From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 5160 invoked by alias); 10 May 2018 21:26:52 -0000 Mailing-List: contact cygwin-help@cygwin.com; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: cygwin-owner@cygwin.com Mail-Followup-To: cygwin@cygwin.com Received: (qmail 5149 invoked by uid 89); 10 May 2018 21:26:51 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-4.7 required=5.0 tests=BAYES_00,GIT_PATCH_2,HTML_MESSAGE,HTTPS_HTTP_MISMATCH,KAM_LOTSOFHASH,KAM_SHORT,RCVD_IN_DNSWL_NONE,SPF_HELO_PASS autolearn=ham version=3.3.2 spammy= X-HELO: NAM03-CO1-obe.outbound.protection.outlook.com Received: from mail-co1nam03on0123.outbound.protection.outlook.com (HELO NAM03-CO1-obe.outbound.protection.outlook.com) (104.47.40.123) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Thu, 10 May 2018 21:26:45 +0000 Received: from SN6PR2101MB1086.namprd21.prod.outlook.com (52.132.115.23) by SN6PR2101MB0893.namprd21.prod.outlook.com (52.132.116.158) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.776.4; Thu, 10 May 2018 21:26:42 +0000 Received: from SN6PR2101MB1086.namprd21.prod.outlook.com ([fe80::38ad:255f:d33:2996]) by SN6PR2101MB1086.namprd21.prod.outlook.com ([fe80::38ad:255f:d33:2996%2]) with mapi id 15.20.0776.004; Thu, 10 May 2018 21:26:42 +0000 From: "Ten Tzen via cygwin" Reply-To: Ten Tzen To: "Steve Carroll (VISUAL STUDIO)" , Stefan Kanthak , "cygwin@cygwin.com" , YongKang Zhu CC: Compiler Crash Subject: Re: Defective "portable executables" distributed/created by Cygwin Date: Thu, 10 May 2018 21:27:00 -0000 Message-ID: References: <1F441795A2584E7684AEFE3C6038B78E@W340>, In-Reply-To: x-ms-publictraffictype: Email x-microsoft-exchange-diagnostics: 1;SN6PR2101MB0893;7:vY8J8Lu4NTgrw6/oXSmEsGMbyAlqVBrCrKWXryLeXSpMKBKnPPKy5+gkt73y1HjXu9g7VEszUL9wpBetVdqfFyt8nHMHf/eQ/0LRI7wrsCUSx8GeOScYMvKVnNk0dsSBvC+dGD/2U4Vdtv17E+i92bqGS14FBC2v4WXrVGylxp3f2EWHkpugtBbm+CvgNDDK/A7YXxTE4gKbRVeftJAW8kV4oGvjQrs/st0hXyPmiL0YFuO+sCTD4PxWVhlv18bx;20:mNLh1f7zzdpD5EFMngFiyyFEIsQG/+gXrbpWydvW9gYSwjpXzMbSA4tQTnEUDX0gMeH/pdndNwOeUDMoHlM3EbD8gawM94q+zvl9/KZEeQUiHlLVeyI9yIzpioMBm58V4XQrnSuqTiCCKRvakwhBNw4Ft/EpqfVR2Sqi2NbqdZI= x-ms-exchange-antispam-srfa-diagnostics: SOS; x-ms-office365-filtering-ht: Tenant x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(7020095)(4652020)(5600026)(48565401081)(2017052603328)(7193020);SRVR:SN6PR2101MB0893; x-ms-traffictypediagnostic: SN6PR2101MB0893: authentication-results: spf=none (sender IP is ) smtp.mailfrom=tentzen@microsoft.com; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(28532068793085)(158342451672863)(89211679590171)(189930954265078)(81439100147899)(219752817060721)(265313219721884); x-ms-exchange-senderadcheck: 1 x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(3002001)(3231254)(2018427008)(944501410)(52105095)(10201501046)(6055026)(149027)(150027)(6041310)(20161123564045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123558120)(6072148)(201708071742011);SRVR:SN6PR2101MB0893;BCL:0;PCL:0;RULEID:;SRVR:SN6PR2101MB0893; x-forefront-prvs: 066898046A x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(396003)(366004)(39380400002)(39860400002)(346002)(376002)(189003)(199004)(13464003)(110136005)(8936002)(105586002)(6246003)(66066001)(55016002)(107886003)(2900100001)(4326008)(3846002)(14454004)(606006)(6116002)(81166006)(6306002)(33656002)(8676002)(236005)(1511001)(53936002)(2906002)(106356001)(97736004)(81156014)(22452003)(2501003)(9686003)(53946003)(86612001)(478600001)(7736002)(54896002)(5250100002)(68736007)(6636002)(11346002)(446003)(8990500004)(229853002)(7696005)(3660700001)(74316002)(102836004)(5660300001)(6436002)(99286004)(59450400001)(10290500003)(76176011)(575784001)(86362001)(10090500001)(53546011)(6506007)(26005)(476003)(486006)(3280700002)(25786009)(316002)(505234006)(460985005);DIR:OUT;SFP:1102;SCL:1;SRVR:SN6PR2101MB0893;H:SN6PR2101MB1086.namprd21.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;MX:1;A:1; received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts) x-microsoft-antispam-message-info: 0UY2slFXcqpXmyjlwJnAfcT5N7PCIo7ALxAEuFsV+pKg9cSNeEpZRgjgsWqXs/xEmoimhyZjtLzwGgJxGSErvawe5AIUxc614SIzg9arYDAzoqh59EuIMLnnd6KmJOf+s8pzQ7zIQFRh0dREG+fG//bs2+hinFWxpXic04hRg/T3vasWSAiC+kLjeOhDGflT spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM MIME-Version: 1.0 X-MS-Office365-Filtering-Correlation-Id: 9fca9bb2-4773-43a5-b709-08d5b6bcb97c X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9fca9bb2-4773-43a5-b709-08d5b6bcb97c X-MS-Exchange-CrossTenant-originalarrivaltime: 10 May 2018 21:26:42.2776 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR2101MB0893 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-SW-Source: 2018-05/txt/msg00132.txt.bz2 +Yongkang Get Outlook for iOS ________________________________ From: Steve Carroll (VISUAL STUDIO) Sent: Thursday, May 10, 2018 3:29:24 PM To: Stefan Kanthak; cygwin@cygwin.com; Ten Tzen Cc: Compiler Crash Subject: RE: Defective "portable executables" distributed/created by Cygwin @Ten Tzen can you take a look? -----Original Message----- From: Stefan Kanthak Sent: Thursday, May 10, 2018 11:30 AM To: cygwin@cygwin.com Cc: Compiler Crash Subject: Defective "portable executables" distributed/created by Cygwin Hi @ll, the "portable executables" distributed by Cygwin (and of course those creat= ed with Cygwin's GCC toolchain too) have INVALID/ILLEGAL headers: 0. Microsoft's DUMPBIN.EXE alias LINK.EXE /DUMP aborts with "access violation" (see below) on almost all Cygwin binaries! 1. they use INVALID/ILLEGAL section names like "/4" or "/14", upon which Microsoft's DUMPBIN.EXE alias LINK.EXE /DUMP stops enumerating the section headers (see below)! From the PE format specification : | Offset Size Field Description | 0 8 Name An 8-byte, null-padded UTF-8 encoded string. | If the string is exactly 8 characters long, | there is no terminating null. For longer names, | this field contains a slash (/) that is followed | by an ASCII representation of a decimal number | that is an offset into the string table. | Executable images do not use a string table and | do ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | not support section names longer than 8 characters. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | Long names in object files are truncated if they ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | are emitted to an executable file. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2. despite no COFF symbol table and a symbol count of 0 (in words: ZERO!) they specify the "PointerToSymbolTable" (see below)! From the PE format specification : | Offset Size Field Description | 8 4 PointerToSymbolTable The file offset of the COFF symbol | table, or zero if no COFF symbol | table is present. This value should | be zero for an image because COFF | debugging information is deprecated. Please fix your tools! regards Stefan Kanthak =3D=3D=3D output from LINK.EXE /DUMP bash.exe =3D=3D=3D Microsoft (R) COFF/PE Dumper Version 10.00.40219.386 Copyright (C) Microsof= t Corporation. All rights reserved. Dump of file bash.exe File Type: EXECUTABLE IMAGE LINK : fatal error LNK1000: Internal error during DumpSections Version 10.00.40219.386 ExceptionCode =3D C0000005 ExceptionFlags =3D 00000000 ExceptionAddress =3D 00427FE0 (00400000) "C:\Program Files\Micros= oft Visual Studio 2010\VC\bin\link.exe" NumberParameters =3D 00000002 ExceptionInformation[ 0] =3D 00000000 ExceptionInformation[ 1] =3D 00000004 CONTEXT: Eax =3D 40000040 Esp =3D 0012E740 Ebx =3D 014B53C0 Ebp =3D 0012E768 Ecx =3D 00000004 Esi =3D 00000004 Edx =3D 00404164 Edi =3D 0000014C Eip =3D 00427FE0 EFlags =3D 00010246 SegCs =3D 0000001B SegDs =3D 00000023 SegSs =3D 00000023 SegEs =3D 00000023 SegFs =3D 0000003B SegGs =3D 00000000 Dr0 =3D 00000000 Dr3 =3D 00000000 Dr1 =3D 00000000 Dr6 =3D 00000000 Dr2 =3D 00000000 Dr7 =3D 00000000 =3D=3D=3D output from LINK.EXE /DUMP /HEADERS bash.exe =3D=3D=3D Microsoft (R) COFF/PE Dumper Version 10.00.40219.386 Copyright (C) Microsof= t Corporation. All rights reserved. Dump of file bash.exe PE signature found File Type: EXECUTABLE IMAGE FILE HEADER VALUES 14C machine (x86) B number of sections 3000 time date stamp Thu Jan 01 04:24:48 1970 C2600 file pointer to symbol table 0 number of symbols E0 size of optional header 32E characteristics Executable Line numbers stripped Symbols stripped Application can handle large (>2GB) addresses 32 bit word machine Debug information stripped OPTIONAL HEADER VALUES 10B magic # (PE32) 2.25 linker version 7C800 size of code C2200 size of initialized data 9E00 size of uninitialized data 1000 entry point (00401000) 1000 base of code 7E000 base of data 400000 image base (00400000 to 004D2FFF) 1000 section alignment 200 file alignment 4.00 operating system version 1.00 image version 4.00 subsystem version 0 Win32 version D3000 size of image 400 size of headers C85A6 checksum 3 subsystem (Windows CUI) 8000 DLL characteristics Terminal Server Aware 200000 size of stack reserve 1000 size of stack commit 100000 size of heap reserve 1000 size of heap commit 0 loader flags 10 number of directories BB000 [ A14D] RVA [size] of Export Directory C6000 [ 2CB4] RVA [size] of Import Directory C9000 [ 4E8] RVA [size] of Resource Directory 0 [ 0] RVA [size] of Exception Directory 0 [ 0] RVA [size] of Certificates Directory CA000 [ 7680] RVA [size] of Base Relocation Directory 9C000 [ 1C] RVA [size] of Debug Directory 0 [ 0] RVA [size] of Architecture Directory 0 [ 0] RVA [size] of Global Pointer Directory 0 [ 0] RVA [size] of Thread Storage Directory 0 [ 0] RVA [size] of Load Configuration Directory 0 [ 0] RVA [size] of Bound Import Directory C66B0 [ 624] RVA [size] of Import Address Table Directory 0 [ 0] RVA [size] of Delay Import Directory 0 [ 0] RVA [size] of COM Descriptor Directory 0 [ 0] RVA [size] of Reserved Directory SECTION HEADER #1 .text name 7C704 virtual size 1000 virtual address (00401000 to 0047D703) 7C800 size of raw data 400 file pointer to raw data (00000400 