I have added some code which compiles cleanly and have just received this Windows error:
--------------------------- (MonTel Administrator) 2.12.7: MtAdmin.exe - Application Error --------------------------- The exception Privileged instruction. (0xc0000096) occurred in the application at location 0x00486752.
I am about to go on a bug hunt, and I am expecting it to be something silly that I have done which just happens to produce this message. The code compiles cleanly with no errors or warnings. The size of the exe has grown to 1,454,132 bytes, and includes links to ODCS.lib, but is otherwise pure 'c' to the Win32 API, with DEBUG on (running on a P4 on Win2K).
-
I saw this with visual c++ 6.0 in the year 2000.
The debug C++ library had calls to physical IO instructions in it, in an exception handler. IIRC it was dumping status to an IO port that used to be for DMA base registers, which I assume someone an M$ was using for a debugger card.
Look for some error condition that might be latent causing diagnostics code to run.
I was debugging, backtracked and read the Dissassembly. It was an exception while processing std::string, maybe indexing off the end.
David L Morris : It is actually VC6. But not C++, though plenty of zero terminated strings. (I could use the new compilers but have heard rumors that VC6 is actually faster for C, rather than C++). I doubt it is a compiler bug though... (I always discover it is one of those - "what was I thinking" moments).From Tim Williscroft -
This sort of thing usually happens when using function pointers that point to invalid data. It can also happen if you have code that trashes your return stack. It can sometimes be quite tricky to track these sort of bugs down because they usually are hard to reproduce.
From Daniel -
First probability that I can think of is, you may be using a local array and it is near the top of the function declaration. Your bounds checking gone insane and overwrite the return address and it points to some instruction that only kernel is allowed to execute.
From artificialidiot -
A privileged instruction is an IA-32 instruction that is only allowed to be executed in Ring-0 (i.e. kernel mode). If you're hitting this in userspace, you've either got a really old EXE, or a corrupted binary.
David L Morris : The exe I compiled using VC6 about 10 seconds ago.... but is does contain links to ODBC.LIB and other libs that might be quite old. This app is not a driver or a service.From Paul Betts -
The error location 0x00486752 seems really small to me, before where executable code usually lives. I agree with Daniel, it looks like a wild pointer to me.
From Jeremy -
To answer the question, a privileged instruction is a processor op-code (assembler instruction) which can only be executed in "supervisor" (or Ring-0) mode. These types of instructions tend to be used to access I/O devices and protected data structures from the windows kernel.
Regular programs execute in "user mode" (Ring-3?) which disallows direct access to I/O devices, etc...
As others mentioned, the cause is probably a corrupted stack or a messed up function pointer call.
From Benoit -
As I suspected it was something silly that I did. I think I solved this twice as fast because of some of the clues in comments in the messages above. Thanks to those especially those who pointed to something early in the app overwriting the stack. I actually found several answer here more useful that the post I have marked as answering the question as they clued and queued me as to where to look, though I think it best sums up the answer.
As it turned out I had just added a button that went over the maximum size of an array holding some tool bar button information (which was on the stack). I had forgotten that
#define MAX_NUM_TOOBAR_BUTTONS (24)
even existed!
From David L Morris -
The CPU of most processors manufactured in the last 15 years have some special instructions which are very powerful. These Privileged Instructions are kept for Operating System Kernel applications and are not able to be used by user written programs. This restricts the damage that a user written program can inflict upon the system and cuts down the number of times that the system actually crashes.
From maliha atteeq
0 comments:
Post a Comment