http://bugs.winehq.org/show_bug.cgi?id=30297
--- Comment #4 from Anastasius Focht focht@gmx.net 2013-10-03 15:06:05 CDT --- Hello folks,
the following trace shows the incorrect delta:
--- snip --- ... 0042:trace:module:load_native_dll Trying native dll L"C:\users\focht\Temp\JIntellitype.dll" 0042:trace:virtual:NtMapViewOfSection handle=0x330 process=0xffffffff addr=(nil) off=000000000 size=0 access=20 0042:trace:virtual:map_view got mem in reserved area 0x4560000-0x4571000 0042:trace:virtual:VIRTUAL_DumpView View: 0x4560000 - 0x4570fff (anonymous) 0042:trace:virtual:VIRTUAL_DumpView 0x4560000 - 0x4570fff c-rWx 0042:trace:module:map_image mapped PE file at 0x4560000-0x4571000 0042:trace:virtual:map_file_into_view forcing exec permission on mapping 0x4560000-0x45603ff 0042:trace:module:map_image mapping section .text at 0x4561000 off 400 size 4e00 virt 4d74 flags 60000060 0042:trace:virtual:map_file_into_view forcing exec permission on mapping 0x4561000-0x4565dff 0042:trace:module:map_image clearing 0x4565e00 - 0x4566000 0042:trace:module:map_image mapping section .data at 0x4566000 off 5200 size 200 virt 40 flags c0000040 0042:trace:virtual:map_file_into_view forcing exec permission on mapping 0x4566000-0x45661ff 0042:trace:module:map_image clearing 0x4566200 - 0x4567000 0042:trace:module:map_image mapping section .rdata at 0x4567000 off 5400 size 600 virt 58c flags 40000040 0042:trace:virtual:map_file_into_view forcing exec permission on mapping 0x4567000-0x45675ff 0042:trace:module:map_image clearing 0x4567600 - 0x4568000 0042:trace:module:map_image mapping section .bss at 0x4568000 off 0 size 0 virt 4140 flags c0000080 0042:trace:module:map_image mapping section .edata at 0x456d000 off 5a00 size 600 virt 47d flags 40000040 0042:trace:virtual:map_file_into_view forcing exec permission on mapping 0x456d000-0x456d5ff 0042:trace:module:map_image clearing 0x456d600 - 0x456e000 0042:trace:module:map_image mapping section .idata at 0x456e000 off 6000 size 800 virt 624 flags c0000040 0042:trace:virtual:map_file_into_view forcing exec permission on mapping 0x456e000-0x456e7ff 0042:trace:module:map_image clearing 0x456e800 - 0x456f000 0042:trace:module:map_image mapping section .rsrc at 0x456f000 off 6800 size 400 virt 3bc flags c0000040 0042:trace:virtual:map_file_into_view forcing exec permission on mapping 0x456f000-0x456f3ff 0042:trace:module:map_image clearing 0x456f400 - 0x4570000 0042:trace:module:map_image mapping section .reloc at 0x4570000 off 6c00 size a00 virt 848 flags 42000040 0042:trace:virtual:map_file_into_view forcing exec permission on mapping 0x4570000-0x45709ff 0042:trace:module:map_image clearing 0x4570a00 - 0x4571000 0042:trace:module:map_image relocating from 0x64e80000-0x64e91000 to 0x4560000-0x4571000 0042:trace:module:LdrProcessRelocationBlock type=3, va=0x4561043, delta=0x9f6e0000 0042:trace:module:LdrProcessRelocationBlock type=3, va=0x456104d, delta=0x9f6e0000 0042:trace:module:LdrProcessRelocationBlock type=3, va=0x4561071, delta=0x9f6e0000 ... --- snip ---
I added a trace to LdrProcessRelocationBlock().
Type 3 -> IMAGE_REL_BASED_HIGHLOW
Regards