Solved

td32.exe

Posted on 2004-08-25
3
745 Views
Last Modified: 2008-01-09
Hello,
After assembling (with tasm32 /zi file.asm) and linking (with tlink /v file) the td32 displays: "program has no symbol table).
Please,help. I'm using win 98.
Thanks in advance,
xyoavx
0
Comment
Question by:xyoavx
  • 2
3 Comments
 
LVL 11

Assisted Solution

by:dimitry
dimitry earned 500 total points
ID: 11897175
I used next flags and it works:
tasm32 -i..\include -kh32768 -l -ml -m -n -w2 -z -zi hello.asm
ilink32 -v -L..\lib hello.obj, hello.exe,, import32.lib

td32 hello.exe

Please note, that your Include and Lib maybe in other places...
0
 

Author Comment

by:xyoavx
ID: 11907747
Hello dimitry,
Thanks a lot for your help. It works. I would like to use use this opportunity for asking you severl questions.
1. The ilink32 displays the following warning: unable to load dll lnkdfm50 ? is it possible to suppress it ?
2. Why the exe file created by tlink32 /v  doen't work with td32.exe ?
3. How, exactly, tasm32 /m2 file.asm works ? Does it create two files (one in each pass ?)
4. Where can I find explanations about ilink32's switches ?
Thanks in advance,
xyoavx
0
 
LVL 11

Accepted Solution

by:
dimitry earned 500 total points
ID: 11908062
1. It seems like lnkdfm50.dll has some concern to Delphi stuff. I don't know if it is possible to suppress it.
2. I don't have tlink32, I can not check this issue, sorry.
3. tasm32 /m2 does 2 passes to resolve forward references. How it is exactly implemented I think only its developer knows. It may create intermediate file after stage 1, but
    it may create internal structure in the memory as well. Take a look about two pass assebler expalantion:
    www.cs.uiowa.edu/~rus/ Courses/SysSoft/Notes/chap16a2.pdf
4. If you run ilink32.exe without parameters it shows all its flags with short description. More detailed description can be found in file bcb5tool.hlp in your help subdir.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Moving applications to the cloud or switching services to cloud-based ones, is a stressful job.  Here's how you can make it easier.
We have come a long way with backup and data protection — from backing up to floppies, external drives, CDs, Blu-ray, flash drives, SSD drives, and now to the cloud.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now