⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 charsample.map

📁 Windows XP WMD驱动开发实例
💻 MAP
📖 第 1 页 / 共 4 页
字号:
 CharSample

 Timestamp is 464a5219 (Wed May 16 08:36:41 2007)

 Preferred load address is 00010000

 Start         Length     Name                   Class
 0001:00000000 000000e8H .idata$5                CODE
 0001:000000f0 0000057cH .rdata                  CODE
 0001:0000066c 00000045H .rdata$debug            CODE
 0001:000006c0 0000ade8H .text                   CODE
 0001:0000b4b0 00000036H .text$yc                CODE
 0001:0000b4f0 0000000fH .text$yd                CODE
 0002:00000000 00000170H .data                   DATA
 0002:00000170 0000047dH .bss                    DATA
 0003:00000000 00000004H .CRT$XCA                DATA
 0003:00000004 00000004H .CRT$XCU                DATA
 0003:00000008 00000004H .CRT$XCZ                DATA
 0004:00000000 00000004H .STL$A                  DATA
 0004:00000004 00000004H .STL$L                  DATA
 0004:00000008 00000004H .STL$M                  DATA
 0004:0000000c 00000004H .STL$Z                  DATA
 0005:00000000 00001711H PAGE                    CODE
 0006:00000000 0000080cH INIT                    CODE
 0006:0000080c 00000028H .idata$2                CODE
 0006:00000834 00000014H .idata$3                CODE
 0006:00000848 000000e8H .idata$4                CODE
 0006:00000930 0000048cH .idata$6                CODE
 0007:00000000 00000058H .rsrc$01                DATA
 0007:00000060 00000338H .rsrc$02                DATA

  Address         Publics by Value              Rva+Base     Lib:Object

 0001:00000000       __imp_@KfAcquireSpinLock@4 00010300     wdm:HAL.DLL
 0001:00000004       __imp_@KfReleaseSpinLock@8 00010304     wdm:HAL.DLL
 0001:00000008       __imp__KeGetCurrentIrql@0  00010308     wdm:HAL.DLL
 0001:0000000c       \177HAL_NULL_THUNK_DATA    0001030c     wdm:HAL.DLL
 0001:00000010       __imp__ZwClose@4           00010310     wdm:NTOSKRNL.EXE
 0001:00000014       __imp__RtlAssert@16        00010314     wdm:NTOSKRNL.EXE
 0001:00000018       __imp__PoSetPowerState@12  00010318     wdm:NTOSKRNL.EXE
 0001:0000001c       __imp__strncpy             0001031c     wdm:NTOSKRNL.EXE
 0001:00000020       __imp__PoStartNextPowerIrp@4 00010320     wdm:NTOSKRNL.EXE
 0001:00000024       __imp_@IofCompleteRequest@8 00010324     wdm:NTOSKRNL.EXE
 0001:00000028       __imp_@ObfDereferenceObject@4 00010328     wdm:NTOSKRNL.EXE
 0001:0000002c       __imp__PoCallDriver@8      0001032c     wdm:NTOSKRNL.EXE
 0001:00000030       __imp_@IofCallDriver@8     00010330     wdm:NTOSKRNL.EXE
 0001:00000034       __imp__RtlInitAnsiString@8 00010334     wdm:NTOSKRNL.EXE
 0001:00000038       __imp__memmove             00010338     wdm:NTOSKRNL.EXE
 0001:0000003c       __imp__strchr              0001033c     wdm:NTOSKRNL.EXE
 0001:00000040       __imp___vsnprintf          00010340     wdm:NTOSKRNL.EXE
 0001:00000044       __imp__DbgPrint            00010344     wdm:NTOSKRNL.EXE
 0001:00000048       __imp_@InterlockedIncrement@4 00010348     wdm:NTOSKRNL.EXE
 0001:0000004c       __imp_@InterlockedDecrement@4 0001034c     wdm:NTOSKRNL.EXE
 0001:00000050       __imp__ExFreePool@4        00010350     wdm:NTOSKRNL.EXE
 0001:00000054       __imp__RtlAppendUnicodeStringToString@8 00010354     wdm:NTOSKRNL.EXE
 0001:00000058       __imp__ZwOpenKey@12        00010358     wdm:NTOSKRNL.EXE
 0001:0000005c       __imp__ZwCreateKey@28      0001035c     wdm:NTOSKRNL.EXE
 0001:00000060       __imp__ExAllocatePoolWithTag@12 00010360     wdm:NTOSKRNL.EXE
 0001:00000064       __imp__ZwQueryValueKey@24  00010364     wdm:NTOSKRNL.EXE
 0001:00000068       __imp__IoDeleteDevice@4    00010368     wdm:NTOSKRNL.EXE
 0001:0000006c       __imp__IoDeleteSymbolicLink@4 0001036c     wdm:NTOSKRNL.EXE
 0001:00000070       __imp__IoCreateSymbolicLink@8 00010370     wdm:NTOSKRNL.EXE
 0001:00000074       __imp__IoCreateDevice@28   00010374     wdm:NTOSKRNL.EXE
 0001:00000078       __imp__IoAttachDeviceToDeviceStack@8 00010378     wdm:NTOSKRNL.EXE
 0001:0000007c       __imp__IoAllocateIrp@8     0001037c     wdm:NTOSKRNL.EXE
 0001:00000080       __imp__IoFreeIrp@4         00010380     wdm:NTOSKRNL.EXE
 0001:00000084       __imp_@InterlockedExchange@8 00010384     wdm:NTOSKRNL.EXE
 0001:00000088       __imp__RtlFreeUnicodeString@4 00010388     wdm:NTOSKRNL.EXE
 0001:0000008c       __imp__KeWaitForSingleObject@20 0001038c     wdm:NTOSKRNL.EXE
 0001:00000090       __imp__KeReleaseMutex@8    00010390     wdm:NTOSKRNL.EXE
 0001:00000094       __imp__IoDetachDevice@4    00010394     wdm:NTOSKRNL.EXE
 0001:00000098       __imp__IoAcquireCancelSpinLock@4 00010398     wdm:NTOSKRNL.EXE
 0001:0000009c       __imp__IoReleaseCancelSpinLock@4 0001039c     wdm:NTOSKRNL.EXE
 0001:000000a0       __imp__KeClearEvent@4      000103a0     wdm:NTOSKRNL.EXE
 0001:000000a4       __imp__KeSetEvent@12       000103a4     wdm:NTOSKRNL.EXE
 0001:000000a8       __imp__PoRequestPowerIrp@24 000103a8     wdm:NTOSKRNL.EXE
 0001:000000ac       __imp__IoCancelIrp@4       000103ac     wdm:NTOSKRNL.EXE
 0001:000000b0       __imp__IoRegisterDeviceInterface@16 000103b0     wdm:NTOSKRNL.EXE
 0001:000000b4       __imp__IoSetDeviceInterfaceState@8 000103b4     wdm:NTOSKRNL.EXE
 0001:000000b8       __imp__KeInitializeSpinLock@4 000103b8     wdm:NTOSKRNL.EXE
 0001:000000bc       __imp__DbgBreakPoint@0     000103bc     wdm:NTOSKRNL.EXE
 0001:000000c0       __imp__RtlCopyUnicodeString@8 000103c0     wdm:NTOSKRNL.EXE
 0001:000000c4       __imp__IoGetDeviceObjectPointer@16 000103c4     wdm:NTOSKRNL.EXE
 0001:000000c8       __imp__IoBuildDeviceIoControlRequest@36 000103c8     wdm:NTOSKRNL.EXE
 0001:000000cc       __imp__KeInitializeEvent@12 000103cc     wdm:NTOSKRNL.EXE
 0001:000000d0       __imp__KeInitializeMutex@8 000103d0     wdm:NTOSKRNL.EXE
 0001:000000d4       __imp__KeRemoveEntryDeviceQueue@8 000103d4     wdm:NTOSKRNL.EXE
 0001:000000d8       __imp_@KefAcquireSpinLockAtDpcLevel@4 000103d8     wdm:NTOSKRNL.EXE
 0001:000000dc       __imp_@KefReleaseSpinLockFromDpcLevel@4 000103dc     wdm:NTOSKRNL.EXE
 0001:000000e0       __imp__RtlInitUnicodeString@8 000103e0     wdm:NTOSKRNL.EXE
 0001:000000e4       \177NTOSKRNL_NULL_THUNK_DATA 000103e4     wdm:NTOSKRNL.EXE
 0001:0000010c       ??_C@_0DF@OJJCGMGD@DriverWorks?5?$CIc?$CJ?5Copyright?52003?5C@ 0001040c     CharSample.obj
 0001:00000144       ??_7CharSample@@6B@        00010444     CharSample.obj
 0001:00000158       ??_7KDriver@@6B@           00010458     CharSample.obj
 0001:0000016c       ??_C@_0BL@NNGFNHOB@m_Irp?9?$DOCurrentLocation?5?$DO?51?$AA@ 0001046c     CharSample.obj
 0001:00000188       ??_C@_0CM@FADDDCMO@m_Irp?9?$DOCurrentLocation?5?$DM?$DN?5m_Irp?9@ 00010488     CharSample.obj
 0001:000001b4       ??_C@_0DO@EFKCJHCD@C?3?2PROGRA?$HO1?2Compuware?2DriverStud@ 000104b4     CharSample.obj
 0001:000001f4       ??_C@_02DKCKIIND@?$CFs?$AA@ 000104f4     CharSample.obj
 0001:000001f8       ??_C@_02GMHACPFF@?$CFu?$AA@ 000104f8     CharSample.obj
 0001:000001fc       ??_C@_07KFGDNAFA@0x?$CF08lx?$AA@ 000104fc     CharSample.obj
 0001:00000208       ??_7CharSampleDevice@@6B@  00010508     CharSampleDevice.obj
 0001:00000334       ??_C@_05MAJJAKPI@FALSE?$AA@ 00010634     CharSampleDevice.obj
 0001:00000340       ??_C@_0EB@COLAEKAL@C?3?2PROGRA?$HO1?2Compuware?2DriverStud@ 00010640     CharSampleDevice.obj
 0001:00000384       ??_C@_0CG@IJCOJOJN@I?4MajorFunction?$CINEXT?$CJ?5?$DN?$DN?5IRP_MJ_@ 00010684     CharSampleDevice.obj
 0001:000003b0       ??_C@_0EB@JAFEGOBF@C?3?2PROGRA?$HO1?2Compuware?2DriverStud@ 000106b0     CharSampleDevice.obj
 0001:000003f4       ??_C@_0BE@HGMFHLDM@?4?2?4?4?2include?2kirp?4h?$AA@ 000106f4     vdw_wdm:ktrace.obj
 0001:00000408       ??_7KDevice@@6B@           00010708     vdw_wdm:kdevice.obj
 0001:00000490       ??_7KDeviceBase@@6B@       00010790     vdw_wdm:kdevice.obj
 0001:00000498       ??_C@_0BH@BINHOGGO@?4?2?4?4?2include?2kdevice?4h?$AA@ 00010798     vdw_wdm:kdevice.obj
 0001:000004b0       ??_7KPnpDevice@@6B@        000107b0     vdw_wdm:kpnpdev.obj
 0001:000005dc       ??_C@_0O@KBDMFNDM@m_pdq?5?$CB?$DN?5NULL?$AA@ 000108dc     vdw_wdm:kpnpdev.obj
 0001:000005ec       ??_C@_0BH@BIPCAELK@?4?2?4?4?2include?2kdevque?4h?$AA@ 000108ec     vdw_wdm:kpnpdev.obj
 0001:00000604       ??_C@_0DN@BBDLMDMH@?$CIOnSuccess?$CJ?5?$HM?5?$CIOnError?$CJ?5?$HM?5?$CIOnCan@ 00010904     vdw_wdm:kpnpdev.obj
 0001:00000644       ??_C@_0BH@LIGMDPNJ@?4?2?4?4?2include?2kpnplow?4h?$AA@ 00010944     vdw_wdm:kpnpdev.obj
 0001:0000065c       ??_7?$KList@UINTERFACE_LIST_ENTRY@@@@6B@ 0001095c     vdw_wdm:kpnpdev.obj
 0001:0000073b       ?AddDevice@CharSample@@UAEJPAU_DEVICE_OBJECT@@@Z 00010a3b f   CharSample.obj
 0001:00000880       ??2@YAPAXI@Z               00010b80 f i CharSample.obj
 0001:000008b0       ??2@YAPAXIW4_POOL_TYPE@@@Z 00010bb0 f i CharSample.obj
 0001:000008f0       ??1KRegistryKey@@QAE@XZ    00010bf0 f i CharSample.obj
 0001:00000980       ??3@YAXPAX@Z               00010c80 f i CharSample.obj
 0001:00000980       ??_V@YAXPAX@Z              00010c80 f i CharSample.obj
 0001:000009a0       ?Invalidate@KRegistryKey@@QAEXXZ 00010ca0 f i CharSample.obj
 0001:000009d0       ?LastError@KRegistryKey@@QAEJXZ 00010cd0 f i CharSample.obj
 0001:000009f0       ?ConstructorStatus@KDevice@@QAEJXZ 00010cf0 f i CharSample.obj
 0001:00000a10       ?_self_delete@KDriver@@EAEXXZ 00010d10 f i CharSample.obj
 0001:00000a50       ??_GKDriver@@QAEPAXI@Z     00010d50 f i CharSample.obj
 0001:00000a80       ??1KDriver@@QAE@XZ         00010d80 f i CharSample.obj
 0001:00000ad0       ?DriverInstance@KDriver@@SGPAV1@XZ 00010dd0 f i CharSample.obj
 0001:00000ae0       ?AddDeviceDispatch@KDriver@@KGJPAU_DRIVER_OBJECT@@PAU_DEVICE_OBJECT@@@Z 00010de0 f   CharSample.obj
 0001:00000b40       ?DriverIrpDispatch@KDriver@@SGJPAU_DEVICE_OBJECT@@PAU_IRP@@@Z 00010e40 f   CharSample.obj
 0001:00000be0       ??0KIrp@@QAE@PAU_IRP@@@Z   00010ee0 f i CharSample.obj
 0001:00000c00       ?MajorFunction@KIrp@@QAEAAEW4EStackLocation@@@Z 00010f00 f i CharSample.obj
 0001:00000c40       ?ValidateStackLocation@KIrp@@QAEXW4EStackLocation@@@Z 00010f40 f i CharSample.obj
 0001:00000cd0       ?DispatchFilter@KDriver@@UAEJPAVKDevice@@VKIrp@@P82@AEJ1@Z@Z 00010fd0 f   CharSample.obj
 0001:00000d4a       __purecall                 0001104a f   CharSample.obj
 0001:00000d90       ?Object@KDispatcherObject@@QAEPAXXZ 00011090 f i vdw_wdm:klower.obj

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -