VirtualBox

source: vbox/trunk/src/VBox/Main/glue/initterm.cpp@ 85121

Last change on this file since 85121 was 85121, checked in by vboxsync, 4 years ago

iprt/cdefs.h: Refactored the typedef use of DECLCALLBACK as well as DECLCALLBACKMEMBER to wrap the whole expression, similar to the DECLR?CALLBACKMEMBER macros. This allows adding a throw() at the end when compiling with the VC++ compiler to indicate that the callbacks won't throw anything, so we can stop supressing the C5039 warning about passing functions that can potential throw C++ exceptions to extern C code that can't necessarily cope with such (unwind,++). Introduced a few _EX variations that allows specifying different/no calling convention too, as that's handy when dynamically resolving host APIs. Fixed numerous places missing DECLCALLBACK and such. Left two angry @todos regarding use of CreateThread. bugref:9794

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 27.4 KB
Line 
1/* $Id: initterm.cpp 85121 2020-07-08 19:33:26Z vboxsync $ */
2/** @file
3 * MS COM / XPCOM Abstraction Layer - Initialization and Termination.
4 */
5
6/*
7 * Copyright (C) 2006-2020 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 */
17
18#define LOG_GROUP LOG_GROUP_MAIN
19#if !defined(VBOX_WITH_XPCOM)
20
21# if !defined(_WIN32_WINNT) || _WIN32_WINNT < 0x600
22# undef _WIN32_WINNT
23# define _WIN32_WINNT 0x600 /* GetModuleHandleExW */
24# endif
25# include <iprt/nt/nt-and-windows.h>
26# include <iprt/win/objbase.h>
27# include <iprt/win/rpcproxy.h>
28# include <rpcasync.h>
29
30#else /* !defined(VBOX_WITH_XPCOM) */
31
32# include <stdlib.h>
33
34# include <nsIComponentRegistrar.h>
35# include <nsIServiceManager.h>
36# include <nsCOMPtr.h>
37# include <nsEventQueueUtils.h>
38# include <nsEmbedString.h>
39
40# include <nsILocalFile.h>
41# include <nsIDirectoryService.h>
42# include <nsDirectoryServiceDefs.h>
43
44#endif /* !defined(VBOX_WITH_XPCOM) */
45
46#include "VBox/com/com.h"
47#include "VBox/com/assert.h"
48#include "VBox/com/NativeEventQueue.h"
49#include "VBox/com/AutoLock.h"
50
51#include "../include/LoggingNew.h"
52
53#include <iprt/asm.h>
54#include <iprt/env.h>
55#include <iprt/ldr.h>
56#include <iprt/param.h>
57#include <iprt/path.h>
58#include <iprt/string.h>
59#include <iprt/system.h>
60#include <iprt/thread.h>
61
62#include <VBox/err.h>
63
64namespace com
65{
66
67#if defined(VBOX_WITH_XPCOM)
68
69class DirectoryServiceProvider : public nsIDirectoryServiceProvider
70{
71public:
72
73 NS_DECL_ISUPPORTS
74
75 DirectoryServiceProvider()
76 : mCompRegLocation(NULL), mXPTIDatLocation(NULL)
77 , mComponentDirLocation(NULL), mCurrProcDirLocation(NULL)
78 {}
79
80 virtual ~DirectoryServiceProvider();
81
82 HRESULT init(const char *aCompRegLocation,
83 const char *aXPTIDatLocation,
84 const char *aComponentDirLocation,
85 const char *aCurrProcDirLocation);
86
87 NS_DECL_NSIDIRECTORYSERVICEPROVIDER
88
89private:
90 /** @remarks This is not a UTF-8 string. */
91 char *mCompRegLocation;
92 /** @remarks This is not a UTF-8 string. */
93 char *mXPTIDatLocation;
94 /** @remarks This is not a UTF-8 string. */
95 char *mComponentDirLocation;
96 /** @remarks This is not a UTF-8 string. */
97 char *mCurrProcDirLocation;
98};
99
100NS_IMPL_ISUPPORTS1(DirectoryServiceProvider, nsIDirectoryServiceProvider)
101
102DirectoryServiceProvider::~DirectoryServiceProvider()
103{
104 if (mCompRegLocation)
105 {
106 RTStrFree(mCompRegLocation);
107 mCompRegLocation = NULL;
108 }
109 if (mXPTIDatLocation)
110 {
111 RTStrFree(mXPTIDatLocation);
112 mXPTIDatLocation = NULL;
113 }
114 if (mComponentDirLocation)
115 {
116 RTStrFree(mComponentDirLocation);
117 mComponentDirLocation = NULL;
118 }
119 if (mCurrProcDirLocation)
120 {
121 RTStrFree(mCurrProcDirLocation);
122 mCurrProcDirLocation = NULL;
123 }
124}
125
126/**
127 * @param aCompRegLocation Path to compreg.dat, in Utf8.
128 * @param aXPTIDatLocation Path to xpti.data, in Utf8.
129 */
130HRESULT
131DirectoryServiceProvider::init(const char *aCompRegLocation,
132 const char *aXPTIDatLocation,
133 const char *aComponentDirLocation,
134 const char *aCurrProcDirLocation)
135{
136 AssertReturn(aCompRegLocation, NS_ERROR_INVALID_ARG);
137 AssertReturn(aXPTIDatLocation, NS_ERROR_INVALID_ARG);
138
139/** @todo r=bird: Gotta check how this encoding stuff plays out on darwin!
140 * We get down to [VBoxNsxp]NS_NewNativeLocalFile and that file isn't
141 * nsLocalFileUnix.cpp on 32-bit darwin. On 64-bit darwin it's a question
142 * of what we're doing in IPRT and such... We should probably add a
143 * RTPathConvertToNative for use here. */
144 int vrc = RTStrUtf8ToCurrentCP(&mCompRegLocation, aCompRegLocation);
145 if (RT_SUCCESS(vrc))
146 vrc = RTStrUtf8ToCurrentCP(&mXPTIDatLocation, aXPTIDatLocation);
147 if (RT_SUCCESS(vrc) && aComponentDirLocation)
148 vrc = RTStrUtf8ToCurrentCP(&mComponentDirLocation, aComponentDirLocation);
149 if (RT_SUCCESS(vrc) && aCurrProcDirLocation)
150 vrc = RTStrUtf8ToCurrentCP(&mCurrProcDirLocation, aCurrProcDirLocation);
151
152 return RT_SUCCESS(vrc) ? NS_OK : NS_ERROR_OUT_OF_MEMORY;
153}
154
155NS_IMETHODIMP
156DirectoryServiceProvider::GetFile(const char *aProp,
157 PRBool *aPersistent,
158 nsIFile **aRetval)
159{
160 nsCOMPtr <nsILocalFile> localFile;
161 nsresult rv = NS_ERROR_FAILURE;
162
163 *aRetval = nsnull;
164 *aPersistent = PR_TRUE;
165
166 const char *fileLocation = NULL;
167
168 if (strcmp(aProp, NS_XPCOM_COMPONENT_REGISTRY_FILE) == 0)
169 fileLocation = mCompRegLocation;
170 else if (strcmp(aProp, NS_XPCOM_XPTI_REGISTRY_FILE) == 0)
171 fileLocation = mXPTIDatLocation;
172 else if (mComponentDirLocation && strcmp(aProp, NS_XPCOM_COMPONENT_DIR) == 0)
173 fileLocation = mComponentDirLocation;
174 else if (mCurrProcDirLocation && strcmp(aProp, NS_XPCOM_CURRENT_PROCESS_DIR) == 0)
175 fileLocation = mCurrProcDirLocation;
176 else
177 return NS_ERROR_FAILURE;
178
179 rv = NS_NewNativeLocalFile(nsEmbedCString(fileLocation),
180 PR_TRUE, getter_AddRefs(localFile));
181 if (NS_FAILED(rv))
182 return rv;
183
184 return localFile->QueryInterface(NS_GET_IID(nsIFile), (void **)aRetval);
185}
186
187/**
188 * Global XPCOM initialization flag (we maintain it ourselves since XPCOM
189 * doesn't provide such functionality)
190 */
191static bool volatile gIsXPCOMInitialized = false;
192
193/**
194 * Number of Initialize() calls on the main thread.
195 */
196static unsigned int gXPCOMInitCount = 0;
197
198#else /* !defined(VBOX_WITH_XPCOM) */
199
200/**
201 * Replacement function for the InvokeStub method for the IRundown stub.
202 */
203static HRESULT STDMETHODCALLTYPE
204Rundown_InvokeStub(IRpcStubBuffer *pThis, RPCOLEMESSAGE *pMsg, IRpcChannelBuffer *pBuf) RT_NOTHROW_DEF
205{
206 /*
207 * Our mission here is to prevent remote calls to methods #8 and #9,
208 * as these contain raw pointers to callback functions.
