http://bugs.winehq.org/show_bug.cgi?id=9484 --- Comment #22 from Klaus Layer <klaus.layer(a)gmx.de> 2008-10-24 03:34:26 --- Yes, the copy protection still rejects to run the program with original CD in drive with latest git. In the last trace I attached I see a SEH after GetProcAddress which is called with LoadLibraryA. Could this be some sort of entry point checking as known from punkbuster? Focht what do you think? 0009:trace:module:LdrGetDllHandle L"Kernel32.dll" -> 0x7ee00000 (load path L"C:\\Programme\\Klett\\Mathetrainer 6;.;C:\\windows\\system32;C:\\windows\\system;C:\\windows;C:\\windows\\system32;C:\\windows") 0009:Ret KERNEL32.GetModuleHandleA() retval=7ee00000 ret=0043a61f 0009:Call KERNEL32.GetProcAddress(7ee00000,0043a5ae "LoadLibraryA") ret=0043a63a 0009:Ret KERNEL32.GetProcAddress() retval=7ee0a0ec ret=0043a63a 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x443546 0009:trace:seh:raise_exception info[0]=00000001 0009:trace:seh:raise_exception info[1]=00000000 0009:trace:seh:raise_exception eax=00000000 ebx=7ee90be8 ecx=00400000 edx=00400000 esi=ffffffa8 edi=00405000 0009:trace:seh:raise_exception ebp=00004d14 esp=0034feec cs=0073 ds=007b es=007b fs=0033 gs=003b flags=00010206 0009:trace:seh:call_stack_handlers calling handler at 0x441d79 code=c0000005 flags=0 0009:trace:seh:call_stack_handlers handler at 0x441d79 returned 0 -- Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email Do not reply to this email, post in Bugzilla using the above URL to reply. ------- You are receiving this mail because: ------- You are watching all bug changes.