@grahamdearsley
Forum Replies Created
-
AuthorPosts
-
Hmm. Not much info out there yet about the exact nature of the hardware bug but the software fix looks nasty.
I was going to write a short pice about virtual address management on x86 CPUs but as this has come up here is a bit about it now.
Once an x86 CPU switches into 32/64 bit protected mode early in the boot process it is using virtual addressing and it maps these addesses into physical memory using page tables set up by the OS.
The CPU provides four levels of hardware memory and execution protection but Windows only uses 0 and 3 which it calls kernel and user modes.
On a 32 bit CPU there is 4GB of virtual address space and Windows normally reserves the top 2GB for its own kernel mode code.
When you launch a user mode program Windows creates a process for its thread/s to run in.
A process is like a container and it holds together all the info Windows needs to run a program. This is called the context.
Part of the context describes the virtual address range the process has been allocated.
A process will usuall be given the bottom 2GB of virtual addresses to use for its own private user mode threads. These virtual addresses are mapped into physical memory using page tables stored in the context of the process.
Every process also gets the 2GB of common kernel mode virtual addresses mapped into its range but this range is mapped into physical memory using the kernal mode page tables common to the whole system.
User mode threads cannot access kernel mode addresses directly but they do need to call OS services so the CPU provides a special service call instruction that puts the CPU into kernel mode and executes a predefined service dispatch routine.
The kerel mode address range has to be included in every process address range or Windows would generate an access violation fault every time a system call was made.
Hardware CPU mode protection is the only thing stopping user code from accessing kernel memory so if a bug has compromised this then its a really big deal !
Hope thats clearer than mud ?
Oops nearly forgot. Here is the answer I was given.
Click Settings, Accounts, Sign-in Options and scroll down to Privacy. Toggle off the option “Use my sign-in info to…” . Do this for all accounts and the annoying message should be gone.
This works for me but I don’t know what else it may affect. So far so good though
Oh all right then
The W10 update has a new feature. If there is any kind of update avalible when a user logs in and they log out or shutdown before the update completes then the next time ANY user logs in Windows will log in the first user automaticaly to finish the update.
Now send the cash and i will tell you how to stop this ?
Now here’s a surprise. Microsoft came back with an answer !
Send cash in used notes to WoF C/O me and I will tell you what it is
Hi John ?
Your phone dont really care where it is charged from. As long as the voltage is correct it will just take the current it needs.
Some litium ion batteries have been made with the potentiol for an internal short but if yours hasn’t caught fire yet i wouldnt worry.
The thing to remember is always charge devices on flat hard serface NOT covered with a pillow !
Oh yeh. Christmas spirit not spirit at christmas ?
Merry Christmas to all and i do mean merry !
Cant share the enthusiasm for Belgian beer though. Last time I was in Brussels all I could get on tap was stella or Maes and it was universally horrid.
Of course I have not followed my own advice on this computer about doing a clean install with the MCT after upgrading from W 8.1 !
The people who installed an earlier build, then restored with a system immage. They got the problem back of course.
The trouble is this is my mums PC and she dosn’t know what she has on it or what she wants to keep.
Hi Bob
Thanks for the reply but I think I can be fairly certain that this is a Windows prblem.
There are now 23 other people on the MS help forum with the same issue. Some have gone as far as reinstalling the previous Windows build and that fixes the problem but so far MS is refusing to belive us. In short they are calling us lying idiots .
Ed
I have just read your post about Windows update causing problems with your CCTV recordings. Have you tried disabling the update service wuauserv ? I have heard that this will stop all updates even on W10 home. I have not tried it myself though so if it works let me know ?
If you updated your Windows 7 PC to Windows 10 during the free update period just to get it registered on the Microsoft hardware database then I find it is usually best to do at least one clean install using the MCT later.
I updated my hobby PC from W7 and the next few updates worked fine but then ALL updates started failing. A clean install fixed that and it has not failed an update since.
All the above specs look good so can I just recomend a supplier.
I use the custom config option on the Palicomp website and most of the time I find them the cheapest for a prebuilt PC.
Their after sales support is good too.
Intel even had a problem with their naming conventions because they had retro named X86 as IA32 (Intel Architecture 32) and named the Itanium IA64.
What were they going to call their 64 bit version of X86. They settled on IA32e.
Yep Intel said at the time that it was not possible to extend X86 any further with a 64 bit version and that was why they were starting afresh with the Itanium.
Before the Itanium launch they also said it would do X86 emulation in hardware at about the same speed as a real X86. The Itaniun actually does emulation at about 25% the speed.
Intel was seriously wrong footed when AMD came up with AMD64 and microsoft wrote a version of windows for it.
The last update broke Office home and student 2016 on two of my mum’s friends computers.
The update disabled the Office click start service preventing Office from starting. Just setting the service back to automatic fixed it.
They have done that before. Seems to happen off and on anytime they talk about X64.
I didn’t forget Ed, I just thought three items was enough to be geting on with ?
For those not in the know though NTFS writes a journel of any proposed disk changes before it actually makes them. If the system crashes before the operation is complete then NTFS usese the journel to roll the changes back so its as if the operation never happened. This protects the filing system but not the data. NTFS runs its repair routines on the first volume access after every boot. If nothing was wrong then this is very quick as nothing really happens but if a fault is found then it is rolled back.
If you DO read up on it Bob you will find that file records don’t work EXACTLY as I described but its close enough to get the idea. For one thing if your file is less than 1k then you may not have a seperate data stream run because it will be contained in the file record its self in the master file table. The other thing i should mention is that all files that relate to the disc structure start with a dollar sign and do not appear to standard user applications.
What gives you that idea speedy ?
Have a look at their wiki page
Just for fun have a look at this tech link.
http://www.stevehilltelevisionservices.co.uk/hitachi-42hxt12u/
-
AuthorPosts
