x46364, 0x19e1f514
136984.886:0008:0041:trace:advapi:ParseStringSidToSid returning TRUE
136984.886:0008:0041:trace:advapi:ParseStringSidToSid L"S-1-5-21-0-0-0-1000)",
0x4637c, 0x19e1f514
136984.886:0008:0041:trace:advapi:ParseStringSidToSid returning TRUE
136984.887:0008:0041:trace:heap:RtlFreeHeap (0x10000,70000062,0x46420):
returning TRUE
136984.887:0008:0041:trace:advapi:ConvertStringSecurityDescriptorToSecurityDescriptorW
 ret=1
136984.887:0008:0041:Ret 
advapi32.ConvertStringSecurityDescriptorToSecurityDescriptorW() retval=00000001
ret=6447f2c4d3e
136984.887:0008:0041:Call ntdll.RtlFreeHeap(00010000,00000000,000f5f30)
ret=6447f2c4dc8
136984.887:0008:0041:trace:heap:RtlFreeHeap (0x10000,70000062,0xf5f30):
returning TRUE
136984.887:0008:0041:Ret  ntdll.RtlFreeHeap() retval=00000001 ret=6447f2c4dc8
136984.887:0008:0041:trace:ntdll:RtlGetSaclSecurityDescriptor
(0x46340,0x19e1f716,0x19e1f718,0x19e1f715)
136984.887:0008:0041:trace:ntdll:RtlGetDaclSecurityDescriptor
(0x46340,0x19e1f717,0x19e1f720,0x19e1f715)
136984.887:0008:0041:trace:heap:RtlAllocateHeap (0x10000,7000006a,0000009c):
returning 0x46570
136984.888:0008:0041:trace:heap:RtlFreeHeap (0x10000,70000062,0x46570):
returning TRUE
136984.888:0008:0041:trace:seh:NtRaiseException code=c0000005 flags=0
addr=0x6447f1d6f19 ip=6447f1d6f19 tid=0041
136984.888:0008:0041:trace:seh:NtRaiseException  info[0]=0000000000000000
136984.888:0008:0041:trace:seh:NtRaiseException  info[1]=0000000000000010
136984.888:0008:0041:trace:seh:NtRaiseException  rax=0000000000000000
rbx=000006447f27fd30 rcx=0000000019e1fce0 rdx=0000000019e21ad0
136984.888:0008:0041:trace:seh:NtRaiseException  rsi=0000000019e1fce0
rdi=0000000000000000 rbp=0000000019e1fe00 rsp=0000000019e1fc20
136984.888:0008:0041:trace:seh:NtRaiseException   r8=0000000019e1f298 
r9=0000000000000010 r10=0000000019e21b25 r11=ffffffffffffffa9
136984.888:0008:0041:trace:seh:NtRaiseException  r12=0000000000000000
r13=0000000000000000 r14=0000000000044860 r15=0000000000000000
136984.888:0008:0041:trace:seh:call_vectored_handlers calling handler at
0x6447f30a954 code=c0000005 flags=0
...
136984.967:0008:0041:err:eventlog:ReportEventW L"Application:
Console64.exe\nFramework Version: v4.0.30319\nDescription: The process was
terminated due to an internal error in the .NET Runtime at IP 000006447F1D6F19
(000006447F100000) with exit code 80131506.\n"

Possibly related to https://bugs.winehq.org/show_bug.cgi?id=27680?

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.



More information about the wine-bugs mailing list