I'm having problems with a technique for stepping into an SEH. It worked before, and now it doesn't. I'm stuck getting dropped in ntdll.dll rather than in the handler code.
This is in a DLL btw. The DLL is loaded, then the SEH is set. I would set a memory breakpoint on the executable code section of the DLL, and disable it immediately. Then set an exception breakpoint and run until that breakpoint. Next, enable the memory breakpoint, and finally step into the exception. This used to leave me in the SEH, and with the current snapshot release, it doesn't work properly. I may just be doing something incorrect.
Is there a more stable, or better process to identify the SEH code and to step into it?