VirtualBox

source: vbox/trunk/src/VBox/HostServices/SharedClipboard/VBoxSharedClipboardSvc.cpp@ 85985

Last change on this file since 85985 was 85985, checked in by vboxsync, 4 years ago

Shared Clipboard/Host Service: Automatically unregister event if it has no (more) references in ShClSvcGuestDataReceived(). bugref:9437

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 91.2 KB
Line 
1/* $Id: VBoxSharedClipboardSvc.cpp 85985 2020-09-01 17:46:22Z vboxsync $ */
2/** @file
3 * Shared Clipboard Service - Host service entry points.
4 */
5
6/*
7 * Copyright (C) 2006-2020 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17
18
19/** @page pg_hostclip The Shared Clipboard Host Service
20 *
21 * The shared clipboard host service is the host half of the clibpoard proxying
22 * between the host and the guest. The guest parts live in VBoxClient, VBoxTray
23 * and VBoxService depending on the OS, with code shared between host and guest
24 * under src/VBox/GuestHost/SharedClipboard/.
25 *
26 * The service is split into a platform-independent core and platform-specific
27 * backends. The service defines two communication protocols - one to
28 * communicate with the clipboard service running on the guest, and one to
29 * communicate with the backend. These will be described in a very skeletal
30 * fashion here.
31 *
32 * r=bird: The "two communication protocols" does not seems to be factual, there
33 * is only one protocol, the first one mentioned. It cannot be backend
34 * specific, because the guest/host protocol is platform and backend agnostic in
35 * nature. You may call it versions, but I take a great dislike to "protocol
36 * versions" here, as you've just extended the existing protocol with a feature
37 * that allows to transfer files and directories too. See @bugref{9437#c39}.
38 *
39 *
40 * @section sec_hostclip_guest_proto The guest communication protocol
41 *
42 * The guest clipboard service communicates with the host service over HGCM
43 * (the host is a HGCM service). HGCM is connection based, so the guest side
44 * has to connect before anything else can be done. (Windows hosts currently
45 * only support one simultaneous connection.) Once it has connected, it can
46 * send messages to the host services, some of which will receive immediate
47 * replies from the host, others which will block till a reply becomes
48 * available. The latter is because HGCM does't allow the host to initiate
49 * communication, it must be guest triggered. The HGCM service is single
50 * threaded, so it doesn't matter if the guest tries to send lots of requests in
51 * parallel, the service will process them one at the time.
52 *
53 * There are currently four messages defined. The first is
54 * VBOX_SHCL_GUEST_FN_MSG_GET / VBOX_SHCL_GUEST_FN_MSG_OLD_GET_WAIT, which waits
55 * for a message from the host. If a host message is sent while the guest is
56 * not waiting, it will be queued until the guest requests it. The host code
57 * only supports a single simultaneous GET call from one client guest.
58 *
59 * The second guest message is VBOX_SHCL_GUEST_FN_REPORT_FORMATS, which tells
60 * the host that the guest has new clipboard data available. The third is
61 * VBOX_SHCL_GUEST_FN_DATA_READ, which asks the host to send its clipboard data
62 * and waits until it arrives. The host supports at most one simultaneous
63 * VBOX_SHCL_GUEST_FN_DATA_READ call from a guest - if a second call is made
64 * before the first has returned, the first will be aborted.
65 *
66 * The last guest message is VBOX_SHCL_GUEST_FN_DATA_WRITE, which is used to
67 * send the contents of the guest clipboard to the host. This call should be
68 * used after the host has requested data from the guest.
69 *
70 *
71 * @section sec_hostclip_backend_proto The communication protocol with the
72 * platform-specific backend
73 *
74 * The initial protocol implementation (called protocol v0) was very simple,
75 * and could only handle simple data (like copied text and so on). It also
76 * was limited to two (2) fixed parameters at all times.
77 *
78 * Since VBox 6.1 a newer protocol (v1) has been established to also support
79 * file transfers. This protocol uses a (per-client) message queue instead
80 * (see VBOX_SHCL_GUEST_FN_MSG_OLD_GET_WAIT vs. VBOX_SHCL_GUEST_FN_GET_HOST_MSG).
81 *
82 * To distinguish the old (legacy) or new(er) protocol, the VBOX_SHCL_GUEST_FN_CONNECT
83 * message has been introduced. If an older guest does not send this message,
84 * an appropriate translation will be done to serve older Guest Additions (< 6.1).
85 *
86 * The protocol also support out-of-order messages by using so-called "context IDs",
87 * which are generated by the host. A context ID consists of a so-called "source event ID"
88 * and a so-called "event ID". Each HGCM client has an own, random, source event ID and
89 * generates non-deterministic event IDs so that the guest side does not known what
90 * comes next; the guest side has to reply with the same conext ID which was sent by
91 * the host request.
92 *
93 * Also see the protocol changelog at VBoxShClSvc.h.
94 *
95 *
96 * @section sec_uri_intro Transferring files
97 *
98 * Since VBox x.x.x transferring files via Shared Clipboard is supported.
99 * See the VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS define for supported / enabled
100 * platforms. This is called "Shared Clipboard transfers".
101 *
102 * Copying files / directories from guest A to guest B requires the host
103 * service to act as a proxy and cache, as we don't allow direct VM-to-VM
104 * communication. Copying from / to the host also is taken into account.
105 *
106 * At the moment a transfer is a all-or-nothing operation, e.g. it either
107 * completes or fails completely. There might be callbacks in the future
108 * to e.g. skip failing entries.
109 *
110 * Known limitations:
111 *
112 * - Support for VRDE (VRDP) is not implemented yet (see #9498).
113 * - Unicode support on Windows hosts / guests is not enabled (yet).
114 * - Symbolic links / Windows junctions are not allowed.
115 * - Windows alternate data streams (ADS) are not allowed.
116 * - No support for ACLs yet.
117 * - No (maybe never) support for NT4.
118 *
119 * @section sec_transfers_areas Clipboard areas.
120 *
121 * For larger / longer transfers there might be file data
122 * temporarily cached on the host, which has not been transferred to the
123 * destination yet. Such a cache is called a "Shared Clipboard Area", which
124 * in turn is identified by a unique ID across all VMs running on the same
125 * host. To control the access (and needed cleanup) of such clipboard areas,
126 * VBoxSVC (Main) is used for this task. A Shared Clipboard client can register,
127 * unregister, attach to and detach from a clipboard area. If all references
128 * to a clipboard area are released, a clipboard area gets detroyed automatically
129 * by VBoxSVC.
130 *
131 * By default a clipboard area lives in the user's temporary directory in the
132 * sub folder "VirtualBox Shared Clipboards/clipboard-<ID>". VBoxSVC does not
133 * do any file locking in a clipboard area, but keeps the clipboard areas's
134 * directory open to prevent deletion by third party processes.
135 *
136 * @todo We might use some VFS / container (IPRT?) for this instead of the
137 * host's file system directly?
138 * bird> Yes, but may take some work as we don't have the pick and choose
139 * kind of VFS containers implemented yet.
140 *
141 * @section sec_transfer_structure Transfer handling structure
142 *
143 * All structures / classes are designed for running on both, on the guest
144 * (via VBoxTray / VBoxClient) or on the host (host service) to avoid code
145 * duplication where applicable.
146 *
147 * Per HGCM client there is a so-called "transfer context", which in turn can
148 * have one or mulitple so-called "Shared Clipboard transfer" objects. At the
149 * moment we only support on concurrent Shared Clipboard transfer per transfer
150 * context. It's being used for reading from a source or writing to destination,
151 * depening on its direction. An Shared Clipboard transfer can have optional
152 * callbacks which might be needed by various implementations. Also, transfers
153 * optionally can run in an asynchronous thread to prevent blocking the UI while
154 * running.
155 *
156 * A Shared Clipboard transfer can maintain its own clipboard area; for the host
157 * service such a clipboard area is coupled to a clipboard area registered or
158 * attached with VBoxSVC. This is needed because multiple transfers from
159 * multiple VMs (n:n) can rely on the same clipboard area, so there needs a
160 * master keeping tracking of a clipboard area. To minimize IPC traffic only the
161 * minimum de/attaching is done at the moment. A clipboard area gets cleaned up
162 * (i.e. physically deleted) if no references are held to it anymore, or if
163 * VBoxSVC goes down.
164 *
165 * @section sec_transfer_providers Transfer providers
166 *
167 * For certain implementations (for example on Windows guests / hosts, using
168 * IDataObject and IStream objects) a more flexible approach reqarding reading /
169 * writing is needed. For this so-called transfer providers abstract the way of how
170 * data is being read / written in the current context (host / guest), while
171 * the rest of the code stays the same.
172 *
173 * @section sec_transfer_protocol Transfer protocol
174 *
175 * The host service issues commands which the guest has to respond with an own
176 * message to. The protocol itself is designed so that it has primitives to list
177 * directories and open/close/read/write file system objects.
178 *
179 * Note that this is different from the DnD approach, as Shared Clipboard transfers
180 * need to be deeper integrated within the host / guest OS (i.e. for progress UI),
181 * and this might require non-monolithic / random access APIs to achieve.
182 *
183 * As there can be multiple file system objects (fs objects) selected for transfer,
184 * a transfer can be queried for its root entries, which then contains the top-level
185 * elements. Based on these elements, (a) (recursive) listing(s) can be performed
186 * to (partially) walk down into directories and query fs object information. The
187 * provider provides appropriate interface for this, even if not all implementations
188 * might need this mechanism.
189 *
190 * An Shared Clipboard transfer has three stages:
191 * - 1. Announcement: An Shared Clipboard transfer-compatible format (currently only one format available)
192 * has been announced, the destination side creates a transfer object, which then,
193 * depending on the actual implementation, can be used to tell the OS that
194 * there is transfer (file) data available.
195 * At this point this just acts as a (kind-of) promise to the OS that we
196 * can provide (file) data at some later point in time.
197 *
198 * - 2. Initialization: As soon as the OS requests the (file) data, mostly triggered
199 * by the user starting a paste operation (CTRL + V), the transfer get initialized
200 * on the destination side, which in turn lets the source know that a transfer
201 * is going to happen.
202 *
203 * - 3. Transfer: At this stage the actual transfer from source to the destination takes
204 * place. How the actual transfer is structurized (e.g. which files / directories
205 * are transferred in which order) depends on the destination implementation. This
206 * is necessary in order to fulfill requirements on the destination side with
207 * regards to ETA calculation or other dependencies.
208 * Both sides can abort or cancel the transfer at any time.
209 */
210
211
212/*********************************************************************************************************************************
213* Header Files *
214*********************************************************************************************************************************/
215#define LOG_GROUP LOG_GROUP_SHARED_CLIPBOARD
216#include <VBox/log.h>
217
218#include <VBox/GuestHost/clipboard-helper.h>
219#include <VBox/HostServices/Service.h>
220#include <VBox/HostServices/VBoxClipboardSvc.h>
221#include <VBox/HostServices/VBoxClipboardExt.h>
222
223#include <VBox/AssertGuest.h>
224#include <VBox/err.h>
225#include <VBox/VMMDev.h>
226#include <VBox/vmm/ssm.h>
227
228#include <iprt/mem.h>
229#include <iprt/string.h>
230#include <iprt/assert.h>
231#include <iprt/critsect.h>
232#include <iprt/rand.h>
233
234#include "VBoxSharedClipboardSvc-internal.h"
235#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
236# include "VBoxSharedClipboardSvc-transfers.h"
237#endif
238
239using namespace HGCM;
240
241
242/*********************************************************************************************************************************
243* Defined Constants And Macros *
244*********************************************************************************************************************************/
245/** @name The saved state versions for the shared clipboard service.
246 *
247 * @note We set bit 31 because prior to version 0x80000002 there would be a
248 * structure size rather than a version number. Setting bit 31 dispells
249 * any possible ambiguity.
250 *
251 * @{ */
252/** The current saved state version. */
253#define VBOX_SHCL_SAVED_STATE_VER_CURRENT VBOX_SHCL_SAVED_STATE_VER_6_1RC1
254/** Adds the client's POD state and client state flags.
255 * @since 6.1 RC1 */
256#define VBOX_SHCL_SAVED_STATE_VER_6_1RC1 UINT32_C(0x80000004)
257/** First attempt saving state during @bugref{9437} development.
258 * @since 6.1 BETA 2 */
259#define VBOX_SHCL_SAVED_STATE_VER_6_1B2 UINT32_C(0x80000003)
260/** First structured version.
261 * @since 3.1 / r53668 */
262#define VBOX_SHCL_SAVED_STATE_VER_3_1 UINT32_C(0x80000002)
263/** This was just a state memory dump, including pointers and everything.
264 * @note This is not supported any more. Sorry. */
265#define VBOX_SHCL_SAVED_STATE_VER_NOT_SUPP (ARCH_BITS == 64 ? UINT32_C(72) : UINT32_C(48))
266/** @} */
267
268
269/*********************************************************************************************************************************
270* Global Variables *
271*********************************************************************************************************************************/
272PVBOXHGCMSVCHELPERS g_pHelpers;
273
274static RTCRITSECT g_CritSect;
275/** Global Shared Clipboard mode. */
276static uint32_t g_uMode = VBOX_SHCL_MODE_OFF;
277#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
278/** Global Shared Clipboard (file) transfer mode. */
279uint32_t g_fTransferMode = VBOX_SHCL_TRANSFER_MODE_DISABLED;
280#endif
281
282/** Is the clipboard running in headless mode? */
283static bool g_fHeadless = false;
284
285/** Holds the service extension state. */
286SHCLEXTSTATE g_ExtState = { 0 };
287
288/** Global map of all connected clients. */
289ClipboardClientMap g_mapClients;
290
291/** Global list of all clients which are queued up (deferred return) and ready
292 * to process new commands. The key is the (unique) client ID. */
293ClipboardClientQueue g_listClientsDeferred;
294
295/** Host feature mask (VBOX_SHCL_HF_0_XXX) for VBOX_SHCL_GUEST_FN_REPORT_FEATURES
296 * and VBOX_SHCL_GUEST_FN_QUERY_FEATURES. */
297static uint64_t const g_fHostFeatures0 = VBOX_SHCL_HF_0_CONTEXT_ID
298#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
299 | VBOX_SHCL_HF_0_TRANSFERS
300#endif
301 ;
302
303
304/**
305 * Returns the current Shared Clipboard service mode.
306 *
307 * @returns Current Shared Clipboard service mode.
308 */
309uint32_t ShClSvcGetMode(void)
310{
311 return g_uMode;
312}
313
314/**
315 * Getter for headless setting. Also needed by testcase.
316 *
317 * @returns Whether service currently running in headless mode or not.
318 */
319bool ShClSvcGetHeadless(void)
320{
321 return g_fHeadless;
322}
323
324static int shClSvcModeSet(uint32_t uMode)
325{
326 int rc = VERR_NOT_SUPPORTED;
327
328 switch (uMode)
329 {
330 case VBOX_SHCL_MODE_OFF:
331 RT_FALL_THROUGH();
332 case VBOX_SHCL_MODE_HOST_TO_GUEST:
333 RT_FALL_THROUGH();
334 case VBOX_SHCL_MODE_GUEST_TO_HOST:
335 RT_FALL_THROUGH();
336 case VBOX_SHCL_MODE_BIDIRECTIONAL:
337 {
338 g_uMode = uMode;
339
340 rc = VINF_SUCCESS;
341 break;
342 }
343
344 default:
345 {
346 g_uMode = VBOX_SHCL_MODE_OFF;
347 break;
348 }
349 }
350
351 LogFlowFuncLeaveRC(rc);
352 return rc;
353}
354
355bool ShClSvcLock(void)
356{
357 return RT_SUCCESS(RTCritSectEnter(&g_CritSect));
358}
359
360void ShClSvcUnlock(void)
361{
362 int rc2 = RTCritSectLeave(&g_CritSect);
363 AssertRC(rc2);
364}
365
366/**
367 * Resets a client's state message queue.
368 *
369 * @param pClient Pointer to the client data structure to reset message queue for.
370 * @note Caller enters pClient->CritSect.
371 */
372void shClSvcMsgQueueReset(PSHCLCLIENT pClient)
373{
374 Assert(RTCritSectIsOwner(&pClient->CritSect));
375 LogFlowFuncEnter();
376
377 while (!RTListIsEmpty(&pClient->MsgQueue))
378 {
379 PSHCLCLIENTMSG pMsg = RTListRemoveFirst(&pClient->MsgQueue, SHCLCLIENTMSG, ListEntry);
380 shClSvcMsgFree(pClient, pMsg);
381 }
382}
383
384/**
385 * Allocates a new clipboard message.
386 *
387 * @returns Allocated clipboard message, or NULL on failure.
388 * @param pClient The client which is target of this message.
389 * @param idMsg The message ID (VBOX_SHCL_HOST_MSG_XXX) to use
390 * @param cParms The number of parameters the message takes.
391 */
392PSHCLCLIENTMSG shClSvcMsgAlloc(PSHCLCLIENT pClient, uint32_t idMsg, uint32_t cParms)
393{
394 RT_NOREF(pClient);
395 PSHCLCLIENTMSG pMsg = (PSHCLCLIENTMSG)RTMemAllocZ(RT_UOFFSETOF_DYN(SHCLCLIENTMSG, aParms[cParms]));
396 if (pMsg)
397 {
398 uint32_t cAllocated = ASMAtomicIncU32(&pClient->cAllocatedMessages);
399 if (cAllocated <= 4096)
400 {
401 RTListInit(&pMsg->ListEntry);
402 pMsg->cParms = cParms;
403 pMsg->idMsg = idMsg;
404 return pMsg;
405 }
406 AssertMsgFailed(("Too many messages allocated for client %u! (%u)\n", pClient->State.uClientID, cAllocated));
407 ASMAtomicDecU32(&pClient->cAllocatedMessages);
408 RTMemFree(pMsg);
409 }
410 return NULL;
411}
412
413/**
414 * Frees a formerly allocated clipboard message.
415 *
416 * @param pClient The client which was the target of this message.
417 * @param pMsg Clipboard message to free.
418 */
419void shClSvcMsgFree(PSHCLCLIENT pClient, PSHCLCLIENTMSG pMsg)
420{
421 RT_NOREF(pClient);
422 /** @todo r=bird: Do accounting. */
423 if (pMsg)
424 {
425 pMsg->idMsg = UINT32_C(0xdeadface);
426 RTMemFree(pMsg);
427
428 uint32_t cAllocated = ASMAtomicDecU32(&pClient->cAllocatedMessages);
429 Assert(cAllocated < UINT32_MAX / 2);
430 RT_NOREF(cAllocated);
431 }
432}
433
434/**
435 * Sets the VBOX_SHCL_GUEST_FN_MSG_PEEK_WAIT and VBOX_SHCL_GUEST_FN_MSG_PEEK_NOWAIT
436 * return parameters.
437 *
438 * @param pMsg Message to set return parameters to.
439 * @param paDstParms The peek parameter vector.
440 * @param cDstParms The number of peek parameters (at least two).
441 * @remarks ASSUMES the parameters has been cleared by clientMsgPeek.
442 */
443static void shClSvcMsgSetPeekReturn(PSHCLCLIENTMSG pMsg, PVBOXHGCMSVCPARM paDstParms, uint32_t cDstParms)
444{
445 Assert(cDstParms >= 2);
446 if (paDstParms[0].type == VBOX_HGCM_SVC_PARM_32BIT)
447 paDstParms[0].u.uint32 = pMsg->idMsg;
448 else
449 paDstParms[0].u.uint64 = pMsg->idMsg;
450 paDstParms[1].u.uint32 = pMsg->cParms;
451
452 uint32_t i = RT_MIN(cDstParms, pMsg->cParms + 2);
453 while (i-- > 2)
454 switch (pMsg->aParms[i - 2].type)
455 {
456 case VBOX_HGCM_SVC_PARM_32BIT: paDstParms[i].u.uint32 = ~(uint32_t)sizeof(uint32_t); break;
457 case VBOX_HGCM_SVC_PARM_64BIT: paDstParms[i].u.uint32 = ~(uint32_t)sizeof(uint64_t); break;
458 case VBOX_HGCM_SVC_PARM_PTR: paDstParms[i].u.uint32 = pMsg->aParms[i - 2].u.pointer.size; break;
459 }
460}
461
462/**
463 * Sets the VBOX_SHCL_GUEST_FN_MSG_OLD_GET_WAIT return parameters.
464 *
465 * @returns VBox status code.
466 * @param pMsg The message which parameters to return to the guest.
467 * @param paDstParms The peek parameter vector.
468 * @param cDstParms The number of peek parameters should be exactly two
469 */
470static int shClSvcMsgSetOldWaitReturn(PSHCLCLIENTMSG pMsg, PVBOXHGCMSVCPARM paDstParms, uint32_t cDstParms)
471{
472 /*
473 * Assert sanity.
474 */
475 AssertPtr(pMsg);
476 AssertPtrReturn(paDstParms, VERR_INVALID_POINTER);
477 AssertReturn(cDstParms >= 2, VERR_INVALID_PARAMETER);
478
479 Assert(pMsg->cParms == 2);
480 Assert(pMsg->aParms[0].u.uint32 == pMsg->idMsg);
481 switch (pMsg->idMsg)
482 {
483 case VBOX_SHCL_HOST_MSG_READ_DATA:
484 case VBOX_SHCL_HOST_MSG_FORMATS_REPORT:
485 break;
486 default:
487 AssertFailed();
488 }
489
490 /*
491 * Set the parameters.
492 */
493 if (pMsg->cParms > 0)
494 paDstParms[0] = pMsg->aParms[0];
495 if (pMsg->cParms > 1)
496 paDstParms[1] = pMsg->aParms[1];
497 return VINF_SUCCESS;
498}
499
500/**
501 * Adds a new message to a client'S message queue.
502 *
503 * @param pClient Pointer to the client data structure to add new message to.
504 * @param pMsg Pointer to message to add. The queue then owns the pointer.
505 * @param fAppend Whether to append or prepend the message to the queue.
506 *
507 * @note Caller must enter critical section.
508 */
509void shClSvcMsgAdd(PSHCLCLIENT pClient, PSHCLCLIENTMSG pMsg, bool fAppend)
510{
511 Assert(RTCritSectIsOwned(&pClient->CritSect));
512 AssertPtr(pMsg);
513
514 LogFlowFunc(("idMsg=%s (%RU32) cParms=%RU32 fAppend=%RTbool\n",
515 ShClHostMsgToStr(pMsg->idMsg), pMsg->idMsg, pMsg->cParms, fAppend));
516
517 if (fAppend)
518 RTListAppend(&pClient->MsgQueue, &pMsg->ListEntry);
519 else
520 RTListPrepend(&pClient->MsgQueue, &pMsg->ListEntry);
521}
522
523
524/**
525 * Appends a message to the client's queue and wake it up.
526 *
527 * @returns VBox status code, though the message is consumed regardless of what
528 * is returned.
529 * @param pClient The client to queue the message on.
530 * @param pMsg The message to queue. Ownership is always
531 * transfered to the queue.
532 *
533 * @note Caller must enter critical section.
534 */
535int shClSvcMsgAddAndWakeupClient(PSHCLCLIENT pClient, PSHCLCLIENTMSG pMsg)
536{
537 Assert(RTCritSectIsOwned(&pClient->CritSect));
538 AssertPtr(pMsg);
539 AssertPtr(pClient);
540 LogFlowFunc(("idMsg=%s (%u) cParms=%u\n", ShClHostMsgToStr(pMsg->idMsg), pMsg->idMsg, pMsg->cParms));
541
542 RTListAppend(&pClient->MsgQueue, &pMsg->ListEntry);
543 return shClSvcClientWakeup(pClient);
544}
545
546/**
547 * Initializes a Shared Clipboard client.
548 *
549 * @param pClient Client to initialize.
550 * @param uClientID HGCM client ID to assign client to.
551 */
552int shClSvcClientInit(PSHCLCLIENT pClient, uint32_t uClientID)
553{
554 AssertPtrReturn(pClient, VERR_INVALID_POINTER);
555
556 /* Assign the client ID. */
557 pClient->State.uClientID = uClientID;
558 RTListInit(&pClient->MsgQueue);
559 pClient->cAllocatedMessages = 0;
560
561 LogFlowFunc(("[Client %RU32]\n", pClient->State.uClientID));
562
563 int rc = RTCritSectInit(&pClient->CritSect);
564 if (RT_SUCCESS(rc))
565 {
566 /* Create the client's own event source. */
567 rc = ShClEventSourceCreate(&pClient->EventSrc, 0 /* ID, ignored */);
568 if (RT_SUCCESS(rc))
569 {
570 LogFlowFunc(("[Client %RU32] Using event source %RU32\n", uClientID, pClient->EventSrc.uID));
571
572 /* Reset the client state. */
573 shclSvcClientStateReset(&pClient->State);
574
575 /* (Re-)initialize the client state. */
576 rc = shClSvcClientStateInit(&pClient->State, uClientID);
577
578#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
579 if (RT_SUCCESS(rc))
580 rc = ShClTransferCtxInit(&pClient->TransferCtx);
581#endif
582 }
583 }
584
585 LogFlowFuncLeaveRC(rc);
586 return rc;
587}
588
589/**
590 * Destroys a Shared Clipboard client.
591 *
592 * @param pClient Client to destroy.
593 */
594void shClSvcClientDestroy(PSHCLCLIENT pClient)
595{
596 AssertPtrReturnVoid(pClient);
597
598 LogFlowFunc(("[Client %RU32]\n", pClient->State.uClientID));
599
600 /* Make sure to send a quit message to the guest so that it can terminate gracefully. */
601 RTCritSectEnter(&pClient->CritSect);
602 if (pClient->Pending.uType)
603 {
604 if (pClient->Pending.cParms > 1)
605 HGCMSvcSetU32(&pClient->Pending.paParms[0], VBOX_SHCL_HOST_MSG_QUIT);
606 if (pClient->Pending.cParms > 2)
607 HGCMSvcSetU32(&pClient->Pending.paParms[1], 0);
608 g_pHelpers->pfnCallComplete(pClient->Pending.hHandle, VINF_SUCCESS);
609 pClient->Pending.uType = 0;
610 pClient->Pending.cParms = 0;
611 pClient->Pending.hHandle = NULL;
612 pClient->Pending.paParms = NULL;
613 }
614 RTCritSectLeave(&pClient->CritSect);
615
616 ShClEventSourceDestroy(&pClient->EventSrc);
617
618 shClSvcClientStateDestroy(&pClient->State);
619
620 int rc2 = RTCritSectDelete(&pClient->CritSect);
621 AssertRC(rc2);
622
623 ClipboardClientMap::iterator itClient = g_mapClients.find(pClient->State.uClientID);
624 if (itClient != g_mapClients.end())
625 {
626 g_mapClients.erase(itClient);
627 }
628 else
629 AssertFailed();
630
631 LogFlowFuncLeave();
632}
633
634/**
635 * Resets a Shared Clipboard client.
636 *
637 * @param pClient Client to reset.
638 */
639void shClSvcClientReset(PSHCLCLIENT pClient)
640{
641 if (!pClient)
642 return;
643
644 LogFlowFunc(("[Client %RU32]\n", pClient->State.uClientID));
645 RTCritSectEnter(&pClient->CritSect);
646
647 /* Reset message queue. */
648 shClSvcMsgQueueReset(pClient);
649
650 /* Reset event source. */
651 ShClEventSourceReset(&pClient->EventSrc);
652
653 /* Reset pending state. */
654 RT_ZERO(pClient->Pending);
655
656#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
657 shClSvcClientTransfersReset(pClient);
658#endif
659
660 shclSvcClientStateReset(&pClient->State);
661
662 RTCritSectLeave(&pClient->CritSect);
663}
664
665static int shClSvcClientNegogiateChunkSize(PSHCLCLIENT pClient, VBOXHGCMCALLHANDLE hCall,
666 uint32_t cParms, VBOXHGCMSVCPARM paParms[])
667{
668 /*
669 * Validate the request.
670 */
671 ASSERT_GUEST_RETURN(cParms == VBOX_SHCL_CPARMS_NEGOTIATE_CHUNK_SIZE, VERR_WRONG_PARAMETER_COUNT);
672 ASSERT_GUEST_RETURN(paParms[0].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE);
673 uint32_t const cbClientMaxChunkSize = paParms[0].u.uint32;
674 ASSERT_GUEST_RETURN(paParms[1].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE);
675 uint32_t const cbClientChunkSize = paParms[1].u.uint32;
676
677 uint32_t const cbHostMaxChunkSize = VBOX_SHCL_MAX_CHUNK_SIZE; /** @todo Make this configurable. */
678
679 /*
680 * Do the work.
681 */
682 if (cbClientChunkSize == 0) /* Does the client want us to choose? */
683 {
684 paParms[0].u.uint32 = cbHostMaxChunkSize; /* Maximum */
685 paParms[1].u.uint32 = RT_MIN(pClient->State.cbChunkSize, cbHostMaxChunkSize); /* Preferred */
686
687 }
688 else /* The client told us what it supports, so update and report back. */
689 {
690 paParms[0].u.uint32 = RT_MIN(cbClientMaxChunkSize, cbHostMaxChunkSize); /* Maximum */
691 paParms[1].u.uint32 = RT_MIN(cbClientMaxChunkSize, pClient->State.cbChunkSize); /* Preferred */
692 }
693
694 int rc = g_pHelpers->pfnCallComplete(hCall, VINF_SUCCESS);
695 if (RT_SUCCESS(rc))
696 {
697 Log(("[Client %RU32] chunk size: %#RU32, max: %#RU32\n",
698 pClient->State.uClientID, paParms[1].u.uint32, paParms[0].u.uint32));
699 }
700 else
701 LogFunc(("pfnCallComplete -> %Rrc\n", rc));
702
703 return VINF_HGCM_ASYNC_EXECUTE;
704}
705
706/**
707 * Implements VBOX_SHCL_GUEST_FN_REPORT_FEATURES.
708 *
709 * @returns VBox status code.
710 * @retval VINF_HGCM_ASYNC_EXECUTE on success (we complete the message here).
711 * @retval VERR_ACCESS_DENIED if not master
712 * @retval VERR_INVALID_PARAMETER if bit 63 in the 2nd parameter isn't set.
713 * @retval VERR_WRONG_PARAMETER_COUNT
714 *
715 * @param pClient The client state.
716 * @param hCall The client's call handle.
717 * @param cParms Number of parameters.
718 * @param paParms Array of parameters.
719 */
720static int shClSvcClientReportFeatures(PSHCLCLIENT pClient, VBOXHGCMCALLHANDLE hCall,
721 uint32_t cParms, VBOXHGCMSVCPARM paParms[])
722{
723 /*
724 * Validate the request.
725 */
726 ASSERT_GUEST_RETURN(cParms == 2, VERR_WRONG_PARAMETER_COUNT);
727 ASSERT_GUEST_RETURN(paParms[0].type == VBOX_HGCM_SVC_PARM_64BIT, VERR_WRONG_PARAMETER_TYPE);
728 uint64_t const fFeatures0 = paParms[0].u.uint64;
729 ASSERT_GUEST_RETURN(paParms[1].type == VBOX_HGCM_SVC_PARM_64BIT, VERR_WRONG_PARAMETER_TYPE);
730 uint64_t const fFeatures1 = paParms[1].u.uint64;
731 ASSERT_GUEST_RETURN(fFeatures1 & VBOX_SHCL_GF_1_MUST_BE_ONE, VERR_INVALID_PARAMETER);
732
733 /*
734 * Do the work.
735 */
736 paParms[0].u.uint64 = g_fHostFeatures0;
737 paParms[1].u.uint64 = 0;
738
739 int rc = g_pHelpers->pfnCallComplete(hCall, VINF_SUCCESS);
740 if (RT_SUCCESS(rc))
741 {
742 pClient->State.fGuestFeatures0 = fFeatures0;
743 pClient->State.fGuestFeatures1 = fFeatures1;
744 Log(("[Client %RU32] features: %#RX64 %#RX64\n", pClient->State.uClientID, fFeatures0, fFeatures1));
745 }
746 else
747 LogFunc(("pfnCallComplete -> %Rrc\n", rc));
748
749 return VINF_HGCM_ASYNC_EXECUTE;
750}
751
752/**
753 * Implements VBOX_SHCL_GUEST_FN_QUERY_FEATURES.
754 *
755 * @returns VBox status code.
756 * @retval VINF_HGCM_ASYNC_EXECUTE on success (we complete the message here).
757 * @retval VERR_WRONG_PARAMETER_COUNT
758 *
759 * @param hCall The client's call handle.
760 * @param cParms Number of parameters.
761 * @param paParms Array of parameters.
762 */
763static int shClSvcClientQueryFeatures(VBOXHGCMCALLHANDLE hCall, uint32_t cParms, VBOXHGCMSVCPARM paParms[])
764{
765 /*
766 * Validate the request.
767 */
768 ASSERT_GUEST_RETURN(cParms == 2, VERR_WRONG_PARAMETER_COUNT);
769 ASSERT_GUEST_RETURN(paParms[0].type == VBOX_HGCM_SVC_PARM_64BIT, VERR_WRONG_PARAMETER_TYPE);
770 ASSERT_GUEST_RETURN(paParms[1].type == VBOX_HGCM_SVC_PARM_64BIT, VERR_WRONG_PARAMETER_TYPE);
771 ASSERT_GUEST(paParms[1].u.uint64 & RT_BIT_64(63));
772
773 /*
774 * Do the work.
775 */
776 paParms[0].u.uint64 = g_fHostFeatures0;
777 paParms[1].u.uint64 = 0;
778 int rc = g_pHelpers->pfnCallComplete(hCall, VINF_SUCCESS);
779 if (RT_FAILURE(rc))
780 LogFunc(("pfnCallComplete -> %Rrc\n", rc));
781
782 return VINF_HGCM_ASYNC_EXECUTE;
783}
784
785/**
786 * Implements VBOX_SHCL_GUEST_FN_MSG_PEEK_WAIT and VBOX_SHCL_GUEST_FN_MSG_PEEK_NOWAIT.
787 *
788 * @returns VBox status code.
789 * @retval VINF_SUCCESS if a message was pending and is being returned.
790 * @retval VERR_TRY_AGAIN if no message pending and not blocking.
791 * @retval VERR_RESOURCE_BUSY if another read already made a waiting call.
792 * @retval VINF_HGCM_ASYNC_EXECUTE if message wait is pending.
793 *
794 * @param pClient The client state.
795 * @param hCall The client's call handle.
796 * @param cParms Number of parameters.
797 * @param paParms Array of parameters.
798 * @param fWait Set if we should wait for a message, clear if to return
799 * immediately.
800 *
801 * @note Caller takes and leave the client's critical section.
802 */
803static int shClSvcClientMsgPeek(PSHCLCLIENT pClient, VBOXHGCMCALLHANDLE hCall, uint32_t cParms, VBOXHGCMSVCPARM paParms[], bool fWait)
804{
805 /*
806 * Validate the request.
807 */
808 ASSERT_GUEST_MSG_RETURN(cParms >= 2, ("cParms=%u!\n", cParms), VERR_WRONG_PARAMETER_COUNT);
809
810 uint64_t idRestoreCheck = 0;
811 uint32_t i = 0;
812 if (paParms[i].type == VBOX_HGCM_SVC_PARM_64BIT)
813 {
814 idRestoreCheck = paParms[0].u.uint64;
815 paParms[0].u.uint64 = 0;
816 i++;
817 }
818 for (; i < cParms; i++)
819 {
820 ASSERT_GUEST_MSG_RETURN(paParms[i].type == VBOX_HGCM_SVC_PARM_32BIT, ("#%u type=%u\n", i, paParms[i].type),
821 VERR_WRONG_PARAMETER_TYPE);
822 paParms[i].u.uint32 = 0;
823 }
824
825 /*
826 * Check restore session ID.
827 */
828 if (idRestoreCheck != 0)
829 {
830 uint64_t idRestore = g_pHelpers->pfnGetVMMDevSessionId(g_pHelpers);
831 if (idRestoreCheck != idRestore)
832 {
833 paParms[0].u.uint64 = idRestore;
834 LogFlowFunc(("[Client %RU32] VBOX_SHCL_GUEST_FN_MSG_PEEK_XXX -> VERR_VM_RESTORED (%#RX64 -> %#RX64)\n",
835 pClient->State.uClientID, idRestoreCheck, idRestore));
836 return VERR_VM_RESTORED;
837 }
838 Assert(!g_pHelpers->pfnIsCallRestored(hCall));
839 }
840
841 /*
842 * Return information about the first message if one is pending in the list.
843 */
844 PSHCLCLIENTMSG pFirstMsg = RTListGetFirst(&pClient->MsgQueue, SHCLCLIENTMSG, ListEntry);
845 if (pFirstMsg)
846 {
847 shClSvcMsgSetPeekReturn(pFirstMsg, paParms, cParms);
848 LogFlowFunc(("[Client %RU32] VBOX_SHCL_GUEST_FN_MSG_PEEK_XXX -> VINF_SUCCESS (idMsg=%s (%u), cParms=%u)\n",
849 pClient->State.uClientID, ShClHostMsgToStr(pFirstMsg->idMsg), pFirstMsg->idMsg, pFirstMsg->cParms));
850 return VINF_SUCCESS;
851 }
852
853 /*
854 * If we cannot wait, fail the call.
855 */
856 if (!fWait)
857 {
858 LogFlowFunc(("[Client %RU32] GUEST_MSG_PEEK_NOWAIT -> VERR_TRY_AGAIN\n", pClient->State.uClientID));
859 return VERR_TRY_AGAIN;
860 }
861
862 /*
863 * Wait for the host to queue a message for this client.
864 */
865 ASSERT_GUEST_MSG_RETURN(pClient->Pending.uType == 0, ("Already pending! (idClient=%RU32)\n",
866 pClient->State.uClientID), VERR_RESOURCE_BUSY);
867 pClient->Pending.hHandle = hCall;
868 pClient->Pending.cParms = cParms;
869 pClient->Pending.paParms = paParms;
870 pClient->Pending.uType = VBOX_SHCL_GUEST_FN_MSG_PEEK_WAIT;
871 LogFlowFunc(("[Client %RU32] Is now in pending mode...\n", pClient->State.uClientID));
872 return VINF_HGCM_ASYNC_EXECUTE;
873}
874
875/**
876 * Implements VBOX_SHCL_GUEST_FN_MSG_OLD_GET_WAIT.
877 *
878 * @returns VBox status code.
879 * @retval VINF_SUCCESS if a message was pending and is being returned.
880 * @retval VINF_HGCM_ASYNC_EXECUTE if message wait is pending.
881 *
882 * @param pClient The client state.
883 * @param hCall The client's call handle.
884 * @param cParms Number of parameters.
885 * @param paParms Array of parameters.
886 *
887 * @note Caller takes and leave the client's critical section.
888 */
889static int shClSvcClientMsgOldGet(PSHCLCLIENT pClient, VBOXHGCMCALLHANDLE hCall, uint32_t cParms, VBOXHGCMSVCPARM paParms[])
890{
891 /*
892 * Validate input.
893 */
894 ASSERT_GUEST_RETURN(cParms == VBOX_SHCL_CPARMS_GET_HOST_MSG_OLD, VERR_WRONG_PARAMETER_COUNT);
895 ASSERT_GUEST_RETURN(paParms[0].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE); /* id32Msg */
896 ASSERT_GUEST_RETURN(paParms[1].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE); /* f32Formats */
897
898 paParms[0].u.uint32 = 0;
899 paParms[1].u.uint32 = 0;
900
901 /*
902 * If there is a message pending we can return immediately.
903 */
904 int rc;
905 PSHCLCLIENTMSG pFirstMsg = RTListGetFirst(&pClient->MsgQueue, SHCLCLIENTMSG, ListEntry);
906 if (pFirstMsg)
907 {
908 LogFlowFunc(("[Client %RU32] uMsg=%s (%RU32), cParms=%RU32\n", pClient->State.uClientID,
909 ShClHostMsgToStr(pFirstMsg->idMsg), pFirstMsg->idMsg, pFirstMsg->cParms));
910
911 rc = shClSvcMsgSetOldWaitReturn(pFirstMsg, paParms, cParms);
912 AssertPtr(g_pHelpers);
913 rc = g_pHelpers->pfnCallComplete(hCall, rc);
914 if (rc != VERR_CANCELLED)
915 {
916 RTListNodeRemove(&pFirstMsg->ListEntry);
917 shClSvcMsgFree(pClient, pFirstMsg);
918
919 rc = VINF_HGCM_ASYNC_EXECUTE; /* The caller must not complete it. */
920 }
921 }
922 /*
923 * Otherwise we must wait.
924 */
925 else
926 {
927 ASSERT_GUEST_MSG_RETURN(pClient->Pending.uType == 0, ("Already pending! (idClient=%RU32)\n", pClient->State.uClientID),
928 VERR_RESOURCE_BUSY);
929
930 pClient->Pending.hHandle = hCall;
931 pClient->Pending.cParms = cParms;
932 pClient->Pending.paParms = paParms;
933 pClient->Pending.uType = VBOX_SHCL_GUEST_FN_MSG_OLD_GET_WAIT;
934
935 rc = VINF_HGCM_ASYNC_EXECUTE; /* The caller must not complete it. */
936
937 LogFlowFunc(("[Client %RU32] Is now in pending mode...\n", pClient->State.uClientID));
938 }
939
940 LogFlowFunc(("[Client %RU32] rc=%Rrc\n", pClient->State.uClientID, rc));
941 return rc;
942}
943
944/**
945 * Implements VBOX_SHCL_GUEST_FN_MSG_GET.
946 *
947 * @returns VBox status code.
948 * @retval VINF_SUCCESS if message retrieved and removed from the pending queue.
949 * @retval VERR_TRY_AGAIN if no message pending.
950 * @retval VERR_BUFFER_OVERFLOW if a parmeter buffer is too small. The buffer
951 * size was updated to reflect the required size, though this isn't yet
952 * forwarded to the guest. (The guest is better of using peek with
953 * parameter count + 2 parameters to get the sizes.)
954 * @retval VERR_MISMATCH if the incoming message ID does not match the pending.
955 * @retval VINF_HGCM_ASYNC_EXECUTE if message was completed already.
956 *
957 * @param pClient The client state.
958 * @param hCall The client's call handle.
959 * @param cParms Number of parameters.
960 * @param paParms Array of parameters.
961 *
962 * @note Called from within pClient->CritSect.
963 */
964static int shClSvcClientMsgGet(PSHCLCLIENT pClient, VBOXHGCMCALLHANDLE hCall, uint32_t cParms, VBOXHGCMSVCPARM paParms[])
965{
966 /*
967 * Validate the request.
968 */
969 uint32_t const idMsgExpected = cParms > 0 && paParms[0].type == VBOX_HGCM_SVC_PARM_32BIT ? paParms[0].u.uint32
970 : cParms > 0 && paParms[0].type == VBOX_HGCM_SVC_PARM_64BIT ? paParms[0].u.uint64
971 : UINT32_MAX;
972
973 /*
974 * Return information about the first message if one is pending in the list.
975 */
976 PSHCLCLIENTMSG pFirstMsg = RTListGetFirst(&pClient->MsgQueue, SHCLCLIENTMSG, ListEntry);
977 if (pFirstMsg)
978 {
979 LogFlowFunc(("First message is: %s (%u), cParms=%RU32\n", ShClHostMsgToStr(pFirstMsg->idMsg), pFirstMsg->idMsg, pFirstMsg->cParms));
980
981 ASSERT_GUEST_MSG_RETURN(pFirstMsg->idMsg == idMsgExpected || idMsgExpected == UINT32_MAX,
982 ("idMsg=%u (%s) cParms=%u, caller expected %u (%s) and %u\n",
983 pFirstMsg->idMsg, ShClHostMsgToStr(pFirstMsg->idMsg), pFirstMsg->cParms,
984 idMsgExpected, ShClHostMsgToStr(idMsgExpected), cParms),
985 VERR_MISMATCH);
986 ASSERT_GUEST_MSG_RETURN(pFirstMsg->cParms == cParms,
987 ("idMsg=%u (%s) cParms=%u, caller expected %u (%s) and %u\n",
988 pFirstMsg->idMsg, ShClHostMsgToStr(pFirstMsg->idMsg), pFirstMsg->cParms,
989 idMsgExpected, ShClHostMsgToStr(idMsgExpected), cParms),
990 VERR_WRONG_PARAMETER_COUNT);
991
992 /* Check the parameter types. */
993 for (uint32_t i = 0; i < cParms; i++)
994 ASSERT_GUEST_MSG_RETURN(pFirstMsg->aParms[i].type == paParms[i].type,
995 ("param #%u: type %u, caller expected %u (idMsg=%u %s)\n", i, pFirstMsg->aParms[i].type,
996 paParms[i].type, pFirstMsg->idMsg, ShClHostMsgToStr(pFirstMsg->idMsg)),
997 VERR_WRONG_PARAMETER_TYPE);
998 /*
999 * Copy out the parameters.
1000 *
1001 * No assertions on buffer overflows, and keep going till the end so we can
1002 * communicate all the required buffer sizes.
1003 */
1004 int rc = VINF_SUCCESS;
1005 for (uint32_t i = 0; i < cParms; i++)
1006 switch (pFirstMsg->aParms[i].type)
1007 {
1008 case VBOX_HGCM_SVC_PARM_32BIT:
1009 paParms[i].u.uint32 = pFirstMsg->aParms[i].u.uint32;
1010 break;
1011
1012 case VBOX_HGCM_SVC_PARM_64BIT:
1013 paParms[i].u.uint64 = pFirstMsg->aParms[i].u.uint64;
1014 break;
1015
1016 case VBOX_HGCM_SVC_PARM_PTR:
1017 {
1018 uint32_t const cbSrc = pFirstMsg->aParms[i].u.pointer.size;
1019 uint32_t const cbDst = paParms[i].u.pointer.size;
1020 paParms[i].u.pointer.size = cbSrc; /** @todo Check if this is safe in other layers...
1021 * Update: Safe, yes, but VMMDevHGCM doesn't pass it along. */
1022 if (cbSrc <= cbDst)
1023 memcpy(paParms[i].u.pointer.addr, pFirstMsg->aParms[i].u.pointer.addr, cbSrc);
1024 else
1025 {
1026 AssertMsgFailed(("#%u: cbSrc=%RU32 is bigger than cbDst=%RU32\n", i, cbSrc, cbDst));
1027 rc = VERR_BUFFER_OVERFLOW;
1028 }
1029 break;
1030 }
1031
1032 default:
1033 AssertMsgFailed(("#%u: %u\n", i, pFirstMsg->aParms[i].type));
1034 rc = VERR_INTERNAL_ERROR;
1035 break;
1036 }
1037 if (RT_SUCCESS(rc))
1038 {
1039 /*
1040 * Complete the message and remove the pending message unless the
1041 * guest raced us and cancelled this call in the meantime.
1042 */
1043 AssertPtr(g_pHelpers);
1044 rc = g_pHelpers->pfnCallComplete(hCall, rc);
1045
1046 LogFlowFunc(("[Client %RU32] pfnCallComplete -> %Rrc\n", pClient->State.uClientID, rc));
1047
1048 if (rc != VERR_CANCELLED)
1049 {
1050 RTListNodeRemove(&pFirstMsg->ListEntry);
1051 shClSvcMsgFree(pClient, pFirstMsg);
1052 }
1053
1054 return VINF_HGCM_ASYNC_EXECUTE; /* The caller must not complete it. */
1055 }
1056
1057 LogFlowFunc(("[Client %RU32] Returning %Rrc\n", pClient->State.uClientID, rc));
1058 return rc;
1059 }
1060
1061 paParms[0].u.uint32 = 0;
1062 paParms[1].u.uint32 = 0;
1063 LogFlowFunc(("[Client %RU32] -> VERR_TRY_AGAIN\n", pClient->State.uClientID));
1064 return VERR_TRY_AGAIN;
1065}
1066
1067/**
1068 * Implements VBOX_SHCL_GUEST_FN_MSG_GET.
1069 *
1070 * @returns VBox status code.
1071 * @retval VINF_SUCCESS if message retrieved and removed from the pending queue.
1072 * @retval VERR_TRY_AGAIN if no message pending.
1073 * @retval VERR_MISMATCH if the incoming message ID does not match the pending.
1074 * @retval VINF_HGCM_ASYNC_EXECUTE if message was completed already.
1075 *
1076 * @param pClient The client state.
1077 * @param cParms Number of parameters.
1078 *
1079 * @note Called from within pClient->CritSect.
1080 */
1081static int shClSvcClientMsgCancel(PSHCLCLIENT pClient, uint32_t cParms)
1082{
1083 /*
1084 * Validate the request.
1085 */
1086 ASSERT_GUEST_MSG_RETURN(cParms == 0, ("cParms=%u!\n", cParms), VERR_WRONG_PARAMETER_COUNT);
1087
1088 /*
1089 * Execute.
1090 */
1091 if (pClient->Pending.uType != 0)
1092 {
1093 LogFlowFunc(("[Client %RU32] Cancelling waiting thread, isPending=%d, pendingNumParms=%RU32, m_idSession=%x\n",
1094 pClient->State.uClientID, pClient->Pending.uType, pClient->Pending.cParms, pClient->State.uSessionID));
1095
1096 /*
1097 * The PEEK call is simple: At least two parameters, all set to zero before sleeping.
1098 */
1099 int rcComplete;
1100 if (pClient->Pending.uType == VBOX_SHCL_GUEST_FN_MSG_PEEK_WAIT)
1101 {
1102 Assert(pClient->Pending.cParms >= 2);
1103 if (pClient->Pending.paParms[0].type == VBOX_HGCM_SVC_PARM_64BIT)
1104 HGCMSvcSetU64(&pClient->Pending.paParms[0], VBOX_SHCL_HOST_MSG_CANCELED);
1105 else
1106 HGCMSvcSetU32(&pClient->Pending.paParms[0], VBOX_SHCL_HOST_MSG_CANCELED);
1107 rcComplete = VINF_TRY_AGAIN;
1108 }
1109 /*
1110 * The MSG_OLD call is complicated, though we're
1111 * generally here to wake up someone who is peeking and have two parameters.
1112 * If there aren't two parameters, fail the call.
1113 */
1114 else
1115 {
1116 Assert(pClient->Pending.uType == VBOX_SHCL_GUEST_FN_MSG_OLD_GET_WAIT);
1117 if (pClient->Pending.cParms > 0)
1118 HGCMSvcSetU32(&pClient->Pending.paParms[0], VBOX_SHCL_HOST_MSG_CANCELED);
1119 if (pClient->Pending.cParms > 1)
1120 HGCMSvcSetU32(&pClient->Pending.paParms[1], 0);
1121 rcComplete = pClient->Pending.cParms == 2 ? VINF_SUCCESS : VERR_TRY_AGAIN;
1122 }
1123
1124 g_pHelpers->pfnCallComplete(pClient->Pending.hHandle, rcComplete);
1125
1126 pClient->Pending.hHandle = NULL;
1127 pClient->Pending.paParms = NULL;
1128 pClient->Pending.cParms = 0;
1129 pClient->Pending.uType = 0;
1130 return VINF_SUCCESS;
1131 }
1132 return VWRN_NOT_FOUND;
1133}
1134
1135
1136/**
1137 * Wakes up a pending client (i.e. waiting for new messages).
1138 *
1139 * @returns VBox status code.
1140 * @retval VINF_NO_CHANGE if the client is not in pending mode.
1141 *
1142 * @param pClient Client to wake up.
1143 * @note Caller must enter pClient->CritSect.
1144 */
1145int shClSvcClientWakeup(PSHCLCLIENT pClient)
1146{
1147 Assert(RTCritSectIsOwner(&pClient->CritSect));
1148 int rc = VINF_NO_CHANGE;
1149
1150 if (pClient->Pending.uType != 0)
1151 {
1152 LogFunc(("[Client %RU32] Waking up ...\n", pClient->State.uClientID));
1153
1154 PSHCLCLIENTMSG pFirstMsg = RTListGetFirst(&pClient->MsgQueue, SHCLCLIENTMSG, ListEntry);
1155 AssertReturn(pFirstMsg, VERR_INTERNAL_ERROR);
1156
1157 LogFunc(("[Client %RU32] Current host message is %s (%RU32), cParms=%RU32\n",
1158 pClient->State.uClientID, ShClHostMsgToStr(pFirstMsg->idMsg), pFirstMsg->idMsg, pFirstMsg->cParms));
1159
1160 if (pClient->Pending.uType == VBOX_SHCL_GUEST_FN_MSG_PEEK_WAIT)
1161 shClSvcMsgSetPeekReturn(pFirstMsg, pClient->Pending.paParms, pClient->Pending.cParms);
1162 else if (pClient->Pending.uType == VBOX_SHCL_GUEST_FN_MSG_OLD_GET_WAIT) /* Legacy, Guest Additions < 6.1. */
1163 shClSvcMsgSetOldWaitReturn(pFirstMsg, pClient->Pending.paParms, pClient->Pending.cParms);
1164 else
1165 AssertMsgFailedReturn(("pClient->Pending.uType=%u\n", pClient->Pending.uType), VERR_INTERNAL_ERROR_3);
1166
1167 rc = g_pHelpers->pfnCallComplete(pClient->Pending.hHandle, VINF_SUCCESS);
1168
1169 if ( rc != VERR_CANCELLED
1170 && pClient->Pending.uType == VBOX_SHCL_GUEST_FN_MSG_OLD_GET_WAIT)
1171 {
1172 RTListNodeRemove(&pFirstMsg->ListEntry);
1173 shClSvcMsgFree(pClient, pFirstMsg);
1174 }
1175
1176 pClient->Pending.hHandle = NULL;
1177 pClient->Pending.paParms = NULL;
1178 pClient->Pending.cParms = 0;
1179 pClient->Pending.uType = 0;
1180 }
1181 else
1182 LogFunc(("[Client %RU32] Not in pending state, skipping wakeup\n", pClient->State.uClientID));
1183
1184 return rc;
1185}
1186
1187/**
1188 * Requests to read clipboard data from the guest.
1189 *
1190 * @returns VBox status code.
1191 * @param pClient Client to request to read data form.
1192 * @param fFormats The formats being requested, OR'ed together (VBOX_SHCL_FMT_XXX).
1193 * @param pidEvent Event ID for waiting for new data. Optional.
1194 * Must be released by the caller with ShClEventRelease() before unregistering then.
1195 */
1196int ShClSvcGuestDataRequest(PSHCLCLIENT pClient, SHCLFORMATS fFormats, PSHCLEVENTID pidEvent)
1197{
1198 LogFlowFuncEnter();
1199 if (pidEvent)
1200 *pidEvent = NIL_SHCLEVENTID;
1201 AssertPtrReturn(pClient, VERR_INVALID_POINTER);
1202
1203 LogFlowFunc(("fFormats=%#x\n", fFormats));
1204
1205 int rc = VERR_NOT_SUPPORTED;
1206
1207 SHCLEVENTID idEvent = NIL_SHCLEVENTID;
1208
1209 while (fFormats)
1210 {
1211 /* Pick the next format to get from the mask: */
1212 /** @todo Make format reporting precedence configurable? */
1213 SHCLFORMAT fFormat;
1214 if (fFormats & VBOX_SHCL_FMT_UNICODETEXT)
1215 fFormat = VBOX_SHCL_FMT_UNICODETEXT;
1216 else if (fFormats & VBOX_SHCL_FMT_BITMAP)
1217 fFormat = VBOX_SHCL_FMT_BITMAP;
1218 else if (fFormats & VBOX_SHCL_FMT_HTML)
1219 fFormat = VBOX_SHCL_FMT_HTML;
1220 else
1221 AssertMsgFailedBreak(("%#x\n", fFormats));
1222
1223 /* Remove it from the mask. */
1224 fFormats &= ~fFormat;
1225
1226 /*
1227 * Allocate messages, one for each format.
1228 */
1229 PSHCLCLIENTMSG pMsg = shClSvcMsgAlloc(pClient,
1230 pClient->State.fGuestFeatures0 & VBOX_SHCL_GF_0_CONTEXT_ID
1231 ? VBOX_SHCL_HOST_MSG_READ_DATA_CID : VBOX_SHCL_HOST_MSG_READ_DATA,
1232 2);
1233 if (pMsg)
1234 {
1235 /*
1236 * Enter the critical section and generate an event.
1237 */
1238 RTCritSectEnter(&pClient->CritSect);
1239
1240 idEvent = ShClEventIdGenerateAndRegister(&pClient->EventSrc);
1241 if (idEvent != NIL_SHCLEVENTID)
1242 {
1243 LogFlowFunc(("fFormats=%#x -> fFormat=%#x, idEvent=%#x\n", fFormats, fFormat, idEvent));
1244
1245 /*
1246 * Format the message.
1247 */
1248 if (pMsg->idMsg == VBOX_SHCL_HOST_MSG_READ_DATA_CID)
1249 HGCMSvcSetU64(&pMsg->aParms[0],
1250 VBOX_SHCL_CONTEXTID_MAKE(pClient->State.uSessionID, pClient->EventSrc.uID, idEvent));
1251 else
1252 HGCMSvcSetU32(&pMsg->aParms[0], VBOX_SHCL_HOST_MSG_READ_DATA);
1253 HGCMSvcSetU32(&pMsg->aParms[1], fFormat);
1254
1255 shClSvcMsgAdd(pClient, pMsg, true /* fAppend */);
1256
1257 rc = VINF_SUCCESS;
1258 }
1259 else
1260 rc = VERR_SHCLPB_MAX_EVENTS_REACHED;
1261
1262 RTCritSectLeave(&pClient->CritSect);
1263 }
1264 else
1265 rc = VERR_NO_MEMORY;
1266
1267 if (RT_FAILURE(rc))
1268 break;
1269 }
1270
1271 if (RT_SUCCESS(rc))
1272 {
1273 RTCritSectEnter(&pClient->CritSect);
1274
1275 /* Retain the last event generated (in case there were multiple clipboard formats)
1276 * if we need to return the event ID to the caller. */
1277 if (pidEvent)
1278 {
1279 ShClEventRetain(&pClient->EventSrc, idEvent);
1280 *pidEvent = idEvent;
1281 }
1282
1283 shClSvcClientWakeup(pClient);
1284
1285 RTCritSectLeave(&pClient->CritSect);
1286 }
1287
1288 LogFlowFuncLeaveRC(rc);
1289 return rc;
1290}
1291
1292/**
1293 * Notifies that clipboard data from the guest has been received.
1294 *
1295 * @returns VBox status code. Returns VERR_NOT_FOUND when related event ID was not found.
1296 * @param pClient Client the guest clipboard data was received for.
1297 * @param pCmdCtx Client command context to use.
1298 * @param uFormat Clipboard format of data received.
1299 * @param pvData Pointer to clipboard data received.
1300 * @param cbData Size (in bytes) of clipboard data received.
1301 */
1302int ShClSvcGuestDataReceived(PSHCLCLIENT pClient, PSHCLCLIENTCMDCTX pCmdCtx,
1303 SHCLFORMAT uFormat, void *pvData, uint32_t cbData)
1304{
1305 AssertPtrReturn(pClient, VERR_INVALID_POINTER);
1306 AssertPtrReturn(pCmdCtx, VERR_INVALID_POINTER);
1307 AssertPtrReturn(pvData, VERR_INVALID_POINTER);
1308
1309 RT_NOREF(uFormat);
1310
1311 LogFlowFuncEnter();
1312
1313 SHCLEVENTID idEvent;
1314 if (!(pClient->State.fGuestFeatures0 & VBOX_SHCL_GF_0_CONTEXT_ID)) /* Legacy, Guest Additions < 6.1. */
1315 {
1316 /* Older Guest Additions (<= VBox 6.0) did not have any context ID handling, so we ASSUME that the last event registered
1317 * is the one we want to handle (as this all was a synchronous protocol anyway). */
1318 idEvent = ShClEventGetLast(&pClient->EventSrc);
1319 }
1320 else
1321 idEvent = VBOX_SHCL_CONTEXTID_GET_EVENT(pCmdCtx->uContextID);
1322
1323 if (idEvent == NIL_SHCLEVENTID) /* Event not found? Bail out early. */
1324 return VERR_NOT_FOUND;
1325
1326 int rc = VINF_SUCCESS;
1327
1328 PSHCLEVENTPAYLOAD pPayload = NULL;
1329 if (cbData)
1330 rc = ShClPayloadAlloc(idEvent, pvData, cbData, &pPayload);
1331
1332 if (RT_SUCCESS(rc))
1333 {
1334 RTCritSectEnter(&pClient->CritSect);
1335 rc = ShClEventSignal(&pClient->EventSrc, idEvent, pPayload);
1336 RTCritSectLeave(&pClient->CritSect);
1337 if (RT_FAILURE(rc))
1338 ShClPayloadFree(pPayload);
1339
1340 /* No one holding a reference to the event event anymore? Unregister it. */
1341 if (ShClEventGetRefs(&pClient->EventSrc, idEvent) == 0)
1342 {
1343 int rc2 = ShClEventUnregister(&pClient->EventSrc, idEvent);
1344 if (RT_SUCCESS(rc))
1345 rc = rc2;
1346 }
1347 }
1348
1349 LogFlowFuncLeaveRC(rc);
1350 return rc;
1351}
1352
1353/**
1354 * Reports available VBox clipboard formats to the guest.
1355 *
1356 * @returns VBox status code.
1357 * @param pClient Client to request to read data form.
1358 * @param fFormats The formats to report (VBOX_SHCL_FMT_XXX), zero
1359 * is okay (empty the clipboard).
1360 */
1361int ShClSvcHostReportFormats(PSHCLCLIENT pClient, SHCLFORMATS fFormats)
1362{
1363 LogFlowFunc(("fFormats=%#x\n", fFormats));
1364 AssertPtrReturn(pClient, VERR_INVALID_POINTER);
1365
1366#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
1367 /*
1368 * If transfer mode is set to disabled, don't report the URI list format to the guest.
1369 */
1370 if (!(g_fTransferMode & VBOX_SHCL_TRANSFER_MODE_ENABLED))
1371 {
1372 LogFlowFunc(("fFormats=%#x -> %#x\n", fFormats, fFormats & ~VBOX_SHCL_FMT_URI_LIST));
1373 fFormats &= ~VBOX_SHCL_FMT_URI_LIST;
1374 }
1375#endif
1376 LogRel2(("Shared Clipboard: Reporting formats %#x to guest\n", fFormats));
1377
1378 /*
1379 * Allocate a message, populate parameters and post it to the client.
1380 */
1381 int rc;
1382 PSHCLCLIENTMSG pMsg = shClSvcMsgAlloc(pClient, VBOX_SHCL_HOST_MSG_FORMATS_REPORT, 2);
1383 if (pMsg)
1384 {
1385 HGCMSvcSetU32(&pMsg->aParms[0], VBOX_SHCL_HOST_MSG_FORMATS_REPORT);
1386 HGCMSvcSetU32(&pMsg->aParms[1], fFormats);
1387
1388 RTCritSectEnter(&pClient->CritSect);
1389 shClSvcMsgAddAndWakeupClient(pClient, pMsg);
1390 RTCritSectLeave(&pClient->CritSect);
1391
1392#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
1393 /* If we announce an URI list, create a transfer locally and also tell the guest to create
1394 * a transfer on the guest side. */
1395 if (fFormats & VBOX_SHCL_FMT_URI_LIST)
1396 {
1397 rc = shClSvcTransferStart(pClient, SHCLTRANSFERDIR_TO_REMOTE, SHCLSOURCE_LOCAL,
1398 NULL /* pTransfer */);
1399 if (RT_SUCCESS(rc))
1400 rc = shClSvcSetSource(pClient, SHCLSOURCE_LOCAL);
1401
1402 if (RT_FAILURE(rc))
1403 LogRel(("Shared Clipboard: Initializing host write transfer failed with %Rrc\n", rc));
1404 }
1405 else
1406#endif
1407 {
1408 rc = VINF_SUCCESS;
1409 }
1410 }
1411 else
1412 rc = VERR_NO_MEMORY;
1413
1414 LogFlowFuncLeaveRC(rc);
1415 return rc;
1416}
1417
1418
1419/**
1420 * Handles the VBOX_SHCL_GUEST_FN_REPORT_FORMATS message from the guest.
1421 */
1422static int shClSvcClientReportFormats(PSHCLCLIENT pClient, uint32_t cParms, VBOXHGCMSVCPARM paParms[])
1423{
1424 /*
1425 * Check if the service mode allows this operation and whether the guest is
1426 * supposed to be reading from the host.
1427 */
1428 uint32_t uMode = ShClSvcGetMode();
1429 if ( uMode == VBOX_SHCL_MODE_BIDIRECTIONAL
1430 || uMode == VBOX_SHCL_MODE_GUEST_TO_HOST)
1431 { /* likely */ }
1432 else
1433 return VERR_ACCESS_DENIED;
1434
1435 /*
1436 * Digest parameters.
1437 */
1438 ASSERT_GUEST_RETURN( cParms == VBOX_SHCL_CPARMS_REPORT_FORMATS
1439 || ( cParms == VBOX_SHCL_CPARMS_REPORT_FORMATS_61B
1440 && (pClient->State.fGuestFeatures0 & VBOX_SHCL_GF_0_CONTEXT_ID)),
1441 VERR_WRONG_PARAMETER_COUNT);
1442
1443 uintptr_t iParm = 0;
1444 if (cParms == VBOX_SHCL_CPARMS_REPORT_FORMATS_61B)
1445 {
1446 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_64BIT, VERR_WRONG_PARAMETER_TYPE);
1447 /* no defined value, so just ignore it */
1448 iParm++;
1449 }
1450 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE);
1451 uint32_t const fFormats = paParms[iParm].u.uint32;
1452 iParm++;
1453 if (cParms == VBOX_SHCL_CPARMS_REPORT_FORMATS_61B)
1454 {
1455 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE);
1456 ASSERT_GUEST_RETURN(paParms[iParm].u.uint32 == 0, VERR_INVALID_FLAGS);
1457 iParm++;
1458 }
1459 Assert(iParm == cParms);
1460
1461 /*
1462 * Report the formats.
1463 *
1464 * We ignore empty reports if the guest isn't the clipboard owner, this
1465 * prevents a freshly booted guest with an empty clibpoard from clearing
1466 * the host clipboard on startup. Likewise, when a guest shutdown it will
1467 * typically issue an empty report in case it's the owner, we don't want
1468 * that to clear host content either.
1469 */
1470 int rc;
1471 if (!fFormats && pClient->State.enmSource != SHCLSOURCE_REMOTE)
1472 rc = VINF_SUCCESS;
1473 else
1474 {
1475 rc = shClSvcSetSource(pClient, SHCLSOURCE_REMOTE);
1476 if (RT_SUCCESS(rc))
1477 {
1478 if (g_ExtState.pfnExtension)
1479 {
1480 SHCLEXTPARMS parms;
1481 RT_ZERO(parms);
1482 parms.uFormat = fFormats;
1483
1484 g_ExtState.pfnExtension(g_ExtState.pvExtension, VBOX_CLIPBOARD_EXT_FN_FORMAT_ANNOUNCE, &parms, sizeof(parms));
1485 }
1486 else
1487 rc = ShClBackendFormatAnnounce(pClient, fFormats);
1488 }
1489 }
1490
1491 return rc;
1492}
1493
1494/**
1495 * Handles the VBOX_SHCL_GUEST_FN_DATA_READ message from the guest.
1496 */
1497static int shClSvcClientReadData(PSHCLCLIENT pClient, uint32_t cParms, VBOXHGCMSVCPARM paParms[])
1498{
1499 LogFlowFuncEnter();
1500
1501 /*
1502 * Check if the service mode allows this operation and whether the guest is
1503 * supposed to be reading from the host.
1504 */
1505 uint32_t uMode = ShClSvcGetMode();
1506 if ( uMode == VBOX_SHCL_MODE_BIDIRECTIONAL
1507 || uMode == VBOX_SHCL_MODE_HOST_TO_GUEST)
1508 { /* likely */ }
1509 else
1510 return VERR_ACCESS_DENIED;
1511
1512 /*
1513 * Digest parameters.
1514 *
1515 * We are dragging some legacy here from the 6.1 dev cycle, a 5 parameter
1516 * variant which prepends a 64-bit context ID (RAZ as meaning not defined),
1517 * a 32-bit flag (MBZ, no defined meaning) and switches the last two parameters.
1518 */
1519 ASSERT_GUEST_RETURN( cParms == VBOX_SHCL_CPARMS_DATA_READ
1520 || ( cParms == VBOX_SHCL_CPARMS_DATA_READ_61B
1521 && (pClient->State.fGuestFeatures0 & VBOX_SHCL_GF_0_CONTEXT_ID)),
1522 VERR_WRONG_PARAMETER_COUNT);
1523
1524 uintptr_t iParm = 0;
1525 SHCLCLIENTCMDCTX cmdCtx;
1526 RT_ZERO(cmdCtx);
1527 if (cParms == VBOX_SHCL_CPARMS_DATA_READ_61B)
1528 {
1529 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_64BIT, VERR_WRONG_PARAMETER_TYPE);
1530 /* This has no defined meaning and was never used, however the guest passed stuff, so ignore it and leave idContext=0. */
1531 iParm++;
1532 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE);
1533 ASSERT_GUEST_RETURN(paParms[iParm].u.uint32 == 0, VERR_INVALID_FLAGS);
1534 iParm++;
1535 }
1536
1537 SHCLFORMAT uFormat = VBOX_SHCL_FMT_NONE;
1538 uint32_t cbData = 0;
1539 void *pvData = NULL;
1540
1541 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE);
1542 uFormat = paParms[iParm].u.uint32;
1543 iParm++;
1544 if (cParms != VBOX_SHCL_CPARMS_DATA_READ_61B)
1545 {
1546 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_PTR, VERR_WRONG_PARAMETER_TYPE); /* Data buffer */
1547 pvData = paParms[iParm].u.pointer.addr;
1548 cbData = paParms[iParm].u.pointer.size;
1549 iParm++;
1550 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE); /*cbDataReturned*/
1551 iParm++;
1552 }
1553 else
1554 {
1555 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE); /*cbDataReturned*/
1556 iParm++;
1557 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_PTR, VERR_WRONG_PARAMETER_TYPE); /* Data buffer */
1558 pvData = paParms[iParm].u.pointer.addr;
1559 cbData = paParms[iParm].u.pointer.size;
1560 iParm++;
1561 }
1562 Assert(iParm == cParms);
1563
1564 /*
1565 * For some reason we need to do this (makes absolutely no sense to bird).
1566 */
1567 /** @todo r=bird: I really don't get why you need the State.POD.uFormat
1568 * member. I'm sure there is a reason. Incomplete code? */
1569 if (!(pClient->State.fGuestFeatures0 & VBOX_SHCL_GF_0_CONTEXT_ID))
1570 {
1571 if (pClient->State.POD.uFormat == VBOX_SHCL_FMT_NONE)
1572 pClient->State.POD.uFormat = uFormat;
1573 }
1574
1575 LogRel2(("Shared Clipboard: Guest wants to read %RU32 bytes host clipboard data in format %RU32\n", cbData, uFormat));
1576
1577 /*
1578 * Do the reading.
1579 */
1580 int rc;
1581 uint32_t cbActual = 0;
1582
1583 /* If there is a service extension active, try reading data from it first. */
1584 if (g_ExtState.pfnExtension)
1585 {
1586 SHCLEXTPARMS parms;
1587 RT_ZERO(parms);
1588
1589 parms.uFormat = uFormat;
1590 parms.u.pvData = pvData;
1591 parms.cbData = cbData;
1592
1593 g_ExtState.fReadingData = true;
1594
1595 /* Read clipboard data from the extension. */
1596 rc = g_ExtState.pfnExtension(g_ExtState.pvExtension, VBOX_CLIPBOARD_EXT_FN_DATA_READ, &parms, sizeof(parms));
1597 LogRelFlowFunc(("Shared Clipboard: DATA/Ext: fDelayedAnnouncement=%RTbool fDelayedFormats=%#x cbData=%RU32->%RU32 rc=%Rrc\n",
1598 g_ExtState.fDelayedAnnouncement, g_ExtState.fDelayedFormats, cbData, parms.cbData, rc));
1599
1600 /* Did the extension send the clipboard formats yet?
1601 * Otherwise, do this now. */
1602 if (g_ExtState.fDelayedAnnouncement)
1603 {
1604 int rc2 = ShClSvcHostReportFormats(pClient, g_ExtState.fDelayedFormats);
1605 AssertRC(rc2);
1606
1607 g_ExtState.fDelayedAnnouncement = false;
1608 g_ExtState.fDelayedFormats = 0;
1609 }
1610
1611 g_ExtState.fReadingData = false;
1612
1613 if (RT_SUCCESS(rc))
1614 cbActual = parms.cbData;
1615 }
1616 else
1617 {
1618 rc = ShClBackendReadData(pClient, &cmdCtx, uFormat, pvData, cbData, &cbActual);
1619 LogRelFlowFunc(("Shared Clipboard: DATA/Host: cbData=%RU32->%RU32 rc=%Rrc\n", cbData, cbActual, rc));
1620 }
1621
1622 if (RT_SUCCESS(rc))
1623 {
1624 /* Return the actual size required to fullfil the request. */
1625 if (cParms != VBOX_SHCL_CPARMS_DATA_READ_61B)
1626 HGCMSvcSetU32(&paParms[2], cbActual);
1627 else
1628 HGCMSvcSetU32(&paParms[3], cbActual);
1629
1630 /* If the data to return exceeds the buffer the guest supplies, tell it (and let it try again). */
1631 if (cbActual >= cbData)
1632 rc = VINF_BUFFER_OVERFLOW;
1633 }
1634
1635 LogFlowFuncLeaveRC(rc);
1636 return rc;
1637}
1638
1639int shClSvcClientWriteData(PSHCLCLIENT pClient, uint32_t cParms, VBOXHGCMSVCPARM paParms[])
1640{
1641 LogFlowFuncEnter();
1642
1643 /*
1644 * Check if the service mode allows this operation and whether the guest is
1645 * supposed to be reading from the host.
1646 */
1647 uint32_t uMode = ShClSvcGetMode();
1648 if ( uMode == VBOX_SHCL_MODE_BIDIRECTIONAL
1649 || uMode == VBOX_SHCL_MODE_GUEST_TO_HOST)
1650 { /* likely */ }
1651 else
1652 return VERR_ACCESS_DENIED;
1653
1654 /*
1655 * Digest parameters.
1656 *
1657 * There are 3 different format here, formatunately no parameters have been
1658 * switch around so it's plain sailing compared to the DATA_READ message.
1659 */
1660 ASSERT_GUEST_RETURN(pClient->State.fGuestFeatures0 & VBOX_SHCL_GF_0_CONTEXT_ID
1661 ? cParms == VBOX_SHCL_CPARMS_DATA_WRITE || cParms == VBOX_SHCL_CPARMS_DATA_WRITE_61B
1662 : cParms == VBOX_SHCL_CPARMS_DATA_WRITE_OLD,
1663 VERR_WRONG_PARAMETER_COUNT);
1664
1665 uintptr_t iParm = 0;
1666 SHCLCLIENTCMDCTX cmdCtx;
1667 RT_ZERO(cmdCtx);
1668 if (cParms > VBOX_SHCL_CPARMS_DATA_WRITE_OLD)
1669 {
1670 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_64BIT, VERR_WRONG_PARAMETER_TYPE);
1671 cmdCtx.uContextID = paParms[iParm].u.uint64;
1672 uint64_t const idCtxExpected = VBOX_SHCL_CONTEXTID_MAKE(pClient->State.uSessionID, pClient->EventSrc.uID,
1673 VBOX_SHCL_CONTEXTID_GET_EVENT(cmdCtx.uContextID));
1674 ASSERT_GUEST_MSG_RETURN(cmdCtx.uContextID == idCtxExpected,
1675 ("Wrong context ID: %#RX64, expected %#RX64\n", cmdCtx.uContextID, idCtxExpected),
1676 VERR_INVALID_CONTEXT);
1677 iParm++;
1678 }
1679 else
1680 {
1681 /** @todo supply CID from client state? Setting it in ShClSvcGuestDataRequest? */
1682 }
1683 if (cParms == VBOX_SHCL_CPARMS_DATA_WRITE_61B)
1684 {
1685 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE);
1686 ASSERT_GUEST_RETURN(paParms[iParm].u.uint32 == 0, VERR_INVALID_FLAGS);
1687 iParm++;
1688 }
1689
1690 SHCLFORMAT uFormat = VBOX_SHCL_FMT_NONE;
1691 uint32_t cbData = 0;
1692 void *pvData = NULL;
1693
1694 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE); /* Format bit. */
1695 uFormat = paParms[iParm].u.uint32;
1696 iParm++;
1697 if (cParms == VBOX_SHCL_CPARMS_DATA_WRITE_61B)
1698 {
1699 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_32BIT, VERR_WRONG_PARAMETER_TYPE); /* "cbData" - duplicates buffer size. */
1700 iParm++;
1701 }
1702 ASSERT_GUEST_RETURN(paParms[iParm].type == VBOX_HGCM_SVC_PARM_PTR, VERR_WRONG_PARAMETER_TYPE); /* Data buffer */
1703 pvData = paParms[iParm].u.pointer.addr;
1704 cbData = paParms[iParm].u.pointer.size;
1705 iParm++;
1706 Assert(iParm == cParms);
1707
1708 /*
1709 * For some reason we need to do this (makes absolutely no sense to bird).
1710 */
1711 /** @todo r=bird: I really don't get why you need the State.POD.uFormat
1712 * member. I'm sure there is a reason. Incomplete code? */
1713 if (!(pClient->State.fGuestFeatures0 & VBOX_SHCL_GF_0_CONTEXT_ID))
1714 {
1715 if (pClient->State.POD.uFormat == VBOX_SHCL_FMT_NONE)
1716 pClient->State.POD.uFormat = uFormat;
1717 }
1718
1719 LogRel2(("Shared Clipboard: Guest writes %RU32 bytes clipboard data in format %RU32 to host\n", cbData, uFormat));
1720
1721 /*
1722 * Write the data to the active host side clipboard.
1723 */
1724 int rc;
1725 if (g_ExtState.pfnExtension)
1726 {
1727 SHCLEXTPARMS parms;
1728 RT_ZERO(parms);
1729 parms.uFormat = uFormat;
1730 parms.u.pvData = pvData;
1731 parms.cbData = cbData;
1732
1733 g_ExtState.pfnExtension(g_ExtState.pvExtension, VBOX_CLIPBOARD_EXT_FN_DATA_WRITE, &parms, sizeof(parms));
1734 rc = VINF_SUCCESS;
1735 }
1736 else
1737 {
1738 /* Let the backend implementation know. */
1739 rc = ShClBackendWriteData(pClient, &cmdCtx, uFormat, pvData, cbData);
1740
1741 int rc2; /* Don't return internals back to the guest. */
1742 rc2 = ShClSvcGuestDataReceived(pClient, &cmdCtx, uFormat, pvData, cbData); /* To complete pending events, if any. */
1743 AssertRC(rc2);
1744 }
1745
1746 LogFlowFuncLeaveRC(rc);
1747 return rc;
1748}
1749
1750/**
1751 * Gets an error from HGCM service parameters.
1752 *
1753 * @returns VBox status code.
1754 * @param cParms Number of HGCM parameters supplied in \a paParms.
1755 * @param paParms Array of HGCM parameters.
1756 * @param pRc Where to store the received error code.
1757 */
1758static int shClSvcClientError(uint32_t cParms, VBOXHGCMSVCPARM paParms[], int *pRc)
1759{
1760 AssertPtrReturn(paParms, VERR_INVALID_PARAMETER);
1761 AssertPtrReturn(pRc, VERR_INVALID_PARAMETER);
1762
1763 int rc;
1764
1765 if (cParms == VBOX_SHCL_CPARMS_ERROR)
1766 {
1767 rc = HGCMSvcGetU32(&paParms[1], (uint32_t *)pRc); /** @todo int vs. uint32_t !!! */
1768 }
1769 else
1770 rc = VERR_INVALID_PARAMETER;
1771
1772 LogFlowFuncLeaveRC(rc);
1773 return rc;
1774}
1775
1776/**
1777 * Sets the transfer source type of a Shared Clipboard client.
1778 *
1779 * @returns VBox status code.
1780 * @param pClient Client to set transfer source type for.
1781 * @param enmSource Source type to set.
1782 */
1783int shClSvcSetSource(PSHCLCLIENT pClient, SHCLSOURCE enmSource)
1784{
1785 if (!pClient) /* If no client connected (anymore), bail out. */
1786 return VINF_SUCCESS;
1787
1788 int rc = VINF_SUCCESS;
1789
1790 if (ShClSvcLock())
1791 {
1792 pClient->State.enmSource = enmSource;
1793
1794 LogFlowFunc(("Source of client %RU32 is now %RU32\n", pClient->State.uClientID, pClient->State.enmSource));
1795
1796 ShClSvcUnlock();
1797 }
1798
1799 LogFlowFuncLeaveRC(rc);
1800 return rc;
1801}
1802
1803static int svcInit(void)
1804{
1805 int rc = RTCritSectInit(&g_CritSect);
1806
1807 if (RT_SUCCESS(rc))
1808 {
1809 shClSvcModeSet(VBOX_SHCL_MODE_OFF);
1810
1811 rc = ShClBackendInit();
1812
1813 /* Clean up on failure, because 'svnUnload' will not be called
1814 * if the 'svcInit' returns an error.
1815 */
1816 if (RT_FAILURE(rc))
1817 {
1818 RTCritSectDelete(&g_CritSect);
1819 }
1820 }
1821
1822 return rc;
1823}
1824
1825static DECLCALLBACK(int) svcUnload(void *)
1826{
1827 LogFlowFuncEnter();
1828
1829 ShClBackendDestroy();
1830
1831 RTCritSectDelete(&g_CritSect);
1832
1833 return VINF_SUCCESS;
1834}
1835
1836static DECLCALLBACK(int) svcDisconnect(void *, uint32_t u32ClientID, void *pvClient)
1837{
1838 RT_NOREF(u32ClientID);
1839
1840 LogFunc(("u32ClientID=%RU32\n", u32ClientID));
1841
1842 PSHCLCLIENT pClient = (PSHCLCLIENT)pvClient;
1843 AssertPtr(pClient);
1844
1845#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
1846 shClSvcClientTransfersReset(pClient);
1847#endif
1848
1849 ShClBackendDisconnect(pClient);
1850
1851 shClSvcClientDestroy(pClient);
1852
1853 return VINF_SUCCESS;
1854}
1855
1856static DECLCALLBACK(int) svcConnect(void *, uint32_t u32ClientID, void *pvClient, uint32_t fRequestor, bool fRestoring)
1857{
1858 RT_NOREF(fRequestor, fRestoring);
1859
1860 PSHCLCLIENT pClient = (PSHCLCLIENT)pvClient;
1861 AssertPtr(pvClient);
1862
1863 int rc = shClSvcClientInit(pClient, u32ClientID);
1864 if (RT_SUCCESS(rc))
1865 {
1866 rc = ShClBackendConnect(pClient, ShClSvcGetHeadless());
1867 if (RT_SUCCESS(rc))
1868 {
1869 /* Sync the host clipboard content with the client. */
1870 rc = ShClBackendSync(pClient);
1871 if (rc == VINF_NO_CHANGE)
1872 {
1873 /*
1874 * The sync could return VINF_NO_CHANGE if nothing has changed on the host, but older
1875 * Guest Additions rely on the fact that only VINF_SUCCESS indicates a successful connect
1876 * to the host service (instead of using RT_SUCCESS()).
1877 *
1878 * So implicitly set VINF_SUCCESS here to not break older Guest Additions.
1879 */
1880 rc = VINF_SUCCESS;
1881 }
1882
1883 if (RT_SUCCESS(rc))
1884 {
1885 /* Assign weak pointer to client map .*/
1886 g_mapClients[u32ClientID] = pClient; /** @todo Handle OOM / collisions? */
1887
1888 /* For now we ASSUME that the first client ever connected is in charge for
1889 * communicating withe the service extension.
1890 *
1891 ** @todo This needs to be fixed ASAP w/o breaking older guest / host combos. */
1892 if (g_ExtState.uClientID == 0)
1893 g_ExtState.uClientID = u32ClientID;
1894 }
1895 }
1896 }
1897
1898 LogFlowFuncLeaveRC(rc);
1899 return rc;
1900}
1901
1902static DECLCALLBACK(void) svcCall(void *,
1903 VBOXHGCMCALLHANDLE callHandle,
1904 uint32_t u32ClientID,
1905 void *pvClient,
1906 uint32_t u32Function,
1907 uint32_t cParms,
1908 VBOXHGCMSVCPARM paParms[],
1909 uint64_t tsArrival)
1910{
1911 RT_NOREF(u32ClientID, pvClient, tsArrival);
1912 PSHCLCLIENT pClient = (PSHCLCLIENT)pvClient;
1913 AssertPtr(pClient);
1914
1915#ifdef LOG_ENABLED
1916 LogFunc(("u32ClientID=%RU32, fn=%RU32 (%s), cParms=%RU32, paParms=%p\n",
1917 u32ClientID, u32Function, ShClGuestMsgToStr(u32Function), cParms, paParms));
1918 for (uint32_t i = 0; i < cParms; i++)
1919 {
1920 switch (paParms[i].type)
1921 {
1922 case VBOX_HGCM_SVC_PARM_32BIT:
1923 LogFunc((" paParms[%RU32]: type uint32_t - value %RU32\n", i, paParms[i].u.uint32));
1924 break;
1925 case VBOX_HGCM_SVC_PARM_64BIT:
1926 LogFunc((" paParms[%RU32]: type uint64_t - value %RU64\n", i, paParms[i].u.uint64));
1927 break;
1928 case VBOX_HGCM_SVC_PARM_PTR:
1929 LogFunc((" paParms[%RU32]: type ptr - value 0x%p (%RU32 bytes)\n",
1930 i, paParms[i].u.pointer.addr, paParms[i].u.pointer.size));
1931 break;
1932 case VBOX_HGCM_SVC_PARM_PAGES:
1933 LogFunc((" paParms[%RU32]: type pages - cb=%RU32, cPages=%RU16\n",
1934 i, paParms[i].u.Pages.cb, paParms[i].u.Pages.cPages));
1935 break;
1936 default:
1937 AssertFailed();
1938 }
1939 }
1940 LogFunc(("Client state: fFlags=0x%x, fGuestFeatures0=0x%x, fGuestFeatures1=0x%x\n",
1941 pClient->State.fFlags, pClient->State.fGuestFeatures0, pClient->State.fGuestFeatures1));
1942#endif
1943
1944 int rc;
1945 switch (u32Function)
1946 {
1947 case VBOX_SHCL_GUEST_FN_MSG_OLD_GET_WAIT:
1948 RTCritSectEnter(&pClient->CritSect);
1949 rc = shClSvcClientMsgOldGet(pClient, callHandle, cParms, paParms);
1950 RTCritSectLeave(&pClient->CritSect);
1951 break;
1952
1953 case VBOX_SHCL_GUEST_FN_CONNECT:
1954 LogRel(("Shared Clipboard: 6.1.0 beta or rc Guest Additions detected. Please upgrade!\n"));
1955 rc = VERR_NOT_IMPLEMENTED;
1956 break;
1957
1958 case VBOX_SHCL_GUEST_FN_NEGOTIATE_CHUNK_SIZE:
1959 rc = shClSvcClientNegogiateChunkSize(pClient, callHandle, cParms, paParms);
1960 break;
1961
1962 case VBOX_SHCL_GUEST_FN_REPORT_FEATURES:
1963 rc = shClSvcClientReportFeatures(pClient, callHandle, cParms, paParms);
1964 break;
1965
1966 case VBOX_SHCL_GUEST_FN_QUERY_FEATURES:
1967 rc = shClSvcClientQueryFeatures(callHandle, cParms, paParms);
1968 break;
1969
1970 case VBOX_SHCL_GUEST_FN_MSG_PEEK_NOWAIT:
1971 RTCritSectEnter(&pClient->CritSect);
1972 rc = shClSvcClientMsgPeek(pClient, callHandle, cParms, paParms, false /*fWait*/);
1973 RTCritSectLeave(&pClient->CritSect);
1974 break;
1975
1976 case VBOX_SHCL_GUEST_FN_MSG_PEEK_WAIT:
1977 RTCritSectEnter(&pClient->CritSect);
1978 rc = shClSvcClientMsgPeek(pClient, callHandle, cParms, paParms, true /*fWait*/);
1979 RTCritSectLeave(&pClient->CritSect);
1980 break;
1981
1982 case VBOX_SHCL_GUEST_FN_MSG_GET:
1983 RTCritSectEnter(&pClient->CritSect);
1984 rc = shClSvcClientMsgGet(pClient, callHandle, cParms, paParms);
1985 RTCritSectLeave(&pClient->CritSect);
1986 break;
1987
1988 case VBOX_SHCL_GUEST_FN_MSG_CANCEL:
1989 RTCritSectEnter(&pClient->CritSect);
1990 rc = shClSvcClientMsgCancel(pClient, cParms);
1991 RTCritSectLeave(&pClient->CritSect);
1992 break;
1993
1994 case VBOX_SHCL_GUEST_FN_REPORT_FORMATS:
1995 rc = shClSvcClientReportFormats(pClient, cParms, paParms);
1996 break;
1997
1998 case VBOX_SHCL_GUEST_FN_DATA_READ:
1999 rc = shClSvcClientReadData(pClient, cParms, paParms);
2000 break;
2001
2002 case VBOX_SHCL_GUEST_FN_DATA_WRITE:
2003 rc = shClSvcClientWriteData(pClient, cParms, paParms);
2004 break;
2005
2006 case VBOX_SHCL_GUEST_FN_ERROR:
2007 {
2008 int rcGuest;
2009 rc = shClSvcClientError(cParms,paParms, &rcGuest);
2010 if (RT_SUCCESS(rc))
2011 {
2012 LogRel(("Shared Clipboard: Error from guest side: %Rrc\n", rcGuest));
2013
2014 /* Reset client state and start over. */
2015 shclSvcClientStateReset(&pClient->State);
2016#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
2017 shClSvcClientTransfersReset(pClient);
2018#endif
2019 }
2020 break;
2021 }
2022
2023 default:
2024 {
2025#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
2026 if ( u32Function <= VBOX_SHCL_GUEST_FN_LAST
2027 && (pClient->State.fGuestFeatures0 & VBOX_SHCL_GF_0_CONTEXT_ID) )
2028 {
2029 if (g_fTransferMode & VBOX_SHCL_TRANSFER_MODE_ENABLED)
2030 rc = shClSvcTransferHandler(pClient, callHandle, u32Function, cParms, paParms, tsArrival);
2031 else
2032 {
2033 LogRel2(("Shared Clipboard: File transfers are disabled for this VM\n"));
2034 rc = VERR_ACCESS_DENIED;
2035 }
2036 }
2037 else
2038#endif
2039 {
2040 LogRel2(("Shared Clipboard: Unknown guest function: %u (%#x)\n", u32Function, u32Function));
2041 rc = VERR_NOT_IMPLEMENTED;
2042 }
2043 break;
2044 }
2045 }
2046
2047 LogFlowFunc(("[Client %RU32] rc=%Rrc\n", pClient->State.uClientID, rc));
2048
2049 if (rc != VINF_HGCM_ASYNC_EXECUTE)
2050 g_pHelpers->pfnCallComplete(callHandle, rc);
2051}
2052
2053/**
2054 * Initializes a Shared Clipboard service's client state.
2055 *
2056 * @returns VBox status code.
2057 * @param pClientState Client state to initialize.
2058 * @param uClientID Client ID (HGCM) to use for this client state.
2059 */
2060int shClSvcClientStateInit(PSHCLCLIENTSTATE pClientState, uint32_t uClientID)
2061{
2062 LogFlowFuncEnter();
2063
2064 shclSvcClientStateReset(pClientState);
2065
2066 /* Register the client. */
2067 pClientState->uClientID = uClientID;
2068
2069 return VINF_SUCCESS;
2070}
2071
2072/**
2073 * Destroys a Shared Clipboard service's client state.
2074 *
2075 * @returns VBox status code.
2076 * @param pClientState Client state to destroy.
2077 */
2078int shClSvcClientStateDestroy(PSHCLCLIENTSTATE pClientState)
2079{
2080 RT_NOREF(pClientState);
2081
2082 LogFlowFuncEnter();
2083
2084 return VINF_SUCCESS;
2085}
2086
2087/**
2088 * Resets a Shared Clipboard service's client state.
2089 *
2090 * @param pClientState Client state to reset.
2091 */
2092void shclSvcClientStateReset(PSHCLCLIENTSTATE pClientState)
2093{
2094 LogFlowFuncEnter();
2095
2096 pClientState->fGuestFeatures0 = VBOX_SHCL_GF_NONE;
2097 pClientState->fGuestFeatures1 = VBOX_SHCL_GF_NONE;
2098
2099 pClientState->cbChunkSize = VBOX_SHCL_DEFAULT_CHUNK_SIZE; /** @todo Make this configurable. */
2100 pClientState->enmSource = SHCLSOURCE_INVALID;
2101 pClientState->fFlags = SHCLCLIENTSTATE_FLAGS_NONE;
2102
2103 pClientState->POD.enmDir = SHCLTRANSFERDIR_UNKNOWN;
2104 pClientState->POD.uFormat = VBOX_SHCL_FMT_NONE;
2105 pClientState->POD.cbToReadWriteTotal = 0;
2106 pClientState->POD.cbReadWritten = 0;
2107
2108#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
2109 pClientState->Transfers.enmTransferDir = SHCLTRANSFERDIR_UNKNOWN;
2110#endif
2111
2112
2113}
2114
2115/*
2116 * We differentiate between a function handler for the guest and one for the host.
2117 */
2118static DECLCALLBACK(int) svcHostCall(void *,
2119 uint32_t u32Function,
2120 uint32_t cParms,
2121 VBOXHGCMSVCPARM paParms[])
2122{
2123 int rc = VINF_SUCCESS;
2124
2125 LogFlowFunc(("u32Function=%RU32 (%s), cParms=%RU32, paParms=%p\n",
2126 u32Function, ShClHostFunctionToStr(u32Function), cParms, paParms));
2127
2128 switch (u32Function)
2129 {
2130 case VBOX_SHCL_HOST_FN_SET_MODE:
2131 {
2132 if (cParms != 1)
2133 {
2134 rc = VERR_INVALID_PARAMETER;
2135 }
2136 else
2137 {
2138 uint32_t u32Mode = VBOX_SHCL_MODE_OFF;
2139
2140 rc = HGCMSvcGetU32(&paParms[0], &u32Mode);
2141 if (RT_SUCCESS(rc))
2142 rc = shClSvcModeSet(u32Mode);
2143 }
2144
2145 break;
2146 }
2147
2148#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
2149 case VBOX_SHCL_HOST_FN_SET_TRANSFER_MODE:
2150 {
2151 if (cParms != 1)
2152 {
2153 rc = VERR_INVALID_PARAMETER;
2154 }
2155 else
2156 {
2157 uint32_t fTransferMode;
2158 rc = HGCMSvcGetU32(&paParms[0], &fTransferMode);
2159 if (RT_SUCCESS(rc))
2160 rc = shClSvcTransferModeSet(fTransferMode);
2161 }
2162 break;
2163 }
2164#endif
2165 case VBOX_SHCL_HOST_FN_SET_HEADLESS:
2166 {
2167 if (cParms != 1)
2168 {
2169 rc = VERR_INVALID_PARAMETER;
2170 }
2171 else
2172 {
2173 uint32_t uHeadless;
2174 rc = HGCMSvcGetU32(&paParms[0], &uHeadless);
2175 if (RT_SUCCESS(rc))
2176 {
2177 g_fHeadless = RT_BOOL(uHeadless);
2178 LogRel(("Shared Clipboard: Service running in %s mode\n", g_fHeadless ? "headless" : "normal"));
2179 }
2180 }
2181 break;
2182 }
2183
2184 default:
2185 {
2186#ifdef VBOX_WITH_SHARED_CLIPBOARD_TRANSFERS
2187 rc = shClSvcTransferHostHandler(u32Function, cParms, paParms);
2188#else
2189 rc = VERR_NOT_IMPLEMENTED;
2190#endif
2191 break;
2192 }
2193 }
2194
2195 LogFlowFuncLeaveRC(rc);
2196 return rc;
2197}
2198
2199#ifndef UNIT_TEST
2200/**
2201 * SSM descriptor table for the SHCLCLIENTSTATE structure.
2202 *
2203 * @note Saving the session ID not necessary, as they're not persistent across
2204 * state save/restore.
2205 */
2206static SSMFIELD const s_aShClSSMClientState[] =
2207{
2208 SSMFIELD_ENTRY(SHCLCLIENTSTATE, fGuestFeatures0),
2209 SSMFIELD_ENTRY(SHCLCLIENTSTATE, fGuestFeatures1),
2210 SSMFIELD_ENTRY(SHCLCLIENTSTATE, cbChunkSize),
2211 SSMFIELD_ENTRY(SHCLCLIENTSTATE, enmSource),
2212 SSMFIELD_ENTRY(SHCLCLIENTSTATE, fFlags),
2213 SSMFIELD_ENTRY_TERM()
2214};
2215
2216/**
2217 * VBox 6.1 Beta 1 version of s_aShClSSMClientState (no flags).
2218 */
2219static SSMFIELD const s_aShClSSMClientState61B1[] =
2220{
2221 SSMFIELD_ENTRY(SHCLCLIENTSTATE, fGuestFeatures0),
2222 SSMFIELD_ENTRY(SHCLCLIENTSTATE, fGuestFeatures1),
2223 SSMFIELD_ENTRY(SHCLCLIENTSTATE, cbChunkSize),
2224 SSMFIELD_ENTRY(SHCLCLIENTSTATE, enmSource),
2225 SSMFIELD_ENTRY_TERM()
2226};
2227
2228/**
2229 * SSM descriptor table for the SHCLCLIENTPODSTATE structure.
2230 */
2231static SSMFIELD const s_aShClSSMClientPODState[] =
2232{
2233 SSMFIELD_ENTRY(SHCLCLIENTPODSTATE, enmDir),
2234 SSMFIELD_ENTRY(SHCLCLIENTPODSTATE, uFormat),
2235 SSMFIELD_ENTRY(SHCLCLIENTPODSTATE, cbToReadWriteTotal),
2236 SSMFIELD_ENTRY(SHCLCLIENTPODSTATE, cbReadWritten),
2237 SSMFIELD_ENTRY(SHCLCLIENTPODSTATE, tsLastReadWrittenMs),
2238 SSMFIELD_ENTRY_TERM()
2239};
2240
2241/**
2242 * SSM descriptor table for the SHCLCLIENTURISTATE structure.
2243 */
2244static SSMFIELD const s_aShClSSMClientTransferState[] =
2245{
2246 SSMFIELD_ENTRY(SHCLCLIENTTRANSFERSTATE, enmTransferDir),
2247 SSMFIELD_ENTRY_TERM()
2248};
2249
2250/**
2251 * SSM descriptor table for the header of the SHCLCLIENTMSG structure.
2252 * The actual message parameters will be serialized separately.
2253 */
2254static SSMFIELD const s_aShClSSMClientMsgHdr[] =
2255{
2256 SSMFIELD_ENTRY(SHCLCLIENTMSG, idMsg),
2257 SSMFIELD_ENTRY(SHCLCLIENTMSG, cParms),
2258 SSMFIELD_ENTRY_TERM()
2259};
2260
2261/**
2262 * SSM descriptor table for what used to be the VBOXSHCLMSGCTX structure but is
2263 * now part of SHCLCLIENTMSG.
2264 */
2265static SSMFIELD const s_aShClSSMClientMsgCtx[] =
2266{
2267 SSMFIELD_ENTRY(SHCLCLIENTMSG, idCtx),
2268 SSMFIELD_ENTRY_TERM()
2269};
2270#endif /* !UNIT_TEST */
2271
2272static DECLCALLBACK(int) svcSaveState(void *, uint32_t u32ClientID, void *pvClient, PSSMHANDLE pSSM)
2273{
2274 LogFlowFuncEnter();
2275
2276#ifndef UNIT_TEST
2277 /*
2278 * When the state will be restored, pending requests will be reissued
2279 * by VMMDev. The service therefore must save state as if there were no
2280 * pending request.
2281 * Pending requests, if any, will be completed in svcDisconnect.
2282 */
2283 RT_NOREF(u32ClientID);
2284 LogFunc(("u32ClientID=%RU32\n", u32ClientID));
2285
2286 PSHCLCLIENT pClient = (PSHCLCLIENT)pvClient;
2287 AssertPtr(pClient);
2288
2289 /* Write Shared Clipboard saved state version. */
2290 SSMR3PutU32(pSSM, VBOX_SHCL_SAVED_STATE_VER_CURRENT);
2291
2292 int rc = SSMR3PutStructEx(pSSM, &pClient->State, sizeof(pClient->State), 0 /*fFlags*/, &s_aShClSSMClientState[0], NULL);
2293 AssertRCReturn(rc, rc);
2294
2295 rc = SSMR3PutStructEx(pSSM, &pClient->State.POD, sizeof(pClient->State.POD), 0 /*fFlags*/, &s_aShClSSMClientPODState[0], NULL);
2296 AssertRCReturn(rc, rc);
2297
2298 rc = SSMR3PutStructEx(pSSM, &pClient->State.Transfers, sizeof(pClient->State.Transfers), 0 /*fFlags*/, &s_aShClSSMClientTransferState[0], NULL);
2299 AssertRCReturn(rc, rc);
2300
2301 /* Serialize the client's internal message queue. */
2302 uint32_t cMsgs = 0;
2303 PSHCLCLIENTMSG pMsg;
2304 RTListForEach(&pClient->MsgQueue, pMsg, SHCLCLIENTMSG, ListEntry)
2305 {
2306 cMsgs += 1;
2307 }
2308
2309 rc = SSMR3PutU64(pSSM, cMsgs);
2310 AssertRCReturn(rc, rc);
2311
2312 RTListForEach(&pClient->MsgQueue, pMsg, SHCLCLIENTMSG, ListEntry)
2313 {
2314 SSMR3PutStructEx(pSSM, pMsg, sizeof(SHCLCLIENTMSG), 0 /*fFlags*/, &s_aShClSSMClientMsgHdr[0], NULL);
2315 SSMR3PutStructEx(pSSM, pMsg, sizeof(SHCLCLIENTMSG), 0 /*fFlags*/, &s_aShClSSMClientMsgCtx[0], NULL);
2316
2317 for (uint32_t iParm = 0; iParm < pMsg->cParms; iParm++)
2318 HGCMSvcSSMR3Put(&pMsg->aParms[iParm], pSSM);
2319 }
2320
2321#else /* UNIT_TEST */
2322 RT_NOREF3(u32ClientID, pvClient, pSSM);
2323#endif /* UNIT_TEST */
2324 return VINF_SUCCESS;
2325}
2326
2327#ifndef UNIT_TEST
2328static int svcLoadStateV0(uint32_t u32ClientID, void *pvClient, PSSMHANDLE pSSM, uint32_t uVersion)
2329{
2330 RT_NOREF(u32ClientID, pvClient, pSSM, uVersion);
2331
2332 uint32_t uMarker;
2333 int rc = SSMR3GetU32(pSSM, &uMarker); /* Begin marker. */
2334 AssertRC(rc);
2335 Assert(uMarker == UINT32_C(0x19200102) /* SSMR3STRUCT_BEGIN */);
2336
2337 rc = SSMR3Skip(pSSM, sizeof(uint32_t)); /* Client ID */
2338 AssertRCReturn(rc, rc);
2339
2340 bool fValue;
2341 rc = SSMR3GetBool(pSSM, &fValue); /* fHostMsgQuit */
2342 AssertRCReturn(rc, rc);
2343
2344 rc = SSMR3GetBool(pSSM, &fValue); /* fHostMsgReadData */
2345 AssertRCReturn(rc, rc);
2346
2347 rc = SSMR3GetBool(pSSM, &fValue); /* fHostMsgFormats */
2348 AssertRCReturn(rc, rc);
2349
2350 uint32_t fFormats;
2351 rc = SSMR3GetU32(pSSM, &fFormats); /* u32RequestedFormat */
2352 AssertRCReturn(rc, rc);
2353
2354 rc = SSMR3GetU32(pSSM, &uMarker); /* End marker. */
2355 AssertRCReturn(rc, rc);
2356 Assert(uMarker == UINT32_C(0x19920406) /* SSMR3STRUCT_END */);
2357
2358 return VINF_SUCCESS;
2359}
2360#endif /* UNIT_TEST */
2361
2362static DECLCALLBACK(int) svcLoadState(void *, uint32_t u32ClientID, void *pvClient, PSSMHANDLE pSSM, uint32_t uVersion)
2363{
2364 LogFlowFuncEnter();
2365
2366#ifndef UNIT_TEST
2367
2368 RT_NOREF(u32ClientID, uVersion);
2369
2370 PSHCLCLIENT pClient = (PSHCLCLIENT)pvClient;
2371 AssertPtr(pClient);
2372
2373 /* Restore the client data. */
2374 uint32_t lenOrVer;
2375 int rc = SSMR3GetU32(pSSM, &lenOrVer);
2376 AssertRCReturn(rc, rc);
2377
2378 LogFunc(("u32ClientID=%RU32, lenOrVer=%#RX64\n", u32ClientID, lenOrVer));
2379
2380 if (lenOrVer == VBOX_SHCL_SAVED_STATE_VER_3_1)
2381 return svcLoadStateV0(u32ClientID, pvClient, pSSM, uVersion);
2382
2383 if ( lenOrVer >= VBOX_SHCL_SAVED_STATE_VER_6_1B2
2384 && lenOrVer <= VBOX_SHCL_SAVED_STATE_VER_CURRENT)
2385 {
2386 if (lenOrVer >= VBOX_SHCL_SAVED_STATE_VER_6_1RC1)
2387 {
2388 SSMR3GetStructEx(pSSM, &pClient->State, sizeof(pClient->State), 0 /* fFlags */, &s_aShClSSMClientState[0], NULL);
2389 SSMR3GetStructEx(pSSM, &pClient->State.POD, sizeof(pClient->State.POD), 0 /* fFlags */,
2390 &s_aShClSSMClientPODState[0], NULL);
2391 }
2392 else
2393 SSMR3GetStructEx(pSSM, &pClient->State, sizeof(pClient->State), 0 /* fFlags */, &s_aShClSSMClientState61B1[0], NULL);
2394 rc = SSMR3GetStructEx(pSSM, &pClient->State.Transfers, sizeof(pClient->State.Transfers), 0 /* fFlags */,
2395 &s_aShClSSMClientTransferState[0], NULL);
2396 AssertRCReturn(rc, rc);
2397
2398 /* Load the client's internal message queue. */
2399 uint64_t cMsgs;
2400 rc = SSMR3GetU64(pSSM, &cMsgs);
2401 AssertRCReturn(rc, rc);
2402 AssertLogRelMsgReturn(cMsgs < _16K, ("Too many messages: %u (%x)\n", cMsgs, cMsgs), VERR_SSM_DATA_UNIT_FORMAT_CHANGED);
2403
2404 for (uint64_t i = 0; i < cMsgs; i++)
2405 {
2406 union
2407 {
2408 SHCLCLIENTMSG Msg;
2409 uint8_t abPadding[RT_UOFFSETOF(SHCLCLIENTMSG, aParms) + sizeof(VBOXHGCMSVCPARM) * 2];
2410 } u;
2411
2412 SSMR3GetStructEx(pSSM, &u.Msg, RT_UOFFSETOF(SHCLCLIENTMSG, aParms), 0 /*fFlags*/, &s_aShClSSMClientMsgHdr[0], NULL);
2413 rc = SSMR3GetStructEx(pSSM, &u.Msg, RT_UOFFSETOF(SHCLCLIENTMSG, aParms), 0 /*fFlags*/, &s_aShClSSMClientMsgCtx[0], NULL);
2414 AssertRCReturn(rc, rc);
2415
2416 AssertLogRelMsgReturn(u.Msg.cParms <= VMMDEV_MAX_HGCM_PARMS,
2417 ("Too many HGCM message parameters: %u (%#x)\n", u.Msg.cParms, u.Msg.cParms),
2418 VERR_SSM_DATA_UNIT_FORMAT_CHANGED);
2419
2420 PSHCLCLIENTMSG pMsg = shClSvcMsgAlloc(pClient, u.Msg.idMsg, u.Msg.cParms);
2421 AssertReturn(pMsg, VERR_NO_MEMORY);
2422 pMsg->idCtx = u.Msg.idCtx;
2423
2424 for (uint32_t p = 0; p < pMsg->cParms; p++)
2425 {
2426 rc = HGCMSvcSSMR3Get(&pMsg->aParms[p], pSSM);
2427 AssertRCReturnStmt(rc, shClSvcMsgFree(pClient, pMsg), rc);
2428 }
2429
2430 shClSvcMsgAdd(pClient, pMsg, true /* fAppend */);
2431 }
2432 }
2433 else
2434 {
2435 LogRel(("Shared Clipboard: Unsupported saved state version (%#x)\n", lenOrVer));
2436 return VERR_SSM_DATA_UNIT_FORMAT_CHANGED;
2437 }
2438
2439 /* Actual host data are to be reported to guest (SYNC). */
2440 ShClBackendSync(pClient);
2441
2442#else /* UNIT_TEST */
2443 RT_NOREF(u32ClientID, pvClient, pSSM, uVersion);
2444#endif /* UNIT_TEST */
2445 return VINF_SUCCESS;
2446}
2447
2448static DECLCALLBACK(int) extCallback(uint32_t u32Function, uint32_t u32Format, void *pvData, uint32_t cbData)
2449{
2450 RT_NOREF(pvData, cbData);
2451
2452 LogFlowFunc(("u32Function=%RU32\n", u32Function));
2453
2454 int rc = VINF_SUCCESS;
2455
2456 /* Figure out if the client in charge for the service extension still is connected. */
2457 ClipboardClientMap::const_iterator itClient = g_mapClients.find(g_ExtState.uClientID);
2458 if (itClient != g_mapClients.end())
2459 {
2460 PSHCLCLIENT pClient = itClient->second;
2461 AssertPtr(pClient);
2462
2463 switch (u32Function)
2464 {
2465 /* The service extension announces formats to the guest. */
2466 case VBOX_CLIPBOARD_EXT_FN_FORMAT_ANNOUNCE:
2467 {
2468 LogFlowFunc(("VBOX_CLIPBOARD_EXT_FN_FORMAT_ANNOUNCE: g_ExtState.fReadingData=%RTbool\n", g_ExtState.fReadingData));
2469 if (!g_ExtState.fReadingData)
2470 rc = ShClSvcHostReportFormats(pClient, u32Format);
2471 else
2472 {
2473 g_ExtState.fDelayedAnnouncement = true;
2474 g_ExtState.fDelayedFormats = u32Format;
2475 rc = VINF_SUCCESS;
2476 }
2477 break;
2478 }
2479
2480 /* The service extension wants read data from the guest. */
2481 case VBOX_CLIPBOARD_EXT_FN_DATA_READ:
2482 rc = ShClSvcGuestDataRequest(pClient, u32Format, NULL /* pidEvent */);
2483 break;
2484
2485 default:
2486 /* Just skip other messages. */
2487 break;
2488 }
2489 }
2490 else
2491 rc = VERR_NOT_FOUND;
2492
2493 LogFlowFuncLeaveRC(rc);
2494 return rc;
2495}
2496
2497static DECLCALLBACK(int) svcRegisterExtension(void *, PFNHGCMSVCEXT pfnExtension, void *pvExtension)
2498{
2499 LogFlowFunc(("pfnExtension=%p\n", pfnExtension));
2500
2501 SHCLEXTPARMS parms;
2502 RT_ZERO(parms);
2503
2504 if (pfnExtension)
2505 {
2506 /* Install extension. */
2507 g_ExtState.pfnExtension = pfnExtension;
2508 g_ExtState.pvExtension = pvExtension;
2509
2510 parms.u.pfnCallback = extCallback;
2511
2512 g_ExtState.pfnExtension(g_ExtState.pvExtension, VBOX_CLIPBOARD_EXT_FN_SET_CALLBACK, &parms, sizeof(parms));
2513 }
2514 else
2515 {
2516 if (g_ExtState.pfnExtension)
2517 g_ExtState.pfnExtension(g_ExtState.pvExtension, VBOX_CLIPBOARD_EXT_FN_SET_CALLBACK, &parms, sizeof(parms));
2518
2519 /* Uninstall extension. */
2520 g_ExtState.pfnExtension = NULL;
2521 g_ExtState.pvExtension = NULL;
2522 }
2523
2524 return VINF_SUCCESS;
2525}
2526
2527extern "C" DECLCALLBACK(DECLEXPORT(int)) VBoxHGCMSvcLoad(VBOXHGCMSVCFNTABLE *pTable)
2528{
2529 int rc = VINF_SUCCESS;
2530
2531 LogFlowFunc(("pTable=%p\n", pTable));
2532
2533 if (!VALID_PTR(pTable))
2534 {
2535 rc = VERR_INVALID_PARAMETER;
2536 }
2537 else
2538 {
2539 LogFunc(("pTable->cbSize = %d, ptable->u32Version = 0x%08X\n", pTable->cbSize, pTable->u32Version));
2540
2541 if ( pTable->cbSize != sizeof (VBOXHGCMSVCFNTABLE)
2542 || pTable->u32Version != VBOX_HGCM_SVC_VERSION)
2543 {
2544 rc = VERR_VERSION_MISMATCH;
2545 }
2546 else
2547 {
2548 g_pHelpers = pTable->pHelpers;
2549
2550 pTable->cbClient = sizeof(SHCLCLIENT);
2551
2552 pTable->pfnUnload = svcUnload;
2553 pTable->pfnConnect = svcConnect;
2554 pTable->pfnDisconnect = svcDisconnect;
2555 pTable->pfnCall = svcCall;
2556 pTable->pfnHostCall = svcHostCall;
2557 pTable->pfnSaveState = svcSaveState;
2558 pTable->pfnLoadState = svcLoadState;
2559 pTable->pfnRegisterExtension = svcRegisterExtension;
2560 pTable->pfnNotify = NULL;
2561 pTable->pvService = NULL;
2562
2563 /* Service specific initialization. */
2564 rc = svcInit();
2565 }
2566 }
2567
2568 LogFlowFunc(("Returning %Rrc\n", rc));
2569 return rc;
2570}
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette