Alexandre Julliard winehq.org> writes:
>
> Jui-Hao Chiang gmail.com> writes:
>
> > Hi, All:
> >
> > I also find out 2 special things
> > (1) The address of the array which causes the exception happens to be
> > the memory-mapped address of comctl32.dll (check the /proc/../smaps)
> > (2) If the
Jui-Hao Chiang writes:
> Hi, All:
>
> I also find out 2 special things
> (1) The address of the array which causes the exception happens to be
> the memory-mapped address of comctl32.dll (check the /proc/../smaps)
> (2) If the address of the array is pointing to heap (from my malloc),
> or some o
hint on how to debug this question
Best wishes,
Jui-Hao
>
> Message: 11
> Date: Wed, 21 Apr 2010 09:37:53 -0400
> From: Jui-Hao Chiang
> Subject: Intercept relay_call causes seh:raise_exception code=c005
> To: wine-devel@winehq.org
> Message-ID:
>
> Content-T
Hi, All, I am currently using the WINEDEBUG=relay feature to intercept
function calls as the following
1. in dlls/ntdll/relay.c, insert code snippet in
static LONGLONG WINAPI relay_call( struct relay_descr *descr, unsigned
int idx, const INT_PTR *stack )
{
.
my_own_function(entry_point->name,