Hi,

So I see that here no libstdc++-6.dll is linked.  Could you try to
rebuild it with additional option '-static'?

Kai

2011/9/21 RAPPAZ Francois <[email protected]>:
> Just in case, here is first lines of the dump of the 32 bits dll that works 
> with java 32 bits.
>
> kbhook32.dll:     file format pei-i386
> kbhook32.dll
> architecture: i386, flags 0x00000133:
> HAS_RELOC, EXEC_P, HAS_SYMS, HAS_LOCALS, D_PAGED
> start address 0x10001060
>
> Characteristics 0x2306
>        executable
>        line numbers stripped
>        32 bit words
>        debugging information removed
>        DLL
>
> Time/Date               Wed Mar 30 15:55:14 2011
> Magic                   010b    (PE32)
> MajorLinkerVersion      2
> MinorLinkerVersion      20
> SizeOfCode              00001600
> SizeOfInitializedData   00001400
> SizeOfUninitializedData 00000200
> AddressOfEntryPoint     00001060
> BaseOfCode              00001000
> BaseOfData              00003000
> ImageBase               10000000
> SectionAlignment        00001000
> FileAlignment           00000200
> MajorOSystemVersion     4
> MinorOSystemVersion     0
> MajorImageVersion       1
> MinorImageVersion       0
> MajorSubsystemVersion   4
> MinorSubsystemVersion   0
> Win32Version            00000000
> SizeOfImage             0000a000
> SizeOfHeaders           00000400
> CheckSum                000083a2
> Subsystem               00000003        (Windows CUI)
> DllCharacteristics      00000000
> SizeOfStackReserve      00200000
> SizeOfStackCommit       00001000
> SizeOfHeapReserve       00100000
> SizeOfHeapCommit        00001000
> LoaderFlags             00000000
> NumberOfRvaAndSizes     00000010
>
> The Data Directory
> Entry 0 00005000 000002ad Export Directory [.edata (or where ever we found 
> it)]
> Entry 1 00006000 00000450 Import Directory [parts of .idata]
> Entry 2 00000000 00000000 Resource Directory [.rsrc]
> Entry 3 00000000 00000000 Exception Directory [.pdata]
> Entry 4 00000000 00000000 Security Directory
> Entry 5 00009000 00000178 Base Relocation Directory [.reloc]
> Entry 6 00000000 00000000 Debug Directory
> Entry 7 00000000 00000000 Description Directory
> Entry 8 00000000 00000000 Special Directory
> Entry 9 00008000 00000018 Thread Storage Directory [.tls]
> Entry a 00000000 00000000 Load Configuration Directory
> Entry b 00000000 00000000 Bound Import Directory
> Entry c 00000000 00000000 Import Address Table Directory
> Entry d 00000000 00000000 Delay Import Directory
> Entry e 00000000 00000000 CLR Runtime Header
> Entry f 00000000 00000000 Reserved
>
> There is an import table in .idata at 0x10006000
>
> The Import Tables (interpreted .idata section contents)
>  vma:            Hint    Time      Forward  DLL       First
>                 Table   Stamp     Chain    Name      Thunk
>  00006000       00006050 00000000 00000000 000063d4 000060e8
>
>        DLL Name: msvcrt.dll
>        vma:  Hint/Ord Member-Name Bound-To
>        6180       52  __dllonexit
>        618e      182  _errno
>        6198      266  _iob
>        61a0      538  _winmajor
>        61ac      583  abort
>        61b4      595  calloc
>        61be      610  fflush
>        61c8      625  free
>        61d0      633  fwrite
>        61da      676  malloc
>        61e4      682  memcpy
>        61ee      684  memset
>        61f8      689  printf
>        6202      748  vfprintf
>
>  00006014       0000608c 00000000 00000000 00006410 00006124
>
>        DLL Name: KERNEL32.dll
>        vma:  Hint/Ord Member-Name Bound-To
>        620e      207  DeleteCriticalSection
>        6226      236  EnterCriticalSection
>        623e      352  FreeLibrary
>        624c      451  GetCurrentThreadId
>        6262      510  GetLastError
>        6272      577  GetProcAddress
>        6284      734  InitializeCriticalSection
>        62a0      814  LeaveCriticalSection
>        62b8      817  LoadLibraryA
>        62c8     1173  TlsGetValue
>        62d6     1213  VirtualProtect
>        62e8     1215  VirtualQuery
>
>  00006028       000060c0 00000000 00000000 00006444 00006158
>
>        DLL Name: USER32.dll
>        vma:  Hint/Ord Member-Name Bound-To
>        62f8       23  CallNextHookEx
>        630a      149  DispatchMessageA
>        631e      293  GetMessageA
>        632c      469  PostThreadMessageA
>        6342      507  SendInput
>        634e      578  SetWindowsHookExA
>        6362      608  TranslateMessage
>        6376      611  UnhookWindowsHookEx
>        638c      626  VkKeyScanA
>
>  0000603c       00000000 00000000 00000000 00000000 00000000
>
> There is an export table in .edata at 0x10005000
>
> The Export Tables (interpreted .edata section contents)
>
> Export Flags                    0
> Time/Date stamp                 4d933642
> Major/Minor                     0/0
> Name                            0000508c kbhook.dll
> Ordinal Base                    1
> Number in:
>        Export Address Table            0000000a
>        [Name Pointer/Ordinal] Table    0000000a
> Table Addresses
>        Export Address Table            00005028
>        Name Pointer Table              00005050
>        Ordinal Table                   0000507
>
> ....
>
> Francois
>
> -----Original Message-----
> From: Kai Tietz [mailto:[email protected]]
> Sent: mardi, 20. septembre 2011 09:59
> To: [email protected]
> Subject: Re: [Mingw-w64-public] Compiling a dll for JNI and java 64 bits
>
> So,
>
> Hmm, could you show me the dump of this DLL with objdump?
>
> Call for this 'x86_64-w64-mingw32-objdump -x <dll-name> >dump.txt', and 
> attach me this file to mail. I am mainly interested in the export-section of 
> this DLL.
>
> Thanks,
> Kai
>
> ------------------------------------------------------------------------------
> All the data continuously generated in your IT infrastructure contains a 
> definitive record of customers, application performance, security threats, 
> fraudulent activity and more. Splunk takes this data and makes sense of it. 
> Business sense. IT sense. Common sense.
> http://p.sf.net/sfu/splunk-d2dcopy1
> _______________________________________________
> Mingw-w64-public mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/mingw-w64-public
>
> ------------------------------------------------------------------------------
> All the data continuously generated in your IT infrastructure contains a
> definitive record of customers, application performance, security
> threats, fraudulent activity and more. Splunk takes this data and makes
> sense of it. Business sense. IT sense. Common sense.
> http://p.sf.net/sfu/splunk-d2dcopy1
> _______________________________________________
> Mingw-w64-public mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/mingw-w64-public
>



-- 
|  (\_/) This is Bunny. Copy and paste
| (='.'=) Bunny into your signature to help
| (")_(") him gain world domination

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Mingw-w64-public mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/mingw-w64-public

Reply via email to