⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 symbol.map

📁 用于汇编领域的,运用于OS的MAIN函数.基于硬件基础的源代码
💻 MAP
字号:
00000004 a GDT_ENTRIES00000008 a GDT_ENTRY_SZ00000008 a SEG100000010 a SEG200000018 a SEG300010000 T startup00010018 T GDT00010038 t GDT_pointer00010044 T start_kernel00010073 t swapper_stack_start0001007b t L1000101fc t scroll0001028f t clear_to_eol000102f8 t newline0001032b t put_graphic_char0001038d T put_char_imp0001040f t update_cursor000104ca t format_d00010574 t format_x000105b6 T init_screen000105de T clear_screen00010634 T get_cursor0001064f T put_cursor0001066c T get_current_attr00010679 T set_current_attr0001068f T put_char000106a7 T put_string000106d3 T put_buf00010701 T printk0001083c T outbyte00010858 T inbyte0001086e T iodelay0001087f T inp00010899 T inpw000108b5 T inpd000108ce T outp000108ea T outpw00010908 T outpd00010920 T init_idt00010958 T set_intr_gate0001099e t set_trap_gate000109e4 t set_system_gate00010a2a T idt_traps_setup00010a50 T do_divide_error00010a68 T do_dummy_interrupt_handler00010a8e T do_dummy_interrupt_handler000010aa6 T do_dummy_interrupt_handler100010abe T do_dummy_interrupt_handler200010ad6 T do_dummy_interrupt_handler300010aee T do_dummy_interrupt_handler400010b06 T do_dummy_interrupt_handler500010b1e T do_dummy_interrupt_handler600010b36 T do_dummy_interrupt_handler700010b4e T do_dummy_interrupt_handler800010b66 T do_dummy_interrupt_handler900010b7e T do_dummy_interrupt_handler1000010b96 T do_dummy_interrupt_handler1100010bae T do_dummy_interrupt_handler1200010bc6 T do_dummy_interrupt_handler1300010bde T do_dummy_interrupt_handler1400010bf6 T do_dummy_interrupt_handler1500010c0e T do_dummy_interrupt_handler1600010c26 T do_dummy_interrupt_handler1700010c3e T do_dummy_interrupt_handler1800010c56 T do_dummy_interrupt_handler1900010c6e T init_interrupt00010e40 t __enable_interrupts00010e46 T is_interrupts_enabled00010e5f T get_current_eflags00010e6f T mask_irq00010eec T unmask_irq00010f70 T timer_handler00010fe4 T init_timer00011056 T delay00011090 t convert000110cd T kbd_handler00011139 T init_kbd00011170 T wait_for_key00011191 T wait_for_anykey000111ac T ReadWriteSector0001133e T lba_to_chs000113f1 T ReadRelativeSector0001143d T WriteRelativeSector000114c0 T FloppyCalibrateHead0001154e T FloppySeek0001166c T FloppyCode0001168b T WaitFloppy000116b8 T floppy_handler000116eb T init_floppy00011714 T FloppyMotorOn00011720 T FloppyMotorOff0001172c T initializeDMA00011767 T initializeDMAWrite000117a2 T ResultFhase000117ac T tss_init00011802 T init_process_q0001181b T init_run_q00011834 T add_to_process_q00011865 T remove_from_process_q000118cd T wake_up000118fe T find_child0001194e T remove_from_run_q000119b6 T display_regs00011a69 T display_regs200011a90 T init_task_init_mm00011b52 T make_init_task00011c3b T kernel_thread00011c68 T init00011ca1 T p1_body00011ce2 T p2_body00011d23 T sys_fork00011d3e T alloc_task_struct00011da6 T get_pid00011dbb T cp_curr_to_p00011e32 T do_fork00011f0a T copy_thread00011fa7 T panic00011fc4 T EXEC_load_body00011ffb T do_execve000121af T sys_execve000121d8 T sys_ni_syscall000121dd T sys_exit000121fa T sys_read00012211 T sys_write00012228 T sys_open0001222d T sys_close00012232 T sys_waitpid0001224f T sys_creat00012254 T sys_link00012259 T sys_unlink00012271 T sys_chdir00012276 T sys_time0001227b T sys_mknod00012280 T sys_chmod00012285 T sys_lchown160001228a T sys_stat0001228f T sys_lseek00012294 T sys_getpid00012299 T sys_mount0001229e T sys_oldumount000122a3 T sys_setuid16000122a8 T sys_getuid16000122b0 T release_body0001232a T do_exit00012387 T do_wait000123f0 T init_mm00012424 T set_page_table000124b5 T init_directory_table00012551 T init_directory0001258f T dump_directory0001260a T dump_directory_table00012695 T dump_mm000126cb T copy_mm00012738 T init_mem_map00012767 T get_free_pgframe000127dd T set_pgframe0001280a T free_pgframe00012838 T next_p0001286d T schedule000128f4 t ret_from_exception00012900 T divide_error00012908 t error_code0001291c T dummy_interrupt_handler0001293c T timer_isr00012960 T kbd_isr00012980 T floppy_isr000129a0 T system_call000129b4 T ret_from_fork000129c8 T comp_sect_num000129d2 T dump_sector00012a6b T test_disk00012ac3 T ReadDiskBlock00012b15 T WriteDiskBlock00012b68 T BitVect_init00012b91 t find_free_loc00012be7 t set_bit00012c06 T BitVect_get_free_bit00012c6e T BitVect_set_bit00012ccc T Ext2Inode_init00012cdb T Ext2Inode_alloc_block00012d20 T Ext2Inode_make_inode00012da7 T Ext2Inode_get_inode00012e6c t get_fname_in_dirent00012ea2 T DirBlk_init00012ecb t next_dent00012ee0 T DirBlk_get_free_dir_ent00012f31 T DirBlk_report_new_entry00013017 T DirBlk_set_empty00013056 T find_ino_for_file_in_dirblk00013125 T find_ino_for_file_in_dir000131a4 T dump_directory_file_block00013239 T dump_directory_file000132a4 T get_next_fname000132bf T move_to_remaining_path000132f8 T FDTable_init00013340 T FDTable_get_empty_entry00013388 T FDTable_report_new_fd000133b4 T FB_dump000133f2 T FBTable_dump_blk00013427 T FBTable_init0001345a T FBTable_find_empty_block_frame000134ab T FBTable_retrieve_block_from_disk00013541 T FBTable_find_block000135a7 T FBTable_get_block00013609 T FBTable_flush_file_blocks00013684 T FPTable_init000136b0 T FPTable_find_empty_fptr000136f9 T FPTable_report_new_file00013730 T do_creat00013829 T do_open00013883 T read_from_kbd000138d1 T do_read00013907 T kernel_do_read000139e4 T do_write00013a23 T kernel_do_write00013adc T print_buf00013b16 T test_fs00013b86 T init_fs00013bd8 T mount_root_fs00013c3b T flush_to_disk00013c58 T Inode_init00013c66 T ITable_make_inode00013c9b T Inode_alloc_block00013cb8 T Inode_get_block00013cde T ITable_init00013d0e T ITable_get_free_inode00013d4e T ITable_get_inode00013d83 T ITable_find_loc00013dd2 T find_inode_for_file00013e18 T ITable_compute_inode00013ee9 T ITable_compute_inode_for_last_directory00014040 T findloc00014089 T substr000140cd T write_substr00014108 T copystr0001413c T strcpy0001414f T strncpy0001417f T strlen000141ac T strcmp0001421e T strncmp00014263 T get_next_tok000142dc T mymemcpy00014800 r scan_table00016000 D floppy_code_read_sector00016024 D floppy_code_calibrate0001602c D floppy_code_seek00016038 D floppy_code_interrupt_status0001603c d interrupt_count00016040 D init_task_union00016044 D init_task00016048 D exec_path00016054 d sys_call_table000160b8 A __bss_start000160b8 A _edata000160c0 b s_row000160c4 b s_col000160c8 b s_currentAttr000160e0 b __idt000168e0 b __idtr000168ec B g_FloppyInterrupted000168f0 B cont000168f4 b curr_pid.172300016900 B interrupt_state00016940 B systick00016944 B key_entered00016948 B keyval_entered00016949 B result_seek00016960 B swapper_dir000016964 B process_q_tail00016980 B init_tss00016a80 B run_q_tail00016a84 B current00016a88 B process_q_head00016aa0 B process_table0002aaa0 B run_q_head0002aac0 B mem_map00032ac0 B d_ibm00032ae0 B fbtable0003abe0 B root0003abe4 B d_dbm0003ac00 B fptable0003ae00 B itable0003af00 A _end

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -