[Bug 47601] New: Process Hacker calls unimplemented ntoskrnl.exe functions SePrivilegeCheck and SeLocateProcessImageName

wine-bugs at winehq.org wine-bugs at winehq.org
Wed Aug 7 22:33:27 CDT 2019


https://bugs.winehq.org/show_bug.cgi?id=47601

            Bug ID: 47601
           Summary: Process Hacker calls unimplemented ntoskrnl.exe
                    functions SePrivilegeCheck and
                    SeLocateProcessImageName
           Product: Wine
           Version: 4.13
          Hardware: x86
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P2
         Component: ntoskrnl
          Assignee: wine-bugs at winehq.org
          Reporter: alexhenrie24 at gmail.com
      Distribution: ---

Pretty self-explanatory. Wine prints "unimplemented function
ntoskrnl.exe.SePrivilegeCheck" and when a stub is added for that function, Wine
prints "unimplemented function ntoskrnl.exe.SeLocateProcessImageName" instead.

-- 
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.



More information about the wine-bugs mailing list