[Bug 47601] New: Process Hacker calls unimplemented ntoskrnl.exe functions SePrivilegeCheck and SeLocateProcessImageName
wine-bugs at winehq.org
wine-bugs at winehq.org
Wed Aug 7 22:33:27 CDT 2019
https://bugs.winehq.org/show_bug.cgi?id=47601
Bug ID: 47601
Summary: Process Hacker calls unimplemented ntoskrnl.exe
functions SePrivilegeCheck and
SeLocateProcessImageName
Product: Wine
Version: 4.13
Hardware: x86
OS: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ntoskrnl
Assignee: wine-bugs at winehq.org
Reporter: alexhenrie24 at gmail.com
Distribution: ---
Pretty self-explanatory. Wine prints "unimplemented function
ntoskrnl.exe.SePrivilegeCheck" and when a stub is added for that function, Wine
prints "unimplemented function ntoskrnl.exe.SeLocateProcessImageName" instead.
--
Do not reply to this email, post in Bugzilla using the
above URL to reply.
You are receiving this mail because:
You are watching all bug changes.
More information about the wine-bugs
mailing list