对测试驱动开启Verifier的标准设置,随后蓝屏,蓝屏代码指向如下:
if (wcslen(processPath) < MAX_PATH)
{
....
}
该段代码运行在dispatch_level,且processPath在非分页内存中分配,蓝屏调试信息如下:
1: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 8c786f98, memory referenced
Arg2: 00000002, IRQL
Arg3: 00000000, value 0 = read operation, 1 = write operation
Arg4: 871dcb5e, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: 8c786f98 Special pool
CURRENT_IRQL: 2
FAULTING_IP:
SecMon!InsertProcessNotifyLog+9e [d:\test\secmon64\processnotify.c @ 121]
871dcb5e 668b08 mov cx,word ptr [eax]
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: services.exe
TRAP_FRAME: 83301420 -- (.trap 0xffffffff83301420)
ErrCode = 00000000
eax=8c786f98 ebx=8da4e030 ecx=8c786f98 edx=8c786f9a esi=8e4a3690 edi=8da4ed48
eip=871dcb5e esp=83301494 ebp=833014e4 iopl=0 nv up ei ng nz na pe nc
cs=0008 ss=0010 ds=0023 es=0023 fs=0030 gs=0000 efl=00010286
SecMon!InsertProcessNotifyLog+0x9e:
871dcb5e 668b08 mov cx,word ptr [eax] ds:0023:8c786f98=0063
Resetting default scope
LAST_CONTROL_TRANSFER: from 83ef108f to 83e8d110
STACK_TEXT:
83300fec 83ef108f 00000003 cf37a414 00000065 nt!RtlpBreakWithStatusInstruction
8330103c 83ef1b8d 00000003 8c786f98 871dcb5e nt!KiBugCheckDebugBreak+0x1c
83301400 83e535cb 0000000a 8c786f98 00000002 nt!KeBugCheck2+0x68b
83301400 871dcb5e 0000000a 8c786f98 00000002 nt!KiTrap0E+0x2cf
833014e4 871db61d 00000178 00000000 0000026c SecMon!InsertProcessNotifyLog+0x9e [d:\test\secmon64\processnotify.c @ 121]
8330153c 84079774 8da4e030 00000178 83301560 SecMon!ObCreateProcessEx+0x1ed [d:\test\secmon64\secmon.c @ 440]
833015f4 840817a1 8da4ed48 01a4e030 83301650 nt!PspInsertThread+0x5c0
83301d00 83e501ea 001bf534 001bf510 02000000 nt!NtCreateUserProcess+0x742
83301d00 76dd70b4 001bf534 001bf510 02000000 nt!KiFastCallEntry+0x12a
001bf1f4 76dd5784 7692e5d5 001bf534 001bf510 ntdll!KiFastSystemCallRet
001bf1f8 7692e5d5 001bf534 001bf510 02000000 ntdll!ZwCreateUserProcess+0xc
001bf854 768e2079 00000000 00000000 0015eab8 kernel32!CreateProcessInternalW+0xe75
001bf88c 00c2c500 00000000 0015eab8 00000000 kernel32!CreateProcessW+0x2c
001bf9d4 00c3643a 00955230 0015eab8 001bfa10 services!ScLogonAndStartImage+0x432
001bfa14 00c2885e 00000000 00000000 00000000 services!ScStartService+0x419
001bfa4c 00c28b7e 00000000 00000000 00000000 services!ScStartMarkedServices+0x14e
001bfa88 00c2f840 00000000 00000000 00000000 services!ScStartServiceAndDependencies+0x364
001bfab0 00c2e682 00000000 00c571f8 00000001 services!ScAutoStartServices+0xf9
001bfaec 00c34680 00000001 002d1010 001bfb40 services!SvcctrlMain+0x7e3
001bfafc 00c3394e 00000001 002d1010 002d1458 services!main+0x19
001bfb40 76933c45 7ffdc000 001bfb8c 76df37f5 services!_initterm_e+0x163
001bfb4c 76df37f5 7ffdc000 76fd225b 00000000 kernel32!BaseThreadInitThunk+0xe
001bfb8c 76df37c8 00c3388a 7ffdc000 00000000 ntdll!__RtlUserThreadStart+0x70
001bfba4 00000000 00c3388a 7ffdc000 00000000 ntdll!_RtlUserThreadStart+0x1b
STACK_COMMAND: kb
FOLLOWUP_IP:
SecMon!InsertProcessNotifyLog+9e [d:\test\secmon64\processnotify.c @ 121]
871dcb5e 668b08 mov cx,word ptr [eax]
FAULTING_SOURCE_CODE:
117: g_Process_Log_Head->processId=pid;
118: g_Process_Log_Head->parentPid=parentPid;
119: g_Process_Log_Head->flags=flags;
120: g_Process_Log_Head->userGeted=0;
> 121: if (wcslen(processPath) < MAX_PATH)
122: {
123: RtlCopyMemory(g_Process_Log_Head->processPath,processPath,wcslen(processPath)*sizeof(WCHAR));
124: }
125: else
126: {
SYMBOL_STACK_INDEX: 4
SYMBOL_NAME: SecMon!InsertProcessNotifyLog+9e
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: SecMon
IMAGE_NAME: SecMon.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 51a8706e
FAILURE_BUCKET_ID: 0xD1_VRF_SecMon!InsertProcessNotifyLog+9e
BUCKET_ID: 0xD1_VRF_SecMon!InsertProcessNotifyLog+9e
Followup: MachineOwner
查看与wcslen类似的函数,“RtlStringCchLengthW”,发现其运行irql要求为:
PASSIVE_LEVEL
怪哉,不会在dispatch_level下运行wcslen也有问题吧。
请各位高手指点指点,谢谢。。
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!