Error in program startup order. Problems loading the PC. Complete system cleaning with cleaning programs
(created to support clients of Praktika LLC)
Important! Before making any changes to the 1C database, make a backup copy. If 1C is launched in configurator mode, then through the Administration -> Save data menu. If you already have older copies, do not write over them, make a separate archive. If 1C does not start in configurator mode, copy the entire database directory to another location. If you have another storage medium (second HDD, Zip drive, writing CD-ROM), then it is better to make a copy to it. Question : When launched, the program does not load and displays the message “Protection key not found.” Answer: This error can occur due to a number of reasons. The solution options depend on whether you have a network version or a local one. Let's start with local, as a simpler case. We suggest you perform the following steps. After each attempt, please try to launch 1C: Enterprise. It is possible that the problem will be solved in the first step, and then all subsequent ones will not be needed. a)Restart your computer by clicking Start->Shut Down ->Restart Computer ->OK. Wait until the computer will restart , then try starting 1C again. b)You may have forgotten to install the protection driver when installing the program. Then you need to launch it by clicking Start ->Programs->1C: Enterprise 7.7->Install protection driver. Restart your computer and try starting 1C: Enterprise again. cCheck the physical presence of the key on the computer; someone may have touched it and it fell out of the computer. To do this, you need to get to the back wall of the computer case, where the wires are connected. Important: It is highly recommended that you turn off your computer first. The key looks like a block about 3x4x1 cm. Most likely, it will be red or white. The key is inserted into the LPT port (in the same place as the printer). In any case, you can only insert the key into the LPT port. Important: you do not need to exert much force, the efforts should be comparable to the efforts when lifting a glass of tea. If the key does not fit into the port, do not try to force it in, as either it is not a key or you are not inserting it into the LPT port. It’s better to call the person responsible for computers in your company, or call us. After you have inserted the key into the port, turn on the computer and try to start 1C: Enterprise again. d) Sometimes a printer and other equipment placed “on top” of the key can interfere with its detection by the security server. After first turning off the computer and printer, try disconnecting the peripheral (usually the printer) from the computer, leaving the key in place. Now turn on the computer and try to start 1C. Of course, in this case, you will not be able to use the disabled device. If you are using a network version and the key is not located on your computer, then it is recommended that you seek help from the person who is responsible for the performance of computers in your company. If you are this person, then we can advise you to perform the following actions: a) Check that the problem computer “sees” the server on which the key is located. You can either ping the server from the command line by running the ping program from the problem computer with the name of the server computer as a parameter. For example, c: ping server1c. Or you can simply check the presence of a server computer in the list of computers available to the client by clicking on the “My Network Neighborhood” icon. If it turns out that the problem computer does not “see” the server, then you will need to carry out a standard check for network problems. We recommend starting with checking the integrity of the cables (no breaks), the functionality of the hub, the functionality of the network card (is the light on, is the ping 127 command successful. 0.0.1), in addition, you should make sure that the necessary protocols are available and that they are configured correctly. b) Make sure that the “Protection Server” program is running on the computer with the key. This program is necessary for the operation of 1C: Enterprise clients in the network version. You can start it by clicking Start -> Programs -> 1C: Enterprise 7.7 -> Protection Server. c) On every computer with 1C: Enterprise there is a nethasp.ini file, which by default is located in C: Program Files1Cv77BIN. This file contains settings for the program that checks for the presence of a key on the network. The file is quite well documented, and you can probably figure out its structure. We recommend that you pay special attention to the lines of the protocols used (perhaps there is only one IPX/SPX left, which is not used at all on your network), the wait time for searching for a key (if the network is weak, the program may simply not have time to find it) and links to the server computer (perhaps such a computer no longer exists, it has been moved or renamed). Question: When starting 1C: Enterprise, the program does not load and displays a message like “Database directory not found C:1C.” Answer: This happened due to the fact that the folder in which the 1C database is located is inaccessible. If the database is on your computer, then most likely you have moved it somewhere. Remember if you have moved any directories (folders) recently. If you know exactly where the database was moved, or it seems to you that the recently moved folder is the database, then when starting 1C in the dialog box, select the “Change” button (on the right are the OK, Cancel buttons and the next one is “Change”). Specify a new path to the database and, by clicking on the OK button, launch 1C: Enterprise again. If the database is not on your computer, but on a remote server, then it is better to seek help from the person who is responsible for the performance of computers in your company. If you still decide to fix the problem yourself, then, firstly, you need to check the presence of a network between two computers (you can simply check the presence of a server computer in the list of computers available to the client by clicking on the “My Network Neighborhood” icon). Secondly, you need to find out the location of the directory with the database on the server. After that, by clicking on the “Change” button in the 1C: Enterprise launch dialog box, select “My Network Neighborhood” -> Server on which the database is located -> Specify the path to the database. Now try launching 1C: Enterprise again. Question: I can’t start 1C: Enterprise, the program stops with the error “Data blocking error. The data may be being used by another task." Answer: 1C: An enterprise can be launched in two modes: Exclusive and Separated. In exclusive mode, only one user can open the database. The above message indicates that someone is already logged in in exclusive mode (perhaps you) and you are now trying to use the database. The first thing you need to do is check your computer. Look at the taskbar (to the right of the “Start” button), if you see the inscription “1C: Enterprise” there, then click on it and close it. This was a previously launched copy of the 1C: Enterprise program. Start 1C: Enterprise again. If 1C: Enterprise is not running in exclusive mode on your computer, then two options are possible. The first option is applicable if there are few computers on the network using 1C: Enterprise, and they are located close to each other. Then you can go to each computer and, by selecting the 1C menu item: Enterprise Help -> About the program, you will see the Operating mode in the very last line. If it says “Monopoly” on the left, then you need to close 1C: Enterprise on this computer and start it on your own. Most likely, the problem will be solved. The second option should be used when there are many computers on the network, and it takes too long to go around them one by one. Then you need to launch the Monitor with the command Start -> Programs -> 1C: Enterprise -> User Monitor. Having launched the monitor, you need to select the menu item Monitor -> Active users. You will see a list of computers from which the database is currently being used (each line is a running 1C component: Configurator, Enterprise, Monitor, Debugger). If you pay attention to the leftmost column, you may notice that one of the computers is running 1C: Enterprise in exclusive mode (this is displayed by a red exclamation mark next to the icon). Go to this computer and close 1C: Enterprise there. The problem should now be resolved. Sometimes it is possible that some computer shut down incorrectly (or simply froze), then you need to turn it off and turn it on again. If it is impossible to determine which computer has occupied the base, and the Monitor does not indicate a computer using exclusive mode, then you will have to turn off all computers (you can one at a time, trying to start 1C after turning off each computer). Question: The program does not start and displays the message “Error loading metadata.” Answer: There is no general solution to the problem here. First, make sure that the correct path to the database is specified. You can check this by looking at the inscription at the very bottom of the 1C: Enterprise launch window. There should be a path to the database (something like C:1C). If you don’t know whether this is the right path, then read the answer to the question “When starting 1C: Enterprise, the program does not load and displays a message like “The database directory is not found C:1C.” If this does not help, then try contacting the person responsible for computers in your company. If you have no one to contact or it turns out that the path is correct, but the database nevertheless does not start, then it is better to contact us. Question: The program does not start and displays the message “Error opening table index file. To restore index files, run the program in exclusive mode." Answer: To solve this problem, you need to run the program in exclusive mode (check the “Exclusive” box when starting the program). Of course, you will first have to ask all users to log out of 1C: Enterprise. The offer to restore index files must be answered in the affirmative. This process can take a significant amount of time, from 1-2 minutes for databases of 5-10 megabytes to about an hour for large databases. If you cannot start the system in exclusive mode, although you are sure that all users have exited the program, then first check your computer; there may be a running copy of the program left there. If this does not help, then try turning off the client machines (you can do one at a time, checking after each one). It is likely that one of the programs was terminated incorrectly and did not free the database. Question: The program does not start and displays the message “The log file is damaged.” Answer: In your database directory (the path to the database is written at the bottom left of the launch window) there is a Syslog subdirectory. In this directory there is a file 1cv7.mlg, this is the log file. Move it to another directory; If you think that you do not need the log file, you can delete it. The main thing is to remove the log file from this directory. The next time you start 1C: Enterprise it should boot successfully and create an empty log file. Question: When you start the program, a pop-up screen appears with the inscription 1C: Enterprise and immediately disappears. Answer: This problem arose because you are not allowed to write to the database directory. 1C: Enterprise requires an entry to this directory to launch. To correct the situation from the server on which the database is located, select a shared resource (disk or directory with the database), right-click, select the Properties menu, Access tab, set the value to Full (or change the indicator to “Share folder” for Windows 2000). Save the changes and try running 1C: Enterprise again. Question: When trying to open the database, the program stops with the error message: "The sort order set for Database, does not coincide with the system one." Answer: In order to fix this error, click on the My Computer icon -> Control Panel -> Languages and Standards. Set the suggested value to “Russian” and restart your computer. Question: When starting the program, the download stops with the error message: “Runtime Error! Program c:Program Files1Cv77Bin1Cv77.exe. Abnormal termination.” Answer: There are several possible reasons for this error. First, copy the directory of your database to another location, so that even if the worst outcome occurs (the lights are turned off during the correction process), you can return to the situation before the correction began. You can take the following steps to fix this error yourself. After each step, try to launch 1C: Enterprise.- Restart your computer.
- Reinstall 1C: Enterprise.
- Copy the file 1Cv7.md, which is located in the NEW_STRU directory of your database, to the directory of your database. For example, if your database is in the c:1Cbase directory, then you need to copy the 1Cv7.md file from c:1CbaseNEW_STRU to c:1Cbase. To the question: “Should I replace the current file?” you should answer “Yes”.
- Launch the Configurator, select Administration -> Information Security Testing and Correction. Click on the Run button.
1cv7.exe MODE [ /M | /D | /U | /N | /P ],
where MODE is the launch mode, can take only one of three values:
config - configurator mode;
debug - debugger mode;
enterprise - normal (working) mode 1C: Enterprise.
the following keys are optional:
/M - launch the program in exclusive mode;
/D - database directory;
/U - user’s working directory (the directory from the list of users is ignored);
/N - user name;
/P - user password;
/T - path to temporary files
/@ - for configurator mode specifying a batch launch file
/W - initialization of the Web extension
Example: 1cv7 enterprise /Dc:1cmainbase /NIvanov /P123,
in this case, the program will launch without displaying dialogs about choosing a database and operating mode, as well as without prompting for a user name and password.
Launching in batch mode is described in detail in the book “Configuration and Administration. Part two" on page 252.
There are a huge number of reasons why programs installed on a computer suddenly stop working or start running altogether. Unfortunately, many of them are of an extremely specific nature, associated with certain software and technical nuances of each individual application and require an exclusive approach from the user to resolve the issue of restoring their functionality.
However, there are many common reasons that arise quite often, and by eliminating them, you can easily restore the operation of most software. We want to offer such truly effective universal solutions to our users in the instructions below.
So, if any program installed on your computer has stopped working or starting, you need...
Check technical requirements (System Requirements)
Before downloading and using any program, always carefully check the technical requirements for each program on the official website of the software developer. At the same time, be sure to keep in mind that such tech. There are two types of requirements: minimum (guarantee that the program will run on your machine, but do not guarantee that it will function quickly and fully) And recommended.
Those who download software from our website mydiv.net should note that information on technical requirements is located on the main page of each program in the tab "Requirements"(see screenshot).
Studying tech. requirements of each application, pay attention to the following nuances, especially if you have problems not with “household” software, but with specialized utilities ( for example, the program for setting up, testing and overclocking any hardware or other professional applications does not start / does not work):
- Processor power, its brand, model and other additional parameters (for example: Intel Core 2 Extreme QX9650, 3GHz).
- Volume random access memory , its brand, type, bus frequency, etc. (for example: Corsair DDR3 2048MB, 1333MHz).
- Video card parameters: brand, model, integrated (built-in) or discrete (external), volume and type of video memory, etc. (for example: AMD Radeon HD 7770, 1GB GDDR5).
- Hard drive: be sure to check the amount of free space required to install the program + additional space for storing temporary and files created in this program, as well as: brand, model, type (external or internal), type (SSD, HDD or SSHD) and other tech. options hard drive.
- Sound card. Carefully check all the requirements for the sound device: brand, model, type (internal or external), etc. This is especially necessary for launching and using specialized programs for setting up and testing sound cards, audio editors, converters, etc.
- Operating system requirements: Be sure to check the OS version, its build number, requirements for the presence of installed service packs, the bit depth of the operating system, etc. (for example: Windows 7 Home Premium SP1 x64 or Windows 10 Build 10547).
- Additional software. In addition to the hardware requirements necessary to launch and operate programs, there are also “software requirements” for the software. That is, for the normal functioning of any application, the mandatory installation of additional technical software may be required. Here is a list of what you definitely need to install on your computer and update periodically to keep the installed version up to date:
- Microsoft DirectX. A set of libraries and tools necessary for processing and reproducing computer graphics.
- K-Lite Codec Pack or Advaced Codecs. Sets of multimedia codecs necessary for playing audio and video on a computer. They are also often used by specialized programs for editing and converting audio and video.
- Adobe Flash Player. A browser add-on program that allows you to play videos on the Internet.
- Microsoft Visual C++. A set of libraries and plugins necessary for the operation of many computer programs (including video games) written in C++ or C#.
- Microsoft .NET Framework. Required for programs and games written using .NET technology.
- Java JRE. Required for running programs created using the Java language.
For other software requirements, check on the official websites of program developers! Having carefully studied all the hardware and software requirements, you will immediately understand whether your computer can handle it the desired program or not!
Update/reinstall drivers
The driver is the most important technical program on which the normal operation of all devices connected to the computer (processor, video card, sound card and other devices), as well as the operating system and all the software installed on it. Agree, if you have any problems with the webcam driver, then you are unlikely to be able to use a program for recording from a webcam or make a video call on Skype. Another option... For example, if you do not have a sound card driver installed on your computer (or it has started to conflict), then your media player will definitely show “silent movies”, and you can also forget about working in audio editors/converters. Therefore, it is quite obvious that you need to carefully monitor the drivers and update them on time!
Complete uninstallation and reinstallation of broken programs
Indeed, this method can really work. Applications that fail or do not start at all should be removed from the system and reinstalled. To correctly remove programs from the operating system, it is best to use specialized applications "uninstallers". For these purposes, we recommend using Revo Uninstaller. Detailed instructions About, how to properly reinstall programs on your computer and use Revo Uninstaller , can be read in.
However, the programs uninstallers To date, a lot has been created. If the above program does not suit you in any way, then you can choose any other application you like from this set of programs.
Complete system cleaning with cleaning programs
This method is also quite justified, especially as a preventative against program failures in the future. Remember! The less “garbage” that accumulates in the operating system, the more stable it and all the software installed on it will work!
To perform tasks of this kind, it is best to use special programs - “cleaners”. The best of them, undoubtedly, is CCleaner. How to use CCleaner and completely clean the system , it is written in detail. For those who would like to use this program on an ongoing basis in the future, we recommend another thematic guide "".
However, there are also quite a lot of cleaning programs on the modern computer market. If the need arises, you can easily select any other program to clean the “OS” by looking at this set of “Programs for cleaning the operating system”.
Removing programs from startup (autorun)
Programs that are in autorun always automatically start along with the operating system and continue to hang in the background in the future. Without a doubt, many of them may well conflict with other applications running/running on the PC, as well as greatly slow down the system and even often lead to crashes! Try removing all unnecessary applications from startup and, quite possibly, the programs you need will start launching and working normally again.
You can clear startup from unnecessary objects different ways as manually (via service msconfig), and with the help of specialized utilities, for example, the same CCleaner. You can read more about how to edit autorun in the manual " ".
Cleaning computers from viruses
Malware can also be the real reason why certain programs on a computer may not work or start, since viruses can easily damage, delete and block working program files. Therefore, we recommend that all users acquire a serious antivirus and completely scan the system!
You can select suitable anti-virus programs here (these sets contain the best, including free anti-virus applications of various types):
Additional antivirus software, you can search on mydiv.net in other sets of programs in the "Security" section.
Read carefully in these guides about how to use antiviruses and thoroughly clean your computer from various malware:
Add exceptions to antivirus
As you know, there are no ideal antiviruses. Many of them often suffer from false positives. At any moment, an antivirus can easily delete files of any program that it “doesn’t like” from the computer or block their execution. Accordingly, these programs will immediately stop working or start altogether.
To avoid such unpleasant situations, you need to use the function "Exceptions", available in almost every normal antivirus. Please note! You can add only those files and folders that you consider 100% safe to exceptions!
To learn how to correctly create exceptions in antiviruses, read these guides:
- " ",
Run programs as administrator and disable UAC
UAC- account control system Windows users, created to control the delimitation of user access rights to operating system functions and prevent unauthorized launch of various applications in the “background” mode.
Only the administrator has elevated privileges in the system. And only it can run many system services and applications installed on the computer! Therefore, if any program does not start for you, try restarting it with administrative rights. At the same time, you can turn off the system UAC so as not to interfere in the future.
You can read more about how this is done in the manual " ".
Various network problems...
Here you will find solutions for the most common network problems due to which many programs installed on the computer stop working or starting.
Prescribing Google DNS
Many programs require a constant and stable Internet connection to launch and work, with which most of our providers often have serious problems. One of the most common problems is DNS server failures. So, if your router detects the presence of a connection, but for some unknown reason the pages in the browser do not load, it is quite possible that the provider has some problems with the DNS servers. To fix the problem, you need to set it in the network card settings alternative DNS servers from Google.
It's done like this. Click on the network icon (in the lower right corner of the screen) and open "Network and Sharing Center".
In the menu that opens, select the option "Change adapter settings" and you will be taken to the section "Network connections".
In this section, select "Connect via local network" or "Wireless network connection"(if you get internet via Wi-Fi). Right-click on the selected object and select "Properties".
In the properties of the network card, select "Internet Protocol Version 4 (TCP/IPv4)" by double-clicking on it. In the network protocol properties that open, enter the following numbers: "Preferred DNS Server" - 8.8.8.8, "Alternate DNS server"- 8.8.4.4. Then, to confirm the operation, press "OK".
As an alternative, you can do this. In the "preferred server" column, write IP address of your router(usually: 192.168.1.1 or 192.168.0.1 ), and in the “alternative” - already Google’s DNS.
After this, if the problem was with the DNS servers, the pages in the browser begin to open normally, and the operation of many programs that require an Internet connection returns to normal.
Adding programs to antivirus network exceptions
As mentioned earlier, in one of the instructions described above, many modern antiviruses are far from ideal and often upset users with false positives. At their “purely personal” discretion, they can easily block all network activity of any programs running/running on the computer. It’s not hard to guess where this will lead! There is only one way to deal with this - add programs and processes running in the system to exceptions Many Windows applications (for example, Windows Live Mail and Skype, etc.) are directly connected to the browser Internet Explorer. That is, simply, they use its engine. Because of this (in some situations) offline mode this browser may cause problems with online applications. If, for example, your mail in Windows Live Mail is not restored or you cannot log into Skype (white or blue screen without fields for entering login / password) and other similar problems with previously normally working software, you may need disable offline mode in Internet Explorer. It's done like this. Launch Internet Explorer. Press the key "ALT" to display the browser control panel. Open the tab "File" and remove the checkbox from the item "Work autonomously"(also, this option can be located in the tab "Service"). However, please note that in new versions of the IE browser, there is no such option in the control panel, and you can disable offline mode only through editing the registry! This is done as follows. Open menu "Start" and in the search bar type the command: regedit. Click left. click on the shortcut that appears at the top regedit.exe to launch Registry Editor. Next, find the branch in the registry: HKEY+CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings. After this, double-click with the left mouse button on the parameter "GlobalUserOffline" and in the window that opens, set the value - 0
. If you find such a parameter in the registry, then you definitely need to create it! Right-click in the right window of the Registry Editor and select the option "Create", and then "DWORD value". After all operations are completed, IE's offline mode will be disabled and the functionality of the programs you need should be restored. This concludes this guide. As far as possible, we have presented you with all the fastest and most effective methods for solving common problems related to the launch and operation of software. Try using the most suitable ones and, most likely, your programs will work again!Turn off offline work in Internet Explorer
Manually editing the Windows registry to remove Error 5 keys that contain errors is not recommended unless you are a PC service professional. Mistakes made when editing the registry can render your PC inoperable and cause irreparable damage to your operating system. In fact, even one comma placed in the wrong place can prevent your computer from booting!
Because of this risk, we highly recommend using a trusted registry cleaner such as WinThruster [Download] (developed by Microsoft Gold Certified Partner) to scan and repair any Error 5-related issues. Using Registry Cleaner [Download] can automate the process of finding corrupted registry entries, missing file references (such as those causing the %%error_name% error), and broken links within the registry. Before each scan, a backup copy, which allows you to undo any changes with one click and protects you from possible damage to your computer. The best part is that fixing registry errors [Download] can dramatically improve system speed and performance.
Warning: Unless you are an experienced PC user, we DO NOT recommend manually editing the Windows Registry. Using Registry Editor incorrectly can cause serious problems and require Windows reinstallation. We do not guarantee that problems resulting from incorrect use of Registry Editor can be corrected. You use Registry Editor at your own risk.
Before manually restoring Windows registry, you need to create a backup by exporting the part of the registry associated with Error 5 (for example, Windows Operating System):
- Click on the button Begin.
- Enter " command" V search bar... DON'T CLICK YET ENTER!
- While holding down the keys CTRL-Shift on your keyboard, press ENTER.
- A dialog box for access will be displayed.
- Click Yes.
- The black box opens with a blinking cursor.
- Enter " regedit" and press ENTER.
- In the Registry Editor, select the Error 5-related key (for example, Windows Operating System) that you want to back up.
- On the menu File select Export.
- On the list Save to select the folder where you want to save the backup Windows key Operating System.
- In field File name Enter a name for the backup file, for example "Windows Operating System backup".
- Make sure the field Export range value selected Selected branch.
- Click Save.
- The file will be saved with extension .reg.
- You now have a backup of your Windows Operating System-related registry entry.
The following steps for manually editing the registry will not be described in this article, as they are likely to damage your system. If you would like more information about editing the registry manually, please check out the links below.
It's time to submit a quarterly or, better yet, an annual report, click on the program shortcut 1C Enterprise 7.7 and in response you get error message: "" After which you can only launch the configurator? Don't know what to do? Let's find a way out of an unpleasant situation together.
The reason for this error messages
clear - settings mismatch 1C Enterprise 7.7
And Windows 7.
Let's start troubleshooting the problem.
Solution 1.
Let's give the code page in accordance with the operating system Windows 7:
Click on the program shortcut 1C Enterprise 7.7
and in the window that opens, mark the database you are going to work with. Then click on the “Configurator” button. In the configurator that opens, follow the menu path Administration → Code page of information security tables... Then in the window " Code page of infobase tables» select from the list → + Current system installation→ OK. In the window that opens asking for changing the code page click “Yes”. Wait for the procedure to complete and close the Configurator. That's it, you can work with this information base in Windows 7(for other databases the procedure will have to be repeated). But do not forget that if you transfer this database to a computer with an operating Windows system XP, you will receive an error message again.
Solution 2.
Let's disable sort order checking:
Create an empty file ordnochk.prm and put it in a folder BIN located in the installation directory 1C Enterprise 7.7
, thus disabling the sorting check for all databases at once. This solution, despite its simplicity, can cause some problems and, moreover, will only work if you are using version 26 or later of the program 1C Enterprise 7.7
.
Naturally, if you use 1C Enterprise 7.7
on local computer with installed Windows 7, or this operating system is installed on all machines, then your choice Solution 1
.
If the computers have different operating systems, then it will suit you better Solution 2. Important! All changes in the Configurator will need to be made exclusively on a computer with the installed Windows XP, information databases should also be stored there, but here is the file ordnochk.prm, on the contrary, you need to put it in a folder BIN located on a machine running an operating system Windows 7.
As you can see, error message: « The sort order set for the database is different from the system one! » is easy to fix. Good luck!
You turn on the computer, a text loading screen appears on which numbers and letters quickly flash. Usually, the computer works fine and you don't pay attention to them. But this is an important part of the computer’s operation during which the firmware built into the BIOS runs. But then something incomprehensible happened and everything stopped, an error code is displayed on the screen, and sometimes nothing is displayed at all - the cursor blinks and everything is frozen in an incomprehensible dream.
How it worksAfter turning on the computer, there is no operating system in its RAM. And without an operating system, the computer's hardware cannot perform complex actions, such as loading a program into memory. This creates a paradox that seems insoluble: in order to load an operating system into memory, we must already have the operating system in memory. The solution to this paradox is the use of several microprograms located in one or more chips, BIOS (Basic Input/Output System). P loading process begins with the processor automatically executing commands located in permanent (or rewritable) memory (EEPROM or Flash ROM), starting from a given address. These firmwares do not have all the functionality of the operating system, but they do have enough functionality to perform sequential loading of other programs, which are executed one after another until the last one loads the operating system. The sequence of main blocks of BIOS functions in PC-compatible computers: 1. - POST - self-test when turning on the power of the processor, memory, system logic chipset, video adapter, disk controller, keyboard, mouse and other controllers and devices; 2. - Setup BIOS (BIOS parameter setting program) - configuration of system parameters. It can be triggered during the POST procedure by pressing a certain key combination. If it was not called by the user, the parameters installed and saved in permanent memory during the last configuration of Setup BIOS are loaded. 3. - Operating system loader - a subroutine that searches for a valid primary boot sector on a disk device. 4. - BIOS - a set of drivers designed for interaction between the operating system and hardware when the system boots. During the BIOS loading process, in addition to the above, connection, disconnection, and setting of the operating mode of the system board device controllers is carried out in accordance with the settings recorded in permanent memory. Why is this necessary? This is needed for:
During its execution, the presence of boot devices that must be initialized before loading the operating system is checked. These include:
The BIOS then polls the devices listed in a pre-built list until it finds a boot device. If such a device is not found, an error message will be displayed and the boot process will be stopped. If the BIOS detects a boot device, it reads the bootloader from it and transfers control to it. In the case of a hard drive, the boot loader is called the master boot record (MBR) and is often independent of the operating system. Typically, it looks for the active hard drive partition, loads the boot sector of that partition, and transfers control to it. This boot sector is typically operating system specific. It must load the operating system kernel into memory and transfer control to it. If no active partition exists, or the active partition's boot sector is invalid, the MBR can load a backup boot loader and transfer control to it. The backup bootloader must select a partition (often with the help of the user), load its boot sector, and transfer control to it. |
Boot sequence for a standard IBM-compatible personal computer
After turning on the personal computer, its processor does not yet start working.
The first device that starts after you press the computer's power button is the power supply. If all supply voltages are available and comply with the norm, a special Power Good signal will be sent to the motherboard, indicating successful testing of the power supply and allowing the system board components to start.
After this, the chipset generates a CPU reset signal, which clears the processor registers and starts it up.
The first command to be executed is located at address FFFF0h and belongs to the BIOS address space. This command simply transfers control to the BIOS initialization program and executes the next command (BIOS firmware).
The BIOS initialization program, using the POST program, checks that all computer devices necessary for the BIOS to operate and subsequently load the main operating system are working correctly and initializes them.
Thus, its job is to sequentially read and execute commands from memory.
System memory is configured so that the first instruction the processor reads after a reset will be in the BIOS chip.
By sequentially selecting commands from the BIOS, the processor will begin to perform a self-test, or POST, procedure.
POST procedure
The POST self-test procedure consists of several steps.
- Initial initialization of the main system components;
- Detecting RAM, copying BIOS code into RAM and checking BIOS checksums;
- Initial chipset setup;
- Finding and initializing the video adapter. Modern video adapters have their own BIOS, which the system BIOS tries to detect in a specially designated address segment. During the initialization of the video adapter, the first image generated using the BIOS of the video adapter appears on the screen;
- Checking the CMOS checksum and battery status. If the CMOS checksum is incorrect, default values will be loaded;
- Testing the processor and RAM. Test results are usually displayed on the screen;
- Connecting a keyboard, testing I/O ports and other devices.
- Initializing disk drives. Information about detected devices is usually displayed on the screen;
- Distribution of resources between devices and displaying a table with detected devices and resources assigned to them;
- Search and initialize devices that have their own BIOS;
- Calls the BIOS INT 19h software interrupt, which looks for the boot sector on devices specified in the boot list.
Depending on the specific BIOS version, the order of the POST procedure may vary slightly, but the above basic steps are performed when booting any computer.
What are POST codes?
After turning on the computer's power, if the power supply and the main components of the motherboard are working (clock generator, components responsible for the operation of the system bus and memory bus), the processor begins executing the BIOS code.
To be precise, in many modern chipsets, before the system controller transmits commands to the processor, the “smart” system bus is pre-configured. But this does not change the essence of the matter.
The main task of the BIOS at this stage is to check the serviceability and initialize the main hardware components of the computer. First, the internal registers of the chipset and processor are configured, and the integrity of the BIOS code is checked. Then the type and size of RAM is determined, and the video card (integrated into the chipset or external) is searched and initialized. Next, the I/O ports, disk drive controller, IDE/SATA controller and the drives connected to it are configured. And finally, additional controllers integrated on the motherboard are searched for and initialized and installed cards extensions. In total, there are about a hundred intermediate steps, after which control is transferred to the BOOTStrap loader, which is responsible for starting the operating system.
Each POST test step has its own unique number, called a POST code. Before the next procedure starts, its POST code is written to a special port called Manufacturing Test Port. When the device is successfully initialized, the POST code of the next procedure is written to the Manufacturing Test Port, and so on, until all tests are completed. If configuration of the device fails, further execution of POST tests stops, and the POST code of the procedure that caused the failure remains in the Manufacturing Test Port. After reading it, you can clearly identify the problematic device.
Keep in mind that after rebooting the computer using the operating system (soft or warm boot) or exiting power-saving mode, not all steps for testing and configuring hardware components are usually performed, but only the necessary minimum - this is faster. When troubleshooting, you must always perform a “hard” (“cold”) reboot - using the RESET key or turning off the computer’s power. This is the only way to guarantee that all initialization steps will be completed in full.
Award BIOS 6.0: full boot option
This table can be used not only as a list of POST codes, but also as a sequence of actions that are performed when the computer is turned on. It contains POST codes that are displayed during the full POST procedure.
POST code | Description of the procedure |
CF | The processor type is determined and CMOS read/write is tested |
C0 | The chipset and L1-, L2-cache are pre-initialized, the interrupt controller, DMA, and timer are programmed |
C1 | The type and amount of RAM is detected |
C3 | The BIOS code is unpacked into a temporary area of RAM |
0C | BIOS checksums are checked |
C5 | The BIOS code is copied to shadow memory and control is transferred to the Boot Block module |
01 | The XGROUP module is unpacked at physical address 1000:0000h |
02 | Processor initialization. The CR and MSR registers are set |
03 | I/O resources are determined (Super I/O) |
05 | Clears the screen and CMOS status flag |
06 | Coprocessor is checked |
07 | The keyboard controller is determined and tested |
08 | Keyboard interface is defined |
09 | Initializing the Serial ATA Controller |
0A | Detects the keyboard and mouse that are connected to the PS/2 ports |
0B | AC97 audio controller resources are installed |
O.E. | Testing memory segment F000h |
10 | The type of flash memory is determined |
12 | CMOS tested |
14 | Set values for chipset registers |
16 | The clock generator is initially initialized |
18 | The processor type, its parameters and L1 and L2 cache sizes are determined |
1B | The interrupt vector table is initialized |
1C | Checks CMOS checksums and battery voltage |
1D | Power management system is defined |
1F | Loading the keyboard matrix (for laptops) |
21 | The Hardware Power Management system is initializing (for laptops) |
23 | Math coprocessor, floppy drive, chipset initialization are tested |
24 | The processor microcode is updated. Creates a resource distribution map for Plug and Play devices |
25 | Initial PCI initialization: lists devices, searches for VGA adapter, writes VGA BIOS to C000:0 |
26 | Installed clock frequency by CMOS Setup. Synchronization of unused DIMM and PCI slots is disabled. The monitoring system (H/W Monitor) is initialized |
27 | Interrupt INT 09h is enabled. The keyboard controller is initialized again |
29 | The MTRR registers are programmed and the APIC is initialized. The IDE controller is being programmed. The processor frequency is measured. The video system BIOS extension is called |
2B | Search for video adapter BIOS |
2D | The Award splash screen displays, information about the processor type and its speed |
33 | Keyboard resets |
35 | First DMA channel being tested |
37 | Testing the second DMA channel |
39 | DMA page registers are tested |
3C | Configuring the 8254 controller (timer) |
3E | Checking the 8259 interrupt controller |
43 | Interrupt controller is checked |
47 | ISA/EISA buses are tested |
49 | The amount of RAM is calculated. Registers are being configured for the AMD K5 processor |
4E | Programming MTRR registers for Syrix processors. L2 cache and APIC are initialized |
50 | USB bus detected |
52 | The RAM is tested and the results are displayed. Clearing extended memory |
53 | If the CMOS is cleared, the login password is reset |
55 | Displays the number of processors (for multiprocessor platforms) |
57 | The EPA logo is displayed. Initial Initialization of ISA PnP Devices |
59 | The virus protection system is determined |
5B | Prompt for running BIOS update from floppy disk |
5D | Super I/O controller and integrated audio controller starts |
60 | Entering CMOS Setup if the Delete key was pressed |
65 | PS/2 mouse is initializing |
69 | L2 cache is enabled |
6B | Chipset registers are configured according to BIOS Setup |
6D | Assigns resources for ISA PnP devices and COM ports for integrated devices |
6F | The floppy controller is initialized and configured |
75 | IDE devices are detected and installed: hard drives, CD/DVD, LS-120, ZIP, etc. |
76 | Displays information about detected IDE devices |
77 | Serial and parallel ports are initialized |
7A | The math coprocessor is reset and ready for operation. |
7C | Defines protection against unauthorized writing to hard drives |
7F | If there are errors, a message is displayed and the Delete and F1 keys are pressed |
82 | Memory is allocated for power management and changes are written to the ESCD table. The splash screen with the EPA logo is removed. Requests a password if needed |
83 | All data is saved from the temporary stack to CMOS |
84 | Displaying the Initializing Plug and Play Cards message |
85 | USB initialization completes |
87 | SYSID tables are created in the DMI area |
89 | ACPI tables are installed. Interrupts are assigned to PCI devices |
8B | Called by the BIOS of additional ISA or PCI controllers, with the exception of the video adapter |
8D | RAM parity parameters are set using CMOS Setup. APM is initialized |
8F | IRQ 12 is allowed for PS/2 mouse hot plugging |
94 | Completing chipset initialization. Displays the resource allocation table. Enable L2 cache. Setting the summer/winter time transition mode |
95 | Sets the keyboard auto-repeat frequency and Num Lock state |
96 | For multiprocessor systems, registers are configured (for Cyrix processors). The ESCD table is created. The DOS Time timer is set according to the RTC CMOS clock. Boot device partitions are saved for use by the built-in antivirus. The speaker announces the end of POST. The MSIRQ FF table is created. The BIOS INT 19h interrupt is executed. Search for the bootloader in the first sector of the boot device |
Failure to complete or failure of any step in the test sequence leads to testing stopping and issuing a POST code corresponding to this failure step.
POST codes from other manufacturers can be found on the websites of your motherboard manufacturer or DIOS manufacturer or on the Internet.
Reading POST codes
In workshops or repair specialists, control of the execution of BIOS microprograms is carried out using a special expansion card. It is inserted into a free slot (most modern models are designed for the PCI bus) and as it loads, it displays on its indicator the code of the currently executing procedure.
An example would be the BM9222 PCI Post card.
However, the POST card is not a widely used means. Rather, it is a professional computer repairman's tool. Realizing this fact, motherboard manufacturers began to equip models designed for enthusiasts experimenting with computer settings and overclocking with built-in POST code indicators.
An example would be the ECS H67H2-M motherboard, or models X58 Extreme3, P55 Deluxe3 and 890GX Extreme3.
There is also a cheaper solution - during the initial initialization of components, POST codes can be displayed on the screen along with other service information. However, this solution has a significant drawback: if the problem is related to the video card, you most likely will not see anything.
Last opportunity to find out about a failure that occurred during testing Sound signals of error messages.
Sounds and error messages
Despite the fact that POST codes are the most powerful tool for identifying hardware problems when starting a computer, the BIOS also provides other diagnostic tools. If you do not have a POST card at your disposal, and the motherboard cannot display POST codes, you can rely on sound signals and error messages.
But for this it is necessary that the PC case has a system speaker and it is connected to the motherboard.
Sound signals are especially valuable at the initial stage, when the video card has not yet been initialized and, as a result, is not able to display anything on the screen. The unique combination of long and short signals will indicate the problematic component.
At later stages, it is easier to navigate by the error message displayed by the BIOS in the event of a hardware problem. In some BIOS versions this message is accompanied by a special sound signal, in others it replaces it. But in any case, the information is usually enough to identify the failing component.
It should be noted that sound signals and error messages are actually a more visual option for displaying certain POST codes, and are by no means an additional diagnostic tool. If you have a POST card at your disposal, or the motherboard is capable of displaying POST codes, you need to focus on the codes - they give a much more accurate and detailed picture. Compare at least the number of POST codes (about a hundred) and the number of different error messages or beeps (several dozen).
Sequence of beeps | Description of the error |
---|---|
1 short | Successful POST |
2 short | Minor errors found. A prompt appears on the monitor screen to enter the CMOS Setup Utility program and correct the situation. Check that the cables are securely fastened in the hard drive and motherboard connectors. |
3 long | Keyboard controller error |
1 short, 1 long | Random access memory (RAM) error |
1 long, 2 short | Video card error |
1 long, 3 short | Keyboard initialization error or video card error |
1 long, 9 short | Error reading from ROM |
Repeating short | Problems with the power supply |
Repeating long | RAM problems |
Repeated high-low frequency | CPU problems |
Continuous | Problems with the power supply |
Setup procedure
Login to BIOS Setup
Entering BIOS Setup is only possible when the computer is turned on and the initial POST test is successful (one short signal from the system speaker).
To do this, you need to press a specific key or key combination.
Typically, when testing, the screen saver displays a message like “Press DEL to enter Setup” - this means that you must press the DEL key to enter BIOS Setup. You can find out which key is assigned to enter the BIOS from the instructions for motherboard. If there are no instructions and the screen saver does not display any hints, you can try the most well-known combinations:
Delete
Esc
Ctrl + Shift + S or Ctrl + Alt + S
Ctrl + Alt + Esc
Ctrl + Alt + Delete
Safe work with BIOS Setup
Working with BIOS Setup is associated with a certain risk, since if the parameter is changed incorrectly or carelessly, the system may become unstable or not function at all. There are a few simple tips that can help reduce the possible risk to a minimum:
- It is best to experiment with BIOS Setup settings on a new computer that is not filled with information;
- Try not to experiment with the BIOS at all on computers that process or store important or voluminous information. Before setting up your system using the BIOS, take care of backup important data. The main thing in such computers is stability. A frozen overclocked computer after several hours of video processing is a waste of time, electricity and work results. An unoverclocked one will cope with this task much more efficiently and will save your nerves;
- Before you change important parameters, always record the set and changed value. This will allow you to return it to working condition in case of unstable operation of the system;
- Do not change parameter values that you do not know. Check their meaning either in the instructions for the motherboard, or on the Internet on the board developer’s resource;
- Do not edit several important unrelated parameters at once. When the system is unstable, it is much more difficult to determine which parameter caused the unstable operation;
- Do not overclock your computer without proper study and preparation of the system being overclocked;
- Do not use the Hard Disk Utility section, which is designed for low-level formatting of older hard drive models and is found in older BIOS versions, because can damage a modern hard drive;
- If, after setting the parameters and exiting the BIOS, the computer stops starting at all, you can return the system to a working state in several ways:
- If it is possible to enter BIOS Setup after restarting the computer, you need to set the edited parameters to the previous values. Some BIOS versions themselves roll back changes from the last session.
- If the changes made are unknown, it is better to use the default parameters using the Load Fail-Safe Defaults command. After this, you will have to configure the system for optimal operation.
- If the computer does not start at all due to incorrect BIOS settings, then in this case it is necessary to reset the CMOS contents. In this case, all values including date/time will be changed. To do this, reset incorrect settings by simply moving the Flash Recovery (IBM) jumper or the Clearing CMOS jumper to the “clearing CMOS” position. In the latter case, you just need to close the contacts of the corresponding jumper with a jumper for a few minutes.
- In case of unsuccessful results of Setup BIOS, after resetting the unsuccessful configuration using a jumper in the Setup BIOS procedure, it is necessary to duplicate the return of loading BIOS values ru.Wikipedia.org<< на главную>>