Removed too strict header check to enable execution of handcoded PE
authorMarcus Meissner <marcus@jet.franken.de>
Wed, 31 Dec 2003 00:12:31 +0000 (00:12 +0000)
committerAlexandre Julliard <julliard@winehq.org>
Wed, 31 Dec 2003 00:12:31 +0000 (00:12 +0000)
exes.

dlls/kernel/module.c

index 1baa08501dbcffe0faedc7414aac3d2eda71c3dd..be4af66bfce575ea1b39d79035c3d07e2818d342 100644 (file)
@@ -192,12 +192,6 @@ enum binary_type MODULE_GetBinaryType( HANDLE hfile )
          * This will tell us if there is more header information
          * to read or not.
          */
-        /* But before we do we will make sure that header
-         * structure encompasses the "Offset to extended header"
-         * field.
-         */
-        if (header.mz.e_lfanew < sizeof(IMAGE_DOS_HEADER))
-            return BINARY_DOS;
         if (SetFilePointer( hfile, header.mz.e_lfanew, NULL, SEEK_SET ) == -1)
             return BINARY_DOS;
         if (!ReadFile( hfile, magic, sizeof(magic), &len, NULL ) || len != sizeof(magic))