209 *
210 * Note! APIs like I_RpcServerInqTransportType, I_RpcBindingInqLocalClientPID
211 * and RpcServerInqCallAttributesW are not usable in this context without
212 * a rpc binding handle (latter two).
213 *
214 * P.S. In more recent windows versions, the buffer implements a interface
215 * IID_IRpcChannelBufferMarshalingContext (undocumented) which has a
216 * GetIMarshallingContextAttribute() method that will return the client PID
217 * when asking for attribute #0x8000000e.
218 */
219 uint32_t const iMethod = pMsg->iMethod & 0xffff; /* Uncertain, but there are hints that the upper bits are flags. */
220 HRESULT hrc;
221 if ( ( iMethod != 8
222 && iMethod != 9)
223 || (pMsg->rpcFlags & RPCFLG_LOCAL_CALL) )
224 hrc = CStdStubBuffer_Invoke(pThis, pMsg, pBuf);
225 else
226 {
227 LogRel(("Rundown_InvokeStub: Rejected call to CRundown::%s: rpcFlags=%#x cbBuffer=%#x dataRepresentation=%d buffer=%p:{%.*Rhxs} reserved1=%p reserved2={%p,%p,%p,%p,%p}\n",
228 pMsg->iMethod == 8 ? "DoCallback" : "DoNonreentrantCallback", pMsg->rpcFlags, pMsg->cbBuffer,
229 pMsg->dataRepresentation, pMsg->Buffer, RT_VALID_PTR(pMsg->Buffer) ? pMsg->cbBuffer : 0, pMsg->Buffer,
230 pMsg->reserved1, pMsg->reserved2[0], pMsg->reserved2[1], pMsg->reserved2[2], pMsg->reserved2[3], pMsg->reserved2[4]));
231 hrc = E_ACCESSDENIED;
232 }
233 return hrc;
234}
235
236/**
237 * Replaces the IRundown InvokeStub method with Rundown_InvokeStub so we can
238 * reject remote calls to a couple of misdesigned methods.
239 */
240void PatchComBugs(void)
241{
242 static volatile bool s_fPatched = false;
243 if (s_fPatched)
244 return;
245
246 /*
247 * The combase.dll / ole32.dll is exporting a DllGetClassObject function
248 * that is implemented using NdrDllGetClassObject just like our own
249 * proxy/stub DLL. This means we can get at the stub interface lists,
250 * since what NdrDllGetClassObject has CStdPSFactoryBuffer as layout.
251 *
252 * Note! Tried using CoRegisterPSClsid instead of this mess, but no luck.
253 */
254 /* Locate the COM DLL, it must be loaded by now: */
255 HMODULE hmod = GetModuleHandleW(L"COMBASE.DLL");
256 if (!hmod)
257 hmod = GetModuleHandleW(L"OLE32.DLL"); /* w7 */
258 AssertReturnVoid(hmod != NULL);
259
260 /* Resolve the class getter: */
261 LPFNGETCLASSOBJECT pfnGetClassObject = (LPFNGETCLASSOBJECT)GetProcAddress(hmod, "DllGetClassObject");
262 AssertReturnVoid(pfnGetClassObject != NULL);
263
264 /* Get the factory instance: */
265 static const CLSID s_PSOlePrx32ClsId = {0x00000320,0x0000,0x0000,{0xc0,0x00,0x00,0x00,0x00,0x00,0x00,0x46}};
266 CStdPSFactoryBuffer *pFactoryBuffer = NULL;
267 HRESULT hrc = pfnGetClassObject(s_PSOlePrx32ClsId, IID_IPSFactoryBuffer, (void **)&pFactoryBuffer);
268 AssertMsgReturnVoid(SUCCEEDED(hrc), ("hrc=%Rhrc\n", hrc));
269 AssertReturnVoid(pFactoryBuffer != NULL);
270
271 /*
272 * Search thru the file list for the interface we want to patch.
273 */
274 static const IID s_IID_Rundown = {0x00000134,0x0000,0x0000,{0xc0,0x00,0x00,0x00,0x00,0x00,0x00,0x46}};
275 decltype(CStdStubBuffer_Invoke) *pfnInvoke = (decltype(pfnInvoke))GetProcAddress(hmod, "CStdStubBuffer_Invoke");
276 if (!pfnInvoke)
277 pfnInvoke = (decltype(pfnInvoke))GetProcAddress(GetModuleHandleW(L"RPCRT4.DLL"), "CStdStubBuffer_Invoke");
278
279 unsigned cPatched = 0;
280 unsigned cAlreadyPatched = 0;
281 Assert(pFactoryBuffer->pProxyFileList != NULL);
282 for (ProxyFileInfo const **ppCur = pFactoryBuffer->pProxyFileList; *ppCur != NULL; ppCur++)
283 {
284 ProxyFileInfo const *pCur = *ppCur;
285
286 if (pCur->pStubVtblList)
287 {
288 for (PCInterfaceStubVtblList const *ppCurStub = pCur->pStubVtblList; *ppCurStub != NULL; ppCurStub++)
289 {
290 PCInterfaceStubVtblList const pCurStub = *ppCurStub;
291 IID const *piid = pCurStub->header.piid;
292 if (piid)
293 {
294 if (IsEqualIID(*piid, s_IID_Rundown))
295 {
296 if (pCurStub->Vtbl.Invoke == pfnInvoke)
297 {
298 DWORD fOld = 0;
299 if (VirtualProtect(&pCurStub->Vtbl.Invoke, sizeof(pCurStub->Vtbl.Invoke), PAGE_READWRITE, &fOld))
300 {
301 pCurStub->Vtbl.Invoke = Rundown_InvokeStub;
302 VirtualProtect(&pCurStub->Vtbl.Invoke, sizeof(pCurStub->Vtbl.Invoke), fOld, &fOld);
303 cPatched++;
304 }
305 else
306 AssertMsgFailed(("%d\n", GetLastError()));
307 }
308 else
309 cAlreadyPatched++;
310 }
311 }
312 }
313 }
314 }
315
316 /* done */
317 pFactoryBuffer->lpVtbl->Release((IPSFactoryBuffer *)pFactoryBuffer);
318
319 /*
320 * If we patched anything we should try prevent being unloaded.
321 */
322 if (cPatched > 0)
323 {
324 s_fPatched = true;
325 HMODULE hmodSelf;
326 AssertLogRelMsg(GetModuleHandleExW(GET_MODULE_HANDLE_EX_FLAG_FROM_ADDRESS | GET_MODULE_HANDLE_EX_FLAG_PIN,
327 (LPCWSTR)(uintptr_t)Rundown_InvokeStub, &hmodSelf),
328 ("last error: %u; Rundown_InvokeStub=%p\n", GetLastError(), Rundown_InvokeStub));
329 }
330 else
331 AssertLogRelMsg(cAlreadyPatched > 0, ("COM patching of IRundown failed!\n"));
332}
333
334
335/**
336 * The COM main thread handle. (The first caller of com::Initialize().)
337 */
338static RTTHREAD volatile gCOMMainThread = NIL_RTTHREAD;
339
340/**
341 * Number of Initialize() calls on the main thread.
342 */
343static uint32_t gCOMMainInitCount = 0;
344
345#endif /* !defined(VBOX_WITH_XPCOM) */
346
347
348/**
349 * Initializes the COM runtime.
350 *
351 * This method must be called on each thread of the client application that
352 * wants to access COM facilities. The initialization must be performed before
353 * calling any other COM method or attempting to instantiate COM objects.
354 *
355 * On platforms using XPCOM, this method uses the following scheme to search for
356 * XPCOM runtime:
357 *
358 * 1. If the VBOX_APP_HOME environment variable is set, the path it specifies
359 * is used to search XPCOM libraries and components. If this method fails to
360 * initialize XPCOM runtime using this path, it will immediately return a
361 * failure and will NOT check for other paths as described below.
362 *
363 * 2. If VBOX_APP_HOME is not set, this methods tries the following paths in the
364 * given order:
365 *
366 * a) Compiled-in application data directory (as returned by
367 * RTPathAppPrivateArch())
368 * b) "/usr/lib/virtualbox" (Linux only)
369 * c) "/opt/VirtualBox" (Linux only)
370 *
371 * The first path for which the initialization succeeds will be used.
372 *
373 * On MS COM platforms, the COM runtime is provided by the system and does not
374 * need to be searched for.
375 *
376 * Once the COM subsystem is no longer necessary on a given thread, Shutdown()
377 * must be called to free resources allocated for it. Note that a thread may
378 * call Initialize() several times but for each of tese calls there must be a
379 * corresponding Shutdown() call.
380 *
381 * @return S_OK on success and a COM result code in case of failure.
382 */
383HRESULT Initialize(uint32_t fInitFlags /*=VBOX_COM_INIT_F_DEFAULT*/)
384{
385 HRESULT rc = E_FAIL;
386
387#if !defined(VBOX_WITH_XPCOM)
388
389# ifdef VBOX_WITH_AUTO_COM_REG_UPDATE
390 /*
391 * First time we're called in a process, we refresh the VBox COM
392 * registrations. Use a global mutex to prevent updating when there are
393 * API users already active, as that could lead to a bit of a mess.
394 */
395 if ( (fInitFlags & VBOX_COM_INIT_F_AUTO_REG_UPDATE)
396 && gCOMMainThread == NIL_RTTHREAD)
397 {
398 SetLastError(ERROR_SUCCESS);
399 HANDLE hLeakIt = CreateMutexW(NULL/*pSecAttr*/, FALSE, L"Global\\VirtualBoxComLazyRegistrationMutant");
400 DWORD dwErr = GetLastError();
401 AssertMsg(dwErr == ERROR_SUCCESS || dwErr == ERROR_ALREADY_EXISTS || dwErr == ERROR_ACCESS_DENIED, ("%u\n", dwErr));
402 if (dwErr == ERROR_SUCCESS)
403 {
404 char szPath[RTPATH_MAX];
405 int vrc = RTPathAppPrivateArch(szPath, sizeof(szPath));
406 if (RT_SUCCESS(vrc))
407# ifndef VBOX_IN_32_ON_64_MAIN_API
408 vrc = RTPathAppend(szPath, sizeof(szPath),
409 RT_MAKE_U64(((PKUSER_SHARED_DATA)MM_SHARED_USER_DATA_VA)->NtMinorVersion,
410 ((PKUSER_SHARED_DATA)MM_SHARED_USER_DATA_VA)->NtMajorVersion)
411 >= RT_MAKE_U64(1/*Lo*/,6/*Hi*/)
412 ? "VBoxProxyStub.dll" : "VBoxProxyStubLegacy.dll");
413# else
414 vrc = RTPathAppend(szPath, sizeof(szPath), "x86\\VBoxProxyStub-x86.dll");
415# endif
416 if (RT_SUCCESS(vrc))
417 {
418 RTLDRMOD hMod;
419 vrc = RTLdrLoad(szPath, &hMod);
420 if (RT_SUCCESS(vrc))
421 {
422 union
423 {
424 void *pv;
425 DECLCALLBACKMEMBER(uint32_t, pfnRegUpdate,(void));
426 } u;
427 vrc = RTLdrGetSymbol(hMod, "VbpsUpdateRegistrations", &u.pv);
428 if (RT_SUCCESS(vrc))
429 u.pfnRegUpdate();
430 /* Just keep it loaded. */
431 }
432 }
433 Assert(hLeakIt != NULL); NOREF(hLeakIt);
434 }
435 }
436# endif
437
438 /*
439 * We initialize COM in GUI thread in STA, to be compliant with QT and
440 * OLE requirments (for example to allow D&D), while other threads
441 * initialized in regular MTA. To allow fast proxyless access from
442 * GUI thread to COM objects, we explicitly provide our COM objects
443 * with free threaded marshaller.
444 * !!!!! Please think twice before touching this code !!!!!
445 */
446 DWORD flags = fInitFlags & VBOX_COM_INIT_F_GUI
447 ? COINIT_APARTMENTTHREADED
448 | COINIT_SPEED_OVER_MEMORY
449 : COINIT_MULTITHREADED
450 | COINIT_DISABLE_OLE1DDE
451 | COINIT_SPEED_OVER_MEMORY;
452
453 rc = CoInitializeEx(NULL, flags);
454
455 /* the overall result must be either S_OK or S_FALSE (S_FALSE means
456 * "already initialized using the same apartment model") */
457 AssertMsg(rc == S_OK || rc == S_FALSE, ("rc=%08X\n", rc));
458
459 /*
460 * IRundown has unsafe two methods we need to patch to prevent remote access.
461 * Do that before we start using COM and open ourselves to possible attacks.
462 */
463 if (!(fInitFlags & VBOX_COM_INIT_F_NO_COM_PATCHING))
464 PatchComBugs();
465
466 /* To be flow compatible with the XPCOM case, we return here if this isn't
467 * the main thread or if it isn't its first initialization call.
468 * Note! CoInitializeEx and CoUninitialize does it's own reference
469 * counting, so this exercise is entirely for the EventQueue init. */
470 bool fRc;
471 RTTHREAD hSelf = RTThreadSelf();
472 if (hSelf != NIL_RTTHREAD)
473 ASMAtomicCmpXchgHandle(&gCOMMainThread, hSelf, NIL_RTTHREAD, fRc);
474 else
475 fRc = false;
476
477 if (fInitFlags & VBOX_COM_INIT_F_GUI)
478 Assert(RTThreadIsMain(hSelf));
479
480 if (!fRc)
481 {
482 if ( gCOMMainThread == hSelf
483 && SUCCEEDED(rc))
484 gCOMMainInitCount++;
485
486 AssertComRC(rc);
487 return rc;
488 }
489 Assert(RTThreadIsMain(hSelf));
490
491 /* this is the first main thread initialization */
492 Assert(gCOMMainInitCount == 0);
493 if (SUCCEEDED(rc))
494 gCOMMainInitCount = 1;
495
496#else /* !defined(VBOX_WITH_XPCOM) */
497
498 /* Unused here */
499 RT_NOREF(fInitFlags);
500
501 if (ASMAtomicXchgBool(&gIsXPCOMInitialized, true) == true)
502 {
503 /* XPCOM is already initialized on the main thread, no special
504 * initialization is necessary on additional threads. Just increase
505 * the init counter if it's a main thread again (to correctly support
506 * nested calls to Initialize()/Shutdown() for compatibility with
507 * Win32). */
508
509 nsCOMPtr<nsIEventQueue> eventQ;
510 rc = NS_GetMainEventQ(getter_AddRefs(eventQ));
511
512 if (NS_SUCCEEDED(rc))
513 {
514 PRBool isOnMainThread = PR_FALSE;
515 rc = eventQ->IsOnCurrentThread(&isOnMainThread);
516 if (NS_SUCCEEDED(rc) && isOnMainThread)
517 ++gXPCOMInitCount;
518 }
519
520 AssertComRC(rc);
521 return rc;
522 }
523 Assert(RTThreadIsMain(RTThreadSelf()));
524
525 /* this is the first initialization */
526 gXPCOMInitCount = 1;
527
528 /* prepare paths for registry files */
529 char szCompReg[RTPATH_MAX];
530 char szXptiDat[RTPATH_MAX];
531
532 int vrc = GetVBoxUserHomeDirectory(szCompReg, sizeof(szCompReg));
533 if (vrc == VERR_ACCESS_DENIED)
534 return NS_ERROR_FILE_ACCESS_DENIED;
535 AssertRCReturn(vrc, NS_ERROR_FAILURE);
536 vrc = RTStrCopy(szXptiDat, sizeof(szXptiDat), szCompReg);
537 AssertRCReturn(vrc, NS_ERROR_FAILURE);
538# ifdef VBOX_IN_32_ON_64_MAIN_API
539 vrc = RTPathAppend(szCompReg, sizeof(szCompReg), "compreg-x86.dat");
540 AssertRCReturn(vrc, NS_ERROR_FAILURE);
541 vrc = RTPathAppend(szXptiDat, sizeof(szXptiDat), "xpti-x86.dat");
542 AssertRCReturn(vrc, NS_ERROR_FAILURE);
543# else
544 vrc = RTPathAppend(szCompReg, sizeof(szCompReg), "compreg.dat");
545 AssertRCReturn(vrc, NS_ERROR_FAILURE);
546 vrc = RTPathAppend(szXptiDat, sizeof(szXptiDat), "xpti.dat");
547 AssertRCReturn(vrc, NS_ERROR_FAILURE);
548# endif
549
550 LogFlowFunc(("component registry : \"%s\"\n", szCompReg));
551 LogFlowFunc(("XPTI data file : \"%s\"\n", szXptiDat));
552
553 static const char *kAppPathsToProbe[] =
554 {
555 NULL, /* 0: will use VBOX_APP_HOME */
556 NULL, /* 1: will try RTPathAppPrivateArch(), correctly installed release builds will never go further */
557 NULL, /* 2: will try parent directory of RTPathAppPrivateArch(), only for testcases in non-hardened builds */
558 /* There used to be hard coded paths, but they only caused trouble
559 * because they often led to mixing of builds or even versions.
560 * If you feel tempted to add anything here, think again. They would
561 * only be used if option 1 would not work, which is a sign of a big
562 * problem, as it returns a fixed location defined at compile time.
563 * It is better to fail than blindly trying to cover the problem. */
564 };
565
566 /* Find out the directory where VirtualBox binaries are located */
567 for (size_t i = 0; i < RT_ELEMENTS(kAppPathsToProbe); ++ i)
568 {
569 char szAppHomeDir[RTPATH_MAX];
570
571 if (i == 0)
572 {
573 /* Use VBOX_APP_HOME if present */
574 vrc = RTEnvGetEx(RTENV_DEFAULT, "VBOX_APP_HOME", szAppHomeDir, sizeof(szAppHomeDir), NULL);
575 if (vrc == VERR_ENV_VAR_NOT_FOUND)
576 continue;
577 AssertRC(vrc);
578 }
579 else if (i == 1)
580 {
581 /* Use RTPathAppPrivateArch() first */
582 vrc = RTPathAppPrivateArch(szAppHomeDir, sizeof(szAppHomeDir));
583 AssertRC(vrc);
584 }
585 else if (i == 2)
586 {
587# ifdef VBOX_WITH_HARDENING
588 continue;
589# else /* !VBOX_WITH_HARDENING */
590 /* Use parent of RTPathAppPrivateArch() if ends with "testcase" */
591 vrc = RTPathAppPrivateArch(szAppHomeDir, sizeof(szAppHomeDir));
592 AssertRC(vrc);
593 vrc = RTPathStripTrailingSlash(szAppHomeDir);
594 AssertRC(vrc);
595 char *filename = RTPathFilename(szAppHomeDir);
596 if (!filename || strcmp(filename, "testcase"))
597 continue;
598 RTPathStripFilename(szAppHomeDir);
599# endif /* !VBOX_WITH_HARDENING */
600 }
601 else
602 {
603 /* Iterate over all other paths */
604 RTStrCopy(szAppHomeDir, sizeof(szAppHomeDir), kAppPathsToProbe[i]);
605 vrc = VINF_SUCCESS;
606 }
607 if (RT_FAILURE(vrc))
608 {
609 rc = NS_ERROR_FAILURE;
610 continue;
611 }
612 char szCompDir[RTPATH_MAX];
613 vrc = RTStrCopy(szCompDir, sizeof(szCompDir), szAppHomeDir);
614 if (RT_FAILURE(vrc))
615 {
616 rc = NS_ERROR_FAILURE;
617 continue;
618 }
619 vrc = RTPathAppend(szCompDir, sizeof(szCompDir), "components");
620 if (RT_FAILURE(vrc))
621 {
622 rc = NS_ERROR_FAILURE;
623 continue;
624 }
625 LogFlowFunc(("component directory : \"%s\"\n", szCompDir));
626
627 nsCOMPtr<DirectoryServiceProvider> dsProv;
628 dsProv = new DirectoryServiceProvider();
629 if (dsProv)
630 rc = dsProv->init(szCompReg, szXptiDat, szCompDir, szAppHomeDir);
631 else
632 rc = NS_ERROR_OUT_OF_MEMORY;
633 if (NS_FAILED(rc))
634 break;
635
636 /* Setup the application path for NS_InitXPCOM2. Note that we properly
637 * answer the NS_XPCOM_CURRENT_PROCESS_DIR query in our directory
638 * service provider but it seems to be activated after the directory
639 * service is used for the first time (see the source NS_InitXPCOM2). So
640 * use the same value here to be on the safe side. */
641 nsCOMPtr <nsIFile> appDir;
642 {
643 char *appDirCP = NULL;
644 vrc = RTStrUtf8ToCurrentCP(&appDirCP, szAppHomeDir);
645 if (RT_SUCCESS(vrc))
646 {
647 nsCOMPtr<nsILocalFile> file;
648 rc = NS_NewNativeLocalFile(nsEmbedCString(appDirCP),
649 PR_FALSE, getter_AddRefs(file));
650 if (NS_SUCCEEDED(rc))
651 appDir = do_QueryInterface(file, &rc);
652
653 RTStrFree(appDirCP);
654 }
655 else
656 rc = NS_ERROR_FAILURE;
657 }
658 if (NS_FAILED(rc))
659 break;
660
661 /* Set VBOX_XPCOM_HOME to the same app path to make XPCOM sources that
662 * still use it instead of the directory service happy */
663 vrc = RTEnvSetEx(RTENV_DEFAULT, "VBOX_XPCOM_HOME", szAppHomeDir);
664 AssertRC(vrc);
665
666 /* Finally, initialize XPCOM */
667 {
668 nsCOMPtr<nsIServiceManager> serviceManager;
669 rc = NS_InitXPCOM2(getter_AddRefs(serviceManager), appDir, dsProv);
670 if (NS_SUCCEEDED(rc))
671 {
672 nsCOMPtr<nsIComponentRegistrar> registrar =
673 do_QueryInterface(serviceManager, &rc);
674 if (NS_SUCCEEDED(rc))
675 {
676 rc = registrar->AutoRegister(nsnull);
677 if (NS_SUCCEEDED(rc))
678 {
679 /* We succeeded, stop probing paths */
680 LogFlowFunc(("Succeeded.\n"));
681 break;
682 }
683 }
684 }
685 }
686
687 /* clean up before the new try */
688 HRESULT rc2 = NS_ShutdownXPCOM(nsnull);
689 if (SUCCEEDED(rc))
690 rc = rc2;
691
692 if (i == 0)
693 {
694 /* We failed with VBOX_APP_HOME, don't probe other paths */
695 break;
696 }
697 }
698
699#endif /* !defined(VBOX_WITH_XPCOM) */
700
701 AssertComRCReturnRC(rc);
702
703 // for both COM and XPCOM, we only get here if this is the main thread;
704 // only then initialize the autolock system (AutoLock.cpp)
705 Assert(RTThreadIsMain(RTThreadSelf()));
706 util::InitAutoLockSystem();
707
708 /*
709 * Init the main event queue (ASSUMES it cannot fail).
710 */
711 if (SUCCEEDED(rc))
712 NativeEventQueue::init();
713
714 return rc;
715}
716
717HRESULT Shutdown()
718{
719 HRESULT rc = S_OK;
720
721#if !defined(VBOX_WITH_XPCOM)
722
723 /* EventQueue::uninit reference counting fun. */
724 RTTHREAD hSelf = RTThreadSelf();
725 if ( hSelf == gCOMMainThread
726 && hSelf != NIL_RTTHREAD)
727 {
728 if (-- gCOMMainInitCount == 0)
729 {
730 NativeEventQueue::uninit();
731 ASMAtomicWriteHandle(&gCOMMainThread, NIL_RTTHREAD);
732 }
733 }
734
735 CoUninitialize();
736
737#else /* !defined(VBOX_WITH_XPCOM) */
738
739 nsCOMPtr<nsIEventQueue> eventQ;
740 rc = NS_GetMainEventQ(getter_AddRefs(eventQ));
741
742 if (NS_SUCCEEDED(rc) || rc == NS_ERROR_NOT_AVAILABLE)
743 {
744 /* NS_ERROR_NOT_AVAILABLE seems to mean that
745 * nsIEventQueue::StopAcceptingEvents() has been called (see
746 * nsEventQueueService.cpp). We hope that this error code always means
747 * just that in this case and assume that we're on the main thread
748 * (it's a kind of unexpected behavior if a non-main thread ever calls
749 * StopAcceptingEvents() on the main event queue). */
750
751 PRBool isOnMainThread = PR_FALSE;
752 if (NS_SUCCEEDED(rc))
753 {
754 rc = eventQ->IsOnCurrentThread(&isOnMainThread);
755 eventQ = nsnull; /* early release before shutdown */
756 }
757 else
758 {
759 isOnMainThread = RTThreadIsMain(RTThreadSelf());
760 rc = NS_OK;
761 }
762
763 if (NS_SUCCEEDED(rc) && isOnMainThread)
764 {
765 /* only the main thread needs to uninitialize XPCOM and only if
766 * init counter drops to zero */
767 if (--gXPCOMInitCount == 0)
768 {
769 NativeEventQueue::uninit();
770 rc = NS_ShutdownXPCOM(nsnull);
771
772 /* This is a thread initialized XPCOM and set gIsXPCOMInitialized to
773 * true. Reset it back to false. */
774 bool wasInited = ASMAtomicXchgBool(&gIsXPCOMInitialized, false);
775 Assert(wasInited == true);
776 NOREF(wasInited);
777 }
778 }
779 }
780
781#endif /* !defined(VBOX_WITH_XPCOM) */
782
783 AssertComRC(rc);
784
785 return rc;
786}
787
788} /* namespace com */
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette