Rebase against ec9e556d31278d2de28b8ba82a063dc9fffdb440.

This commit is contained in:
Zebediah Figura
2020-06-29 18:56:48 -05:00
parent b6c2818755
commit 70d8178927
11 changed files with 137 additions and 229 deletions

View File

@@ -6,3 +6,13 @@ Fixes: [45650] chromium 32-bit sandbox expects different syscall thunks dependin
Depends: ntdll-WRITECOPY
Depends: ws2_32-WSACleanup
Depends: ntdll-ApiSetMap
# As of 43be3507c04, unless I've misread, ntdll.dll no longer has the chance to
# run code before ntdll.so performs process initialization. Unfortunately,
# ntdll.so is still making calls to Nt* exports during that process
# initialization, which in practice means it's calling syscall thunks. In order
# for this series to work, we need to poke __wine_syscall_dispatcher into the
# TEB before those calls are made. Fixing this would require a nontrivial amount
# of effort, which will be obviated as soon as Alexandre finishes splitting
# ntdll upstream.
Disabled: true