http://bugs.winehq.org/show_bug.cgi?id=23604
Anastasius Focht focht@gmx.net changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |focht@gmx.net
--- Comment #1 from Anastasius Focht focht@gmx.net 2010-07-11 09:10:23 --- Hello,
that Shrinker 3.3 wrapped executable "binkplay.exe" works fine here.
The page faulting at this place is by design, it's triggered by executing instructions in no-access pages. The Shrinker installed SEH will write out new opcodes and correct the page protection to read-execute, restarting execution thereafter.
Either the page protection is not correctly restored on your system after writing out new opcodes, re-triggering the exception ("pushl %ebp" instruction at your faulting EIP indicates opcode already rewritten) or the signal delivery/exception handling is broken.
You might have a broken kernel -> post your kernel specs.
Regards