to 0007CBFF) 0 file pointer to relocation table 0 file pointer to line numbers 0 number of relocations 0 number of line numbers 60500060 flags Code Initialized Data RESERVED - UNKNOWN RESERVED - UNKNOWN Execute Read SECTION HEADER #2 .data name 1B24 virtual size 7E000 virtual address (0047E000 to 0047FB23) 1C00 size of raw data 7CC00 file pointer to raw data (0007CC00 to 0007E7FF) 0 file pointer to relocation table 0 file pointer to line numbers 0 number of relocations 0 number of line numbers C0600040 flags Initialized Data RESERVED - UNKNOWN RESERVED - UNKNOWN Read Write SECTION HEADER #3 .rdata name 1B0C0 virtual size 80000 virtual address (00480000 to 0049B0BF) 1B200 size of raw data 7E800 file pointer to raw data (0007E800 to 000999FF) 0 file pointer to relocation table 0 file pointer to line numbers 0 number of relocations 0 number of line numbers 40600040 flags Initialized Data RESERVED - UNKNOWN RESERVED - UNKNOWN Read Only SECTION HEADER #4 .buildid name 35 virtual size 9C000 virtual address (0049C000 to 0049C034) 200 size of raw data 99A00 file pointer to raw data (00099A00 to 00099BFF) 0 file pointer to relocation table 0 file pointer to line numbers 0 number of relocations 0 number of line numbers 40300040 flags Initialized Data RESERVED - UNKNOWN RESERVED - UNKNOWN Read Only Debug Directories Time Type Size RVA Pointer -------- ------ -------- -------- -------- 00000000 cv 19 0009C01C 99A1C Format: RSDS, {FD1EEED9-A= 50C-F670-E4AA-B9EF2C1094CA}, 1, LINK : fatal error LNK1000: Internal error during DumpDebugDirectory Version 10.00.40219.386 ExceptionCode =3D C0000005 ExceptionFlags =3D 00000000 ExceptionAddress =3D 00427FE0 (00400000) "C:\Program Files\Micros= oft Visual Studio 2010\VC\bin\link.exe" NumberParameters =3D 00000002 ExceptionInformation[ 0] =3D 00000000 ExceptionInformation[ 1] =3D 00000004 CONTEXT: Eax =3D 40000040 Esp =3D 0012E740 Ebx =3D 014B53C0 Ebp =3D 0012E768 Ecx =3D 00000004 Esi =3D 00000004 Edx =3D 00404164 Edi =3D 0000014C Eip =3D 00427FE0 EFlags =3D 00010246 SegCs =3D 0000001B SegDs =3D 00000023 SegSs =3D 00000023 SegEs =3D 00000023 SegFs =3D 0000003B SegGs =3D 00000000 Dr0 =3D 00000000 Dr3 =3D 00000000 Dr1 =3D 00000000 Dr6 =3D 00000000 Dr2 =3D 00000000 Dr7 =3D 00000000 =3D=3D=3D hexdump from offset 099a10 of bash.exe: CV_PDB_INFO70 structure = =3D=3D=3D 099a10 19 00 00 00 1c c0 09 00 1c 9a 09 00 52 53 44 53 ............RSDS 099a20 d9 ee 1e fd 0c a5 70 f6 e4 aa b9 ef 2c 10 94 ca ......p.....,... 099a30 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ =3D=3D=3D hexdump from offset 0c2600 of bash.exe, right before EOF: COFF symbol table with 0 entries, followed by COFF string table =3D=3D= =3D 0c2600 1d 00 00 00 2e 65 68 5f 66 72 61 6d 65 00 2e 67 .....eh_frame..g 0c2610 6e 75 5f 64 65 62 75 67 6c 69 6e 6b 00 nu_debuglink. =3D=3D=3D hexdump of first kB from bash.exe =3D=3D=3D 000000 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 MZ.............. 000010 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@....... 000020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000030 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 ................ 000040 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 ........!..L.!Th 000050 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f is program canno 000060 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 t be run in DOS 000070 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 mode....$....... 000080 50 45 00 00 4c 01 0b 00 00 30 00 00 00 26 0c 00 PE..L....0...&.. 000090 00 00 00 00 e0 00 2e 03 0b 01 02 19 00 c8 07 00 ................ 0000a0 00 22 0c 00 00 9e 00 00 00 10 00 00 00 10 00 00 .".............. 0000b0 00 e0 07 00 00 00 40 00 00 10 00 00 00 02 00 00 ......@......... 0000c0 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 ................ 0000d0 00 30 0d 00 00 04 00 00 a6 85 0c 00 03 00 00 80 .0.............. 0000e0 00 00 20 00 00 10 00 00 00 00 10 00 00 10 00 00 .. ............. 0000f0 00 00 00 00 10 00 00 00 00 b0 0b 00 4d a1 00 00 ............M... 000100 00 60 0c 00 b4 2c 00 00 00 90 0c 00 e8 04 00 00 .`...,.......... 000110 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000120 00 a0 0c 00 80 76 00 00 00 c0 09 00 1c 00 00 00 .....v.......... 000130 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000140 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000150 00 00 00 00 00 00 00 00 b0 66 0c 00 24 06 00 00 .........f..$... 000160 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000170 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 .........text... 000180 04 c7 07 00 00 10 00 00 00 c8 07 00 00 04 00 00 ................ 000190 00 00 00 00 00 00 00 00 00 00 00 00 60 00 50 60 ............`.P` 0001a0 2e 64 61 74 61 00 00 00 24 1b 00 00 00 e0 07 00 .data...$....... 0001b0 00 1c 00 00 00 cc 07 00 00 00 00 00 00 00 00 00 ................ 0001c0 00 00 00 00 40 00 60 c0 2e 72 64 61 74 61 00 00 ....@.`..rdata.. 0001d0 c0 b0 01 00 00 00 08 00 00 b2 01 00 00 e8 07 00 ................ 0001e0 00 00 00 00 00 00 00 00 00 00 00 00 40 00 60 40 ............@.`@ 0001f0 2e 62 75 69 6c 64 69 64 35 00 00 00 00 c0 09 00 .buildid5....... 000200 00 02 00 00 00 9a 09 00 00 00 00 00 00 00 00 00 ................ 000210 00 00 00 00 40 00 30 40 2f 34 00 00 00 00 00 00 ....@.0@/4...... 000220 c0 39 01 00 00 d0 09 00 00 3a 01 00 00 9c 09 00 .9.......:...... 000230 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 40 ............@.0@ 000240 2e 62 73 73 00 00 00 00 40 9d 00 00 00 10 0b 00 .bss....@....... 000250 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000260 00 00 00 00 80 00 60 c0 2e 65 64 61 74 61 00 00 ......`..edata.. 000270 4d a1 00 00 00 b0 0b 00 00 a2 00 00 00 d6 0a 00 M............... 000280 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 40 ............@.0@ 000290 2e 69 64 61 74 61 00 00 b4 2c 00 00 00 60 0c 00 .idata...,...`.. 0002a0 00 2e 00 00 00 78 0b 00 00 00 00 00 00 00 00 00 .....x.......... 0002b0 00 00 00 00 40 00 30 c0 2e 72 73 72 63 00 00 00 ....@.0..rsrc... 0002c0 e8 04 00 00 00 90 0c 00 00 06 00 00 00 a6 0b 00 ................ 0002d0 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 c0 ............@.0. 0002e0 2e 72 65 6c 6f 63 00 00 80 76 00 00 00 a0 0c 00 .reloc...v...... 0002f0 00 78 00 00 00 ac 0b 00 00 00 00 00 00 00 00 00 .x.............. 000300 00 00 00 00 40 00 30 42 2f 31 34 00 00 00 00 00 ....@.0B/14..... 000310 14 00 00 00 00 20 0d 00 00 02 00 00 00 24 0c 00 ..... .......$.. 000320 00 00 00 00 00 00 00 00 00 00 00 00 40 00 30 40 ............@.0@ 000330 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000340 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000350 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000360 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000370 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000380 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 000390 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0003a0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0003b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0003c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0003d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0003e0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 0003f0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ =3D=3D=3D output from an alternative PE dumper which doesn't bail out when it encounters the illegal section names "/4" and "/14", and enumerates the COFF string table (although obsolete) =3D=3D=3D .text: Virtual address and size =3D 0x00001000, 0x0007C704 File offset and raw size =3D 0x00000400, 0x0007C800 Characteristics =3D 0x60500060 .data: Virtual address and size =3D 0x0007E000, 0x00001B24 File offset and raw size =3D 0x0007CC00, 0x00001C00 Characteristics =3D 0xC0600040 .rdata: Virtual address and size =3D 0x00080000, 0x0001B0C0 File offset and raw size =3D 0x0007E800, 0x0001B200 Characteristics =3D 0x40600040 .buildid: Virtual address and size =3D 0x0009C000, 0x00000035 File offset and raw size =3D 0x00099A00, 0x00000200 Characteristics =3D 0x40300040 /4: Virtual address and size =3D 0x0009D000, 0x000139C0 File offset and raw size =3D 0x00099C00, 0x00013A00 Characteristics =3D 0x40300040 .bss: Virtual address and size =3D 0x000B1000, 0x00009D40 File offset and raw size =3D 0x00000000, 0x00000000 Characteristics =3D 0xC0600080 .edata: Virtual address and size =3D 0x000BB000, 0x0000A14D File offset and raw size =3D 0x000AD600, 0x0000A200 Characteristics =3D 0x40300040 .idata: Virtual address and size =3D 0x000C6000, 0x00002CB4 File offset and raw size =3D 0x000B7800, 0x00002E00 Characteristics =3D 0xC0300040 .rsrc: Virtual address and size =3D 0x000C9000, 0x000004E8 File offset and raw size =3D 0x000BA600, 0x00000600 Characteristics =3D 0xC0300040 .reloc: Virtual address and size =3D 0x000CA000, 0x00007680 File offset and raw size =3D 0x000BAC00, 0x00007800 Characteristics =3D 0x42300040 /14: Virtual address and size =3D 0x000D2000, 0x00000014 File offset and raw size =3D 0x000C2400, 0x00000200 Characteristics =3D 0x40300040 COFF string table: /4 =3D .eh_frame /14 =3D .gnu_debuglink ... Export directory: Characteristics =3D 0x00000000 Time/date stamp =3D 0x588B9AAB Version =3D 0.0 Module name =3D bash.exe Base of ordinals =3D 1 Number of functions =3D 1532 Number of names =3D 1532 Array of functions =3D 0x000BB028 Array of names =3D 0x000BC818 Array of name ordinals =3D 0x000BE008 Named exports: 1 0 0x000B10F0 EOF_Reached 2 1 0x000B65E0 SB ... Debug directory: Debug directory entry: Characteristics =3D 0x00000000 Time/date stamp =3D 0x00000000 Version =3D 0.0 Type =3D 2 (Codeview) Address of data =3D 0x0009C01C Offset of data =3D 0x00099A1C Size of data =3D 0x00000019 Format =3D RSDS Signature =3D {FD1EEED9-A50C-F670-E4AA-B9EF2C1094CA} Age =3D 1 Filename =3D -- Problem reports: http://cygwin.com/problems.html FAQ: http://cygwin.com/faq/ Documentation: http://cygwin.com/docs.html Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple