Implemented new PE DLL initalization code, trying to call the
commita3527cf3695928c3ca6f3fdad4b8661b12a7c41c
authorUlrich Weigand <weigand@informatik.uni-erlangen.de>
Sun, 11 Oct 1998 19:31:10 +0000 (11 19:31 +0000)
committerAlexandre Julliard <julliard@winehq.org>
Sun, 11 Oct 1998 19:31:10 +0000 (11 19:31 +0000)
treee6183a99e89f53a875ff92eb62996a2d3c9c3fb6
parent2e244c45a3a767205ab0a9965b4f6414dc66a5a5
Implemented new PE DLL initalization code, trying to call the
DllEntryPoint routines always in correct order :-)
Bypass snooping when getting data buffer addresses (thunk buffers,
__GP handlers) and for 32-bit routines directly called from 16-bit
(due to stack address size problems).
include/module.h
include/pe_image.h
loader/module.c
loader/pe_image.c
loader/task.c
scheduler/thread.c
win32/kernel32.c