|
喷血跪求 WM6启动问题!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[复制链接]
喷血跪求WM6启动死机问题, 以下是启动log,跪求各位高手指点!!!!!!!!!!!!!!!!!!!!!!
LOG前半段
4294767296 PID:0 TID:0 -OALKitlInit(rc = 1)
4294767296 PID:0 TID:0 -OALKitlStart(rc = 1)
4294767296 PID:0 TID:0 -OEMInit
4294767296 PID:0 TID:0 Using Paging Pool, size = 0x00200000, Addr = 0x84387000, gpPoolArr = 0x84587000
4294767296 PID:0 TID:0 Error Reporting Memory Reserved, dump size = 0004b000
4294767296 PID:0 TID:0 Booting Windows CE version 5.02 for (ARM)
4294767296 PID:0 TID:0 &pTOC = 840071c4, pTOC = 841c06a8, pTOC->ulRamFree = 84387000, MemForPT = 00202000
4294767296 PID:0 TID:0
Old or invalid version stamp in kernel structures - starting clean!
4294767296 PID:0 TID:0 Configuring: Primary pages: 13606, Secondary pages: 0, Filesystem pages = 531
4294767296 PID:0 TID:0
Booting kernel with clean memory configuration:
4294767296 PID:0 TID:0 Memory Sections:
4294767296 PID:0 TID:0 [0] : start: 8458a000, extension: 00004000, length: 03526000
4294767296 PID:0 TID:0 Memory Extension Sections:
4294767296 PID:0 TID:0 <* ====================================== *>
4294767296 PID:0 TID:0 [0] : Start: 8458e000, End: 87ab4000
4294767296 PID:0 TID:0 <* ====================================== *>
4294767296 PID:0 TID:0 Sp=ffffc7cc
0 PID:0 TID:0 Windows CE KernelInit
942 PID:7ab3002 TID:7ab3266 Updated eptr->e32_vsize to = 000c4000
951 PID:7ab3002 TID:7ab3266 Scheduling the first thread.
959 PID:7ab3002 TID:7ab3266 0x87ab3024: KernelInit2: pCurThread=87ab3024 hCurThread=07ab3266 hCurProc=07ab3002, KernelInit = 8402b158
974 PID:7ab3002 TID:7ab3266 0x87ab3024: Detecting VFP...
982 PID:7ab3002 TID:7ab3266 0x87ab3024: VFP Not Found!
991 PID:7ab3002 TID:7ab3266 0x87ab3024: Updated eptr->e32_vsize to = 00004000
1001 PID:7ab3002 TID:7ab3266 0x87ab3024: Updated eptr->e32_vsize to = 0000c000
1013 PID:7ab3002 TID:7ab3266 0x87ab3024: gaojian +OEMIoControl(0x1010004, 0xc201fc64, 4, 0x84370e18, 520, 0x84372828)
1027 PID:7ab3002 TID:7ab3266 0x87ab3024: +OALIoCtlHalGetDeviceInfo(...)
1036 PID:7ab3002 TID:7ab3266 0x87ab3024: -OALIoCtlHalGetDeviceInfo(rc = 1)
1045 PID:7ab3002 TID:7ab3266 0x87ab3024: -OEMIoControl(rc = 1)
1054 PID:7ab3002 TID:7ab3266 0x87ab3024: gaojian +OEMIoControl(0x1010004, 0xc201fc64, 4, 0x84370c10, 520, 0x84372824)
1068 PID:7ab3002 TID:7ab3266 0x87ab3024: +OALIoCtlHalGetDeviceInfo(...)
1077 PID:7ab3002 TID:7ab3266 0x87ab3024: -OALIoCtlHalGetDeviceInfo(rc = 1)
1086 PID:7ab3002 TID:7ab3266 0x87ab3024: -OEMIoControl(rc = 1)
1095 PID:7ab3002 TID:7ab3266 0x87ab3024: gaojian +OEMIoControl(0x1010004, 0xc201fc64, 4, 0x84370a04, 32, 0x84372820)
1109 PID:7ab3002 TID:7ab3266 0x87ab3024: +OALIoCtlHalGetDeviceInfo(...)
1118 PID:7ab3002 TID:7ab3266 0x87ab3024: -OALIoCtlHalGetDeviceInfo(rc = 1)
1127 PID:7ab3002 TID:7ab3266 0x87ab3024: -OEMIoControl(rc = 1)
1136 PID:7ab3002 TID:7ab3266 0x87ab3024: Updated eptr->e32_vsize to = 0000c000
1148 PID:7ab3002 TID:7ab3266 0x87ab3024: Updated eptr->e32_vsize to = 00022000
1159 PID:7ab3002 TID:7ab3266 0x87ab3024: Starting kernel debugger software probe (KdStub) - KD API version 20
1179 PID:7ab3002 TID:7ab3266 0x87ab3024: >>> Loading module NK.EXE at address 0x84000000-0x840C4000 (RW data at 0x84306000-0x8436F427)
Kernel debugger connected.
The Kernel Debugger connection has been established (Target CPU is ARM).
Target name: CE Device
Probe name: KdStub
Binary Image should be loaded at 0x84000000 / Data relocated at 0x84306000
Loaded symbols for 'NK.EXE'
Loaded symbols for 'KD.DLL'
Loaded symbols for 'OSAXST1.DLL'
Loaded symbols for 'OSAXST0.DLL'
Loaded symbols for 'HD.DLL'
1206 PID:7ab3002 TID:7ab3266 0x87ab3024: first = 01fa0000, last = 02000000, SharedDllBase = 02010000
1225 PID:7ab3002 TID:7ab3266 0x87ab3024: >>> Loading module coredll.dll at address 0x03F5A000-0x03FE1000 (RW data at 0x01FFC000-0x01FFCD08)
Loaded symbols for 'COREDLL.DLL'
1245 PID:7ab3002 TID:7ab3266 0x87ab3024: gaojian +OEMIoControl(0x10100d0, 0x0, 0, 0xc201fdf0, 4, 0xc201fe04)
1257 PID:7ab3002 TID:7ab3266 0x87ab3024: +OALIoctlHalGetRandomSeed(...)
1266 PID:7ab3002 TID:7ab3266 0x87ab3024: -OALIoCtlHalGetRandomSeed(rc = 1)
1276 PID:7ab3002 TID:7ab3266 0x87ab3024: -OEMIoControl(rc = 1)
1285 PID:7ab3002 TID:7ab3266 0x87ab3024: gaojian +OEMIoControl(0x10100f8, 0x0, 0, 0xc201fdf8, 8, 0xc201fe04)
1297 PID:7ab3002 TID:7ab3266 0x87ab3024: -OALIoCtlHalGetHWEntropy(rc = 1)
1307 PID:7ab3002 TID:7ab3266 0x87ab3024: -OEMIoControl(rc = 1)
1340 PID:7ab3002 TID:7ab3266 0x87ab3024: gaojian +OEMIoControl(0x10100b4, 0x0, 0, 0x0, 0, 0x0)
1352 PID:7ab3002 TID:7ab3266 0x87ab3024: +OALIoCtlHalPostInit
1361 PID:7ab3002 TID:7ab3266 0x87ab3024: -OALIoCtlHalPostInit
1370 PID:7ab3002 TID:7ab3266 0x87ab3024: -OEMIoControl(rc = 1)
1391 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: >>> Loading module coredll.dll at address 0x03F5A000-0x03FE1000 (RW data at 0x01FFC000-0x01FFCD08)
1416 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: >>> Loading module filesys.exe at address 0x04010000-0x0405C000
Loaded symbols for 'FILESYS.EXE'
1442 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: >>> Loading module certmod.dll at address 0x03FE1000-0x03FEF000 (RW data at 0x01FFD000-0x01FFD658)
Loaded symbols for 'CERTMOD.DLL'
1476 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: gaojian +OEMIoControl(0x1010038, 0x406fad8, 16, 0x0, 0, 0x406fb00)
1489 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: +gaojian OALIoCtlHalInitRTC(...)
1499 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: -OEMIoControl(rc = 1)
1518 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: SC_CreateAPIHandle: pvData == NULL
1532 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: gaojian +OEMIoControl(0x101008c, 0x0, 0, 0x406fa78, 4, 0x406fa7c)
1544 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: -OALIoCtlHalGetRegSecureKeys(rc = 1)
1554 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: -OEMIoControl(rc = 1)
1564 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: gaojian +OEMIoControl(0x101008c, 0x0, 0, 0x702b0, 52, 0x406fa7c)
1577 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: -OALIoCtlHalGetRegSecureKeys(rc = 1)
1586 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: -OEMIoControl(rc = 1)
1641 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: gaojian +OEMIoControl(0x10100b0, 0x0, 0, 0x0, 0, 0x0)
1652 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: -OEMIoControl(rc = 1)
1679 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: >>> Loading module fsdmgr.dll at address 0x03F14000-0x03F2A000 (RW data at 0x01FF7000-0x01FF73F0)
Loaded symbols for 'FSDMGR.DLL'
1727 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: >>> Loading module relfsd.dll at address 0x03E9D000-0x03EA8000 (RW data at 0x01FED000-0x01FEDB2C)
Loaded symbols for 'RELFSD.DLL'
1811 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: Mounted ReleaseFSD volume '\Release'
1855 PID:87a9fbfa TID:87a9fbd6 0x87a9f994: size of 'dbglist.txt' = 00000000
1904 PID:67a69266 TID:67a69242 0x87a69000: >>> Loading module coredll.dll at address 0x03F5A000-0x03FE1000 (RW data at 0x01FFC000-0x01FFCD08)
1936 PID:67a69266 TID:67a69242 0x87a69000: >>> Loading module pm.dll at address 0x03ED7000-0x03EE6000 (RW data at 0x01FF2000-0x01FF284D)
Loaded symbols for 'PM.DLL'
|
|