ntdll: try to not raise exceptions when checking for atl thunks
Alexandre Julliard
julliard at winehq.org
Wed Jun 16 04:37:28 CDT 2010
Markus Amsler <markus.amsler at oribi.org> writes:
> + * Windows checks the following conditions before emulating an ATL thunk:
> + * - DEP policy allows emulating
> + * - thunk has memory type MEM_PRIVATE and is readable
> + * - jmp func is executable
> + * - thunk signature (movl, jmp) matches
> + * - a "secret" flag is set:
> + * The flag gets set before calling WndProc and cleared after WndProc
> + * or a thunk was emulated.
> + * In Windows XP SP 3 this flag is located at TEB+0xfb4.
> */
Where does that information come from?
--
Alexandre Julliard
julliard at winehq.org
More information about the wine-devel
mailing list