VirtualBox

source: vbox/trunk/src/VBox/Main/src-server/MediumImpl.cpp@ 69734

Last change on this file since 69734 was 69500, checked in by vboxsync, 7 years ago

*: scm --update-copyright-year

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 351.6 KB
Line 
1/* $Id: MediumImpl.cpp 69500 2017-10-28 15:14:05Z vboxsync $ */
2/** @file
3 * VirtualBox COM class implementation
4 */
5
6/*
7 * Copyright (C) 2008-2017 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17#include "MediumImpl.h"
18#include "TokenImpl.h"
19#include "ProgressImpl.h"
20#include "SystemPropertiesImpl.h"
21#include "VirtualBoxImpl.h"
22#include "ExtPackManagerImpl.h"
23
24#include "AutoCaller.h"
25#include "Logging.h"
26#include "ThreadTask.h"
27#include "VBox/com/MultiResult.h"
28#include "VBox/com/ErrorInfo.h"
29
30#include <VBox/err.h>
31#include <VBox/settings.h>
32
33#include <iprt/param.h>
34#include <iprt/path.h>
35#include <iprt/file.h>
36#include <iprt/tcp.h>
37#include <iprt/cpp/utils.h>
38#include <iprt/memsafer.h>
39#include <iprt/base64.h>
40
41#include <VBox/vd.h>
42
43#include <algorithm>
44#include <list>
45
46
47typedef std::list<Guid> GuidList;
48
49
50#ifdef VBOX_WITH_EXTPACK
51static const char g_szVDPlugin[] = "VDPluginCrypt";
52#endif
53
54
55////////////////////////////////////////////////////////////////////////////////
56//
57// Medium data definition
58//
59////////////////////////////////////////////////////////////////////////////////
60
61/** Describes how a machine refers to this medium. */
62struct BackRef
63{
64 /** Equality predicate for stdc++. */
65 struct EqualsTo : public std::unary_function <BackRef, bool>
66 {
67 explicit EqualsTo(const Guid &aMachineId) : machineId(aMachineId) {}
68
69 bool operator()(const argument_type &aThat) const
70 {
71 return aThat.machineId == machineId;
72 }
73
74 const Guid machineId;
75 };
76
77 BackRef(const Guid &aMachineId,
78 const Guid &aSnapshotId = Guid::Empty)
79 : machineId(aMachineId),
80 fInCurState(aSnapshotId.isZero())
81 {
82 if (aSnapshotId.isValid() && !aSnapshotId.isZero())
83 llSnapshotIds.push_back(aSnapshotId);
84 }
85
86 Guid machineId;
87 bool fInCurState : 1;
88 GuidList llSnapshotIds;
89};
90
91typedef std::list<BackRef> BackRefList;
92
93struct Medium::Data
94{
95 Data()
96 : pVirtualBox(NULL),
97 state(MediumState_NotCreated),
98 variant(MediumVariant_Standard),
99 size(0),
100 readers(0),
101 preLockState(MediumState_NotCreated),
102 queryInfoSem(LOCKCLASS_MEDIUMQUERY),
103 queryInfoRunning(false),
104 type(MediumType_Normal),
105 devType(DeviceType_HardDisk),
106 logicalSize(0),
107 hddOpenMode(OpenReadWrite),
108 autoReset(false),
109 hostDrive(false),
110 implicit(false),
111 fClosing(false),
112 uOpenFlagsDef(VD_OPEN_FLAGS_IGNORE_FLUSH),
113 numCreateDiffTasks(0),
114 vdDiskIfaces(NULL),
115 vdImageIfaces(NULL),
116 fMoveThisMedium(false)
117 { }
118
119 /** weak VirtualBox parent */
120 VirtualBox * const pVirtualBox;
121
122 // pParent and llChildren are protected by VirtualBox::i_getMediaTreeLockHandle()
123 ComObjPtr<Medium> pParent;
124 MediaList llChildren; // to add a child, just call push_back; to remove
125 // a child, call child->deparent() which does a lookup
126
127 GuidList llRegistryIDs; // media registries in which this medium is listed
128
129 const Guid id;
130 Utf8Str strDescription;
131 MediumState_T state;
132 MediumVariant_T variant;
133 Utf8Str strLocationFull;
134 uint64_t size;
135 Utf8Str strLastAccessError;
136
137 BackRefList backRefs;
138
139 size_t readers;
140 MediumState_T preLockState;
141
142 /** Special synchronization for operations which must wait for
143 * Medium::i_queryInfo in another thread to complete. Using a SemRW is
144 * not quite ideal, but at least it is subject to the lock validator,
145 * unlike the SemEventMulti which we had here for many years. Catching
146 * possible deadlocks is more important than a tiny bit of efficiency. */
147 RWLockHandle queryInfoSem;
148 bool queryInfoRunning : 1;
149
150 const Utf8Str strFormat;
151 ComObjPtr<MediumFormat> formatObj;
152
153 MediumType_T type;
154 DeviceType_T devType;
155 uint64_t logicalSize;
156
157 HDDOpenMode hddOpenMode;
158
159 bool autoReset : 1;
160
161 /** New UUID to be set on the next Medium::i_queryInfo call. */
162 const Guid uuidImage;
163 /** New parent UUID to be set on the next Medium::i_queryInfo call. */
164 const Guid uuidParentImage;
165
166 bool hostDrive : 1;
167
168 settings::StringsMap mapProperties;
169
170 bool implicit : 1;
171 /** Flag whether the medium is in the process of being closed. */
172 bool fClosing: 1;
173
174 /** Default flags passed to VDOpen(). */
175 unsigned uOpenFlagsDef;
176
177 uint32_t numCreateDiffTasks;
178
179 Utf8Str vdError; /*< Error remembered by the VD error callback. */
180
181 VDINTERFACEERROR vdIfError;
182
183 VDINTERFACECONFIG vdIfConfig;
184
185 VDINTERFACETCPNET vdIfTcpNet;
186
187 PVDINTERFACE vdDiskIfaces;
188 PVDINTERFACE vdImageIfaces;
189
190 /** Flag if the medium is going to move to a new
191 * location. */
192 bool fMoveThisMedium;
193 /** new location path */
194 Utf8Str strNewLocationFull;
195};
196
197typedef struct VDSOCKETINT
198{
199 /** Socket handle. */
200 RTSOCKET hSocket;
201} VDSOCKETINT, *PVDSOCKETINT;
202
203////////////////////////////////////////////////////////////////////////////////
204//
205// Globals
206//
207////////////////////////////////////////////////////////////////////////////////
208
209/**
210 * Medium::Task class for asynchronous operations.
211 *
212 * @note Instances of this class must be created using new() because the
213 * task thread function will delete them when the task is complete.
214 *
215 * @note The constructor of this class adds a caller on the managed Medium
216 * object which is automatically released upon destruction.
217 */
218class Medium::Task : public ThreadTask
219{
220public:
221 Task(Medium *aMedium, Progress *aProgress)
222 : ThreadTask("Medium::Task"),
223 mVDOperationIfaces(NULL),
224 mMedium(aMedium),
225 mMediumCaller(aMedium),
226 mProgress(aProgress),
227 mVirtualBoxCaller(NULL)
228 {
229 AssertReturnVoidStmt(aMedium, mRC = E_FAIL);
230 mRC = mMediumCaller.rc();
231 if (FAILED(mRC))
232 return;
233
234 /* Get strong VirtualBox reference, see below. */
235 VirtualBox *pVirtualBox = aMedium->m->pVirtualBox;
236 mVirtualBox = pVirtualBox;
237 mVirtualBoxCaller.attach(pVirtualBox);
238 mRC = mVirtualBoxCaller.rc();
239 if (FAILED(mRC))
240 return;
241
242 /* Set up a per-operation progress interface, can be used freely (for
243 * binary operations you can use it either on the source or target). */
244 if (mProgress)
245 {
246 mVDIfProgress.pfnProgress = aProgress->i_vdProgressCallback;
247 int vrc = VDInterfaceAdd(&mVDIfProgress.Core,
248 "Medium::Task::vdInterfaceProgress",
249 VDINTERFACETYPE_PROGRESS,
250 mProgress,
251 sizeof(mVDIfProgress),
252 &mVDOperationIfaces);
253 AssertRC(vrc);
254 if (RT_FAILURE(vrc))
255 mRC = E_FAIL;
256 }
257 }
258
259 // Make all destructors virtual. Just in case.
260 virtual ~Task()
261 {
262 /* send the notification of completion.*/
263 if ( isAsync()
264 && !mProgress.isNull())
265 mProgress->i_notifyComplete(mRC);
266 }
267
268 HRESULT rc() const { return mRC; }
269 bool isOk() const { return SUCCEEDED(rc()); }
270
271 const ComPtr<Progress>& GetProgressObject() const {return mProgress;}
272
273 /**
274 * Runs Medium::Task::executeTask() on the current thread
275 * instead of creating a new one.
276 */
277 HRESULT runNow()
278 {
279 LogFlowFuncEnter();
280
281 mRC = executeTask();
282
283 LogFlowFunc(("rc=%Rhrc\n", mRC));
284 LogFlowFuncLeave();
285 return mRC;
286 }
287
288 /**
289 * Implementation code for the "create base" task.
290 * Used as function for execution from a standalone thread.
291 */
292 void handler()
293 {
294 LogFlowFuncEnter();
295 try
296 {
297 mRC = executeTask(); /* (destructor picks up mRC, see above) */
298 LogFlowFunc(("rc=%Rhrc\n", mRC));
299 }
300 catch (...)
301 {
302 LogRel(("Some exception in the function Medium::Task:handler()\n"));
303 }
304
305 LogFlowFuncLeave();
306 }
307
308 PVDINTERFACE mVDOperationIfaces;
309
310 const ComObjPtr<Medium> mMedium;
311 AutoCaller mMediumCaller;
312
313protected:
314 HRESULT mRC;
315
316private:
317 virtual HRESULT executeTask() = 0;
318
319 const ComObjPtr<Progress> mProgress;
320
321 VDINTERFACEPROGRESS mVDIfProgress;
322
323 /* Must have a strong VirtualBox reference during a task otherwise the
324 * reference count might drop to 0 while a task is still running. This
325 * would result in weird behavior, including deadlocks due to uninit and
326 * locking order issues. The deadlock often is not detectable because the
327 * uninit uses event semaphores which sabotages deadlock detection. */
328 ComObjPtr<VirtualBox> mVirtualBox;
329 AutoCaller mVirtualBoxCaller;
330};
331
332HRESULT Medium::Task::executeTask()
333{
334 return E_NOTIMPL;//ReturnComNotImplemented()
335}
336
337class Medium::CreateBaseTask : public Medium::Task
338{
339public:
340 CreateBaseTask(Medium *aMedium,
341 Progress *aProgress,
342 uint64_t aSize,
343 MediumVariant_T aVariant)
344 : Medium::Task(aMedium, aProgress),
345 mSize(aSize),
346 mVariant(aVariant)
347 {
348 m_strTaskName = "createBase";
349 }
350
351 uint64_t mSize;
352 MediumVariant_T mVariant;
353
354private:
355 HRESULT executeTask();
356};
357
358class Medium::CreateDiffTask : public Medium::Task
359{
360public:
361 CreateDiffTask(Medium *aMedium,
362 Progress *aProgress,
363 Medium *aTarget,
364 MediumVariant_T aVariant,
365 MediumLockList *aMediumLockList,
366 bool fKeepMediumLockList = false)
367 : Medium::Task(aMedium, aProgress),
368 mpMediumLockList(aMediumLockList),
369 mTarget(aTarget),
370 mVariant(aVariant),
371 mTargetCaller(aTarget),
372 mfKeepMediumLockList(fKeepMediumLockList)
373 {
374 AssertReturnVoidStmt(aTarget != NULL, mRC = E_FAIL);
375 mRC = mTargetCaller.rc();
376 if (FAILED(mRC))
377 return;
378 m_strTaskName = "createDiff";
379 }
380
381 ~CreateDiffTask()
382 {
383 if (!mfKeepMediumLockList && mpMediumLockList)
384 delete mpMediumLockList;
385 }
386
387 MediumLockList *mpMediumLockList;
388
389 const ComObjPtr<Medium> mTarget;
390 MediumVariant_T mVariant;
391
392private:
393 HRESULT executeTask();
394 AutoCaller mTargetCaller;
395 bool mfKeepMediumLockList;
396};
397
398class Medium::CloneTask : public Medium::Task
399{
400public:
401 CloneTask(Medium *aMedium,
402 Progress *aProgress,
403 Medium *aTarget,
404 MediumVariant_T aVariant,
405 Medium *aParent,
406 uint32_t idxSrcImageSame,
407 uint32_t idxDstImageSame,
408 MediumLockList *aSourceMediumLockList,
409 MediumLockList *aTargetMediumLockList,
410 bool fKeepSourceMediumLockList = false,
411 bool fKeepTargetMediumLockList = false)
412 : Medium::Task(aMedium, aProgress),
413 mTarget(aTarget),
414 mParent(aParent),
415 mpSourceMediumLockList(aSourceMediumLockList),
416 mpTargetMediumLockList(aTargetMediumLockList),
417 mVariant(aVariant),
418 midxSrcImageSame(idxSrcImageSame),
419 midxDstImageSame(idxDstImageSame),
420 mTargetCaller(aTarget),
421 mParentCaller(aParent),
422 mfKeepSourceMediumLockList(fKeepSourceMediumLockList),
423 mfKeepTargetMediumLockList(fKeepTargetMediumLockList)
424 {
425 AssertReturnVoidStmt(aTarget != NULL, mRC = E_FAIL);
426 mRC = mTargetCaller.rc();
427 if (FAILED(mRC))
428 return;
429 /* aParent may be NULL */
430 mRC = mParentCaller.rc();
431 if (FAILED(mRC))
432 return;
433 AssertReturnVoidStmt(aSourceMediumLockList != NULL, mRC = E_FAIL);
434 AssertReturnVoidStmt(aTargetMediumLockList != NULL, mRC = E_FAIL);
435 m_strTaskName = "createClone";
436 }
437
438 ~CloneTask()
439 {
440 if (!mfKeepSourceMediumLockList && mpSourceMediumLockList)
441 delete mpSourceMediumLockList;
442 if (!mfKeepTargetMediumLockList && mpTargetMediumLockList)
443 delete mpTargetMediumLockList;
444 }
445
446 const ComObjPtr<Medium> mTarget;
447 const ComObjPtr<Medium> mParent;
448 MediumLockList *mpSourceMediumLockList;
449 MediumLockList *mpTargetMediumLockList;
450 MediumVariant_T mVariant;
451 uint32_t midxSrcImageSame;
452 uint32_t midxDstImageSame;
453
454private:
455 HRESULT executeTask();
456 AutoCaller mTargetCaller;
457 AutoCaller mParentCaller;
458 bool mfKeepSourceMediumLockList;
459 bool mfKeepTargetMediumLockList;
460};
461
462class Medium::MoveTask : public Medium::Task
463{
464public:
465 MoveTask(Medium *aMedium,
466 Progress *aProgress,
467 MediumVariant_T aVariant,
468 MediumLockList *aMediumLockList,
469 bool fKeepMediumLockList = false)
470 : Medium::Task(aMedium, aProgress),
471 mpMediumLockList(aMediumLockList),
472 mVariant(aVariant),
473 mfKeepMediumLockList(fKeepMediumLockList)
474 {
475 AssertReturnVoidStmt(aMediumLockList != NULL, mRC = E_FAIL);
476 m_strTaskName = "createMove";
477 }
478
479 ~MoveTask()
480 {
481 if (!mfKeepMediumLockList && mpMediumLockList)
482 delete mpMediumLockList;
483 }
484
485 MediumLockList *mpMediumLockList;
486 MediumVariant_T mVariant;
487
488private:
489 HRESULT executeTask();
490 bool mfKeepMediumLockList;
491};
492
493class Medium::CompactTask : public Medium::Task
494{
495public:
496 CompactTask(Medium *aMedium,
497 Progress *aProgress,
498 MediumLockList *aMediumLockList,
499 bool fKeepMediumLockList = false)
500 : Medium::Task(aMedium, aProgress),
501 mpMediumLockList(aMediumLockList),
502 mfKeepMediumLockList(fKeepMediumLockList)
503 {
504 AssertReturnVoidStmt(aMediumLockList != NULL, mRC = E_FAIL);
505 m_strTaskName = "createCompact";
506 }
507
508 ~CompactTask()
509 {
510 if (!mfKeepMediumLockList && mpMediumLockList)
511 delete mpMediumLockList;
512 }
513
514 MediumLockList *mpMediumLockList;
515
516private:
517 HRESULT executeTask();
518 bool mfKeepMediumLockList;
519};
520
521class Medium::ResizeTask : public Medium::Task
522{
523public:
524 ResizeTask(Medium *aMedium,
525 uint64_t aSize,
526 Progress *aProgress,
527 MediumLockList *aMediumLockList,
528 bool fKeepMediumLockList = false)
529 : Medium::Task(aMedium, aProgress),
530 mSize(aSize),
531 mpMediumLockList(aMediumLockList),
532 mfKeepMediumLockList(fKeepMediumLockList)
533 {
534 AssertReturnVoidStmt(aMediumLockList != NULL, mRC = E_FAIL);
535 m_strTaskName = "createResize";
536 }
537
538 ~ResizeTask()
539 {
540 if (!mfKeepMediumLockList && mpMediumLockList)
541 delete mpMediumLockList;
542 }
543
544 uint64_t mSize;
545 MediumLockList *mpMediumLockList;
546
547private:
548 HRESULT executeTask();
549 bool mfKeepMediumLockList;
550};
551
552class Medium::ResetTask : public Medium::Task
553{
554public:
555 ResetTask(Medium *aMedium,
556 Progress *aProgress,
557 MediumLockList *aMediumLockList,
558 bool fKeepMediumLockList = false)
559 : Medium::Task(aMedium, aProgress),
560 mpMediumLockList(aMediumLockList),
561 mfKeepMediumLockList(fKeepMediumLockList)
562 {
563 m_strTaskName = "createReset";
564 }
565
566 ~ResetTask()
567 {
568 if (!mfKeepMediumLockList && mpMediumLockList)
569 delete mpMediumLockList;
570 }
571
572 MediumLockList *mpMediumLockList;
573
574private:
575 HRESULT executeTask();
576 bool mfKeepMediumLockList;
577};
578
579class Medium::DeleteTask : public Medium::Task
580{
581public:
582 DeleteTask(Medium *aMedium,
583 Progress *aProgress,
584 MediumLockList *aMediumLockList,
585 bool fKeepMediumLockList = false)
586 : Medium::Task(aMedium, aProgress),
587 mpMediumLockList(aMediumLockList),
588 mfKeepMediumLockList(fKeepMediumLockList)
589 {
590 m_strTaskName = "createDelete";
591 }
592
593 ~DeleteTask()
594 {
595 if (!mfKeepMediumLockList && mpMediumLockList)
596 delete mpMediumLockList;
597 }
598
599 MediumLockList *mpMediumLockList;
600
601private:
602 HRESULT executeTask();
603 bool mfKeepMediumLockList;
604};
605
606class Medium::MergeTask : public Medium::Task
607{
608public:
609 MergeTask(Medium *aMedium,
610 Medium *aTarget,
611 bool fMergeForward,
612 Medium *aParentForTarget,
613 MediumLockList *aChildrenToReparent,
614 Progress *aProgress,
615 MediumLockList *aMediumLockList,
616 bool fKeepMediumLockList = false)
617 : Medium::Task(aMedium, aProgress),
618 mTarget(aTarget),
619 mfMergeForward(fMergeForward),
620 mParentForTarget(aParentForTarget),
621 mpChildrenToReparent(aChildrenToReparent),
622 mpMediumLockList(aMediumLockList),
623 mTargetCaller(aTarget),
624 mParentForTargetCaller(aParentForTarget),
625 mfKeepMediumLockList(fKeepMediumLockList)
626 {
627 AssertReturnVoidStmt(aMediumLockList != NULL, mRC = E_FAIL);
628 m_strTaskName = "createMerge";
629 }
630
631 ~MergeTask()
632 {
633 if (!mfKeepMediumLockList && mpMediumLockList)
634 delete mpMediumLockList;
635 if (mpChildrenToReparent)
636 delete mpChildrenToReparent;
637 }
638
639 const ComObjPtr<Medium> mTarget;
640 bool mfMergeForward;
641 /* When mpChildrenToReparent is null then mParentForTarget is non-null and
642 * vice versa. In other words: they are used in different cases. */
643 const ComObjPtr<Medium> mParentForTarget;
644 MediumLockList *mpChildrenToReparent;
645 MediumLockList *mpMediumLockList;
646
647private:
648 HRESULT executeTask();
649 AutoCaller mTargetCaller;
650 AutoCaller mParentForTargetCaller;
651 bool mfKeepMediumLockList;
652};
653
654class Medium::ImportTask : public Medium::Task
655{
656public:
657 ImportTask(Medium *aMedium,
658 Progress *aProgress,
659 const char *aFilename,
660 MediumFormat *aFormat,
661 MediumVariant_T aVariant,
662 RTVFSIOSTREAM aVfsIosSrc,
663 Medium *aParent,
664 MediumLockList *aTargetMediumLockList,
665 bool fKeepTargetMediumLockList = false)
666 : Medium::Task(aMedium, aProgress),
667 mFilename(aFilename),
668 mFormat(aFormat),
669 mVariant(aVariant),
670 mParent(aParent),
671 mpTargetMediumLockList(aTargetMediumLockList),
672 mpVfsIoIf(NULL),
673 mParentCaller(aParent),
674 mfKeepTargetMediumLockList(fKeepTargetMediumLockList)
675 {
676 AssertReturnVoidStmt(aTargetMediumLockList != NULL, mRC = E_FAIL);
677 /* aParent may be NULL */
678 mRC = mParentCaller.rc();
679 if (FAILED(mRC))
680 return;
681
682 mVDImageIfaces = aMedium->m->vdImageIfaces;
683
684 int vrc = VDIfCreateFromVfsStream(aVfsIosSrc, RTFILE_O_READ, &mpVfsIoIf);
685 AssertRCReturnVoidStmt(vrc, mRC = E_FAIL);
686
687 vrc = VDInterfaceAdd(&mpVfsIoIf->Core, "Medium::ImportTaskVfsIos",
688 VDINTERFACETYPE_IO, mpVfsIoIf,
689 sizeof(VDINTERFACEIO), &mVDImageIfaces);
690 AssertRCReturnVoidStmt(vrc, mRC = E_FAIL);
691 m_strTaskName = "createImport";
692 }
693
694 ~ImportTask()
695 {
696 if (!mfKeepTargetMediumLockList && mpTargetMediumLockList)
697 delete mpTargetMediumLockList;
698 if (mpVfsIoIf)
699 {
700 VDIfDestroyFromVfsStream(mpVfsIoIf);
701 mpVfsIoIf = NULL;
702 }
703 }
704
705 Utf8Str mFilename;
706 ComObjPtr<MediumFormat> mFormat;
707 MediumVariant_T mVariant;
708 const ComObjPtr<Medium> mParent;
709 MediumLockList *mpTargetMediumLockList;
710 PVDINTERFACE mVDImageIfaces;
711 PVDINTERFACEIO mpVfsIoIf; /**< Pointer to the VFS I/O stream to VD I/O interface wrapper. */
712
713private:
714 HRESULT executeTask();
715 AutoCaller mParentCaller;
716 bool mfKeepTargetMediumLockList;
717};
718
719class Medium::EncryptTask : public Medium::Task
720{
721public:
722 EncryptTask(Medium *aMedium,
723 const com::Utf8Str &strNewPassword,
724 const com::Utf8Str &strCurrentPassword,
725 const com::Utf8Str &strCipher,
726 const com::Utf8Str &strNewPasswordId,
727 Progress *aProgress,
728 MediumLockList *aMediumLockList)
729 : Medium::Task(aMedium, aProgress),
730 mstrNewPassword(strNewPassword),
731 mstrCurrentPassword(strCurrentPassword),
732 mstrCipher(strCipher),
733 mstrNewPasswordId(strNewPasswordId),
734 mpMediumLockList(aMediumLockList)
735 {
736 AssertReturnVoidStmt(aMediumLockList != NULL, mRC = E_FAIL);
737 /* aParent may be NULL */
738 mRC = mParentCaller.rc();
739 if (FAILED(mRC))
740 return;
741
742 mVDImageIfaces = aMedium->m->vdImageIfaces;
743 m_strTaskName = "createEncrypt";
744 }
745
746 ~EncryptTask()
747 {
748 if (mstrNewPassword.length())
749 RTMemWipeThoroughly(mstrNewPassword.mutableRaw(), mstrNewPassword.length(), 10 /* cPasses */);
750 if (mstrCurrentPassword.length())
751 RTMemWipeThoroughly(mstrCurrentPassword.mutableRaw(), mstrCurrentPassword.length(), 10 /* cPasses */);
752
753 /* Keep any errors which might be set when deleting the lock list. */
754 ErrorInfoKeeper eik;
755 delete mpMediumLockList;
756 }
757
758 Utf8Str mstrNewPassword;
759 Utf8Str mstrCurrentPassword;
760 Utf8Str mstrCipher;
761 Utf8Str mstrNewPasswordId;
762 MediumLockList *mpMediumLockList;
763 PVDINTERFACE mVDImageIfaces;
764
765private:
766 HRESULT executeTask();
767 AutoCaller mParentCaller;
768};
769
770/**
771 * Settings for a crypto filter instance.
772 */
773struct Medium::CryptoFilterSettings
774{
775 CryptoFilterSettings()
776 : fCreateKeyStore(false),
777 pszPassword(NULL),
778 pszKeyStore(NULL),
779 pszKeyStoreLoad(NULL),
780 pbDek(NULL),
781 cbDek(0),
782 pszCipher(NULL),
783 pszCipherReturned(NULL)
784 { }
785
786 bool fCreateKeyStore;
787 const char *pszPassword;
788 char *pszKeyStore;
789 const char *pszKeyStoreLoad;
790
791 const uint8_t *pbDek;
792 size_t cbDek;
793 const char *pszCipher;
794
795 /** The cipher returned by the crypto filter. */
796 char *pszCipherReturned;
797
798 PVDINTERFACE vdFilterIfaces;
799
800 VDINTERFACECONFIG vdIfCfg;
801 VDINTERFACECRYPTO vdIfCrypto;
802};
803
804/**
805 * Implementation code for the "create base" task.
806 */
807HRESULT Medium::CreateBaseTask::executeTask()
808{
809 return mMedium->i_taskCreateBaseHandler(*this);
810}
811
812/**
813 * Implementation code for the "create diff" task.
814 */
815HRESULT Medium::CreateDiffTask::executeTask()
816{
817 return mMedium->i_taskCreateDiffHandler(*this);
818}
819
820/**
821 * Implementation code for the "clone" task.
822 */
823HRESULT Medium::CloneTask::executeTask()
824{
825 return mMedium->i_taskCloneHandler(*this);
826}
827
828/**
829 * Implementation code for the "move" task.
830 */
831HRESULT Medium::MoveTask::executeTask()
832{
833 return mMedium->i_taskMoveHandler(*this);
834}
835
836/**
837 * Implementation code for the "compact" task.
838 */
839HRESULT Medium::CompactTask::executeTask()
840{
841 return mMedium->i_taskCompactHandler(*this);
842}
843
844/**
845 * Implementation code for the "resize" task.
846 */
847HRESULT Medium::ResizeTask::executeTask()
848{
849 return mMedium->i_taskResizeHandler(*this);
850}
851
852
853/**
854 * Implementation code for the "reset" task.
855 */
856HRESULT Medium::ResetTask::executeTask()
857{
858 return mMedium->i_taskResetHandler(*this);
859}
860
861/**
862 * Implementation code for the "delete" task.
863 */
864HRESULT Medium::DeleteTask::executeTask()
865{
866 return mMedium->i_taskDeleteHandler(*this);
867}
868
869/**
870 * Implementation code for the "merge" task.
871 */
872HRESULT Medium::MergeTask::executeTask()
873{
874 return mMedium->i_taskMergeHandler(*this);
875}
876
877/**
878 * Implementation code for the "import" task.
879 */
880HRESULT Medium::ImportTask::executeTask()
881{
882 return mMedium->i_taskImportHandler(*this);
883}
884
885/**
886 * Implementation code for the "encrypt" task.
887 */
888HRESULT Medium::EncryptTask::executeTask()
889{
890 return mMedium->i_taskEncryptHandler(*this);
891}
892
893////////////////////////////////////////////////////////////////////////////////
894//
895// Medium constructor / destructor
896//
897////////////////////////////////////////////////////////////////////////////////
898
899DEFINE_EMPTY_CTOR_DTOR(Medium)
900
901HRESULT Medium::FinalConstruct()
902{
903 m = new Data;
904
905 /* Initialize the callbacks of the VD error interface */
906 m->vdIfError.pfnError = i_vdErrorCall;
907 m->vdIfError.pfnMessage = NULL;
908
909 /* Initialize the callbacks of the VD config interface */
910 m->vdIfConfig.pfnAreKeysValid = i_vdConfigAreKeysValid;
911 m->vdIfConfig.pfnQuerySize = i_vdConfigQuerySize;
912 m->vdIfConfig.pfnQuery = i_vdConfigQuery;
913 m->vdIfConfig.pfnQueryBytes = NULL;
914
915 /* Initialize the callbacks of the VD TCP interface (we always use the host
916 * IP stack for now) */
917 m->vdIfTcpNet.pfnSocketCreate = i_vdTcpSocketCreate;
918 m->vdIfTcpNet.pfnSocketDestroy = i_vdTcpSocketDestroy;
919 m->vdIfTcpNet.pfnClientConnect = i_vdTcpClientConnect;
920 m->vdIfTcpNet.pfnClientClose = i_vdTcpClientClose;
921 m->vdIfTcpNet.pfnIsClientConnected = i_vdTcpIsClientConnected;
922 m->vdIfTcpNet.pfnSelectOne = i_vdTcpSelectOne;
923 m->vdIfTcpNet.pfnRead = i_vdTcpRead;
924 m->vdIfTcpNet.pfnWrite = i_vdTcpWrite;
925 m->vdIfTcpNet.pfnSgWrite = i_vdTcpSgWrite;
926 m->vdIfTcpNet.pfnFlush = i_vdTcpFlush;
927 m->vdIfTcpNet.pfnSetSendCoalescing = i_vdTcpSetSendCoalescing;
928 m->vdIfTcpNet.pfnGetLocalAddress = i_vdTcpGetLocalAddress;
929 m->vdIfTcpNet.pfnGetPeerAddress = i_vdTcpGetPeerAddress;
930 m->vdIfTcpNet.pfnSelectOneEx = NULL;
931 m->vdIfTcpNet.pfnPoke = NULL;
932
933 /* Initialize the per-disk interface chain (could be done more globally,
934 * but it's not wasting much time or space so it's not worth it). */
935 int vrc;
936 vrc = VDInterfaceAdd(&m->vdIfError.Core,
937 "Medium::vdInterfaceError",
938 VDINTERFACETYPE_ERROR, this,
939 sizeof(VDINTERFACEERROR), &m->vdDiskIfaces);
940 AssertRCReturn(vrc, E_FAIL);
941
942 /* Initialize the per-image interface chain */
943 vrc = VDInterfaceAdd(&m->vdIfConfig.Core,
944 "Medium::vdInterfaceConfig",
945 VDINTERFACETYPE_CONFIG, this,
946 sizeof(VDINTERFACECONFIG), &m->vdImageIfaces);
947 AssertRCReturn(vrc, E_FAIL);
948
949 vrc = VDInterfaceAdd(&m->vdIfTcpNet.Core,
950 "Medium::vdInterfaceTcpNet",
951 VDINTERFACETYPE_TCPNET, this,
952 sizeof(VDINTERFACETCPNET), &m->vdImageIfaces);
953 AssertRCReturn(vrc, E_FAIL);
954
955 return BaseFinalConstruct();
956}
957
958void Medium::FinalRelease()
959{
960 uninit();
961
962 delete m;
963
964 BaseFinalRelease();
965}
966
967/**
968 * Initializes an empty hard disk object without creating or opening an associated
969 * storage unit.
970 *
971 * This gets called by VirtualBox::CreateMedium() in which case uuidMachineRegistry
972 * is empty since starting with VirtualBox 4.0, we no longer add opened media to a
973 * registry automatically (this is deferred until the medium is attached to a machine).
974 *
975 * This also gets called when VirtualBox creates diff images; in this case uuidMachineRegistry
976 * is set to the registry of the parent image to make sure they all end up in the same
977 * file.
978 *
979 * For hard disks that don't have the MediumFormatCapabilities_CreateFixed or
980 * MediumFormatCapabilities_CreateDynamic capability (and therefore cannot be created or deleted
981 * with the means of VirtualBox) the associated storage unit is assumed to be
982 * ready for use so the state of the hard disk object will be set to Created.
983 *
984 * @param aVirtualBox VirtualBox object.
985 * @param aFormat
986 * @param aLocation Storage unit location.
987 * @param uuidMachineRegistry The registry to which this medium should be added
988 * (global registry UUID or machine UUID or empty if none).
989 * @param aDeviceType Device Type.
990 */
991HRESULT Medium::init(VirtualBox *aVirtualBox,
992 const Utf8Str &aFormat,
993 const Utf8Str &aLocation,
994 const Guid &uuidMachineRegistry,
995 const DeviceType_T aDeviceType)
996{
997 AssertReturn(aVirtualBox != NULL, E_FAIL);
998 AssertReturn(!aFormat.isEmpty(), E_FAIL);
999
1000 /* Enclose the state transition NotReady->InInit->Ready */
1001 AutoInitSpan autoInitSpan(this);
1002 AssertReturn(autoInitSpan.isOk(), E_FAIL);
1003
1004 HRESULT rc = S_OK;
1005
1006 unconst(m->pVirtualBox) = aVirtualBox;
1007
1008 if (uuidMachineRegistry.isValid() && !uuidMachineRegistry.isZero())
1009 m->llRegistryIDs.push_back(uuidMachineRegistry);
1010
1011 /* no storage yet */
1012 m->state = MediumState_NotCreated;
1013
1014 /* cannot be a host drive */
1015 m->hostDrive = false;
1016
1017 m->devType = aDeviceType;
1018
1019 /* No storage unit is created yet, no need to call Medium::i_queryInfo */
1020
1021 rc = i_setFormat(aFormat);
1022 if (FAILED(rc)) return rc;
1023
1024 rc = i_setLocation(aLocation);
1025 if (FAILED(rc)) return rc;
1026
1027 if (!(m->formatObj->i_getCapabilities() & ( MediumFormatCapabilities_CreateFixed
1028 | MediumFormatCapabilities_CreateDynamic))
1029 )
1030 {
1031 /* Storage for mediums of this format can neither be explicitly
1032 * created by VirtualBox nor deleted, so we place the medium to
1033 * Inaccessible state here and also add it to the registry. The
1034 * state means that one has to use RefreshState() to update the
1035 * medium format specific fields. */
1036 m->state = MediumState_Inaccessible;
1037 // create new UUID
1038 unconst(m->id).create();
1039
1040 AutoWriteLock treeLock(m->pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
1041 ComObjPtr<Medium> pMedium;
1042
1043 /*
1044 * Check whether the UUID is taken already and create a new one
1045 * if required.
1046 * Try this only a limited amount of times in case the PRNG is broken
1047 * in some way to prevent an endless loop.
1048 */
1049 for (unsigned i = 0; i < 5; i++)
1050 {
1051 bool fInUse;
1052
1053 fInUse = m->pVirtualBox->i_isMediaUuidInUse(m->id, aDeviceType);
1054 if (fInUse)
1055 {
1056 // create new UUID
1057 unconst(m->id).create();
1058 }
1059 else
1060 break;
1061 }
1062
1063 rc = m->pVirtualBox->i_registerMedium(this, &pMedium, treeLock);
1064 Assert(this == pMedium || FAILED(rc));
1065 }
1066
1067 /* Confirm a successful initialization when it's the case */
1068 if (SUCCEEDED(rc))
1069 autoInitSpan.setSucceeded();
1070
1071 return rc;
1072}
1073
1074/**
1075 * Initializes the medium object by opening the storage unit at the specified
1076 * location. The enOpenMode parameter defines whether the medium will be opened
1077 * read/write or read-only.
1078 *
1079 * This gets called by VirtualBox::OpenMedium() and also by
1080 * Machine::AttachDevice() and createImplicitDiffs() when new diff
1081 * images are created.
1082 *
1083 * There is no registry for this case since starting with VirtualBox 4.0, we
1084 * no longer add opened media to a registry automatically (this is deferred
1085 * until the medium is attached to a machine).
1086 *
1087 * For hard disks, the UUID, format and the parent of this medium will be
1088 * determined when reading the medium storage unit. For DVD and floppy images,
1089 * which have no UUIDs in their storage units, new UUIDs are created.
1090 * If the detected or set parent is not known to VirtualBox, then this method
1091 * will fail.
1092 *
1093 * @param aVirtualBox VirtualBox object.
1094 * @param aLocation Storage unit location.
1095 * @param enOpenMode Whether to open the medium read/write or read-only.
1096 * @param fForceNewUuid Whether a new UUID should be set to avoid duplicates.
1097 * @param aDeviceType Device type of medium.
1098 */
1099HRESULT Medium::init(VirtualBox *aVirtualBox,
1100 const Utf8Str &aLocation,
1101 HDDOpenMode enOpenMode,
1102 bool fForceNewUuid,
1103 DeviceType_T aDeviceType)
1104{
1105 AssertReturn(aVirtualBox, E_INVALIDARG);
1106 AssertReturn(!aLocation.isEmpty(), E_INVALIDARG);
1107
1108 HRESULT rc = S_OK;
1109
1110 {
1111 /* Enclose the state transition NotReady->InInit->Ready */
1112 AutoInitSpan autoInitSpan(this);
1113 AssertReturn(autoInitSpan.isOk(), E_FAIL);
1114
1115 unconst(m->pVirtualBox) = aVirtualBox;
1116
1117 /* there must be a storage unit */
1118 m->state = MediumState_Created;
1119
1120 /* remember device type for correct unregistering later */
1121 m->devType = aDeviceType;
1122
1123 /* cannot be a host drive */
1124 m->hostDrive = false;
1125
1126 /* remember the open mode (defaults to ReadWrite) */
1127 m->hddOpenMode = enOpenMode;
1128
1129 if (aDeviceType == DeviceType_DVD)
1130 m->type = MediumType_Readonly;
1131 else if (aDeviceType == DeviceType_Floppy)
1132 m->type = MediumType_Writethrough;
1133
1134 rc = i_setLocation(aLocation);
1135 if (FAILED(rc)) return rc;
1136
1137 /* get all the information about the medium from the storage unit */
1138 if (fForceNewUuid)
1139 unconst(m->uuidImage).create();
1140
1141 m->state = MediumState_Inaccessible;
1142 m->strLastAccessError = tr("Accessibility check was not yet performed");
1143
1144 /* Confirm a successful initialization before the call to i_queryInfo.
1145 * Otherwise we can end up with a AutoCaller deadlock because the
1146 * medium becomes visible but is not marked as initialized. Causes
1147 * locking trouble (e.g. trying to save media registries) which is
1148 * hard to solve. */
1149 autoInitSpan.setSucceeded();
1150 }
1151
1152 /* we're normal code from now on, no longer init */
1153 AutoCaller autoCaller(this);
1154 if (FAILED(autoCaller.rc()))
1155 return autoCaller.rc();
1156
1157 /* need to call i_queryInfo immediately to correctly place the medium in
1158 * the respective media tree and update other information such as uuid */
1159 rc = i_queryInfo(fForceNewUuid /* fSetImageId */, false /* fSetParentId */,
1160 autoCaller);
1161 if (SUCCEEDED(rc))
1162 {
1163 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1164
1165 /* if the storage unit is not accessible, it's not acceptable for the
1166 * newly opened media so convert this into an error */
1167 if (m->state == MediumState_Inaccessible)
1168 {
1169 Assert(!m->strLastAccessError.isEmpty());
1170 rc = setError(E_FAIL, "%s", m->strLastAccessError.c_str());
1171 alock.release();
1172 autoCaller.release();
1173 uninit();
1174 }
1175 else
1176 {
1177 AssertStmt(!m->id.isZero(),
1178 alock.release(); autoCaller.release(); uninit(); return E_FAIL);
1179
1180 /* storage format must be detected by Medium::i_queryInfo if the
1181 * medium is accessible */
1182 AssertStmt(!m->strFormat.isEmpty(),
1183 alock.release(); autoCaller.release(); uninit(); return E_FAIL);
1184 }
1185 }
1186 else
1187 {
1188 /* opening this image failed, mark the object as dead */
1189 autoCaller.release();
1190 uninit();
1191 }
1192
1193 return rc;
1194}
1195
1196/**
1197 * Initializes the medium object by loading its data from the given settings
1198 * node. The medium will always be opened read/write.
1199 *
1200 * In this case, since we're loading from a registry, uuidMachineRegistry is
1201 * always set: it's either the global registry UUID or a machine UUID when
1202 * loading from a per-machine registry.
1203 *
1204 * @param aParent Parent medium disk or NULL for a root (base) medium.
1205 * @param aDeviceType Device type of the medium.
1206 * @param uuidMachineRegistry The registry to which this medium should be
1207 * added (global registry UUID or machine UUID).
1208 * @param data Configuration settings.
1209 * @param strMachineFolder The machine folder with which to resolve relative paths;
1210 * if empty, then we use the VirtualBox home directory
1211 *
1212 * @note Locks the medium tree for writing.
1213 */
1214HRESULT Medium::initOne(Medium *aParent,
1215 DeviceType_T aDeviceType,
1216 const Guid &uuidMachineRegistry,
1217 const settings::Medium &data,
1218 const Utf8Str &strMachineFolder)
1219{
1220 HRESULT rc;
1221
1222 if (uuidMachineRegistry.isValid() && !uuidMachineRegistry.isZero())
1223 m->llRegistryIDs.push_back(uuidMachineRegistry);
1224
1225 /* register with VirtualBox/parent early, since uninit() will
1226 * unconditionally unregister on failure */
1227 if (aParent)
1228 {
1229 // differencing medium: add to parent
1230 AutoWriteLock treeLock(m->pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
1231 // no need to check maximum depth as settings reading did it
1232 i_setParent(aParent);
1233 }
1234
1235 /* see below why we don't call Medium::i_queryInfo (and therefore treat
1236 * the medium as inaccessible for now */
1237 m->state = MediumState_Inaccessible;
1238 m->strLastAccessError = tr("Accessibility check was not yet performed");
1239
1240 /* required */
1241 unconst(m->id) = data.uuid;
1242
1243 /* assume not a host drive */
1244 m->hostDrive = false;
1245
1246 /* optional */
1247 m->strDescription = data.strDescription;
1248
1249 /* required */
1250 if (aDeviceType == DeviceType_HardDisk)
1251 {
1252 AssertReturn(!data.strFormat.isEmpty(), E_FAIL);
1253 rc = i_setFormat(data.strFormat);
1254 if (FAILED(rc)) return rc;
1255 }
1256 else
1257 {
1258 /// @todo handle host drive settings here as well?
1259 if (!data.strFormat.isEmpty())
1260 rc = i_setFormat(data.strFormat);
1261 else
1262 rc = i_setFormat("RAW");
1263 if (FAILED(rc)) return rc;
1264 }
1265
1266 /* optional, only for diffs, default is false; we can only auto-reset
1267 * diff media so they must have a parent */
1268 if (aParent != NULL)
1269 m->autoReset = data.fAutoReset;
1270 else
1271 m->autoReset = false;
1272
1273 /* properties (after setting the format as it populates the map). Note that
1274 * if some properties are not supported but present in the settings file,
1275 * they will still be read and accessible (for possible backward
1276 * compatibility; we can also clean them up from the XML upon next
1277 * XML format version change if we wish) */
1278 for (settings::StringsMap::const_iterator it = data.properties.begin();
1279 it != data.properties.end();
1280 ++it)
1281 {
1282 const Utf8Str &name = it->first;
1283 const Utf8Str &value = it->second;
1284 m->mapProperties[name] = value;
1285 }
1286
1287 /* try to decrypt an optional iSCSI initiator secret */
1288 settings::StringsMap::const_iterator itCph = data.properties.find("InitiatorSecretEncrypted");
1289 if ( itCph != data.properties.end()
1290 && !itCph->second.isEmpty())
1291 {
1292 Utf8Str strPlaintext;
1293 int vrc = m->pVirtualBox->i_decryptSetting(&strPlaintext, itCph->second);
1294 if (RT_SUCCESS(vrc))
1295 m->mapProperties["InitiatorSecret"] = strPlaintext;
1296 }
1297
1298 Utf8Str strFull;
1299 if (m->formatObj->i_getCapabilities() & MediumFormatCapabilities_File)
1300 {
1301 // compose full path of the medium, if it's not fully qualified...
1302 // slightly convoluted logic here. If the caller has given us a
1303 // machine folder, then a relative path will be relative to that:
1304 if ( !strMachineFolder.isEmpty()
1305 && !RTPathStartsWithRoot(data.strLocation.c_str())
1306 )
1307 {
1308 strFull = strMachineFolder;
1309 strFull += RTPATH_SLASH;
1310 strFull += data.strLocation;
1311 }
1312 else
1313 {
1314 // Otherwise use the old VirtualBox "make absolute path" logic:
1315 rc = m->pVirtualBox->i_calculateFullPath(data.strLocation, strFull);
1316 if (FAILED(rc)) return rc;
1317 }
1318 }
1319 else
1320 strFull = data.strLocation;
1321
1322 rc = i_setLocation(strFull);
1323 if (FAILED(rc)) return rc;
1324
1325 if (aDeviceType == DeviceType_HardDisk)
1326 {
1327 /* type is only for base hard disks */
1328 if (m->pParent.isNull())
1329 m->type = data.hdType;
1330 }
1331 else if (aDeviceType == DeviceType_DVD)
1332 m->type = MediumType_Readonly;
1333 else
1334 m->type = MediumType_Writethrough;
1335
1336 /* remember device type for correct unregistering later */
1337 m->devType = aDeviceType;
1338
1339 LogFlowThisFunc(("m->strLocationFull='%s', m->strFormat=%s, m->id={%RTuuid}\n",
1340 m->strLocationFull.c_str(), m->strFormat.c_str(), m->id.raw()));
1341
1342 return S_OK;
1343}
1344
1345/**
1346 * Initializes the medium object and its children by loading its data from the
1347 * given settings node. The medium will always be opened read/write.
1348 *
1349 * In this case, since we're loading from a registry, uuidMachineRegistry is
1350 * always set: it's either the global registry UUID or a machine UUID when
1351 * loading from a per-machine registry.
1352 *
1353 * @param aVirtualBox VirtualBox object.
1354 * @param aParent Parent medium disk or NULL for a root (base) medium.
1355 * @param aDeviceType Device type of the medium.
1356 * @param uuidMachineRegistry The registry to which this medium should be added
1357 * (global registry UUID or machine UUID).
1358 * @param data Configuration settings.
1359 * @param strMachineFolder The machine folder with which to resolve relative
1360 * paths; if empty, then we use the VirtualBox home directory
1361 * @param mediaTreeLock Autolock.
1362 *
1363 * @note Locks the medium tree for writing.
1364 */
1365HRESULT Medium::init(VirtualBox *aVirtualBox,
1366 Medium *aParent,
1367 DeviceType_T aDeviceType,
1368 const Guid &uuidMachineRegistry,
1369 const settings::Medium &data,
1370 const Utf8Str &strMachineFolder,
1371 AutoWriteLock &mediaTreeLock)
1372{
1373 using namespace settings;
1374
1375 Assert(aVirtualBox->i_getMediaTreeLockHandle().isWriteLockOnCurrentThread());
1376 AssertReturn(aVirtualBox, E_INVALIDARG);
1377
1378 /* Enclose the state transition NotReady->InInit->Ready */
1379 AutoInitSpan autoInitSpan(this);
1380 AssertReturn(autoInitSpan.isOk(), E_FAIL);
1381
1382 unconst(m->pVirtualBox) = aVirtualBox;
1383
1384 // Do not inline this method call, as the purpose of having this separate
1385 // is to save on stack size. Less local variables are the key for reaching
1386 // deep recursion levels with small stack (XPCOM/g++ without optimization).
1387 HRESULT rc = initOne(aParent, aDeviceType, uuidMachineRegistry, data, strMachineFolder);
1388
1389
1390 /* Don't call Medium::i_queryInfo for registered media to prevent the calling
1391 * thread (i.e. the VirtualBox server startup thread) from an unexpected
1392 * freeze but mark it as initially inaccessible instead. The vital UUID,
1393 * location and format properties are read from the registry file above; to
1394 * get the actual state and the rest of the data, the user will have to call
1395 * COMGETTER(State). */
1396
1397 /* load all children */
1398 for (settings::MediaList::const_iterator it = data.llChildren.begin();
1399 it != data.llChildren.end();
1400 ++it)
1401 {
1402 const settings::Medium &med = *it;
1403
1404 ComObjPtr<Medium> pMedium;
1405 pMedium.createObject();
1406 rc = pMedium->init(aVirtualBox,
1407 this, // parent
1408 aDeviceType,
1409 uuidMachineRegistry,
1410 med, // child data
1411 strMachineFolder,
1412 mediaTreeLock);
1413 if (FAILED(rc)) break;
1414
1415 rc = m->pVirtualBox->i_registerMedium(pMedium, &pMedium, mediaTreeLock);
1416 if (FAILED(rc)) break;
1417 }
1418
1419 /* Confirm a successful initialization when it's the case */
1420 if (SUCCEEDED(rc))
1421 autoInitSpan.setSucceeded();
1422
1423 return rc;
1424}
1425
1426/**
1427 * Initializes the medium object by providing the host drive information.
1428 * Not used for anything but the host floppy/host DVD case.
1429 *
1430 * There is no registry for this case.
1431 *
1432 * @param aVirtualBox VirtualBox object.
1433 * @param aDeviceType Device type of the medium.
1434 * @param aLocation Location of the host drive.
1435 * @param aDescription Comment for this host drive.
1436 *
1437 * @note Locks VirtualBox lock for writing.
1438 */
1439HRESULT Medium::init(VirtualBox *aVirtualBox,
1440 DeviceType_T aDeviceType,
1441 const Utf8Str &aLocation,
1442 const Utf8Str &aDescription /* = Utf8Str::Empty */)
1443{
1444 ComAssertRet(aDeviceType == DeviceType_DVD || aDeviceType == DeviceType_Floppy, E_INVALIDARG);
1445 ComAssertRet(!aLocation.isEmpty(), E_INVALIDARG);
1446
1447 /* Enclose the state transition NotReady->InInit->Ready */
1448 AutoInitSpan autoInitSpan(this);
1449 AssertReturn(autoInitSpan.isOk(), E_FAIL);
1450
1451 unconst(m->pVirtualBox) = aVirtualBox;
1452
1453 // We do not store host drives in VirtualBox.xml or anywhere else, so if we want
1454 // host drives to be identifiable by UUID and not give the drive a different UUID
1455 // every time VirtualBox starts, we need to fake a reproducible UUID here:
1456 RTUUID uuid;
1457 RTUuidClear(&uuid);
1458 if (aDeviceType == DeviceType_DVD)
1459 memcpy(&uuid.au8[0], "DVD", 3);
1460 else
1461 memcpy(&uuid.au8[0], "FD", 2);
1462 /* use device name, adjusted to the end of uuid, shortened if necessary */
1463 size_t lenLocation = aLocation.length();
1464 if (lenLocation > 12)
1465 memcpy(&uuid.au8[4], aLocation.c_str() + (lenLocation - 12), 12);
1466 else
1467 memcpy(&uuid.au8[4 + 12 - lenLocation], aLocation.c_str(), lenLocation);
1468 unconst(m->id) = uuid;
1469
1470 if (aDeviceType == DeviceType_DVD)
1471 m->type = MediumType_Readonly;
1472 else
1473 m->type = MediumType_Writethrough;
1474 m->devType = aDeviceType;
1475 m->state = MediumState_Created;
1476 m->hostDrive = true;
1477 HRESULT rc = i_setFormat("RAW");
1478 if (FAILED(rc)) return rc;
1479 rc = i_setLocation(aLocation);
1480 if (FAILED(rc)) return rc;
1481 m->strDescription = aDescription;
1482
1483 autoInitSpan.setSucceeded();
1484 return S_OK;
1485}
1486
1487/**
1488 * Uninitializes the instance.
1489 *
1490 * Called either from FinalRelease() or by the parent when it gets destroyed.
1491 *
1492 * @note All children of this medium get uninitialized by calling their
1493 * uninit() methods.
1494 */
1495void Medium::uninit()
1496{
1497 /* It is possible that some previous/concurrent uninit has already cleared
1498 * the pVirtualBox reference, and in this case we don't need to continue.
1499 * Normally this would be handled through the AutoUninitSpan magic, however
1500 * this cannot be done at this point as the media tree must be locked
1501 * before reaching the AutoUninitSpan, otherwise deadlocks can happen.
1502 *
1503 * NOTE: The tree lock is higher priority than the medium caller and medium
1504 * object locks, i.e. the medium caller may have to be released and be
1505 * re-acquired in the right place later. See Medium::getParent() for sample
1506 * code how to do this safely. */
1507 VirtualBox *pVirtualBox = m->pVirtualBox;
1508 if (!pVirtualBox)
1509 return;
1510
1511 /* Caller must not hold the object or media tree lock over uninit(). */
1512 Assert(!isWriteLockOnCurrentThread());
1513 Assert(!pVirtualBox->i_getMediaTreeLockHandle().isWriteLockOnCurrentThread());
1514
1515 AutoWriteLock treeLock(pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
1516
1517 /* Enclose the state transition Ready->InUninit->NotReady */
1518 AutoUninitSpan autoUninitSpan(this);
1519 if (autoUninitSpan.uninitDone())
1520 return;
1521
1522 if (!m->formatObj.isNull())
1523 m->formatObj.setNull();
1524
1525 if (m->state == MediumState_Deleting)
1526 {
1527 /* This medium has been already deleted (directly or as part of a
1528 * merge). Reparenting has already been done. */
1529 Assert(m->pParent.isNull());
1530 }
1531 else
1532 {
1533 MediaList llChildren(m->llChildren);
1534 m->llChildren.clear();
1535 autoUninitSpan.setSucceeded();
1536
1537 while (!llChildren.empty())
1538 {
1539 ComObjPtr<Medium> pChild = llChildren.front();
1540 llChildren.pop_front();
1541 pChild->m->pParent.setNull();
1542 treeLock.release();
1543 pChild->uninit();
1544 treeLock.acquire();
1545 }
1546
1547 if (m->pParent)
1548 {
1549 // this is a differencing disk: then remove it from the parent's children list
1550 i_deparent();
1551 }
1552 }
1553
1554 unconst(m->pVirtualBox) = NULL;
1555}
1556
1557/**
1558 * Internal helper that removes "this" from the list of children of its
1559 * parent. Used in uninit() and other places when reparenting is necessary.
1560 *
1561 * The caller must hold the medium tree lock!
1562 */
1563void Medium::i_deparent()
1564{
1565 MediaList &llParent = m->pParent->m->llChildren;
1566 for (MediaList::iterator it = llParent.begin();
1567 it != llParent.end();
1568 ++it)
1569 {
1570 Medium *pParentsChild = *it;
1571 if (this == pParentsChild)
1572 {
1573 llParent.erase(it);
1574 break;
1575 }
1576 }
1577 m->pParent.setNull();
1578}
1579
1580/**
1581 * Internal helper that removes "this" from the list of children of its
1582 * parent. Used in uninit() and other places when reparenting is necessary.
1583 *
1584 * The caller must hold the medium tree lock!
1585 */
1586void Medium::i_setParent(const ComObjPtr<Medium> &pParent)
1587{
1588 m->pParent = pParent;
1589 if (pParent)
1590 pParent->m->llChildren.push_back(this);
1591}
1592
1593
1594////////////////////////////////////////////////////////////////////////////////
1595//
1596// IMedium public methods
1597//
1598////////////////////////////////////////////////////////////////////////////////
1599
1600HRESULT Medium::getId(com::Guid &aId)
1601{
1602 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1603
1604 aId = m->id;
1605
1606 return S_OK;
1607}
1608
1609HRESULT Medium::getDescription(com::Utf8Str &aDescription)
1610{
1611 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1612
1613 aDescription = m->strDescription;
1614
1615 return S_OK;
1616}
1617
1618HRESULT Medium::setDescription(const com::Utf8Str &aDescription)
1619{
1620 /// @todo update m->strDescription and save the global registry (and local
1621 /// registries of portable VMs referring to this medium), this will also
1622 /// require to add the mRegistered flag to data
1623
1624 HRESULT rc = S_OK;
1625
1626 MediumLockList *pMediumLockList(new MediumLockList());
1627
1628 try
1629 {
1630 // locking: we need the tree lock first because we access parent pointers
1631 // and we need to write-lock the media involved
1632 uint32_t cHandles = 2;
1633 LockHandle* pHandles[2] = { &m->pVirtualBox->i_getMediaTreeLockHandle(),
1634 this->lockHandle() };
1635
1636 AutoWriteLock alock(cHandles,
1637 pHandles
1638 COMMA_LOCKVAL_SRC_POS);
1639
1640 /* Build the lock list. */
1641 alock.release();
1642 rc = i_createMediumLockList(true /* fFailIfInaccessible */,
1643 this /* pToLockWrite */,
1644 true /* fMediumLockWriteAll */,
1645 NULL,
1646 *pMediumLockList);
1647 alock.acquire();
1648
1649 if (FAILED(rc))
1650 {
1651 throw setError(rc,
1652 tr("Failed to create medium lock list for '%s'"),
1653 i_getLocationFull().c_str());
1654 }
1655
1656 alock.release();
1657 rc = pMediumLockList->Lock();
1658 alock.acquire();
1659
1660 if (FAILED(rc))
1661 {
1662 throw setError(rc,
1663 tr("Failed to lock media '%s'"),
1664 i_getLocationFull().c_str());
1665 }
1666
1667 /* Set a new description */
1668 if (SUCCEEDED(rc))
1669 {
1670 m->strDescription = aDescription;
1671 }
1672
1673 // save the settings
1674 alock.release();
1675 i_markRegistriesModified();
1676 m->pVirtualBox->i_saveModifiedRegistries();
1677 }
1678 catch (HRESULT aRC) { rc = aRC; }
1679
1680 delete pMediumLockList;
1681
1682 return rc;
1683}
1684
1685HRESULT Medium::getState(MediumState_T *aState)
1686{
1687 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1688 *aState = m->state;
1689
1690 return S_OK;
1691}
1692
1693HRESULT Medium::getVariant(std::vector<MediumVariant_T> &aVariant)
1694{
1695 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1696
1697 const size_t cBits = sizeof(MediumVariant_T) * 8;
1698 aVariant.resize(cBits);
1699 for (size_t i = 0; i < cBits; ++i)
1700 aVariant[i] = (MediumVariant_T)(m->variant & RT_BIT(i));
1701
1702 return S_OK;
1703}
1704
1705HRESULT Medium::getLocation(com::Utf8Str &aLocation)
1706{
1707 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1708
1709 aLocation = m->strLocationFull;
1710
1711 return S_OK;
1712}
1713
1714HRESULT Medium::getName(com::Utf8Str &aName)
1715{
1716 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1717
1718 aName = i_getName();
1719
1720 return S_OK;
1721}
1722
1723HRESULT Medium::getDeviceType(DeviceType_T *aDeviceType)
1724{
1725 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1726
1727 *aDeviceType = m->devType;
1728
1729 return S_OK;
1730}
1731
1732HRESULT Medium::getHostDrive(BOOL *aHostDrive)
1733{
1734 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1735
1736 *aHostDrive = m->hostDrive;
1737
1738 return S_OK;
1739}
1740
1741HRESULT Medium::getSize(LONG64 *aSize)
1742{
1743 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1744
1745 *aSize = m->size;
1746
1747 return S_OK;
1748}
1749
1750HRESULT Medium::getFormat(com::Utf8Str &aFormat)
1751{
1752 /* no need to lock, m->strFormat is const */
1753
1754 aFormat = m->strFormat;
1755 return S_OK;
1756}
1757
1758HRESULT Medium::getMediumFormat(ComPtr<IMediumFormat> &aMediumFormat)
1759{
1760 /* no need to lock, m->formatObj is const */
1761 m->formatObj.queryInterfaceTo(aMediumFormat.asOutParam());
1762
1763 return S_OK;
1764}
1765
1766HRESULT Medium::getType(AutoCaller &autoCaller, MediumType_T *aType)
1767{
1768 NOREF(autoCaller);
1769 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1770
1771 *aType = m->type;
1772
1773 return S_OK;
1774}
1775
1776HRESULT Medium::setType(AutoCaller &autoCaller, MediumType_T aType)
1777{
1778 autoCaller.release();
1779
1780 /* It is possible that some previous/concurrent uninit has already cleared
1781 * the pVirtualBox reference, see #uninit(). */
1782 ComObjPtr<VirtualBox> pVirtualBox(m->pVirtualBox);
1783
1784 // we access m->pParent
1785 AutoReadLock treeLock(!pVirtualBox.isNull() ? &pVirtualBox->i_getMediaTreeLockHandle() : NULL COMMA_LOCKVAL_SRC_POS);
1786
1787 autoCaller.add();
1788 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1789
1790 AutoWriteLock mlock(this COMMA_LOCKVAL_SRC_POS);
1791
1792 switch (m->state)
1793 {
1794 case MediumState_Created:
1795 case MediumState_Inaccessible:
1796 break;
1797 default:
1798 return i_setStateError();
1799 }
1800
1801 if (m->type == aType)
1802 {
1803 /* Nothing to do */
1804 return S_OK;
1805 }
1806
1807 DeviceType_T devType = i_getDeviceType();
1808 // DVD media can only be readonly.
1809 if (devType == DeviceType_DVD && aType != MediumType_Readonly)
1810 return setError(VBOX_E_INVALID_OBJECT_STATE,
1811 tr("Cannot change the type of DVD medium '%s'"),
1812 m->strLocationFull.c_str());
1813 // Floppy media can only be writethrough or readonly.
1814 if ( devType == DeviceType_Floppy
1815 && aType != MediumType_Writethrough
1816 && aType != MediumType_Readonly)
1817 return setError(VBOX_E_INVALID_OBJECT_STATE,
1818 tr("Cannot change the type of floppy medium '%s'"),
1819 m->strLocationFull.c_str());
1820
1821 /* cannot change the type of a differencing medium */
1822 if (m->pParent)
1823 return setError(VBOX_E_INVALID_OBJECT_STATE,
1824 tr("Cannot change the type of medium '%s' because it is a differencing medium"),
1825 m->strLocationFull.c_str());
1826
1827 /* Cannot change the type of a medium being in use by more than one VM.
1828 * If the change is to Immutable or MultiAttach then it must not be
1829 * directly attached to any VM, otherwise the assumptions about indirect
1830 * attachment elsewhere are violated and the VM becomes inaccessible.
1831 * Attaching an immutable medium triggers the diff creation, and this is
1832 * vital for the correct operation. */
1833 if ( m->backRefs.size() > 1
1834 || ( ( aType == MediumType_Immutable
1835 || aType == MediumType_MultiAttach)
1836 && m->backRefs.size() > 0))
1837 return setError(VBOX_E_INVALID_OBJECT_STATE,
1838 tr("Cannot change the type of medium '%s' because it is attached to %d virtual machines"),
1839 m->strLocationFull.c_str(), m->backRefs.size());
1840
1841 switch (aType)
1842 {
1843 case MediumType_Normal:
1844 case MediumType_Immutable:
1845 case MediumType_MultiAttach:
1846 {
1847 /* normal can be easily converted to immutable and vice versa even
1848 * if they have children as long as they are not attached to any
1849 * machine themselves */
1850 break;
1851 }
1852 case MediumType_Writethrough:
1853 case MediumType_Shareable:
1854 case MediumType_Readonly:
1855 {
1856 /* cannot change to writethrough, shareable or readonly
1857 * if there are children */
1858 if (i_getChildren().size() != 0)
1859 return setError(VBOX_E_OBJECT_IN_USE,
1860 tr("Cannot change type for medium '%s' since it has %d child media"),
1861 m->strLocationFull.c_str(), i_getChildren().size());
1862 if (aType == MediumType_Shareable)
1863 {
1864 MediumVariant_T variant = i_getVariant();
1865 if (!(variant & MediumVariant_Fixed))
1866 return setError(VBOX_E_INVALID_OBJECT_STATE,
1867 tr("Cannot change type for medium '%s' to 'Shareable' since it is a dynamic medium storage unit"),
1868 m->strLocationFull.c_str());
1869 }
1870 else if (aType == MediumType_Readonly && devType == DeviceType_HardDisk)
1871 {
1872 // Readonly hard disks are not allowed, this medium type is reserved for
1873 // DVDs and floppy images at the moment. Later we might allow readonly hard
1874 // disks, but that's extremely unusual and many guest OSes will have trouble.
1875 return setError(VBOX_E_INVALID_OBJECT_STATE,
1876 tr("Cannot change type for medium '%s' to 'Readonly' since it is a hard disk"),
1877 m->strLocationFull.c_str());
1878 }
1879 break;
1880 }
1881 default:
1882 AssertFailedReturn(E_FAIL);
1883 }
1884
1885 if (aType == MediumType_MultiAttach)
1886 {
1887 // This type is new with VirtualBox 4.0 and therefore requires settings
1888 // version 1.11 in the settings backend. Unfortunately it is not enough to do
1889 // the usual routine in MachineConfigFile::bumpSettingsVersionIfNeeded() for
1890 // two reasons: The medium type is a property of the media registry tree, which
1891 // can reside in the global config file (for pre-4.0 media); we would therefore
1892 // possibly need to bump the global config version. We don't want to do that though
1893 // because that might make downgrading to pre-4.0 impossible.
1894 // As a result, we can only use these two new types if the medium is NOT in the
1895 // global registry:
1896 const Guid &uuidGlobalRegistry = m->pVirtualBox->i_getGlobalRegistryId();
1897 if (i_isInRegistry(uuidGlobalRegistry))
1898 return setError(VBOX_E_INVALID_OBJECT_STATE,
1899 tr("Cannot change type for medium '%s': the media type 'MultiAttach' can only be used "
1900 "on media registered with a machine that was created with VirtualBox 4.0 or later"),
1901 m->strLocationFull.c_str());
1902 }
1903
1904 m->type = aType;
1905
1906 // save the settings
1907 mlock.release();
1908 treeLock.release();
1909 i_markRegistriesModified();
1910 m->pVirtualBox->i_saveModifiedRegistries();
1911
1912 return S_OK;
1913}
1914
1915HRESULT Medium::getAllowedTypes(std::vector<MediumType_T> &aAllowedTypes)
1916{
1917 NOREF(aAllowedTypes);
1918 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1919
1920 ReturnComNotImplemented();
1921}
1922
1923HRESULT Medium::getParent(AutoCaller &autoCaller, ComPtr<IMedium> &aParent)
1924{
1925 autoCaller.release();
1926
1927 /* It is possible that some previous/concurrent uninit has already cleared
1928 * the pVirtualBox reference, see #uninit(). */
1929 ComObjPtr<VirtualBox> pVirtualBox(m->pVirtualBox);
1930
1931 /* we access m->pParent */
1932 AutoReadLock treeLock(!pVirtualBox.isNull() ? &pVirtualBox->i_getMediaTreeLockHandle() : NULL COMMA_LOCKVAL_SRC_POS);
1933
1934 autoCaller.add();
1935 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1936
1937 m->pParent.queryInterfaceTo(aParent.asOutParam());
1938
1939 return S_OK;
1940}
1941
1942HRESULT Medium::getChildren(AutoCaller &autoCaller, std::vector<ComPtr<IMedium> > &aChildren)
1943{
1944 autoCaller.release();
1945
1946 /* It is possible that some previous/concurrent uninit has already cleared
1947 * the pVirtualBox reference, see #uninit(). */
1948 ComObjPtr<VirtualBox> pVirtualBox(m->pVirtualBox);
1949
1950 /* we access children */
1951 AutoReadLock treeLock(!pVirtualBox.isNull() ? &pVirtualBox->i_getMediaTreeLockHandle() : NULL COMMA_LOCKVAL_SRC_POS);
1952
1953 autoCaller.add();
1954 if (FAILED(autoCaller.rc())) return autoCaller.rc();
1955
1956 MediaList children(this->i_getChildren());
1957 aChildren.resize(children.size());
1958 size_t i = 0;
1959 for (MediaList::const_iterator it = children.begin(); it != children.end(); ++it, ++i)
1960 (*it).queryInterfaceTo(aChildren[i].asOutParam());
1961 return S_OK;
1962}
1963
1964HRESULT Medium::getBase(AutoCaller &autoCaller, ComPtr<IMedium> &aBase)
1965{
1966 autoCaller.release();
1967
1968 /* i_getBase() will do callers/locking */
1969 i_getBase().queryInterfaceTo(aBase.asOutParam());
1970
1971 return S_OK;
1972}
1973
1974HRESULT Medium::getReadOnly(AutoCaller &autoCaller, BOOL *aReadOnly)
1975{
1976 autoCaller.release();
1977
1978 /* isReadOnly() will do locking */
1979 *aReadOnly = i_isReadOnly();
1980
1981 return S_OK;
1982}
1983
1984HRESULT Medium::getLogicalSize(LONG64 *aLogicalSize)
1985{
1986 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1987
1988 *aLogicalSize = m->logicalSize;
1989
1990 return S_OK;
1991}
1992
1993HRESULT Medium::getAutoReset(BOOL *aAutoReset)
1994{
1995 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
1996
1997 if (m->pParent.isNull())
1998 *aAutoReset = FALSE;
1999 else
2000 *aAutoReset = m->autoReset;
2001
2002 return S_OK;
2003}
2004
2005HRESULT Medium::setAutoReset(BOOL aAutoReset)
2006{
2007 AutoWriteLock mlock(this COMMA_LOCKVAL_SRC_POS);
2008
2009 if (m->pParent.isNull())
2010 return setError(VBOX_E_NOT_SUPPORTED,
2011 tr("Medium '%s' is not differencing"),
2012 m->strLocationFull.c_str());
2013
2014 if (m->autoReset != !!aAutoReset)
2015 {
2016 m->autoReset = !!aAutoReset;
2017
2018 // save the settings
2019 mlock.release();
2020 i_markRegistriesModified();
2021 m->pVirtualBox->i_saveModifiedRegistries();
2022 }
2023
2024 return S_OK;
2025}
2026
2027HRESULT Medium::getLastAccessError(com::Utf8Str &aLastAccessError)
2028{
2029 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
2030
2031 aLastAccessError = m->strLastAccessError;
2032
2033 return S_OK;
2034}
2035
2036HRESULT Medium::getMachineIds(std::vector<com::Guid> &aMachineIds)
2037{
2038 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
2039
2040 if (m->backRefs.size() != 0)
2041 {
2042 BackRefList brlist(m->backRefs);
2043 aMachineIds.resize(brlist.size());
2044 size_t i = 0;
2045 for (BackRefList::const_iterator it = brlist.begin(); it != brlist.end(); ++it, ++i)
2046 aMachineIds[i] = it->machineId;
2047 }
2048
2049 return S_OK;
2050}
2051
2052HRESULT Medium::setIds(AutoCaller &autoCaller,
2053 BOOL aSetImageId,
2054 const com::Guid &aImageId,
2055 BOOL aSetParentId,
2056 const com::Guid &aParentId)
2057{
2058 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2059
2060 switch (m->state)
2061 {
2062 case MediumState_Created:
2063 break;
2064 default:
2065 return i_setStateError();
2066 }
2067
2068 Guid imageId, parentId;
2069 if (aSetImageId)
2070 {
2071 if (aImageId.isZero())
2072 imageId.create();
2073 else
2074 {
2075 imageId = aImageId;
2076 if (!imageId.isValid())
2077 return setError(E_INVALIDARG, tr("Argument %s is invalid"), "aImageId");
2078 }
2079 }
2080 if (aSetParentId)
2081 {
2082 if (aParentId.isZero())
2083 parentId.create();
2084 else
2085 parentId = aParentId;
2086 }
2087
2088 unconst(m->uuidImage) = imageId;
2089 unconst(m->uuidParentImage) = parentId;
2090
2091 // must not hold any locks before calling Medium::i_queryInfo
2092 alock.release();
2093
2094 HRESULT rc = i_queryInfo(!!aSetImageId /* fSetImageId */,
2095 !!aSetParentId /* fSetParentId */,
2096 autoCaller);
2097
2098 return rc;
2099}
2100
2101HRESULT Medium::refreshState(AutoCaller &autoCaller, MediumState_T *aState)
2102{
2103 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
2104
2105 HRESULT rc = S_OK;
2106
2107 switch (m->state)
2108 {
2109 case MediumState_Created:
2110 case MediumState_Inaccessible:
2111 case MediumState_LockedRead:
2112 {
2113 // must not hold any locks before calling Medium::i_queryInfo
2114 alock.release();
2115
2116 rc = i_queryInfo(false /* fSetImageId */, false /* fSetParentId */,
2117 autoCaller);
2118
2119 alock.acquire();
2120 break;
2121 }
2122 default:
2123 break;
2124 }
2125
2126 *aState = m->state;
2127
2128 return rc;
2129}
2130
2131HRESULT Medium::getSnapshotIds(const com::Guid &aMachineId,
2132 std::vector<com::Guid> &aSnapshotIds)
2133{
2134 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
2135
2136 for (BackRefList::const_iterator it = m->backRefs.begin();
2137 it != m->backRefs.end(); ++it)
2138 {
2139 if (it->machineId == aMachineId)
2140 {
2141 size_t size = it->llSnapshotIds.size();
2142
2143 /* if the medium is attached to the machine in the current state, we
2144 * return its ID as the first element of the array */
2145 if (it->fInCurState)
2146 ++size;
2147
2148 if (size > 0)
2149 {
2150 aSnapshotIds.resize(size);
2151
2152 size_t j = 0;
2153 if (it->fInCurState)
2154 aSnapshotIds[j++] = it->machineId.toUtf16();
2155
2156 for(GuidList::const_iterator jt = it->llSnapshotIds.begin(); jt != it->llSnapshotIds.end(); ++jt, ++j)
2157 aSnapshotIds[j] = (*jt);
2158 }
2159
2160 break;
2161 }
2162 }
2163
2164 return S_OK;
2165}
2166
2167HRESULT Medium::lockRead(ComPtr<IToken> &aToken)
2168{
2169 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2170
2171 /* Wait for a concurrently running Medium::i_queryInfo to complete. */
2172 if (m->queryInfoRunning)
2173 {
2174 /* Must not hold the media tree lock, as Medium::i_queryInfo needs this
2175 * lock and thus we would run into a deadlock here. */
2176 Assert(!m->pVirtualBox->i_getMediaTreeLockHandle().isWriteLockOnCurrentThread());
2177 while (m->queryInfoRunning)
2178 {
2179 alock.release();
2180 /* must not hold the object lock now */
2181 Assert(!isWriteLockOnCurrentThread());
2182 {
2183 AutoReadLock qlock(m->queryInfoSem COMMA_LOCKVAL_SRC_POS);
2184 }
2185 alock.acquire();
2186 }
2187 }
2188
2189 HRESULT rc = S_OK;
2190
2191 switch (m->state)
2192 {
2193 case MediumState_Created:
2194 case MediumState_Inaccessible:
2195 case MediumState_LockedRead:
2196 {
2197 ++m->readers;
2198
2199 ComAssertMsgBreak(m->readers != 0, ("Counter overflow"), rc = E_FAIL);
2200
2201 /* Remember pre-lock state */
2202 if (m->state != MediumState_LockedRead)
2203 m->preLockState = m->state;
2204
2205 LogFlowThisFunc(("Okay - prev state=%d readers=%d\n", m->state, m->readers));
2206 m->state = MediumState_LockedRead;
2207
2208 ComObjPtr<MediumLockToken> pToken;
2209 rc = pToken.createObject();
2210 if (SUCCEEDED(rc))
2211 rc = pToken->init(this, false /* fWrite */);
2212 if (FAILED(rc))
2213 {
2214 --m->readers;
2215 if (m->readers == 0)
2216 m->state = m->preLockState;
2217 return rc;
2218 }
2219
2220 pToken.queryInterfaceTo(aToken.asOutParam());
2221 break;
2222 }
2223 default:
2224 {
2225 LogFlowThisFunc(("Failing - state=%d\n", m->state));
2226 rc = i_setStateError();
2227 break;
2228 }
2229 }
2230
2231 return rc;
2232}
2233
2234/**
2235 * @note @a aState may be NULL if the state value is not needed (only for
2236 * in-process calls).
2237 */
2238HRESULT Medium::i_unlockRead(MediumState_T *aState)
2239{
2240 AutoCaller autoCaller(this);
2241 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2242
2243 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2244
2245 HRESULT rc = S_OK;
2246
2247 switch (m->state)
2248 {
2249 case MediumState_LockedRead:
2250 {
2251 ComAssertMsgBreak(m->readers != 0, ("Counter underflow"), rc = E_FAIL);
2252 --m->readers;
2253
2254 /* Reset the state after the last reader */
2255 if (m->readers == 0)
2256 {
2257 m->state = m->preLockState;
2258 /* There are cases where we inject the deleting state into
2259 * a medium locked for reading. Make sure #unmarkForDeletion()
2260 * gets the right state afterwards. */
2261 if (m->preLockState == MediumState_Deleting)
2262 m->preLockState = MediumState_Created;
2263 }
2264
2265 LogFlowThisFunc(("new state=%d\n", m->state));
2266 break;
2267 }
2268 default:
2269 {
2270 LogFlowThisFunc(("Failing - state=%d\n", m->state));
2271 rc = setError(VBOX_E_INVALID_OBJECT_STATE,
2272 tr("Medium '%s' is not locked for reading"),
2273 m->strLocationFull.c_str());
2274 break;
2275 }
2276 }
2277
2278 /* return the current state after */
2279 if (aState)
2280 *aState = m->state;
2281
2282 return rc;
2283}
2284HRESULT Medium::lockWrite(ComPtr<IToken> &aToken)
2285{
2286 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2287
2288 /* Wait for a concurrently running Medium::i_queryInfo to complete. */
2289 if (m->queryInfoRunning)
2290 {
2291 /* Must not hold the media tree lock, as Medium::i_queryInfo needs this
2292 * lock and thus we would run into a deadlock here. */
2293 Assert(!m->pVirtualBox->i_getMediaTreeLockHandle().isWriteLockOnCurrentThread());
2294 while (m->queryInfoRunning)
2295 {
2296 alock.release();
2297 /* must not hold the object lock now */
2298 Assert(!isWriteLockOnCurrentThread());
2299 {
2300 AutoReadLock qlock(m->queryInfoSem COMMA_LOCKVAL_SRC_POS);
2301 }
2302 alock.acquire();
2303 }
2304 }
2305
2306 HRESULT rc = S_OK;
2307
2308 switch (m->state)
2309 {
2310 case MediumState_Created:
2311 case MediumState_Inaccessible:
2312 {
2313 m->preLockState = m->state;
2314
2315 LogFlowThisFunc(("Okay - prev state=%d locationFull=%s\n", m->state, i_getLocationFull().c_str()));
2316 m->state = MediumState_LockedWrite;
2317
2318 ComObjPtr<MediumLockToken> pToken;
2319 rc = pToken.createObject();
2320 if (SUCCEEDED(rc))
2321 rc = pToken->init(this, true /* fWrite */);
2322 if (FAILED(rc))
2323 {
2324 m->state = m->preLockState;
2325 return rc;
2326 }
2327
2328 pToken.queryInterfaceTo(aToken.asOutParam());
2329 break;
2330 }
2331 default:
2332 {
2333 LogFlowThisFunc(("Failing - state=%d locationFull=%s\n", m->state, i_getLocationFull().c_str()));
2334 rc = i_setStateError();
2335 break;
2336 }
2337 }
2338
2339 return rc;
2340}
2341
2342/**
2343 * @note @a aState may be NULL if the state value is not needed (only for
2344 * in-process calls).
2345 */
2346HRESULT Medium::i_unlockWrite(MediumState_T *aState)
2347{
2348 AutoCaller autoCaller(this);
2349 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2350
2351 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2352
2353 HRESULT rc = S_OK;
2354
2355 switch (m->state)
2356 {
2357 case MediumState_LockedWrite:
2358 {
2359 m->state = m->preLockState;
2360 /* There are cases where we inject the deleting state into
2361 * a medium locked for writing. Make sure #unmarkForDeletion()
2362 * gets the right state afterwards. */
2363 if (m->preLockState == MediumState_Deleting)
2364 m->preLockState = MediumState_Created;
2365 LogFlowThisFunc(("new state=%d locationFull=%s\n", m->state, i_getLocationFull().c_str()));
2366 break;
2367 }
2368 default:
2369 {
2370 LogFlowThisFunc(("Failing - state=%d locationFull=%s\n", m->state, i_getLocationFull().c_str()));
2371 rc = setError(VBOX_E_INVALID_OBJECT_STATE,
2372 tr("Medium '%s' is not locked for writing"),
2373 m->strLocationFull.c_str());
2374 break;
2375 }
2376 }
2377
2378 /* return the current state after */
2379 if (aState)
2380 *aState = m->state;
2381
2382 return rc;
2383}
2384
2385HRESULT Medium::close(AutoCaller &aAutoCaller)
2386{
2387 // make a copy of VirtualBox pointer which gets nulled by uninit()
2388 ComObjPtr<VirtualBox> pVirtualBox(m->pVirtualBox);
2389
2390 MultiResult mrc = i_close(aAutoCaller);
2391
2392 pVirtualBox->i_saveModifiedRegistries();
2393
2394 return mrc;
2395}
2396
2397HRESULT Medium::getProperty(const com::Utf8Str &aName,
2398 com::Utf8Str &aValue)
2399{
2400 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
2401
2402 settings::StringsMap::const_iterator it = m->mapProperties.find(aName);
2403 if (it == m->mapProperties.end())
2404 {
2405 if (!aName.startsWith("Special/"))
2406 return setError(VBOX_E_OBJECT_NOT_FOUND,
2407 tr("Property '%s' does not exist"), aName.c_str());
2408 else
2409 /* be more silent here */
2410 return VBOX_E_OBJECT_NOT_FOUND;
2411 }
2412
2413 aValue = it->second;
2414
2415 return S_OK;
2416}
2417
2418HRESULT Medium::setProperty(const com::Utf8Str &aName,
2419 const com::Utf8Str &aValue)
2420{
2421 AutoWriteLock mlock(this COMMA_LOCKVAL_SRC_POS);
2422
2423 switch (m->state)
2424 {
2425 case MediumState_Created:
2426 case MediumState_Inaccessible:
2427 break;
2428 default:
2429 return i_setStateError();
2430 }
2431
2432 settings::StringsMap::iterator it = m->mapProperties.find(aName);
2433 if ( !aName.startsWith("Special/")
2434 && !i_isPropertyForFilter(aName))
2435 {
2436 if (it == m->mapProperties.end())
2437 return setError(VBOX_E_OBJECT_NOT_FOUND,
2438 tr("Property '%s' does not exist"),
2439 aName.c_str());
2440 it->second = aValue;
2441 }
2442 else
2443 {
2444 if (it == m->mapProperties.end())
2445 {
2446 if (!aValue.isEmpty())
2447 m->mapProperties[aName] = aValue;
2448 }
2449 else
2450 {
2451 if (!aValue.isEmpty())
2452 it->second = aValue;
2453 else
2454 m->mapProperties.erase(it);
2455 }
2456 }
2457
2458 // save the settings
2459 mlock.release();
2460 i_markRegistriesModified();
2461 m->pVirtualBox->i_saveModifiedRegistries();
2462
2463 return S_OK;
2464}
2465
2466HRESULT Medium::getProperties(const com::Utf8Str &aNames,
2467 std::vector<com::Utf8Str> &aReturnNames,
2468 std::vector<com::Utf8Str> &aReturnValues)
2469{
2470 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
2471
2472 /// @todo make use of aNames according to the documentation
2473 NOREF(aNames);
2474
2475 aReturnNames.resize(m->mapProperties.size());
2476 aReturnValues.resize(m->mapProperties.size());
2477 size_t i = 0;
2478 for (settings::StringsMap::const_iterator it = m->mapProperties.begin();
2479 it != m->mapProperties.end();
2480 ++it, ++i)
2481 {
2482 aReturnNames[i] = it->first;
2483 aReturnValues[i] = it->second;
2484 }
2485 return S_OK;
2486}
2487
2488HRESULT Medium::setProperties(const std::vector<com::Utf8Str> &aNames,
2489 const std::vector<com::Utf8Str> &aValues)
2490{
2491 AutoWriteLock mlock(this COMMA_LOCKVAL_SRC_POS);
2492
2493 /* first pass: validate names */
2494 for (size_t i = 0;
2495 i < aNames.size();
2496 ++i)
2497 {
2498 Utf8Str strName(aNames[i]);
2499 if ( !strName.startsWith("Special/")
2500 && !i_isPropertyForFilter(strName)
2501 && m->mapProperties.find(strName) == m->mapProperties.end())
2502 return setError(VBOX_E_OBJECT_NOT_FOUND,
2503 tr("Property '%s' does not exist"), strName.c_str());
2504 }
2505
2506 /* second pass: assign */
2507 for (size_t i = 0;
2508 i < aNames.size();
2509 ++i)
2510 {
2511 Utf8Str strName(aNames[i]);
2512 Utf8Str strValue(aValues[i]);
2513 settings::StringsMap::iterator it = m->mapProperties.find(strName);
2514 if ( !strName.startsWith("Special/")
2515 && !i_isPropertyForFilter(strName))
2516 {
2517 AssertReturn(it != m->mapProperties.end(), E_FAIL);
2518 it->second = strValue;
2519 }
2520 else
2521 {
2522 if (it == m->mapProperties.end())
2523 {
2524 if (!strValue.isEmpty())
2525 m->mapProperties[strName] = strValue;
2526 }
2527 else
2528 {
2529 if (!strValue.isEmpty())
2530 it->second = strValue;
2531 else
2532 m->mapProperties.erase(it);
2533 }
2534 }
2535 }
2536
2537 // save the settings
2538 mlock.release();
2539 i_markRegistriesModified();
2540 m->pVirtualBox->i_saveModifiedRegistries();
2541
2542 return S_OK;
2543}
2544HRESULT Medium::createBaseStorage(LONG64 aLogicalSize,
2545 const std::vector<MediumVariant_T> &aVariant,
2546 ComPtr<IProgress> &aProgress)
2547{
2548 if (aLogicalSize < 0)
2549 return setError(E_INVALIDARG, tr("The medium size argument (%lld) is negative"), aLogicalSize);
2550
2551 HRESULT rc = S_OK;
2552 ComObjPtr<Progress> pProgress;
2553 Medium::Task *pTask = NULL;
2554
2555 try
2556 {
2557 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
2558
2559 ULONG mediumVariantFlags = 0;
2560
2561 if (aVariant.size())
2562 {
2563 for (size_t i = 0; i < aVariant.size(); i++)
2564 mediumVariantFlags |= (ULONG)aVariant[i];
2565 }
2566
2567 mediumVariantFlags &= ((unsigned)~MediumVariant_Diff);
2568
2569 if ( !(mediumVariantFlags & MediumVariant_Fixed)
2570 && !(m->formatObj->i_getCapabilities() & MediumFormatCapabilities_CreateDynamic))
2571 throw setError(VBOX_E_NOT_SUPPORTED,
2572 tr("Medium format '%s' does not support dynamic storage creation"),
2573 m->strFormat.c_str());
2574
2575 if ( (mediumVariantFlags & MediumVariant_Fixed)
2576 && !(m->formatObj->i_getCapabilities() & MediumFormatCapabilities_CreateFixed))
2577 throw setError(VBOX_E_NOT_SUPPORTED,
2578 tr("Medium format '%s' does not support fixed storage creation"),
2579 m->strFormat.c_str());
2580
2581 if (m->state != MediumState_NotCreated)
2582 throw i_setStateError();
2583
2584 pProgress.createObject();
2585 rc = pProgress->init(m->pVirtualBox,
2586 static_cast<IMedium*>(this),
2587 (mediumVariantFlags & MediumVariant_Fixed)
2588 ? BstrFmt(tr("Creating fixed medium storage unit '%s'"), m->strLocationFull.c_str()).raw()
2589 : BstrFmt(tr("Creating dynamic medium storage unit '%s'"), m->strLocationFull.c_str()).raw(),
2590 TRUE /* aCancelable */);
2591 if (FAILED(rc))
2592 throw rc;
2593
2594 /* setup task object to carry out the operation asynchronously */
2595 pTask = new Medium::CreateBaseTask(this, pProgress, aLogicalSize,
2596 (MediumVariant_T)mediumVariantFlags);
2597 //(MediumVariant_T)aVariant);
2598 rc = pTask->rc();
2599 AssertComRC(rc);
2600 if (FAILED(rc))
2601 throw rc;
2602
2603 m->state = MediumState_Creating;
2604 }
2605 catch (HRESULT aRC) { rc = aRC; }
2606
2607 if (SUCCEEDED(rc))
2608 {
2609 rc = pTask->createThread();
2610
2611 if (SUCCEEDED(rc))
2612 pProgress.queryInterfaceTo(aProgress.asOutParam());
2613 }
2614 else if (pTask != NULL)
2615 delete pTask;
2616
2617 return rc;
2618}
2619
2620HRESULT Medium::deleteStorage(ComPtr<IProgress> &aProgress)
2621{
2622 ComObjPtr<Progress> pProgress;
2623
2624 MultiResult mrc = i_deleteStorage(&pProgress,
2625 false /* aWait */);
2626 /* Must save the registries in any case, since an entry was removed. */
2627 m->pVirtualBox->i_saveModifiedRegistries();
2628
2629 if (SUCCEEDED(mrc))
2630 pProgress.queryInterfaceTo(aProgress.asOutParam());
2631
2632 return mrc;
2633}
2634
2635HRESULT Medium::createDiffStorage(AutoCaller &autoCaller,
2636 const ComPtr<IMedium> &aTarget,
2637 const std::vector<MediumVariant_T> &aVariant,
2638 ComPtr<IProgress> &aProgress)
2639{
2640 /** @todo r=klaus The code below needs to be double checked with regard
2641 * to lock order violations, it probably causes lock order issues related
2642 * to the AutoCaller usage. */
2643 IMedium *aT = aTarget;
2644 ComObjPtr<Medium> diff = static_cast<Medium*>(aT);
2645
2646 autoCaller.release();
2647
2648 /* It is possible that some previous/concurrent uninit has already cleared
2649 * the pVirtualBox reference, see #uninit(). */
2650 ComObjPtr<VirtualBox> pVirtualBox(m->pVirtualBox);
2651
2652 // we access m->pParent
2653 AutoReadLock treeLock(!pVirtualBox.isNull() ? &pVirtualBox->i_getMediaTreeLockHandle() : NULL COMMA_LOCKVAL_SRC_POS);
2654
2655 autoCaller.add();
2656 if (FAILED(autoCaller.rc())) return autoCaller.rc();
2657
2658 AutoMultiWriteLock2 alock(this->lockHandle(), diff->lockHandle() COMMA_LOCKVAL_SRC_POS);
2659
2660 if (m->type == MediumType_Writethrough)
2661 return setError(VBOX_E_INVALID_OBJECT_STATE,
2662 tr("Medium type of '%s' is Writethrough"),
2663 m->strLocationFull.c_str());
2664 else if (m->type == MediumType_Shareable)
2665 return setError(VBOX_E_INVALID_OBJECT_STATE,
2666 tr("Medium type of '%s' is Shareable"),
2667 m->strLocationFull.c_str());
2668 else if (m->type == MediumType_Readonly)
2669 return setError(VBOX_E_INVALID_OBJECT_STATE,
2670 tr("Medium type of '%s' is Readonly"),
2671 m->strLocationFull.c_str());
2672
2673 /* Apply the normal locking logic to the entire chain. */
2674 MediumLockList *pMediumLockList(new MediumLockList());
2675 alock.release();
2676 treeLock.release();
2677 HRESULT rc = diff->i_createMediumLockList(true /* fFailIfInaccessible */,
2678 diff /* pToLockWrite */,
2679 false /* fMediumLockWriteAll */,
2680 this,
2681 *pMediumLockList);
2682 treeLock.acquire();
2683 alock.acquire();
2684 if (FAILED(rc))
2685 {
2686 delete pMediumLockList;
2687 return rc;
2688 }
2689
2690 alock.release();
2691 treeLock.release();
2692 rc = pMediumLockList->Lock();
2693 treeLock.acquire();
2694 alock.acquire();
2695 if (FAILED(rc))
2696 {
2697 delete pMediumLockList;
2698
2699 return setError(rc, tr("Could not lock medium when creating diff '%s'"),
2700 diff->i_getLocationFull().c_str());
2701 }
2702
2703 Guid parentMachineRegistry;
2704 if (i_getFirstRegistryMachineId(parentMachineRegistry))
2705 {
2706 /* since this medium has been just created it isn't associated yet */
2707 diff->m->llRegistryIDs.push_back(parentMachineRegistry);
2708 alock.release();
2709 treeLock.release();
2710 diff->i_markRegistriesModified();
2711 treeLock.acquire();
2712 alock.acquire();
2713 }
2714
2715 alock.release();
2716 treeLock.release();
2717
2718 ComObjPtr<Progress> pProgress;
2719
2720 ULONG mediumVariantFlags = 0;
2721
2722 if (aVariant.size())
2723 {
2724 for (size_t i = 0; i < aVariant.size(); i++)
2725 mediumVariantFlags |= (ULONG)aVariant[i];
2726 }
2727
2728 rc = i_createDiffStorage(diff, (MediumVariant_T)mediumVariantFlags, pMediumLockList,
2729 &pProgress, false /* aWait */);
2730 if (FAILED(rc))
2731 delete pMediumLockList;
2732 else
2733 pProgress.queryInterfaceTo(aProgress.asOutParam());
2734
2735 return rc;
2736}
2737
2738HRESULT Medium::mergeTo(const ComPtr<IMedium> &aTarget,
2739 ComPtr<IProgress> &aProgress)
2740{
2741
2742 /** @todo r=klaus The code below needs to be double checked with regard
2743 * to lock order violations, it probably causes lock order issues related
2744 * to the AutoCaller usage. */
2745 IMedium *aT = aTarget;
2746
2747 ComAssertRet(aT != this, E_INVALIDARG);
2748
2749 ComObjPtr<Medium> pTarget = static_cast<Medium*>(aT);
2750
2751 bool fMergeForward = false;
2752 ComObjPtr<Medium> pParentForTarget;
2753 MediumLockList *pChildrenToReparent = NULL;
2754 MediumLockList *pMediumLockList = NULL;
2755
2756 HRESULT rc = S_OK;
2757
2758 rc = i_prepareMergeTo(pTarget, NULL, NULL, true, fMergeForward,
2759 pParentForTarget, pChildrenToReparent, pMediumLockList);
2760 if (FAILED(rc)) return rc;
2761
2762 ComObjPtr<Progress> pProgress;
2763
2764 rc = i_mergeTo(pTarget, fMergeForward, pParentForTarget, pChildrenToReparent,
2765 pMediumLockList, &pProgress, false /* aWait */);
2766 if (FAILED(rc))
2767 i_cancelMergeTo(pChildrenToReparent, pMediumLockList);
2768 else
2769 pProgress.queryInterfaceTo(aProgress.asOutParam());
2770
2771 return rc;
2772}
2773
2774HRESULT Medium::cloneToBase(const ComPtr<IMedium> &aTarget,
2775 const std::vector<MediumVariant_T> &aVariant,
2776 ComPtr<IProgress> &aProgress)
2777{
2778 int rc = S_OK;
2779
2780 rc = cloneTo(aTarget, aVariant, NULL, aProgress);
2781 return rc;
2782}
2783
2784HRESULT Medium::cloneTo(const ComPtr<IMedium> &aTarget,
2785 const std::vector<MediumVariant_T> &aVariant,
2786 const ComPtr<IMedium> &aParent,
2787 ComPtr<IProgress> &aProgress)
2788{
2789 /** @todo r=klaus The code below needs to be double checked with regard
2790 * to lock order violations, it probably causes lock order issues related
2791 * to the AutoCaller usage. */
2792 ComAssertRet(aTarget != this, E_INVALIDARG);
2793
2794 IMedium *aT = aTarget;
2795 ComObjPtr<Medium> pTarget = static_cast<Medium*>(aT);
2796 ComObjPtr<Medium> pParent;
2797 if (aParent)
2798 {
2799 IMedium *aP = aParent;
2800 pParent = static_cast<Medium*>(aP);
2801 }
2802
2803 HRESULT rc = S_OK;
2804 ComObjPtr<Progress> pProgress;
2805 Medium::Task *pTask = NULL;
2806
2807 try
2808 {
2809 // locking: we need the tree lock first because we access parent pointers
2810 // and we need to write-lock the media involved
2811 uint32_t cHandles = 3;
2812 LockHandle* pHandles[4] = { &m->pVirtualBox->i_getMediaTreeLockHandle(),
2813 this->lockHandle(),
2814 pTarget->lockHandle() };
2815 /* Only add parent to the lock if it is not null */
2816 if (!pParent.isNull())
2817 pHandles[cHandles++] = pParent->lockHandle();
2818 AutoWriteLock alock(cHandles,
2819 pHandles
2820 COMMA_LOCKVAL_SRC_POS);
2821
2822 if ( pTarget->m->state != MediumState_NotCreated
2823 && pTarget->m->state != MediumState_Created)
2824 throw pTarget->i_setStateError();
2825
2826 /* Build the source lock list. */
2827 MediumLockList *pSourceMediumLockList(new MediumLockList());
2828 alock.release();
2829 rc = i_createMediumLockList(true /* fFailIfInaccessible */,
2830 NULL /* pToLockWrite */,
2831 false /* fMediumLockWriteAll */,
2832 NULL,
2833 *pSourceMediumLockList);
2834 alock.acquire();
2835 if (FAILED(rc))
2836 {
2837 delete pSourceMediumLockList;
2838 throw rc;
2839 }
2840
2841 /* Build the target lock list (including the to-be parent chain). */
2842 MediumLockList *pTargetMediumLockList(new MediumLockList());
2843 alock.release();
2844 rc = pTarget->i_createMediumLockList(true /* fFailIfInaccessible */,
2845 pTarget /* pToLockWrite */,
2846 false /* fMediumLockWriteAll */,
2847 pParent,
2848 *pTargetMediumLockList);
2849 alock.acquire();
2850 if (FAILED(rc))
2851 {
2852 delete pSourceMediumLockList;
2853 delete pTargetMediumLockList;
2854 throw rc;
2855 }
2856
2857 alock.release();
2858 rc = pSourceMediumLockList->Lock();
2859 alock.acquire();
2860 if (FAILED(rc))
2861 {
2862 delete pSourceMediumLockList;
2863 delete pTargetMediumLockList;
2864 throw setError(rc,
2865 tr("Failed to lock source media '%s'"),
2866 i_getLocationFull().c_str());
2867 }
2868 alock.release();
2869 rc = pTargetMediumLockList->Lock();
2870 alock.acquire();
2871 if (FAILED(rc))
2872 {
2873 delete pSourceMediumLockList;
2874 delete pTargetMediumLockList;
2875 throw setError(rc,
2876 tr("Failed to lock target media '%s'"),
2877 pTarget->i_getLocationFull().c_str());
2878 }
2879
2880 pProgress.createObject();
2881 rc = pProgress->init(m->pVirtualBox,
2882 static_cast <IMedium *>(this),
2883 BstrFmt(tr("Creating clone medium '%s'"), pTarget->m->strLocationFull.c_str()).raw(),
2884 TRUE /* aCancelable */);
2885 if (FAILED(rc))
2886 {
2887 delete pSourceMediumLockList;
2888 delete pTargetMediumLockList;
2889 throw rc;
2890 }
2891
2892 ULONG mediumVariantFlags = 0;
2893
2894 if (aVariant.size())
2895 {
2896 for (size_t i = 0; i < aVariant.size(); i++)
2897 mediumVariantFlags |= (ULONG)aVariant[i];
2898 }
2899
2900 /* setup task object to carry out the operation asynchronously */
2901 pTask = new Medium::CloneTask(this, pProgress, pTarget,
2902 (MediumVariant_T)mediumVariantFlags,
2903 pParent, UINT32_MAX, UINT32_MAX,
2904 pSourceMediumLockList, pTargetMediumLockList);
2905 rc = pTask->rc();
2906 AssertComRC(rc);
2907 if (FAILED(rc))
2908 throw rc;
2909
2910 if (pTarget->m->state == MediumState_NotCreated)
2911 pTarget->m->state = MediumState_Creating;
2912 }
2913 catch (HRESULT aRC) { rc = aRC; }
2914
2915 if (SUCCEEDED(rc))
2916 {
2917 rc = pTask->createThread();
2918
2919 if (SUCCEEDED(rc))
2920 pProgress.queryInterfaceTo(aProgress.asOutParam());
2921 }
2922 else if (pTask != NULL)
2923 delete pTask;
2924
2925 return rc;
2926}
2927
2928HRESULT Medium::setLocation(const com::Utf8Str &aLocation, ComPtr<IProgress> &aProgress)
2929{
2930
2931 ComObjPtr<Medium> pParent;
2932 ComObjPtr<Progress> pProgress;
2933 HRESULT rc = S_OK;
2934 Medium::Task *pTask = NULL;
2935
2936 try
2937 {
2938 /// @todo NEWMEDIA for file names, add the default extension if no extension
2939 /// is present (using the information from the VD backend which also implies
2940 /// that one more parameter should be passed to setLocation() requesting
2941 /// that functionality since it is only allowed when called from this method
2942
2943 /// @todo NEWMEDIA rename the file and set m->location on success, then save
2944 /// the global registry (and local registries of portable VMs referring to
2945 /// this medium), this will also require to add the mRegistered flag to data
2946
2947 // locking: we need the tree lock first because we access parent pointers
2948 // and we need to write-lock the media involved
2949 uint32_t cHandles = 2;
2950 LockHandle* pHandles[2] = { &m->pVirtualBox->i_getMediaTreeLockHandle(),
2951 this->lockHandle() };
2952
2953 AutoWriteLock alock(cHandles,
2954 pHandles
2955 COMMA_LOCKVAL_SRC_POS);
2956
2957 /* play with locations */
2958 {
2959 /* get source path and filename */
2960 Utf8Str sourcePath = i_getLocationFull();
2961 Utf8Str sourceFName = i_getName();
2962
2963 if (aLocation.isEmpty())
2964 {
2965 rc = setError(VERR_PATH_ZERO_LENGTH,
2966 tr("Medium '%s' can't be moved. Destination path is empty."),
2967 i_getLocationFull().c_str());
2968 throw rc;
2969 }
2970
2971 /* extract destination path and filename */
2972 Utf8Str destPath(aLocation);
2973 Utf8Str destFName(destPath);
2974 destFName.stripPath();
2975
2976 Utf8Str suffix(destFName);
2977 suffix.stripSuffix();
2978
2979 if (suffix.equals(destFName) && !destFName.isEmpty())
2980 {
2981 /*
2982 * The target path has no filename: Either "/path/to/new/location" or
2983 * just "newname" (no trailing backslash or there is no filename with
2984 * extension(suffix)).
2985 */
2986 if (destPath.equals(destFName))
2987 {
2988 /* new path contains only "newname", no path, no extension */
2989 destFName.append(RTPathSuffix(sourceFName.c_str()));
2990 destPath = destFName;
2991 }
2992 else
2993 {
2994 /* new path looks like "/path/to/new/location" */
2995 destFName.setNull();
2996 destPath.append(RTPATH_SLASH);
2997 }
2998 }
2999
3000 if (destFName.isEmpty())
3001 {
3002 /* No target name */
3003 destPath.append(sourceFName);
3004 }
3005 else
3006 {
3007 if (destPath.equals(destFName))
3008 {
3009 /*
3010 * The target path contains of only a filename without a directory.
3011 * Move the medium within the source directory to the new name
3012 * (actually rename operation).
3013 * Scratches sourcePath!
3014 */
3015 destPath = sourcePath.stripFilename().append(RTPATH_SLASH).append(destFName);
3016 }
3017 suffix = i_getFormat();
3018 if (suffix.compare("RAW", Utf8Str::CaseInsensitive) == 0)
3019 {
3020 if (i_getDeviceType() == DeviceType_DVD)
3021 suffix = "iso";
3022 else
3023 {
3024 rc = setError(VERR_NOT_A_FILE,
3025 tr("Medium '%s' has RAW type. \"Move\" operation isn't supported for this type."),
3026 i_getLocationFull().c_str());
3027 throw rc;
3028 }
3029 }
3030 /* Set the target extension like on the source. Any conversions are prohibited */
3031 suffix.toLower();
3032 destPath.stripSuffix().append('.').append(suffix);
3033 }
3034
3035 if (!i_isMediumFormatFile())
3036 {
3037 rc = setError(VERR_NOT_A_FILE,
3038 tr("Medium '%s' isn't a file object. \"Move\" operation isn't supported."),
3039 i_getLocationFull().c_str());
3040 throw rc;
3041 }
3042 /* Path must be absolute */
3043 if (!RTPathStartsWithRoot(destPath.c_str()))
3044 {
3045 rc = setError(VBOX_E_FILE_ERROR,
3046 tr("The given path '%s' is not fully qualified"),
3047 destPath.c_str());
3048 throw rc;
3049 }
3050 /* Check path for a new file object */
3051 rc = VirtualBox::i_ensureFilePathExists(destPath, true);
3052 if (FAILED(rc))
3053 throw rc;
3054
3055 /* Set needed variables for "moving" procedure. It'll be used later in separate thread task */
3056 rc = i_preparationForMoving(destPath);
3057 if (FAILED(rc))
3058 {
3059 rc = setError(VERR_NO_CHANGE,
3060 tr("Medium '%s' is already in the correct location"),
3061 i_getLocationFull().c_str());
3062 throw rc;
3063 }
3064 }
3065
3066 /* Check VMs which have this medium attached to*/
3067 std::vector<com::Guid> aMachineIds;
3068 rc = getMachineIds(aMachineIds);
3069 std::vector<com::Guid>::const_iterator currMachineID = aMachineIds.begin();
3070 std::vector<com::Guid>::const_iterator lastMachineID = aMachineIds.end();
3071
3072 while (currMachineID != lastMachineID)
3073 {
3074 Guid id(*currMachineID);
3075 ComObjPtr<Machine> aMachine;
3076
3077 alock.release();
3078 rc = m->pVirtualBox->i_findMachine(id, false, true, &aMachine);
3079 alock.acquire();
3080
3081 if (SUCCEEDED(rc))
3082 {
3083 ComObjPtr<SessionMachine> sm;
3084 ComPtr<IInternalSessionControl> ctl;
3085
3086 alock.release();
3087 bool ses = aMachine->i_isSessionOpenVM(sm, &ctl);
3088 alock.acquire();
3089
3090 if (ses)
3091 {
3092 rc = setError(VERR_VM_UNEXPECTED_VM_STATE,
3093 tr("At least the VM '%s' to whom this medium '%s' attached has currently an opened session. Stop all VMs before relocating this medium"),
3094 id.toString().c_str(),
3095 i_getLocationFull().c_str());
3096 throw rc;
3097 }
3098 }
3099 ++currMachineID;
3100 }
3101
3102 /* Build the source lock list. */
3103 MediumLockList *pMediumLockList(new MediumLockList());
3104 alock.release();
3105 rc = i_createMediumLockList(true /* fFailIfInaccessible */,
3106 this /* pToLockWrite */,
3107 true /* fMediumLockWriteAll */,
3108 NULL,
3109 *pMediumLockList);
3110 alock.acquire();
3111 if (FAILED(rc))
3112 {
3113 delete pMediumLockList;
3114 throw setError(rc,
3115 tr("Failed to create medium lock list for '%s'"),
3116 i_getLocationFull().c_str());
3117 }
3118 alock.release();
3119 rc = pMediumLockList->Lock();
3120 alock.acquire();
3121 if (FAILED(rc))
3122 {
3123 delete pMediumLockList;
3124 throw setError(rc,
3125 tr("Failed to lock media '%s'"),
3126 i_getLocationFull().c_str());
3127 }
3128
3129 pProgress.createObject();
3130 rc = pProgress->init(m->pVirtualBox,
3131 static_cast <IMedium *>(this),
3132 BstrFmt(tr("Moving medium '%s'"), m->strLocationFull.c_str()).raw(),
3133 TRUE /* aCancelable */);
3134
3135 /* Do the disk moving. */
3136 if (SUCCEEDED(rc))
3137 {
3138 ULONG mediumVariantFlags = i_getVariant();
3139
3140 /* setup task object to carry out the operation asynchronously */
3141 pTask = new Medium::MoveTask(this, pProgress,
3142 (MediumVariant_T)mediumVariantFlags,
3143 pMediumLockList);
3144 rc = pTask->rc();
3145 AssertComRC(rc);
3146 if (FAILED(rc))
3147 throw rc;
3148 }
3149
3150 }
3151 catch (HRESULT aRC) { rc = aRC; }
3152
3153 if (SUCCEEDED(rc))
3154 {
3155 rc = pTask->createThread();
3156
3157 if (SUCCEEDED(rc))
3158 pProgress.queryInterfaceTo(aProgress.asOutParam());
3159 }
3160 else
3161 {
3162 if (pTask)
3163 delete pTask;
3164 }
3165
3166 return rc;
3167}
3168
3169HRESULT Medium::compact(ComPtr<IProgress> &aProgress)
3170{
3171 HRESULT rc = S_OK;
3172 ComObjPtr<Progress> pProgress;
3173 Medium::Task *pTask = NULL;
3174
3175 try
3176 {
3177 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3178
3179 /* Build the medium lock list. */
3180 MediumLockList *pMediumLockList(new MediumLockList());
3181 alock.release();
3182 rc = i_createMediumLockList(true /* fFailIfInaccessible */ ,
3183 this /* pToLockWrite */,
3184 false /* fMediumLockWriteAll */,
3185 NULL,
3186 *pMediumLockList);
3187 alock.acquire();
3188 if (FAILED(rc))
3189 {
3190 delete pMediumLockList;
3191 throw rc;
3192 }
3193
3194 alock.release();
3195 rc = pMediumLockList->Lock();
3196 alock.acquire();
3197 if (FAILED(rc))
3198 {
3199 delete pMediumLockList;
3200 throw setError(rc,
3201 tr("Failed to lock media when compacting '%s'"),
3202 i_getLocationFull().c_str());
3203 }
3204
3205 pProgress.createObject();
3206 rc = pProgress->init(m->pVirtualBox,
3207 static_cast <IMedium *>(this),
3208 BstrFmt(tr("Compacting medium '%s'"), m->strLocationFull.c_str()).raw(),
3209 TRUE /* aCancelable */);
3210 if (FAILED(rc))
3211 {
3212 delete pMediumLockList;
3213 throw rc;
3214 }
3215
3216 /* setup task object to carry out the operation asynchronously */
3217 pTask = new Medium::CompactTask(this, pProgress, pMediumLockList);
3218 rc = pTask->rc();
3219 AssertComRC(rc);
3220 if (FAILED(rc))
3221 throw rc;
3222 }
3223 catch (HRESULT aRC) { rc = aRC; }
3224
3225 if (SUCCEEDED(rc))
3226 {
3227 rc = pTask->createThread();
3228
3229 if (SUCCEEDED(rc))
3230 pProgress.queryInterfaceTo(aProgress.asOutParam());
3231 }
3232 else if (pTask != NULL)
3233 delete pTask;
3234
3235 return rc;
3236}
3237
3238HRESULT Medium::resize(LONG64 aLogicalSize,
3239 ComPtr<IProgress> &aProgress)
3240{
3241 HRESULT rc = S_OK;
3242 ComObjPtr<Progress> pProgress;
3243 Medium::Task *pTask = NULL;
3244
3245 try
3246 {
3247 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3248
3249 /* Build the medium lock list. */
3250 MediumLockList *pMediumLockList(new MediumLockList());
3251 alock.release();
3252 rc = i_createMediumLockList(true /* fFailIfInaccessible */ ,
3253 this /* pToLockWrite */,
3254 false /* fMediumLockWriteAll */,
3255 NULL,
3256 *pMediumLockList);
3257 alock.acquire();
3258 if (FAILED(rc))
3259 {
3260 delete pMediumLockList;
3261 throw rc;
3262 }
3263
3264 alock.release();
3265 rc = pMediumLockList->Lock();
3266 alock.acquire();
3267 if (FAILED(rc))
3268 {
3269 delete pMediumLockList;
3270 throw setError(rc,
3271 tr("Failed to lock media when compacting '%s'"),
3272 i_getLocationFull().c_str());
3273 }
3274
3275 pProgress.createObject();
3276 rc = pProgress->init(m->pVirtualBox,
3277 static_cast <IMedium *>(this),
3278 BstrFmt(tr("Compacting medium '%s'"), m->strLocationFull.c_str()).raw(),
3279 TRUE /* aCancelable */);
3280 if (FAILED(rc))
3281 {
3282 delete pMediumLockList;
3283 throw rc;
3284 }
3285
3286 /* setup task object to carry out the operation asynchronously */
3287 pTask = new Medium::ResizeTask(this, aLogicalSize, pProgress, pMediumLockList);
3288 rc = pTask->rc();
3289 AssertComRC(rc);
3290 if (FAILED(rc))
3291 throw rc;
3292 }
3293 catch (HRESULT aRC) { rc = aRC; }
3294
3295 if (SUCCEEDED(rc))
3296 {
3297 rc = pTask->createThread();
3298
3299 if (SUCCEEDED(rc))
3300 pProgress.queryInterfaceTo(aProgress.asOutParam());
3301 }
3302 else if (pTask != NULL)
3303 delete pTask;
3304
3305 return rc;
3306}
3307
3308HRESULT Medium::reset(AutoCaller &autoCaller, ComPtr<IProgress> &aProgress)
3309{
3310 HRESULT rc = S_OK;
3311 ComObjPtr<Progress> pProgress;
3312 Medium::Task *pTask = NULL;
3313
3314 try
3315 {
3316 autoCaller.release();
3317
3318 /* It is possible that some previous/concurrent uninit has already
3319 * cleared the pVirtualBox reference, see #uninit(). */
3320 ComObjPtr<VirtualBox> pVirtualBox(m->pVirtualBox);
3321
3322 /* canClose() needs the tree lock */
3323 AutoMultiWriteLock2 multilock(!pVirtualBox.isNull() ? &pVirtualBox->i_getMediaTreeLockHandle() : NULL,
3324 this->lockHandle()
3325 COMMA_LOCKVAL_SRC_POS);
3326
3327 autoCaller.add();
3328 if (FAILED(autoCaller.rc())) return autoCaller.rc();
3329
3330 LogFlowThisFunc(("ENTER for medium %s\n", m->strLocationFull.c_str()));
3331
3332 if (m->pParent.isNull())
3333 throw setError(VBOX_E_NOT_SUPPORTED,
3334 tr("Medium type of '%s' is not differencing"),
3335 m->strLocationFull.c_str());
3336
3337 rc = i_canClose();
3338 if (FAILED(rc))
3339 throw rc;
3340
3341 /* Build the medium lock list. */
3342 MediumLockList *pMediumLockList(new MediumLockList());
3343 multilock.release();
3344 rc = i_createMediumLockList(true /* fFailIfInaccessible */,
3345 this /* pToLockWrite */,
3346 false /* fMediumLockWriteAll */,
3347 NULL,
3348 *pMediumLockList);
3349 multilock.acquire();
3350 if (FAILED(rc))
3351 {
3352 delete pMediumLockList;
3353 throw rc;
3354 }
3355
3356 multilock.release();
3357 rc = pMediumLockList->Lock();
3358 multilock.acquire();
3359 if (FAILED(rc))
3360 {
3361 delete pMediumLockList;
3362 throw setError(rc,
3363 tr("Failed to lock media when resetting '%s'"),
3364 i_getLocationFull().c_str());
3365 }
3366
3367 pProgress.createObject();
3368 rc = pProgress->init(m->pVirtualBox,
3369 static_cast<IMedium*>(this),
3370 BstrFmt(tr("Resetting differencing medium '%s'"), m->strLocationFull.c_str()).raw(),
3371 FALSE /* aCancelable */);
3372 if (FAILED(rc))
3373 throw rc;
3374
3375 /* setup task object to carry out the operation asynchronously */
3376 pTask = new Medium::ResetTask(this, pProgress, pMediumLockList);
3377 rc = pTask->rc();
3378 AssertComRC(rc);
3379 if (FAILED(rc))
3380 throw rc;
3381 }
3382 catch (HRESULT aRC) { rc = aRC; }
3383
3384 if (SUCCEEDED(rc))
3385 {
3386 rc = pTask->createThread();
3387
3388 if (SUCCEEDED(rc))
3389 pProgress.queryInterfaceTo(aProgress.asOutParam());
3390 }
3391 else if (pTask != NULL)
3392 delete pTask;
3393
3394 LogFlowThisFunc(("LEAVE, rc=%Rhrc\n", rc));
3395
3396 return rc;
3397}
3398
3399HRESULT Medium::changeEncryption(const com::Utf8Str &aCurrentPassword, const com::Utf8Str &aCipher,
3400 const com::Utf8Str &aNewPassword, const com::Utf8Str &aNewPasswordId,
3401 ComPtr<IProgress> &aProgress)
3402{
3403 HRESULT rc = S_OK;
3404 ComObjPtr<Progress> pProgress;
3405 Medium::Task *pTask = NULL;
3406
3407 try
3408 {
3409 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3410
3411 DeviceType_T devType = i_getDeviceType();
3412 /* Cannot encrypt DVD or floppy images so far. */
3413 if ( devType == DeviceType_DVD
3414 || devType == DeviceType_Floppy)
3415 return setError(VBOX_E_INVALID_OBJECT_STATE,
3416 tr("Cannot encrypt DVD or Floppy medium '%s'"),
3417 m->strLocationFull.c_str());
3418
3419 /* Cannot encrypt media which are attached to more than one virtual machine. */
3420 if (m->backRefs.size() > 1)
3421 return setError(VBOX_E_INVALID_OBJECT_STATE,
3422 tr("Cannot encrypt medium '%s' because it is attached to %d virtual machines"),
3423 m->strLocationFull.c_str(), m->backRefs.size());
3424
3425 if (i_getChildren().size() != 0)
3426 return setError(VBOX_E_INVALID_OBJECT_STATE,
3427 tr("Cannot encrypt medium '%s' because it has %d children"),
3428 m->strLocationFull.c_str(), i_getChildren().size());
3429
3430 /* Build the medium lock list. */
3431 MediumLockList *pMediumLockList(new MediumLockList());
3432 alock.release();
3433 rc = i_createMediumLockList(true /* fFailIfInaccessible */ ,
3434 this /* pToLockWrite */,
3435 true /* fMediumLockAllWrite */,
3436 NULL,
3437 *pMediumLockList);
3438 alock.acquire();
3439 if (FAILED(rc))
3440 {
3441 delete pMediumLockList;
3442 throw rc;
3443 }
3444
3445 alock.release();
3446 rc = pMediumLockList->Lock();
3447 alock.acquire();
3448 if (FAILED(rc))
3449 {
3450 delete pMediumLockList;
3451 throw setError(rc,
3452 tr("Failed to lock media for encryption '%s'"),
3453 i_getLocationFull().c_str());
3454 }
3455
3456 /*
3457 * Check all media in the chain to not contain any branches or references to
3458 * other virtual machines, we support encrypting only a list of differencing media at the moment.
3459 */
3460 MediumLockList::Base::const_iterator mediumListBegin = pMediumLockList->GetBegin();
3461 MediumLockList::Base::const_iterator mediumListEnd = pMediumLockList->GetEnd();
3462 for (MediumLockList::Base::const_iterator it = mediumListBegin;
3463 it != mediumListEnd;
3464 ++it)
3465 {
3466 const MediumLock &mediumLock = *it;
3467 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
3468 AutoReadLock mediumReadLock(pMedium COMMA_LOCKVAL_SRC_POS);
3469
3470 Assert(pMedium->m->state == MediumState_LockedWrite);
3471
3472 if (pMedium->m->backRefs.size() > 1)
3473 {
3474 rc = setError(VBOX_E_INVALID_OBJECT_STATE,
3475 tr("Cannot encrypt medium '%s' because it is attached to %d virtual machines"),
3476 pMedium->m->strLocationFull.c_str(), pMedium->m->backRefs.size());
3477 break;
3478 }
3479 else if (pMedium->i_getChildren().size() > 1)
3480 {
3481 rc = setError(VBOX_E_INVALID_OBJECT_STATE,
3482 tr("Cannot encrypt medium '%s' because it has %d children"),
3483 pMedium->m->strLocationFull.c_str(), pMedium->i_getChildren().size());
3484 break;
3485 }
3486 }
3487
3488 if (FAILED(rc))
3489 {
3490 delete pMediumLockList;
3491 throw rc;
3492 }
3493
3494 const char *pszAction = "Encrypting";
3495 if ( aCurrentPassword.isNotEmpty()
3496 && aCipher.isEmpty())
3497 pszAction = "Decrypting";
3498
3499 pProgress.createObject();
3500 rc = pProgress->init(m->pVirtualBox,
3501 static_cast <IMedium *>(this),
3502 BstrFmt(tr("%s medium '%s'"), pszAction, m->strLocationFull.c_str()).raw(),
3503 TRUE /* aCancelable */);
3504 if (FAILED(rc))
3505 {
3506 delete pMediumLockList;
3507 throw rc;
3508 }
3509
3510 /* setup task object to carry out the operation asynchronously */
3511 pTask = new Medium::EncryptTask(this, aNewPassword, aCurrentPassword,
3512 aCipher, aNewPasswordId, pProgress, pMediumLockList);
3513 rc = pTask->rc();
3514 AssertComRC(rc);
3515 if (FAILED(rc))
3516 throw rc;
3517 }
3518 catch (HRESULT aRC) { rc = aRC; }
3519
3520 if (SUCCEEDED(rc))
3521 {
3522 rc = pTask->createThread();
3523
3524 if (SUCCEEDED(rc))
3525 pProgress.queryInterfaceTo(aProgress.asOutParam());
3526 }
3527 else if (pTask != NULL)
3528 delete pTask;
3529
3530 return rc;
3531}
3532
3533HRESULT Medium::getEncryptionSettings(com::Utf8Str &aCipher, com::Utf8Str &aPasswordId)
3534{
3535#ifndef VBOX_WITH_EXTPACK
3536 RT_NOREF(aCipher, aPasswordId);
3537#endif
3538 HRESULT rc = S_OK;
3539
3540 try
3541 {
3542 ComObjPtr<Medium> pBase = i_getBase();
3543 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3544
3545 /* Check whether encryption is configured for this medium. */
3546 settings::StringsMap::iterator it = pBase->m->mapProperties.find("CRYPT/KeyStore");
3547 if (it == pBase->m->mapProperties.end())
3548 throw VBOX_E_NOT_SUPPORTED;
3549
3550# ifdef VBOX_WITH_EXTPACK
3551 ExtPackManager *pExtPackManager = m->pVirtualBox->i_getExtPackManager();
3552 if (pExtPackManager->i_isExtPackUsable(ORACLE_PUEL_EXTPACK_NAME))
3553 {
3554 /* Load the plugin */
3555 Utf8Str strPlugin;
3556 rc = pExtPackManager->i_getLibraryPathForExtPack(g_szVDPlugin, ORACLE_PUEL_EXTPACK_NAME, &strPlugin);
3557 if (SUCCEEDED(rc))
3558 {
3559 int vrc = VDPluginLoadFromFilename(strPlugin.c_str());
3560 if (RT_FAILURE(vrc))
3561 throw setError(VBOX_E_NOT_SUPPORTED,
3562 tr("Retrieving encryption settings of the image failed because the encryption plugin could not be loaded (%s)"),
3563 i_vdError(vrc).c_str());
3564 }
3565 else
3566 throw setError(VBOX_E_NOT_SUPPORTED,
3567 tr("Encryption is not supported because the extension pack '%s' is missing the encryption plugin (old extension pack installed?)"),
3568 ORACLE_PUEL_EXTPACK_NAME);
3569 }
3570 else
3571 throw setError(VBOX_E_NOT_SUPPORTED,
3572 tr("Encryption is not supported because the extension pack '%s' is missing"),
3573 ORACLE_PUEL_EXTPACK_NAME);
3574
3575 PVDISK pDisk = NULL;
3576 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &pDisk);
3577 ComAssertRCThrow(vrc, E_FAIL);
3578
3579 Medium::CryptoFilterSettings CryptoSettings;
3580
3581 i_taskEncryptSettingsSetup(&CryptoSettings, NULL, it->second.c_str(), NULL, false /* fCreateKeyStore */);
3582 vrc = VDFilterAdd(pDisk, "CRYPT", VD_FILTER_FLAGS_READ | VD_FILTER_FLAGS_INFO, CryptoSettings.vdFilterIfaces);
3583 if (RT_FAILURE(vrc))
3584 throw setError(VBOX_E_INVALID_OBJECT_STATE,
3585 tr("Failed to load the encryption filter: %s"),
3586 i_vdError(vrc).c_str());
3587
3588 it = pBase->m->mapProperties.find("CRYPT/KeyId");
3589 if (it == pBase->m->mapProperties.end())
3590 throw setError(VBOX_E_INVALID_OBJECT_STATE,
3591 tr("Image is configured for encryption but doesn't has a KeyId set"));
3592
3593 aPasswordId = it->second.c_str();
3594 aCipher = CryptoSettings.pszCipherReturned;
3595 RTStrFree(CryptoSettings.pszCipherReturned);
3596
3597 VDDestroy(pDisk);
3598# else
3599 throw setError(VBOX_E_NOT_SUPPORTED,
3600 tr("Encryption is not supported because extension pack support is not built in"));
3601# endif
3602 }
3603 catch (HRESULT aRC) { rc = aRC; }
3604
3605 return rc;
3606}
3607
3608HRESULT Medium::checkEncryptionPassword(const com::Utf8Str &aPassword)
3609{
3610 HRESULT rc = S_OK;
3611
3612 try
3613 {
3614 ComObjPtr<Medium> pBase = i_getBase();
3615 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
3616
3617 settings::StringsMap::iterator it = pBase->m->mapProperties.find("CRYPT/KeyStore");
3618 if (it == pBase->m->mapProperties.end())
3619 throw setError(VBOX_E_NOT_SUPPORTED,
3620 tr("The image is not configured for encryption"));
3621
3622 if (aPassword.isEmpty())
3623 throw setError(E_INVALIDARG,
3624 tr("The given password must not be empty"));
3625
3626# ifdef VBOX_WITH_EXTPACK
3627 ExtPackManager *pExtPackManager = m->pVirtualBox->i_getExtPackManager();
3628 if (pExtPackManager->i_isExtPackUsable(ORACLE_PUEL_EXTPACK_NAME))
3629 {
3630 /* Load the plugin */
3631 Utf8Str strPlugin;
3632 rc = pExtPackManager->i_getLibraryPathForExtPack(g_szVDPlugin, ORACLE_PUEL_EXTPACK_NAME, &strPlugin);
3633 if (SUCCEEDED(rc))
3634 {
3635 int vrc = VDPluginLoadFromFilename(strPlugin.c_str());
3636 if (RT_FAILURE(vrc))
3637 throw setError(VBOX_E_NOT_SUPPORTED,
3638 tr("Retrieving encryption settings of the image failed because the encryption plugin could not be loaded (%s)"),
3639 i_vdError(vrc).c_str());
3640 }
3641 else
3642 throw setError(VBOX_E_NOT_SUPPORTED,
3643 tr("Encryption is not supported because the extension pack '%s' is missing the encryption plugin (old extension pack installed?)"),
3644 ORACLE_PUEL_EXTPACK_NAME);
3645 }
3646 else
3647 throw setError(VBOX_E_NOT_SUPPORTED,
3648 tr("Encryption is not supported because the extension pack '%s' is missing"),
3649 ORACLE_PUEL_EXTPACK_NAME);
3650
3651 PVDISK pDisk = NULL;
3652 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &pDisk);
3653 ComAssertRCThrow(vrc, E_FAIL);
3654
3655 Medium::CryptoFilterSettings CryptoSettings;
3656
3657 i_taskEncryptSettingsSetup(&CryptoSettings, NULL, it->second.c_str(), aPassword.c_str(),
3658 false /* fCreateKeyStore */);
3659 vrc = VDFilterAdd(pDisk, "CRYPT", VD_FILTER_FLAGS_READ, CryptoSettings.vdFilterIfaces);
3660 if (vrc == VERR_VD_PASSWORD_INCORRECT)
3661 throw setError(VBOX_E_PASSWORD_INCORRECT,
3662 tr("The given password is incorrect"));
3663 else if (RT_FAILURE(vrc))
3664 throw setError(VBOX_E_INVALID_OBJECT_STATE,
3665 tr("Failed to load the encryption filter: %s"),
3666 i_vdError(vrc).c_str());
3667
3668 VDDestroy(pDisk);
3669# else
3670 throw setError(VBOX_E_NOT_SUPPORTED,
3671 tr("Encryption is not supported because extension pack support is not built in"));
3672# endif
3673 }
3674 catch (HRESULT aRC) { rc = aRC; }
3675
3676 return rc;
3677}
3678
3679////////////////////////////////////////////////////////////////////////////////
3680//
3681// Medium public internal methods
3682//
3683////////////////////////////////////////////////////////////////////////////////
3684
3685/**
3686 * Internal method to return the medium's parent medium. Must have caller + locking!
3687 * @return
3688 */
3689const ComObjPtr<Medium>& Medium::i_getParent() const
3690{
3691 return m->pParent;
3692}
3693
3694/**
3695 * Internal method to return the medium's list of child media. Must have caller + locking!
3696 * @return
3697 */
3698const MediaList& Medium::i_getChildren() const
3699{
3700 return m->llChildren;
3701}
3702
3703/**
3704 * Internal method to return the medium's GUID. Must have caller + locking!
3705 * @return
3706 */
3707const Guid& Medium::i_getId() const
3708{
3709 return m->id;
3710}
3711
3712/**
3713 * Internal method to return the medium's state. Must have caller + locking!
3714 * @return
3715 */
3716MediumState_T Medium::i_getState() const
3717{
3718 return m->state;
3719}
3720
3721/**
3722 * Internal method to return the medium's variant. Must have caller + locking!
3723 * @return
3724 */
3725MediumVariant_T Medium::i_getVariant() const
3726{
3727 return m->variant;
3728}
3729
3730/**
3731 * Internal method which returns true if this medium represents a host drive.
3732 * @return
3733 */
3734bool Medium::i_isHostDrive() const
3735{
3736 return m->hostDrive;
3737}
3738
3739/**
3740 * Internal method to return the medium's full location. Must have caller + locking!
3741 * @return
3742 */
3743const Utf8Str& Medium::i_getLocationFull() const
3744{
3745 return m->strLocationFull;
3746}
3747
3748/**
3749 * Internal method to return the medium's format string. Must have caller + locking!
3750 * @return
3751 */
3752const Utf8Str& Medium::i_getFormat() const
3753{
3754 return m->strFormat;
3755}
3756
3757/**
3758 * Internal method to return the medium's format object. Must have caller + locking!
3759 * @return
3760 */
3761const ComObjPtr<MediumFormat>& Medium::i_getMediumFormat() const
3762{
3763 return m->formatObj;
3764}
3765
3766/**
3767 * Internal method that returns true if the medium is represented by a file on the host disk
3768 * (and not iSCSI or something).
3769 * @return
3770 */
3771bool Medium::i_isMediumFormatFile() const
3772{
3773 if ( m->formatObj
3774 && (m->formatObj->i_getCapabilities() & MediumFormatCapabilities_File)
3775 )
3776 return true;
3777 return false;
3778}
3779
3780/**
3781 * Internal method to return the medium's size. Must have caller + locking!
3782 * @return
3783 */
3784uint64_t Medium::i_getSize() const
3785{
3786 return m->size;
3787}
3788
3789/**
3790 * Internal method to return the medium's size. Must have caller + locking!
3791 * @return
3792 */
3793uint64_t Medium::i_getLogicalSize() const
3794{
3795 return m->logicalSize;
3796}
3797
3798/**
3799 * Returns the medium device type. Must have caller + locking!
3800 * @return
3801 */
3802DeviceType_T Medium::i_getDeviceType() const
3803{
3804 return m->devType;
3805}
3806
3807/**
3808 * Returns the medium type. Must have caller + locking!
3809 * @return
3810 */
3811MediumType_T Medium::i_getType() const
3812{
3813 return m->type;
3814}
3815
3816/**
3817 * Returns a short version of the location attribute.
3818 *
3819 * @note Must be called from under this object's read or write lock.
3820 */
3821Utf8Str Medium::i_getName()
3822{
3823 Utf8Str name = RTPathFilename(m->strLocationFull.c_str());
3824 return name;
3825}
3826
3827/**
3828 * This adds the given UUID to the list of media registries in which this
3829 * medium should be registered. The UUID can either be a machine UUID,
3830 * to add a machine registry, or the global registry UUID as returned by
3831 * VirtualBox::getGlobalRegistryId().
3832 *
3833 * Note that for hard disks, this method does nothing if the medium is
3834 * already in another registry to avoid having hard disks in more than
3835 * one registry, which causes trouble with keeping diff images in sync.
3836 * See getFirstRegistryMachineId() for details.
3837 *
3838 * @param id
3839 * @return true if the registry was added; false if the given id was already on the list.
3840 */
3841bool Medium::i_addRegistry(const Guid& id)
3842{
3843 AutoCaller autoCaller(this);
3844 if (FAILED(autoCaller.rc()))
3845 return false;
3846 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3847
3848 bool fAdd = true;
3849
3850 // hard disks cannot be in more than one registry
3851 if ( m->devType == DeviceType_HardDisk
3852 && m->llRegistryIDs.size() > 0)
3853 fAdd = false;
3854
3855 // no need to add the UUID twice
3856 if (fAdd)
3857 {
3858 for (GuidList::const_iterator it = m->llRegistryIDs.begin();
3859 it != m->llRegistryIDs.end();
3860 ++it)
3861 {
3862 if ((*it) == id)
3863 {
3864 fAdd = false;
3865 break;
3866 }
3867 }
3868 }
3869
3870 if (fAdd)
3871 m->llRegistryIDs.push_back(id);
3872
3873 return fAdd;
3874}
3875
3876/**
3877 * This adds the given UUID to the list of media registries in which this
3878 * medium should be registered. The UUID can either be a machine UUID,
3879 * to add a machine registry, or the global registry UUID as returned by
3880 * VirtualBox::getGlobalRegistryId(). This recurses over all children.
3881 *
3882 * Note that for hard disks, this method does nothing if the medium is
3883 * already in another registry to avoid having hard disks in more than
3884 * one registry, which causes trouble with keeping diff images in sync.
3885 * See getFirstRegistryMachineId() for details.
3886 *
3887 * @note the caller must hold the media tree lock for reading.
3888 *
3889 * @param id
3890 * @return true if the registry was added; false if the given id was already on the list.
3891 */
3892bool Medium::i_addRegistryRecursive(const Guid &id)
3893{
3894 AutoCaller autoCaller(this);
3895 if (FAILED(autoCaller.rc()))
3896 return false;
3897
3898 bool fAdd = i_addRegistry(id);
3899
3900 // protected by the medium tree lock held by our original caller
3901 for (MediaList::const_iterator it = i_getChildren().begin();
3902 it != i_getChildren().end();
3903 ++it)
3904 {
3905 Medium *pChild = *it;
3906 fAdd |= pChild->i_addRegistryRecursive(id);
3907 }
3908
3909 return fAdd;
3910}
3911
3912/**
3913 * Removes the given UUID from the list of media registry UUIDs of this medium.
3914 *
3915 * @param id
3916 * @return true if the UUID was found or false if not.
3917 */
3918bool Medium::i_removeRegistry(const Guid &id)
3919{
3920 AutoCaller autoCaller(this);
3921 if (FAILED(autoCaller.rc()))
3922 return false;
3923 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
3924
3925 bool fRemove = false;
3926
3927 /// @todo r=klaus eliminate this code, replace it by using find.
3928 for (GuidList::iterator it = m->llRegistryIDs.begin();
3929 it != m->llRegistryIDs.end();
3930 ++it)
3931 {
3932 if ((*it) == id)
3933 {
3934 // getting away with this as the iterator isn't used after
3935 m->llRegistryIDs.erase(it);
3936 fRemove = true;
3937 break;
3938 }
3939 }
3940
3941 return fRemove;
3942}
3943
3944/**
3945 * Removes the given UUID from the list of media registry UUIDs, for this
3946 * medium and all its children recursively.
3947 *
3948 * @note the caller must hold the media tree lock for reading.
3949 *
3950 * @param id
3951 * @return true if the UUID was found or false if not.
3952 */
3953bool Medium::i_removeRegistryRecursive(const Guid &id)
3954{
3955 AutoCaller autoCaller(this);
3956 if (FAILED(autoCaller.rc()))
3957 return false;
3958
3959 bool fRemove = i_removeRegistry(id);
3960
3961 // protected by the medium tree lock held by our original caller
3962 for (MediaList::const_iterator it = i_getChildren().begin();
3963 it != i_getChildren().end();
3964 ++it)
3965 {
3966 Medium *pChild = *it;
3967 fRemove |= pChild->i_removeRegistryRecursive(id);
3968 }
3969
3970 return fRemove;
3971}
3972
3973/**
3974 * Returns true if id is in the list of media registries for this medium.
3975 *
3976 * Must have caller + read locking!
3977 *
3978 * @param id
3979 * @return
3980 */
3981bool Medium::i_isInRegistry(const Guid &id)
3982{
3983 /// @todo r=klaus eliminate this code, replace it by using find.
3984 for (GuidList::const_iterator it = m->llRegistryIDs.begin();
3985 it != m->llRegistryIDs.end();
3986 ++it)
3987 {
3988 if (*it == id)
3989 return true;
3990 }
3991
3992 return false;
3993}
3994
3995/**
3996 * Internal method to return the medium's first registry machine (i.e. the machine in whose
3997 * machine XML this medium is listed).
3998 *
3999 * Every attached medium must now (4.0) reside in at least one media registry, which is identified
4000 * by a UUID. This is either a machine UUID if the machine is from 4.0 or newer, in which case
4001 * machines have their own media registries, or it is the pseudo-UUID of the VirtualBox
4002 * object if the machine is old and still needs the global registry in VirtualBox.xml.
4003 *
4004 * By definition, hard disks may only be in one media registry, in which all its children
4005 * will be stored as well. Otherwise we run into problems with having keep multiple registries
4006 * in sync. (This is the "cloned VM" case in which VM1 may link to the disks of VM2; in this
4007 * case, only VM2's registry is used for the disk in question.)
4008 *
4009 * If there is no medium registry, particularly if the medium has not been attached yet, this
4010 * does not modify uuid and returns false.
4011 *
4012 * ISOs and RAWs, by contrast, can be in more than one repository to make things easier for
4013 * the user.
4014 *
4015 * Must have caller + locking!
4016 *
4017 * @param uuid Receives first registry machine UUID, if available.
4018 * @return true if uuid was set.
4019 */
4020bool Medium::i_getFirstRegistryMachineId(Guid &uuid) const
4021{
4022 if (m->llRegistryIDs.size())
4023 {
4024 uuid = m->llRegistryIDs.front();
4025 return true;
4026 }
4027 return false;
4028}
4029
4030/**
4031 * Marks all the registries in which this medium is registered as modified.
4032 */
4033void Medium::i_markRegistriesModified()
4034{
4035 AutoCaller autoCaller(this);
4036 if (FAILED(autoCaller.rc())) return;
4037
4038 // Get local copy, as keeping the lock over VirtualBox::markRegistryModified
4039 // causes trouble with the lock order
4040 GuidList llRegistryIDs;
4041 {
4042 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
4043 llRegistryIDs = m->llRegistryIDs;
4044 }
4045
4046 autoCaller.release();
4047
4048 /* Save the error information now, the implicit restore when this goes
4049 * out of scope will throw away spurious additional errors created below. */
4050 ErrorInfoKeeper eik;
4051 for (GuidList::const_iterator it = llRegistryIDs.begin();
4052 it != llRegistryIDs.end();
4053 ++it)
4054 {
4055 m->pVirtualBox->i_markRegistryModified(*it);
4056 }
4057}
4058
4059/**
4060 * Adds the given machine and optionally the snapshot to the list of the objects
4061 * this medium is attached to.
4062 *
4063 * @param aMachineId Machine ID.
4064 * @param aSnapshotId Snapshot ID; when non-empty, adds a snapshot attachment.
4065 */
4066HRESULT Medium::i_addBackReference(const Guid &aMachineId,
4067 const Guid &aSnapshotId /*= Guid::Empty*/)
4068{
4069 AssertReturn(aMachineId.isValid(), E_FAIL);
4070
4071 LogFlowThisFunc(("ENTER, aMachineId: {%RTuuid}, aSnapshotId: {%RTuuid}\n", aMachineId.raw(), aSnapshotId.raw()));
4072
4073 AutoCaller autoCaller(this);
4074 AssertComRCReturnRC(autoCaller.rc());
4075
4076 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
4077
4078 switch (m->state)
4079 {
4080 case MediumState_Created:
4081 case MediumState_Inaccessible:
4082 case MediumState_LockedRead:
4083 case MediumState_LockedWrite:
4084 break;
4085
4086 default:
4087 return i_setStateError();
4088 }
4089
4090 if (m->numCreateDiffTasks > 0)
4091 return setError(VBOX_E_OBJECT_IN_USE,
4092 tr("Cannot attach medium '%s' {%RTuuid}: %u differencing child media are being created"),
4093 m->strLocationFull.c_str(),
4094 m->id.raw(),
4095 m->numCreateDiffTasks);
4096
4097 BackRefList::iterator it = std::find_if(m->backRefs.begin(),
4098 m->backRefs.end(),
4099 BackRef::EqualsTo(aMachineId));
4100 if (it == m->backRefs.end())
4101 {
4102 BackRef ref(aMachineId, aSnapshotId);
4103 m->backRefs.push_back(ref);
4104
4105 return S_OK;
4106 }
4107
4108 // if the caller has not supplied a snapshot ID, then we're attaching
4109 // to a machine a medium which represents the machine's current state,
4110 // so set the flag
4111
4112 if (aSnapshotId.isZero())
4113 {
4114 /* sanity: no duplicate attachments */
4115 if (it->fInCurState)
4116 return setError(VBOX_E_OBJECT_IN_USE,
4117 tr("Cannot attach medium '%s' {%RTuuid}: medium is already associated with the current state of machine uuid {%RTuuid}!"),
4118 m->strLocationFull.c_str(),
4119 m->id.raw(),
4120 aMachineId.raw());
4121 it->fInCurState = true;
4122
4123 return S_OK;
4124 }
4125
4126 // otherwise: a snapshot medium is being attached
4127
4128 /* sanity: no duplicate attachments */
4129 for (GuidList::const_iterator jt = it->llSnapshotIds.begin();
4130 jt != it->llSnapshotIds.end();
4131 ++jt)
4132 {
4133 const Guid &idOldSnapshot = *jt;
4134
4135 if (idOldSnapshot == aSnapshotId)
4136 {
4137#ifdef DEBUG
4138 i_dumpBackRefs();
4139#endif
4140 return setError(VBOX_E_OBJECT_IN_USE,
4141 tr("Cannot attach medium '%s' {%RTuuid} from snapshot '%RTuuid': medium is already in use by this snapshot!"),
4142 m->strLocationFull.c_str(),
4143 m->id.raw(),
4144 aSnapshotId.raw());
4145 }
4146 }
4147
4148 it->llSnapshotIds.push_back(aSnapshotId);
4149 // Do not touch fInCurState, as the image may be attached to the current
4150 // state *and* a snapshot, otherwise we lose the current state association!
4151
4152 LogFlowThisFuncLeave();
4153
4154 return S_OK;
4155}
4156
4157/**
4158 * Removes the given machine and optionally the snapshot from the list of the
4159 * objects this medium is attached to.
4160 *
4161 * @param aMachineId Machine ID.
4162 * @param aSnapshotId Snapshot ID; when non-empty, removes the snapshot
4163 * attachment.
4164 */
4165HRESULT Medium::i_removeBackReference(const Guid &aMachineId,
4166 const Guid &aSnapshotId /*= Guid::Empty*/)
4167{
4168 AssertReturn(aMachineId.isValid(), E_FAIL);
4169
4170 AutoCaller autoCaller(this);
4171 AssertComRCReturnRC(autoCaller.rc());
4172
4173 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
4174
4175 BackRefList::iterator it =
4176 std::find_if(m->backRefs.begin(), m->backRefs.end(),
4177 BackRef::EqualsTo(aMachineId));
4178 AssertReturn(it != m->backRefs.end(), E_FAIL);
4179
4180 if (aSnapshotId.isZero())
4181 {
4182 /* remove the current state attachment */
4183 it->fInCurState = false;
4184 }
4185 else
4186 {
4187 /* remove the snapshot attachment */
4188 GuidList::iterator jt = std::find(it->llSnapshotIds.begin(),
4189 it->llSnapshotIds.end(),
4190 aSnapshotId);
4191
4192 AssertReturn(jt != it->llSnapshotIds.end(), E_FAIL);
4193 it->llSnapshotIds.erase(jt);
4194 }
4195
4196 /* if the backref becomes empty, remove it */
4197 if (it->fInCurState == false && it->llSnapshotIds.size() == 0)
4198 m->backRefs.erase(it);
4199
4200 return S_OK;
4201}
4202
4203/**
4204 * Internal method to return the medium's list of backrefs. Must have caller + locking!
4205 * @return
4206 */
4207const Guid* Medium::i_getFirstMachineBackrefId() const
4208{
4209 if (!m->backRefs.size())
4210 return NULL;
4211
4212 return &m->backRefs.front().machineId;
4213}
4214
4215/**
4216 * Internal method which returns a machine that either this medium or one of its children
4217 * is attached to. This is used for finding a replacement media registry when an existing
4218 * media registry is about to be deleted in VirtualBox::unregisterMachine().
4219 *
4220 * Must have caller + locking, *and* caller must hold the media tree lock!
4221 * @return
4222 */
4223const Guid* Medium::i_getAnyMachineBackref() const
4224{
4225 if (m->backRefs.size())
4226 return &m->backRefs.front().machineId;
4227
4228 for (MediaList::const_iterator it = i_getChildren().begin();
4229 it != i_getChildren().end();
4230 ++it)
4231 {
4232 Medium *pChild = *it;
4233 // recurse for this child
4234 const Guid* puuid;
4235 if ((puuid = pChild->i_getAnyMachineBackref()))
4236 return puuid;
4237 }
4238
4239 return NULL;
4240}
4241
4242const Guid* Medium::i_getFirstMachineBackrefSnapshotId() const
4243{
4244 if (!m->backRefs.size())
4245 return NULL;
4246
4247 const BackRef &ref = m->backRefs.front();
4248 if (ref.llSnapshotIds.empty())
4249 return NULL;
4250
4251 return &ref.llSnapshotIds.front();
4252}
4253
4254size_t Medium::i_getMachineBackRefCount() const
4255{
4256 return m->backRefs.size();
4257}
4258
4259#ifdef DEBUG
4260/**
4261 * Debugging helper that gets called after VirtualBox initialization that writes all
4262 * machine backreferences to the debug log.
4263 */
4264void Medium::i_dumpBackRefs()
4265{
4266 AutoCaller autoCaller(this);
4267 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
4268
4269 LogFlowThisFunc(("Dumping backrefs for medium '%s':\n", m->strLocationFull.c_str()));
4270
4271 for (BackRefList::iterator it2 = m->backRefs.begin();
4272 it2 != m->backRefs.end();
4273 ++it2)
4274 {
4275 const BackRef &ref = *it2;
4276 LogFlowThisFunc((" Backref from machine {%RTuuid} (fInCurState: %d)\n", ref.machineId.raw(), ref.fInCurState));
4277
4278 for (GuidList::const_iterator jt2 = it2->llSnapshotIds.begin();
4279 jt2 != it2->llSnapshotIds.end();
4280 ++jt2)
4281 {
4282 const Guid &id = *jt2;
4283 LogFlowThisFunc((" Backref from snapshot {%RTuuid}\n", id.raw()));
4284 }
4285 }
4286}
4287#endif
4288
4289/**
4290 * Checks if the given change of \a aOldPath to \a aNewPath affects the location
4291 * of this media and updates it if necessary to reflect the new location.
4292 *
4293 * @param strOldPath Old path (full).
4294 * @param strNewPath New path (full).
4295 *
4296 * @note Locks this object for writing.
4297 */
4298HRESULT Medium::i_updatePath(const Utf8Str &strOldPath, const Utf8Str &strNewPath)
4299{
4300 AssertReturn(!strOldPath.isEmpty(), E_FAIL);
4301 AssertReturn(!strNewPath.isEmpty(), E_FAIL);
4302
4303 AutoCaller autoCaller(this);
4304 if (FAILED(autoCaller.rc())) return autoCaller.rc();
4305
4306 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
4307
4308 LogFlowThisFunc(("locationFull.before='%s'\n", m->strLocationFull.c_str()));
4309
4310 const char *pcszMediumPath = m->strLocationFull.c_str();
4311
4312 if (RTPathStartsWith(pcszMediumPath, strOldPath.c_str()))
4313 {
4314 Utf8Str newPath(strNewPath);
4315 newPath.append(pcszMediumPath + strOldPath.length());
4316 unconst(m->strLocationFull) = newPath;
4317
4318 LogFlowThisFunc(("locationFull.after='%s'\n", m->strLocationFull.c_str()));
4319 // we changed something
4320 return S_OK;
4321 }
4322
4323 // no change was necessary, signal error which the caller needs to interpret
4324 return VBOX_E_FILE_ERROR;
4325}
4326
4327/**
4328 * Returns the base medium of the media chain this medium is part of.
4329 *
4330 * The base medium is found by walking up the parent-child relationship axis.
4331 * If the medium doesn't have a parent (i.e. it's a base medium), it
4332 * returns itself in response to this method.
4333 *
4334 * @param aLevel Where to store the number of ancestors of this medium
4335 * (zero for the base), may be @c NULL.
4336 *
4337 * @note Locks medium tree for reading.
4338 */
4339ComObjPtr<Medium> Medium::i_getBase(uint32_t *aLevel /*= NULL*/)
4340{
4341 ComObjPtr<Medium> pBase;
4342
4343 /* it is possible that some previous/concurrent uninit has already cleared
4344 * the pVirtualBox reference, and in this case we don't need to continue */
4345 ComObjPtr<VirtualBox> pVirtualBox(m->pVirtualBox);
4346 if (!pVirtualBox)
4347 return pBase;
4348
4349 /* we access m->pParent */
4350 AutoReadLock treeLock(pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
4351
4352 AutoCaller autoCaller(this);
4353 AssertReturn(autoCaller.isOk(), pBase);
4354
4355 pBase = this;
4356 uint32_t level = 0;
4357
4358 if (m->pParent)
4359 {
4360 for (;;)
4361 {
4362 AutoCaller baseCaller(pBase);
4363 AssertReturn(baseCaller.isOk(), pBase);
4364
4365 if (pBase->m->pParent.isNull())
4366 break;
4367
4368 pBase = pBase->m->pParent;
4369 ++level;
4370 }
4371 }
4372
4373 if (aLevel != NULL)
4374 *aLevel = level;
4375
4376 return pBase;
4377}
4378
4379/**
4380 * Returns the depth of this medium in the media chain.
4381 *
4382 * @note Locks medium tree for reading.
4383 */
4384uint32_t Medium::i_getDepth()
4385{
4386 /* it is possible that some previous/concurrent uninit has already cleared
4387 * the pVirtualBox reference, and in this case we don't need to continue */
4388 ComObjPtr<VirtualBox> pVirtualBox(m->pVirtualBox);
4389 if (!pVirtualBox)
4390 return 1;
4391
4392 /* we access m->pParent */
4393 AutoReadLock treeLock(pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
4394
4395 uint32_t cDepth = 0;
4396 ComObjPtr<Medium> pMedium(this);
4397 while (!pMedium.isNull())
4398 {
4399 AutoCaller autoCaller(this);
4400 AssertReturn(autoCaller.isOk(), cDepth + 1);
4401
4402 pMedium = pMedium->m->pParent;
4403 cDepth++;
4404 }
4405
4406 return cDepth;
4407}
4408
4409/**
4410 * Returns @c true if this medium cannot be modified because it has
4411 * dependents (children) or is part of the snapshot. Related to the medium
4412 * type and posterity, not to the current media state.
4413 *
4414 * @note Locks this object and medium tree for reading.
4415 */
4416bool Medium::i_isReadOnly()
4417{
4418 /* it is possible that some previous/concurrent uninit has already cleared
4419 * the pVirtualBox reference, and in this case we don't need to continue */
4420 ComObjPtr<VirtualBox> pVirtualBox(m->pVirtualBox);
4421 if (!pVirtualBox)
4422 return false;
4423
4424 /* we access children */
4425 AutoReadLock treeLock(m->pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
4426
4427 AutoCaller autoCaller(this);
4428 AssertComRCReturn(autoCaller.rc(), false);
4429
4430 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
4431
4432 switch (m->type)
4433 {
4434 case MediumType_Normal:
4435 {
4436 if (i_getChildren().size() != 0)
4437 return true;
4438
4439 for (BackRefList::const_iterator it = m->backRefs.begin();
4440 it != m->backRefs.end(); ++it)
4441 if (it->llSnapshotIds.size() != 0)
4442 return true;
4443
4444 if (m->variant & MediumVariant_VmdkStreamOptimized)
4445 return true;
4446
4447 return false;
4448 }
4449 case MediumType_Immutable:
4450 case MediumType_MultiAttach:
4451 return true;
4452 case MediumType_Writethrough:
4453 case MediumType_Shareable:
4454 case MediumType_Readonly: /* explicit readonly media has no diffs */
4455 return false;
4456 default:
4457 break;
4458 }
4459
4460 AssertFailedReturn(false);
4461}
4462
4463/**
4464 * Internal method to return the medium's size. Must have caller + locking!
4465 * @return
4466 */
4467void Medium::i_updateId(const Guid &id)
4468{
4469 unconst(m->id) = id;
4470}
4471
4472/**
4473 * Saves the settings of one medium.
4474 *
4475 * @note Caller MUST take care of the medium tree lock and caller.
4476 *
4477 * @param data Settings struct to be updated.
4478 * @param strHardDiskFolder Folder for which paths should be relative.
4479 */
4480void Medium::i_saveSettingsOne(settings::Medium &data, const Utf8Str &strHardDiskFolder)
4481{
4482 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
4483
4484 data.uuid = m->id;
4485
4486 // make path relative if needed
4487 if ( !strHardDiskFolder.isEmpty()
4488 && RTPathStartsWith(m->strLocationFull.c_str(), strHardDiskFolder.c_str())
4489 )
4490 data.strLocation = m->strLocationFull.substr(strHardDiskFolder.length() + 1);
4491 else
4492 data.strLocation = m->strLocationFull;
4493 data.strFormat = m->strFormat;
4494
4495 /* optional, only for diffs, default is false */
4496 if (m->pParent)
4497 data.fAutoReset = m->autoReset;
4498 else
4499 data.fAutoReset = false;
4500
4501 /* optional */
4502 data.strDescription = m->strDescription;
4503
4504 /* optional properties */
4505 data.properties.clear();
4506
4507 /* handle iSCSI initiator secrets transparently */
4508 bool fHaveInitiatorSecretEncrypted = false;
4509 Utf8Str strCiphertext;
4510 settings::StringsMap::const_iterator itPln = m->mapProperties.find("InitiatorSecret");
4511 if ( itPln != m->mapProperties.end()
4512 && !itPln->second.isEmpty())
4513 {
4514 /* Encrypt the plain secret. If that does not work (i.e. no or wrong settings key
4515 * specified), just use the encrypted secret (if there is any). */
4516 int rc = m->pVirtualBox->i_encryptSetting(itPln->second, &strCiphertext);
4517 if (RT_SUCCESS(rc))
4518 fHaveInitiatorSecretEncrypted = true;
4519 }
4520 for (settings::StringsMap::const_iterator it = m->mapProperties.begin();
4521 it != m->mapProperties.end();
4522 ++it)
4523 {
4524 /* only save properties that have non-default values */
4525 if (!it->second.isEmpty())
4526 {
4527 const Utf8Str &name = it->first;
4528 const Utf8Str &value = it->second;
4529 /* do NOT store the plain InitiatorSecret */
4530 if ( !fHaveInitiatorSecretEncrypted
4531 || !name.equals("InitiatorSecret"))
4532 data.properties[name] = value;
4533 }
4534 }
4535 if (fHaveInitiatorSecretEncrypted)
4536 data.properties["InitiatorSecretEncrypted"] = strCiphertext;
4537
4538 /* only for base media */
4539 if (m->pParent.isNull())
4540 data.hdType = m->type;
4541}
4542
4543/**
4544 * Saves medium data by putting it into the provided data structure.
4545 * Recurses over all children to save their settings, too.
4546 *
4547 * @param data Settings struct to be updated.
4548 * @param strHardDiskFolder Folder for which paths should be relative.
4549 *
4550 * @note Locks this object, medium tree and children for reading.
4551 */
4552HRESULT Medium::i_saveSettings(settings::Medium &data,
4553 const Utf8Str &strHardDiskFolder)
4554{
4555 /* we access m->pParent */
4556 AutoReadLock treeLock(m->pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
4557
4558 AutoCaller autoCaller(this);
4559 if (FAILED(autoCaller.rc())) return autoCaller.rc();
4560
4561 i_saveSettingsOne(data, strHardDiskFolder);
4562
4563 /* save all children */
4564 settings::MediaList &llSettingsChildren = data.llChildren;
4565 for (MediaList::const_iterator it = i_getChildren().begin();
4566 it != i_getChildren().end();
4567 ++it)
4568 {
4569 // Use the element straight in the list to reduce both unnecessary
4570 // deep copying (when unwinding the recursion the entire medium
4571 // settings sub-tree is copied) and the stack footprint (the settings
4572 // need almost 1K, and there can be VMs with long image chains.
4573 llSettingsChildren.push_back(settings::Medium::Empty);
4574 HRESULT rc = (*it)->i_saveSettings(llSettingsChildren.back(), strHardDiskFolder);
4575 if (FAILED(rc))
4576 {
4577 llSettingsChildren.pop_back();
4578 return rc;
4579 }
4580 }
4581
4582 return S_OK;
4583}
4584
4585/**
4586 * Constructs a medium lock list for this medium. The lock is not taken.
4587 *
4588 * @note Caller MUST NOT hold the media tree or medium lock.
4589 *
4590 * @param fFailIfInaccessible If true, this fails with an error if a medium is inaccessible. If false,
4591 * inaccessible media are silently skipped and not locked (i.e. their state remains "Inaccessible");
4592 * this is necessary for a VM's removable media VM startup for which we do not want to fail.
4593 * @param pToLockWrite If not NULL, associate a write lock with this medium object.
4594 * @param fMediumLockWriteAll Whether to associate a write lock to all other media too.
4595 * @param pToBeParent Medium which will become the parent of this medium.
4596 * @param mediumLockList Where to store the resulting list.
4597 */
4598HRESULT Medium::i_createMediumLockList(bool fFailIfInaccessible,
4599 Medium *pToLockWrite,
4600 bool fMediumLockWriteAll,
4601 Medium *pToBeParent,
4602 MediumLockList &mediumLockList)
4603{
4604 /** @todo r=klaus this needs to be reworked, as the code below uses
4605 * i_getParent without holding the tree lock, and changing this is
4606 * a significant amount of effort. */
4607 Assert(!m->pVirtualBox->i_getMediaTreeLockHandle().isWriteLockOnCurrentThread());
4608 Assert(!isWriteLockOnCurrentThread());
4609
4610 AutoCaller autoCaller(this);
4611 if (FAILED(autoCaller.rc())) return autoCaller.rc();
4612
4613 HRESULT rc = S_OK;
4614
4615 /* paranoid sanity checking if the medium has a to-be parent medium */
4616 if (pToBeParent)
4617 {
4618 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
4619 ComAssertRet(i_getParent().isNull(), E_FAIL);
4620 ComAssertRet(i_getChildren().size() == 0, E_FAIL);
4621 }
4622
4623 ErrorInfoKeeper eik;
4624 MultiResult mrc(S_OK);
4625
4626 ComObjPtr<Medium> pMedium = this;
4627 while (!pMedium.isNull())
4628 {
4629 AutoReadLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
4630
4631 /* Accessibility check must be first, otherwise locking interferes
4632 * with getting the medium state. Lock lists are not created for
4633 * fun, and thus getting the medium status is no luxury. */
4634 MediumState_T mediumState = pMedium->i_getState();
4635 if (mediumState == MediumState_Inaccessible)
4636 {
4637 alock.release();
4638 rc = pMedium->i_queryInfo(false /* fSetImageId */, false /* fSetParentId */,
4639 autoCaller);
4640 alock.acquire();
4641 if (FAILED(rc)) return rc;
4642
4643 mediumState = pMedium->i_getState();
4644 if (mediumState == MediumState_Inaccessible)
4645 {
4646 // ignore inaccessible ISO media and silently return S_OK,
4647 // otherwise VM startup (esp. restore) may fail without good reason
4648 if (!fFailIfInaccessible)
4649 return S_OK;
4650
4651 // otherwise report an error
4652 Bstr error;
4653 rc = pMedium->COMGETTER(LastAccessError)(error.asOutParam());
4654 if (FAILED(rc)) return rc;
4655
4656 /* collect multiple errors */
4657 eik.restore();
4658 Assert(!error.isEmpty());
4659 mrc = setError(E_FAIL,
4660 "%ls",
4661 error.raw());
4662 // error message will be something like
4663 // "Could not open the medium ... VD: error VERR_FILE_NOT_FOUND opening image file ... (VERR_FILE_NOT_FOUND).
4664 eik.fetch();
4665 }
4666 }
4667
4668 if (pMedium == pToLockWrite)
4669 mediumLockList.Prepend(pMedium, true);
4670 else
4671 mediumLockList.Prepend(pMedium, fMediumLockWriteAll);
4672
4673 pMedium = pMedium->i_getParent();
4674 if (pMedium.isNull() && pToBeParent)
4675 {
4676 pMedium = pToBeParent;
4677 pToBeParent = NULL;
4678 }
4679 }
4680
4681 return mrc;
4682}
4683
4684/**
4685 * Creates a new differencing storage unit using the format of the given target
4686 * medium and the location. Note that @c aTarget must be NotCreated.
4687 *
4688 * The @a aMediumLockList parameter contains the associated medium lock list,
4689 * which must be in locked state. If @a aWait is @c true then the caller is
4690 * responsible for unlocking.
4691 *
4692 * If @a aProgress is not NULL but the object it points to is @c null then a
4693 * new progress object will be created and assigned to @a *aProgress on
4694 * success, otherwise the existing progress object is used. If @a aProgress is
4695 * NULL, then no progress object is created/used at all.
4696 *
4697 * When @a aWait is @c false, this method will create a thread to perform the
4698 * create operation asynchronously and will return immediately. Otherwise, it
4699 * will perform the operation on the calling thread and will not return to the
4700 * caller until the operation is completed. Note that @a aProgress cannot be
4701 * NULL when @a aWait is @c false (this method will assert in this case).
4702 *
4703 * @param aTarget Target medium.
4704 * @param aVariant Precise medium variant to create.
4705 * @param aMediumLockList List of media which should be locked.
4706 * @param aProgress Where to find/store a Progress object to track
4707 * operation completion.
4708 * @param aWait @c true if this method should block instead of
4709 * creating an asynchronous thread.
4710 *
4711 * @note Locks this object and @a aTarget for writing.
4712 */
4713HRESULT Medium::i_createDiffStorage(ComObjPtr<Medium> &aTarget,
4714 MediumVariant_T aVariant,
4715 MediumLockList *aMediumLockList,
4716 ComObjPtr<Progress> *aProgress,
4717 bool aWait)
4718{
4719 AssertReturn(!aTarget.isNull(), E_FAIL);
4720 AssertReturn(aMediumLockList, E_FAIL);
4721 AssertReturn(aProgress != NULL || aWait == true, E_FAIL);
4722
4723 AutoCaller autoCaller(this);
4724 if (FAILED(autoCaller.rc())) return autoCaller.rc();
4725
4726 AutoCaller targetCaller(aTarget);
4727 if (FAILED(targetCaller.rc())) return targetCaller.rc();
4728
4729 HRESULT rc = S_OK;
4730 ComObjPtr<Progress> pProgress;
4731 Medium::Task *pTask = NULL;
4732
4733 try
4734 {
4735 AutoMultiWriteLock2 alock(this, aTarget COMMA_LOCKVAL_SRC_POS);
4736
4737 ComAssertThrow( m->type != MediumType_Writethrough
4738 && m->type != MediumType_Shareable
4739 && m->type != MediumType_Readonly, E_FAIL);
4740 ComAssertThrow(m->state == MediumState_LockedRead, E_FAIL);
4741
4742 if (aTarget->m->state != MediumState_NotCreated)
4743 throw aTarget->i_setStateError();
4744
4745 /* Check that the medium is not attached to the current state of
4746 * any VM referring to it. */
4747 for (BackRefList::const_iterator it = m->backRefs.begin();
4748 it != m->backRefs.end();
4749 ++it)
4750 {
4751 if (it->fInCurState)
4752 {
4753 /* Note: when a VM snapshot is being taken, all normal media
4754 * attached to the VM in the current state will be, as an
4755 * exception, also associated with the snapshot which is about
4756 * to create (see SnapshotMachine::init()) before deassociating
4757 * them from the current state (which takes place only on
4758 * success in Machine::fixupHardDisks()), so that the size of
4759 * snapshotIds will be 1 in this case. The extra condition is
4760 * used to filter out this legal situation. */
4761 if (it->llSnapshotIds.size() == 0)
4762 throw setError(VBOX_E_INVALID_OBJECT_STATE,
4763 tr("Medium '%s' is attached to a virtual machine with UUID {%RTuuid}. No differencing media based on it may be created until it is detached"),
4764 m->strLocationFull.c_str(), it->machineId.raw());
4765
4766 Assert(it->llSnapshotIds.size() == 1);
4767 }
4768 }
4769
4770 if (aProgress != NULL)
4771 {
4772 /* use the existing progress object... */
4773 pProgress = *aProgress;
4774
4775 /* ...but create a new one if it is null */
4776 if (pProgress.isNull())
4777 {
4778 pProgress.createObject();
4779 rc = pProgress->init(m->pVirtualBox,
4780 static_cast<IMedium*>(this),
4781 BstrFmt(tr("Creating differencing medium storage unit '%s'"),
4782 aTarget->m->strLocationFull.c_str()).raw(),
4783 TRUE /* aCancelable */);
4784 if (FAILED(rc))
4785 throw rc;
4786 }
4787 }
4788
4789 /* setup task object to carry out the operation sync/async */
4790 pTask = new Medium::CreateDiffTask(this, pProgress, aTarget, aVariant,
4791 aMediumLockList,
4792 aWait /* fKeepMediumLockList */);
4793 rc = pTask->rc();
4794 AssertComRC(rc);
4795 if (FAILED(rc))
4796 throw rc;
4797
4798 /* register a task (it will deregister itself when done) */
4799 ++m->numCreateDiffTasks;
4800 Assert(m->numCreateDiffTasks != 0); /* overflow? */
4801
4802 aTarget->m->state = MediumState_Creating;
4803 }
4804 catch (HRESULT aRC) { rc = aRC; }
4805
4806 if (SUCCEEDED(rc))
4807 {
4808 if (aWait)
4809 {
4810 rc = pTask->runNow();
4811
4812 delete pTask;
4813 }
4814 else
4815 rc = pTask->createThread();
4816
4817 if (SUCCEEDED(rc) && aProgress != NULL)
4818 *aProgress = pProgress;
4819 }
4820 else if (pTask != NULL)
4821 delete pTask;
4822
4823 return rc;
4824}
4825
4826/**
4827 * Returns a preferred format for differencing media.
4828 */
4829Utf8Str Medium::i_getPreferredDiffFormat()
4830{
4831 AutoCaller autoCaller(this);
4832 AssertComRCReturn(autoCaller.rc(), Utf8Str::Empty);
4833
4834 /* check that our own format supports diffs */
4835 if (!(m->formatObj->i_getCapabilities() & MediumFormatCapabilities_Differencing))
4836 {
4837 /* use the default format if not */
4838 Utf8Str tmp;
4839 m->pVirtualBox->i_getDefaultHardDiskFormat(tmp);
4840 return tmp;
4841 }
4842
4843 /* m->strFormat is const, no need to lock */
4844 return m->strFormat;
4845}
4846
4847/**
4848 * Returns a preferred variant for differencing media.
4849 */
4850MediumVariant_T Medium::i_getPreferredDiffVariant()
4851{
4852 AutoCaller autoCaller(this);
4853 AssertComRCReturn(autoCaller.rc(), MediumVariant_Standard);
4854
4855 /* check that our own format supports diffs */
4856 if (!(m->formatObj->i_getCapabilities() & MediumFormatCapabilities_Differencing))
4857 return MediumVariant_Standard;
4858
4859 /* m->variant is const, no need to lock */
4860 ULONG mediumVariantFlags = (ULONG)m->variant;
4861 mediumVariantFlags &= ~(MediumVariant_Fixed | MediumVariant_VmdkStreamOptimized);
4862 mediumVariantFlags |= MediumVariant_Diff;
4863 return (MediumVariant_T)mediumVariantFlags;
4864}
4865
4866/**
4867 * Implementation for the public Medium::Close() with the exception of calling
4868 * VirtualBox::saveRegistries(), in case someone wants to call this for several
4869 * media.
4870 *
4871 * After this returns with success, uninit() has been called on the medium, and
4872 * the object is no longer usable ("not ready" state).
4873 *
4874 * @param autoCaller AutoCaller instance which must have been created on the caller's
4875 * stack for this medium. This gets released hereupon
4876 * which the Medium instance gets uninitialized.
4877 * @return
4878 */
4879HRESULT Medium::i_close(AutoCaller &autoCaller)
4880{
4881 // must temporarily drop the caller, need the tree lock first
4882 autoCaller.release();
4883
4884 // we're accessing parent/child and backrefs, so lock the tree first, then ourselves
4885 AutoMultiWriteLock2 multilock(&m->pVirtualBox->i_getMediaTreeLockHandle(),
4886 this->lockHandle()
4887 COMMA_LOCKVAL_SRC_POS);
4888
4889 autoCaller.add();
4890 if (FAILED(autoCaller.rc())) return autoCaller.rc();
4891
4892 LogFlowFunc(("ENTER for %s\n", i_getLocationFull().c_str()));
4893
4894 bool wasCreated = true;
4895
4896 switch (m->state)
4897 {
4898 case MediumState_NotCreated:
4899 wasCreated = false;
4900 break;
4901 case MediumState_Created:
4902 case MediumState_Inaccessible:
4903 break;
4904 default:
4905 return i_setStateError();
4906 }
4907
4908 if (m->backRefs.size() != 0)
4909 return setError(VBOX_E_OBJECT_IN_USE,
4910 tr("Medium '%s' cannot be closed because it is still attached to %d virtual machines"),
4911 m->strLocationFull.c_str(), m->backRefs.size());
4912
4913 // perform extra media-dependent close checks
4914 HRESULT rc = i_canClose();
4915 if (FAILED(rc)) return rc;
4916
4917 m->fClosing = true;
4918
4919 if (wasCreated)
4920 {
4921 // remove from the list of known media before performing actual
4922 // uninitialization (to keep the media registry consistent on
4923 // failure to do so)
4924 rc = i_unregisterWithVirtualBox();
4925 if (FAILED(rc)) return rc;
4926
4927 multilock.release();
4928 // Release the AutoCaller now, as otherwise uninit() will simply hang.
4929 // Needs to be done before mark the registries as modified and saving
4930 // the registry, as otherwise there may be a deadlock with someone else
4931 // closing this object while we're in i_saveModifiedRegistries(), which
4932 // needs the media tree lock, which the other thread holds until after
4933 // uninit() below.
4934 autoCaller.release();
4935 i_markRegistriesModified();
4936 m->pVirtualBox->i_saveModifiedRegistries();
4937 }
4938 else
4939 {
4940 multilock.release();
4941 // release the AutoCaller, as otherwise uninit() will simply hang
4942 autoCaller.release();
4943 }
4944
4945 // Keep the locks held until after uninit, as otherwise the consistency
4946 // of the medium tree cannot be guaranteed.
4947 uninit();
4948
4949 LogFlowFuncLeave();
4950
4951 return rc;
4952}
4953
4954/**
4955 * Deletes the medium storage unit.
4956 *
4957 * If @a aProgress is not NULL but the object it points to is @c null then a new
4958 * progress object will be created and assigned to @a *aProgress on success,
4959 * otherwise the existing progress object is used. If Progress is NULL, then no
4960 * progress object is created/used at all.
4961 *
4962 * When @a aWait is @c false, this method will create a thread to perform the
4963 * delete operation asynchronously and will return immediately. Otherwise, it
4964 * will perform the operation on the calling thread and will not return to the
4965 * caller until the operation is completed. Note that @a aProgress cannot be
4966 * NULL when @a aWait is @c false (this method will assert in this case).
4967 *
4968 * @param aProgress Where to find/store a Progress object to track operation
4969 * completion.
4970 * @param aWait @c true if this method should block instead of creating
4971 * an asynchronous thread.
4972 *
4973 * @note Locks mVirtualBox and this object for writing. Locks medium tree for
4974 * writing.
4975 */
4976HRESULT Medium::i_deleteStorage(ComObjPtr<Progress> *aProgress,
4977 bool aWait)
4978{
4979 /** @todo r=klaus The code below needs to be double checked with regard
4980 * to lock order violations, it probably causes lock order issues related
4981 * to the AutoCaller usage. */
4982 AssertReturn(aProgress != NULL || aWait == true, E_FAIL);
4983
4984 AutoCaller autoCaller(this);
4985 if (FAILED(autoCaller.rc())) return autoCaller.rc();
4986
4987 HRESULT rc = S_OK;
4988 ComObjPtr<Progress> pProgress;
4989 Medium::Task *pTask = NULL;
4990
4991 try
4992 {
4993 /* we're accessing the media tree, and canClose() needs it too */
4994 AutoMultiWriteLock2 multilock(&m->pVirtualBox->i_getMediaTreeLockHandle(),
4995 this->lockHandle()
4996 COMMA_LOCKVAL_SRC_POS);
4997 LogFlowThisFunc(("aWait=%RTbool locationFull=%s\n", aWait, i_getLocationFull().c_str() ));
4998
4999 if ( !(m->formatObj->i_getCapabilities() & ( MediumFormatCapabilities_CreateDynamic
5000 | MediumFormatCapabilities_CreateFixed)))
5001 throw setError(VBOX_E_NOT_SUPPORTED,
5002 tr("Medium format '%s' does not support storage deletion"),
5003 m->strFormat.c_str());
5004
5005 /* Wait for a concurrently running Medium::i_queryInfo to complete. */
5006 /** @todo r=klaus would be great if this could be moved to the async
5007 * part of the operation as it can take quite a while */
5008 if (m->queryInfoRunning)
5009 {
5010 while (m->queryInfoRunning)
5011 {
5012 multilock.release();
5013 /* Must not hold the media tree lock or the object lock, as
5014 * Medium::i_queryInfo needs this lock and thus we would run
5015 * into a deadlock here. */
5016 Assert(!m->pVirtualBox->i_getMediaTreeLockHandle().isWriteLockOnCurrentThread());
5017 Assert(!isWriteLockOnCurrentThread());
5018 {
5019 AutoReadLock qlock(m->queryInfoSem COMMA_LOCKVAL_SRC_POS);
5020 }
5021 multilock.acquire();
5022 }
5023 }
5024
5025 /* Note that we are fine with Inaccessible state too: a) for symmetry
5026 * with create calls and b) because it doesn't really harm to try, if
5027 * it is really inaccessible, the delete operation will fail anyway.
5028 * Accepting Inaccessible state is especially important because all
5029 * registered media are initially Inaccessible upon VBoxSVC startup
5030 * until COMGETTER(RefreshState) is called. Accept Deleting state
5031 * because some callers need to put the medium in this state early
5032 * to prevent races. */
5033 switch (m->state)
5034 {
5035 case MediumState_Created:
5036 case MediumState_Deleting:
5037 case MediumState_Inaccessible:
5038 break;
5039 default:
5040 throw i_setStateError();
5041 }
5042
5043 if (m->backRefs.size() != 0)
5044 {
5045 Utf8Str strMachines;
5046 for (BackRefList::const_iterator it = m->backRefs.begin();
5047 it != m->backRefs.end();
5048 ++it)
5049 {
5050 const BackRef &b = *it;
5051 if (strMachines.length())
5052 strMachines.append(", ");
5053 strMachines.append(b.machineId.toString().c_str());
5054 }
5055#ifdef DEBUG
5056 i_dumpBackRefs();
5057#endif
5058 throw setError(VBOX_E_OBJECT_IN_USE,
5059 tr("Cannot delete storage: medium '%s' is still attached to the following %d virtual machine(s): %s"),
5060 m->strLocationFull.c_str(),
5061 m->backRefs.size(),
5062 strMachines.c_str());
5063 }
5064
5065 rc = i_canClose();
5066 if (FAILED(rc))
5067 throw rc;
5068
5069 /* go to Deleting state, so that the medium is not actually locked */
5070 if (m->state != MediumState_Deleting)
5071 {
5072 rc = i_markForDeletion();
5073 if (FAILED(rc))
5074 throw rc;
5075 }
5076
5077 /* Build the medium lock list. */
5078 MediumLockList *pMediumLockList(new MediumLockList());
5079 multilock.release();
5080 rc = i_createMediumLockList(true /* fFailIfInaccessible */,
5081 this /* pToLockWrite */,
5082 false /* fMediumLockWriteAll */,
5083 NULL,
5084 *pMediumLockList);
5085 multilock.acquire();
5086 if (FAILED(rc))
5087 {
5088 delete pMediumLockList;
5089 throw rc;
5090 }
5091
5092 multilock.release();
5093 rc = pMediumLockList->Lock();
5094 multilock.acquire();
5095 if (FAILED(rc))
5096 {
5097 delete pMediumLockList;
5098 throw setError(rc,
5099 tr("Failed to lock media when deleting '%s'"),
5100 i_getLocationFull().c_str());
5101 }
5102
5103 /* try to remove from the list of known media before performing
5104 * actual deletion (we favor the consistency of the media registry
5105 * which would have been broken if unregisterWithVirtualBox() failed
5106 * after we successfully deleted the storage) */
5107 rc = i_unregisterWithVirtualBox();
5108 if (FAILED(rc))
5109 throw rc;
5110 // no longer need lock
5111 multilock.release();
5112 i_markRegistriesModified();
5113
5114 if (aProgress != NULL)
5115 {
5116 /* use the existing progress object... */
5117 pProgress = *aProgress;
5118
5119 /* ...but create a new one if it is null */
5120 if (pProgress.isNull())
5121 {
5122 pProgress.createObject();
5123 rc = pProgress->init(m->pVirtualBox,
5124 static_cast<IMedium*>(this),
5125 BstrFmt(tr("Deleting medium storage unit '%s'"), m->strLocationFull.c_str()).raw(),
5126 FALSE /* aCancelable */);
5127 if (FAILED(rc))
5128 throw rc;
5129 }
5130 }
5131
5132 /* setup task object to carry out the operation sync/async */
5133 pTask = new Medium::DeleteTask(this, pProgress, pMediumLockList);
5134 rc = pTask->rc();
5135 AssertComRC(rc);
5136 if (FAILED(rc))
5137 throw rc;
5138 }
5139 catch (HRESULT aRC) { rc = aRC; }
5140
5141 if (SUCCEEDED(rc))
5142 {
5143 if (aWait)
5144 {
5145 rc = pTask->runNow();
5146
5147 delete pTask;
5148 }
5149 else
5150 rc = pTask->createThread();
5151
5152 if (SUCCEEDED(rc) && aProgress != NULL)
5153 *aProgress = pProgress;
5154
5155 }
5156 else
5157 {
5158 if (pTask)
5159 delete pTask;
5160
5161 /* Undo deleting state if necessary. */
5162 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
5163 /* Make sure that any error signalled by unmarkForDeletion() is not
5164 * ending up in the error list (if the caller uses MultiResult). It
5165 * usually is spurious, as in most cases the medium hasn't been marked
5166 * for deletion when the error was thrown above. */
5167 ErrorInfoKeeper eik;
5168 i_unmarkForDeletion();
5169 }
5170
5171 return rc;
5172}
5173
5174/**
5175 * Mark a medium for deletion.
5176 *
5177 * @note Caller must hold the write lock on this medium!
5178 */
5179HRESULT Medium::i_markForDeletion()
5180{
5181 ComAssertRet(isWriteLockOnCurrentThread(), E_FAIL);
5182 switch (m->state)
5183 {
5184 case MediumState_Created:
5185 case MediumState_Inaccessible:
5186 m->preLockState = m->state;
5187 m->state = MediumState_Deleting;
5188 return S_OK;
5189 default:
5190 return i_setStateError();
5191 }
5192}
5193
5194/**
5195 * Removes the "mark for deletion".
5196 *
5197 * @note Caller must hold the write lock on this medium!
5198 */
5199HRESULT Medium::i_unmarkForDeletion()
5200{
5201 ComAssertRet(isWriteLockOnCurrentThread(), E_FAIL);
5202 switch (m->state)
5203 {
5204 case MediumState_Deleting:
5205 m->state = m->preLockState;
5206 return S_OK;
5207 default:
5208 return i_setStateError();
5209 }
5210}
5211
5212/**
5213 * Mark a medium for deletion which is in locked state.
5214 *
5215 * @note Caller must hold the write lock on this medium!
5216 */
5217HRESULT Medium::i_markLockedForDeletion()
5218{
5219 ComAssertRet(isWriteLockOnCurrentThread(), E_FAIL);
5220 if ( ( m->state == MediumState_LockedRead
5221 || m->state == MediumState_LockedWrite)
5222 && m->preLockState == MediumState_Created)
5223 {
5224 m->preLockState = MediumState_Deleting;
5225 return S_OK;
5226 }
5227 else
5228 return i_setStateError();
5229}
5230
5231/**
5232 * Removes the "mark for deletion" for a medium in locked state.
5233 *
5234 * @note Caller must hold the write lock on this medium!
5235 */
5236HRESULT Medium::i_unmarkLockedForDeletion()
5237{
5238 ComAssertRet(isWriteLockOnCurrentThread(), E_FAIL);
5239 if ( ( m->state == MediumState_LockedRead
5240 || m->state == MediumState_LockedWrite)
5241 && m->preLockState == MediumState_Deleting)
5242 {
5243 m->preLockState = MediumState_Created;
5244 return S_OK;
5245 }
5246 else
5247 return i_setStateError();
5248}
5249
5250/**
5251 * Queries the preferred merge direction from this to the other medium, i.e.
5252 * the one which requires the least amount of I/O and therefore time and
5253 * disk consumption.
5254 *
5255 * @returns Status code.
5256 * @retval E_FAIL in case determining the merge direction fails for some reason,
5257 * for example if getting the size of the media fails. There is no
5258 * error set though and the caller is free to continue to find out
5259 * what was going wrong later. Leaves fMergeForward unset.
5260 * @retval VBOX_E_INVALID_OBJECT_STATE if both media are not related to each other
5261 * An error is set.
5262 * @param pOther The other medium to merge with.
5263 * @param fMergeForward Resulting preferred merge direction (out).
5264 */
5265HRESULT Medium::i_queryPreferredMergeDirection(const ComObjPtr<Medium> &pOther,
5266 bool &fMergeForward)
5267{
5268 /** @todo r=klaus The code below needs to be double checked with regard
5269 * to lock order violations, it probably causes lock order issues related
5270 * to the AutoCaller usage. Likewise the code using this method seems
5271 * problematic. */
5272 AssertReturn(pOther != NULL, E_FAIL);
5273 AssertReturn(pOther != this, E_FAIL);
5274
5275 AutoCaller autoCaller(this);
5276 AssertComRCReturnRC(autoCaller.rc());
5277
5278 AutoCaller otherCaller(pOther);
5279 AssertComRCReturnRC(otherCaller.rc());
5280
5281 HRESULT rc = S_OK;
5282 bool fThisParent = false; /**<< Flag whether this medium is the parent of pOther. */
5283
5284 try
5285 {
5286 // locking: we need the tree lock first because we access parent pointers
5287 AutoWriteLock treeLock(m->pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
5288
5289 /* more sanity checking and figuring out the current merge direction */
5290 ComObjPtr<Medium> pMedium = i_getParent();
5291 while (!pMedium.isNull() && pMedium != pOther)
5292 pMedium = pMedium->i_getParent();
5293 if (pMedium == pOther)
5294 fThisParent = false;
5295 else
5296 {
5297 pMedium = pOther->i_getParent();
5298 while (!pMedium.isNull() && pMedium != this)
5299 pMedium = pMedium->i_getParent();
5300 if (pMedium == this)
5301 fThisParent = true;
5302 else
5303 {
5304 Utf8Str tgtLoc;
5305 {
5306 AutoReadLock alock(pOther COMMA_LOCKVAL_SRC_POS);
5307 tgtLoc = pOther->i_getLocationFull();
5308 }
5309
5310 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
5311 throw setError(VBOX_E_INVALID_OBJECT_STATE,
5312 tr("Media '%s' and '%s' are unrelated"),
5313 m->strLocationFull.c_str(), tgtLoc.c_str());
5314 }
5315 }
5316
5317 /*
5318 * Figure out the preferred merge direction. The current way is to
5319 * get the current sizes of file based images and select the merge
5320 * direction depending on the size.
5321 *
5322 * Can't use the VD API to get current size here as the media might
5323 * be write locked by a running VM. Resort to RTFileQuerySize().
5324 */
5325 int vrc = VINF_SUCCESS;
5326 uint64_t cbMediumThis = 0;
5327 uint64_t cbMediumOther = 0;
5328
5329 if (i_isMediumFormatFile() && pOther->i_isMediumFormatFile())
5330 {
5331 vrc = RTFileQuerySize(this->i_getLocationFull().c_str(), &cbMediumThis);
5332 if (RT_SUCCESS(vrc))
5333 {
5334 vrc = RTFileQuerySize(pOther->i_getLocationFull().c_str(),
5335 &cbMediumOther);
5336 }
5337
5338 if (RT_FAILURE(vrc))
5339 rc = E_FAIL;
5340 else
5341 {
5342 /*
5343 * Check which merge direction might be more optimal.
5344 * This method is not bullet proof of course as there might
5345 * be overlapping blocks in the images so the file size is
5346 * not the best indicator but it is good enough for our purpose
5347 * and everything else is too complicated, especially when the
5348 * media are used by a running VM.
5349 */
5350 bool fMergeIntoThis = cbMediumThis > cbMediumOther;
5351 fMergeForward = fMergeIntoThis != fThisParent;
5352 }
5353 }
5354 }
5355 catch (HRESULT aRC) { rc = aRC; }
5356
5357 return rc;
5358}
5359
5360/**
5361 * Prepares this (source) medium, target medium and all intermediate media
5362 * for the merge operation.
5363 *
5364 * This method is to be called prior to calling the #mergeTo() to perform
5365 * necessary consistency checks and place involved media to appropriate
5366 * states. If #mergeTo() is not called or fails, the state modifications
5367 * performed by this method must be undone by #i_cancelMergeTo().
5368 *
5369 * See #mergeTo() for more information about merging.
5370 *
5371 * @param pTarget Target medium.
5372 * @param aMachineId Allowed machine attachment. NULL means do not check.
5373 * @param aSnapshotId Allowed snapshot attachment. NULL or empty UUID means
5374 * do not check.
5375 * @param fLockMedia Flag whether to lock the medium lock list or not.
5376 * If set to false and the medium lock list locking fails
5377 * later you must call #i_cancelMergeTo().
5378 * @param fMergeForward Resulting merge direction (out).
5379 * @param pParentForTarget New parent for target medium after merge (out).
5380 * @param aChildrenToReparent Medium lock list containing all children of the
5381 * source which will have to be reparented to the target
5382 * after merge (out).
5383 * @param aMediumLockList Medium locking information (out).
5384 *
5385 * @note Locks medium tree for reading. Locks this object, aTarget and all
5386 * intermediate media for writing.
5387 */
5388HRESULT Medium::i_prepareMergeTo(const ComObjPtr<Medium> &pTarget,
5389 const Guid *aMachineId,
5390 const Guid *aSnapshotId,
5391 bool fLockMedia,
5392 bool &fMergeForward,
5393 ComObjPtr<Medium> &pParentForTarget,
5394 MediumLockList * &aChildrenToReparent,
5395 MediumLockList * &aMediumLockList)
5396{
5397 /** @todo r=klaus The code below needs to be double checked with regard
5398 * to lock order violations, it probably causes lock order issues related
5399 * to the AutoCaller usage. Likewise the code using this method seems
5400 * problematic. */
5401 AssertReturn(pTarget != NULL, E_FAIL);
5402 AssertReturn(pTarget != this, E_FAIL);
5403
5404 AutoCaller autoCaller(this);
5405 AssertComRCReturnRC(autoCaller.rc());
5406
5407 AutoCaller targetCaller(pTarget);
5408 AssertComRCReturnRC(targetCaller.rc());
5409
5410 HRESULT rc = S_OK;
5411 fMergeForward = false;
5412 pParentForTarget.setNull();
5413 Assert(aChildrenToReparent == NULL);
5414 aChildrenToReparent = NULL;
5415 Assert(aMediumLockList == NULL);
5416 aMediumLockList = NULL;
5417
5418 try
5419 {
5420 // locking: we need the tree lock first because we access parent pointers
5421 AutoWriteLock treeLock(m->pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
5422
5423 /* more sanity checking and figuring out the merge direction */
5424 ComObjPtr<Medium> pMedium = i_getParent();
5425 while (!pMedium.isNull() && pMedium != pTarget)
5426 pMedium = pMedium->i_getParent();
5427 if (pMedium == pTarget)
5428 fMergeForward = false;
5429 else
5430 {
5431 pMedium = pTarget->i_getParent();
5432 while (!pMedium.isNull() && pMedium != this)
5433 pMedium = pMedium->i_getParent();
5434 if (pMedium == this)
5435 fMergeForward = true;
5436 else
5437 {
5438 Utf8Str tgtLoc;
5439 {
5440 AutoReadLock alock(pTarget COMMA_LOCKVAL_SRC_POS);
5441 tgtLoc = pTarget->i_getLocationFull();
5442 }
5443
5444 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
5445 throw setError(VBOX_E_INVALID_OBJECT_STATE,
5446 tr("Media '%s' and '%s' are unrelated"),
5447 m->strLocationFull.c_str(), tgtLoc.c_str());
5448 }
5449 }
5450
5451 /* Build the lock list. */
5452 aMediumLockList = new MediumLockList();
5453 treeLock.release();
5454 if (fMergeForward)
5455 rc = pTarget->i_createMediumLockList(true /* fFailIfInaccessible */,
5456 pTarget /* pToLockWrite */,
5457 false /* fMediumLockWriteAll */,
5458 NULL,
5459 *aMediumLockList);
5460 else
5461 rc = i_createMediumLockList(true /* fFailIfInaccessible */,
5462 pTarget /* pToLockWrite */,
5463 false /* fMediumLockWriteAll */,
5464 NULL,
5465 *aMediumLockList);
5466 treeLock.acquire();
5467 if (FAILED(rc))
5468 throw rc;
5469
5470 /* Sanity checking, must be after lock list creation as it depends on
5471 * valid medium states. The medium objects must be accessible. Only
5472 * do this if immediate locking is requested, otherwise it fails when
5473 * we construct a medium lock list for an already running VM. Snapshot
5474 * deletion uses this to simplify its life. */
5475 if (fLockMedia)
5476 {
5477 {
5478 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
5479 if (m->state != MediumState_Created)
5480 throw i_setStateError();
5481 }
5482 {
5483 AutoReadLock alock(pTarget COMMA_LOCKVAL_SRC_POS);
5484 if (pTarget->m->state != MediumState_Created)
5485 throw pTarget->i_setStateError();
5486 }
5487 }
5488
5489 /* check medium attachment and other sanity conditions */
5490 if (fMergeForward)
5491 {
5492 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
5493 if (i_getChildren().size() > 1)
5494 {
5495 throw setError(VBOX_E_INVALID_OBJECT_STATE,
5496 tr("Medium '%s' involved in the merge operation has more than one child medium (%d)"),
5497 m->strLocationFull.c_str(), i_getChildren().size());
5498 }
5499 /* One backreference is only allowed if the machine ID is not empty
5500 * and it matches the machine the medium is attached to (including
5501 * the snapshot ID if not empty). */
5502 if ( m->backRefs.size() != 0
5503 && ( !aMachineId
5504 || m->backRefs.size() != 1
5505 || aMachineId->isZero()
5506 || *i_getFirstMachineBackrefId() != *aMachineId
5507 || ( (!aSnapshotId || !aSnapshotId->isZero())
5508 && *i_getFirstMachineBackrefSnapshotId() != *aSnapshotId)))
5509 throw setError(VBOX_E_OBJECT_IN_USE,
5510 tr("Medium '%s' is attached to %d virtual machines"),
5511 m->strLocationFull.c_str(), m->backRefs.size());
5512 if (m->type == MediumType_Immutable)
5513 throw setError(VBOX_E_INVALID_OBJECT_STATE,
5514 tr("Medium '%s' is immutable"),
5515 m->strLocationFull.c_str());
5516 if (m->type == MediumType_MultiAttach)
5517 throw setError(VBOX_E_INVALID_OBJECT_STATE,
5518 tr("Medium '%s' is multi-attach"),
5519 m->strLocationFull.c_str());
5520 }
5521 else
5522 {
5523 AutoReadLock alock(pTarget COMMA_LOCKVAL_SRC_POS);
5524 if (pTarget->i_getChildren().size() > 1)
5525 {
5526 throw setError(VBOX_E_OBJECT_IN_USE,
5527 tr("Medium '%s' involved in the merge operation has more than one child medium (%d)"),
5528 pTarget->m->strLocationFull.c_str(),
5529 pTarget->i_getChildren().size());
5530 }
5531 if (pTarget->m->type == MediumType_Immutable)
5532 throw setError(VBOX_E_INVALID_OBJECT_STATE,
5533 tr("Medium '%s' is immutable"),
5534 pTarget->m->strLocationFull.c_str());
5535 if (pTarget->m->type == MediumType_MultiAttach)
5536 throw setError(VBOX_E_INVALID_OBJECT_STATE,
5537 tr("Medium '%s' is multi-attach"),
5538 pTarget->m->strLocationFull.c_str());
5539 }
5540 ComObjPtr<Medium> pLast(fMergeForward ? (Medium *)pTarget : this);
5541 ComObjPtr<Medium> pLastIntermediate = pLast->i_getParent();
5542 for (pLast = pLastIntermediate;
5543 !pLast.isNull() && pLast != pTarget && pLast != this;
5544 pLast = pLast->i_getParent())
5545 {
5546 AutoReadLock alock(pLast COMMA_LOCKVAL_SRC_POS);
5547 if (pLast->i_getChildren().size() > 1)
5548 {
5549 throw setError(VBOX_E_OBJECT_IN_USE,
5550 tr("Medium '%s' involved in the merge operation has more than one child medium (%d)"),
5551 pLast->m->strLocationFull.c_str(),
5552 pLast->i_getChildren().size());
5553 }
5554 if (pLast->m->backRefs.size() != 0)
5555 throw setError(VBOX_E_OBJECT_IN_USE,
5556 tr("Medium '%s' is attached to %d virtual machines"),
5557 pLast->m->strLocationFull.c_str(),
5558 pLast->m->backRefs.size());
5559
5560 }
5561
5562 /* Update medium states appropriately */
5563 {
5564 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
5565
5566 if (m->state == MediumState_Created)
5567 {
5568 rc = i_markForDeletion();
5569 if (FAILED(rc))
5570 throw rc;
5571 }
5572 else
5573 {
5574 if (fLockMedia)
5575 throw i_setStateError();
5576 else if ( m->state == MediumState_LockedWrite
5577 || m->state == MediumState_LockedRead)
5578 {
5579 /* Either mark it for deletion in locked state or allow
5580 * others to have done so. */
5581 if (m->preLockState == MediumState_Created)
5582 i_markLockedForDeletion();
5583 else if (m->preLockState != MediumState_Deleting)
5584 throw i_setStateError();
5585 }
5586 else
5587 throw i_setStateError();
5588 }
5589 }
5590
5591 if (fMergeForward)
5592 {
5593 /* we will need parent to reparent target */
5594 pParentForTarget = i_getParent();
5595 }
5596 else
5597 {
5598 /* we will need to reparent children of the source */
5599 aChildrenToReparent = new MediumLockList();
5600 for (MediaList::const_iterator it = i_getChildren().begin();
5601 it != i_getChildren().end();
5602 ++it)
5603 {
5604 pMedium = *it;
5605 aChildrenToReparent->Append(pMedium, true /* fLockWrite */);
5606 }
5607 if (fLockMedia && aChildrenToReparent)
5608 {
5609 treeLock.release();
5610 rc = aChildrenToReparent->Lock();
5611 treeLock.acquire();
5612 if (FAILED(rc))
5613 throw rc;
5614 }
5615 }
5616 for (pLast = pLastIntermediate;
5617 !pLast.isNull() && pLast != pTarget && pLast != this;
5618 pLast = pLast->i_getParent())
5619 {
5620 AutoWriteLock alock(pLast COMMA_LOCKVAL_SRC_POS);
5621 if (pLast->m->state == MediumState_Created)
5622 {
5623 rc = pLast->i_markForDeletion();
5624 if (FAILED(rc))
5625 throw rc;
5626 }
5627 else
5628 throw pLast->i_setStateError();
5629 }
5630
5631 /* Tweak the lock list in the backward merge case, as the target
5632 * isn't marked to be locked for writing yet. */
5633 if (!fMergeForward)
5634 {
5635 MediumLockList::Base::iterator lockListBegin =
5636 aMediumLockList->GetBegin();
5637 MediumLockList::Base::iterator lockListEnd =
5638 aMediumLockList->GetEnd();
5639 ++lockListEnd;
5640 for (MediumLockList::Base::iterator it = lockListBegin;
5641 it != lockListEnd;
5642 ++it)
5643 {
5644 MediumLock &mediumLock = *it;
5645 if (mediumLock.GetMedium() == pTarget)
5646 {
5647 HRESULT rc2 = mediumLock.UpdateLock(true);
5648 AssertComRC(rc2);
5649 break;
5650 }
5651 }
5652 }
5653
5654 if (fLockMedia)
5655 {
5656 treeLock.release();
5657 rc = aMediumLockList->Lock();
5658 treeLock.acquire();
5659 if (FAILED(rc))
5660 {
5661 AutoReadLock alock(pTarget COMMA_LOCKVAL_SRC_POS);
5662 throw setError(rc,
5663 tr("Failed to lock media when merging to '%s'"),
5664 pTarget->i_getLocationFull().c_str());
5665 }
5666 }
5667 }
5668 catch (HRESULT aRC) { rc = aRC; }
5669
5670 if (FAILED(rc))
5671 {
5672 if (aMediumLockList)
5673 {
5674 delete aMediumLockList;
5675 aMediumLockList = NULL;
5676 }
5677 if (aChildrenToReparent)
5678 {
5679 delete aChildrenToReparent;
5680 aChildrenToReparent = NULL;
5681 }
5682 }
5683
5684 return rc;
5685}
5686
5687/**
5688 * Merges this medium to the specified medium which must be either its
5689 * direct ancestor or descendant.
5690 *
5691 * Given this medium is SOURCE and the specified medium is TARGET, we will
5692 * get two variants of the merge operation:
5693 *
5694 * forward merge
5695 * ------------------------->
5696 * [Extra] <- SOURCE <- Intermediate <- TARGET
5697 * Any Del Del LockWr
5698 *
5699 *
5700 * backward merge
5701 * <-------------------------
5702 * TARGET <- Intermediate <- SOURCE <- [Extra]
5703 * LockWr Del Del LockWr
5704 *
5705 * Each diagram shows the involved media on the media chain where
5706 * SOURCE and TARGET belong. Under each medium there is a state value which
5707 * the medium must have at a time of the mergeTo() call.
5708 *
5709 * The media in the square braces may be absent (e.g. when the forward
5710 * operation takes place and SOURCE is the base medium, or when the backward
5711 * merge operation takes place and TARGET is the last child in the chain) but if
5712 * they present they are involved too as shown.
5713 *
5714 * Neither the source medium nor intermediate media may be attached to
5715 * any VM directly or in the snapshot, otherwise this method will assert.
5716 *
5717 * The #i_prepareMergeTo() method must be called prior to this method to place
5718 * all involved to necessary states and perform other consistency checks.
5719 *
5720 * If @a aWait is @c true then this method will perform the operation on the
5721 * calling thread and will not return to the caller until the operation is
5722 * completed. When this method succeeds, all intermediate medium objects in
5723 * the chain will be uninitialized, the state of the target medium (and all
5724 * involved extra media) will be restored. @a aMediumLockList will not be
5725 * deleted, whether the operation is successful or not. The caller has to do
5726 * this if appropriate. Note that this (source) medium is not uninitialized
5727 * because of possible AutoCaller instances held by the caller of this method
5728 * on the current thread. It's therefore the responsibility of the caller to
5729 * call Medium::uninit() after releasing all callers.
5730 *
5731 * If @a aWait is @c false then this method will create a thread to perform the
5732 * operation asynchronously and will return immediately. If the operation
5733 * succeeds, the thread will uninitialize the source medium object and all
5734 * intermediate medium objects in the chain, reset the state of the target
5735 * medium (and all involved extra media) and delete @a aMediumLockList.
5736 * If the operation fails, the thread will only reset the states of all
5737 * involved media and delete @a aMediumLockList.
5738 *
5739 * When this method fails (regardless of the @a aWait mode), it is a caller's
5740 * responsibility to undo state changes and delete @a aMediumLockList using
5741 * #i_cancelMergeTo().
5742 *
5743 * If @a aProgress is not NULL but the object it points to is @c null then a new
5744 * progress object will be created and assigned to @a *aProgress on success,
5745 * otherwise the existing progress object is used. If Progress is NULL, then no
5746 * progress object is created/used at all. Note that @a aProgress cannot be
5747 * NULL when @a aWait is @c false (this method will assert in this case).
5748 *
5749 * @param pTarget Target medium.
5750 * @param fMergeForward Merge direction.
5751 * @param pParentForTarget New parent for target medium after merge.
5752 * @param aChildrenToReparent List of children of the source which will have
5753 * to be reparented to the target after merge.
5754 * @param aMediumLockList Medium locking information.
5755 * @param aProgress Where to find/store a Progress object to track operation
5756 * completion.
5757 * @param aWait @c true if this method should block instead of creating
5758 * an asynchronous thread.
5759 *
5760 * @note Locks the tree lock for writing. Locks the media from the chain
5761 * for writing.
5762 */
5763HRESULT Medium::i_mergeTo(const ComObjPtr<Medium> &pTarget,
5764 bool fMergeForward,
5765 const ComObjPtr<Medium> &pParentForTarget,
5766 MediumLockList *aChildrenToReparent,
5767 MediumLockList *aMediumLockList,
5768 ComObjPtr<Progress> *aProgress,
5769 bool aWait)
5770{
5771 AssertReturn(pTarget != NULL, E_FAIL);
5772 AssertReturn(pTarget != this, E_FAIL);
5773 AssertReturn(aMediumLockList != NULL, E_FAIL);
5774 AssertReturn(aProgress != NULL || aWait == true, E_FAIL);
5775
5776 AutoCaller autoCaller(this);
5777 if (FAILED(autoCaller.rc())) return autoCaller.rc();
5778
5779 AutoCaller targetCaller(pTarget);
5780 AssertComRCReturnRC(targetCaller.rc());
5781
5782 HRESULT rc = S_OK;
5783 ComObjPtr<Progress> pProgress;
5784 Medium::Task *pTask = NULL;
5785
5786 try
5787 {
5788 if (aProgress != NULL)
5789 {
5790 /* use the existing progress object... */
5791 pProgress = *aProgress;
5792
5793 /* ...but create a new one if it is null */
5794 if (pProgress.isNull())
5795 {
5796 Utf8Str tgtName;
5797 {
5798 AutoReadLock alock(pTarget COMMA_LOCKVAL_SRC_POS);
5799 tgtName = pTarget->i_getName();
5800 }
5801
5802 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
5803
5804 pProgress.createObject();
5805 rc = pProgress->init(m->pVirtualBox,
5806 static_cast<IMedium*>(this),
5807 BstrFmt(tr("Merging medium '%s' to '%s'"),
5808 i_getName().c_str(),
5809 tgtName.c_str()).raw(),
5810 TRUE /* aCancelable */);
5811 if (FAILED(rc))
5812 throw rc;
5813 }
5814 }
5815
5816 /* setup task object to carry out the operation sync/async */
5817 pTask = new Medium::MergeTask(this, pTarget, fMergeForward,
5818 pParentForTarget, aChildrenToReparent,
5819 pProgress, aMediumLockList,
5820 aWait /* fKeepMediumLockList */);
5821 rc = pTask->rc();
5822 AssertComRC(rc);
5823 if (FAILED(rc))
5824 throw rc;
5825 }
5826 catch (HRESULT aRC) { rc = aRC; }
5827
5828 if (SUCCEEDED(rc))
5829 {
5830 if (aWait)
5831 {
5832 rc = pTask->runNow();
5833
5834 delete pTask;
5835 }
5836 else
5837 rc = pTask->createThread();
5838
5839 if (SUCCEEDED(rc) && aProgress != NULL)
5840 *aProgress = pProgress;
5841 }
5842 else if (pTask != NULL)
5843 delete pTask;
5844
5845 return rc;
5846}
5847
5848/**
5849 * Undoes what #i_prepareMergeTo() did. Must be called if #mergeTo() is not
5850 * called or fails. Frees memory occupied by @a aMediumLockList and unlocks
5851 * the medium objects in @a aChildrenToReparent.
5852 *
5853 * @param aChildrenToReparent List of children of the source which will have
5854 * to be reparented to the target after merge.
5855 * @param aMediumLockList Medium locking information.
5856 *
5857 * @note Locks the media from the chain for writing.
5858 */
5859void Medium::i_cancelMergeTo(MediumLockList *aChildrenToReparent,
5860 MediumLockList *aMediumLockList)
5861{
5862 AutoCaller autoCaller(this);
5863 AssertComRCReturnVoid(autoCaller.rc());
5864
5865 AssertReturnVoid(aMediumLockList != NULL);
5866
5867 /* Revert media marked for deletion to previous state. */
5868 HRESULT rc;
5869 MediumLockList::Base::const_iterator mediumListBegin =
5870 aMediumLockList->GetBegin();
5871 MediumLockList::Base::const_iterator mediumListEnd =
5872 aMediumLockList->GetEnd();
5873 for (MediumLockList::Base::const_iterator it = mediumListBegin;
5874 it != mediumListEnd;
5875 ++it)
5876 {
5877 const MediumLock &mediumLock = *it;
5878 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
5879 AutoWriteLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
5880
5881 if (pMedium->m->state == MediumState_Deleting)
5882 {
5883 rc = pMedium->i_unmarkForDeletion();
5884 AssertComRC(rc);
5885 }
5886 else if ( ( pMedium->m->state == MediumState_LockedWrite
5887 || pMedium->m->state == MediumState_LockedRead)
5888 && pMedium->m->preLockState == MediumState_Deleting)
5889 {
5890 rc = pMedium->i_unmarkLockedForDeletion();
5891 AssertComRC(rc);
5892 }
5893 }
5894
5895 /* the destructor will do the work */
5896 delete aMediumLockList;
5897
5898 /* unlock the children which had to be reparented, the destructor will do
5899 * the work */
5900 if (aChildrenToReparent)
5901 delete aChildrenToReparent;
5902}
5903
5904/**
5905 * Fix the parent UUID of all children to point to this medium as their
5906 * parent.
5907 */
5908HRESULT Medium::i_fixParentUuidOfChildren(MediumLockList *pChildrenToReparent)
5909{
5910 /** @todo r=klaus The code below needs to be double checked with regard
5911 * to lock order violations, it probably causes lock order issues related
5912 * to the AutoCaller usage. Likewise the code using this method seems
5913 * problematic. */
5914 Assert(!isWriteLockOnCurrentThread());
5915 Assert(!m->pVirtualBox->i_getMediaTreeLockHandle().isWriteLockOnCurrentThread());
5916 MediumLockList mediumLockList;
5917 HRESULT rc = i_createMediumLockList(true /* fFailIfInaccessible */,
5918 NULL /* pToLockWrite */,
5919 false /* fMediumLockWriteAll */,
5920 this,
5921 mediumLockList);
5922 AssertComRCReturnRC(rc);
5923
5924 try
5925 {
5926 PVDISK hdd;
5927 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
5928 ComAssertRCThrow(vrc, E_FAIL);
5929
5930 try
5931 {
5932 MediumLockList::Base::iterator lockListBegin =
5933 mediumLockList.GetBegin();
5934 MediumLockList::Base::iterator lockListEnd =
5935 mediumLockList.GetEnd();
5936 for (MediumLockList::Base::iterator it = lockListBegin;
5937 it != lockListEnd;
5938 ++it)
5939 {
5940 MediumLock &mediumLock = *it;
5941 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
5942 AutoReadLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
5943
5944 // open the medium
5945 vrc = VDOpen(hdd,
5946 pMedium->m->strFormat.c_str(),
5947 pMedium->m->strLocationFull.c_str(),
5948 VD_OPEN_FLAGS_READONLY | m->uOpenFlagsDef,
5949 pMedium->m->vdImageIfaces);
5950 if (RT_FAILURE(vrc))
5951 throw vrc;
5952 }
5953
5954 MediumLockList::Base::iterator childrenBegin = pChildrenToReparent->GetBegin();
5955 MediumLockList::Base::iterator childrenEnd = pChildrenToReparent->GetEnd();
5956 for (MediumLockList::Base::iterator it = childrenBegin;
5957 it != childrenEnd;
5958 ++it)
5959 {
5960 Medium *pMedium = it->GetMedium();
5961 /* VD_OPEN_FLAGS_INFO since UUID is wrong yet */
5962 vrc = VDOpen(hdd,
5963 pMedium->m->strFormat.c_str(),
5964 pMedium->m->strLocationFull.c_str(),
5965 VD_OPEN_FLAGS_INFO | m->uOpenFlagsDef,
5966 pMedium->m->vdImageIfaces);
5967 if (RT_FAILURE(vrc))
5968 throw vrc;
5969
5970 vrc = VDSetParentUuid(hdd, VD_LAST_IMAGE, m->id.raw());
5971 if (RT_FAILURE(vrc))
5972 throw vrc;
5973
5974 vrc = VDClose(hdd, false /* fDelete */);
5975 if (RT_FAILURE(vrc))
5976 throw vrc;
5977 }
5978 }
5979 catch (HRESULT aRC) { rc = aRC; }
5980 catch (int aVRC)
5981 {
5982 rc = setError(E_FAIL,
5983 tr("Could not update medium UUID references to parent '%s' (%s)"),
5984 m->strLocationFull.c_str(),
5985 i_vdError(aVRC).c_str());
5986 }
5987
5988 VDDestroy(hdd);
5989 }
5990 catch (HRESULT aRC) { rc = aRC; }
5991
5992 return rc;
5993}
5994
5995/**
5996 *
5997 * @note Similar code exists in i_taskExportHandler.
5998 */
5999HRESULT Medium::i_addRawToFss(const char *aFilename, SecretKeyStore *pKeyStore, RTVFSFSSTREAM hVfsFssDst,
6000 const ComObjPtr<Progress> &aProgress, bool fSparse)
6001{
6002 AutoCaller autoCaller(this);
6003 HRESULT hrc = autoCaller.rc();
6004 if (SUCCEEDED(hrc))
6005 {
6006 /*
6007 * Get a readonly hdd for this medium.
6008 */
6009 Medium::CryptoFilterSettings CryptoSettingsRead;
6010 MediumLockList SourceMediumLockList;
6011 PVDISK pHdd;
6012 hrc = i_openHddForReading(pKeyStore, &pHdd, &SourceMediumLockList, &CryptoSettingsRead);
6013 if (SUCCEEDED(hrc))
6014 {
6015 /*
6016 * Create a VFS file interface to the HDD and attach a progress wrapper
6017 * that monitors the progress reading of the raw image. The image will
6018 * be read twice if hVfsFssDst does sparse processing.
6019 */
6020 RTVFSFILE hVfsFileDisk = NIL_RTVFSFILE;
6021 int vrc = VDCreateVfsFileFromDisk(pHdd, 0 /*fFlags*/, &hVfsFileDisk);
6022 if (RT_SUCCESS(vrc))
6023 {
6024 RTVFSFILE hVfsFileProgress = NIL_RTVFSFILE;
6025 vrc = RTVfsCreateProgressForFile(hVfsFileDisk, aProgress->i_iprtProgressCallback, &*aProgress,
6026 RTVFSPROGRESS_F_CANCELABLE | RTVFSPROGRESS_F_FORWARD_SEEK_AS_READ,
6027 VDGetSize(pHdd, VD_LAST_IMAGE) * (fSparse ? 2 : 1) /*cbExpectedRead*/,
6028 0 /*cbExpectedWritten*/, &hVfsFileProgress);
6029 RTVfsFileRelease(hVfsFileDisk);
6030 if (RT_SUCCESS(vrc))
6031 {
6032 RTVFSOBJ hVfsObj = RTVfsObjFromFile(hVfsFileProgress);
6033 RTVfsFileRelease(hVfsFileProgress);
6034
6035 vrc = RTVfsFsStrmAdd(hVfsFssDst, aFilename, hVfsObj, 0 /*fFlags*/);
6036 RTVfsObjRelease(hVfsObj);
6037 if (RT_FAILURE(vrc))
6038 hrc = setErrorBoth(VBOX_E_FILE_ERROR, vrc, tr("Failed to add '%s' to output (%Rrc)"), aFilename, vrc);
6039 }
6040 else
6041 hrc = setErrorBoth(VBOX_E_FILE_ERROR, vrc,
6042 tr("RTVfsCreateProgressForFile failed when processing '%s' (%Rrc)"), aFilename, vrc);
6043 }
6044 else
6045 hrc = setErrorBoth(VBOX_E_FILE_ERROR, vrc, tr("VDCreateVfsFileFromDisk failed for '%s' (%Rrc)"), aFilename, vrc);
6046 VDDestroy(pHdd);
6047 }
6048 }
6049 return hrc;
6050}
6051
6052/**
6053 * Used by IAppliance to export disk images.
6054 *
6055 * @param aFilename Filename to create (UTF8).
6056 * @param aFormat Medium format for creating @a aFilename.
6057 * @param aVariant Which exact image format variant to use for the
6058 * destination image.
6059 * @param pKeyStore The optional key store for decrypting the data for
6060 * encrypted media during the export.
6061 * @param hVfsIosDst The destination I/O stream object.
6062 * @param aProgress Progress object to use.
6063 * @return
6064 *
6065 * @note The source format is defined by the Medium instance.
6066 */
6067HRESULT Medium::i_exportFile(const char *aFilename,
6068 const ComObjPtr<MediumFormat> &aFormat,
6069 MediumVariant_T aVariant,
6070 SecretKeyStore *pKeyStore,
6071 RTVFSIOSTREAM hVfsIosDst,
6072 const ComObjPtr<Progress> &aProgress)
6073{
6074 AssertPtrReturn(aFilename, E_INVALIDARG);
6075 AssertReturn(aFormat.isNotNull(), E_INVALIDARG);
6076 AssertReturn(aProgress.isNotNull(), E_INVALIDARG);
6077
6078 AutoCaller autoCaller(this);
6079 HRESULT hrc = autoCaller.rc();
6080 if (SUCCEEDED(hrc))
6081 {
6082 /*
6083 * Setup VD interfaces.
6084 */
6085 PVDINTERFACE pVDImageIfaces = m->vdImageIfaces;
6086 PVDINTERFACEIO pVfsIoIf;
6087 int vrc = VDIfCreateFromVfsStream(hVfsIosDst, RTFILE_O_WRITE, &pVfsIoIf);
6088 if (RT_SUCCESS(vrc))
6089 {
6090 vrc = VDInterfaceAdd(&pVfsIoIf->Core, "Medium::ExportTaskVfsIos", VDINTERFACETYPE_IO,
6091 pVfsIoIf, sizeof(VDINTERFACEIO), &pVDImageIfaces);
6092 if (RT_SUCCESS(vrc))
6093 {
6094 /*
6095 * Get a readonly hdd for this medium (source).
6096 */
6097 Medium::CryptoFilterSettings CryptoSettingsRead;
6098 MediumLockList SourceMediumLockList;
6099 PVDISK pSrcHdd;
6100 hrc = i_openHddForReading(pKeyStore, &pSrcHdd, &SourceMediumLockList, &CryptoSettingsRead);
6101 if (SUCCEEDED(hrc))
6102 {
6103 /*
6104 * Create the target medium.
6105 */
6106 Utf8Str strDstFormat(aFormat->i_getId());
6107
6108 /* ensure the target directory exists */
6109 uint64_t fDstCapabilities = aFormat->i_getCapabilities();
6110 if (fDstCapabilities & MediumFormatCapabilities_File)
6111 {
6112 Utf8Str strDstLocation(aFilename);
6113 hrc = VirtualBox::i_ensureFilePathExists(strDstLocation.c_str(),
6114 !(aVariant & MediumVariant_NoCreateDir) /* fCreate */);
6115 }
6116 if (SUCCEEDED(hrc))
6117 {
6118 PVDISK pDstHdd;
6119 vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &pDstHdd);
6120 if (RT_SUCCESS(vrc))
6121 {
6122 /*
6123 * Create an interface for getting progress callbacks.
6124 */
6125 VDINTERFACEPROGRESS ProgressIf = VDINTERFACEPROGRESS_INITALIZER(aProgress->i_vdProgressCallback);
6126 PVDINTERFACE pProgress = NULL;
6127 vrc = VDInterfaceAdd(&ProgressIf.Core, "export-progress", VDINTERFACETYPE_PROGRESS,
6128 &*aProgress, sizeof(ProgressIf), &pProgress);
6129 AssertRC(vrc);
6130
6131 /*
6132 * Do the exporting.
6133 */
6134 vrc = VDCopy(pSrcHdd,
6135 VD_LAST_IMAGE,
6136 pDstHdd,
6137 strDstFormat.c_str(),
6138 aFilename,
6139 false /* fMoveByRename */,
6140 0 /* cbSize */,
6141 aVariant & ~MediumVariant_NoCreateDir,
6142 NULL /* pDstUuid */,
6143 VD_OPEN_FLAGS_NORMAL | VD_OPEN_FLAGS_SEQUENTIAL,
6144 pProgress,
6145 pVDImageIfaces,
6146 NULL);
6147 if (RT_SUCCESS(vrc))
6148 hrc = S_OK;
6149 else
6150 hrc = setErrorBoth(VBOX_E_FILE_ERROR, vrc, tr("Could not create the exported medium '%s'%s"),
6151 aFilename, i_vdError(vrc).c_str());
6152 VDDestroy(pDstHdd);
6153 }
6154 else
6155 hrc = setErrorVrc(vrc);
6156 }
6157 }
6158 VDDestroy(pSrcHdd);
6159 }
6160 else
6161 hrc = setErrorVrc(vrc, "VDInterfaceAdd -> %Rrc", vrc);
6162 VDIfDestroyFromVfsStream(pVfsIoIf);
6163 }
6164 else
6165 hrc = setErrorVrc(vrc, "VDIfCreateFromVfsStream -> %Rrc", vrc);
6166 }
6167 return hrc;
6168}
6169
6170/**
6171 * Used by IAppliance to import disk images.
6172 *
6173 * @param aFilename Filename to read (UTF8).
6174 * @param aFormat Medium format for reading @a aFilename.
6175 * @param aVariant Which exact image format variant to use
6176 * for the destination image.
6177 * @param aVfsIosSrc Handle to the source I/O stream.
6178 * @param aParent Parent medium. May be NULL.
6179 * @param aProgress Progress object to use.
6180 * @return
6181 * @note The destination format is defined by the Medium instance.
6182 *
6183 * @todo The only consumer of this method (Appliance::i_importOneDiskImage) is
6184 * already on a worker thread, so perhaps consider bypassing the thread
6185 * here and run in the task synchronously? VBoxSVC has enough threads as
6186 * it is...
6187 */
6188HRESULT Medium::i_importFile(const char *aFilename,
6189 const ComObjPtr<MediumFormat> &aFormat,
6190 MediumVariant_T aVariant,
6191 RTVFSIOSTREAM aVfsIosSrc,
6192 const ComObjPtr<Medium> &aParent,
6193 const ComObjPtr<Progress> &aProgress)
6194{
6195 /** @todo r=klaus The code below needs to be double checked with regard
6196 * to lock order violations, it probably causes lock order issues related
6197 * to the AutoCaller usage. */
6198 AssertPtrReturn(aFilename, E_INVALIDARG);
6199 AssertReturn(!aFormat.isNull(), E_INVALIDARG);
6200 AssertReturn(!aProgress.isNull(), E_INVALIDARG);
6201
6202 AutoCaller autoCaller(this);
6203 if (FAILED(autoCaller.rc())) return autoCaller.rc();
6204
6205 HRESULT rc = S_OK;
6206 Medium::Task *pTask = NULL;
6207
6208 try
6209 {
6210 // locking: we need the tree lock first because we access parent pointers
6211 // and we need to write-lock the media involved
6212 uint32_t cHandles = 2;
6213 LockHandle* pHandles[3] = { &m->pVirtualBox->i_getMediaTreeLockHandle(),
6214 this->lockHandle() };
6215 /* Only add parent to the lock if it is not null */
6216 if (!aParent.isNull())
6217 pHandles[cHandles++] = aParent->lockHandle();
6218 AutoWriteLock alock(cHandles,
6219 pHandles
6220 COMMA_LOCKVAL_SRC_POS);
6221
6222 if ( m->state != MediumState_NotCreated
6223 && m->state != MediumState_Created)
6224 throw i_setStateError();
6225
6226 /* Build the target lock list. */
6227 MediumLockList *pTargetMediumLockList(new MediumLockList());
6228 alock.release();
6229 rc = i_createMediumLockList(true /* fFailIfInaccessible */,
6230 this /* pToLockWrite */,
6231 false /* fMediumLockWriteAll */,
6232 aParent,
6233 *pTargetMediumLockList);
6234 alock.acquire();
6235 if (FAILED(rc))
6236 {
6237 delete pTargetMediumLockList;
6238 throw rc;
6239 }
6240
6241 alock.release();
6242 rc = pTargetMediumLockList->Lock();
6243 alock.acquire();
6244 if (FAILED(rc))
6245 {
6246 delete pTargetMediumLockList;
6247 throw setError(rc,
6248 tr("Failed to lock target media '%s'"),
6249 i_getLocationFull().c_str());
6250 }
6251
6252 /* setup task object to carry out the operation asynchronously */
6253 pTask = new Medium::ImportTask(this, aProgress, aFilename, aFormat, aVariant,
6254 aVfsIosSrc, aParent, pTargetMediumLockList);
6255 rc = pTask->rc();
6256 AssertComRC(rc);
6257 if (FAILED(rc))
6258 throw rc;
6259
6260 if (m->state == MediumState_NotCreated)
6261 m->state = MediumState_Creating;
6262 }
6263 catch (HRESULT aRC) { rc = aRC; }
6264
6265 if (SUCCEEDED(rc))
6266 rc = pTask->createThread();
6267 else if (pTask != NULL)
6268 delete pTask;
6269
6270 return rc;
6271}
6272
6273/**
6274 * Internal version of the public CloneTo API which allows to enable certain
6275 * optimizations to improve speed during VM cloning.
6276 *
6277 * @param aTarget Target medium
6278 * @param aVariant Which exact image format variant to use
6279 * for the destination image.
6280 * @param aParent Parent medium. May be NULL.
6281 * @param aProgress Progress object to use.
6282 * @param idxSrcImageSame The last image in the source chain which has the
6283 * same content as the given image in the destination
6284 * chain. Use UINT32_MAX to disable this optimization.
6285 * @param idxDstImageSame The last image in the destination chain which has the
6286 * same content as the given image in the source chain.
6287 * Use UINT32_MAX to disable this optimization.
6288 * @return
6289 */
6290HRESULT Medium::i_cloneToEx(const ComObjPtr<Medium> &aTarget, ULONG aVariant,
6291 const ComObjPtr<Medium> &aParent, IProgress **aProgress,
6292 uint32_t idxSrcImageSame, uint32_t idxDstImageSame)
6293{
6294 /** @todo r=klaus The code below needs to be double checked with regard
6295 * to lock order violations, it probably causes lock order issues related
6296 * to the AutoCaller usage. */
6297 CheckComArgNotNull(aTarget);
6298 CheckComArgOutPointerValid(aProgress);
6299 ComAssertRet(aTarget != this, E_INVALIDARG);
6300
6301 AutoCaller autoCaller(this);
6302 if (FAILED(autoCaller.rc())) return autoCaller.rc();
6303
6304 HRESULT rc = S_OK;
6305 ComObjPtr<Progress> pProgress;
6306 Medium::Task *pTask = NULL;
6307
6308 try
6309 {
6310 // locking: we need the tree lock first because we access parent pointers
6311 // and we need to write-lock the media involved
6312 uint32_t cHandles = 3;
6313 LockHandle* pHandles[4] = { &m->pVirtualBox->i_getMediaTreeLockHandle(),
6314 this->lockHandle(),
6315 aTarget->lockHandle() };
6316 /* Only add parent to the lock if it is not null */
6317 if (!aParent.isNull())
6318 pHandles[cHandles++] = aParent->lockHandle();
6319 AutoWriteLock alock(cHandles,
6320 pHandles
6321 COMMA_LOCKVAL_SRC_POS);
6322
6323 if ( aTarget->m->state != MediumState_NotCreated
6324 && aTarget->m->state != MediumState_Created)
6325 throw aTarget->i_setStateError();
6326
6327 /* Build the source lock list. */
6328 MediumLockList *pSourceMediumLockList(new MediumLockList());
6329 alock.release();
6330 rc = i_createMediumLockList(true /* fFailIfInaccessible */,
6331 NULL /* pToLockWrite */,
6332 false /* fMediumLockWriteAll */,
6333 NULL,
6334 *pSourceMediumLockList);
6335 alock.acquire();
6336 if (FAILED(rc))
6337 {
6338 delete pSourceMediumLockList;
6339 throw rc;
6340 }
6341
6342 /* Build the target lock list (including the to-be parent chain). */
6343 MediumLockList *pTargetMediumLockList(new MediumLockList());
6344 alock.release();
6345 rc = aTarget->i_createMediumLockList(true /* fFailIfInaccessible */,
6346 aTarget /* pToLockWrite */,
6347 false /* fMediumLockWriteAll */,
6348 aParent,
6349 *pTargetMediumLockList);
6350 alock.acquire();
6351 if (FAILED(rc))
6352 {
6353 delete pSourceMediumLockList;
6354 delete pTargetMediumLockList;
6355 throw rc;
6356 }
6357
6358 alock.release();
6359 rc = pSourceMediumLockList->Lock();
6360 alock.acquire();
6361 if (FAILED(rc))
6362 {
6363 delete pSourceMediumLockList;
6364 delete pTargetMediumLockList;
6365 throw setError(rc,
6366 tr("Failed to lock source media '%s'"),
6367 i_getLocationFull().c_str());
6368 }
6369 alock.release();
6370 rc = pTargetMediumLockList->Lock();
6371 alock.acquire();
6372 if (FAILED(rc))
6373 {
6374 delete pSourceMediumLockList;
6375 delete pTargetMediumLockList;
6376 throw setError(rc,
6377 tr("Failed to lock target media '%s'"),
6378 aTarget->i_getLocationFull().c_str());
6379 }
6380
6381 pProgress.createObject();
6382 rc = pProgress->init(m->pVirtualBox,
6383 static_cast <IMedium *>(this),
6384 BstrFmt(tr("Creating clone medium '%s'"), aTarget->m->strLocationFull.c_str()).raw(),
6385 TRUE /* aCancelable */);
6386 if (FAILED(rc))
6387 {
6388 delete pSourceMediumLockList;
6389 delete pTargetMediumLockList;
6390 throw rc;
6391 }
6392
6393 /* setup task object to carry out the operation asynchronously */
6394 pTask = new Medium::CloneTask(this, pProgress, aTarget,
6395 (MediumVariant_T)aVariant,
6396 aParent, idxSrcImageSame,
6397 idxDstImageSame, pSourceMediumLockList,
6398 pTargetMediumLockList);
6399 rc = pTask->rc();
6400 AssertComRC(rc);
6401 if (FAILED(rc))
6402 throw rc;
6403
6404 if (aTarget->m->state == MediumState_NotCreated)
6405 aTarget->m->state = MediumState_Creating;
6406 }
6407 catch (HRESULT aRC) { rc = aRC; }
6408
6409 if (SUCCEEDED(rc))
6410 {
6411 rc = pTask->createThread();
6412
6413 if (SUCCEEDED(rc))
6414 pProgress.queryInterfaceTo(aProgress);
6415 }
6416 else if (pTask != NULL)
6417 delete pTask;
6418
6419 return rc;
6420}
6421
6422/**
6423 * Returns the key identifier for this medium if encryption is configured.
6424 *
6425 * @returns Key identifier or empty string if no encryption is configured.
6426 */
6427const Utf8Str& Medium::i_getKeyId()
6428{
6429 ComObjPtr<Medium> pBase = i_getBase();
6430
6431 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
6432
6433 settings::StringsMap::const_iterator it = pBase->m->mapProperties.find("CRYPT/KeyId");
6434 if (it == pBase->m->mapProperties.end())
6435 return Utf8Str::Empty;
6436
6437 return it->second;
6438}
6439
6440/**
6441 * Returns all filter related properties.
6442 *
6443 * @returns COM status code.
6444 * @param aReturnNames Where to store the properties names on success.
6445 * @param aReturnValues Where to store the properties values on success.
6446 */
6447HRESULT Medium::i_getFilterProperties(std::vector<com::Utf8Str> &aReturnNames,
6448 std::vector<com::Utf8Str> &aReturnValues)
6449{
6450 std::vector<com::Utf8Str> aPropNames;
6451 std::vector<com::Utf8Str> aPropValues;
6452 HRESULT hrc = getProperties(Utf8Str(""), aPropNames, aPropValues);
6453
6454 if (SUCCEEDED(hrc))
6455 {
6456 unsigned cReturnSize = 0;
6457 aReturnNames.resize(0);
6458 aReturnValues.resize(0);
6459 for (unsigned idx = 0; idx < aPropNames.size(); idx++)
6460 {
6461 if (i_isPropertyForFilter(aPropNames[idx]))
6462 {
6463 aReturnNames.resize(cReturnSize + 1);
6464 aReturnValues.resize(cReturnSize + 1);
6465 aReturnNames[cReturnSize] = aPropNames[idx];
6466 aReturnValues[cReturnSize] = aPropValues[idx];
6467 cReturnSize++;
6468 }
6469 }
6470 }
6471
6472 return hrc;
6473}
6474
6475/**
6476 * Preparation to move this medium to a new location
6477 *
6478 * @param aLocation Location of the storage unit. If the location is a FS-path,
6479 * then it can be relative to the VirtualBox home directory.
6480 *
6481 * @note Must be called from under this object's write lock.
6482 */
6483HRESULT Medium::i_preparationForMoving(const Utf8Str &aLocation)
6484{
6485 HRESULT rc = E_FAIL;
6486
6487 if (i_getLocationFull() != aLocation)
6488 {
6489 m->strNewLocationFull = aLocation;
6490 m->fMoveThisMedium = true;
6491 rc = S_OK;
6492 }
6493
6494 return rc;
6495}
6496
6497/**
6498 * Checking whether current operation "moving" or not
6499 */
6500bool Medium::i_isMoveOperation(const ComObjPtr<Medium> &aTarget) const
6501{
6502 RT_NOREF(aTarget);
6503 return (m->fMoveThisMedium == true) ? true:false;
6504}
6505
6506bool Medium::i_resetMoveOperationData()
6507{
6508 m->strNewLocationFull.setNull();
6509 m->fMoveThisMedium = false;
6510 return true;
6511}
6512
6513Utf8Str Medium::i_getNewLocationForMoving() const
6514{
6515 if (m->fMoveThisMedium == true)
6516 return m->strNewLocationFull;
6517 else
6518 return Utf8Str();
6519}
6520////////////////////////////////////////////////////////////////////////////////
6521//
6522// Private methods
6523//
6524////////////////////////////////////////////////////////////////////////////////
6525
6526/**
6527 * Queries information from the medium.
6528 *
6529 * As a result of this call, the accessibility state and data members such as
6530 * size and description will be updated with the current information.
6531 *
6532 * @note This method may block during a system I/O call that checks storage
6533 * accessibility.
6534 *
6535 * @note Caller MUST NOT hold the media tree or medium lock.
6536 *
6537 * @note Locks m->pParent for reading. Locks this object for writing.
6538 *
6539 * @param fSetImageId Whether to reset the UUID contained in the image file
6540 * to the UUID in the medium instance data (see SetIDs())
6541 * @param fSetParentId Whether to reset the parent UUID contained in the image
6542 * file to the parent UUID in the medium instance data (see
6543 * SetIDs())
6544 * @param autoCaller
6545 * @return
6546 */
6547HRESULT Medium::i_queryInfo(bool fSetImageId, bool fSetParentId, AutoCaller &autoCaller)
6548{
6549 Assert(!isWriteLockOnCurrentThread());
6550 AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
6551
6552 if ( ( m->state != MediumState_Created
6553 && m->state != MediumState_Inaccessible
6554 && m->state != MediumState_LockedRead)
6555 || m->fClosing)
6556 return E_FAIL;
6557
6558 HRESULT rc = S_OK;
6559
6560 int vrc = VINF_SUCCESS;
6561
6562 /* check if a blocking i_queryInfo() call is in progress on some other thread,
6563 * and wait for it to finish if so instead of querying data ourselves */
6564 if (m->queryInfoRunning)
6565 {
6566 Assert( m->state == MediumState_LockedRead
6567 || m->state == MediumState_LockedWrite);
6568
6569 while (m->queryInfoRunning)
6570 {
6571 alock.release();
6572 /* must not hold the object lock now */
6573 Assert(!isWriteLockOnCurrentThread());
6574 {
6575 AutoReadLock qlock(m->queryInfoSem COMMA_LOCKVAL_SRC_POS);
6576 }
6577 alock.acquire();
6578 }
6579
6580 return S_OK;
6581 }
6582
6583 bool success = false;
6584 Utf8Str lastAccessError;
6585
6586 /* are we dealing with a new medium constructed using the existing
6587 * location? */
6588 bool isImport = m->id.isZero();
6589 unsigned uOpenFlags = VD_OPEN_FLAGS_INFO;
6590
6591 /* Note that we don't use VD_OPEN_FLAGS_READONLY when opening new
6592 * media because that would prevent necessary modifications
6593 * when opening media of some third-party formats for the first
6594 * time in VirtualBox (such as VMDK for which VDOpen() needs to
6595 * generate an UUID if it is missing) */
6596 if ( m->hddOpenMode == OpenReadOnly
6597 || m->type == MediumType_Readonly
6598 || (!isImport && !fSetImageId && !fSetParentId)
6599 )
6600 uOpenFlags |= VD_OPEN_FLAGS_READONLY;
6601
6602 /* Open shareable medium with the appropriate flags */
6603 if (m->type == MediumType_Shareable)
6604 uOpenFlags |= VD_OPEN_FLAGS_SHAREABLE;
6605
6606 /* Lock the medium, which makes the behavior much more consistent, must be
6607 * done before dropping the object lock and setting queryInfoRunning. */
6608 ComPtr<IToken> pToken;
6609 if (uOpenFlags & (VD_OPEN_FLAGS_READONLY | VD_OPEN_FLAGS_SHAREABLE))
6610 rc = LockRead(pToken.asOutParam());
6611 else
6612 rc = LockWrite(pToken.asOutParam());
6613 if (FAILED(rc)) return rc;
6614
6615 /* Copies of the input state fields which are not read-only,
6616 * as we're dropping the lock. CAUTION: be extremely careful what
6617 * you do with the contents of this medium object, as you will
6618 * create races if there are concurrent changes. */
6619 Utf8Str format(m->strFormat);
6620 Utf8Str location(m->strLocationFull);
6621 ComObjPtr<MediumFormat> formatObj = m->formatObj;
6622
6623 /* "Output" values which can't be set because the lock isn't held
6624 * at the time the values are determined. */
6625 Guid mediumId = m->id;
6626 uint64_t mediumSize = 0;
6627 uint64_t mediumLogicalSize = 0;
6628
6629 /* Flag whether a base image has a non-zero parent UUID and thus
6630 * need repairing after it was closed again. */
6631 bool fRepairImageZeroParentUuid = false;
6632
6633 ComObjPtr<VirtualBox> pVirtualBox = m->pVirtualBox;
6634
6635 /* must be set before leaving the object lock the first time */
6636 m->queryInfoRunning = true;
6637
6638 /* must leave object lock now, because a lock from a higher lock class
6639 * is needed and also a lengthy operation is coming */
6640 alock.release();
6641 autoCaller.release();
6642
6643 /* Note that taking the queryInfoSem after leaving the object lock above
6644 * can lead to short spinning of the loops waiting for i_queryInfo() to
6645 * complete. This is unavoidable since the other order causes a lock order
6646 * violation: here it would be requesting the object lock (at the beginning
6647 * of the method), then queryInfoSem, and below the other way round. */
6648 AutoWriteLock qlock(m->queryInfoSem COMMA_LOCKVAL_SRC_POS);
6649
6650 /* take the opportunity to have a media tree lock, released initially */
6651 Assert(!isWriteLockOnCurrentThread());
6652 Assert(!pVirtualBox->i_getMediaTreeLockHandle().isWriteLockOnCurrentThread());
6653 AutoWriteLock treeLock(pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
6654 treeLock.release();
6655
6656 /* re-take the caller, but not the object lock, to keep uninit away */
6657 autoCaller.add();
6658 if (FAILED(autoCaller.rc()))
6659 {
6660 m->queryInfoRunning = false;
6661 return autoCaller.rc();
6662 }
6663
6664 try
6665 {
6666 /* skip accessibility checks for host drives */
6667 if (m->hostDrive)
6668 {
6669 success = true;
6670 throw S_OK;
6671 }
6672
6673 PVDISK hdd;
6674 vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
6675 ComAssertRCThrow(vrc, E_FAIL);
6676
6677 try
6678 {
6679 /** @todo This kind of opening of media is assuming that diff
6680 * media can be opened as base media. Should be documented that
6681 * it must work for all medium format backends. */
6682 vrc = VDOpen(hdd,
6683 format.c_str(),
6684 location.c_str(),
6685 uOpenFlags | m->uOpenFlagsDef,
6686 m->vdImageIfaces);
6687 if (RT_FAILURE(vrc))
6688 {
6689 lastAccessError = Utf8StrFmt(tr("Could not open the medium '%s'%s"),
6690 location.c_str(), i_vdError(vrc).c_str());
6691 throw S_OK;
6692 }
6693
6694 if (formatObj->i_getCapabilities() & MediumFormatCapabilities_Uuid)
6695 {
6696 /* Modify the UUIDs if necessary. The associated fields are
6697 * not modified by other code, so no need to copy. */
6698 if (fSetImageId)
6699 {
6700 alock.acquire();
6701 vrc = VDSetUuid(hdd, 0, m->uuidImage.raw());
6702 alock.release();
6703 if (RT_FAILURE(vrc))
6704 {
6705 lastAccessError = Utf8StrFmt(tr("Could not update the UUID of medium '%s'%s"),
6706 location.c_str(), i_vdError(vrc).c_str());
6707 throw S_OK;
6708 }
6709 mediumId = m->uuidImage;
6710 }
6711 if (fSetParentId)
6712 {
6713 alock.acquire();
6714 vrc = VDSetParentUuid(hdd, 0, m->uuidParentImage.raw());
6715 alock.release();
6716 if (RT_FAILURE(vrc))
6717 {
6718 lastAccessError = Utf8StrFmt(tr("Could not update the parent UUID of medium '%s'%s"),
6719 location.c_str(), i_vdError(vrc).c_str());
6720 throw S_OK;
6721 }
6722 }
6723 /* zap the information, these are no long-term members */
6724 alock.acquire();
6725 unconst(m->uuidImage).clear();
6726 unconst(m->uuidParentImage).clear();
6727 alock.release();
6728
6729 /* check the UUID */
6730 RTUUID uuid;
6731 vrc = VDGetUuid(hdd, 0, &uuid);
6732 ComAssertRCThrow(vrc, E_FAIL);
6733
6734 if (isImport)
6735 {
6736 mediumId = uuid;
6737
6738 if (mediumId.isZero() && (m->hddOpenMode == OpenReadOnly))
6739 // only when importing a VDMK that has no UUID, create one in memory
6740 mediumId.create();
6741 }
6742 else
6743 {
6744 Assert(!mediumId.isZero());
6745
6746 if (mediumId != uuid)
6747 {
6748 /** @todo r=klaus this always refers to VirtualBox.xml as the medium registry, even for new VMs */
6749 lastAccessError = Utf8StrFmt(
6750 tr("UUID {%RTuuid} of the medium '%s' does not match the value {%RTuuid} stored in the media registry ('%s')"),
6751 &uuid,
6752 location.c_str(),
6753 mediumId.raw(),
6754 pVirtualBox->i_settingsFilePath().c_str());
6755 throw S_OK;
6756 }
6757 }
6758 }
6759 else
6760 {
6761 /* the backend does not support storing UUIDs within the
6762 * underlying storage so use what we store in XML */
6763
6764 if (fSetImageId)
6765 {
6766 /* set the UUID if an API client wants to change it */
6767 alock.acquire();
6768 mediumId = m->uuidImage;
6769 alock.release();
6770 }
6771 else if (isImport)
6772 {
6773 /* generate an UUID for an imported UUID-less medium */
6774 mediumId.create();
6775 }
6776 }
6777
6778 /* set the image uuid before the below parent uuid handling code
6779 * might place it somewhere in the media tree, so that the medium
6780 * UUID is valid at this point */
6781 alock.acquire();
6782 if (isImport || fSetImageId)
6783 unconst(m->id) = mediumId;
6784 alock.release();
6785
6786 /* get the medium variant */
6787 unsigned uImageFlags;
6788 vrc = VDGetImageFlags(hdd, 0, &uImageFlags);
6789 ComAssertRCThrow(vrc, E_FAIL);
6790 alock.acquire();
6791 m->variant = (MediumVariant_T)uImageFlags;
6792 alock.release();
6793
6794 /* check/get the parent uuid and update corresponding state */
6795 if (uImageFlags & VD_IMAGE_FLAGS_DIFF)
6796 {
6797 RTUUID parentId;
6798 vrc = VDGetParentUuid(hdd, 0, &parentId);
6799 ComAssertRCThrow(vrc, E_FAIL);
6800
6801 /* streamOptimized VMDK images are only accepted as base
6802 * images, as this allows automatic repair of OVF appliances.
6803 * Since such images don't support random writes they will not
6804 * be created for diff images. Only an overly smart user might
6805 * manually create this case. Too bad for him. */
6806 if ( (isImport || fSetParentId)
6807 && !(uImageFlags & VD_VMDK_IMAGE_FLAGS_STREAM_OPTIMIZED))
6808 {
6809 /* the parent must be known to us. Note that we freely
6810 * call locking methods of mVirtualBox and parent, as all
6811 * relevant locks must be already held. There may be no
6812 * concurrent access to the just opened medium on other
6813 * threads yet (and init() will fail if this method reports
6814 * MediumState_Inaccessible) */
6815
6816 ComObjPtr<Medium> pParent;
6817 if (RTUuidIsNull(&parentId))
6818 rc = VBOX_E_OBJECT_NOT_FOUND;
6819 else
6820 rc = pVirtualBox->i_findHardDiskById(Guid(parentId), false /* aSetError */, &pParent);
6821 if (FAILED(rc))
6822 {
6823 if (fSetImageId && !fSetParentId)
6824 {
6825 /* If the image UUID gets changed for an existing
6826 * image then the parent UUID can be stale. In such
6827 * cases clear the parent information. The parent
6828 * information may/will be re-set later if the
6829 * API client wants to adjust a complete medium
6830 * hierarchy one by one. */
6831 rc = S_OK;
6832 alock.acquire();
6833 RTUuidClear(&parentId);
6834 vrc = VDSetParentUuid(hdd, 0, &parentId);
6835 alock.release();
6836 ComAssertRCThrow(vrc, E_FAIL);
6837 }
6838 else
6839 {
6840 lastAccessError = Utf8StrFmt(tr("Parent medium with UUID {%RTuuid} of the medium '%s' is not found in the media registry ('%s')"),
6841 &parentId, location.c_str(),
6842 pVirtualBox->i_settingsFilePath().c_str());
6843 throw S_OK;
6844 }
6845 }
6846
6847 /* must drop the caller before taking the tree lock */
6848 autoCaller.release();
6849 /* we set m->pParent & children() */
6850 treeLock.acquire();
6851 autoCaller.add();
6852 if (FAILED(autoCaller.rc()))
6853 throw autoCaller.rc();
6854
6855 if (m->pParent)
6856 i_deparent();
6857
6858 if (!pParent.isNull())
6859 if (pParent->i_getDepth() >= SETTINGS_MEDIUM_DEPTH_MAX)
6860 {
6861 AutoReadLock plock(pParent COMMA_LOCKVAL_SRC_POS);
6862 throw setError(VBOX_E_INVALID_OBJECT_STATE,
6863 tr("Cannot open differencing image for medium '%s', because it exceeds the medium tree depth limit. Please merge some images which you no longer need"),
6864 pParent->m->strLocationFull.c_str());
6865 }
6866 i_setParent(pParent);
6867
6868 treeLock.release();
6869 }
6870 else
6871 {
6872 /* must drop the caller before taking the tree lock */
6873 autoCaller.release();
6874 /* we access m->pParent */
6875 treeLock.acquire();
6876 autoCaller.add();
6877 if (FAILED(autoCaller.rc()))
6878 throw autoCaller.rc();
6879
6880 /* check that parent UUIDs match. Note that there's no need
6881 * for the parent's AutoCaller (our lifetime is bound to
6882 * it) */
6883
6884 if (m->pParent.isNull())
6885 {
6886 /* Due to a bug in VDCopy() in VirtualBox 3.0.0-3.0.14
6887 * and 3.1.0-3.1.8 there are base images out there
6888 * which have a non-zero parent UUID. No point in
6889 * complaining about them, instead automatically
6890 * repair the problem. Later we can bring back the
6891 * error message, but we should wait until really
6892 * most users have repaired their images, either with
6893 * VBoxFixHdd or this way. */
6894#if 1
6895 fRepairImageZeroParentUuid = true;
6896#else /* 0 */
6897 lastAccessError = Utf8StrFmt(
6898 tr("Medium type of '%s' is differencing but it is not associated with any parent medium in the media registry ('%s')"),
6899 location.c_str(),
6900 pVirtualBox->settingsFilePath().c_str());
6901 treeLock.release();
6902 throw S_OK;
6903#endif /* 0 */
6904 }
6905
6906 {
6907 autoCaller.release();
6908 AutoReadLock parentLock(m->pParent COMMA_LOCKVAL_SRC_POS);
6909 autoCaller.add();
6910 if (FAILED(autoCaller.rc()))
6911 throw autoCaller.rc();
6912
6913 if ( !fRepairImageZeroParentUuid
6914 && m->pParent->i_getState() != MediumState_Inaccessible
6915 && m->pParent->i_getId() != parentId)
6916 {
6917 /** @todo r=klaus this always refers to VirtualBox.xml as the medium registry, even for new VMs */
6918 lastAccessError = Utf8StrFmt(
6919 tr("Parent UUID {%RTuuid} of the medium '%s' does not match UUID {%RTuuid} of its parent medium stored in the media registry ('%s')"),
6920 &parentId, location.c_str(),
6921 m->pParent->i_getId().raw(),
6922 pVirtualBox->i_settingsFilePath().c_str());
6923 parentLock.release();
6924 treeLock.release();
6925 throw S_OK;
6926 }
6927 }
6928
6929 /// @todo NEWMEDIA what to do if the parent is not
6930 /// accessible while the diff is? Probably nothing. The
6931 /// real code will detect the mismatch anyway.
6932
6933 treeLock.release();
6934 }
6935 }
6936
6937 mediumSize = VDGetFileSize(hdd, 0);
6938 mediumLogicalSize = VDGetSize(hdd, 0);
6939
6940 success = true;
6941 }
6942 catch (HRESULT aRC)
6943 {
6944 rc = aRC;
6945 }
6946
6947 vrc = VDDestroy(hdd);
6948 if (RT_FAILURE(vrc))
6949 {
6950 lastAccessError = Utf8StrFmt(tr("Could not update and close the medium '%s'%s"),
6951 location.c_str(), i_vdError(vrc).c_str());
6952 success = false;
6953 throw S_OK;
6954 }
6955 }
6956 catch (HRESULT aRC)
6957 {
6958 rc = aRC;
6959 }
6960
6961 autoCaller.release();
6962 treeLock.acquire();
6963 autoCaller.add();
6964 if (FAILED(autoCaller.rc()))
6965 {
6966 m->queryInfoRunning = false;
6967 return autoCaller.rc();
6968 }
6969 alock.acquire();
6970
6971 if (success)
6972 {
6973 m->size = mediumSize;
6974 m->logicalSize = mediumLogicalSize;
6975 m->strLastAccessError.setNull();
6976 }
6977 else
6978 {
6979 m->strLastAccessError = lastAccessError;
6980 Log1WarningFunc(("'%s' is not accessible (error='%s', rc=%Rhrc, vrc=%Rrc)\n",
6981 location.c_str(), m->strLastAccessError.c_str(), rc, vrc));
6982 }
6983
6984 /* Set the proper state according to the result of the check */
6985 if (success)
6986 m->preLockState = MediumState_Created;
6987 else
6988 m->preLockState = MediumState_Inaccessible;
6989
6990 /* unblock anyone waiting for the i_queryInfo results */
6991 qlock.release();
6992 m->queryInfoRunning = false;
6993
6994 pToken->Abandon();
6995 pToken.setNull();
6996
6997 if (FAILED(rc)) return rc;
6998
6999 /* If this is a base image which incorrectly has a parent UUID set,
7000 * repair the image now by zeroing the parent UUID. This is only done
7001 * when we have structural information from a config file, on import
7002 * this is not possible. If someone would accidentally call openMedium
7003 * with a diff image before the base is registered this would destroy
7004 * the diff. Not acceptable. */
7005 if (fRepairImageZeroParentUuid)
7006 {
7007 rc = LockWrite(pToken.asOutParam());
7008 if (FAILED(rc)) return rc;
7009
7010 alock.release();
7011
7012 try
7013 {
7014 PVDISK hdd;
7015 vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
7016 ComAssertRCThrow(vrc, E_FAIL);
7017
7018 try
7019 {
7020 vrc = VDOpen(hdd,
7021 format.c_str(),
7022 location.c_str(),
7023 (uOpenFlags & ~VD_OPEN_FLAGS_READONLY) | m->uOpenFlagsDef,
7024 m->vdImageIfaces);
7025 if (RT_FAILURE(vrc))
7026 throw S_OK;
7027
7028 RTUUID zeroParentUuid;
7029 RTUuidClear(&zeroParentUuid);
7030 vrc = VDSetParentUuid(hdd, 0, &zeroParentUuid);
7031 ComAssertRCThrow(vrc, E_FAIL);
7032 }
7033 catch (HRESULT aRC)
7034 {
7035 rc = aRC;
7036 }
7037
7038 VDDestroy(hdd);
7039 }
7040 catch (HRESULT aRC)
7041 {
7042 rc = aRC;
7043 }
7044
7045 pToken->Abandon();
7046 pToken.setNull();
7047 if (FAILED(rc)) return rc;
7048 }
7049
7050 return rc;
7051}
7052
7053/**
7054 * Performs extra checks if the medium can be closed and returns S_OK in
7055 * this case. Otherwise, returns a respective error message. Called by
7056 * Close() under the medium tree lock and the medium lock.
7057 *
7058 * @note Also reused by Medium::Reset().
7059 *
7060 * @note Caller must hold the media tree write lock!
7061 */
7062HRESULT Medium::i_canClose()
7063{
7064 Assert(m->pVirtualBox->i_getMediaTreeLockHandle().isWriteLockOnCurrentThread());
7065
7066 if (i_getChildren().size() != 0)
7067 return setError(VBOX_E_OBJECT_IN_USE,
7068 tr("Cannot close medium '%s' because it has %d child media"),
7069 m->strLocationFull.c_str(), i_getChildren().size());
7070
7071 return S_OK;
7072}
7073
7074/**
7075 * Unregisters this medium with mVirtualBox. Called by close() under the medium tree lock.
7076 *
7077 * @note Caller must have locked the media tree lock for writing!
7078 */
7079HRESULT Medium::i_unregisterWithVirtualBox()
7080{
7081 /* Note that we need to de-associate ourselves from the parent to let
7082 * VirtualBox::i_unregisterMedium() properly save the registry */
7083
7084 /* we modify m->pParent and access children */
7085 Assert(m->pVirtualBox->i_getMediaTreeLockHandle().isWriteLockOnCurrentThread());
7086
7087 Medium *pParentBackup = m->pParent;
7088 AssertReturn(i_getChildren().size() == 0, E_FAIL);
7089 if (m->pParent)
7090 i_deparent();
7091
7092 HRESULT rc = m->pVirtualBox->i_unregisterMedium(this);
7093 if (FAILED(rc))
7094 {
7095 if (pParentBackup)
7096 {
7097 // re-associate with the parent as we are still relatives in the registry
7098 i_setParent(pParentBackup);
7099 }
7100 }
7101
7102 return rc;
7103}
7104
7105/**
7106 * Like SetProperty but do not trigger a settings store. Only for internal use!
7107 */
7108HRESULT Medium::i_setPropertyDirect(const Utf8Str &aName, const Utf8Str &aValue)
7109{
7110 AutoCaller autoCaller(this);
7111 if (FAILED(autoCaller.rc())) return autoCaller.rc();
7112
7113 AutoWriteLock mlock(this COMMA_LOCKVAL_SRC_POS);
7114
7115 switch (m->state)
7116 {
7117 case MediumState_Created:
7118 case MediumState_Inaccessible:
7119 break;
7120 default:
7121 return i_setStateError();
7122 }
7123
7124 m->mapProperties[aName] = aValue;
7125
7126 return S_OK;
7127}
7128
7129/**
7130 * Sets the extended error info according to the current media state.
7131 *
7132 * @note Must be called from under this object's write or read lock.
7133 */
7134HRESULT Medium::i_setStateError()
7135{
7136 HRESULT rc = E_FAIL;
7137
7138 switch (m->state)
7139 {
7140 case MediumState_NotCreated:
7141 {
7142 rc = setError(VBOX_E_INVALID_OBJECT_STATE,
7143 tr("Storage for the medium '%s' is not created"),
7144 m->strLocationFull.c_str());
7145 break;
7146 }
7147 case MediumState_Created:
7148 {
7149 rc = setError(VBOX_E_INVALID_OBJECT_STATE,
7150 tr("Storage for the medium '%s' is already created"),
7151 m->strLocationFull.c_str());
7152 break;
7153 }
7154 case MediumState_LockedRead:
7155 {
7156 rc = setError(VBOX_E_INVALID_OBJECT_STATE,
7157 tr("Medium '%s' is locked for reading by another task"),
7158 m->strLocationFull.c_str());
7159 break;
7160 }
7161 case MediumState_LockedWrite:
7162 {
7163 rc = setError(VBOX_E_INVALID_OBJECT_STATE,
7164 tr("Medium '%s' is locked for writing by another task"),
7165 m->strLocationFull.c_str());
7166 break;
7167 }
7168 case MediumState_Inaccessible:
7169 {
7170 /* be in sync with Console::powerUpThread() */
7171 if (!m->strLastAccessError.isEmpty())
7172 rc = setError(VBOX_E_INVALID_OBJECT_STATE,
7173 tr("Medium '%s' is not accessible. %s"),
7174 m->strLocationFull.c_str(), m->strLastAccessError.c_str());
7175 else
7176 rc = setError(VBOX_E_INVALID_OBJECT_STATE,
7177 tr("Medium '%s' is not accessible"),
7178 m->strLocationFull.c_str());
7179 break;
7180 }
7181 case MediumState_Creating:
7182 {
7183 rc = setError(VBOX_E_INVALID_OBJECT_STATE,
7184 tr("Storage for the medium '%s' is being created"),
7185 m->strLocationFull.c_str());
7186 break;
7187 }
7188 case MediumState_Deleting:
7189 {
7190 rc = setError(VBOX_E_INVALID_OBJECT_STATE,
7191 tr("Storage for the medium '%s' is being deleted"),
7192 m->strLocationFull.c_str());
7193 break;
7194 }
7195 default:
7196 {
7197 AssertFailed();
7198 break;
7199 }
7200 }
7201
7202 return rc;
7203}
7204
7205/**
7206 * Sets the value of m->strLocationFull. The given location must be a fully
7207 * qualified path; relative paths are not supported here.
7208 *
7209 * As a special exception, if the specified location is a file path that ends with '/'
7210 * then the file name part will be generated by this method automatically in the format
7211 * '{\<uuid\>}.\<ext\>' where \<uuid\> is a fresh UUID that this method will generate
7212 * and assign to this medium, and \<ext\> is the default extension for this
7213 * medium's storage format. Note that this procedure requires the media state to
7214 * be NotCreated and will return a failure otherwise.
7215 *
7216 * @param aLocation Location of the storage unit. If the location is a FS-path,
7217 * then it can be relative to the VirtualBox home directory.
7218 * @param aFormat Optional fallback format if it is an import and the format
7219 * cannot be determined.
7220 *
7221 * @note Must be called from under this object's write lock.
7222 */
7223HRESULT Medium::i_setLocation(const Utf8Str &aLocation,
7224 const Utf8Str &aFormat /* = Utf8Str::Empty */)
7225{
7226 AssertReturn(!aLocation.isEmpty(), E_FAIL);
7227
7228 AutoCaller autoCaller(this);
7229 AssertComRCReturnRC(autoCaller.rc());
7230
7231 /* formatObj may be null only when initializing from an existing path and
7232 * no format is known yet */
7233 AssertReturn( (!m->strFormat.isEmpty() && !m->formatObj.isNull())
7234 || ( getObjectState().getState() == ObjectState::InInit
7235 && m->state != MediumState_NotCreated
7236 && m->id.isZero()
7237 && m->strFormat.isEmpty()
7238 && m->formatObj.isNull()),
7239 E_FAIL);
7240
7241 /* are we dealing with a new medium constructed using the existing
7242 * location? */
7243 bool isImport = m->strFormat.isEmpty();
7244
7245 if ( isImport
7246 || ( (m->formatObj->i_getCapabilities() & MediumFormatCapabilities_File)
7247 && !m->hostDrive))
7248 {
7249 Guid id;
7250
7251 Utf8Str locationFull(aLocation);
7252
7253 if (m->state == MediumState_NotCreated)
7254 {
7255 /* must be a file (formatObj must be already known) */
7256 Assert(m->formatObj->i_getCapabilities() & MediumFormatCapabilities_File);
7257
7258 if (RTPathFilename(aLocation.c_str()) == NULL)
7259 {
7260 /* no file name is given (either an empty string or ends with a
7261 * slash), generate a new UUID + file name if the state allows
7262 * this */
7263
7264 ComAssertMsgRet(!m->formatObj->i_getFileExtensions().empty(),
7265 ("Must be at least one extension if it is MediumFormatCapabilities_File\n"),
7266 E_FAIL);
7267
7268 Utf8Str strExt = m->formatObj->i_getFileExtensions().front();
7269 ComAssertMsgRet(!strExt.isEmpty(),
7270 ("Default extension must not be empty\n"),
7271 E_FAIL);
7272
7273 id.create();
7274
7275 locationFull = Utf8StrFmt("%s{%RTuuid}.%s",
7276 aLocation.c_str(), id.raw(), strExt.c_str());
7277 }
7278 }
7279
7280 // we must always have full paths now (if it refers to a file)
7281 if ( ( m->formatObj.isNull()
7282 || m->formatObj->i_getCapabilities() & MediumFormatCapabilities_File)
7283 && !RTPathStartsWithRoot(locationFull.c_str()))
7284 return setError(VBOX_E_FILE_ERROR,
7285 tr("The given path '%s' is not fully qualified"),
7286 locationFull.c_str());
7287
7288 /* detect the backend from the storage unit if importing */
7289 if (isImport)
7290 {
7291 VDTYPE enmType = VDTYPE_INVALID;
7292 char *backendName = NULL;
7293
7294 int vrc = VINF_SUCCESS;
7295
7296 /* is it a file? */
7297 {
7298 RTFILE file;
7299 vrc = RTFileOpen(&file, locationFull.c_str(), RTFILE_O_READ | RTFILE_O_OPEN | RTFILE_O_DENY_NONE);
7300 if (RT_SUCCESS(vrc))
7301 RTFileClose(file);
7302 }
7303 if (RT_SUCCESS(vrc))
7304 {
7305 vrc = VDGetFormat(NULL /* pVDIfsDisk */, NULL /* pVDIfsImage */,
7306 locationFull.c_str(), &backendName, &enmType);
7307 }
7308 else if ( vrc != VERR_FILE_NOT_FOUND
7309 && vrc != VERR_PATH_NOT_FOUND
7310 && vrc != VERR_ACCESS_DENIED
7311 && locationFull != aLocation)
7312 {
7313 /* assume it's not a file, restore the original location */
7314 locationFull = aLocation;
7315 vrc = VDGetFormat(NULL /* pVDIfsDisk */, NULL /* pVDIfsImage */,
7316 locationFull.c_str(), &backendName, &enmType);
7317 }
7318
7319 if (RT_FAILURE(vrc))
7320 {
7321 if (vrc == VERR_ACCESS_DENIED)
7322 return setError(VBOX_E_FILE_ERROR,
7323 tr("Permission problem accessing the file for the medium '%s' (%Rrc)"),
7324 locationFull.c_str(), vrc);
7325 else if (vrc == VERR_FILE_NOT_FOUND || vrc == VERR_PATH_NOT_FOUND)
7326 return setError(VBOX_E_FILE_ERROR,
7327 tr("Could not find file for the medium '%s' (%Rrc)"),
7328 locationFull.c_str(), vrc);
7329 else if (aFormat.isEmpty())
7330 return setError(VBOX_E_IPRT_ERROR,
7331 tr("Could not get the storage format of the medium '%s' (%Rrc)"),
7332 locationFull.c_str(), vrc);
7333 else
7334 {
7335 HRESULT rc = i_setFormat(aFormat);
7336 /* setFormat() must not fail since we've just used the backend so
7337 * the format object must be there */
7338 AssertComRCReturnRC(rc);
7339 }
7340 }
7341 else if ( enmType == VDTYPE_INVALID
7342 || m->devType != i_convertToDeviceType(enmType))
7343 {
7344 /*
7345 * The user tried to use a image as a device which is not supported
7346 * by the backend.
7347 */
7348 return setError(E_FAIL,
7349 tr("The medium '%s' can't be used as the requested device type"),
7350 locationFull.c_str());
7351 }
7352 else
7353 {
7354 ComAssertRet(backendName != NULL && *backendName != '\0', E_FAIL);
7355
7356 HRESULT rc = i_setFormat(backendName);
7357 RTStrFree(backendName);
7358
7359 /* setFormat() must not fail since we've just used the backend so
7360 * the format object must be there */
7361 AssertComRCReturnRC(rc);
7362 }
7363 }
7364
7365 m->strLocationFull = locationFull;
7366
7367 /* is it still a file? */
7368 if ( (m->formatObj->i_getCapabilities() & MediumFormatCapabilities_File)
7369 && (m->state == MediumState_NotCreated)
7370 )
7371 /* assign a new UUID (this UUID will be used when calling
7372 * VDCreateBase/VDCreateDiff as a wanted UUID). Note that we
7373 * also do that if we didn't generate it to make sure it is
7374 * either generated by us or reset to null */
7375 unconst(m->id) = id;
7376 }
7377 else
7378 m->strLocationFull = aLocation;
7379
7380 return S_OK;
7381}
7382
7383/**
7384 * Checks that the format ID is valid and sets it on success.
7385 *
7386 * Note that this method will caller-reference the format object on success!
7387 * This reference must be released somewhere to let the MediumFormat object be
7388 * uninitialized.
7389 *
7390 * @note Must be called from under this object's write lock.
7391 */
7392HRESULT Medium::i_setFormat(const Utf8Str &aFormat)
7393{
7394 /* get the format object first */
7395 {
7396 SystemProperties *pSysProps = m->pVirtualBox->i_getSystemProperties();
7397 AutoReadLock propsLock(pSysProps COMMA_LOCKVAL_SRC_POS);
7398
7399 unconst(m->formatObj) = pSysProps->i_mediumFormat(aFormat);
7400 if (m->formatObj.isNull())
7401 return setError(E_INVALIDARG,
7402 tr("Invalid medium storage format '%s'"),
7403 aFormat.c_str());
7404
7405 /* get properties (preinsert them as keys in the map). Note that the
7406 * map doesn't grow over the object life time since the set of
7407 * properties is meant to be constant. */
7408
7409 Assert(m->mapProperties.empty());
7410
7411 for (MediumFormat::PropertyArray::const_iterator it = m->formatObj->i_getProperties().begin();
7412 it != m->formatObj->i_getProperties().end();
7413 ++it)
7414 {
7415 m->mapProperties.insert(std::make_pair(it->strName, Utf8Str::Empty));
7416 }
7417 }
7418
7419 unconst(m->strFormat) = aFormat;
7420
7421 return S_OK;
7422}
7423
7424/**
7425 * Converts the Medium device type to the VD type.
7426 */
7427VDTYPE Medium::i_convertDeviceType()
7428{
7429 VDTYPE enmType;
7430
7431 switch (m->devType)
7432 {
7433 case DeviceType_HardDisk:
7434 enmType = VDTYPE_HDD;
7435 break;
7436 case DeviceType_DVD:
7437 enmType = VDTYPE_OPTICAL_DISC;
7438 break;
7439 case DeviceType_Floppy:
7440 enmType = VDTYPE_FLOPPY;
7441 break;
7442 default:
7443 ComAssertFailedRet(VDTYPE_INVALID);
7444 }
7445
7446 return enmType;
7447}
7448
7449/**
7450 * Converts from the VD type to the medium type.
7451 */
7452DeviceType_T Medium::i_convertToDeviceType(VDTYPE enmType)
7453{
7454 DeviceType_T devType;
7455
7456 switch (enmType)
7457 {
7458 case VDTYPE_HDD:
7459 devType = DeviceType_HardDisk;
7460 break;
7461 case VDTYPE_OPTICAL_DISC:
7462 devType = DeviceType_DVD;
7463 break;
7464 case VDTYPE_FLOPPY:
7465 devType = DeviceType_Floppy;
7466 break;
7467 default:
7468 ComAssertFailedRet(DeviceType_Null);
7469 }
7470
7471 return devType;
7472}
7473
7474/**
7475 * Internal method which checks whether a property name is for a filter plugin.
7476 */
7477bool Medium::i_isPropertyForFilter(const com::Utf8Str &aName)
7478{
7479 /* If the name contains "/" use the part before as a filter name and lookup the filter. */
7480 size_t offSlash;
7481 if ((offSlash = aName.find("/", 0)) != aName.npos)
7482 {
7483 com::Utf8Str strFilter;
7484 com::Utf8Str strKey;
7485
7486 HRESULT rc = strFilter.assignEx(aName, 0, offSlash);
7487 if (FAILED(rc))
7488 return false;
7489
7490 rc = strKey.assignEx(aName, offSlash + 1, aName.length() - offSlash - 1); /* Skip slash */
7491 if (FAILED(rc))
7492 return false;
7493
7494 VDFILTERINFO FilterInfo;
7495 int vrc = VDFilterInfoOne(strFilter.c_str(), &FilterInfo);
7496 if (RT_SUCCESS(vrc))
7497 {
7498 /* Check that the property exists. */
7499 PCVDCONFIGINFO paConfig = FilterInfo.paConfigInfo;
7500 while (paConfig->pszKey)
7501 {
7502 if (strKey.equals(paConfig->pszKey))
7503 return true;
7504 paConfig++;
7505 }
7506 }
7507 }
7508
7509 return false;
7510}
7511
7512/**
7513 * Returns the last error message collected by the i_vdErrorCall callback and
7514 * resets it.
7515 *
7516 * The error message is returned prepended with a dot and a space, like this:
7517 * <code>
7518 * ". <error_text> (%Rrc)"
7519 * </code>
7520 * to make it easily appendable to a more general error message. The @c %Rrc
7521 * format string is given @a aVRC as an argument.
7522 *
7523 * If there is no last error message collected by i_vdErrorCall or if it is a
7524 * null or empty string, then this function returns the following text:
7525 * <code>
7526 * " (%Rrc)"
7527 * </code>
7528 *
7529 * @note Doesn't do any object locking; it is assumed that the caller makes sure
7530 * the callback isn't called by more than one thread at a time.
7531 *
7532 * @param aVRC VBox error code to use when no error message is provided.
7533 */
7534Utf8Str Medium::i_vdError(int aVRC)
7535{
7536 Utf8Str error;
7537
7538 if (m->vdError.isEmpty())
7539 error = Utf8StrFmt(" (%Rrc)", aVRC);
7540 else
7541 error = Utf8StrFmt(".\n%s", m->vdError.c_str());
7542
7543 m->vdError.setNull();
7544
7545 return error;
7546}
7547
7548/**
7549 * Error message callback.
7550 *
7551 * Puts the reported error message to the m->vdError field.
7552 *
7553 * @note Doesn't do any object locking; it is assumed that the caller makes sure
7554 * the callback isn't called by more than one thread at a time.
7555 *
7556 * @param pvUser The opaque data passed on container creation.
7557 * @param rc The VBox error code.
7558 * @param SRC_POS Use RT_SRC_POS.
7559 * @param pszFormat Error message format string.
7560 * @param va Error message arguments.
7561 */
7562/*static*/
7563DECLCALLBACK(void) Medium::i_vdErrorCall(void *pvUser, int rc, RT_SRC_POS_DECL,
7564 const char *pszFormat, va_list va)
7565{
7566 NOREF(pszFile); NOREF(iLine); NOREF(pszFunction); /* RT_SRC_POS_DECL */
7567
7568 Medium *that = static_cast<Medium*>(pvUser);
7569 AssertReturnVoid(that != NULL);
7570
7571 if (that->m->vdError.isEmpty())
7572 that->m->vdError =
7573 Utf8StrFmt("%s (%Rrc)", Utf8Str(pszFormat, va).c_str(), rc);
7574 else
7575 that->m->vdError =
7576 Utf8StrFmt("%s.\n%s (%Rrc)", that->m->vdError.c_str(),
7577 Utf8Str(pszFormat, va).c_str(), rc);
7578}
7579
7580/* static */
7581DECLCALLBACK(bool) Medium::i_vdConfigAreKeysValid(void *pvUser,
7582 const char * /* pszzValid */)
7583{
7584 Medium *that = static_cast<Medium*>(pvUser);
7585 AssertReturn(that != NULL, false);
7586
7587 /* we always return true since the only keys we have are those found in
7588 * VDBACKENDINFO */
7589 return true;
7590}
7591
7592/* static */
7593DECLCALLBACK(int) Medium::i_vdConfigQuerySize(void *pvUser,
7594 const char *pszName,
7595 size_t *pcbValue)
7596{
7597 AssertReturn(VALID_PTR(pcbValue), VERR_INVALID_POINTER);
7598
7599 Medium *that = static_cast<Medium*>(pvUser);
7600 AssertReturn(that != NULL, VERR_GENERAL_FAILURE);
7601
7602 settings::StringsMap::const_iterator it = that->m->mapProperties.find(Utf8Str(pszName));
7603 if (it == that->m->mapProperties.end())
7604 return VERR_CFGM_VALUE_NOT_FOUND;
7605
7606 /* we interpret null values as "no value" in Medium */
7607 if (it->second.isEmpty())
7608 return VERR_CFGM_VALUE_NOT_FOUND;
7609
7610 *pcbValue = it->second.length() + 1 /* include terminator */;
7611
7612 return VINF_SUCCESS;
7613}
7614
7615/* static */
7616DECLCALLBACK(int) Medium::i_vdConfigQuery(void *pvUser,
7617 const char *pszName,
7618 char *pszValue,
7619 size_t cchValue)
7620{
7621 AssertReturn(VALID_PTR(pszValue), VERR_INVALID_POINTER);
7622
7623 Medium *that = static_cast<Medium*>(pvUser);
7624 AssertReturn(that != NULL, VERR_GENERAL_FAILURE);
7625
7626 settings::StringsMap::const_iterator it = that->m->mapProperties.find(Utf8Str(pszName));
7627 if (it == that->m->mapProperties.end())
7628 return VERR_CFGM_VALUE_NOT_FOUND;
7629
7630 /* we interpret null values as "no value" in Medium */
7631 if (it->second.isEmpty())
7632 return VERR_CFGM_VALUE_NOT_FOUND;
7633
7634 const Utf8Str &value = it->second;
7635 if (value.length() >= cchValue)
7636 return VERR_CFGM_NOT_ENOUGH_SPACE;
7637
7638 memcpy(pszValue, value.c_str(), value.length() + 1);
7639
7640 return VINF_SUCCESS;
7641}
7642
7643DECLCALLBACK(int) Medium::i_vdTcpSocketCreate(uint32_t fFlags, PVDSOCKET pSock)
7644{
7645 PVDSOCKETINT pSocketInt = NULL;
7646
7647 if ((fFlags & VD_INTERFACETCPNET_CONNECT_EXTENDED_SELECT) != 0)
7648 return VERR_NOT_SUPPORTED;
7649
7650 pSocketInt = (PVDSOCKETINT)RTMemAllocZ(sizeof(VDSOCKETINT));
7651 if (!pSocketInt)
7652 return VERR_NO_MEMORY;
7653
7654 pSocketInt->hSocket = NIL_RTSOCKET;
7655 *pSock = pSocketInt;
7656 return VINF_SUCCESS;
7657}
7658
7659DECLCALLBACK(int) Medium::i_vdTcpSocketDestroy(VDSOCKET Sock)
7660{
7661 PVDSOCKETINT pSocketInt = (PVDSOCKETINT)Sock;
7662
7663 if (pSocketInt->hSocket != NIL_RTSOCKET)
7664 RTTcpClientCloseEx(pSocketInt->hSocket, false /*fGracefulShutdown*/);
7665
7666 RTMemFree(pSocketInt);
7667
7668 return VINF_SUCCESS;
7669}
7670
7671DECLCALLBACK(int) Medium::i_vdTcpClientConnect(VDSOCKET Sock, const char *pszAddress, uint32_t uPort,
7672 RTMSINTERVAL cMillies)
7673{
7674 PVDSOCKETINT pSocketInt = (PVDSOCKETINT)Sock;
7675
7676 return RTTcpClientConnectEx(pszAddress, uPort, &pSocketInt->hSocket, cMillies, NULL);
7677}
7678
7679DECLCALLBACK(int) Medium::i_vdTcpClientClose(VDSOCKET Sock)
7680{
7681 int rc = VINF_SUCCESS;
7682 PVDSOCKETINT pSocketInt = (PVDSOCKETINT)Sock;
7683
7684 rc = RTTcpClientCloseEx(pSocketInt->hSocket, false /*fGracefulShutdown*/);
7685 pSocketInt->hSocket = NIL_RTSOCKET;
7686 return rc;
7687}
7688
7689DECLCALLBACK(bool) Medium::i_vdTcpIsClientConnected(VDSOCKET Sock)
7690{
7691 PVDSOCKETINT pSocketInt = (PVDSOCKETINT)Sock;
7692 return pSocketInt->hSocket != NIL_RTSOCKET;
7693}
7694
7695DECLCALLBACK(int) Medium::i_vdTcpSelectOne(VDSOCKET Sock, RTMSINTERVAL cMillies)
7696{
7697 PVDSOCKETINT pSocketInt = (PVDSOCKETINT)Sock;
7698 return RTTcpSelectOne(pSocketInt->hSocket, cMillies);
7699}
7700
7701DECLCALLBACK(int) Medium::i_vdTcpRead(VDSOCKET Sock, void *pvBuffer, size_t cbBuffer, size_t *pcbRead)
7702{
7703 PVDSOCKETINT pSocketInt = (PVDSOCKETINT)Sock;
7704 return RTTcpRead(pSocketInt->hSocket, pvBuffer, cbBuffer, pcbRead);
7705}
7706
7707DECLCALLBACK(int) Medium::i_vdTcpWrite(VDSOCKET Sock, const void *pvBuffer, size_t cbBuffer)
7708{
7709 PVDSOCKETINT pSocketInt = (PVDSOCKETINT)Sock;
7710 return RTTcpWrite(pSocketInt->hSocket, pvBuffer, cbBuffer);
7711}
7712
7713DECLCALLBACK(int) Medium::i_vdTcpSgWrite(VDSOCKET Sock, PCRTSGBUF pSgBuf)
7714{
7715 PVDSOCKETINT pSocketInt = (PVDSOCKETINT)Sock;
7716 return RTTcpSgWrite(pSocketInt->hSocket, pSgBuf);
7717}
7718
7719DECLCALLBACK(int) Medium::i_vdTcpFlush(VDSOCKET Sock)
7720{
7721 PVDSOCKETINT pSocketInt = (PVDSOCKETINT)Sock;
7722 return RTTcpFlush(pSocketInt->hSocket);
7723}
7724
7725DECLCALLBACK(int) Medium::i_vdTcpSetSendCoalescing(VDSOCKET Sock, bool fEnable)
7726{
7727 PVDSOCKETINT pSocketInt = (PVDSOCKETINT)Sock;
7728 return RTTcpSetSendCoalescing(pSocketInt->hSocket, fEnable);
7729}
7730
7731DECLCALLBACK(int) Medium::i_vdTcpGetLocalAddress(VDSOCKET Sock, PRTNETADDR pAddr)
7732{
7733 PVDSOCKETINT pSocketInt = (PVDSOCKETINT)Sock;
7734 return RTTcpGetLocalAddress(pSocketInt->hSocket, pAddr);
7735}
7736
7737DECLCALLBACK(int) Medium::i_vdTcpGetPeerAddress(VDSOCKET Sock, PRTNETADDR pAddr)
7738{
7739 PVDSOCKETINT pSocketInt = (PVDSOCKETINT)Sock;
7740 return RTTcpGetPeerAddress(pSocketInt->hSocket, pAddr);
7741}
7742
7743DECLCALLBACK(bool) Medium::i_vdCryptoConfigAreKeysValid(void *pvUser, const char *pszzValid)
7744{
7745 /* Just return always true here. */
7746 NOREF(pvUser);
7747 NOREF(pszzValid);
7748 return true;
7749}
7750
7751DECLCALLBACK(int) Medium::i_vdCryptoConfigQuerySize(void *pvUser, const char *pszName, size_t *pcbValue)
7752{
7753 Medium::CryptoFilterSettings *pSettings = (Medium::CryptoFilterSettings *)pvUser;
7754 AssertPtrReturn(pSettings, VERR_GENERAL_FAILURE);
7755 AssertReturn(VALID_PTR(pcbValue), VERR_INVALID_POINTER);
7756
7757 size_t cbValue = 0;
7758 if (!strcmp(pszName, "Algorithm"))
7759 cbValue = strlen(pSettings->pszCipher) + 1;
7760 else if (!strcmp(pszName, "KeyId"))
7761 cbValue = sizeof("irrelevant");
7762 else if (!strcmp(pszName, "KeyStore"))
7763 {
7764 if (!pSettings->pszKeyStoreLoad)
7765 return VERR_CFGM_VALUE_NOT_FOUND;
7766 cbValue = strlen(pSettings->pszKeyStoreLoad) + 1;
7767 }
7768 else if (!strcmp(pszName, "CreateKeyStore"))
7769 cbValue = 2; /* Single digit + terminator. */
7770 else
7771 return VERR_CFGM_VALUE_NOT_FOUND;
7772
7773 *pcbValue = cbValue + 1 /* include terminator */;
7774
7775 return VINF_SUCCESS;
7776}
7777
7778DECLCALLBACK(int) Medium::i_vdCryptoConfigQuery(void *pvUser, const char *pszName,
7779 char *pszValue, size_t cchValue)
7780{
7781 Medium::CryptoFilterSettings *pSettings = (Medium::CryptoFilterSettings *)pvUser;
7782 AssertPtrReturn(pSettings, VERR_GENERAL_FAILURE);
7783 AssertReturn(VALID_PTR(pszValue), VERR_INVALID_POINTER);
7784
7785 const char *psz = NULL;
7786 if (!strcmp(pszName, "Algorithm"))
7787 psz = pSettings->pszCipher;
7788 else if (!strcmp(pszName, "KeyId"))
7789 psz = "irrelevant";
7790 else if (!strcmp(pszName, "KeyStore"))
7791 psz = pSettings->pszKeyStoreLoad;
7792 else if (!strcmp(pszName, "CreateKeyStore"))
7793 {
7794 if (pSettings->fCreateKeyStore)
7795 psz = "1";
7796 else
7797 psz = "0";
7798 }
7799 else
7800 return VERR_CFGM_VALUE_NOT_FOUND;
7801
7802 size_t cch = strlen(psz);
7803 if (cch >= cchValue)
7804 return VERR_CFGM_NOT_ENOUGH_SPACE;
7805
7806 memcpy(pszValue, psz, cch + 1);
7807 return VINF_SUCCESS;
7808}
7809
7810DECLCALLBACK(int) Medium::i_vdCryptoKeyRetain(void *pvUser, const char *pszId,
7811 const uint8_t **ppbKey, size_t *pcbKey)
7812{
7813 Medium::CryptoFilterSettings *pSettings = (Medium::CryptoFilterSettings *)pvUser;
7814 NOREF(pszId);
7815 NOREF(ppbKey);
7816 NOREF(pcbKey);
7817 AssertPtrReturn(pSettings, VERR_GENERAL_FAILURE);
7818 AssertMsgFailedReturn(("This method should not be called here!\n"), VERR_INVALID_STATE);
7819}
7820
7821DECLCALLBACK(int) Medium::i_vdCryptoKeyRelease(void *pvUser, const char *pszId)
7822{
7823 Medium::CryptoFilterSettings *pSettings = (Medium::CryptoFilterSettings *)pvUser;
7824 NOREF(pszId);
7825 AssertPtrReturn(pSettings, VERR_GENERAL_FAILURE);
7826 AssertMsgFailedReturn(("This method should not be called here!\n"), VERR_INVALID_STATE);
7827}
7828
7829DECLCALLBACK(int) Medium::i_vdCryptoKeyStorePasswordRetain(void *pvUser, const char *pszId, const char **ppszPassword)
7830{
7831 Medium::CryptoFilterSettings *pSettings = (Medium::CryptoFilterSettings *)pvUser;
7832 AssertPtrReturn(pSettings, VERR_GENERAL_FAILURE);
7833
7834 NOREF(pszId);
7835 *ppszPassword = pSettings->pszPassword;
7836 return VINF_SUCCESS;
7837}
7838
7839DECLCALLBACK(int) Medium::i_vdCryptoKeyStorePasswordRelease(void *pvUser, const char *pszId)
7840{
7841 Medium::CryptoFilterSettings *pSettings = (Medium::CryptoFilterSettings *)pvUser;
7842 AssertPtrReturn(pSettings, VERR_GENERAL_FAILURE);
7843 NOREF(pszId);
7844 return VINF_SUCCESS;
7845}
7846
7847DECLCALLBACK(int) Medium::i_vdCryptoKeyStoreSave(void *pvUser, const void *pvKeyStore, size_t cbKeyStore)
7848{
7849 Medium::CryptoFilterSettings *pSettings = (Medium::CryptoFilterSettings *)pvUser;
7850 AssertPtrReturn(pSettings, VERR_GENERAL_FAILURE);
7851
7852 pSettings->pszKeyStore = (char *)RTMemAllocZ(cbKeyStore);
7853 if (!pSettings->pszKeyStore)
7854 return VERR_NO_MEMORY;
7855
7856 memcpy(pSettings->pszKeyStore, pvKeyStore, cbKeyStore);
7857 return VINF_SUCCESS;
7858}
7859
7860DECLCALLBACK(int) Medium::i_vdCryptoKeyStoreReturnParameters(void *pvUser, const char *pszCipher,
7861 const uint8_t *pbDek, size_t cbDek)
7862{
7863 Medium::CryptoFilterSettings *pSettings = (Medium::CryptoFilterSettings *)pvUser;
7864 AssertPtrReturn(pSettings, VERR_GENERAL_FAILURE);
7865
7866 pSettings->pszCipherReturned = RTStrDup(pszCipher);
7867 pSettings->pbDek = pbDek;
7868 pSettings->cbDek = cbDek;
7869
7870 return pSettings->pszCipherReturned ? VINF_SUCCESS : VERR_NO_MEMORY;
7871}
7872
7873/**
7874 * Creates a read-only VDISK instance for this medium.
7875 *
7876 * @note Caller should not hold any medium related locks as this method will
7877 * acquire the medium lock for writing and others (VirtualBox).
7878 *
7879 * @returns COM status code.
7880 * @param pKeyStore The key store.
7881 * @param ppHdd Where to return the pointer to the VDISK on
7882 * success.
7883 * @param pMediumLockList The lock list to populate and lock. Caller
7884 * is responsible for calling the destructor or
7885 * MediumLockList::Clear() after destroying
7886 * @a *ppHdd
7887 * @param pCryptoSettingsRead The crypto read settings to use for setting
7888 * up decryption of the VDISK. This object
7889 * must be alive until the VDISK is destroyed!
7890 */
7891HRESULT Medium::i_openHddForReading(SecretKeyStore *pKeyStore, PVDISK *ppHdd, MediumLockList *pMediumLockList,
7892 Medium::CryptoFilterSettings *pCryptoSettingsRead)
7893{
7894 /*
7895 * Create the media lock list and lock the media.
7896 */
7897 HRESULT hrc = i_createMediumLockList(true /* fFailIfInaccessible */,
7898 NULL /* pToLockWrite */,
7899 false /* fMediumLockWriteAll */,
7900 NULL,
7901 *pMediumLockList);
7902 if (SUCCEEDED(hrc))
7903 hrc = pMediumLockList->Lock();
7904 if (FAILED(hrc))
7905 return hrc;
7906
7907 /*
7908 * Get the base medium before write locking this medium.
7909 */
7910 ComObjPtr<Medium> pBase = i_getBase();
7911 AutoWriteLock thisLock(this COMMA_LOCKVAL_SRC_POS);
7912
7913 /*
7914 * Create the VDISK instance.
7915 */
7916 PVDISK pHdd;
7917 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &pHdd);
7918 AssertRCReturn(vrc, E_FAIL);
7919
7920 /*
7921 * Goto avoidance using try/catch/throw(HRESULT).
7922 */
7923 try
7924 {
7925 settings::StringsMap::iterator itKeyStore = pBase->m->mapProperties.find("CRYPT/KeyStore");
7926 if (itKeyStore != pBase->m->mapProperties.end())
7927 {
7928 settings::StringsMap::iterator itKeyId = pBase->m->mapProperties.find("CRYPT/KeyId");
7929
7930#ifdef VBOX_WITH_EXTPACK
7931 ExtPackManager *pExtPackManager = m->pVirtualBox->i_getExtPackManager();
7932 if (pExtPackManager->i_isExtPackUsable(ORACLE_PUEL_EXTPACK_NAME))
7933 {
7934 /* Load the plugin */
7935 Utf8Str strPlugin;
7936 hrc = pExtPackManager->i_getLibraryPathForExtPack(g_szVDPlugin, ORACLE_PUEL_EXTPACK_NAME, &strPlugin);
7937 if (SUCCEEDED(hrc))
7938 {
7939 vrc = VDPluginLoadFromFilename(strPlugin.c_str());
7940 if (RT_FAILURE(vrc))
7941 throw setError(VBOX_E_NOT_SUPPORTED,
7942 tr("Retrieving encryption settings of the image failed because the encryption plugin could not be loaded (%s)"),
7943 i_vdError(vrc).c_str());
7944 }
7945 else
7946 throw setError(VBOX_E_NOT_SUPPORTED,
7947 tr("Encryption is not supported because the extension pack '%s' is missing the encryption plugin (old extension pack installed?)"),
7948 ORACLE_PUEL_EXTPACK_NAME);
7949 }
7950 else
7951 throw setError(VBOX_E_NOT_SUPPORTED,
7952 tr("Encryption is not supported because the extension pack '%s' is missing"),
7953 ORACLE_PUEL_EXTPACK_NAME);
7954#else
7955 throw setError(VBOX_E_NOT_SUPPORTED,
7956 tr("Encryption is not supported because extension pack support is not built in"));
7957#endif
7958
7959 if (itKeyId == pBase->m->mapProperties.end())
7960 throw setError(VBOX_E_INVALID_OBJECT_STATE,
7961 tr("Image '%s' is configured for encryption but doesn't has a key identifier set"),
7962 pBase->m->strLocationFull.c_str());
7963
7964 /* Find the proper secret key in the key store. */
7965 if (!pKeyStore)
7966 throw setError(VBOX_E_INVALID_OBJECT_STATE,
7967 tr("Image '%s' is configured for encryption but there is no key store to retrieve the password from"),
7968 pBase->m->strLocationFull.c_str());
7969
7970 SecretKey *pKey = NULL;
7971 vrc = pKeyStore->retainSecretKey(itKeyId->second, &pKey);
7972 if (RT_FAILURE(vrc))
7973 throw setError(VBOX_E_INVALID_OBJECT_STATE,
7974 tr("Failed to retrieve the secret key with ID \"%s\" from the store (%Rrc)"),
7975 itKeyId->second.c_str(), vrc);
7976
7977 i_taskEncryptSettingsSetup(pCryptoSettingsRead, NULL, itKeyStore->second.c_str(), (const char *)pKey->getKeyBuffer(),
7978 false /* fCreateKeyStore */);
7979 vrc = VDFilterAdd(pHdd, "CRYPT", VD_FILTER_FLAGS_READ, pCryptoSettingsRead->vdFilterIfaces);
7980 pKeyStore->releaseSecretKey(itKeyId->second);
7981 if (vrc == VERR_VD_PASSWORD_INCORRECT)
7982 throw setError(VBOX_E_PASSWORD_INCORRECT, tr("The password to decrypt the image is incorrect"));
7983 if (RT_FAILURE(vrc))
7984 throw setError(VBOX_E_INVALID_OBJECT_STATE, tr("Failed to load the decryption filter: %s"),
7985 i_vdError(vrc).c_str());
7986 }
7987
7988 /*
7989 * Open all media in the source chain.
7990 */
7991 MediumLockList::Base::const_iterator sourceListBegin = pMediumLockList->GetBegin();
7992 MediumLockList::Base::const_iterator sourceListEnd = pMediumLockList->GetEnd();
7993 for (MediumLockList::Base::const_iterator it = sourceListBegin; it != sourceListEnd; ++it)
7994 {
7995 const MediumLock &mediumLock = *it;
7996 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
7997 AutoReadLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
7998
7999 /* sanity check */
8000 Assert(pMedium->m->state == MediumState_LockedRead);
8001
8002 /* Open all media in read-only mode. */
8003 vrc = VDOpen(pHdd,
8004 pMedium->m->strFormat.c_str(),
8005 pMedium->m->strLocationFull.c_str(),
8006 VD_OPEN_FLAGS_READONLY | m->uOpenFlagsDef,
8007 pMedium->m->vdImageIfaces);
8008 if (RT_FAILURE(vrc))
8009 throw setError(VBOX_E_FILE_ERROR,
8010 tr("Could not open the medium storage unit '%s'%s"),
8011 pMedium->m->strLocationFull.c_str(),
8012 i_vdError(vrc).c_str());
8013 }
8014
8015 Assert(m->state == MediumState_LockedRead);
8016
8017 /*
8018 * Done!
8019 */
8020 *ppHdd = pHdd;
8021 return S_OK;
8022 }
8023 catch (HRESULT hrc2)
8024 {
8025 hrc = hrc2;
8026 }
8027
8028 VDDestroy(pHdd);
8029 return hrc;
8030
8031}
8032
8033/**
8034 * Implementation code for the "create base" task.
8035 *
8036 * This only gets started from Medium::CreateBaseStorage() and always runs
8037 * asynchronously. As a result, we always save the VirtualBox.xml file when
8038 * we're done here.
8039 *
8040 * @param task
8041 * @return
8042 */
8043HRESULT Medium::i_taskCreateBaseHandler(Medium::CreateBaseTask &task)
8044{
8045 /** @todo r=klaus The code below needs to be double checked with regard
8046 * to lock order violations, it probably causes lock order issues related
8047 * to the AutoCaller usage. */
8048 HRESULT rc = S_OK;
8049
8050 /* these parameters we need after creation */
8051 uint64_t size = 0, logicalSize = 0;
8052 MediumVariant_T variant = MediumVariant_Standard;
8053 bool fGenerateUuid = false;
8054
8055 try
8056 {
8057 AutoWriteLock thisLock(this COMMA_LOCKVAL_SRC_POS);
8058
8059 /* The object may request a specific UUID (through a special form of
8060 * the setLocation() argument). Otherwise we have to generate it */
8061 Guid id = m->id;
8062
8063 fGenerateUuid = id.isZero();
8064 if (fGenerateUuid)
8065 {
8066 id.create();
8067 /* VirtualBox::i_registerMedium() will need UUID */
8068 unconst(m->id) = id;
8069 }
8070
8071 Utf8Str format(m->strFormat);
8072 Utf8Str location(m->strLocationFull);
8073 uint64_t capabilities = m->formatObj->i_getCapabilities();
8074 ComAssertThrow(capabilities & ( MediumFormatCapabilities_CreateFixed
8075 | MediumFormatCapabilities_CreateDynamic), E_FAIL);
8076 Assert(m->state == MediumState_Creating);
8077
8078 PVDISK hdd;
8079 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
8080 ComAssertRCThrow(vrc, E_FAIL);
8081
8082 /* unlock before the potentially lengthy operation */
8083 thisLock.release();
8084
8085 try
8086 {
8087 /* ensure the directory exists */
8088 if (capabilities & MediumFormatCapabilities_File)
8089 {
8090 rc = VirtualBox::i_ensureFilePathExists(location, !(task.mVariant & MediumVariant_NoCreateDir) /* fCreate */);
8091 if (FAILED(rc))
8092 throw rc;
8093 }
8094
8095 VDGEOMETRY geo = { 0, 0, 0 }; /* auto-detect */
8096
8097 vrc = VDCreateBase(hdd,
8098 format.c_str(),
8099 location.c_str(),
8100 task.mSize,
8101 task.mVariant & ~MediumVariant_NoCreateDir,
8102 NULL,
8103 &geo,
8104 &geo,
8105 id.raw(),
8106 VD_OPEN_FLAGS_NORMAL | m->uOpenFlagsDef,
8107 m->vdImageIfaces,
8108 task.mVDOperationIfaces);
8109 if (RT_FAILURE(vrc))
8110 {
8111 if (vrc == VERR_VD_INVALID_TYPE)
8112 throw setError(VBOX_E_FILE_ERROR,
8113 tr("Parameters for creating the medium storage unit '%s' are invalid%s"),
8114 location.c_str(), i_vdError(vrc).c_str());
8115 else
8116 throw setError(VBOX_E_FILE_ERROR,
8117 tr("Could not create the medium storage unit '%s'%s"),
8118 location.c_str(), i_vdError(vrc).c_str());
8119 }
8120
8121 size = VDGetFileSize(hdd, 0);
8122 logicalSize = VDGetSize(hdd, 0);
8123 unsigned uImageFlags;
8124 vrc = VDGetImageFlags(hdd, 0, &uImageFlags);
8125 if (RT_SUCCESS(vrc))
8126 variant = (MediumVariant_T)uImageFlags;
8127 }
8128 catch (HRESULT aRC) { rc = aRC; }
8129
8130 VDDestroy(hdd);
8131 }
8132 catch (HRESULT aRC) { rc = aRC; }
8133
8134 if (SUCCEEDED(rc))
8135 {
8136 /* register with mVirtualBox as the last step and move to
8137 * Created state only on success (leaving an orphan file is
8138 * better than breaking media registry consistency) */
8139 AutoWriteLock treeLock(m->pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
8140 ComObjPtr<Medium> pMedium;
8141 rc = m->pVirtualBox->i_registerMedium(this, &pMedium, treeLock);
8142 Assert(pMedium == NULL || this == pMedium);
8143 }
8144
8145 // re-acquire the lock before changing state
8146 AutoWriteLock thisLock(this COMMA_LOCKVAL_SRC_POS);
8147
8148 if (SUCCEEDED(rc))
8149 {
8150 m->state = MediumState_Created;
8151
8152 m->size = size;
8153 m->logicalSize = logicalSize;
8154 m->variant = variant;
8155
8156 thisLock.release();
8157 i_markRegistriesModified();
8158 if (task.isAsync())
8159 {
8160 // in asynchronous mode, save settings now
8161 m->pVirtualBox->i_saveModifiedRegistries();
8162 }
8163 }
8164 else
8165 {
8166 /* back to NotCreated on failure */
8167 m->state = MediumState_NotCreated;
8168
8169 /* reset UUID to prevent it from being reused next time */
8170 if (fGenerateUuid)
8171 unconst(m->id).clear();
8172 }
8173
8174 return rc;
8175}
8176
8177/**
8178 * Implementation code for the "create diff" task.
8179 *
8180 * This task always gets started from Medium::createDiffStorage() and can run
8181 * synchronously or asynchronously depending on the "wait" parameter passed to
8182 * that function. If we run synchronously, the caller expects the medium
8183 * registry modification to be set before returning; otherwise (in asynchronous
8184 * mode), we save the settings ourselves.
8185 *
8186 * @param task
8187 * @return
8188 */
8189HRESULT Medium::i_taskCreateDiffHandler(Medium::CreateDiffTask &task)
8190{
8191 /** @todo r=klaus The code below needs to be double checked with regard
8192 * to lock order violations, it probably causes lock order issues related
8193 * to the AutoCaller usage. */
8194 HRESULT rcTmp = S_OK;
8195
8196 const ComObjPtr<Medium> &pTarget = task.mTarget;
8197
8198 uint64_t size = 0, logicalSize = 0;
8199 MediumVariant_T variant = MediumVariant_Standard;
8200 bool fGenerateUuid = false;
8201
8202 try
8203 {
8204 if (i_getDepth() >= SETTINGS_MEDIUM_DEPTH_MAX)
8205 {
8206 AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
8207 throw setError(VBOX_E_INVALID_OBJECT_STATE,
8208 tr("Cannot create differencing image for medium '%s', because it exceeds the medium tree depth limit. Please merge some images which you no longer need"),
8209 m->strLocationFull.c_str());
8210 }
8211
8212 /* Lock both in {parent,child} order. */
8213 AutoMultiWriteLock2 mediaLock(this, pTarget COMMA_LOCKVAL_SRC_POS);
8214
8215 /* The object may request a specific UUID (through a special form of
8216 * the setLocation() argument). Otherwise we have to generate it */
8217 Guid targetId = pTarget->m->id;
8218
8219 fGenerateUuid = targetId.isZero();
8220 if (fGenerateUuid)
8221 {
8222 targetId.create();
8223 /* VirtualBox::i_registerMedium() will need UUID */
8224 unconst(pTarget->m->id) = targetId;
8225 }
8226
8227 Guid id = m->id;
8228
8229 Utf8Str targetFormat(pTarget->m->strFormat);
8230 Utf8Str targetLocation(pTarget->m->strLocationFull);
8231 uint64_t capabilities = pTarget->m->formatObj->i_getCapabilities();
8232 ComAssertThrow(capabilities & MediumFormatCapabilities_CreateDynamic, E_FAIL);
8233
8234 Assert(pTarget->m->state == MediumState_Creating);
8235 Assert(m->state == MediumState_LockedRead);
8236
8237 PVDISK hdd;
8238 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
8239 ComAssertRCThrow(vrc, E_FAIL);
8240
8241 /* the two media are now protected by their non-default states;
8242 * unlock the media before the potentially lengthy operation */
8243 mediaLock.release();
8244
8245 try
8246 {
8247 /* Open all media in the target chain but the last. */
8248 MediumLockList::Base::const_iterator targetListBegin =
8249 task.mpMediumLockList->GetBegin();
8250 MediumLockList::Base::const_iterator targetListEnd =
8251 task.mpMediumLockList->GetEnd();
8252 for (MediumLockList::Base::const_iterator it = targetListBegin;
8253 it != targetListEnd;
8254 ++it)
8255 {
8256 const MediumLock &mediumLock = *it;
8257 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
8258
8259 AutoReadLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
8260
8261 /* Skip over the target diff medium */
8262 if (pMedium->m->state == MediumState_Creating)
8263 continue;
8264
8265 /* sanity check */
8266 Assert(pMedium->m->state == MediumState_LockedRead);
8267
8268 /* Open all media in appropriate mode. */
8269 vrc = VDOpen(hdd,
8270 pMedium->m->strFormat.c_str(),
8271 pMedium->m->strLocationFull.c_str(),
8272 VD_OPEN_FLAGS_READONLY | VD_OPEN_FLAGS_INFO | m->uOpenFlagsDef,
8273 pMedium->m->vdImageIfaces);
8274 if (RT_FAILURE(vrc))
8275 throw setError(VBOX_E_FILE_ERROR,
8276 tr("Could not open the medium storage unit '%s'%s"),
8277 pMedium->m->strLocationFull.c_str(),
8278 i_vdError(vrc).c_str());
8279 }
8280
8281 /* ensure the target directory exists */
8282 if (capabilities & MediumFormatCapabilities_File)
8283 {
8284 HRESULT rc = VirtualBox::i_ensureFilePathExists(targetLocation,
8285 !(task.mVariant & MediumVariant_NoCreateDir) /* fCreate */);
8286 if (FAILED(rc))
8287 throw rc;
8288 }
8289
8290 vrc = VDCreateDiff(hdd,
8291 targetFormat.c_str(),
8292 targetLocation.c_str(),
8293 (task.mVariant & ~(MediumVariant_NoCreateDir | MediumVariant_VmdkESX)) | VD_IMAGE_FLAGS_DIFF,
8294 NULL,
8295 targetId.raw(),
8296 id.raw(),
8297 VD_OPEN_FLAGS_NORMAL | m->uOpenFlagsDef,
8298 pTarget->m->vdImageIfaces,
8299 task.mVDOperationIfaces);
8300 if (RT_FAILURE(vrc))
8301 {
8302 if (vrc == VERR_VD_INVALID_TYPE)
8303 throw setError(VBOX_E_FILE_ERROR,
8304 tr("Parameters for creating the differencing medium storage unit '%s' are invalid%s"),
8305 targetLocation.c_str(), i_vdError(vrc).c_str());
8306 else
8307 throw setError(VBOX_E_FILE_ERROR,
8308 tr("Could not create the differencing medium storage unit '%s'%s"),
8309 targetLocation.c_str(), i_vdError(vrc).c_str());
8310 }
8311
8312 size = VDGetFileSize(hdd, VD_LAST_IMAGE);
8313 logicalSize = VDGetSize(hdd, VD_LAST_IMAGE);
8314 unsigned uImageFlags;
8315 vrc = VDGetImageFlags(hdd, 0, &uImageFlags);
8316 if (RT_SUCCESS(vrc))
8317 variant = (MediumVariant_T)uImageFlags;
8318 }
8319 catch (HRESULT aRC) { rcTmp = aRC; }
8320
8321 VDDestroy(hdd);
8322 }
8323 catch (HRESULT aRC) { rcTmp = aRC; }
8324
8325 MultiResult mrc(rcTmp);
8326
8327 if (SUCCEEDED(mrc))
8328 {
8329 AutoWriteLock treeLock(m->pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
8330
8331 Assert(pTarget->m->pParent.isNull());
8332
8333 /* associate child with the parent, maximum depth was checked above */
8334 pTarget->i_setParent(this);
8335
8336 /* diffs for immutable media are auto-reset by default */
8337 bool fAutoReset;
8338 {
8339 ComObjPtr<Medium> pBase = i_getBase();
8340 AutoReadLock block(pBase COMMA_LOCKVAL_SRC_POS);
8341 fAutoReset = (pBase->m->type == MediumType_Immutable);
8342 }
8343 {
8344 AutoWriteLock tlock(pTarget COMMA_LOCKVAL_SRC_POS);
8345 pTarget->m->autoReset = fAutoReset;
8346 }
8347
8348 /* register with mVirtualBox as the last step and move to
8349 * Created state only on success (leaving an orphan file is
8350 * better than breaking media registry consistency) */
8351 ComObjPtr<Medium> pMedium;
8352 mrc = m->pVirtualBox->i_registerMedium(pTarget, &pMedium, treeLock);
8353 Assert(pTarget == pMedium);
8354
8355 if (FAILED(mrc))
8356 /* break the parent association on failure to register */
8357 i_deparent();
8358 }
8359
8360 AutoMultiWriteLock2 mediaLock(this, pTarget COMMA_LOCKVAL_SRC_POS);
8361
8362 if (SUCCEEDED(mrc))
8363 {
8364 pTarget->m->state = MediumState_Created;
8365
8366 pTarget->m->size = size;
8367 pTarget->m->logicalSize = logicalSize;
8368 pTarget->m->variant = variant;
8369 }
8370 else
8371 {
8372 /* back to NotCreated on failure */
8373 pTarget->m->state = MediumState_NotCreated;
8374
8375 pTarget->m->autoReset = false;
8376
8377 /* reset UUID to prevent it from being reused next time */
8378 if (fGenerateUuid)
8379 unconst(pTarget->m->id).clear();
8380 }
8381
8382 // deregister the task registered in createDiffStorage()
8383 Assert(m->numCreateDiffTasks != 0);
8384 --m->numCreateDiffTasks;
8385
8386 mediaLock.release();
8387 i_markRegistriesModified();
8388 if (task.isAsync())
8389 {
8390 // in asynchronous mode, save settings now
8391 m->pVirtualBox->i_saveModifiedRegistries();
8392 }
8393
8394 /* Note that in sync mode, it's the caller's responsibility to
8395 * unlock the medium. */
8396
8397 return mrc;
8398}
8399
8400/**
8401 * Implementation code for the "merge" task.
8402 *
8403 * This task always gets started from Medium::mergeTo() and can run
8404 * synchronously or asynchronously depending on the "wait" parameter passed to
8405 * that function. If we run synchronously, the caller expects the medium
8406 * registry modification to be set before returning; otherwise (in asynchronous
8407 * mode), we save the settings ourselves.
8408 *
8409 * @param task
8410 * @return
8411 */
8412HRESULT Medium::i_taskMergeHandler(Medium::MergeTask &task)
8413{
8414 /** @todo r=klaus The code below needs to be double checked with regard
8415 * to lock order violations, it probably causes lock order issues related
8416 * to the AutoCaller usage. */
8417 HRESULT rcTmp = S_OK;
8418
8419 const ComObjPtr<Medium> &pTarget = task.mTarget;
8420
8421 try
8422 {
8423 if (!task.mParentForTarget.isNull())
8424 if (task.mParentForTarget->i_getDepth() >= SETTINGS_MEDIUM_DEPTH_MAX)
8425 {
8426 AutoReadLock plock(task.mParentForTarget COMMA_LOCKVAL_SRC_POS);
8427 throw setError(VBOX_E_INVALID_OBJECT_STATE,
8428 tr("Cannot merge image for medium '%s', because it exceeds the medium tree depth limit. Please merge some images which you no longer need"),
8429 task.mParentForTarget->m->strLocationFull.c_str());
8430 }
8431
8432 PVDISK hdd;
8433 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
8434 ComAssertRCThrow(vrc, E_FAIL);
8435
8436 try
8437 {
8438 // Similar code appears in SessionMachine::onlineMergeMedium, so
8439 // if you make any changes below check whether they are applicable
8440 // in that context as well.
8441
8442 unsigned uTargetIdx = VD_LAST_IMAGE;
8443 unsigned uSourceIdx = VD_LAST_IMAGE;
8444 /* Open all media in the chain. */
8445 MediumLockList::Base::iterator lockListBegin =
8446 task.mpMediumLockList->GetBegin();
8447 MediumLockList::Base::iterator lockListEnd =
8448 task.mpMediumLockList->GetEnd();
8449 unsigned i = 0;
8450 for (MediumLockList::Base::iterator it = lockListBegin;
8451 it != lockListEnd;
8452 ++it)
8453 {
8454 MediumLock &mediumLock = *it;
8455 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
8456
8457 if (pMedium == this)
8458 uSourceIdx = i;
8459 else if (pMedium == pTarget)
8460 uTargetIdx = i;
8461
8462 AutoReadLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
8463
8464 /*
8465 * complex sanity (sane complexity)
8466 *
8467 * The current medium must be in the Deleting (medium is merged)
8468 * or LockedRead (parent medium) state if it is not the target.
8469 * If it is the target it must be in the LockedWrite state.
8470 */
8471 Assert( ( pMedium != pTarget
8472 && ( pMedium->m->state == MediumState_Deleting
8473 || pMedium->m->state == MediumState_LockedRead))
8474 || ( pMedium == pTarget
8475 && pMedium->m->state == MediumState_LockedWrite));
8476 /*
8477 * Medium must be the target, in the LockedRead state
8478 * or Deleting state where it is not allowed to be attached
8479 * to a virtual machine.
8480 */
8481 Assert( pMedium == pTarget
8482 || pMedium->m->state == MediumState_LockedRead
8483 || ( pMedium->m->backRefs.size() == 0
8484 && pMedium->m->state == MediumState_Deleting));
8485 /* The source medium must be in Deleting state. */
8486 Assert( pMedium != this
8487 || pMedium->m->state == MediumState_Deleting);
8488
8489 unsigned uOpenFlags = VD_OPEN_FLAGS_NORMAL;
8490
8491 if ( pMedium->m->state == MediumState_LockedRead
8492 || pMedium->m->state == MediumState_Deleting)
8493 uOpenFlags = VD_OPEN_FLAGS_READONLY;
8494 if (pMedium->m->type == MediumType_Shareable)
8495 uOpenFlags |= VD_OPEN_FLAGS_SHAREABLE;
8496
8497 /* Open the medium */
8498 vrc = VDOpen(hdd,
8499 pMedium->m->strFormat.c_str(),
8500 pMedium->m->strLocationFull.c_str(),
8501 uOpenFlags | m->uOpenFlagsDef,
8502 pMedium->m->vdImageIfaces);
8503 if (RT_FAILURE(vrc))
8504 throw vrc;
8505
8506 i++;
8507 }
8508
8509 ComAssertThrow( uSourceIdx != VD_LAST_IMAGE
8510 && uTargetIdx != VD_LAST_IMAGE, E_FAIL);
8511
8512 vrc = VDMerge(hdd, uSourceIdx, uTargetIdx,
8513 task.mVDOperationIfaces);
8514 if (RT_FAILURE(vrc))
8515 throw vrc;
8516
8517 /* update parent UUIDs */
8518 if (!task.mfMergeForward)
8519 {
8520 /* we need to update UUIDs of all source's children
8521 * which cannot be part of the container at once so
8522 * add each one in there individually */
8523 if (task.mpChildrenToReparent)
8524 {
8525 MediumLockList::Base::iterator childrenBegin = task.mpChildrenToReparent->GetBegin();
8526 MediumLockList::Base::iterator childrenEnd = task.mpChildrenToReparent->GetEnd();
8527 for (MediumLockList::Base::iterator it = childrenBegin;
8528 it != childrenEnd;
8529 ++it)
8530 {
8531 Medium *pMedium = it->GetMedium();
8532 /* VD_OPEN_FLAGS_INFO since UUID is wrong yet */
8533 vrc = VDOpen(hdd,
8534 pMedium->m->strFormat.c_str(),
8535 pMedium->m->strLocationFull.c_str(),
8536 VD_OPEN_FLAGS_INFO | m->uOpenFlagsDef,
8537 pMedium->m->vdImageIfaces);
8538 if (RT_FAILURE(vrc))
8539 throw vrc;
8540
8541 vrc = VDSetParentUuid(hdd, VD_LAST_IMAGE,
8542 pTarget->m->id.raw());
8543 if (RT_FAILURE(vrc))
8544 throw vrc;
8545
8546 vrc = VDClose(hdd, false /* fDelete */);
8547 if (RT_FAILURE(vrc))
8548 throw vrc;
8549 }
8550 }
8551 }
8552 }
8553 catch (HRESULT aRC) { rcTmp = aRC; }
8554 catch (int aVRC)
8555 {
8556 rcTmp = setError(VBOX_E_FILE_ERROR,
8557 tr("Could not merge the medium '%s' to '%s'%s"),
8558 m->strLocationFull.c_str(),
8559 pTarget->m->strLocationFull.c_str(),
8560 i_vdError(aVRC).c_str());
8561 }
8562
8563 VDDestroy(hdd);
8564 }
8565 catch (HRESULT aRC) { rcTmp = aRC; }
8566
8567 ErrorInfoKeeper eik;
8568 MultiResult mrc(rcTmp);
8569 HRESULT rc2;
8570
8571 if (SUCCEEDED(mrc))
8572 {
8573 /* all media but the target were successfully deleted by
8574 * VDMerge; reparent the last one and uninitialize deleted media. */
8575
8576 AutoWriteLock treeLock(m->pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
8577
8578 if (task.mfMergeForward)
8579 {
8580 /* first, unregister the target since it may become a base
8581 * medium which needs re-registration */
8582 rc2 = m->pVirtualBox->i_unregisterMedium(pTarget);
8583 AssertComRC(rc2);
8584
8585 /* then, reparent it and disconnect the deleted branch at both ends
8586 * (chain->parent() is source's parent). Depth check above. */
8587 pTarget->i_deparent();
8588 pTarget->i_setParent(task.mParentForTarget);
8589 if (task.mParentForTarget)
8590 i_deparent();
8591
8592 /* then, register again */
8593 ComObjPtr<Medium> pMedium;
8594 rc2 = m->pVirtualBox->i_registerMedium(pTarget, &pMedium,
8595 treeLock);
8596 AssertComRC(rc2);
8597 }
8598 else
8599 {
8600 Assert(pTarget->i_getChildren().size() == 1);
8601 Medium *targetChild = pTarget->i_getChildren().front();
8602
8603 /* disconnect the deleted branch at the elder end */
8604 targetChild->i_deparent();
8605
8606 /* reparent source's children and disconnect the deleted
8607 * branch at the younger end */
8608 if (task.mpChildrenToReparent)
8609 {
8610 /* obey {parent,child} lock order */
8611 AutoWriteLock sourceLock(this COMMA_LOCKVAL_SRC_POS);
8612
8613 MediumLockList::Base::iterator childrenBegin = task.mpChildrenToReparent->GetBegin();
8614 MediumLockList::Base::iterator childrenEnd = task.mpChildrenToReparent->GetEnd();
8615 for (MediumLockList::Base::iterator it = childrenBegin;
8616 it != childrenEnd;
8617 ++it)
8618 {
8619 Medium *pMedium = it->GetMedium();
8620 AutoWriteLock childLock(pMedium COMMA_LOCKVAL_SRC_POS);
8621
8622 pMedium->i_deparent(); // removes pMedium from source
8623 // no depth check, reduces depth
8624 pMedium->i_setParent(pTarget);
8625 }
8626 }
8627 }
8628
8629 /* unregister and uninitialize all media removed by the merge */
8630 MediumLockList::Base::iterator lockListBegin =
8631 task.mpMediumLockList->GetBegin();
8632 MediumLockList::Base::iterator lockListEnd =
8633 task.mpMediumLockList->GetEnd();
8634 for (MediumLockList::Base::iterator it = lockListBegin;
8635 it != lockListEnd;
8636 )
8637 {
8638 MediumLock &mediumLock = *it;
8639 /* Create a real copy of the medium pointer, as the medium
8640 * lock deletion below would invalidate the referenced object. */
8641 const ComObjPtr<Medium> pMedium = mediumLock.GetMedium();
8642
8643 /* The target and all media not merged (readonly) are skipped */
8644 if ( pMedium == pTarget
8645 || pMedium->m->state == MediumState_LockedRead)
8646 {
8647 ++it;
8648 continue;
8649 }
8650
8651 rc2 = pMedium->m->pVirtualBox->i_unregisterMedium(pMedium);
8652 AssertComRC(rc2);
8653
8654 /* now, uninitialize the deleted medium (note that
8655 * due to the Deleting state, uninit() will not touch
8656 * the parent-child relationship so we need to
8657 * uninitialize each disk individually) */
8658
8659 /* note that the operation initiator medium (which is
8660 * normally also the source medium) is a special case
8661 * -- there is one more caller added by Task to it which
8662 * we must release. Also, if we are in sync mode, the
8663 * caller may still hold an AutoCaller instance for it
8664 * and therefore we cannot uninit() it (it's therefore
8665 * the caller's responsibility) */
8666 if (pMedium == this)
8667 {
8668 Assert(i_getChildren().size() == 0);
8669 Assert(m->backRefs.size() == 0);
8670 task.mMediumCaller.release();
8671 }
8672
8673 /* Delete the medium lock list entry, which also releases the
8674 * caller added by MergeChain before uninit() and updates the
8675 * iterator to point to the right place. */
8676 rc2 = task.mpMediumLockList->RemoveByIterator(it);
8677 AssertComRC(rc2);
8678
8679 if (task.isAsync() || pMedium != this)
8680 {
8681 treeLock.release();
8682 pMedium->uninit();
8683 treeLock.acquire();
8684 }
8685 }
8686 }
8687
8688 i_markRegistriesModified();
8689 if (task.isAsync())
8690 {
8691 // in asynchronous mode, save settings now
8692 eik.restore();
8693 m->pVirtualBox->i_saveModifiedRegistries();
8694 eik.fetch();
8695 }
8696
8697 if (FAILED(mrc))
8698 {
8699 /* Here we come if either VDMerge() failed (in which case we
8700 * assume that it tried to do everything to make a further
8701 * retry possible -- e.g. not deleted intermediate media
8702 * and so on) or VirtualBox::saveRegistries() failed (where we
8703 * should have the original tree but with intermediate storage
8704 * units deleted by VDMerge()). We have to only restore states
8705 * (through the MergeChain dtor) unless we are run synchronously
8706 * in which case it's the responsibility of the caller as stated
8707 * in the mergeTo() docs. The latter also implies that we
8708 * don't own the merge chain, so release it in this case. */
8709 if (task.isAsync())
8710 i_cancelMergeTo(task.mpChildrenToReparent, task.mpMediumLockList);
8711 }
8712
8713 return mrc;
8714}
8715
8716/**
8717 * Implementation code for the "clone" task.
8718 *
8719 * This only gets started from Medium::CloneTo() and always runs asynchronously.
8720 * As a result, we always save the VirtualBox.xml file when we're done here.
8721 *
8722 * @param task
8723 * @return
8724 */
8725HRESULT Medium::i_taskCloneHandler(Medium::CloneTask &task)
8726{
8727 /** @todo r=klaus The code below needs to be double checked with regard
8728 * to lock order violations, it probably causes lock order issues related
8729 * to the AutoCaller usage. */
8730 HRESULT rcTmp = S_OK;
8731
8732 const ComObjPtr<Medium> &pTarget = task.mTarget;
8733 const ComObjPtr<Medium> &pParent = task.mParent;
8734
8735 bool fCreatingTarget = false;
8736
8737 uint64_t size = 0, logicalSize = 0;
8738 MediumVariant_T variant = MediumVariant_Standard;
8739 bool fGenerateUuid = false;
8740
8741 try
8742 {
8743 if (!pParent.isNull())
8744 {
8745
8746 if (pParent->i_getDepth() >= SETTINGS_MEDIUM_DEPTH_MAX)
8747 {
8748 AutoReadLock plock(pParent COMMA_LOCKVAL_SRC_POS);
8749 throw setError(VBOX_E_INVALID_OBJECT_STATE,
8750 tr("Cannot clone image for medium '%s', because it exceeds the medium tree depth limit. Please merge some images which you no longer need"),
8751 pParent->m->strLocationFull.c_str());
8752 }
8753 }
8754
8755 /* Lock all in {parent,child} order. The lock is also used as a
8756 * signal from the task initiator (which releases it only after
8757 * RTThreadCreate()) that we can start the job. */
8758 AutoMultiWriteLock3 thisLock(this, pTarget, pParent COMMA_LOCKVAL_SRC_POS);
8759
8760 fCreatingTarget = pTarget->m->state == MediumState_Creating;
8761
8762 /* The object may request a specific UUID (through a special form of
8763 * the setLocation() argument). Otherwise we have to generate it */
8764 Guid targetId = pTarget->m->id;
8765
8766 fGenerateUuid = targetId.isZero();
8767 if (fGenerateUuid)
8768 {
8769 targetId.create();
8770 /* VirtualBox::registerMedium() will need UUID */
8771 unconst(pTarget->m->id) = targetId;
8772 }
8773
8774 PVDISK hdd;
8775 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
8776 ComAssertRCThrow(vrc, E_FAIL);
8777
8778 try
8779 {
8780 /* Open all media in the source chain. */
8781 MediumLockList::Base::const_iterator sourceListBegin =
8782 task.mpSourceMediumLockList->GetBegin();
8783 MediumLockList::Base::const_iterator sourceListEnd =
8784 task.mpSourceMediumLockList->GetEnd();
8785 for (MediumLockList::Base::const_iterator it = sourceListBegin;
8786 it != sourceListEnd;
8787 ++it)
8788 {
8789 const MediumLock &mediumLock = *it;
8790 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
8791 AutoReadLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
8792
8793 /* sanity check */
8794 Assert(pMedium->m->state == MediumState_LockedRead);
8795
8796 /** Open all media in read-only mode. */
8797 vrc = VDOpen(hdd,
8798 pMedium->m->strFormat.c_str(),
8799 pMedium->m->strLocationFull.c_str(),
8800 VD_OPEN_FLAGS_READONLY | m->uOpenFlagsDef,
8801 pMedium->m->vdImageIfaces);
8802 if (RT_FAILURE(vrc))
8803 throw setError(VBOX_E_FILE_ERROR,
8804 tr("Could not open the medium storage unit '%s'%s"),
8805 pMedium->m->strLocationFull.c_str(),
8806 i_vdError(vrc).c_str());
8807 }
8808
8809 Utf8Str targetFormat(pTarget->m->strFormat);
8810 Utf8Str targetLocation(pTarget->m->strLocationFull);
8811 uint64_t capabilities = pTarget->m->formatObj->i_getCapabilities();
8812
8813 Assert( pTarget->m->state == MediumState_Creating
8814 || pTarget->m->state == MediumState_LockedWrite);
8815 Assert(m->state == MediumState_LockedRead);
8816 Assert( pParent.isNull()
8817 || pParent->m->state == MediumState_LockedRead);
8818
8819 /* unlock before the potentially lengthy operation */
8820 thisLock.release();
8821
8822 /* ensure the target directory exists */
8823 if (capabilities & MediumFormatCapabilities_File)
8824 {
8825 HRESULT rc = VirtualBox::i_ensureFilePathExists(targetLocation,
8826 !(task.mVariant & MediumVariant_NoCreateDir) /* fCreate */);
8827 if (FAILED(rc))
8828 throw rc;
8829 }
8830
8831 PVDISK targetHdd;
8832 vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &targetHdd);
8833 ComAssertRCThrow(vrc, E_FAIL);
8834
8835 try
8836 {
8837 /* Open all media in the target chain. */
8838 MediumLockList::Base::const_iterator targetListBegin =
8839 task.mpTargetMediumLockList->GetBegin();
8840 MediumLockList::Base::const_iterator targetListEnd =
8841 task.mpTargetMediumLockList->GetEnd();
8842 for (MediumLockList::Base::const_iterator it = targetListBegin;
8843 it != targetListEnd;
8844 ++it)
8845 {
8846 const MediumLock &mediumLock = *it;
8847 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
8848
8849 /* If the target medium is not created yet there's no
8850 * reason to open it. */
8851 if (pMedium == pTarget && fCreatingTarget)
8852 continue;
8853
8854 AutoReadLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
8855
8856 /* sanity check */
8857 Assert( pMedium->m->state == MediumState_LockedRead
8858 || pMedium->m->state == MediumState_LockedWrite);
8859
8860 unsigned uOpenFlags = VD_OPEN_FLAGS_NORMAL;
8861 if (pMedium->m->state != MediumState_LockedWrite)
8862 uOpenFlags = VD_OPEN_FLAGS_READONLY;
8863 if (pMedium->m->type == MediumType_Shareable)
8864 uOpenFlags |= VD_OPEN_FLAGS_SHAREABLE;
8865
8866 /* Open all media in appropriate mode. */
8867 vrc = VDOpen(targetHdd,
8868 pMedium->m->strFormat.c_str(),
8869 pMedium->m->strLocationFull.c_str(),
8870 uOpenFlags | m->uOpenFlagsDef,
8871 pMedium->m->vdImageIfaces);
8872 if (RT_FAILURE(vrc))
8873 throw setError(VBOX_E_FILE_ERROR,
8874 tr("Could not open the medium storage unit '%s'%s"),
8875 pMedium->m->strLocationFull.c_str(),
8876 i_vdError(vrc).c_str());
8877 }
8878
8879 /* target isn't locked, but no changing data is accessed */
8880 if (task.midxSrcImageSame == UINT32_MAX)
8881 {
8882 vrc = VDCopy(hdd,
8883 VD_LAST_IMAGE,
8884 targetHdd,
8885 targetFormat.c_str(),
8886 (fCreatingTarget) ? targetLocation.c_str() : (char *)NULL,
8887 false /* fMoveByRename */,
8888 0 /* cbSize */,
8889 task.mVariant & ~MediumVariant_NoCreateDir,
8890 targetId.raw(),
8891 VD_OPEN_FLAGS_NORMAL | m->uOpenFlagsDef,
8892 NULL /* pVDIfsOperation */,
8893 pTarget->m->vdImageIfaces,
8894 task.mVDOperationIfaces);
8895 }
8896 else
8897 {
8898 vrc = VDCopyEx(hdd,
8899 VD_LAST_IMAGE,
8900 targetHdd,
8901 targetFormat.c_str(),
8902 (fCreatingTarget) ? targetLocation.c_str() : (char *)NULL,
8903 false /* fMoveByRename */,
8904 0 /* cbSize */,
8905 task.midxSrcImageSame,
8906 task.midxDstImageSame,
8907 task.mVariant & ~MediumVariant_NoCreateDir,
8908 targetId.raw(),
8909 VD_OPEN_FLAGS_NORMAL | m->uOpenFlagsDef,
8910 NULL /* pVDIfsOperation */,
8911 pTarget->m->vdImageIfaces,
8912 task.mVDOperationIfaces);
8913 }
8914 if (RT_FAILURE(vrc))
8915 throw setError(VBOX_E_FILE_ERROR,
8916 tr("Could not create the clone medium '%s'%s"),
8917 targetLocation.c_str(), i_vdError(vrc).c_str());
8918
8919 size = VDGetFileSize(targetHdd, VD_LAST_IMAGE);
8920 logicalSize = VDGetSize(targetHdd, VD_LAST_IMAGE);
8921 unsigned uImageFlags;
8922 vrc = VDGetImageFlags(targetHdd, 0, &uImageFlags);
8923 if (RT_SUCCESS(vrc))
8924 variant = (MediumVariant_T)uImageFlags;
8925 }
8926 catch (HRESULT aRC) { rcTmp = aRC; }
8927
8928 VDDestroy(targetHdd);
8929 }
8930 catch (HRESULT aRC) { rcTmp = aRC; }
8931
8932 VDDestroy(hdd);
8933 }
8934 catch (HRESULT aRC) { rcTmp = aRC; }
8935
8936 ErrorInfoKeeper eik;
8937 MultiResult mrc(rcTmp);
8938
8939 /* Only do the parent changes for newly created media. */
8940 if (SUCCEEDED(mrc) && fCreatingTarget)
8941 {
8942 /* we set m->pParent & children() */
8943 AutoWriteLock treeLock(m->pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
8944
8945 Assert(pTarget->m->pParent.isNull());
8946
8947 if (pParent)
8948 {
8949 /* Associate the clone with the parent and deassociate
8950 * from VirtualBox. Depth check above. */
8951 pTarget->i_setParent(pParent);
8952
8953 /* register with mVirtualBox as the last step and move to
8954 * Created state only on success (leaving an orphan file is
8955 * better than breaking media registry consistency) */
8956 eik.restore();
8957 ComObjPtr<Medium> pMedium;
8958 mrc = pParent->m->pVirtualBox->i_registerMedium(pTarget, &pMedium,
8959 treeLock);
8960 Assert( FAILED(mrc)
8961 || pTarget == pMedium);
8962 eik.fetch();
8963
8964 if (FAILED(mrc))
8965 /* break parent association on failure to register */
8966 pTarget->i_deparent(); // removes target from parent
8967 }
8968 else
8969 {
8970 /* just register */
8971 eik.restore();
8972 ComObjPtr<Medium> pMedium;
8973 mrc = m->pVirtualBox->i_registerMedium(pTarget, &pMedium,
8974 treeLock);
8975 Assert( FAILED(mrc)
8976 || pTarget == pMedium);
8977 eik.fetch();
8978 }
8979 }
8980
8981 if (fCreatingTarget)
8982 {
8983 AutoWriteLock mLock(pTarget COMMA_LOCKVAL_SRC_POS);
8984
8985 if (SUCCEEDED(mrc))
8986 {
8987 pTarget->m->state = MediumState_Created;
8988
8989 pTarget->m->size = size;
8990 pTarget->m->logicalSize = logicalSize;
8991 pTarget->m->variant = variant;
8992 }
8993 else
8994 {
8995 /* back to NotCreated on failure */
8996 pTarget->m->state = MediumState_NotCreated;
8997
8998 /* reset UUID to prevent it from being reused next time */
8999 if (fGenerateUuid)
9000 unconst(pTarget->m->id).clear();
9001 }
9002 }
9003
9004 /* Copy any filter related settings over to the target. */
9005 if (SUCCEEDED(mrc))
9006 {
9007 /* Copy any filter related settings over. */
9008 ComObjPtr<Medium> pBase = i_getBase();
9009 ComObjPtr<Medium> pTargetBase = pTarget->i_getBase();
9010 std::vector<com::Utf8Str> aFilterPropNames;
9011 std::vector<com::Utf8Str> aFilterPropValues;
9012 mrc = pBase->i_getFilterProperties(aFilterPropNames, aFilterPropValues);
9013 if (SUCCEEDED(mrc))
9014 {
9015 /* Go through the properties and add them to the target medium. */
9016 for (unsigned idx = 0; idx < aFilterPropNames.size(); idx++)
9017 {
9018 mrc = pTargetBase->i_setPropertyDirect(aFilterPropNames[idx], aFilterPropValues[idx]);
9019 if (FAILED(mrc)) break;
9020 }
9021
9022 // now, at the end of this task (always asynchronous), save the settings
9023 if (SUCCEEDED(mrc))
9024 {
9025 // save the settings
9026 i_markRegistriesModified();
9027 /* collect multiple errors */
9028 eik.restore();
9029 m->pVirtualBox->i_saveModifiedRegistries();
9030 eik.fetch();
9031 }
9032 }
9033 }
9034
9035 /* Everything is explicitly unlocked when the task exits,
9036 * as the task destruction also destroys the source chain. */
9037
9038 /* Make sure the source chain is released early. It could happen
9039 * that we get a deadlock in Appliance::Import when Medium::Close
9040 * is called & the source chain is released at the same time. */
9041 task.mpSourceMediumLockList->Clear();
9042
9043 return mrc;
9044}
9045
9046/**
9047 * Implementation code for the "move" task.
9048 *
9049 * This only gets started from Medium::SetLocation() and always
9050 * runs asynchronously.
9051 *
9052 * @param task
9053 * @return
9054 */
9055HRESULT Medium::i_taskMoveHandler(Medium::MoveTask &task)
9056{
9057
9058 HRESULT rcOut = S_OK;
9059
9060 /* pTarget is equal "this" in our case */
9061 const ComObjPtr<Medium> &pTarget = task.mMedium;
9062
9063 uint64_t size = 0; NOREF(size);
9064 uint64_t logicalSize = 0; NOREF(logicalSize);
9065 MediumVariant_T variant = MediumVariant_Standard; NOREF(variant);
9066
9067 /*
9068 * it's exactly moving, not cloning
9069 */
9070 if (!i_isMoveOperation(pTarget))
9071 {
9072 HRESULT rc = setError(VBOX_E_FILE_ERROR,
9073 tr("Wrong preconditions for moving the medium %s"),
9074 pTarget->m->strLocationFull.c_str());
9075 return rc;
9076 }
9077
9078 try
9079 {
9080 /* Lock all in {parent,child} order. The lock is also used as a
9081 * signal from the task initiator (which releases it only after
9082 * RTThreadCreate()) that we can start the job. */
9083
9084 AutoWriteLock thisLock(this COMMA_LOCKVAL_SRC_POS);
9085
9086 PVDISK hdd;
9087 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
9088 ComAssertRCThrow(vrc, E_FAIL);
9089
9090 try
9091 {
9092 /* Open all media in the source chain. */
9093 MediumLockList::Base::const_iterator sourceListBegin =
9094 task.mpMediumLockList->GetBegin();
9095 MediumLockList::Base::const_iterator sourceListEnd =
9096 task.mpMediumLockList->GetEnd();
9097 for (MediumLockList::Base::const_iterator it = sourceListBegin;
9098 it != sourceListEnd;
9099 ++it)
9100 {
9101 const MediumLock &mediumLock = *it;
9102 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
9103 AutoWriteLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
9104
9105 /* sanity check */
9106 Assert(pMedium->m->state == MediumState_LockedWrite);
9107
9108 vrc = VDOpen(hdd,
9109 pMedium->m->strFormat.c_str(),
9110 pMedium->m->strLocationFull.c_str(),
9111 VD_OPEN_FLAGS_NORMAL,
9112 pMedium->m->vdImageIfaces);
9113 if (RT_FAILURE(vrc))
9114 throw setError(VBOX_E_FILE_ERROR,
9115 tr("Could not open the medium storage unit '%s'%s"),
9116 pMedium->m->strLocationFull.c_str(),
9117 i_vdError(vrc).c_str());
9118 }
9119
9120 /* we can directly use pTarget->m->"variables" but for better reading we use local copies */
9121 Guid targetId = pTarget->m->id;
9122 Utf8Str targetFormat(pTarget->m->strFormat);
9123 uint64_t targetCapabilities = pTarget->m->formatObj->i_getCapabilities();
9124
9125 /*
9126 * change target location
9127 * m->strNewLocationFull has been set already together with m->fMoveThisMedium in
9128 * i_preparationForMoving()
9129 */
9130 Utf8Str targetLocation = i_getNewLocationForMoving();
9131
9132 /* unlock before the potentially lengthy operation */
9133 thisLock.release();
9134
9135 /* ensure the target directory exists */
9136 if (targetCapabilities & MediumFormatCapabilities_File)
9137 {
9138 HRESULT rc = VirtualBox::i_ensureFilePathExists(targetLocation,
9139 !(task.mVariant & MediumVariant_NoCreateDir) /* fCreate */);
9140 if (FAILED(rc))
9141 throw rc;
9142 }
9143
9144 try
9145 {
9146 vrc = VDCopy(hdd,
9147 VD_LAST_IMAGE,
9148 hdd,
9149 targetFormat.c_str(),
9150 targetLocation.c_str(),
9151 true /* fMoveByRename */,
9152 0 /* cbSize */,
9153 VD_IMAGE_FLAGS_NONE,
9154 targetId.raw(),
9155 VD_OPEN_FLAGS_NORMAL,
9156 NULL /* pVDIfsOperation */,
9157 NULL,
9158 NULL);
9159 if (RT_FAILURE(vrc))
9160 throw setError(VBOX_E_FILE_ERROR,
9161 tr("Could not move medium '%s'%s"),
9162 targetLocation.c_str(), i_vdError(vrc).c_str());
9163 size = VDGetFileSize(hdd, VD_LAST_IMAGE);
9164 logicalSize = VDGetSize(hdd, VD_LAST_IMAGE);
9165 unsigned uImageFlags;
9166 vrc = VDGetImageFlags(hdd, 0, &uImageFlags);
9167 if (RT_SUCCESS(vrc))
9168 variant = (MediumVariant_T)uImageFlags;
9169
9170 /*
9171 * set current location, because VDCopy\VDCopyEx doesn't do it.
9172 * also reset moving flag
9173 */
9174 i_resetMoveOperationData();
9175 m->strLocationFull = targetLocation;
9176
9177 }
9178 catch (HRESULT aRC) { rcOut = aRC; }
9179
9180 }
9181 catch (HRESULT aRC) { rcOut = aRC; }
9182
9183 VDDestroy(hdd);
9184 }
9185 catch (HRESULT aRC) { rcOut = aRC; }
9186
9187 ErrorInfoKeeper eik;
9188 MultiResult mrc(rcOut);
9189
9190 // now, at the end of this task (always asynchronous), save the settings
9191 if (SUCCEEDED(mrc))
9192 {
9193 // save the settings
9194 i_markRegistriesModified();
9195 /* collect multiple errors */
9196 eik.restore();
9197 m->pVirtualBox->i_saveModifiedRegistries();
9198 eik.fetch();
9199 }
9200
9201 /* Everything is explicitly unlocked when the task exits,
9202 * as the task destruction also destroys the source chain. */
9203
9204 task.mpMediumLockList->Clear();
9205
9206 return mrc;
9207}
9208
9209/**
9210 * Implementation code for the "delete" task.
9211 *
9212 * This task always gets started from Medium::deleteStorage() and can run
9213 * synchronously or asynchronously depending on the "wait" parameter passed to
9214 * that function.
9215 *
9216 * @param task
9217 * @return
9218 */
9219HRESULT Medium::i_taskDeleteHandler(Medium::DeleteTask &task)
9220{
9221 NOREF(task);
9222 HRESULT rc = S_OK;
9223
9224 try
9225 {
9226 /* The lock is also used as a signal from the task initiator (which
9227 * releases it only after RTThreadCreate()) that we can start the job */
9228 AutoWriteLock thisLock(this COMMA_LOCKVAL_SRC_POS);
9229
9230 PVDISK hdd;
9231 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
9232 ComAssertRCThrow(vrc, E_FAIL);
9233
9234 Utf8Str format(m->strFormat);
9235 Utf8Str location(m->strLocationFull);
9236
9237 /* unlock before the potentially lengthy operation */
9238 Assert(m->state == MediumState_Deleting);
9239 thisLock.release();
9240
9241 try
9242 {
9243 vrc = VDOpen(hdd,
9244 format.c_str(),
9245 location.c_str(),
9246 VD_OPEN_FLAGS_READONLY | VD_OPEN_FLAGS_INFO | m->uOpenFlagsDef,
9247 m->vdImageIfaces);
9248 if (RT_SUCCESS(vrc))
9249 vrc = VDClose(hdd, true /* fDelete */);
9250
9251 if (RT_FAILURE(vrc) && vrc != VERR_FILE_NOT_FOUND)
9252 throw setError(VBOX_E_FILE_ERROR,
9253 tr("Could not delete the medium storage unit '%s'%s"),
9254 location.c_str(), i_vdError(vrc).c_str());
9255
9256 }
9257 catch (HRESULT aRC) { rc = aRC; }
9258
9259 VDDestroy(hdd);
9260 }
9261 catch (HRESULT aRC) { rc = aRC; }
9262
9263 AutoWriteLock thisLock(this COMMA_LOCKVAL_SRC_POS);
9264
9265 /* go to the NotCreated state even on failure since the storage
9266 * may have been already partially deleted and cannot be used any
9267 * more. One will be able to manually re-open the storage if really
9268 * needed to re-register it. */
9269 m->state = MediumState_NotCreated;
9270
9271 /* Reset UUID to prevent Create* from reusing it again */
9272 unconst(m->id).clear();
9273
9274 return rc;
9275}
9276
9277/**
9278 * Implementation code for the "reset" task.
9279 *
9280 * This always gets started asynchronously from Medium::Reset().
9281 *
9282 * @param task
9283 * @return
9284 */
9285HRESULT Medium::i_taskResetHandler(Medium::ResetTask &task)
9286{
9287 HRESULT rc = S_OK;
9288
9289 uint64_t size = 0, logicalSize = 0;
9290 MediumVariant_T variant = MediumVariant_Standard;
9291
9292 try
9293 {
9294 /* The lock is also used as a signal from the task initiator (which
9295 * releases it only after RTThreadCreate()) that we can start the job */
9296 AutoWriteLock thisLock(this COMMA_LOCKVAL_SRC_POS);
9297
9298 /// @todo Below we use a pair of delete/create operations to reset
9299 /// the diff contents but the most efficient way will of course be
9300 /// to add a VDResetDiff() API call
9301
9302 PVDISK hdd;
9303 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
9304 ComAssertRCThrow(vrc, E_FAIL);
9305
9306 Guid id = m->id;
9307 Utf8Str format(m->strFormat);
9308 Utf8Str location(m->strLocationFull);
9309
9310 Medium *pParent = m->pParent;
9311 Guid parentId = pParent->m->id;
9312 Utf8Str parentFormat(pParent->m->strFormat);
9313 Utf8Str parentLocation(pParent->m->strLocationFull);
9314
9315 Assert(m->state == MediumState_LockedWrite);
9316
9317 /* unlock before the potentially lengthy operation */
9318 thisLock.release();
9319
9320 try
9321 {
9322 /* Open all media in the target chain but the last. */
9323 MediumLockList::Base::const_iterator targetListBegin =
9324 task.mpMediumLockList->GetBegin();
9325 MediumLockList::Base::const_iterator targetListEnd =
9326 task.mpMediumLockList->GetEnd();
9327 for (MediumLockList::Base::const_iterator it = targetListBegin;
9328 it != targetListEnd;
9329 ++it)
9330 {
9331 const MediumLock &mediumLock = *it;
9332 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
9333
9334 AutoReadLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
9335
9336 /* sanity check, "this" is checked above */
9337 Assert( pMedium == this
9338 || pMedium->m->state == MediumState_LockedRead);
9339
9340 /* Open all media in appropriate mode. */
9341 vrc = VDOpen(hdd,
9342 pMedium->m->strFormat.c_str(),
9343 pMedium->m->strLocationFull.c_str(),
9344 VD_OPEN_FLAGS_READONLY | m->uOpenFlagsDef,
9345 pMedium->m->vdImageIfaces);
9346 if (RT_FAILURE(vrc))
9347 throw setError(VBOX_E_FILE_ERROR,
9348 tr("Could not open the medium storage unit '%s'%s"),
9349 pMedium->m->strLocationFull.c_str(),
9350 i_vdError(vrc).c_str());
9351
9352 /* Done when we hit the media which should be reset */
9353 if (pMedium == this)
9354 break;
9355 }
9356
9357 /* first, delete the storage unit */
9358 vrc = VDClose(hdd, true /* fDelete */);
9359 if (RT_FAILURE(vrc))
9360 throw setError(VBOX_E_FILE_ERROR,
9361 tr("Could not delete the medium storage unit '%s'%s"),
9362 location.c_str(), i_vdError(vrc).c_str());
9363
9364 /* next, create it again */
9365 vrc = VDOpen(hdd,
9366 parentFormat.c_str(),
9367 parentLocation.c_str(),
9368 VD_OPEN_FLAGS_READONLY | VD_OPEN_FLAGS_INFO | m->uOpenFlagsDef,
9369 m->vdImageIfaces);
9370 if (RT_FAILURE(vrc))
9371 throw setError(VBOX_E_FILE_ERROR,
9372 tr("Could not open the medium storage unit '%s'%s"),
9373 parentLocation.c_str(), i_vdError(vrc).c_str());
9374
9375 vrc = VDCreateDiff(hdd,
9376 format.c_str(),
9377 location.c_str(),
9378 /// @todo use the same medium variant as before
9379 VD_IMAGE_FLAGS_NONE,
9380 NULL,
9381 id.raw(),
9382 parentId.raw(),
9383 VD_OPEN_FLAGS_NORMAL,
9384 m->vdImageIfaces,
9385 task.mVDOperationIfaces);
9386 if (RT_FAILURE(vrc))
9387 {
9388 if (vrc == VERR_VD_INVALID_TYPE)
9389 throw setError(VBOX_E_FILE_ERROR,
9390 tr("Parameters for creating the differencing medium storage unit '%s' are invalid%s"),
9391 location.c_str(), i_vdError(vrc).c_str());
9392 else
9393 throw setError(VBOX_E_FILE_ERROR,
9394 tr("Could not create the differencing medium storage unit '%s'%s"),
9395 location.c_str(), i_vdError(vrc).c_str());
9396 }
9397
9398 size = VDGetFileSize(hdd, VD_LAST_IMAGE);
9399 logicalSize = VDGetSize(hdd, VD_LAST_IMAGE);
9400 unsigned uImageFlags;
9401 vrc = VDGetImageFlags(hdd, 0, &uImageFlags);
9402 if (RT_SUCCESS(vrc))
9403 variant = (MediumVariant_T)uImageFlags;
9404 }
9405 catch (HRESULT aRC) { rc = aRC; }
9406
9407 VDDestroy(hdd);
9408 }
9409 catch (HRESULT aRC) { rc = aRC; }
9410
9411 AutoWriteLock thisLock(this COMMA_LOCKVAL_SRC_POS);
9412
9413 m->size = size;
9414 m->logicalSize = logicalSize;
9415 m->variant = variant;
9416
9417 /* Everything is explicitly unlocked when the task exits,
9418 * as the task destruction also destroys the media chain. */
9419
9420 return rc;
9421}
9422
9423/**
9424 * Implementation code for the "compact" task.
9425 *
9426 * @param task
9427 * @return
9428 */
9429HRESULT Medium::i_taskCompactHandler(Medium::CompactTask &task)
9430{
9431 HRESULT rc = S_OK;
9432
9433 /* Lock all in {parent,child} order. The lock is also used as a
9434 * signal from the task initiator (which releases it only after
9435 * RTThreadCreate()) that we can start the job. */
9436 AutoWriteLock thisLock(this COMMA_LOCKVAL_SRC_POS);
9437
9438 try
9439 {
9440 PVDISK hdd;
9441 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
9442 ComAssertRCThrow(vrc, E_FAIL);
9443
9444 try
9445 {
9446 /* Open all media in the chain. */
9447 MediumLockList::Base::const_iterator mediumListBegin =
9448 task.mpMediumLockList->GetBegin();
9449 MediumLockList::Base::const_iterator mediumListEnd =
9450 task.mpMediumLockList->GetEnd();
9451 MediumLockList::Base::const_iterator mediumListLast =
9452 mediumListEnd;
9453 --mediumListLast;
9454 for (MediumLockList::Base::const_iterator it = mediumListBegin;
9455 it != mediumListEnd;
9456 ++it)
9457 {
9458 const MediumLock &mediumLock = *it;
9459 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
9460 AutoReadLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
9461
9462 /* sanity check */
9463 if (it == mediumListLast)
9464 Assert(pMedium->m->state == MediumState_LockedWrite);
9465 else
9466 Assert(pMedium->m->state == MediumState_LockedRead);
9467
9468 /* Open all media but last in read-only mode. Do not handle
9469 * shareable media, as compaction and sharing are mutually
9470 * exclusive. */
9471 vrc = VDOpen(hdd,
9472 pMedium->m->strFormat.c_str(),
9473 pMedium->m->strLocationFull.c_str(),
9474 m->uOpenFlagsDef | (it == mediumListLast ? VD_OPEN_FLAGS_NORMAL : VD_OPEN_FLAGS_READONLY),
9475 pMedium->m->vdImageIfaces);
9476 if (RT_FAILURE(vrc))
9477 throw setError(VBOX_E_FILE_ERROR,
9478 tr("Could not open the medium storage unit '%s'%s"),
9479 pMedium->m->strLocationFull.c_str(),
9480 i_vdError(vrc).c_str());
9481 }
9482
9483 Assert(m->state == MediumState_LockedWrite);
9484
9485 Utf8Str location(m->strLocationFull);
9486
9487 /* unlock before the potentially lengthy operation */
9488 thisLock.release();
9489
9490 vrc = VDCompact(hdd, VD_LAST_IMAGE, task.mVDOperationIfaces);
9491 if (RT_FAILURE(vrc))
9492 {
9493 if (vrc == VERR_NOT_SUPPORTED)
9494 throw setError(VBOX_E_NOT_SUPPORTED,
9495 tr("Compacting is not yet supported for medium '%s'"),
9496 location.c_str());
9497 else if (vrc == VERR_NOT_IMPLEMENTED)
9498 throw setError(E_NOTIMPL,
9499 tr("Compacting is not implemented, medium '%s'"),
9500 location.c_str());
9501 else
9502 throw setError(VBOX_E_FILE_ERROR,
9503 tr("Could not compact medium '%s'%s"),
9504 location.c_str(),
9505 i_vdError(vrc).c_str());
9506 }
9507 }
9508 catch (HRESULT aRC) { rc = aRC; }
9509
9510 VDDestroy(hdd);
9511 }
9512 catch (HRESULT aRC) { rc = aRC; }
9513
9514 /* Everything is explicitly unlocked when the task exits,
9515 * as the task destruction also destroys the media chain. */
9516
9517 return rc;
9518}
9519
9520/**
9521 * Implementation code for the "resize" task.
9522 *
9523 * @param task
9524 * @return
9525 */
9526HRESULT Medium::i_taskResizeHandler(Medium::ResizeTask &task)
9527{
9528 HRESULT rc = S_OK;
9529
9530 uint64_t size = 0, logicalSize = 0;
9531
9532 try
9533 {
9534 /* The lock is also used as a signal from the task initiator (which
9535 * releases it only after RTThreadCreate()) that we can start the job */
9536 AutoWriteLock thisLock(this COMMA_LOCKVAL_SRC_POS);
9537
9538 PVDISK hdd;
9539 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
9540 ComAssertRCThrow(vrc, E_FAIL);
9541
9542 try
9543 {
9544 /* Open all media in the chain. */
9545 MediumLockList::Base::const_iterator mediumListBegin =
9546 task.mpMediumLockList->GetBegin();
9547 MediumLockList::Base::const_iterator mediumListEnd =
9548 task.mpMediumLockList->GetEnd();
9549 MediumLockList::Base::const_iterator mediumListLast =
9550 mediumListEnd;
9551 --mediumListLast;
9552 for (MediumLockList::Base::const_iterator it = mediumListBegin;
9553 it != mediumListEnd;
9554 ++it)
9555 {
9556 const MediumLock &mediumLock = *it;
9557 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
9558 AutoReadLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
9559
9560 /* sanity check */
9561 if (it == mediumListLast)
9562 Assert(pMedium->m->state == MediumState_LockedWrite);
9563 else
9564 Assert(pMedium->m->state == MediumState_LockedRead);
9565
9566 /* Open all media but last in read-only mode. Do not handle
9567 * shareable media, as compaction and sharing are mutually
9568 * exclusive. */
9569 vrc = VDOpen(hdd,
9570 pMedium->m->strFormat.c_str(),
9571 pMedium->m->strLocationFull.c_str(),
9572 m->uOpenFlagsDef | (it == mediumListLast ? VD_OPEN_FLAGS_NORMAL : VD_OPEN_FLAGS_READONLY),
9573 pMedium->m->vdImageIfaces);
9574 if (RT_FAILURE(vrc))
9575 throw setError(VBOX_E_FILE_ERROR,
9576 tr("Could not open the medium storage unit '%s'%s"),
9577 pMedium->m->strLocationFull.c_str(),
9578 i_vdError(vrc).c_str());
9579 }
9580
9581 Assert(m->state == MediumState_LockedWrite);
9582
9583 Utf8Str location(m->strLocationFull);
9584
9585 /* unlock before the potentially lengthy operation */
9586 thisLock.release();
9587
9588 VDGEOMETRY geo = {0, 0, 0}; /* auto */
9589 vrc = VDResize(hdd, task.mSize, &geo, &geo, task.mVDOperationIfaces);
9590 if (RT_FAILURE(vrc))
9591 {
9592 if (vrc == VERR_NOT_SUPPORTED)
9593 throw setError(VBOX_E_NOT_SUPPORTED,
9594 tr("Resizing to new size %llu is not yet supported for medium '%s'"),
9595 task.mSize, location.c_str());
9596 else if (vrc == VERR_NOT_IMPLEMENTED)
9597 throw setError(E_NOTIMPL,
9598 tr("Resiting is not implemented, medium '%s'"),
9599 location.c_str());
9600 else
9601 throw setError(VBOX_E_FILE_ERROR,
9602 tr("Could not resize medium '%s'%s"),
9603 location.c_str(),
9604 i_vdError(vrc).c_str());
9605 }
9606 size = VDGetFileSize(hdd, VD_LAST_IMAGE);
9607 logicalSize = VDGetSize(hdd, VD_LAST_IMAGE);
9608 }
9609 catch (HRESULT aRC) { rc = aRC; }
9610
9611 VDDestroy(hdd);
9612 }
9613 catch (HRESULT aRC) { rc = aRC; }
9614
9615 if (SUCCEEDED(rc))
9616 {
9617 AutoWriteLock thisLock(this COMMA_LOCKVAL_SRC_POS);
9618 m->size = size;
9619 m->logicalSize = logicalSize;
9620 }
9621
9622 /* Everything is explicitly unlocked when the task exits,
9623 * as the task destruction also destroys the media chain. */
9624
9625 return rc;
9626}
9627
9628/**
9629 * Implementation code for the "import" task.
9630 *
9631 * This only gets started from Medium::importFile() and always runs
9632 * asynchronously. It potentially touches the media registry, so we
9633 * always save the VirtualBox.xml file when we're done here.
9634 *
9635 * @param task
9636 * @return
9637 */
9638HRESULT Medium::i_taskImportHandler(Medium::ImportTask &task)
9639{
9640 /** @todo r=klaus The code below needs to be double checked with regard
9641 * to lock order violations, it probably causes lock order issues related
9642 * to the AutoCaller usage. */
9643 HRESULT rcTmp = S_OK;
9644
9645 const ComObjPtr<Medium> &pParent = task.mParent;
9646
9647 bool fCreatingTarget = false;
9648
9649 uint64_t size = 0, logicalSize = 0;
9650 MediumVariant_T variant = MediumVariant_Standard;
9651 bool fGenerateUuid = false;
9652
9653 try
9654 {
9655 if (!pParent.isNull())
9656 if (pParent->i_getDepth() >= SETTINGS_MEDIUM_DEPTH_MAX)
9657 {
9658 AutoReadLock plock(pParent COMMA_LOCKVAL_SRC_POS);
9659 throw setError(VBOX_E_INVALID_OBJECT_STATE,
9660 tr("Cannot import image for medium '%s', because it exceeds the medium tree depth limit. Please merge some images which you no longer need"),
9661 pParent->m->strLocationFull.c_str());
9662 }
9663
9664 /* Lock all in {parent,child} order. The lock is also used as a
9665 * signal from the task initiator (which releases it only after
9666 * RTThreadCreate()) that we can start the job. */
9667 AutoMultiWriteLock2 thisLock(this, pParent COMMA_LOCKVAL_SRC_POS);
9668
9669 fCreatingTarget = m->state == MediumState_Creating;
9670
9671 /* The object may request a specific UUID (through a special form of
9672 * the setLocation() argument). Otherwise we have to generate it */
9673 Guid targetId = m->id;
9674
9675 fGenerateUuid = targetId.isZero();
9676 if (fGenerateUuid)
9677 {
9678 targetId.create();
9679 /* VirtualBox::i_registerMedium() will need UUID */
9680 unconst(m->id) = targetId;
9681 }
9682
9683
9684 PVDISK hdd;
9685 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &hdd);
9686 ComAssertRCThrow(vrc, E_FAIL);
9687
9688 try
9689 {
9690 /* Open source medium. */
9691 vrc = VDOpen(hdd,
9692 task.mFormat->i_getId().c_str(),
9693 task.mFilename.c_str(),
9694 VD_OPEN_FLAGS_READONLY | VD_OPEN_FLAGS_SEQUENTIAL | m->uOpenFlagsDef,
9695 task.mVDImageIfaces);
9696 if (RT_FAILURE(vrc))
9697 throw setError(VBOX_E_FILE_ERROR,
9698 tr("Could not open the medium storage unit '%s'%s"),
9699 task.mFilename.c_str(),
9700 i_vdError(vrc).c_str());
9701
9702 Utf8Str targetFormat(m->strFormat);
9703 Utf8Str targetLocation(m->strLocationFull);
9704 uint64_t capabilities = task.mFormat->i_getCapabilities();
9705
9706 Assert( m->state == MediumState_Creating
9707 || m->state == MediumState_LockedWrite);
9708 Assert( pParent.isNull()
9709 || pParent->m->state == MediumState_LockedRead);
9710
9711 /* unlock before the potentially lengthy operation */
9712 thisLock.release();
9713
9714 /* ensure the target directory exists */
9715 if (capabilities & MediumFormatCapabilities_File)
9716 {
9717 HRESULT rc = VirtualBox::i_ensureFilePathExists(targetLocation,
9718 !(task.mVariant & MediumVariant_NoCreateDir) /* fCreate */);
9719 if (FAILED(rc))
9720 throw rc;
9721 }
9722
9723 PVDISK targetHdd;
9724 vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &targetHdd);
9725 ComAssertRCThrow(vrc, E_FAIL);
9726
9727 try
9728 {
9729 /* Open all media in the target chain. */
9730 MediumLockList::Base::const_iterator targetListBegin =
9731 task.mpTargetMediumLockList->GetBegin();
9732 MediumLockList::Base::const_iterator targetListEnd =
9733 task.mpTargetMediumLockList->GetEnd();
9734 for (MediumLockList::Base::const_iterator it = targetListBegin;
9735 it != targetListEnd;
9736 ++it)
9737 {
9738 const MediumLock &mediumLock = *it;
9739 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
9740
9741 /* If the target medium is not created yet there's no
9742 * reason to open it. */
9743 if (pMedium == this && fCreatingTarget)
9744 continue;
9745
9746 AutoReadLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
9747
9748 /* sanity check */
9749 Assert( pMedium->m->state == MediumState_LockedRead
9750 || pMedium->m->state == MediumState_LockedWrite);
9751
9752 unsigned uOpenFlags = VD_OPEN_FLAGS_NORMAL;
9753 if (pMedium->m->state != MediumState_LockedWrite)
9754 uOpenFlags = VD_OPEN_FLAGS_READONLY;
9755 if (pMedium->m->type == MediumType_Shareable)
9756 uOpenFlags |= VD_OPEN_FLAGS_SHAREABLE;
9757
9758 /* Open all media in appropriate mode. */
9759 vrc = VDOpen(targetHdd,
9760 pMedium->m->strFormat.c_str(),
9761 pMedium->m->strLocationFull.c_str(),
9762 uOpenFlags | m->uOpenFlagsDef,
9763 pMedium->m->vdImageIfaces);
9764 if (RT_FAILURE(vrc))
9765 throw setError(VBOX_E_FILE_ERROR,
9766 tr("Could not open the medium storage unit '%s'%s"),
9767 pMedium->m->strLocationFull.c_str(),
9768 i_vdError(vrc).c_str());
9769 }
9770
9771 vrc = VDCopy(hdd,
9772 VD_LAST_IMAGE,
9773 targetHdd,
9774 targetFormat.c_str(),
9775 (fCreatingTarget) ? targetLocation.c_str() : (char *)NULL,
9776 false /* fMoveByRename */,
9777 0 /* cbSize */,
9778 task.mVariant & ~MediumVariant_NoCreateDir,
9779 targetId.raw(),
9780 VD_OPEN_FLAGS_NORMAL,
9781 NULL /* pVDIfsOperation */,
9782 m->vdImageIfaces,
9783 task.mVDOperationIfaces);
9784 if (RT_FAILURE(vrc))
9785 throw setError(VBOX_E_FILE_ERROR,
9786 tr("Could not create the imported medium '%s'%s"),
9787 targetLocation.c_str(), i_vdError(vrc).c_str());
9788
9789 size = VDGetFileSize(targetHdd, VD_LAST_IMAGE);
9790 logicalSize = VDGetSize(targetHdd, VD_LAST_IMAGE);
9791 unsigned uImageFlags;
9792 vrc = VDGetImageFlags(targetHdd, 0, &uImageFlags);
9793 if (RT_SUCCESS(vrc))
9794 variant = (MediumVariant_T)uImageFlags;
9795 }
9796 catch (HRESULT aRC) { rcTmp = aRC; }
9797
9798 VDDestroy(targetHdd);
9799 }
9800 catch (HRESULT aRC) { rcTmp = aRC; }
9801
9802 VDDestroy(hdd);
9803 }
9804 catch (HRESULT aRC) { rcTmp = aRC; }
9805
9806 ErrorInfoKeeper eik;
9807 MultiResult mrc(rcTmp);
9808
9809 /* Only do the parent changes for newly created media. */
9810 if (SUCCEEDED(mrc) && fCreatingTarget)
9811 {
9812 /* we set m->pParent & children() */
9813 AutoWriteLock treeLock(m->pVirtualBox->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS);
9814
9815 Assert(m->pParent.isNull());
9816
9817 if (pParent)
9818 {
9819 /* Associate the imported medium with the parent and deassociate
9820 * from VirtualBox. Depth check above. */
9821 i_setParent(pParent);
9822
9823 /* register with mVirtualBox as the last step and move to
9824 * Created state only on success (leaving an orphan file is
9825 * better than breaking media registry consistency) */
9826 eik.restore();
9827 ComObjPtr<Medium> pMedium;
9828 mrc = pParent->m->pVirtualBox->i_registerMedium(this, &pMedium,
9829 treeLock);
9830 Assert(this == pMedium);
9831 eik.fetch();
9832
9833 if (FAILED(mrc))
9834 /* break parent association on failure to register */
9835 this->i_deparent(); // removes target from parent
9836 }
9837 else
9838 {
9839 /* just register */
9840 eik.restore();
9841 ComObjPtr<Medium> pMedium;
9842 mrc = m->pVirtualBox->i_registerMedium(this, &pMedium, treeLock);
9843 Assert(this == pMedium);
9844 eik.fetch();
9845 }
9846 }
9847
9848 if (fCreatingTarget)
9849 {
9850 AutoWriteLock mLock(this COMMA_LOCKVAL_SRC_POS);
9851
9852 if (SUCCEEDED(mrc))
9853 {
9854 m->state = MediumState_Created;
9855
9856 m->size = size;
9857 m->logicalSize = logicalSize;
9858 m->variant = variant;
9859 }
9860 else
9861 {
9862 /* back to NotCreated on failure */
9863 m->state = MediumState_NotCreated;
9864
9865 /* reset UUID to prevent it from being reused next time */
9866 if (fGenerateUuid)
9867 unconst(m->id).clear();
9868 }
9869 }
9870
9871 // now, at the end of this task (always asynchronous), save the settings
9872 {
9873 // save the settings
9874 i_markRegistriesModified();
9875 /* collect multiple errors */
9876 eik.restore();
9877 m->pVirtualBox->i_saveModifiedRegistries();
9878 eik.fetch();
9879 }
9880
9881 /* Everything is explicitly unlocked when the task exits,
9882 * as the task destruction also destroys the target chain. */
9883
9884 /* Make sure the target chain is released early, otherwise it can
9885 * lead to deadlocks with concurrent IAppliance activities. */
9886 task.mpTargetMediumLockList->Clear();
9887
9888 return mrc;
9889}
9890
9891/**
9892 * Sets up the encryption settings for a filter.
9893 */
9894void Medium::i_taskEncryptSettingsSetup(CryptoFilterSettings *pSettings, const char *pszCipher,
9895 const char *pszKeyStore, const char *pszPassword,
9896 bool fCreateKeyStore)
9897{
9898 pSettings->pszCipher = pszCipher;
9899 pSettings->pszPassword = pszPassword;
9900 pSettings->pszKeyStoreLoad = pszKeyStore;
9901 pSettings->fCreateKeyStore = fCreateKeyStore;
9902 pSettings->pbDek = NULL;
9903 pSettings->cbDek = 0;
9904 pSettings->vdFilterIfaces = NULL;
9905
9906 pSettings->vdIfCfg.pfnAreKeysValid = i_vdCryptoConfigAreKeysValid;
9907 pSettings->vdIfCfg.pfnQuerySize = i_vdCryptoConfigQuerySize;
9908 pSettings->vdIfCfg.pfnQuery = i_vdCryptoConfigQuery;
9909 pSettings->vdIfCfg.pfnQueryBytes = NULL;
9910
9911 pSettings->vdIfCrypto.pfnKeyRetain = i_vdCryptoKeyRetain;
9912 pSettings->vdIfCrypto.pfnKeyRelease = i_vdCryptoKeyRelease;
9913 pSettings->vdIfCrypto.pfnKeyStorePasswordRetain = i_vdCryptoKeyStorePasswordRetain;
9914 pSettings->vdIfCrypto.pfnKeyStorePasswordRelease = i_vdCryptoKeyStorePasswordRelease;
9915 pSettings->vdIfCrypto.pfnKeyStoreSave = i_vdCryptoKeyStoreSave;
9916 pSettings->vdIfCrypto.pfnKeyStoreReturnParameters = i_vdCryptoKeyStoreReturnParameters;
9917
9918 int vrc = VDInterfaceAdd(&pSettings->vdIfCfg.Core,
9919 "Medium::vdInterfaceCfgCrypto",
9920 VDINTERFACETYPE_CONFIG, pSettings,
9921 sizeof(VDINTERFACECONFIG), &pSettings->vdFilterIfaces);
9922 AssertRC(vrc);
9923
9924 vrc = VDInterfaceAdd(&pSettings->vdIfCrypto.Core,
9925 "Medium::vdInterfaceCrypto",
9926 VDINTERFACETYPE_CRYPTO, pSettings,
9927 sizeof(VDINTERFACECRYPTO), &pSettings->vdFilterIfaces);
9928 AssertRC(vrc);
9929}
9930
9931/**
9932 * Implementation code for the "encrypt" task.
9933 *
9934 * @param task
9935 * @return
9936 */
9937HRESULT Medium::i_taskEncryptHandler(Medium::EncryptTask &task)
9938{
9939# ifndef VBOX_WITH_EXTPACK
9940 RT_NOREF(task);
9941# endif
9942 HRESULT rc = S_OK;
9943
9944 /* Lock all in {parent,child} order. The lock is also used as a
9945 * signal from the task initiator (which releases it only after
9946 * RTThreadCreate()) that we can start the job. */
9947 ComObjPtr<Medium> pBase = i_getBase();
9948 AutoWriteLock thisLock(this COMMA_LOCKVAL_SRC_POS);
9949
9950 try
9951 {
9952# ifdef VBOX_WITH_EXTPACK
9953 ExtPackManager *pExtPackManager = m->pVirtualBox->i_getExtPackManager();
9954 if (pExtPackManager->i_isExtPackUsable(ORACLE_PUEL_EXTPACK_NAME))
9955 {
9956 /* Load the plugin */
9957 Utf8Str strPlugin;
9958 rc = pExtPackManager->i_getLibraryPathForExtPack(g_szVDPlugin, ORACLE_PUEL_EXTPACK_NAME, &strPlugin);
9959 if (SUCCEEDED(rc))
9960 {
9961 int vrc = VDPluginLoadFromFilename(strPlugin.c_str());
9962 if (RT_FAILURE(vrc))
9963 throw setError(VBOX_E_NOT_SUPPORTED,
9964 tr("Encrypting the image failed because the encryption plugin could not be loaded (%s)"),
9965 i_vdError(vrc).c_str());
9966 }
9967 else
9968 throw setError(VBOX_E_NOT_SUPPORTED,
9969 tr("Encryption is not supported because the extension pack '%s' is missing the encryption plugin (old extension pack installed?)"),
9970 ORACLE_PUEL_EXTPACK_NAME);
9971 }
9972 else
9973 throw setError(VBOX_E_NOT_SUPPORTED,
9974 tr("Encryption is not supported because the extension pack '%s' is missing"),
9975 ORACLE_PUEL_EXTPACK_NAME);
9976
9977 PVDISK pDisk = NULL;
9978 int vrc = VDCreate(m->vdDiskIfaces, i_convertDeviceType(), &pDisk);
9979 ComAssertRCThrow(vrc, E_FAIL);
9980
9981 Medium::CryptoFilterSettings CryptoSettingsRead;
9982 Medium::CryptoFilterSettings CryptoSettingsWrite;
9983
9984 void *pvBuf = NULL;
9985 const char *pszPasswordNew = NULL;
9986 try
9987 {
9988 /* Set up disk encryption filters. */
9989 if (task.mstrCurrentPassword.isEmpty())
9990 {
9991 /*
9992 * Query whether the medium property indicating that encryption is
9993 * configured is existing.
9994 */
9995 settings::StringsMap::iterator it = pBase->m->mapProperties.find("CRYPT/KeyStore");
9996 if (it != pBase->m->mapProperties.end())
9997 throw setError(VBOX_E_PASSWORD_INCORRECT,
9998 tr("The password given for the encrypted image is incorrect"));
9999 }
10000 else
10001 {
10002 settings::StringsMap::iterator it = pBase->m->mapProperties.find("CRYPT/KeyStore");
10003 if (it == pBase->m->mapProperties.end())
10004 throw setError(VBOX_E_INVALID_OBJECT_STATE,
10005 tr("The image is not configured for encryption"));
10006
10007 i_taskEncryptSettingsSetup(&CryptoSettingsRead, NULL, it->second.c_str(), task.mstrCurrentPassword.c_str(),
10008 false /* fCreateKeyStore */);
10009 vrc = VDFilterAdd(pDisk, "CRYPT", VD_FILTER_FLAGS_READ, CryptoSettingsRead.vdFilterIfaces);
10010 if (vrc == VERR_VD_PASSWORD_INCORRECT)
10011 throw setError(VBOX_E_PASSWORD_INCORRECT,
10012 tr("The password to decrypt the image is incorrect"));
10013 else if (RT_FAILURE(vrc))
10014 throw setError(VBOX_E_INVALID_OBJECT_STATE,
10015 tr("Failed to load the decryption filter: %s"),
10016 i_vdError(vrc).c_str());
10017 }
10018
10019 if (task.mstrCipher.isNotEmpty())
10020 {
10021 if ( task.mstrNewPassword.isEmpty()
10022 && task.mstrNewPasswordId.isEmpty()
10023 && task.mstrCurrentPassword.isNotEmpty())
10024 {
10025 /* An empty password and password ID will default to the current password. */
10026 pszPasswordNew = task.mstrCurrentPassword.c_str();
10027 }
10028 else if (task.mstrNewPassword.isEmpty())
10029 throw setError(VBOX_E_OBJECT_NOT_FOUND,
10030 tr("A password must be given for the image encryption"));
10031 else if (task.mstrNewPasswordId.isEmpty())
10032 throw setError(VBOX_E_INVALID_OBJECT_STATE,
10033 tr("A valid identifier for the password must be given"));
10034 else
10035 pszPasswordNew = task.mstrNewPassword.c_str();
10036
10037 i_taskEncryptSettingsSetup(&CryptoSettingsWrite, task.mstrCipher.c_str(), NULL,
10038 pszPasswordNew, true /* fCreateKeyStore */);
10039 vrc = VDFilterAdd(pDisk, "CRYPT", VD_FILTER_FLAGS_WRITE, CryptoSettingsWrite.vdFilterIfaces);
10040 if (RT_FAILURE(vrc))
10041 throw setError(VBOX_E_INVALID_OBJECT_STATE,
10042 tr("Failed to load the encryption filter: %s"),
10043 i_vdError(vrc).c_str());
10044 }
10045 else if (task.mstrNewPasswordId.isNotEmpty() || task.mstrNewPassword.isNotEmpty())
10046 throw setError(VBOX_E_INVALID_OBJECT_STATE,
10047 tr("The password and password identifier must be empty if the output should be unencrypted"));
10048
10049 /* Open all media in the chain. */
10050 MediumLockList::Base::const_iterator mediumListBegin =
10051 task.mpMediumLockList->GetBegin();
10052 MediumLockList::Base::const_iterator mediumListEnd =
10053 task.mpMediumLockList->GetEnd();
10054 MediumLockList::Base::const_iterator mediumListLast =
10055 mediumListEnd;
10056 --mediumListLast;
10057 for (MediumLockList::Base::const_iterator it = mediumListBegin;
10058 it != mediumListEnd;
10059 ++it)
10060 {
10061 const MediumLock &mediumLock = *it;
10062 const ComObjPtr<Medium> &pMedium = mediumLock.GetMedium();
10063 AutoReadLock alock(pMedium COMMA_LOCKVAL_SRC_POS);
10064
10065 Assert(pMedium->m->state == MediumState_LockedWrite);
10066
10067 /* Open all media but last in read-only mode. Do not handle
10068 * shareable media, as compaction and sharing are mutually
10069 * exclusive. */
10070 vrc = VDOpen(pDisk,
10071 pMedium->m->strFormat.c_str(),
10072 pMedium->m->strLocationFull.c_str(),
10073 m->uOpenFlagsDef | (it == mediumListLast ? VD_OPEN_FLAGS_NORMAL : VD_OPEN_FLAGS_READONLY),
10074 pMedium->m->vdImageIfaces);
10075 if (RT_FAILURE(vrc))
10076 throw setError(VBOX_E_FILE_ERROR,
10077 tr("Could not open the medium storage unit '%s'%s"),
10078 pMedium->m->strLocationFull.c_str(),
10079 i_vdError(vrc).c_str());
10080 }
10081
10082 Assert(m->state == MediumState_LockedWrite);
10083
10084 Utf8Str location(m->strLocationFull);
10085
10086 /* unlock before the potentially lengthy operation */
10087 thisLock.release();
10088
10089 vrc = VDPrepareWithFilters(pDisk, task.mVDOperationIfaces);
10090 if (RT_FAILURE(vrc))
10091 throw setError(VBOX_E_FILE_ERROR,
10092 tr("Could not prepare disk images for encryption (%Rrc): %s"),
10093 vrc, i_vdError(vrc).c_str());
10094
10095 thisLock.acquire();
10096 /* If everything went well set the new key store. */
10097 settings::StringsMap::iterator it = pBase->m->mapProperties.find("CRYPT/KeyStore");
10098 if (it != pBase->m->mapProperties.end())
10099 pBase->m->mapProperties.erase(it);
10100
10101 /* Delete KeyId if encryption is removed or the password did change. */
10102 if ( task.mstrNewPasswordId.isNotEmpty()
10103 || task.mstrCipher.isEmpty())
10104 {
10105 it = pBase->m->mapProperties.find("CRYPT/KeyId");
10106 if (it != pBase->m->mapProperties.end())
10107 pBase->m->mapProperties.erase(it);
10108 }
10109
10110 if (CryptoSettingsWrite.pszKeyStore)
10111 {
10112 pBase->m->mapProperties["CRYPT/KeyStore"] = Utf8Str(CryptoSettingsWrite.pszKeyStore);
10113 if (task.mstrNewPasswordId.isNotEmpty())
10114 pBase->m->mapProperties["CRYPT/KeyId"] = task.mstrNewPasswordId;
10115 }
10116
10117 if (CryptoSettingsRead.pszCipherReturned)
10118 RTStrFree(CryptoSettingsRead.pszCipherReturned);
10119
10120 if (CryptoSettingsWrite.pszCipherReturned)
10121 RTStrFree(CryptoSettingsWrite.pszCipherReturned);
10122
10123 thisLock.release();
10124 pBase->i_markRegistriesModified();
10125 m->pVirtualBox->i_saveModifiedRegistries();
10126 }
10127 catch (HRESULT aRC) { rc = aRC; }
10128
10129 if (pvBuf)
10130 RTMemFree(pvBuf);
10131
10132 VDDestroy(pDisk);
10133# else
10134 throw setError(VBOX_E_NOT_SUPPORTED,
10135 tr("Encryption is not supported because extension pack support is not built in"));
10136# endif
10137 }
10138 catch (HRESULT aRC) { rc = aRC; }
10139
10140 /* Everything is explicitly unlocked when the task exits,
10141 * as the task destruction also destroys the media chain. */
10142
10143 return rc;
10144}
10145
10146/* vi: set tabstop=4 shiftwidth=4 expandtab: */
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette