VirtualBox

source: vbox/trunk/src/VBox/Main/src-client/ConsoleImpl.cpp@ 40286

Last change on this file since 40286 was 40282, checked in by vboxsync, 13 years ago

*: gcc-4.7: ~0 => ~0U in initializers (warning: narrowing conversion of -1' from int' to `unsigned int' inside { } is ill-formed in C++11 [-Wnarrowing])

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 326.7 KB
Line 
1/* $Id: ConsoleImpl.cpp 40282 2012-02-28 21:02:40Z vboxsync $ */
2/** @file
3 * VBox Console COM Class implementation
4 */
5
6/*
7 * Copyright (C) 2006-2012 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17
18/** @todo Move the TAP mess back into the driver! */
19#if defined(RT_OS_WINDOWS)
20#elif defined(RT_OS_LINUX)
21# include <errno.h>
22# include <sys/ioctl.h>
23# include <sys/poll.h>
24# include <sys/fcntl.h>
25# include <sys/types.h>
26# include <sys/wait.h>
27# include <net/if.h>
28# include <linux/if_tun.h>
29# include <stdio.h>
30# include <stdlib.h>
31# include <string.h>
32#elif defined(RT_OS_FREEBSD)
33# include <errno.h>
34# include <sys/ioctl.h>
35# include <sys/poll.h>
36# include <sys/fcntl.h>
37# include <sys/types.h>
38# include <sys/wait.h>
39# include <stdio.h>
40# include <stdlib.h>
41# include <string.h>
42#elif defined(RT_OS_SOLARIS)
43# include <iprt/coredumper.h>
44#endif
45
46#include "ConsoleImpl.h"
47
48#include "Global.h"
49#include "VirtualBoxErrorInfoImpl.h"
50#include "GuestImpl.h"
51#include "KeyboardImpl.h"
52#include "MouseImpl.h"
53#include "DisplayImpl.h"
54#include "MachineDebuggerImpl.h"
55#include "USBDeviceImpl.h"
56#include "RemoteUSBDeviceImpl.h"
57#include "SharedFolderImpl.h"
58#include "AudioSnifferInterface.h"
59#ifdef VBOX_WITH_USB_VIDEO
60# include "UsbWebcamInterface.h"
61#endif
62#include "ProgressCombinedImpl.h"
63#include "ConsoleVRDPServer.h"
64#include "VMMDev.h"
65#include "package-generated.h"
66#ifdef VBOX_WITH_EXTPACK
67# include "ExtPackManagerImpl.h"
68#endif
69#include "BusAssignmentManager.h"
70
71#include "VBoxEvents.h"
72#include "AutoCaller.h"
73#include "Logging.h"
74
75#include <VBox/com/array.h>
76#include "VBox/com/ErrorInfo.h"
77#include <VBox/com/listeners.h>
78
79#include <iprt/asm.h>
80#include <iprt/buildconfig.h>
81#include <iprt/cpp/utils.h>
82#include <iprt/dir.h>
83#include <iprt/file.h>
84#include <iprt/ldr.h>
85#include <iprt/path.h>
86#include <iprt/process.h>
87#include <iprt/string.h>
88#include <iprt/system.h>
89
90#include <VBox/vmm/vmapi.h>
91#include <VBox/vmm/vmm.h>
92#include <VBox/vmm/pdmapi.h>
93#include <VBox/vmm/pdmasynccompletion.h>
94#include <VBox/vmm/pdmnetifs.h>
95#ifdef VBOX_WITH_USB
96# include <VBox/vmm/pdmusb.h>
97#endif
98#include <VBox/vmm/mm.h>
99#include <VBox/vmm/ftm.h>
100#include <VBox/vmm/ssm.h>
101#include <VBox/err.h>
102#include <VBox/param.h>
103#include <VBox/vusb.h>
104#include <VBox/version.h>
105
106#include <VBox/VMMDev.h>
107
108#include <VBox/HostServices/VBoxClipboardSvc.h>
109#ifdef VBOX_WITH_GUEST_PROPS
110# include <VBox/HostServices/GuestPropertySvc.h>
111# include <VBox/com/array.h>
112#endif
113
114#include <set>
115#include <algorithm>
116#include <memory> // for auto_ptr
117#include <vector>
118#include <typeinfo>
119
120
121// VMTask and friends
122////////////////////////////////////////////////////////////////////////////////
123
124/**
125 * Task structure for asynchronous VM operations.
126 *
127 * Once created, the task structure adds itself as a Console caller. This means:
128 *
129 * 1. The user must check for #rc() before using the created structure
130 * (e.g. passing it as a thread function argument). If #rc() returns a
131 * failure, the Console object may not be used by the task (see
132 * Console::addCaller() for more details).
133 * 2. On successful initialization, the structure keeps the Console caller
134 * until destruction (to ensure Console remains in the Ready state and won't
135 * be accidentally uninitialized). Forgetting to delete the created task
136 * will lead to Console::uninit() stuck waiting for releasing all added
137 * callers.
138 *
139 * If \a aUsesVMPtr parameter is true, the task structure will also add itself
140 * as a Console::mpUVM caller with the same meaning as above. See
141 * Console::addVMCaller() for more info.
142 */
143struct VMTask
144{
145 VMTask(Console *aConsole,
146 Progress *aProgress,
147 const ComPtr<IProgress> &aServerProgress,
148 bool aUsesVMPtr)
149 : mConsole(aConsole),
150 mConsoleCaller(aConsole),
151 mProgress(aProgress),
152 mServerProgress(aServerProgress),
153 mpVM(NULL),
154 mRC(E_FAIL),
155 mpSafeVMPtr(NULL)
156 {
157 AssertReturnVoid(aConsole);
158 mRC = mConsoleCaller.rc();
159 if (FAILED(mRC))
160 return;
161 if (aUsesVMPtr)
162 {
163 mpSafeVMPtr = new Console::SafeVMPtr(aConsole);
164 if (mpSafeVMPtr->isOk())
165 mpVM = mpSafeVMPtr->raw();
166 else
167 mRC = mpSafeVMPtr->rc();
168 }
169 }
170
171 ~VMTask()
172 {
173 releaseVMCaller();
174 }
175
176 HRESULT rc() const { return mRC; }
177 bool isOk() const { return SUCCEEDED(rc()); }
178
179 /** Releases the VM caller before destruction. Not normally necessary. */
180 void releaseVMCaller()
181 {
182 if (mpSafeVMPtr)
183 {
184 delete mpSafeVMPtr;
185 mpSafeVMPtr = NULL;
186 }
187 }
188
189 const ComObjPtr<Console> mConsole;
190 AutoCaller mConsoleCaller;
191 const ComObjPtr<Progress> mProgress;
192 Utf8Str mErrorMsg;
193 const ComPtr<IProgress> mServerProgress;
194 PVM mpVM;
195
196private:
197 HRESULT mRC;
198 Console::SafeVMPtr *mpSafeVMPtr;
199};
200
201struct VMTakeSnapshotTask : public VMTask
202{
203 VMTakeSnapshotTask(Console *aConsole,
204 Progress *aProgress,
205 IN_BSTR aName,
206 IN_BSTR aDescription)
207 : VMTask(aConsole, aProgress, NULL /* aServerProgress */,
208 false /* aUsesVMPtr */),
209 bstrName(aName),
210 bstrDescription(aDescription),
211 lastMachineState(MachineState_Null)
212 {}
213
214 Bstr bstrName,
215 bstrDescription;
216 Bstr bstrSavedStateFile; // received from BeginTakeSnapshot()
217 MachineState_T lastMachineState;
218 bool fTakingSnapshotOnline;
219 ULONG ulMemSize;
220};
221
222struct VMPowerUpTask : public VMTask
223{
224 VMPowerUpTask(Console *aConsole,
225 Progress *aProgress)
226 : VMTask(aConsole, aProgress, NULL /* aServerProgress */,
227 false /* aUsesVMPtr */),
228 mConfigConstructor(NULL),
229 mStartPaused(false),
230 mTeleporterEnabled(FALSE),
231 mEnmFaultToleranceState(FaultToleranceState_Inactive)
232 {}
233
234 PFNCFGMCONSTRUCTOR mConfigConstructor;
235 Utf8Str mSavedStateFile;
236 Console::SharedFolderDataMap mSharedFolders;
237 bool mStartPaused;
238 BOOL mTeleporterEnabled;
239 FaultToleranceState_T mEnmFaultToleranceState;
240
241 /* array of progress objects for hard disk reset operations */
242 typedef std::list<ComPtr<IProgress> > ProgressList;
243 ProgressList hardDiskProgresses;
244};
245
246struct VMPowerDownTask : public VMTask
247{
248 VMPowerDownTask(Console *aConsole,
249 const ComPtr<IProgress> &aServerProgress)
250 : VMTask(aConsole, NULL /* aProgress */, aServerProgress,
251 true /* aUsesVMPtr */)
252 {}
253};
254
255struct VMSaveTask : public VMTask
256{
257 VMSaveTask(Console *aConsole,
258 const ComPtr<IProgress> &aServerProgress,
259 const Utf8Str &aSavedStateFile)
260 : VMTask(aConsole, NULL /* aProgress */, aServerProgress,
261 true /* aUsesVMPtr */),
262 mSavedStateFile(aSavedStateFile)
263 {}
264
265 Utf8Str mSavedStateFile;
266};
267
268// Handler for global events
269////////////////////////////////////////////////////////////////////////////////
270inline static const char *networkAdapterTypeToName(NetworkAdapterType_T adapterType);
271
272class VmEventListener {
273public:
274 VmEventListener()
275 {}
276
277
278 HRESULT init(Console *aConsole)
279 {
280 mConsole = aConsole;
281 return S_OK;
282 }
283
284 void uninit()
285 {
286 }
287
288 virtual ~VmEventListener()
289 {
290 }
291
292 STDMETHOD(HandleEvent)(VBoxEventType_T aType, IEvent * aEvent)
293 {
294 switch(aType)
295 {
296 case VBoxEventType_OnNATRedirect:
297 {
298 Bstr id;
299 ComPtr<IMachine> pMachine = mConsole->machine();
300 ComPtr<INATRedirectEvent> pNREv = aEvent;
301 HRESULT rc = E_FAIL;
302 Assert(pNREv);
303
304 Bstr interestedId;
305 rc = pMachine->COMGETTER(Id)(interestedId.asOutParam());
306 AssertComRC(rc);
307 rc = pNREv->COMGETTER(MachineId)(id.asOutParam());
308 AssertComRC(rc);
309 if (id != interestedId)
310 break;
311 /* now we can operate with redirects */
312 NATProtocol_T proto;
313 pNREv->COMGETTER(Proto)(&proto);
314 BOOL fRemove;
315 pNREv->COMGETTER(Remove)(&fRemove);
316 bool fUdp = (proto == NATProtocol_UDP);
317 Bstr hostIp, guestIp;
318 LONG hostPort, guestPort;
319 pNREv->COMGETTER(HostIp)(hostIp.asOutParam());
320 pNREv->COMGETTER(HostPort)(&hostPort);
321 pNREv->COMGETTER(GuestIp)(guestIp.asOutParam());
322 pNREv->COMGETTER(GuestPort)(&guestPort);
323 ULONG ulSlot;
324 rc = pNREv->COMGETTER(Slot)(&ulSlot);
325 AssertComRC(rc);
326 if (FAILED(rc))
327 break;
328 mConsole->onNATRedirectRuleChange(ulSlot, fRemove, proto, hostIp.raw(), hostPort, guestIp.raw(), guestPort);
329 }
330 break;
331
332 case VBoxEventType_OnHostPciDevicePlug:
333 {
334 // handle if needed
335 break;
336 }
337
338 default:
339 AssertFailed();
340 }
341 return S_OK;
342 }
343private:
344 Console *mConsole;
345};
346
347typedef ListenerImpl<VmEventListener, Console*> VmEventListenerImpl;
348
349
350VBOX_LISTENER_DECLARE(VmEventListenerImpl)
351
352
353// constructor / destructor
354/////////////////////////////////////////////////////////////////////////////
355
356Console::Console()
357 : mSavedStateDataLoaded(false)
358 , mConsoleVRDPServer(NULL)
359 , mpUVM(NULL)
360 , mVMCallers(0)
361 , mVMZeroCallersSem(NIL_RTSEMEVENT)
362 , mVMDestroying(false)
363 , mVMPoweredOff(false)
364 , mVMIsAlreadyPoweringOff(false)
365 , mfSnapshotFolderSizeWarningShown(false)
366 , mfSnapshotFolderExt4WarningShown(false)
367 , mfSnapshotFolderDiskTypeShown(false)
368 , mpVmm2UserMethods(NULL)
369 , m_pVMMDev(NULL)
370 , mAudioSniffer(NULL)
371#ifdef VBOX_WITH_USB_VIDEO
372 , mUsbWebcamInterface(NULL)
373#endif
374 , mBusMgr(NULL)
375 , mVMStateChangeCallbackDisabled(false)
376 , mfUseHostClipboard(true)
377 , mMachineState(MachineState_PoweredOff)
378{
379}
380
381Console::~Console()
382{}
383
384HRESULT Console::FinalConstruct()
385{
386 LogFlowThisFunc(("\n"));
387
388 memset(mapStorageLeds, 0, sizeof(mapStorageLeds));
389 memset(mapNetworkLeds, 0, sizeof(mapNetworkLeds));
390 memset(&mapUSBLed, 0, sizeof(mapUSBLed));
391 memset(&mapSharedFolderLed, 0, sizeof(mapSharedFolderLed));
392
393 for (unsigned i = 0; i < RT_ELEMENTS(maStorageDevType); ++i)
394 maStorageDevType[i] = DeviceType_Null;
395
396 MYVMM2USERMETHODS *pVmm2UserMethods = (MYVMM2USERMETHODS *)RTMemAllocZ(sizeof(*mpVmm2UserMethods) + sizeof(Console *));
397 if (!pVmm2UserMethods)
398 return E_OUTOFMEMORY;
399 pVmm2UserMethods->u32Magic = VMM2USERMETHODS_MAGIC;
400 pVmm2UserMethods->u32Version = VMM2USERMETHODS_VERSION;
401 pVmm2UserMethods->pfnSaveState = Console::vmm2User_SaveState;
402 pVmm2UserMethods->pfnNotifyEmtInit = Console::vmm2User_NotifyEmtInit;
403 pVmm2UserMethods->pfnNotifyEmtTerm = Console::vmm2User_NotifyEmtTerm;
404 pVmm2UserMethods->pfnNotifyPdmtInit = Console::vmm2User_NotifyPdmtInit;
405 pVmm2UserMethods->pfnNotifyPdmtTerm = Console::vmm2User_NotifyPdmtTerm;
406 pVmm2UserMethods->u32EndMagic = VMM2USERMETHODS_MAGIC;
407 pVmm2UserMethods->pConsole = this;
408 mpVmm2UserMethods = pVmm2UserMethods;
409
410 return BaseFinalConstruct();
411}
412
413void Console::FinalRelease()
414{
415 LogFlowThisFunc(("\n"));
416
417 uninit();
418
419 BaseFinalRelease();
420}
421
422// public initializer/uninitializer for internal purposes only
423/////////////////////////////////////////////////////////////////////////////
424
425HRESULT Console::init(IMachine *aMachine, IInternalMachineControl *aControl)
426{
427 AssertReturn(aMachine && aControl, E_INVALIDARG);
428
429 /* Enclose the state transition NotReady->InInit->Ready */
430 AutoInitSpan autoInitSpan(this);
431 AssertReturn(autoInitSpan.isOk(), E_FAIL);
432
433 LogFlowThisFuncEnter();
434 LogFlowThisFunc(("aMachine=%p, aControl=%p\n", aMachine, aControl));
435
436 HRESULT rc = E_FAIL;
437
438 unconst(mMachine) = aMachine;
439 unconst(mControl) = aControl;
440
441 /* Cache essential properties and objects */
442
443 rc = mMachine->COMGETTER(State)(&mMachineState);
444 AssertComRCReturnRC(rc);
445
446 rc = mMachine->COMGETTER(VRDEServer)(unconst(mVRDEServer).asOutParam());
447 AssertComRCReturnRC(rc);
448
449 /* Create associated child COM objects */
450
451 // Event source may be needed by other children
452 unconst(mEventSource).createObject();
453 rc = mEventSource->init(static_cast<IConsole*>(this));
454 AssertComRCReturnRC(rc);
455
456 unconst(mGuest).createObject();
457 rc = mGuest->init(this);
458 AssertComRCReturnRC(rc);
459
460 unconst(mKeyboard).createObject();
461 rc = mKeyboard->init(this);
462 AssertComRCReturnRC(rc);
463
464 unconst(mMouse).createObject();
465 rc = mMouse->init(this);
466 AssertComRCReturnRC(rc);
467
468 unconst(mDisplay).createObject();
469 rc = mDisplay->init(this);
470 AssertComRCReturnRC(rc);
471
472 unconst(mVRDEServerInfo).createObject();
473 rc = mVRDEServerInfo->init(this);
474 AssertComRCReturnRC(rc);
475
476#ifdef VBOX_WITH_EXTPACK
477 unconst(mptrExtPackManager).createObject();
478 rc = mptrExtPackManager->initExtPackManager(NULL, VBOXEXTPACKCTX_VM_PROCESS);
479 AssertComRCReturnRC(rc);
480#endif
481
482 /* Grab global and machine shared folder lists */
483
484 rc = fetchSharedFolders(true /* aGlobal */);
485 AssertComRCReturnRC(rc);
486 rc = fetchSharedFolders(false /* aGlobal */);
487 AssertComRCReturnRC(rc);
488
489 /* Create other child objects */
490
491 unconst(mConsoleVRDPServer) = new ConsoleVRDPServer(this);
492 AssertReturn(mConsoleVRDPServer, E_FAIL);
493
494 mcAudioRefs = 0;
495 mcVRDPClients = 0;
496 mu32SingleRDPClientId = 0;
497 mcGuestCredentialsProvided = false;
498
499 /* Figure out size of meAttachmentType vector */
500 ComPtr<IVirtualBox> pVirtualBox;
501 rc = aMachine->COMGETTER(Parent)(pVirtualBox.asOutParam());
502 AssertComRC(rc);
503 ComPtr<ISystemProperties> pSystemProperties;
504 if (pVirtualBox)
505 pVirtualBox->COMGETTER(SystemProperties)(pSystemProperties.asOutParam());
506 ChipsetType_T chipsetType = ChipsetType_PIIX3;
507 aMachine->COMGETTER(ChipsetType)(&chipsetType);
508 ULONG maxNetworkAdapters = 0;
509 if (pSystemProperties)
510 pSystemProperties->GetMaxNetworkAdapters(chipsetType, &maxNetworkAdapters);
511 meAttachmentType.resize(maxNetworkAdapters);
512 for (ULONG slot = 0; slot < maxNetworkAdapters; ++slot)
513 meAttachmentType[slot] = NetworkAttachmentType_Null;
514
515
516 // VirtualBox 4.0: We no longer initialize the VMMDev instance here,
517 // which starts the HGCM thread. Instead, this is now done in the
518 // power-up thread when a VM is actually being powered up to avoid
519 // having HGCM threads all over the place every time a session is
520 // opened, even if that session will not run a VM.
521 // unconst(m_pVMMDev) = new VMMDev(this);
522 // AssertReturn(mVMMDev, E_FAIL);
523
524 unconst(mAudioSniffer) = new AudioSniffer(this);
525 AssertReturn(mAudioSniffer, E_FAIL);
526#ifdef VBOX_WITH_USB_VIDEO
527 unconst(mUsbWebcamInterface) = new UsbWebcamInterface(this);
528 AssertReturn(mUsbWebcamInterface, E_FAIL);
529#endif
530
531 /* VirtualBox events registration. */
532 {
533 ComPtr<IEventSource> pES;
534 rc = pVirtualBox->COMGETTER(EventSource)(pES.asOutParam());
535 AssertComRC(rc);
536 ComObjPtr<VmEventListenerImpl> aVmListener;
537 aVmListener.createObject();
538 aVmListener->init(new VmEventListener(), this);
539 mVmListener = aVmListener;
540 com::SafeArray<VBoxEventType_T> eventTypes;
541 eventTypes.push_back(VBoxEventType_OnNATRedirect);
542 eventTypes.push_back(VBoxEventType_OnHostPciDevicePlug);
543 rc = pES->RegisterListener(aVmListener, ComSafeArrayAsInParam(eventTypes), true);
544 AssertComRC(rc);
545 }
546
547
548 /* Confirm a successful initialization when it's the case */
549 autoInitSpan.setSucceeded();
550
551#ifdef VBOX_WITH_EXTPACK
552 /* Let the extension packs have a go at things (hold no locks). */
553 if (SUCCEEDED(rc))
554 mptrExtPackManager->callAllConsoleReadyHooks(this);
555#endif
556
557 LogFlowThisFuncLeave();
558
559 return S_OK;
560}
561
562/**
563 * Uninitializes the Console object.
564 */
565void Console::uninit()
566{
567 LogFlowThisFuncEnter();
568
569 /* Enclose the state transition Ready->InUninit->NotReady */
570 AutoUninitSpan autoUninitSpan(this);
571 if (autoUninitSpan.uninitDone())
572 {
573 LogFlowThisFunc(("Already uninitialized.\n"));
574 LogFlowThisFuncLeave();
575 return;
576 }
577
578 LogFlowThisFunc(("initFailed()=%d\n", autoUninitSpan.initFailed()));
579 if (mVmListener)
580 {
581 ComPtr<IEventSource> pES;
582 ComPtr<IVirtualBox> pVirtualBox;
583 HRESULT rc = mMachine->COMGETTER(Parent)(pVirtualBox.asOutParam());
584 AssertComRC(rc);
585 if (SUCCEEDED(rc) && !pVirtualBox.isNull())
586 {
587 rc = pVirtualBox->COMGETTER(EventSource)(pES.asOutParam());
588 AssertComRC(rc);
589 if (!pES.isNull())
590 {
591 rc = pES->UnregisterListener(mVmListener);
592 AssertComRC(rc);
593 }
594 }
595 mVmListener.setNull();
596 }
597
598 /* power down the VM if necessary */
599 if (mpUVM)
600 {
601 powerDown();
602 Assert(mpUVM == NULL);
603 }
604
605 if (mVMZeroCallersSem != NIL_RTSEMEVENT)
606 {
607 RTSemEventDestroy(mVMZeroCallersSem);
608 mVMZeroCallersSem = NIL_RTSEMEVENT;
609 }
610
611 if (mpVmm2UserMethods)
612 {
613 RTMemFree((void *)mpVmm2UserMethods);
614 mpVmm2UserMethods = NULL;
615 }
616
617#ifdef VBOX_WITH_USB_VIDEO
618 if (mUsbWebcamInterface)
619 {
620 delete mUsbWebcamInterface;
621 unconst(mUsbWebcamInterface) = NULL;
622 }
623#endif
624
625 if (mAudioSniffer)
626 {
627 delete mAudioSniffer;
628 unconst(mAudioSniffer) = NULL;
629 }
630
631 // if the VM had a VMMDev with an HGCM thread, then remove that here
632 if (m_pVMMDev)
633 {
634 delete m_pVMMDev;
635 unconst(m_pVMMDev) = NULL;
636 }
637
638 if (mBusMgr)
639 {
640 mBusMgr->Release();
641 mBusMgr = NULL;
642 }
643
644 m_mapGlobalSharedFolders.clear();
645 m_mapMachineSharedFolders.clear();
646 m_mapSharedFolders.clear(); // console instances
647
648 mRemoteUSBDevices.clear();
649 mUSBDevices.clear();
650
651 if (mVRDEServerInfo)
652 {
653 mVRDEServerInfo->uninit();
654 unconst(mVRDEServerInfo).setNull();;
655 }
656
657 if (mDebugger)
658 {
659 mDebugger->uninit();
660 unconst(mDebugger).setNull();
661 }
662
663 if (mDisplay)
664 {
665 mDisplay->uninit();
666 unconst(mDisplay).setNull();
667 }
668
669 if (mMouse)
670 {
671 mMouse->uninit();
672 unconst(mMouse).setNull();
673 }
674
675 if (mKeyboard)
676 {
677 mKeyboard->uninit();
678 unconst(mKeyboard).setNull();;
679 }
680
681 if (mGuest)
682 {
683 mGuest->uninit();
684 unconst(mGuest).setNull();;
685 }
686
687 if (mConsoleVRDPServer)
688 {
689 delete mConsoleVRDPServer;
690 unconst(mConsoleVRDPServer) = NULL;
691 }
692
693 unconst(mVRDEServer).setNull();
694
695 unconst(mControl).setNull();
696 unconst(mMachine).setNull();
697
698 // we don't perform uninit() as it's possible that some pending event refers to this source
699 unconst(mEventSource).setNull();
700
701#ifdef CONSOLE_WITH_EVENT_CACHE
702 mCallbackData.clear();
703#endif
704
705 LogFlowThisFuncLeave();
706}
707
708#ifdef VBOX_WITH_GUEST_PROPS
709
710/**
711 * Handles guest properties on a VM reset.
712 *
713 * We must delete properties that are flagged TRANSRESET.
714 *
715 * @todo r=bird: Would be more efficient if we added a request to the HGCM
716 * service to do this instead of detouring thru VBoxSVC.
717 * (IMachine::SetGuestProperty ends up in VBoxSVC, which in turns calls
718 * back into the VM process and the HGCM service.)
719 */
720void Console::guestPropertiesHandleVMReset(void)
721{
722 com::SafeArray<BSTR> arrNames;
723 com::SafeArray<BSTR> arrValues;
724 com::SafeArray<LONG64> arrTimestamps;
725 com::SafeArray<BSTR> arrFlags;
726 HRESULT hrc = enumerateGuestProperties(Bstr("*").raw(),
727 ComSafeArrayAsOutParam(arrNames),
728 ComSafeArrayAsOutParam(arrValues),
729 ComSafeArrayAsOutParam(arrTimestamps),
730 ComSafeArrayAsOutParam(arrFlags));
731 if (SUCCEEDED(hrc))
732 {
733 for (size_t i = 0; i < arrFlags.size(); i++)
734 {
735 /* Delete all properties which have the flag "TRANSRESET". */
736 if (Utf8Str(arrFlags[i]).contains("TRANSRESET", Utf8Str::CaseInsensitive))
737 {
738 hrc = mMachine->SetGuestProperty(arrNames[i], Bstr("").raw() /* Value */,
739 Bstr("").raw() /* Flags */);
740 if (FAILED(hrc))
741 LogRel(("RESET: Could not delete transient property \"%ls\", rc=%Rhrc\n",
742 arrNames[i], hrc));
743 }
744 }
745 }
746 else
747 LogRel(("RESET: Unable to enumerate guest properties, rc=%Rhrc\n", hrc));
748}
749
750bool Console::guestPropertiesVRDPEnabled(void)
751{
752 Bstr value;
753 HRESULT hrc = mMachine->GetExtraData(Bstr("VBoxInternal2/EnableGuestPropertiesVRDP").raw(),
754 value.asOutParam());
755 if ( hrc == S_OK
756 && value == "1")
757 return true;
758 return false;
759}
760
761void Console::guestPropertiesVRDPUpdateLogon(uint32_t u32ClientId, const char *pszUser, const char *pszDomain)
762{
763 if (!guestPropertiesVRDPEnabled())
764 return;
765
766 char szPropNm[256];
767 Bstr bstrReadOnlyGuest(L"RDONLYGUEST");
768
769 RTStrPrintf(szPropNm, sizeof(szPropNm), "/VirtualBox/HostInfo/VRDP/Client/%u/Name", u32ClientId);
770 Bstr clientName;
771 mVRDEServerInfo->COMGETTER(ClientName)(clientName.asOutParam());
772
773 mMachine->SetGuestProperty(Bstr(szPropNm).raw(),
774 clientName.raw(),
775 bstrReadOnlyGuest.raw());
776
777 RTStrPrintf(szPropNm, sizeof(szPropNm), "/VirtualBox/HostInfo/VRDP/Client/%u/User", u32ClientId);
778 mMachine->SetGuestProperty(Bstr(szPropNm).raw(),
779 Bstr(pszUser).raw(),
780 bstrReadOnlyGuest.raw());
781
782 RTStrPrintf(szPropNm, sizeof(szPropNm), "/VirtualBox/HostInfo/VRDP/Client/%u/Domain", u32ClientId);
783 mMachine->SetGuestProperty(Bstr(szPropNm).raw(),
784 Bstr(pszDomain).raw(),
785 bstrReadOnlyGuest.raw());
786
787 char szClientId[64];
788 RTStrPrintf(szClientId, sizeof(szClientId), "%d", u32ClientId);
789 mMachine->SetGuestProperty(Bstr("/VirtualBox/HostInfo/VRDP/LastConnectedClient").raw(),
790 Bstr(szClientId).raw(),
791 bstrReadOnlyGuest.raw());
792
793 return;
794}
795
796void Console::guestPropertiesVRDPUpdateNameChange(uint32_t u32ClientId, const char *pszName)
797{
798 if (!guestPropertiesVRDPEnabled())
799 return;
800
801 char szPropNm[256];
802 Bstr bstrReadOnlyGuest(L"RDONLYGUEST");
803
804 RTStrPrintf(szPropNm, sizeof(szPropNm), "/VirtualBox/HostInfo/VRDP/Client/%u/Name", u32ClientId);
805 Bstr clientName(pszName);
806
807 mMachine->SetGuestProperty(Bstr(szPropNm).raw(),
808 clientName.raw(),
809 bstrReadOnlyGuest.raw());
810
811}
812
813void Console::guestPropertiesVRDPUpdateClientAttach(uint32_t u32ClientId, bool fAttached)
814{
815 if (!guestPropertiesVRDPEnabled())
816 return;
817
818 Bstr bstrReadOnlyGuest(L"RDONLYGUEST");
819
820 char szPropNm[256];
821 RTStrPrintf(szPropNm, sizeof(szPropNm), "/VirtualBox/HostInfo/VRDP/Client/%u/Attach", u32ClientId);
822
823 Bstr bstrValue = fAttached? "1": "0";
824
825 mMachine->SetGuestProperty(Bstr(szPropNm).raw(),
826 bstrValue.raw(),
827 bstrReadOnlyGuest.raw());
828}
829
830void Console::guestPropertiesVRDPUpdateDisconnect(uint32_t u32ClientId)
831{
832 if (!guestPropertiesVRDPEnabled())
833 return;
834
835 Bstr bstrReadOnlyGuest(L"RDONLYGUEST");
836
837 char szPropNm[256];
838 RTStrPrintf(szPropNm, sizeof(szPropNm), "/VirtualBox/HostInfo/VRDP/Client/%u/Name", u32ClientId);
839 mMachine->SetGuestProperty(Bstr(szPropNm).raw(), NULL,
840 bstrReadOnlyGuest.raw());
841
842 RTStrPrintf(szPropNm, sizeof(szPropNm), "/VirtualBox/HostInfo/VRDP/Client/%u/User", u32ClientId);
843 mMachine->SetGuestProperty(Bstr(szPropNm).raw(), NULL,
844 bstrReadOnlyGuest.raw());
845
846 RTStrPrintf(szPropNm, sizeof(szPropNm), "/VirtualBox/HostInfo/VRDP/Client/%u/Domain", u32ClientId);
847 mMachine->SetGuestProperty(Bstr(szPropNm).raw(), NULL,
848 bstrReadOnlyGuest.raw());
849
850 RTStrPrintf(szPropNm, sizeof(szPropNm), "/VirtualBox/HostInfo/VRDP/Client/%u/Attach", u32ClientId);
851 mMachine->SetGuestProperty(Bstr(szPropNm).raw(), NULL,
852 bstrReadOnlyGuest.raw());
853
854 char szClientId[64];
855 RTStrPrintf(szClientId, sizeof(szClientId), "%d", u32ClientId);
856 mMachine->SetGuestProperty(Bstr("/VirtualBox/HostInfo/VRDP/LastDisconnectedClient").raw(),
857 Bstr(szClientId).raw(),
858 bstrReadOnlyGuest.raw());
859
860 return;
861}
862
863#endif /* VBOX_WITH_GUEST_PROPS */
864
865#ifdef VBOX_WITH_EXTPACK
866/**
867 * Used by VRDEServer and others to talke to the extension pack manager.
868 *
869 * @returns The extension pack manager.
870 */
871ExtPackManager *Console::getExtPackManager()
872{
873 return mptrExtPackManager;
874}
875#endif
876
877
878int Console::VRDPClientLogon(uint32_t u32ClientId, const char *pszUser, const char *pszPassword, const char *pszDomain)
879{
880 LogFlowFuncEnter();
881 LogFlowFunc(("%d, %s, %s, %s\n", u32ClientId, pszUser, pszPassword, pszDomain));
882
883 AutoCaller autoCaller(this);
884 if (!autoCaller.isOk())
885 {
886 /* Console has been already uninitialized, deny request */
887 LogRel(("AUTH: Access denied (Console uninitialized).\n"));
888 LogFlowFuncLeave();
889 return VERR_ACCESS_DENIED;
890 }
891
892 Bstr id;
893 HRESULT hrc = mMachine->COMGETTER(Id)(id.asOutParam());
894 Guid uuid = Guid(id);
895
896 AssertComRCReturn(hrc, VERR_ACCESS_DENIED);
897
898 AuthType_T authType = AuthType_Null;
899 hrc = mVRDEServer->COMGETTER(AuthType)(&authType);
900 AssertComRCReturn(hrc, VERR_ACCESS_DENIED);
901
902 ULONG authTimeout = 0;
903 hrc = mVRDEServer->COMGETTER(AuthTimeout)(&authTimeout);
904 AssertComRCReturn(hrc, VERR_ACCESS_DENIED);
905
906 AuthResult result = AuthResultAccessDenied;
907 AuthGuestJudgement guestJudgement = AuthGuestNotAsked;
908
909 LogFlowFunc(("Auth type %d\n", authType));
910
911 LogRel(("AUTH: User: [%s]. Domain: [%s]. Authentication type: [%s]\n",
912 pszUser, pszDomain,
913 authType == AuthType_Null?
914 "Null":
915 (authType == AuthType_External?
916 "External":
917 (authType == AuthType_Guest?
918 "Guest":
919 "INVALID"
920 )
921 )
922 ));
923
924 switch (authType)
925 {
926 case AuthType_Null:
927 {
928 result = AuthResultAccessGranted;
929 break;
930 }
931
932 case AuthType_External:
933 {
934 /* Call the external library. */
935 result = mConsoleVRDPServer->Authenticate(uuid, guestJudgement, pszUser, pszPassword, pszDomain, u32ClientId);
936
937 if (result != AuthResultDelegateToGuest)
938 {
939 break;
940 }
941
942 LogRel(("AUTH: Delegated to guest.\n"));
943
944 LogFlowFunc(("External auth asked for guest judgement\n"));
945 } /* pass through */
946
947 case AuthType_Guest:
948 {
949 guestJudgement = AuthGuestNotReacted;
950
951 // @todo r=dj locking required here for m_pVMMDev?
952 PPDMIVMMDEVPORT pDevPort;
953 if ( (m_pVMMDev)
954 && ((pDevPort = m_pVMMDev->getVMMDevPort()))
955 )
956 {
957 /* Issue the request to guest. Assume that the call does not require EMT. It should not. */
958
959 /* Ask the guest to judge these credentials. */
960 uint32_t u32GuestFlags = VMMDEV_SETCREDENTIALS_JUDGE;
961
962 int rc = pDevPort->pfnSetCredentials(pDevPort, pszUser, pszPassword, pszDomain, u32GuestFlags);
963
964 if (RT_SUCCESS(rc))
965 {
966 /* Wait for guest. */
967 rc = m_pVMMDev->WaitCredentialsJudgement(authTimeout, &u32GuestFlags);
968
969 if (RT_SUCCESS(rc))
970 {
971 switch (u32GuestFlags & (VMMDEV_CREDENTIALS_JUDGE_OK | VMMDEV_CREDENTIALS_JUDGE_DENY | VMMDEV_CREDENTIALS_JUDGE_NOJUDGEMENT))
972 {
973 case VMMDEV_CREDENTIALS_JUDGE_DENY: guestJudgement = AuthGuestAccessDenied; break;
974 case VMMDEV_CREDENTIALS_JUDGE_NOJUDGEMENT: guestJudgement = AuthGuestNoJudgement; break;
975 case VMMDEV_CREDENTIALS_JUDGE_OK: guestJudgement = AuthGuestAccessGranted; break;
976 default:
977 LogFlowFunc(("Invalid guest flags %08X!!!\n", u32GuestFlags)); break;
978 }
979 }
980 else
981 {
982 LogFlowFunc(("Wait for credentials judgement rc = %Rrc!!!\n", rc));
983 }
984
985 LogFlowFunc(("Guest judgement %d\n", guestJudgement));
986 }
987 else
988 {
989 LogFlowFunc(("Could not set credentials rc = %Rrc!!!\n", rc));
990 }
991 }
992
993 if (authType == AuthType_External)
994 {
995 LogRel(("AUTH: Guest judgement %d.\n", guestJudgement));
996 LogFlowFunc(("External auth called again with guest judgement = %d\n", guestJudgement));
997 result = mConsoleVRDPServer->Authenticate(uuid, guestJudgement, pszUser, pszPassword, pszDomain, u32ClientId);
998 }
999 else
1000 {
1001 switch (guestJudgement)
1002 {
1003 case AuthGuestAccessGranted:
1004 result = AuthResultAccessGranted;
1005 break;
1006 default:
1007 result = AuthResultAccessDenied;
1008 break;
1009 }
1010 }
1011 } break;
1012
1013 default:
1014 AssertFailed();
1015 }
1016
1017 LogFlowFunc(("Result = %d\n", result));
1018 LogFlowFuncLeave();
1019
1020 if (result != AuthResultAccessGranted)
1021 {
1022 /* Reject. */
1023 LogRel(("AUTH: Access denied.\n"));
1024 return VERR_ACCESS_DENIED;
1025 }
1026
1027 LogRel(("AUTH: Access granted.\n"));
1028
1029 /* Multiconnection check must be made after authentication, so bad clients would not interfere with a good one. */
1030 BOOL allowMultiConnection = FALSE;
1031 hrc = mVRDEServer->COMGETTER(AllowMultiConnection)(&allowMultiConnection);
1032 AssertComRCReturn(hrc, VERR_ACCESS_DENIED);
1033
1034 BOOL reuseSingleConnection = FALSE;
1035 hrc = mVRDEServer->COMGETTER(ReuseSingleConnection)(&reuseSingleConnection);
1036 AssertComRCReturn(hrc, VERR_ACCESS_DENIED);
1037
1038 LogFlowFunc(("allowMultiConnection %d, reuseSingleConnection = %d, mcVRDPClients = %d, mu32SingleRDPClientId = %d\n", allowMultiConnection, reuseSingleConnection, mcVRDPClients, mu32SingleRDPClientId));
1039
1040 if (allowMultiConnection == FALSE)
1041 {
1042 /* Note: the 'mcVRDPClients' variable is incremented in ClientConnect callback, which is called when the client
1043 * is successfully connected, that is after the ClientLogon callback. Therefore the mcVRDPClients
1044 * value is 0 for first client.
1045 */
1046 if (mcVRDPClients != 0)
1047 {
1048 Assert(mcVRDPClients == 1);
1049 /* There is a client already.
1050 * If required drop the existing client connection and let the connecting one in.
1051 */
1052 if (reuseSingleConnection)
1053 {
1054 LogRel(("AUTH: Multiple connections are not enabled. Disconnecting existing client.\n"));
1055 mConsoleVRDPServer->DisconnectClient(mu32SingleRDPClientId, false);
1056 }
1057 else
1058 {
1059 /* Reject. */
1060 LogRel(("AUTH: Multiple connections are not enabled. Access denied.\n"));
1061 return VERR_ACCESS_DENIED;
1062 }
1063 }
1064
1065 /* Save the connected client id. From now on it will be necessary to disconnect this one. */
1066 mu32SingleRDPClientId = u32ClientId;
1067 }
1068
1069#ifdef VBOX_WITH_GUEST_PROPS
1070 guestPropertiesVRDPUpdateLogon(u32ClientId, pszUser, pszDomain);
1071#endif /* VBOX_WITH_GUEST_PROPS */
1072
1073 /* Check if the successfully verified credentials are to be sent to the guest. */
1074 BOOL fProvideGuestCredentials = FALSE;
1075
1076 Bstr value;
1077 hrc = mMachine->GetExtraData(Bstr("VRDP/ProvideGuestCredentials").raw(),
1078 value.asOutParam());
1079 if (SUCCEEDED(hrc) && value == "1")
1080 {
1081 /* Provide credentials only if there are no logged in users. */
1082 Bstr noLoggedInUsersValue;
1083 LONG64 ul64Timestamp = 0;
1084 Bstr flags;
1085
1086 hrc = getGuestProperty(Bstr("/VirtualBox/GuestInfo/OS/NoLoggedInUsers").raw(),
1087 noLoggedInUsersValue.asOutParam(), &ul64Timestamp, flags.asOutParam());
1088
1089 if (SUCCEEDED(hrc) && noLoggedInUsersValue != Bstr("false"))
1090 {
1091 /* And only if there are no connected clients. */
1092 if (ASMAtomicCmpXchgBool(&mcGuestCredentialsProvided, true, false))
1093 {
1094 fProvideGuestCredentials = TRUE;
1095 }
1096 }
1097 }
1098
1099 // @todo r=dj locking required here for m_pVMMDev?
1100 if ( fProvideGuestCredentials
1101 && m_pVMMDev)
1102 {
1103 uint32_t u32GuestFlags = VMMDEV_SETCREDENTIALS_GUESTLOGON;
1104
1105 int rc = m_pVMMDev->getVMMDevPort()->pfnSetCredentials(m_pVMMDev->getVMMDevPort(),
1106 pszUser, pszPassword, pszDomain, u32GuestFlags);
1107 AssertRC(rc);
1108 }
1109
1110 return VINF_SUCCESS;
1111}
1112
1113void Console::VRDPClientStatusChange(uint32_t u32ClientId, const char *pszStatus)
1114{
1115 LogFlowFuncEnter();
1116
1117 AutoCaller autoCaller(this);
1118 AssertComRCReturnVoid(autoCaller.rc());
1119
1120 /* Parse the status string. */
1121 if (RTStrICmp(pszStatus, "ATTACH") == 0)
1122 {
1123 guestPropertiesVRDPUpdateClientAttach(u32ClientId, true);
1124 }
1125 else if (RTStrICmp(pszStatus, "DETACH") == 0)
1126 {
1127 guestPropertiesVRDPUpdateClientAttach(u32ClientId, false);
1128 }
1129 else if (RTStrNICmp(pszStatus, "NAME=", strlen("NAME=")) == 0)
1130 {
1131 guestPropertiesVRDPUpdateNameChange(u32ClientId, pszStatus + strlen("NAME="));
1132 }
1133
1134 LogFlowFuncLeave();
1135}
1136
1137void Console::VRDPClientConnect(uint32_t u32ClientId)
1138{
1139 LogFlowFuncEnter();
1140
1141 AutoCaller autoCaller(this);
1142 AssertComRCReturnVoid(autoCaller.rc());
1143
1144 uint32_t u32Clients = ASMAtomicIncU32(&mcVRDPClients);
1145 VMMDev *pDev;
1146 PPDMIVMMDEVPORT pPort;
1147 if ( (u32Clients == 1)
1148 && ((pDev = getVMMDev()))
1149 && ((pPort = pDev->getVMMDevPort()))
1150 )
1151 {
1152 pPort->pfnVRDPChange(pPort,
1153 true,
1154 VRDP_EXPERIENCE_LEVEL_FULL); // @todo configurable
1155 }
1156
1157 NOREF(u32ClientId);
1158 mDisplay->VideoAccelVRDP(true);
1159
1160 LogFlowFuncLeave();
1161 return;
1162}
1163
1164void Console::VRDPClientDisconnect(uint32_t u32ClientId,
1165 uint32_t fu32Intercepted)
1166{
1167 LogFlowFuncEnter();
1168
1169 AutoCaller autoCaller(this);
1170 AssertComRCReturnVoid(autoCaller.rc());
1171
1172 AssertReturnVoid(mConsoleVRDPServer);
1173
1174 uint32_t u32Clients = ASMAtomicDecU32(&mcVRDPClients);
1175 VMMDev *pDev;
1176 PPDMIVMMDEVPORT pPort;
1177
1178 if ( (u32Clients == 0)
1179 && ((pDev = getVMMDev()))
1180 && ((pPort = pDev->getVMMDevPort()))
1181 )
1182 {
1183 pPort->pfnVRDPChange(pPort,
1184 false,
1185 0);
1186 }
1187
1188 mDisplay->VideoAccelVRDP(false);
1189
1190 if (fu32Intercepted & VRDE_CLIENT_INTERCEPT_USB)
1191 {
1192 mConsoleVRDPServer->USBBackendDelete(u32ClientId);
1193 }
1194
1195 if (fu32Intercepted & VRDE_CLIENT_INTERCEPT_CLIPBOARD)
1196 {
1197 mConsoleVRDPServer->ClipboardDelete(u32ClientId);
1198 }
1199
1200 if (fu32Intercepted & VRDE_CLIENT_INTERCEPT_AUDIO)
1201 {
1202 mcAudioRefs--;
1203
1204 if (mcAudioRefs <= 0)
1205 {
1206 if (mAudioSniffer)
1207 {
1208 PPDMIAUDIOSNIFFERPORT port = mAudioSniffer->getAudioSnifferPort();
1209 if (port)
1210 {
1211 port->pfnSetup(port, false, false);
1212 }
1213 }
1214 }
1215 }
1216
1217 Bstr uuid;
1218 HRESULT hrc = mMachine->COMGETTER(Id)(uuid.asOutParam());
1219 AssertComRC(hrc);
1220
1221 AuthType_T authType = AuthType_Null;
1222 hrc = mVRDEServer->COMGETTER(AuthType)(&authType);
1223 AssertComRC(hrc);
1224
1225 if (authType == AuthType_External)
1226 mConsoleVRDPServer->AuthDisconnect(uuid, u32ClientId);
1227
1228#ifdef VBOX_WITH_GUEST_PROPS
1229 guestPropertiesVRDPUpdateDisconnect(u32ClientId);
1230#endif /* VBOX_WITH_GUEST_PROPS */
1231
1232 if (u32Clients == 0)
1233 mcGuestCredentialsProvided = false;
1234
1235 LogFlowFuncLeave();
1236 return;
1237}
1238
1239void Console::VRDPInterceptAudio(uint32_t u32ClientId)
1240{
1241 LogFlowFuncEnter();
1242
1243 AutoCaller autoCaller(this);
1244 AssertComRCReturnVoid(autoCaller.rc());
1245
1246 LogFlowFunc(("mAudioSniffer %p, u32ClientId %d.\n",
1247 mAudioSniffer, u32ClientId));
1248 NOREF(u32ClientId);
1249
1250 ++mcAudioRefs;
1251
1252 if (mcAudioRefs == 1)
1253 {
1254 if (mAudioSniffer)
1255 {
1256 PPDMIAUDIOSNIFFERPORT port = mAudioSniffer->getAudioSnifferPort();
1257 if (port)
1258 {
1259 port->pfnSetup(port, true, true);
1260 }
1261 }
1262 }
1263
1264 LogFlowFuncLeave();
1265 return;
1266}
1267
1268void Console::VRDPInterceptUSB(uint32_t u32ClientId, void **ppvIntercept)
1269{
1270 LogFlowFuncEnter();
1271
1272 AutoCaller autoCaller(this);
1273 AssertComRCReturnVoid(autoCaller.rc());
1274
1275 AssertReturnVoid(mConsoleVRDPServer);
1276
1277 mConsoleVRDPServer->USBBackendCreate(u32ClientId, ppvIntercept);
1278
1279 LogFlowFuncLeave();
1280 return;
1281}
1282
1283void Console::VRDPInterceptClipboard(uint32_t u32ClientId)
1284{
1285 LogFlowFuncEnter();
1286
1287 AutoCaller autoCaller(this);
1288 AssertComRCReturnVoid(autoCaller.rc());
1289
1290 AssertReturnVoid(mConsoleVRDPServer);
1291
1292 mConsoleVRDPServer->ClipboardCreate(u32ClientId);
1293
1294 LogFlowFuncLeave();
1295 return;
1296}
1297
1298
1299//static
1300const char *Console::sSSMConsoleUnit = "ConsoleData";
1301//static
1302uint32_t Console::sSSMConsoleVer = 0x00010001;
1303
1304inline static const char *networkAdapterTypeToName(NetworkAdapterType_T adapterType)
1305{
1306 switch (adapterType)
1307 {
1308 case NetworkAdapterType_Am79C970A:
1309 case NetworkAdapterType_Am79C973:
1310 return "pcnet";
1311#ifdef VBOX_WITH_E1000
1312 case NetworkAdapterType_I82540EM:
1313 case NetworkAdapterType_I82543GC:
1314 case NetworkAdapterType_I82545EM:
1315 return "e1000";
1316#endif
1317#ifdef VBOX_WITH_VIRTIO
1318 case NetworkAdapterType_Virtio:
1319 return "virtio-net";
1320#endif
1321 default:
1322 AssertFailed();
1323 return "unknown";
1324 }
1325 return NULL;
1326}
1327
1328/**
1329 * Loads various console data stored in the saved state file.
1330 * This method does validation of the state file and returns an error info
1331 * when appropriate.
1332 *
1333 * The method does nothing if the machine is not in the Saved file or if
1334 * console data from it has already been loaded.
1335 *
1336 * @note The caller must lock this object for writing.
1337 */
1338HRESULT Console::loadDataFromSavedState()
1339{
1340 if (mMachineState != MachineState_Saved || mSavedStateDataLoaded)
1341 return S_OK;
1342
1343 Bstr savedStateFile;
1344 HRESULT rc = mMachine->COMGETTER(StateFilePath)(savedStateFile.asOutParam());
1345 if (FAILED(rc))
1346 return rc;
1347
1348 PSSMHANDLE ssm;
1349 int vrc = SSMR3Open(Utf8Str(savedStateFile).c_str(), 0, &ssm);
1350 if (RT_SUCCESS(vrc))
1351 {
1352 uint32_t version = 0;
1353 vrc = SSMR3Seek(ssm, sSSMConsoleUnit, 0 /* iInstance */, &version);
1354 if (SSM_VERSION_MAJOR(version) == SSM_VERSION_MAJOR(sSSMConsoleVer))
1355 {
1356 if (RT_SUCCESS(vrc))
1357 vrc = loadStateFileExecInternal(ssm, version);
1358 else if (vrc == VERR_SSM_UNIT_NOT_FOUND)
1359 vrc = VINF_SUCCESS;
1360 }
1361 else
1362 vrc = VERR_SSM_UNSUPPORTED_DATA_UNIT_VERSION;
1363
1364 SSMR3Close(ssm);
1365 }
1366
1367 if (RT_FAILURE(vrc))
1368 rc = setError(VBOX_E_FILE_ERROR,
1369 tr("The saved state file '%ls' is invalid (%Rrc). Delete the saved state and try again"),
1370 savedStateFile.raw(), vrc);
1371
1372 mSavedStateDataLoaded = true;
1373
1374 return rc;
1375}
1376
1377/**
1378 * Callback handler to save various console data to the state file,
1379 * called when the user saves the VM state.
1380 *
1381 * @param pvUser pointer to Console
1382 *
1383 * @note Locks the Console object for reading.
1384 */
1385//static
1386DECLCALLBACK(void)
1387Console::saveStateFileExec(PSSMHANDLE pSSM, void *pvUser)
1388{
1389 LogFlowFunc(("\n"));
1390
1391 Console *that = static_cast<Console *>(pvUser);
1392 AssertReturnVoid(that);
1393
1394 AutoCaller autoCaller(that);
1395 AssertComRCReturnVoid(autoCaller.rc());
1396
1397 AutoReadLock alock(that COMMA_LOCKVAL_SRC_POS);
1398
1399 int vrc = SSMR3PutU32(pSSM, (uint32_t)that->m_mapSharedFolders.size());
1400 AssertRC(vrc);
1401
1402 for (SharedFolderMap::const_iterator it = that->m_mapSharedFolders.begin();
1403 it != that->m_mapSharedFolders.end();
1404 ++it)
1405 {
1406 SharedFolder *pSF = (*it).second;
1407 AutoCaller sfCaller(pSF);
1408 AutoReadLock sfLock(pSF COMMA_LOCKVAL_SRC_POS);
1409
1410 Utf8Str name = pSF->getName();
1411 vrc = SSMR3PutU32(pSSM, (uint32_t)name.length() + 1 /* term. 0 */);
1412 AssertRC(vrc);
1413 vrc = SSMR3PutStrZ(pSSM, name.c_str());
1414 AssertRC(vrc);
1415
1416 Utf8Str hostPath = pSF->getHostPath();
1417 vrc = SSMR3PutU32(pSSM, (uint32_t)hostPath.length() + 1 /* term. 0 */);
1418 AssertRC(vrc);
1419 vrc = SSMR3PutStrZ(pSSM, hostPath.c_str());
1420 AssertRC(vrc);
1421
1422 vrc = SSMR3PutBool(pSSM, !!pSF->isWritable());
1423 AssertRC(vrc);
1424
1425 vrc = SSMR3PutBool(pSSM, !!pSF->isAutoMounted());
1426 AssertRC(vrc);
1427 }
1428
1429 return;
1430}
1431
1432/**
1433 * Callback handler to load various console data from the state file.
1434 * Called when the VM is being restored from the saved state.
1435 *
1436 * @param pvUser pointer to Console
1437 * @param uVersion Console unit version.
1438 * Should match sSSMConsoleVer.
1439 * @param uPass The data pass.
1440 *
1441 * @note Should locks the Console object for writing, if necessary.
1442 */
1443//static
1444DECLCALLBACK(int)
1445Console::loadStateFileExec(PSSMHANDLE pSSM, void *pvUser, uint32_t uVersion, uint32_t uPass)
1446{
1447 LogFlowFunc(("\n"));
1448
1449 if (SSM_VERSION_MAJOR_CHANGED(uVersion, sSSMConsoleVer))
1450 return VERR_VERSION_MISMATCH;
1451 Assert(uPass == SSM_PASS_FINAL); NOREF(uPass);
1452
1453 Console *that = static_cast<Console *>(pvUser);
1454 AssertReturn(that, VERR_INVALID_PARAMETER);
1455
1456 /* Currently, nothing to do when we've been called from VMR3Load*. */
1457 return SSMR3SkipToEndOfUnit(pSSM);
1458}
1459
1460/**
1461 * Method to load various console data from the state file.
1462 * Called from #loadDataFromSavedState.
1463 *
1464 * @param pvUser pointer to Console
1465 * @param u32Version Console unit version.
1466 * Should match sSSMConsoleVer.
1467 *
1468 * @note Locks the Console object for writing.
1469 */
1470int
1471Console::loadStateFileExecInternal(PSSMHANDLE pSSM, uint32_t u32Version)
1472{
1473 AutoCaller autoCaller(this);
1474 AssertComRCReturn(autoCaller.rc(), VERR_ACCESS_DENIED);
1475
1476 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
1477
1478 AssertReturn(m_mapSharedFolders.size() == 0, VERR_INTERNAL_ERROR);
1479
1480 uint32_t size = 0;
1481 int vrc = SSMR3GetU32(pSSM, &size);
1482 AssertRCReturn(vrc, vrc);
1483
1484 for (uint32_t i = 0; i < size; ++i)
1485 {
1486 Utf8Str strName;
1487 Utf8Str strHostPath;
1488 bool writable = true;
1489 bool autoMount = false;
1490
1491 uint32_t szBuf = 0;
1492 char *buf = NULL;
1493
1494 vrc = SSMR3GetU32(pSSM, &szBuf);
1495 AssertRCReturn(vrc, vrc);
1496 buf = new char[szBuf];
1497 vrc = SSMR3GetStrZ(pSSM, buf, szBuf);
1498 AssertRC(vrc);
1499 strName = buf;
1500 delete[] buf;
1501
1502 vrc = SSMR3GetU32(pSSM, &szBuf);
1503 AssertRCReturn(vrc, vrc);
1504 buf = new char[szBuf];
1505 vrc = SSMR3GetStrZ(pSSM, buf, szBuf);
1506 AssertRC(vrc);
1507 strHostPath = buf;
1508 delete[] buf;
1509
1510 if (u32Version > 0x00010000)
1511 SSMR3GetBool(pSSM, &writable);
1512
1513 if (u32Version > 0x00010000) // ???
1514 SSMR3GetBool(pSSM, &autoMount);
1515
1516 ComObjPtr<SharedFolder> pSharedFolder;
1517 pSharedFolder.createObject();
1518 HRESULT rc = pSharedFolder->init(this,
1519 strName,
1520 strHostPath,
1521 writable,
1522 autoMount,
1523 false /* fFailOnError */);
1524 AssertComRCReturn(rc, VERR_INTERNAL_ERROR);
1525
1526 m_mapSharedFolders.insert(std::make_pair(strName, pSharedFolder));
1527 }
1528
1529 return VINF_SUCCESS;
1530}
1531
1532#ifdef VBOX_WITH_GUEST_PROPS
1533
1534// static
1535DECLCALLBACK(int) Console::doGuestPropNotification(void *pvExtension,
1536 uint32_t u32Function,
1537 void *pvParms,
1538 uint32_t cbParms)
1539{
1540 using namespace guestProp;
1541
1542 Assert(u32Function == 0); NOREF(u32Function);
1543
1544 /*
1545 * No locking, as this is purely a notification which does not make any
1546 * changes to the object state.
1547 */
1548 PHOSTCALLBACKDATA pCBData = reinterpret_cast<PHOSTCALLBACKDATA>(pvParms);
1549 AssertReturn(sizeof(HOSTCALLBACKDATA) == cbParms, VERR_INVALID_PARAMETER);
1550 AssertReturn(HOSTCALLBACKMAGIC == pCBData->u32Magic, VERR_INVALID_PARAMETER);
1551 Log5(("Console::doGuestPropNotification: pCBData={.pcszName=%s, .pcszValue=%s, .pcszFlags=%s}\n",
1552 pCBData->pcszName, pCBData->pcszValue, pCBData->pcszFlags));
1553
1554 int rc;
1555 Bstr name(pCBData->pcszName);
1556 Bstr value(pCBData->pcszValue);
1557 Bstr flags(pCBData->pcszFlags);
1558 ComObjPtr<Console> pConsole = reinterpret_cast<Console *>(pvExtension);
1559 HRESULT hrc = pConsole->mControl->PushGuestProperty(name.raw(),
1560 value.raw(),
1561 pCBData->u64Timestamp,
1562 flags.raw());
1563 if (SUCCEEDED(hrc))
1564 rc = VINF_SUCCESS;
1565 else
1566 {
1567 LogFunc(("Console::doGuestPropNotification: hrc=%Rhrc pCBData={.pcszName=%s, .pcszValue=%s, .pcszFlags=%s}\n",
1568 hrc, pCBData->pcszName, pCBData->pcszValue, pCBData->pcszFlags));
1569 rc = Global::vboxStatusCodeFromCOM(hrc);
1570 }
1571 return rc;
1572}
1573
1574HRESULT Console::doEnumerateGuestProperties(CBSTR aPatterns,
1575 ComSafeArrayOut(BSTR, aNames),
1576 ComSafeArrayOut(BSTR, aValues),
1577 ComSafeArrayOut(LONG64, aTimestamps),
1578 ComSafeArrayOut(BSTR, aFlags))
1579{
1580 AssertReturn(m_pVMMDev, E_FAIL);
1581
1582 using namespace guestProp;
1583
1584 VBOXHGCMSVCPARM parm[3];
1585
1586 Utf8Str utf8Patterns(aPatterns);
1587 parm[0].type = VBOX_HGCM_SVC_PARM_PTR;
1588 parm[0].u.pointer.addr = (void*)utf8Patterns.c_str();
1589 parm[0].u.pointer.size = (uint32_t)utf8Patterns.length() + 1;
1590
1591 /*
1592 * Now things get slightly complicated. Due to a race with the guest adding
1593 * properties, there is no good way to know how much to enlarge a buffer for
1594 * the service to enumerate into. We choose a decent starting size and loop a
1595 * few times, each time retrying with the size suggested by the service plus
1596 * one Kb.
1597 */
1598 size_t cchBuf = 4096;
1599 Utf8Str Utf8Buf;
1600 int vrc = VERR_BUFFER_OVERFLOW;
1601 for (unsigned i = 0; i < 10 && (VERR_BUFFER_OVERFLOW == vrc); ++i)
1602 {
1603 try
1604 {
1605 Utf8Buf.reserve(cchBuf + 1024);
1606 }
1607 catch(...)
1608 {
1609 return E_OUTOFMEMORY;
1610 }
1611 parm[1].type = VBOX_HGCM_SVC_PARM_PTR;
1612 parm[1].u.pointer.addr = Utf8Buf.mutableRaw();
1613 parm[1].u.pointer.size = (uint32_t)cchBuf + 1024;
1614 vrc = m_pVMMDev->hgcmHostCall("VBoxGuestPropSvc", ENUM_PROPS_HOST, 3,
1615 &parm[0]);
1616 Utf8Buf.jolt();
1617 if (parm[2].type != VBOX_HGCM_SVC_PARM_32BIT)
1618 return setError(E_FAIL, tr("Internal application error"));
1619 cchBuf = parm[2].u.uint32;
1620 }
1621 if (VERR_BUFFER_OVERFLOW == vrc)
1622 return setError(E_UNEXPECTED,
1623 tr("Temporary failure due to guest activity, please retry"));
1624
1625 /*
1626 * Finally we have to unpack the data returned by the service into the safe
1627 * arrays supplied by the caller. We start by counting the number of entries.
1628 */
1629 const char *pszBuf
1630 = reinterpret_cast<const char *>(parm[1].u.pointer.addr);
1631 unsigned cEntries = 0;
1632 /* The list is terminated by a zero-length string at the end of a set
1633 * of four strings. */
1634 for (size_t i = 0; strlen(pszBuf + i) != 0; )
1635 {
1636 /* We are counting sets of four strings. */
1637 for (unsigned j = 0; j < 4; ++j)
1638 i += strlen(pszBuf + i) + 1;
1639 ++cEntries;
1640 }
1641
1642 /*
1643 * And now we create the COM safe arrays and fill them in.
1644 */
1645 com::SafeArray<BSTR> names(cEntries);
1646 com::SafeArray<BSTR> values(cEntries);
1647 com::SafeArray<LONG64> timestamps(cEntries);
1648 com::SafeArray<BSTR> flags(cEntries);
1649 size_t iBuf = 0;
1650 /* Rely on the service to have formated the data correctly. */
1651 for (unsigned i = 0; i < cEntries; ++i)
1652 {
1653 size_t cchName = strlen(pszBuf + iBuf);
1654 Bstr(pszBuf + iBuf).detachTo(&names[i]);
1655 iBuf += cchName + 1;
1656 size_t cchValue = strlen(pszBuf + iBuf);
1657 Bstr(pszBuf + iBuf).detachTo(&values[i]);
1658 iBuf += cchValue + 1;
1659 size_t cchTimestamp = strlen(pszBuf + iBuf);
1660 timestamps[i] = RTStrToUInt64(pszBuf + iBuf);
1661 iBuf += cchTimestamp + 1;
1662 size_t cchFlags = strlen(pszBuf + iBuf);
1663 Bstr(pszBuf + iBuf).detachTo(&flags[i]);
1664 iBuf += cchFlags + 1;
1665 }
1666 names.detachTo(ComSafeArrayOutArg(aNames));
1667 values.detachTo(ComSafeArrayOutArg(aValues));
1668 timestamps.detachTo(ComSafeArrayOutArg(aTimestamps));
1669 flags.detachTo(ComSafeArrayOutArg(aFlags));
1670 return S_OK;
1671}
1672
1673#endif /* VBOX_WITH_GUEST_PROPS */
1674
1675
1676// IConsole properties
1677/////////////////////////////////////////////////////////////////////////////
1678
1679STDMETHODIMP Console::COMGETTER(Machine)(IMachine **aMachine)
1680{
1681 CheckComArgOutPointerValid(aMachine);
1682
1683 AutoCaller autoCaller(this);
1684 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1685
1686 /* mMachine is constant during life time, no need to lock */
1687 mMachine.queryInterfaceTo(aMachine);
1688
1689 /* callers expect to get a valid reference, better fail than crash them */
1690 if (mMachine.isNull())
1691 return E_FAIL;
1692
1693 return S_OK;
1694}
1695
1696STDMETHODIMP Console::COMGETTER(State)(MachineState_T *aMachineState)
1697{
1698 CheckComArgOutPointerValid(aMachineState);
1699
1700 AutoCaller autoCaller(this);
1701 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1702
1703 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1704
1705 /* we return our local state (since it's always the same as on the server) */
1706 *aMachineState = mMachineState;
1707
1708 return S_OK;
1709}
1710
1711STDMETHODIMP Console::COMGETTER(Guest)(IGuest **aGuest)
1712{
1713 CheckComArgOutPointerValid(aGuest);
1714
1715 AutoCaller autoCaller(this);
1716 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1717
1718 /* mGuest is constant during life time, no need to lock */
1719 mGuest.queryInterfaceTo(aGuest);
1720
1721 return S_OK;
1722}
1723
1724STDMETHODIMP Console::COMGETTER(Keyboard)(IKeyboard **aKeyboard)
1725{
1726 CheckComArgOutPointerValid(aKeyboard);
1727
1728 AutoCaller autoCaller(this);
1729 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1730
1731 /* mKeyboard is constant during life time, no need to lock */
1732 mKeyboard.queryInterfaceTo(aKeyboard);
1733
1734 return S_OK;
1735}
1736
1737STDMETHODIMP Console::COMGETTER(Mouse)(IMouse **aMouse)
1738{
1739 CheckComArgOutPointerValid(aMouse);
1740
1741 AutoCaller autoCaller(this);
1742 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1743
1744 /* mMouse is constant during life time, no need to lock */
1745 mMouse.queryInterfaceTo(aMouse);
1746
1747 return S_OK;
1748}
1749
1750STDMETHODIMP Console::COMGETTER(Display)(IDisplay **aDisplay)
1751{
1752 CheckComArgOutPointerValid(aDisplay);
1753
1754 AutoCaller autoCaller(this);
1755 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1756
1757 /* mDisplay is constant during life time, no need to lock */
1758 mDisplay.queryInterfaceTo(aDisplay);
1759
1760 return S_OK;
1761}
1762
1763STDMETHODIMP Console::COMGETTER(Debugger)(IMachineDebugger **aDebugger)
1764{
1765 CheckComArgOutPointerValid(aDebugger);
1766
1767 AutoCaller autoCaller(this);
1768 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1769
1770 /* we need a write lock because of the lazy mDebugger initialization*/
1771 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
1772
1773 /* check if we have to create the debugger object */
1774 if (!mDebugger)
1775 {
1776 unconst(mDebugger).createObject();
1777 mDebugger->init(this);
1778 }
1779
1780 mDebugger.queryInterfaceTo(aDebugger);
1781
1782 return S_OK;
1783}
1784
1785STDMETHODIMP Console::COMGETTER(USBDevices)(ComSafeArrayOut(IUSBDevice *, aUSBDevices))
1786{
1787 CheckComArgOutSafeArrayPointerValid(aUSBDevices);
1788
1789 AutoCaller autoCaller(this);
1790 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1791
1792 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1793
1794 SafeIfaceArray<IUSBDevice> collection(mUSBDevices);
1795 collection.detachTo(ComSafeArrayOutArg(aUSBDevices));
1796
1797 return S_OK;
1798}
1799
1800STDMETHODIMP Console::COMGETTER(RemoteUSBDevices)(ComSafeArrayOut(IHostUSBDevice *, aRemoteUSBDevices))
1801{
1802 CheckComArgOutSafeArrayPointerValid(aRemoteUSBDevices);
1803
1804 AutoCaller autoCaller(this);
1805 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1806
1807 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1808
1809 SafeIfaceArray<IHostUSBDevice> collection(mRemoteUSBDevices);
1810 collection.detachTo(ComSafeArrayOutArg(aRemoteUSBDevices));
1811
1812 return S_OK;
1813}
1814
1815STDMETHODIMP Console::COMGETTER(VRDEServerInfo)(IVRDEServerInfo **aVRDEServerInfo)
1816{
1817 CheckComArgOutPointerValid(aVRDEServerInfo);
1818
1819 AutoCaller autoCaller(this);
1820 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1821
1822 /* mDisplay is constant during life time, no need to lock */
1823 mVRDEServerInfo.queryInterfaceTo(aVRDEServerInfo);
1824
1825 return S_OK;
1826}
1827
1828STDMETHODIMP
1829Console::COMGETTER(SharedFolders)(ComSafeArrayOut(ISharedFolder *, aSharedFolders))
1830{
1831 CheckComArgOutSafeArrayPointerValid(aSharedFolders);
1832
1833 AutoCaller autoCaller(this);
1834 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1835
1836 /* loadDataFromSavedState() needs a write lock */
1837 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
1838
1839 /* Read console data stored in the saved state file (if not yet done) */
1840 HRESULT rc = loadDataFromSavedState();
1841 if (FAILED(rc)) return rc;
1842
1843 SafeIfaceArray<ISharedFolder> sf(m_mapSharedFolders);
1844 sf.detachTo(ComSafeArrayOutArg(aSharedFolders));
1845
1846 return S_OK;
1847}
1848
1849
1850STDMETHODIMP Console::COMGETTER(EventSource)(IEventSource ** aEventSource)
1851{
1852 CheckComArgOutPointerValid(aEventSource);
1853
1854 AutoCaller autoCaller(this);
1855 HRESULT hrc = autoCaller.rc();
1856 if (SUCCEEDED(hrc))
1857 {
1858 // no need to lock - lifetime constant
1859 mEventSource.queryInterfaceTo(aEventSource);
1860 }
1861
1862 return hrc;
1863}
1864
1865STDMETHODIMP Console::COMGETTER(AttachedPciDevices)(ComSafeArrayOut(IPciDeviceAttachment *, aAttachments))
1866{
1867 CheckComArgOutSafeArrayPointerValid(aAttachments);
1868
1869 AutoCaller autoCaller(this);
1870 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1871
1872 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1873
1874 if (mBusMgr)
1875 mBusMgr->listAttachedPciDevices(ComSafeArrayOutArg(aAttachments));
1876 else
1877 {
1878 com::SafeIfaceArray<IPciDeviceAttachment> result((size_t)0);
1879 result.detachTo(ComSafeArrayOutArg(aAttachments));
1880 }
1881
1882 return S_OK;
1883}
1884
1885STDMETHODIMP Console::COMGETTER(UseHostClipboard)(BOOL *aUseHostClipboard)
1886{
1887 CheckComArgOutPointerValid(aUseHostClipboard);
1888
1889 AutoCaller autoCaller(this);
1890 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1891
1892 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1893
1894 *aUseHostClipboard = mfUseHostClipboard;
1895
1896 return S_OK;
1897}
1898
1899STDMETHODIMP Console::COMSETTER(UseHostClipboard)(BOOL aUseHostClipboard)
1900{
1901 AutoCaller autoCaller(this);
1902 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1903
1904 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
1905
1906 mfUseHostClipboard = aUseHostClipboard;
1907
1908 return S_OK;
1909}
1910
1911// IConsole methods
1912/////////////////////////////////////////////////////////////////////////////
1913
1914
1915STDMETHODIMP Console::PowerUp(IProgress **aProgress)
1916{
1917 return powerUp(aProgress, false /* aPaused */);
1918}
1919
1920STDMETHODIMP Console::PowerUpPaused(IProgress **aProgress)
1921{
1922 return powerUp(aProgress, true /* aPaused */);
1923}
1924
1925STDMETHODIMP Console::PowerDown(IProgress **aProgress)
1926{
1927 LogFlowThisFuncEnter();
1928 LogFlowThisFunc(("mMachineState=%d\n", mMachineState));
1929
1930 CheckComArgOutPointerValid(aProgress);
1931
1932 AutoCaller autoCaller(this);
1933 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1934
1935 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
1936
1937 switch (mMachineState)
1938 {
1939 case MachineState_Running:
1940 case MachineState_Paused:
1941 case MachineState_Stuck:
1942 break;
1943
1944 /* Try cancel the teleportation. */
1945 case MachineState_Teleporting:
1946 case MachineState_TeleportingPausedVM:
1947 if (!mptrCancelableProgress.isNull())
1948 {
1949 HRESULT hrc = mptrCancelableProgress->Cancel();
1950 if (SUCCEEDED(hrc))
1951 break;
1952 }
1953 return setError(VBOX_E_INVALID_VM_STATE, tr("Cannot power down at this point in a teleportation"));
1954
1955 /* Try cancel the live snapshot. */
1956 case MachineState_LiveSnapshotting:
1957 if (!mptrCancelableProgress.isNull())
1958 {
1959 HRESULT hrc = mptrCancelableProgress->Cancel();
1960 if (SUCCEEDED(hrc))
1961 break;
1962 }
1963 return setError(VBOX_E_INVALID_VM_STATE, tr("Cannot power down at this point in a live snapshot"));
1964
1965 /* Try cancel the FT sync. */
1966 case MachineState_FaultTolerantSyncing:
1967 if (!mptrCancelableProgress.isNull())
1968 {
1969 HRESULT hrc = mptrCancelableProgress->Cancel();
1970 if (SUCCEEDED(hrc))
1971 break;
1972 }
1973 return setError(VBOX_E_INVALID_VM_STATE, tr("Cannot power down at this point in a fault tolerant sync"));
1974
1975 /* extra nice error message for a common case */
1976 case MachineState_Saved:
1977 return setError(VBOX_E_INVALID_VM_STATE, tr("Cannot power down a saved virtual machine"));
1978 case MachineState_Stopping:
1979 return setError(VBOX_E_INVALID_VM_STATE, tr("The virtual machine is being powered down"));
1980 default:
1981 return setError(VBOX_E_INVALID_VM_STATE,
1982 tr("Invalid machine state: %s (must be Running, Paused or Stuck)"),
1983 Global::stringifyMachineState(mMachineState));
1984 }
1985
1986 LogFlowThisFunc(("Initiating SHUTDOWN request...\n"));
1987
1988 /* memorize the current machine state */
1989 MachineState_T lastMachineState = mMachineState;
1990
1991 HRESULT rc = S_OK;
1992 bool fBeganPowerDown = false;
1993
1994 do
1995 {
1996 ComPtr<IProgress> pProgress;
1997
1998 /*
1999 * request a progress object from the server
2000 * (this will set the machine state to Stopping on the server to block
2001 * others from accessing this machine)
2002 */
2003 rc = mControl->BeginPoweringDown(pProgress.asOutParam());
2004 if (FAILED(rc))
2005 break;
2006
2007 fBeganPowerDown = true;
2008
2009 /* sync the state with the server */
2010 setMachineStateLocally(MachineState_Stopping);
2011
2012 /* setup task object and thread to carry out the operation asynchronously */
2013 std::auto_ptr<VMPowerDownTask> task(new VMPowerDownTask(this, pProgress));
2014 AssertBreakStmt(task->isOk(), rc = E_FAIL);
2015
2016 int vrc = RTThreadCreate(NULL, Console::powerDownThread,
2017 (void *) task.get(), 0,
2018 RTTHREADTYPE_MAIN_WORKER, 0,
2019 "VMPwrDwn");
2020 if (RT_FAILURE(vrc))
2021 {
2022 rc = setError(E_FAIL, "Could not create VMPowerDown thread (%Rrc)", vrc);
2023 break;
2024 }
2025
2026 /* task is now owned by powerDownThread(), so release it */
2027 task.release();
2028
2029 /* pass the progress to the caller */
2030 pProgress.queryInterfaceTo(aProgress);
2031 }
2032 while (0);
2033
2034 if (FAILED(rc))
2035 {
2036 /* preserve existing error info */
2037 ErrorInfoKeeper eik;
2038
2039 if (fBeganPowerDown)
2040 {
2041 /*
2042 * cancel the requested power down procedure.
2043 * This will reset the machine state to the state it had right
2044 * before calling mControl->BeginPoweringDown().
2045 */
2046 mControl->EndPoweringDown(eik.getResultCode(), eik.getText().raw()); }
2047
2048 setMachineStateLocally(lastMachineState);
2049 }
2050
2051 LogFlowThisFunc(("rc=%Rhrc\n", rc));
2052 LogFlowThisFuncLeave();
2053
2054 return rc;
2055}
2056
2057STDMETHODIMP Console::Reset()
2058{
2059 LogFlowThisFuncEnter();
2060 LogFlowThisFunc(("mMachineState=%d\n", mMachineState));
2061
2062 AutoCaller autoCaller(this);
2063 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2064
2065 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2066
2067 if ( mMachineState != MachineState_Running
2068 && mMachineState != MachineState_Teleporting
2069 && mMachineState != MachineState_LiveSnapshotting
2070 /** @todo r=bird: This should be allowed on paused VMs as well. Later. */
2071 )
2072 return setInvalidMachineStateError();
2073
2074 /* protect mpUVM */
2075 SafeVMPtr ptrVM(this);
2076 if (!ptrVM.isOk())
2077 return ptrVM.rc();
2078
2079 /* release the lock before a VMR3* call (EMT will call us back)! */
2080 alock.release();
2081
2082 int vrc = VMR3Reset(ptrVM);
2083
2084 HRESULT rc = RT_SUCCESS(vrc) ? S_OK :
2085 setError(VBOX_E_VM_ERROR,
2086 tr("Could not reset the machine (%Rrc)"),
2087 vrc);
2088
2089 LogFlowThisFunc(("mMachineState=%d, rc=%Rhrc\n", mMachineState, rc));
2090 LogFlowThisFuncLeave();
2091 return rc;
2092}
2093
2094/*static*/ DECLCALLBACK(int) Console::unplugCpu(Console *pThis, PVM pVM, unsigned uCpu)
2095{
2096 LogFlowFunc(("pThis=%p pVM=%p uCpu=%u\n", pThis, pVM, uCpu));
2097
2098 AssertReturn(pThis, VERR_INVALID_PARAMETER);
2099
2100 int vrc = PDMR3DeviceDetach(pVM, "acpi", 0, uCpu, 0);
2101 Log(("UnplugCpu: rc=%Rrc\n", vrc));
2102
2103 return vrc;
2104}
2105
2106HRESULT Console::doCPURemove(ULONG aCpu, PVM pVM)
2107{
2108 HRESULT rc = S_OK;
2109
2110 LogFlowThisFuncEnter();
2111 LogFlowThisFunc(("mMachineState=%d\n", mMachineState));
2112
2113 AutoCaller autoCaller(this);
2114 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2115
2116 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2117
2118 AssertReturn(m_pVMMDev, E_FAIL);
2119 PPDMIVMMDEVPORT pVmmDevPort = m_pVMMDev->getVMMDevPort();
2120 AssertReturn(pVmmDevPort, E_FAIL);
2121
2122 if ( mMachineState != MachineState_Running
2123 && mMachineState != MachineState_Teleporting
2124 && mMachineState != MachineState_LiveSnapshotting
2125 )
2126 return setInvalidMachineStateError();
2127
2128 /* Check if the CPU is present */
2129 BOOL fCpuAttached;
2130 rc = mMachine->GetCPUStatus(aCpu, &fCpuAttached);
2131 if (FAILED(rc))
2132 return rc;
2133 if (!fCpuAttached)
2134 return setError(E_FAIL, tr("CPU %d is not attached"), aCpu);
2135
2136 /* Leave the lock before any EMT/VMMDev call. */
2137 alock.release();
2138 bool fLocked = true;
2139
2140 /* Check if the CPU is unlocked */
2141 PPDMIBASE pBase;
2142 int vrc = PDMR3QueryDeviceLun(pVM, "acpi", 0, aCpu, &pBase);
2143 if (RT_SUCCESS(vrc))
2144 {
2145 Assert(pBase);
2146 PPDMIACPIPORT pApicPort = PDMIBASE_QUERY_INTERFACE(pBase, PDMIACPIPORT);
2147
2148 /* Notify the guest if possible. */
2149 uint32_t idCpuCore, idCpuPackage;
2150 vrc = VMR3GetCpuCoreAndPackageIdFromCpuId(pVM, aCpu, &idCpuCore, &idCpuPackage); AssertRC(vrc);
2151 if (RT_SUCCESS(vrc))
2152 vrc = pVmmDevPort->pfnCpuHotUnplug(pVmmDevPort, idCpuCore, idCpuPackage);
2153 if (RT_SUCCESS(vrc))
2154 {
2155 unsigned cTries = 100;
2156 do
2157 {
2158 /* It will take some time until the event is processed in the guest. Wait... */
2159 vrc = pApicPort ? pApicPort->pfnGetCpuStatus(pApicPort, aCpu, &fLocked) : VERR_INVALID_POINTER;
2160 if (RT_SUCCESS(vrc) && !fLocked)
2161 break;
2162
2163 /* Sleep a bit */
2164 RTThreadSleep(100);
2165 } while (cTries-- > 0);
2166 }
2167 else if (vrc == VERR_CPU_HOTPLUG_NOT_MONITORED_BY_GUEST)
2168 {
2169 /* Query one time. It is possible that the user ejected the CPU. */
2170 vrc = pApicPort ? pApicPort->pfnGetCpuStatus(pApicPort, aCpu, &fLocked) : VERR_INVALID_POINTER;
2171 }
2172 }
2173
2174 /* If the CPU was unlocked we can detach it now. */
2175 if (RT_SUCCESS(vrc) && !fLocked)
2176 {
2177 /*
2178 * Call worker in EMT, that's faster and safer than doing everything
2179 * using VMR3ReqCall.
2180 */
2181 PVMREQ pReq;
2182 vrc = VMR3ReqCall(pVM, 0, &pReq, 0 /* no wait! */, VMREQFLAGS_VBOX_STATUS,
2183 (PFNRT)Console::unplugCpu, 3,
2184 this, pVM, aCpu);
2185 if (vrc == VERR_TIMEOUT || RT_SUCCESS(vrc))
2186 {
2187 vrc = VMR3ReqWait(pReq, RT_INDEFINITE_WAIT);
2188 AssertRC(vrc);
2189 if (RT_SUCCESS(vrc))
2190 vrc = pReq->iStatus;
2191 }
2192 VMR3ReqFree(pReq);
2193
2194 if (RT_SUCCESS(vrc))
2195 {
2196 /* Detach it from the VM */
2197 vrc = VMR3HotUnplugCpu(pVM, aCpu);
2198 AssertRC(vrc);
2199 }
2200 else
2201 rc = setError(VBOX_E_VM_ERROR,
2202 tr("Hot-Remove failed (rc=%Rrc)"), vrc);
2203 }
2204 else
2205 rc = setError(VBOX_E_VM_ERROR,
2206 tr("Hot-Remove was aborted because the CPU may still be used by the guest"), VERR_RESOURCE_BUSY);
2207
2208 LogFlowThisFunc(("mMachineState=%d, rc=%Rhrc\n", mMachineState, rc));
2209 LogFlowThisFuncLeave();
2210 return rc;
2211}
2212
2213/*static*/ DECLCALLBACK(int) Console::plugCpu(Console *pThis, PVM pVM, unsigned uCpu)
2214{
2215 LogFlowFunc(("pThis=%p uCpu=%u\n", pThis, uCpu));
2216
2217 AssertReturn(pThis, VERR_INVALID_PARAMETER);
2218
2219 int rc = VMR3HotPlugCpu(pVM, uCpu);
2220 AssertRC(rc);
2221
2222 PCFGMNODE pInst = CFGMR3GetChild(CFGMR3GetRoot(pVM), "Devices/acpi/0/");
2223 AssertRelease(pInst);
2224 /* nuke anything which might have been left behind. */
2225 CFGMR3RemoveNode(CFGMR3GetChildF(pInst, "LUN#%d", uCpu));
2226
2227#define RC_CHECK() do { if (RT_FAILURE(rc)) { AssertReleaseRC(rc); break; } } while (0)
2228
2229 PCFGMNODE pLunL0;
2230 PCFGMNODE pCfg;
2231 rc = CFGMR3InsertNodeF(pInst, &pLunL0, "LUN#%d", uCpu); RC_CHECK();
2232 rc = CFGMR3InsertString(pLunL0, "Driver", "ACPICpu"); RC_CHECK();
2233 rc = CFGMR3InsertNode(pLunL0, "Config", &pCfg); RC_CHECK();
2234
2235 /*
2236 * Attach the driver.
2237 */
2238 PPDMIBASE pBase;
2239 rc = PDMR3DeviceAttach(pVM, "acpi", 0, uCpu, 0, &pBase); RC_CHECK();
2240
2241 Log(("PlugCpu: rc=%Rrc\n", rc));
2242
2243 CFGMR3Dump(pInst);
2244
2245#undef RC_CHECK
2246
2247 return VINF_SUCCESS;
2248}
2249
2250HRESULT Console::doCPUAdd(ULONG aCpu, PVM pVM)
2251{
2252 HRESULT rc = S_OK;
2253
2254 LogFlowThisFuncEnter();
2255 LogFlowThisFunc(("mMachineState=%d\n", mMachineState));
2256
2257 AutoCaller autoCaller(this);
2258 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2259
2260 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2261
2262 if ( mMachineState != MachineState_Running
2263 && mMachineState != MachineState_Teleporting
2264 && mMachineState != MachineState_LiveSnapshotting
2265 /** @todo r=bird: This should be allowed on paused VMs as well. Later. */
2266 )
2267 return setInvalidMachineStateError();
2268
2269 AssertReturn(m_pVMMDev, E_FAIL);
2270 PPDMIVMMDEVPORT pDevPort = m_pVMMDev->getVMMDevPort();
2271 AssertReturn(pDevPort, E_FAIL);
2272
2273 /* Check if the CPU is present */
2274 BOOL fCpuAttached;
2275 rc = mMachine->GetCPUStatus(aCpu, &fCpuAttached);
2276 if (FAILED(rc)) return rc;
2277
2278 if (fCpuAttached)
2279 return setError(E_FAIL,
2280 tr("CPU %d is already attached"), aCpu);
2281
2282 /*
2283 * Call worker in EMT, that's faster and safer than doing everything
2284 * using VMR3ReqCall. Note that we separate VMR3ReqCall from VMR3ReqWait
2285 * here to make requests from under the lock in order to serialize them.
2286 */
2287 PVMREQ pReq;
2288 int vrc = VMR3ReqCall(pVM, 0, &pReq, 0 /* no wait! */, VMREQFLAGS_VBOX_STATUS,
2289 (PFNRT)Console::plugCpu, 3,
2290 this, pVM, aCpu);
2291
2292 /* release the lock before a VMR3* call (EMT will call us back)! */
2293 alock.release();
2294
2295 if (vrc == VERR_TIMEOUT || RT_SUCCESS(vrc))
2296 {
2297 vrc = VMR3ReqWait(pReq, RT_INDEFINITE_WAIT);
2298 AssertRC(vrc);
2299 if (RT_SUCCESS(vrc))
2300 vrc = pReq->iStatus;
2301 }
2302 VMR3ReqFree(pReq);
2303
2304 rc = RT_SUCCESS(vrc) ? S_OK :
2305 setError(VBOX_E_VM_ERROR,
2306 tr("Could not add CPU to the machine (%Rrc)"),
2307 vrc);
2308
2309 if (RT_SUCCESS(vrc))
2310 {
2311 /* Notify the guest if possible. */
2312 uint32_t idCpuCore, idCpuPackage;
2313 vrc = VMR3GetCpuCoreAndPackageIdFromCpuId(pVM, aCpu, &idCpuCore, &idCpuPackage); AssertRC(vrc);
2314 if (RT_SUCCESS(vrc))
2315 vrc = pDevPort->pfnCpuHotPlug(pDevPort, idCpuCore, idCpuPackage);
2316 /** @todo warning if the guest doesn't support it */
2317 }
2318
2319 LogFlowThisFunc(("mMachineState=%d, rc=%Rhrc\n", mMachineState, rc));
2320 LogFlowThisFuncLeave();
2321 return rc;
2322}
2323
2324STDMETHODIMP Console::Pause()
2325{
2326 LogFlowThisFuncEnter();
2327
2328 AutoCaller autoCaller(this);
2329 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2330
2331 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2332
2333 switch (mMachineState)
2334 {
2335 case MachineState_Running:
2336 case MachineState_Teleporting:
2337 case MachineState_LiveSnapshotting:
2338 break;
2339
2340 case MachineState_Paused:
2341 case MachineState_TeleportingPausedVM:
2342 case MachineState_Saving:
2343 return setError(VBOX_E_INVALID_VM_STATE, tr("Already paused"));
2344
2345 default:
2346 return setInvalidMachineStateError();
2347 }
2348
2349 /* get the VM handle. */
2350 SafeVMPtr ptrVM(this);
2351 if (!ptrVM.isOk())
2352 return ptrVM.rc();
2353
2354 LogFlowThisFunc(("Sending PAUSE request...\n"));
2355
2356 /* release the lock before a VMR3* call (EMT will call us back)! */
2357 alock.release();
2358
2359 int vrc = VMR3Suspend(ptrVM);
2360
2361 HRESULT hrc = S_OK;
2362 if (RT_FAILURE(vrc))
2363 hrc = setError(VBOX_E_VM_ERROR, tr("Could not suspend the machine execution (%Rrc)"), vrc);
2364
2365 LogFlowThisFunc(("hrc=%Rhrc\n", hrc));
2366 LogFlowThisFuncLeave();
2367 return hrc;
2368}
2369
2370STDMETHODIMP Console::Resume()
2371{
2372 LogFlowThisFuncEnter();
2373
2374 AutoCaller autoCaller(this);
2375 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2376
2377 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2378
2379 if (mMachineState != MachineState_Paused)
2380 return setError(VBOX_E_INVALID_VM_STATE,
2381 tr("Cannot resume the machine as it is not paused (machine state: %s)"),
2382 Global::stringifyMachineState(mMachineState));
2383
2384 /* get the VM handle. */
2385 SafeVMPtr ptrVM(this);
2386 if (!ptrVM.isOk())
2387 return ptrVM.rc();
2388
2389 LogFlowThisFunc(("Sending RESUME request...\n"));
2390
2391 /* release the lock before a VMR3* call (EMT will call us back)! */
2392 alock.release();
2393
2394#ifdef VBOX_WITH_EXTPACK
2395 int vrc = mptrExtPackManager->callAllVmPowerOnHooks(this, ptrVM); /** @todo called a few times too many... */
2396#else
2397 int vrc = VINF_SUCCESS;
2398#endif
2399 if (RT_SUCCESS(vrc))
2400 {
2401 if (VMR3GetState(ptrVM) == VMSTATE_CREATED)
2402 vrc = VMR3PowerOn(ptrVM); /* (PowerUpPaused) */
2403 else
2404 vrc = VMR3Resume(ptrVM);
2405 }
2406
2407 HRESULT rc = RT_SUCCESS(vrc) ? S_OK :
2408 setError(VBOX_E_VM_ERROR,
2409 tr("Could not resume the machine execution (%Rrc)"),
2410 vrc);
2411
2412 LogFlowThisFunc(("rc=%Rhrc\n", rc));
2413 LogFlowThisFuncLeave();
2414 return rc;
2415}
2416
2417STDMETHODIMP Console::PowerButton()
2418{
2419 LogFlowThisFuncEnter();
2420
2421 AutoCaller autoCaller(this);
2422 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2423
2424 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2425
2426 if ( mMachineState != MachineState_Running
2427 && mMachineState != MachineState_Teleporting
2428 && mMachineState != MachineState_LiveSnapshotting
2429 )
2430 return setInvalidMachineStateError();
2431
2432 /* get the VM handle. */
2433 SafeVMPtr ptrVM(this);
2434 if (!ptrVM.isOk())
2435 return ptrVM.rc();
2436
2437/** @todo release the console lock? */
2438
2439 /* get the acpi device interface and press the button. */
2440 PPDMIBASE pBase;
2441 int vrc = PDMR3QueryDeviceLun(ptrVM, "acpi", 0, 0, &pBase);
2442 if (RT_SUCCESS(vrc))
2443 {
2444 Assert(pBase);
2445 PPDMIACPIPORT pPort = PDMIBASE_QUERY_INTERFACE(pBase, PDMIACPIPORT);
2446 if (pPort)
2447 vrc = pPort->pfnPowerButtonPress(pPort);
2448 else
2449 vrc = VERR_PDM_MISSING_INTERFACE;
2450 }
2451
2452 HRESULT rc = RT_SUCCESS(vrc) ? S_OK :
2453 setError(VBOX_E_PDM_ERROR,
2454 tr("Controlled power off failed (%Rrc)"),
2455 vrc);
2456
2457 LogFlowThisFunc(("rc=%Rhrc\n", rc));
2458 LogFlowThisFuncLeave();
2459 return rc;
2460}
2461
2462STDMETHODIMP Console::GetPowerButtonHandled(BOOL *aHandled)
2463{
2464 LogFlowThisFuncEnter();
2465
2466 CheckComArgOutPointerValid(aHandled);
2467
2468 *aHandled = FALSE;
2469
2470 AutoCaller autoCaller(this);
2471
2472 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2473
2474 if ( mMachineState != MachineState_Running
2475 && mMachineState != MachineState_Teleporting
2476 && mMachineState != MachineState_LiveSnapshotting
2477 )
2478 return setInvalidMachineStateError();
2479
2480 /* get the VM handle. */
2481 SafeVMPtr ptrVM(this);
2482 if (!ptrVM.isOk())
2483 return ptrVM.rc();
2484
2485/** @todo release the console lock? */
2486
2487 /* get the acpi device interface and check if the button press was handled. */
2488 PPDMIBASE pBase;
2489 int vrc = PDMR3QueryDeviceLun(ptrVM, "acpi", 0, 0, &pBase);
2490 if (RT_SUCCESS(vrc))
2491 {
2492 Assert(pBase);
2493 PPDMIACPIPORT pPort = PDMIBASE_QUERY_INTERFACE(pBase, PDMIACPIPORT);
2494 if (pPort)
2495 {
2496 bool fHandled = false;
2497 vrc = pPort->pfnGetPowerButtonHandled(pPort, &fHandled);
2498 if (RT_SUCCESS(vrc))
2499 *aHandled = fHandled;
2500 }
2501 else
2502 vrc = VERR_PDM_MISSING_INTERFACE;
2503 }
2504
2505 HRESULT rc = RT_SUCCESS(vrc) ? S_OK :
2506 setError(VBOX_E_PDM_ERROR,
2507 tr("Checking if the ACPI Power Button event was handled by the guest OS failed (%Rrc)"),
2508 vrc);
2509
2510 LogFlowThisFunc(("rc=%Rhrc\n", rc));
2511 LogFlowThisFuncLeave();
2512 return rc;
2513}
2514
2515STDMETHODIMP Console::GetGuestEnteredACPIMode(BOOL *aEntered)
2516{
2517 LogFlowThisFuncEnter();
2518
2519 CheckComArgOutPointerValid(aEntered);
2520
2521 *aEntered = FALSE;
2522
2523 AutoCaller autoCaller(this);
2524
2525 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2526
2527 if ( mMachineState != MachineState_Running
2528 && mMachineState != MachineState_Teleporting
2529 && mMachineState != MachineState_LiveSnapshotting
2530 )
2531 return setError(VBOX_E_INVALID_VM_STATE,
2532 tr("Invalid machine state %s when checking if the guest entered the ACPI mode)"),
2533 Global::stringifyMachineState(mMachineState));
2534
2535 /* get the VM handle. */
2536 SafeVMPtr ptrVM(this);
2537 if (!ptrVM.isOk())
2538 return ptrVM.rc();
2539
2540/** @todo release the console lock? */
2541
2542 /* get the acpi device interface and query the information. */
2543 PPDMIBASE pBase;
2544 int vrc = PDMR3QueryDeviceLun(ptrVM, "acpi", 0, 0, &pBase);
2545 if (RT_SUCCESS(vrc))
2546 {
2547 Assert(pBase);
2548 PPDMIACPIPORT pPort = PDMIBASE_QUERY_INTERFACE(pBase, PDMIACPIPORT);
2549 if (pPort)
2550 {
2551 bool fEntered = false;
2552 vrc = pPort->pfnGetGuestEnteredACPIMode(pPort, &fEntered);
2553 if (RT_SUCCESS(vrc))
2554 *aEntered = fEntered;
2555 }
2556 else
2557 vrc = VERR_PDM_MISSING_INTERFACE;
2558 }
2559
2560 LogFlowThisFuncLeave();
2561 return S_OK;
2562}
2563
2564STDMETHODIMP Console::SleepButton()
2565{
2566 LogFlowThisFuncEnter();
2567
2568 AutoCaller autoCaller(this);
2569 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2570
2571 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2572
2573 if (mMachineState != MachineState_Running) /** @todo Live Migration: ??? */
2574 return setInvalidMachineStateError();
2575
2576 /* get the VM handle. */
2577 SafeVMPtr ptrVM(this);
2578 if (!ptrVM.isOk())
2579 return ptrVM.rc();
2580
2581/** @todo release the console lock? */
2582
2583 /* get the acpi device interface and press the sleep button. */
2584 PPDMIBASE pBase;
2585 int vrc = PDMR3QueryDeviceLun(ptrVM, "acpi", 0, 0, &pBase);
2586 if (RT_SUCCESS(vrc))
2587 {
2588 Assert(pBase);
2589 PPDMIACPIPORT pPort = PDMIBASE_QUERY_INTERFACE(pBase, PDMIACPIPORT);
2590 if (pPort)
2591 vrc = pPort->pfnSleepButtonPress(pPort);
2592 else
2593 vrc = VERR_PDM_MISSING_INTERFACE;
2594 }
2595
2596 HRESULT rc = RT_SUCCESS(vrc) ? S_OK :
2597 setError(VBOX_E_PDM_ERROR,
2598 tr("Sending sleep button event failed (%Rrc)"),
2599 vrc);
2600
2601 LogFlowThisFunc(("rc=%Rhrc\n", rc));
2602 LogFlowThisFuncLeave();
2603 return rc;
2604}
2605
2606STDMETHODIMP Console::SaveState(IProgress **aProgress)
2607{
2608 LogFlowThisFuncEnter();
2609 LogFlowThisFunc(("mMachineState=%d\n", mMachineState));
2610
2611 CheckComArgOutPointerValid(aProgress);
2612
2613 AutoCaller autoCaller(this);
2614 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2615
2616 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2617
2618 if ( mMachineState != MachineState_Running
2619 && mMachineState != MachineState_Paused)
2620 {
2621 return setError(VBOX_E_INVALID_VM_STATE,
2622 tr("Cannot save the execution state as the machine is not running or paused (machine state: %s)"),
2623 Global::stringifyMachineState(mMachineState));
2624 }
2625
2626 /* memorize the current machine state */
2627 MachineState_T lastMachineState = mMachineState;
2628
2629 if (mMachineState == MachineState_Running)
2630 {
2631 /* get the VM handle. */
2632 SafeVMPtr ptrVM(this);
2633 if (!ptrVM.isOk())
2634 return ptrVM.rc();
2635
2636 /* release the lock before a VMR3* call (EMT will call us back)! */
2637 alock.release();
2638 int vrc = VMR3Suspend(ptrVM);
2639 alock.acquire();
2640
2641 HRESULT hrc = S_OK;
2642 if (RT_FAILURE(vrc))
2643 hrc = setError(VBOX_E_VM_ERROR, tr("Could not suspend the machine execution (%Rrc)"), vrc);
2644 if (FAILED(hrc))
2645 return hrc;
2646 }
2647
2648 HRESULT rc = S_OK;
2649 bool fBeganSavingState = false;
2650 bool fTaskCreationFailed = false;
2651
2652 do
2653 {
2654 ComPtr<IProgress> pProgress;
2655 Bstr stateFilePath;
2656
2657 /*
2658 * request a saved state file path from the server
2659 * (this will set the machine state to Saving on the server to block
2660 * others from accessing this machine)
2661 */
2662 rc = mControl->BeginSavingState(pProgress.asOutParam(),
2663 stateFilePath.asOutParam());
2664 if (FAILED(rc))
2665 break;
2666
2667 fBeganSavingState = true;
2668
2669 /* sync the state with the server */
2670 setMachineStateLocally(MachineState_Saving);
2671
2672 /* ensure the directory for the saved state file exists */
2673 {
2674 Utf8Str dir = stateFilePath;
2675 dir.stripFilename();
2676 if (!RTDirExists(dir.c_str()))
2677 {
2678 int vrc = RTDirCreateFullPath(dir.c_str(), 0700);
2679 if (RT_FAILURE(vrc))
2680 {
2681 rc = setError(VBOX_E_FILE_ERROR,
2682 tr("Could not create a directory '%s' to save the state to (%Rrc)"),
2683 dir.c_str(), vrc);
2684 break;
2685 }
2686 }
2687 }
2688
2689 /* create a task object early to ensure mpVM protection is successful */
2690 std::auto_ptr<VMSaveTask> task(new VMSaveTask(this, pProgress,
2691 stateFilePath));
2692 rc = task->rc();
2693 /*
2694 * If we fail here it means a PowerDown() call happened on another
2695 * thread while we were doing Pause() (which releases the Console lock).
2696 * We assign PowerDown() a higher precedence than SaveState(),
2697 * therefore just return the error to the caller.
2698 */
2699 if (FAILED(rc))
2700 {
2701 fTaskCreationFailed = true;
2702 break;
2703 }
2704
2705 /* create a thread to wait until the VM state is saved */
2706 int vrc = RTThreadCreate(NULL, Console::saveStateThread, (void *)task.get(),
2707 0, RTTHREADTYPE_MAIN_WORKER, 0, "VMSave");
2708 if (RT_FAILURE(vrc))
2709 {
2710 rc = setError(E_FAIL, "Could not create VMSave thread (%Rrc)", vrc);
2711 break;
2712 }
2713
2714 /* task is now owned by saveStateThread(), so release it */
2715 task.release();
2716
2717 /* return the progress to the caller */
2718 pProgress.queryInterfaceTo(aProgress);
2719 } while (0);
2720
2721 if (FAILED(rc) && !fTaskCreationFailed)
2722 {
2723 /* preserve existing error info */
2724 ErrorInfoKeeper eik;
2725
2726 if (fBeganSavingState)
2727 {
2728 /*
2729 * cancel the requested save state procedure.
2730 * This will reset the machine state to the state it had right
2731 * before calling mControl->BeginSavingState().
2732 */
2733 mControl->EndSavingState(eik.getResultCode(), eik.getText().raw());
2734 }
2735
2736 if (lastMachineState == MachineState_Running)
2737 {
2738 /* restore the paused state if appropriate */
2739 setMachineStateLocally(MachineState_Paused);
2740 /* restore the running state if appropriate */
2741 SafeVMPtr ptrVM(this);
2742 if (ptrVM.isOk())
2743 {
2744 alock.release();
2745 VMR3Resume(ptrVM);
2746 alock.acquire();
2747 }
2748 }
2749 else
2750 setMachineStateLocally(lastMachineState);
2751 }
2752
2753 LogFlowThisFunc(("rc=%Rhrc\n", rc));
2754 LogFlowThisFuncLeave();
2755 return rc;
2756}
2757
2758STDMETHODIMP Console::AdoptSavedState(IN_BSTR aSavedStateFile)
2759{
2760 CheckComArgStrNotEmptyOrNull(aSavedStateFile);
2761
2762 AutoCaller autoCaller(this);
2763 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2764
2765 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2766
2767 if ( mMachineState != MachineState_PoweredOff
2768 && mMachineState != MachineState_Teleported
2769 && mMachineState != MachineState_Aborted
2770 )
2771 return setError(VBOX_E_INVALID_VM_STATE,
2772 tr("Cannot adopt the saved machine state as the machine is not in Powered Off, Teleported or Aborted state (machine state: %s)"),
2773 Global::stringifyMachineState(mMachineState));
2774
2775 return mControl->AdoptSavedState(aSavedStateFile);
2776}
2777
2778STDMETHODIMP Console::DiscardSavedState(BOOL aRemoveFile)
2779{
2780 AutoCaller autoCaller(this);
2781 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2782
2783 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2784
2785 if (mMachineState != MachineState_Saved)
2786 return setError(VBOX_E_INVALID_VM_STATE,
2787 tr("Cannot delete the machine state as the machine is not in the saved state (machine state: %s)"),
2788 Global::stringifyMachineState(mMachineState));
2789
2790 HRESULT rc = mControl->SetRemoveSavedStateFile(aRemoveFile);
2791 if (FAILED(rc)) return rc;
2792
2793 /*
2794 * Saved -> PoweredOff transition will be detected in the SessionMachine
2795 * and properly handled.
2796 */
2797 rc = setMachineState(MachineState_PoweredOff);
2798
2799 return rc;
2800}
2801
2802/** read the value of a LEd. */
2803inline uint32_t readAndClearLed(PPDMLED pLed)
2804{
2805 if (!pLed)
2806 return 0;
2807 uint32_t u32 = pLed->Actual.u32 | pLed->Asserted.u32;
2808 pLed->Asserted.u32 = 0;
2809 return u32;
2810}
2811
2812STDMETHODIMP Console::GetDeviceActivity(DeviceType_T aDeviceType,
2813 DeviceActivity_T *aDeviceActivity)
2814{
2815 CheckComArgNotNull(aDeviceActivity);
2816
2817 AutoCaller autoCaller(this);
2818 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2819
2820 /*
2821 * Note: we don't lock the console object here because
2822 * readAndClearLed() should be thread safe.
2823 */
2824
2825 /* Get LED array to read */
2826 PDMLEDCORE SumLed = {0};
2827 switch (aDeviceType)
2828 {
2829 case DeviceType_Floppy:
2830 case DeviceType_DVD:
2831 case DeviceType_HardDisk:
2832 {
2833 for (unsigned i = 0; i < RT_ELEMENTS(mapStorageLeds); ++i)
2834 if (maStorageDevType[i] == aDeviceType)
2835 SumLed.u32 |= readAndClearLed(mapStorageLeds[i]);
2836 break;
2837 }
2838
2839 case DeviceType_Network:
2840 {
2841 for (unsigned i = 0; i < RT_ELEMENTS(mapNetworkLeds); ++i)
2842 SumLed.u32 |= readAndClearLed(mapNetworkLeds[i]);
2843 break;
2844 }
2845
2846 case DeviceType_USB:
2847 {
2848 for (unsigned i = 0; i < RT_ELEMENTS(mapUSBLed); ++i)
2849 SumLed.u32 |= readAndClearLed(mapUSBLed[i]);
2850 break;
2851 }
2852
2853 case DeviceType_SharedFolder:
2854 {
2855 SumLed.u32 |= readAndClearLed(mapSharedFolderLed);
2856 break;
2857 }
2858
2859 default:
2860 return setError(E_INVALIDARG,
2861 tr("Invalid device type: %d"),
2862 aDeviceType);
2863 }
2864
2865 /* Compose the result */
2866 switch (SumLed.u32 & (PDMLED_READING | PDMLED_WRITING))
2867 {
2868 case 0:
2869 *aDeviceActivity = DeviceActivity_Idle;
2870 break;
2871 case PDMLED_READING:
2872 *aDeviceActivity = DeviceActivity_Reading;
2873 break;
2874 case PDMLED_WRITING:
2875 case PDMLED_READING | PDMLED_WRITING:
2876 *aDeviceActivity = DeviceActivity_Writing;
2877 break;
2878 }
2879
2880 return S_OK;
2881}
2882
2883STDMETHODIMP Console::AttachUSBDevice(IN_BSTR aId)
2884{
2885#ifdef VBOX_WITH_USB
2886 AutoCaller autoCaller(this);
2887 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2888
2889 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2890
2891 if ( mMachineState != MachineState_Running
2892 && mMachineState != MachineState_Paused)
2893 return setError(VBOX_E_INVALID_VM_STATE,
2894 tr("Cannot attach a USB device to the machine which is not running or paused (machine state: %s)"),
2895 Global::stringifyMachineState(mMachineState));
2896
2897 /* Get the VM handle. */
2898 SafeVMPtr ptrVM(this);
2899 if (!ptrVM.isOk())
2900 return ptrVM.rc();
2901
2902 /* Don't proceed unless we've found the usb controller. */
2903 PPDMIBASE pBase = NULL;
2904 int vrc = PDMR3QueryLun(ptrVM, "usb-ohci", 0, 0, &pBase);
2905 if (RT_FAILURE(vrc))
2906 return setError(VBOX_E_PDM_ERROR,
2907 tr("The virtual machine does not have a USB controller"));
2908
2909 /* release the lock because the USB Proxy service may call us back
2910 * (via onUSBDeviceAttach()) */
2911 alock.release();
2912
2913 /* Request the device capture */
2914 return mControl->CaptureUSBDevice(aId);
2915
2916#else /* !VBOX_WITH_USB */
2917 return setError(VBOX_E_PDM_ERROR,
2918 tr("The virtual machine does not have a USB controller"));
2919#endif /* !VBOX_WITH_USB */
2920}
2921
2922STDMETHODIMP Console::DetachUSBDevice(IN_BSTR aId, IUSBDevice **aDevice)
2923{
2924#ifdef VBOX_WITH_USB
2925 CheckComArgOutPointerValid(aDevice);
2926
2927 AutoCaller autoCaller(this);
2928 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2929
2930 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2931
2932 /* Find it. */
2933 ComObjPtr<OUSBDevice> pUSBDevice;
2934 USBDeviceList::iterator it = mUSBDevices.begin();
2935 Guid uuid(aId);
2936 while (it != mUSBDevices.end())
2937 {
2938 if ((*it)->id() == uuid)
2939 {
2940 pUSBDevice = *it;
2941 break;
2942 }
2943 ++it;
2944 }
2945
2946 if (!pUSBDevice)
2947 return setError(E_INVALIDARG,
2948 tr("USB device with UUID {%RTuuid} is not attached to this machine"),
2949 Guid(aId).raw());
2950
2951 /*
2952 * Inform the USB device and USB proxy about what's cooking.
2953 */
2954 alock.release();
2955 HRESULT rc2 = mControl->DetachUSBDevice(aId, false /* aDone */);
2956 if (FAILED(rc2))
2957 return rc2;
2958 alock.acquire();
2959
2960 /* Request the PDM to detach the USB device. */
2961 HRESULT rc = detachUSBDevice(it);
2962
2963 if (SUCCEEDED(rc))
2964 {
2965 /* release the lock since we don't need it any more (note though that
2966 * the USB Proxy service must not call us back here) */
2967 alock.release();
2968
2969 /* Request the device release. Even if it fails, the device will
2970 * remain as held by proxy, which is OK for us (the VM process). */
2971 rc = mControl->DetachUSBDevice(aId, true /* aDone */);
2972 }
2973
2974 return rc;
2975
2976
2977#else /* !VBOX_WITH_USB */
2978 return setError(VBOX_E_PDM_ERROR,
2979 tr("The virtual machine does not have a USB controller"));
2980#endif /* !VBOX_WITH_USB */
2981}
2982
2983STDMETHODIMP Console::FindUSBDeviceByAddress(IN_BSTR aAddress, IUSBDevice **aDevice)
2984{
2985#ifdef VBOX_WITH_USB
2986 CheckComArgStrNotEmptyOrNull(aAddress);
2987 CheckComArgOutPointerValid(aDevice);
2988
2989 *aDevice = NULL;
2990
2991 SafeIfaceArray<IUSBDevice> devsvec;
2992 HRESULT rc = COMGETTER(USBDevices)(ComSafeArrayAsOutParam(devsvec));
2993 if (FAILED(rc)) return rc;
2994
2995 for (size_t i = 0; i < devsvec.size(); ++i)
2996 {
2997 Bstr address;
2998 rc = devsvec[i]->COMGETTER(Address)(address.asOutParam());
2999 if (FAILED(rc)) return rc;
3000 if (address == aAddress)
3001 {
3002 ComObjPtr<OUSBDevice> pUSBDevice;
3003 pUSBDevice.createObject();
3004 pUSBDevice->init(devsvec[i]);
3005 return pUSBDevice.queryInterfaceTo(aDevice);
3006 }
3007 }
3008
3009 return setErrorNoLog(VBOX_E_OBJECT_NOT_FOUND,
3010 tr("Could not find a USB device with address '%ls'"),
3011 aAddress);
3012
3013#else /* !VBOX_WITH_USB */
3014 return E_NOTIMPL;
3015#endif /* !VBOX_WITH_USB */
3016}
3017
3018STDMETHODIMP Console::FindUSBDeviceById(IN_BSTR aId, IUSBDevice **aDevice)
3019{
3020#ifdef VBOX_WITH_USB
3021 CheckComArgExpr(aId, Guid(aId).isEmpty() == false);
3022 CheckComArgOutPointerValid(aDevice);
3023
3024 *aDevice = NULL;
3025
3026 SafeIfaceArray<IUSBDevice> devsvec;
3027 HRESULT rc = COMGETTER(USBDevices)(ComSafeArrayAsOutParam(devsvec));
3028 if (FAILED(rc)) return rc;
3029
3030 for (size_t i = 0; i < devsvec.size(); ++i)
3031 {
3032 Bstr id;
3033 rc = devsvec[i]->COMGETTER(Id)(id.asOutParam());
3034 if (FAILED(rc)) return rc;
3035 if (id == aId)
3036 {
3037 ComObjPtr<OUSBDevice> pUSBDevice;
3038 pUSBDevice.createObject();
3039 pUSBDevice->init(devsvec[i]);
3040 return pUSBDevice.queryInterfaceTo(aDevice);
3041 }
3042 }
3043
3044 return setErrorNoLog(VBOX_E_OBJECT_NOT_FOUND,
3045 tr("Could not find a USB device with uuid {%RTuuid}"),
3046 Guid(aId).raw());
3047
3048#else /* !VBOX_WITH_USB */
3049 return E_NOTIMPL;
3050#endif /* !VBOX_WITH_USB */
3051}
3052
3053STDMETHODIMP
3054Console::CreateSharedFolder(IN_BSTR aName, IN_BSTR aHostPath, BOOL aWritable, BOOL aAutoMount)
3055{
3056 CheckComArgStrNotEmptyOrNull(aName);
3057 CheckComArgStrNotEmptyOrNull(aHostPath);
3058
3059 LogFlowThisFunc(("Entering for '%ls' -> '%ls'\n", aName, aHostPath));
3060
3061 AutoCaller autoCaller(this);
3062 if (FAILED(autoCaller.rc())) return autoCaller.rc();
3063
3064 Utf8Str strName(aName);
3065 Utf8Str strHostPath(aHostPath);
3066
3067 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3068
3069 /// @todo see @todo in AttachUSBDevice() about the Paused state
3070 if (mMachineState == MachineState_Saved)
3071 return setError(VBOX_E_INVALID_VM_STATE,
3072 tr("Cannot create a transient shared folder on the machine in the saved state"));
3073 if ( mMachineState != MachineState_PoweredOff
3074 && mMachineState != MachineState_Teleported
3075 && mMachineState != MachineState_Aborted
3076 && mMachineState != MachineState_Running
3077 && mMachineState != MachineState_Paused
3078 )
3079 return setError(VBOX_E_INVALID_VM_STATE,
3080 tr("Cannot create a transient shared folder on the machine while it is changing the state (machine state: %s)"),
3081 Global::stringifyMachineState(mMachineState));
3082
3083 ComObjPtr<SharedFolder> pSharedFolder;
3084 HRESULT rc = findSharedFolder(strName, pSharedFolder, false /* aSetError */);
3085 if (SUCCEEDED(rc))
3086 return setError(VBOX_E_FILE_ERROR,
3087 tr("Shared folder named '%s' already exists"),
3088 strName.c_str());
3089
3090 pSharedFolder.createObject();
3091 rc = pSharedFolder->init(this,
3092 strName,
3093 strHostPath,
3094 aWritable,
3095 aAutoMount,
3096 true /* fFailOnError */);
3097 if (FAILED(rc)) return rc;
3098
3099 /* If the VM is online and supports shared folders, share this folder
3100 * under the specified name. (Ignore any failure to obtain the VM handle.) */
3101 SafeVMPtrQuiet ptrVM(this);
3102 if ( ptrVM.isOk()
3103 && m_pVMMDev
3104 && m_pVMMDev->isShFlActive()
3105 )
3106 {
3107 /* first, remove the machine or the global folder if there is any */
3108 SharedFolderDataMap::const_iterator it;
3109 if (findOtherSharedFolder(aName, it))
3110 {
3111 rc = removeSharedFolder(aName);
3112 if (FAILED(rc))
3113 return rc;
3114 }
3115
3116 /* second, create the given folder */
3117 rc = createSharedFolder(aName, SharedFolderData(aHostPath, aWritable, aAutoMount));
3118 if (FAILED(rc))
3119 return rc;
3120 }
3121
3122 m_mapSharedFolders.insert(std::make_pair(aName, pSharedFolder));
3123
3124 /* Notify console callbacks after the folder is added to the list. */
3125 alock.release();
3126 fireSharedFolderChangedEvent(mEventSource, Scope_Session);
3127
3128 LogFlowThisFunc(("Leaving for '%ls' -> '%ls'\n", aName, aHostPath));
3129
3130 return rc;
3131}
3132
3133STDMETHODIMP Console::RemoveSharedFolder(IN_BSTR aName)
3134{
3135 CheckComArgStrNotEmptyOrNull(aName);
3136
3137 AutoCaller autoCaller(this);
3138 if (FAILED(autoCaller.rc())) return autoCaller.rc();
3139
3140 LogFlowThisFunc(("Entering for '%ls'\n", aName));
3141
3142 Utf8Str strName(aName);
3143
3144 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3145
3146 /// @todo see @todo in AttachUSBDevice() about the Paused state
3147 if (mMachineState == MachineState_Saved)
3148 return setError(VBOX_E_INVALID_VM_STATE,
3149 tr("Cannot remove a transient shared folder from the machine in the saved state"));
3150 if ( mMachineState != MachineState_PoweredOff
3151 && mMachineState != MachineState_Teleported
3152 && mMachineState != MachineState_Aborted
3153 && mMachineState != MachineState_Running
3154 && mMachineState != MachineState_Paused
3155 )
3156 return setError(VBOX_E_INVALID_VM_STATE,
3157 tr("Cannot remove a transient shared folder from the machine while it is changing the state (machine state: %s)"),
3158 Global::stringifyMachineState(mMachineState));
3159
3160 ComObjPtr<SharedFolder> pSharedFolder;
3161 HRESULT rc = findSharedFolder(aName, pSharedFolder, true /* aSetError */);
3162 if (FAILED(rc)) return rc;
3163
3164 /* protect the VM handle (if not NULL) */
3165 SafeVMPtrQuiet ptrVM(this);
3166 if ( ptrVM.isOk()
3167 && m_pVMMDev
3168 && m_pVMMDev->isShFlActive()
3169 )
3170 {
3171 /* if the VM is online and supports shared folders, UNshare this
3172 * folder. */
3173
3174 /* first, remove the given folder */
3175 rc = removeSharedFolder(strName);
3176 if (FAILED(rc)) return rc;
3177
3178 /* first, remove the machine or the global folder if there is any */
3179 SharedFolderDataMap::const_iterator it;
3180 if (findOtherSharedFolder(strName, it))
3181 {
3182 rc = createSharedFolder(strName, it->second);
3183 /* don't check rc here because we need to remove the console
3184 * folder from the collection even on failure */
3185 }
3186 }
3187
3188 m_mapSharedFolders.erase(strName);
3189
3190 /* Notify console callbacks after the folder is removed from the list. */
3191 alock.release();
3192 fireSharedFolderChangedEvent(mEventSource, Scope_Session);
3193
3194 LogFlowThisFunc(("Leaving for '%ls'\n", aName));
3195
3196 return rc;
3197}
3198
3199STDMETHODIMP Console::TakeSnapshot(IN_BSTR aName,
3200 IN_BSTR aDescription,
3201 IProgress **aProgress)
3202{
3203 LogFlowThisFuncEnter();
3204 LogFlowThisFunc(("aName='%ls' mMachineState=%d\n", aName, mMachineState));
3205
3206 CheckComArgStrNotEmptyOrNull(aName);
3207 CheckComArgOutPointerValid(aProgress);
3208
3209 AutoCaller autoCaller(this);
3210 if (FAILED(autoCaller.rc())) return autoCaller.rc();
3211
3212 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3213
3214 if (Global::IsTransient(mMachineState))
3215 return setError(VBOX_E_INVALID_VM_STATE,
3216 tr("Cannot take a snapshot of the machine while it is changing the state (machine state: %s)"),
3217 Global::stringifyMachineState(mMachineState));
3218
3219 HRESULT rc = S_OK;
3220
3221 /* prepare the progress object:
3222 a) count the no. of hard disk attachments to get a matching no. of progress sub-operations */
3223 ULONG cOperations = 2; // always at least setting up + finishing up
3224 ULONG ulTotalOperationsWeight = 2; // one each for setting up + finishing up
3225 SafeIfaceArray<IMediumAttachment> aMediumAttachments;
3226 rc = mMachine->COMGETTER(MediumAttachments)(ComSafeArrayAsOutParam(aMediumAttachments));
3227 if (FAILED(rc))
3228 return setError(rc, tr("Cannot get medium attachments of the machine"));
3229
3230 ULONG ulMemSize;
3231 rc = mMachine->COMGETTER(MemorySize)(&ulMemSize);
3232 if (FAILED(rc))
3233 return rc;
3234
3235 for (size_t i = 0;
3236 i < aMediumAttachments.size();
3237 ++i)
3238 {
3239 DeviceType_T type;
3240 rc = aMediumAttachments[i]->COMGETTER(Type)(&type);
3241 if (FAILED(rc))
3242 return rc;
3243
3244 if (type == DeviceType_HardDisk)
3245 {
3246 ++cOperations;
3247
3248 // assume that creating a diff image takes as long as saving a 1MB state
3249 // (note, the same value must be used in SessionMachine::BeginTakingSnapshot() on the server!)
3250 ulTotalOperationsWeight += 1;
3251 }
3252 }
3253
3254 // b) one extra sub-operations for online snapshots OR offline snapshots that have a saved state (needs to be copied)
3255 bool const fTakingSnapshotOnline = Global::IsOnline(mMachineState);
3256
3257 LogFlowFunc(("fTakingSnapshotOnline = %d, mMachineState = %d\n", fTakingSnapshotOnline, mMachineState));
3258
3259 if (fTakingSnapshotOnline)
3260 {
3261 ++cOperations;
3262 ulTotalOperationsWeight += ulMemSize;
3263 }
3264
3265 // finally, create the progress object
3266 ComObjPtr<Progress> pProgress;
3267 pProgress.createObject();
3268 rc = pProgress->init(static_cast<IConsole*>(this),
3269 Bstr(tr("Taking a snapshot of the virtual machine")).raw(),
3270 mMachineState == MachineState_Running /* aCancelable */,
3271 cOperations,
3272 ulTotalOperationsWeight,
3273 Bstr(tr("Setting up snapshot operation")).raw(), // first sub-op description
3274 1); // ulFirstOperationWeight
3275
3276 if (FAILED(rc))
3277 return rc;
3278
3279 VMTakeSnapshotTask *pTask;
3280 if (!(pTask = new VMTakeSnapshotTask(this, pProgress, aName, aDescription)))
3281 return E_OUTOFMEMORY;
3282
3283 Assert(pTask->mProgress);
3284
3285 try
3286 {
3287 mptrCancelableProgress = pProgress;
3288
3289 /*
3290 * If we fail here it means a PowerDown() call happened on another
3291 * thread while we were doing Pause() (which releases the Console lock).
3292 * We assign PowerDown() a higher precedence than TakeSnapshot(),
3293 * therefore just return the error to the caller.
3294 */
3295 rc = pTask->rc();
3296 if (FAILED(rc)) throw rc;
3297
3298 pTask->ulMemSize = ulMemSize;
3299
3300 /* memorize the current machine state */
3301 pTask->lastMachineState = mMachineState;
3302 pTask->fTakingSnapshotOnline = fTakingSnapshotOnline;
3303
3304 int vrc = RTThreadCreate(NULL,
3305 Console::fntTakeSnapshotWorker,
3306 (void *)pTask,
3307 0,
3308 RTTHREADTYPE_MAIN_WORKER,
3309 0,
3310 "TakeSnap");
3311 if (FAILED(vrc))
3312 throw setError(E_FAIL,
3313 tr("Could not create VMTakeSnap thread (%Rrc)"),
3314 vrc);
3315
3316 pTask->mProgress.queryInterfaceTo(aProgress);
3317 }
3318 catch (HRESULT erc)
3319 {
3320 delete pTask;
3321 rc = erc;
3322 mptrCancelableProgress.setNull();
3323 }
3324
3325 LogFlowThisFunc(("rc=%Rhrc\n", rc));
3326 LogFlowThisFuncLeave();
3327 return rc;
3328}
3329
3330STDMETHODIMP Console::DeleteSnapshot(IN_BSTR aId, IProgress **aProgress)
3331{
3332 CheckComArgExpr(aId, Guid(aId).isEmpty() == false);
3333 CheckComArgOutPointerValid(aProgress);
3334
3335 AutoCaller autoCaller(this);
3336 if (FAILED(autoCaller.rc())) return autoCaller.rc();
3337
3338 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3339
3340 if (Global::IsTransient(mMachineState))
3341 return setError(VBOX_E_INVALID_VM_STATE,
3342 tr("Cannot delete a snapshot of the machine while it is changing the state (machine state: %s)"),
3343 Global::stringifyMachineState(mMachineState));
3344
3345 MachineState_T machineState = MachineState_Null;
3346 HRESULT rc = mControl->DeleteSnapshot(this, aId, aId, FALSE /* fDeleteAllChildren */, &machineState, aProgress);
3347 if (FAILED(rc)) return rc;
3348
3349 setMachineStateLocally(machineState);
3350 return S_OK;
3351}
3352
3353STDMETHODIMP Console::DeleteSnapshotAndAllChildren(IN_BSTR aId, IProgress **aProgress)
3354{
3355 CheckComArgExpr(aId, Guid(aId).isEmpty() == false);
3356 CheckComArgOutPointerValid(aProgress);
3357
3358 AutoCaller autoCaller(this);
3359 if (FAILED(autoCaller.rc())) return autoCaller.rc();
3360
3361 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3362
3363 if (Global::IsTransient(mMachineState))
3364 return setError(VBOX_E_INVALID_VM_STATE,
3365 tr("Cannot delete a snapshot of the machine while it is changing the state (machine state: %s)"),
3366 Global::stringifyMachineState(mMachineState));
3367
3368 MachineState_T machineState = MachineState_Null;
3369 HRESULT rc = mControl->DeleteSnapshot(this, aId, aId, TRUE /* fDeleteAllChildren */, &machineState, aProgress);
3370 if (FAILED(rc)) return rc;
3371
3372 setMachineStateLocally(machineState);
3373 return S_OK;
3374}
3375
3376STDMETHODIMP Console::DeleteSnapshotRange(IN_BSTR aStartId, IN_BSTR aEndId, IProgress **aProgress)
3377{
3378 CheckComArgExpr(aStartId, Guid(aStartId).isEmpty() == false);
3379 CheckComArgExpr(aEndId, Guid(aEndId).isEmpty() == false);
3380 CheckComArgOutPointerValid(aProgress);
3381
3382 AutoCaller autoCaller(this);
3383 if (FAILED(autoCaller.rc())) return autoCaller.rc();
3384
3385 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3386
3387 if (Global::IsTransient(mMachineState))
3388 return setError(VBOX_E_INVALID_VM_STATE,
3389 tr("Cannot delete a snapshot of the machine while it is changing the state (machine state: %s)"),
3390 Global::stringifyMachineState(mMachineState));
3391
3392 MachineState_T machineState = MachineState_Null;
3393 HRESULT rc = mControl->DeleteSnapshot(this, aStartId, aEndId, FALSE /* fDeleteAllChildren */, &machineState, aProgress);
3394 if (FAILED(rc)) return rc;
3395
3396 setMachineStateLocally(machineState);
3397 return S_OK;
3398}
3399
3400STDMETHODIMP Console::RestoreSnapshot(ISnapshot *aSnapshot, IProgress **aProgress)
3401{
3402 AutoCaller autoCaller(this);
3403 if (FAILED(autoCaller.rc())) return autoCaller.rc();
3404
3405 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3406
3407 if (Global::IsOnlineOrTransient(mMachineState))
3408 return setError(VBOX_E_INVALID_VM_STATE,
3409 tr("Cannot delete the current state of the running machine (machine state: %s)"),
3410 Global::stringifyMachineState(mMachineState));
3411
3412 MachineState_T machineState = MachineState_Null;
3413 HRESULT rc = mControl->RestoreSnapshot(this, aSnapshot, &machineState, aProgress);
3414 if (FAILED(rc)) return rc;
3415
3416 setMachineStateLocally(machineState);
3417 return S_OK;
3418}
3419
3420// Non-interface public methods
3421/////////////////////////////////////////////////////////////////////////////
3422
3423/*static*/
3424HRESULT Console::setErrorStatic(HRESULT aResultCode, const char *pcsz, ...)
3425{
3426 va_list args;
3427 va_start(args, pcsz);
3428 HRESULT rc = setErrorInternal(aResultCode,
3429 getStaticClassIID(),
3430 getStaticComponentName(),
3431 Utf8Str(pcsz, args),
3432 false /* aWarning */,
3433 true /* aLogIt */);
3434 va_end(args);
3435 return rc;
3436}
3437
3438HRESULT Console::setInvalidMachineStateError()
3439{
3440 return setError(VBOX_E_INVALID_VM_STATE,
3441 tr("Invalid machine state: %s"),
3442 Global::stringifyMachineState(mMachineState));
3443}
3444
3445
3446/**
3447 * @copydoc VirtualBox::handleUnexpectedExceptions
3448 */
3449/* static */
3450HRESULT Console::handleUnexpectedExceptions(RT_SRC_POS_DECL)
3451{
3452 try
3453 {
3454 /* re-throw the current exception */
3455 throw;
3456 }
3457 catch (const std::exception &err)
3458 {
3459 return setErrorStatic(E_FAIL,
3460 tr("Unexpected exception: %s [%s]\n%s[%d] (%s)"),
3461 err.what(), typeid(err).name(),
3462 pszFile, iLine, pszFunction);
3463 }
3464 catch (...)
3465 {
3466 return setErrorStatic(E_FAIL,
3467 tr("Unknown exception\n%s[%d] (%s)"),
3468 pszFile, iLine, pszFunction);
3469 }
3470
3471 /* should not get here */
3472 AssertFailed();
3473 return E_FAIL;
3474}
3475
3476/* static */
3477const char *Console::convertControllerTypeToDev(StorageControllerType_T enmCtrlType)
3478{
3479 switch (enmCtrlType)
3480 {
3481 case StorageControllerType_LsiLogic:
3482 return "lsilogicscsi";
3483 case StorageControllerType_BusLogic:
3484 return "buslogic";
3485 case StorageControllerType_LsiLogicSas:
3486 return "lsilogicsas";
3487 case StorageControllerType_IntelAhci:
3488 return "ahci";
3489 case StorageControllerType_PIIX3:
3490 case StorageControllerType_PIIX4:
3491 case StorageControllerType_ICH6:
3492 return "piix3ide";
3493 case StorageControllerType_I82078:
3494 return "i82078";
3495 default:
3496 return NULL;
3497 }
3498}
3499
3500HRESULT Console::convertBusPortDeviceToLun(StorageBus_T enmBus, LONG port, LONG device, unsigned &uLun)
3501{
3502 switch (enmBus)
3503 {
3504 case StorageBus_IDE:
3505 case StorageBus_Floppy:
3506 {
3507 AssertMsgReturn(port < 2 && port >= 0, ("%d\n", port), E_INVALIDARG);
3508 AssertMsgReturn(device < 2 && device >= 0, ("%d\n", device), E_INVALIDARG);
3509 uLun = 2 * port + device;
3510 return S_OK;
3511 }
3512 case StorageBus_SATA:
3513 case StorageBus_SCSI:
3514 case StorageBus_SAS:
3515 {
3516 uLun = port;
3517 return S_OK;
3518 }
3519 default:
3520 uLun = 0;
3521 AssertMsgFailedReturn(("%d\n", enmBus), E_INVALIDARG);
3522 }
3523}
3524
3525// private methods
3526/////////////////////////////////////////////////////////////////////////////
3527
3528/**
3529 * Process a medium change.
3530 *
3531 * @param aMediumAttachment The medium attachment with the new medium state.
3532 * @param fForce Force medium chance, if it is locked or not.
3533 * @param pVM Safe VM handle.
3534 *
3535 * @note Locks this object for writing.
3536 */
3537HRESULT Console::doMediumChange(IMediumAttachment *aMediumAttachment, bool fForce, PVM pVM)
3538{
3539 AutoCaller autoCaller(this);
3540 AssertComRCReturnRC(autoCaller.rc());
3541
3542 /* We will need to release the write lock before calling EMT */
3543 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3544
3545 HRESULT rc = S_OK;
3546 const char *pszDevice = NULL;
3547
3548 SafeIfaceArray<IStorageController> ctrls;
3549 rc = mMachine->COMGETTER(StorageControllers)(ComSafeArrayAsOutParam(ctrls));
3550 AssertComRC(rc);
3551 IMedium *pMedium;
3552 rc = aMediumAttachment->COMGETTER(Medium)(&pMedium);
3553 AssertComRC(rc);
3554 Bstr mediumLocation;
3555 if (pMedium)
3556 {
3557 rc = pMedium->COMGETTER(Location)(mediumLocation.asOutParam());
3558 AssertComRC(rc);
3559 }
3560
3561 Bstr attCtrlName;
3562 rc = aMediumAttachment->COMGETTER(Controller)(attCtrlName.asOutParam());
3563 AssertComRC(rc);
3564 ComPtr<IStorageController> pStorageController;
3565 for (size_t i = 0; i < ctrls.size(); ++i)
3566 {
3567 Bstr ctrlName;
3568 rc = ctrls[i]->COMGETTER(Name)(ctrlName.asOutParam());
3569 AssertComRC(rc);
3570 if (attCtrlName == ctrlName)
3571 {
3572 pStorageController = ctrls[i];
3573 break;
3574 }
3575 }
3576 if (pStorageController.isNull())
3577 return setError(E_FAIL,
3578 tr("Could not find storage controller '%ls'"), attCtrlName.raw());
3579
3580 StorageControllerType_T enmCtrlType;
3581 rc = pStorageController->COMGETTER(ControllerType)(&enmCtrlType);
3582 AssertComRC(rc);
3583 pszDevice = convertControllerTypeToDev(enmCtrlType);
3584
3585 StorageBus_T enmBus;
3586 rc = pStorageController->COMGETTER(Bus)(&enmBus);
3587 AssertComRC(rc);
3588 ULONG uInstance;
3589 rc = pStorageController->COMGETTER(Instance)(&uInstance);
3590 AssertComRC(rc);
3591 BOOL fUseHostIOCache;
3592 rc = pStorageController->COMGETTER(UseHostIOCache)(&fUseHostIOCache);
3593 AssertComRC(rc);
3594
3595 /*
3596 * Call worker in EMT, that's faster and safer than doing everything
3597 * using VMR3ReqCall. Note that we separate VMR3ReqCall from VMR3ReqWait
3598 * here to make requests from under the lock in order to serialize them.
3599 */
3600 PVMREQ pReq;
3601 int vrc = VMR3ReqCall(pVM,
3602 VMCPUID_ANY,
3603 &pReq,
3604 0 /* no wait! */,
3605 VMREQFLAGS_VBOX_STATUS,
3606 (PFNRT)Console::changeRemovableMedium,
3607 8,
3608 this,
3609 pVM,
3610 pszDevice,
3611 uInstance,
3612 enmBus,
3613 fUseHostIOCache,
3614 aMediumAttachment,
3615 fForce);
3616
3617 /* release the lock before waiting for a result (EMT will call us back!) */
3618 alock.release();
3619
3620 if (vrc == VERR_TIMEOUT || RT_SUCCESS(vrc))
3621 {
3622 vrc = VMR3ReqWait(pReq, RT_INDEFINITE_WAIT);
3623 AssertRC(vrc);
3624 if (RT_SUCCESS(vrc))
3625 vrc = pReq->iStatus;
3626 }
3627 VMR3ReqFree(pReq);
3628
3629 if (RT_SUCCESS(vrc))
3630 {
3631 LogFlowThisFunc(("Returns S_OK\n"));
3632 return S_OK;
3633 }
3634
3635 if (pMedium)
3636 return setError(E_FAIL,
3637 tr("Could not mount the media/drive '%ls' (%Rrc)"),
3638 mediumLocation.raw(), vrc);
3639
3640 return setError(E_FAIL,
3641 tr("Could not unmount the currently mounted media/drive (%Rrc)"),
3642 vrc);
3643}
3644
3645/**
3646 * Performs the medium change in EMT.
3647 *
3648 * @returns VBox status code.
3649 *
3650 * @param pThis Pointer to the Console object.
3651 * @param pVM The VM handle.
3652 * @param pcszDevice The PDM device name.
3653 * @param uInstance The PDM device instance.
3654 * @param uLun The PDM LUN number of the drive.
3655 * @param fHostDrive True if this is a host drive attachment.
3656 * @param pszPath The path to the media / drive which is now being mounted / captured.
3657 * If NULL no media or drive is attached and the LUN will be configured with
3658 * the default block driver with no media. This will also be the state if
3659 * mounting / capturing the specified media / drive fails.
3660 * @param pszFormat Medium format string, usually "RAW".
3661 * @param fPassthrough Enables using passthrough mode of the host DVD drive if applicable.
3662 *
3663 * @thread EMT
3664 */
3665DECLCALLBACK(int) Console::changeRemovableMedium(Console *pConsole,
3666 PVM pVM,
3667 const char *pcszDevice,
3668 unsigned uInstance,
3669 StorageBus_T enmBus,
3670 bool fUseHostIOCache,
3671 IMediumAttachment *aMediumAtt,
3672 bool fForce)
3673{
3674 LogFlowFunc(("pConsole=%p uInstance=%u pszDevice=%p:{%s} enmBus=%u, aMediumAtt=%p, fForce=%d\n",
3675 pConsole, uInstance, pcszDevice, pcszDevice, enmBus, aMediumAtt, fForce));
3676
3677 AssertReturn(pConsole, VERR_INVALID_PARAMETER);
3678
3679 AutoCaller autoCaller(pConsole);
3680 AssertComRCReturn(autoCaller.rc(), VERR_ACCESS_DENIED);
3681
3682 /*
3683 * Suspend the VM first.
3684 *
3685 * The VM must not be running since it might have pending I/O to
3686 * the drive which is being changed.
3687 */
3688 bool fResume;
3689 VMSTATE enmVMState = VMR3GetState(pVM);
3690 switch (enmVMState)
3691 {
3692 case VMSTATE_RESETTING:
3693 case VMSTATE_RUNNING:
3694 {
3695 LogFlowFunc(("Suspending the VM...\n"));
3696 /* disable the callback to prevent Console-level state change */
3697 pConsole->mVMStateChangeCallbackDisabled = true;
3698 int rc = VMR3Suspend(pVM);
3699 pConsole->mVMStateChangeCallbackDisabled = false;
3700 AssertRCReturn(rc, rc);
3701 fResume = true;
3702 break;
3703 }
3704
3705 case VMSTATE_SUSPENDED:
3706 case VMSTATE_CREATED:
3707 case VMSTATE_OFF:
3708 fResume = false;
3709 break;
3710
3711 case VMSTATE_RUNNING_LS:
3712 case VMSTATE_RUNNING_FT:
3713 return setErrorInternal(VBOX_E_INVALID_VM_STATE,
3714 COM_IIDOF(IConsole),
3715 getStaticComponentName(),
3716 (enmVMState == VMSTATE_RUNNING_LS) ? Utf8Str(tr("Cannot change drive during live migration")) : Utf8Str(tr("Cannot change drive during fault tolerant syncing")),
3717 false /*aWarning*/,
3718 true /*aLogIt*/);
3719
3720 default:
3721 AssertMsgFailedReturn(("enmVMState=%d\n", enmVMState), VERR_ACCESS_DENIED);
3722 }
3723
3724 /* Determine the base path for the device instance. */
3725 PCFGMNODE pCtlInst;
3726 pCtlInst = CFGMR3GetChildF(CFGMR3GetRoot(pVM), "Devices/%s/%u/", pcszDevice, uInstance);
3727 AssertReturn(pCtlInst, VERR_INTERNAL_ERROR);
3728
3729 int rc = VINF_SUCCESS;
3730 int rcRet = VINF_SUCCESS;
3731
3732 rcRet = pConsole->configMediumAttachment(pCtlInst,
3733 pcszDevice,
3734 uInstance,
3735 enmBus,
3736 fUseHostIOCache,
3737 false /* fSetupMerge */,
3738 false /* fBuiltinIoCache */,
3739 0 /* uMergeSource */,
3740 0 /* uMergeTarget */,
3741 aMediumAtt,
3742 pConsole->mMachineState,
3743 NULL /* phrc */,
3744 true /* fAttachDetach */,
3745 fForce /* fForceUnmount */,
3746 false /* fHotplug */,
3747 pVM,
3748 NULL /* paLedDevType */);
3749 /** @todo this dumps everything attached to this device instance, which
3750 * is more than necessary. Dumping the changed LUN would be enough. */
3751 CFGMR3Dump(pCtlInst);
3752
3753 /*
3754 * Resume the VM if necessary.
3755 */
3756 if (fResume)
3757 {
3758 LogFlowFunc(("Resuming the VM...\n"));
3759 /* disable the callback to prevent Console-level state change */
3760 pConsole->mVMStateChangeCallbackDisabled = true;
3761 rc = VMR3Resume(pVM);
3762 pConsole->mVMStateChangeCallbackDisabled = false;
3763 AssertRC(rc);
3764 if (RT_FAILURE(rc))
3765 {
3766 /* too bad, we failed. try to sync the console state with the VMM state */
3767 vmstateChangeCallback(pVM, VMSTATE_SUSPENDED, enmVMState, pConsole);
3768 }
3769 /// @todo (r=dmik) if we failed with drive mount, then the VMR3Resume
3770 // error (if any) will be hidden from the caller. For proper reporting
3771 // of such multiple errors to the caller we need to enhance the
3772 // IVirtualBoxError interface. For now, give the first error the higher
3773 // priority.
3774 if (RT_SUCCESS(rcRet))
3775 rcRet = rc;
3776 }
3777
3778 LogFlowFunc(("Returning %Rrc\n", rcRet));
3779 return rcRet;
3780}
3781
3782
3783/**
3784 * Attach a new storage device to the VM.
3785 *
3786 * @param aMediumAttachment The medium attachment which is added.
3787 * @param pVM Safe VM handle.
3788 *
3789 * @note Locks this object for writing.
3790 */
3791HRESULT Console::doStorageDeviceAttach(IMediumAttachment *aMediumAttachment, PVM pVM)
3792{
3793 AutoCaller autoCaller(this);
3794 AssertComRCReturnRC(autoCaller.rc());
3795
3796 /* We will need to release the write lock before calling EMT */
3797 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3798
3799 HRESULT rc = S_OK;
3800 const char *pszDevice = NULL;
3801
3802 SafeIfaceArray<IStorageController> ctrls;
3803 rc = mMachine->COMGETTER(StorageControllers)(ComSafeArrayAsOutParam(ctrls));
3804 AssertComRC(rc);
3805 IMedium *pMedium;
3806 rc = aMediumAttachment->COMGETTER(Medium)(&pMedium);
3807 AssertComRC(rc);
3808 Bstr mediumLocation;
3809 if (pMedium)
3810 {
3811 rc = pMedium->COMGETTER(Location)(mediumLocation.asOutParam());
3812 AssertComRC(rc);
3813 }
3814
3815 Bstr attCtrlName;
3816 rc = aMediumAttachment->COMGETTER(Controller)(attCtrlName.asOutParam());
3817 AssertComRC(rc);
3818 ComPtr<IStorageController> pStorageController;
3819 for (size_t i = 0; i < ctrls.size(); ++i)
3820 {
3821 Bstr ctrlName;
3822 rc = ctrls[i]->COMGETTER(Name)(ctrlName.asOutParam());
3823 AssertComRC(rc);
3824 if (attCtrlName == ctrlName)
3825 {
3826 pStorageController = ctrls[i];
3827 break;
3828 }
3829 }
3830 if (pStorageController.isNull())
3831 return setError(E_FAIL,
3832 tr("Could not find storage controller '%ls'"), attCtrlName.raw());
3833
3834 StorageControllerType_T enmCtrlType;
3835 rc = pStorageController->COMGETTER(ControllerType)(&enmCtrlType);
3836 AssertComRC(rc);
3837 pszDevice = convertControllerTypeToDev(enmCtrlType);
3838
3839 StorageBus_T enmBus;
3840 rc = pStorageController->COMGETTER(Bus)(&enmBus);
3841 AssertComRC(rc);
3842 ULONG uInstance;
3843 rc = pStorageController->COMGETTER(Instance)(&uInstance);
3844 AssertComRC(rc);
3845 BOOL fUseHostIOCache;
3846 rc = pStorageController->COMGETTER(UseHostIOCache)(&fUseHostIOCache);
3847 AssertComRC(rc);
3848
3849 /*
3850 * Call worker in EMT, that's faster and safer than doing everything
3851 * using VMR3ReqCall. Note that we separate VMR3ReqCall from VMR3ReqWait
3852 * here to make requests from under the lock in order to serialize them.
