ntdll: Stub system service requests in i386 mode (Int 2E, SYSENTER, SYSCALL) (try 2)
paulc at voip.null.ro
Tue Jul 6 16:00:47 CDT 2010
ntdll: Stub system service requests in i386 mode (Int 2E, SYSENTER, SYSCALL)
Some system checkers, antiviruses and protections make direct system service
requests bypassing the Nt... entry points. Oh, and probably some viruses too.
On Linux (at least) SYSCALL is used by the system so we won't have a chance to
see it, it crashes the application.
No idea if this mechanism is used on other architectures and what is the call
Changed from previous attempt: fixed the parameter offset, for SYSENTER and
SYSCALL it is 8 above edx == esp.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 2483 bytes
Desc: not available
More information about the wine-patches