⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 kernkitl.map

📁 WINDOWS CE BSP用于SBC2440开发板
💻 MAP
📖 第 1 页 / 共 5 页
字号:
 0001:0003f518       SC_SetTextColor            8c5c0518 f   nk:kmisc.obj
 0001:0003f5a0       SC_InvalidateRect          8c5c05a0 f   nk:kmisc.obj
 0001:0003f638       SC_TransparentImage        8c5c0638 f   nk:kmisc.obj
 0001:0003f708       SC_IsDialogMessageW        8c5c0708 f   nk:kmisc.obj
 0001:0003f798       SC_PostMessageW            8c5c0798 f   nk:kmisc.obj
 0001:0003f830       SC_IsWindowVisible         8c5c0830 f   nk:kmisc.obj
 0001:0003f8b0       SC_GetKeyState             8c5c08b0 f   nk:kmisc.obj
 0001:0003f930       SC_BeginPaint              8c5c0930 f   nk:kmisc.obj
 0001:0003f9c0       SC_EndPaint                8c5c09c0 f   nk:kmisc.obj
 0001:0003fa48       NKRegOpenKeyExW            8c5c0a48 f   nk:kmisc.obj
 0001:0003fac4       NKRegCloseKey              8c5c0ac4 f   nk:kmisc.obj
 0001:0003fb0c       NKRegQueryValueExW         8c5c0b0c f   nk:kmisc.obj
 0001:0003fba0       NKRegCreateKeyExW          8c5c0ba0 f   nk:kmisc.obj
 0001:0003fc50       SC_IsSystemFile            8c5c0c50 f   nk:kmisc.obj
 0001:0003fca4       SC_CreateFileW             8c5c0ca4 f   nk:kmisc.obj
 0001:0003fd34       SC_ReadFile                8c5c0d34 f   nk:kmisc.obj
 0001:0003fe04       SC_CeWriteRecordProps      8c5c0e04 f   nk:kmisc.obj
 0001:0003fec0       SC_ReadFileWithSeek        8c5c0ec0 f   nk:kmisc.obj
 0001:0003ffa0       SC_WriteFileWithSeek       8c5c0fa0 f   nk:kmisc.obj
 0001:00040078       SC_CloseHandle             8c5c1078 f   nk:kmisc.obj
 0001:000400e8       SC_DuplicateHandle         8c5c10e8 f   nk:kmisc.obj
 0001:00040260       SC_DeviceIoControl         8c5c1260 f   nk:kmisc.obj
 0001:0004034c       SC_OpenDatabaseEx          8c5c134c f   nk:kmisc.obj
 0001:000403e0       SC_SeekDatabase            8c5c13e0 f   nk:kmisc.obj
 0001:000404a8       SC_ReadRecordPropsEx       8c5c14a8 f   nk:kmisc.obj
 0001:00040588       SC_CreateLocaleView        8c5c1588 f   nk:kmisc.obj
 0001:0004066c       VerifyAccess               8c5c166c f   nk:virtmem.obj
 0001:000407bc       IsROM                      8c5c17bc f   nk:virtmem.obj
 0001:0004095c       IsStackVA                  8c5c195c f   nk:virtmem.obj
 0001:00040a20       MakePagePerms              8c5c1a20 f   nk:virtmem.obj
 0001:00040af8       ProtectFromPerms           8c5c1af8 f   nk:virtmem.obj
 0001:00040b40       FindFirstBlock             8c5c1b40 f   nk:virtmem.obj
 0001:00040b7c       ScanRegion                 8c5c1b7c f   nk:virtmem.obj
 0001:00040d3c       DecommitPages              8c5c1d3c f   nk:virtmem.obj
 0001:00040fe4       FreePageList               8c5c1fe4 f   nk:virtmem.obj
 0001:0004100c       ReleaseRegion              8c5c200c f   nk:virtmem.obj
 0001:00041070       IsAccessOK                 8c5c2070 f   nk:virtmem.obj
 0001:000410f4       DbgVerify                  8c5c20f4 f   nk:virtmem.obj
 0001:00041240       GetKPagePMB                8c5c2240 f   nk:virtmem.obj
 0001:00041284       InitNKSection              8c5c2284 f   nk:virtmem.obj
 0001:000412b4       DeleteSection              8c5c22b4 f   nk:virtmem.obj
 0001:000413d4       CreateSection              8c5c23d4 f   nk:virtmem.obj
 0001:000414c4       CreateMapperSection        8c5c24c4 f   nk:virtmem.obj
 0001:000415c8       DeleteMapperSection        8c5c25c8 f   nk:virtmem.obj
 0001:000415e4       DoVirtualAlloc             8c5c25e4 f   nk:virtmem.obj
 0001:00041ebc       SC_VirtualAlloc            8c5c2ebc f   nk:virtmem.obj
 0001:00041ee0       SC_VirtualFree             8c5c2ee0 f   nk:virtmem.obj
 0001:000421a4       DoVirtualCopy              8c5c31a4 f   nk:virtmem.obj
 0001:000425c0       SC_VirtualCopy             8c5c35c0 f   nk:virtmem.obj
 0001:00042614       SC_VirtualSetAttributes    8c5c3614 f   nk:virtmem.obj
 0001:000427b8       SC_VirtualProtect          8c5c37b8 f   nk:virtmem.obj
 0001:000429f0       SC_VirtualQuery            8c5c39f0 f   nk:virtmem.obj
 0001:00042cfc       IsCommittedSecureSlot      8c5c3cfc f   nk:virtmem.obj
 0001:00042d60       DoLockPages                8c5c3d60 f   nk:virtmem.obj
 0001:0004315c       SC_LockPages               8c5c415c f   nk:virtmem.obj
 0001:000431b0       DoUnlockPages              8c5c41b0 f   nk:virtmem.obj
 0001:00043374       SC_UnlockPages             8c5c4374 f   nk:virtmem.obj
 0001:000433c8       AutoCommit                 8c5c43c8 f   nk:virtmem.obj
 0001:00043560       GuardCommit                8c5c4560 f   nk:virtmem.obj
 0001:000435f4       ProcessPageFault           8c5c45f4 f   nk:virtmem.obj
 0001:00043814       CELOG_SystemPage           8c5c4814 f i nk:virtmem.obj
 0001:00043880       ProfInit                   8c5c4880 f   nk:virtmem.obj
 0001:000438d0       SC_GetProfileBaseAddress   8c5c48d0 f   nk:virtmem.obj
 0001:00043964       SC_SetProfilePortAddress   8c5c4964 f   nk:virtmem.obj
 0001:00043aa8       SC_AllocPhysMem            8c5c4aa8 f   nk:virtmem.obj
 0001:00043b74       SC_FreePhysMem             8c5c4b74 f   nk:virtmem.obj
 0001:00043bd4       GetVMInfo                  8c5c4bd4 f   nk:virtmem.obj
 0001:00043d08       SC_ProfileSyscall          8c5c4d08 f   nk:profiler.obj
 0001:00043d0c       SC_TurnOnProfiling         8c5c4d0c f   nk:profiler.obj
 0001:00043d30       SC_TurnOffProfiling        8c5c4d30 f   nk:profiler.obj
 0001:00043d58       SC_DumpKCallProfile        8c5c4d58 f   nk:profiler.obj
 0001:00043d5c       Phys2VirtWrapper           8c5c4d5c f   nk:profiler.obj
 0001:00043d6c       InSysCallWrapper           8c5c4d6c f   nk:profiler.obj
 0001:00043d7c       KernelLibIoControl_Verifier 8c5c4d7c f   nk:profiler.obj
 0001:00043ef8       KernelLibIoControl_CeLog   8c5c4ef8 f   nk:profiler.obj
 0001:000440f8       CeLogThreadMigrate         8c5c50f8 f   nk:profiler.obj
 0001:0004414c       SC_CeLogData               8c5c514c f   nk:profiler.obj
 0001:000441d4       SC_CeLogSetZones           8c5c51d4 f   nk:profiler.obj
 0001:0004420c       SC_CeLogGetZones           8c5c520c f   nk:profiler.obj
 0001:000442e4       SC_CeLogReSync             8c5c52e4 f   nk:profiler.obj
 0001:000446d0       lowerW                     8c5c56d0 f   nk:loader.obj
 0001:000446fc       strcmponeiW                8c5c56fc f   nk:loader.obj
 0001:00044764       strcmpdllnameW             8c5c5764 f   nk:loader.obj
 0001:00044848       strcmpiAandW               8c5c5848 f   nk:loader.obj
 0001:000448cc       kstrncmpi                  8c5c58cc f   nk:loader.obj
 0001:0004493c       kstrcmpi                   8c5c593c f   nk:loader.obj
 0001:00044990       kstrcpyW                   8c5c5990 f   nk:loader.obj
 0001:000449c8       FindOptr                   8c5c59c8 f   nk:loader.obj
 0001:00044a64       ChkDebug                   8c5c5a64 f   nk:loader.obj
 0001:00044aec       ReadExtImageInfo           8c5c5aec f   nk:loader.obj
 0001:00044b40       VerifyBinary               8c5c5b40 f   nk:loader.obj
 0001:00044cf8       SetROMDllBase              8c5c5cf8 f   nk:loader.obj
 0001:00044f3c       OpenExe                    8c5c5f3c f   nk:loader.obj
 0001:00044f68       OpenFileFromFilesys        8c5c5f68 f   nk:loader.obj
 0001:000451ac       SafeOpenExe                8c5c61ac f   nk:loader.obj
 0001:0004598c       CloseExe                   8c5c698c f   nk:loader.obj
 0001:00045a1c       SC_CloseProcOE             8c5c6a1c f   nk:loader.obj
 0001:00045c24       NKForceCleanBoot           8c5c6c24 f   nk:loader.obj
 0001:00045c50       SC_SetCleanRebootFlag      8c5c6c50 f   nk:loader.obj
 0001:00045c90       KernelRelocate             8c5c6c90 f   nk:loader.obj
 0001:00045d58       SC_NotifyForceCleanboot    8c5c6d58 f   nk:loader.obj
 0001:00045d8c       CalcFSPages                8c5c6d8c f   nk:loader.obj
 0001:00045e24       CarveMem                   8c5c6e24 f   nk:loader.obj
 0001:00045ec8       GrabFSPages                8c5c6ec8 f   nk:loader.obj
 0001:00045f28       KernelFindMemory           8c5c6f28 f   nk:loader.obj
 0001:0004647c       RelocatePage               8c5c747c f   nk:loader.obj
 0001:00046978       Relocate                   8c5c7978 f   nk:loader.obj
 0001:00046c84       Katoi                      8c5c7c84 f   nk:loader.obj
 0001:00046cb8       AddrFromEat                8c5c7cb8 f   nk:loader.obj
 0001:00046e40       ResolveImpOrd              8c5c7e40 f   nk:loader.obj
 0001:00046e9c       ResolveImpStr              8c5c7e9c f   nk:loader.obj
 0001:00046f64       ResolveImpHintStr          8c5c7f64 f   nk:loader.obj
 0001:00047004       IncRefCount                8c5c8004 f   nk:loader.obj
 0001:0004707c       DecRefCount                8c5c807c f   nk:loader.obj
 0001:000470fc       UnlinkModule               8c5c80fc f   nk:loader.obj
 0001:0004717c       UnCopyRegions              8c5c817c f   nk:loader.obj
 0001:00047254       FreeModuleMemory           8c5c8254 f   nk:loader.obj
 0001:00047340       FreeLibraryFromProc        8c5c8340 f   nk:loader.obj
 0001:00047450       FreeAllProcLibraries       8c5c8450 f   nk:loader.obj
 0001:000474a8       CallDLLEntry               8c5c84a8 f   nk:loader.obj
 0001:000477bc       FreeOneLibrary             8c5c87bc f   nk:loader.obj
 0001:00047ab8       FreeLibraryByName          8c5c8ab8 f   nk:loader.obj
 0001:00047b3c       KAsciiToUnicode            8c5c8b3c f   nk:loader.obj
 0001:00047b74       KUnicodeToAscii            8c5c8b74 f   nk:loader.obj
 0001:00047bc8       DoImports                  8c5c8bc8 f   nk:loader.obj
 0001:000480c4       AdjustRegions              8c5c90c4 f   nk:loader.obj
 0001:00048174       GetNameFromOE              8c5c9174 f   nk:loader.obj
 0001:000482b8       ReopenExe                  8c5c92b8 f   nk:loader.obj
 0001:000484a8       JitOpenFile                8c5c94a8 f   nk:loader.obj
 0001:00048528       JitCloseFile               8c5c9528 f   nk:loader.obj
 0001:00048540       LoadE32                    8c5c9540 f   nk:loader.obj
 0001:000488f4       PageInPage                 8c5c98f4 f   nk:loader.obj
 0001:000489b8       PageInFromROM              8c5c99b8 f   nk:loader.obj
 0001:00048c18       PageInFromRAM              8c5c9c18 f   nk:loader.obj
 0001:00048e2c       PageInModule               8c5c9e2c f   nk:loader.obj
 0001:000490f8       PageInProcess              8c5ca0f8 f   nk:loader.obj
 0001:000491fc       AccessFromFlags            8c5ca1fc f   nk:loader.obj
 0001:00049224       UnloadMod                  8c5ca224 f   nk:loader.obj
 0001:00049504       UnloadExe                  8c5ca504 f   nk:loader.obj
 0001:000496a0       ReadO32FromFile            8c5ca6a0 f   nk:loader.obj
 0001:00049758       ReadSection                8c5ca758 f   nk:loader.obj
 0001:00049a20       UpdateKmodVSize            8c5caa20 f   nk:loader.obj
 0001:00049ab8       LoadO32                    8c5caab8 f   nk:loader.obj
 0001:00049d34       FindEntryPoint             8c5cad34 f   nk:loader.obj
 0001:00049dd8       OpenAnExe                  8c5cadd8 f   nk:loader.obj
 0001:00049e80       OpenADll                   8c5cae80 f   nk:loader.obj
 0001:00049f24       CalcStackSize              8c5caf24 f   nk:loader.obj
 0001:00049f60       LoadSwitch                 8c5caf60 f   nk:loader.obj
 0001:00049fdc       FinishLoadSwitch           8c5cafdc f   nk:loader.obj
 0001:0004a164       ReserveDllRW               8c5cb164 f   nk:loader.obj
 0001:0004a260       CreateNewProc              8c5cb260 f   nk:loader.obj
 0001:0004acf4       CopyRegions                8c5cbcf4 f   nk:loader.obj
 0001:0004aff4       FindModByName              8c5cbff4 f   nk:loader.obj
 0001:0004b07c       SC_ThreadDetachAllDLLs     8c5cc07c f   nk:loader.obj
 0001:0004b1a0       SC_ProcessDetachAllDLLs    8c5cc1a0 f   nk:loader.obj
 0001:0004b1c8       SC_Thre

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -