Just in case, here is first lines of the dump of the 32 bits dll that works 
with java 32 bits.

kbhook32.dll:     file format pei-i386
kbhook32.dll
architecture: i386, flags 0x00000133:
HAS_RELOC, EXEC_P, HAS_SYMS, HAS_LOCALS, D_PAGED
start address 0x10001060

Characteristics 0x2306
        executable
        line numbers stripped
        32 bit words
        debugging information removed
        DLL

Time/Date               Wed Mar 30 15:55:14 2011
Magic                   010b    (PE32)
MajorLinkerVersion      2
MinorLinkerVersion      20
SizeOfCode              00001600
SizeOfInitializedData   00001400
SizeOfUninitializedData 00000200
AddressOfEntryPoint     00001060
BaseOfCode              00001000
BaseOfData              00003000
ImageBase               10000000
SectionAlignment        00001000
FileAlignment           00000200
MajorOSystemVersion     4
MinorOSystemVersion     0
MajorImageVersion       1
MinorImageVersion       0
MajorSubsystemVersion   4
MinorSubsystemVersion   0
Win32Version            00000000
SizeOfImage             0000a000
SizeOfHeaders           00000400
CheckSum                000083a2
Subsystem               00000003        (Windows CUI)
DllCharacteristics      00000000
SizeOfStackReserve      00200000
SizeOfStackCommit       00001000
SizeOfHeapReserve       00100000
SizeOfHeapCommit        00001000
LoaderFlags             00000000
NumberOfRvaAndSizes     00000010

The Data Directory
Entry 0 00005000 000002ad Export Directory [.edata (or where ever we found it)]
Entry 1 00006000 00000450 Import Directory [parts of .idata]
Entry 2 00000000 00000000 Resource Directory [.rsrc]
Entry 3 00000000 00000000 Exception Directory [.pdata]
Entry 4 00000000 00000000 Security Directory
Entry 5 00009000 00000178 Base Relocation Directory [.reloc]
Entry 6 00000000 00000000 Debug Directory
Entry 7 00000000 00000000 Description Directory
Entry 8 00000000 00000000 Special Directory
Entry 9 00008000 00000018 Thread Storage Directory [.tls]
Entry a 00000000 00000000 Load Configuration Directory
Entry b 00000000 00000000 Bound Import Directory
Entry c 00000000 00000000 Import Address Table Directory
Entry d 00000000 00000000 Delay Import Directory
Entry e 00000000 00000000 CLR Runtime Header
Entry f 00000000 00000000 Reserved

There is an import table in .idata at 0x10006000

The Import Tables (interpreted .idata section contents)
 vma:            Hint    Time      Forward  DLL       First
                 Table   Stamp     Chain    Name      Thunk
 00006000       00006050 00000000 00000000 000063d4 000060e8

        DLL Name: msvcrt.dll
        vma:  Hint/Ord Member-Name Bound-To
        6180       52  __dllonexit
        618e      182  _errno
        6198      266  _iob
        61a0      538  _winmajor
        61ac      583  abort
        61b4      595  calloc
        61be      610  fflush
        61c8      625  free
        61d0      633  fwrite
        61da      676  malloc
        61e4      682  memcpy
        61ee      684  memset
        61f8      689  printf
        6202      748  vfprintf

 00006014       0000608c 00000000 00000000 00006410 00006124

        DLL Name: KERNEL32.dll
        vma:  Hint/Ord Member-Name Bound-To
        620e      207  DeleteCriticalSection
        6226      236  EnterCriticalSection
        623e      352  FreeLibrary
        624c      451  GetCurrentThreadId
        6262      510  GetLastError
        6272      577  GetProcAddress
        6284      734  InitializeCriticalSection
        62a0      814  LeaveCriticalSection
        62b8      817  LoadLibraryA
        62c8     1173  TlsGetValue
        62d6     1213  VirtualProtect
        62e8     1215  VirtualQuery

 00006028       000060c0 00000000 00000000 00006444 00006158

        DLL Name: USER32.dll
        vma:  Hint/Ord Member-Name Bound-To
        62f8       23  CallNextHookEx
        630a      149  DispatchMessageA
        631e      293  GetMessageA
        632c      469  PostThreadMessageA
        6342      507  SendInput
        634e      578  SetWindowsHookExA
        6362      608  TranslateMessage
        6376      611  UnhookWindowsHookEx
        638c      626  VkKeyScanA

 0000603c       00000000 00000000 00000000 00000000 00000000

There is an export table in .edata at 0x10005000

The Export Tables (interpreted .edata section contents)

Export Flags                    0
Time/Date stamp                 4d933642
Major/Minor                     0/0
Name                            0000508c kbhook.dll
Ordinal Base                    1
Number in:
        Export Address Table            0000000a
        [Name Pointer/Ordinal] Table    0000000a
Table Addresses
        Export Address Table            00005028
        Name Pointer Table              00005050
        Ordinal Table                   0000507

....

Francois

-----Original Message-----
From: Kai Tietz [mailto:[email protected]] 
Sent: mardi, 20. septembre 2011 09:59
To: [email protected]
Subject: Re: [Mingw-w64-public] Compiling a dll for JNI and java 64 bits

So,

Hmm, could you show me the dump of this DLL with objdump?

Call for this 'x86_64-w64-mingw32-objdump -x <dll-name> >dump.txt', and attach 
me this file to mail. I am mainly interested in the export-section of this DLL.

Thanks,
Kai

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a 
definitive record of customers, application performance, security threats, 
fraudulent activity and more. Splunk takes this data and makes sense of it. 
Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Mingw-w64-public mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/mingw-w64-public

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Mingw-w64-public mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/mingw-w64-public

Reply via email to