https://bugs.winehq.org/show_bug.cgi?id=46633 Jacek Caban <jacek(a)codeweavers.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |jacek(a)codeweavers.com --- Comment #11 from Jacek Caban <jacek(a)codeweavers.com> --- Created attachment 66862 --> https://bugs.winehq.org/attachment.cgi?id=66862 new patchset (In reply to Zebediah Figura from comment #10)
there's no obvious way to thunk from the ntdll callback to the kernel32 callback without leaking memory.
One way to do it is in the attached patch (together with rebased version of ntdll patches). It's not pretty, but I'd say it's not too bad given that we don't have any other solution. -- Do not reply to this email, post in Bugzilla using the above URL to reply. You are receiving this mail because: You are watching all bug changes.