3853 */
3854 PVMREQ pReq;
3855 int vrc = VMR3ReqCall(pVM,
3856 VMCPUID_ANY,
3857 &pReq,
3858 0 /* no wait! */,
3859 VMREQFLAGS_VBOX_STATUS,
3860 (PFNRT)Console::attachStorageDevice,
3861 7,
3862 this,
3863 pVM,
3864 pszDevice,
3865 uInstance,
3866 enmBus,
3867 fUseHostIOCache,
3868 aMediumAttachment);
3869
3870 /* release the lock before waiting for a result (EMT will call us back!) */
3871 alock.release();
3872
3873 if (vrc == VERR_TIMEOUT || RT_SUCCESS(vrc))
3874 {
3875 vrc = VMR3ReqWait(pReq, RT_INDEFINITE_WAIT);
3876 AssertRC(vrc);
3877 if (RT_SUCCESS(vrc))
3878 vrc = pReq->iStatus;
3879 }
3880 VMR3ReqFree(pReq);
3881
3882 if (RT_SUCCESS(vrc))
3883 {
3884 LogFlowThisFunc(("Returns S_OK\n"));
3885 return S_OK;
3886 }
3887
3888 if (!pMedium)
3889 return setError(E_FAIL,
3890 tr("Could not mount the media/drive '%ls' (%Rrc)"),
3891 mediumLocation.raw(), vrc);
3892
3893 return setError(E_FAIL,
3894 tr("Could not unmount the currently mounted media/drive (%Rrc)"),
3895 vrc);
3896}
3897
3898
3899/**
3900 * Performs the storage attach operation in EMT.
3901 *
3902 * @returns VBox status code.
3903 *
3904 * @param pThis Pointer to the Console object.
3905 * @param pVM The VM handle.
3906 * @param pcszDevice The PDM device name.
3907 * @param uInstance The PDM device instance.
3908 *
3909 * @thread EMT
3910 */
3911DECLCALLBACK(int) Console::attachStorageDevice(Console *pConsole,
3912 PVM pVM,
3913 const char *pcszDevice,
3914 unsigned uInstance,
3915 StorageBus_T enmBus,
3916 bool fUseHostIOCache,
3917 IMediumAttachment *aMediumAtt)
3918{
3919 LogFlowFunc(("pConsole=%p uInstance=%u pszDevice=%p:{%s} enmBus=%u, aMediumAtt=%p\n",
3920 pConsole, uInstance, pcszDevice, pcszDevice, enmBus, aMediumAtt));
3921
3922 AssertReturn(pConsole, VERR_INVALID_PARAMETER);
3923
3924 AutoCaller autoCaller(pConsole);
3925 AssertComRCReturn(autoCaller.rc(), VERR_ACCESS_DENIED);
3926
3927 /*
3928 * Suspend the VM first.
3929 *
3930 * The VM must not be running since it might have pending I/O to
3931 * the drive which is being changed.
3932 */
3933 bool fResume;
3934 VMSTATE enmVMState = VMR3GetState(pVM);
3935 switch (enmVMState)
3936 {
3937 case VMSTATE_RESETTING:
3938 case VMSTATE_RUNNING:
3939 {
3940 LogFlowFunc(("Suspending the VM...\n"));
3941 /* disable the callback to prevent Console-level state change */
3942 pConsole->mVMStateChangeCallbackDisabled = true;
3943 int rc = VMR3Suspend(pVM);
3944 pConsole->mVMStateChangeCallbackDisabled = false;
3945 AssertRCReturn(rc, rc);
3946 fResume = true;
3947 break;
3948 }
3949
3950 case VMSTATE_SUSPENDED:
3951 case VMSTATE_CREATED:
3952 case VMSTATE_OFF:
3953 fResume = false;
3954 break;
3955
3956 case VMSTATE_RUNNING_LS:
3957 case VMSTATE_RUNNING_FT:
3958 return setErrorInternal(VBOX_E_INVALID_VM_STATE,
3959 COM_IIDOF(IConsole),
3960 getStaticComponentName(),
3961 (enmVMState == VMSTATE_RUNNING_LS) ? Utf8Str(tr("Cannot change drive during live migration")) : Utf8Str(tr("Cannot change drive during fault tolerant syncing")),
3962 false /*aWarning*/,
3963 true /*aLogIt*/);
3964
3965 default:
3966 AssertMsgFailedReturn(("enmVMState=%d\n", enmVMState), VERR_ACCESS_DENIED);
3967 }
3968
3969 /* Determine the base path for the device instance. */
3970 PCFGMNODE pCtlInst;
3971 pCtlInst = CFGMR3GetChildF(CFGMR3GetRoot(pVM), "Devices/%s/%u/", pcszDevice, uInstance);
3972 AssertReturn(pCtlInst, VERR_INTERNAL_ERROR);
3973
3974 int rc = VINF_SUCCESS;
3975 int rcRet = VINF_SUCCESS;
3976
3977 rcRet = pConsole->configMediumAttachment(pCtlInst,
3978 pcszDevice,
3979 uInstance,
3980 enmBus,
3981 fUseHostIOCache,
3982 false /* fSetupMerge */,
3983 false /* fBuiltinIoCache */,
3984 0 /* uMergeSource */,
3985 0 /* uMergeTarget */,
3986 aMediumAtt,
3987 pConsole->mMachineState,
3988 NULL /* phrc */,
3989 true /* fAttachDetach */,
3990 false /* fForceUnmount */,
3991 true /* fHotplug */,
3992 pVM,
3993 NULL /* paLedDevType */);
3994 /** @todo this dumps everything attached to this device instance, which
3995 * is more than necessary. Dumping the changed LUN would be enough. */
3996 CFGMR3Dump(pCtlInst);
3997
3998 /*
3999 * Resume the VM if necessary.
4000 */
4001 if (fResume)
4002 {
4003 LogFlowFunc(("Resuming the VM...\n"));
4004 /* disable the callback to prevent Console-level state change */
4005 pConsole->mVMStateChangeCallbackDisabled = true;
4006 rc = VMR3Resume(pVM);
4007 pConsole->mVMStateChangeCallbackDisabled = false;
4008 AssertRC(rc);
4009 if (RT_FAILURE(rc))
4010 {
4011 /* too bad, we failed. try to sync the console state with the VMM state */
4012 vmstateChangeCallback(pVM, VMSTATE_SUSPENDED, enmVMState, pConsole);
4013 }
4014 /** @todo: if we failed with drive mount, then the VMR3Resume
4015 * error (if any) will be hidden from the caller. For proper reporting
4016 * of such multiple errors to the caller we need to enhance the
4017 * IVirtualBoxError interface. For now, give the first error the higher
4018 * priority.
4019 */
4020 if (RT_SUCCESS(rcRet))
4021 rcRet = rc;
4022 }
4023
4024 LogFlowFunc(("Returning %Rrc\n", rcRet));
4025 return rcRet;
4026}
4027
4028/**
4029 * Attach a new storage device to the VM.
4030 *
4031 * @param aMediumAttachment The medium attachment which is added.
4032 * @param pVM Safe VM handle.
4033 *
4034 * @note Locks this object for writing.
4035 */
4036HRESULT Console::doStorageDeviceDetach(IMediumAttachment *aMediumAttachment, PVM pVM)
4037{
4038 AutoCaller autoCaller(this);
4039 AssertComRCReturnRC(autoCaller.rc());
4040
4041 /* We will need to release the write lock before calling EMT */
4042 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
4043
4044 HRESULT rc = S_OK;
4045 const char *pszDevice = NULL;
4046
4047 SafeIfaceArray<IStorageController> ctrls;
4048 rc = mMachine->COMGETTER(StorageControllers)(ComSafeArrayAsOutParam(ctrls));
4049 AssertComRC(rc);
4050 IMedium *pMedium;
4051 rc = aMediumAttachment->COMGETTER(Medium)(&pMedium);
4052 AssertComRC(rc);
4053 Bstr mediumLocation;
4054 if (pMedium)
4055 {
4056 rc = pMedium->COMGETTER(Location)(mediumLocation.asOutParam());
4057 AssertComRC(rc);
4058 }
4059
4060 Bstr attCtrlName;
4061 rc = aMediumAttachment->COMGETTER(Controller)(attCtrlName.asOutParam());
4062 AssertComRC(rc);
4063 ComPtr<IStorageController> pStorageController;
4064 for (size_t i = 0; i < ctrls.size(); ++i)
4065 {
4066 Bstr ctrlName;
4067 rc = ctrls[i]->COMGETTER(Name)(ctrlName.asOutParam());
4068 AssertComRC(rc);
4069 if (attCtrlName == ctrlName)
4070 {
4071 pStorageController = ctrls[i];
4072 break;
4073 }
4074 }
4075 if (pStorageController.isNull())
4076 return setError(E_FAIL,
4077 tr("Could not find storage controller '%ls'"), attCtrlName.raw());
4078
4079 StorageControllerType_T enmCtrlType;
4080 rc = pStorageController->COMGETTER(ControllerType)(&enmCtrlType);
4081 AssertComRC(rc);
4082 pszDevice = convertControllerTypeToDev(enmCtrlType);
4083
4084 StorageBus_T enmBus;
4085 rc = pStorageController->COMGETTER(Bus)(&enmBus);
4086 AssertComRC(rc);
4087 ULONG uInstance;
4088 rc = pStorageController->COMGETTER(Instance)(&uInstance);
4089 AssertComRC(rc);
4090
4091 /*
4092 * Call worker in EMT, that's faster and safer than doing everything
4093 * using VMR3ReqCall. Note that we separate VMR3ReqCall from VMR3ReqWait
4094 * here to make requests from under the lock in order to serialize them.
4095 */
4096 PVMREQ pReq;
4097 int vrc = VMR3ReqCall(pVM,
4098 VMCPUID_ANY,
4099 &pReq,
4100 0 /* no wait! */,
4101 VMREQFLAGS_VBOX_STATUS,
4102 (PFNRT)Console::detachStorageDevice,
4103 6,
4104 this,
4105 pVM,
4106 pszDevice,
4107 uInstance,
4108 enmBus,
4109 aMediumAttachment);
4110
4111 /* release the lock before waiting for a result (EMT will call us back!) */
4112 alock.release();
4113
4114 if (vrc == VERR_TIMEOUT || RT_SUCCESS(vrc))
4115 {
4116 vrc = VMR3ReqWait(pReq, RT_INDEFINITE_WAIT);
4117 AssertRC(vrc);
4118 if (RT_SUCCESS(vrc))
4119 vrc = pReq->iStatus;
4120 }
4121 VMR3ReqFree(pReq);
4122
4123 if (RT_SUCCESS(vrc))
4124 {
4125 LogFlowThisFunc(("Returns S_OK\n"));
4126 return S_OK;
4127 }
4128
4129 if (!pMedium)
4130 return setError(E_FAIL,
4131 tr("Could not mount the media/drive '%ls' (%Rrc)"),
4132 mediumLocation.raw(), vrc);
4133
4134 return setError(E_FAIL,
4135 tr("Could not unmount the currently mounted media/drive (%Rrc)"),
4136 vrc);
4137}
4138
4139/**
4140 * Performs the storage detach operation in EMT.
4141 *
4142 * @returns VBox status code.
4143 *
4144 * @param pThis Pointer to the Console object.
4145 * @param pVM The VM handle.
4146 * @param pcszDevice The PDM device name.
4147 * @param uInstance The PDM device instance.
4148 *
4149 * @thread EMT
4150 */
4151DECLCALLBACK(int) Console::detachStorageDevice(Console *pConsole,
4152 PVM pVM,
4153 const char *pcszDevice,
4154 unsigned uInstance,
4155 StorageBus_T enmBus,
4156 IMediumAttachment *pMediumAtt)
4157{
4158 LogFlowFunc(("pConsole=%p uInstance=%u pszDevice=%p:{%s} enmBus=%u, pMediumAtt=%p\n",
4159 pConsole, uInstance, pcszDevice, pcszDevice, enmBus, pMediumAtt));
4160
4161 AssertReturn(pConsole, VERR_INVALID_PARAMETER);
4162
4163 AutoCaller autoCaller(pConsole);
4164 AssertComRCReturn(autoCaller.rc(), VERR_ACCESS_DENIED);
4165
4166 /*
4167 * Suspend the VM first.
4168 *
4169 * The VM must not be running since it might have pending I/O to
4170 * the drive which is being changed.
4171 */
4172 bool fResume;
4173 VMSTATE enmVMState = VMR3GetState(pVM);
4174 switch (enmVMState)
4175 {
4176 case VMSTATE_RESETTING:
4177 case VMSTATE_RUNNING:
4178 {
4179 LogFlowFunc(("Suspending the VM...\n"));
4180 /* disable the callback to prevent Console-level state change */
4181 pConsole->mVMStateChangeCallbackDisabled = true;
4182 int rc = VMR3Suspend(pVM);
4183 pConsole->mVMStateChangeCallbackDisabled = false;
4184 AssertRCReturn(rc, rc);
4185 fResume = true;
4186 break;
4187 }
4188
4189 case VMSTATE_SUSPENDED:
4190 case VMSTATE_CREATED:
4191 case VMSTATE_OFF:
4192 fResume = false;
4193 break;
4194
4195 case VMSTATE_RUNNING_LS:
4196 case VMSTATE_RUNNING_FT:
4197 return setErrorInternal(VBOX_E_INVALID_VM_STATE,
4198 COM_IIDOF(IConsole),
4199 getStaticComponentName(),
4200 (enmVMState == VMSTATE_RUNNING_LS) ? Utf8Str(tr("Cannot change drive during live migration")) : Utf8Str(tr("Cannot change drive during fault tolerant syncing")),
4201 false /*aWarning*/,
4202 true /*aLogIt*/);
4203
4204 default:
4205 AssertMsgFailedReturn(("enmVMState=%d\n", enmVMState), VERR_ACCESS_DENIED);
4206 }
4207
4208 /* Determine the base path for the device instance. */
4209 PCFGMNODE pCtlInst;
4210 pCtlInst = CFGMR3GetChildF(CFGMR3GetRoot(pVM), "Devices/%s/%u/", pcszDevice, uInstance);
4211 AssertReturn(pCtlInst, VERR_INTERNAL_ERROR);
4212
4213#define H() AssertMsgReturn(!FAILED(hrc), ("hrc=%Rhrc\n", hrc), VERR_GENERAL_FAILURE)
4214
4215 HRESULT hrc;
4216 int rc = VINF_SUCCESS;
4217 int rcRet = VINF_SUCCESS;
4218 unsigned uLUN;
4219 LONG lDev;
4220 LONG lPort;
4221 DeviceType_T lType;
4222 PCFGMNODE pLunL0 = NULL;
4223 PCFGMNODE pCfg = NULL;
4224
4225 hrc = pMediumAtt->COMGETTER(Device)(&lDev); H();
4226 hrc = pMediumAtt->COMGETTER(Port)(&lPort); H();
4227 hrc = pMediumAtt->COMGETTER(Type)(&lType); H();
4228 hrc = Console::convertBusPortDeviceToLun(enmBus, lPort, lDev, uLUN); H();
4229
4230#undef H
4231
4232 /* First check if the LUN really exists. */
4233 pLunL0 = CFGMR3GetChildF(pCtlInst, "LUN#%u", uLUN);
4234 if (pLunL0)
4235 {
4236 rc = PDMR3DeviceDetach(pVM, pcszDevice, uInstance, uLUN, 0);
4237 if (rc == VERR_PDM_NO_DRIVER_ATTACHED_TO_LUN)
4238 rc = VINF_SUCCESS;
4239 AssertRCReturn(rc, rc);
4240 CFGMR3RemoveNode(pLunL0);
4241
4242 Utf8Str devicePath = Utf8StrFmt("%s/%u/LUN#%u", pcszDevice, uInstance, uLUN);
4243 pConsole->mapMediumAttachments.erase(devicePath);
4244
4245 }
4246 else
4247 AssertFailedReturn(VERR_INTERNAL_ERROR);
4248
4249 CFGMR3Dump(pCtlInst);
4250
4251 /*
4252 * Resume the VM if necessary.
4253 */
4254 if (fResume)
4255 {
4256 LogFlowFunc(("Resuming the VM...\n"));
4257 /* disable the callback to prevent Console-level state change */
4258 pConsole->mVMStateChangeCallbackDisabled = true;
4259 rc = VMR3Resume(pVM);
4260 pConsole->mVMStateChangeCallbackDisabled = false;
4261 AssertRC(rc);
4262 if (RT_FAILURE(rc))
4263 {
4264 /* too bad, we failed. try to sync the console state with the VMM state */
4265 vmstateChangeCallback(pVM, VMSTATE_SUSPENDED, enmVMState, pConsole);
4266 }
4267 /** @todo: if we failed with drive mount, then the VMR3Resume
4268 * error (if any) will be hidden from the caller. For proper reporting
4269 * of such multiple errors to the caller we need to enhance the
4270 * IVirtualBoxError interface. For now, give the first error the higher
4271 * priority.
4272 */
4273 if (RT_SUCCESS(rcRet))
4274 rcRet = rc;
4275 }
4276
4277 LogFlowFunc(("Returning %Rrc\n", rcRet));
4278 return rcRet;
4279}
4280
4281/**
4282 * Called by IInternalSessionControl::OnNetworkAdapterChange().
4283 *
4284 * @note Locks this object for writing.
4285 */
4286HRESULT Console::onNetworkAdapterChange(INetworkAdapter *aNetworkAdapter, BOOL changeAdapter)
4287{
4288 LogFlowThisFunc(("\n"));
4289
4290 AutoCaller autoCaller(this);
4291 AssertComRCReturnRC(autoCaller.rc());
4292
4293 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
4294
4295 HRESULT rc = S_OK;
4296
4297 /* don't trigger network change if the VM isn't running */
4298 SafeVMPtrQuiet ptrVM(this);
4299 if (ptrVM.isOk())
4300 {
4301 /* Get the properties we need from the adapter */
4302 BOOL fCableConnected, fTraceEnabled;
4303 rc = aNetworkAdapter->COMGETTER(CableConnected)(&fCableConnected);
4304 AssertComRC(rc);
4305 if (SUCCEEDED(rc))
4306 {
4307 rc = aNetworkAdapter->COMGETTER(TraceEnabled)(&fTraceEnabled);
4308 AssertComRC(rc);
4309 }
4310 if (SUCCEEDED(rc))
4311 {
4312 ULONG ulInstance;
4313 rc = aNetworkAdapter->COMGETTER(Slot)(&ulInstance);
4314 AssertComRC(rc);
4315 if (SUCCEEDED(rc))
4316 {
4317 /*
4318 * Find the adapter instance, get the config interface and update
4319 * the link state.
4320 */
4321 NetworkAdapterType_T adapterType;
4322 rc = aNetworkAdapter->COMGETTER(AdapterType)(&adapterType);
4323 AssertComRC(rc);
4324 const char *pszAdapterName = networkAdapterTypeToName(adapterType);
4325 PPDMIBASE pBase;
4326 int vrc = PDMR3QueryDeviceLun(ptrVM, pszAdapterName, ulInstance, 0, &pBase);
4327 if (RT_SUCCESS(vrc))
4328 {
4329 Assert(pBase);
4330 PPDMINETWORKCONFIG pINetCfg;
4331 pINetCfg = PDMIBASE_QUERY_INTERFACE(pBase, PDMINETWORKCONFIG);
4332 if (pINetCfg)
4333 {
4334 Log(("Console::onNetworkAdapterChange: setting link state to %d\n",
4335 fCableConnected));
4336 vrc = pINetCfg->pfnSetLinkState(pINetCfg,
4337 fCableConnected ? PDMNETWORKLINKSTATE_UP
4338 : PDMNETWORKLINKSTATE_DOWN);
4339 ComAssertRC(vrc);
4340 }
4341 if (RT_SUCCESS(vrc) && changeAdapter)
4342 {
4343 VMSTATE enmVMState = VMR3GetState(ptrVM);
4344 if ( enmVMState == VMSTATE_RUNNING /** @todo LiveMigration: Forbid or deal correctly with the _LS variants */
4345 || enmVMState == VMSTATE_SUSPENDED)
4346 {
4347 if (fTraceEnabled && fCableConnected && pINetCfg)
4348 {
4349 vrc = pINetCfg->pfnSetLinkState(pINetCfg, PDMNETWORKLINKSTATE_DOWN);
4350 ComAssertRC(vrc);
4351 }
4352
4353 rc = doNetworkAdapterChange(ptrVM, pszAdapterName, ulInstance, 0, aNetworkAdapter);
4354
4355 if (fTraceEnabled && fCableConnected && pINetCfg)
4356 {
4357 vrc = pINetCfg->pfnSetLinkState(pINetCfg, PDMNETWORKLINKSTATE_UP);
4358 ComAssertRC(vrc);
4359 }
4360 }
4361 }
4362 }
4363 else if (vrc == VERR_PDM_DEVICE_INSTANCE_NOT_FOUND)
4364 return setError(E_FAIL,
4365 tr("The network adapter #%u is not enabled"), ulInstance);
4366 else
4367 ComAssertRC(vrc);
4368
4369 if (RT_FAILURE(vrc))
4370 rc = E_FAIL;
4371 }
4372 }
4373 ptrVM.release();
4374 }
4375
4376 /* notify console callbacks on success */
4377 if (SUCCEEDED(rc))
4378 {
4379 alock.release(); /** @todo 101% safe? */
4380 fireNetworkAdapterChangedEvent(mEventSource, aNetworkAdapter);
4381 }
4382
4383 LogFlowThisFunc(("Leaving rc=%#x\n", rc));
4384 return rc;
4385}
4386
4387/**
4388 * Called by IInternalSessionControl::OnNATEngineChange().
4389 *
4390 * @note Locks this object for writing.
4391 */
4392HRESULT Console::onNATRedirectRuleChange(ULONG ulInstance, BOOL aNatRuleRemove,
4393 NATProtocol_T aProto, IN_BSTR aHostIp, LONG aHostPort, IN_BSTR aGuestIp, LONG aGuestPort)
4394{
4395 LogFlowThisFunc(("\n"));
4396
4397 AutoCaller autoCaller(this);
4398 AssertComRCReturnRC(autoCaller.rc());
4399
4400 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
4401
4402 HRESULT rc = S_OK;
4403
4404 /* don't trigger nat engine change if the VM isn't running */
4405 SafeVMPtrQuiet ptrVM(this);
4406 if (ptrVM.isOk())
4407 {
4408 do
4409 {
4410 ComPtr<INetworkAdapter> pNetworkAdapter;
4411 rc = machine()->GetNetworkAdapter(ulInstance, pNetworkAdapter.asOutParam());
4412 if ( FAILED(rc)
4413 || pNetworkAdapter.isNull())
4414 break;
4415
4416 /*
4417 * Find the adapter instance, get the config interface and update
4418 * the link state.
4419 */
4420 NetworkAdapterType_T adapterType;
4421 rc = pNetworkAdapter->COMGETTER(AdapterType)(&adapterType);
4422 if (FAILED(rc))
4423 {
4424 AssertComRC(rc);
4425 rc = E_FAIL;
4426 break;
4427 }
4428
4429 const char *pszAdapterName = networkAdapterTypeToName(adapterType);
4430 PPDMIBASE pBase;
4431 int vrc = PDMR3QueryLun(ptrVM, pszAdapterName, ulInstance, 0, &pBase);
4432 if (RT_FAILURE(vrc))
4433 {
4434 ComAssertRC(vrc);
4435 rc = E_FAIL;
4436 break;
4437 }
4438
4439 NetworkAttachmentType_T attachmentType;
4440 rc = pNetworkAdapter->COMGETTER(AttachmentType)(&attachmentType);
4441 if ( FAILED(rc)
4442 || attachmentType != NetworkAttachmentType_NAT)
4443 {
4444 rc = E_FAIL;
4445 break;
4446 }
4447
4448 /* look down for PDMINETWORKNATCONFIG interface */
4449 PPDMINETWORKNATCONFIG pNetNatCfg = NULL;
4450 while (pBase)
4451 {
4452 pNetNatCfg = (PPDMINETWORKNATCONFIG)pBase->pfnQueryInterface(pBase, PDMINETWORKNATCONFIG_IID);
4453 if (pNetNatCfg)
4454 break;
4455 /** @todo r=bird: This stinks! */
4456 PPDMDRVINS pDrvIns = PDMIBASE_2_PDMDRV(pBase);
4457 pBase = pDrvIns->pDownBase;
4458 }
4459 if (!pNetNatCfg)
4460 break;
4461
4462 bool fUdp = aProto == NATProtocol_UDP;
4463 vrc = pNetNatCfg->pfnRedirectRuleCommand(pNetNatCfg, aNatRuleRemove, fUdp,
4464 Utf8Str(aHostIp).c_str(), aHostPort, Utf8Str(aGuestIp).c_str(),
4465 aGuestPort);
4466 if (RT_FAILURE(vrc))
4467 rc = E_FAIL;
4468 } while (0); /* break loop */
4469 ptrVM.release();
4470 }
4471
4472 LogFlowThisFunc(("Leaving rc=%#x\n", rc));
4473 return rc;
4474}
4475
4476
4477/**
4478 * Process a network adaptor change.
4479 *
4480 * @returns COM status code.
4481 *
4482 * @parma pVM The VM handle (caller hold this safely).
4483 * @param pszDevice The PDM device name.
4484 * @param uInstance The PDM device instance.
4485 * @param uLun The PDM LUN number of the drive.
4486 * @param aNetworkAdapter The network adapter whose attachment needs to be changed
4487 *
4488 * @note Locks this object for writing.
4489 */
4490HRESULT Console::doNetworkAdapterChange(PVM pVM,
4491 const char *pszDevice,
4492 unsigned uInstance,
4493 unsigned uLun,
4494 INetworkAdapter *aNetworkAdapter)
4495{
4496 LogFlowThisFunc(("pszDevice=%p:{%s} uInstance=%u uLun=%u aNetworkAdapter=%p\n",
4497 pszDevice, pszDevice, uInstance, uLun, aNetworkAdapter));
4498
4499 AutoCaller autoCaller(this);
4500 AssertComRCReturnRC(autoCaller.rc());
4501
4502 /* We will need to release the write lock before calling EMT */
4503 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
4504
4505 /* Get the VM handle. */
4506 SafeVMPtr ptrVM(this);
4507 if (!ptrVM.isOk())
4508 return ptrVM.rc();
4509
4510 /*
4511 * Call worker in EMT, that's faster and safer than doing everything
4512 * using VM3ReqCall. Note that we separate VMR3ReqCall from VMR3ReqWait
4513 * here to make requests from under the lock in order to serialize them.
4514 */
4515 PVMREQ pReq;
4516 int vrc = VMR3ReqCall(pVM, 0 /*idDstCpu*/, &pReq, 0 /* no wait! */, VMREQFLAGS_VBOX_STATUS,
4517 (PFNRT) Console::changeNetworkAttachment, 6,
4518 this, ptrVM.raw(), pszDevice, uInstance, uLun, aNetworkAdapter);
4519
4520 /* release the lock before waiting for a result (EMT will call us back!) */
4521 alock.release();
4522
4523 if (vrc == VERR_TIMEOUT || RT_SUCCESS(vrc))
4524 {
4525 vrc = VMR3ReqWait(pReq, RT_INDEFINITE_WAIT);
4526 AssertRC(vrc);
4527 if (RT_SUCCESS(vrc))
4528 vrc = pReq->iStatus;
4529 }
4530 VMR3ReqFree(pReq);
4531
4532 if (RT_SUCCESS(vrc))
4533 {
4534 LogFlowThisFunc(("Returns S_OK\n"));
4535 return S_OK;
4536 }
4537
4538 return setError(E_FAIL,
4539 tr("Could not change the network adaptor attachement type (%Rrc)"),
4540 vrc);
4541}
4542
4543
4544/**
4545 * Performs the Network Adaptor change in EMT.
4546 *
4547 * @returns VBox status code.
4548 *
4549 * @param pThis Pointer to the Console object.
4550 * @param pVM The VM handle.
4551 * @param pszDevice The PDM device name.
4552 * @param uInstance The PDM device instance.
4553 * @param uLun The PDM LUN number of the drive.
4554 * @param aNetworkAdapter The network adapter whose attachment needs to be changed
4555 *
4556 * @thread EMT
4557 * @note Locks the Console object for writing.
4558 */
4559DECLCALLBACK(int) Console::changeNetworkAttachment(Console *pThis,
4560 PVM pVM,
4561 const char *pszDevice,
4562 unsigned uInstance,
4563 unsigned uLun,
4564 INetworkAdapter *aNetworkAdapter)
4565{
4566 LogFlowFunc(("pThis=%p pszDevice=%p:{%s} uInstance=%u uLun=%u aNetworkAdapter=%p\n",
4567 pThis, pszDevice, pszDevice, uInstance, uLun, aNetworkAdapter));
4568
4569 AssertReturn(pThis, VERR_INVALID_PARAMETER);
4570
4571 AutoCaller autoCaller(pThis);
4572 AssertComRCReturn(autoCaller.rc(), VERR_ACCESS_DENIED);
4573
4574 ComPtr<IVirtualBox> pVirtualBox;
4575 pThis->mMachine->COMGETTER(Parent)(pVirtualBox.asOutParam());
4576 ComPtr<ISystemProperties> pSystemProperties;
4577 if (pVirtualBox)
4578 pVirtualBox->COMGETTER(SystemProperties)(pSystemProperties.asOutParam());
4579 ChipsetType_T chipsetType = ChipsetType_PIIX3;
4580 pThis->mMachine->COMGETTER(ChipsetType)(&chipsetType);
4581 ULONG maxNetworkAdapters = 0;
4582 if (pSystemProperties)
4583 pSystemProperties->GetMaxNetworkAdapters(chipsetType, &maxNetworkAdapters);
4584 AssertMsg( ( !strcmp(pszDevice, "pcnet")
4585 || !strcmp(pszDevice, "e1000")
4586 || !strcmp(pszDevice, "virtio-net"))
4587 && uLun == 0
4588 && uInstance < maxNetworkAdapters,
4589 ("pszDevice=%s uLun=%d uInstance=%d\n", pszDevice, uLun, uInstance));
4590 Log(("pszDevice=%s uLun=%d uInstance=%d\n", pszDevice, uLun, uInstance));
4591
4592 /*
4593 * Suspend the VM first.
4594 *
4595 * The VM must not be running since it might have pending I/O to
4596 * the drive which is being changed.
4597 */
4598 bool fResume;
4599 VMSTATE enmVMState = VMR3GetState(pVM);
4600 switch (enmVMState)
4601 {
4602 case VMSTATE_RESETTING:
4603 case VMSTATE_RUNNING:
4604 {
4605 LogFlowFunc(("Suspending the VM...\n"));
4606 /* disable the callback to prevent Console-level state change */
4607 pThis->mVMStateChangeCallbackDisabled = true;
4608 int rc = VMR3Suspend(pVM);
4609 pThis->mVMStateChangeCallbackDisabled = false;
4610 AssertRCReturn(rc, rc);
4611 fResume = true;
4612 break;
4613 }
4614
4615 case VMSTATE_SUSPENDED:
4616 case VMSTATE_CREATED:
4617 case VMSTATE_OFF:
4618 fResume = false;
4619 break;
4620
4621 default:
4622 AssertLogRelMsgFailedReturn(("enmVMState=%d\n", enmVMState), VERR_ACCESS_DENIED);
4623 }
4624
4625 int rc = VINF_SUCCESS;
4626 int rcRet = VINF_SUCCESS;
4627
4628 PCFGMNODE pCfg = NULL; /* /Devices/Dev/.../Config/ */
4629 PCFGMNODE pLunL0 = NULL; /* /Devices/Dev/0/LUN#0/ */
4630 PCFGMNODE pInst = CFGMR3GetChildF(CFGMR3GetRoot(pVM), "Devices/%s/%d/", pszDevice, uInstance);
4631 AssertRelease(pInst);
4632
4633 rcRet = pThis->configNetwork(pszDevice, uInstance, uLun, aNetworkAdapter, pCfg, pLunL0, pInst,
4634 true /*fAttachDetach*/, false /*fIgnoreConnectFailure*/);
4635
4636 /*
4637 * Resume the VM if necessary.
4638 */
4639 if (fResume)
4640 {
4641 LogFlowFunc(("Resuming the VM...\n"));
4642 /* disable the callback to prevent Console-level state change */
4643 pThis->mVMStateChangeCallbackDisabled = true;
4644 rc = VMR3Resume(pVM);
4645 pThis->mVMStateChangeCallbackDisabled = false;
4646 AssertRC(rc);
4647 if (RT_FAILURE(rc))
4648 {
4649 /* too bad, we failed. try to sync the console state with the VMM state */
4650 vmstateChangeCallback(pVM, VMSTATE_SUSPENDED, enmVMState, pThis);
4651 }
4652 /// @todo (r=dmik) if we failed with drive mount, then the VMR3Resume
4653 // error (if any) will be hidden from the caller. For proper reporting
4654 // of such multiple errors to the caller we need to enhance the
4655 // IVirtualBoxError interface. For now, give the first error the higher
4656 // priority.
4657 if (RT_SUCCESS(rcRet))
4658 rcRet = rc;
4659 }
4660
4661 LogFlowFunc(("Returning %Rrc\n", rcRet));
4662 return rcRet;
4663}
4664
4665
4666/**
4667 * Called by IInternalSessionControl::OnSerialPortChange().
4668 */
4669HRESULT Console::onSerialPortChange(ISerialPort *aSerialPort)
4670{
4671 LogFlowThisFunc(("\n"));
4672
4673 AutoCaller autoCaller(this);
4674 AssertComRCReturnRC(autoCaller.rc());
4675
4676 fireSerialPortChangedEvent(mEventSource, aSerialPort);
4677
4678 LogFlowThisFunc(("Leaving rc=%#x\n", S_OK));
4679 return S_OK;
4680}
4681
4682/**
4683 * Called by IInternalSessionControl::OnParallelPortChange().
4684 */
4685HRESULT Console::onParallelPortChange(IParallelPort *aParallelPort)
4686{
4687 LogFlowThisFunc(("\n"));
4688
4689 AutoCaller autoCaller(this);
4690 AssertComRCReturnRC(autoCaller.rc());
4691
4692 fireParallelPortChangedEvent(mEventSource, aParallelPort);
4693
4694 LogFlowThisFunc(("Leaving rc=%#x\n", S_OK));
4695 return S_OK;
4696}
4697
4698/**
4699 * Called by IInternalSessionControl::OnStorageControllerChange().
4700 */
4701HRESULT Console::onStorageControllerChange()
4702{
4703 LogFlowThisFunc(("\n"));
4704
4705 AutoCaller autoCaller(this);
4706 AssertComRCReturnRC(autoCaller.rc());
4707
4708 fireStorageControllerChangedEvent(mEventSource);
4709
4710 LogFlowThisFunc(("Leaving rc=%#x\n", S_OK));
4711 return S_OK;
4712}
4713
4714/**
4715 * Called by IInternalSessionControl::OnMediumChange().
4716 *
4717 * @note Locks this object for writing.
4718 */
4719HRESULT Console::onMediumChange(IMediumAttachment *aMediumAttachment, BOOL aForce)
4720{
4721 LogFlowThisFunc(("\n"));
4722
4723 AutoCaller autoCaller(this);
4724 AssertComRCReturnRC(autoCaller.rc());
4725
4726 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
4727
4728 HRESULT rc = S_OK;
4729
4730 /* don't trigger medium change if the VM isn't running */
4731 SafeVMPtrQuiet ptrVM(this);
4732 if (ptrVM.isOk())
4733 {
4734 rc = doMediumChange(aMediumAttachment, !!aForce, ptrVM);
4735 ptrVM.release();
4736 }
4737
4738 /* notify console callbacks on success */
4739 if (SUCCEEDED(rc))
4740 {
4741 alock.release(); /** @todo 101% safe? */
4742 fireMediumChangedEvent(mEventSource, aMediumAttachment);
4743 }
4744
4745 LogFlowThisFunc(("Leaving rc=%#x\n", rc));
4746 return rc;
4747}
4748
4749/**
4750 * Called by IInternalSessionControl::OnCPUChange().
4751 *
4752 * @note Locks this object for writing.
4753 */
4754HRESULT Console::onCPUChange(ULONG aCPU, BOOL aRemove)
4755{
4756 LogFlowThisFunc(("\n"));
4757
4758 AutoCaller autoCaller(this);
4759 AssertComRCReturnRC(autoCaller.rc());
4760
4761 HRESULT rc = S_OK;
4762
4763 /* don't trigger CPU change if the VM isn't running */
4764 SafeVMPtrQuiet ptrVM(this);
4765 if (ptrVM.isOk())
4766 {
4767 if (aRemove)
4768 rc = doCPURemove(aCPU, ptrVM);
4769 else
4770 rc = doCPUAdd(aCPU, ptrVM);
4771 ptrVM.release();
4772 }
4773
4774 /* notify console callbacks on success */
4775 if (SUCCEEDED(rc))
4776 fireCPUChangedEvent(mEventSource, aCPU, aRemove);
4777
4778 LogFlowThisFunc(("Leaving rc=%#x\n", rc));
4779 return rc;
4780}
4781
4782/**
4783 * Called by IInternalSessionControl::OnCpuExecutionCapChange().
4784 *
4785 * @note Locks this object for writing.
4786 */
4787HRESULT Console::onCPUExecutionCapChange(ULONG aExecutionCap)
4788{
4789 LogFlowThisFunc(("\n"));
4790
4791 AutoCaller autoCaller(this);
4792 AssertComRCReturnRC(autoCaller.rc());
4793
4794 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
4795
4796 HRESULT rc = S_OK;
4797
4798 /* don't trigger the CPU priority change if the VM isn't running */
4799 SafeVMPtrQuiet ptrVM(this);
4800 if (ptrVM.isOk())
4801 {
4802 if ( mMachineState == MachineState_Running
4803 || mMachineState == MachineState_Teleporting
4804 || mMachineState == MachineState_LiveSnapshotting
4805 )
4806 {
4807 /* No need to call in the EMT thread. */
4808 rc = VMR3SetCpuExecutionCap(ptrVM, aExecutionCap);
4809 }
4810 else
4811 rc = setInvalidMachineStateError();
4812 ptrVM.release();
4813 }
4814
4815 /* notify console callbacks on success */
4816 if (SUCCEEDED(rc))
4817 {
4818 alock.release();
4819 fireCPUExecutionCapChangedEvent(mEventSource, aExecutionCap);
4820 }
4821
4822 LogFlowThisFunc(("Leaving rc=%#x\n", rc));
4823 return rc;
4824}
4825
4826/**
4827 * Called by IInternalSessionControl::OnVRDEServerChange().
4828 *
4829 * @note Locks this object for writing.
4830 */
4831HRESULT Console::onVRDEServerChange(BOOL aRestart)
4832{
4833 AutoCaller autoCaller(this);
4834 AssertComRCReturnRC(autoCaller.rc());
4835
4836 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
4837
4838 HRESULT rc = S_OK;
4839
4840 if ( mVRDEServer
4841 && ( mMachineState == MachineState_Running
4842 || mMachineState == MachineState_Teleporting
4843 || mMachineState == MachineState_LiveSnapshotting
4844 )
4845 )
4846 {
4847 BOOL vrdpEnabled = FALSE;
4848
4849 rc = mVRDEServer->COMGETTER(Enabled)(&vrdpEnabled);
4850 ComAssertComRCRetRC(rc);
4851
4852 if (aRestart)
4853 {
4854 /* VRDP server may call this Console object back from other threads (VRDP INPUT or OUTPUT). */
4855 alock.release();
4856
4857 if (vrdpEnabled)
4858 {
4859 // If there was no VRDP server started the 'stop' will do nothing.
4860 // However if a server was started and this notification was called,
4861 // we have to restart the server.
4862 mConsoleVRDPServer->Stop();
4863
4864 if (RT_FAILURE(mConsoleVRDPServer->Launch()))
4865 rc = E_FAIL;
4866 else
4867 mConsoleVRDPServer->EnableConnections();
4868 }
4869 else
4870 {
4871 mConsoleVRDPServer->Stop();
4872 }
4873
4874 alock.acquire();
4875 }
4876 }
4877
4878 /* notify console callbacks on success */
4879 if (SUCCEEDED(rc))
4880 {
4881 alock.release();
4882 fireVRDEServerChangedEvent(mEventSource);
4883 }
4884
4885 return rc;
4886}
4887
4888void Console::onVRDEServerInfoChange()
4889{
4890 AutoCaller autoCaller(this);
4891 AssertComRCReturnVoid(autoCaller.rc());
4892
4893 fireVRDEServerInfoChangedEvent(mEventSource);
4894}
4895
4896
4897/**
4898 * Called by IInternalSessionControl::OnUSBControllerChange().
4899 */
4900HRESULT Console::onUSBControllerChange()
4901{
4902 LogFlowThisFunc(("\n"));
4903
4904 AutoCaller autoCaller(this);
4905 AssertComRCReturnRC(autoCaller.rc());
4906
4907 fireUSBControllerChangedEvent(mEventSource);
4908
4909 return S_OK;
4910}
4911
4912/**
4913 * Called by IInternalSessionControl::OnSharedFolderChange().
4914 *
4915 * @note Locks this object for writing.
4916 */
4917HRESULT Console::onSharedFolderChange(BOOL aGlobal)
4918{
4919 LogFlowThisFunc(("aGlobal=%RTbool\n", aGlobal));
4920
4921 AutoCaller autoCaller(this);
4922 AssertComRCReturnRC(autoCaller.rc());
4923
4924 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
4925
4926 HRESULT rc = fetchSharedFolders(aGlobal);
4927
4928 /* notify console callbacks on success */
4929 if (SUCCEEDED(rc))
4930 {
4931 alock.release();
4932 fireSharedFolderChangedEvent(mEventSource, aGlobal ? (Scope_T)Scope_Global : (Scope_T)Scope_Machine);
4933 }
4934
4935 return rc;
4936}
4937
4938/**
4939 * Called by IInternalSessionControl::OnUSBDeviceAttach() or locally by
4940 * processRemoteUSBDevices() after IInternalMachineControl::RunUSBDeviceFilters()
4941 * returns TRUE for a given remote USB device.
4942 *
4943 * @return S_OK if the device was attached to the VM.
4944 * @return failure if not attached.
4945 *
4946 * @param aDevice
4947 * The device in question.
4948 * @param aMaskedIfs
4949 * The interfaces to hide from the guest.
4950 *
4951 * @note Locks this object for writing.
4952 */
4953HRESULT Console::onUSBDeviceAttach(IUSBDevice *aDevice, IVirtualBoxErrorInfo *aError, ULONG aMaskedIfs)
4954{
4955#ifdef VBOX_WITH_USB
4956 LogFlowThisFunc(("aDevice=%p aError=%p\n", aDevice, aError));
4957
4958 AutoCaller autoCaller(this);
4959 ComAssertComRCRetRC(autoCaller.rc());
4960
4961 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
4962
4963 /* Get the VM pointer (we don't need error info, since it's a callback). */
4964 SafeVMPtrQuiet ptrVM(this);
4965 if (!ptrVM.isOk())
4966 {
4967 /* The VM may be no more operational when this message arrives
4968 * (e.g. it may be Saving or Stopping or just PoweredOff) --
4969 * autoVMCaller.rc() will return a failure in this case. */
4970 LogFlowThisFunc(("Attach request ignored (mMachineState=%d).\n",
4971 mMachineState));
4972 return ptrVM.rc();
4973 }
4974
4975 if (aError != NULL)
4976 {
4977 /* notify callbacks about the error */
4978 onUSBDeviceStateChange(aDevice, true /* aAttached */, aError);
4979 return S_OK;
4980 }
4981
4982 /* Don't proceed unless there's at least one USB hub. */
4983 if (!PDMR3USBHasHub(ptrVM))
4984 {
4985 LogFlowThisFunc(("Attach request ignored (no USB controller).\n"));
4986 return E_FAIL;
4987 }
4988
4989 HRESULT rc = attachUSBDevice(aDevice, aMaskedIfs);
4990 if (FAILED(rc))
4991 {
4992 /* take the current error info */
4993 com::ErrorInfoKeeper eik;
4994 /* the error must be a VirtualBoxErrorInfo instance */
4995 ComPtr<IVirtualBoxErrorInfo> pError = eik.takeError();
4996 Assert(!pError.isNull());
4997 if (!pError.isNull())
4998 {
4999 /* notify callbacks about the error */
5000 onUSBDeviceStateChange(aDevice, true /* aAttached */, pError);
5001 }
5002 }
5003
5004 return rc;
5005
5006#else /* !VBOX_WITH_USB */
5007 return E_FAIL;
5008#endif /* !VBOX_WITH_USB */
5009}
5010
5011/**
5012 * Called by IInternalSessionControl::OnUSBDeviceDetach() and locally by
5013 * processRemoteUSBDevices().
5014 *
5015 * @note Locks this object for writing.
5016 */
5017HRESULT Console::onUSBDeviceDetach(IN_BSTR aId,
5018 IVirtualBoxErrorInfo *aError)
5019{
5020#ifdef VBOX_WITH_USB
5021 Guid Uuid(aId);
5022 LogFlowThisFunc(("aId={%RTuuid} aError=%p\n", Uuid.raw(), aError));
5023
5024 AutoCaller autoCaller(this);
5025 AssertComRCReturnRC(autoCaller.rc());
5026
5027 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
5028
5029 /* Find the device. */
5030 ComObjPtr<OUSBDevice> pUSBDevice;
5031 USBDeviceList::iterator it = mUSBDevices.begin();
5032 while (it != mUSBDevices.end())
5033 {
5034 LogFlowThisFunc(("it={%RTuuid}\n", (*it)->id().raw()));
5035 if ((*it)->id() == Uuid)
5036 {
5037 pUSBDevice = *it;
5038 break;
5039 }
5040 ++it;
5041 }
5042
5043
5044 if (pUSBDevice.isNull())
5045 {
5046 LogFlowThisFunc(("USB device not found.\n"));
5047
5048 /* The VM may be no more operational when this message arrives
5049 * (e.g. it may be Saving or Stopping or just PoweredOff). Use
5050 * AutoVMCaller to detect it -- AutoVMCaller::rc() will return a
5051 * failure in this case. */
5052
5053 AutoVMCallerQuiet autoVMCaller(this);
5054 if (FAILED(autoVMCaller.rc()))
5055 {
5056 LogFlowThisFunc(("Detach request ignored (mMachineState=%d).\n",
5057 mMachineState));
5058 return autoVMCaller.rc();
5059 }
5060
5061 /* the device must be in the list otherwise */
5062 AssertFailedReturn(E_FAIL);
5063 }
5064
5065 if (aError != NULL)
5066 {
5067 /* notify callback about an error */
5068 onUSBDeviceStateChange(pUSBDevice, false /* aAttached */, aError);
5069 return S_OK;
5070 }
5071
5072 HRESULT rc = detachUSBDevice(it);
5073
5074 if (FAILED(rc))
5075 {
5076 /* take the current error info */
5077 com::ErrorInfoKeeper eik;
5078 /* the error must be a VirtualBoxErrorInfo instance */
5079 ComPtr<IVirtualBoxErrorInfo> pError = eik.takeError();
5080 Assert(!pError.isNull());
5081 if (!pError.isNull())
5082 {
5083 /* notify callbacks about the error */
5084 onUSBDeviceStateChange(pUSBDevice, false /* aAttached */, pError);
5085 }
5086 }
5087
5088 return rc;
5089
5090#else /* !VBOX_WITH_USB */
5091 return E_FAIL;
5092#endif /* !VBOX_WITH_USB */
5093}
5094
5095/**
5096 * Called by IInternalSessionControl::OnBandwidthGroupChange().
5097 *
5098 * @note Locks this object for writing.
5099 */
5100HRESULT Console::onBandwidthGroupChange(IBandwidthGroup *aBandwidthGroup)
5101{
5102 LogFlowThisFunc(("\n"));
5103
5104 AutoCaller autoCaller(this);
5105 AssertComRCReturnRC(autoCaller.rc());
5106
5107 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
5108
5109 HRESULT rc = S_OK;
5110
5111 /* don't trigger the CPU priority change if the VM isn't running */
5112 SafeVMPtrQuiet ptrVM(this);
5113 if (ptrVM.isOk())
5114 {
5115 if ( mMachineState == MachineState_Running
5116 || mMachineState == MachineState_Teleporting
5117 || mMachineState == MachineState_LiveSnapshotting
5118 )
5119 {
5120 /* No need to call in the EMT thread. */
5121 ULONG cMax;
5122 Bstr strName;
5123 rc = aBandwidthGroup->COMGETTER(Name)(strName.asOutParam());
5124 if (SUCCEEDED(rc))
5125 rc = aBandwidthGroup->COMGETTER(MaxMbPerSec)(&cMax);
5126
5127 if (SUCCEEDED(rc))
5128 {
5129 int vrc;
5130 vrc = PDMR3AsyncCompletionBwMgrSetMaxForFile(ptrVM, Utf8Str(strName).c_str(),
5131 cMax * _1M);
5132 AssertRC(vrc);
5133 }
5134 }
5135 else
5136 rc = setInvalidMachineStateError();
5137 ptrVM.release();
5138 }
5139
5140 /* notify console callbacks on success */
5141 if (SUCCEEDED(rc))
5142 {
5143 alock.release();
5144 fireBandwidthGroupChangedEvent(mEventSource, aBandwidthGroup);
5145 }
5146
5147 LogFlowThisFunc(("Leaving rc=%#x\n", rc));
5148 return rc;
5149}
5150
5151/**
5152 * Called by IInternalSessionControl::OnStorageDeviceChange().
5153 *
5154 * @note Locks this object for writing.
5155 */
5156HRESULT Console::onStorageDeviceChange(IMediumAttachment *aMediumAttachment, BOOL aRemove)
5157{
5158 LogFlowThisFunc(("\n"));
5159
5160 AutoCaller autoCaller(this);
5161 AssertComRCReturnRC(autoCaller.rc());
5162
5163 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
5164
5165 HRESULT rc = S_OK;
5166
5167 /* don't trigger medium change if the VM isn't running */
5168 SafeVMPtrQuiet ptrVM(this);
5169 if (ptrVM.isOk())
5170 {
5171 if (aRemove)
5172 rc = doStorageDeviceDetach(aMediumAttachment, ptrVM);
5173 else
5174 rc = doStorageDeviceAttach(aMediumAttachment, ptrVM);
5175 ptrVM.release();
5176 }
5177
5178 /* notify console callbacks on success */
5179 if (SUCCEEDED(rc))
5180 {
5181 alock.release(); /** @todo 101% safe? */
5182 fireStorageDeviceChangedEvent(mEventSource, aMediumAttachment, aRemove);
5183 }
5184
5185 LogFlowThisFunc(("Leaving rc=%#x\n", rc));
5186 return rc;
5187}
5188
5189/**
5190 * @note Temporarily locks this object for writing.
5191 */
5192HRESULT Console::getGuestProperty(IN_BSTR aName, BSTR *aValue,
5193 LONG64 *aTimestamp, BSTR *aFlags)
5194{
5195#ifndef VBOX_WITH_GUEST_PROPS
5196 ReturnComNotImplemented();
5197#else /* VBOX_WITH_GUEST_PROPS */
5198 if (!VALID_PTR(aName))
5199 return E_INVALIDARG;
5200 if (!VALID_PTR(aValue))
5201 return E_POINTER;
5202 if ((aTimestamp != NULL) && !VALID_PTR(aTimestamp))
5203 return E_POINTER;
5204 if ((aFlags != NULL) && !VALID_PTR(aFlags))
5205 return E_POINTER;
5206
5207 AutoCaller autoCaller(this);
5208 AssertComRCReturnRC(autoCaller.rc());
5209
5210 /* protect mpVM (if not NULL) */
5211 AutoVMCallerWeak autoVMCaller(this);
5212 if (FAILED(autoVMCaller.rc())) return autoVMCaller.rc();
5213
5214 /* Note: validity of mVMMDev which is bound to uninit() is guaranteed by
5215 * autoVMCaller, so there is no need to hold a lock of this */
5216
5217 HRESULT rc = E_UNEXPECTED;
5218 using namespace guestProp;
5219
5220 try
5221 {
5222 VBOXHGCMSVCPARM parm[4];
5223 Utf8Str Utf8Name = aName;
5224 char szBuffer[MAX_VALUE_LEN + MAX_FLAGS_LEN];
5225
5226 parm[0].type = VBOX_HGCM_SVC_PARM_PTR;
5227 parm[0].u.pointer.addr = (void*)Utf8Name.c_str();
5228 /* The + 1 is the null terminator */
5229 parm[0].u.pointer.size = (uint32_t)Utf8Name.length() + 1;
5230 parm[1].type = VBOX_HGCM_SVC_PARM_PTR;
5231 parm[1].u.pointer.addr = szBuffer;
5232 parm[1].u.pointer.size = sizeof(szBuffer);
5233 int vrc = m_pVMMDev->hgcmHostCall("VBoxGuestPropSvc", GET_PROP_HOST,
5234 4, &parm[0]);
5235 /* The returned string should never be able to be greater than our buffer */
5236 AssertLogRel(vrc != VERR_BUFFER_OVERFLOW);
5237 AssertLogRel(RT_FAILURE(vrc) || VBOX_HGCM_SVC_PARM_64BIT == parm[2].type);
5238 if (RT_SUCCESS(vrc) || (VERR_NOT_FOUND == vrc))
5239 {
5240 rc = S_OK;
5241 if (vrc != VERR_NOT_FOUND)
5242 {
5243 Utf8Str strBuffer(szBuffer);
5244 strBuffer.cloneTo(aValue);
5245
5246 if (aTimestamp)
5247 *aTimestamp = parm[2].u.uint64;
5248
5249 if (aFlags)
5250 {
5251 size_t iFlags = strBuffer.length() + 1;
5252 Utf8Str(szBuffer + iFlags).cloneTo(aFlags);
5253 }
5254 }
5255 else
5256 aValue = NULL;
5257 }
5258 else
5259 rc = setError(E_UNEXPECTED,
5260 tr("The service call failed with the error %Rrc"),
5261 vrc);
5262 }
5263 catch(std::bad_alloc & /*e*/)
5264 {
5265 rc = E_OUTOFMEMORY;
5266 }
5267 return rc;
5268#endif /* VBOX_WITH_GUEST_PROPS */
5269}
5270
5271/**
5272 * @note Temporarily locks this object for writing.
5273 */
5274HRESULT Console::setGuestProperty(IN_BSTR aName, IN_BSTR aValue, IN_BSTR aFlags)
5275{
5276#ifndef VBOX_WITH_GUEST_PROPS
5277 ReturnComNotImplemented();
5278#else /* VBOX_WITH_GUEST_PROPS */
5279 if (!VALID_PTR(aName))
5280 return E_INVALIDARG;
5281 if ((aValue != NULL) && !VALID_PTR(aValue))
5282 return E_INVALIDARG;
5283 if ((aFlags != NULL) && !VALID_PTR(aFlags))
5284 return E_INVALIDARG;
5285
5286 AutoCaller autoCaller(this);
5287 AssertComRCReturnRC(autoCaller.rc());
5288
5289 /* protect mpVM (if not NULL) */
5290 AutoVMCallerWeak autoVMCaller(this);
5291 if (FAILED(autoVMCaller.rc())) return autoVMCaller.rc();
5292
5293 /* Note: validity of mVMMDev which is bound to uninit() is guaranteed by
5294 * autoVMCaller, so there is no need to hold a lock of this */
5295
5296 HRESULT rc = E_UNEXPECTED;
5297 using namespace guestProp;
5298
5299 VBOXHGCMSVCPARM parm[3];
5300 Utf8Str Utf8Name = aName;
5301 int vrc = VINF_SUCCESS;
5302
5303 parm[0].type = VBOX_HGCM_SVC_PARM_PTR;
5304 parm[0].u.pointer.addr = (void*)Utf8Name.c_str();
5305 /* The + 1 is the null terminator */
5306 parm[0].u.pointer.size = (uint32_t)Utf8Name.length() + 1;
5307 Utf8Str Utf8Value = aValue;
5308 if (aValue != NULL)
5309 {
5310 parm[1].type = VBOX_HGCM_SVC_PARM_PTR;
5311 parm[1].u.pointer.addr = (void*)Utf8Value.c_str();
5312 /* The + 1 is the null terminator */
5313 parm[1].u.pointer.size = (uint32_t)Utf8Value.length() + 1;
5314 }
5315 Utf8Str Utf8Flags = aFlags;
5316 if (aFlags != NULL)
5317 {
5318 parm[2].type = VBOX_HGCM_SVC_PARM_PTR;
5319 parm[2].u.pointer.addr = (void*)Utf8Flags.c_str();
5320 /* The + 1 is the null terminator */
5321 parm[2].u.pointer.size = (uint32_t)Utf8Flags.length() + 1;
5322 }
5323 if ((aValue != NULL) && (aFlags != NULL))
5324 vrc = m_pVMMDev->hgcmHostCall("VBoxGuestPropSvc", SET_PROP_HOST,
5325 3, &parm[0]);
5326 else if (aValue != NULL)
5327 vrc = m_pVMMDev->hgcmHostCall("VBoxGuestPropSvc", SET_PROP_VALUE_HOST,
5328 2, &parm[0]);
5329 else
5330 vrc = m_pVMMDev->hgcmHostCall("VBoxGuestPropSvc", DEL_PROP_HOST,
5331 1, &parm[0]);
5332 if (RT_SUCCESS(vrc))
5333 rc = S_OK;
5334 else
5335 rc = setError(E_UNEXPECTED,
5336 tr("The service call failed with the error %Rrc"),
5337 vrc);
5338 return rc;
5339#endif /* VBOX_WITH_GUEST_PROPS */
5340}
5341
5342
5343/**
5344 * @note Temporarily locks this object for writing.
5345 */
5346HRESULT Console::enumerateGuestProperties(IN_BSTR aPatterns,
5347 ComSafeArrayOut(BSTR, aNames),
5348 ComSafeArrayOut(BSTR, aValues),
5349 ComSafeArrayOut(LONG64, aTimestamps),
5350 ComSafeArrayOut(BSTR, aFlags))
5351{
5352#ifndef VBOX_WITH_GUEST_PROPS
5353 ReturnComNotImplemented();
5354#else /* VBOX_WITH_GUEST_PROPS */
5355 if (!VALID_PTR(aPatterns) && (aPatterns != NULL))
5356 return E_POINTER;
5357 if (ComSafeArrayOutIsNull(aNames))
5358 return E_POINTER;
5359 if (ComSafeArrayOutIsNull(aValues))
5360 return E_POINTER;
5361 if (ComSafeArrayOutIsNull(aTimestamps))
5362 return E_POINTER;
5363 if (ComSafeArrayOutIsNull(aFlags))
5364 return E_POINTER;
5365
5366 AutoCaller autoCaller(this);
5367 AssertComRCReturnRC(autoCaller.rc());
5368
5369 /* protect mpVM (if not NULL) */
5370 AutoVMCallerWeak autoVMCaller(this);
5371 if (FAILED(autoVMCaller.rc())) return autoVMCaller.rc();
5372
5373 /* Note: validity of mVMMDev which is bound to uninit() is guaranteed by
5374 * autoVMCaller, so there is no need to hold a lock of this */
5375
5376 return doEnumerateGuestProperties(aPatterns, ComSafeArrayOutArg(aNames),
5377 ComSafeArrayOutArg(aValues),
5378 ComSafeArrayOutArg(aTimestamps),
5379 ComSafeArrayOutArg(aFlags));
5380#endif /* VBOX_WITH_GUEST_PROPS */
5381}
5382
5383
5384/*
5385 * Internal: helper function for connecting progress reporting
5386 */
5387static int onlineMergeMediumProgress(void *pvUser, unsigned uPercentage)
5388{
5389 HRESULT rc = S_OK;
5390 IProgress *pProgress = static_cast<IProgress *>(pvUser);
5391 if (pProgress)
5392 rc = pProgress->SetCurrentOperationProgress(uPercentage);
5393 return SUCCEEDED(rc) ? VINF_SUCCESS : VERR_GENERAL_FAILURE;
5394}
5395
5396/**
5397 * @note Temporarily locks this object for writing. bird: And/or reading?
5398 */
5399HRESULT Console::onlineMergeMedium(IMediumAttachment *aMediumAttachment,
5400 ULONG aSourceIdx, ULONG aTargetIdx,
5401 IMedium *aSource, IMedium *aTarget,
5402 BOOL aMergeForward,
5403 IMedium *aParentForTarget,
5404 ComSafeArrayIn(IMedium *, aChildrenToReparent),
5405 IProgress *aProgress)
5406{
5407 AutoCaller autoCaller(this);
5408 AssertComRCReturnRC(autoCaller.rc());
5409
5410 HRESULT rc = S_OK;
5411 int vrc = VINF_SUCCESS;
5412
5413 /* Get the VM - must be done before the read-locking. */
5414 SafeVMPtr ptrVM(this);
5415 if (!ptrVM.isOk())
5416 return ptrVM.rc();
5417
5418 /* We will need to release the lock before doing the actual merge */
5419 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
5420
5421 /* paranoia - we don't want merges to happen while teleporting etc. */
5422 switch (mMachineState)
5423 {
5424 case MachineState_DeletingSnapshotOnline:
5425 case MachineState_DeletingSnapshotPaused:
5426 break;
5427
5428 default:
5429 return setInvalidMachineStateError();
5430 }
5431
5432 /** @todo AssertComRC -> AssertComRCReturn! Could potentially end up
5433 * using uninitialized variables here. */
5434 BOOL fBuiltinIoCache;
5435 rc = mMachine->COMGETTER(IoCacheEnabled)(&fBuiltinIoCache);
5436 AssertComRC(rc);
5437 SafeIfaceArray<IStorageController> ctrls;
5438 rc = mMachine->COMGETTER(StorageControllers)(ComSafeArrayAsOutParam(ctrls));
5439 AssertComRC(rc);
5440 LONG lDev;
5441 rc = aMediumAttachment->COMGETTER(Device)(&lDev);
5442 AssertComRC(rc);
5443 LONG lPort;
5444 rc = aMediumAttachment->COMGETTER(Port)(&lPort);
5445 AssertComRC(rc);
5446 IMedium *pMedium;
5447 rc = aMediumAttachment->COMGETTER(Medium)(&pMedium);
5448 AssertComRC(rc);
5449 Bstr mediumLocation;
5450 if (pMedium)
5451 {
5452 rc = pMedium->COMGETTER(Location)(mediumLocation.asOutParam());
5453 AssertComRC(rc);
5454 }
5455
5456 Bstr attCtrlName;
5457 rc = aMediumAttachment->COMGETTER(Controller)(attCtrlName.asOutParam());
5458 AssertComRC(rc);
5459 ComPtr<IStorageController> pStorageController;
5460 for (size_t i = 0; i < ctrls.size(); ++i)
5461 {
5462 Bstr ctrlName;
5463 rc = ctrls[i]->COMGETTER(Name)(ctrlName.asOutParam());
5464 AssertComRC(rc);
5465 if (attCtrlName == ctrlName)
5466 {
5467 pStorageController = ctrls[i];
5468 break;
5469 }
5470 }
5471 if (pStorageController.isNull())
5472 return setError(E_FAIL,
5473 tr("Could not find storage controller '%ls'"),
5474 attCtrlName.raw());
5475
5476 StorageControllerType_T enmCtrlType;
5477 rc = pStorageController->COMGETTER(ControllerType)(&enmCtrlType);
5478 AssertComRC(rc);
5479 const char *pcszDevice = convertControllerTypeToDev(enmCtrlType);
5480
5481 StorageBus_T enmBus;
5482 rc = pStorageController->COMGETTER(Bus)(&enmBus);
5483 AssertComRC(rc);
5484 ULONG uInstance;
5485 rc = pStorageController->COMGETTER(Instance)(&uInstance);
5486 AssertComRC(rc);
5487 BOOL fUseHostIOCache;
5488 rc = pStorageController->COMGETTER(UseHostIOCache)(&fUseHostIOCache);
5489 AssertComRC(rc);
5490
5491 unsigned uLUN;
5492 rc = Console::convertBusPortDeviceToLun(enmBus, lPort, lDev, uLUN);
5493 AssertComRCReturnRC(rc);
5494
5495 alock.release();
5496
5497 /* Pause the VM, as it might have pending IO on this drive */
5498 VMSTATE enmVMState = VMR3GetState(ptrVM);
5499 if (mMachineState == MachineState_DeletingSnapshotOnline)
5500 {
5501 LogFlowFunc(("Suspending the VM...\n"));
5502 /* disable the callback to prevent Console-level state change */
5503 mVMStateChangeCallbackDisabled = true;
5504 int vrc2 = VMR3Suspend(ptrVM);
5505 mVMStateChangeCallbackDisabled = false;
5506 AssertRCReturn(vrc2, E_FAIL);
5507 }
5508
5509 vrc = VMR3ReqCallWait(ptrVM,
5510 VMCPUID_ANY,
5511 (PFNRT)reconfigureMediumAttachment,
5512 13,
5513 this,
5514 ptrVM.raw(),
5515 pcszDevice,
5516 uInstance,
5517 enmBus,
5518 fUseHostIOCache,
5519 fBuiltinIoCache,
5520 true /* fSetupMerge */,
5521 aSourceIdx,
5522 aTargetIdx,
5523 aMediumAttachment,
5524 mMachineState,
5525 &rc);
5526 /* error handling is after resuming the VM */
5527
5528 if (mMachineState == MachineState_DeletingSnapshotOnline)
5529 {
5530 LogFlowFunc(("Resuming the VM...\n"));
5531 /* disable the callback to prevent Console-level state change */
5532 mVMStateChangeCallbackDisabled = true;
5533 int vrc2 = VMR3Resume(ptrVM);
5534 mVMStateChangeCallbackDisabled = false;
5535 if (RT_FAILURE(vrc2))
5536 {
5537 /* too bad, we failed. try to sync the console state with the VMM state */
5538 AssertLogRelRC(vrc2);
5539 vmstateChangeCallback(ptrVM, VMSTATE_SUSPENDED, enmVMState, this);
5540 }
5541 }
5542
5543 if (RT_FAILURE(vrc))
5544 return setError(E_FAIL, tr("%Rrc"), vrc);
5545 if (FAILED(rc))
5546 return rc;
5547
5548 PPDMIBASE pIBase = NULL;
5549 PPDMIMEDIA pIMedium = NULL;
5550 vrc = PDMR3QueryDriverOnLun(ptrVM, pcszDevice, uInstance, uLUN, "VD", &pIBase);
5551 if (RT_SUCCESS(vrc))
5552 {
5553 if (pIBase)
5554 {
5555 pIMedium = (PPDMIMEDIA)pIBase->pfnQueryInterface(pIBase, PDMIMEDIA_IID);
5556 if (!pIMedium)
5557 return setError(E_FAIL, tr("could not query medium interface of controller"));
5558 }
5559 else
5560 return setError(E_FAIL, tr("could not query base interface of controller"));
5561 }
5562
5563 /* Finally trigger the merge. */
5564 vrc = pIMedium->pfnMerge(pIMedium, onlineMergeMediumProgress, aProgress);
5565 if (RT_FAILURE(vrc))
5566 return setError(E_FAIL, tr("Failed to perform an online medium merge (%Rrc)"), vrc);
5567
5568 /* Pause the VM, as it might have pending IO on this drive */
5569 enmVMState = VMR3GetState(ptrVM);
5570 if (mMachineState == MachineState_DeletingSnapshotOnline)
5571 {
5572 LogFlowFunc(("Suspending the VM...\n"));
5573 /* disable the callback to prevent Console-level state change */
5574 mVMStateChangeCallbackDisabled = true;
5575 int vrc2 = VMR3Suspend(ptrVM);
5576 mVMStateChangeCallbackDisabled = false;
5577 AssertRCReturn(vrc2, E_FAIL);
5578 }
5579
5580 /* Update medium chain and state now, so that the VM can continue. */
5581 rc = mControl->FinishOnlineMergeMedium(aMediumAttachment, aSource, aTarget,
5582 aMergeForward, aParentForTarget,
5583 ComSafeArrayInArg(aChildrenToReparent));
5584
5585 vrc = VMR3ReqCallWait(ptrVM,
5586 VMCPUID_ANY,
5587 (PFNRT)reconfigureMediumAttachment,
5588 13,
5589 this,
5590 ptrVM.raw(),
5591 pcszDevice,
5592 uInstance,
5593 enmBus,
5594 fUseHostIOCache,
5595 fBuiltinIoCache,
5596 false /* fSetupMerge */,
5597 0 /* uMergeSource */,
5598 0 /* uMergeTarget */,
5599 aMediumAttachment,
5600 mMachineState,
5601 &rc);
5602 /* error handling is after resuming the VM */
5603
5604 if (mMachineState == MachineState_DeletingSnapshotOnline)
5605 {
5606 LogFlowFunc(("Resuming the VM...\n"));
5607 /* disable the callback to prevent Console-level state change */
5608 mVMStateChangeCallbackDisabled = true;
5609 int vrc2 = VMR3Resume(ptrVM);
5610 mVMStateChangeCallbackDisabled = false;
5611 AssertRC(vrc2);
5612 if (RT_FAILURE(vrc2))
5613 {
5614 /* too bad, we failed. try to sync the console state with the VMM state */
5615 vmstateChangeCallback(ptrVM, VMSTATE_SUSPENDED, enmVMState, this);
5616 }
5617 }
5618
5619 if (RT_FAILURE(vrc))
5620 return setError(E_FAIL, tr("%Rrc"), vrc);
5621 if (FAILED(rc))
5622 return rc;
5623
5624 return rc;
5625}
5626
5627
5628/**
5629 * Merely passes the call to Guest::enableVMMStatistics().
5630 */
5631void Console::enableVMMStatistics(BOOL aEnable)
5632{
5633 if (mGuest)
5634 mGuest->enableVMMStatistics(aEnable);
5635}
5636
5637/**
5638 * Gets called by Session::UpdateMachineState()
5639 * (IInternalSessionControl::updateMachineState()).
5640 *
5641 * Must be called only in certain cases (see the implementation).
5642 *
5643 * @note Locks this object for writing.
5644 */
5645HRESULT Console::updateMachineState(MachineState_T aMachineState)
5646{
5647 AutoCaller autoCaller(this);
5648 AssertComRCReturnRC(autoCaller.rc());
5649
5650 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
5651
5652 AssertReturn( mMachineState == MachineState_Saving
5653 || mMachineState == MachineState_LiveSnapshotting
5654 || mMachineState == MachineState_RestoringSnapshot
5655 || mMachineState == MachineState_DeletingSnapshot
5656 || mMachineState == MachineState_DeletingSnapshotOnline
5657 || mMachineState == MachineState_DeletingSnapshotPaused
5658 , E_FAIL);
5659
5660 return setMachineStateLocally(aMachineState);
5661}
5662
5663#ifdef CONSOLE_WITH_EVENT_CACHE
5664/**
5665 * @note Locks this object for writing.
5666 */
5667#endif
5668void Console::onMousePointerShapeChange(bool fVisible, bool fAlpha,
5669 uint32_t xHot, uint32_t yHot,
5670 uint32_t width, uint32_t height,
5671 ComSafeArrayIn(BYTE,pShape))
5672{
5673#if 0
5674 LogFlowThisFuncEnter();
5675 LogFlowThisFunc(("fVisible=%d, fAlpha=%d, xHot = %d, yHot = %d, width=%d, height=%d, shape=%p\n",
5676 fVisible, fAlpha, xHot, yHot, width, height, pShape));
5677#endif
5678
5679 AutoCaller autoCaller(this);
5680 AssertComRCReturnVoid(autoCaller.rc());
5681
5682#ifdef CONSOLE_WITH_EVENT_CACHE
5683 {
5684 /* We need a write lock because we alter the cached callback data */
5685 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
5686
5687 /* Save the callback arguments */
5688 mCallbackData.mpsc.visible = fVisible;
5689 mCallbackData.mpsc.alpha = fAlpha;
5690 mCallbackData.mpsc.xHot = xHot;
5691 mCallbackData.mpsc.yHot = yHot;
5692 mCallbackData.mpsc.width = width;
5693 mCallbackData.mpsc.height = height;
5694
5695 /* start with not valid */
5696 bool wasValid = mCallbackData.mpsc.valid;
5697 mCallbackData.mpsc.valid = false;
5698
5699 com::SafeArray<BYTE> aShape(ComSafeArrayInArg(pShape));
5700 if (aShape.size() != 0)
5701 mCallbackData.mpsc.shape.initFrom(aShape);
5702 else
5703 mCallbackData.mpsc.shape.resize(0);
5704 mCallbackData.mpsc.valid = true;
5705 }
5706#endif
5707
5708 fireMousePointerShapeChangedEvent(mEventSource, fVisible, fAlpha, xHot, yHot, width, height, ComSafeArrayInArg(pShape));
5709
5710#if 0
5711 LogFlowThisFuncLeave();
5712#endif
5713}
5714
5715#ifdef CONSOLE_WITH_EVENT_CACHE
5716/**
5717 * @note Locks this object for writing.
5718 */
5719#endif
5720void Console::onMouseCapabilityChange(BOOL supportsAbsolute, BOOL supportsRelative, BOOL needsHostCursor)
5721{
5722 LogFlowThisFunc(("supportsAbsolute=%d supportsRelative=%d needsHostCursor=%d\n",
5723 supportsAbsolute, supportsRelative, needsHostCursor));
5724
5725 AutoCaller autoCaller(this);
5726 AssertComRCReturnVoid(autoCaller.rc());
5727
5728#ifdef CONSOLE_WITH_EVENT_CACHE
5729 {
5730 /* We need a write lock because we alter the cached callback data */
5731 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
5732
5733 /* save the callback arguments */
5734 mCallbackData.mcc.supportsAbsolute = supportsAbsolute;
5735 mCallbackData.mcc.supportsRelative = supportsRelative;
5736 mCallbackData.mcc.needsHostCursor = needsHostCursor;
5737 mCallbackData.mcc.valid = true;
5738 }
5739#endif
5740
5741 fireMouseCapabilityChangedEvent(mEventSource, supportsAbsolute, supportsRelative, needsHostCursor);
5742}
5743
5744void Console::onStateChange(MachineState_T machineState)
5745{
5746 AutoCaller autoCaller(this);
5747 AssertComRCReturnVoid(autoCaller.rc());
5748
5749 fireStateChangedEvent(mEventSource, machineState);
5750}
5751
5752void Console::onAdditionsStateChange()
5753{
5754 AutoCaller autoCaller(this);
5755 AssertComRCReturnVoid(autoCaller.rc());
5756
5757 fireAdditionsStateChangedEvent(mEventSource);
5758}
5759
5760/**
5761 * @remarks This notification only is for reporting an incompatible
5762 * Guest Additions interface, *not* the Guest Additions version!
5763 *
5764 * The user will be notified inside the guest if new Guest
5765 * Additions are available (via VBoxTray/VBoxClient).
5766 */
5767void Console::onAdditionsOutdated()
5768{
5769 AutoCaller autoCaller(this);
5770 AssertComRCReturnVoid(autoCaller.rc());
5771
5772 /** @todo implement this */
5773}
5774
5775#ifdef CONSOLE_WITH_EVENT_CACHE
5776/**
5777 * @note Locks this object for writing.
5778 */
5779#endif
5780void Console::onKeyboardLedsChange(bool fNumLock, bool fCapsLock, bool fScrollLock)
5781{
5782 AutoCaller autoCaller(this);
5783 AssertComRCReturnVoid(autoCaller.rc());
5784
5785#ifdef CONSOLE_WITH_EVENT_CACHE
5786 {
5787 /* We need a write lock because we alter the cached callback data */
5788 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
5789
5790 /* save the callback arguments */
5791 mCallbackData.klc.numLock = fNumLock;
5792 mCallbackData.klc.capsLock = fCapsLock;
5793 mCallbackData.klc.scrollLock = fScrollLock;
5794 mCallbackData.klc.valid = true;
5795 }
5796#endif
5797
5798 fireKeyboardLedsChangedEvent(mEventSource, fNumLock, fCapsLock, fScrollLock);
5799}
5800
5801void Console::onUSBDeviceStateChange(IUSBDevice *aDevice, bool aAttached,
5802 IVirtualBoxErrorInfo *aError)
5803{
5804 AutoCaller autoCaller(this);
5805 AssertComRCReturnVoid(autoCaller.rc());
5806
5807 fireUSBDeviceStateChangedEvent(mEventSource, aDevice, aAttached, aError);
5808}
5809
5810void Console::onRuntimeError(BOOL aFatal, IN_BSTR aErrorID, IN_BSTR aMessage)
5811{
5812 AutoCaller autoCaller(this);
5813 AssertComRCReturnVoid(autoCaller.rc());
5814
5815 fireRuntimeErrorEvent(mEventSource, aFatal, aErrorID, aMessage);
5816}
5817
5818HRESULT Console::onShowWindow(BOOL aCheck, BOOL *aCanShow, LONG64 *aWinId)
5819{
5820 AssertReturn(aCanShow, E_POINTER);
5821 AssertReturn(aWinId, E_POINTER);
5822
5823 *aCanShow = FALSE;
5824 *aWinId = 0;
5825
5826 AutoCaller autoCaller(this);
5827 AssertComRCReturnRC(autoCaller.rc());
5828
5829 VBoxEventDesc evDesc;
5830 if (aCheck)
5831 {
5832 evDesc.init(mEventSource, VBoxEventType_OnCanShowWindow);
5833 BOOL fDelivered = evDesc.fire(5000); /* Wait up to 5 secs for delivery */
5834 //Assert(fDelivered);
5835 if (fDelivered)
5836 {
5837 ComPtr<IEvent> pEvent;
5838 evDesc.getEvent(pEvent.asOutParam());
5839 // bit clumsy
5840 ComPtr<ICanShowWindowEvent> pCanShowEvent = pEvent;
5841 if (pCanShowEvent)
5842 {
5843 BOOL fVetoed = FALSE;
5844 pCanShowEvent->IsVetoed(&fVetoed);
5845 *aCanShow = !fVetoed;
5846 }
5847 else
5848 {
5849 AssertFailed();
5850 *aCanShow = TRUE;
5851 }
5852 }
5853 else
5854 *aCanShow = TRUE;
5855 }
5856 else
5857 {
5858 evDesc.init(mEventSource, VBoxEventType_OnShowWindow, INT64_C(0));
5859 BOOL fDelivered = evDesc.fire(5000); /* Wait up to 5 secs for delivery */
5860 //Assert(fDelivered);
5861 if (fDelivered)
5862 {
5863 ComPtr<IEvent> pEvent;
5864 evDesc.getEvent(pEvent.asOutParam());
5865 ComPtr<IShowWindowEvent> pShowEvent = pEvent;
5866 if (pShowEvent)
5867 {
5868 LONG64 iEvWinId = 0;
5869 pShowEvent->COMGETTER(WinId)(&iEvWinId);
5870 if (iEvWinId != 0 && *aWinId == 0)
5871 *aWinId = iEvWinId;
5872 }
5873 else
5874 AssertFailed();
5875 }
5876 }
5877
5878 return S_OK;
5879}
5880
5881// private methods
5882////////////////////////////////////////////////////////////////////////////////
5883
5884/**
5885 * Increases the usage counter of the mpVM pointer. Guarantees that
5886 * VMR3Destroy() will not be called on it at least until releaseVMCaller()
5887 * is called.
5888 *
5889 * If this method returns a failure, the caller is not allowed to use mpVM
5890 * and may return the failed result code to the upper level. This method sets
5891 * the extended error info on failure if \a aQuiet is false.
5892 *
5893 * Setting \a aQuiet to true is useful for methods that don't want to return
5894 * the failed result code to the caller when this method fails (e.g. need to
5895 * silently check for the mpVM availability).
5896 *
5897 * When mpVM is NULL but \a aAllowNullVM is true, a corresponding error will be
5898 * returned instead of asserting. Having it false is intended as a sanity check
5899 * for methods that have checked mMachineState and expect mpVM *NOT* to be NULL.
5900 *
5901 * @param aQuiet true to suppress setting error info
5902 * @param aAllowNullVM true to accept mpVM being NULL and return a failure
5903 * (otherwise this method will assert if mpVM is NULL)
5904 *
5905 * @note Locks this object for writing.
5906 */
5907HRESULT Console::addVMCaller(bool aQuiet /* = false */,
5908 bool aAllowNullVM /* = false */)
5909{
5910 AutoCaller autoCaller(this);
5911 AssertComRCReturnRC(autoCaller.rc());
5912
5913 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
5914
5915 if (mVMDestroying)
5916 {
5917 /* powerDown() is waiting for all callers to finish */
5918 return aQuiet ? E_ACCESSDENIED : setError(E_ACCESSDENIED,
5919 tr("The virtual machine is being powered down"));
5920 }
5921
5922 if (mpUVM == NULL)
5923 {
5924 Assert(aAllowNullVM == true);
5925
5926 /* The machine is not powered up */
5927 return aQuiet ? E_ACCESSDENIED : setError(E_ACCESSDENIED,
5928 tr("The virtual machine is not powered up"));
5929 }
5930
5931 ++mVMCallers;
5932
5933 return S_OK;
5934}
5935
5936/**
5937 * Decreases the usage counter of the mpVM pointer. Must always complete
5938 * the addVMCaller() call after the mpVM pointer is no more necessary.
5939 *
5940 * @note Locks this object for writing.
5941 */
5942void Console::releaseVMCaller()
5943{
5944 AutoCaller autoCaller(this);
5945 AssertComRCReturnVoid(autoCaller.rc());
5946
5947 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
5948
5949 AssertReturnVoid(mpUVM != NULL);
5950
5951 Assert(mVMCallers > 0);
5952 --mVMCallers;
5953
5954 if (mVMCallers == 0 && mVMDestroying)
5955 {
5956 /* inform powerDown() there are no more callers */
5957 RTSemEventSignal(mVMZeroCallersSem);
5958 }
5959}
5960
5961
5962HRESULT Console::safeVMPtrRetainer(PVM *a_ppVM, PUVM *a_ppUVM, bool a_Quiet)
5963{
5964 *a_ppVM = NULL;
5965 *a_ppUVM = NULL;
5966
5967 AutoCaller autoCaller(this);
5968 AssertComRCReturnRC(autoCaller.rc());
5969 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
5970
5971 /*
5972 * Repeat the checks done by addVMCaller.
5973 */
5974 if (mVMDestroying) /* powerDown() is waiting for all callers to finish */
5975 return a_Quiet
5976 ? E_ACCESSDENIED
5977 : setError(E_ACCESSDENIED, tr("The virtual machine is being powered down"));
5978 PUVM pUVM = mpUVM;
5979 if (!pUVM)
5980 return a_Quiet
5981 ? E_ACCESSDENIED
5982 : setError(E_ACCESSDENIED, tr("The virtual machine is was powered off"));
5983
5984 /*
5985 * Retain a reference to the user mode VM handle and get the global handle.
5986 */
5987 uint32_t cRefs = VMR3RetainUVM(pUVM);
5988 if (cRefs == UINT32_MAX)
5989 return a_Quiet
5990 ? E_ACCESSDENIED
5991 : setError(E_ACCESSDENIED, tr("The virtual machine is was powered off"));
5992
5993 PVM pVM = VMR3GetVM(pUVM);
5994 if (!pVM)
5995 {
5996 VMR3ReleaseUVM(pUVM);
5997 return a_Quiet
5998 ? E_ACCESSDENIED
5999 : setError(E_ACCESSDENIED, tr("The virtual machine is was powered off"));
6000 }
6001
6002 /* done */
6003 *a_ppVM = pVM;
6004 *a_ppUVM = pUVM;
6005 return S_OK;
6006}
6007
6008void Console::safeVMPtrReleaser(PVM *a_ppVM, PUVM *a_ppUVM)
6009{
6010 if (*a_ppVM && *a_ppUVM)
6011 VMR3ReleaseUVM(*a_ppUVM);
6012 *a_ppVM = NULL;
6013 *a_ppUVM = NULL;
6014}
6015
6016
6017/**
6018 * Initialize the release logging facility. In case something
6019 * goes wrong, there will be no release logging. Maybe in the future
6020 * we can add some logic to use different file names in this case.
6021 * Note that the logic must be in sync with Machine::DeleteSettings().
6022 */
6023HRESULT Console::consoleInitReleaseLog(const ComPtr<IMachine> aMachine)
6024{
6025 HRESULT hrc = S_OK;
6026
6027 Bstr logFolder;
6028 hrc = aMachine->COMGETTER(LogFolder)(logFolder.asOutParam());
6029 if (FAILED(hrc)) return hrc;
6030
6031 Utf8Str logDir = logFolder;
6032
6033 /* make sure the Logs folder exists */
6034 Assert(logDir.length());
6035 if (!RTDirExists(logDir.c_str()))
6036 RTDirCreateFullPath(logDir.c_str(), 0700);
6037
6038 Utf8Str logFile = Utf8StrFmt("%s%cVBox.log",
6039 logDir.c_str(), RTPATH_DELIMITER);
6040 Utf8Str pngFile = Utf8StrFmt("%s%cVBox.png",
6041 logDir.c_str(), RTPATH_DELIMITER);
6042
6043 /*
6044 * Age the old log files
6045 * Rename .(n-1) to .(n), .(n-2) to .(n-1), ..., and the last log file to .1
6046 * Overwrite target files in case they exist.
6047 */
6048 ComPtr<IVirtualBox> pVirtualBox;
6049 aMachine->COMGETTER(Parent)(pVirtualBox.asOutParam());
6050 ComPtr<ISystemProperties> pSystemProperties;
6051 pVirtualBox->COMGETTER(SystemProperties)(pSystemProperties.asOutParam());
6052 ULONG cHistoryFiles = 3;
6053 pSystemProperties->COMGETTER(LogHistoryCount)(&cHistoryFiles);
6054 if (cHistoryFiles)
6055 {
6056 for (int i = cHistoryFiles-1; i >= 0; i--)
6057 {
6058 Utf8Str *files[] = { &logFile, &pngFile };
6059 Utf8Str oldName, newName;
6060
6061 for (unsigned int j = 0; j < RT_ELEMENTS(files); ++j)
6062 {
6063 if (i > 0)
6064 oldName = Utf8StrFmt("%s.%d", files[j]->c_str(), i);
6065 else
6066 oldName = *files[j];
6067 newName = Utf8StrFmt("%s.%d", files[j]->c_str(), i + 1);
6068 /* If the old file doesn't exist, delete the new file (if it
6069 * exists) to provide correct rotation even if the sequence is
6070 * broken */
6071 if ( RTFileRename(oldName.c_str(), newName.c_str(), RTFILEMOVE_FLAGS_REPLACE)
6072 == VERR_FILE_NOT_FOUND)
6073 RTFileDelete(newName.c_str());
6074 }
6075 }
6076 }
6077
6078 static const char * const s_apszGroups[] = VBOX_LOGGROUP_NAMES;
6079 char szError[RTPATH_MAX + 128] = "";
6080 PRTLOGGER pReleaseLogger;
6081 uint32_t fFlags = RTLOGFLAGS_PREFIX_TIME_PROG | RTLOGFLAGS_RESTRICT_GROUPS;
6082#if defined(RT_OS_WINDOWS) || defined(RT_OS_OS2)
6083 fFlags |= RTLOGFLAGS_USECRLF;
6084#endif
6085 int vrc = RTLogCreateEx(&pReleaseLogger, fFlags, "all all.restrict default.unrestricted",
6086 "VBOX_RELEASE_LOG", RT_ELEMENTS(s_apszGroups), s_apszGroups, RTLOGDEST_FILE,
6087 NULL /* pfnBeginEnd */, 0 /* cHistory */, 0 /* cbHistoryFileMax */, 0 /* uHistoryTimeMax */,
6088 szError, sizeof(szError), logFile.c_str());
6089 if (RT_SUCCESS(vrc))
6090 {
6091 RTLogSetGroupLimit(pReleaseLogger, 32768);
6092 bool fOldBuffered = RTLogRelSetBuffering(true /*fBuffered*/);
6093
6094 /* some introductory information */
6095 RTTIMESPEC timeSpec;
6096 char szTmp[256];
6097 RTTimeSpecToString(RTTimeNow(&timeSpec), szTmp, sizeof(szTmp));
6098 RTLogRelLogger(pReleaseLogger, 0, ~0U,
6099 "VirtualBox %s r%u %s (%s %s) release log\n"
6100#ifdef VBOX_BLEEDING_EDGE
6101 "EXPERIMENTAL build " VBOX_BLEEDING_EDGE "\n"
6102#endif
6103 "Log opened %s\n",
6104 VBOX_VERSION_STRING, RTBldCfgRevision(), VBOX_BUILD_TARGET,
6105 __DATE__, __TIME__, szTmp);
6106
6107 vrc = RTSystemQueryOSInfo(RTSYSOSINFO_PRODUCT, szTmp, sizeof(szTmp));
6108 if (RT_SUCCESS(vrc) || vrc == VERR_BUFFER_OVERFLOW)
6109 RTLogRelLogger(pReleaseLogger, 0, ~0U, "OS Product: %s\n", szTmp);
6110 vrc = RTSystemQueryOSInfo(RTSYSOSINFO_RELEASE, szTmp, sizeof(szTmp));
6111 if (RT_SUCCESS(vrc) || vrc == VERR_BUFFER_OVERFLOW)
6112 RTLogRelLogger(pReleaseLogger, 0, ~0U, "OS Release: %s\n", szTmp);
6113 vrc = RTSystemQueryOSInfo(RTSYSOSINFO_VERSION, szTmp, sizeof(szTmp));
6114 if (RT_SUCCESS(vrc) || vrc == VERR_BUFFER_OVERFLOW)
6115 RTLogRelLogger(pReleaseLogger, 0, ~0U, "OS Version: %s\n", szTmp);
6116 vrc = RTSystemQueryOSInfo(RTSYSOSINFO_SERVICE_PACK, szTmp, sizeof(szTmp));
6117 if (RT_SUCCESS(vrc) || vrc == VERR_BUFFER_OVERFLOW)
6118 RTLogRelLogger(pReleaseLogger, 0, ~0U, "OS Service Pack: %s\n", szTmp);
6119 vrc = RTSystemQueryDmiString(RTSYSDMISTR_PRODUCT_NAME, szTmp, sizeof(szTmp));
6120 if (RT_SUCCESS(vrc) || vrc == VERR_BUFFER_OVERFLOW)
6121 RTLogRelLogger(pReleaseLogger, 0, ~0U, "DMI Product Name: %s\n", szTmp);
6122 vrc = RTSystemQueryDmiString(RTSYSDMISTR_PRODUCT_VERSION, szTmp, sizeof(szTmp));
6123 if (RT_SUCCESS(vrc) || vrc == VERR_BUFFER_OVERFLOW)
6124 RTLogRelLogger(pReleaseLogger, 0, ~0U, "DMI Product Version: %s\n", szTmp);
6125
6126 ComPtr<IHost> pHost;
6127 pVirtualBox->COMGETTER(Host)(pHost.asOutParam());
6128 ULONG cMbHostRam = 0;
6129 ULONG cMbHostRamAvail = 0;
6130 pHost->COMGETTER(MemorySize)(&cMbHostRam);
6131 pHost->COMGETTER(MemoryAvailable)(&cMbHostRamAvail);
6132 RTLogRelLogger(pReleaseLogger, 0, ~0U, "Host RAM: %uMB RAM, available: %uMB\n",
6133 cMbHostRam, cMbHostRamAvail);
6134
6135 /* the package type is interesting for Linux distributions */
6136 char szExecName[RTPATH_MAX];
6137 char *pszExecName = RTProcGetExecutablePath(szExecName, sizeof(szExecName));
6138 RTLogRelLogger(pReleaseLogger, 0, ~0U,
6139 "Executable: %s\n"
6140 "Process ID: %u\n"
6141 "Package type: %s"
6142#ifdef VBOX_OSE
6143 " (OSE)"
6144#endif
6145 "\n",
6146 pszExecName ? pszExecName : "unknown",
6147 RTProcSelf(),
6148 VBOX_PACKAGE_STRING);
6149
6150 /* register this logger as the release logger */
6151 RTLogRelSetDefaultInstance(pReleaseLogger);
6152 hrc = S_OK;
6153
6154 /* Restore the buffering setting and xplicitly flush the log. */
6155 RTLogRelSetBuffering(fOldBuffered);
6156 RTLogFlush(pReleaseLogger);
6157 }
6158 else
6159 hrc = setError(E_FAIL,
6160 tr("Failed to open release log (%s, %Rrc)"),
6161 szError, vrc);
6162
6163 /* If we've made any directory changes, flush the directory to increase
6164 the likelihood that the log file will be usable after a system panic.
6165
6166 Tip: Try 'export VBOX_RELEASE_LOG_FLAGS=flush' if the last bits of the log
6167 is missing. Just don't have too high hopes for this to help. */
6168 if (SUCCEEDED(hrc) || cHistoryFiles)
6169 RTDirFlush(logDir.c_str());
6170
6171 return hrc;
6172}
6173
6174/**
6175 * Common worker for PowerUp and PowerUpPaused.
6176 *
6177 * @returns COM status code.
6178 *
6179 * @param aProgress Where to return the progress object.
6180 * @param aPaused true if PowerUpPaused called.
6181 */
6182HRESULT Console::powerUp(IProgress **aProgress, bool aPaused)
6183{
6184 LogFlowThisFuncEnter();
6185 LogFlowThisFunc(("mMachineState=%d\n", mMachineState));
6186
6187 CheckComArgOutPointerValid(aProgress);
6188
6189 AutoCaller autoCaller(this);
6190 if (FAILED(autoCaller.rc())) return autoCaller.rc();
6191
6192 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
6193
6194 HRESULT rc = S_OK;
6195 ComObjPtr<Progress> pPowerupProgress;
6196 bool fBeganPoweringUp = false;
6197
6198 try
6199 {
6200 if (Global::IsOnlineOrTransient(mMachineState))
6201 throw setError(VBOX_E_INVALID_VM_STATE,
6202 tr("The virtual machine is already running or busy (machine state: %s)"),
6203 Global::stringifyMachineState(mMachineState));
6204
6205 /* test and clear the TeleporterEnabled property */
6206 BOOL fTeleporterEnabled;
6207 rc = mMachine->COMGETTER(TeleporterEnabled)(&fTeleporterEnabled);
6208 if (FAILED(rc))
6209 throw rc;
6210#if 0 /** @todo we should save it afterwards, but that isn't necessarily a good idea. Find a better place for this (VBoxSVC). */
6211 if (fTeleporterEnabled)
6212 {
6213 rc = mMachine->COMSETTER(TeleporterEnabled)(FALSE);
6214 if (FAILED(rc))
6215 throw rc;
6216 }
6217#endif
6218
6219 /* test the FaultToleranceState property */
6220 FaultToleranceState_T enmFaultToleranceState;
6221 rc = mMachine->COMGETTER(FaultToleranceState)(&enmFaultToleranceState);
6222 if (FAILED(rc))
6223 throw rc;
6224 BOOL fFaultToleranceSyncEnabled = (enmFaultToleranceState == FaultToleranceState_Standby);
6225
6226 /* Create a progress object to track progress of this operation. Must
6227 * be done as early as possible (together with BeginPowerUp()) as this
6228 * is vital for communicating as much as possible early powerup
6229 * failure information to the API caller */
6230 pPowerupProgress.createObject();
6231 Bstr progressDesc;
6232 if (mMachineState == MachineState_Saved)
6233 progressDesc = tr("Restoring virtual machine");
6234 else if (fTeleporterEnabled)
6235 progressDesc = tr("Teleporting virtual machine");
6236 else if (fFaultToleranceSyncEnabled)
6237 progressDesc = tr("Fault Tolerance syncing of remote virtual machine");
6238 else
6239 progressDesc = tr("Starting virtual machine");
6240 if ( mMachineState == MachineState_Saved
6241 || (!fTeleporterEnabled && !fFaultToleranceSyncEnabled))
6242 rc = pPowerupProgress->init(static_cast<IConsole *>(this),
6243 progressDesc.raw(),
6244 FALSE /* aCancelable */);
6245 else
6246 if (fTeleporterEnabled)
6247 rc = pPowerupProgress->init(static_cast<IConsole *>(this),
6248 progressDesc.raw(),
6249 TRUE /* aCancelable */,
6250 3 /* cOperations */,
6251 10 /* ulTotalOperationsWeight */,
6252 Bstr(tr("Teleporting virtual machine")).raw(),
6253 1 /* ulFirstOperationWeight */,
6254 NULL);
6255 else
6256 if (fFaultToleranceSyncEnabled)
6257 rc = pPowerupProgress->init(static_cast<IConsole *>(this),
6258 progressDesc.raw(),
6259 TRUE /* aCancelable */,
6260 3 /* cOperations */,
6261 10 /* ulTotalOperationsWeight */,
6262 Bstr(tr("Fault Tolerance syncing of remote virtual machine")).raw(),
6263 1 /* ulFirstOperationWeight */,
6264 NULL);
6265
6266 if (FAILED(rc))
6267 throw rc;
6268
6269 /* Tell VBoxSVC and Machine about the progress object so they can
6270 combine/proxy it to any openRemoteSession caller. */
6271 LogFlowThisFunc(("Calling BeginPowerUp...\n"));
6272 rc = mControl->BeginPowerUp(pPowerupProgress);
6273 if (FAILED(rc))
6274 {
6275 LogFlowThisFunc(("BeginPowerUp failed\n"));
6276 throw rc;
6277 }
6278 fBeganPoweringUp = true;
6279
6280 /** @todo this code prevents starting a VM with unavailable bridged
6281 * networking interface. The only benefit is a slightly better error
6282 * message, which should be moved to the driver code. This is the
6283 * only reason why I left the code in for now. The driver allows
6284 * unavailable bridged networking interfaces in certain circumstances,
6285 * and this is sabotaged by this check. The VM will initially have no
6286 * network connectivity, but the user can fix this at runtime. */
6287#if 0
6288 /* the network cards will undergo a quick consistency check */
6289 for (ULONG slot = 0;
6290 slot < maxNetworkAdapters;
6291 ++slot)
6292 {
6293 ComPtr<INetworkAdapter> pNetworkAdapter;
6294 mMachine->GetNetworkAdapter(slot, pNetworkAdapter.asOutParam());
6295 BOOL enabled = FALSE;
6296 pNetworkAdapter->COMGETTER(Enabled)(&enabled);
6297 if (!enabled)
6298 continue;
6299
6300 NetworkAttachmentType_T netattach;
6301 pNetworkAdapter->COMGETTER(AttachmentType)(&netattach);
6302 switch (netattach)
6303 {
6304 case NetworkAttachmentType_Bridged:
6305 {
6306 /* a valid host interface must have been set */
6307 Bstr hostif;
6308 pNetworkAdapter->COMGETTER(HostInterface)(hostif.asOutParam());
6309 if (hostif.isEmpty())
6310 {
6311 throw setError(VBOX_E_HOST_ERROR,
6312 tr("VM cannot start because host interface networking requires a host interface name to be set"));
6313 }
6314 ComPtr<IVirtualBox> pVirtualBox;
6315 mMachine->COMGETTER(Parent)(pVirtualBox.asOutParam());
6316 ComPtr<IHost> pHost;
6317 pVirtualBox->COMGETTER(Host)(pHost.asOutParam());
6318 ComPtr<IHostNetworkInterface> pHostInterface;
6319 if (!SUCCEEDED(pHost->FindHostNetworkInterfaceByName(hostif.raw(),
6320 pHostInterface.asOutParam())))
6321 {
6322 throw setError(VBOX_E_HOST_ERROR,
6323 tr("VM cannot start because the host interface '%ls' does not exist"),
6324 hostif.raw());
6325 }
6326 break;
6327 }
6328 default:
6329 break;
6330 }
6331 }
6332#endif // 0
6333
6334 /* Read console data stored in the saved state file (if not yet done) */
6335 rc = loadDataFromSavedState();
6336 if (FAILED(rc))
6337 throw rc;
6338
6339 /* Check all types of shared folders and compose a single list */
6340 SharedFolderDataMap sharedFolders;
6341 {
6342 /* first, insert global folders */
6343 for (SharedFolderDataMap::const_iterator it = m_mapGlobalSharedFolders.begin();
6344 it != m_mapGlobalSharedFolders.end();
6345 ++it)
6346 {
6347 const SharedFolderData &d = it->second;
6348 sharedFolders[it->first] = d;
6349 }
6350
6351 /* second, insert machine folders */
6352 for (SharedFolderDataMap::const_iterator it = m_mapMachineSharedFolders.begin();
6353 it != m_mapMachineSharedFolders.end();
6354 ++it)
6355 {
6356 const SharedFolderData &d = it->second;
6357 sharedFolders[it->first] = d;
6358 }
6359
6360 /* third, insert console folders */
6361 for (SharedFolderMap::const_iterator it = m_mapSharedFolders.begin();
6362 it != m_mapSharedFolders.end();
6363 ++it)
6364 {
6365 SharedFolder *pSF = it->second;
6366 AutoCaller sfCaller(pSF);
6367 AutoReadLock sfLock(pSF COMMA_LOCKVAL_SRC_POS);
6368 sharedFolders[it->first] = SharedFolderData(pSF->getHostPath(),
6369 pSF->isWritable(),
6370 pSF->isAutoMounted());
6371 }
6372 }
6373
6374 Bstr savedStateFile;
6375
6376 /*
6377 * Saved VMs will have to prove that their saved states seem kosher.
6378 */
6379 if (mMachineState == MachineState_Saved)
6380 {
6381 rc = mMachine->COMGETTER(StateFilePath)(savedStateFile.asOutParam());
6382 if (FAILED(rc))
6383 throw rc;
6384 ComAssertRet(!savedStateFile.isEmpty(), E_FAIL);
6385 int vrc = SSMR3ValidateFile(Utf8Str(savedStateFile).c_str(), false /* fChecksumIt */);
6386 if (RT_FAILURE(vrc))
6387 throw setError(VBOX_E_FILE_ERROR,
6388 tr("VM cannot start because the saved state file '%ls' is invalid (%Rrc). Delete the saved state prior to starting the VM"),
6389 savedStateFile.raw(), vrc);
6390 }
6391
6392 LogFlowThisFunc(("Checking if canceled...\n"));
6393 BOOL fCanceled;
6394 rc = pPowerupProgress->COMGETTER(Canceled)(&fCanceled);
6395 if (FAILED(rc))
6396 throw rc;
6397 if (fCanceled)
6398 {
6399 LogFlowThisFunc(("Canceled in BeginPowerUp\n"));
6400 throw setError(E_FAIL, tr("Powerup was canceled"));
6401 }
6402 LogFlowThisFunc(("Not canceled yet.\n"));
6403
6404 /* setup task object and thread to carry out the operation
6405 * asynchronously */
6406
6407 std::auto_ptr<VMPowerUpTask> task(new VMPowerUpTask(this, pPowerupProgress));
6408 ComAssertComRCRetRC(task->rc());
6409
6410 task->mConfigConstructor = configConstructor;
6411 task->mSharedFolders = sharedFolders;
6412 task->mStartPaused = aPaused;
6413 if (mMachineState == MachineState_Saved)
6414 task->mSavedStateFile = savedStateFile;
6415 task->mTeleporterEnabled = fTeleporterEnabled;
6416 task->mEnmFaultToleranceState = enmFaultToleranceState;
6417
6418 /* Reset differencing hard disks for which autoReset is true,
6419 * but only if the machine has no snapshots OR the current snapshot
6420 * is an OFFLINE snapshot; otherwise we would reset the current
6421 * differencing image of an ONLINE snapshot which contains the disk
6422 * state of the machine while it was previously running, but without
6423 * the corresponding machine state, which is equivalent to powering
6424 * off a running machine and not good idea
6425 */
6426 ComPtr<ISnapshot> pCurrentSnapshot;
6427 rc = mMachine->COMGETTER(CurrentSnapshot)(pCurrentSnapshot.asOutParam());
6428 if (FAILED(rc))
6429 throw rc;
6430
6431 BOOL fCurrentSnapshotIsOnline = false;
6432 if (pCurrentSnapshot)
6433 {
6434 rc = pCurrentSnapshot->COMGETTER(Online)(&fCurrentSnapshotIsOnline);
6435 if (FAILED(rc))
6436 throw rc;
6437 }
6438
6439 if (!fCurrentSnapshotIsOnline)
6440 {
6441 LogFlowThisFunc(("Looking for immutable images to reset\n"));
6442
6443 com::SafeIfaceArray<IMediumAttachment> atts;
6444 rc = mMachine->COMGETTER(MediumAttachments)(ComSafeArrayAsOutParam(atts));
6445 if (FAILED(rc))
6446 throw rc;
6447
6448 for (size_t i = 0;
6449 i < atts.size();
6450 ++i)
6451 {
6452 DeviceType_T devType;
6453 rc = atts[i]->COMGETTER(Type)(&devType);
6454 /** @todo later applies to floppies as well */
6455 if (devType == DeviceType_HardDisk)
6456 {
6457 ComPtr<IMedium> pMedium;
6458 rc = atts[i]->COMGETTER(Medium)(pMedium.asOutParam());
6459 if (FAILED(rc))
6460 throw rc;
6461
6462 /* needs autoreset? */
6463 BOOL autoReset = FALSE;
6464 rc = pMedium->COMGETTER(AutoReset)(&autoReset);
6465 if (FAILED(rc))
6466 throw rc;
6467
6468 if (autoReset)
6469 {
6470 ComPtr<IProgress> pResetProgress;
6471 rc = pMedium->Reset(pResetProgress.asOutParam());
6472 if (FAILED(rc))
6473 throw rc;
6474
6475 /* save for later use on the powerup thread */
6476 task->hardDiskProgresses.push_back(pResetProgress);
6477 }
6478 }
6479 }
6480 }
6481 else
6482 LogFlowThisFunc(("Machine has a current snapshot which is online, skipping immutable images reset\n"));
6483
6484 rc = consoleInitReleaseLog(mMachine);
6485 if (FAILED(rc))
6486 throw rc;
6487#ifdef VBOX_WITH_EXTPACK
6488 mptrExtPackManager->dumpAllToReleaseLog();
6489#endif
6490
6491#ifdef RT_OS_SOLARIS
6492 /* setup host core dumper for the VM */
6493 Bstr value;
6494 HRESULT hrc = mMachine->GetExtraData(Bstr("VBoxInternal2/CoreDumpEnabled").raw(), value.asOutParam());
6495 if (SUCCEEDED(hrc) && value == "1")
6496 {
6497 Bstr coreDumpDir, coreDumpReplaceSys, coreDumpLive;
6498 mMachine->GetExtraData(Bstr("VBoxInternal2/CoreDumpDir").raw(), coreDumpDir.asOutParam());
6499 mMachine->GetExtraData(Bstr("VBoxInternal2/CoreDumpReplaceSystemDump").raw(), coreDumpReplaceSys.asOutParam());
6500 mMachine->GetExtraData(Bstr("VBoxInternal2/CoreDumpLive").raw(), coreDumpLive.asOutParam());
6501
6502 uint32_t fCoreFlags = 0;
6503 if ( coreDumpReplaceSys.isEmpty() == false
6504 && Utf8Str(coreDumpReplaceSys).toUInt32() == 1)
6505 {
6506 fCoreFlags |= RTCOREDUMPER_FLAGS_REPLACE_SYSTEM_DUMP;
6507 }
6508
6509 if ( coreDumpLive.isEmpty() == false
6510 && Utf8Str(coreDumpLive).toUInt32() == 1)
6511 {
6512 fCoreFlags |= RTCOREDUMPER_FLAGS_LIVE_CORE;
6513 }
6514
6515 Utf8Str strDumpDir(coreDumpDir);
6516 const char *pszDumpDir = strDumpDir.c_str();
6517 if ( pszDumpDir
6518 && *pszDumpDir == '\0')
6519 pszDumpDir = NULL;
6520
6521 int vrc;
6522 if ( pszDumpDir
6523 && !RTDirExists(pszDumpDir))
6524 {
6525 /*
6526 * Try create the directory.
6527 */
6528 vrc = RTDirCreateFullPath(pszDumpDir, 0700);
6529 if (RT_FAILURE(vrc))
6530 throw setError(E_FAIL, "Failed to setup CoreDumper. Couldn't create dump directory '%s' (%Rrc)\n", pszDumpDir, vrc);
6531 }
6532
6533 vrc = RTCoreDumperSetup(pszDumpDir, fCoreFlags);
6534 if (RT_FAILURE(vrc))
6535 throw setError(E_FAIL, "Failed to setup CoreDumper (%Rrc)", vrc);
6536 else
6537 LogRel(("CoreDumper setup successful. pszDumpDir=%s fFlags=%#x\n", pszDumpDir ? pszDumpDir : ".", fCoreFlags));
6538 }
6539#endif
6540
6541 /* pass the progress object to the caller if requested */
6542 if (aProgress)
6543 {
6544 if (task->hardDiskProgresses.size() == 0)
6545 {
6546 /* there are no other operations to track, return the powerup
6547 * progress only */
6548 pPowerupProgress.queryInterfaceTo(aProgress);
6549 }
6550 else
6551 {
6552 /* create a combined progress object */
6553 ComObjPtr<CombinedProgress> pProgress;
6554 pProgress.createObject();
6555 VMPowerUpTask::ProgressList progresses(task->hardDiskProgresses);
6556 progresses.push_back(ComPtr<IProgress> (pPowerupProgress));
6557 rc = pProgress->init(static_cast<IConsole *>(this),
6558 progressDesc.raw(), progresses.begin(),
6559 progresses.end());
6560 AssertComRCReturnRC(rc);
6561 pProgress.queryInterfaceTo(aProgress);
6562 }
6563 }
6564
6565 int vrc = RTThreadCreate(NULL, Console::powerUpThread,
6566 (void *)task.get(), 0,
6567 RTTHREADTYPE_MAIN_WORKER, 0, "VMPwrUp");
6568 if (RT_FAILURE(vrc))
6569 throw setError(E_FAIL, "Could not create VMPowerUp thread (%Rrc)", vrc);
6570
6571 /* task is now owned by powerUpThread(), so release it */
6572 task.release();
6573
6574 /* finally, set the state: no right to fail in this method afterwards
6575 * since we've already started the thread and it is now responsible for
6576 * any error reporting and appropriate state change! */
6577 if (mMachineState == MachineState_Saved)
6578 setMachineState(MachineState_Restoring);
6579 else if (fTeleporterEnabled)
6580 setMachineState(MachineState_TeleportingIn);
6581 else if (enmFaultToleranceState == FaultToleranceState_Standby)
6582 setMachineState(MachineState_FaultTolerantSyncing);
6583 else
6584 setMachineState(MachineState_Starting);
6585 }
6586 catch (HRESULT aRC) { rc = aRC; }
6587
6588 if (FAILED(rc) && fBeganPoweringUp)
6589 {
6590
6591 /* The progress object will fetch the current error info */
6592 if (!pPowerupProgress.isNull())
6593 pPowerupProgress->notifyComplete(rc);
6594
6595 /* Save the error info across the IPC below. Can't be done before the
6596 * progress notification above, as saving the error info deletes it
6597 * from the current context, and thus the progress object wouldn't be
6598 * updated correctly. */
6599 ErrorInfoKeeper eik;
6600
6601 /* signal end of operation */
6602 mControl->EndPowerUp(rc);
6603 }
6604
6605 LogFlowThisFunc(("mMachineState=%d, rc=%Rhrc\n", mMachineState, rc));
6606 LogFlowThisFuncLeave();
6607 return rc;
6608}
6609
6610/**
6611 * Internal power off worker routine.
6612 *
6613 * This method may be called only at certain places with the following meaning
6614 * as shown below:
6615 *
6616 * - if the machine state is either Running or Paused, a normal
6617 * Console-initiated powerdown takes place (e.g. PowerDown());
6618 * - if the machine state is Saving, saveStateThread() has successfully done its
6619 * job;
6620 * - if the machine state is Starting or Restoring, powerUpThread() has failed
6621 * to start/load the VM;
6622 * - if the machine state is Stopping, the VM has powered itself off (i.e. not
6623 * as a result of the powerDown() call).
6624 *
6625 * Calling it in situations other than the above will cause unexpected behavior.
6626 *
6627 * Note that this method should be the only one that destroys mpVM and sets it
6628 * to NULL.
6629 *
6630 * @param aProgress Progress object to run (may be NULL).
6631 *
6632 * @note Locks this object for writing.
6633 *
6634 * @note Never call this method from a thread that called addVMCaller() or
6635 * instantiated an AutoVMCaller object; first call releaseVMCaller() or
6636 * release(). Otherwise it will deadlock.
6637 */
6638HRESULT Console::powerDown(IProgress *aProgress /*= NULL*/)
6639{
6640 LogFlowThisFuncEnter();
6641
6642 AutoCaller autoCaller(this);
6643 AssertComRCReturnRC(autoCaller.rc());
6644
6645 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
6646
6647 /* Total # of steps for the progress object. Must correspond to the
6648 * number of "advance percent count" comments in this method! */
6649 enum { StepCount = 7 };
6650 /* current step */
6651 ULONG step = 0;
6652
6653 HRESULT rc = S_OK;
6654 int vrc = VINF_SUCCESS;
6655
6656 /* sanity */
6657 Assert(mVMDestroying == false);
6658
6659 PUVM pUVM = mpUVM; Assert(pUVM != NULL);
6660 uint32_t cRefs = VMR3RetainUVM(pUVM); Assert(cRefs != UINT32_MAX);
6661
6662 AssertMsg( mMachineState == MachineState_Running
6663 || mMachineState == MachineState_Paused
6664 || mMachineState == MachineState_Stuck
6665 || mMachineState == MachineState_Starting
6666 || mMachineState == MachineState_Stopping
6667 || mMachineState == MachineState_Saving
6668 || mMachineState == MachineState_Restoring
6669 || mMachineState == MachineState_TeleportingPausedVM
6670 || mMachineState == MachineState_FaultTolerantSyncing
6671 || mMachineState == MachineState_TeleportingIn
6672 , ("Invalid machine state: %s\n", Global::stringifyMachineState(mMachineState)));
6673
6674 LogRel(("Console::powerDown(): A request to power off the VM has been issued (mMachineState=%s, InUninit=%d)\n",
6675 Global::stringifyMachineState(mMachineState), autoCaller.state() == InUninit));
6676
6677 /* Check if we need to power off the VM. In case of mVMPoweredOff=true, the
6678 * VM has already powered itself off in vmstateChangeCallback() and is just
6679 * notifying Console about that. In case of Starting or Restoring,
6680 * powerUpThread() is calling us on failure, so the VM is already off at
6681 * that point. */
6682 if ( !mVMPoweredOff
6683 && ( mMachineState == MachineState_Starting
6684 || mMachineState == MachineState_Restoring
6685 || mMachineState == MachineState_FaultTolerantSyncing
6686 || mMachineState == MachineState_TeleportingIn)
6687 )
6688 mVMPoweredOff = true;
6689
6690 /*
6691 * Go to Stopping state if not already there.
6692 *
6693 * Note that we don't go from Saving/Restoring to Stopping because
6694 * vmstateChangeCallback() needs it to set the state to Saved on
6695 * VMSTATE_TERMINATED. In terms of protecting from inappropriate operations
6696 * while leaving the lock below, Saving or Restoring should be fine too.
6697 * Ditto for TeleportingPausedVM -> Teleported.
6698 */
6699 if ( mMachineState != MachineState_Saving
6700 && mMachineState != MachineState_Restoring
6701 && mMachineState != MachineState_Stopping
6702 && mMachineState != MachineState_TeleportingIn
6703 && mMachineState != MachineState_TeleportingPausedVM
6704 && mMachineState != MachineState_FaultTolerantSyncing
6705 )
6706 setMachineState(MachineState_Stopping);
6707
6708 /* ----------------------------------------------------------------------
6709 * DONE with necessary state changes, perform the power down actions (it's
6710 * safe to release the object lock now if needed)
6711 * ---------------------------------------------------------------------- */
6712
6713 /* Stop the VRDP server to prevent new clients connection while VM is being
6714 * powered off. */
6715 if (mConsoleVRDPServer)
6716 {
6717 LogFlowThisFunc(("Stopping VRDP server...\n"));
6718
6719 /* Leave the lock since EMT will call us back as addVMCaller()
6720 * in updateDisplayData(). */
6721 alock.release();
6722
6723 mConsoleVRDPServer->Stop();
6724
6725 alock.acquire();
6726 }
6727
6728 /* advance percent count */
6729 if (aProgress)
6730 aProgress->SetCurrentOperationProgress(99 * (++step) / StepCount );
6731
6732
6733 /* ----------------------------------------------------------------------
6734 * Now, wait for all mpVM callers to finish their work if there are still
6735 * some on other threads. NO methods that need mpVM (or initiate other calls
6736 * that need it) may be called after this point
6737 * ---------------------------------------------------------------------- */
6738
6739 /* go to the destroying state to prevent from adding new callers */
6740 mVMDestroying = true;
6741
6742 if (mVMCallers > 0)
6743 {
6744 /* lazy creation */
6745 if (mVMZeroCallersSem == NIL_RTSEMEVENT)
6746 RTSemEventCreate(&mVMZeroCallersSem);
6747
6748 LogFlowThisFunc(("Waiting for mpVM callers (%d) to drop to zero...\n",
6749 mVMCallers));
6750
6751 alock.release();
6752
6753 RTSemEventWait(mVMZeroCallersSem, RT_INDEFINITE_WAIT);
6754
6755 alock.acquire();
6756 }
6757
6758 /* advance percent count */
6759 if (aProgress)
6760 aProgress->SetCurrentOperationProgress(99 * (++step) / StepCount );
6761
6762 vrc = VINF_SUCCESS;
6763
6764 /*
6765 * Power off the VM if not already done that.
6766 * Leave the lock since EMT will call vmstateChangeCallback.
6767 *
6768 * Note that VMR3PowerOff() may fail here (invalid VMSTATE) if the
6769 * VM-(guest-)initiated power off happened in parallel a ms before this
6770 * call. So far, we let this error pop up on the user's side.
6771 */
6772 if (!mVMPoweredOff)
6773 {
6774 LogFlowThisFunc(("Powering off the VM...\n"));
6775 alock.release();
6776 vrc = VMR3PowerOff(VMR3GetVM(pUVM));
6777#ifdef VBOX_WITH_EXTPACK
6778 mptrExtPackManager->callAllVmPowerOffHooks(this, VMR3GetVM(pUVM));
6779#endif
6780 alock.acquire();
6781 }
6782
6783 /* advance percent count */
6784 if (aProgress)
6785 aProgress->SetCurrentOperationProgress(99 * (++step) / StepCount );
6786
6787#ifdef VBOX_WITH_HGCM
6788 /* Shutdown HGCM services before destroying the VM. */
6789 if (m_pVMMDev)
6790 {
6791 LogFlowThisFunc(("Shutdown HGCM...\n"));
6792
6793 /* Leave the lock since EMT will call us back as addVMCaller() */
6794 alock.release();
6795
6796 m_pVMMDev->hgcmShutdown();
6797
6798 alock.acquire();
6799 }
6800
6801 /* advance percent count */
6802 if (aProgress)
6803 aProgress->SetCurrentOperationProgress(99 * (++step) / StepCount);
6804
6805#endif /* VBOX_WITH_HGCM */
6806
6807 LogFlowThisFunc(("Ready for VM destruction.\n"));
6808
6809 /* If we are called from Console::uninit(), then try to destroy the VM even
6810 * on failure (this will most likely fail too, but what to do?..) */
6811 if (RT_SUCCESS(vrc) || autoCaller.state() == InUninit)
6812 {
6813 /* If the machine has an USB controller, release all USB devices
6814 * (symmetric to the code in captureUSBDevices()) */
6815 bool fHasUSBController = false;
6816 {
6817 PPDMIBASE pBase;
6818 vrc = PDMR3QueryLun(VMR3GetVM(pUVM), "usb-ohci", 0, 0, &pBase);
6819 if (RT_SUCCESS(vrc))
6820 {
6821 fHasUSBController = true;
6822 detachAllUSBDevices(false /* aDone */);
6823 }
6824 }
6825
6826 /* Now we've got to destroy the VM as well. (mpVM is not valid beyond
6827 * this point). We release the lock before calling VMR3Destroy() because
6828 * it will result into calling destructors of drivers associated with
6829 * Console children which may in turn try to lock Console (e.g. by
6830 * instantiating SafeVMPtr to access mpVM). It's safe here because
6831 * mVMDestroying is set which should prevent any activity. */
6832
6833 /* Set mpUVM to NULL early just in case if some old code is not using
6834 * addVMCaller()/releaseVMCaller(). (We have our own ref on pUVM.) */
6835 VMR3ReleaseUVM(mpUVM);
6836 mpUVM = NULL;
6837
6838 LogFlowThisFunc(("Destroying the VM...\n"));
6839
6840 alock.release();
6841
6842 vrc = VMR3Destroy(VMR3GetVM(pUVM));
6843
6844 /* take the lock again */
6845 alock.acquire();
6846
6847 /* advance percent count */
6848 if (aProgress)
6849 aProgress->SetCurrentOperationProgress(99 * (++step) / StepCount);
6850
6851 if (RT_SUCCESS(vrc))
6852 {
6853 LogFlowThisFunc(("Machine has been destroyed (mMachineState=%d)\n",
6854 mMachineState));
6855 /* Note: the Console-level machine state change happens on the
6856 * VMSTATE_TERMINATE state change in vmstateChangeCallback(). If
6857 * powerDown() is called from EMT (i.e. from vmstateChangeCallback()
6858 * on receiving VM-initiated VMSTATE_OFF), VMSTATE_TERMINATE hasn't
6859 * occurred yet. This is okay, because mMachineState is already
6860 * Stopping in this case, so any other attempt to call PowerDown()
6861 * will be rejected. */
6862 }
6863 else
6864 {
6865 /* bad bad bad, but what to do? (Give Console our UVM ref.) */
6866 mpUVM = pUVM;
6867 pUVM = NULL;
6868 rc = setError(VBOX_E_VM_ERROR,
6869 tr("Could not destroy the machine. (Error: %Rrc)"),
6870 vrc);
6871 }
6872
6873 /* Complete the detaching of the USB devices. */
6874 if (fHasUSBController)
6875 detachAllUSBDevices(true /* aDone */);
6876
6877 /* advance percent count */
6878 if (aProgress)
6879 aProgress->SetCurrentOperationProgress(99 * (++step) / StepCount);
6880 }
6881 else
6882 {
6883 rc = setError(VBOX_E_VM_ERROR,
6884 tr("Could not power off the machine. (Error: %Rrc)"),
6885 vrc);
6886 }
6887
6888 /*
6889 * Finished with the destruction.
6890 *
6891 * Note that if something impossible happened and we've failed to destroy
6892 * the VM, mVMDestroying will remain true and mMachineState will be
6893 * something like Stopping, so most Console methods will return an error
6894 * to the caller.
6895 */
6896 if (mpUVM != NULL)
6897 VMR3ReleaseUVM(pUVM);
6898 else
6899 mVMDestroying = false;
6900
6901#ifdef CONSOLE_WITH_EVENT_CACHE
6902 if (SUCCEEDED(rc))
6903 mCallbackData.clear();
6904#endif
6905
6906 LogFlowThisFuncLeave();
6907 return rc;
6908}
6909
6910/**
6911 * @note Locks this object for writing.
6912 */
6913HRESULT Console::setMachineState(MachineState_T aMachineState,
6914 bool aUpdateServer /* = true */)
6915{
6916 AutoCaller autoCaller(this);
6917 AssertComRCReturnRC(autoCaller.rc());
6918
6919 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
6920
6921 HRESULT rc = S_OK;
6922
6923 if (mMachineState != aMachineState)
6924 {
6925 LogThisFunc(("machineState=%s -> %s aUpdateServer=%RTbool\n",
6926 Global::stringifyMachineState(mMachineState), Global::stringifyMachineState(aMachineState), aUpdateServer));
6927 mMachineState = aMachineState;
6928
6929 /// @todo (dmik)
6930 // possibly, we need to redo onStateChange() using the dedicated
6931 // Event thread, like it is done in VirtualBox. This will make it
6932 // much safer (no deadlocks possible if someone tries to use the
6933 // console from the callback), however, listeners will lose the
6934 // ability to synchronously react to state changes (is it really
6935 // necessary??)
6936 LogFlowThisFunc(("Doing onStateChange()...\n"));
6937 onStateChange(aMachineState);
6938 LogFlowThisFunc(("Done onStateChange()\n"));
6939
6940 if (aUpdateServer)
6941 {
6942 /* Server notification MUST be done from under the lock; otherwise
6943 * the machine state here and on the server might go out of sync
6944 * which can lead to various unexpected results (like the machine
6945 * state being >= MachineState_Running on the server, while the
6946 * session state is already SessionState_Unlocked at the same time
6947 * there).
6948 *
6949 * Cross-lock conditions should be carefully watched out: calling
6950 * UpdateState we will require Machine and SessionMachine locks
6951 * (remember that here we're holding the Console lock here, and also
6952 * all locks that have been acquire by the thread before calling
6953 * this method).
6954 */
6955 LogFlowThisFunc(("Doing mControl->UpdateState()...\n"));
6956 rc = mControl->UpdateState(aMachineState);
6957 LogFlowThisFunc(("mControl->UpdateState()=%Rhrc\n", rc));
6958 }
6959 }
6960
6961 return rc;
6962}
6963
6964/**
6965 * Searches for a shared folder with the given logical name
6966 * in the collection of shared folders.
6967 *
6968 * @param aName logical name of the shared folder
6969 * @param aSharedFolder where to return the found object
6970 * @param aSetError whether to set the error info if the folder is
6971 * not found
6972 * @return
6973 * S_OK when found or E_INVALIDARG when not found
6974 *
6975 * @note The caller must lock this object for writing.
6976 */
6977HRESULT Console::findSharedFolder(const Utf8Str &strName,
6978 ComObjPtr<SharedFolder> &aSharedFolder,
6979 bool aSetError /* = false */)
6980{
6981 /* sanity check */
6982 AssertReturn(isWriteLockOnCurrentThread(), E_FAIL);
6983
6984 SharedFolderMap::const_iterator it = m_mapSharedFolders.find(strName);
6985 if (it != m_mapSharedFolders.end())
6986 {
6987 aSharedFolder = it->second;
6988 return S_OK;
6989 }
6990
6991 if (aSetError)
6992 setError(VBOX_E_FILE_ERROR,
6993 tr("Could not find a shared folder named '%s'."),
6994 strName.c_str());
6995
6996 return VBOX_E_FILE_ERROR;
6997}
6998
6999/**
7000 * Fetches the list of global or machine shared folders from the server.
7001 *
7002 * @param aGlobal true to fetch global folders.
7003 *
7004 * @note The caller must lock this object for writing.
7005 */
7006HRESULT Console::fetchSharedFolders(BOOL aGlobal)
7007{
7008 /* sanity check */
7009 AssertReturn(AutoCaller(this).state() == InInit ||
7010 isWriteLockOnCurrentThread(), E_FAIL);
7011
7012 LogFlowThisFunc(("Entering\n"));
7013
7014 /* Check if we're online and keep it that way. */
7015 SafeVMPtrQuiet ptrVM(this);
7016 AutoVMCallerQuietWeak autoVMCaller(this);
7017 bool const online = ptrVM.isOk()
7018 && m_pVMMDev
7019 && m_pVMMDev->isShFlActive();
7020
7021 HRESULT rc = S_OK;
7022
7023 try
7024 {
7025 if (aGlobal)
7026 {
7027 /// @todo grab & process global folders when they are done
7028 }
7029 else
7030 {
7031 SharedFolderDataMap oldFolders;
7032 if (online)
7033 oldFolders = m_mapMachineSharedFolders;
7034
7035 m_mapMachineSharedFolders.clear();
7036
7037 SafeIfaceArray<ISharedFolder> folders;
7038 rc = mMachine->COMGETTER(SharedFolders)(ComSafeArrayAsOutParam(folders));
7039 if (FAILED(rc)) throw rc;
7040
7041 for (size_t i = 0; i < folders.size(); ++i)
7042 {
7043 ComPtr<ISharedFolder> pSharedFolder = folders[i];
7044
7045 Bstr bstrName;
7046 Bstr bstrHostPath;
7047 BOOL writable;
7048 BOOL autoMount;
7049
7050 rc = pSharedFolder->COMGETTER(Name)(bstrName.asOutParam());
7051 if (FAILED(rc)) throw rc;
7052 Utf8Str strName(bstrName);
7053
7054 rc = pSharedFolder->COMGETTER(HostPath)(bstrHostPath.asOutParam());
7055 if (FAILED(rc)) throw rc;
7056 Utf8Str strHostPath(bstrHostPath);
7057
7058 rc = pSharedFolder->COMGETTER(Writable)(&writable);
7059 if (FAILED(rc)) throw rc;
7060
7061 rc = pSharedFolder->COMGETTER(AutoMount)(&autoMount);
7062 if (FAILED(rc)) throw rc;
7063
7064 m_mapMachineSharedFolders.insert(std::make_pair(strName,
7065 SharedFolderData(strHostPath, writable, autoMount)));
7066
7067 /* send changes to HGCM if the VM is running */
7068 if (online)
7069 {
7070 SharedFolderDataMap::iterator it = oldFolders.find(strName);
7071 if ( it == oldFolders.end()
7072 || it->second.m_strHostPath != strHostPath)
7073 {
7074 /* a new machine folder is added or
7075 * the existing machine folder is changed */
7076 if (m_mapSharedFolders.find(strName) != m_mapSharedFolders.end())
7077 ; /* the console folder exists, nothing to do */
7078 else
7079 {
7080 /* remove the old machine folder (when changed)
7081 * or the global folder if any (when new) */
7082 if ( it != oldFolders.end()
7083 || m_mapGlobalSharedFolders.find(strName) != m_mapGlobalSharedFolders.end()
7084 )
7085 {
7086 rc = removeSharedFolder(strName);
7087 if (FAILED(rc)) throw rc;
7088 }
7089
7090 /* create the new machine folder */
7091 rc = createSharedFolder(strName,
7092 SharedFolderData(strHostPath,
7093 writable,
7094 autoMount));
7095 if (FAILED(rc)) throw rc;
7096 }
7097 }
7098 /* forget the processed (or identical) folder */
7099 if (it != oldFolders.end())
7100 oldFolders.erase(it);
7101 }
7102 }
7103
7104 /* process outdated (removed) folders */
7105 if (online)
7106 {
7107 for (SharedFolderDataMap::const_iterator it = oldFolders.begin();
7108 it != oldFolders.end(); ++it)
7109 {
7110 if (m_mapSharedFolders.find(it->first) != m_mapSharedFolders.end())
7111 ; /* the console folder exists, nothing to do */
7112 else
7113 {
7114 /* remove the outdated machine folder */
7115 rc = removeSharedFolder(it->first);
7116 if (FAILED(rc)) throw rc;
7117
7118 /* create the global folder if there is any */
7119 SharedFolderDataMap::const_iterator git =
7120 m_mapGlobalSharedFolders.find(it->first);
7121 if (git != m_mapGlobalSharedFolders.end())
7122 {
7123 rc = createSharedFolder(git->first, git->second);
7124 if (FAILED(rc)) throw rc;
7125 }
7126 }
7127 }
7128 }
7129 }
7130 }
7131 catch (HRESULT rc2)
7132 {
7133 if (online)
7134 setVMRuntimeErrorCallbackF(ptrVM, this, 0, "BrokenSharedFolder",
7135 N_("Broken shared folder!"));
7136 }
7137
7138 LogFlowThisFunc(("Leaving\n"));
7139
7140 return rc;
7141}
7142
7143/**
7144 * Searches for a shared folder with the given name in the list of machine
7145 * shared folders and then in the list of the global shared folders.
7146 *
7147 * @param aName Name of the folder to search for.
7148 * @param aIt Where to store the pointer to the found folder.
7149 * @return @c true if the folder was found and @c false otherwise.
7150 *
7151 * @note The caller must lock this object for reading.
7152 */
7153bool Console::findOtherSharedFolder(const Utf8Str &strName,
7154 SharedFolderDataMap::const_iterator &aIt)
7155{
7156 /* sanity check */
7157 AssertReturn(isWriteLockOnCurrentThread(), false);
7158
7159 /* first, search machine folders */
7160 aIt = m_mapMachineSharedFolders.find(strName);
7161 if (aIt != m_mapMachineSharedFolders.end())
7162 return true;
7163
7164 /* second, search machine folders */
7165 aIt = m_mapGlobalSharedFolders.find(strName);
7166 if (aIt != m_mapGlobalSharedFolders.end())
7167 return true;
7168
7169 return false;
7170}
7171
7172/**
7173 * Calls the HGCM service to add a shared folder definition.
7174 *
7175 * @param aName Shared folder name.
7176 * @param aHostPath Shared folder path.
7177 *
7178 * @note Must be called from under AutoVMCaller and when mpVM != NULL!
7179 * @note Doesn't lock anything.
7180 */
7181HRESULT Console::createSharedFolder(const Utf8Str &strName, const SharedFolderData &aData)
7182{
7183 ComAssertRet(strName.isNotEmpty(), E_FAIL);
7184 ComAssertRet(aData.m_strHostPath.isNotEmpty(), E_FAIL);
7185
7186 /* sanity checks */
7187 AssertReturn(mpUVM, E_FAIL);
7188 AssertReturn(m_pVMMDev && m_pVMMDev->isShFlActive(), E_FAIL);
7189
7190 VBOXHGCMSVCPARM parms[SHFL_CPARMS_ADD_MAPPING];
7191 SHFLSTRING *pFolderName, *pMapName;
7192 size_t cbString;
7193
7194 Bstr value;
7195 HRESULT hrc = mMachine->GetExtraData(BstrFmt("VBoxInternal2/SharedFoldersEnableSymlinksCreate/%s",
7196 strName.c_str()).raw(),
7197 value.asOutParam());
7198 bool fSymlinksCreate = hrc == S_OK && value == "1";
7199
7200 Log(("Adding shared folder '%s' -> '%s'\n", strName.c_str(), aData.m_strHostPath.c_str()));
7201
7202 // check whether the path is valid and exists
7203 char hostPathFull[RTPATH_MAX];
7204 int vrc = RTPathAbsEx(NULL,
7205 aData.m_strHostPath.c_str(),
7206 hostPathFull,
7207 sizeof(hostPathFull));
7208 if (RT_FAILURE(vrc))
7209 return setError(E_INVALIDARG,
7210 tr("Invalid shared folder path: '%s' (%Rrc)"),
7211 aData.m_strHostPath.c_str(), vrc);
7212 if (!RTPathExists(hostPathFull))
7213 return setError(E_INVALIDARG,
7214 tr("Shared folder path '%s' does not exist on the host"),
7215 aData.m_strHostPath.c_str());
7216 /* Check whether the path is full (absolute) */
7217 if (RTPathCompare(aData.m_strHostPath.c_str(), hostPathFull) != 0)
7218 return setError(E_INVALIDARG,
7219 tr("Shared folder path '%s' is not absolute"),
7220 aData.m_strHostPath.c_str());
7221
7222 // now that we know the path is good, give it to HGCM
7223
7224 Bstr bstrName(strName);
7225 Bstr bstrHostPath(aData.m_strHostPath);
7226
7227 cbString = (bstrHostPath.length() + 1) * sizeof(RTUTF16);
7228 if (cbString >= UINT16_MAX)
7229 return setError(E_INVALIDARG, tr("The name is too long"));
7230 pFolderName = (SHFLSTRING*)RTMemAllocZ(sizeof(SHFLSTRING) + cbString);
7231 Assert(pFolderName);
7232 memcpy(pFolderName->String.ucs2, bstrHostPath.raw(), cbString);
7233
7234 pFolderName->u16Size = (uint16_t)cbString;
7235 pFolderName->u16Length = (uint16_t)cbString - sizeof(RTUTF16);
7236
7237 parms[0].type = VBOX_HGCM_SVC_PARM_PTR;
7238 parms[0].u.pointer.addr = pFolderName;
7239 parms[0].u.pointer.size = sizeof(SHFLSTRING) + (uint16_t)cbString;
7240
7241 cbString = (bstrName.length() + 1) * sizeof(RTUTF16);
7242 if (cbString >= UINT16_MAX)
7243 {
7244 RTMemFree(pFolderName);
7245 return setError(E_INVALIDARG, tr("The host path is too long"));
7246 }
7247 pMapName = (SHFLSTRING*)RTMemAllocZ(sizeof(SHFLSTRING) + cbString);
7248 Assert(pMapName);
7249 memcpy(pMapName->String.ucs2, bstrName.raw(), cbString);
7250
7251 pMapName->u16Size = (uint16_t)cbString;
7252 pMapName->u16Length = (uint16_t)cbString - sizeof(RTUTF16);
7253
7254 parms[1].type = VBOX_HGCM_SVC_PARM_PTR;
7255 parms[1].u.pointer.addr = pMapName;
7256 parms[1].u.pointer.size = sizeof(SHFLSTRING) + (uint16_t)cbString;
7257
7258 parms[2].type = VBOX_HGCM_SVC_PARM_32BIT;
7259 parms[2].u.uint32 = (aData.m_fWritable ? SHFL_ADD_MAPPING_F_WRITABLE : 0)
7260 | (aData.m_fAutoMount ? SHFL_ADD_MAPPING_F_AUTOMOUNT : 0)
7261 | (fSymlinksCreate ? SHFL_ADD_MAPPING_F_CREATE_SYMLINKS : 0);
7262
7263 vrc = m_pVMMDev->hgcmHostCall("VBoxSharedFolders",
7264 SHFL_FN_ADD_MAPPING,
7265 SHFL_CPARMS_ADD_MAPPING, &parms[0]);
7266 RTMemFree(pFolderName);
7267 RTMemFree(pMapName);
7268
7269 if (RT_FAILURE(vrc))
7270 return setError(E_FAIL,
7271 tr("Could not create a shared folder '%s' mapped to '%s' (%Rrc)"),
7272 strName.c_str(), aData.m_strHostPath.c_str(), vrc);
7273
7274 return S_OK;
7275}
7276
7277/**
7278 * Calls the HGCM service to remove the shared folder definition.
7279 *
7280 * @param aName Shared folder name.
7281 *
7282 * @note Must be called from under AutoVMCaller and when mpVM != NULL!
7283 * @note Doesn't lock anything.
7284 */
7285HRESULT Console::removeSharedFolder(const Utf8Str &strName)
7286{
7287 ComAssertRet(strName.isNotEmpty(), E_FAIL);
7288
7289 /* sanity checks */
7290 AssertReturn(mpUVM, E_FAIL);
7291 AssertReturn(m_pVMMDev && m_pVMMDev->isShFlActive(), E_FAIL);
7292
7293 VBOXHGCMSVCPARM parms;
7294 SHFLSTRING *pMapName;
7295 size_t cbString;
7296
7297 Log(("Removing shared folder '%s'\n", strName.c_str()));
7298
7299 Bstr bstrName(strName);
7300 cbString = (bstrName.length() + 1) * sizeof(RTUTF16);
7301 if (cbString >= UINT16_MAX)
7302 return setError(E_INVALIDARG, tr("The name is too long"));
7303 pMapName = (SHFLSTRING *) RTMemAllocZ(sizeof(SHFLSTRING) + cbString);
7304 Assert(pMapName);
7305 memcpy(pMapName->String.ucs2, bstrName.raw(), cbString);
7306
7307 pMapName->u16Size = (uint16_t)cbString;
7308 pMapName->u16Length = (uint16_t)cbString - sizeof(RTUTF16);
7309
7310 parms.type = VBOX_HGCM_SVC_PARM_PTR;
7311 parms.u.pointer.addr = pMapName;
7312 parms.u.pointer.size = sizeof(SHFLSTRING) + (uint16_t)cbString;
7313
7314 int vrc = m_pVMMDev->hgcmHostCall("VBoxSharedFolders",
7315 SHFL_FN_REMOVE_MAPPING,
7316 1, &parms);
7317 RTMemFree(pMapName);
7318 if (RT_FAILURE(vrc))
7319 return setError(E_FAIL,
7320 tr("Could not remove the shared folder '%s' (%Rrc)"),
7321 strName.c_str(), vrc);
7322
7323 return S_OK;
7324}
7325
7326/**
7327 * VM state callback function. Called by the VMM
7328 * using its state machine states.
7329 *
7330 * Primarily used to handle VM initiated power off, suspend and state saving,
7331 * but also for doing termination completed work (VMSTATE_TERMINATE).
7332 *
7333 * In general this function is called in the context of the EMT.
7334 *
7335 * @param aVM The VM handle.
7336 * @param aState The new state.
7337 * @param aOldState The old state.
7338 * @param aUser The user argument (pointer to the Console object).
7339 *
7340 * @note Locks the Console object for writing.
7341 */
7342DECLCALLBACK(void) Console::vmstateChangeCallback(PVM aVM,
7343 VMSTATE aState,
7344 VMSTATE aOldState,
7345 void *aUser)
7346{
7347 LogFlowFunc(("Changing state from %s to %s (aVM=%p)\n",
7348 VMR3GetStateName(aOldState), VMR3GetStateName(aState), aVM));
7349
7350 Console *that = static_cast<Console *>(aUser);
7351 AssertReturnVoid(that);
7352
7353 AutoCaller autoCaller(that);
7354
7355 /* Note that we must let this method proceed even if Console::uninit() has
7356 * been already called. In such case this VMSTATE change is a result of:
7357 * 1) powerDown() called from uninit() itself, or
7358 * 2) VM-(guest-)initiated power off. */
7359 AssertReturnVoid( autoCaller.isOk()
7360 || autoCaller.state() == InUninit);
7361
7362 switch (aState)
7363 {
7364 /*
7365 * The VM has terminated
7366 */
7367 case VMSTATE_OFF:
7368 {
7369 AutoWriteLock alock(that COMMA_LOCKVAL_SRC_POS);
7370
7371 if (that->mVMStateChangeCallbackDisabled)
7372 break;
7373
7374 /* Do we still think that it is running? It may happen if this is a
7375 * VM-(guest-)initiated shutdown/poweroff.
7376 */
7377 if ( that->mMachineState != MachineState_Stopping
7378 && that->mMachineState != MachineState_Saving
7379 && that->mMachineState != MachineState_Restoring
7380 && that->mMachineState != MachineState_TeleportingIn
7381 && that->mMachineState != MachineState_FaultTolerantSyncing
7382 && that->mMachineState != MachineState_TeleportingPausedVM
7383 && !that->mVMIsAlreadyPoweringOff
7384 )
7385 {
7386 LogFlowFunc(("VM has powered itself off but Console still thinks it is running. Notifying.\n"));
7387
7388 /* prevent powerDown() from calling VMR3PowerOff() again */
7389 Assert(that->mVMPoweredOff == false);
7390 that->mVMPoweredOff = true;
7391
7392 /*
7393 * request a progress object from the server
7394 * (this will set the machine state to Stopping on the server
7395 * to block others from accessing this machine)
7396 */
7397 ComPtr<IProgress> pProgress;
7398 HRESULT rc = that->mControl->BeginPoweringDown(pProgress.asOutParam());
7399 AssertComRC(rc);
7400
7401 /* sync the state with the server */
7402 that->setMachineStateLocally(MachineState_Stopping);
7403
7404 /* Setup task object and thread to carry out the operation
7405 * asynchronously (if we call powerDown() right here but there
7406 * is one or more mpVM callers (added with addVMCaller()) we'll
7407 * deadlock).
7408 */
7409 std::auto_ptr<VMPowerDownTask> task(new VMPowerDownTask(that,
7410 pProgress));
7411
7412 /* If creating a task failed, this can currently mean one of
7413 * two: either Console::uninit() has been called just a ms
7414 * before (so a powerDown() call is already on the way), or
7415 * powerDown() itself is being already executed. Just do
7416 * nothing.
7417 */
7418 if (!task->isOk())
7419 {
7420 LogFlowFunc(("Console is already being uninitialized.\n"));
7421 break;
7422 }
7423
7424 int vrc = RTThreadCreate(NULL, Console::powerDownThread,
7425 (void *) task.get(), 0,
7426 RTTHREADTYPE_MAIN_WORKER, 0,
7427 "VMPwrDwn");
7428 AssertMsgRCBreak(vrc, ("Could not create VMPowerDown thread (%Rrc)\n", vrc));
7429
7430 /* task is now owned by powerDownThread(), so release it */
7431 task.release();
7432 }
7433 break;
7434 }
7435
7436 /* The VM has been completely destroyed.
7437 *
7438 * Note: This state change can happen at two points:
7439 * 1) At the end of VMR3Destroy() if it was not called from EMT.
7440 * 2) At the end of vmR3EmulationThread if VMR3Destroy() was
7441 * called by EMT.
