⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 kernkitl.map

📁 针对Intel Xscale PXA255的WinCE boot loader源代码包!极具参考价值!
💻 MAP
📖 第 1 页 / 共 5 页
字号:
 0001:0001b040       SC_OpenDatabaseEx          8c59c040 f   nk:kmisc.obj
 0001:0001b0d4       SC_SeekDatabase            8c59c0d4 f   nk:kmisc.obj
 0001:0001b19c       SC_ReadRecordPropsEx       8c59c19c f   nk:kmisc.obj
 0001:0001b27c       SC_CreateLocaleView        8c59c27c f   nk:kmisc.obj
 0001:0001b360       VerifyAccess               8c59c360 f   nk:virtmem.obj
 0001:0001b4b0       IsROM                      8c59c4b0 f   nk:virtmem.obj
 0001:0001b650       IsStackVA                  8c59c650 f   nk:virtmem.obj
 0001:0001b714       MakePagePerms              8c59c714 f   nk:virtmem.obj
 0001:0001b7ec       ProtectFromPerms           8c59c7ec f   nk:virtmem.obj
 0001:0001b834       FindFirstBlock             8c59c834 f   nk:virtmem.obj
 0001:0001b870       ScanRegion                 8c59c870 f   nk:virtmem.obj
 0001:0001ba30       DecommitPages              8c59ca30 f   nk:virtmem.obj
 0001:0001bcd8       FreePageList               8c59ccd8 f   nk:virtmem.obj
 0001:0001bd00       ReleaseRegion              8c59cd00 f   nk:virtmem.obj
 0001:0001bd64       IsAccessOK                 8c59cd64 f   nk:virtmem.obj
 0001:0001bde8       DbgVerify                  8c59cde8 f   nk:virtmem.obj
 0001:0001bf34       GetKPagePMB                8c59cf34 f   nk:virtmem.obj
 0001:0001bf78       InitNKSection              8c59cf78 f   nk:virtmem.obj
 0001:0001bfa8       DeleteSection              8c59cfa8 f   nk:virtmem.obj
 0001:0001c0c8       CreateSection              8c59d0c8 f   nk:virtmem.obj
 0001:0001c1b8       CreateMapperSection        8c59d1b8 f   nk:virtmem.obj
 0001:0001c2bc       DeleteMapperSection        8c59d2bc f   nk:virtmem.obj
 0001:0001c2d8       DoVirtualAlloc             8c59d2d8 f   nk:virtmem.obj
 0001:0001cbb0       SC_VirtualAlloc            8c59dbb0 f   nk:virtmem.obj
 0001:0001cbd4       SC_VirtualFree             8c59dbd4 f   nk:virtmem.obj
 0001:0001ce98       DoVirtualCopy              8c59de98 f   nk:virtmem.obj
 0001:0001d2b4       SC_VirtualCopy             8c59e2b4 f   nk:virtmem.obj
 0001:0001d308       SC_VirtualSetAttributes    8c59e308 f   nk:virtmem.obj
 0001:0001d4ac       SC_VirtualProtect          8c59e4ac f   nk:virtmem.obj
 0001:0001d6e4       SC_VirtualQuery            8c59e6e4 f   nk:virtmem.obj
 0001:0001d9f0       IsCommittedSecureSlot      8c59e9f0 f   nk:virtmem.obj
 0001:0001da54       DoLockPages                8c59ea54 f   nk:virtmem.obj
 0001:0001de50       SC_LockPages               8c59ee50 f   nk:virtmem.obj
 0001:0001dea4       DoUnlockPages              8c59eea4 f   nk:virtmem.obj
 0001:0001e068       SC_UnlockPages             8c59f068 f   nk:virtmem.obj
 0001:0001e0bc       AutoCommit                 8c59f0bc f   nk:virtmem.obj
 0001:0001e254       GuardCommit                8c59f254 f   nk:virtmem.obj
 0001:0001e2e8       ProcessPageFault           8c59f2e8 f   nk:virtmem.obj
 0001:0001e508       CELOG_SystemPage           8c59f508 f i nk:virtmem.obj
 0001:0001e574       ProfInit                   8c59f574 f   nk:virtmem.obj
 0001:0001e5c4       SC_GetProfileBaseAddress   8c59f5c4 f   nk:virtmem.obj
 0001:0001e658       SC_SetProfilePortAddress   8c59f658 f   nk:virtmem.obj
 0001:0001e79c       SC_AllocPhysMem            8c59f79c f   nk:virtmem.obj
 0001:0001e868       SC_FreePhysMem             8c59f868 f   nk:virtmem.obj
 0001:0001e8c8       GetVMInfo                  8c59f8c8 f   nk:virtmem.obj
 0001:0001e9fc       SC_ProfileSyscall          8c59f9fc f   nk:profiler.obj
 0001:0001ea00       SC_TurnOnProfiling         8c59fa00 f   nk:profiler.obj
 0001:0001ea24       SC_TurnOffProfiling        8c59fa24 f   nk:profiler.obj
 0001:0001ea4c       SC_DumpKCallProfile        8c59fa4c f   nk:profiler.obj
 0001:0001ea50       Phys2VirtWrapper           8c59fa50 f   nk:profiler.obj
