29 Sep
2020
29 Sep
'20
2:10 a.m.
https://bugs.winehq.org/show_bug.cgi?id=49896 --- Comment #9 from Esme Povirk <madewokherd(a)gmail.com> --- Calling through kernelbase to ntdll is expected. The address of the crashing instruction appears to be on the stack. So this is most likely a case of stack misalignment, where a function pops a different number of bytes than expected, and a pointer on the stack is treated as a return address. We're lucky the stack trace has any useful information. It might be worth checking whether any compiler/optimization flags in your build are contributing to this. -- Do not reply to this email, post in Bugzilla using the above URL to reply. You are receiving this mail because: You are watching all bug changes.