7442 */
7443 case VMSTATE_TERMINATED:
7444 {
7445 AutoWriteLock alock(that COMMA_LOCKVAL_SRC_POS);
7446
7447 if (that->mVMStateChangeCallbackDisabled)
7448 break;
7449
7450 /* Terminate host interface networking. If aVM is NULL, we've been
7451 * manually called from powerUpThread() either before calling
7452 * VMR3Create() or after VMR3Create() failed, so no need to touch
7453 * networking.
7454 */
7455 if (aVM)
7456 that->powerDownHostInterfaces();
7457
7458 /* From now on the machine is officially powered down or remains in
7459 * the Saved state.
7460 */
7461 switch (that->mMachineState)
7462 {
7463 default:
7464 AssertFailed();
7465 /* fall through */
7466 case MachineState_Stopping:
7467 /* successfully powered down */
7468 that->setMachineState(MachineState_PoweredOff);
7469 break;
7470 case MachineState_Saving:
7471 /* successfully saved */
7472 that->setMachineState(MachineState_Saved);
7473 break;
7474 case MachineState_Starting:
7475 /* failed to start, but be patient: set back to PoweredOff
7476 * (for similarity with the below) */
7477 that->setMachineState(MachineState_PoweredOff);
7478 break;
7479 case MachineState_Restoring:
7480 /* failed to load the saved state file, but be patient: set
7481 * back to Saved (to preserve the saved state file) */
7482 that->setMachineState(MachineState_Saved);
7483 break;
7484 case MachineState_TeleportingIn:
7485 /* Teleportation failed or was canceled. Back to powered off. */
7486 that->setMachineState(MachineState_PoweredOff);
7487 break;
7488 case MachineState_TeleportingPausedVM:
7489 /* Successfully teleported the VM. */
7490 that->setMachineState(MachineState_Teleported);
7491 break;
7492 case MachineState_FaultTolerantSyncing:
7493 /* Fault tolerant sync failed or was canceled. Back to powered off. */
7494 that->setMachineState(MachineState_PoweredOff);
7495 break;
7496 }
7497 break;
7498 }
7499
7500 case VMSTATE_RESETTING:
7501 {
7502#ifdef VBOX_WITH_GUEST_PROPS
7503 /* Do not take any read/write locks here! */
7504 that->guestPropertiesHandleVMReset();
7505#endif
7506 break;
7507 }
7508
7509 case VMSTATE_SUSPENDED:
7510 {
7511 AutoWriteLock alock(that COMMA_LOCKVAL_SRC_POS);
7512
7513 if (that->mVMStateChangeCallbackDisabled)
7514 break;
7515
7516 switch (that->mMachineState)
7517 {
7518 case MachineState_Teleporting:
7519 that->setMachineState(MachineState_TeleportingPausedVM);
7520 break;
7521
7522 case MachineState_LiveSnapshotting:
7523 that->setMachineState(MachineState_Saving);
7524 break;
7525
7526 case MachineState_TeleportingPausedVM:
7527 case MachineState_Saving:
7528 case MachineState_Restoring:
7529 case MachineState_Stopping:
7530 case MachineState_TeleportingIn:
7531 case MachineState_FaultTolerantSyncing:
7532 /* The worker thread handles the transition. */
7533 break;
7534
7535 default:
7536 AssertMsgFailed(("%s\n", Global::stringifyMachineState(that->mMachineState)));
7537 case MachineState_Running:
7538 that->setMachineState(MachineState_Paused);
7539 break;
7540
7541 case MachineState_Paused:
7542 /* Nothing to do. */
7543 break;
7544 }
7545 break;
7546 }
7547
7548 case VMSTATE_SUSPENDED_LS:
7549 case VMSTATE_SUSPENDED_EXT_LS:
7550 {
7551 AutoWriteLock alock(that COMMA_LOCKVAL_SRC_POS);
7552 if (that->mVMStateChangeCallbackDisabled)
7553 break;
7554 switch (that->mMachineState)
7555 {
7556 case MachineState_Teleporting:
7557 that->setMachineState(MachineState_TeleportingPausedVM);
7558 break;
7559
7560 case MachineState_LiveSnapshotting:
7561 that->setMachineState(MachineState_Saving);
7562 break;
7563
7564 case MachineState_TeleportingPausedVM:
7565 case MachineState_Saving:
7566 /* ignore */
7567 break;
7568
7569 default:
7570 AssertMsgFailed(("%s/%s -> %s\n", Global::stringifyMachineState(that->mMachineState), VMR3GetStateName(aOldState), VMR3GetStateName(aState) ));
7571 that->setMachineState(MachineState_Paused);
7572 break;
7573 }
7574 break;
7575 }
7576
7577 case VMSTATE_RUNNING:
7578 {
7579 if ( aOldState == VMSTATE_POWERING_ON
7580 || aOldState == VMSTATE_RESUMING
7581 || aOldState == VMSTATE_RUNNING_FT)
7582 {
7583 AutoWriteLock alock(that COMMA_LOCKVAL_SRC_POS);
7584
7585 if (that->mVMStateChangeCallbackDisabled)
7586 break;
7587
7588 Assert( ( ( that->mMachineState == MachineState_Starting
7589 || that->mMachineState == MachineState_Paused)
7590 && aOldState == VMSTATE_POWERING_ON)
7591 || ( ( that->mMachineState == MachineState_Restoring
7592 || that->mMachineState == MachineState_TeleportingIn
7593 || that->mMachineState == MachineState_Paused
7594 || that->mMachineState == MachineState_Saving
7595 )
7596 && aOldState == VMSTATE_RESUMING)
7597 || ( that->mMachineState == MachineState_FaultTolerantSyncing
7598 && aOldState == VMSTATE_RUNNING_FT));
7599
7600 that->setMachineState(MachineState_Running);
7601 }
7602
7603 break;
7604 }
7605
7606 case VMSTATE_RUNNING_LS:
7607 AssertMsg( that->mMachineState == MachineState_LiveSnapshotting
7608 || that->mMachineState == MachineState_Teleporting,
7609 ("%s/%s -> %s\n", Global::stringifyMachineState(that->mMachineState), VMR3GetStateName(aOldState), VMR3GetStateName(aState) ));
7610 break;
7611
7612 case VMSTATE_RUNNING_FT:
7613 AssertMsg(that->mMachineState == MachineState_FaultTolerantSyncing,
7614 ("%s/%s -> %s\n", Global::stringifyMachineState(that->mMachineState), VMR3GetStateName(aOldState), VMR3GetStateName(aState) ));
7615 break;
7616
7617 case VMSTATE_FATAL_ERROR:
7618 {
7619 AutoWriteLock alock(that COMMA_LOCKVAL_SRC_POS);
7620
7621 if (that->mVMStateChangeCallbackDisabled)
7622 break;
7623
7624 /* Fatal errors are only for running VMs. */
7625 Assert(Global::IsOnline(that->mMachineState));
7626
7627 /* Note! 'Pause' is used here in want of something better. There
7628 * are currently only two places where fatal errors might be
7629 * raised, so it is not worth adding a new externally
7630 * visible state for this yet. */
7631 that->setMachineState(MachineState_Paused);
7632 break;
7633 }
7634
7635 case VMSTATE_GURU_MEDITATION:
7636 {
7637 AutoWriteLock alock(that COMMA_LOCKVAL_SRC_POS);
7638
7639 if (that->mVMStateChangeCallbackDisabled)
7640 break;
7641
7642 /* Guru are only for running VMs */
7643 Assert(Global::IsOnline(that->mMachineState));
7644
7645 that->setMachineState(MachineState_Stuck);
7646 break;
7647 }
7648
7649 default: /* shut up gcc */
7650 break;
7651 }
7652}
7653
7654#ifdef VBOX_WITH_USB
7655/**
7656 * Sends a request to VMM to attach the given host device.
7657 * After this method succeeds, the attached device will appear in the
7658 * mUSBDevices collection.
7659 *
7660 * @param aHostDevice device to attach
7661 *
7662 * @note Synchronously calls EMT.
7663 * @note Must be called from under this object's lock.
7664 */
7665HRESULT Console::attachUSBDevice(IUSBDevice *aHostDevice, ULONG aMaskedIfs)
7666{
7667 AssertReturn(aHostDevice, E_FAIL);
7668 AssertReturn(isWriteLockOnCurrentThread(), E_FAIL);
7669
7670 /* still want a lock object because we need to release it */
7671 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
7672
7673 HRESULT hrc;
7674
7675 /*
7676 * Get the address and the Uuid, and call the pfnCreateProxyDevice roothub
7677 * method in EMT (using usbAttachCallback()).
7678 */
7679 Bstr BstrAddress;
7680 hrc = aHostDevice->COMGETTER(Address)(BstrAddress.asOutParam());
7681 ComAssertComRCRetRC(hrc);
7682
7683 Utf8Str Address(BstrAddress);
7684
7685 Bstr id;
7686 hrc = aHostDevice->COMGETTER(Id)(id.asOutParam());
7687 ComAssertComRCRetRC(hrc);
7688 Guid uuid(id);
7689
7690 BOOL fRemote = FALSE;
7691 hrc = aHostDevice->COMGETTER(Remote)(&fRemote);
7692 ComAssertComRCRetRC(hrc);
7693
7694 /* Get the VM handle. */
7695 SafeVMPtr ptrVM(this);
7696 if (!ptrVM.isOk())
7697 return ptrVM.rc();
7698
7699 LogFlowThisFunc(("Proxying USB device '%s' {%RTuuid}...\n",
7700 Address.c_str(), uuid.raw()));
7701
7702 /* release the lock before a VMR3* call (EMT will call us back)! */
7703 alock.release();
7704
7705/** @todo just do everything here and only wrap the PDMR3Usb call. That'll offload some notification stuff from the EMT thread. */
7706 int vrc = VMR3ReqCallWait(ptrVM, VMCPUID_ANY,
7707 (PFNRT)usbAttachCallback, 7,
7708 this, ptrVM.raw(), aHostDevice, uuid.raw(), fRemote, Address.c_str(), aMaskedIfs);
7709
7710 /* restore the lock */
7711 alock.acquire();
7712
7713 /* hrc is S_OK here */
7714
7715 if (RT_FAILURE(vrc))
7716 {
7717 LogWarningThisFunc(("Failed to create proxy device for '%s' {%RTuuid} (%Rrc)\n",
7718 Address.c_str(), uuid.raw(), vrc));
7719
7720 switch (vrc)
7721 {
7722 case VERR_VUSB_NO_PORTS:
7723 hrc = setError(E_FAIL,
7724 tr("Failed to attach the USB device. (No available ports on the USB controller)."));
7725 break;
7726 case VERR_VUSB_USBFS_PERMISSION:
7727 hrc = setError(E_FAIL,
7728 tr("Not permitted to open the USB device, check usbfs options"));
7729 break;
7730 default:
7731 hrc = setError(E_FAIL,
7732 tr("Failed to create a proxy device for the USB device. (Error: %Rrc)"),
7733 vrc);
7734 break;
7735 }
7736 }
7737
7738 return hrc;
7739}
7740
7741/**
7742 * USB device attach callback used by AttachUSBDevice().
7743 * Note that AttachUSBDevice() doesn't return until this callback is executed,
7744 * so we don't use AutoCaller and don't care about reference counters of
7745 * interface pointers passed in.
7746 *
7747 * @thread EMT
7748 * @note Locks the console object for writing.
7749 */
7750//static
7751DECLCALLBACK(int)
7752Console::usbAttachCallback(Console *that, PVM pVM, IUSBDevice *aHostDevice, PCRTUUID aUuid, bool aRemote, const char *aAddress, ULONG aMaskedIfs)
7753{
7754 LogFlowFuncEnter();
7755 LogFlowFunc(("that={%p}\n", that));
7756
7757 AssertReturn(that && aUuid, VERR_INVALID_PARAMETER);
7758
7759 void *pvRemoteBackend = NULL;
7760 if (aRemote)
7761 {
7762 RemoteUSBDevice *pRemoteUSBDevice = static_cast<RemoteUSBDevice *>(aHostDevice);
7763 Guid guid(*aUuid);
7764
7765 pvRemoteBackend = that->consoleVRDPServer()->USBBackendRequestPointer(pRemoteUSBDevice->clientId(), &guid);
7766 if (!pvRemoteBackend)
7767 return VERR_INVALID_PARAMETER; /* The clientId is invalid then. */
7768 }
7769
7770 USHORT portVersion = 1;
7771 HRESULT hrc = aHostDevice->COMGETTER(PortVersion)(&portVersion);
7772 AssertComRCReturn(hrc, VERR_GENERAL_FAILURE);
7773 Assert(portVersion == 1 || portVersion == 2);
7774
7775 int vrc = PDMR3USBCreateProxyDevice(pVM, aUuid, aRemote, aAddress, pvRemoteBackend,
7776 portVersion == 1 ? VUSB_STDVER_11 : VUSB_STDVER_20, aMaskedIfs);
7777 if (RT_SUCCESS(vrc))
7778 {
7779 /* Create a OUSBDevice and add it to the device list */
7780 ComObjPtr<OUSBDevice> pUSBDevice;
7781 pUSBDevice.createObject();
7782 hrc = pUSBDevice->init(aHostDevice);
7783 AssertComRC(hrc);
7784
7785 AutoWriteLock alock(that COMMA_LOCKVAL_SRC_POS);
7786 that->mUSBDevices.push_back(pUSBDevice);
7787 LogFlowFunc(("Attached device {%RTuuid}\n", pUSBDevice->id().raw()));
7788
7789 /* notify callbacks */
7790 that->onUSBDeviceStateChange(pUSBDevice, true /* aAttached */, NULL);
7791 }
7792
7793 LogFlowFunc(("vrc=%Rrc\n", vrc));
7794 LogFlowFuncLeave();
7795 return vrc;
7796}
7797
7798/**
7799 * Sends a request to VMM to detach the given host device. After this method
7800 * succeeds, the detached device will disappear from the mUSBDevices
7801 * collection.
7802 *
7803 * @param aIt Iterator pointing to the device to detach.
7804 *
7805 * @note Synchronously calls EMT.
7806 * @note Must be called from under this object's lock.
7807 */
7808HRESULT Console::detachUSBDevice(USBDeviceList::iterator &aIt)
7809{
7810 AssertReturn(isWriteLockOnCurrentThread(), E_FAIL);
7811
7812 /* still want a lock object because we need to release it */
7813 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
7814
7815 /* Get the VM handle. */
7816 SafeVMPtr ptrVM(this);
7817 if (!ptrVM.isOk())
7818 return ptrVM.rc();
7819
7820 /* if the device is attached, then there must at least one USB hub. */
7821 AssertReturn(PDMR3USBHasHub(ptrVM), E_FAIL);
7822
7823 LogFlowThisFunc(("Detaching USB proxy device {%RTuuid}...\n",
7824 (*aIt)->id().raw()));
7825
7826 /* release the lock before a VMR3* call (EMT will call us back)! */
7827 alock.release();
7828
7829/** @todo just do everything here and only wrap the PDMR3Usb call. That'll offload some notification stuff from the EMT thread. */
7830 int vrc = VMR3ReqCallWait(ptrVM, VMCPUID_ANY,
7831 (PFNRT)usbDetachCallback, 5,
7832 this, ptrVM.raw(), &aIt, (*aIt)->id().raw());
7833 ComAssertRCRet(vrc, E_FAIL);
7834
7835 return S_OK;
7836}
7837
7838/**
7839 * USB device detach callback used by DetachUSBDevice().
7840 * Note that DetachUSBDevice() doesn't return until this callback is executed,
7841 * so we don't use AutoCaller and don't care about reference counters of
7842 * interface pointers passed in.
7843 *
7844 * @thread EMT
7845 * @note Locks the console object for writing.
7846 */
7847//static
7848DECLCALLBACK(int)
7849Console::usbDetachCallback(Console *that, PVM pVM, USBDeviceList::iterator *aIt, PCRTUUID aUuid)
7850{
7851 LogFlowFuncEnter();
7852 LogFlowFunc(("that={%p}\n", that));
7853
7854 AssertReturn(that && aUuid, VERR_INVALID_PARAMETER);
7855 ComObjPtr<OUSBDevice> pUSBDevice = **aIt;
7856
7857 /*
7858 * If that was a remote device, release the backend pointer.
7859 * The pointer was requested in usbAttachCallback.
7860 */
7861 BOOL fRemote = FALSE;
7862
7863 HRESULT hrc2 = (**aIt)->COMGETTER(Remote)(&fRemote);
7864 if (FAILED(hrc2))
7865 setErrorStatic(hrc2, "GetRemote() failed");
7866
7867 if (fRemote)
7868 {
7869 Guid guid(*aUuid);
7870 that->consoleVRDPServer()->USBBackendReleasePointer(&guid);
7871 }
7872
7873 int vrc = PDMR3USBDetachDevice(pVM, aUuid);
7874
7875 if (RT_SUCCESS(vrc))
7876 {
7877 AutoWriteLock alock(that COMMA_LOCKVAL_SRC_POS);
7878
7879 /* Remove the device from the collection */
7880 that->mUSBDevices.erase(*aIt);
7881 LogFlowFunc(("Detached device {%RTuuid}\n", pUSBDevice->id().raw()));
7882
7883 /* notify callbacks */
7884 that->onUSBDeviceStateChange(pUSBDevice, false /* aAttached */, NULL);
7885 }
7886
7887 LogFlowFunc(("vrc=%Rrc\n", vrc));
7888 LogFlowFuncLeave();
7889 return vrc;
7890}
7891#endif /* VBOX_WITH_USB */
7892
7893/* Note: FreeBSD needs this whether netflt is used or not. */
7894#if ((defined(RT_OS_LINUX) && !defined(VBOX_WITH_NETFLT)) || defined(RT_OS_FREEBSD))
7895/**
7896 * Helper function to handle host interface device creation and attachment.
7897 *
7898 * @param networkAdapter the network adapter which attachment should be reset
7899 * @return COM status code
7900 *
7901 * @note The caller must lock this object for writing.
7902 *
7903 * @todo Move this back into the driver!
7904 */
7905HRESULT Console::attachToTapInterface(INetworkAdapter *networkAdapter)
7906{
7907 LogFlowThisFunc(("\n"));
7908 /* sanity check */
7909 AssertReturn(isWriteLockOnCurrentThread(), E_FAIL);
7910
7911# ifdef VBOX_STRICT
7912 /* paranoia */
7913 NetworkAttachmentType_T attachment;
7914 networkAdapter->COMGETTER(AttachmentType)(&attachment);
7915 Assert(attachment == NetworkAttachmentType_Bridged);
7916# endif /* VBOX_STRICT */
7917
7918 HRESULT rc = S_OK;
7919
7920 ULONG slot = 0;
7921 rc = networkAdapter->COMGETTER(Slot)(&slot);
7922 AssertComRC(rc);
7923
7924# ifdef RT_OS_LINUX
7925 /*
7926 * Allocate a host interface device
7927 */
7928 int rcVBox = RTFileOpen(&maTapFD[slot], "/dev/net/tun",
7929 RTFILE_O_READWRITE | RTFILE_O_OPEN | RTFILE_O_DENY_NONE | RTFILE_O_INHERIT);
7930 if (RT_SUCCESS(rcVBox))
7931 {
7932 /*
7933 * Set/obtain the tap interface.
7934 */
7935 struct ifreq IfReq;
7936 memset(&IfReq, 0, sizeof(IfReq));
7937 /* The name of the TAP interface we are using */
7938 Bstr tapDeviceName;
7939 rc = networkAdapter->COMGETTER(BridgedInterface)(tapDeviceName.asOutParam());
7940 if (FAILED(rc))
7941 tapDeviceName.setNull(); /* Is this necessary? */
7942 if (tapDeviceName.isEmpty())
7943 {
7944 LogRel(("No TAP device name was supplied.\n"));
7945 rc = setError(E_FAIL, tr("No TAP device name was supplied for the host networking interface"));
7946 }
7947
7948 if (SUCCEEDED(rc))
7949 {
7950 /* If we are using a static TAP device then try to open it. */
7951 Utf8Str str(tapDeviceName);
7952 if (str.length() <= sizeof(IfReq.ifr_name))
7953 strcpy(IfReq.ifr_name, str.c_str());
7954 else
7955 memcpy(IfReq.ifr_name, str.c_str(), sizeof(IfReq.ifr_name) - 1); /** @todo bitch about names which are too long... */
7956 IfReq.ifr_flags = IFF_TAP | IFF_NO_PI;
7957 rcVBox = ioctl(maTapFD[slot], TUNSETIFF, &IfReq);
7958 if (rcVBox != 0)
7959 {
7960 LogRel(("Failed to open the host network interface %ls\n", tapDeviceName.raw()));
7961 rc = setError(E_FAIL,
7962 tr("Failed to open the host network interface %ls"),
7963 tapDeviceName.raw());
7964 }
7965 }
7966 if (SUCCEEDED(rc))
7967 {
7968 /*
7969 * Make it pollable.
7970 */
7971 if (fcntl(maTapFD[slot], F_SETFL, O_NONBLOCK) != -1)
7972 {
7973 Log(("attachToTapInterface: %RTfile %ls\n", maTapFD[slot], tapDeviceName.raw()));
7974 /*
7975 * Here is the right place to communicate the TAP file descriptor and
7976 * the host interface name to the server if/when it becomes really
7977 * necessary.
7978 */
7979 maTAPDeviceName[slot] = tapDeviceName;
7980 rcVBox = VINF_SUCCESS;
7981 }
7982 else
7983 {
7984 int iErr = errno;
7985
7986 LogRel(("Configuration error: Failed to configure /dev/net/tun non blocking. Error: %s\n", strerror(iErr)));
7987 rcVBox = VERR_HOSTIF_BLOCKING;
7988 rc = setError(E_FAIL,
7989 tr("could not set up the host networking device for non blocking access: %s"),
7990 strerror(errno));
7991 }
7992 }
7993 }
7994 else
7995 {
7996 LogRel(("Configuration error: Failed to open /dev/net/tun rc=%Rrc\n", rcVBox));
7997 switch (rcVBox)
7998 {
7999 case VERR_ACCESS_DENIED:
8000 /* will be handled by our caller */
8001 rc = rcVBox;
8002 break;
8003 default:
8004 rc = setError(E_FAIL,
8005 tr("Could not set up the host networking device: %Rrc"),
8006 rcVBox);
8007 break;
8008 }
8009 }
8010
8011# elif defined(RT_OS_FREEBSD)
8012 /*
8013 * Set/obtain the tap interface.
8014 */
8015 /* The name of the TAP interface we are using */
8016 Bstr tapDeviceName;
8017 rc = networkAdapter->COMGETTER(BridgedInterface)(tapDeviceName.asOutParam());
8018 if (FAILED(rc))
8019 tapDeviceName.setNull(); /* Is this necessary? */
8020 if (tapDeviceName.isEmpty())
8021 {
8022 LogRel(("No TAP device name was supplied.\n"));
8023 rc = setError(E_FAIL, tr("No TAP device name was supplied for the host networking interface"));
8024 }
8025 char szTapdev[1024] = "/dev/";
8026 /* If we are using a static TAP device then try to open it. */
8027 Utf8Str str(tapDeviceName);
8028 if (str.length() + strlen(szTapdev) <= sizeof(szTapdev))
8029 strcat(szTapdev, str.c_str());
8030 else
8031 memcpy(szTapdev + strlen(szTapdev), str.c_str(),
8032 sizeof(szTapdev) - strlen(szTapdev) - 1); /** @todo bitch about names which are too long... */
8033 int rcVBox = RTFileOpen(&maTapFD[slot], szTapdev,
8034 RTFILE_O_READWRITE | RTFILE_O_OPEN | RTFILE_O_DENY_NONE | RTFILE_O_INHERIT | RTFILE_O_NON_BLOCK);
8035
8036 if (RT_SUCCESS(rcVBox))
8037 maTAPDeviceName[slot] = tapDeviceName;
8038 else
8039 {
8040 switch (rcVBox)
8041 {
8042 case VERR_ACCESS_DENIED:
8043 /* will be handled by our caller */
8044 rc = rcVBox;
8045 break;
8046 default:
8047 rc = setError(E_FAIL,
8048 tr("Failed to open the host network interface %ls"),
8049 tapDeviceName.raw());
8050 break;
8051 }
8052 }
8053# else
8054# error "huh?"
8055# endif
8056 /* in case of failure, cleanup. */
8057 if (RT_FAILURE(rcVBox) && SUCCEEDED(rc))
8058 {
8059 LogRel(("General failure attaching to host interface\n"));
8060 rc = setError(E_FAIL,
8061 tr("General failure attaching to host interface"));
8062 }
8063 LogFlowThisFunc(("rc=%d\n", rc));
8064 return rc;
8065}
8066
8067
8068/**
8069 * Helper function to handle detachment from a host interface
8070 *
8071 * @param networkAdapter the network adapter which attachment should be reset
8072 * @return COM status code
8073 *
8074 * @note The caller must lock this object for writing.
8075 *
8076 * @todo Move this back into the driver!
8077 */
8078HRESULT Console::detachFromTapInterface(INetworkAdapter *networkAdapter)
8079{
8080 /* sanity check */
8081 LogFlowThisFunc(("\n"));
8082 AssertReturn(isWriteLockOnCurrentThread(), E_FAIL);
8083
8084 HRESULT rc = S_OK;
8085# ifdef VBOX_STRICT
8086 /* paranoia */
8087 NetworkAttachmentType_T attachment;
8088 networkAdapter->COMGETTER(AttachmentType)(&attachment);
8089 Assert(attachment == NetworkAttachmentType_Bridged);
8090# endif /* VBOX_STRICT */
8091
8092 ULONG slot = 0;
8093 rc = networkAdapter->COMGETTER(Slot)(&slot);
8094 AssertComRC(rc);
8095
8096 /* is there an open TAP device? */
8097 if (maTapFD[slot] != NIL_RTFILE)
8098 {
8099 /*
8100 * Close the file handle.
8101 */
8102 Bstr tapDeviceName, tapTerminateApplication;
8103 bool isStatic = true;
8104 rc = networkAdapter->COMGETTER(BridgedInterface)(tapDeviceName.asOutParam());
8105 if (FAILED(rc) || tapDeviceName.isEmpty())
8106 {
8107 /* If the name is empty, this is a dynamic TAP device, so close it now,
8108 so that the termination script can remove the interface. Otherwise we still
8109 need the FD to pass to the termination script. */
8110 isStatic = false;
8111 int rcVBox = RTFileClose(maTapFD[slot]);
8112 AssertRC(rcVBox);
8113 maTapFD[slot] = NIL_RTFILE;
8114 }
8115 if (isStatic)
8116 {
8117 /* If we are using a static TAP device, we close it now, after having called the
8118 termination script. */
8119 int rcVBox = RTFileClose(maTapFD[slot]);
8120 AssertRC(rcVBox);
8121 }
8122 /* the TAP device name and handle are no longer valid */
8123 maTapFD[slot] = NIL_RTFILE;
8124 maTAPDeviceName[slot] = "";
8125 }
8126 LogFlowThisFunc(("returning %d\n", rc));
8127 return rc;
8128}
8129#endif /* (RT_OS_LINUX || RT_OS_FREEBSD) && !VBOX_WITH_NETFLT */
8130
8131/**
8132 * Called at power down to terminate host interface networking.
8133 *
8134 * @note The caller must lock this object for writing.
8135 */
8136HRESULT Console::powerDownHostInterfaces()
8137{
8138 LogFlowThisFunc(("\n"));
8139
8140 /* sanity check */
8141 AssertReturn(isWriteLockOnCurrentThread(), E_FAIL);
8142
8143 /*
8144 * host interface termination handling
8145 */
8146 HRESULT rc = S_OK;
8147 ComPtr<IVirtualBox> pVirtualBox;
8148 mMachine->COMGETTER(Parent)(pVirtualBox.asOutParam());
8149 ComPtr<ISystemProperties> pSystemProperties;
8150 if (pVirtualBox)
8151 pVirtualBox->COMGETTER(SystemProperties)(pSystemProperties.asOutParam());
8152 ChipsetType_T chipsetType = ChipsetType_PIIX3;
8153 mMachine->COMGETTER(ChipsetType)(&chipsetType);
8154 ULONG maxNetworkAdapters = 0;
8155 if (pSystemProperties)
8156 pSystemProperties->GetMaxNetworkAdapters(chipsetType, &maxNetworkAdapters);
8157
8158 for (ULONG slot = 0; slot < maxNetworkAdapters; slot++)
8159 {
8160 ComPtr<INetworkAdapter> pNetworkAdapter;
8161 rc = mMachine->GetNetworkAdapter(slot, pNetworkAdapter.asOutParam());
8162 if (FAILED(rc)) break;
8163
8164 BOOL enabled = FALSE;
8165 pNetworkAdapter->COMGETTER(Enabled)(&enabled);
8166 if (!enabled)
8167 continue;
8168
8169 NetworkAttachmentType_T attachment;
8170 pNetworkAdapter->COMGETTER(AttachmentType)(&attachment);
8171 if (attachment == NetworkAttachmentType_Bridged)
8172 {
8173#if ((defined(RT_OS_LINUX) || defined(RT_OS_FREEBSD)) && !defined(VBOX_WITH_NETFLT))
8174 HRESULT rc2 = detachFromTapInterface(pNetworkAdapter);
8175 if (FAILED(rc2) && SUCCEEDED(rc))
8176 rc = rc2;
8177#endif /* (RT_OS_LINUX || RT_OS_FREEBSD) && !VBOX_WITH_NETFLT */
8178 }
8179 }
8180
8181 return rc;
8182}
8183
8184
8185/**
8186 * Process callback handler for VMR3LoadFromFile, VMR3LoadFromStream, VMR3Save
8187 * and VMR3Teleport.
8188 *
8189 * @param pVM The VM handle.
8190 * @param uPercent Completion percentage (0-100).
8191 * @param pvUser Pointer to an IProgress instance.
8192 * @return VINF_SUCCESS.
8193 */
8194/*static*/
8195DECLCALLBACK(int) Console::stateProgressCallback(PVM pVM, unsigned uPercent, void *pvUser)
8196{
8197 IProgress *pProgress = static_cast<IProgress *>(pvUser);
8198
8199 /* update the progress object */
8200 if (pProgress)
8201 pProgress->SetCurrentOperationProgress(uPercent);
8202
8203 return VINF_SUCCESS;
8204}
8205
8206/**
8207 * @copydoc FNVMATERROR
8208 *
8209 * @remarks Might be some tiny serialization concerns with access to the string
8210 * object here...
8211 */
8212/*static*/ DECLCALLBACK(void)
8213Console::genericVMSetErrorCallback(PVM pVM, void *pvUser, int rc, RT_SRC_POS_DECL,
8214 const char *pszErrorFmt, va_list va)
8215{
8216 Utf8Str *pErrorText = (Utf8Str *)pvUser;
8217 AssertPtr(pErrorText);
8218
8219 /* We ignore RT_SRC_POS_DECL arguments to avoid confusion of end-users. */
8220 va_list va2;
8221 va_copy(va2, va);
8222
8223 /* Append to any the existing error message. */
8224 if (pErrorText->length())
8225 *pErrorText = Utf8StrFmt("%s.\n%N (%Rrc)", pErrorText->c_str(),
8226 pszErrorFmt, &va2, rc, rc);
8227 else
8228 *pErrorText = Utf8StrFmt("%N (%Rrc)", pszErrorFmt, &va2, rc, rc);
8229
8230 va_end(va2);
8231}
8232
8233/**
8234 * VM runtime error callback function.
8235 * See VMSetRuntimeError for the detailed description of parameters.
8236 *
8237 * @param pVM The VM handle.
8238 * @param pvUser The user argument.
8239 * @param fFlags The action flags. See VMSETRTERR_FLAGS_*.
8240 * @param pszErrorId Error ID string.
8241 * @param pszFormat Error message format string.
8242 * @param va Error message arguments.
8243 * @thread EMT.
8244 */
8245/* static */ DECLCALLBACK(void)
8246Console::setVMRuntimeErrorCallback(PVM pVM, void *pvUser, uint32_t fFlags,
8247 const char *pszErrorId,
8248 const char *pszFormat, va_list va)
8249{
8250 bool const fFatal = !!(fFlags & VMSETRTERR_FLAGS_FATAL);
8251 LogFlowFuncEnter();
8252
8253 Console *that = static_cast<Console *>(pvUser);
8254 AssertReturnVoid(that);
8255
8256 Utf8Str message(pszFormat, va);
8257
8258 LogRel(("Console: VM runtime error: fatal=%RTbool, errorID=%s message=\"%s\"\n",
8259 fFatal, pszErrorId, message.c_str()));
8260
8261 that->onRuntimeError(BOOL(fFatal), Bstr(pszErrorId).raw(),
8262 Bstr(message).raw());
8263
8264 LogFlowFuncLeave();
8265}
8266
8267/**
8268 * Captures USB devices that match filters of the VM.
8269 * Called at VM startup.
8270 *
8271 * @param pVM The VM handle.
8272 *
8273 * @note The caller must lock this object for writing.
8274 */
8275HRESULT Console::captureUSBDevices(PVM pVM)
8276{
8277 LogFlowThisFunc(("\n"));
8278
8279 /* sanity check */
8280 ComAssertRet(isWriteLockOnCurrentThread(), E_FAIL);
8281
8282 /* If the machine has an USB controller, ask the USB proxy service to
8283 * capture devices */
8284 PPDMIBASE pBase;
8285 int vrc = PDMR3QueryLun(pVM, "usb-ohci", 0, 0, &pBase);
8286 if (RT_SUCCESS(vrc))
8287 {
8288 /* release the lock before calling Host in VBoxSVC since Host may call
8289 * us back from under its lock (e.g. onUSBDeviceAttach()) which would
8290 * produce an inter-process dead-lock otherwise. */
8291 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
8292 alock.release();
8293
8294 HRESULT hrc = mControl->AutoCaptureUSBDevices();
8295 ComAssertComRCRetRC(hrc);
8296 }
8297 else if ( vrc == VERR_PDM_DEVICE_NOT_FOUND
8298 || vrc == VERR_PDM_DEVICE_INSTANCE_NOT_FOUND)
8299 vrc = VINF_SUCCESS;
8300 else
8301 AssertRC(vrc);
8302
8303 return RT_SUCCESS(vrc) ? S_OK : E_FAIL;
8304}
8305
8306
8307/**
8308 * Detach all USB device which are attached to the VM for the
8309 * purpose of clean up and such like.
8310 *
8311 * @note The caller must lock this object for writing.
8312 */
8313void Console::detachAllUSBDevices(bool aDone)
8314{
8315 LogFlowThisFunc(("aDone=%RTbool\n", aDone));
8316
8317 /* sanity check */
8318 AssertReturnVoid(isWriteLockOnCurrentThread());
8319
8320 mUSBDevices.clear();
8321
8322 /* release the lock before calling Host in VBoxSVC since Host may call
8323 * us back from under its lock (e.g. onUSBDeviceAttach()) which would
8324 * produce an inter-process dead-lock otherwise. */
8325 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
8326 alock.release();
8327
8328 mControl->DetachAllUSBDevices(aDone);
8329}
8330
8331/**
8332 * @note Locks this object for writing.
8333 */
8334void Console::processRemoteUSBDevices(uint32_t u32ClientId, VRDEUSBDEVICEDESC *pDevList, uint32_t cbDevList, bool fDescExt)
8335{
8336 LogFlowThisFuncEnter();
8337 LogFlowThisFunc(("u32ClientId = %d, pDevList=%p, cbDevList = %d, fDescExt = %d\n", u32ClientId, pDevList, cbDevList, fDescExt));
8338
8339 AutoCaller autoCaller(this);
8340 if (!autoCaller.isOk())
8341 {
8342 /* Console has been already uninitialized, deny request */
8343 AssertMsgFailed(("Console is already uninitialized\n"));
8344 LogFlowThisFunc(("Console is already uninitialized\n"));
8345 LogFlowThisFuncLeave();
8346 return;
8347 }
8348
8349 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
8350
8351 /*
8352 * Mark all existing remote USB devices as dirty.
8353 */
8354 for (RemoteUSBDeviceList::iterator it = mRemoteUSBDevices.begin();
8355 it != mRemoteUSBDevices.end();
8356 ++it)
8357 {
8358 (*it)->dirty(true);
8359 }
8360
8361 /*
8362 * Process the pDevList and add devices those are not already in the mRemoteUSBDevices list.
8363 */
8364 /** @todo (sunlover) REMOTE_USB Strict validation of the pDevList. */
8365 VRDEUSBDEVICEDESC *e = pDevList;
8366
8367 /* The cbDevList condition must be checked first, because the function can
8368 * receive pDevList = NULL and cbDevList = 0 on client disconnect.
8369 */
8370 while (cbDevList >= 2 && e->oNext)
8371 {
8372 /* Sanitize incoming strings in case they aren't valid UTF-8. */
8373 if (e->oManufacturer)
8374 RTStrPurgeEncoding((char *)e + e->oManufacturer);
8375 if (e->oProduct)
8376 RTStrPurgeEncoding((char *)e + e->oProduct);
8377 if (e->oSerialNumber)
8378 RTStrPurgeEncoding((char *)e + e->oSerialNumber);
8379
8380 LogFlowThisFunc(("vendor %04X, product %04X, name = %s\n",
8381 e->idVendor, e->idProduct,
8382 e->oProduct? (char *)e + e->oProduct: ""));
8383
8384 bool fNewDevice = true;
8385
8386 for (RemoteUSBDeviceList::iterator it = mRemoteUSBDevices.begin();
8387 it != mRemoteUSBDevices.end();
8388 ++it)
8389 {
8390 if ((*it)->devId() == e->id
8391 && (*it)->clientId() == u32ClientId)
8392 {
8393 /* The device is already in the list. */
8394 (*it)->dirty(false);
8395 fNewDevice = false;
8396 break;
8397 }
8398 }
8399
8400 if (fNewDevice)
8401 {
8402 LogRel(("Remote USB: ++++ Vendor %04X. Product %04X. Name = [%s].\n",
8403 e->idVendor, e->idProduct, e->oProduct? (char *)e + e->oProduct: ""));
8404
8405 /* Create the device object and add the new device to list. */
8406 ComObjPtr<RemoteUSBDevice> pUSBDevice;
8407 pUSBDevice.createObject();
8408 pUSBDevice->init(u32ClientId, e, fDescExt);
8409
8410 mRemoteUSBDevices.push_back(pUSBDevice);
8411
8412 /* Check if the device is ok for current USB filters. */
8413 BOOL fMatched = FALSE;
8414 ULONG fMaskedIfs = 0;
8415
8416 HRESULT hrc = mControl->RunUSBDeviceFilters(pUSBDevice, &fMatched, &fMaskedIfs);
8417
8418 AssertComRC(hrc);
8419
8420 LogFlowThisFunc(("USB filters return %d %#x\n", fMatched, fMaskedIfs));
8421
8422 if (fMatched)
8423 {
8424 hrc = onUSBDeviceAttach(pUSBDevice, NULL, fMaskedIfs);
8425
8426 /// @todo (r=dmik) warning reporting subsystem
8427
8428 if (hrc == S_OK)
8429 {
8430 LogFlowThisFunc(("Device attached\n"));
8431 pUSBDevice->captured(true);
8432 }
8433 }
8434 }
8435
8436 if (cbDevList < e->oNext)
8437 {
8438 LogWarningThisFunc(("cbDevList %d > oNext %d\n",
8439 cbDevList, e->oNext));
8440 break;
8441 }
8442
8443 cbDevList -= e->oNext;
8444
8445 e = (VRDEUSBDEVICEDESC *)((uint8_t *)e + e->oNext);
8446 }
8447
8448 /*
8449 * Remove dirty devices, that is those which are not reported by the server anymore.
8450 */
8451 for (;;)
8452 {
8453 ComObjPtr<RemoteUSBDevice> pUSBDevice;
8454
8455 RemoteUSBDeviceList::iterator it = mRemoteUSBDevices.begin();
8456 while (it != mRemoteUSBDevices.end())
8457 {
8458 if ((*it)->dirty())
8459 {
8460 pUSBDevice = *it;
8461 break;
8462 }
8463
8464 ++it;
8465 }
8466
8467 if (!pUSBDevice)
8468 {
8469 break;
8470 }
8471
8472 USHORT vendorId = 0;
8473 pUSBDevice->COMGETTER(VendorId)(&vendorId);
8474
8475 USHORT productId = 0;
8476 pUSBDevice->COMGETTER(ProductId)(&productId);
8477
8478 Bstr product;
8479 pUSBDevice->COMGETTER(Product)(product.asOutParam());
8480
8481 LogRel(("Remote USB: ---- Vendor %04X. Product %04X. Name = [%ls].\n",
8482 vendorId, productId, product.raw()));
8483
8484 /* Detach the device from VM. */
8485 if (pUSBDevice->captured())
8486 {
8487 Bstr uuid;
8488 pUSBDevice->COMGETTER(Id)(uuid.asOutParam());
8489 onUSBDeviceDetach(uuid.raw(), NULL);
8490 }
8491
8492 /* And remove it from the list. */
8493 mRemoteUSBDevices.erase(it);
8494 }
8495
8496 LogFlowThisFuncLeave();
8497}
8498
8499/**
8500 * Progress cancelation callback for fault tolerance VM poweron
8501 */
8502static void faultToleranceProgressCancelCallback(void *pvUser)
8503{
8504 PVM pVM = (PVM)pvUser;
8505
8506 if (pVM)
8507 FTMR3CancelStandby(pVM);
8508}
8509
8510/**
8511 * Thread function which starts the VM (also from saved state) and
8512 * track progress.
8513 *
8514 * @param Thread The thread id.
8515 * @param pvUser Pointer to a VMPowerUpTask structure.
8516 * @return VINF_SUCCESS (ignored).
8517 *
8518 * @note Locks the Console object for writing.
8519 */
8520/*static*/
8521DECLCALLBACK(int) Console::powerUpThread(RTTHREAD Thread, void *pvUser)
8522{
8523 LogFlowFuncEnter();
8524
8525 std::auto_ptr<VMPowerUpTask> task(static_cast<VMPowerUpTask *>(pvUser));
8526 AssertReturn(task.get(), VERR_INVALID_PARAMETER);
8527
8528 AssertReturn(!task->mConsole.isNull(), VERR_INVALID_PARAMETER);
8529 AssertReturn(!task->mProgress.isNull(), VERR_INVALID_PARAMETER);
8530
8531 VirtualBoxBase::initializeComForThread();
8532
8533 HRESULT rc = S_OK;
8534 int vrc = VINF_SUCCESS;
8535
8536 /* Set up a build identifier so that it can be seen from core dumps what
8537 * exact build was used to produce the core. */
8538 static char saBuildID[40];
8539 RTStrPrintf(saBuildID, sizeof(saBuildID), "%s%s%s%s VirtualBox %s r%u %s%s%s%s",
8540 "BU", "IL", "DI", "D", VBOX_VERSION_STRING, RTBldCfgRevision(), "BU", "IL", "DI", "D");
8541
8542 ComObjPtr<Console> pConsole = task->mConsole;
8543
8544 /* Note: no need to use addCaller() because VMPowerUpTask does that */
8545
8546 /* The lock is also used as a signal from the task initiator (which
8547 * releases it only after RTThreadCreate()) that we can start the job */
8548 AutoWriteLock alock(pConsole COMMA_LOCKVAL_SRC_POS);
8549
8550 /* sanity */
8551 Assert(pConsole->mpUVM == NULL);
8552
8553 try
8554 {
8555 // Create the VMM device object, which starts the HGCM thread; do this only
8556 // once for the console, for the pathological case that the same console
8557 // object is used to power up a VM twice. VirtualBox 4.0: we now do that
8558 // here instead of the Console constructor (see Console::init())
8559 if (!pConsole->m_pVMMDev)
8560 {
8561 pConsole->m_pVMMDev = new VMMDev(pConsole);
8562 AssertReturn(pConsole->m_pVMMDev, E_FAIL);
8563 }
8564
8565 /* wait for auto reset ops to complete so that we can successfully lock
8566 * the attached hard disks by calling LockMedia() below */
8567 for (VMPowerUpTask::ProgressList::const_iterator
8568 it = task->hardDiskProgresses.begin();
8569 it != task->hardDiskProgresses.end(); ++it)
8570 {
8571 HRESULT rc2 = (*it)->WaitForCompletion(-1);
8572 AssertComRC(rc2);
8573 }
8574
8575 /*
8576 * Lock attached media. This method will also check their accessibility.
8577 * If we're a teleporter, we'll have to postpone this action so we can
8578 * migrate between local processes.
8579 *
8580 * Note! The media will be unlocked automatically by
8581 * SessionMachine::setMachineState() when the VM is powered down.
8582 */
8583 if ( !task->mTeleporterEnabled
8584 && task->mEnmFaultToleranceState != FaultToleranceState_Standby)
8585 {
8586 rc = pConsole->mControl->LockMedia();
8587 if (FAILED(rc)) throw rc;
8588 }
8589
8590 /* Create the VRDP server. In case of headless operation, this will
8591 * also create the framebuffer, required at VM creation.
8592 */
8593 ConsoleVRDPServer *server = pConsole->consoleVRDPServer();
8594 Assert(server);
8595
8596 /* Does VRDP server call Console from the other thread?
8597 * Not sure (and can change), so release the lock just in case.
8598 */
8599 alock.release();
8600 vrc = server->Launch();
8601 alock.acquire();
8602
8603 if (vrc == VERR_NET_ADDRESS_IN_USE)
8604 {
8605 Utf8Str errMsg;
8606 Bstr bstr;
8607 pConsole->mVRDEServer->GetVRDEProperty(Bstr("TCP/Ports").raw(), bstr.asOutParam());
8608 Utf8Str ports = bstr;
8609 errMsg = Utf8StrFmt(tr("VirtualBox Remote Desktop Extension server can't bind to the port: %s"),
8610 ports.c_str());
8611 LogRel(("VRDE: Warning: failed to launch VRDE server (%Rrc): '%s'\n",
8612 vrc, errMsg.c_str()));
8613 }
8614 else if (vrc == VINF_NOT_SUPPORTED)
8615 {
8616 /* This means that the VRDE is not installed. */
8617 LogRel(("VRDE: VirtualBox Remote Desktop Extension is not available.\n"));
8618 }
8619 else if (RT_FAILURE(vrc))
8620 {
8621 /* Fail, if the server is installed but can't start. */
8622 Utf8Str errMsg;
8623 switch (vrc)
8624 {
8625 case VERR_FILE_NOT_FOUND:
8626 {
8627 /* VRDE library file is missing. */
8628 errMsg = Utf8StrFmt(tr("Could not find the VirtualBox Remote Desktop Extension library."));
8629 break;
8630 }
8631 default:
8632 errMsg = Utf8StrFmt(tr("Failed to launch Remote Desktop Extension server (%Rrc)"),
8633 vrc);
8634 }
8635 LogRel(("VRDE: Failed: (%Rrc), error message: '%s'\n",
8636 vrc, errMsg.c_str()));
8637 throw setErrorStatic(E_FAIL, errMsg.c_str());
8638 }
8639
8640 ComPtr<IMachine> pMachine = pConsole->machine();
8641 ULONG cCpus = 1;
8642 pMachine->COMGETTER(CPUCount)(&cCpus);
8643
8644 /*
8645 * Create the VM
8646 */
8647 PVM pVM;
8648 /*
8649 * release the lock since EMT will call Console. It's safe because
8650 * mMachineState is either Starting or Restoring state here.
8651 */
8652 alock.release();
8653
8654 vrc = VMR3Create(cCpus,
8655 pConsole->mpVmm2UserMethods,
8656 Console::genericVMSetErrorCallback,
8657 &task->mErrorMsg,
8658 task->mConfigConstructor,
8659 static_cast<Console *>(pConsole),
8660 &pVM);
8661
8662 alock.acquire();
8663
8664 /* Enable client connections to the server. */
8665 pConsole->consoleVRDPServer()->EnableConnections();
8666
8667 if (RT_SUCCESS(vrc))
8668 {
8669 do
8670 {
8671 /*
8672 * Register our load/save state file handlers
8673 */
8674 vrc = SSMR3RegisterExternal(pVM, sSSMConsoleUnit, 0 /*iInstance*/, sSSMConsoleVer, 0 /* cbGuess */,
8675 NULL, NULL, NULL,
8676 NULL, saveStateFileExec, NULL,
8677 NULL, loadStateFileExec, NULL,
8678 static_cast<Console *>(pConsole));
8679 AssertRCBreak(vrc);
8680
8681 vrc = static_cast<Console *>(pConsole)->getDisplay()->registerSSM(pVM);
8682 AssertRC(vrc);
8683 if (RT_FAILURE(vrc))
8684 break;
8685
8686 /*
8687 * Synchronize debugger settings
8688 */
8689 MachineDebugger *machineDebugger = pConsole->getMachineDebugger();
8690 if (machineDebugger)
8691 machineDebugger->flushQueuedSettings();
8692
8693 /*
8694 * Shared Folders
8695 */
8696 if (pConsole->m_pVMMDev->isShFlActive())
8697 {
8698 /* Does the code below call Console from the other thread?
8699 * Not sure, so release the lock just in case. */
8700 alock.release();
8701
8702 for (SharedFolderDataMap::const_iterator it = task->mSharedFolders.begin();
8703 it != task->mSharedFolders.end();
8704 ++it)
8705 {
8706 const SharedFolderData &d = it->second;
8707 rc = pConsole->createSharedFolder(it->first, d);
8708 if (FAILED(rc))
8709 {
8710 ErrorInfoKeeper eik;
8711 setVMRuntimeErrorCallbackF(pVM, pConsole, 0, "BrokenSharedFolder",
8712 N_("The shared folder '%s' could not be set up: %ls.\n"
8713 "The shared folder setup will not be complete. It is recommended to power down the virtual machine and fix the shared folder settings while the machine is not running"),
8714 it->first.c_str(), eik.getText().raw());
8715 }
8716 }
8717 if (FAILED(rc))
8718 rc = S_OK; // do not fail with broken shared folders
8719
8720 /* acquire the lock again */
8721 alock.acquire();
8722 }
8723
8724 /*
8725 * Capture USB devices.
8726 */
8727 rc = pConsole->captureUSBDevices(pVM);
8728 if (FAILED(rc)) break;
8729
8730 /* release the lock before a lengthy operation */
8731 alock.release();
8732
8733 /* Load saved state? */
8734 if (task->mSavedStateFile.length())
8735 {
8736 LogFlowFunc(("Restoring saved state from '%s'...\n",
8737 task->mSavedStateFile.c_str()));
8738
8739 vrc = VMR3LoadFromFile(pVM,
8740 task->mSavedStateFile.c_str(),
8741 Console::stateProgressCallback,
8742 static_cast<IProgress *>(task->mProgress));
8743
8744 if (RT_SUCCESS(vrc))
8745 {
8746 if (task->mStartPaused)
8747 /* done */
8748 pConsole->setMachineState(MachineState_Paused);
8749 else
8750 {
8751 /* Start/Resume the VM execution */
8752#ifdef VBOX_WITH_EXTPACK
8753 vrc = pConsole->mptrExtPackManager->callAllVmPowerOnHooks(pConsole, pVM);
8754#endif
8755 if (RT_SUCCESS(vrc))
8756 vrc = VMR3Resume(pVM);
8757 AssertLogRelRC(vrc);
8758 }
8759 }
8760
8761 /* Power off in case we failed loading or resuming the VM */
8762 if (RT_FAILURE(vrc))
8763 {
8764 int vrc2 = VMR3PowerOff(pVM); AssertLogRelRC(vrc2);
8765#ifdef VBOX_WITH_EXTPACK
8766 pConsole->mptrExtPackManager->callAllVmPowerOffHooks(pConsole, pVM);
8767#endif
8768 }
8769 }
8770 else if (task->mTeleporterEnabled)
8771 {
8772 /* -> ConsoleImplTeleporter.cpp */
8773 bool fPowerOffOnFailure;
8774 rc = pConsole->teleporterTrg(VMR3GetUVM(pVM), pMachine, &task->mErrorMsg, task->mStartPaused,
8775 task->mProgress, &fPowerOffOnFailure);
8776 if (FAILED(rc) && fPowerOffOnFailure)
8777 {
8778 ErrorInfoKeeper eik;
8779 int vrc2 = VMR3PowerOff(pVM); AssertLogRelRC(vrc2);
8780#ifdef VBOX_WITH_EXTPACK
8781 pConsole->mptrExtPackManager->callAllVmPowerOffHooks(pConsole, pVM);
8782#endif
8783 }
8784 }
8785 else if (task->mEnmFaultToleranceState != FaultToleranceState_Inactive)
8786 {
8787 /*
8788 * Get the config.
8789 */
8790 ULONG uPort;
8791 ULONG uInterval;
8792 Bstr bstrAddress, bstrPassword;
8793
8794 rc = pMachine->COMGETTER(FaultTolerancePort)(&uPort);
8795 if (SUCCEEDED(rc))
8796 {
8797 rc = pMachine->COMGETTER(FaultToleranceSyncInterval)(&uInterval);
8798 if (SUCCEEDED(rc))
8799 rc = pMachine->COMGETTER(FaultToleranceAddress)(bstrAddress.asOutParam());
8800 if (SUCCEEDED(rc))
8801 rc = pMachine->COMGETTER(FaultTolerancePassword)(bstrPassword.asOutParam());
8802 }
8803 if (task->mProgress->setCancelCallback(faultToleranceProgressCancelCallback, pVM))
8804 {
8805 if (SUCCEEDED(rc))
8806 {
8807 Utf8Str strAddress(bstrAddress);
8808 const char *pszAddress = strAddress.isEmpty() ? NULL : strAddress.c_str();
8809 Utf8Str strPassword(bstrPassword);
8810 const char *pszPassword = strPassword.isEmpty() ? NULL : strPassword.c_str();
8811
8812 /* Power on the FT enabled VM. */
8813#ifdef VBOX_WITH_EXTPACK
8814 vrc = pConsole->mptrExtPackManager->callAllVmPowerOnHooks(pConsole, pVM);
8815#endif
8816 if (RT_SUCCESS(vrc))
8817 vrc = FTMR3PowerOn(pVM,
8818 task->mEnmFaultToleranceState == FaultToleranceState_Master /* fMaster */,
8819 uInterval,
8820 pszAddress,
8821 uPort,
8822 pszPassword);
8823 AssertLogRelRC(vrc);
8824 }
8825 task->mProgress->setCancelCallback(NULL, NULL);
8826 }
8827 else
8828 rc = E_FAIL;
8829 }
8830 else if (task->mStartPaused)
8831 /* done */
8832 pConsole->setMachineState(MachineState_Paused);
8833 else
8834 {
8835 /* Power on the VM (i.e. start executing) */
8836#ifdef VBOX_WITH_EXTPACK
8837 vrc = pConsole->mptrExtPackManager->callAllVmPowerOnHooks(pConsole, pVM);
8838#endif
8839 if (RT_SUCCESS(vrc))
8840 vrc = VMR3PowerOn(pVM);
8841 AssertLogRelRC(vrc);
8842 }
8843
8844 /* acquire the lock again */
8845 alock.acquire();
8846 }
8847 while (0);
8848
8849 /* On failure, destroy the VM */
8850 if (FAILED(rc) || RT_FAILURE(vrc))
8851 {
8852 /* preserve existing error info */
8853 ErrorInfoKeeper eik;
8854
8855 /* powerDown() will call VMR3Destroy() and do all necessary
8856 * cleanup (VRDP, USB devices) */
8857 alock.release();
8858 HRESULT rc2 = pConsole->powerDown();
8859 alock.acquire();
8860 AssertComRC(rc2);
8861 }
8862 else
8863 {
8864 /*
8865 * Deregister the VMSetError callback. This is necessary as the
8866 * pfnVMAtError() function passed to VMR3Create() is supposed to
8867 * be sticky but our error callback isn't.
8868 */
8869 alock.release();
8870 VMR3AtErrorDeregister(pVM, Console::genericVMSetErrorCallback, &task->mErrorMsg);
8871 /** @todo register another VMSetError callback? */
8872 alock.acquire();
8873 }
8874 }
8875 else
8876 {
8877 /*
8878 * If VMR3Create() failed it has released the VM memory.
8879 */
8880 VMR3ReleaseUVM(pConsole->mpUVM);
8881 pConsole->mpUVM = NULL;
8882 }
8883
8884 if (SUCCEEDED(rc) && RT_FAILURE(vrc))
8885 {
8886 /* If VMR3Create() or one of the other calls in this function fail,
8887 * an appropriate error message has been set in task->mErrorMsg.
8888 * However since that happens via a callback, the rc status code in
8889 * this function is not updated.
8890 */
8891 if (!task->mErrorMsg.length())
8892 {
8893 /* If the error message is not set but we've got a failure,
8894 * convert the VBox status code into a meaningful error message.
8895 * This becomes unused once all the sources of errors set the
8896 * appropriate error message themselves.
8897 */
8898 AssertMsgFailed(("Missing error message during powerup for status code %Rrc\n", vrc));
8899 task->mErrorMsg = Utf8StrFmt(tr("Failed to start VM execution (%Rrc)"),
8900 vrc);
8901 }
8902
8903 /* Set the error message as the COM error.
8904 * Progress::notifyComplete() will pick it up later. */
8905 throw setErrorStatic(E_FAIL, task->mErrorMsg.c_str());
8906 }
8907 }
8908 catch (HRESULT aRC) { rc = aRC; }
8909
8910 if ( pConsole->mMachineState == MachineState_Starting
8911 || pConsole->mMachineState == MachineState_Restoring
8912 || pConsole->mMachineState == MachineState_TeleportingIn
8913 )
8914 {
8915 /* We are still in the Starting/Restoring state. This means one of:
8916 *
8917 * 1) we failed before VMR3Create() was called;
8918 * 2) VMR3Create() failed.
8919 *
8920 * In both cases, there is no need to call powerDown(), but we still
8921 * need to go back to the PoweredOff/Saved state. Reuse
8922 * vmstateChangeCallback() for that purpose.
8923 */
8924
8925 /* preserve existing error info */
8926 ErrorInfoKeeper eik;
8927
8928 Assert(pConsole->mpUVM == NULL);
8929 vmstateChangeCallback(NULL, VMSTATE_TERMINATED, VMSTATE_CREATING,
8930 pConsole);
8931 }
8932
8933 /*
8934 * Evaluate the final result. Note that the appropriate mMachineState value
8935 * is already set by vmstateChangeCallback() in all cases.
8936 */
8937
8938 /* release the lock, don't need it any more */
8939 alock.release();
8940
8941 if (SUCCEEDED(rc))
8942 {
8943 /* Notify the progress object of the success */
8944 task->mProgress->notifyComplete(S_OK);
8945 }
8946 else
8947 {
8948 /* The progress object will fetch the current error info */
8949 task->mProgress->notifyComplete(rc);
8950 LogRel(("Power up failed (vrc=%Rrc, rc=%Rhrc (%#08X))\n", vrc, rc, rc));
8951 }
8952
8953 /* Notify VBoxSVC and any waiting openRemoteSession progress object. */
8954 pConsole->mControl->EndPowerUp(rc);
8955
8956#if defined(RT_OS_WINDOWS)
8957 /* uninitialize COM */
8958 CoUninitialize();
8959#endif
8960
8961 LogFlowFuncLeave();
8962
8963 return VINF_SUCCESS;
8964}
8965
8966
8967/**
8968 * Reconfigures a medium attachment (part of taking or deleting an online snapshot).
8969 *
8970 * @param pConsole Reference to the console object.
8971 * @param pVM The VM handle.
8972 * @param lInstance The instance of the controller.
8973 * @param pcszDevice The name of the controller type.
8974 * @param enmBus The storage bus type of the controller.
8975 * @param fSetupMerge Whether to set up a medium merge
8976 * @param uMergeSource Merge source image index
8977 * @param uMergeTarget Merge target image index
8978 * @param aMediumAtt The medium attachment.
8979 * @param aMachineState The current machine state.
8980 * @param phrc Where to store com error - only valid if we return VERR_GENERAL_FAILURE.
8981 * @return VBox status code.
8982 */
8983/* static */
8984DECLCALLBACK(int) Console::reconfigureMediumAttachment(Console *pConsole,
8985 PVM pVM,
8986 const char *pcszDevice,
8987 unsigned uInstance,
8988 StorageBus_T enmBus,
8989 bool fUseHostIOCache,
8990 bool fBuiltinIoCache,
8991 bool fSetupMerge,
8992 unsigned uMergeSource,
8993 unsigned uMergeTarget,
8994 IMediumAttachment *aMediumAtt,
8995 MachineState_T aMachineState,
8996 HRESULT *phrc)
8997{
8998 LogFlowFunc(("pVM=%p aMediumAtt=%p phrc=%p\n", pVM, aMediumAtt, phrc));
8999
9000 int rc;
9001 HRESULT hrc;
9002 Bstr bstr;
9003 *phrc = S_OK;
9004#define RC_CHECK() do { if (RT_FAILURE(rc)) { AssertMsgFailed(("rc=%Rrc\n", rc)); return rc; } } while (0)
9005#define H() do { if (FAILED(hrc)) { AssertMsgFailed(("hrc=%Rhrc (%#x)\n", hrc, hrc)); *phrc = hrc; return VERR_GENERAL_FAILURE; } } while (0)
9006
9007 /* Ignore attachments other than hard disks, since at the moment they are
9008 * not subject to snapshotting in general. */
9009 DeviceType_T lType;
9010 hrc = aMediumAtt->COMGETTER(Type)(&lType); H();
9011 if (lType != DeviceType_HardDisk)
9012 return VINF_SUCCESS;
9013
9014 /* Determine the base path for the device instance. */
9015 PCFGMNODE pCtlInst;
9016 pCtlInst = CFGMR3GetChildF(CFGMR3GetRoot(pVM), "Devices/%s/%u/", pcszDevice, uInstance);
9017 AssertReturn(pCtlInst, VERR_INTERNAL_ERROR);
9018
9019 /* Update the device instance configuration. */
9020 rc = pConsole->configMediumAttachment(pCtlInst,
9021 pcszDevice,
9022 uInstance,
9023 enmBus,
9024 fUseHostIOCache,
9025 fBuiltinIoCache,
9026 fSetupMerge,
9027 uMergeSource,
9028 uMergeTarget,
9029 aMediumAtt,
9030 aMachineState,
9031 phrc,
9032 true /* fAttachDetach */,
9033 false /* fForceUnmount */,
9034 false /* fHotplug */,
9035 pVM,
9036 NULL /* paLedDevType */);
9037 /** @todo this dumps everything attached to this device instance, which
9038 * is more than necessary. Dumping the changed LUN would be enough. */
9039 CFGMR3Dump(pCtlInst);
9040 RC_CHECK();
9041
9042#undef RC_CHECK
9043#undef H
9044
9045 LogFlowFunc(("Returns success\n"));
9046 return VINF_SUCCESS;
9047}
9048
9049/**
9050 * Progress cancelation callback employed by Console::fntTakeSnapshotWorker.
9051 */
9052static void takesnapshotProgressCancelCallback(void *pvUser)
9053{
9054 PUVM pUVM = (PUVM)pvUser;
9055 SSMR3Cancel(VMR3GetVM(pUVM));
9056}
9057
9058/**
9059 * Worker thread created by Console::TakeSnapshot.
9060 * @param Thread The current thread (ignored).
9061 * @param pvUser The task.
9062 * @return VINF_SUCCESS (ignored).
9063 */
9064/*static*/
9065DECLCALLBACK(int) Console::fntTakeSnapshotWorker(RTTHREAD Thread, void *pvUser)
9066{
9067 VMTakeSnapshotTask *pTask = (VMTakeSnapshotTask*)pvUser;
9068
9069 // taking a snapshot consists of the following:
9070
9071 // 1) creating a diff image for each virtual hard disk, into which write operations go after
9072 // the snapshot has been created (done in VBoxSVC, in SessionMachine::BeginTakingSnapshot)
9073 // 2) creating a Snapshot object with the state of the machine (hardware + storage,
9074 // done in VBoxSVC, also in SessionMachine::BeginTakingSnapshot)
9075 // 3) saving the state of the virtual machine (here, in the VM process, if the machine is online)
9076
9077 Console *that = pTask->mConsole;
9078 bool fBeganTakingSnapshot = false;
9079 bool fSuspenededBySave = false;
9080
9081 AutoCaller autoCaller(that);
9082 if (FAILED(autoCaller.rc()))
9083 {
9084 that->mptrCancelableProgress.setNull();
9085 return autoCaller.rc();
9086 }
9087
9088 AutoWriteLock alock(that COMMA_LOCKVAL_SRC_POS);
9089
9090 HRESULT rc = S_OK;
9091
9092 try
9093 {
9094 /* STEP 1 + 2:
9095 * request creating the diff images on the server and create the snapshot object
9096 * (this will set the machine state to Saving on the server to block
9097 * others from accessing this machine)
9098 */
9099 rc = that->mControl->BeginTakingSnapshot(that,
9100 pTask->bstrName.raw(),
9101 pTask->bstrDescription.raw(),
9102 pTask->mProgress,
9103 pTask->fTakingSnapshotOnline,
9104 pTask->bstrSavedStateFile.asOutParam());
9105 if (FAILED(rc))
9106 throw rc;
9107
9108 fBeganTakingSnapshot = true;
9109
9110 /*
9111 * state file is non-null only when the VM is paused
9112 * (i.e. creating a snapshot online)
9113 */
9114 bool f = (!pTask->bstrSavedStateFile.isEmpty() && pTask->fTakingSnapshotOnline)
9115 || ( pTask->bstrSavedStateFile.isEmpty() && !pTask->fTakingSnapshotOnline);
9116 if (!f)
9117 throw setErrorStatic(E_FAIL, "Invalid state of saved state file");
9118
9119 /* sync the state with the server */
9120 if (pTask->lastMachineState == MachineState_Running)
9121 that->setMachineStateLocally(MachineState_LiveSnapshotting);
9122 else
9123 that->setMachineStateLocally(MachineState_Saving);
9124
9125 // STEP 3: save the VM state (if online)
9126 if (pTask->fTakingSnapshotOnline)
9127 {
9128 Utf8Str strSavedStateFile(pTask->bstrSavedStateFile);
9129
9130 SafeVMPtr ptrVM(that);
9131 if (!ptrVM.isOk())
9132 throw ptrVM.rc();
9133
9134 pTask->mProgress->SetNextOperation(Bstr(tr("Saving the machine state")).raw(),
9135 pTask->ulMemSize); // operation weight, same as computed when setting up progress object
9136 pTask->mProgress->setCancelCallback(takesnapshotProgressCancelCallback, ptrVM.rawUVM());
9137
9138 alock.release();
9139 LogFlowFunc(("VMR3Save...\n"));
9140 int vrc = VMR3Save(ptrVM,
9141 strSavedStateFile.c_str(),
9142 true /*fContinueAfterwards*/,
9143 Console::stateProgressCallback,
9144 static_cast<IProgress *>(pTask->mProgress),
9145 &fSuspenededBySave);
9146 alock.acquire();
9147 if (RT_FAILURE(vrc))
9148 throw setErrorStatic(E_FAIL,
9149 tr("Failed to save the machine state to '%s' (%Rrc)"),
9150 strSavedStateFile.c_str(), vrc);
9151
9152 pTask->mProgress->setCancelCallback(NULL, NULL);
9153 if (!pTask->mProgress->notifyPointOfNoReturn())
9154 throw setErrorStatic(E_FAIL, tr("Canceled"));
9155 that->mptrCancelableProgress.setNull();
9156
9157 // STEP 4: reattach hard disks
9158 LogFlowFunc(("Reattaching new differencing hard disks...\n"));
9159
9160 pTask->mProgress->SetNextOperation(Bstr(tr("Reconfiguring medium attachments")).raw(),
9161 1); // operation weight, same as computed when setting up progress object
9162
9163 com::SafeIfaceArray<IMediumAttachment> atts;
9164 rc = that->mMachine->COMGETTER(MediumAttachments)(ComSafeArrayAsOutParam(atts));
9165 if (FAILED(rc))
9166 throw rc;
9167
9168 for (size_t i = 0;
9169 i < atts.size();
9170 ++i)
9171 {
9172 ComPtr<IStorageController> pStorageController;
9173 Bstr controllerName;
9174 ULONG lInstance;
9175 StorageControllerType_T enmController;
9176 StorageBus_T enmBus;
9177 BOOL fUseHostIOCache;
9178
9179 /*
9180 * We can't pass a storage controller object directly
9181 * (g++ complains about not being able to pass non POD types through '...')
9182 * so we have to query needed values here and pass them.
9183 */
9184 rc = atts[i]->COMGETTER(Controller)(controllerName.asOutParam());
9185 if (FAILED(rc))
9186 throw rc;
9187
9188 rc = that->mMachine->GetStorageControllerByName(controllerName.raw(),
9189 pStorageController.asOutParam());
9190 if (FAILED(rc))
9191 throw rc;
9192
9193 rc = pStorageController->COMGETTER(ControllerType)(&enmController);
9194 if (FAILED(rc))
9195 throw rc;
9196 rc = pStorageController->COMGETTER(Instance)(&lInstance);
9197 if (FAILED(rc))
9198 throw rc;
9199 rc = pStorageController->COMGETTER(Bus)(&enmBus);
9200 if (FAILED(rc))
9201 throw rc;
9202 rc = pStorageController->COMGETTER(UseHostIOCache)(&fUseHostIOCache);
9203 if (FAILED(rc))
9204 throw rc;
9205
9206 const char *pcszDevice = Console::convertControllerTypeToDev(enmController);
9207
9208 BOOL fBuiltinIoCache;
9209 rc = that->mMachine->COMGETTER(IoCacheEnabled)(&fBuiltinIoCache);
9210 if (FAILED(rc))
9211 throw rc;
9212
9213 /*
9214 * don't release the lock since reconfigureMediumAttachment
9215 * isn't going to need the Console lock.
9216 */
9217 vrc = VMR3ReqCallWait(ptrVM,
9218 VMCPUID_ANY,
9219 (PFNRT)reconfigureMediumAttachment,
9220 13,
9221 that,
9222 ptrVM.raw(),
9223 pcszDevice,
9224 lInstance,
9225 enmBus,
9226 fUseHostIOCache,
9227 fBuiltinIoCache,
9228 false /* fSetupMerge */,
9229 0 /* uMergeSource */,
9230 0 /* uMergeTarget */,
9231 atts[i],
9232 that->mMachineState,
9233 &rc);
9234 if (RT_FAILURE(vrc))
9235 throw setErrorStatic(E_FAIL, Console::tr("%Rrc"), vrc);
9236 if (FAILED(rc))
9237 throw rc;
9238 }
9239 }
9240
9241 /*
9242 * finalize the requested snapshot object.
9243 * This will reset the machine state to the state it had right
9244 * before calling mControl->BeginTakingSnapshot().
9245 */
9246 rc = that->mControl->EndTakingSnapshot(TRUE /*aSuccess*/);
9247 // do not throw rc here because we can't call EndTakingSnapshot() twice
9248 LogFlowFunc(("EndTakingSnapshot -> %Rhrc [mMachineState=%s]\n", rc, Global::stringifyMachineState(that->mMachineState)));
9249 }
9250 catch (HRESULT rcThrown)
9251 {
9252 /* preserve existing error info */
9253 ErrorInfoKeeper eik;
9254
9255 if (fBeganTakingSnapshot)
9256 that->mControl->EndTakingSnapshot(FALSE /*aSuccess*/);
9257
9258 rc = rcThrown;
9259 LogFunc(("Caught %Rhrc [mMachineState=%s]\n", rc, Global::stringifyMachineState(that->mMachineState)));
9260 }
9261 Assert(alock.isWriteLockOnCurrentThread());
9262
9263 if (FAILED(rc)) /* Must come before calling setMachineState. */
9264 pTask->mProgress->notifyComplete(rc);
9265
9266 /*
9267 * Fix up the machine state.
9268 *
9269 * For live snapshots we do all the work, for the two other variations we
9270 * just update the local copy.
9271 */
9272 MachineState_T enmMachineState;
9273 that->mMachine->COMGETTER(State)(&enmMachineState);
9274 if ( that->mMachineState == MachineState_LiveSnapshotting
9275 || that->mMachineState == MachineState_Saving)
9276 {
9277
9278 if (!pTask->fTakingSnapshotOnline)
9279 that->setMachineStateLocally(pTask->lastMachineState);
9280 else if (SUCCEEDED(rc))
9281 {
9282 Assert( pTask->lastMachineState == MachineState_Running
9283 || pTask->lastMachineState == MachineState_Paused);
9284 Assert(that->mMachineState == MachineState_Saving);
9285 if (pTask->lastMachineState == MachineState_Running)
9286 {
9287 LogFlowFunc(("VMR3Resume...\n"));
9288 SafeVMPtr ptrVM(that);
9289 alock.release();
9290 int vrc = VMR3Resume(ptrVM);
9291 alock.acquire();
9292 if (RT_FAILURE(vrc))
9293 {
9294 rc = setErrorStatic(VBOX_E_VM_ERROR, tr("Could not resume the machine execution (%Rrc)"), vrc);
9295 pTask->mProgress->notifyComplete(rc);
9296 if (that->mMachineState == MachineState_Saving)
9297 that->setMachineStateLocally(MachineState_Paused);
9298 }
9299 }
9300 else
9301 that->setMachineStateLocally(MachineState_Paused);
9302 }
9303 else
9304 {
9305 /** @todo this could probably be made more generic and reused elsewhere. */
9306 /* paranoid cleanup on for a failed online snapshot. */
9307 VMSTATE enmVMState = VMR3GetStateU(that->mpUVM);
9308 switch (enmVMState)
9309 {
9310 case VMSTATE_RUNNING:
9311 case VMSTATE_RUNNING_LS:
9312 case VMSTATE_DEBUGGING:
9313 case VMSTATE_DEBUGGING_LS:
9314 case VMSTATE_POWERING_OFF:
9315 case VMSTATE_POWERING_OFF_LS:
9316 case VMSTATE_RESETTING:
9317 case VMSTATE_RESETTING_LS:
9318 Assert(!fSuspenededBySave);
9319 that->setMachineState(MachineState_Running);
9320 break;
9321
9322 case VMSTATE_GURU_MEDITATION:
9323 case VMSTATE_GURU_MEDITATION_LS:
9324 that->setMachineState(MachineState_Stuck);
9325 break;
9326
9327 case VMSTATE_FATAL_ERROR:
9328 case VMSTATE_FATAL_ERROR_LS:
9329 if (pTask->lastMachineState == MachineState_Paused)
9330 that->setMachineStateLocally(pTask->lastMachineState);
9331 else
9332 that->setMachineState(MachineState_Paused);
9333 break;
9334
9335 default:
9336 AssertMsgFailed(("%s\n", VMR3GetStateName(enmVMState)));
9337 case VMSTATE_SUSPENDED:
9338 case VMSTATE_SUSPENDED_LS:
9339 case VMSTATE_SUSPENDING:
9340 case VMSTATE_SUSPENDING_LS:
9341 case VMSTATE_SUSPENDING_EXT_LS:
9342 if (fSuspenededBySave)
9343 {
9344 Assert(pTask->lastMachineState == MachineState_Running);
9345 LogFlowFunc(("VMR3Resume (on failure)...\n"));
9346 SafeVMPtr ptrVM(that);
9347 alock.release();
9348 int vrc = VMR3Resume(ptrVM); AssertLogRelRC(vrc);
9349 alock.acquire();
9350 if (RT_FAILURE(vrc))
9351 that->setMachineState(MachineState_Paused);
9352 }
9353 else if (pTask->lastMachineState == MachineState_Paused)
9354 that->setMachineStateLocally(pTask->lastMachineState);
9355 else
9356 that->setMachineState(MachineState_Paused);
9357 break;
9358 }
9359
9360 }
9361 }
9362 /*else: somebody else has change the state... Leave it. */
9363
9364 /* check the remote state to see that we got it right. */
9365 that->mMachine->COMGETTER(State)(&enmMachineState);
9366 AssertLogRelMsg(that->mMachineState == enmMachineState,
9367 ("mMachineState=%s enmMachineState=%s\n", Global::stringifyMachineState(that->mMachineState),
9368 Global::stringifyMachineState(enmMachineState) ));
9369
9370
9371 if (SUCCEEDED(rc)) /* The failure cases are handled above. */
9372 pTask->mProgress->notifyComplete(rc);
9373
9374 delete pTask;
9375
9376 LogFlowFuncLeave();
9377 return VINF_SUCCESS;
9378}
9379
9380/**
9381 * Thread for executing the saved state operation.
9382 *
9383 * @param Thread The thread handle.
9384 * @param pvUser Pointer to a VMSaveTask structure.
9385 * @return VINF_SUCCESS (ignored).
9386 *
9387 * @note Locks the Console object for writing.
9388 */
9389/*static*/
9390DECLCALLBACK(int) Console::saveStateThread(RTTHREAD Thread, void *pvUser)
9391{
9392 LogFlowFuncEnter();
9393
9394 std::auto_ptr<VMSaveTask> task(static_cast<VMSaveTask*>(pvUser));
9395 AssertReturn(task.get(), VERR_INVALID_PARAMETER);
9396
9397 Assert(task->mSavedStateFile.length());
9398 Assert(task->mProgress.isNull());
9399 Assert(!task->mServerProgress.isNull());
9400
9401 const ComObjPtr<Console> &that = task->mConsole;
9402 Utf8Str errMsg;
9403 HRESULT rc = S_OK;
9404
9405 LogFlowFunc(("Saving the state to '%s'...\n", task->mSavedStateFile.c_str()));
9406
9407 bool fSuspenededBySave;
9408 int vrc = VMR3Save(task->mpVM,
9409 task->mSavedStateFile.c_str(),
9410 false, /*fContinueAfterwards*/
9411 Console::stateProgressCallback,
9412 static_cast<IProgress *>(task->mServerProgress),
9413 &fSuspenededBySave);
9414 if (RT_FAILURE(vrc))
9415 {
9416 errMsg = Utf8StrFmt(Console::tr("Failed to save the machine state to '%s' (%Rrc)"),
9417 task->mSavedStateFile.c_str(), vrc);
9418 rc = E_FAIL;
9419 }
9420 Assert(!fSuspenededBySave);
9421
9422 /* lock the console once we're going to access it */
9423 AutoWriteLock thatLock(that COMMA_LOCKVAL_SRC_POS);
9424
9425 /* synchronize the state with the server */
9426 if (SUCCEEDED(rc))
9427 {
9428 /*
9429 * The machine has been successfully saved, so power it down
9430 * (vmstateChangeCallback() will set state to Saved on success).
9431 * Note: we release the task's VM caller, otherwise it will
9432 * deadlock.
9433 */
9434 task->releaseVMCaller();
9435 thatLock.release();
9436 rc = that->powerDown();
9437 thatLock.acquire();
9438 }
9439
9440 /*
9441 * Finalize the requested save state procedure. In case of failure it will
9442 * reset the machine state to the state it had right before calling
9443 * mControl->BeginSavingState(). This must be the last thing because it
9444 * will set the progress to completed, and that means that the frontend
9445 * can immediately uninit the associated console object.
9446 */
9447 that->mControl->EndSavingState(rc, Bstr(errMsg).raw());
9448
9449 LogFlowFuncLeave();
9450 return VINF_SUCCESS;
9451}
9452
9453/**
9454 * Thread for powering down the Console.
9455 *
9456 * @param Thread The thread handle.
9457 * @param pvUser Pointer to the VMTask structure.
9458 * @return VINF_SUCCESS (ignored).
9459 *
9460 * @note Locks the Console object for writing.
9461 */
9462/*static*/
9463DECLCALLBACK(int) Console::powerDownThread(RTTHREAD Thread, void *pvUser)
9464{
9465 LogFlowFuncEnter();
9466
9467 std::auto_ptr<VMPowerDownTask> task(static_cast<VMPowerDownTask *>(pvUser));
9468 AssertReturn(task.get(), VERR_INVALID_PARAMETER);
9469
9470 AssertReturn(task->isOk(), VERR_GENERAL_FAILURE);
9471
9472 Assert(task->mProgress.isNull());
9473
9474 const ComObjPtr<Console> &that = task->mConsole;
9475
9476 /* Note: no need to use addCaller() to protect Console because VMTask does
9477 * that */
9478
9479 /* wait until the method tat started us returns */
9480 AutoWriteLock thatLock(that COMMA_LOCKVAL_SRC_POS);
9481
9482 /* release VM caller to avoid the powerDown() deadlock */
9483 task->releaseVMCaller();
9484
9485 thatLock.release();
9486
9487 that->powerDown(task->mServerProgress);
9488
9489 /* complete the operation */
9490 that->mControl->EndPoweringDown(S_OK, Bstr().raw());
9491
9492 LogFlowFuncLeave();
9493 return VINF_SUCCESS;
9494}
9495
9496
9497/**
9498 * @interface_method_impl{VMM2USERMETHODS,pfnSaveState}
9499 */
9500/*static*/ DECLCALLBACK(int)
9501Console::vmm2User_SaveState(PCVMM2USERMETHODS pThis, PUVM pUVM)
9502{
9503 Console *pConsole = ((MYVMM2USERMETHODS *)pThis)->pConsole;
9504 NOREF(pUVM);
9505
9506 /*
9507 * For now, just call SaveState. We should probably try notify the GUI so
9508 * it can pop up a progress object and stuff.
9509 */
9510 HRESULT hrc = pConsole->SaveState(NULL);
9511 return SUCCEEDED(hrc) ? VINF_SUCCESS : Global::vboxStatusCodeFromCOM(hrc);
9512}
9513
9514/**
9515 * @interface_method_impl{VMM2USERMETHODS,pfnNotifyEmtInit}
9516 */
9517/*static*/ DECLCALLBACK(void)
9518Console::vmm2User_NotifyEmtInit(PCVMM2USERMETHODS pThis, PUVM pUVM, PUVMCPU pUVCpu)
9519{
9520 NOREF(pThis); NOREF(pUVM); NOREF(pUVCpu);
9521 VirtualBoxBase::initializeComForThread();
9522}
9523
9524/**
9525 * @interface_method_impl{VMM2USERMETHODS,pfnNotifyEmtTerm}
9526 */
9527/*static*/ DECLCALLBACK(void)
9528Console::vmm2User_NotifyEmtTerm(PCVMM2USERMETHODS pThis, PUVM pUVM, PUVMCPU pUVCpu)
9529{
9530 NOREF(pThis); NOREF(pUVM); NOREF(pUVCpu);
9531 VirtualBoxBase::uninitializeComForThread();
9532}
9533
9534/**
9535 * @interface_method_impl{VMM2USERMETHODS,pfnNotifyPdmtInit}
9536 */
9537/*static*/ DECLCALLBACK(void)
9538Console::vmm2User_NotifyPdmtInit(PCVMM2USERMETHODS pThis, PUVM pUVM)
9539{
9540 NOREF(pThis); NOREF(pUVM);
9541 VirtualBoxBase::initializeComForThread();
9542}
9543
9544/**
9545 * @interface_method_impl{VMM2USERMETHODS,pfnNotifyPdmtTerm}
9546 */
9547/*static*/ DECLCALLBACK(void)
9548Console::vmm2User_NotifyPdmtTerm(PCVMM2USERMETHODS pThis, PUVM pUVM)
9549{
9550 NOREF(pThis); NOREF(pUVM);
9551 VirtualBoxBase::uninitializeComForThread();
9552}
9553
9554
9555
9556
9557/**
9558 * The Main status driver instance data.
9559 */
9560typedef struct DRVMAINSTATUS
9561{
9562 /** The LED connectors. */
9563 PDMILEDCONNECTORS ILedConnectors;
9564 /** Pointer to the LED ports interface above us. */
9565 PPDMILEDPORTS pLedPorts;
9566 /** Pointer to the array of LED pointers. */
9567 PPDMLED *papLeds;
9568 /** The unit number corresponding to the first entry in the LED array. */
9569 RTUINT iFirstLUN;
9570 /** The unit number corresponding to the last entry in the LED array.
9571 * (The size of the LED array is iLastLUN - iFirstLUN + 1.) */
9572 RTUINT iLastLUN;
9573 /** Pointer to the driver instance. */
9574 PPDMDRVINS pDrvIns;
9575 /** The Media Notify interface. */
9576 PDMIMEDIANOTIFY IMediaNotify;
9577 /** Map for translating PDM storage controller/LUN information to
9578 * IMediumAttachment references. */
9579 Console::MediumAttachmentMap *pmapMediumAttachments;
9580 /** Device name+instance for mapping */
9581 char *pszDeviceInstance;
9582 /** Pointer to the Console object, for driver triggered activities. */
9583 Console *pConsole;
9584} DRVMAINSTATUS, *PDRVMAINSTATUS;
9585
9586
9587/**
9588 * Notification about a unit which have been changed.
9589 *
9590 * The driver must discard any pointers to data owned by
9591 * the unit and requery it.
9592 *
9593 * @param pInterface Pointer to the interface structure containing the called function pointer.
9594 * @param iLUN The unit number.
9595 */
9596DECLCALLBACK(void) Console::drvStatus_UnitChanged(PPDMILEDCONNECTORS pInterface, unsigned iLUN)
9597{
9598 PDRVMAINSTATUS pData = (PDRVMAINSTATUS)((uintptr_t)pInterface - RT_OFFSETOF(DRVMAINSTATUS, ILedConnectors));
9599 if (iLUN >= pData->iFirstLUN && iLUN <= pData->iLastLUN)
9600 {
9601 PPDMLED pLed;
9602 int rc = pData->pLedPorts->pfnQueryStatusLed(pData->pLedPorts, iLUN, &pLed);
9603 if (RT_FAILURE(rc))
9604 pLed = NULL;
9605 ASMAtomicWritePtr(&pData->papLeds[iLUN - pData->iFirstLUN], pLed);
9606 Log(("drvStatus_UnitChanged: iLUN=%d pLed=%p\n", iLUN, pLed));
9607 }
9608}
9609
9610
9611/**
9612 * Notification about a medium eject.
9613 *
9614 * @returns VBox status.
9615 * @param pInterface Pointer to the interface structure containing the called function pointer.
9616 * @param uLUN The unit number.
9617 */
9618DECLCALLBACK(int) Console::drvStatus_MediumEjected(PPDMIMEDIANOTIFY pInterface, unsigned uLUN)
9619{
9620 PDRVMAINSTATUS pData = (PDRVMAINSTATUS)((uintptr_t)pInterface - RT_OFFSETOF(DRVMAINSTATUS, IMediaNotify));
9621 PPDMDRVINS pDrvIns = pData->pDrvIns;
9622 LogFunc(("uLUN=%d\n", uLUN));
9623 if (pData->pmapMediumAttachments)
9624 {
9625 AutoWriteLock alock(pData->pConsole COMMA_LOCKVAL_SRC_POS);
9626
9627 ComPtr<IMediumAttachment> pMediumAtt;
9628 Utf8Str devicePath = Utf8StrFmt("%s/LUN#%u", pData->pszDeviceInstance, uLUN);
9629 Console::MediumAttachmentMap::const_iterator end = pData->pmapMediumAttachments->end();
9630 Console::MediumAttachmentMap::const_iterator it = pData->pmapMediumAttachments->find(devicePath);
9631 if (it != end)
9632 pMediumAtt = it->second;
9633 Assert(!pMediumAtt.isNull());
9634 if (!pMediumAtt.isNull())
9635 {
9636 IMedium *pMedium = NULL;
9637 HRESULT rc = pMediumAtt->COMGETTER(Medium)(&pMedium);
9638 AssertComRC(rc);
9639 if (SUCCEEDED(rc) && pMedium)
9640 {
9641 BOOL fHostDrive = FALSE;
9642 rc = pMedium->COMGETTER(HostDrive)(&fHostDrive);
9643 AssertComRC(rc);
9644 if (!fHostDrive)
9645 {
9646 alock.release();
9647
9648 ComPtr<IMediumAttachment> pNewMediumAtt;
9649 rc = pData->pConsole->mControl->EjectMedium(pMediumAtt, pNewMediumAtt.asOutParam());
9650 if (SUCCEEDED(rc))
9651 fireMediumChangedEvent(pData->pConsole->mEventSource, pNewMediumAtt);
9652
9653 alock.acquire();
9654 if (pNewMediumAtt != pMediumAtt)
9655 {
9656 pData->pmapMediumAttachments->erase(devicePath);
9657 pData->pmapMediumAttachments->insert(std::make_pair(devicePath, pNewMediumAtt));
9658 }
9659 }
9660 }
9661 }
9662 }
9663 return VINF_SUCCESS;
9664}
9665
9666
9667/**
9668 * @interface_method_impl{PDMIBASE,pfnQueryInterface}
9669 */
9670DECLCALLBACK(void *) Console::drvStatus_QueryInterface(PPDMIBASE pInterface, const char *pszIID)
9671{
9672 PPDMDRVINS pDrvIns = PDMIBASE_2_PDMDRV(pInterface);
9673 PDRVMAINSTATUS pThis = PDMINS_2_DATA(pDrvIns, PDRVMAINSTATUS);
9674 PDMIBASE_RETURN_INTERFACE(pszIID, PDMIBASE, &pDrvIns->IBase);
9675 PDMIBASE_RETURN_INTERFACE(pszIID, PDMILEDCONNECTORS, &pThis->ILedConnectors);
9676 PDMIBASE_RETURN_INTERFACE(pszIID, PDMIMEDIANOTIFY, &pThis->IMediaNotify);
9677 return NULL;
9678}
9679
9680
9681/**
9682 * Destruct a status driver instance.
9683 *
9684 * @returns VBox status.
9685 * @param pDrvIns The driver instance data.
9686 */
9687DECLCALLBACK(void) Console::drvStatus_Destruct(PPDMDRVINS pDrvIns)
9688{
9689 PDRVMAINSTATUS pData = PDMINS_2_DATA(pDrvIns, PDRVMAINSTATUS);
9690 LogFlowFunc(("iInstance=%d\n", pDrvIns->iInstance));
9691 PDMDRV_CHECK_VERSIONS_RETURN_VOID(pDrvIns);
9692
9693 if (pData->papLeds)
9694 {
9695 unsigned iLed = pData->iLastLUN - pData->iFirstLUN + 1;
9696 while (iLed-- > 0)
9697 ASMAtomicWriteNullPtr(&pData->papLeds[iLed]);
9698 }
9699}
9700
9701
9702/**
9703 * Construct a status driver instance.
9704 *
9705 * @copydoc FNPDMDRVCONSTRUCT
9706 */
9707DECLCALLBACK(int) Console::drvStatus_Construct(PPDMDRVINS pDrvIns, PCFGMNODE pCfg, uint32_t fFlags)
9708{
9709 PDRVMAINSTATUS pData = PDMINS_2_DATA(pDrvIns, PDRVMAINSTATUS);
9710 LogFlowFunc(("iInstance=%d\n", pDrvIns->iInstance));
9711 PDMDRV_CHECK_VERSIONS_RETURN(pDrvIns);
9712
9713 /*
9714 * Validate configuration.
9715 */
9716 if (!CFGMR3AreValuesValid(pCfg, "papLeds\0pmapMediumAttachments\0DeviceInstance\0pConsole\0First\0Last\0"))
9717 return VERR_PDM_DRVINS_UNKNOWN_CFG_VALUES;
9718 AssertMsgReturn(PDMDrvHlpNoAttach(pDrvIns) == VERR_PDM_NO_ATTACHED_DRIVER,
9719 ("Configuration error: Not possible to attach anything to this driver!\n"),
9720 VERR_PDM_DRVINS_NO_ATTACH);
9721
9722 /*
9723 * Data.
9724 */
9725 pDrvIns->IBase.pfnQueryInterface = Console::drvStatus_QueryInterface;
9726 pData->ILedConnectors.pfnUnitChanged = Console::drvStatus_UnitChanged;
9727 pData->IMediaNotify.pfnEjected = Console::drvStatus_MediumEjected;
9728 pData->pDrvIns = pDrvIns;
9729 pData->pszDeviceInstance = NULL;
9730
9731 /*
9732 * Read config.
9733 */
9734 int rc = CFGMR3QueryPtr(pCfg, "papLeds", (void **)&pData->papLeds);
9735 if (RT_FAILURE(rc))
9736 {
9737 AssertMsgFailed(("Configuration error: Failed to query the \"papLeds\" value! rc=%Rrc\n", rc));
9738 return rc;
9739 }
9740
9741 rc = CFGMR3QueryPtrDef(pCfg, "pmapMediumAttachments", (void **)&pData->pmapMediumAttachments, NULL);
9742 if (RT_FAILURE(rc))
9743 {
9744 AssertMsgFailed(("Configuration error: Failed to query the \"pmapMediumAttachments\" value! rc=%Rrc\n", rc));
9745 return rc;
9746 }
9747 if (pData->pmapMediumAttachments)
9748 {
9749 rc = CFGMR3QueryStringAlloc(pCfg, "DeviceInstance", &pData->pszDeviceInstance);
9750 if (RT_FAILURE(rc))
9751 {
9752 AssertMsgFailed(("Configuration error: Failed to query the \"DeviceInstance\" value! rc=%Rrc\n", rc));
9753 return rc;
9754 }
9755 rc = CFGMR3QueryPtr(pCfg, "pConsole", (void **)&pData->pConsole);
9756 if (RT_FAILURE(rc))
9757 {
9758 AssertMsgFailed(("Configuration error: Failed to query the \"pConsole\" value! rc=%Rrc\n", rc));
9759 return rc;
9760 }
9761 }
9762
9763 rc = CFGMR3QueryU32(pCfg, "First", &pData->iFirstLUN);
9764 if (rc == VERR_CFGM_VALUE_NOT_FOUND)
9765 pData->iFirstLUN = 0;
9766 else if (RT_FAILURE(rc))
9767 {
9768 AssertMsgFailed(("Configuration error: Failed to query the \"First\" value! rc=%Rrc\n", rc));
9769 return rc;
9770 }
9771
9772 rc = CFGMR3QueryU32(pCfg, "Last", &pData->iLastLUN);
9773 if (rc == VERR_CFGM_VALUE_NOT_FOUND)
9774 pData->iLastLUN = 0;
9775 else if (RT_FAILURE(rc))
9776 {
9777 AssertMsgFailed(("Configuration error: Failed to query the \"Last\" value! rc=%Rrc\n", rc));
9778 return rc;
9779 }
9780 if (pData->iFirstLUN > pData->iLastLUN)
9781 {
9782 AssertMsgFailed(("Configuration error: Invalid unit range %u-%u\n", pData->iFirstLUN, pData->iLastLUN));
9783 return VERR_GENERAL_FAILURE;
9784 }
9785
9786 /*
9787 * Get the ILedPorts interface of the above driver/device and
9788 * query the LEDs we want.
9789 */
9790 pData->pLedPorts = PDMIBASE_QUERY_INTERFACE(pDrvIns->pUpBase, PDMILEDPORTS);
9791 AssertMsgReturn(pData->pLedPorts, ("Configuration error: No led ports interface above!\n"),
9792 VERR_PDM_MISSING_INTERFACE_ABOVE);
9793
9794 for (unsigned i = pData->iFirstLUN; i <= pData->iLastLUN; ++i)
9795 Console::drvStatus_UnitChanged(&pData->ILedConnectors, i);
9796
9797 return VINF_SUCCESS;
9798}
9799
9800
9801/**
9802 * Console status driver (LED) registration record.
9803 */
9804const PDMDRVREG Console::DrvStatusReg =
9805{
9806 /* u32Version */
9807 PDM_DRVREG_VERSION,
9808 /* szName */
9809 "MainStatus",
9810 /* szRCMod */
9811 "",
9812 /* szR0Mod */
9813 "",
9814 /* pszDescription */
9815 "Main status driver (Main as in the API).",
9816 /* fFlags */
9817 PDM_DRVREG_FLAGS_HOST_BITS_DEFAULT,
9818 /* fClass. */
9819 PDM_DRVREG_CLASS_STATUS,
9820 /* cMaxInstances */
9821 ~0U,
9822 /* cbInstance */
9823 sizeof(DRVMAINSTATUS),
9824 /* pfnConstruct */
9825 Console::drvStatus_Construct,
9826 /* pfnDestruct */
9827 Console::drvStatus_Destruct,
9828 /* pfnRelocate */
9829 NULL,
9830 /* pfnIOCtl */
9831 NULL,
9832 /* pfnPowerOn */
9833 NULL,
9834 /* pfnReset */
9835 NULL,
9836 /* pfnSuspend */
9837 NULL,
9838 /* pfnResume */
9839 NULL,
9840 /* pfnAttach */
9841 NULL,
9842 /* pfnDetach */
9843 NULL,
9844 /* pfnPowerOff */
9845 NULL,
9846 /* pfnSoftReset */
9847 NULL,
9848 /* u32EndVersion */
9849 PDM_DRVREG_VERSION
9850};
9851
9852/* vi: set tabstop=4 shiftwidth=4 expandtab: */
Note: See TracBrowser for help on using the repository browser.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette