⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 kern.map

📁 wince 下的bsp测试wince_bspSMDK2440_L35T32.rar
💻 MAP
📖 第 1 页 / 共 5 页
字号:
 0001:0003fe7c       SC_SetTextColor            8c5c0e7c f   nk:kmisc.obj
 0001:0003ff04       SC_InvalidateRect          8c5c0f04 f   nk:kmisc.obj
 0001:0003ff9c       SC_TransparentImage        8c5c0f9c f   nk:kmisc.obj
 0001:0004006c       SC_IsDialogMessageW        8c5c106c f   nk:kmisc.obj
 0001:000400fc       SC_PostMessageW            8c5c10fc f   nk:kmisc.obj
 0001:00040194       SC_IsWindowVisible         8c5c1194 f   nk:kmisc.obj
 0001:00040214       SC_GetKeyState             8c5c1214 f   nk:kmisc.obj
 0001:00040294       SC_BeginPaint              8c5c1294 f   nk:kmisc.obj
 0001:00040324       SC_EndPaint                8c5c1324 f   nk:kmisc.obj
 0001:000403ac       NKRegOpenKeyExW            8c5c13ac f   nk:kmisc.obj
 0001:00040428       NKRegCloseKey              8c5c1428 f   nk:kmisc.obj
 0001:00040470       NKRegQueryValueExW         8c5c1470 f   nk:kmisc.obj
 0001:00040504       NKRegCreateKeyExW          8c5c1504 f   nk:kmisc.obj
 0001:000405b4       SC_IsSystemFile            8c5c15b4 f   nk:kmisc.obj
 0001:00040608       SC_CreateFileW             8c5c1608 f   nk:kmisc.obj
 0001:00040698       SC_ReadFile                8c5c1698 f   nk:kmisc.obj
 0001:00040768       SC_CeWriteRecordProps      8c5c1768 f   nk:kmisc.obj
 0001:00040824       SC_ReadFileWithSeek        8c5c1824 f   nk:kmisc.obj
 0001:00040904       SC_WriteFileWithSeek       8c5c1904 f   nk:kmisc.obj
 0001:000409dc       SC_CloseHandle             8c5c19dc f   nk:kmisc.obj
 0001:00040a4c       SC_DuplicateHandle         8c5c1a4c f   nk:kmisc.obj
 0001:00040bc4       SC_DeviceIoControl         8c5c1bc4 f   nk:kmisc.obj
 0001:00040cb0       SC_OpenDatabaseEx          8c5c1cb0 f   nk:kmisc.obj
 0001:00040d44       SC_SeekDatabase            8c5c1d44 f   nk:kmisc.obj
 0001:00040e0c       SC_ReadRecordPropsEx       8c5c1e0c f   nk:kmisc.obj
 0001:00040eec       SC_CreateLocaleView        8c5c1eec f   nk:kmisc.obj
 0001:00040fd0       VerifyAccess               8c5c1fd0 f   nk:virtmem.obj
 0001:00041120       IsROM                      8c5c2120 f   nk:virtmem.obj
 0001:000412c0       IsStackVA                  8c5c22c0 f   nk:virtmem.obj
 0001:00041384       MakePagePerms              8c5c2384 f   nk:virtmem.obj
 0001:0004145c       ProtectFromPerms           8c5c245c f   nk:virtmem.obj
 0001:000414a4       FindFirstBlock             8c5c24a4 f   nk:virtmem.obj
 0001:000414e0       ScanRegion                 8c5c24e0 f   nk:virtmem.obj
 0001:000416a0       DecommitPages              8c5c26a0 f   nk:virtmem.obj
 0001:00041948       FreePageList               8c5c2948 f   nk:virtmem.obj
 0001:00041970       ReleaseRegion              8c5c2970 f   nk:virtmem.obj
 0001:000419d4       IsAccessOK                 8c5c29d4 f   nk:virtmem.obj
 0001:00041a58       DbgVerify                  8c5c2a58 f   nk:virtmem.obj
 0001:00041ba4       GetKPagePMB                8c5c2ba4 f   nk:virtmem.obj
 0001:00041be8       InitNKSection              8c5c2be8 f   nk:virtmem.obj
 0001:00041c18       DeleteSection              8c5c2c18 f   nk:virtmem.obj
 0001:00041d38       CreateSection              8c5c2d38 f   nk:virtmem.obj
 0001:00041e28       CreateMapperSection        8c5c2e28 f   nk:virtmem.obj
 0001:00041f2c       DeleteMapperSection        8c5c2f2c f   nk:virtmem.obj
 0001:00041f48       DoVirtualAlloc             8c5c2f48 f   nk:virtmem.obj
 0001:00042820       SC_VirtualAlloc            8c5c3820 f   nk:virtmem.obj
 0001:00042844       SC_VirtualFree             8c5c3844 f   nk:virtmem.obj
 0001:00042b08       DoVirtualCopy              8c5c3b08 f   nk:virtmem.obj
 0001:00042f24       SC_VirtualCopy             8c5c3f24 f   nk:virtmem.obj
 0001:00042f78       SC_VirtualSetAttributes    8c5c3f78 f   nk:virtmem.obj
 0001:0004311c       SC_VirtualProtect          8c5c411c f   nk:virtmem.obj
 0001:00043354       SC_VirtualQuery            8c5c4354 f   nk:virtmem.obj
 0001:00043660       IsCommittedSecureSlot      8c5c4660 f   nk:virtmem.obj
 0001:000436c4       DoLockPages                8c5c46c4 f   nk:virtmem.obj
 0001:00043ac0       SC_LockPages               8c5c4ac0 f   nk:virtmem.obj
 0001:00043b14       DoUnlockPages              8c5c4b14 f   nk:virtmem.obj
 0001:00043cd8       SC_UnlockPages             8c5c4cd8 f   nk:virtmem.obj
 0001:00043d2c       AutoCommit                 8c5c4d2c f   nk:virtmem.obj
 0001:00043ec4       GuardCommit                8c5c4ec4 f   nk:virtmem.obj
 0001:00043f58       ProcessPageFault           8c5c4f58 f   nk:virtmem.obj
 0001:00044178       CELOG_SystemPage           8c5c5178 f i nk:virtmem.obj
 0001:000441e4       ProfInit                   8c5c51e4 f   nk:virtmem.obj
 0001:00044234       SC_GetProfileBaseAddress   8c5c5234 f   nk:virtmem.obj
 0001:000442c8       SC_SetProfilePortAddress   8c5c52c8 f   nk:virtmem.obj
 0001:0004440c       SC_AllocPhysMem            8c5c540c f   nk:virtmem.obj
 0001:000444d8       SC_FreePhysMem             8c5c54d8 f   nk:virtmem.obj
 0001:00044538       GetVMInfo                  8c5c5538 f   nk:virtmem.obj
 0001:0004466c       SC_ProfileSyscall          8c5c566c f   nk:profiler.obj
 0001:00044670       SC_TurnOnProfiling         8c5c5670 f   nk:profiler.obj
 0001:00044694       SC_TurnOffProfiling        8c5c5694 f   nk:profiler.obj
 0001:000446bc       SC_DumpKCallProfile        8c5c56bc f   nk:profiler.obj
 0001:000446c0       Phys2VirtWrapper           8c5c56c0 f   nk:profiler.obj
 0001:000446d0       InSysCallWrapper           8c5c56d0 f   nk:profiler.obj
 0001:000446e0       KernelLibIoControl_Verifier 8c5c56e0 f   nk:profiler.obj
 0001:0004485c       KernelLibIoControl_CeLog   8c5c585c f   nk:profiler.obj
 0001:00044a5c       CeLogThreadMigrate         8c5c5a5c f   nk:profiler.obj
 0001:00044ab0       SC_CeLogData               8c5c5ab0 f   nk:profiler.obj
 0001:00044b38       SC_CeLogSetZones           8c5c5b38 f   nk:profiler.obj
 0001:00044b70       SC_CeLogGetZones           8c5c5b70 f   nk:profiler.obj
 0001:00044c48       SC_CeLogReSync             8c5c5c48 f   nk:profiler.obj
 0001:00045034       lowerW                     8c5c6034 f   nk:loader.obj
 0001:00045060       strcmponeiW                8c5c6060 f   nk:loader.obj
 0001:000450c8       strcmpdllnameW             8c5c60c8 f   nk:loader.obj
 0001:000451ac       strcmpiAandW               8c5c61ac f   nk:loader.obj
 0001:00045230       kstrncmpi                  8c5c6230 f   nk:loader.obj
 0001:000452a0       kstrcmpi                   8c5c62a0 f   nk:loader.obj
 0001:000452f4       kstrcpyW                   8c5c62f4 f   nk:loader.obj
 0001:0004532c       FindOptr                   8c5c632c f   nk:loader.obj
 0001:000453c8       ChkDebug                   8c5c63c8 f   nk:loader.obj
 0001:00045450       ReadExtImageInfo           8c5c6450 f   nk:loader.obj
 0001:000454a4       VerifyBinary               8c5c64a4 f   nk:loader.obj
 0001:0004565c       SetROMDllBase              8c5c665c f   nk:loader.obj
 0001:000458a0       OpenExe                    8c5c68a0 f   nk:loader.obj
 0001:000458cc       OpenFileFromFilesys        8c5c68cc f   nk:loader.obj
 0001:00045b10       SafeOpenExe                8c5c6b10 f   nk:loader.obj
 0001:000462f0       CloseExe                   8c5c72f0 f   nk:loader.obj
 0001:00046380       SC_CloseProcOE             8c5c7380 f   nk:loader.obj
 0001:00046588       NKForceCleanBoot           8c5c7588 f   nk:loader.obj
 0001:000465b4       SC_SetCleanRebootFlag      8c5c75b4 f   nk:loader.obj
 0001:000465f4       KernelRelocate             8c5c75f4 f   nk:loader.obj
 0001:000466bc       SC_NotifyForceCleanboot    8c5c76bc f   nk:loader.obj
 0001:000466f0       CalcFSPages                8c5c76f0 f   nk:loader.obj
 0001:00046788       CarveMem                   8c5c7788 f   nk:loader.obj
 0001:0004682c       GrabFSPages                8c5c782c f   nk:loader.obj
 0001:0004688c       KernelFindMemory           8c5c788c f   nk:loader.obj
 0001:00046de0       RelocatePage               8c5c7de0 f   nk:loader.obj
 0001:000472dc       Relocate                   8c5c82dc f   nk:loader.obj
 0001:000475e8       Katoi                      8c5c85e8 f   nk:loader.obj
 0001:0004761c       AddrFromEat                8c5c861c f   nk:loader.obj
 0001:000477a4       ResolveImpOrd              8c5c87a4 f   nk:loader.obj
 0001:00047800       ResolveImpStr              8c5c8800 f   nk:loader.obj
 0001:000478c8       ResolveImpHintStr          8c5c88c8 f   nk:loader.obj
 0001:00047968       IncRefCount                8c5c8968 f   nk:loader.obj
 0001:000479e0       DecRefCount                8c5c89e0 f   nk:loader.obj
 0001:00047a60       UnlinkModule               8c5c8a60 f   nk:loader.obj
 0001:00047ae0       UnCopyRegions              8c5c8ae0 f   nk:loader.obj
 0001:00047bb8       FreeModuleMemory           8c5c8bb8 f   nk:loader.obj
 0001:00047ca4       FreeLibraryFromProc        8c5c8ca4 f   nk:loader.obj
 0001:00047db4       FreeAllProcLibraries       8c5c8db4 f   nk:loader.obj
 0001:00047e0c       CallDLLEntry               8c5c8e0c f   nk:loader.obj
 0001:00048120       FreeOneLibrary             8c5c9120 f   nk:loader.obj
 0001:0004841c       FreeLibraryByName          8c5c941c f   nk:loader.obj
 0001:000484a0       KAsciiToUnicode            8c5c94a0 f   nk:loader.obj
 0001:000484d8       KUnicodeToAscii            8c5c94d8 f   nk:loader.obj
 0001:0004852c       DoImports                  8c5c952c f   nk:loader.obj
 0001:00048a28       AdjustRegions              8c5c9a28 f   nk:loader.obj
 0001:00048ad8       GetNameFromOE              8c5c9ad8 f   nk:loader.obj
 0001:00048c1c       ReopenExe                  8c5c9c1c f   nk:loader.obj
 0001:00048e0c       JitOpenFile                8c5c9e0c f   nk:loader.obj
 0001:00048e8c       JitCloseFile               8c5c9e8c f   nk:loader.obj
 0001:00048ea4       LoadE32                    8c5c9ea4 f   nk:loader.obj
 0001:00049258       PageInPage                 8c5ca258 f   nk:loader.obj
 0001:0004931c       PageInFromROM              8c5ca31c f   nk:loader.obj
 0001:0004957c       PageInFromRAM              8c5ca57c f   nk:loader.obj
 0001:00049790       PageInModule               8c5ca790 f   nk:loader.obj
 0001:00049a5c       PageInProcess              8c5caa5c f   nk:loader.obj
 0001:00049b60       AccessFromFlags            8c5cab60 f   nk:loader.obj
 0001:00049b88       UnloadMod                  8c5cab88 f   nk:loader.obj
 0001:00049e68       UnloadExe                  8c5cae68 f   nk:loader.obj
 0001:0004a004       ReadO32FromFile            8c5cb004 f   nk:loader.obj
 0001:0004a0bc       ReadSection                8c5cb0bc f   nk:loader.obj
 0001:0004a384       UpdateKmodVSize            8c5cb384 f   nk:loader.obj
 0001:0004a41c       LoadO32                    8c5cb41c f   nk:loader.obj
 0001:0004a698       FindEntryPoint             8c5cb698 f   nk:loader.obj
 0001:0004a73c       OpenAnExe                  8c5cb73c f   nk:loader.obj
 0001:0004a7e4       OpenADll                   8c5cb7e4 f   nk:loader.obj
 0001:0004a888       CalcStackSize              8c5cb888 f   nk:loader.obj
 0001:0004a8c4       LoadSwitch                 8c5cb8c4 f   nk:loader.obj
 0001:0004a940       FinishLoadSwitch           8c5cb940 f   nk:loader.obj
 0001:0004aac8       ReserveDllRW               8c5cbac8 f   nk:loader.obj
 0001:0004abc4       CreateNewProc              8c5cbbc4 f   nk:loader.obj
 0001:

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -