public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Ni, Ray" <ray.ni@intel.com>
To: "devel@edk2.groups.io" <devel@edk2.groups.io>,
	"Kinney, Michael D" <michael.d.kinney@intel.com>
Cc: "Justen, Jordan L" <jordan.l.justen@intel.com>,
	Andrew Fish <afish@apple.com>, Tim Lewis <tim.lewis@insyde.com>
Subject: Re: [edk2-devel] [Patch][edk2-stable201908 1/2] EmulatorPkg/Win/Host: Fix image unload regression
Date: Thu, 22 Aug 2019 23:10:25 +0000	[thread overview]
Message-ID: <734D49CCEBEEF84792F5B80ED585239D5C29519C@SHSMSX104.ccr.corp.intel.com> (raw)
In-Reply-To: <20190822023610.2068-2-michael.d.kinney@intel.com>

Mike,
Thanks for fixing this regression issue.

I also did a comparison between this and the Nt32 accordingly code.
They are almost the same.

I also noticed your unit test steps in Bugzilla and the behavior is expected.

I agree and also suggest that this fix to be included in the coming stable tag release.

Reviewed-by: Ray Ni <ray.ni@intel.com>



> -----Original Message-----
> From: devel@edk2.groups.io <devel@edk2.groups.io> On Behalf Of Michael D
> Kinney
> Sent: Thursday, August 22, 2019 10:36 AM
> To: devel@edk2.groups.io
> Cc: Justen, Jordan L <jordan.l.justen@intel.com>; Ni, Ray <ray.ni@intel.com>;
> Andrew Fish <afish@apple.com>; Tim Lewis <tim.lewis@insyde.com>
> Subject: [edk2-devel] [Patch][edk2-stable201908 1/2] EmulatorPkg/Win/Host:
> Fix image unload regression
> 
> https://bugzilla.tianocore.org/show_bug.cgi?id=2104
> 
> When UEFI Applications or UEFI Drivers are unloaded, the
> PeCoffLoaderUnloadImageExtraAction() needs to unload the image using
> FreeLibrary() if the image was successfully loaded using LoadLibrrayEx().
> 
> This is a regression from the Nt32Pkg that supported unloading applications and
> drivers as well as loading the same application or driver multiple times.
> 
> Cc: Jordan Justen <jordan.l.justen@intel.com>
> Cc: Ray Ni <ray.ni@intel.com>
> Cc: Andrew Fish <afish@apple.com>
> Cc: Tim Lewis <tim.lewis@insyde.com>
> Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
> ---
>  EmulatorPkg/Win/Host/WinHost.c | 167
> +++++++++++++++++++++++++++++++--
>  1 file changed, 161 insertions(+), 6 deletions(-)
> 
> diff --git a/EmulatorPkg/Win/Host/WinHost.c
> b/EmulatorPkg/Win/Host/WinHost.c index dd52075f98..9c6acac279 100644
> --- a/EmulatorPkg/Win/Host/WinHost.c
> +++ b/EmulatorPkg/Win/Host/WinHost.c
> @@ -19,6 +19,25 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
>  #define SE_TIME_ZONE_NAME                 TEXT("SeTimeZonePrivilege")
>  #endif
> 
> +//
> +// The growth size for array of module handle entries // #define
> +MAX_PDB_NAME_TO_MOD_HANDLE_ARRAY_SIZE 0x100
> +
> +//
> +// Module handle entry structure
> +//
> +typedef struct {
> +  CHAR8   *PdbPointer;
> +  VOID    *ModHandle;
> +} PDB_NAME_TO_MOD_HANDLE;
> +
> +//
> +// An Array to hold the module handles
> +//
> +PDB_NAME_TO_MOD_HANDLE  *mPdbNameModHandleArray = NULL;
> +UINTN                   mPdbNameModHandleArraySize = 0;
> +
>  //
>  // Default information about where the FD is located.
>  //  This array gets filled in with information from PcdWinNtFirmwareVolume
> @@ -840,6 +859,120 @@ Returns:
>    return Count;
>  }
> 
> +/**
> +  Store the ModHandle in an array indexed by the Pdb File name.
> +  The ModHandle is needed to unload the image.
> +  @param ImageContext - Input data returned from PE Laoder Library. Used to
> find the
> +                 .PDB file name of the PE Image.
> +  @param ModHandle    - Returned from LoadLibraryEx() and stored for call to
> +                 FreeLibrary().
> +  @return   return EFI_SUCCESS when ModHandle was stored.
> +--*/
> +EFI_STATUS
> +AddModHandle (
> +  IN  PE_COFF_LOADER_IMAGE_CONTEXT         *ImageContext,
> +  IN  VOID                                 *ModHandle
> +  )
> +
> +{
> +  UINTN                   Index;
> +  PDB_NAME_TO_MOD_HANDLE  *Array;
> +  UINTN                   PreviousSize;
> +  PDB_NAME_TO_MOD_HANDLE  *TempArray;
> +  HANDLE                  Handle;
> +  UINTN                   Size;
> +
> +  //
> +  // Return EFI_ALREADY_STARTED if this DLL has already been loaded  //
> + Array = mPdbNameModHandleArray;  for (Index = 0; Index <
> + mPdbNameModHandleArraySize; Index++, Array++) {
> +    if (Array->PdbPointer != NULL && Array->ModHandle == ModHandle) {
> +      return EFI_ALREADY_STARTED;
> +    }
> +  }
> +
> +  Array = mPdbNameModHandleArray;
> +  for (Index = 0; Index < mPdbNameModHandleArraySize; Index++, Array++) {
> +    if (Array->PdbPointer == NULL) {
> +      //
> +      // Make a copy of the stirng and store the ModHandle
> +      //
> +      Handle = GetProcessHeap ();
> +      Size = AsciiStrLen (ImageContext->PdbPointer) + 1;
> +      Array->PdbPointer = HeapAlloc ( Handle, HEAP_ZERO_MEMORY, Size);
> +      ASSERT (Array->PdbPointer != NULL);
> +
> +      AsciiStrCpyS (Array->PdbPointer, Size, ImageContext->PdbPointer);
> +      Array->ModHandle = ModHandle;
> +      return EFI_SUCCESS;
> +    }
> +  }
> +
> +  //
> +  // No free space in mPdbNameModHandleArray so grow it by  //
> + MAX_PDB_NAME_TO_MOD_HANDLE_ARRAY_SIZE entires.
> +  //
> +  PreviousSize = mPdbNameModHandleArraySize * sizeof
> + (PDB_NAME_TO_MOD_HANDLE);  mPdbNameModHandleArraySize +=
> + MAX_PDB_NAME_TO_MOD_HANDLE_ARRAY_SIZE;
> +  //
> +  // re-allocate a new buffer and copy the old values to the new locaiton.
> +  //
> +  TempArray = HeapAlloc (GetProcessHeap (),
> +                                HEAP_ZERO_MEMORY,
> +                                mPdbNameModHandleArraySize * sizeof
> (PDB_NAME_TO_MOD_HANDLE)
> +                               );
> +
> +  CopyMem ((VOID *) (UINTN) TempArray, (VOID *)
> + (UINTN)mPdbNameModHandleArray, PreviousSize);
> +
> +  HeapFree (GetProcessHeap (), 0, mPdbNameModHandleArray);
> +
> +  mPdbNameModHandleArray = TempArray;
> +  if (mPdbNameModHandleArray == NULL) {
> +    ASSERT (FALSE);
> +    return EFI_OUT_OF_RESOURCES;
> +  }
> +
> +  return AddModHandle (ImageContext, ModHandle); }
> +
> +/**
> +  Return the ModHandle and delete the entry in the array.
> +   @param  ImageContext - Input data returned from PE Laoder Library. Used
> to find the
> +                 .PDB file name of the PE Image.
> +  @return
> +    ModHandle - ModHandle assoicated with ImageContext is returned
> +    NULL      - No ModHandle associated with ImageContext
> +**/
> +VOID *
> +RemoveModHandle (
> +  IN  PE_COFF_LOADER_IMAGE_CONTEXT         *ImageContext
> +  )
> +{
> +  UINTN                   Index;
> +  PDB_NAME_TO_MOD_HANDLE  *Array;
> +
> +  if (ImageContext->PdbPointer == NULL) {
> +    //
> +    // If no PDB pointer there is no ModHandle so return NULL
> +    //
> +    return NULL;
> +  }
> +
> +  Array = mPdbNameModHandleArray;
> +  for (Index = 0; Index < mPdbNameModHandleArraySize; Index++, Array++) {
> +    if ((Array->PdbPointer != NULL) && (AsciiStrCmp(Array->PdbPointer,
> ImageContext->PdbPointer) == 0)) {
> +      //
> +      // If you find a match return it and delete the entry
> +      //
> +      HeapFree (GetProcessHeap (), 0, Array->PdbPointer);
> +      Array->PdbPointer = NULL;
> +      return Array->ModHandle;
> +    }
> +  }
> +
> +  return NULL;
> +}
> 
>  VOID
>  EFIAPI
> @@ -847,6 +980,7 @@ PeCoffLoaderRelocateImageExtraAction (
>    IN OUT PE_COFF_LOADER_IMAGE_CONTEXT         *ImageContext
>    )
>  {
> +  EFI_STATUS        Status;
>    VOID              *DllEntryPoint;
>    CHAR16            *DllFileName;
>    HMODULE           Library;
> @@ -855,7 +989,7 @@ PeCoffLoaderRelocateImageExtraAction (
>    ASSERT (ImageContext != NULL);
>    //
>    // If we load our own PE COFF images the Windows debugger can not source
> -  //  level debug our code. If a valid PDB pointer exists usw it to load
> +  //  level debug our code. If a valid PDB pointer exists use it to
> + load
>    //  the *.dll file as a library using Windows* APIs. This allows
>    //  source level debug. The image is still loaded and relocated
>    //  in the Framework memory space like on a real system (by the code above),
> @@ -913,10 +1047,22 @@ PeCoffLoaderRelocateImageExtraAction (
>      }
> 
>      if ((Library != NULL) && (DllEntryPoint != NULL)) {
> -      ImageContext->EntryPoint  = (EFI_PHYSICAL_ADDRESS) (UINTN)
> DllEntryPoint;
> -      SecPrint ("LoadLibraryEx (%S,\n               NULL,
> DONT_RESOLVE_DLL_REFERENCES)\n", DllFileName);
> +      Status = AddModHandle (ImageContext, Library);
> +      if (Status == EFI_ALREADY_STARTED) {
> +        //
> +        // If the DLL has already been loaded before, then this instance of the DLL
> can not be debugged.
> +        //
> +        ImageContext->PdbPointer = NULL;
> +        SecPrint ("WARNING: DLL already loaded.  No source level debug %S.\n\r",
> DllFileName);
> +      } else {
> +        //
> +        // This DLL is not already loaded, so source level debugging is supported.
> +        //
> +        ImageContext->EntryPoint  = (EFI_PHYSICAL_ADDRESS) (UINTN)
> DllEntryPoint;
> +        SecPrint ("LoadLibraryEx (\n\r  %S,\n\r  NULL,
> DONT_RESOLVE_DLL_REFERENCES)\n\r", DllFileName);
> +      }
>      } else {
> -      SecPrint ("WARNING: No source level debug %S. \n", DllFileName);
> +      SecPrint ("WARNING: No source level debug %S. \n\r",
> + DllFileName);
>      }
> 
>      free (DllFileName);
> @@ -926,13 +1072,22 @@ PeCoffLoaderRelocateImageExtraAction (  VOID
> EFIAPI  PeCoffLoaderUnloadImageExtraAction (
> -  IN PE_COFF_LOADER_IMAGE_CONTEXT         *ImageContext
> +  IN PE_COFF_LOADER_IMAGE_CONTEXT  *ImageContext
>  )
>  {
> +  VOID  *ModHandle;
> +
>    ASSERT (ImageContext != NULL);
> +
> +  ModHandle = RemoveModHandle (ImageContext);  if (ModHandle != NULL) {
> +    FreeLibrary (ModHandle);
> +    SecPrint ("FreeLibrary (\n\r  %s)\n\r", ImageContext->PdbPointer);
> + } else {
> +    SecPrint ("WARNING: Unload image without source level debug\n\r");
> + }
>  }
> 
> -
>  VOID
>  _ModuleEntryPoint (
>    VOID
> --
> 2.21.0.windows.1
> 
> 
> 


  reply	other threads:[~2019-08-22 23:10 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-08-22  2:36 [Patch][edk2-stable201908 0/2] EmulatorPkg/Win/Host: Fix image unload regression Michael D Kinney
2019-08-22  2:36 ` [Patch][edk2-stable201908 1/2] " Michael D Kinney
2019-08-22 23:10   ` Ni, Ray [this message]
2019-08-22  2:36 ` [Patch][edk2-stable201908 2/2] EmulatorPkg/Win/Host: Fix SecPrint() log line endings Michael D Kinney
2019-08-22 23:12   ` [edk2-devel] " Ni, Ray
2019-08-26 19:31 ` [Patch][edk2-stable201908 0/2] EmulatorPkg/Win/Host: Fix image unload regression Tim Lewis
2019-08-26 20:35   ` [edk2-devel] " Ni, Ray
2019-08-26 21:01     ` Michael D Kinney
2019-08-26 21:10       ` Andrew Fish
2019-08-26 22:03         ` Ni, Ray

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=734D49CCEBEEF84792F5B80ED585239D5C29519C@SHSMSX104.ccr.corp.intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox