7 |
The LA
Fox Developer Newsletter
|
July
1994
|
Traversing the GP Fault
(Con't from p.6)
As a final step, before venturing into this territory, load
Windows,
and remove any “.TMP” files. This can be easily accomplished by opening the
Windows
File Manager, normally found in the “Main” box. Double-click on the “File Manager” icon. From there, select “File” (menu), “Search” (menu choice), and key in
*tmP
Make sure the “Search all subdirectories” box is “X’d”. Next, select “OK” to have the search begin. This is a basic garbage collection that’s
absolutely necessary before
beginning an undertaking of this nature.
(Windows 3. 1x,
as part of its “nature”, will create these “.TMP” files any time there is a malfunction within the OS, such as a GPF.) Once these files have been identified, delete them.
The previous step can be automated by creating a subdirectory called TEMP (under C:\) and adding the following statements to the AUTOEXEC. BAT file:
|
and CONFIG.SYS.
Windows
is a slightly different story. Fortunately,
Windows
makes it fairly easy to identify those statements which load different programs and drivers by preceding each section of code with an appropriate note in brackets ([]). These statements can then be modified with a semi-colon
(“;“)
to disable them. For instance, to disable
After Dark,
insert the semi-colon at the beginning of the statement:
|
Now, for the obvious things to check against:
Remember, after trying each of these steps, it is
important to re-boot your system (so the changes
may take effect), reopen
Windows,
reopen the
application that was causing the CBPF. and proceed
with what you were doing before the error oc
curred
. (Unfortunately, there is no quick and easy fix for this problem. And since the GPF may be occurring on an intermittent basis, you’re really not guaranteed that any changes made will be effective until hours, or days, later. It’s just the nature of the beast. Another very hard lesson to be learned, while the GPF is “alive”, is to
periodically save
sections of your work
, and not wait till they’re complete.)
Disable any TSRs. These include menuing systems (ex.,
Direct
Access),
shells, screen savers (i.e.,
After Dark),
memory managers
(ex.,QEMM),
etc. Even the screen saver that’s native to
Windows
may be suspect. Disabling these programs is pretty straightforward. In DOS, you can “rem” out the appropriate statements in AUTOEXEC.BAT
|
(Con’t, page 8)
|
Page 7
|
7 |