VirtualBox

source: vbox/trunk/src/VBox/Main/VirtualBoxImpl.cpp@ 33249

Last change on this file since 33249 was 33239, checked in by vboxsync, 14 years ago

Main: remove VirtualBox::WaitForPropertyChange which has been obsoleted by new events APIs

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 142.0 KB
Line 
1/* $Id: VirtualBoxImpl.cpp 33239 2010-10-19 15:59:39Z vboxsync $ */
2
3/** @file
4 * Implementation of IVirtualBox in VBoxSVC.
5 */
6
7/*
8 * Copyright (C) 2006-2010 Oracle Corporation
9 *
10 * This file is part of VirtualBox Open Source Edition (OSE), as
11 * available from http://www.virtualbox.org. This file is free software;
12 * you can redistribute it and/or modify it under the terms of the GNU
13 * General Public License (GPL) as published by the Free Software
14 * Foundation, in version 2 as it comes in the "COPYING" file of the
15 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
16 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
17 */
18
19#include <iprt/asm.h>
20#include <iprt/buildconfig.h>
21#include <iprt/cpp/utils.h>
22#include <iprt/dir.h>
23#include <iprt/env.h>
24#include <iprt/file.h>
25#include <iprt/path.h>
26#include <iprt/process.h>
27#include <iprt/string.h>
28#include <iprt/stream.h>
29#include <iprt/thread.h>
30#include <iprt/uuid.h>
31#include <iprt/cpp/xml.h>
32
33#include <VBox/com/com.h>
34#include <VBox/com/array.h>
35#include "VBox/com/EventQueue.h"
36
37#include <VBox/err.h>
38#include <VBox/param.h>
39#include <VBox/VBoxHDD.h>
40#include <VBox/settings.h>
41#include <VBox/version.h>
42
43#include <package-generated.h>
44
45#include <algorithm>
46#include <set>
47#include <vector>
48#include <memory> // for auto_ptr
49
50#include <typeinfo>
51
52#include "VirtualBoxImpl.h"
53
54#include "Global.h"
55#include "MachineImpl.h"
56#include "MediumImpl.h"
57#include "SharedFolderImpl.h"
58#include "ProgressImpl.h"
59#include "ProgressProxyImpl.h"
60#include "HostImpl.h"
61#include "USBControllerImpl.h"
62#include "SystemPropertiesImpl.h"
63#include "GuestOSTypeImpl.h"
64#include "DHCPServerRunner.h"
65#include "DHCPServerImpl.h"
66#ifdef VBOX_WITH_RESOURCE_USAGE_API
67#include "PerformanceImpl.h"
68#endif /* VBOX_WITH_RESOURCE_USAGE_API */
69#include "EventImpl.h"
70
71#include "AutoCaller.h"
72#include "Logging.h"
73#include "objectslist.h"
74
75#ifdef RT_OS_WINDOWS
76# include "win/svchlp.h"
77# include "win/VBoxComEvents.h"
78#endif
79
80////////////////////////////////////////////////////////////////////////////////
81//
82// Definitions
83//
84////////////////////////////////////////////////////////////////////////////////
85
86#define VBOX_GLOBAL_SETTINGS_FILE "VirtualBox.xml"
87
88////////////////////////////////////////////////////////////////////////////////
89//
90// Global variables
91//
92////////////////////////////////////////////////////////////////////////////////
93
94// static
95Bstr VirtualBox::sVersion;
96
97// static
98ULONG VirtualBox::sRevision;
99
100// static
101Bstr VirtualBox::sPackageType;
102
103////////////////////////////////////////////////////////////////////////////////
104//
105// VirtualBoxCallbackRegistration
106//
107////////////////////////////////////////////////////////////////////////////////
108
109/**
110 * Registered IVirtualBoxCallback, used by VirtualBox::CallbackList and
111 * VirtualBox::Data::llCallbacks.
112 *
113 * In addition to keeping the interface pointer this also keeps track of the
114 * methods that asked to not be called again. The latter is for reducing
115 * unnecessary IPC.
116 */
117class VirtualBoxCallbackRegistration
118{
119public:
120 /** Callback bit indexes (for bmDisabled). */
121 typedef enum
122 {
123 kOnMachineStateChanged = 0,
124 kOnMachineDataChanged,
125 kOnExtraDataCanChange,
126 kOnExtraDataChanged,
127 kOnMediumRegistered,
128 kOnMachineRegistered,
129 kOnSessionStateChanged,
130 kOnSnapshotTaken,
131 kOnSnapshotDeleted,
132 kOnSnapshotChanged,
133 kOnGuestPropertyChanged
134 } CallbackBit;
135
136 VirtualBoxCallbackRegistration()
137 {
138 /* nothing */
139 }
140
141 ~VirtualBoxCallbackRegistration()
142 {
143 /* nothing */
144 }
145};
146
147////////////////////////////////////////////////////////////////////////////////
148//
149// CallbackEvent class
150//
151////////////////////////////////////////////////////////////////////////////////
152
153/**
154 * Abstract callback event class to asynchronously call VirtualBox callbacks
155 * on a dedicated event thread. Subclasses reimplement #handleCallback()
156 * to call appropriate IVirtualBoxCallback methods depending on the event
157 * to be dispatched.
158 *
159 * @note The VirtualBox instance passed to the constructor is strongly
160 * referenced, so that the VirtualBox singleton won't be released until the
161 * event gets handled by the event thread.
162 */
163class VirtualBox::CallbackEvent : public Event
164{
165public:
166
167 CallbackEvent(VirtualBox *aVirtualBox, VirtualBoxCallbackRegistration::CallbackBit aWhat)
168 : mVirtualBox(aVirtualBox), mWhat(aWhat)
169 {
170 Assert(aVirtualBox);
171 }
172
173 void *handler();
174
175 virtual HRESULT prepareEventDesc(IEventSource* aSource, VBoxEventDesc& aEvDesc) = 0;
176
177private:
178
179 /**
180 * Note that this is a weak ref -- the CallbackEvent handler thread
181 * is bound to the lifetime of the VirtualBox instance, so it's safe.
182 */
183 VirtualBox *mVirtualBox;
184protected:
185 VirtualBoxCallbackRegistration::CallbackBit mWhat;
186};
187
188////////////////////////////////////////////////////////////////////////////////
189//
190// VirtualBox private member data definition
191//
192////////////////////////////////////////////////////////////////////////////////
193
194#if defined(RT_OS_WINDOWS)
195 #define UPDATEREQARG NULL
196 #define UPDATEREQTYPE HANDLE
197#elif defined(RT_OS_OS2)
198 #define UPDATEREQARG NIL_RTSEMEVENT
199 #define UPDATEREQTYPE RTSEMEVENT
200#elif defined(VBOX_WITH_SYS_V_IPC_SESSION_WATCHER)
201 #define UPDATEREQARG
202 #define UPDATEREQTYPE RTSEMEVENT
203#else
204# error "Port me!"
205#endif
206
207typedef ObjectsList<Machine> MachinesOList;
208typedef ObjectsList<Medium> MediaOList;
209typedef ObjectsList<GuestOSType> GuestOSTypesOList;
210typedef ObjectsList<SharedFolder> SharedFoldersOList;
211typedef ObjectsList<DHCPServer> DHCPServersOList;
212
213typedef std::map<Guid, ComPtr<IProgress> > ProgressMap;
214typedef std::map<Guid, ComObjPtr<Medium> > HardDiskMap;
215
216/**
217 * Main VirtualBox data structure.
218 * @note |const| members are persistent during lifetime so can be accessed
219 * without locking.
220 */
221struct VirtualBox::Data
222{
223 Data()
224 : pMainConfigFile(NULL),
225 lockMachines(LOCKCLASS_LISTOFMACHINES),
226 allMachines(lockMachines),
227 lockGuestOSTypes(LOCKCLASS_LISTOFOTHEROBJECTS),
228 allGuestOSTypes(lockGuestOSTypes),
229 lockMedia(LOCKCLASS_LISTOFMEDIA),
230 allHardDisks(lockMedia),
231 allDVDImages(lockMedia),
232 allFloppyImages(lockMedia),
233 lockSharedFolders(LOCKCLASS_LISTOFOTHEROBJECTS),
234 allSharedFolders(lockSharedFolders),
235 lockDHCPServers(LOCKCLASS_LISTOFOTHEROBJECTS),
236 allDHCPServers(lockDHCPServers),
237 mtxProgressOperations(LOCKCLASS_PROGRESSLIST),
238 updateReq(UPDATEREQARG),
239 threadClientWatcher(NIL_RTTHREAD),
240 threadAsyncEvent(NIL_RTTHREAD),
241 pAsyncEventQ(NULL)
242 {
243 unconst(uuidMediaRegistry).create();
244 }
245
246 ~Data()
247 {
248 if (pMainConfigFile)
249 {
250 delete pMainConfigFile;
251 pMainConfigFile = NULL;
252 }
253 };
254
255 // const data members not requiring locking
256 const Utf8Str strHomeDir;
257
258 // VirtualBox main settings file
259 const Utf8Str strSettingsFilePath;
260 settings::MainConfigFile *pMainConfigFile;
261
262 // pseudo machine ID for global media registry (recreated on every startup)
263 const Guid uuidMediaRegistry;
264
265 // const objects not requiring locking
266 const ComObjPtr<Host> pHost;
267 const ComObjPtr<SystemProperties> pSystemProperties;
268#ifdef VBOX_WITH_RESOURCE_USAGE_API
269 const ComObjPtr<PerformanceCollector> pPerformanceCollector;
270#endif /* VBOX_WITH_RESOURCE_USAGE_API */
271
272 // Each of the following lists use a particular lock handle that protects the
273 // list as a whole. As opposed to version 3.1 and earlier, these lists no
274 // longer need the main VirtualBox object lock, but only the respective list
275 // lock. In each case, the locking order is defined that the list must be
276 // requested before object locks of members of the lists (see the order definitions
277 // in AutoLock.h; e.g. LOCKCLASS_LISTOFMACHINES before LOCKCLASS_MACHINEOBJECT).
278 RWLockHandle lockMachines;
279 MachinesOList allMachines;
280
281 RWLockHandle lockGuestOSTypes;
282 GuestOSTypesOList allGuestOSTypes;
283
284 // All the media lists are protected by the following locking handle:
285 RWLockHandle lockMedia;
286 MediaOList allHardDisks, // base images only!
287 allDVDImages,
288 allFloppyImages;
289 // the hard disks map is an additional map sorted by UUID for quick lookup
290 // and contains ALL hard disks (base and differencing); it is protected by
291 // the same lock as the other media lists above
292 HardDiskMap mapHardDisks;
293
294 // list of pending machine renames (also protected by media tree lock;
295 // see VirtualBox::rememberMachineNameChangeForMedia())
296 struct PendingMachineRename
297 {
298 Utf8Str strConfigDirOld;
299 Utf8Str strConfigDirNew;
300 };
301 typedef std::list<PendingMachineRename> PendingMachineRenamesList;
302 PendingMachineRenamesList llPendingMachineRenames;
303
304 RWLockHandle lockSharedFolders;
305 SharedFoldersOList allSharedFolders;
306
307 RWLockHandle lockDHCPServers;
308 DHCPServersOList allDHCPServers;
309
310 RWLockHandle mtxProgressOperations;
311 ProgressMap mapProgressOperations;
312
313 // the following are data for the client watcher thread
314 const UPDATEREQTYPE updateReq;
315 const RTTHREAD threadClientWatcher;
316 typedef std::list<RTPROCESS> ProcessList;
317 ProcessList llProcesses;
318
319 // the following are data for the async event thread
320 const RTTHREAD threadAsyncEvent;
321 EventQueue * const pAsyncEventQ;
322 const ComObjPtr<EventSource> pEventSource;
323};
324
325// constructor / destructor
326/////////////////////////////////////////////////////////////////////////////
327
328VirtualBox::VirtualBox()
329{}
330
331VirtualBox::~VirtualBox()
332{}
333
334HRESULT VirtualBox::FinalConstruct()
335{
336 LogFlowThisFunc(("\n"));
337
338 return init();
339}
340
341void VirtualBox::FinalRelease()
342{
343 LogFlowThisFunc(("\n"));
344
345 uninit();
346}
347
348// public initializer/uninitializer for internal purposes only
349/////////////////////////////////////////////////////////////////////////////
350
351/**
352 * Initializes the VirtualBox object.
353 *
354 * @return COM result code
355 */
356HRESULT VirtualBox::init()
357{
358 /* Enclose the state transition NotReady->InInit->Ready */
359 AutoInitSpan autoInitSpan(this);
360 AssertReturn(autoInitSpan.isOk(), E_FAIL);
361
362 /* Locking this object for writing during init sounds a bit paradoxical,
363 * but in the current locking mess this avoids that some code gets a
364 * read lock and later calls code which wants the same write lock. */
365 AutoWriteLock lock(this COMMA_LOCKVAL_SRC_POS);
366
367 // allocate our instance data
368 m = new Data;
369
370 LogFlow(("===========================================================\n"));
371 LogFlowThisFuncEnter();
372
373 if (sVersion.isEmpty())
374 sVersion = VBOX_VERSION_STRING;
375 sRevision = RTBldCfgRevision();
376 if (sPackageType.isEmpty())
377 sPackageType = VBOX_PACKAGE_STRING;
378 LogFlowThisFunc(("Version: %ls, Package: %ls\n", sVersion.raw(), sPackageType.raw()));
379
380 /* Get the VirtualBox home directory. */
381 {
382 char szHomeDir[RTPATH_MAX];
383 int vrc = com::GetVBoxUserHomeDirectory(szHomeDir, sizeof(szHomeDir));
384 if (RT_FAILURE(vrc))
385 return setError(E_FAIL,
386 tr("Could not create the VirtualBox home directory '%s' (%Rrc)"),
387 szHomeDir, vrc);
388
389 unconst(m->strHomeDir) = szHomeDir;
390 }
391
392 /* compose the VirtualBox.xml file name */
393 unconst(m->strSettingsFilePath) = Utf8StrFmt("%s%c%s",
394 m->strHomeDir.c_str(),
395 RTPATH_DELIMITER,
396 VBOX_GLOBAL_SETTINGS_FILE);
397 HRESULT rc = S_OK;
398 bool fCreate = false;
399 try
400 {
401 // load and parse VirtualBox.xml; this will throw on XML or logic errors
402 try
403 {
404 m->pMainConfigFile = new settings::MainConfigFile(&m->strSettingsFilePath);
405 }
406 catch (xml::EIPRTFailure &e)
407 {
408 // this is thrown by the XML backend if the RTOpen() call fails;
409 // only if the main settings file does not exist, create it,
410 // if there's something more serious, then do fail!
411 if (e.rc() == VERR_FILE_NOT_FOUND)
412 fCreate = true;
413 else
414 throw;
415 }
416
417 if (fCreate)
418 m->pMainConfigFile = new settings::MainConfigFile(NULL);
419
420#ifdef VBOX_WITH_RESOURCE_USAGE_API
421 /* create the performance collector object BEFORE host */
422 unconst(m->pPerformanceCollector).createObject();
423 rc = m->pPerformanceCollector->init();
424 ComAssertComRCThrowRC(rc);
425#endif /* VBOX_WITH_RESOURCE_USAGE_API */
426
427 /* create the host object early, machines will need it */
428 unconst(m->pHost).createObject();
429 rc = m->pHost->init(this);
430 ComAssertComRCThrowRC(rc);
431
432 rc = m->pHost->loadSettings(m->pMainConfigFile->host);
433 if (FAILED(rc)) throw rc;
434
435 /* create the system properties object, someone may need it too */
436 unconst(m->pSystemProperties).createObject();
437 rc = m->pSystemProperties->init(this);
438 ComAssertComRCThrowRC(rc);
439
440 rc = m->pSystemProperties->loadSettings(m->pMainConfigFile->systemProperties);
441 if (FAILED(rc)) throw rc;
442
443 /* guest OS type objects, needed by machines */
444 for (size_t i = 0; i < RT_ELEMENTS(Global::sOSTypes); ++i)
445 {
446 ComObjPtr<GuestOSType> guestOSTypeObj;
447 rc = guestOSTypeObj.createObject();
448 if (SUCCEEDED(rc))
449 {
450 rc = guestOSTypeObj->init(Global::sOSTypes[i]);
451 if (SUCCEEDED(rc))
452 m->allGuestOSTypes.addChild(guestOSTypeObj);
453 }
454 ComAssertComRCThrowRC(rc);
455 }
456
457 /* all registered media, needed by machines */
458 if (FAILED(rc = initMedia(m->uuidMediaRegistry,
459 m->pMainConfigFile->mediaRegistry,
460 Utf8Str::Empty))) // const Utf8Str &machineFolder
461 throw rc;
462
463 /* machines */
464 if (FAILED(rc = initMachines()))
465 throw rc;
466
467
468#ifdef DEBUG
469 LogFlowThisFunc(("Dumping media backreferences\n"));
470 dumpAllBackRefs();
471#endif
472
473 /* net services */
474 for (settings::DHCPServersList::const_iterator it = m->pMainConfigFile->llDhcpServers.begin();
475 it != m->pMainConfigFile->llDhcpServers.end();
476 ++it)
477 {
478 const settings::DHCPServer &data = *it;
479
480 ComObjPtr<DHCPServer> pDhcpServer;
481 if (SUCCEEDED(rc = pDhcpServer.createObject()))
482 rc = pDhcpServer->init(this, data);
483 if (FAILED(rc)) throw rc;
484
485 rc = registerDHCPServer(pDhcpServer, false /* aSaveRegistry */);
486 if (FAILED(rc)) throw rc;
487 }
488
489 /* events */
490 if (SUCCEEDED(rc = unconst(m->pEventSource).createObject()))
491 rc = m->pEventSource->init(static_cast<IVirtualBox*>(this));
492 if (FAILED(rc)) throw rc;
493 }
494 catch (HRESULT err)
495 {
496 /* we assume that error info is set by the thrower */
497 rc = err;
498 }
499 catch (...)
500 {
501 rc = VirtualBox::handleUnexpectedExceptions(RT_SRC_POS);
502 }
503
504 if (SUCCEEDED(rc))
505 {
506 /* start the client watcher thread */
507#if defined(RT_OS_WINDOWS)
508 unconst(m->updateReq) = ::CreateEvent(NULL, FALSE, FALSE, NULL);
509#elif defined(RT_OS_OS2)
510 RTSemEventCreate(&unconst(m->updateReq));
511#elif defined(VBOX_WITH_SYS_V_IPC_SESSION_WATCHER)
512 RTSemEventCreate(&unconst(m->updateReq));
513#else
514# error "Port me!"
515#endif
516 int vrc = RTThreadCreate(&unconst(m->threadClientWatcher),
517 ClientWatcher,
518 (void *)this,
519 0,
520 RTTHREADTYPE_MAIN_WORKER,
521 RTTHREADFLAGS_WAITABLE,
522 "Watcher");
523 ComAssertRC(vrc);
524 if (RT_FAILURE(vrc))
525 rc = E_FAIL;
526 }
527
528 if (SUCCEEDED(rc))
529 {
530 try
531 {
532 /* start the async event handler thread */
533 int vrc = RTThreadCreate(&unconst(m->threadAsyncEvent),
534 AsyncEventHandler,
535 &unconst(m->pAsyncEventQ),
536 0,
537 RTTHREADTYPE_MAIN_WORKER,
538 RTTHREADFLAGS_WAITABLE,
539 "EventHandler");
540 ComAssertRCThrow(vrc, E_FAIL);
541
542 /* wait until the thread sets m->pAsyncEventQ */
543 RTThreadUserWait(m->threadAsyncEvent, RT_INDEFINITE_WAIT);
544 ComAssertThrow(m->pAsyncEventQ, E_FAIL);
545 }
546 catch (HRESULT aRC)
547 {
548 rc = aRC;
549 }
550 }
551
552 /* Confirm a successful initialization when it's the case */
553 if (SUCCEEDED(rc))
554 autoInitSpan.setSucceeded();
555
556 LogFlowThisFunc(("rc=%08X\n", rc));
557 LogFlowThisFuncLeave();
558 LogFlow(("===========================================================\n"));
559 return rc;
560}
561
562HRESULT VirtualBox::initMachines()
563{
564 for (settings::MachinesRegistry::const_iterator it = m->pMainConfigFile->llMachines.begin();
565 it != m->pMainConfigFile->llMachines.end();
566 ++it)
567 {
568 HRESULT rc = S_OK;
569 const settings::MachineRegistryEntry &xmlMachine = *it;
570 Guid uuid = xmlMachine.uuid;
571
572 ComObjPtr<Machine> pMachine;
573 if (SUCCEEDED(rc = pMachine.createObject()))
574 {
575 rc = pMachine->init(this,
576 xmlMachine.strSettingsFile,
577 &uuid);
578 if (SUCCEEDED(rc))
579 rc = registerMachine(pMachine);
580 if (FAILED(rc))
581 return rc;
582 }
583 }
584
585 return S_OK;
586}
587
588/**
589 * Loads a media registry from XML and adds the media contained therein to
590 * the global lists of known media.
591 *
592 * This now (4.0) gets called from two locations:
593 *
594 * -- VirtualBox::init(), to load the global media registry from VirtualBox.xml;
595 *
596 * -- Machine::loadMachineDataFromSettings(), to load the per-machine registry
597 * from machine XML, for machines created with VirtualBox 4.0 or later.
598 *
599 * In both cases, the media found are added to the global lists so the
600 * global arrays of media (including the GUI's virtual media manager)
601 * continue to work as before.
602 *
603 * @param uuidMachineRegistry The UUID of the media registry. This is either the
604 * transient UUID created at VirtualBox startup for the global registry or
605 * a machine ID.
606 * @param mediaRegistry The XML settings structure to load, either from VirtualBox.xml
607 * or a machine XML.
608 * @return
609 */
610HRESULT VirtualBox::initMedia(const Guid &uuidRegistry,
611 const settings::MediaRegistry mediaRegistry,
612 const Utf8Str &strMachineFolder)
613{
614 LogFlow(("VirtualBox::initMedia ENTERING, uuidRegistry=%s\n", uuidRegistry.toString().c_str()));
615
616 AutoWriteLock treeLock(getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
617
618 HRESULT rc = S_OK;
619 settings::MediaList::const_iterator it;
620 for (it = mediaRegistry.llHardDisks.begin();
621 it != mediaRegistry.llHardDisks.end();
622 ++it)
623 {
624 const settings::Medium &xmlHD = *it;
625
626 ComObjPtr<Medium> pHardDisk;
627 if (SUCCEEDED(rc = pHardDisk.createObject()))
628 rc = pHardDisk->init(this,
629 NULL, // parent
630 DeviceType_HardDisk,
631 uuidRegistry,
632 xmlHD, // XML data; this recurses to processes the children
633 strMachineFolder);
634 if (FAILED(rc)) return rc;
635
636 rc = registerHardDisk(pHardDisk,
637 NULL /*pfNeedsGlobalSaveSettings*/ );
638 if (FAILED(rc)) return rc;
639 }
640
641 for (it = mediaRegistry.llDvdImages.begin();
642 it != mediaRegistry.llDvdImages.end();
643 ++it)
644 {
645 const settings::Medium &xmlDvd = *it;
646
647 ComObjPtr<Medium> pImage;
648 if (SUCCEEDED(pImage.createObject()))
649 rc = pImage->init(this,
650 NULL,
651 DeviceType_DVD,
652 uuidRegistry,
653 xmlDvd,
654 strMachineFolder);
655 if (FAILED(rc)) return rc;
656
657 rc = registerImage(pImage,
658 DeviceType_DVD,
659 NULL /*pfNeedsGlobalSaveSettings*/ );
660 if (FAILED(rc)) return rc;
661 }
662
663 for (it = mediaRegistry.llFloppyImages.begin();
664 it != mediaRegistry.llFloppyImages.end();
665 ++it)
666 {
667 const settings::Medium &xmlFloppy = *it;
668
669 ComObjPtr<Medium> pImage;
670 if (SUCCEEDED(pImage.createObject()))
671 rc = pImage->init(this,
672 NULL,
673 DeviceType_Floppy,
674 uuidRegistry,
675 xmlFloppy,
676 strMachineFolder);
677 if (FAILED(rc)) return rc;
678
679 rc = registerImage(pImage,
680 DeviceType_Floppy,
681 NULL /*pfNeedsGlobalSaveSettings*/ );
682 if (FAILED(rc)) return rc;
683 }
684
685 LogFlow(("VirtualBox::initMedia LEAVING\n"));
686
687 return S_OK;
688}
689
690void VirtualBox::uninit()
691{
692 /* Enclose the state transition Ready->InUninit->NotReady */
693 AutoUninitSpan autoUninitSpan(this);
694 if (autoUninitSpan.uninitDone())
695 return;
696
697 LogFlow(("===========================================================\n"));
698 LogFlowThisFuncEnter();
699 LogFlowThisFunc(("initFailed()=%d\n", autoUninitSpan.initFailed()));
700
701 /* tell all our child objects we've been uninitialized */
702
703 LogFlowThisFunc(("Uninitializing machines (%d)...\n", m->allMachines.size()));
704 if (m->pHost)
705 {
706 /* It is necessary to hold the VirtualBox and Host locks here because
707 we may have to uninitialize SessionMachines. */
708 AutoMultiWriteLock2 multilock(this, m->pHost COMMA_LOCKVAL_SRC_POS);
709 m->allMachines.uninitAll();
710 }
711 else
712 m->allMachines.uninitAll();
713 m->allFloppyImages.uninitAll();
714 m->allDVDImages.uninitAll();
715 m->allHardDisks.uninitAll();
716 m->allDHCPServers.uninitAll();
717
718 m->mapProgressOperations.clear();
719
720 m->allGuestOSTypes.uninitAll();
721
722 /* Note that we release singleton children after we've all other children.
723 * In some cases this is important because these other children may use
724 * some resources of the singletons which would prevent them from
725 * uninitializing (as for example, mSystemProperties which owns
726 * MediumFormat objects which Medium objects refer to) */
727 if (m->pSystemProperties)
728 {
729 m->pSystemProperties->uninit();
730 unconst(m->pSystemProperties).setNull();
731 }
732
733 if (m->pHost)
734 {
735 m->pHost->uninit();
736 unconst(m->pHost).setNull();
737 }
738
739#ifdef VBOX_WITH_RESOURCE_USAGE_API
740 if (m->pPerformanceCollector)
741 {
742 m->pPerformanceCollector->uninit();
743 unconst(m->pPerformanceCollector).setNull();
744 }
745#endif /* VBOX_WITH_RESOURCE_USAGE_API */
746
747 LogFlowThisFunc(("Terminating the async event handler...\n"));
748 if (m->threadAsyncEvent != NIL_RTTHREAD)
749 {
750 /* signal to exit the event loop */
751 if (RT_SUCCESS(m->pAsyncEventQ->interruptEventQueueProcessing()))
752 {
753 /*
754 * Wait for thread termination (only after we've successfully
755 * interrupted the event queue processing!)
756 */
757 int vrc = RTThreadWait(m->threadAsyncEvent, 60000, NULL);
758 if (RT_FAILURE(vrc))
759 LogWarningFunc(("RTThreadWait(%RTthrd) -> %Rrc\n",
760 m->threadAsyncEvent, vrc));
761 }
762 else
763 {
764 AssertMsgFailed(("interruptEventQueueProcessing() failed\n"));
765 RTThreadWait(m->threadAsyncEvent, 0, NULL);
766 }
767
768 unconst(m->threadAsyncEvent) = NIL_RTTHREAD;
769 unconst(m->pAsyncEventQ) = NULL;
770 }
771
772 LogFlowThisFunc(("Releasing event source...\n"));
773 if (m->pEventSource)
774 {
775 // we don't perform uninit() as it's possible that some pending event refers to this source
776 unconst(m->pEventSource).setNull();
777 }
778
779 LogFlowThisFunc(("Terminating the client watcher...\n"));
780 if (m->threadClientWatcher != NIL_RTTHREAD)
781 {
782 /* signal the client watcher thread */
783 updateClientWatcher();
784 /* wait for the termination */
785 RTThreadWait(m->threadClientWatcher, RT_INDEFINITE_WAIT, NULL);
786 unconst(m->threadClientWatcher) = NIL_RTTHREAD;
787 }
788 m->llProcesses.clear();
789#if defined(RT_OS_WINDOWS)
790 if (m->updateReq != NULL)
791 {
792 ::CloseHandle(m->updateReq);
793 unconst(m->updateReq) = NULL;
794 }
795#elif defined(RT_OS_OS2)
796 if (m->updateReq != NIL_RTSEMEVENT)
797 {
798 RTSemEventDestroy(m->updateReq);
799 unconst(m->updateReq) = NIL_RTSEMEVENT;
800 }
801#elif defined(VBOX_WITH_SYS_V_IPC_SESSION_WATCHER)
802 if (m->updateReq != NIL_RTSEMEVENT)
803 {
804 RTSemEventDestroy(m->updateReq);
805 unconst(m->updateReq) = NIL_RTSEMEVENT;
806 }
807#else
808# error "Port me!"
809#endif
810
811 // clean up our instance data
812 delete m;
813
814 /* Unload hard disk plugin backends. */
815 VDShutdown();
816
817 LogFlowThisFuncLeave();
818 LogFlow(("===========================================================\n"));
819}
820
821// IVirtualBox properties
822/////////////////////////////////////////////////////////////////////////////
823
824STDMETHODIMP VirtualBox::COMGETTER(Version)(BSTR *aVersion)
825{
826 CheckComArgNotNull(aVersion);
827
828 AutoCaller autoCaller(this);
829 if (FAILED(autoCaller.rc())) return autoCaller.rc();
830
831 sVersion.cloneTo(aVersion);
832 return S_OK;
833}
834
835STDMETHODIMP VirtualBox::COMGETTER(Revision)(ULONG *aRevision)
836{
837 CheckComArgNotNull(aRevision);
838
839 AutoCaller autoCaller(this);
840 if (FAILED(autoCaller.rc())) return autoCaller.rc();
841
842 *aRevision = sRevision;
843 return S_OK;
844}
845
846STDMETHODIMP VirtualBox::COMGETTER(PackageType)(BSTR *aPackageType)
847{
848 CheckComArgNotNull(aPackageType);
849
850 AutoCaller autoCaller(this);
851 if (FAILED(autoCaller.rc())) return autoCaller.rc();
852
853 sPackageType.cloneTo(aPackageType);
854 return S_OK;
855}
856
857STDMETHODIMP VirtualBox::COMGETTER(HomeFolder)(BSTR *aHomeFolder)
858{
859 CheckComArgNotNull(aHomeFolder);
860
861 AutoCaller autoCaller(this);
862 if (FAILED(autoCaller.rc())) return autoCaller.rc();
863
864 /* mHomeDir is const and doesn't need a lock */
865 m->strHomeDir.cloneTo(aHomeFolder);
866 return S_OK;
867}
868
869STDMETHODIMP VirtualBox::COMGETTER(SettingsFilePath)(BSTR *aSettingsFilePath)
870{
871 CheckComArgNotNull(aSettingsFilePath);
872
873 AutoCaller autoCaller(this);
874 if (FAILED(autoCaller.rc())) return autoCaller.rc();
875
876 /* mCfgFile.mName is const and doesn't need a lock */
877 m->strSettingsFilePath.cloneTo(aSettingsFilePath);
878 return S_OK;
879}
880
881STDMETHODIMP VirtualBox::COMGETTER(Host)(IHost **aHost)
882{
883 CheckComArgOutSafeArrayPointerValid(aHost);
884
885 AutoCaller autoCaller(this);
886 if (FAILED(autoCaller.rc())) return autoCaller.rc();
887
888 /* mHost is const, no need to lock */
889 m->pHost.queryInterfaceTo(aHost);
890 return S_OK;
891}
892
893STDMETHODIMP
894VirtualBox::COMGETTER(SystemProperties)(ISystemProperties **aSystemProperties)
895{
896 CheckComArgOutSafeArrayPointerValid(aSystemProperties);
897
898 AutoCaller autoCaller(this);
899 if (FAILED(autoCaller.rc())) return autoCaller.rc();
900
901 /* mSystemProperties is const, no need to lock */
902 m->pSystemProperties.queryInterfaceTo(aSystemProperties);
903 return S_OK;
904}
905
906STDMETHODIMP
907VirtualBox::COMGETTER(Machines)(ComSafeArrayOut(IMachine *, aMachines))
908{
909 if (ComSafeArrayOutIsNull(aMachines))
910 return E_POINTER;
911
912 AutoCaller autoCaller(this);
913 if (FAILED(autoCaller.rc())) return autoCaller.rc();
914
915 AutoReadLock al(m->allMachines.getLockHandle() COMMA_LOCKVAL_SRC_POS);
916 SafeIfaceArray<IMachine> machines(m->allMachines.getList());
917 machines.detachTo(ComSafeArrayOutArg(aMachines));
918
919 return S_OK;
920}
921
922STDMETHODIMP VirtualBox::COMGETTER(HardDisks)(ComSafeArrayOut(IMedium *, aHardDisks))
923{
924 if (ComSafeArrayOutIsNull(aHardDisks))
925 return E_POINTER;
926
927 AutoCaller autoCaller(this);
928 if (FAILED(autoCaller.rc())) return autoCaller.rc();
929
930 AutoReadLock al(m->allHardDisks.getLockHandle() COMMA_LOCKVAL_SRC_POS);
931 SafeIfaceArray<IMedium> hardDisks(m->allHardDisks.getList());
932 hardDisks.detachTo(ComSafeArrayOutArg(aHardDisks));
933
934 return S_OK;
935}
936
937STDMETHODIMP VirtualBox::COMGETTER(DVDImages)(ComSafeArrayOut(IMedium *, aDVDImages))
938{
939 if (ComSafeArrayOutIsNull(aDVDImages))
940 return E_POINTER;
941
942 AutoCaller autoCaller(this);
943 if (FAILED(autoCaller.rc())) return autoCaller.rc();
944
945 AutoReadLock al(m->allDVDImages.getLockHandle() COMMA_LOCKVAL_SRC_POS);
946 SafeIfaceArray<IMedium> images(m->allDVDImages.getList());
947 images.detachTo(ComSafeArrayOutArg(aDVDImages));
948
949 return S_OK;
950}
951
952STDMETHODIMP VirtualBox::COMGETTER(FloppyImages)(ComSafeArrayOut(IMedium *, aFloppyImages))
953{
954 if (ComSafeArrayOutIsNull(aFloppyImages))
955 return E_POINTER;
956
957 AutoCaller autoCaller(this);
958 if (FAILED(autoCaller.rc())) return autoCaller.rc();
959
960 AutoReadLock al(m->allFloppyImages.getLockHandle() COMMA_LOCKVAL_SRC_POS);
961 SafeIfaceArray<IMedium> images(m->allFloppyImages.getList());
962 images.detachTo(ComSafeArrayOutArg(aFloppyImages));
963
964 return S_OK;
965}
966
967STDMETHODIMP VirtualBox::COMGETTER(ProgressOperations)(ComSafeArrayOut(IProgress *, aOperations))
968{
969 CheckComArgOutSafeArrayPointerValid(aOperations);
970
971 AutoCaller autoCaller(this);
972 if (FAILED(autoCaller.rc())) return autoCaller.rc();
973
974 /* protect mProgressOperations */
975 AutoReadLock safeLock(m->mtxProgressOperations COMMA_LOCKVAL_SRC_POS);
976 SafeIfaceArray<IProgress> progress(m->mapProgressOperations);
977 progress.detachTo(ComSafeArrayOutArg(aOperations));
978
979 return S_OK;
980}
981
982STDMETHODIMP VirtualBox::COMGETTER(GuestOSTypes)(ComSafeArrayOut(IGuestOSType *, aGuestOSTypes))
983{
984 CheckComArgOutSafeArrayPointerValid(aGuestOSTypes);
985
986 AutoCaller autoCaller(this);
987 if (FAILED(autoCaller.rc())) return autoCaller.rc();
988
989 AutoReadLock al(m->allGuestOSTypes.getLockHandle() COMMA_LOCKVAL_SRC_POS);
990 SafeIfaceArray<IGuestOSType> ostypes(m->allGuestOSTypes.getList());
991 ostypes.detachTo(ComSafeArrayOutArg(aGuestOSTypes));
992
993 return S_OK;
994}
995
996STDMETHODIMP VirtualBox::COMGETTER(SharedFolders)(ComSafeArrayOut(ISharedFolder *, aSharedFolders))
997{
998#ifndef RT_OS_WINDOWS
999 NOREF(aSharedFoldersSize);
1000#endif /* RT_OS_WINDOWS */
1001
1002 CheckComArgOutSafeArrayPointerValid(aSharedFolders);
1003
1004 AutoCaller autoCaller(this);
1005 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1006
1007 return setError(E_NOTIMPL, "Not yet implemented");
1008}
1009
1010STDMETHODIMP
1011VirtualBox::COMGETTER(PerformanceCollector)(IPerformanceCollector **aPerformanceCollector)
1012{
1013#ifdef VBOX_WITH_RESOURCE_USAGE_API
1014 CheckComArgOutSafeArrayPointerValid(aPerformanceCollector);
1015
1016 AutoCaller autoCaller(this);
1017 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1018
1019 /* mPerformanceCollector is const, no need to lock */
1020 m->pPerformanceCollector.queryInterfaceTo(aPerformanceCollector);
1021
1022 return S_OK;
1023#else /* !VBOX_WITH_RESOURCE_USAGE_API */
1024 ReturnComNotImplemented();
1025#endif /* !VBOX_WITH_RESOURCE_USAGE_API */
1026}
1027
1028STDMETHODIMP
1029VirtualBox::COMGETTER(DHCPServers)(ComSafeArrayOut(IDHCPServer *, aDHCPServers))
1030{
1031 if (ComSafeArrayOutIsNull(aDHCPServers))
1032 return E_POINTER;
1033
1034 AutoCaller autoCaller(this);
1035 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1036
1037 AutoReadLock al(m->allDHCPServers.getLockHandle() COMMA_LOCKVAL_SRC_POS);
1038 SafeIfaceArray<IDHCPServer> svrs(m->allDHCPServers.getList());
1039 svrs.detachTo(ComSafeArrayOutArg(aDHCPServers));
1040
1041 return S_OK;
1042}
1043
1044STDMETHODIMP
1045VirtualBox::COMGETTER(EventSource)(IEventSource ** aEventSource)
1046{
1047 CheckComArgOutPointerValid(aEventSource);
1048
1049 AutoCaller autoCaller(this);
1050 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1051
1052 /* event source is const, no need to lock */
1053 m->pEventSource.queryInterfaceTo(aEventSource);
1054
1055 return S_OK;
1056}
1057
1058STDMETHODIMP
1059VirtualBox::CheckFirmwarePresent(FirmwareType_T aFirmwareType,
1060 IN_BSTR aVersion,
1061 BSTR *aUrl,
1062 BSTR *aFile,
1063 BOOL *aResult)
1064{
1065 CheckComArgNotNull(aResult);
1066
1067 AutoCaller autoCaller(this);
1068 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1069
1070 const char * url = NULL;
1071
1072 NOREF(aVersion);
1073
1074 static const struct {
1075 FirmwareType_T type;
1076 const char* fileName;
1077 const char* url;
1078 } firmwareDesc[] = {
1079 {
1080 /* compiled-in firmware */
1081 FirmwareType_BIOS, NULL, NULL
1082 },
1083 {
1084 FirmwareType_EFI32, "VBoxEFI32.fd", "http://virtualbox.org/firmware/VBoxEFI32.fd"
1085 },
1086 {
1087 FirmwareType_EFI64, "VBoxEFI64.fd", "http://virtualbox.org/firmware/VBoxEFI64.fd"
1088 },
1089 {
1090 FirmwareType_EFIDUAL, "VBoxEFIDual.fd", "http://virtualbox.org/firmware/VBoxEFIDual.fd"
1091 }
1092 };
1093
1094 for (size_t i = 0; i < sizeof(firmwareDesc) / sizeof(firmwareDesc[0]); i++)
1095 {
1096 if (aFirmwareType != firmwareDesc[i].type)
1097 continue;
1098
1099 /* compiled-in firmware */
1100 if (firmwareDesc[i].fileName == NULL)
1101 {
1102 *aResult = TRUE;
1103 break;
1104 }
1105
1106 Utf8Str shortName, fullName;
1107 int rc;
1108
1109 shortName = Utf8StrFmt("Firmware%c%s",
1110 RTPATH_DELIMITER,
1111 firmwareDesc[i].fileName);
1112 rc = calculateFullPath(shortName, fullName); AssertRCReturn(rc, rc);
1113 if (RTFileExists(fullName.c_str()))
1114 {
1115 *aResult = TRUE;
1116 if (aFile)
1117 Utf8Str(fullName).cloneTo(aFile);
1118 break;
1119 }
1120
1121 char pszVBoxPath[RTPATH_MAX];
1122 rc = RTPathExecDir(pszVBoxPath, RTPATH_MAX); AssertRCReturn(rc, rc);
1123 fullName = Utf8StrFmt("%s%c%s",
1124 pszVBoxPath,
1125 RTPATH_DELIMITER,
1126 firmwareDesc[i].fileName);
1127 if (RTFileExists(fullName.c_str()))
1128 {
1129 *aResult = TRUE;
1130 if (aFile)
1131 Utf8Str(fullName).cloneTo(aFile);
1132 break;
1133 }
1134
1135
1136 url = firmwareDesc[i].url;
1137 /** @todo: account for version in the URL */
1138 if (aUrl != NULL)
1139 Utf8Str(firmwareDesc[i].url).cloneTo(aUrl);
1140 *aResult = FALSE;
1141
1142 /* Assume single record per firmware type */
1143 break;
1144 }
1145
1146 return S_OK;
1147}
1148// IVirtualBox methods
1149/////////////////////////////////////////////////////////////////////////////
1150
1151STDMETHODIMP VirtualBox::ComposeMachineFilename(IN_BSTR aName,
1152 IN_BSTR aBaseFolder,
1153 BSTR *aFilename)
1154{
1155 LogFlowThisFuncEnter();
1156 LogFlowThisFunc(("aName=\"%ls\",aBaseFolder=\"%ls\"\n", aName, aBaseFolder));
1157
1158 CheckComArgStrNotEmptyOrNull(aName);
1159 CheckComArgOutPointerValid(aFilename);
1160
1161 AutoCaller autoCaller(this);
1162 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1163
1164 /* Compose the settings file name using the following scheme:
1165 *
1166 * <base_folder>/<machine_name>/<machine_name>.xml
1167 *
1168 * If a non-null and non-empty base folder is specified, the default
1169 * machine folder will be used as a base folder.
1170 */
1171 Utf8Str strBase = aBaseFolder;
1172 if (strBase.isEmpty())
1173 /* we use the non-full folder value below to keep the path relative */
1174 getDefaultMachineFolder(strBase);
1175
1176 Bstr bstrSettingsFile = BstrFmt("%s%c%ls%c%ls.vbox",
1177 strBase.c_str(),
1178 RTPATH_DELIMITER,
1179 aName,
1180 RTPATH_DELIMITER,
1181 aName);
1182
1183 bstrSettingsFile.detachTo(aFilename);
1184
1185 return S_OK;
1186}
1187
1188/** @note Locks mSystemProperties object for reading. */
1189STDMETHODIMP VirtualBox::CreateMachine(IN_BSTR aName,
1190 IN_BSTR aOsTypeId,
1191 IN_BSTR aBaseFolder,
1192 IN_BSTR aId,
1193 BOOL aOverride,
1194 IMachine **aMachine)
1195{
1196 LogFlowThisFuncEnter();
1197 LogFlowThisFunc(("aName=\"%ls\",aOsTypeId =\"%ls\",aBaseFolder=\"%ls\"\n", aName, aOsTypeId, aBaseFolder));
1198
1199 CheckComArgStrNotEmptyOrNull(aName);
1200 /** @todo tighten checks on aId? */
1201 CheckComArgOutPointerValid(aMachine);
1202
1203 AutoCaller autoCaller(this);
1204 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1205
1206 Bstr bstrSettingsFilename;
1207 HRESULT rc = ComposeMachineFilename(aName, aBaseFolder, bstrSettingsFilename.asOutParam());
1208 if (FAILED(rc)) return rc;
1209
1210 /* create a new object */
1211 ComObjPtr<Machine> machine;
1212 rc = machine.createObject();
1213 if (FAILED(rc)) return rc;
1214
1215 /* Create UUID if an empty one was specified. */
1216 Guid id(aId);
1217 if (id.isEmpty())
1218 id.create();
1219
1220 GuestOSType *osType = NULL;
1221 rc = findGuestOSType(Bstr(aOsTypeId), osType);
1222 if (FAILED(rc)) return rc;
1223
1224 /* initialize the machine object */
1225 rc = machine->init(this,
1226 Utf8Str(bstrSettingsFilename),
1227 Utf8Str(aName),
1228 id,
1229 osType,
1230 aOverride,
1231 TRUE /* aNameSync */);
1232 if (SUCCEEDED(rc))
1233 {
1234 /* set the return value */
1235 rc = machine.queryInterfaceTo(aMachine);
1236 AssertComRC(rc);
1237 }
1238
1239 LogFlowThisFuncLeave();
1240
1241 return rc;
1242}
1243
1244STDMETHODIMP VirtualBox::OpenMachine(IN_BSTR aSettingsFile,
1245 IMachine **aMachine)
1246{
1247 CheckComArgStrNotEmptyOrNull(aSettingsFile);
1248 CheckComArgOutSafeArrayPointerValid(aMachine);
1249
1250 AutoCaller autoCaller(this);
1251 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1252
1253 HRESULT rc = E_FAIL;
1254
1255 /* create a new object */
1256 ComObjPtr<Machine> machine;
1257 rc = machine.createObject();
1258 if (SUCCEEDED(rc))
1259 {
1260 /* initialize the machine object */
1261 rc = machine->init(this,
1262 aSettingsFile,
1263 NULL); /* const Guid *aId */
1264 if (SUCCEEDED(rc))
1265 {
1266 /* set the return value */
1267 rc = machine.queryInterfaceTo(aMachine);
1268 ComAssertComRC(rc);
1269 }
1270 }
1271
1272 return rc;
1273}
1274
1275/** @note Locks objects! */
1276STDMETHODIMP VirtualBox::RegisterMachine(IMachine *aMachine)
1277{
1278 CheckComArgNotNull(aMachine);
1279
1280 AutoCaller autoCaller(this);
1281 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1282
1283 HRESULT rc;
1284
1285 Bstr name;
1286 rc = aMachine->COMGETTER(Name)(name.asOutParam());
1287 if (FAILED(rc)) return rc;
1288
1289 /* We can safely cast child to Machine * here because only Machine
1290 * implementations of IMachine can be among our children. */
1291 Machine *pMachine = static_cast<Machine*>(aMachine);
1292
1293 AutoCaller machCaller(pMachine);
1294 ComAssertComRCRetRC(machCaller.rc());
1295
1296 rc = registerMachine(pMachine);
1297 /* fire an event */
1298 if (SUCCEEDED(rc))
1299 onMachineRegistered(pMachine->getId(), TRUE);
1300
1301 return rc;
1302}
1303
1304/** @note Locks objects! */
1305STDMETHODIMP VirtualBox::GetMachine(IN_BSTR aId, IMachine **aMachine)
1306{
1307 CheckComArgOutSafeArrayPointerValid(aMachine);
1308
1309 AutoCaller autoCaller(this);
1310 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1311
1312 ComObjPtr<Machine> machine;
1313 HRESULT rc = findMachine(Guid(aId),
1314 true /* fPermitInaccessible */,
1315 true /* setError */,
1316 &machine);
1317
1318 /* the below will set *aMachine to NULL if machine is null */
1319 machine.queryInterfaceTo(aMachine);
1320
1321 return rc;
1322}
1323
1324/** @note Locks this object for reading, then some machine objects for reading. */
1325STDMETHODIMP VirtualBox::FindMachine(IN_BSTR aName, IMachine **aMachine)
1326{
1327 LogFlowThisFuncEnter();
1328 LogFlowThisFunc(("aName=\"%ls\", aMachine={%p}\n", aName, aMachine));
1329
1330 CheckComArgStrNotEmptyOrNull(aName);
1331 CheckComArgOutSafeArrayPointerValid(aMachine);
1332
1333 AutoCaller autoCaller(this);
1334 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1335
1336 /* start with not found */
1337 ComObjPtr<Machine> pMachineFound;
1338 Utf8Str strName(aName);
1339
1340 AutoReadLock al(m->allMachines.getLockHandle() COMMA_LOCKVAL_SRC_POS);
1341 for (MachinesOList::iterator it = m->allMachines.begin();
1342 it != m->allMachines.end();
1343 ++it)
1344 {
1345 ComObjPtr<Machine> &pMachine2 = *it;
1346 AutoCaller machCaller(pMachine2);
1347 /* skip inaccessible machines */
1348 if (FAILED(machCaller.rc()))
1349 continue;
1350
1351 AutoReadLock machLock(pMachine2 COMMA_LOCKVAL_SRC_POS);
1352 if (pMachine2->getName() == strName)
1353 {
1354 pMachineFound = pMachine2;
1355 break;
1356 }
1357 }
1358
1359 /* this will set (*machine) to NULL if machineObj is null */
1360 pMachineFound.queryInterfaceTo(aMachine);
1361
1362 HRESULT rc = pMachineFound
1363 ? S_OK
1364 : setError(VBOX_E_OBJECT_NOT_FOUND,
1365 tr("Could not find a registered machine named '%ls'"), aName);
1366
1367 LogFlowThisFunc(("aName=\"%ls\", aMachine=%p, rc=%08X\n", aName, *aMachine, rc));
1368 LogFlowThisFuncLeave();
1369
1370 return rc;
1371}
1372
1373STDMETHODIMP VirtualBox::CreateHardDisk(IN_BSTR aFormat,
1374 IN_BSTR aLocation,
1375 IMedium **aHardDisk)
1376{
1377 CheckComArgOutPointerValid(aHardDisk);
1378
1379 AutoCaller autoCaller(this);
1380 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1381
1382 /* we don't access non-const data members so no need to lock */
1383
1384 Utf8Str format(aFormat);
1385 if (format.isEmpty())
1386 getDefaultHardDiskFormat(format);
1387
1388 bool fNeedsGlobalSaveSettings = false;
1389
1390 ComObjPtr<Medium> hardDisk;
1391 hardDisk.createObject();
1392 HRESULT rc = hardDisk->init(this,
1393 format,
1394 aLocation,
1395 Guid::Empty, // media registry
1396 &fNeedsGlobalSaveSettings);
1397
1398 if (SUCCEEDED(rc))
1399 hardDisk.queryInterfaceTo(aHardDisk);
1400
1401 if (fNeedsGlobalSaveSettings)
1402 {
1403 AutoWriteLock vboxlock(this COMMA_LOCKVAL_SRC_POS);
1404 saveSettings();
1405 }
1406
1407 return rc;
1408}
1409
1410STDMETHODIMP VirtualBox::OpenMedium(IN_BSTR aLocation,
1411 DeviceType_T deviceType,
1412 AccessMode_T accessMode,
1413 IMedium **aMedium)
1414{
1415 CheckComArgStrNotEmptyOrNull(aLocation);
1416 CheckComArgOutSafeArrayPointerValid(aMedium);
1417
1418 AutoCaller autoCaller(this);
1419 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1420
1421 bool fNeedsGlobalSaveSettings = false;
1422 ComObjPtr<Medium> pMedium;
1423
1424 /* we don't access non-const data members so no need to lock */
1425
1426 switch (deviceType)
1427 {
1428 case DeviceType_HardDisk:
1429 case DeviceType_Floppy:
1430 break;
1431
1432 case DeviceType_DVD:
1433 accessMode = AccessMode_ReadOnly;
1434 break;
1435
1436 default:
1437 return setError(E_INVALIDARG, "Device type must be HardDisk, DVD or Floppy");
1438 }
1439
1440 pMedium.createObject();
1441 HRESULT rc = pMedium->init(this,
1442 aLocation,
1443 (accessMode == AccessMode_ReadWrite) ? Medium::OpenReadWrite : Medium::OpenReadOnly,
1444 deviceType);
1445
1446 if (SUCCEEDED(rc))
1447 {
1448 AutoWriteLock treeLock(getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
1449
1450 switch (deviceType)
1451 {
1452 case DeviceType_HardDisk:
1453 rc = registerHardDisk(pMedium,
1454 &fNeedsGlobalSaveSettings);
1455 break;
1456
1457 case DeviceType_DVD:
1458 case DeviceType_Floppy:
1459 rc = registerImage(pMedium,
1460 deviceType,
1461 &fNeedsGlobalSaveSettings);
1462 break;
1463 }
1464
1465 treeLock.release();
1466
1467 /* Note that it's important to call uninit() on failure to register
1468 * because the differencing hard disk would have been already associated
1469 * with the parent and this association needs to be broken. */
1470
1471 if (FAILED(rc))
1472 pMedium->uninit();
1473 }
1474
1475 if (SUCCEEDED(rc))
1476 pMedium.queryInterfaceTo(aMedium);
1477
1478 if (fNeedsGlobalSaveSettings)
1479 {
1480 AutoWriteLock vboxlock(this COMMA_LOCKVAL_SRC_POS);
1481 saveSettings();
1482 }
1483
1484 return rc;
1485}
1486
1487STDMETHODIMP VirtualBox::FindMedium(IN_BSTR aLocation,
1488 DeviceType_T aDeviceType,
1489 IMedium **aMedium)
1490{
1491 CheckComArgOutSafeArrayPointerValid(aMedium);
1492
1493 AutoCaller autoCaller(this);
1494 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1495
1496 Guid id(aLocation);
1497 Utf8Str strLocation(aLocation);
1498
1499 HRESULT rc;
1500 ComObjPtr<Medium> pMedium;
1501
1502 switch (aDeviceType)
1503 {
1504 case DeviceType_HardDisk:
1505 if (!id.isEmpty())
1506 rc = findHardDiskById(id, true /* setError */, &pMedium);
1507 else
1508 rc = findHardDiskByLocation(strLocation, true /* setError */, &pMedium);
1509 break;
1510
1511 case DeviceType_Floppy:
1512 case DeviceType_DVD:
1513 if (!id.isEmpty())
1514 rc = findDVDOrFloppyImage(aDeviceType, &id, Utf8Str::Empty, true /* setError */, &pMedium);
1515 else
1516 rc = findDVDOrFloppyImage(aDeviceType, NULL, strLocation, true /* setError */, &pMedium);
1517 break;
1518
1519 default:
1520 return setError(E_INVALIDARG,
1521 tr("Invalid device type %d"), aDeviceType);
1522 }
1523
1524 /* the below will set *aHardDisk to NULL if hardDisk is null */
1525 pMedium.queryInterfaceTo(aMedium);
1526
1527 return rc;
1528}
1529
1530/** @note Locks this object for reading. */
1531STDMETHODIMP VirtualBox::GetGuestOSType(IN_BSTR aId, IGuestOSType **aType)
1532{
1533 /* Old ID to new ID conversion table. See r39691 for a source */
1534 static const wchar_t *kOldNewIDs[] =
1535 {
1536 L"unknown", L"Other",
1537 L"win31", L"Windows31",
1538 L"win95", L"Windows95",
1539 L"win98", L"Windows98",
1540 L"winme", L"WindowsMe",
1541 L"winnt4", L"WindowsNT4",
1542 L"win2k", L"Windows2000",
1543 L"winxp", L"WindowsXP",
1544 L"win2k3", L"Windows2003",
1545 L"winvista", L"WindowsVista",
1546 L"win2k8", L"Windows2008",
1547 L"ecs", L"OS2eCS",
1548 L"fedoracore", L"Fedora",
1549 /* the rest is covered by the case-insensitive comparison */
1550 };
1551
1552 CheckComArgNotNull(aType);
1553
1554 AutoCaller autoCaller(this);
1555 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1556
1557 /* first, look for a substitution */
1558 Bstr id = aId;
1559 for (size_t i = 0; i < RT_ELEMENTS(kOldNewIDs) / 2; i += 2)
1560 {
1561 if (id == kOldNewIDs[i])
1562 {
1563 id = kOldNewIDs[i + 1];
1564 break;
1565 }
1566 }
1567
1568 *aType = NULL;
1569
1570 AutoReadLock alock(m->allGuestOSTypes.getLockHandle() COMMA_LOCKVAL_SRC_POS);
1571 for (GuestOSTypesOList::iterator it = m->allGuestOSTypes.begin();
1572 it != m->allGuestOSTypes.end();
1573 ++it)
1574 {
1575 const Bstr &typeId = (*it)->id();
1576 AssertMsg(!typeId.isEmpty(), ("ID must not be NULL"));
1577 if (typeId.compare(id, Bstr::CaseInsensitive) == 0)
1578 {
1579 (*it).queryInterfaceTo(aType);
1580 break;
1581 }
1582 }
1583
1584 return (*aType) ? S_OK :
1585 setError(E_INVALIDARG,
1586 tr("'%ls' is not a valid Guest OS type"),
1587 aId);
1588}
1589
1590STDMETHODIMP VirtualBox::CreateSharedFolder(IN_BSTR aName, IN_BSTR aHostPath,
1591 BOOL /* aWritable */, BOOL /* aAutoMount */)
1592{
1593 CheckComArgStrNotEmptyOrNull(aName);
1594 CheckComArgStrNotEmptyOrNull(aHostPath);
1595
1596 AutoCaller autoCaller(this);
1597 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1598
1599 return setError(E_NOTIMPL, "Not yet implemented");
1600}
1601
1602STDMETHODIMP VirtualBox::RemoveSharedFolder(IN_BSTR aName)
1603{
1604 CheckComArgStrNotEmptyOrNull(aName);
1605
1606 AutoCaller autoCaller(this);
1607 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1608
1609 return setError(E_NOTIMPL, "Not yet implemented");
1610}
1611
1612/**
1613 * @note Locks this object for reading.
1614 */
1615STDMETHODIMP VirtualBox::GetExtraDataKeys(ComSafeArrayOut(BSTR, aKeys))
1616{
1617 using namespace settings;
1618
1619 if (ComSafeArrayOutIsNull(aKeys))
1620 return E_POINTER;
1621
1622 AutoCaller autoCaller(this);
1623 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1624
1625 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1626
1627 com::SafeArray<BSTR> saKeys(m->pMainConfigFile->mapExtraDataItems.size());
1628 int i = 0;
1629 for (StringsMap::const_iterator it = m->pMainConfigFile->mapExtraDataItems.begin();
1630 it != m->pMainConfigFile->mapExtraDataItems.end();
1631 ++it, ++i)
1632 {
1633 const Utf8Str &strName = it->first; // the key
1634 strName.cloneTo(&saKeys[i]);
1635 }
1636 saKeys.detachTo(ComSafeArrayOutArg(aKeys));
1637
1638 return S_OK;
1639}
1640
1641/**
1642 * @note Locks this object for reading.
1643 */
1644STDMETHODIMP VirtualBox::GetExtraData(IN_BSTR aKey,
1645 BSTR *aValue)
1646{
1647 CheckComArgStrNotEmptyOrNull(aKey);
1648 CheckComArgNotNull(aValue);
1649
1650 AutoCaller autoCaller(this);
1651 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1652
1653 /* start with nothing found */
1654 Utf8Str strKey(aKey);
1655 Bstr bstrResult;
1656
1657 settings::StringsMap::const_iterator it = m->pMainConfigFile->mapExtraDataItems.find(strKey);
1658 if (it != m->pMainConfigFile->mapExtraDataItems.end())
1659 // found:
1660 bstrResult = it->second; // source is a Utf8Str
1661
1662 /* return the result to caller (may be empty) */
1663 bstrResult.cloneTo(aValue);
1664
1665 return S_OK;
1666}
1667
1668/**
1669 * @note Locks this object for writing.
1670 */
1671STDMETHODIMP VirtualBox::SetExtraData(IN_BSTR aKey,
1672 IN_BSTR aValue)
1673{
1674 CheckComArgStrNotEmptyOrNull(aKey);
1675
1676 AutoCaller autoCaller(this);
1677 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1678
1679 Utf8Str strKey(aKey);
1680 Utf8Str strValue(aValue);
1681 Utf8Str strOldValue; // empty
1682
1683 // locking note: we only hold the read lock briefly to look up the old value,
1684 // then release it and call the onExtraCanChange callbacks. There is a small
1685 // chance of a race insofar as the callback might be called twice if two callers
1686 // change the same key at the same time, but that's a much better solution
1687 // than the deadlock we had here before. The actual changing of the extradata
1688 // is then performed under the write lock and race-free.
1689
1690 // look up the old value first; if nothing's changed then we need not do anything
1691 {
1692 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); // hold read lock only while looking up
1693 settings::StringsMap::const_iterator it = m->pMainConfigFile->mapExtraDataItems.find(strKey);
1694 if (it != m->pMainConfigFile->mapExtraDataItems.end())
1695 strOldValue = it->second;
1696 }
1697
1698 bool fChanged;
1699 if ((fChanged = (strOldValue != strValue)))
1700 {
1701 // ask for permission from all listeners outside the locks;
1702 // onExtraDataCanChange() only briefly requests the VirtualBox
1703 // lock to copy the list of callbacks to invoke
1704 Bstr error;
1705 Bstr bstrValue(aValue);
1706
1707 if (!onExtraDataCanChange(Guid::Empty, aKey, bstrValue.raw(), error))
1708 {
1709 const char *sep = error.isEmpty() ? "" : ": ";
1710 CBSTR err = error.raw();
1711 LogWarningFunc(("Someone vetoed! Change refused%s%ls\n",
1712 sep, err));
1713 return setError(E_ACCESSDENIED,
1714 tr("Could not set extra data because someone refused the requested change of '%ls' to '%ls'%s%ls"),
1715 aKey,
1716 bstrValue.raw(),
1717 sep,
1718 err);
1719 }
1720
1721 // data is changing and change not vetoed: then write it out under the lock
1722
1723 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
1724
1725 if (strValue.isEmpty())
1726 m->pMainConfigFile->mapExtraDataItems.erase(strKey);
1727 else
1728 m->pMainConfigFile->mapExtraDataItems[strKey] = strValue;
1729 // creates a new key if needed
1730
1731 /* save settings on success */
1732 HRESULT rc = saveSettings();
1733 if (FAILED(rc)) return rc;
1734 }
1735
1736 // fire notification outside the lock
1737 if (fChanged)
1738 onExtraDataChange(Guid::Empty, aKey, aValue);
1739
1740 return S_OK;
1741}
1742
1743// public methods only for internal purposes
1744/////////////////////////////////////////////////////////////////////////////
1745
1746#ifdef DEBUG
1747void VirtualBox::dumpAllBackRefs()
1748{
1749 {
1750 AutoReadLock al(m->allHardDisks.getLockHandle() COMMA_LOCKVAL_SRC_POS);
1751 for (MediaList::const_iterator mt = m->allHardDisks.begin();
1752 mt != m->allHardDisks.end();
1753 ++mt)
1754 {
1755 ComObjPtr<Medium> pMedium = *mt;
1756 pMedium->dumpBackRefs();
1757 }
1758 }
1759 {
1760 AutoReadLock al(m->allDVDImages.getLockHandle() COMMA_LOCKVAL_SRC_POS);
1761 for (MediaList::const_iterator mt = m->allDVDImages.begin();
1762 mt != m->allDVDImages.end();
1763 ++mt)
1764 {
1765 ComObjPtr<Medium> pMedium = *mt;
1766 pMedium->dumpBackRefs();
1767 }
1768 }
1769}
1770#endif
1771
1772/**
1773 * Posts an event to the event queue that is processed asynchronously
1774 * on a dedicated thread.
1775 *
1776 * Posting events to the dedicated event queue is useful to perform secondary
1777 * actions outside any object locks -- for example, to iterate over a list
1778 * of callbacks and inform them about some change caused by some object's
1779 * method call.
1780 *
1781 * @param event event to post; must have been allocated using |new|, will
1782 * be deleted automatically by the event thread after processing
1783 *
1784 * @note Doesn't lock any object.
1785 */
1786HRESULT VirtualBox::postEvent(Event *event)
1787{
1788 AssertReturn(event, E_FAIL);
1789
1790 HRESULT rc;
1791 AutoCaller autoCaller(this);
1792 if (SUCCEEDED((rc = autoCaller.rc())))
1793 {
1794 if (autoCaller.state() != Ready)
1795 LogWarningFunc(("VirtualBox has been uninitialized (state=%d), the event is discarded!\n",
1796 autoCaller.state()));
1797 // return S_OK
1798 else if ( (m->pAsyncEventQ)
1799 && (m->pAsyncEventQ->postEvent(event))
1800 )
1801 return S_OK;
1802 else
1803 rc = E_FAIL;
1804 }
1805
1806 // in any event of failure, we must clean up here, or we'll leak;
1807 // the caller has allocated the object using new()
1808 delete event;
1809 return rc;
1810}
1811
1812/**
1813 * Adds a progress to the global collection of pending operations.
1814 * Usually gets called upon progress object initialization.
1815 *
1816 * @param aProgress Operation to add to the collection.
1817 *
1818 * @note Doesn't lock objects.
1819 */
1820HRESULT VirtualBox::addProgress(IProgress *aProgress)
1821{
1822 CheckComArgNotNull(aProgress);
1823
1824 AutoCaller autoCaller(this);
1825 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1826
1827 Bstr id;
1828 HRESULT rc = aProgress->COMGETTER(Id)(id.asOutParam());
1829 AssertComRCReturnRC(rc);
1830
1831 /* protect mProgressOperations */
1832 AutoWriteLock safeLock(m->mtxProgressOperations COMMA_LOCKVAL_SRC_POS);
1833
1834 m->mapProgressOperations.insert(ProgressMap::value_type(Guid(id), aProgress));
1835 return S_OK;
1836}
1837
1838/**
1839 * Removes the progress from the global collection of pending operations.
1840 * Usually gets called upon progress completion.
1841 *
1842 * @param aId UUID of the progress operation to remove
1843 *
1844 * @note Doesn't lock objects.
1845 */
1846HRESULT VirtualBox::removeProgress(IN_GUID aId)
1847{
1848 AutoCaller autoCaller(this);
1849 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1850
1851 ComPtr<IProgress> progress;
1852
1853 /* protect mProgressOperations */
1854 AutoWriteLock safeLock(m->mtxProgressOperations COMMA_LOCKVAL_SRC_POS);
1855
1856 size_t cnt = m->mapProgressOperations.erase(aId);
1857 Assert(cnt == 1);
1858 NOREF(cnt);
1859
1860 return S_OK;
1861}
1862
1863#ifdef RT_OS_WINDOWS
1864
1865struct StartSVCHelperClientData
1866{
1867 ComObjPtr<VirtualBox> that;
1868 ComObjPtr<Progress> progress;
1869 bool privileged;
1870 VirtualBox::SVCHelperClientFunc func;
1871 void *user;
1872};
1873
1874/**
1875 * Helper method that starts a worker thread that:
1876 * - creates a pipe communication channel using SVCHlpClient;
1877 * - starts an SVC Helper process that will inherit this channel;
1878 * - executes the supplied function by passing it the created SVCHlpClient
1879 * and opened instance to communicate to the Helper process and the given
1880 * Progress object.
1881 *
1882 * The user function is supposed to communicate to the helper process
1883 * using the \a aClient argument to do the requested job and optionally expose
1884 * the progress through the \a aProgress object. The user function should never
1885 * call notifyComplete() on it: this will be done automatically using the
1886 * result code returned by the function.
1887 *
1888 * Before the user function is started, the communication channel passed to
1889 * the \a aClient argument is fully set up, the function should start using
1890 * its write() and read() methods directly.
1891 *
1892 * The \a aVrc parameter of the user function may be used to return an error
1893 * code if it is related to communication errors (for example, returned by
1894 * the SVCHlpClient members when they fail). In this case, the correct error
1895 * message using this value will be reported to the caller. Note that the
1896 * value of \a aVrc is inspected only if the user function itself returns
1897 * success.
1898 *
1899 * If a failure happens anywhere before the user function would be normally
1900 * called, it will be called anyway in special "cleanup only" mode indicated
1901 * by \a aClient, \a aProgress and \aVrc arguments set to NULL. In this mode,
1902 * all the function is supposed to do is to cleanup its aUser argument if
1903 * necessary (it's assumed that the ownership of this argument is passed to
1904 * the user function once #startSVCHelperClient() returns a success, thus
1905 * making it responsible for the cleanup).
1906 *
1907 * After the user function returns, the thread will send the SVCHlpMsg::Null
1908 * message to indicate a process termination.
1909 *
1910 * @param aPrivileged |true| to start the SVC Helper process as a privileged
1911 * user that can perform administrative tasks
1912 * @param aFunc user function to run
1913 * @param aUser argument to the user function
1914 * @param aProgress progress object that will track operation completion
1915 *
1916 * @note aPrivileged is currently ignored (due to some unsolved problems in
1917 * Vista) and the process will be started as a normal (unprivileged)
1918 * process.
1919 *
1920 * @note Doesn't lock anything.
1921 */
1922HRESULT VirtualBox::startSVCHelperClient(bool aPrivileged,
1923 SVCHelperClientFunc aFunc,
1924 void *aUser, Progress *aProgress)
1925{
1926 AssertReturn(aFunc, E_POINTER);
1927 AssertReturn(aProgress, E_POINTER);
1928
1929 AutoCaller autoCaller(this);
1930 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1931
1932 /* create the SVCHelperClientThread() argument */
1933 std::auto_ptr <StartSVCHelperClientData>
1934 d(new StartSVCHelperClientData());
1935 AssertReturn(d.get(), E_OUTOFMEMORY);
1936
1937 d->that = this;
1938 d->progress = aProgress;
1939 d->privileged = aPrivileged;
1940 d->func = aFunc;
1941 d->user = aUser;
1942
1943 RTTHREAD tid = NIL_RTTHREAD;
1944 int vrc = RTThreadCreate(&tid, SVCHelperClientThread,
1945 static_cast <void *>(d.get()),
1946 0, RTTHREADTYPE_MAIN_WORKER,
1947 RTTHREADFLAGS_WAITABLE, "SVCHelper");
1948 if (RT_FAILURE(vrc))
1949 return setError(E_FAIL, "Could not create SVCHelper thread (%Rrc)", vrc);
1950
1951 /* d is now owned by SVCHelperClientThread(), so release it */
1952 d.release();
1953
1954 return S_OK;
1955}
1956
1957/**
1958 * Worker thread for startSVCHelperClient().
1959 */
1960/* static */
1961DECLCALLBACK(int)
1962VirtualBox::SVCHelperClientThread(RTTHREAD aThread, void *aUser)
1963{
1964 LogFlowFuncEnter();
1965
1966 std::auto_ptr<StartSVCHelperClientData>
1967 d(static_cast<StartSVCHelperClientData*>(aUser));
1968
1969 HRESULT rc = S_OK;
1970 bool userFuncCalled = false;
1971
1972 do
1973 {
1974 AssertBreakStmt(d.get(), rc = E_POINTER);
1975 AssertReturn(!d->progress.isNull(), E_POINTER);
1976
1977 /* protect VirtualBox from uninitialization */
1978 AutoCaller autoCaller(d->that);
1979 if (!autoCaller.isOk())
1980 {
1981 /* it's too late */
1982 rc = autoCaller.rc();
1983 break;
1984 }
1985
1986 int vrc = VINF_SUCCESS;
1987
1988 Guid id;
1989 id.create();
1990 SVCHlpClient client;
1991 vrc = client.create(Utf8StrFmt("VirtualBox\\SVCHelper\\{%RTuuid}",
1992 id.raw()).c_str());
1993 if (RT_FAILURE(vrc))
1994 {
1995 rc = d->that->setError(E_FAIL,
1996 tr("Could not create the communication channel (%Rrc)"), vrc);
1997 break;
1998 }
1999
2000 /* get the path to the executable */
2001 char exePathBuf[RTPATH_MAX];
2002 char *exePath = RTProcGetExecutableName(exePathBuf, RTPATH_MAX);
2003 if (!exePath)
2004 {
2005 rc = d->that->setError(E_FAIL, tr("Cannot get executable name"));
2006 break;
2007 }
2008
2009 Utf8Str argsStr = Utf8StrFmt("/Helper %s", client.name().c_str());
2010
2011 LogFlowFunc(("Starting '\"%s\" %s'...\n", exePath, argsStr.c_str()));
2012
2013 RTPROCESS pid = NIL_RTPROCESS;
2014
2015 if (d->privileged)
2016 {
2017 /* Attempt to start a privileged process using the Run As dialog */
2018
2019 Bstr file = exePath;
2020 Bstr parameters = argsStr;
2021
2022 SHELLEXECUTEINFO shExecInfo;
2023
2024 shExecInfo.cbSize = sizeof(SHELLEXECUTEINFO);
2025
2026 shExecInfo.fMask = NULL;
2027 shExecInfo.hwnd = NULL;
2028 shExecInfo.lpVerb = L"runas";
2029 shExecInfo.lpFile = file.raw();
2030 shExecInfo.lpParameters = parameters.raw();
2031 shExecInfo.lpDirectory = NULL;
2032 shExecInfo.nShow = SW_NORMAL;
2033 shExecInfo.hInstApp = NULL;
2034
2035 if (!ShellExecuteEx(&shExecInfo))
2036 {
2037 int vrc2 = RTErrConvertFromWin32(GetLastError());
2038 /* hide excessive details in case of a frequent error
2039 * (pressing the Cancel button to close the Run As dialog) */
2040 if (vrc2 == VERR_CANCELLED)
2041 rc = d->that->setError(E_FAIL,
2042 tr("Operation canceled by the user"));
2043 else
2044 rc = d->that->setError(E_FAIL,
2045 tr("Could not launch a privileged process '%s' (%Rrc)"),
2046 exePath, vrc2);
2047 break;
2048 }
2049 }
2050 else
2051 {
2052 const char *args[] = { exePath, "/Helper", client.name().c_str(), 0 };
2053 vrc = RTProcCreate(exePath, args, RTENV_DEFAULT, 0, &pid);
2054 if (RT_FAILURE(vrc))
2055 {
2056 rc = d->that->setError(E_FAIL,
2057 tr("Could not launch a process '%s' (%Rrc)"), exePath, vrc);
2058 break;
2059 }
2060 }
2061
2062 /* wait for the client to connect */
2063 vrc = client.connect();
2064 if (RT_SUCCESS(vrc))
2065 {
2066 /* start the user supplied function */
2067 rc = d->func(&client, d->progress, d->user, &vrc);
2068 userFuncCalled = true;
2069 }
2070
2071 /* send the termination signal to the process anyway */
2072 {
2073 int vrc2 = client.write(SVCHlpMsg::Null);
2074 if (RT_SUCCESS(vrc))
2075 vrc = vrc2;
2076 }
2077
2078 if (SUCCEEDED(rc) && RT_FAILURE(vrc))
2079 {
2080 rc = d->that->setError(E_FAIL,
2081 tr("Could not operate the communication channel (%Rrc)"), vrc);
2082 break;
2083 }
2084 }
2085 while (0);
2086
2087 if (FAILED(rc) && !userFuncCalled)
2088 {
2089 /* call the user function in the "cleanup only" mode
2090 * to let it free resources passed to in aUser */
2091 d->func(NULL, NULL, d->user, NULL);
2092 }
2093
2094 d->progress->notifyComplete(rc);
2095
2096 LogFlowFuncLeave();
2097 return 0;
2098}
2099
2100#endif /* RT_OS_WINDOWS */
2101
2102/**
2103 * Sends a signal to the client watcher thread to rescan the set of machines
2104 * that have open sessions.
2105 *
2106 * @note Doesn't lock anything.
2107 */
2108void VirtualBox::updateClientWatcher()
2109{
2110 AutoCaller autoCaller(this);
2111 AssertComRCReturnVoid(autoCaller.rc());
2112
2113 AssertReturnVoid(m->threadClientWatcher != NIL_RTTHREAD);
2114
2115 /* sent an update request */
2116#if defined(RT_OS_WINDOWS)
2117 ::SetEvent(m->updateReq);
2118#elif defined(RT_OS_OS2)
2119 RTSemEventSignal(m->updateReq);
2120#elif defined(VBOX_WITH_SYS_V_IPC_SESSION_WATCHER)
2121 RTSemEventSignal(m->updateReq);
2122#else
2123# error "Port me!"
2124#endif
2125}
2126
2127/**
2128 * Adds the given child process ID to the list of processes to be reaped.
2129 * This call should be followed by #updateClientWatcher() to take the effect.
2130 */
2131void VirtualBox::addProcessToReap(RTPROCESS pid)
2132{
2133 AutoCaller autoCaller(this);
2134 AssertComRCReturnVoid(autoCaller.rc());
2135
2136 /// @todo (dmik) Win32?
2137#ifndef RT_OS_WINDOWS
2138 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2139 m->llProcesses.push_back(pid);
2140#endif
2141}
2142
2143/** Event for onMachineStateChange(), onMachineDataChange(), onMachineRegistered() */
2144struct MachineEvent : public VirtualBox::CallbackEvent
2145{
2146 MachineEvent(VirtualBox *aVB, const Guid &aId)
2147 : CallbackEvent(aVB, VirtualBoxCallbackRegistration::kOnMachineDataChanged), id(aId.toUtf16())
2148 {}
2149
2150 MachineEvent(VirtualBox *aVB, const Guid &aId, MachineState_T aState)
2151 : CallbackEvent(aVB, VirtualBoxCallbackRegistration::kOnMachineStateChanged), id(aId.toUtf16())
2152 , state(aState)
2153 {}
2154
2155 MachineEvent(VirtualBox *aVB, const Guid &aId, BOOL aRegistered)
2156 : CallbackEvent(aVB, VirtualBoxCallbackRegistration::kOnMachineRegistered), id(aId.toUtf16())
2157 , registered(aRegistered)
2158 {}
2159
2160 virtual HRESULT prepareEventDesc(IEventSource* aSource, VBoxEventDesc& aEvDesc)
2161 {
2162 switch (mWhat)
2163 {
2164 case VirtualBoxCallbackRegistration::kOnMachineDataChanged:
2165 aEvDesc.init(aSource, VBoxEventType_OnMachineDataChanged, id.raw());
2166 break;
2167
2168 case VirtualBoxCallbackRegistration::kOnMachineStateChanged:
2169 aEvDesc.init(aSource, VBoxEventType_OnMachineStateChanged, id.raw(), state);
2170 break;
2171
2172 case VirtualBoxCallbackRegistration::kOnMachineRegistered:
2173 aEvDesc.init(aSource, VBoxEventType_OnMachineRegistered, id.raw(), registered);
2174 break;
2175
2176 default:
2177 AssertFailedReturn(S_OK);
2178 }
2179 return S_OK;
2180 }
2181
2182 Bstr id;
2183 MachineState_T state;
2184 BOOL registered;
2185};
2186
2187/**
2188 * @note Doesn't lock any object.
2189 */
2190void VirtualBox::onMachineStateChange(const Guid &aId, MachineState_T aState)
2191{
2192 postEvent(new MachineEvent(this, aId, aState));
2193}
2194
2195/**
2196 * @note Doesn't lock any object.
2197 */
2198void VirtualBox::onMachineDataChange(const Guid &aId)
2199{
2200 postEvent(new MachineEvent(this, aId));
2201}
2202
2203/**
2204 * @note Locks this object for reading.
2205 */
2206BOOL VirtualBox::onExtraDataCanChange(const Guid &aId, IN_BSTR aKey, IN_BSTR aValue,
2207 Bstr &aError)
2208{
2209 LogFlowThisFunc(("machine={%s} aKey={%ls} aValue={%ls}\n",
2210 aId.toString().c_str(), aKey, aValue));
2211
2212 AutoCaller autoCaller(this);
2213 AssertComRCReturn(autoCaller.rc(), autoCaller.rc());
2214
2215 BOOL allowChange = TRUE;
2216 Bstr id = aId.toUtf16();
2217
2218 VBoxEventDesc evDesc;
2219 evDesc.init(m->pEventSource, VBoxEventType_OnExtraDataCanChange, id.raw(), aKey, aValue);
2220 BOOL fDelivered = evDesc.fire(3000); /* Wait up to 3 secs for delivery */
2221 //Assert(fDelivered);
2222 if (fDelivered)
2223 {
2224 ComPtr<IEvent> aEvent;
2225 evDesc.getEvent(aEvent.asOutParam());
2226 ComPtr<IExtraDataCanChangeEvent> aCanChangeEvent = aEvent;
2227 Assert(aCanChangeEvent);
2228 BOOL fVetoed = FALSE;
2229 aCanChangeEvent->IsVetoed(&fVetoed);
2230 allowChange = !fVetoed;
2231
2232 if (!allowChange)
2233 {
2234 SafeArray<BSTR> aVetos;
2235 aCanChangeEvent->GetVetos(ComSafeArrayAsOutParam(aVetos));
2236 if (aVetos.size() > 0)
2237 aError = aVetos[0];
2238 }
2239 }
2240 else
2241 allowChange = TRUE;
2242
2243 LogFlowThisFunc(("allowChange=%RTbool\n", allowChange));
2244 return allowChange;
2245}
2246
2247/** Event for onExtraDataChange() */
2248struct ExtraDataEvent : public VirtualBox::CallbackEvent
2249{
2250 ExtraDataEvent(VirtualBox *aVB, const Guid &aMachineId,
2251 IN_BSTR aKey, IN_BSTR aVal)
2252 : CallbackEvent(aVB, VirtualBoxCallbackRegistration::kOnExtraDataChanged)
2253 , machineId(aMachineId.toUtf16()), key(aKey), val(aVal)
2254 {}
2255
2256 virtual HRESULT prepareEventDesc(IEventSource* aSource, VBoxEventDesc& aEvDesc)
2257 {
2258 return aEvDesc.init(aSource, VBoxEventType_OnExtraDataChanged, machineId.raw(), key.raw(), val.raw());
2259 }
2260
2261 Bstr machineId, key, val;
2262};
2263
2264/**
2265 * @note Doesn't lock any object.
2266 */
2267void VirtualBox::onExtraDataChange(const Guid &aId, IN_BSTR aKey, IN_BSTR aValue)
2268{
2269 postEvent(new ExtraDataEvent(this, aId, aKey, aValue));
2270}
2271
2272/**
2273 * @note Doesn't lock any object.
2274 */
2275void VirtualBox::onMachineRegistered(const Guid &aId, BOOL aRegistered)
2276{
2277 postEvent(new MachineEvent(this, aId, aRegistered));
2278}
2279
2280/** Event for onSessionStateChange() */
2281struct SessionEvent : public VirtualBox::CallbackEvent
2282{
2283 SessionEvent(VirtualBox *aVB, const Guid &aMachineId, SessionState_T aState)
2284 : CallbackEvent(aVB, VirtualBoxCallbackRegistration::kOnSessionStateChanged)
2285 , machineId(aMachineId.toUtf16()), sessionState(aState)
2286 {}
2287
2288 virtual HRESULT prepareEventDesc(IEventSource* aSource, VBoxEventDesc& aEvDesc)
2289 {
2290 return aEvDesc.init(aSource, VBoxEventType_OnSessionStateChanged, machineId.raw(), sessionState);
2291 }
2292 Bstr machineId;
2293 SessionState_T sessionState;
2294};
2295
2296/**
2297 * @note Doesn't lock any object.
2298 */
2299void VirtualBox::onSessionStateChange(const Guid &aId, SessionState_T aState)
2300{
2301 postEvent(new SessionEvent(this, aId, aState));
2302}
2303
2304/** Event for onSnapshotTaken(), onSnapshotDeleted() and onSnapshotChange() */
2305struct SnapshotEvent : public VirtualBox::CallbackEvent
2306{
2307 SnapshotEvent(VirtualBox *aVB, const Guid &aMachineId, const Guid &aSnapshotId,
2308 VirtualBoxCallbackRegistration::CallbackBit aWhat)
2309 : CallbackEvent(aVB, aWhat)
2310 , machineId(aMachineId), snapshotId(aSnapshotId)
2311 {}
2312
2313 virtual HRESULT prepareEventDesc(IEventSource* aSource, VBoxEventDesc& aEvDesc)
2314 {
2315 return aEvDesc.init(aSource, VBoxEventType_OnSnapshotTaken,
2316 machineId.toUtf16().raw(), snapshotId.toUtf16().raw());
2317 }
2318
2319 Guid machineId;
2320 Guid snapshotId;
2321};
2322
2323/**
2324 * @note Doesn't lock any object.
2325 */
2326void VirtualBox::onSnapshotTaken(const Guid &aMachineId, const Guid &aSnapshotId)
2327{
2328 postEvent(new SnapshotEvent(this, aMachineId, aSnapshotId,
2329 VirtualBoxCallbackRegistration::kOnSnapshotTaken));
2330}
2331
2332/**
2333 * @note Doesn't lock any object.
2334 */
2335void VirtualBox::onSnapshotDeleted(const Guid &aMachineId, const Guid &aSnapshotId)
2336{
2337 postEvent(new SnapshotEvent(this, aMachineId, aSnapshotId,
2338 VirtualBoxCallbackRegistration::kOnSnapshotDeleted));
2339}
2340
2341/**
2342 * @note Doesn't lock any object.
2343 */
2344void VirtualBox::onSnapshotChange(const Guid &aMachineId, const Guid &aSnapshotId)
2345{
2346 postEvent(new SnapshotEvent(this, aMachineId, aSnapshotId,
2347 VirtualBoxCallbackRegistration::kOnSnapshotChanged));
2348}
2349
2350/** Event for onGuestPropertyChange() */
2351struct GuestPropertyEvent : public VirtualBox::CallbackEvent
2352{
2353 GuestPropertyEvent(VirtualBox *aVBox, const Guid &aMachineId,
2354 IN_BSTR aName, IN_BSTR aValue, IN_BSTR aFlags)
2355 : CallbackEvent(aVBox, VirtualBoxCallbackRegistration::kOnGuestPropertyChanged),
2356 machineId(aMachineId),
2357 name(aName),
2358 value(aValue),
2359 flags(aFlags)
2360 {}
2361
2362 virtual HRESULT prepareEventDesc(IEventSource* aSource, VBoxEventDesc& aEvDesc)
2363 {
2364 return aEvDesc.init(aSource, VBoxEventType_OnGuestPropertyChanged,
2365 machineId.toUtf16().raw(), name.raw(), value.raw(), flags.raw());
2366 }
2367
2368 Guid machineId;
2369 Bstr name, value, flags;
2370};
2371
2372/**
2373 * @note Doesn't lock any object.
2374 */
2375void VirtualBox::onGuestPropertyChange(const Guid &aMachineId, IN_BSTR aName,
2376 IN_BSTR aValue, IN_BSTR aFlags)
2377{
2378 postEvent(new GuestPropertyEvent(this, aMachineId, aName, aValue, aFlags));
2379}
2380
2381/** Event for onMachineUninit(), this is not a CallbackEvent */
2382class MachineUninitEvent : public Event
2383{
2384public:
2385
2386 MachineUninitEvent(VirtualBox *aVirtualBox, Machine *aMachine)
2387 : mVirtualBox(aVirtualBox), mMachine(aMachine)
2388 {
2389 Assert(aVirtualBox);
2390 Assert(aMachine);
2391 }
2392
2393 void *handler()
2394 {
2395#ifdef VBOX_WITH_RESOURCE_USAGE_API
2396 /* Handle unregistering metrics here, as it is not vital to get
2397 * it done immediately. It reduces the number of locks needed and
2398 * the lock contention in SessionMachine::uninit. */
2399 {
2400 AutoWriteLock mLock(mMachine COMMA_LOCKVAL_SRC_POS);
2401 mMachine->unregisterMetrics(mVirtualBox->performanceCollector(), mMachine);
2402 }
2403#endif /* VBOX_WITH_RESOURCE_USAGE_API */
2404
2405 return NULL;
2406 }
2407
2408private:
2409
2410 /**
2411 * Note that this is a weak ref -- the CallbackEvent handler thread
2412 * is bound to the lifetime of the VirtualBox instance, so it's safe.
2413 */
2414 VirtualBox *mVirtualBox;
2415
2416 /** Reference to the machine object. */
2417 ComObjPtr<Machine> mMachine;
2418};
2419
2420/**
2421 * Trigger internal event. This isn't meant to be signalled to clients.
2422 * @note Doesn't lock any object.
2423 */
2424void VirtualBox::onMachineUninit(Machine *aMachine)
2425{
2426 postEvent(new MachineUninitEvent(this, aMachine));
2427}
2428
2429/**
2430 * @note Locks this object for reading.
2431 */
2432ComObjPtr<GuestOSType> VirtualBox::getUnknownOSType()
2433{
2434 ComObjPtr<GuestOSType> type;
2435 AutoCaller autoCaller(this);
2436 AssertComRCReturn(autoCaller.rc(), type);
2437
2438 /* unknown type must always be the first */
2439 ComAssertRet(m->allGuestOSTypes.size() > 0, type);
2440
2441 return m->allGuestOSTypes.front();
2442}
2443
2444/**
2445 * Returns the list of opened machines (machines having direct sessions opened
2446 * by client processes) and optionally the list of direct session controls.
2447 *
2448 * @param aMachines Where to put opened machines (will be empty if none).
2449 * @param aControls Where to put direct session controls (optional).
2450 *
2451 * @note The returned lists contain smart pointers. So, clear it as soon as
2452 * it becomes no more necessary to release instances.
2453 *
2454 * @note It can be possible that a session machine from the list has been
2455 * already uninitialized, so do a usual AutoCaller/AutoReadLock sequence
2456 * when accessing unprotected data directly.
2457 *
2458 * @note Locks objects for reading.
2459 */
2460void VirtualBox::getOpenedMachines(SessionMachinesList &aMachines,
2461 InternalControlList *aControls /*= NULL*/)
2462{
2463 AutoCaller autoCaller(this);
2464 AssertComRCReturnVoid(autoCaller.rc());
2465
2466 aMachines.clear();
2467 if (aControls)
2468 aControls->clear();
2469
2470 AutoReadLock alock(m->allMachines.getLockHandle() COMMA_LOCKVAL_SRC_POS);
2471
2472 for (MachinesOList::iterator it = m->allMachines.begin();
2473 it != m->allMachines.end();
2474 ++it)
2475 {
2476 ComObjPtr<SessionMachine> sm;
2477 ComPtr<IInternalSessionControl> ctl;
2478 if ((*it)->isSessionOpen(sm, &ctl))
2479 {
2480 aMachines.push_back(sm);
2481 if (aControls)
2482 aControls->push_back(ctl);
2483 }
2484 }
2485}
2486
2487/**
2488 * Searches for a machine object with the given ID in the collection
2489 * of registered machines.
2490 *
2491 * @param aId Machine UUID to look for.
2492 * @param aPermitInaccessible If true, inaccessible machines will be found;
2493 * if false, this will fail if the given machine is inaccessible.
2494 * @param aSetError If true, set errorinfo if the machine is not found.
2495 * @param aMachine Returned machine, if found.
2496 * @return
2497 */
2498HRESULT VirtualBox::findMachine(const Guid &aId,
2499 bool fPermitInaccessible,
2500 bool aSetError,
2501 ComObjPtr<Machine> *aMachine /* = NULL */)
2502{
2503 HRESULT rc = VBOX_E_OBJECT_NOT_FOUND;
2504
2505 AutoCaller autoCaller(this);
2506 AssertComRCReturn(autoCaller.rc(), autoCaller.rc());
2507
2508 {
2509 AutoReadLock al(m->allMachines.getLockHandle() COMMA_LOCKVAL_SRC_POS);
2510
2511 for (MachinesOList::iterator it = m->allMachines.begin();
2512 it != m->allMachines.end();
2513 ++it)
2514 {
2515 ComObjPtr<Machine> pMachine2 = *it;
2516
2517 if (!fPermitInaccessible)
2518 {
2519 // skip inaccessible machines
2520 AutoCaller machCaller(pMachine2);
2521 if (FAILED(machCaller.rc()))
2522 continue;
2523 }
2524
2525 if (pMachine2->getId() == aId)
2526 {
2527 rc = S_OK;
2528 if (aMachine)
2529 *aMachine = pMachine2;
2530 break;
2531 }
2532 }
2533 }
2534
2535 if (aSetError && FAILED(rc))
2536 rc = setError(rc,
2537 tr("Could not find a registered machine with UUID {%RTuuid}"),
2538 aId.raw());
2539
2540 return rc;
2541}
2542
2543/**
2544 * Searches for a Medium object with the given ID in the list of registered
2545 * hard disks.
2546 *
2547 * @param aId ID of the hard disk. Must not be empty.
2548 * @param aSetError If @c true , the appropriate error info is set in case
2549 * when the hard disk is not found.
2550 * @param aHardDisk Where to store the found hard disk object (can be NULL).
2551 *
2552 * @return S_OK, E_INVALIDARG or VBOX_E_OBJECT_NOT_FOUND when not found.
2553 *
2554 * @note Locks the media tree for reading.
2555 */
2556HRESULT VirtualBox::findHardDiskById(const Guid &id,
2557 bool aSetError,
2558 ComObjPtr<Medium> *aHardDisk /*= NULL*/)
2559{
2560 AssertReturn(!id.isEmpty(), E_INVALIDARG);
2561
2562 // we use the hard disks map, but it is protected by the
2563 // hard disk _list_ lock handle
2564 AutoReadLock alock(m->allHardDisks.getLockHandle() COMMA_LOCKVAL_SRC_POS);
2565
2566 HardDiskMap::const_iterator it = m->mapHardDisks.find(id);
2567 if (it != m->mapHardDisks.end())
2568 {
2569 if (aHardDisk)
2570 *aHardDisk = (*it).second;
2571 return S_OK;
2572 }
2573
2574 if (aSetError)
2575 return setError(VBOX_E_OBJECT_NOT_FOUND,
2576 tr("Could not find an open hard disk with UUID {%RTuuid}"),
2577 id.raw());
2578
2579 return VBOX_E_OBJECT_NOT_FOUND;
2580}
2581
2582/**
2583 * Searches for a Medium object with the given ID or location in the list of
2584 * registered hard disks. If both ID and location are specified, the first
2585 * object that matches either of them (not necessarily both) is returned.
2586 *
2587 * @param aLocation Full location specification. Must not be empty.
2588 * @param aSetError If @c true , the appropriate error info is set in case
2589 * when the hard disk is not found.
2590 * @param aHardDisk Where to store the found hard disk object (can be NULL).
2591 *
2592 * @return S_OK, E_INVALIDARG or VBOX_E_OBJECT_NOT_FOUND when not found.
2593 *
2594 * @note Locks the media tree for reading.
2595 */
2596HRESULT VirtualBox::findHardDiskByLocation(const Utf8Str &strLocation,
2597 bool aSetError,
2598 ComObjPtr<Medium> *aHardDisk /*= NULL*/)
2599{
2600 AssertReturn(!strLocation.isEmpty(), E_INVALIDARG);
2601
2602 // we use the hard disks map, but it is protected by the
2603 // hard disk _list_ lock handle
2604 AutoReadLock alock(m->allHardDisks.getLockHandle() COMMA_LOCKVAL_SRC_POS);
2605
2606 for (HardDiskMap::const_iterator it = m->mapHardDisks.begin();
2607 it != m->mapHardDisks.end();
2608 ++it)
2609 {
2610 const ComObjPtr<Medium> &pHD = (*it).second;
2611
2612 AutoCaller autoCaller(pHD);
2613 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2614 AutoWriteLock mlock(pHD COMMA_LOCKVAL_SRC_POS);
2615
2616 Utf8Str strLocationFull = pHD->getLocationFull();
2617
2618 if (0 == RTPathCompare(strLocationFull.c_str(), strLocation.c_str()))
2619 {
2620 if (aHardDisk)
2621 *aHardDisk = pHD;
2622 return S_OK;
2623 }
2624 }
2625
2626 if (aSetError)
2627 return setError(VBOX_E_OBJECT_NOT_FOUND,
2628 tr("Could not find an open hard disk with location '%s'"),
2629 strLocation.c_str());
2630
2631 return VBOX_E_OBJECT_NOT_FOUND;
2632}
2633
2634/**
2635 * Searches for a Medium object with the given ID or location in the list of
2636 * registered DVD or floppy images, depending on the @a mediumType argument.
2637 * If both ID and file path are specified, the first object that matches either
2638 * of them (not necessarily both) is returned.
2639 *
2640 * @param mediumType Must be either DeviceType_DVD or DeviceType_Floppy.
2641 * @param aId ID of the image file (unused when NULL).
2642 * @param aLocation Full path to the image file (unused when NULL).
2643 * @param aSetError If @c true, the appropriate error info is set in case when
2644 * the image is not found.
2645 * @param aImage Where to store the found image object (can be NULL).
2646 *
2647 * @return S_OK when found or E_INVALIDARG or VBOX_E_OBJECT_NOT_FOUND when not found.
2648 *
2649 * @note Locks the media tree for reading.
2650 */
2651HRESULT VirtualBox::findDVDOrFloppyImage(DeviceType_T mediumType,
2652 const Guid *aId,
2653 const Utf8Str &aLocation,
2654 bool aSetError,
2655 ComObjPtr<Medium> *aImage /* = NULL */)
2656{
2657 AssertReturn(aId || !aLocation.isEmpty(), E_INVALIDARG);
2658
2659 Utf8Str location;
2660 if (!aLocation.isEmpty())
2661 {
2662 int vrc = calculateFullPath(aLocation, location);
2663 if (RT_FAILURE(vrc))
2664 return setError(VBOX_E_FILE_ERROR,
2665 tr("Invalid image file location '%ls' (%Rrc)"),
2666 aLocation.c_str(),
2667 vrc);
2668 }
2669
2670 MediaOList *pMediaList;
2671
2672 switch (mediumType)
2673 {
2674 case DeviceType_DVD:
2675 pMediaList = &m->allDVDImages;
2676 break;
2677
2678 case DeviceType_Floppy:
2679 pMediaList = &m->allFloppyImages;
2680 break;
2681
2682 default:
2683 return E_INVALIDARG;
2684 }
2685
2686 AutoReadLock alock(pMediaList->getLockHandle() COMMA_LOCKVAL_SRC_POS);
2687
2688 bool found = false;
2689
2690 for (MediaList::const_iterator it = pMediaList->begin();
2691 it != pMediaList->end();
2692 ++it)
2693 {
2694 // no AutoCaller, registered image life time is bound to this
2695 Medium *pMedium = *it;
2696 AutoReadLock imageLock(pMedium COMMA_LOCKVAL_SRC_POS);
2697 const Utf8Str &strLocationFull = pMedium->getLocationFull();
2698
2699 found = ( aId
2700 && pMedium->getId() == *aId)
2701 || ( !aLocation.isEmpty()
2702 && RTPathCompare(location.c_str(),
2703 strLocationFull.c_str()) == 0);
2704 if (found)
2705 {
2706 if (pMedium->getDeviceType() != mediumType)
2707 {
2708 if (mediumType == DeviceType_DVD)
2709 return setError(E_INVALIDARG,
2710 "Cannot mount DVD medium '%s' as floppy", strLocationFull.c_str());
2711 else
2712 return setError(E_INVALIDARG,
2713 "Cannot mount floppy medium '%s' as DVD", strLocationFull.c_str());
2714 }
2715
2716 if (aImage)
2717 *aImage = pMedium;
2718 break;
2719 }
2720 }
2721
2722 HRESULT rc = found ? S_OK : VBOX_E_OBJECT_NOT_FOUND;
2723
2724 if (aSetError && !found)
2725 {
2726 if (aId)
2727 setError(rc,
2728 tr("Could not find an image file with UUID {%RTuuid} in the media registry ('%s')"),
2729 aId->raw(),
2730 m->strSettingsFilePath.c_str());
2731 else
2732 setError(rc,
2733 tr("Could not find an image file with location '%ls' in the media registry ('%s')"),
2734 aLocation.c_str(),
2735 m->strSettingsFilePath.c_str());
2736 }
2737
2738 return rc;
2739}
2740
2741/**
2742 * Searches for an IMedium object that represents the given UUID.
2743 *
2744 * If the UUID is empty (indicating an empty drive), this sets pMedium
2745 * to NULL and returns S_OK.
2746 *
2747 * If the UUID refers to a host drive of the given device type, this
2748 * sets pMedium to the object from the list in IHost and returns S_OK.
2749 *
2750 * If the UUID is an image file, this sets pMedium to the object that
2751 * findDVDOrFloppyImage() returned.
2752 *
2753 * If none of the above apply, this returns VBOX_E_OBJECT_NOT_FOUND.
2754 *
2755 * @param mediumType Must be DeviceType_DVD or DeviceType_Floppy.
2756 * @param uuid UUID to search for; must refer to a host drive or an image file or be null.
2757 * @param fRefresh Whether to refresh the list of host drives in IHost (see Host::getDrives())
2758 * @param pMedium out: IMedium object found.
2759 * @return
2760 */
2761HRESULT VirtualBox::findRemoveableMedium(DeviceType_T mediumType,
2762 const Guid &uuid,
2763 bool fRefresh,
2764 ComObjPtr<Medium> &pMedium)
2765{
2766 if (uuid.isEmpty())
2767 {
2768 // that's easy
2769 pMedium.setNull();
2770 return S_OK;
2771 }
2772
2773 // first search for host drive with that UUID
2774 HRESULT rc = m->pHost->findHostDrive(mediumType,
2775 uuid,
2776 fRefresh,
2777 pMedium);
2778 if (rc == VBOX_E_OBJECT_NOT_FOUND)
2779 // then search for an image with that UUID
2780 rc = findDVDOrFloppyImage(mediumType, &uuid, Utf8Str::Empty, true /* aSetError */, &pMedium);
2781
2782 return rc;
2783}
2784
2785HRESULT VirtualBox::findGuestOSType(const Bstr &bstrOSType,
2786 GuestOSType*& pGuestOSType)
2787{
2788 /* Look for a GuestOSType object */
2789 AssertMsg(m->allGuestOSTypes.size() != 0,
2790 ("Guest OS types array must be filled"));
2791
2792 if (bstrOSType.isEmpty())
2793 {
2794 pGuestOSType = NULL;
2795 return S_OK;
2796 }
2797
2798 AutoReadLock alock(m->allGuestOSTypes.getLockHandle() COMMA_LOCKVAL_SRC_POS);
2799 for (GuestOSTypesOList::const_iterator it = m->allGuestOSTypes.begin();
2800 it != m->allGuestOSTypes.end();
2801 ++it)
2802 {
2803 if ((*it)->id() == bstrOSType)
2804 {
2805 pGuestOSType = *it;
2806 return S_OK;
2807 }
2808 }
2809
2810 return setError(VBOX_E_OBJECT_NOT_FOUND,
2811 tr("Guest OS type '%ls' is invalid"),
2812 bstrOSType.raw());
2813}
2814
2815/**
2816 * Returns the pseudo-machine UUID that is created on each VirtualBox startup
2817 * and that is used to identify the global media registry.
2818 *
2819 * Starting with VirtualBox 4.0 each medium remembers in its instance data
2820 * in which media registry it is saved (if any): this can either be a machine
2821 * UUID, if it's in a per-machine media registry, or this global ID.
2822 *
2823 * This UUID is only used to identify the VirtualBox object while VirtualBox
2824 * is running. It is not saved anywhere and thus gets recreated with every
2825 * VirtualBox startup.
2826 *
2827 * @return
2828 */
2829const Guid& VirtualBox::getGlobalRegistryId() const
2830{
2831 return m->uuidMediaRegistry;
2832}
2833
2834const ComObjPtr<Host>& VirtualBox::host() const
2835{
2836 return m->pHost;
2837}
2838
2839SystemProperties* VirtualBox::getSystemProperties() const
2840{
2841 return m->pSystemProperties;
2842}
2843
2844#ifdef VBOX_WITH_RESOURCE_USAGE_API
2845const ComObjPtr<PerformanceCollector>& VirtualBox::performanceCollector() const
2846{
2847 return m->pPerformanceCollector;
2848}
2849#endif /* VBOX_WITH_RESOURCE_USAGE_API */
2850
2851/**
2852 * Returns the default machine folder from the system properties
2853 * with proper locking.
2854 * @return
2855 */
2856void VirtualBox::getDefaultMachineFolder(Utf8Str &str) const
2857{
2858 AutoReadLock propsLock(m->pSystemProperties COMMA_LOCKVAL_SRC_POS);
2859 str = m->pSystemProperties->m->strDefaultMachineFolder;
2860}
2861
2862/**
2863 * Returns the default hard disk format from the system properties
2864 * with proper locking.
2865 * @return
2866 */
2867void VirtualBox::getDefaultHardDiskFormat(Utf8Str &str) const
2868{
2869 AutoReadLock propsLock(m->pSystemProperties COMMA_LOCKVAL_SRC_POS);
2870 str = m->pSystemProperties->m->strDefaultHardDiskFormat;
2871}
2872
2873const Utf8Str& VirtualBox::homeDir() const
2874{
2875 return m->strHomeDir;
2876}
2877
2878/**
2879 * Calculates the absolute path of the given path taking the VirtualBox home
2880 * directory as the current directory.
2881 *
2882 * @param aPath Path to calculate the absolute path for.
2883 * @param aResult Where to put the result (used only on success, can be the
2884 * same Utf8Str instance as passed in @a aPath).
2885 * @return IPRT result.
2886 *
2887 * @note Doesn't lock any object.
2888 */
2889int VirtualBox::calculateFullPath(const Utf8Str &strPath, Utf8Str &aResult)
2890{
2891 AutoCaller autoCaller(this);
2892 AssertComRCReturn(autoCaller.rc(), VERR_GENERAL_FAILURE);
2893
2894 /* no need to lock since mHomeDir is const */
2895
2896 char folder[RTPATH_MAX];
2897 int vrc = RTPathAbsEx(m->strHomeDir.c_str(),
2898 strPath.c_str(),
2899 folder,
2900 sizeof(folder));
2901 if (RT_SUCCESS(vrc))
2902 aResult = folder;
2903
2904 return vrc;
2905}
2906
2907/**
2908 * Copies strSource to strTarget, making it relative to the VirtualBox config folder
2909 * if it is a subdirectory thereof, or simply copying it otherwise.
2910 *
2911 * @param strSource Path to evalue and copy.
2912 * @param strTarget Buffer to receive target path.
2913 */
2914void VirtualBox::copyPathRelativeToConfig(const Utf8Str &strSource,
2915 Utf8Str &strTarget)
2916{
2917 AutoCaller autoCaller(this);
2918 AssertComRCReturnVoid(autoCaller.rc());
2919
2920 // no need to lock since mHomeDir is const
2921
2922 // use strTarget as a temporary buffer to hold the machine settings dir
2923 strTarget = m->strHomeDir;
2924 if (RTPathStartsWith(strSource.c_str(), strTarget.c_str()))
2925 // is relative: then append what's left
2926 strTarget.append(strSource.c_str() + strTarget.length()); // include '/'
2927 else
2928 // is not relative: then overwrite
2929 strTarget = strSource;
2930}
2931
2932// private methods
2933/////////////////////////////////////////////////////////////////////////////
2934
2935/**
2936 * Checks if there is a hard disk, DVD or floppy image with the given ID or
2937 * location already registered.
2938 *
2939 * On return, sets @a aConflict to the string describing the conflicting medium,
2940 * or sets it to @c Null if no conflicting media is found. Returns S_OK in
2941 * either case. A failure is unexpected.
2942 *
2943 * @param aId UUID to check.
2944 * @param aLocation Location to check.
2945 * @param aConflict Where to return parameters of the conflicting medium.
2946 *
2947 * @note Locks the media tree and media objects for reading.
2948 */
2949HRESULT VirtualBox::checkMediaForConflicts(const Guid &aId,
2950 const Utf8Str &aLocation,
2951 Utf8Str &aConflict,
2952 bool &fIdentical)
2953{
2954 aConflict.setNull();
2955
2956 AssertReturn(!aId.isEmpty() && !aLocation.isEmpty(), E_FAIL);
2957
2958 AutoReadLock alock(getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
2959
2960 HRESULT rc = S_OK;
2961
2962 aConflict.setNull();
2963 fIdentical = false;
2964
2965 ComObjPtr<Medium> pMediumFound;
2966 const char *pcszType = NULL;
2967
2968 if (!aId.isEmpty())
2969 rc = findHardDiskById(aId, false /* aSetError */, &pMediumFound);
2970 if (FAILED(rc) && !aLocation.isEmpty())
2971 rc = findHardDiskByLocation(aLocation, false /* aSetError */, &pMediumFound);
2972 if (SUCCEEDED(rc))
2973 pcszType = tr("hard disk");
2974
2975 if (!pcszType)
2976 {
2977 rc = findDVDOrFloppyImage(DeviceType_DVD, &aId, aLocation, false /* aSetError */, &pMediumFound);
2978 if (SUCCEEDED(rc))
2979 pcszType = tr("CD/DVD image");
2980 }
2981
2982 if (!pcszType)
2983 {
2984 rc = findDVDOrFloppyImage(DeviceType_Floppy, &aId, aLocation, false /* aSetError */, &pMediumFound);
2985 if (SUCCEEDED(rc))
2986 pcszType = tr("floppy image");
2987 }
2988
2989 if (pcszType && pMediumFound)
2990 {
2991 /* Note: no AutoCaller since bound to this */
2992 AutoReadLock mlock(pMediumFound COMMA_LOCKVAL_SRC_POS);
2993
2994 Utf8Str strLocFound = pMediumFound->getLocationFull();
2995 Guid idFound = pMediumFound->getId();
2996
2997 if ( (strLocFound == aLocation)
2998 && (idFound == aId)
2999 )
3000 fIdentical = true;
3001
3002 aConflict = Utf8StrFmt(tr("%s '%s' with UUID {%RTuuid}"),
3003 pcszType,
3004 strLocFound.c_str(),
3005 idFound.raw());
3006 }
3007
3008 return S_OK;
3009}
3010
3011/**
3012 * Called from Machine::prepareSaveSettings() when it has detected
3013 * that a machine has been renamed. Such renames will require
3014 * updating the global media registry during the
3015 * VirtualBox::saveSettings() that follows later.
3016*
3017 * When a machine is renamed, there may well be media (in particular,
3018 * diff images for snapshots) in the global registry that will need
3019 * to have their paths updated. Before 3.2, Machine::saveSettings
3020 * used to call VirtualBox::saveSettings implicitly, which was both
3021 * unintuitive and caused locking order problems. Now, we remeber
3022 * such pending name changes with this method so that
3023 * VirtualBox::saveSettings() can process them properly.
3024 */
3025void VirtualBox::rememberMachineNameChangeForMedia(const Utf8Str &strOldConfigDir,
3026 const Utf8Str &strNewConfigDir)
3027{
3028 AutoWriteLock mediaLock(getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
3029
3030 Data::PendingMachineRename pmr;
3031 pmr.strConfigDirOld = strOldConfigDir;
3032 pmr.strConfigDirNew = strNewConfigDir;
3033 m->llPendingMachineRenames.push_back(pmr);
3034}
3035
3036/**
3037 * Goes through all known media (hard disks, floppies and DVDs) and saves
3038 * those into the given settings::MediaRegistry structures whose registry
3039 * ID match the given UUID.
3040 *
3041 * This gets called from two contexts:
3042 *
3043 * -- VirtualBox::saveSettings() with the UUID of the global registry
3044 * (VirtualBox::Data.uuidRegistry); this will save those media
3045 * which had been loaded from the global registry or have been
3046 * attached to a "legacy" machine which can't save its own registry;
3047 *
3048 * -- Machine::saveSettings() with the UUID of a machine, if a medium
3049 * has been attached to a machine created with VirtualBox 4.0 or later.
3050 *
3051 * Media which have only been temporarily opened without having been
3052 * attached to a machine have a NULL registry UUID and therefore don't
3053 * get saved.
3054 *
3055 * This throws HRESULT on errors!
3056 *
3057 * @param mediaRegistry Settings structure to fill.
3058 * @param uuidRegistry The UUID of the media registry; either a machine UUID (if machine registry) or the UUID of the global registry.
3059 * @param hardDiskFolder The machine folder for relative paths, if machine registry, or an empty string otherwise.
3060 */
3061void VirtualBox::saveMediaRegistry(settings::MediaRegistry &mediaRegistry,
3062 const Guid &uuidRegistry,
3063 const Utf8Str &strMachineFolder)
3064{
3065 HRESULT rc;
3066 // hard disks
3067 mediaRegistry.llHardDisks.clear();
3068 for (MediaList::const_iterator it = m->allHardDisks.begin();
3069 it != m->allHardDisks.end();
3070 ++it)
3071 {
3072 Medium *pMedium = *it;
3073 if (pMedium->isInRegistry(uuidRegistry))
3074 {
3075 settings::Medium med;
3076 rc = pMedium->saveSettings(med, strMachineFolder); // this recurses into its children
3077 if (FAILED(rc)) throw rc;
3078 mediaRegistry.llHardDisks.push_back(med);
3079 }
3080 }
3081
3082 // CD/DVD images
3083 mediaRegistry.llDvdImages.clear();
3084 for (MediaList::const_iterator it = m->allDVDImages.begin();
3085 it != m->allDVDImages.end();
3086 ++it)
3087 {
3088 Medium *pMedium = *it;
3089 if (pMedium->isInRegistry(uuidRegistry))
3090 {
3091 settings::Medium med;
3092 rc = pMedium->saveSettings(med, strMachineFolder);
3093 if (FAILED(rc)) throw rc;
3094 mediaRegistry.llDvdImages.push_back(med);
3095 }
3096 }
3097
3098 // floppy images
3099 mediaRegistry.llFloppyImages.clear();
3100 for (MediaList::const_iterator it = m->allFloppyImages.begin();
3101 it != m->allFloppyImages.end();
3102 ++it)
3103 {
3104 Medium *pMedium = *it;
3105 if (pMedium->isInRegistry(uuidRegistry))
3106 {
3107 settings::Medium med;
3108 rc = pMedium->saveSettings(med, strMachineFolder);
3109 if (FAILED(rc)) throw rc;
3110 mediaRegistry.llFloppyImages.push_back(med);
3111 }
3112 }
3113}
3114
3115/**
3116 * Helper function which actually writes out VirtualBox.xml, the main configuration file.
3117 * Gets called from the public VirtualBox::SaveSettings() as well as from various other
3118 * places internally when settings need saving.
3119 *
3120 * @note Caller must have locked the VirtualBox object for writing and must not hold any
3121 * other locks since this locks all kinds of member objects and trees temporarily,
3122 * which could cause conflicts.
3123 */
3124HRESULT VirtualBox::saveSettings()
3125{
3126 AutoCaller autoCaller(this);
3127 AssertComRCReturn(autoCaller.rc(), autoCaller.rc());
3128
3129 AssertReturn(isWriteLockOnCurrentThread(), E_FAIL);
3130 AssertReturn(!m->strSettingsFilePath.isEmpty(), E_FAIL);
3131
3132 HRESULT rc = S_OK;
3133
3134 try
3135 {
3136 // machines
3137 m->pMainConfigFile->llMachines.clear();
3138 {
3139 AutoReadLock machinesLock(m->allMachines.getLockHandle() COMMA_LOCKVAL_SRC_POS);
3140 for (MachinesOList::iterator it = m->allMachines.begin();
3141 it != m->allMachines.end();
3142 ++it)
3143 {
3144 Machine *pMachine = *it;
3145 // save actual machine registry entry
3146 settings::MachineRegistryEntry mre;
3147 rc = pMachine->saveRegistryEntry(mre);
3148 m->pMainConfigFile->llMachines.push_back(mre);
3149 }
3150 }
3151
3152 // lock all media for the following; use a write lock because we're
3153 // modifying the PendingMachineRenamesList, which is protected by this
3154 AutoWriteLock mediaLock(getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
3155
3156 // if a machine was renamed, then we'll need to refresh media paths
3157 if (m->llPendingMachineRenames.size())
3158 {
3159 // make a single list from the three media lists so we don't need three loops
3160 MediaList llAllMedia;
3161 // with hard disks, we must use the map, not the list, because the list only has base images
3162 for (HardDiskMap::iterator it = m->mapHardDisks.begin(); it != m->mapHardDisks.end(); ++it)
3163 llAllMedia.push_back(it->second);
3164 for (MediaList::iterator it = m->allDVDImages.begin(); it != m->allDVDImages.end(); ++it)
3165 llAllMedia.push_back(*it);
3166 for (MediaList::iterator it = m->allFloppyImages.begin(); it != m->allFloppyImages.end(); ++it)
3167 llAllMedia.push_back(*it);
3168
3169 for (MediaList::iterator it = llAllMedia.begin();
3170 it != llAllMedia.end();
3171 ++it)
3172 {
3173 Medium *pMedium = *it;
3174 for (Data::PendingMachineRenamesList::iterator it2 = m->llPendingMachineRenames.begin();
3175 it2 != m->llPendingMachineRenames.end();
3176 ++it2)
3177 {
3178 // is medium in global registry:?
3179 if (pMedium->isInRegistry(m->uuidMediaRegistry))
3180 {
3181 const Data::PendingMachineRename &pmr = *it2;
3182 pMedium->updatePath(pmr.strConfigDirOld,
3183 pmr.strConfigDirNew);
3184 }
3185 }
3186 }
3187 // done, don't do it again until we have more machine renames
3188 m->llPendingMachineRenames.clear();
3189 }
3190
3191 saveMediaRegistry(m->pMainConfigFile->mediaRegistry,
3192 m->uuidMediaRegistry, // global media registry ID
3193 Utf8Str::Empty); // strMachineFolder
3194
3195 mediaLock.release();
3196
3197 m->pMainConfigFile->llDhcpServers.clear();
3198 {
3199 AutoReadLock dhcpLock(m->allDHCPServers.getLockHandle() COMMA_LOCKVAL_SRC_POS);
3200 for (DHCPServersOList::const_iterator it = m->allDHCPServers.begin();
3201 it != m->allDHCPServers.end();
3202 ++it)
3203 {
3204 settings::DHCPServer d;
3205 rc = (*it)->saveSettings(d);
3206 if (FAILED(rc)) throw rc;
3207 m->pMainConfigFile->llDhcpServers.push_back(d);
3208 }
3209 }
3210
3211 // leave extra data alone, it's still in the config file
3212
3213 // host data (USB filters)
3214 rc = m->pHost->saveSettings(m->pMainConfigFile->host);
3215 if (FAILED(rc)) throw rc;
3216
3217 rc = m->pSystemProperties->saveSettings(m->pMainConfigFile->systemProperties);
3218 if (FAILED(rc)) throw rc;
3219
3220 // and write out the XML, still under the lock
3221 m->pMainConfigFile->write(m->strSettingsFilePath);
3222 }
3223 catch (HRESULT err)
3224 {
3225 /* we assume that error info is set by the thrower */
3226 rc = err;
3227 }
3228 catch (...)
3229 {
3230 rc = VirtualBox::handleUnexpectedExceptions(RT_SRC_POS);
3231 }
3232
3233 return rc;
3234}
3235
3236/**
3237 * Helper to register the machine.
3238 *
3239 * When called during VirtualBox startup, adds the given machine to the
3240 * collection of registered machines. Otherwise tries to mark the machine
3241 * as registered, and, if succeeded, adds it to the collection and
3242 * saves global settings.
3243 *
3244 * @note The caller must have added itself as a caller of the @a aMachine
3245 * object if calls this method not on VirtualBox startup.
3246 *
3247 * @param aMachine machine to register
3248 *
3249 * @note Locks objects!
3250 */
3251HRESULT VirtualBox::registerMachine(Machine *aMachine)
3252{
3253 ComAssertRet(aMachine, E_INVALIDARG);
3254
3255 AutoCaller autoCaller(this);
3256 if (FAILED(autoCaller.rc())) return autoCaller.rc();
3257
3258 HRESULT rc = S_OK;
3259
3260 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3261
3262 {
3263 ComObjPtr<Machine> pMachine;
3264 rc = findMachine(aMachine->getId(),
3265 true /* fPermitInaccessible */,
3266 false /* aDoSetError */,
3267 &pMachine);
3268 if (SUCCEEDED(rc))
3269 {
3270 /* sanity */
3271 AutoLimitedCaller machCaller(pMachine);
3272 AssertComRC(machCaller.rc());
3273
3274 return setError(E_INVALIDARG,
3275 tr("Registered machine with UUID {%RTuuid} ('%s') already exists"),
3276 aMachine->getId().raw(),
3277 pMachine->getSettingsFileFull().c_str());
3278 }
3279
3280 ComAssertRet(rc == VBOX_E_OBJECT_NOT_FOUND, rc);
3281 rc = S_OK;
3282 }
3283
3284 if (autoCaller.state() != InInit)
3285 {
3286 rc = aMachine->prepareRegister();
3287 if (FAILED(rc)) return rc;
3288 }
3289
3290 /* add to the collection of registered machines */
3291 m->allMachines.addChild(aMachine);
3292
3293 if (autoCaller.state() != InInit)
3294 rc = saveSettings();
3295
3296 return rc;
3297}
3298
3299/**
3300 * Remembers the given hard disk by storing it in either the global hard disk registry
3301 * or a machine one.
3302 *
3303 * @note Caller must hold the media tree lock for writing; in addition, this locks @a aHardDisk for reading
3304 *
3305 * @param aHardDisk Hard disk object to remember.
3306 * @param uuidMachineRegistry UUID of machine whose registry should be used, or a NULL UUID for the global registry.
3307 * @param pfNeedsGlobalSaveSettings Optional pointer to a bool that must have been initialized to false and that will be set to true
3308 * by this function if the caller should invoke VirtualBox::saveSettings() because the global settings have changed.
3309 * @return
3310 */
3311HRESULT VirtualBox::registerHardDisk(Medium *pMedium,
3312 bool *pfNeedsGlobalSaveSettings)
3313{
3314 AssertReturn(pMedium != NULL, E_INVALIDARG);
3315
3316 AutoCaller autoCaller(this);
3317 AssertComRCReturn(autoCaller.rc(), autoCaller.rc());
3318
3319 AutoCaller hardDiskCaller(pMedium);
3320 AssertComRCReturn(hardDiskCaller.rc(), hardDiskCaller.rc());
3321
3322 // caller must hold the media tree write lock
3323 Assert(getMediaTreeLockHandle().isWriteLockOnCurrentThread());
3324
3325 Guid id;
3326 Utf8Str strLocationFull;
3327 ComObjPtr<Medium> pParent;
3328 {
3329 AutoReadLock hardDiskLock(pMedium COMMA_LOCKVAL_SRC_POS);
3330 id = pMedium->getId();
3331 strLocationFull = pMedium->getLocationFull();
3332 pParent = pMedium->getParent();
3333 }
3334
3335 HRESULT rc;
3336
3337 Utf8Str strConflict;
3338 bool fIdentical;
3339 rc = checkMediaForConflicts(id,
3340 strLocationFull,
3341 strConflict,
3342 fIdentical);
3343 if (FAILED(rc)) return rc;
3344
3345 if (!fIdentical)
3346 {
3347 if (strConflict.length())
3348 return setError(E_INVALIDARG,
3349 tr("Cannot register the hard disk '%s' {%RTuuid} because a %s already exists"),
3350 strLocationFull.c_str(),
3351 id.raw(),
3352 strConflict.c_str(),
3353 m->strSettingsFilePath.c_str());
3354
3355 // store base (root) hard disks in the list
3356 if (pParent.isNull())
3357 m->allHardDisks.getList().push_back(pMedium);
3358 // access the list directly because we already locked the list above
3359
3360 // store all hard disks (even differencing images) in the map
3361 m->mapHardDisks[id] = pMedium;
3362
3363 if (pfNeedsGlobalSaveSettings)
3364 // global settings need saving only if the medium is to be saved in the global registry
3365 if (pMedium->isInRegistry(m->uuidMediaRegistry))
3366 *pfNeedsGlobalSaveSettings = true;
3367 }
3368
3369 return rc;
3370}
3371
3372/**
3373 * Removes the given hard disk from the hard disk registry.
3374 *
3375 * @param aHardDisk Hard disk object to remove.
3376 * @param pfNeedsGlobalSaveSettings Optional pointer to a bool that must have been initialized to false and that will be set to true
3377 * by this function if the caller should invoke VirtualBox::saveSettings() because the global settings have changed.
3378 *
3379 * @note Caller must hold the media tree lock for writing; in addition, this locks @a aHardDisk for reading
3380 */
3381HRESULT VirtualBox::unregisterHardDisk(Medium *aHardDisk,
3382 bool *pfNeedsGlobalSaveSettings)
3383{
3384 AssertReturn(aHardDisk != NULL, E_INVALIDARG);
3385
3386 AutoCaller autoCaller(this);
3387 AssertComRCReturn(autoCaller.rc(), autoCaller.rc());
3388
3389 AutoCaller hardDiskCaller(aHardDisk);
3390 AssertComRCReturn(hardDiskCaller.rc(), hardDiskCaller.rc());
3391
3392 // caller must hold the media tree write lock
3393 Assert(getMediaTreeLockHandle().isWriteLockOnCurrentThread());
3394
3395 Guid id;
3396 ComObjPtr<Medium> pParent;
3397 {
3398 AutoReadLock hardDiskLock(aHardDisk COMMA_LOCKVAL_SRC_POS);
3399 id = aHardDisk->getId();
3400 pParent = aHardDisk->getParent();
3401 }
3402
3403 // remove base (root) hard disks from the list
3404 if (pParent.isNull())
3405 m->allHardDisks.getList().remove(aHardDisk);
3406 // access the list directly because caller must have locked the list
3407
3408 // remove all hard disks (even differencing images) from map
3409 size_t cnt = m->mapHardDisks.erase(id);
3410 Assert(cnt == 1);
3411 NOREF(cnt);
3412
3413 if (pfNeedsGlobalSaveSettings)
3414 // global settings need saving only if the medium is to be saved in the global registry
3415 if (aHardDisk->isInRegistry(m->uuidMediaRegistry))
3416 *pfNeedsGlobalSaveSettings = true;
3417
3418 return S_OK;
3419}
3420
3421/**
3422 * Remembers the given image by storing it in the CD/DVD or floppy image registry.
3423 *
3424 * @param argImage Image object to remember.
3425 * @param argType Either DeviceType_DVD or DeviceType_Floppy.
3426 * @param uuidMachineRegistry UUID of machine whose registry should be used, or a NULL UUID for the global registry.
3427 * @param pfNeedsGlobalSaveSettings Optional pointer to a bool that must have been initialized to false and that will be set to true
3428 * by this function if the caller should invoke VirtualBox::saveSettings() because the global settings have changed.
3429 *
3430 * @note Caller must hold the media tree lock for writing; in addition, this locks @a argImage for reading
3431 */
3432HRESULT VirtualBox::registerImage(Medium *pMedium,
3433 DeviceType_T argType,
3434 bool *pfNeedsGlobalSaveSettings)
3435{
3436 AssertReturn(pMedium != NULL, E_INVALIDARG);
3437
3438 AutoCaller autoCaller(this);
3439 AssertComRCReturn(autoCaller.rc(), autoCaller.rc());
3440
3441 AutoCaller imageCaller(pMedium);
3442 AssertComRCReturn(imageCaller.rc(), imageCaller.rc());
3443
3444 // caller must hold the media tree write lock
3445 Assert(getMediaTreeLockHandle().isWriteLockOnCurrentThread());
3446
3447 Guid id;
3448 Utf8Str strLocationFull;
3449 ComObjPtr<Medium> pParent;
3450 {
3451 AutoReadLock al(pMedium COMMA_LOCKVAL_SRC_POS);
3452 id = pMedium->getId();
3453 strLocationFull = pMedium->getLocationFull();
3454 pParent = pMedium->getParent();
3455 }
3456
3457 // work on DVDs or floppies list?
3458 ObjectsList<Medium> &all = (argType == DeviceType_DVD) ? m->allDVDImages : m->allFloppyImages;
3459
3460 HRESULT rc;
3461 // lock the images lists (list + map) while checking for conflicts
3462 AutoWriteLock al(all.getLockHandle() COMMA_LOCKVAL_SRC_POS);
3463
3464 Utf8Str strConflict;
3465 bool fIdentical;
3466 rc = checkMediaForConflicts(id,
3467 strLocationFull,
3468 strConflict,
3469 fIdentical);
3470 if (FAILED(rc)) return rc;
3471
3472 if (!fIdentical)
3473 {
3474 if (strConflict.length())
3475 return setError(VBOX_E_INVALID_OBJECT_STATE,
3476 tr("Cannot register the image '%s' with UUID {%RTuuid} because a %s already exists"),
3477 strLocationFull.c_str(),
3478 id.raw(),
3479 strConflict.c_str());
3480
3481 // add to the collection
3482 all.getList().push_back(pMedium);
3483 // access the list directly because we already locked the list above
3484
3485 if (pfNeedsGlobalSaveSettings)
3486 // global settings need saving only if the medium is to be saved in the global registry
3487 if (pMedium->isInRegistry(m->uuidMediaRegistry))
3488 *pfNeedsGlobalSaveSettings = true;
3489 }
3490
3491 return rc;
3492}
3493
3494/**
3495 * Removes the given image from the CD/DVD or floppy image registry.
3496 *
3497 * @param argImage Image object to remove.
3498 * @param argType Either DeviceType_DVD or DeviceType_Floppy.
3499 * @param pfNeedsGlobalSaveSettings Optional pointer to a bool that must have been initialized to false and that will be set to true
3500 * by this function if the caller should invoke VirtualBox::saveSettings() because the global settings have changed.
3501 *
3502 * @note Caller must hold the media tree lock for writing; in addition, this locks @a argImage for reading
3503 */
3504HRESULT VirtualBox::unregisterImage(Medium *argImage,
3505 DeviceType_T argType,
3506 bool *pfNeedsGlobalSaveSettings)
3507{
3508 AssertReturn(argImage != NULL, E_INVALIDARG);
3509
3510 AutoCaller autoCaller(this);
3511 AssertComRCReturn(autoCaller.rc(), autoCaller.rc());
3512
3513 AutoCaller imageCaller(argImage);
3514 AssertComRCReturn(imageCaller.rc(), imageCaller.rc());
3515
3516 // caller must hold the media tree write lock
3517 Assert(getMediaTreeLockHandle().isWriteLockOnCurrentThread());
3518
3519 Guid id;
3520 ComObjPtr<Medium> pParent;
3521 {
3522 AutoReadLock al(argImage COMMA_LOCKVAL_SRC_POS);
3523 id = argImage->getId();
3524 pParent = argImage->getParent();
3525 }
3526
3527 // work on DVDs or floppies list?
3528 ObjectsList<Medium> &all = (argType == DeviceType_DVD) ? m->allDVDImages : m->allFloppyImages;
3529
3530 // access the list directly because the caller must have requested the lock
3531 all.getList().remove(argImage);
3532
3533 HRESULT rc = S_OK;
3534
3535 if (pfNeedsGlobalSaveSettings)
3536 // global settings need saving only if the medium is to be saved in the global registry
3537 if (argImage->isInRegistry(m->uuidMediaRegistry))
3538 *pfNeedsGlobalSaveSettings = true;
3539
3540 return rc;
3541}
3542
3543/**
3544 * Little helper called from unregisterMachineMedia() to recursively add media to the given list,
3545 * with children appearing before their parents.
3546 * @param llMedia
3547 * @param pMedium
3548 */
3549void VirtualBox::pushMediumToListWithChildren(MediaList &llMedia, Medium *pMedium)
3550{
3551 // recurse first, then add ourselves; this way children end up on the
3552 // list before their parents
3553
3554 const MediaList &llChildren = pMedium->getChildren();
3555 for (MediaList::const_iterator it = llChildren.begin();
3556 it != llChildren.end();
3557 ++it)
3558 {
3559 Medium *pChild = *it;
3560 pushMediumToListWithChildren(llMedia, pChild);
3561 }
3562
3563 Log(("Pushing medium %RTuuid\n", pMedium->getId().raw()));
3564 llMedia.push_back(pMedium);
3565}
3566
3567/**
3568 * Unregisters all Medium objects which belong to the given machine registry.
3569 * Gets called from Machine::uninit() just before the machine object dies
3570 * and must only be called with a machine UUID as the registry ID.
3571 *
3572 * Locks the media tree.
3573 *
3574 * @param uuidMachine Medium registry ID (always a machine UUID)
3575 * @return
3576 */
3577HRESULT VirtualBox::unregisterMachineMedia(const Guid &uuidMachine)
3578{
3579 Assert(!uuidMachine.isEmpty());
3580
3581 LogFlowFuncEnter();
3582
3583 AutoCaller autoCaller(this);
3584 AssertComRCReturn(autoCaller.rc(), autoCaller.rc());
3585
3586 MediaList llMedia2Close;
3587
3588 {
3589 AutoWriteLock mlock(getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
3590 for (MediaOList::iterator it = m->allHardDisks.getList().begin();
3591 it != m->allHardDisks.getList().end();
3592 ++it)
3593 {
3594 ComObjPtr<Medium> pMedium = *it;
3595
3596 if (pMedium->isInRegistry(uuidMachine))
3597 // recursively with children first
3598 pushMediumToListWithChildren(llMedia2Close, pMedium);
3599 }
3600 }
3601
3602 for (MediaList::iterator it = llMedia2Close.begin();
3603 it != llMedia2Close.end();
3604 ++it)
3605 {
3606 ComObjPtr<Medium> pMedium = *it;
3607 Log(("Closing medium %RTuuid\n", pMedium->getId().raw()));
3608 AutoCaller mac(pMedium);
3609 pMedium->close(NULL /* pfNeedsGlobalSaveSettings*/, mac);
3610 }
3611
3612 LogFlowFuncLeave();
3613
3614 return S_OK;
3615}
3616
3617/**
3618 * Removes the given machine object from the internal list of registered machines.
3619 * Called from Machine::Unregister().
3620 * @param pMachine
3621 * @param id UUID of the machine. Must be passed by caller because machine may be dead by this time.
3622 * @return
3623 */
3624HRESULT VirtualBox::unregisterMachine(Machine *pMachine,
3625 const Guid &id)
3626{
3627 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3628
3629 // remove from the collection of registered machines
3630 m->allMachines.removeChild(pMachine);
3631
3632 // save the global registry
3633 HRESULT rc = saveSettings();
3634
3635 alock.release();
3636
3637 /* fire an event */
3638 onMachineRegistered(id, FALSE);
3639
3640 return rc;
3641}
3642
3643/**
3644 * Creates the path to the specified file according to the path information
3645 * present in the file name.
3646 *
3647 * Note that the given file name must contain the full path otherwise the
3648 * extracted relative path will be created based on the current working
3649 * directory which is normally unknown.
3650 *
3651 * @param aFileName Full file name which path needs to be created.
3652 *
3653 * @return Extended error information on failure to create the path.
3654 */
3655/* static */
3656HRESULT VirtualBox::ensureFilePathExists(const Utf8Str &strFileName)
3657{
3658 Utf8Str strDir(strFileName);
3659 strDir.stripFilename();
3660 if (!RTDirExists(strDir.c_str()))
3661 {
3662 int vrc = RTDirCreateFullPath(strDir.c_str(), 0777);
3663 if (RT_FAILURE(vrc))
3664 return setErrorStatic(E_FAIL,
3665 Utf8StrFmt(tr("Could not create the directory '%s' (%Rrc)"),
3666 strDir.c_str(),
3667 vrc));
3668 }
3669
3670 return S_OK;
3671}
3672
3673/**
3674 * Handles unexpected exceptions by turning them into COM errors in release
3675 * builds or by hitting a breakpoint in the release builds.
3676 *
3677 * Usage pattern:
3678 * @code
3679 try
3680 {
3681 // ...
3682 }
3683 catch (LaLalA)
3684 {
3685 // ...
3686 }
3687 catch (...)
3688 {
3689 rc = VirtualBox::handleUnexpectedExceptions (RT_SRC_POS);
3690 }
3691 * @endcode
3692 *
3693 * @param RT_SRC_POS_DECL "RT_SRC_POS" macro instantiation.
3694 */
3695/* static */
3696HRESULT VirtualBox::handleUnexpectedExceptions(RT_SRC_POS_DECL)
3697{
3698 try
3699 {
3700 /* re-throw the current exception */
3701 throw;
3702 }
3703 catch (const iprt::Error &err) // includes all XML exceptions
3704 {
3705 return setErrorStatic(E_FAIL,
3706 Utf8StrFmt(tr("%s.\n%s[%d] (%s)"),
3707 err.what(),
3708 pszFile, iLine, pszFunction).c_str());
3709 }
3710 catch (const std::exception &err)
3711 {
3712 return setErrorStatic(E_FAIL,
3713 Utf8StrFmt(tr("Unexpected exception: %s [%s]\n%s[%d] (%s)"),
3714 err.what(), typeid(err).name(),
3715 pszFile, iLine, pszFunction).c_str());
3716 }
3717 catch (...)
3718 {
3719 return setErrorStatic(E_FAIL,
3720 Utf8StrFmt(tr("Unknown exception\n%s[%d] (%s)"),
3721 pszFile, iLine, pszFunction).c_str());
3722 }
3723
3724 /* should not get here */
3725 AssertFailed();
3726 return E_FAIL;
3727}
3728
3729const Utf8Str& VirtualBox::settingsFilePath()
3730{
3731 return m->strSettingsFilePath;
3732}
3733
3734/**
3735 * Returns the lock handle which protects the media trees (hard disks,
3736 * DVDs, floppies). As opposed to version 3.1 and earlier, these lists
3737 * are no longer protected by the VirtualBox lock, but by this more
3738 * specialized lock. Mind the locking order: always request this lock
3739 * after the VirtualBox object lock but before the locks of the media
3740 * objects contained in these lists. See AutoLock.h.
3741 */
3742RWLockHandle& VirtualBox::getMediaTreeLockHandle()
3743{
3744 return m->lockMedia;
3745}
3746
3747/**
3748 * Thread function that watches the termination of all client processes
3749 * that have opened sessions using IMachine::LockMachine()
3750 */
3751// static
3752DECLCALLBACK(int) VirtualBox::ClientWatcher(RTTHREAD /* thread */, void *pvUser)
3753{
3754 LogFlowFuncEnter();
3755
3756 VirtualBox *that = (VirtualBox*)pvUser;
3757 Assert(that);
3758
3759 typedef std::vector< ComObjPtr<Machine> > MachineVector;
3760 typedef std::vector< ComObjPtr<SessionMachine> > SessionMachineVector;
3761
3762 SessionMachineVector machines;
3763 MachineVector spawnedMachines;
3764
3765 size_t cnt = 0;
3766 size_t cntSpawned = 0;
3767
3768#if defined(RT_OS_WINDOWS)
3769
3770 HRESULT hrc = CoInitializeEx(NULL,
3771 COINIT_MULTITHREADED | COINIT_DISABLE_OLE1DDE |
3772 COINIT_SPEED_OVER_MEMORY);
3773 AssertComRC(hrc);
3774
3775 /// @todo (dmik) processes reaping!
3776
3777 HANDLE handles[MAXIMUM_WAIT_OBJECTS];
3778 handles[0] = that->m->updateReq;
3779
3780 do
3781 {
3782 AutoCaller autoCaller(that);
3783 /* VirtualBox has been early uninitialized, terminate */
3784 if (!autoCaller.isOk())
3785 break;
3786
3787 do
3788 {
3789 /* release the caller to let uninit() ever proceed */
3790 autoCaller.release();
3791
3792 DWORD rc = ::WaitForMultipleObjects((DWORD)(1 + cnt + cntSpawned),
3793 handles,
3794 FALSE,
3795 INFINITE);
3796
3797 /* Restore the caller before using VirtualBox. If it fails, this
3798 * means VirtualBox is being uninitialized and we must terminate. */
3799 autoCaller.add();
3800 if (!autoCaller.isOk())
3801 break;
3802
3803 bool update = false;
3804
3805 if (rc == WAIT_OBJECT_0)
3806 {
3807 /* update event is signaled */
3808 update = true;
3809 }
3810 else if (rc > WAIT_OBJECT_0 && rc <= (WAIT_OBJECT_0 + cnt))
3811 {
3812 /* machine mutex is released */
3813 (machines[rc - WAIT_OBJECT_0 - 1])->checkForDeath();
3814 update = true;
3815 }
3816 else if (rc > WAIT_ABANDONED_0 && rc <= (WAIT_ABANDONED_0 + cnt))
3817 {
3818 /* machine mutex is abandoned due to client process termination */
3819 (machines[rc - WAIT_ABANDONED_0 - 1])->checkForDeath();
3820 update = true;
3821 }
3822 else if (rc > WAIT_OBJECT_0 + cnt && rc <= (WAIT_OBJECT_0 + cntSpawned))
3823 {
3824 /* spawned VM process has terminated (normally or abnormally) */
3825 (spawnedMachines[rc - WAIT_OBJECT_0 - cnt - 1])->
3826 checkForSpawnFailure();
3827 update = true;
3828 }
3829
3830 if (update)
3831 {
3832 /* close old process handles */
3833 for (size_t i = 1 + cnt; i < 1 + cnt + cntSpawned; ++i)
3834 CloseHandle(handles[i]);
3835
3836 // lock the machines list for reading
3837 AutoReadLock thatLock(that->m->allMachines.getLockHandle() COMMA_LOCKVAL_SRC_POS);
3838
3839 /* obtain a new set of opened machines */
3840 cnt = 0;
3841 machines.clear();
3842
3843 for (MachinesOList::iterator it = that->m->allMachines.begin();
3844 it != that->m->allMachines.end();
3845 ++it)
3846 {
3847 /// @todo handle situations with more than 64 objects
3848 AssertMsgBreak((1 + cnt) <= MAXIMUM_WAIT_OBJECTS,
3849 ("MAXIMUM_WAIT_OBJECTS reached"));
3850
3851 ComObjPtr<SessionMachine> sm;
3852 HANDLE ipcSem;
3853 if ((*it)->isSessionOpenOrClosing(sm, NULL, &ipcSem))
3854 {
3855 machines.push_back(sm);
3856 handles[1 + cnt] = ipcSem;
3857 ++cnt;
3858 }
3859 }
3860
3861 LogFlowFunc(("UPDATE: direct session count = %d\n", cnt));
3862
3863 /* obtain a new set of spawned machines */
3864 cntSpawned = 0;
3865 spawnedMachines.clear();
3866
3867 for (MachinesOList::iterator it = that->m->allMachines.begin();
3868 it != that->m->allMachines.end();
3869 ++it)
3870 {
3871 /// @todo handle situations with more than 64 objects
3872 AssertMsgBreak((1 + cnt + cntSpawned) <= MAXIMUM_WAIT_OBJECTS,
3873 ("MAXIMUM_WAIT_OBJECTS reached"));
3874
3875 RTPROCESS pid;
3876 if ((*it)->isSessionSpawning(&pid))
3877 {
3878 HANDLE ph = OpenProcess(SYNCHRONIZE, FALSE, pid);
3879 AssertMsg(ph != NULL, ("OpenProcess (pid=%d) failed with %d\n",
3880 pid, GetLastError()));
3881 if (rc == 0)
3882 {
3883 spawnedMachines.push_back(*it);
3884 handles[1 + cnt + cntSpawned] = ph;
3885 ++cntSpawned;
3886 }
3887 }
3888 }
3889
3890 LogFlowFunc(("UPDATE: spawned session count = %d\n", cntSpawned));
3891
3892 // machines lock unwinds here
3893 }
3894 }
3895 while (true);
3896 }
3897 while (0);
3898
3899 /* close old process handles */
3900 for (size_t i = 1 + cnt; i < 1 + cnt + cntSpawned; ++ i)
3901 CloseHandle(handles[i]);
3902
3903 /* release sets of machines if any */
3904 machines.clear();
3905 spawnedMachines.clear();
3906
3907 ::CoUninitialize();
3908
3909#elif defined(RT_OS_OS2)
3910
3911 /// @todo (dmik) processes reaping!
3912
3913 /* according to PMREF, 64 is the maximum for the muxwait list */
3914 SEMRECORD handles[64];
3915
3916 HMUX muxSem = NULLHANDLE;
3917
3918 do
3919 {
3920 AutoCaller autoCaller(that);
3921 /* VirtualBox has been early uninitialized, terminate */
3922 if (!autoCaller.isOk())
3923 break;
3924
3925 do
3926 {
3927 /* release the caller to let uninit() ever proceed */
3928 autoCaller.release();
3929
3930 int vrc = RTSemEventWait(that->m->updateReq, 500);
3931
3932 /* Restore the caller before using VirtualBox. If it fails, this
3933 * means VirtualBox is being uninitialized and we must terminate. */
3934 autoCaller.add();
3935 if (!autoCaller.isOk())
3936 break;
3937
3938 bool update = false;
3939 bool updateSpawned = false;
3940
3941 if (RT_SUCCESS(vrc))
3942 {
3943 /* update event is signaled */
3944 update = true;
3945 updateSpawned = true;
3946 }
3947 else
3948 {
3949 AssertMsg(vrc == VERR_TIMEOUT || vrc == VERR_INTERRUPTED,
3950 ("RTSemEventWait returned %Rrc\n", vrc));
3951
3952 /* are there any mutexes? */
3953 if (cnt > 0)
3954 {
3955 /* figure out what's going on with machines */
3956
3957 unsigned long semId = 0;
3958 APIRET arc = ::DosWaitMuxWaitSem(muxSem,
3959 SEM_IMMEDIATE_RETURN, &semId);
3960
3961 if (arc == NO_ERROR)
3962 {
3963 /* machine mutex is normally released */
3964 Assert(semId >= 0 && semId < cnt);
3965 if (semId >= 0 && semId < cnt)
3966 {
3967#ifdef DEBUG
3968 {
3969 AutoReadLock machineLock(machines[semId] COMMA_LOCKVAL_SRC_POS);
3970 LogFlowFunc(("released mutex: machine='%ls'\n",
3971 machines[semId]->name().raw()));
3972 }
3973#endif
3974 machines[semId]->checkForDeath();
3975 }
3976 update = true;
3977 }
3978 else if (arc == ERROR_SEM_OWNER_DIED)
3979 {
3980 /* machine mutex is abandoned due to client process
3981 * termination; find which mutex is in the Owner Died
3982 * state */
3983 for (size_t i = 0; i < cnt; ++ i)
3984 {
3985 PID pid; TID tid;
3986 unsigned long reqCnt;
3987 arc = DosQueryMutexSem((HMTX)handles[i].hsemCur, &pid, &tid, &reqCnt);
3988 if (arc == ERROR_SEM_OWNER_DIED)
3989 {
3990 /* close the dead mutex as asked by PMREF */
3991 ::DosCloseMutexSem((HMTX)handles[i].hsemCur);
3992
3993 Assert(i >= 0 && i < cnt);
3994 if (i >= 0 && i < cnt)
3995 {
3996#ifdef DEBUG
3997 {
3998 AutoReadLock machineLock(machines[semId] COMMA_LOCKVAL_SRC_POS);
3999 LogFlowFunc(("mutex owner dead: machine='%ls'\n",
4000 machines[i]->name().raw()));
4001 }
4002#endif
4003 machines[i]->checkForDeath();
4004 }
4005 }
4006 }
4007 update = true;
4008 }
4009 else
4010 AssertMsg(arc == ERROR_INTERRUPT || arc == ERROR_TIMEOUT,
4011 ("DosWaitMuxWaitSem returned %d\n", arc));
4012 }
4013
4014 /* are there any spawning sessions? */
4015 if (cntSpawned > 0)
4016 {
4017 for (size_t i = 0; i < cntSpawned; ++ i)
4018 updateSpawned |= (spawnedMachines[i])->
4019 checkForSpawnFailure();
4020 }
4021 }
4022
4023 if (update || updateSpawned)
4024 {
4025 AutoReadLock thatLock(that COMMA_LOCKVAL_SRC_POS);
4026
4027 if (update)
4028 {
4029 /* close the old muxsem */
4030 if (muxSem != NULLHANDLE)
4031 ::DosCloseMuxWaitSem(muxSem);
4032
4033 /* obtain a new set of opened machines */
4034 cnt = 0;
4035 machines.clear();
4036
4037 for (MachinesOList::iterator it = that->m->llMachines.begin();
4038 it != that->m->llMachines.end(); ++ it)
4039 {
4040 /// @todo handle situations with more than 64 objects
4041 AssertMsg(cnt <= 64 /* according to PMREF */,
4042 ("maximum of 64 mutex semaphores reached (%d)",
4043 cnt));
4044
4045 ComObjPtr<SessionMachine> sm;
4046 HMTX ipcSem;
4047 if ((*it)->isSessionOpenOrClosing(sm, NULL, &ipcSem))
4048 {
4049 machines.push_back(sm);
4050 handles[cnt].hsemCur = (HSEM)ipcSem;
4051 handles[cnt].ulUser = cnt;
4052 ++ cnt;
4053 }
4054 }
4055
4056 LogFlowFunc(("UPDATE: direct session count = %d\n", cnt));
4057
4058 if (cnt > 0)
4059 {
4060 /* create a new muxsem */
4061 APIRET arc = ::DosCreateMuxWaitSem(NULL, &muxSem, cnt,
4062 handles,
4063 DCMW_WAIT_ANY);
4064 AssertMsg(arc == NO_ERROR,
4065 ("DosCreateMuxWaitSem returned %d\n", arc));
4066 NOREF(arc);
4067 }
4068 }
4069
4070 if (updateSpawned)
4071 {
4072 /* obtain a new set of spawned machines */
4073 spawnedMachines.clear();
4074
4075 for (MachinesOList::iterator it = that->m->llMachines.begin();
4076 it != that->m->llMachines.end(); ++ it)
4077 {
4078 if ((*it)->isSessionSpawning())
4079 spawnedMachines.push_back(*it);
4080 }
4081
4082 cntSpawned = spawnedMachines.size();
4083 LogFlowFunc(("UPDATE: spawned session count = %d\n", cntSpawned));
4084 }
4085 }
4086 }
4087 while (true);
4088 }
4089 while (0);
4090
4091 /* close the muxsem */
4092 if (muxSem != NULLHANDLE)
4093 ::DosCloseMuxWaitSem(muxSem);
4094
4095 /* release sets of machines if any */
4096 machines.clear();
4097 spawnedMachines.clear();
4098
4099#elif defined(VBOX_WITH_SYS_V_IPC_SESSION_WATCHER)
4100
4101 bool update = false;
4102 bool updateSpawned = false;
4103
4104 do
4105 {
4106 AutoCaller autoCaller(that);
4107 if (!autoCaller.isOk())
4108 break;
4109
4110 do
4111 {
4112 /* release the caller to let uninit() ever proceed */
4113 autoCaller.release();
4114
4115 int rc = RTSemEventWait(that->m->updateReq, 500);
4116
4117 /*
4118 * Restore the caller before using VirtualBox. If it fails, this
4119 * means VirtualBox is being uninitialized and we must terminate.
4120 */
4121 autoCaller.add();
4122 if (!autoCaller.isOk())
4123 break;
4124
4125 if (RT_SUCCESS(rc) || update || updateSpawned)
4126 {
4127 /* RT_SUCCESS(rc) means an update event is signaled */
4128
4129 // lock the machines list for reading
4130 AutoReadLock thatLock(that->m->allMachines.getLockHandle() COMMA_LOCKVAL_SRC_POS);
4131
4132 if (RT_SUCCESS(rc) || update)
4133 {
4134 /* obtain a new set of opened machines */
4135 machines.clear();
4136
4137 for (MachinesOList::iterator it = that->m->allMachines.begin();
4138 it != that->m->allMachines.end();
4139 ++it)
4140 {
4141 ComObjPtr<SessionMachine> sm;
4142 if ((*it)->isSessionOpenOrClosing(sm))
4143 machines.push_back(sm);
4144 }
4145
4146 cnt = machines.size();
4147 LogFlowFunc(("UPDATE: direct session count = %d\n", cnt));
4148 }
4149
4150 if (RT_SUCCESS(rc) || updateSpawned)
4151 {
4152 /* obtain a new set of spawned machines */
4153 spawnedMachines.clear();
4154
4155 for (MachinesOList::iterator it = that->m->allMachines.begin();
4156 it != that->m->allMachines.end();
4157 ++it)
4158 {
4159 if ((*it)->isSessionSpawning())
4160 spawnedMachines.push_back(*it);
4161 }
4162
4163 cntSpawned = spawnedMachines.size();
4164 LogFlowFunc(("UPDATE: spawned session count = %d\n", cntSpawned));
4165 }
4166
4167 // machines lock unwinds here
4168 }
4169
4170 update = false;
4171 for (size_t i = 0; i < cnt; ++ i)
4172 update |= (machines[i])->checkForDeath();
4173
4174 updateSpawned = false;
4175 for (size_t i = 0; i < cntSpawned; ++ i)
4176 updateSpawned |= (spawnedMachines[i])->checkForSpawnFailure();
4177
4178 /* reap child processes */
4179 {
4180 AutoWriteLock alock(that COMMA_LOCKVAL_SRC_POS);
4181 if (that->m->llProcesses.size())
4182 {
4183 LogFlowFunc(("UPDATE: child process count = %d\n",
4184 that->m->llProcesses.size()));
4185 VirtualBox::Data::ProcessList::iterator it = that->m->llProcesses.begin();
4186 while (it != that->m->llProcesses.end())
4187 {
4188 RTPROCESS pid = *it;
4189 RTPROCSTATUS status;
4190 int vrc = ::RTProcWait(pid, RTPROCWAIT_FLAGS_NOBLOCK, &status);
4191 if (vrc == VINF_SUCCESS)
4192 {
4193 LogFlowFunc(("pid %d (%x) was reaped, status=%d, reason=%d\n",
4194 pid, pid, status.iStatus,
4195 status.enmReason));
4196 it = that->m->llProcesses.erase(it);
4197 }
4198 else
4199 {
4200 LogFlowFunc(("pid %d (%x) was NOT reaped, vrc=%Rrc\n",
4201 pid, pid, vrc));
4202 if (vrc != VERR_PROCESS_RUNNING)
4203 {
4204 /* remove the process if it is not already running */
4205 it = that->m->llProcesses.erase(it);
4206 }
4207 else
4208 ++ it;
4209 }
4210 }
4211 }
4212 }
4213 }
4214 while (true);
4215 }
4216 while (0);
4217
4218 /* release sets of machines if any */
4219 machines.clear();
4220 spawnedMachines.clear();
4221
4222#else
4223# error "Port me!"
4224#endif
4225
4226 LogFlowFuncLeave();
4227 return 0;
4228}
4229
4230/**
4231 * Thread function that handles custom events posted using #postEvent().
4232 */
4233// static
4234DECLCALLBACK(int) VirtualBox::AsyncEventHandler(RTTHREAD thread, void *pvUser)
4235{
4236 LogFlowFuncEnter();
4237
4238 AssertReturn(pvUser, VERR_INVALID_POINTER);
4239
4240 // create an event queue for the current thread
4241 EventQueue *eventQ = new EventQueue();
4242 AssertReturn(eventQ, VERR_NO_MEMORY);
4243
4244 // return the queue to the one who created this thread
4245 *(static_cast <EventQueue **>(pvUser)) = eventQ;
4246 // signal that we're ready
4247 RTThreadUserSignal(thread);
4248
4249 while (RT_SUCCESS(eventQ->processEventQueue(RT_INDEFINITE_WAIT)))
4250 /* nothing */ ;
4251
4252 delete eventQ;
4253
4254 LogFlowFuncLeave();
4255
4256 return 0;
4257}
4258
4259
4260////////////////////////////////////////////////////////////////////////////////
4261
4262/**
4263 * Takes the current list of registered callbacks of the managed VirtualBox
4264 * instance, and calls #handleCallback() for every callback item from the
4265 * list, passing the item as an argument.
4266 *
4267 * @note Locks the managed VirtualBox object for reading but leaves the lock
4268 * before iterating over callbacks and calling their methods.
4269 */
4270void *VirtualBox::CallbackEvent::handler()
4271{
4272 if (!mVirtualBox)
4273 return NULL;
4274
4275 AutoCaller autoCaller(mVirtualBox);
4276 if (!autoCaller.isOk())
4277 {
4278 LogWarningFunc(("VirtualBox has been uninitialized (state=%d), the callback event is discarded!\n",
4279 autoCaller.state()));
4280 /* We don't need mVirtualBox any more, so release it */
4281 mVirtualBox = NULL;
4282 return NULL;
4283 }
4284
4285
4286 {
4287 VBoxEventDesc evDesc;
4288 prepareEventDesc(mVirtualBox->m->pEventSource, evDesc);
4289
4290 evDesc.fire(/* don't wait for delivery */0);
4291 }
4292
4293 mVirtualBox = NULL; /* Not needed any longer. Still make sense to do this? */
4294 return NULL;
4295}
4296
4297//STDMETHODIMP VirtualBox::CreateDHCPServerForInterface(/*IHostNetworkInterface * aIinterface,*/ IDHCPServer ** aServer)
4298//{
4299// return E_NOTIMPL;
4300//}
4301
4302STDMETHODIMP VirtualBox::CreateDHCPServer(IN_BSTR aName, IDHCPServer ** aServer)
4303{
4304 CheckComArgStrNotEmptyOrNull(aName);
4305 CheckComArgNotNull(aServer);
4306
4307 AutoCaller autoCaller(this);
4308 if (FAILED(autoCaller.rc())) return autoCaller.rc();
4309
4310 ComObjPtr<DHCPServer> dhcpServer;
4311 dhcpServer.createObject();
4312 HRESULT rc = dhcpServer->init(this, aName);
4313 if (FAILED(rc)) return rc;
4314
4315 rc = registerDHCPServer(dhcpServer, true);
4316 if (FAILED(rc)) return rc;
4317
4318 dhcpServer.queryInterfaceTo(aServer);
4319
4320 return rc;
4321}
4322
4323STDMETHODIMP VirtualBox::FindDHCPServerByNetworkName(IN_BSTR aName, IDHCPServer ** aServer)
4324{
4325 CheckComArgStrNotEmptyOrNull(aName);
4326 CheckComArgNotNull(aServer);
4327
4328 AutoCaller autoCaller(this);
4329 if (FAILED(autoCaller.rc())) return autoCaller.rc();
4330
4331 HRESULT rc;
4332 Bstr bstr;
4333 ComPtr<DHCPServer> found;
4334
4335 AutoReadLock alock(m->allDHCPServers.getLockHandle() COMMA_LOCKVAL_SRC_POS);
4336
4337 for (DHCPServersOList::const_iterator it = m->allDHCPServers.begin();
4338 it != m->allDHCPServers.end();
4339 ++it)
4340 {
4341 rc = (*it)->COMGETTER(NetworkName)(bstr.asOutParam());
4342 if (FAILED(rc)) throw rc;
4343
4344 if (bstr == aName)
4345 {
4346 found = *it;
4347 break;
4348 }
4349 }
4350
4351 if (!found)
4352 return E_INVALIDARG;
4353
4354 return found.queryInterfaceTo(aServer);
4355}
4356
4357STDMETHODIMP VirtualBox::RemoveDHCPServer(IDHCPServer * aServer)
4358{
4359 CheckComArgNotNull(aServer);
4360
4361 AutoCaller autoCaller(this);
4362 if (FAILED(autoCaller.rc())) return autoCaller.rc();
4363
4364 HRESULT rc = unregisterDHCPServer(static_cast<DHCPServer *>(aServer), true);
4365
4366 return rc;
4367}
4368
4369/**
4370 * Remembers the given dhcp server by storing it in the hard disk registry.
4371 *
4372 * @param aDHCPServer Dhcp Server object to remember.
4373 * @param aSaveRegistry @c true to save hard disk registry to disk (default).
4374 *
4375 * When @a aSaveRegistry is @c true, this operation may fail because of the
4376 * failed #saveSettings() method it calls. In this case, the dhcp server object
4377 * will not be remembered. It is therefore the responsibility of the caller to
4378 * call this method as the last step of some action that requires registration
4379 * in order to make sure that only fully functional dhcp server objects get
4380 * registered.
4381 *
4382 * @note Locks this object for writing and @a aDHCPServer for reading.
4383 */
4384HRESULT VirtualBox::registerDHCPServer(DHCPServer *aDHCPServer,
4385 bool aSaveRegistry /*= true*/)
4386{
4387 AssertReturn(aDHCPServer != NULL, E_INVALIDARG);
4388
4389 AutoCaller autoCaller(this);
4390 AssertComRCReturn(autoCaller.rc(), autoCaller.rc());
4391
4392 AutoCaller dhcpServerCaller(aDHCPServer);
4393 AssertComRCReturn(dhcpServerCaller.rc(), dhcpServerCaller.rc());
4394
4395 Bstr name;
4396 HRESULT rc;
4397 rc = aDHCPServer->COMGETTER(NetworkName)(name.asOutParam());
4398 if (FAILED(rc)) return rc;
4399
4400 ComPtr<IDHCPServer> existing;
4401 rc = FindDHCPServerByNetworkName(name.raw(), existing.asOutParam());
4402 if (SUCCEEDED(rc))
4403 return E_INVALIDARG;
4404
4405 rc = S_OK;
4406
4407 m->allDHCPServers.addChild(aDHCPServer);
4408
4409 if (aSaveRegistry)
4410 {
4411 AutoWriteLock vboxLock(this COMMA_LOCKVAL_SRC_POS);
4412 rc = saveSettings();
4413 vboxLock.release();
4414
4415 if (FAILED(rc))
4416 unregisterDHCPServer(aDHCPServer, false /* aSaveRegistry */);
4417 }
4418
4419 return rc;
4420}
4421
4422/**
4423 * Removes the given hard disk from the hard disk registry.
4424 *
4425 * @param aHardDisk Hard disk object to remove.
4426 * @param aSaveRegistry @c true to save hard disk registry to disk (default).
4427 *
4428 * When @a aSaveRegistry is @c true, this operation may fail because of the
4429 * failed #saveSettings() method it calls. In this case, the hard disk object
4430 * will NOT be removed from the registry when this method returns. It is
4431 * therefore the responsibility of the caller to call this method as the first
4432 * step of some action that requires unregistration, before calling uninit() on
4433 * @a aHardDisk.
4434 *
4435 * @note Locks this object for writing and @a aHardDisk for reading.
4436 */
4437HRESULT VirtualBox::unregisterDHCPServer(DHCPServer *aDHCPServer,
4438 bool aSaveRegistry /*= true*/)
4439{
4440 AssertReturn(aDHCPServer != NULL, E_INVALIDARG);
4441
4442 AutoCaller autoCaller(this);
4443 AssertComRCReturn(autoCaller.rc(), autoCaller.rc());
4444
4445 AutoCaller dhcpServerCaller(aDHCPServer);
4446 AssertComRCReturn(dhcpServerCaller.rc(), dhcpServerCaller.rc());
4447
4448 m->allDHCPServers.removeChild(aDHCPServer);
4449
4450 HRESULT rc = S_OK;
4451
4452 if (aSaveRegistry)
4453 {
4454 AutoWriteLock vboxLock(this COMMA_LOCKVAL_SRC_POS);
4455 rc = saveSettings();
4456 vboxLock.release();
4457
4458 if (FAILED(rc))
4459 registerDHCPServer(aDHCPServer, false /* aSaveRegistry */);
4460 }
4461
4462 return rc;
4463}
4464
4465/* vi: set tabstop=4 shiftwidth=4 expandtab: */
Note: See TracBrowser for help on using the repository browser.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette