http://bugs.winehq.org/show_bug.cgi?id=23604 Anastasius Focht <focht(a)gmx.net> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |focht(a)gmx.net --- Comment #1 from Anastasius Focht <focht(a)gmx.net> 2010-07-11 09:10:23 --- Hello, that Shrinker 3.3 wrapped executable "binkplay.exe" works fine here. The page faulting at this place is by design, it's triggered by executing instructions in no-access pages. The Shrinker installed SEH will write out new opcodes and correct the page protection to read-execute, restarting execution thereafter. Either the page protection is not correctly restored on your system after writing out new opcodes, re-triggering the exception ("pushl %ebp" instruction at your faulting EIP indicates opcode already rewritten) or the signal delivery/exception handling is broken. You might have a broken kernel -> post your kernel specs. Regards -- Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email Do not reply to this email, post in Bugzilla using the above URL to reply. ------- You are receiving this mail because: ------- You are watching all bug changes.