 0001:0001ea60       InSysCallWrapper           8c59fa60 f   nk:profiler.obj
 0001:0001ea70       KernelLibIoControl_Verifier 8c59fa70 f   nk:profiler.obj
 0001:0001ebec       KernelLibIoControl_CeLog   8c59fbec f   nk:profiler.obj
 0001:0001edec       CeLogThreadMigrate         8c59fdec f   nk:profiler.obj
 0001:0001ee40       SC_CeLogData               8c59fe40 f   nk:profiler.obj
 0001:0001eec8       SC_CeLogSetZones           8c59fec8 f   nk:profiler.obj
 0001:0001ef00       SC_CeLogGetZones           8c59ff00 f   nk:profiler.obj
 0001:0001efd8       SC_CeLogReSync             8c59ffd8 f   nk:profiler.obj
 0001:0001f3c4       lowerW                     8c5a03c4 f   nk:loader.obj
 0001:0001f3f0       strcmponeiW                8c5a03f0 f   nk:loader.obj
 0001:0001f458       strcmpdllnameW             8c5a0458 f   nk:loader.obj
 0001:0001f53c       strcmpiAandW               8c5a053c f   nk:loader.obj
 0001:0001f5c0       kstrncmpi                  8c5a05c0 f   nk:loader.obj
 0001:0001f630       kstrcmpi                   8c5a0630 f   nk:loader.obj
 0001:0001f684       kstrcpyW                   8c5a0684 f   nk:loader.obj
 0001:0001f6bc       FindOptr                   8c5a06bc f   nk:loader.obj
 0001:0001f758       ChkDebug                   8c5a0758 f   nk:loader.obj
 0001:0001f7e0       ReadExtImageInfo           8c5a07e0 f   nk:loader.obj
 0001:0001f834       VerifyBinary               8c5a0834 f   nk:loader.obj
 0001:0001f9ec       SetROMDllBase              8c5a09ec f   nk:loader.obj
 0001:0001fc30       OpenExe                    8c5a0c30 f   nk:loader.obj
 0001:0001fc5c       OpenFileFromFilesys        8c5a0c5c f   nk:loader.obj
 0001:0001fea0       SafeOpenExe                8c5a0ea0 f   nk:loader.obj
 0001:00020680       CloseExe                   8c5a1680 f   nk:loader.obj
 0001:00020710       SC_CloseProcOE             8c5a1710 f   nk:loader.obj
 0001:00020918       NKForceCleanBoot           8c5a1918 f   nk:loader.obj
 0001:00020944       SC_SetCleanRebootFlag      8c5a1944 f   nk:loader.obj
 0001:00020984       KernelRelocate             8c5a1984 f   nk:loader.obj
 0001:00020a4c       SC_NotifyForceCleanboot    8c5a1a4c f   nk:loader.obj
 0001:00020a80       CalcFSPages                8c5a1a80 f   nk:loader.obj
 0001:00020b18       CarveMem                   8c5a1b18 f   nk:loader.obj
 0001:00020bbc       GrabFSPages                8c5a1bbc f   nk:loader.obj
 0001:00020c1c       KernelFindMemory           8c5a1c1c f   nk:loader.obj
 0001:00021170       RelocatePage               8c5a2170 f   nk:loader.obj
 0001:0002166c       Relocate                   8c5a266c f   nk:loader.obj
 0001:00021978       Katoi                      8c5a2978 f   nk:loader.obj
 0001:000219ac       AddrFromEat                8c5a29ac f   nk:loader.obj
 0001:00021b34       ResolveImpOrd              8c5a2b34 f   nk:loader.obj
 0001:00021b90       ResolveImpStr              8c5a2b90 f   nk:loader.obj
 0001:00021c58       ResolveImpHintStr          8c5a2c58 f   nk:loader.obj
 0001:00021cf8       IncRefCount                8c5a2cf8 f   nk:loader.obj
 0001:00021d70       DecRefCount                8c5a2d70 f   nk:loader.obj
 0001:00021df0       UnlinkModule               8c5a2df0 f   nk:loader.obj
 0001:00021e70       UnCopyRegions              8c5a2e70 f   nk:loader.obj
 0001:00021f48       FreeModuleMemory           8c5a2f48 f   nk:loader.obj
 0001:00022034       FreeLibraryFromProc        8c5a3034 f   nk:loader.obj
 0001:00022144       FreeAllProcLibraries       8c5a3144 f   nk:loader.obj
 0001:0002219c       CallDLLEntry               8c5a319c f   nk:loader.obj
 0001:000224b0       FreeOneLibrary             8c5a34b0 f   nk:loader.obj
 0001:000227ac       FreeLibraryByName          8c5a37ac f   nk:loader.obj
 0001:00022830       KAsciiToUnicode            8c5a3830 f   nk:loader.obj
 0001:00022868       KUnicodeToAscii            8c5a3868 f   nk:loader.obj
 0001:000228bc       DoImports                  8c5a38bc f   nk:loader.obj
 0001:00022db8       AdjustRegions              8c5a3db8 f   nk:loader.obj
 0001:00022e68       GetNameFromOE              8c5a3e68 f   nk:loader.obj
 0001:00022fac       ReopenExe                  8c5a3fac f   nk:loader.obj
 0001:0002319c       JitOpenFile                8c5a419c f   nk:loader.obj
 0001:0002321c       JitCloseFile               8c5a421c f   nk:loader.obj
 0001:00023234       LoadE32                    8c5a4234 f   nk:loader.obj
 0001:000235e8       PageInPage                 8c5a45e8 f   nk:loader.obj
 0001:000236ac       PageInFromROM              8c5a46ac f   nk:loader.obj
 0001:0002390c       PageInFromRAM              8c5a490c f   nk:loader.obj
 0001:00023b20       PageInModule               8c5a4b20 f   nk:loader.obj
 0001:00023dec       PageInProcess              8c5a4dec f   nk:loader.obj
 0001:00023ef0       AccessFromFlags            8c5a4ef0 f   nk:loader.obj
 0001:00023f18       UnloadMod                  8c5a4f18 f   nk:loader.obj
 0001:000241f8       UnloadExe                  8c5a51f8 f   nk:loader.obj
 0001:00024394       ReadO32FromFile            8c5a5394 f   nk:loader.obj
 0001:0002444c       ReadSection                8c5a544c f   nk:loader.obj
 0001:00024714       UpdateKmodVSize            8c5a5714 f   nk:loader.obj
 0001:000247ac       LoadO32                    8c5a57ac f   nk:loader.obj
 0001:00024a28       FindEntryPoint             8c5a5a28 f   nk:loader.obj
 0001:00024acc       OpenAnExe                  8c5a5acc f   nk:loader.obj
 0001:00024b74       OpenADll                   8c5a5b74 f   nk:loader.obj
 0001:00024c18       CalcStackSize              8c5a5c18 f   nk:loader.obj
 0001:00024c54       LoadSwitch                 8c5a5c54 f   nk:loader.obj
 0001:00024cd0       FinishLoadSwitch           8c5a5cd0 f   nk:loader.obj
 0001:00024e58       ReserveDllRW               8c5a5e58 f   nk:loader.obj
 0001:00024f54       CreateNewProc              8c5a5f54 f   nk:loader.obj
 0001:000259e8       CopyRegions                8c5a69e8 f   nk:loader.obj
 0001:00025ce8       FindModByName              8c5a6ce8 f   nk:loader.obj
 0001:00025d70       SC_ThreadDetachAllDLLs     8c5a6d70 f   nk:loader.obj
 0001:00025e94       SC_ProcessDetachAllDLLs    8c5a6e94 f   nk:loader.obj
 0001:00025ebc       SC_ThreadAttachAllDLLs     8c5a6ebc f   nk:loader.obj
 0001:00025f44       UnDoDepends                8c5a6f44 f   nk:loader.obj
 0001:00025ff4       InitModule                 8c5a6ff4 f   nk:loader.obj
 0001:00026738       LoadOneLibraryW            8c5a7738 f   nk:loader.obj
 0001:00026e34       CELOG_ModuleLoad           8c5a7e34 f i nk:loader.obj
 0001:00026f18       SC_LoadLibraryW            8c5a7f18 f   nk:loader.obj
 0001:00026f54       SC_LoadLibraryExW          8c5a7f54 f   nk:loader.obj
 0001:00026fc4       SC_GetModuleHandleW        8c5a7fc4 f   nk:loader.obj
 0001:0002708c       SC_LoadDriver              8c5a808c f   nk:loader.obj
 0001:000270f8       SC_LoadKernelLibrary       8c5a80f8 f   nk:loader.obj
 0001:000271c4       SC_LoadIntChainHandler     8c5a81c4 f   nk:loader.obj
 0001:0002730c       SC_FreeIntChainHandler     8c5a830c f   nk:loader.obj
 0001:00027404       SC_FreeLibrary             8c5a8404 f   nk:loader.obj
 0001:00027448       GetOneProcAddress          8c5a8448 f   nk:loader.obj
 0001:00027500       DisableThreadCalls         8c5a8500 f   nk:loader.obj
 0001:00027578       SC_DisableThreadLibraryCalls 8c5a8578 f   nk:loader.obj
 0001:0002759c       SC_GetProcAddressA         8c5a859c f   nk:loader.obj
 0001:000275f4       SC_GetProcAddressW         8c5a85f4 f   nk:loader.obj
 0001:00027644       MatchesExtRange            8c5a8644 f   nk:loader.obj
 0001:000276d4       PDataFromExt               8c5a86d4 f   nk:loader.obj
 0001:00027758       PDataFromPC                8c5a8758 f   nk:loader.obj
 0001:000279b0       LoaderPageIn               8c5a89b0 f  

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -