Event Id | 1 |
Source | acpi |
Description | %1: ACPI Name Space Object %2 reports an _ADR (%3) that is already in use.Such conflicts are not legal. Please contact your system vendor fortechnical assistance. |
Event Information | cause: The problem to be known,ACPI Embedded Controller chip and Windows XP, which is newly sensitive to this.The most likely solution would be a corrected BIOS, but only if it is true what the warning message says. Another solution could be to remove the new sensitivity from Windows XP again and make it as deaf to unwanted ACPIEC babbling as all earlier versions of Windows were. But thats in Microsofts hands.It may be a dying problem, as faster processors reduce the impact and newer BIOS versions may prevent the problem in the first place.The errors are triggered by programs like temperature monitors or DVD playing programs, which query the ACPIEC chip for temperature or battery charge information or similar. The DVD player WinDVD, for example, does it to find out whether the battery of a laptop is running low. Resolution: It can do it by modifying ACPIEC.SYS with a hex editor. 1. Go into \windows\system32\drivers and make a copy of ACPIEC.SYS to a new file called acpiecNoLog.sys. 2. Open acpiecNoLog.sys with a hex editor. 3. Most of the file will be unreadable garbage, but near the end you should be able to see a long series of null-terminated strings (the first is MmUnlockPagableImageSection"). These are the names of the external functions dynamically linked by the driver. 4. Look for the function name "IoWriteErrorLogEntry". This is the function that writes the warnings into the system log. Now disable it by replacing the string, byte-for-byte, with "IOFreeErrorLogEntry". Note that this is one character shorter than the original, so make sure to replace the final y with a null byte. Be careful to use an honest-to-god null (0x00) and not an ASCII space (0x20). And especially do NOT just delete the character, as that would pull up everything after it by one byte and screw up addressing. Visually:I o W r i t e E r r o r L o g E n t r y becomes byte-for-byte: 5. Verify that you hacked the file properly by checking the fi |
Reference Links |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.