/* $Id: MachineImpl.cpp 98103 2023-01-17 14:15:46Z vboxsync $ */ /** @file * Implementation of IMachine in VBoxSVC. */ /* * Copyright (C) 2004-2023 Oracle and/or its affiliates. * * This file is part of VirtualBox base platform packages, as * available from https://www.virtualbox.org. * * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation, in version 3 of the * License. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, see . * * SPDX-License-Identifier: GPL-3.0-only */ #define LOG_GROUP LOG_GROUP_MAIN_MACHINE /* Make sure all the stdint.h macros are included - must come first! */ #ifndef __STDC_LIMIT_MACROS # define __STDC_LIMIT_MACROS #endif #ifndef __STDC_CONSTANT_MACROS # define __STDC_CONSTANT_MACROS #endif #include "LoggingNew.h" #include "VirtualBoxImpl.h" #include "MachineImpl.h" #include "SnapshotImpl.h" #include "ClientToken.h" #include "ProgressImpl.h" #include "ProgressProxyImpl.h" #include "MediumAttachmentImpl.h" #include "MediumImpl.h" #include "MediumLock.h" #include "USBControllerImpl.h" #include "USBDeviceFiltersImpl.h" #include "HostImpl.h" #include "SharedFolderImpl.h" #include "GuestOSTypeImpl.h" #include "VirtualBoxErrorInfoImpl.h" #include "StorageControllerImpl.h" #include "DisplayImpl.h" #include "DisplayUtils.h" #include "MachineImplCloneVM.h" #include "AutostartDb.h" #include "SystemPropertiesImpl.h" #include "MachineImplMoveVM.h" #include "ExtPackManagerImpl.h" #include "MachineLaunchVMCommonWorker.h" #include "CryptoUtils.h" // generated header #include "VBoxEvents.h" #ifdef VBOX_WITH_USB # include "USBProxyService.h" #endif #include "AutoCaller.h" #include "HashedPw.h" #include "Performance.h" #include "StringifyEnums.h" #include #include #include #include #include #include #include #include #include /* xml::XmlFileWriter::s_psz*Suff. */ #include #include #include #include #include #include #include #include #include #include #include #ifdef VBOX_WITH_GUEST_PROPS # include # include #endif #ifdef VBOX_WITH_SHARED_CLIPBOARD # include #endif #include "VBox/com/MultiResult.h" #include #ifdef VBOX_WITH_DTRACE_R3_MAIN # include "dtrace/VBoxAPI.h" #endif #if defined(RT_OS_WINDOWS) || defined(RT_OS_OS2) # define HOSTSUFF_EXE ".exe" #else /* !RT_OS_WINDOWS */ # define HOSTSUFF_EXE "" #endif /* !RT_OS_WINDOWS */ // defines / prototypes ///////////////////////////////////////////////////////////////////////////// #ifdef VBOX_WITH_FULL_VM_ENCRYPTION # define BUF_DATA_SIZE _64K enum CipherMode { CipherModeGcm = 0, CipherModeCtr, CipherModeXts, CipherModeMax }; enum AesSize { Aes128 = 0, Aes256, AesMax }; const char *g_apszCipher[AesMax][CipherModeMax] = { {"AES-GCM128", "AES-CTR128", "AES-XTS128-PLAIN64"}, {"AES-GCM256", "AES-CTR256", "AES-XTS256-PLAIN64"} }; const char *g_apszCipherAlgo[AesMax] = {"AES-128", "AES-256"}; static const char *getCipherString(const char *pszAlgo, const int iMode) { if (iMode >= CipherModeMax) return pszAlgo; for (int i = 0; i < AesMax; i++) { if (strcmp(pszAlgo, g_apszCipherAlgo[i]) == 0) return g_apszCipher[i][iMode]; } return pszAlgo; } static const char *getCipherStringWithoutMode(const char *pszAlgo) { for (int i = 0; i < AesMax; i++) { for (int j = 0; j < CipherModeMax; j++) { if (strcmp(pszAlgo, g_apszCipher[i][j]) == 0) return g_apszCipherAlgo[i]; } } return pszAlgo; } #endif ///////////////////////////////////////////////////////////////////////////// // Machine::Data structure ///////////////////////////////////////////////////////////////////////////// Machine::Data::Data() { mRegistered = FALSE; pMachineConfigFile = NULL; /* Contains hints on what has changed when the user is using the VM (config * changes, running the VM, ...). This is used to decide if a config needs * to be written to disk. */ flModifications = 0; /* VM modification usually also trigger setting the current state to * "Modified". Although this is not always the case. An e.g. is the VM * initialization phase or when snapshot related data is changed. The * actually behavior is controlled by the following flag. */ m_fAllowStateModification = false; mAccessible = FALSE; /* mUuid is initialized in Machine::init() */ mMachineState = MachineState_PoweredOff; RTTimeNow(&mLastStateChange); mMachineStateDeps = 0; mMachineStateDepsSem = NIL_RTSEMEVENTMULTI; mMachineStateChangePending = 0; mCurrentStateModified = TRUE; mGuestPropertiesModified = FALSE; mSession.mPID = NIL_RTPROCESS; mSession.mLockType = LockType_Null; mSession.mState = SessionState_Unlocked; #ifdef VBOX_WITH_FULL_VM_ENCRYPTION mpKeyStore = NULL; #endif } Machine::Data::~Data() { if (mMachineStateDepsSem != NIL_RTSEMEVENTMULTI) { RTSemEventMultiDestroy(mMachineStateDepsSem); mMachineStateDepsSem = NIL_RTSEMEVENTMULTI; } if (pMachineConfigFile) { delete pMachineConfigFile; pMachineConfigFile = NULL; } } ///////////////////////////////////////////////////////////////////////////// // Machine::HWData structure ///////////////////////////////////////////////////////////////////////////// Machine::HWData::HWData() { /* default values for a newly created machine */ mHWVersion.printf("%d", SchemaDefs::DefaultHardwareVersion); mMemorySize = 128; mCPUCount = 1; mCPUHotPlugEnabled = false; mMemoryBalloonSize = 0; mPageFusionEnabled = false; mHWVirtExEnabled = true; mHWVirtExNestedPagingEnabled = true; mHWVirtExLargePagesEnabled = HC_ARCH_BITS == 64; /* Not supported on 32 bits hosts. */ mHWVirtExVPIDEnabled = true; mHWVirtExUXEnabled = true; mHWVirtExForceEnabled = false; mHWVirtExUseNativeApi = false; mHWVirtExVirtVmsaveVmload = true; #if HC_ARCH_BITS == 64 || defined(RT_OS_WINDOWS) || defined(RT_OS_DARWIN) mPAEEnabled = true; #else mPAEEnabled = false; #endif mLongMode = HC_ARCH_BITS == 64 ? settings::Hardware::LongMode_Enabled : settings::Hardware::LongMode_Disabled; mTripleFaultReset = false; mAPIC = true; mX2APIC = false; mIBPBOnVMExit = false; mIBPBOnVMEntry = false; mSpecCtrl = false; mSpecCtrlByHost = false; mL1DFlushOnSched = true; mL1DFlushOnVMEntry = false; mMDSClearOnSched = true; mMDSClearOnVMEntry = false; mNestedHWVirt = false; mHPETEnabled = false; mCpuExecutionCap = 100; /* Maximum CPU execution cap by default. */ mCpuIdPortabilityLevel = 0; mCpuProfile = "host"; /* default boot order: floppy - DVD - HDD */ mBootOrder[0] = DeviceType_Floppy; mBootOrder[1] = DeviceType_DVD; mBootOrder[2] = DeviceType_HardDisk; for (size_t i = 3; i < RT_ELEMENTS(mBootOrder); ++i) mBootOrder[i] = DeviceType_Null; mClipboardMode = ClipboardMode_Disabled; mClipboardFileTransfersEnabled = FALSE; mDnDMode = DnDMode_Disabled; mFirmwareType = FirmwareType_BIOS; mKeyboardHIDType = KeyboardHIDType_PS2Keyboard; mPointingHIDType = PointingHIDType_PS2Mouse; mChipsetType = ChipsetType_PIIX3; mIommuType = IommuType_None; mParavirtProvider = ParavirtProvider_Default; mEmulatedUSBCardReaderEnabled = FALSE; for (size_t i = 0; i < RT_ELEMENTS(mCPUAttached); ++i) mCPUAttached[i] = false; mIOCacheEnabled = true; mIOCacheSize = 5; /* 5MB */ } Machine::HWData::~HWData() { } ///////////////////////////////////////////////////////////////////////////// // Machine class ///////////////////////////////////////////////////////////////////////////// // constructor / destructor ///////////////////////////////////////////////////////////////////////////// Machine::Machine() : #ifdef VBOX_WITH_RESOURCE_USAGE_API mCollectorGuest(NULL), #endif mPeer(NULL), mParent(NULL), mSerialPorts(), mParallelPorts(), uRegistryNeedsSaving(0) {} Machine::~Machine() {} HRESULT Machine::FinalConstruct() { LogFlowThisFunc(("\n")); return BaseFinalConstruct(); } void Machine::FinalRelease() { LogFlowThisFunc(("\n")); uninit(); BaseFinalRelease(); } /** * Initializes a new machine instance; this init() variant creates a new, empty machine. * This gets called from VirtualBox::CreateMachine(). * * @param aParent Associated parent object * @param strConfigFile Local file system path to the VM settings file (can * be relative to the VirtualBox config directory). * @param strName name for the machine * @param llGroups list of groups for the machine * @param strOsType OS Type string (stored as is if aOsType is NULL). * @param aOsType OS Type of this machine or NULL. * @param aId UUID for the new machine. * @param fForceOverwrite Whether to overwrite an existing machine settings file. * @param fDirectoryIncludesUUID Whether the use a special VM directory naming * scheme (includes the UUID). * @param aCipher The cipher to encrypt the VM with. * @param aPasswordId The password ID, empty if the VM should not be encrypted. * @param aPassword The password to encrypt the VM with. * * @return Success indicator. if not S_OK, the machine object is invalid */ HRESULT Machine::init(VirtualBox *aParent, const Utf8Str &strConfigFile, const Utf8Str &strName, const StringsList &llGroups, const Utf8Str &strOsType, GuestOSType *aOsType, const Guid &aId, bool fForceOverwrite, bool fDirectoryIncludesUUID, const com::Utf8Str &aCipher, const com::Utf8Str &aPasswordId, const com::Utf8Str &aPassword) { LogFlowThisFuncEnter(); LogFlowThisFunc(("(Init_New) aConfigFile='%s'\n", strConfigFile.c_str())); #ifndef VBOX_WITH_FULL_VM_ENCRYPTION RT_NOREF(aCipher); if (aPassword.isNotEmpty() || aPasswordId.isNotEmpty()) return setError(VBOX_E_NOT_SUPPORTED, tr("Full VM encryption is not available with this build")); #endif /* Enclose the state transition NotReady->InInit->Ready */ AutoInitSpan autoInitSpan(this); AssertReturn(autoInitSpan.isOk(), E_FAIL); HRESULT rc = initImpl(aParent, strConfigFile); if (FAILED(rc)) return rc; #ifdef VBOX_WITH_FULL_VM_ENCRYPTION com::Utf8Str strSsmKeyId; com::Utf8Str strSsmKeyStore; com::Utf8Str strNVRAMKeyId; com::Utf8Str strNVRAMKeyStore; if (aPassword.isNotEmpty() && aPasswordId.isNotEmpty()) { /* Resolve the cryptographic interface. */ PCVBOXCRYPTOIF pCryptoIf = NULL; HRESULT hrc = aParent->i_retainCryptoIf(&pCryptoIf); if (SUCCEEDED(hrc)) { CipherMode aenmMode[] = {CipherModeGcm, CipherModeGcm, CipherModeGcm, CipherModeCtr}; com::Utf8Str *astrKeyId[] = {&mData->mstrKeyId, &strSsmKeyId, &strNVRAMKeyId, &mData->mstrLogKeyId}; com::Utf8Str *astrKeyStore[] = {&mData->mstrKeyStore, &strSsmKeyStore, &strNVRAMKeyStore, &mData->mstrLogKeyStore}; for (uint32_t i = 0; i < RT_ELEMENTS(astrKeyId); i++) { const char *pszCipher = getCipherString(aCipher.c_str(), aenmMode[i]); if (!pszCipher) { hrc = setError(VBOX_E_NOT_SUPPORTED, tr("The cipher '%s' is not supported"), aCipher.c_str()); break; } VBOXCRYPTOCTX hCryptoCtx; int vrc = pCryptoIf->pfnCryptoCtxCreate(pszCipher, aPassword.c_str(), &hCryptoCtx); if (RT_FAILURE(vrc)) { hrc = setErrorBoth(E_FAIL, vrc, tr("New key store creation failed, (%Rrc)"), vrc); break; } char *pszKeyStore; vrc = pCryptoIf->pfnCryptoCtxSave(hCryptoCtx, &pszKeyStore); int vrc2 = pCryptoIf->pfnCryptoCtxDestroy(hCryptoCtx); AssertRC(vrc2); if (RT_FAILURE(vrc)) { hrc = setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Saving the key store failed, (%Rrc)"), vrc); break; } *(astrKeyStore[i]) = pszKeyStore; RTMemFree(pszKeyStore); *(astrKeyId[i]) = aPasswordId; } HRESULT hrc2 = aParent->i_releaseCryptoIf(pCryptoIf); Assert(hrc2 == S_OK); RT_NOREF(hrc2); if (FAILED(hrc)) return hrc; /* Error is set. */ } else return hrc; /* Error is set. */ } #endif rc = i_tryCreateMachineConfigFile(fForceOverwrite); if (FAILED(rc)) return rc; if (SUCCEEDED(rc)) { // create an empty machine config mData->pMachineConfigFile = new settings::MachineConfigFile(NULL); rc = initDataAndChildObjects(); } if (SUCCEEDED(rc)) { #ifdef VBOX_WITH_FULL_VM_ENCRYPTION mSSData->strStateKeyId = strSsmKeyId; mSSData->strStateKeyStore = strSsmKeyStore; #endif // set to true now to cause uninit() to call uninitDataAndChildObjects() on failure mData->mAccessible = TRUE; unconst(mData->mUuid) = aId; mUserData->s.strName = strName; if (llGroups.size()) mUserData->s.llGroups = llGroups; mUserData->s.fDirectoryIncludesUUID = fDirectoryIncludesUUID; // the "name sync" flag determines whether the machine directory gets renamed along // with the machine file; say so if the settings file name is the same as the // settings file parent directory (machine directory) mUserData->s.fNameSync = i_isInOwnDir(); // initialize the default snapshots folder rc = COMSETTER(SnapshotFolder)(NULL); AssertComRC(rc); if (aOsType) { /* Store OS type */ mUserData->s.strOsType = aOsType->i_id(); /* Let the OS type select 64-bit ness. */ mHWData->mLongMode = aOsType->i_is64Bit() ? settings::Hardware::LongMode_Enabled : settings::Hardware::LongMode_Disabled; /* Let the OS type enable the X2APIC */ mHWData->mX2APIC = aOsType->i_recommendedX2APIC(); rc = aOsType->COMGETTER(RecommendedFirmware)(&mHWData->mFirmwareType); AssertComRC(rc); } else if (!strOsType.isEmpty()) { /* Store OS type */ mUserData->s.strOsType = strOsType; /* No guest OS type object. Pick some plausible defaults which the * host can handle. There's no way to know or validate anything. */ mHWData->mLongMode = HC_ARCH_BITS == 64 ? settings::Hardware::LongMode_Enabled : settings::Hardware::LongMode_Disabled; mHWData->mX2APIC = false; } /* Apply BIOS defaults. */ mBIOSSettings->i_applyDefaults(aOsType); /* Apply TPM defaults. */ mTrustedPlatformModule->i_applyDefaults(aOsType); /* Apply recording defaults. */ mRecordingSettings->i_applyDefaults(); /* Apply network adapters defaults */ for (ULONG slot = 0; slot < mNetworkAdapters.size(); ++slot) mNetworkAdapters[slot]->i_applyDefaults(aOsType); /* Apply serial port defaults */ for (ULONG slot = 0; slot < RT_ELEMENTS(mSerialPorts); ++slot) mSerialPorts[slot]->i_applyDefaults(aOsType); /* Apply parallel port defaults */ for (ULONG slot = 0; slot < RT_ELEMENTS(mParallelPorts); ++slot) mParallelPorts[slot]->i_applyDefaults(); /* Enable the VMMDev testing feature for bootsector VMs: */ if (aOsType && aOsType->i_id() == "VBoxBS_64") mData->pMachineConfigFile->mapExtraDataItems["VBoxInternal/Devices/VMMDev/0/Config/TestingEnabled"] = "1"; #ifdef VBOX_WITH_FULL_VM_ENCRYPTION rc = mNvramStore->i_updateEncryptionSettings(strNVRAMKeyId, strNVRAMKeyStore); #endif if (SUCCEEDED(rc)) { /* At this point the changing of the current state modification * flag is allowed. */ i_allowStateModification(); /* commit all changes made during the initialization */ i_commit(); } } /* Confirm a successful initialization when it's the case */ if (SUCCEEDED(rc)) { #ifdef VBOX_WITH_FULL_VM_ENCRYPTION if (aPassword.isNotEmpty() && aPasswordId.isNotEmpty()) { size_t cbPassword = aPassword.length() + 1; uint8_t *pbPassword = (uint8_t *)aPassword.c_str(); mData->mpKeyStore->addSecretKey(aPasswordId, pbPassword, cbPassword); } #endif if (mData->mAccessible) autoInitSpan.setSucceeded(); else autoInitSpan.setLimited(); } LogFlowThisFunc(("mName='%s', mRegistered=%RTbool, mAccessible=%RTbool, rc=%08X\n", !!mUserData ? mUserData->s.strName.c_str() : "NULL", mData->mRegistered, mData->mAccessible, rc)); LogFlowThisFuncLeave(); return rc; } /** * Initializes a new instance with data from machine XML (formerly Init_Registered). * Gets called in two modes: * * -- from VirtualBox::initMachines() during VirtualBox startup; in that case, the * UUID is specified and we mark the machine as "registered"; * * -- from the public VirtualBox::OpenMachine() API, in which case the UUID is NULL * and the machine remains unregistered until RegisterMachine() is called. * * @param aParent Associated parent object * @param strConfigFile Local file system path to the VM settings file (can * be relative to the VirtualBox config directory). * @param aId UUID of the machine or NULL (see above). * @param strPassword Password for decrypting the config * * @return Success indicator. if not S_OK, the machine object is invalid */ HRESULT Machine::initFromSettings(VirtualBox *aParent, const Utf8Str &strConfigFile, const Guid *aId, const com::Utf8Str &strPassword) { LogFlowThisFuncEnter(); LogFlowThisFunc(("(Init_Registered) aConfigFile='%s\n", strConfigFile.c_str())); PCVBOXCRYPTOIF pCryptoIf = NULL; #ifndef VBOX_WITH_FULL_VM_ENCRYPTION if (strPassword.isNotEmpty()) return setError(VBOX_E_NOT_SUPPORTED, tr("Full VM encryption is not available with this build")); #else if (strPassword.isNotEmpty()) { /* Get at the crpytographic interface. */ HRESULT hrc = aParent->i_retainCryptoIf(&pCryptoIf); if (FAILED(hrc)) return hrc; /* Error is set. */ } #endif /* Enclose the state transition NotReady->InInit->Ready */ AutoInitSpan autoInitSpan(this); AssertReturn(autoInitSpan.isOk(), E_FAIL); HRESULT rc = initImpl(aParent, strConfigFile); if (FAILED(rc)) return rc; if (aId) { // loading a registered VM: unconst(mData->mUuid) = *aId; mData->mRegistered = TRUE; // now load the settings from XML: rc = i_registeredInit(); // this calls initDataAndChildObjects() and loadSettings() } else { // opening an unregistered VM (VirtualBox::OpenMachine()): rc = initDataAndChildObjects(); if (SUCCEEDED(rc)) { // set to true now to cause uninit() to call uninitDataAndChildObjects() on failure mData->mAccessible = TRUE; try { // load and parse machine XML; this will throw on XML or logic errors mData->pMachineConfigFile = new settings::MachineConfigFile(&mData->m_strConfigFileFull, pCryptoIf, strPassword.c_str()); // reject VM UUID duplicates, they can happen if someone // tries to register an already known VM config again if (aParent->i_findMachine(mData->pMachineConfigFile->uuid, true /* fPermitInaccessible */, false /* aDoSetError */, NULL) != VBOX_E_OBJECT_NOT_FOUND) { throw setError(E_FAIL, tr("Trying to open a VM config '%s' which has the same UUID as an existing virtual machine"), mData->m_strConfigFile.c_str()); } // use UUID from machine config unconst(mData->mUuid) = mData->pMachineConfigFile->uuid; #ifdef VBOX_WITH_FULL_VM_ENCRYPTION // No exception is thrown if config is encrypted, allowing us to get the uuid and the encryption fields. // We fill in the encryptions fields, and the rest will be filled in if all data parsed. mData->mstrKeyId = mData->pMachineConfigFile->strKeyId; mData->mstrKeyStore = mData->pMachineConfigFile->strKeyStore; #endif if (mData->pMachineConfigFile->enmParseState == settings::MachineConfigFile::ParseState_PasswordError) { // We just set the inaccessible state and fill the error info allowing the caller // to register the machine with encrypted config even if the password is incorrect mData->mAccessible = FALSE; /* fetch the current error info */ mData->mAccessError = com::ErrorInfo(); setError(VBOX_E_PASSWORD_INCORRECT, tr("Decryption of the machine {%RTuuid} failed. Incorrect or unknown password"), mData->pMachineConfigFile->uuid.raw()); } else { #ifdef VBOX_WITH_FULL_VM_ENCRYPTION if (strPassword.isNotEmpty()) { size_t cbKey = strPassword.length() + 1; /* Include terminator */ const uint8_t *pbKey = (const uint8_t *)strPassword.c_str(); mData->mpKeyStore->addSecretKey(mData->mstrKeyId, pbKey, cbKey); } #endif rc = i_loadMachineDataFromSettings(*mData->pMachineConfigFile, NULL /* puuidRegistry */); if (FAILED(rc)) throw rc; /* At this point the changing of the current state modification * flag is allowed. */ i_allowStateModification(); i_commit(); } } catch (HRESULT err) { /* we assume that error info is set by the thrower */ rc = err; } catch (...) { rc = VirtualBoxBase::handleUnexpectedExceptions(this, RT_SRC_POS); } } } /* Confirm a successful initialization when it's the case */ if (SUCCEEDED(rc)) { if (mData->mAccessible) autoInitSpan.setSucceeded(); else { autoInitSpan.setLimited(); // uninit media from this machine's media registry, or else // reloading the settings will fail mParent->i_unregisterMachineMedia(i_getId()); } } #ifdef VBOX_WITH_FULL_VM_ENCRYPTION if (pCryptoIf) { HRESULT hrc2 = aParent->i_releaseCryptoIf(pCryptoIf); Assert(hrc2 == S_OK); RT_NOREF(hrc2); } #endif LogFlowThisFunc(("mName='%s', mRegistered=%RTbool, mAccessible=%RTbool " "rc=%08X\n", !!mUserData ? mUserData->s.strName.c_str() : "NULL", mData->mRegistered, mData->mAccessible, rc)); LogFlowThisFuncLeave(); return rc; } /** * Initializes a new instance from a machine config that is already in memory * (import OVF case). Since we are importing, the UUID in the machine * config is ignored and we always generate a fresh one. * * @param aParent Associated parent object. * @param strName Name for the new machine; this overrides what is specified in config. * @param strSettingsFilename File name of .vbox file. * @param config Machine configuration loaded and parsed from XML. * * @return Success indicator. if not S_OK, the machine object is invalid */ HRESULT Machine::init(VirtualBox *aParent, const Utf8Str &strName, const Utf8Str &strSettingsFilename, const settings::MachineConfigFile &config) { LogFlowThisFuncEnter(); /* Enclose the state transition NotReady->InInit->Ready */ AutoInitSpan autoInitSpan(this); AssertReturn(autoInitSpan.isOk(), E_FAIL); HRESULT rc = initImpl(aParent, strSettingsFilename); if (FAILED(rc)) return rc; rc = i_tryCreateMachineConfigFile(false /* fForceOverwrite */); if (FAILED(rc)) return rc; rc = initDataAndChildObjects(); if (SUCCEEDED(rc)) { // set to true now to cause uninit() to call uninitDataAndChildObjects() on failure mData->mAccessible = TRUE; // create empty machine config for instance data mData->pMachineConfigFile = new settings::MachineConfigFile(NULL); // generate fresh UUID, ignore machine config unconst(mData->mUuid).create(); rc = i_loadMachineDataFromSettings(config, &mData->mUuid); // puuidRegistry: initialize media with this registry ID // override VM name as well, it may be different mUserData->s.strName = strName; if (SUCCEEDED(rc)) { /* At this point the changing of the current state modification * flag is allowed. */ i_allowStateModification(); /* commit all changes made during the initialization */ i_commit(); } } /* Confirm a successful initialization when it's the case */ if (SUCCEEDED(rc)) { if (mData->mAccessible) autoInitSpan.setSucceeded(); else { /* Ignore all errors from unregistering, they would destroy - * the more interesting error information we already have, - * pinpointing the issue with the VM config. */ ErrorInfoKeeper eik; autoInitSpan.setLimited(); // uninit media from this machine's media registry, or else // reloading the settings will fail mParent->i_unregisterMachineMedia(i_getId()); } } LogFlowThisFunc(("mName='%s', mRegistered=%RTbool, mAccessible=%RTbool " "rc=%08X\n", !!mUserData ? mUserData->s.strName.c_str() : "NULL", mData->mRegistered, mData->mAccessible, rc)); LogFlowThisFuncLeave(); return rc; } /** * Shared code between the various init() implementations. * @param aParent The VirtualBox object. * @param strConfigFile Settings file. * @return */ HRESULT Machine::initImpl(VirtualBox *aParent, const Utf8Str &strConfigFile) { LogFlowThisFuncEnter(); AssertReturn(aParent, E_INVALIDARG); AssertReturn(!strConfigFile.isEmpty(), E_INVALIDARG); HRESULT rc = S_OK; /* share the parent weakly */ unconst(mParent) = aParent; /* allocate the essential machine data structure (the rest will be * allocated later by initDataAndChildObjects() */ mData.allocate(); /* memorize the config file name (as provided) */ mData->m_strConfigFile = strConfigFile; /* get the full file name */ int vrc1 = mParent->i_calculateFullPath(strConfigFile, mData->m_strConfigFileFull); if (RT_FAILURE(vrc1)) return setErrorBoth(VBOX_E_FILE_ERROR, vrc1, tr("Invalid machine settings file name '%s' (%Rrc)"), strConfigFile.c_str(), vrc1); #ifdef VBOX_WITH_FULL_VM_ENCRYPTION /** @todo Only create when the machine is going to be encrypted. */ /* Non-pageable memory is not accessible for non-VM process */ mData->mpKeyStore = new SecretKeyStore(false /* fKeyBufNonPageable */); AssertReturn(mData->mpKeyStore, E_OUTOFMEMORY); #endif LogFlowThisFuncLeave(); return rc; } /** * Tries to create a machine settings file in the path stored in the machine * instance data. Used when a new machine is created to fail gracefully if * the settings file could not be written (e.g. because machine dir is read-only). * @return */ HRESULT Machine::i_tryCreateMachineConfigFile(bool fForceOverwrite) { HRESULT rc = S_OK; // when we create a new machine, we must be able to create the settings file RTFILE f = NIL_RTFILE; int vrc = RTFileOpen(&f, mData->m_strConfigFileFull.c_str(), RTFILE_O_READ | RTFILE_O_OPEN | RTFILE_O_DENY_NONE); if ( RT_SUCCESS(vrc) || vrc == VERR_SHARING_VIOLATION ) { if (RT_SUCCESS(vrc)) RTFileClose(f); if (!fForceOverwrite) rc = setError(VBOX_E_FILE_ERROR, tr("Machine settings file '%s' already exists"), mData->m_strConfigFileFull.c_str()); else { /* try to delete the config file, as otherwise the creation * of a new settings file will fail. */ i_deleteFile(mData->m_strConfigFileFull.c_str(), false /* fIgnoreFailures */, tr("existing settings file")); } } else if ( vrc != VERR_FILE_NOT_FOUND && vrc != VERR_PATH_NOT_FOUND ) rc = setErrorBoth(VBOX_E_FILE_ERROR, vrc, tr("Invalid machine settings file name '%s' (%Rrc)"), mData->m_strConfigFileFull.c_str(), vrc); return rc; } /** * Initializes the registered machine by loading the settings file. * This method is separated from #init() in order to make it possible to * retry the operation after VirtualBox startup instead of refusing to * startup the whole VirtualBox server in case if the settings file of some * registered VM is invalid or inaccessible. * * @note Must be always called from this object's write lock * (unless called from #init() that doesn't need any locking). * @note Locks the mUSBController method for writing. * @note Subclasses must not call this method. */ HRESULT Machine::i_registeredInit() { AssertReturn(!i_isSessionMachine(), E_FAIL); AssertReturn(!i_isSnapshotMachine(), E_FAIL); AssertReturn(mData->mUuid.isValid(), E_FAIL); AssertReturn(!mData->mAccessible, E_FAIL); HRESULT rc = initDataAndChildObjects(); if (SUCCEEDED(rc)) { /* Temporarily reset the registered flag in order to let setters * potentially called from loadSettings() succeed (isMutable() used in * all setters will return FALSE for a Machine instance if mRegistered * is TRUE). */ mData->mRegistered = FALSE; PCVBOXCRYPTOIF pCryptoIf = NULL; SecretKey *pKey = NULL; const char *pszPassword = NULL; #ifdef VBOX_WITH_FULL_VM_ENCRYPTION /* Resolve password and cryptographic support interface if machine is encrypted. */ if (mData->mstrKeyId.isNotEmpty()) { /* Get at the crpytographic interface. */ rc = mParent->i_retainCryptoIf(&pCryptoIf); if (SUCCEEDED(rc)) { int vrc = mData->mpKeyStore->retainSecretKey(mData->mstrKeyId, &pKey); if (RT_SUCCESS(vrc)) pszPassword = (const char *)pKey->getKeyBuffer(); else rc = setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Failed to retain key for key ID '%s' with %Rrc"), mData->mstrKeyId.c_str(), vrc); } } #else RT_NOREF(pKey); #endif if (SUCCEEDED(rc)) { try { // load and parse machine XML; this will throw on XML or logic errors mData->pMachineConfigFile = new settings::MachineConfigFile(&mData->m_strConfigFileFull, pCryptoIf, pszPassword); if (mData->mUuid != mData->pMachineConfigFile->uuid) throw setError(E_FAIL, tr("Machine UUID {%RTuuid} in '%s' doesn't match its UUID {%s} in the registry file '%s'"), mData->pMachineConfigFile->uuid.raw(), mData->m_strConfigFileFull.c_str(), mData->mUuid.toString().c_str(), mParent->i_settingsFilePath().c_str()); #ifdef VBOX_WITH_FULL_VM_ENCRYPTION // If config is encrypted, no exception is thrown allowing us to get the uuid and the encryption fields. // We fill in the encryptions fields, and the rest will be filled in if all data parsed mData->mstrKeyId = mData->pMachineConfigFile->strKeyId; mData->mstrKeyStore = mData->pMachineConfigFile->strKeyStore; if (mData->pMachineConfigFile->enmParseState == settings::MachineConfigFile::ParseState_PasswordError) rc = setError(VBOX_E_PASSWORD_INCORRECT, tr("Config decryption of the machine {%RTuuid} failed. Incorrect or unknown password"), mData->pMachineConfigFile->uuid.raw()); else #endif rc = i_loadMachineDataFromSettings(*mData->pMachineConfigFile, NULL /* const Guid *puuidRegistry */); if (FAILED(rc)) throw rc; } catch (HRESULT err) { /* we assume that error info is set by the thrower */ rc = err; } catch (...) { rc = VirtualBoxBase::handleUnexpectedExceptions(this, RT_SRC_POS); } /* Restore the registered flag (even on failure) */ mData->mRegistered = TRUE; } #ifdef VBOX_WITH_FULL_VM_ENCRYPTION if (pCryptoIf) mParent->i_releaseCryptoIf(pCryptoIf); if (pKey) mData->mpKeyStore->releaseSecretKey(mData->mstrKeyId); #endif } if (SUCCEEDED(rc)) { /* Set mAccessible to TRUE only if we successfully locked and loaded * the settings file */ mData->mAccessible = TRUE; /* commit all changes made during loading the settings file */ i_commit(); /// @todo r=dj why do we need a commit during init?!? this is very expensive /// @todo r=klaus for some reason the settings loading logic backs up // the settings, and therefore a commit is needed. Should probably be changed. } else { /* If the machine is registered, then, instead of returning a * failure, we mark it as inaccessible and set the result to * success to give it a try later */ /* fetch the current error info */ mData->mAccessError = com::ErrorInfo(); Log1Warning(("Machine {%RTuuid} is inaccessible! [%ls]\n", mData->mUuid.raw(), mData->mAccessError.getText().raw())); /* rollback all changes */ i_rollback(false /* aNotify */); // uninit media from this machine's media registry, or else // reloading the settings will fail mParent->i_unregisterMachineMedia(i_getId()); /* uninitialize the common part to make sure all data is reset to * default (null) values */ uninitDataAndChildObjects(); rc = S_OK; } return rc; } /** * Uninitializes the instance. * Called either from FinalRelease() or by the parent when it gets destroyed. * * @note The caller of this method must make sure that this object * a) doesn't have active callers on the current thread and b) is not locked * by the current thread; otherwise uninit() will hang either a) due to * AutoUninitSpan waiting for a number of calls to drop to zero or b) due to * a dead-lock caused by this thread waiting for all callers on the other * threads are done but preventing them from doing so by holding a lock. */ void Machine::uninit() { LogFlowThisFuncEnter(); Assert(!isWriteLockOnCurrentThread()); Assert(!uRegistryNeedsSaving); if (uRegistryNeedsSaving) { AutoCaller autoCaller(this); if (SUCCEEDED(autoCaller.rc())) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); i_saveSettings(NULL, alock, Machine::SaveS_Force); } } /* Enclose the state transition Ready->InUninit->NotReady */ AutoUninitSpan autoUninitSpan(this); if (autoUninitSpan.uninitDone()) return; Assert(!i_isSnapshotMachine()); Assert(!i_isSessionMachine()); Assert(!!mData); LogFlowThisFunc(("initFailed()=%d\n", autoUninitSpan.initFailed())); LogFlowThisFunc(("mRegistered=%d\n", mData->mRegistered)); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (!mData->mSession.mMachine.isNull()) { /* Theoretically, this can only happen if the VirtualBox server has been * terminated while there were clients running that owned open direct * sessions. Since in this case we are definitely called by * VirtualBox::uninit(), we may be sure that SessionMachine::uninit() * won't happen on the client watcher thread (because it has a * VirtualBox caller for the duration of the * SessionMachine::i_checkForDeath() call, so that VirtualBox::uninit() * cannot happen until the VirtualBox caller is released). This is * important, because SessionMachine::uninit() cannot correctly operate * after we return from this method (it expects the Machine instance is * still valid). We'll call it ourselves below. */ Log1WarningThisFunc(("Session machine is not NULL (%p), the direct session is still open!\n", (SessionMachine*)mData->mSession.mMachine)); if (Global::IsOnlineOrTransient(mData->mMachineState)) { Log1WarningThisFunc(("Setting state to Aborted!\n")); /* set machine state using SessionMachine reimplementation */ static_cast(mData->mSession.mMachine)->i_setMachineState(MachineState_Aborted); } /* * Uninitialize SessionMachine using public uninit() to indicate * an unexpected uninitialization. */ mData->mSession.mMachine->uninit(); /* SessionMachine::uninit() must set mSession.mMachine to null */ Assert(mData->mSession.mMachine.isNull()); } // uninit media from this machine's media registry, if they're still there Guid uuidMachine(i_getId()); /* the lock is no more necessary (SessionMachine is uninitialized) */ alock.release(); /* XXX This will fail with * "cannot be closed because it is still attached to 1 virtual machines" * because at this point we did not call uninitDataAndChildObjects() yet * and therefore also removeBackReference() for all these mediums was not called! */ if (uuidMachine.isValid() && !uuidMachine.isZero()) // can be empty if we're called from a failure of Machine::init mParent->i_unregisterMachineMedia(uuidMachine); // has machine been modified? if (mData->flModifications) { Log1WarningThisFunc(("Discarding unsaved settings changes!\n")); i_rollback(false /* aNotify */); } if (mData->mAccessible) uninitDataAndChildObjects(); #ifdef VBOX_WITH_FULL_VM_ENCRYPTION if (mData->mpKeyStore != NULL) delete mData->mpKeyStore; #endif /* free the essential data structure last */ mData.free(); LogFlowThisFuncLeave(); } // Wrapped IMachine properties ///////////////////////////////////////////////////////////////////////////// HRESULT Machine::getParent(ComPtr &aParent) { /* mParent is constant during life time, no need to lock */ ComObjPtr pVirtualBox(mParent); aParent = pVirtualBox; return S_OK; } HRESULT Machine::getAccessible(BOOL *aAccessible) { /* In some cases (medium registry related), it is necessary to be able to * go through the list of all machines. Happens when an inaccessible VM * has a sensible medium registry. */ AutoReadLock mllock(mParent->i_getMachinesListLockHandle() COMMA_LOCKVAL_SRC_POS); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = S_OK; if (!mData->mAccessible) { /* try to initialize the VM once more if not accessible */ AutoReinitSpan autoReinitSpan(this); AssertReturn(autoReinitSpan.isOk(), E_FAIL); #ifdef DEBUG LogFlowThisFunc(("Dumping media backreferences\n")); mParent->i_dumpAllBackRefs(); #endif if (mData->pMachineConfigFile) { // reset the XML file to force loadSettings() (called from i_registeredInit()) // to parse it again; the file might have changed delete mData->pMachineConfigFile; mData->pMachineConfigFile = NULL; } rc = i_registeredInit(); if (SUCCEEDED(rc) && mData->mAccessible) { autoReinitSpan.setSucceeded(); /* make sure interesting parties will notice the accessibility * state change */ mParent->i_onMachineStateChanged(mData->mUuid, mData->mMachineState); mParent->i_onMachineDataChanged(mData->mUuid); } } if (SUCCEEDED(rc)) *aAccessible = mData->mAccessible; LogFlowThisFuncLeave(); return rc; } HRESULT Machine::getAccessError(ComPtr &aAccessError) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mAccessible || !mData->mAccessError.isBasicAvailable()) { /* return shortly */ aAccessError = NULL; return S_OK; } HRESULT rc = S_OK; ComObjPtr errorInfo; rc = errorInfo.createObject(); if (SUCCEEDED(rc)) { errorInfo->init(mData->mAccessError.getResultCode(), mData->mAccessError.getInterfaceID().ref(), Utf8Str(mData->mAccessError.getComponent()).c_str(), Utf8Str(mData->mAccessError.getText())); aAccessError = errorInfo; } return rc; } HRESULT Machine::getName(com::Utf8Str &aName) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aName = mUserData->s.strName; return S_OK; } HRESULT Machine::setName(const com::Utf8Str &aName) { // prohibit setting a UUID only as the machine name, or else it can // never be found by findMachine() Guid test(aName); if (test.isValid()) return setError(E_INVALIDARG, tr("A machine cannot have a UUID as its name")); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrSavedStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mUserData.backup(); mUserData->s.strName = aName; return S_OK; } HRESULT Machine::getDescription(com::Utf8Str &aDescription) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aDescription = mUserData->s.strDescription; return S_OK; } HRESULT Machine::setDescription(const com::Utf8Str &aDescription) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); // this can be done in principle in any state as it doesn't affect the VM // significantly, but play safe by not messing around while complex // activities are going on HRESULT rc = i_checkStateDependency(MutableOrSavedOrRunningStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mUserData.backup(); mUserData->s.strDescription = aDescription; return S_OK; } HRESULT Machine::getId(com::Guid &aId) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aId = mData->mUuid; return S_OK; } HRESULT Machine::getGroups(std::vector &aGroups) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aGroups.resize(mUserData->s.llGroups.size()); size_t i = 0; for (StringsList::const_iterator it = mUserData->s.llGroups.begin(); it != mUserData->s.llGroups.end(); ++it, ++i) aGroups[i] = (*it); return S_OK; } HRESULT Machine::setGroups(const std::vector &aGroups) { StringsList llGroups; HRESULT rc = mParent->i_convertMachineGroups(aGroups, &llGroups); if (FAILED(rc)) return rc; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); rc = i_checkStateDependency(MutableOrSavedStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mUserData.backup(); mUserData->s.llGroups = llGroups; mParent->i_onMachineGroupsChanged(mData->mUuid); return S_OK; } HRESULT Machine::getOSTypeId(com::Utf8Str &aOSTypeId) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aOSTypeId = mUserData->s.strOsType; return S_OK; } HRESULT Machine::setOSTypeId(const com::Utf8Str &aOSTypeId) { /* look up the object by Id to check it is valid */ ComObjPtr pGuestOSType; mParent->i_findGuestOSType(aOSTypeId, pGuestOSType); /* when setting, always use the "etalon" value for consistency -- lookup * by ID is case-insensitive and the input value may have different case */ Utf8Str osTypeId = !pGuestOSType.isNull() ? pGuestOSType->i_id() : aOSTypeId; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mUserData.backup(); mUserData->s.strOsType = osTypeId; return S_OK; } HRESULT Machine::getFirmwareType(FirmwareType_T *aFirmwareType) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aFirmwareType = mHWData->mFirmwareType; return S_OK; } HRESULT Machine::setFirmwareType(FirmwareType_T aFirmwareType) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mFirmwareType = aFirmwareType; Utf8Str strNVRAM = i_getDefaultNVRAMFilename(); alock.release(); mNvramStore->i_updateNonVolatileStorageFile(strNVRAM); return S_OK; } HRESULT Machine::getKeyboardHIDType(KeyboardHIDType_T *aKeyboardHIDType) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aKeyboardHIDType = mHWData->mKeyboardHIDType; return S_OK; } HRESULT Machine::setKeyboardHIDType(KeyboardHIDType_T aKeyboardHIDType) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mKeyboardHIDType = aKeyboardHIDType; return S_OK; } HRESULT Machine::getPointingHIDType(PointingHIDType_T *aPointingHIDType) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aPointingHIDType = mHWData->mPointingHIDType; return S_OK; } HRESULT Machine::setPointingHIDType(PointingHIDType_T aPointingHIDType) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mPointingHIDType = aPointingHIDType; return S_OK; } HRESULT Machine::getChipsetType(ChipsetType_T *aChipsetType) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aChipsetType = mHWData->mChipsetType; return S_OK; } HRESULT Machine::setChipsetType(ChipsetType_T aChipsetType) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; if (aChipsetType != mHWData->mChipsetType) { i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mChipsetType = aChipsetType; // Resize network adapter array, to be finalized on commit/rollback. // We must not throw away entries yet, otherwise settings are lost // without a way to roll back. size_t newCount = Global::getMaxNetworkAdapters(aChipsetType); size_t oldCount = mNetworkAdapters.size(); if (newCount > oldCount) { mNetworkAdapters.resize(newCount); for (size_t slot = oldCount; slot < mNetworkAdapters.size(); slot++) { unconst(mNetworkAdapters[slot]).createObject(); mNetworkAdapters[slot]->init(this, (ULONG)slot); } } } return S_OK; } HRESULT Machine::getIommuType(IommuType_T *aIommuType) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aIommuType = mHWData->mIommuType; return S_OK; } HRESULT Machine::setIommuType(IommuType_T aIommuType) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; if (aIommuType != mHWData->mIommuType) { if (aIommuType == IommuType_Intel) { #ifndef VBOX_WITH_IOMMU_INTEL LogRelFunc(("Setting Intel IOMMU when Intel IOMMU support not available!\n")); return E_UNEXPECTED; #endif } i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mIommuType = aIommuType; } return S_OK; } HRESULT Machine::getParavirtDebug(com::Utf8Str &aParavirtDebug) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aParavirtDebug = mHWData->mParavirtDebug; return S_OK; } HRESULT Machine::setParavirtDebug(const com::Utf8Str &aParavirtDebug) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; /** @todo Parse/validate options? */ if (aParavirtDebug != mHWData->mParavirtDebug) { i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mParavirtDebug = aParavirtDebug; } return S_OK; } HRESULT Machine::getParavirtProvider(ParavirtProvider_T *aParavirtProvider) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aParavirtProvider = mHWData->mParavirtProvider; return S_OK; } HRESULT Machine::setParavirtProvider(ParavirtProvider_T aParavirtProvider) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; if (aParavirtProvider != mHWData->mParavirtProvider) { i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mParavirtProvider = aParavirtProvider; } return S_OK; } HRESULT Machine::getEffectiveParavirtProvider(ParavirtProvider_T *aParavirtProvider) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aParavirtProvider = mHWData->mParavirtProvider; switch (mHWData->mParavirtProvider) { case ParavirtProvider_None: case ParavirtProvider_HyperV: case ParavirtProvider_KVM: case ParavirtProvider_Minimal: break; /* Resolve dynamic provider types to the effective types. */ default: { ComObjPtr pGuestOSType; HRESULT hrc2 = mParent->i_findGuestOSType(mUserData->s.strOsType, pGuestOSType); if (FAILED(hrc2) || pGuestOSType.isNull()) { *aParavirtProvider = ParavirtProvider_None; break; } Utf8Str guestTypeFamilyId = pGuestOSType->i_familyId(); bool fOsXGuest = guestTypeFamilyId == "MacOS"; switch (mHWData->mParavirtProvider) { case ParavirtProvider_Legacy: { if (fOsXGuest) *aParavirtProvider = ParavirtProvider_Minimal; else *aParavirtProvider = ParavirtProvider_None; break; } case ParavirtProvider_Default: { if (fOsXGuest) *aParavirtProvider = ParavirtProvider_Minimal; else if ( mUserData->s.strOsType == "Windows11_64" || mUserData->s.strOsType == "Windows10" || mUserData->s.strOsType == "Windows10_64" || mUserData->s.strOsType == "Windows81" || mUserData->s.strOsType == "Windows81_64" || mUserData->s.strOsType == "Windows8" || mUserData->s.strOsType == "Windows8_64" || mUserData->s.strOsType == "Windows7" || mUserData->s.strOsType == "Windows7_64" || mUserData->s.strOsType == "WindowsVista" || mUserData->s.strOsType == "WindowsVista_64" || ( ( mUserData->s.strOsType.startsWith("Windows202") || mUserData->s.strOsType.startsWith("Windows201")) && mUserData->s.strOsType.endsWith("_64")) || mUserData->s.strOsType == "Windows2012" || mUserData->s.strOsType == "Windows2012_64" || mUserData->s.strOsType == "Windows2008" || mUserData->s.strOsType == "Windows2008_64") { *aParavirtProvider = ParavirtProvider_HyperV; } else if (guestTypeFamilyId == "Linux" && mUserData->s.strOsType != "Linux22" && // Linux22 and Linux24{_64} excluded as they're too old mUserData->s.strOsType != "Linux24" && // to have any KVM paravirtualization support. mUserData->s.strOsType != "Linux24_64") { *aParavirtProvider = ParavirtProvider_KVM; } else *aParavirtProvider = ParavirtProvider_None; break; } default: AssertFailedBreak(); /* Shut up MSC. */ } break; } } Assert( *aParavirtProvider == ParavirtProvider_None || *aParavirtProvider == ParavirtProvider_Minimal || *aParavirtProvider == ParavirtProvider_HyperV || *aParavirtProvider == ParavirtProvider_KVM); return S_OK; } HRESULT Machine::getHardwareVersion(com::Utf8Str &aHardwareVersion) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aHardwareVersion = mHWData->mHWVersion; return S_OK; } HRESULT Machine::setHardwareVersion(const com::Utf8Str &aHardwareVersion) { /* check known version */ Utf8Str hwVersion = aHardwareVersion; if ( hwVersion.compare("1") != 0 && hwVersion.compare("2") != 0) // VBox 2.1.x and later (VMMDev heap) return setError(E_INVALIDARG, tr("Invalid hardware version: %s\n"), aHardwareVersion.c_str()); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mHWVersion = aHardwareVersion; return S_OK; } HRESULT Machine::getHardwareUUID(com::Guid &aHardwareUUID) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (!mHWData->mHardwareUUID.isZero()) aHardwareUUID = mHWData->mHardwareUUID; else aHardwareUUID = mData->mUuid; return S_OK; } HRESULT Machine::setHardwareUUID(const com::Guid &aHardwareUUID) { if (!aHardwareUUID.isValid()) return E_INVALIDARG; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); if (aHardwareUUID == mData->mUuid) mHWData->mHardwareUUID.clear(); else mHWData->mHardwareUUID = aHardwareUUID; return S_OK; } HRESULT Machine::getMemorySize(ULONG *aMemorySize) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aMemorySize = mHWData->mMemorySize; return S_OK; } HRESULT Machine::setMemorySize(ULONG aMemorySize) { /* check RAM limits */ if ( aMemorySize < MM_RAM_MIN_IN_MB || aMemorySize > MM_RAM_MAX_IN_MB ) return setError(E_INVALIDARG, tr("Invalid RAM size: %lu MB (must be in range [%lu, %lu] MB)"), aMemorySize, MM_RAM_MIN_IN_MB, MM_RAM_MAX_IN_MB); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mMemorySize = aMemorySize; return S_OK; } HRESULT Machine::getCPUCount(ULONG *aCPUCount) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aCPUCount = mHWData->mCPUCount; return S_OK; } HRESULT Machine::setCPUCount(ULONG aCPUCount) { /* check CPU limits */ if ( aCPUCount < SchemaDefs::MinCPUCount || aCPUCount > SchemaDefs::MaxCPUCount ) return setError(E_INVALIDARG, tr("Invalid virtual CPU count: %lu (must be in range [%lu, %lu])"), aCPUCount, SchemaDefs::MinCPUCount, SchemaDefs::MaxCPUCount); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); /* We cant go below the current number of CPUs attached if hotplug is enabled*/ if (mHWData->mCPUHotPlugEnabled) { for (unsigned idx = aCPUCount; idx < SchemaDefs::MaxCPUCount; idx++) { if (mHWData->mCPUAttached[idx]) return setError(E_INVALIDARG, tr("There is still a CPU attached to socket %lu." "Detach the CPU before removing the socket"), aCPUCount, idx+1); } } HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mCPUCount = aCPUCount; return S_OK; } HRESULT Machine::getCPUExecutionCap(ULONG *aCPUExecutionCap) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aCPUExecutionCap = mHWData->mCpuExecutionCap; return S_OK; } HRESULT Machine::setCPUExecutionCap(ULONG aCPUExecutionCap) { HRESULT rc = S_OK; /* check throttle limits */ if ( aCPUExecutionCap < 1 || aCPUExecutionCap > 100 ) return setError(E_INVALIDARG, tr("Invalid CPU execution cap value: %lu (must be in range [%lu, %lu])"), aCPUExecutionCap, 1, 100); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; alock.release(); rc = i_onCPUExecutionCapChange(aCPUExecutionCap); alock.acquire(); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mCpuExecutionCap = aCPUExecutionCap; /** Save settings if online - @todo why is this required? -- @bugref{6818} */ if (Global::IsOnline(mData->mMachineState)) i_saveSettings(NULL, alock); return S_OK; } HRESULT Machine::getCPUHotPlugEnabled(BOOL *aCPUHotPlugEnabled) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aCPUHotPlugEnabled = mHWData->mCPUHotPlugEnabled; return S_OK; } HRESULT Machine::setCPUHotPlugEnabled(BOOL aCPUHotPlugEnabled) { HRESULT rc = S_OK; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; if (mHWData->mCPUHotPlugEnabled != aCPUHotPlugEnabled) { if (aCPUHotPlugEnabled) { i_setModified(IsModified_MachineData); mHWData.backup(); /* Add the amount of CPUs currently attached */ for (unsigned i = 0; i < mHWData->mCPUCount; ++i) mHWData->mCPUAttached[i] = true; } else { /* * We can disable hotplug only if the amount of maximum CPUs is equal * to the amount of attached CPUs */ unsigned cCpusAttached = 0; unsigned iHighestId = 0; for (unsigned i = 0; i < SchemaDefs::MaxCPUCount; ++i) { if (mHWData->mCPUAttached[i]) { cCpusAttached++; iHighestId = i; } } if ( (cCpusAttached != mHWData->mCPUCount) || (iHighestId >= mHWData->mCPUCount)) return setError(E_INVALIDARG, tr("CPU hotplugging can't be disabled because the maximum number of CPUs is not equal to the amount of CPUs attached")); i_setModified(IsModified_MachineData); mHWData.backup(); } } mHWData->mCPUHotPlugEnabled = aCPUHotPlugEnabled; return rc; } HRESULT Machine::getCPUIDPortabilityLevel(ULONG *aCPUIDPortabilityLevel) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aCPUIDPortabilityLevel = mHWData->mCpuIdPortabilityLevel; return S_OK; } HRESULT Machine::setCPUIDPortabilityLevel(ULONG aCPUIDPortabilityLevel) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableStateDep); if (SUCCEEDED(hrc)) { i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mCpuIdPortabilityLevel = aCPUIDPortabilityLevel; } return hrc; } HRESULT Machine::getCPUProfile(com::Utf8Str &aCPUProfile) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aCPUProfile = mHWData->mCpuProfile; return S_OK; } HRESULT Machine::setCPUProfile(const com::Utf8Str &aCPUProfile) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableStateDep); if (SUCCEEDED(hrc)) { i_setModified(IsModified_MachineData); mHWData.backup(); /* Empty equals 'host'. */ if (aCPUProfile.isNotEmpty()) mHWData->mCpuProfile = aCPUProfile; else mHWData->mCpuProfile = "host"; } return hrc; } HRESULT Machine::getEmulatedUSBCardReaderEnabled(BOOL *aEmulatedUSBCardReaderEnabled) { #ifdef VBOX_WITH_USB_CARDREADER AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aEmulatedUSBCardReaderEnabled = mHWData->mEmulatedUSBCardReaderEnabled; return S_OK; #else NOREF(aEmulatedUSBCardReaderEnabled); return E_NOTIMPL; #endif } HRESULT Machine::setEmulatedUSBCardReaderEnabled(BOOL aEmulatedUSBCardReaderEnabled) { #ifdef VBOX_WITH_USB_CARDREADER AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrSavedStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mEmulatedUSBCardReaderEnabled = aEmulatedUSBCardReaderEnabled; return S_OK; #else NOREF(aEmulatedUSBCardReaderEnabled); return E_NOTIMPL; #endif } HRESULT Machine::getHPETEnabled(BOOL *aHPETEnabled) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aHPETEnabled = mHWData->mHPETEnabled; return S_OK; } HRESULT Machine::setHPETEnabled(BOOL aHPETEnabled) { HRESULT rc = S_OK; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mHPETEnabled = aHPETEnabled; return rc; } /** @todo this method should not be public */ HRESULT Machine::getMemoryBalloonSize(ULONG *aMemoryBalloonSize) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aMemoryBalloonSize = mHWData->mMemoryBalloonSize; return S_OK; } /** * Set the memory balloon size. * * This method is also called from IGuest::COMSETTER(MemoryBalloonSize) so * we have to make sure that we never call IGuest from here. */ HRESULT Machine::setMemoryBalloonSize(ULONG aMemoryBalloonSize) { /* This must match GMMR0Init; currently we only support memory ballooning on all 64-bit hosts except Mac OS X */ #if HC_ARCH_BITS == 64 && (defined(RT_OS_WINDOWS) || defined(RT_OS_SOLARIS) || defined(RT_OS_LINUX) || defined(RT_OS_FREEBSD)) /* check limits */ if (aMemoryBalloonSize >= VMMDEV_MAX_MEMORY_BALLOON(mHWData->mMemorySize)) return setError(E_INVALIDARG, tr("Invalid memory balloon size: %lu MB (must be in range [%lu, %lu] MB)"), aMemoryBalloonSize, 0, VMMDEV_MAX_MEMORY_BALLOON(mHWData->mMemorySize)); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mMemoryBalloonSize = aMemoryBalloonSize; return S_OK; #else NOREF(aMemoryBalloonSize); return setError(E_NOTIMPL, tr("Memory ballooning is only supported on 64-bit hosts")); #endif } HRESULT Machine::getPageFusionEnabled(BOOL *aPageFusionEnabled) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aPageFusionEnabled = mHWData->mPageFusionEnabled; return S_OK; } HRESULT Machine::setPageFusionEnabled(BOOL aPageFusionEnabled) { #ifdef VBOX_WITH_PAGE_SHARING AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; /** @todo must support changes for running vms and keep this in sync with IGuest. */ i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mPageFusionEnabled = aPageFusionEnabled; return S_OK; #else NOREF(aPageFusionEnabled); return setError(E_NOTIMPL, tr("Page fusion is only supported on 64-bit hosts")); #endif } HRESULT Machine::getBIOSSettings(ComPtr &aBIOSSettings) { /* mBIOSSettings is constant during life time, no need to lock */ aBIOSSettings = mBIOSSettings; return S_OK; } HRESULT Machine::getTrustedPlatformModule(ComPtr &aTrustedPlatformModule) { /* mTrustedPlatformModule is constant during life time, no need to lock */ aTrustedPlatformModule = mTrustedPlatformModule; return S_OK; } HRESULT Machine::getNonVolatileStore(ComPtr &aNvramStore) { /* mNvramStore is constant during life time, no need to lock */ aNvramStore = mNvramStore; return S_OK; } HRESULT Machine::getRecordingSettings(ComPtr &aRecordingSettings) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aRecordingSettings = mRecordingSettings; return S_OK; } HRESULT Machine::getGraphicsAdapter(ComPtr &aGraphicsAdapter) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aGraphicsAdapter = mGraphicsAdapter; return S_OK; } HRESULT Machine::getCPUProperty(CPUPropertyType_T aProperty, BOOL *aValue) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); switch (aProperty) { case CPUPropertyType_PAE: *aValue = mHWData->mPAEEnabled; break; case CPUPropertyType_LongMode: if (mHWData->mLongMode == settings::Hardware::LongMode_Enabled) *aValue = TRUE; else if (mHWData->mLongMode == settings::Hardware::LongMode_Disabled) *aValue = FALSE; #if HC_ARCH_BITS == 64 else *aValue = TRUE; #else else { *aValue = FALSE; ComObjPtr pGuestOSType; HRESULT hrc2 = mParent->i_findGuestOSType(mUserData->s.strOsType, pGuestOSType); if (SUCCEEDED(hrc2) && !pGuestOSType.isNull()) { if (pGuestOSType->i_is64Bit()) { ComObjPtr pHost = mParent->i_host(); alock.release(); hrc2 = pHost->GetProcessorFeature(ProcessorFeature_LongMode, aValue); AssertComRC(hrc2); if (FAILED(hrc2)) *aValue = FALSE; } } } #endif break; case CPUPropertyType_TripleFaultReset: *aValue = mHWData->mTripleFaultReset; break; case CPUPropertyType_APIC: *aValue = mHWData->mAPIC; break; case CPUPropertyType_X2APIC: *aValue = mHWData->mX2APIC; break; case CPUPropertyType_IBPBOnVMExit: *aValue = mHWData->mIBPBOnVMExit; break; case CPUPropertyType_IBPBOnVMEntry: *aValue = mHWData->mIBPBOnVMEntry; break; case CPUPropertyType_SpecCtrl: *aValue = mHWData->mSpecCtrl; break; case CPUPropertyType_SpecCtrlByHost: *aValue = mHWData->mSpecCtrlByHost; break; case CPUPropertyType_HWVirt: *aValue = mHWData->mNestedHWVirt; break; case CPUPropertyType_L1DFlushOnEMTScheduling: *aValue = mHWData->mL1DFlushOnSched; break; case CPUPropertyType_L1DFlushOnVMEntry: *aValue = mHWData->mL1DFlushOnVMEntry; break; case CPUPropertyType_MDSClearOnEMTScheduling: *aValue = mHWData->mMDSClearOnSched; break; case CPUPropertyType_MDSClearOnVMEntry: *aValue = mHWData->mMDSClearOnVMEntry; break; default: return E_INVALIDARG; } return S_OK; } HRESULT Machine::setCPUProperty(CPUPropertyType_T aProperty, BOOL aValue) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; switch (aProperty) { case CPUPropertyType_PAE: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mPAEEnabled = !!aValue; break; case CPUPropertyType_LongMode: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mLongMode = !aValue ? settings::Hardware::LongMode_Disabled : settings::Hardware::LongMode_Enabled; break; case CPUPropertyType_TripleFaultReset: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mTripleFaultReset = !!aValue; break; case CPUPropertyType_APIC: if (mHWData->mX2APIC) aValue = TRUE; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mAPIC = !!aValue; break; case CPUPropertyType_X2APIC: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mX2APIC = !!aValue; if (aValue) mHWData->mAPIC = !!aValue; break; case CPUPropertyType_IBPBOnVMExit: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mIBPBOnVMExit = !!aValue; break; case CPUPropertyType_IBPBOnVMEntry: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mIBPBOnVMEntry = !!aValue; break; case CPUPropertyType_SpecCtrl: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mSpecCtrl = !!aValue; break; case CPUPropertyType_SpecCtrlByHost: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mSpecCtrlByHost = !!aValue; break; case CPUPropertyType_HWVirt: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mNestedHWVirt = !!aValue; break; case CPUPropertyType_L1DFlushOnEMTScheduling: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mL1DFlushOnSched = !!aValue; break; case CPUPropertyType_L1DFlushOnVMEntry: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mL1DFlushOnVMEntry = !!aValue; break; case CPUPropertyType_MDSClearOnEMTScheduling: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mMDSClearOnSched = !!aValue; break; case CPUPropertyType_MDSClearOnVMEntry: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mMDSClearOnVMEntry = !!aValue; break; default: return E_INVALIDARG; } return S_OK; } HRESULT Machine::getCPUIDLeafByOrdinal(ULONG aOrdinal, ULONG *aIdx, ULONG *aSubIdx, ULONG *aValEax, ULONG *aValEbx, ULONG *aValEcx, ULONG *aValEdx) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (aOrdinal < mHWData->mCpuIdLeafList.size()) { for (settings::CpuIdLeafsList::const_iterator it = mHWData->mCpuIdLeafList.begin(); it != mHWData->mCpuIdLeafList.end(); ++it) { if (aOrdinal == 0) { const settings::CpuIdLeaf &rLeaf= *it; *aIdx = rLeaf.idx; *aSubIdx = rLeaf.idxSub; *aValEax = rLeaf.uEax; *aValEbx = rLeaf.uEbx; *aValEcx = rLeaf.uEcx; *aValEdx = rLeaf.uEdx; return S_OK; } aOrdinal--; } } return E_INVALIDARG; } HRESULT Machine::getCPUIDLeaf(ULONG aIdx, ULONG aSubIdx, ULONG *aValEax, ULONG *aValEbx, ULONG *aValEcx, ULONG *aValEdx) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); /* * Search the list. */ for (settings::CpuIdLeafsList::const_iterator it = mHWData->mCpuIdLeafList.begin(); it != mHWData->mCpuIdLeafList.end(); ++it) { const settings::CpuIdLeaf &rLeaf= *it; if ( rLeaf.idx == aIdx && ( aSubIdx == UINT32_MAX || rLeaf.idxSub == aSubIdx) ) { *aValEax = rLeaf.uEax; *aValEbx = rLeaf.uEbx; *aValEcx = rLeaf.uEcx; *aValEdx = rLeaf.uEdx; return S_OK; } } return E_INVALIDARG; } HRESULT Machine::setCPUIDLeaf(ULONG aIdx, ULONG aSubIdx, ULONG aValEax, ULONG aValEbx, ULONG aValEcx, ULONG aValEdx) { /* * Validate input before taking locks and checking state. */ if (aSubIdx != 0 && aSubIdx != UINT32_MAX) return setError(E_INVALIDARG, tr("Currently only aSubIdx values 0 and 0xffffffff are supported: %#x"), aSubIdx); if ( aIdx >= UINT32_C(0x20) && aIdx - UINT32_C(0x80000000) >= UINT32_C(0x20) && aIdx - UINT32_C(0xc0000000) >= UINT32_C(0x10) ) return setError(E_INVALIDARG, tr("CpuId override leaf %#x is out of range"), aIdx); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; /* * Impose a maximum number of leaves. */ if (mHWData->mCpuIdLeafList.size() > 256) return setError(E_FAIL, tr("Max of 256 CPUID override leaves reached")); /* * Updating the list is a bit more complicated. So, let's do a remove first followed by an insert. */ i_setModified(IsModified_MachineData); mHWData.backup(); for (settings::CpuIdLeafsList::iterator it = mHWData->mCpuIdLeafList.begin(); it != mHWData->mCpuIdLeafList.end(); ) { settings::CpuIdLeaf &rLeaf= *it; if ( rLeaf.idx == aIdx && ( aSubIdx == UINT32_MAX || rLeaf.idxSub == aSubIdx) ) it = mHWData->mCpuIdLeafList.erase(it); else ++it; } settings::CpuIdLeaf NewLeaf; NewLeaf.idx = aIdx; NewLeaf.idxSub = aSubIdx == UINT32_MAX ? 0 : aSubIdx; NewLeaf.uEax = aValEax; NewLeaf.uEbx = aValEbx; NewLeaf.uEcx = aValEcx; NewLeaf.uEdx = aValEdx; mHWData->mCpuIdLeafList.push_back(NewLeaf); return S_OK; } HRESULT Machine::removeCPUIDLeaf(ULONG aIdx, ULONG aSubIdx) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; /* * Do the removal. */ bool fModified = mHWData.isBackedUp(); for (settings::CpuIdLeafsList::iterator it = mHWData->mCpuIdLeafList.begin(); it != mHWData->mCpuIdLeafList.end(); ) { settings::CpuIdLeaf &rLeaf= *it; if ( rLeaf.idx == aIdx && ( aSubIdx == UINT32_MAX || rLeaf.idxSub == aSubIdx) ) { if (!fModified) { fModified = true; i_setModified(IsModified_MachineData); mHWData.backup(); // Start from the beginning, since mHWData.backup() creates // a new list, causing iterator mixup. This makes sure that // the settings are not unnecessarily marked as modified, // at the price of extra list walking. it = mHWData->mCpuIdLeafList.begin(); } else it = mHWData->mCpuIdLeafList.erase(it); } else ++it; } return S_OK; } HRESULT Machine::removeAllCPUIDLeaves() { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; if (mHWData->mCpuIdLeafList.size() > 0) { i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mCpuIdLeafList.clear(); } return S_OK; } HRESULT Machine::getHWVirtExProperty(HWVirtExPropertyType_T aProperty, BOOL *aValue) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); switch(aProperty) { case HWVirtExPropertyType_Enabled: *aValue = mHWData->mHWVirtExEnabled; break; case HWVirtExPropertyType_VPID: *aValue = mHWData->mHWVirtExVPIDEnabled; break; case HWVirtExPropertyType_NestedPaging: *aValue = mHWData->mHWVirtExNestedPagingEnabled; break; case HWVirtExPropertyType_UnrestrictedExecution: *aValue = mHWData->mHWVirtExUXEnabled; break; case HWVirtExPropertyType_LargePages: *aValue = mHWData->mHWVirtExLargePagesEnabled; break; case HWVirtExPropertyType_Force: *aValue = mHWData->mHWVirtExForceEnabled; break; case HWVirtExPropertyType_UseNativeApi: *aValue = mHWData->mHWVirtExUseNativeApi; break; case HWVirtExPropertyType_VirtVmsaveVmload: *aValue = mHWData->mHWVirtExVirtVmsaveVmload; break; default: return E_INVALIDARG; } return S_OK; } HRESULT Machine::setHWVirtExProperty(HWVirtExPropertyType_T aProperty, BOOL aValue) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; switch (aProperty) { case HWVirtExPropertyType_Enabled: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mHWVirtExEnabled = !!aValue; break; case HWVirtExPropertyType_VPID: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mHWVirtExVPIDEnabled = !!aValue; break; case HWVirtExPropertyType_NestedPaging: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mHWVirtExNestedPagingEnabled = !!aValue; break; case HWVirtExPropertyType_UnrestrictedExecution: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mHWVirtExUXEnabled = !!aValue; break; case HWVirtExPropertyType_LargePages: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mHWVirtExLargePagesEnabled = !!aValue; break; case HWVirtExPropertyType_Force: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mHWVirtExForceEnabled = !!aValue; break; case HWVirtExPropertyType_UseNativeApi: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mHWVirtExUseNativeApi = !!aValue; break; case HWVirtExPropertyType_VirtVmsaveVmload: i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mHWVirtExVirtVmsaveVmload = !!aValue; break; default: return E_INVALIDARG; } return S_OK; } HRESULT Machine::getSnapshotFolder(com::Utf8Str &aSnapshotFolder) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); i_calculateFullPath(mUserData->s.strSnapshotFolder, aSnapshotFolder); return S_OK; } HRESULT Machine::setSnapshotFolder(const com::Utf8Str &aSnapshotFolder) { /** @todo (r=dmik): * 1. Allow to change the name of the snapshot folder containing snapshots * 2. Rename the folder on disk instead of just changing the property * value (to be smart and not to leave garbage). Note that it cannot be * done here because the change may be rolled back. Thus, the right * place is #saveSettings(). */ AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; if (!mData->mCurrentSnapshot.isNull()) return setError(E_FAIL, tr("The snapshot folder of a machine with snapshots cannot be changed (please delete all snapshots first)")); Utf8Str strSnapshotFolder(aSnapshotFolder); // keep original if (strSnapshotFolder.isEmpty()) strSnapshotFolder = "Snapshots"; int vrc = i_calculateFullPath(strSnapshotFolder, strSnapshotFolder); if (RT_FAILURE(vrc)) return setErrorBoth(E_FAIL, vrc, tr("Invalid snapshot folder '%s' (%Rrc)"), strSnapshotFolder.c_str(), vrc); i_setModified(IsModified_MachineData); mUserData.backup(); i_copyPathRelativeToMachine(strSnapshotFolder, mUserData->s.strSnapshotFolder); return S_OK; } HRESULT Machine::getMediumAttachments(std::vector > &aMediumAttachments) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aMediumAttachments.resize(mMediumAttachments->size()); size_t i = 0; for (MediumAttachmentList::const_iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it, ++i) aMediumAttachments[i] = *it; return S_OK; } HRESULT Machine::getVRDEServer(ComPtr &aVRDEServer) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); Assert(!!mVRDEServer); aVRDEServer = mVRDEServer; return S_OK; } HRESULT Machine::getAudioSettings(ComPtr &aAudioSettings) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aAudioSettings = mAudioSettings; return S_OK; } HRESULT Machine::getUSBControllers(std::vector > &aUSBControllers) { #ifdef VBOX_WITH_VUSB clearError(); MultiResult rc(S_OK); # ifdef VBOX_WITH_USB rc = mParent->i_host()->i_checkUSBProxyService(); if (FAILED(rc)) return rc; # endif AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aUSBControllers.resize(mUSBControllers->size()); size_t i = 0; for (USBControllerList::const_iterator it = mUSBControllers->begin(); it != mUSBControllers->end(); ++it, ++i) aUSBControllers[i] = *it; return S_OK; #else /* Note: The GUI depends on this method returning E_NOTIMPL with no * extended error info to indicate that USB is simply not available * (w/o treating it as a failure), for example, as in OSE */ NOREF(aUSBControllers); ReturnComNotImplemented(); #endif /* VBOX_WITH_VUSB */ } HRESULT Machine::getUSBDeviceFilters(ComPtr &aUSBDeviceFilters) { #ifdef VBOX_WITH_VUSB clearError(); MultiResult rc(S_OK); # ifdef VBOX_WITH_USB rc = mParent->i_host()->i_checkUSBProxyService(); if (FAILED(rc)) return rc; # endif AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aUSBDeviceFilters = mUSBDeviceFilters; return rc; #else /* Note: The GUI depends on this method returning E_NOTIMPL with no * extended error info to indicate that USB is simply not available * (w/o treating it as a failure), for example, as in OSE */ NOREF(aUSBDeviceFilters); ReturnComNotImplemented(); #endif /* VBOX_WITH_VUSB */ } HRESULT Machine::getSettingsFilePath(com::Utf8Str &aSettingsFilePath) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aSettingsFilePath = mData->m_strConfigFileFull; return S_OK; } HRESULT Machine::getSettingsAuxFilePath(com::Utf8Str &aSettingsFilePath) { RT_NOREF(aSettingsFilePath); ReturnComNotImplemented(); } HRESULT Machine::getSettingsModified(BOOL *aSettingsModified) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrSavedOrRunningStateDep); if (FAILED(rc)) return rc; if (!mData->pMachineConfigFile->fileExists()) // this is a new machine, and no config file exists yet: *aSettingsModified = TRUE; else *aSettingsModified = (mData->flModifications != 0); return S_OK; } HRESULT Machine::getSessionState(SessionState_T *aSessionState) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aSessionState = mData->mSession.mState; return S_OK; } HRESULT Machine::getSessionName(com::Utf8Str &aSessionName) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aSessionName = mData->mSession.mName; return S_OK; } HRESULT Machine::getSessionPID(ULONG *aSessionPID) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aSessionPID = mData->mSession.mPID; return S_OK; } HRESULT Machine::getState(MachineState_T *aState) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aState = mData->mMachineState; Assert(mData->mMachineState != MachineState_Null); return S_OK; } HRESULT Machine::getLastStateChange(LONG64 *aLastStateChange) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aLastStateChange = RTTimeSpecGetMilli(&mData->mLastStateChange); return S_OK; } HRESULT Machine::getStateFilePath(com::Utf8Str &aStateFilePath) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aStateFilePath = mSSData->strStateFilePath; return S_OK; } HRESULT Machine::getLogFolder(com::Utf8Str &aLogFolder) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); i_getLogFolder(aLogFolder); return S_OK; } HRESULT Machine::getCurrentSnapshot(ComPtr &aCurrentSnapshot) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aCurrentSnapshot = mData->mCurrentSnapshot; return S_OK; } HRESULT Machine::getSnapshotCount(ULONG *aSnapshotCount) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aSnapshotCount = mData->mFirstSnapshot.isNull() ? 0 : mData->mFirstSnapshot->i_getAllChildrenCount() + 1; return S_OK; } HRESULT Machine::getCurrentStateModified(BOOL *aCurrentStateModified) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); /* Note: for machines with no snapshots, we always return FALSE * (mData->mCurrentStateModified will be TRUE in this case, for historical * reasons :) */ *aCurrentStateModified = mData->mFirstSnapshot.isNull() ? FALSE : mData->mCurrentStateModified; return S_OK; } HRESULT Machine::getSharedFolders(std::vector > &aSharedFolders) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aSharedFolders.resize(mHWData->mSharedFolders.size()); size_t i = 0; for (std::list >::const_iterator it = mHWData->mSharedFolders.begin(); it != mHWData->mSharedFolders.end(); ++it, ++i) aSharedFolders[i] = *it; return S_OK; } HRESULT Machine::getClipboardMode(ClipboardMode_T *aClipboardMode) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aClipboardMode = mHWData->mClipboardMode; return S_OK; } HRESULT Machine::setClipboardMode(ClipboardMode_T aClipboardMode) { HRESULT rc = S_OK; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; alock.release(); rc = i_onClipboardModeChange(aClipboardMode); alock.acquire(); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mClipboardMode = aClipboardMode; /** Save settings if online - @todo why is this required? -- @bugref{6818} */ if (Global::IsOnline(mData->mMachineState)) i_saveSettings(NULL, alock); return S_OK; } HRESULT Machine::getClipboardFileTransfersEnabled(BOOL *aEnabled) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aEnabled = mHWData->mClipboardFileTransfersEnabled; return S_OK; } HRESULT Machine::setClipboardFileTransfersEnabled(BOOL aEnabled) { HRESULT rc = S_OK; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; alock.release(); rc = i_onClipboardFileTransferModeChange(aEnabled); alock.acquire(); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mClipboardFileTransfersEnabled = aEnabled; /** Save settings if online - @todo why is this required? -- @bugref{6818} */ if (Global::IsOnline(mData->mMachineState)) i_saveSettings(NULL, alock); return S_OK; } HRESULT Machine::getDnDMode(DnDMode_T *aDnDMode) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aDnDMode = mHWData->mDnDMode; return S_OK; } HRESULT Machine::setDnDMode(DnDMode_T aDnDMode) { HRESULT rc = S_OK; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; alock.release(); rc = i_onDnDModeChange(aDnDMode); alock.acquire(); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mDnDMode = aDnDMode; /** Save settings if online - @todo why is this required? -- @bugref{6818} */ if (Global::IsOnline(mData->mMachineState)) i_saveSettings(NULL, alock); return S_OK; } HRESULT Machine::getStorageControllers(std::vector > &aStorageControllers) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aStorageControllers.resize(mStorageControllers->size()); size_t i = 0; for (StorageControllerList::const_iterator it = mStorageControllers->begin(); it != mStorageControllers->end(); ++it, ++i) aStorageControllers[i] = *it; return S_OK; } HRESULT Machine::getTeleporterEnabled(BOOL *aEnabled) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aEnabled = mUserData->s.fTeleporterEnabled; return S_OK; } HRESULT Machine::setTeleporterEnabled(BOOL aTeleporterEnabled) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); /* Only allow it to be set to true when PoweredOff or Aborted. (Clearing it is always permitted.) */ if ( aTeleporterEnabled && mData->mRegistered && ( !i_isSessionMachine() || ( mData->mMachineState != MachineState_PoweredOff && mData->mMachineState != MachineState_Teleported && mData->mMachineState != MachineState_Aborted ) ) ) return setError(VBOX_E_INVALID_VM_STATE, tr("The machine is not powered off (state is %s)"), Global::stringifyMachineState(mData->mMachineState)); i_setModified(IsModified_MachineData); mUserData.backup(); mUserData->s.fTeleporterEnabled = !! aTeleporterEnabled; return S_OK; } HRESULT Machine::getTeleporterPort(ULONG *aTeleporterPort) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aTeleporterPort = (ULONG)mUserData->s.uTeleporterPort; return S_OK; } HRESULT Machine::setTeleporterPort(ULONG aTeleporterPort) { if (aTeleporterPort >= _64K) return setError(E_INVALIDARG, tr("Invalid port number %d"), aTeleporterPort); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrSavedStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mUserData.backup(); mUserData->s.uTeleporterPort = (uint32_t)aTeleporterPort; return S_OK; } HRESULT Machine::getTeleporterAddress(com::Utf8Str &aTeleporterAddress) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aTeleporterAddress = mUserData->s.strTeleporterAddress; return S_OK; } HRESULT Machine::setTeleporterAddress(const com::Utf8Str &aTeleporterAddress) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrSavedStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mUserData.backup(); mUserData->s.strTeleporterAddress = aTeleporterAddress; return S_OK; } HRESULT Machine::getTeleporterPassword(com::Utf8Str &aTeleporterPassword) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aTeleporterPassword = mUserData->s.strTeleporterPassword; return S_OK; } HRESULT Machine::setTeleporterPassword(const com::Utf8Str &aTeleporterPassword) { /* * Hash the password first. */ com::Utf8Str aT = aTeleporterPassword; if (!aT.isEmpty()) { if (VBoxIsPasswordHashed(&aT)) return setError(E_INVALIDARG, tr("Cannot set an already hashed password, only plain text password please")); VBoxHashPassword(&aT); } /* * Do the update. */ AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableOrSavedStateDep); if (SUCCEEDED(hrc)) { i_setModified(IsModified_MachineData); mUserData.backup(); mUserData->s.strTeleporterPassword = aT; } return hrc; } HRESULT Machine::getRTCUseUTC(BOOL *aRTCUseUTC) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aRTCUseUTC = mUserData->s.fRTCUseUTC; return S_OK; } HRESULT Machine::setRTCUseUTC(BOOL aRTCUseUTC) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); /* Only allow it to be set to true when PoweredOff or Aborted. (Clearing it is always permitted.) */ if ( aRTCUseUTC && mData->mRegistered && ( !i_isSessionMachine() || ( mData->mMachineState != MachineState_PoweredOff && mData->mMachineState != MachineState_Teleported && mData->mMachineState != MachineState_Aborted ) ) ) return setError(VBOX_E_INVALID_VM_STATE, tr("The machine is not powered off (state is %s)"), Global::stringifyMachineState(mData->mMachineState)); i_setModified(IsModified_MachineData); mUserData.backup(); mUserData->s.fRTCUseUTC = !!aRTCUseUTC; return S_OK; } HRESULT Machine::getIOCacheEnabled(BOOL *aIOCacheEnabled) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aIOCacheEnabled = mHWData->mIOCacheEnabled; return S_OK; } HRESULT Machine::setIOCacheEnabled(BOOL aIOCacheEnabled) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mIOCacheEnabled = aIOCacheEnabled; return S_OK; } HRESULT Machine::getIOCacheSize(ULONG *aIOCacheSize) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aIOCacheSize = mHWData->mIOCacheSize; return S_OK; } HRESULT Machine::setIOCacheSize(ULONG aIOCacheSize) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mIOCacheSize = aIOCacheSize; return S_OK; } HRESULT Machine::getStateKeyId(com::Utf8Str &aKeyId) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); #ifdef VBOX_WITH_FULL_VM_ENCRYPTION aKeyId = mSSData->strStateKeyId; #else aKeyId = com::Utf8Str::Empty; #endif return S_OK; } HRESULT Machine::getStateKeyStore(com::Utf8Str &aKeyStore) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); #ifdef VBOX_WITH_FULL_VM_ENCRYPTION aKeyStore = mSSData->strStateKeyStore; #else aKeyStore = com::Utf8Str::Empty; #endif return S_OK; } HRESULT Machine::getLogKeyId(com::Utf8Str &aKeyId) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); #ifdef VBOX_WITH_FULL_VM_ENCRYPTION aKeyId = mData->mstrLogKeyId; #else aKeyId = com::Utf8Str::Empty; #endif return S_OK; } HRESULT Machine::getLogKeyStore(com::Utf8Str &aKeyStore) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); #ifdef VBOX_WITH_FULL_VM_ENCRYPTION aKeyStore = mData->mstrLogKeyStore; #else aKeyStore = com::Utf8Str::Empty; #endif return S_OK; } HRESULT Machine::getGuestDebugControl(ComPtr &aGuestDebugControl) { mGuestDebugControl.queryInterfaceTo(aGuestDebugControl.asOutParam()); return S_OK; } /** * @note Locks objects! */ HRESULT Machine::lockMachine(const ComPtr &aSession, LockType_T aLockType) { /* check the session state */ SessionState_T state; HRESULT rc = aSession->COMGETTER(State)(&state); if (FAILED(rc)) return rc; if (state != SessionState_Unlocked) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("The given session is busy")); // get the client's IInternalSessionControl interface ComPtr pSessionControl = aSession; ComAssertMsgRet(!!pSessionControl, (tr("No IInternalSessionControl interface")), E_INVALIDARG); // session name (only used in some code paths) Utf8Str strSessionName; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (!mData->mRegistered) return setError(E_UNEXPECTED, tr("The machine '%s' is not registered"), mUserData->s.strName.c_str()); LogFlowThisFunc(("mSession.mState=%s\n", ::stringifySessionState(mData->mSession.mState))); SessionState_T oldState = mData->mSession.mState; /* Hack: in case the session is closing and there is a progress object * which allows waiting for the session to be closed, take the opportunity * and do a limited wait (max. 1 second). This helps a lot when the system * is busy and thus session closing can take a little while. */ if ( mData->mSession.mState == SessionState_Unlocking && mData->mSession.mProgress) { alock.release(); mData->mSession.mProgress->WaitForCompletion(1000); alock.acquire(); LogFlowThisFunc(("after waiting: mSession.mState=%s\n", ::stringifySessionState(mData->mSession.mState))); } // try again now if ( (mData->mSession.mState == SessionState_Locked) // machine is write-locked already // (i.e. session machine exists) && (aLockType == LockType_Shared) // caller wants a shared link to the // existing session that holds the write lock: ) { // OK, share the session... we are now dealing with three processes: // 1) VBoxSVC (where this code runs); // 2) process C: the caller's client process (who wants a shared session); // 3) process W: the process which already holds the write lock on the machine (write-locking session) // copy pointers to W (the write-locking session) before leaving lock (these must not be NULL) ComPtr pSessionW = mData->mSession.mDirectControl; ComAssertRet(!pSessionW.isNull(), E_FAIL); ComObjPtr pSessionMachine = mData->mSession.mMachine; AssertReturn(!pSessionMachine.isNull(), E_FAIL); /* * Release the lock before calling the client process. It's safe here * since the only thing to do after we get the lock again is to add * the remote control to the list (which doesn't directly influence * anything). */ alock.release(); // get the console of the session holding the write lock (this is a remote call) ComPtr pConsoleW; if (mData->mSession.mLockType == LockType_VM) { LogFlowThisFunc(("Calling GetRemoteConsole()...\n")); rc = pSessionW->COMGETTER(RemoteConsole)(pConsoleW.asOutParam()); LogFlowThisFunc(("GetRemoteConsole() returned %08X\n", rc)); if (FAILED(rc)) // the failure may occur w/o any error info (from RPC), so provide one return setError(VBOX_E_VM_ERROR, tr("Failed to get a console object from the direct session (%Rhrc)"), rc); ComAssertRet(!pConsoleW.isNull(), E_FAIL); } // share the session machine and W's console with the caller's session LogFlowThisFunc(("Calling AssignRemoteMachine()...\n")); rc = pSessionControl->AssignRemoteMachine(pSessionMachine, pConsoleW); LogFlowThisFunc(("AssignRemoteMachine() returned %08X\n", rc)); if (FAILED(rc)) // the failure may occur w/o any error info (from RPC), so provide one return setError(VBOX_E_VM_ERROR, tr("Failed to assign the machine to the session (%Rhrc)"), rc); alock.acquire(); // need to revalidate the state after acquiring the lock again if (mData->mSession.mState != SessionState_Locked) { pSessionControl->Uninitialize(); return setError(VBOX_E_INVALID_SESSION_STATE, tr("The machine '%s' was unlocked unexpectedly while attempting to share its session"), mUserData->s.strName.c_str()); } // add the caller's session to the list mData->mSession.mRemoteControls.push_back(pSessionControl); } else if ( mData->mSession.mState == SessionState_Locked || mData->mSession.mState == SessionState_Unlocking ) { // sharing not permitted, or machine still unlocking: return setError(VBOX_E_INVALID_OBJECT_STATE, tr("The machine '%s' is already locked for a session (or being unlocked)"), mUserData->s.strName.c_str()); } else { // machine is not locked: then write-lock the machine (create the session machine) // must not be busy AssertReturn(!Global::IsOnlineOrTransient(mData->mMachineState), E_FAIL); // get the caller's session PID RTPROCESS pid = NIL_RTPROCESS; AssertCompile(sizeof(ULONG) == sizeof(RTPROCESS)); pSessionControl->COMGETTER(PID)((ULONG*)&pid); Assert(pid != NIL_RTPROCESS); bool fLaunchingVMProcess = (mData->mSession.mState == SessionState_Spawning); if (fLaunchingVMProcess) { if (mData->mSession.mPID == NIL_RTPROCESS) { // two or more clients racing for a lock, the one which set the // session state to Spawning will win, the others will get an // error as we can't decide here if waiting a little would help // (only for shared locks this would avoid an error) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("The machine '%s' already has a lock request pending"), mUserData->s.strName.c_str()); } // this machine is awaiting for a spawning session to be opened: // then the calling process must be the one that got started by // LaunchVMProcess() LogFlowThisFunc(("mSession.mPID=%d(0x%x)\n", mData->mSession.mPID, mData->mSession.mPID)); LogFlowThisFunc(("session.pid=%d(0x%x)\n", pid, pid)); #if defined(VBOX_WITH_HARDENING) && defined(RT_OS_WINDOWS) /* Hardened windows builds spawns three processes when a VM is launched, the 3rd one is the one that will end up here. */ RTPROCESS pidParent; int vrc = RTProcQueryParent(pid, &pidParent); if (RT_SUCCESS(vrc)) vrc = RTProcQueryParent(pidParent, &pidParent); if ( (RT_SUCCESS(vrc) && mData->mSession.mPID == pidParent) || vrc == VERR_ACCESS_DENIED) { LogFlowThisFunc(("mSession.mPID => %d(%#x) - windows hardening stub\n", mData->mSession.mPID, pid)); mData->mSession.mPID = pid; } #endif if (mData->mSession.mPID != pid) return setError(E_ACCESSDENIED, tr("An unexpected process (PID=0x%08X) has tried to lock the " "machine '%s', while only the process started by LaunchVMProcess (PID=0x%08X) is allowed"), pid, mUserData->s.strName.c_str(), mData->mSession.mPID); } // create the mutable SessionMachine from the current machine ComObjPtr sessionMachine; sessionMachine.createObject(); rc = sessionMachine->init(this); AssertComRC(rc); /* NOTE: doing return from this function after this point but * before the end is forbidden since it may call SessionMachine::uninit() * (through the ComObjPtr's destructor) which requests the VirtualBox write * lock while still holding the Machine lock in alock so that a deadlock * is possible due to the wrong lock order. */ if (SUCCEEDED(rc)) { /* * Set the session state to Spawning to protect against subsequent * attempts to open a session and to unregister the machine after * we release the lock. */ SessionState_T origState = mData->mSession.mState; mData->mSession.mState = SessionState_Spawning; #ifndef VBOX_WITH_GENERIC_SESSION_WATCHER /* Get the client token ID to be passed to the client process */ Utf8Str strTokenId; sessionMachine->i_getTokenId(strTokenId); Assert(!strTokenId.isEmpty()); #else /* VBOX_WITH_GENERIC_SESSION_WATCHER */ /* Get the client token to be passed to the client process */ ComPtr pToken(sessionMachine->i_getToken()); /* The token is now "owned" by pToken, fix refcount */ if (!pToken.isNull()) pToken->Release(); #endif /* VBOX_WITH_GENERIC_SESSION_WATCHER */ /* * Release the lock before calling the client process -- it will call * Machine/SessionMachine methods. Releasing the lock here is quite safe * because the state is Spawning, so that LaunchVMProcess() and * LockMachine() calls will fail. This method, called before we * acquire the lock again, will fail because of the wrong PID. * * Note that mData->mSession.mRemoteControls accessed outside * the lock may not be modified when state is Spawning, so it's safe. */ alock.release(); LogFlowThisFunc(("Calling AssignMachine()...\n")); #ifndef VBOX_WITH_GENERIC_SESSION_WATCHER rc = pSessionControl->AssignMachine(sessionMachine, aLockType, Bstr(strTokenId).raw()); #else /* VBOX_WITH_GENERIC_SESSION_WATCHER */ rc = pSessionControl->AssignMachine(sessionMachine, aLockType, pToken); /* Now the token is owned by the client process. */ pToken.setNull(); #endif /* VBOX_WITH_GENERIC_SESSION_WATCHER */ LogFlowThisFunc(("AssignMachine() returned %08X\n", rc)); /* The failure may occur w/o any error info (from RPC), so provide one */ if (FAILED(rc)) setError(VBOX_E_VM_ERROR, tr("Failed to assign the machine to the session (%Rhrc)"), rc); // get session name, either to remember or to compare against // the already known session name. { Bstr bstrSessionName; HRESULT rc2 = aSession->COMGETTER(Name)(bstrSessionName.asOutParam()); if (SUCCEEDED(rc2)) strSessionName = bstrSessionName; } if ( SUCCEEDED(rc) && fLaunchingVMProcess ) { /* complete the remote session initialization */ /* get the console from the direct session */ ComPtr console; rc = pSessionControl->COMGETTER(RemoteConsole)(console.asOutParam()); ComAssertComRC(rc); if (SUCCEEDED(rc) && !console) { ComAssert(!!console); rc = E_FAIL; } /* assign machine & console to the remote session */ if (SUCCEEDED(rc)) { /* * after LaunchVMProcess(), the first and the only * entry in remoteControls is that remote session */ LogFlowThisFunc(("Calling AssignRemoteMachine()...\n")); rc = mData->mSession.mRemoteControls.front()->AssignRemoteMachine(sessionMachine, console); LogFlowThisFunc(("AssignRemoteMachine() returned %08X\n", rc)); /* The failure may occur w/o any error info (from RPC), so provide one */ if (FAILED(rc)) setError(VBOX_E_VM_ERROR, tr("Failed to assign the machine to the remote session (%Rhrc)"), rc); } if (FAILED(rc)) pSessionControl->Uninitialize(); } /* acquire the lock again */ alock.acquire(); /* Restore the session state */ mData->mSession.mState = origState; } // finalize spawning anyway (this is why we don't return on errors above) if (fLaunchingVMProcess) { Assert(mData->mSession.mName == strSessionName || FAILED(rc)); /* Note that the progress object is finalized later */ /** @todo Consider checking mData->mSession.mProgress for cancellation * around here. */ /* We don't reset mSession.mPID here because it is necessary for * SessionMachine::uninit() to reap the child process later. */ if (FAILED(rc)) { /* Close the remote session, remove the remote control from the list * and reset session state to Closed (@note keep the code in sync * with the relevant part in checkForSpawnFailure()). */ Assert(mData->mSession.mRemoteControls.size() == 1); if (mData->mSession.mRemoteControls.size() == 1) { ErrorInfoKeeper eik; mData->mSession.mRemoteControls.front()->Uninitialize(); } mData->mSession.mRemoteControls.clear(); mData->mSession.mState = SessionState_Unlocked; } } else { /* memorize PID of the directly opened session */ if (SUCCEEDED(rc)) mData->mSession.mPID = pid; } if (SUCCEEDED(rc)) { mData->mSession.mLockType = aLockType; /* memorize the direct session control and cache IUnknown for it */ mData->mSession.mDirectControl = pSessionControl; mData->mSession.mState = SessionState_Locked; if (!fLaunchingVMProcess) mData->mSession.mName = strSessionName; /* associate the SessionMachine with this Machine */ mData->mSession.mMachine = sessionMachine; /* request an IUnknown pointer early from the remote party for later * identity checks (it will be internally cached within mDirectControl * at least on XPCOM) */ ComPtr unk = mData->mSession.mDirectControl; NOREF(unk); #ifdef VBOX_WITH_FULL_VM_ENCRYPTION if (aLockType == LockType_VM) { /* get the console from the direct session */ ComPtr console; rc = pSessionControl->COMGETTER(RemoteConsole)(console.asOutParam()); ComAssertComRC(rc); /* send passswords to console */ for (SecretKeyStore::SecretKeyMap::iterator it = mData->mpKeyStore->begin(); it != mData->mpKeyStore->end(); ++it) { SecretKey *pKey = it->second; pKey->retain(); console->AddEncryptionPassword(Bstr(it->first).raw(), Bstr((const char*)pKey->getKeyBuffer()).raw(), TRUE); pKey->release(); } } #endif } /* Release the lock since SessionMachine::uninit() locks VirtualBox which * would break the lock order */ alock.release(); /* uninitialize the created session machine on failure */ if (FAILED(rc)) sessionMachine->uninit(); } if (SUCCEEDED(rc)) { /* * tell the client watcher thread to update the set of * machines that have open sessions */ mParent->i_updateClientWatcher(); if (oldState != SessionState_Locked) /* fire an event */ mParent->i_onSessionStateChanged(i_getId(), SessionState_Locked); } return rc; } /** * @note Locks objects! */ HRESULT Machine::launchVMProcess(const ComPtr &aSession, const com::Utf8Str &aName, const std::vector &aEnvironmentChanges, ComPtr &aProgress) { Utf8Str strFrontend(aName); /* "emergencystop" doesn't need the session, so skip the checks/interface * retrieval. This code doesn't quite fit in here, but introducing a * special API method would be even more effort, and would require explicit * support by every API client. It's better to hide the feature a bit. */ if (strFrontend != "emergencystop") CheckComArgNotNull(aSession); HRESULT rc = S_OK; if (strFrontend.isEmpty()) { Bstr bstrFrontend; rc = COMGETTER(DefaultFrontend)(bstrFrontend.asOutParam()); if (FAILED(rc)) return rc; strFrontend = bstrFrontend; if (strFrontend.isEmpty()) { ComPtr systemProperties; rc = mParent->COMGETTER(SystemProperties)(systemProperties.asOutParam()); if (FAILED(rc)) return rc; rc = systemProperties->COMGETTER(DefaultFrontend)(bstrFrontend.asOutParam()); if (FAILED(rc)) return rc; strFrontend = bstrFrontend; } /* paranoia - emergencystop is not a valid default */ if (strFrontend == "emergencystop") strFrontend = Utf8Str::Empty; } /* default frontend: Qt GUI */ if (strFrontend.isEmpty()) strFrontend = "GUI/Qt"; if (strFrontend != "emergencystop") { /* check the session state */ SessionState_T state; rc = aSession->COMGETTER(State)(&state); if (FAILED(rc)) return rc; if (state != SessionState_Unlocked) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("The given session is busy")); /* get the IInternalSessionControl interface */ ComPtr control(aSession); ComAssertMsgRet(!control.isNull(), ("No IInternalSessionControl interface"), E_INVALIDARG); /* get the teleporter enable state for the progress object init. */ BOOL fTeleporterEnabled; rc = COMGETTER(TeleporterEnabled)(&fTeleporterEnabled); if (FAILED(rc)) return rc; /* create a progress object */ ComObjPtr progress; progress.createObject(); rc = progress->init(mParent, static_cast(this), Bstr(tr("Starting VM")).raw(), TRUE /* aCancelable */, fTeleporterEnabled ? 20 : 10 /* uTotalOperationsWeight */, BstrFmt(tr("Creating process for virtual machine \"%s\" (%s)"), mUserData->s.strName.c_str(), strFrontend.c_str()).raw(), 2 /* uFirstOperationWeight */, fTeleporterEnabled ? 3 : 1 /* cOtherProgressObjectOperations */); if (SUCCEEDED(rc)) { rc = i_launchVMProcess(control, strFrontend, aEnvironmentChanges, progress); if (SUCCEEDED(rc)) { aProgress = progress; /* signal the client watcher thread */ mParent->i_updateClientWatcher(); /* fire an event */ mParent->i_onSessionStateChanged(i_getId(), SessionState_Spawning); } } } else { /* no progress object - either instant success or failure */ aProgress = NULL; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mState != SessionState_Locked) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("The machine '%s' is not locked by a session"), mUserData->s.strName.c_str()); /* must have a VM process associated - do not kill normal API clients * with an open session */ if (!Global::IsOnline(mData->mMachineState)) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("The machine '%s' does not have a VM process"), mUserData->s.strName.c_str()); /* forcibly terminate the VM process */ if (mData->mSession.mPID != NIL_RTPROCESS) RTProcTerminate(mData->mSession.mPID); /* signal the client watcher thread, as most likely the client has * been terminated */ mParent->i_updateClientWatcher(); } return rc; } HRESULT Machine::setBootOrder(ULONG aPosition, DeviceType_T aDevice) { if (aPosition < 1 || aPosition > SchemaDefs::MaxBootPosition) return setError(E_INVALIDARG, tr("Invalid boot position: %lu (must be in range [1, %lu])"), aPosition, SchemaDefs::MaxBootPosition); if (aDevice == DeviceType_USB) return setError(E_NOTIMPL, tr("Booting from USB device is currently not supported")); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mBootOrder[aPosition - 1] = aDevice; return S_OK; } HRESULT Machine::getBootOrder(ULONG aPosition, DeviceType_T *aDevice) { if (aPosition < 1 || aPosition > SchemaDefs::MaxBootPosition) return setError(E_INVALIDARG, tr("Invalid boot position: %lu (must be in range [1, %lu])"), aPosition, SchemaDefs::MaxBootPosition); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aDevice = mHWData->mBootOrder[aPosition - 1]; return S_OK; } HRESULT Machine::attachDevice(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice, DeviceType_T aType, const ComPtr &aMedium) { IMedium *aM = aMedium; LogFlowThisFunc(("aControllerName=\"%s\" aControllerPort=%d aDevice=%d aType=%d aMedium=%p\n", aName.c_str(), aControllerPort, aDevice, aType, aM)); // request the host lock first, since might be calling Host methods for getting host drives; // next, protect the media tree all the while we're in here, as well as our member variables AutoMultiWriteLock2 alock(mParent->i_host(), this COMMA_LOCKVAL_SRC_POS); AutoWriteLock treeLock(&mParent->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; /// @todo NEWMEDIA implicit machine registration if (!mData->mRegistered) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("Cannot attach storage devices to an unregistered machine")); AssertReturn(mData->mMachineState != MachineState_Saved, E_FAIL); /* Check for an existing controller. */ ComObjPtr ctl; rc = i_getStorageControllerByName(aName, ctl, true /* aSetError */); if (FAILED(rc)) return rc; StorageControllerType_T ctrlType; rc = ctl->COMGETTER(ControllerType)(&ctrlType); if (FAILED(rc)) return setError(E_FAIL, tr("Could not get type of controller '%s'"), aName.c_str()); bool fSilent = false; /* Check whether the flag to allow silent storage attachment reconfiguration is set. */ Utf8Str const strReconfig = i_getExtraData(Utf8Str("VBoxInternal2/SilentReconfigureWhilePaused")); if ( mData->mMachineState == MachineState_Paused && strReconfig == "1") fSilent = true; /* Check that the controller can do hot-plugging if we attach the device while the VM is running. */ bool fHotplug = false; if (!fSilent && Global::IsOnlineOrTransient(mData->mMachineState)) fHotplug = true; if (fHotplug && !i_isControllerHotplugCapable(ctrlType)) return setError(VBOX_E_INVALID_VM_STATE, tr("Controller '%s' does not support hot-plugging"), aName.c_str()); // check that the port and device are not out of range rc = ctl->i_checkPortAndDeviceValid(aControllerPort, aDevice); if (FAILED(rc)) return rc; /* check if the device slot is already busy */ MediumAttachment *pAttachTemp = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); if (pAttachTemp) { Medium *pMedium = pAttachTemp->i_getMedium(); if (pMedium) { AutoReadLock mediumLock(pMedium COMMA_LOCKVAL_SRC_POS); return setError(VBOX_E_OBJECT_IN_USE, tr("Medium '%s' is already attached to port %d, device %d of controller '%s' of this virtual machine"), pMedium->i_getLocationFull().c_str(), aControllerPort, aDevice, aName.c_str()); } else return setError(VBOX_E_OBJECT_IN_USE, tr("Device is already attached to port %d, device %d of controller '%s' of this virtual machine"), aControllerPort, aDevice, aName.c_str()); } ComObjPtr medium = static_cast(aM); if (aMedium && medium.isNull()) return setError(E_INVALIDARG, tr("The given medium pointer is invalid")); AutoCaller mediumCaller(medium); if (FAILED(mediumCaller.rc())) return mediumCaller.rc(); AutoWriteLock mediumLock(medium COMMA_LOCKVAL_SRC_POS); pAttachTemp = i_findAttachment(*mMediumAttachments.data(), medium); if ( pAttachTemp && !medium.isNull() && ( medium->i_getType() != MediumType_Readonly || medium->i_getDeviceType() != DeviceType_DVD) ) return setError(VBOX_E_OBJECT_IN_USE, tr("Medium '%s' is already attached to this virtual machine"), medium->i_getLocationFull().c_str()); if (!medium.isNull()) { MediumType_T mtype = medium->i_getType(); // MediumType_Readonly is also new, but only applies to DVDs and floppies. // For DVDs it's not written to the config file, so needs no global config // version bump. For floppies it's a new attribute "type", which is ignored // by older VirtualBox version, so needs no global config version bump either. // For hard disks this type is not accepted. if (mtype == MediumType_MultiAttach) { // This type is new with VirtualBox 4.0 and therefore requires settings // version 1.11 in the settings backend. Unfortunately it is not enough to do // the usual routine in MachineConfigFile::bumpSettingsVersionIfNeeded() for // two reasons: The medium type is a property of the media registry tree, which // can reside in the global config file (for pre-4.0 media); we would therefore // possibly need to bump the global config version. We don't want to do that though // because that might make downgrading to pre-4.0 impossible. // As a result, we can only use these two new types if the medium is NOT in the // global registry: const Guid &uuidGlobalRegistry = mParent->i_getGlobalRegistryId(); if ( medium->i_isInRegistry(uuidGlobalRegistry) || !mData->pMachineConfigFile->canHaveOwnMediaRegistry() ) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("Cannot attach medium '%s': the media type 'MultiAttach' can only be attached " "to machines that were created with VirtualBox 4.0 or later"), medium->i_getLocationFull().c_str()); } } bool fIndirect = false; if (!medium.isNull()) fIndirect = medium->i_isReadOnly(); bool associate = true; do { if ( aType == DeviceType_HardDisk && mMediumAttachments.isBackedUp()) { const MediumAttachmentList &oldAtts = *mMediumAttachments.backedUpData(); /* check if the medium was attached to the VM before we started * changing attachments in which case the attachment just needs to * be restored */ pAttachTemp = i_findAttachment(oldAtts, medium); if (pAttachTemp) { AssertReturn(!fIndirect, E_FAIL); /* see if it's the same bus/channel/device */ if (pAttachTemp->i_matches(aName, aControllerPort, aDevice)) { /* the simplest case: restore the whole attachment * and return, nothing else to do */ mMediumAttachments->push_back(pAttachTemp); /* Reattach the medium to the VM. */ if (fHotplug || fSilent) { mediumLock.release(); treeLock.release(); alock.release(); MediumLockList *pMediumLockList(new MediumLockList()); rc = medium->i_createMediumLockList(true /* fFailIfInaccessible */, medium /* pToLockWrite */, false /* fMediumLockWriteAll */, NULL, *pMediumLockList); alock.acquire(); if (FAILED(rc)) delete pMediumLockList; else { Assert(mData->mSession.mLockedMedia.IsLocked()); mData->mSession.mLockedMedia.Unlock(); alock.release(); rc = mData->mSession.mLockedMedia.Insert(pAttachTemp, pMediumLockList); mData->mSession.mLockedMedia.Lock(); alock.acquire(); } alock.release(); if (SUCCEEDED(rc)) { rc = i_onStorageDeviceChange(pAttachTemp, FALSE /* aRemove */, fSilent); /* Remove lock list in case of error. */ if (FAILED(rc)) { mData->mSession.mLockedMedia.Unlock(); mData->mSession.mLockedMedia.Remove(pAttachTemp); mData->mSession.mLockedMedia.Lock(); } } } return S_OK; } /* bus/channel/device differ; we need a new attachment object, * but don't try to associate it again */ associate = false; break; } } /* go further only if the attachment is to be indirect */ if (!fIndirect) break; /* perform the so called smart attachment logic for indirect * attachments. Note that smart attachment is only applicable to base * hard disks. */ if (medium->i_getParent().isNull()) { /* first, investigate the backup copy of the current hard disk * attachments to make it possible to re-attach existing diffs to * another device slot w/o losing their contents */ if (mMediumAttachments.isBackedUp()) { const MediumAttachmentList &oldAtts = *mMediumAttachments.backedUpData(); MediumAttachmentList::const_iterator foundIt = oldAtts.end(); uint32_t foundLevel = 0; for (MediumAttachmentList::const_iterator it = oldAtts.begin(); it != oldAtts.end(); ++it) { uint32_t level = 0; MediumAttachment *pAttach = *it; ComObjPtr pMedium = pAttach->i_getMedium(); Assert(!pMedium.isNull() || pAttach->i_getType() != DeviceType_HardDisk); if (pMedium.isNull()) continue; if (pMedium->i_getBase(&level) == medium) { /* skip the hard disk if its currently attached (we * cannot attach the same hard disk twice) */ if (i_findAttachment(*mMediumAttachments.data(), pMedium)) continue; /* matched device, channel and bus (i.e. attached to the * same place) will win and immediately stop the search; * otherwise the attachment that has the youngest * descendant of medium will be used */ if (pAttach->i_matches(aName, aControllerPort, aDevice)) { /* the simplest case: restore the whole attachment * and return, nothing else to do */ mMediumAttachments->push_back(*it); /* Reattach the medium to the VM. */ if (fHotplug || fSilent) { mediumLock.release(); treeLock.release(); alock.release(); MediumLockList *pMediumLockList(new MediumLockList()); rc = medium->i_createMediumLockList(true /* fFailIfInaccessible */, medium /* pToLockWrite */, false /* fMediumLockWriteAll */, NULL, *pMediumLockList); alock.acquire(); if (FAILED(rc)) delete pMediumLockList; else { Assert(mData->mSession.mLockedMedia.IsLocked()); mData->mSession.mLockedMedia.Unlock(); alock.release(); rc = mData->mSession.mLockedMedia.Insert(pAttachTemp, pMediumLockList); mData->mSession.mLockedMedia.Lock(); alock.acquire(); } alock.release(); if (SUCCEEDED(rc)) { rc = i_onStorageDeviceChange(pAttachTemp, FALSE /* aRemove */, fSilent); /* Remove lock list in case of error. */ if (FAILED(rc)) { mData->mSession.mLockedMedia.Unlock(); mData->mSession.mLockedMedia.Remove(pAttachTemp); mData->mSession.mLockedMedia.Lock(); } } } return S_OK; } else if ( foundIt == oldAtts.end() || level > foundLevel /* prefer younger */ ) { foundIt = it; foundLevel = level; } } } if (foundIt != oldAtts.end()) { /* use the previously attached hard disk */ medium = (*foundIt)->i_getMedium(); mediumCaller.attach(medium); if (FAILED(mediumCaller.rc())) return mediumCaller.rc(); mediumLock.attach(medium); /* not implicit, doesn't require association with this VM */ fIndirect = false; associate = false; /* go right to the MediumAttachment creation */ break; } } /* must give up the medium lock and medium tree lock as below we * go over snapshots, which needs a lock with higher lock order. */ mediumLock.release(); treeLock.release(); /* then, search through snapshots for the best diff in the given * hard disk's chain to base the new diff on */ ComObjPtr base; ComObjPtr snap = mData->mCurrentSnapshot; while (snap) { AutoReadLock snapLock(snap COMMA_LOCKVAL_SRC_POS); const MediumAttachmentList &snapAtts = *snap->i_getSnapshotMachine()->mMediumAttachments.data(); MediumAttachment *pAttachFound = NULL; uint32_t foundLevel = 0; for (MediumAttachmentList::const_iterator it = snapAtts.begin(); it != snapAtts.end(); ++it) { MediumAttachment *pAttach = *it; ComObjPtr pMedium = pAttach->i_getMedium(); Assert(!pMedium.isNull() || pAttach->i_getType() != DeviceType_HardDisk); if (pMedium.isNull()) continue; uint32_t level = 0; if (pMedium->i_getBase(&level) == medium) { /* matched device, channel and bus (i.e. attached to the * same place) will win and immediately stop the search; * otherwise the attachment that has the youngest * descendant of medium will be used */ if ( pAttach->i_getDevice() == aDevice && pAttach->i_getPort() == aControllerPort && pAttach->i_getControllerName() == aName ) { pAttachFound = pAttach; break; } else if ( !pAttachFound || level > foundLevel /* prefer younger */ ) { pAttachFound = pAttach; foundLevel = level; } } } if (pAttachFound) { base = pAttachFound->i_getMedium(); break; } snap = snap->i_getParent(); } /* re-lock medium tree and the medium, as we need it below */ treeLock.acquire(); mediumLock.acquire(); /* found a suitable diff, use it as a base */ if (!base.isNull()) { medium = base; mediumCaller.attach(medium); if (FAILED(mediumCaller.rc())) return mediumCaller.rc(); mediumLock.attach(medium); } } Utf8Str strFullSnapshotFolder; i_calculateFullPath(mUserData->s.strSnapshotFolder, strFullSnapshotFolder); ComObjPtr diff; diff.createObject(); // store this diff in the same registry as the parent Guid uuidRegistryParent; if (!medium->i_getFirstRegistryMachineId(uuidRegistryParent)) { // parent image has no registry: this can happen if we're attaching a new immutable // image that has not yet been attached (medium then points to the base and we're // creating the diff image for the immutable, and the parent is not yet registered); // put the parent in the machine registry then mediumLock.release(); treeLock.release(); alock.release(); i_addMediumToRegistry(medium); alock.acquire(); treeLock.acquire(); mediumLock.acquire(); medium->i_getFirstRegistryMachineId(uuidRegistryParent); } rc = diff->init(mParent, medium->i_getPreferredDiffFormat(), strFullSnapshotFolder.append(RTPATH_SLASH_STR), uuidRegistryParent, DeviceType_HardDisk); if (FAILED(rc)) return rc; /* Apply the normal locking logic to the entire chain. */ MediumLockList *pMediumLockList(new MediumLockList()); mediumLock.release(); treeLock.release(); rc = diff->i_createMediumLockList(true /* fFailIfInaccessible */, diff /* pToLockWrite */, false /* fMediumLockWriteAll */, medium, *pMediumLockList); treeLock.acquire(); mediumLock.acquire(); if (SUCCEEDED(rc)) { mediumLock.release(); treeLock.release(); rc = pMediumLockList->Lock(); treeLock.acquire(); mediumLock.acquire(); if (FAILED(rc)) setError(rc, tr("Could not lock medium when creating diff '%s'"), diff->i_getLocationFull().c_str()); else { /* will release the lock before the potentially lengthy * operation, so protect with the special state */ MachineState_T oldState = mData->mMachineState; i_setMachineState(MachineState_SettingUp); mediumLock.release(); treeLock.release(); alock.release(); rc = medium->i_createDiffStorage(diff, medium->i_getPreferredDiffVariant(), pMediumLockList, NULL /* aProgress */, true /* aWait */, false /* aNotify */); alock.acquire(); treeLock.acquire(); mediumLock.acquire(); i_setMachineState(oldState); } } /* Unlock the media and free the associated memory. */ delete pMediumLockList; if (FAILED(rc)) return rc; /* use the created diff for the actual attachment */ medium = diff; mediumCaller.attach(medium); if (FAILED(mediumCaller.rc())) return mediumCaller.rc(); mediumLock.attach(medium); } while (0); ComObjPtr attachment; attachment.createObject(); rc = attachment->init(this, medium, aName, aControllerPort, aDevice, aType, fIndirect, false /* fPassthrough */, false /* fTempEject */, false /* fNonRotational */, false /* fDiscard */, fHotplug || ctrlType == StorageControllerType_USB /* fHotPluggable */, Utf8Str::Empty); if (FAILED(rc)) return rc; if (associate && !medium.isNull()) { // as the last step, associate the medium to the VM rc = medium->i_addBackReference(mData->mUuid); // here we can fail because of Deleting, or being in process of creating a Diff if (FAILED(rc)) return rc; mediumLock.release(); treeLock.release(); alock.release(); i_addMediumToRegistry(medium); alock.acquire(); treeLock.acquire(); mediumLock.acquire(); } /* success: finally remember the attachment */ i_setModified(IsModified_Storage); mMediumAttachments.backup(); mMediumAttachments->push_back(attachment); mediumLock.release(); treeLock.release(); alock.release(); if (fHotplug || fSilent) { if (!medium.isNull()) { MediumLockList *pMediumLockList(new MediumLockList()); rc = medium->i_createMediumLockList(true /* fFailIfInaccessible */, medium /* pToLockWrite */, false /* fMediumLockWriteAll */, NULL, *pMediumLockList); alock.acquire(); if (FAILED(rc)) delete pMediumLockList; else { Assert(mData->mSession.mLockedMedia.IsLocked()); mData->mSession.mLockedMedia.Unlock(); alock.release(); rc = mData->mSession.mLockedMedia.Insert(attachment, pMediumLockList); mData->mSession.mLockedMedia.Lock(); alock.acquire(); } alock.release(); } if (SUCCEEDED(rc)) { rc = i_onStorageDeviceChange(attachment, FALSE /* aRemove */, fSilent); /* Remove lock list in case of error. */ if (FAILED(rc)) { mData->mSession.mLockedMedia.Unlock(); mData->mSession.mLockedMedia.Remove(attachment); mData->mSession.mLockedMedia.Lock(); } } } /* Save modified registries, but skip this machine as it's the caller's * job to save its settings like all other settings changes. */ mParent->i_unmarkRegistryModified(i_getId()); mParent->i_saveModifiedRegistries(); if (SUCCEEDED(rc)) { if (fIndirect && medium != aM) mParent->i_onMediumConfigChanged(medium); mParent->i_onStorageDeviceChanged(attachment, FALSE, fSilent); } return rc; } HRESULT Machine::detachDevice(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice) { LogFlowThisFunc(("aControllerName=\"%s\" aControllerPort=%d aDevice=%d\n", aName.c_str(), aControllerPort, aDevice)); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; AssertReturn(mData->mMachineState != MachineState_Saved, E_FAIL); /* Check for an existing controller. */ ComObjPtr ctl; rc = i_getStorageControllerByName(aName, ctl, true /* aSetError */); if (FAILED(rc)) return rc; StorageControllerType_T ctrlType; rc = ctl->COMGETTER(ControllerType)(&ctrlType); if (FAILED(rc)) return setError(E_FAIL, tr("Could not get type of controller '%s'"), aName.c_str()); bool fSilent = false; Utf8Str strReconfig; /* Check whether the flag to allow silent storage attachment reconfiguration is set. */ strReconfig = i_getExtraData(Utf8Str("VBoxInternal2/SilentReconfigureWhilePaused")); if ( mData->mMachineState == MachineState_Paused && strReconfig == "1") fSilent = true; /* Check that the controller can do hot-plugging if we detach the device while the VM is running. */ bool fHotplug = false; if (!fSilent && Global::IsOnlineOrTransient(mData->mMachineState)) fHotplug = true; if (fHotplug && !i_isControllerHotplugCapable(ctrlType)) return setError(VBOX_E_INVALID_VM_STATE, tr("Controller '%s' does not support hot-plugging"), aName.c_str()); MediumAttachment *pAttach = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); if (!pAttach) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("No storage device attached to device slot %d on port %d of controller '%s'"), aDevice, aControllerPort, aName.c_str()); if (fHotplug && !pAttach->i_getHotPluggable()) return setError(VBOX_E_NOT_SUPPORTED, tr("The device slot %d on port %d of controller '%s' does not support hot-plugging"), aDevice, aControllerPort, aName.c_str()); /* * The VM has to detach the device before we delete any implicit diffs. * If this fails we can roll back without loosing data. */ if (fHotplug || fSilent) { alock.release(); rc = i_onStorageDeviceChange(pAttach, TRUE /* aRemove */, fSilent); alock.acquire(); } if (FAILED(rc)) return rc; /* If we are here everything went well and we can delete the implicit now. */ rc = i_detachDevice(pAttach, alock, NULL /* pSnapshot */); alock.release(); /* Save modified registries, but skip this machine as it's the caller's * job to save its settings like all other settings changes. */ mParent->i_unmarkRegistryModified(i_getId()); mParent->i_saveModifiedRegistries(); if (SUCCEEDED(rc)) mParent->i_onStorageDeviceChanged(pAttach, TRUE, fSilent); return rc; } HRESULT Machine::passthroughDevice(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice, BOOL aPassthrough) { LogFlowThisFunc(("aName=\"%s\" aControllerPort=%d aDevice=%d aPassthrough=%d\n", aName.c_str(), aControllerPort, aDevice, aPassthrough)); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; AssertReturn(mData->mMachineState != MachineState_Saved, E_FAIL); /* Check for an existing controller. */ ComObjPtr ctl; rc = i_getStorageControllerByName(aName, ctl, true /* aSetError */); if (FAILED(rc)) return rc; StorageControllerType_T ctrlType; rc = ctl->COMGETTER(ControllerType)(&ctrlType); if (FAILED(rc)) return setError(E_FAIL, tr("Could not get type of controller '%s'"), aName.c_str()); bool fSilent = false; Utf8Str strReconfig; /* Check whether the flag to allow silent storage attachment reconfiguration is set. */ strReconfig = i_getExtraData(Utf8Str("VBoxInternal2/SilentReconfigureWhilePaused")); if ( mData->mMachineState == MachineState_Paused && strReconfig == "1") fSilent = true; /* Check that the controller can do hot-plugging if we detach the device while the VM is running. */ bool fHotplug = false; if (!fSilent && Global::IsOnlineOrTransient(mData->mMachineState)) fHotplug = true; if (fHotplug && !i_isControllerHotplugCapable(ctrlType)) return setError(VBOX_E_INVALID_VM_STATE, tr("Controller '%s' does not support hot-plugging which is required to change the passthrough setting while the VM is running"), aName.c_str()); MediumAttachment *pAttach = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); if (!pAttach) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("No storage device attached to device slot %d on port %d of controller '%s'"), aDevice, aControllerPort, aName.c_str()); i_setModified(IsModified_Storage); mMediumAttachments.backup(); AutoWriteLock attLock(pAttach COMMA_LOCKVAL_SRC_POS); if (pAttach->i_getType() != DeviceType_DVD) return setError(E_INVALIDARG, tr("Setting passthrough rejected as the device attached to device slot %d on port %d of controller '%s' is not a DVD"), aDevice, aControllerPort, aName.c_str()); bool fValueChanged = pAttach->i_getPassthrough() != (aPassthrough != 0); pAttach->i_updatePassthrough(!!aPassthrough); attLock.release(); alock.release(); rc = i_onStorageDeviceChange(pAttach, FALSE /* aRemove */, FALSE /* aSilent */); if (SUCCEEDED(rc) && fValueChanged) mParent->i_onStorageDeviceChanged(pAttach, FALSE, FALSE); return rc; } HRESULT Machine::temporaryEjectDevice(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice, BOOL aTemporaryEject) { LogFlowThisFunc(("aName=\"%s\" aControllerPort=%d aDevice=%d aTemporaryEject=%d\n", aName.c_str(), aControllerPort, aDevice, aTemporaryEject)); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrSavedOrRunningStateDep); if (FAILED(rc)) return rc; MediumAttachment *pAttach = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); if (!pAttach) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("No storage device attached to device slot %d on port %d of controller '%s'"), aDevice, aControllerPort, aName.c_str()); i_setModified(IsModified_Storage); mMediumAttachments.backup(); AutoWriteLock attLock(pAttach COMMA_LOCKVAL_SRC_POS); if (pAttach->i_getType() != DeviceType_DVD) return setError(E_INVALIDARG, tr("Setting temporary eject flag rejected as the device attached to device slot %d on port %d of controller '%s' is not a DVD"), aDevice, aControllerPort, aName.c_str()); pAttach->i_updateTempEject(!!aTemporaryEject); return S_OK; } HRESULT Machine::nonRotationalDevice(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice, BOOL aNonRotational) { LogFlowThisFunc(("aName=\"%s\" aControllerPort=%d aDevice=%d aNonRotational=%d\n", aName.c_str(), aControllerPort, aDevice, aNonRotational)); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; AssertReturn(mData->mMachineState != MachineState_Saved, E_FAIL); if (Global::IsOnlineOrTransient(mData->mMachineState)) return setError(VBOX_E_INVALID_VM_STATE, tr("Invalid machine state: %s"), Global::stringifyMachineState(mData->mMachineState)); MediumAttachment *pAttach = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); if (!pAttach) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("No storage device attached to device slot %d on port %d of controller '%s'"), aDevice, aControllerPort, aName.c_str()); i_setModified(IsModified_Storage); mMediumAttachments.backup(); AutoWriteLock attLock(pAttach COMMA_LOCKVAL_SRC_POS); if (pAttach->i_getType() != DeviceType_HardDisk) return setError(E_INVALIDARG, tr("Setting the non-rotational medium flag rejected as the device attached to device slot %d on port %d of controller '%s' is not a hard disk"), aDevice, aControllerPort, aName.c_str()); pAttach->i_updateNonRotational(!!aNonRotational); return S_OK; } HRESULT Machine::setAutoDiscardForDevice(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice, BOOL aDiscard) { LogFlowThisFunc(("aName=\"%s\" aControllerPort=%d aDevice=%d aDiscard=%d\n", aName.c_str(), aControllerPort, aDevice, aDiscard)); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; AssertReturn(mData->mMachineState != MachineState_Saved, E_FAIL); if (Global::IsOnlineOrTransient(mData->mMachineState)) return setError(VBOX_E_INVALID_VM_STATE, tr("Invalid machine state: %s"), Global::stringifyMachineState(mData->mMachineState)); MediumAttachment *pAttach = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); if (!pAttach) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("No storage device attached to device slot %d on port %d of controller '%s'"), aDevice, aControllerPort, aName.c_str()); i_setModified(IsModified_Storage); mMediumAttachments.backup(); AutoWriteLock attLock(pAttach COMMA_LOCKVAL_SRC_POS); if (pAttach->i_getType() != DeviceType_HardDisk) return setError(E_INVALIDARG, tr("Setting the discard medium flag rejected as the device attached to device slot %d on port %d of controller '%s' is not a hard disk"), aDevice, aControllerPort, aName.c_str()); pAttach->i_updateDiscard(!!aDiscard); return S_OK; } HRESULT Machine::setHotPluggableForDevice(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice, BOOL aHotPluggable) { LogFlowThisFunc(("aName=\"%s\" aControllerPort=%d aDevice=%d aHotPluggable=%d\n", aName.c_str(), aControllerPort, aDevice, aHotPluggable)); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; AssertReturn(mData->mMachineState != MachineState_Saved, E_FAIL); if (Global::IsOnlineOrTransient(mData->mMachineState)) return setError(VBOX_E_INVALID_VM_STATE, tr("Invalid machine state: %s"), Global::stringifyMachineState(mData->mMachineState)); MediumAttachment *pAttach = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); if (!pAttach) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("No storage device attached to device slot %d on port %d of controller '%s'"), aDevice, aControllerPort, aName.c_str()); /* Check for an existing controller. */ ComObjPtr ctl; rc = i_getStorageControllerByName(aName, ctl, true /* aSetError */); if (FAILED(rc)) return rc; StorageControllerType_T ctrlType; rc = ctl->COMGETTER(ControllerType)(&ctrlType); if (FAILED(rc)) return setError(E_FAIL, tr("Could not get type of controller '%s'"), aName.c_str()); if (!i_isControllerHotplugCapable(ctrlType)) return setError(VBOX_E_NOT_SUPPORTED, tr("Controller '%s' does not support changing the hot-pluggable device flag"), aName.c_str()); /* silently ignore attempts to modify the hot-plug status of USB devices */ if (ctrlType == StorageControllerType_USB) return S_OK; i_setModified(IsModified_Storage); mMediumAttachments.backup(); AutoWriteLock attLock(pAttach COMMA_LOCKVAL_SRC_POS); if (pAttach->i_getType() == DeviceType_Floppy) return setError(E_INVALIDARG, tr("Setting the hot-pluggable device flag rejected as the device attached to device slot %d on port %d of controller '%s' is a floppy drive"), aDevice, aControllerPort, aName.c_str()); pAttach->i_updateHotPluggable(!!aHotPluggable); return S_OK; } HRESULT Machine::setNoBandwidthGroupForDevice(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice) { LogFlowThisFunc(("aName=\"%s\" aControllerPort=%d aDevice=%d\n", aName.c_str(), aControllerPort, aDevice)); return setBandwidthGroupForDevice(aName, aControllerPort, aDevice, NULL); } HRESULT Machine::setBandwidthGroupForDevice(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice, const ComPtr &aBandwidthGroup) { LogFlowThisFunc(("aName=\"%s\" aControllerPort=%d aDevice=%d\n", aName.c_str(), aControllerPort, aDevice)); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrSavedStateDep); if (FAILED(rc)) return rc; if (Global::IsOnlineOrTransient(mData->mMachineState)) return setError(VBOX_E_INVALID_VM_STATE, tr("Invalid machine state: %s"), Global::stringifyMachineState(mData->mMachineState)); MediumAttachment *pAttach = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); if (!pAttach) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("No storage device attached to device slot %d on port %d of controller '%s'"), aDevice, aControllerPort, aName.c_str()); i_setModified(IsModified_Storage); mMediumAttachments.backup(); IBandwidthGroup *iB = aBandwidthGroup; ComObjPtr group = static_cast(iB); if (aBandwidthGroup && group.isNull()) return setError(E_INVALIDARG, tr("The given bandwidth group pointer is invalid")); AutoWriteLock attLock(pAttach COMMA_LOCKVAL_SRC_POS); const Utf8Str strBandwidthGroupOld = pAttach->i_getBandwidthGroup(); if (strBandwidthGroupOld.isNotEmpty()) { /* Get the bandwidth group object and release it - this must not fail. */ ComObjPtr pBandwidthGroupOld; rc = i_getBandwidthGroup(strBandwidthGroupOld, pBandwidthGroupOld, false); Assert(SUCCEEDED(rc)); pBandwidthGroupOld->i_release(); pAttach->i_updateBandwidthGroup(Utf8Str::Empty); } if (!group.isNull()) { group->i_reference(); pAttach->i_updateBandwidthGroup(group->i_getName()); } return S_OK; } HRESULT Machine::attachDeviceWithoutMedium(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice, DeviceType_T aType) { LogFlowThisFunc(("aName=\"%s\" aControllerPort=%d aDevice=%d aType=%d\n", aName.c_str(), aControllerPort, aDevice, aType)); return attachDevice(aName, aControllerPort, aDevice, aType, NULL); } HRESULT Machine::unmountMedium(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice, BOOL aForce) { LogFlowThisFunc(("aName=\"%s\" aControllerPort=%d aDevice=%d", aName.c_str(), aControllerPort, aForce)); return mountMedium(aName, aControllerPort, aDevice, NULL, aForce); } HRESULT Machine::mountMedium(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice, const ComPtr &aMedium, BOOL aForce) { LogFlowThisFunc(("aName=\"%s\" aControllerPort=%d aDevice=%d aForce=%d\n", aName.c_str(), aControllerPort, aDevice, aForce)); // request the host lock first, since might be calling Host methods for getting host drives; // next, protect the media tree all the while we're in here, as well as our member variables AutoMultiWriteLock3 multiLock(mParent->i_host()->lockHandle(), this->lockHandle(), &mParent->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(hrc)) return hrc; ComObjPtr pAttach = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); if (pAttach.isNull()) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("No drive attached to device slot %d on port %d of controller '%s'"), aDevice, aControllerPort, aName.c_str()); /* Remember previously mounted medium. The medium before taking the * backup is not necessarily the same thing. */ ComObjPtr oldmedium; oldmedium = pAttach->i_getMedium(); IMedium *iM = aMedium; ComObjPtr pMedium = static_cast(iM); if (aMedium && pMedium.isNull()) return setError(E_INVALIDARG, tr("The given medium pointer is invalid")); /* Check if potential medium is already mounted */ if (pMedium == oldmedium) return S_OK; AutoCaller mediumCaller(pMedium); if (FAILED(mediumCaller.rc())) return mediumCaller.rc(); AutoWriteLock mediumLock(pMedium COMMA_LOCKVAL_SRC_POS); if (pMedium) { DeviceType_T mediumType = pAttach->i_getType(); switch (mediumType) { case DeviceType_DVD: case DeviceType_Floppy: break; default: return setError(VBOX_E_INVALID_OBJECT_STATE, tr("The device at port %d, device %d of controller '%s' of this virtual machine is not removeable"), aControllerPort, aDevice, aName.c_str()); } } i_setModified(IsModified_Storage); mMediumAttachments.backup(); { // The backup operation makes the pAttach reference point to the // old settings. Re-get the correct reference. pAttach = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); if (!oldmedium.isNull()) oldmedium->i_removeBackReference(mData->mUuid); if (!pMedium.isNull()) { pMedium->i_addBackReference(mData->mUuid); mediumLock.release(); multiLock.release(); i_addMediumToRegistry(pMedium); multiLock.acquire(); mediumLock.acquire(); } AutoWriteLock attLock(pAttach COMMA_LOCKVAL_SRC_POS); pAttach->i_updateMedium(pMedium); } i_setModified(IsModified_Storage); mediumLock.release(); multiLock.release(); HRESULT rc = i_onMediumChange(pAttach, aForce); multiLock.acquire(); mediumLock.acquire(); /* On error roll back this change only. */ if (FAILED(rc)) { if (!pMedium.isNull()) pMedium->i_removeBackReference(mData->mUuid); pAttach = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); /* If the attachment is gone in the meantime, bail out. */ if (pAttach.isNull()) return rc; AutoWriteLock attLock(pAttach COMMA_LOCKVAL_SRC_POS); if (!oldmedium.isNull()) oldmedium->i_addBackReference(mData->mUuid); pAttach->i_updateMedium(oldmedium); } mediumLock.release(); multiLock.release(); /* Save modified registries, but skip this machine as it's the caller's * job to save its settings like all other settings changes. */ mParent->i_unmarkRegistryModified(i_getId()); mParent->i_saveModifiedRegistries(); return rc; } HRESULT Machine::getMedium(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice, ComPtr &aMedium) { LogFlowThisFunc(("aName=\"%s\" aControllerPort=%d aDevice=%d\n", aName.c_str(), aControllerPort, aDevice)); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aMedium = NULL; ComObjPtr pAttach = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); if (pAttach.isNull()) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("No storage device attached to device slot %d on port %d of controller '%s'"), aDevice, aControllerPort, aName.c_str()); aMedium = pAttach->i_getMedium(); return S_OK; } HRESULT Machine::getSerialPort(ULONG aSlot, ComPtr &aPort) { if (aSlot < RT_ELEMENTS(mSerialPorts)) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); mSerialPorts[aSlot].queryInterfaceTo(aPort.asOutParam()); return S_OK; } return setError(E_INVALIDARG, tr("Serial port slot %RU32 is out of bounds (max %zu)"), aSlot, RT_ELEMENTS(mSerialPorts)); } HRESULT Machine::getParallelPort(ULONG aSlot, ComPtr &aPort) { if (aSlot < RT_ELEMENTS(mParallelPorts)) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); mParallelPorts[aSlot].queryInterfaceTo(aPort.asOutParam()); return S_OK; } return setError(E_INVALIDARG, tr("Parallel port slot %RU32 is out of bounds (max %zu)"), aSlot, RT_ELEMENTS(mParallelPorts)); } HRESULT Machine::getNetworkAdapter(ULONG aSlot, ComPtr &aAdapter) { /* Do not assert if slot is out of range, just return the advertised status. testdriver/vbox.py triggers this in logVmInfo. */ if (aSlot >= mNetworkAdapters.size()) return setError(E_INVALIDARG, tr("No network adapter in slot %RU32 (total %RU32 adapters)", "", mNetworkAdapters.size()), aSlot, mNetworkAdapters.size()); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); mNetworkAdapters[aSlot].queryInterfaceTo(aAdapter.asOutParam()); return S_OK; } HRESULT Machine::getExtraDataKeys(std::vector &aKeys) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aKeys.resize(mData->pMachineConfigFile->mapExtraDataItems.size()); size_t i = 0; for (settings::StringsMap::const_iterator it = mData->pMachineConfigFile->mapExtraDataItems.begin(); it != mData->pMachineConfigFile->mapExtraDataItems.end(); ++it, ++i) aKeys[i] = it->first; return S_OK; } /** * @note Locks this object for reading. */ HRESULT Machine::getExtraData(const com::Utf8Str &aKey, com::Utf8Str &aValue) { /* start with nothing found */ aValue = ""; AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); settings::StringsMap::const_iterator it = mData->pMachineConfigFile->mapExtraDataItems.find(aKey); if (it != mData->pMachineConfigFile->mapExtraDataItems.end()) // found: aValue = it->second; // source is a Utf8Str /* return the result to caller (may be empty) */ return S_OK; } /** * @note Locks mParent for writing + this object for writing. */ HRESULT Machine::setExtraData(const com::Utf8Str &aKey, const com::Utf8Str &aValue) { /* Because control characters in aKey have caused problems in the settings * they are rejected unless the key should be deleted. */ if (!aValue.isEmpty()) { for (size_t i = 0; i < aKey.length(); ++i) { char ch = aKey[i]; if (RTLocCIsCntrl(ch)) return E_INVALIDARG; } } Utf8Str strOldValue; // empty // locking note: we only hold the read lock briefly to look up the old value, // then release it and call the onExtraCanChange callbacks. There is a small // chance of a race insofar as the callback might be called twice if two callers // change the same key at the same time, but that's a much better solution // than the deadlock we had here before. The actual changing of the extradata // is then performed under the write lock and race-free. // look up the old value first; if nothing has changed then we need not do anything { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); // hold read lock only while looking up // For snapshots don't even think about allowing changes, extradata // is global for a machine, so there is nothing snapshot specific. if (i_isSnapshotMachine()) return setError(VBOX_E_INVALID_VM_STATE, tr("Cannot set extradata for a snapshot")); // check if the right IMachine instance is used if (mData->mRegistered && !i_isSessionMachine()) return setError(VBOX_E_INVALID_VM_STATE, tr("Cannot set extradata for an immutable machine")); settings::StringsMap::const_iterator it = mData->pMachineConfigFile->mapExtraDataItems.find(aKey); if (it != mData->pMachineConfigFile->mapExtraDataItems.end()) strOldValue = it->second; } bool fChanged; if ((fChanged = (strOldValue != aValue))) { // ask for permission from all listeners outside the locks; // i_onExtraDataCanChange() only briefly requests the VirtualBox // lock to copy the list of callbacks to invoke Bstr bstrError; if (!mParent->i_onExtraDataCanChange(mData->mUuid, aKey, aValue, bstrError)) { const char *sep = bstrError.isEmpty() ? "" : ": "; Log1WarningFunc(("Someone vetoed! Change refused%s%ls\n", sep, bstrError.raw())); return setError(E_ACCESSDENIED, tr("Could not set extra data because someone refused the requested change of '%s' to '%s'%s%ls"), aKey.c_str(), aValue.c_str(), sep, bstrError.raw()); } // data is changing and change not vetoed: then write it out under the lock AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (aValue.isEmpty()) mData->pMachineConfigFile->mapExtraDataItems.erase(aKey); else mData->pMachineConfigFile->mapExtraDataItems[aKey] = aValue; // creates a new key if needed bool fNeedsGlobalSaveSettings = false; // This saving of settings is tricky: there is no "old state" for the // extradata items at all (unlike all other settings), so the old/new // settings comparison would give a wrong result! i_saveSettings(&fNeedsGlobalSaveSettings, alock, SaveS_Force); if (fNeedsGlobalSaveSettings) { // save the global settings; for that we should hold only the VirtualBox lock alock.release(); AutoWriteLock vboxlock(mParent COMMA_LOCKVAL_SRC_POS); mParent->i_saveSettings(); } } // fire notification outside the lock if (fChanged) mParent->i_onExtraDataChanged(mData->mUuid, aKey, aValue); return S_OK; } HRESULT Machine::setSettingsFilePath(const com::Utf8Str &aSettingsFilePath, ComPtr &aProgress) { aProgress = NULL; NOREF(aSettingsFilePath); ReturnComNotImplemented(); } HRESULT Machine::saveSettings() { AutoWriteLock mlock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrSavedOrRunningStateDep); if (FAILED(rc)) return rc; /* the settings file path may never be null */ ComAssertRet(!mData->m_strConfigFileFull.isEmpty(), E_FAIL); /* save all VM data excluding snapshots */ bool fNeedsGlobalSaveSettings = false; rc = i_saveSettings(&fNeedsGlobalSaveSettings, mlock); mlock.release(); if (SUCCEEDED(rc) && fNeedsGlobalSaveSettings) { // save the global settings; for that we should hold only the VirtualBox lock AutoWriteLock vlock(mParent COMMA_LOCKVAL_SRC_POS); rc = mParent->i_saveSettings(); } return rc; } HRESULT Machine::discardSettings() { /* * We need to take the machine list lock here as well as the machine one * or we'll get into trouble should any media stuff require rolling back. * * Details: * * 11:06:01.934284 00:00:05.805182 ALIEN-1 Wrong locking order! [uId=00007ff6853f6c34 thrd=ALIEN-1] * 11:06:01.934284 00:00:05.805182 ALIEN-1 Lock: s 000000000259ef40 RTCritSectRw-3 srec=000000000259f150 cls=4-LISTOFMACHINES/any [s] * 11:06:01.934284 00:00:05.805182 ALIEN-1 Other lock: 00000000025ec710 RTCritSectRw-158 own=ALIEN-1 r=1 cls=5-MACHINEOBJECT/any pos={MachineImpl.cpp(5085) Machine::discardSettings 00007ff6853f6ce4} [x] * 11:06:01.934284 00:00:05.805182 ALIEN-1 My class: class=0000000000d5eb10 4-LISTOFMACHINES created={AutoLock.cpp(98) util::InitAutoLockSystem 00007ff6853f571f} sub-class=any * 11:06:01.934284 00:00:05.805182 ALIEN-1 My class: Prior: #00: 2-VIRTUALBOXOBJECT, manually , 4 lookups * 11:06:01.934284 00:00:05.805182 ALIEN-1 My class: #01: 3-HOSTOBJECT, manually , 0 lookups * 11:06:01.934284 00:00:05.805182 ALIEN-1 My class: Hash Stats: 3 hits, 1 misses * 11:06:01.934284 00:00:05.805182 ALIEN-1 Other class: class=0000000000d5ecd0 5-MACHINEOBJECT created={AutoLock.cpp(98) util::InitAutoLockSystem 00007ff6853f571f} sub-class=any * 11:06:01.934284 00:00:05.805182 ALIEN-1 Other class: Prior: #00: 2-VIRTUALBOXOBJECT, manually , 2 lookups * 11:06:01.934284 00:00:05.805182 ALIEN-1 Other class: #01: 3-HOSTOBJECT, manually , 6 lookups * 11:06:01.934284 00:00:05.805182 ALIEN-1 Other class: #02: 4-LISTOFMACHINES, manually , 5 lookups * 11:06:01.934284 00:00:05.805182 ALIEN-1 Other class: Hash Stats: 10 hits, 3 misses * 11:06:01.934284 00:00:05.805182 ALIEN-1 ---- start of lock stack for 000000000259d2d0 ALIEN-1 - 2 entries ---- * 11:06:01.934284 00:00:05.805182 ALIEN-1 #00: 00000000025ec710 RTCritSectRw-158 own=ALIEN-1 r=2 cls=5-MACHINEOBJECT/any pos={MachineImpl.cpp(11705) Machine::i_rollback 00007ff6853f6ce4} [x/r] * 11:06:01.934284 00:00:05.805182 ALIEN-1 #01: 00000000025ec710 RTCritSectRw-158 own=ALIEN-1 r=1 cls=5-MACHINEOBJECT/any pos={MachineImpl.cpp(5085) Machine::discardSettings 00007ff6853f6ce4} [x] (*) * 11:06:01.934284 00:00:05.805182 ALIEN-1 ---- end of lock stack ---- * 0:005> k * # Child-SP RetAddr Call Site * 00 00000000`0287bc90 00007ffc`8c0bc8dc VBoxRT!rtLockValComplainPanic+0x23 [e:\vbox\svn\trunk\src\vbox\runtime\common\misc\lockvalidator.cpp @ 807] * 01 00000000`0287bcc0 00007ffc`8c0bc083 VBoxRT!rtLockValidatorStackWrongOrder+0xac [e:\vbox\svn\trunk\src\vbox\runtime\common\misc\lockvalidator.cpp @ 2149] * 02 00000000`0287bd10 00007ffc`8c0bbfc3 VBoxRT!rtLockValidatorStackCheckLockingOrder2+0x93 [e:\vbox\svn\trunk\src\vbox\runtime\common\misc\lockvalidator.cpp @ 2227] * 03 00000000`0287bdd0 00007ffc`8c0bf3c0 VBoxRT!rtLockValidatorStackCheckLockingOrder+0x523 [e:\vbox\svn\trunk\src\vbox\runtime\common\misc\lockvalidator.cpp @ 2406] * 04 00000000`0287be40 00007ffc`8c180de4 VBoxRT!RTLockValidatorRecSharedCheckOrder+0x210 [e:\vbox\svn\trunk\src\vbox\runtime\common\misc\lockvalidator.cpp @ 3607] * 05 00000000`0287be90 00007ffc`8c1819b8 VBoxRT!rtCritSectRwEnterShared+0x1a4 [e:\vbox\svn\trunk\src\vbox\runtime\generic\critsectrw-generic.cpp @ 222] * 06 00000000`0287bf60 00007ff6`853f5e78 VBoxRT!RTCritSectRwEnterSharedDebug+0x58 [e:\vbox\svn\trunk\src\vbox\runtime\generic\critsectrw-generic.cpp @ 428] * 07 00000000`0287bfb0 00007ff6`853f6c34 VBoxSVC!util::RWLockHandle::lockRead+0x58 [e:\vbox\svn\trunk\src\vbox\main\glue\autolock.cpp @ 245] * 08 00000000`0287c000 00007ff6`853f68a1 VBoxSVC!util::AutoReadLock::callLockImpl+0x64 [e:\vbox\svn\trunk\src\vbox\main\glue\autolock.cpp @ 552] * 09 00000000`0287c040 00007ff6`853f6a59 VBoxSVC!util::AutoLockBase::callLockOnAllHandles+0xa1 [e:\vbox\svn\trunk\src\vbox\main\glue\autolock.cpp @ 455] * 0a 00000000`0287c0a0 00007ff6`85038fdb VBoxSVC!util::AutoLockBase::acquire+0x89 [e:\vbox\svn\trunk\src\vbox\main\glue\autolock.cpp @ 500] * 0b 00000000`0287c0d0 00007ff6`85216dcf VBoxSVC!util::AutoReadLock::AutoReadLock+0x7b [e:\vbox\svn\trunk\include\vbox\com\autolock.h @ 370] * 0c 00000000`0287c120 00007ff6`8521cf08 VBoxSVC!VirtualBox::i_findMachine+0x14f [e:\vbox\svn\trunk\src\vbox\main\src-server\virtualboximpl.cpp @ 3216] * 0d 00000000`0287c260 00007ff6`8517a4b0 VBoxSVC!VirtualBox::i_markRegistryModified+0xa8 [e:\vbox\svn\trunk\src\vbox\main\src-server\virtualboximpl.cpp @ 4697] * 0e 00000000`0287c2f0 00007ff6`8517fac0 VBoxSVC!Medium::i_markRegistriesModified+0x170 [e:\vbox\svn\trunk\src\vbox\main\src-server\mediumimpl.cpp @ 4056] * 0f 00000000`0287c500 00007ff6`8511ca9d VBoxSVC!Medium::i_deleteStorage+0xb90 [e:\vbox\svn\trunk\src\vbox\main\src-server\mediumimpl.cpp @ 5114] * 10 00000000`0287cad0 00007ff6`8511ef0e VBoxSVC!Machine::i_deleteImplicitDiffs+0x11ed [e:\vbox\svn\trunk\src\vbox\main\src-server\machineimpl.cpp @ 11117] * 11 00000000`0287d2e0 00007ff6`8511f896 VBoxSVC!Machine::i_rollbackMedia+0x42e [e:\vbox\svn\trunk\src\vbox\main\src-server\machineimpl.cpp @ 11657] * 12 00000000`0287d3c0 00007ff6`850fd17a VBoxSVC!Machine::i_rollback+0x6a6 [e:\vbox\svn\trunk\src\vbox\main\src-server\machineimpl.cpp @ 11786] * 13 00000000`0287d710 00007ff6`85342dbe VBoxSVC!Machine::discardSettings+0x9a [e:\vbox\svn\trunk\src\vbox\main\src-server\machineimpl.cpp @ 5096] * 14 00000000`0287d790 00007ffc`c06813ff VBoxSVC!MachineWrap::DiscardSettings+0x16e [e:\vbox\svn\trunk\out\win.amd64\debug\obj\vboxapiwrap\machinewrap.cpp @ 9171] * */ AutoReadLock alockMachines(mParent->i_getMachinesListLockHandle() COMMA_LOCKVAL_SRC_POS); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrSavedOrRunningStateDep); if (FAILED(rc)) return rc; /* * during this rollback, the session will be notified if data has * been actually changed */ i_rollback(true /* aNotify */); return S_OK; } /** @note Locks objects! */ HRESULT Machine::unregister(AutoCaller &autoCaller, CleanupMode_T aCleanupMode, std::vector > &aMedia) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); Guid id(i_getId()); if (mData->mSession.mState != SessionState_Unlocked) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("Cannot unregister the machine '%s' while it is locked"), mUserData->s.strName.c_str()); // wait for state dependents to drop to zero i_ensureNoStateDependencies(alock); if (!mData->mAccessible) { // inaccessible machines can only be unregistered; uninitialize ourselves // here because currently there may be no unregistered that are inaccessible // (this state combination is not supported). Note releasing the caller and // leaving the lock before calling uninit() alock.release(); autoCaller.release(); uninit(); mParent->i_unregisterMachine(this, CleanupMode_UnregisterOnly, id); // calls VirtualBox::i_saveSettings() return S_OK; } HRESULT rc = S_OK; mData->llFilesToDelete.clear(); if (!mSSData->strStateFilePath.isEmpty()) mData->llFilesToDelete.push_back(mSSData->strStateFilePath); Utf8Str strNVRAMFile = mNvramStore->i_getNonVolatileStorageFile(); if (!strNVRAMFile.isEmpty() && RTFileExists(strNVRAMFile.c_str())) mData->llFilesToDelete.push_back(strNVRAMFile); // This list collects the medium objects from all medium attachments // which we will detach from the machine and its snapshots, in a specific // order which allows for closing all media without getting "media in use" // errors, simply by going through the list from the front to the back: // 1) first media from machine attachments (these have the "leaf" attachments with snapshots // and must be closed before the parent media from the snapshots, or closing the parents // will fail because they still have children); // 2) media from the youngest snapshots followed by those from the parent snapshots until // the root ("first") snapshot of the machine. MediaList llMedia; if ( !mMediumAttachments.isNull() // can be NULL if machine is inaccessible && mMediumAttachments->size() ) { // we have media attachments: detach them all and add the Medium objects to our list i_detachAllMedia(alock, NULL /* pSnapshot */, aCleanupMode, llMedia); } if (mData->mFirstSnapshot) { // add the media from the medium attachments of the snapshots to // llMedia as well, after the "main" machine media; // Snapshot::uninitAll() calls Machine::detachAllMedia() for each // snapshot machine, depth first. // Snapshot::beginDeletingSnapshot() asserts if the machine state is not this MachineState_T oldState = mData->mMachineState; mData->mMachineState = MachineState_DeletingSnapshot; // make a copy of the first snapshot reference so the refcount does not // drop to 0 in beginDeletingSnapshot, which sets pFirstSnapshot to 0 // (would hang due to the AutoCaller voodoo) ComObjPtr pFirstSnapshot = mData->mFirstSnapshot; // GO! pFirstSnapshot->i_uninitAll(alock, aCleanupMode, llMedia, mData->llFilesToDelete); mData->mMachineState = oldState; } if (FAILED(rc)) { i_rollbackMedia(); return rc; } // commit all the media changes made above i_commitMedia(); mData->mRegistered = false; // machine lock no longer needed alock.release(); /* Make sure that the settings of the current VM are not saved, because * they are rather crippled at this point to meet the cleanup expectations * and there's no point destroying the VM config on disk just because. */ mParent->i_unmarkRegistryModified(id); // return media to caller aMedia.resize(llMedia.size()); size_t i = 0; for (MediaList::const_iterator it = llMedia.begin(); it != llMedia.end(); ++it, ++i) (*it).queryInterfaceTo(aMedia[i].asOutParam()); mParent->i_unregisterMachine(this, aCleanupMode, id); // calls VirtualBox::i_saveSettings() and VirtualBox::saveModifiedRegistries() return S_OK; } /** * Task record for deleting a machine config. */ class Machine::DeleteConfigTask : public Machine::Task { public: DeleteConfigTask(Machine *m, Progress *p, const Utf8Str &t, const RTCList > &llMediums, const StringsList &llFilesToDelete) : Task(m, p, t), m_llMediums(llMediums), m_llFilesToDelete(llFilesToDelete) {} private: void handler() { try { m_pMachine->i_deleteConfigHandler(*this); } catch (...) { LogRel(("Some exception in the function Machine::i_deleteConfigHandler()\n")); } } RTCList > m_llMediums; StringsList m_llFilesToDelete; friend void Machine::i_deleteConfigHandler(DeleteConfigTask &task); }; /** * Task thread implementation for SessionMachine::DeleteConfig(), called from * SessionMachine::taskHandler(). * * @note Locks this object for writing. * * @param task * @return */ void Machine::i_deleteConfigHandler(DeleteConfigTask &task) { LogFlowThisFuncEnter(); AutoCaller autoCaller(this); LogFlowThisFunc(("state=%d\n", getObjectState().getState())); if (FAILED(autoCaller.rc())) { /* we might have been uninitialized because the session was accidentally * closed by the client, so don't assert */ HRESULT rc = setError(E_FAIL, tr("The session has been accidentally closed")); task.m_pProgress->i_notifyComplete(rc); LogFlowThisFuncLeave(); return; } AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = S_OK; try { ULONG uLogHistoryCount = 3; ComPtr systemProperties; rc = mParent->COMGETTER(SystemProperties)(systemProperties.asOutParam()); if (FAILED(rc)) throw rc; if (!systemProperties.isNull()) { rc = systemProperties->COMGETTER(LogHistoryCount)(&uLogHistoryCount); if (FAILED(rc)) throw rc; } MachineState_T oldState = mData->mMachineState; i_setMachineState(MachineState_SettingUp); alock.release(); for (size_t i = 0; i < task.m_llMediums.size(); ++i) { ComObjPtr pMedium = (Medium*)(IMedium*)(task.m_llMediums.at(i)); { AutoCaller mac(pMedium); if (FAILED(mac.rc())) throw mac.rc(); Utf8Str strLocation = pMedium->i_getLocationFull(); LogFunc(("Deleting file %s\n", strLocation.c_str())); rc = task.m_pProgress->SetNextOperation(BstrFmt(tr("Deleting '%s'"), strLocation.c_str()).raw(), 1); if (FAILED(rc)) throw rc; } if (pMedium->i_isMediumFormatFile()) { ComPtr pProgress2; rc = pMedium->DeleteStorage(pProgress2.asOutParam()); if (FAILED(rc)) throw rc; rc = task.m_pProgress->WaitForOtherProgressCompletion(pProgress2, 0 /* indefinite wait */); if (FAILED(rc)) throw rc; } /* Close the medium, deliberately without checking the return * code, and without leaving any trace in the error info, as * a failure here is a very minor issue, which shouldn't happen * as above we even managed to delete the medium. */ { ErrorInfoKeeper eik; pMedium->Close(); } } i_setMachineState(oldState); alock.acquire(); // delete the files pushed on the task list by Machine::Delete() // (this includes saved states of the machine and snapshots and // medium storage files from the IMedium list passed in, and the // machine XML file) for (StringsList::const_iterator it = task.m_llFilesToDelete.begin(); it != task.m_llFilesToDelete.end(); ++it) { const Utf8Str &strFile = *it; LogFunc(("Deleting file %s\n", strFile.c_str())); rc = task.m_pProgress->SetNextOperation(BstrFmt(tr("Deleting '%s'"), it->c_str()).raw(), 1); if (FAILED(rc)) throw rc; i_deleteFile(strFile); } rc = task.m_pProgress->SetNextOperation(Bstr(tr("Cleaning up machine directory")).raw(), 1); if (FAILED(rc)) throw rc; /* delete the settings only when the file actually exists */ if (mData->pMachineConfigFile->fileExists()) { /* Delete any backup or uncommitted XML files. Ignore failures. See the fSafe parameter of xml::XmlFileWriter::write for details. */ /** @todo Find a way to avoid referring directly to iprt/xml.h here. */ Utf8StrFmt otherXml("%s%s", mData->m_strConfigFileFull.c_str(), xml::XmlFileWriter::s_pszTmpSuff); i_deleteFile(otherXml, true /* fIgnoreFailures */); otherXml.printf("%s%s", mData->m_strConfigFileFull.c_str(), xml::XmlFileWriter::s_pszPrevSuff); i_deleteFile(otherXml, true /* fIgnoreFailures */); /* delete the Logs folder, nothing important should be left * there (we don't check for errors because the user might have * some private files there that we don't want to delete) */ Utf8Str logFolder; getLogFolder(logFolder); Assert(logFolder.length()); if (RTDirExists(logFolder.c_str())) { /* Delete all VBox.log[.N] files from the Logs folder * (this must be in sync with the rotation logic in * Console::powerUpThread()). Also, delete the VBox.png[.N] * files that may have been created by the GUI. */ Utf8StrFmt log("%s%cVBox.log", logFolder.c_str(), RTPATH_DELIMITER); i_deleteFile(log, true /* fIgnoreFailures */); log.printf("%s%cVBox.png", logFolder.c_str(), RTPATH_DELIMITER); i_deleteFile(log, true /* fIgnoreFailures */); for (ULONG i = uLogHistoryCount; i > 0; i--) { log.printf("%s%cVBox.log.%u", logFolder.c_str(), RTPATH_DELIMITER, i); i_deleteFile(log, true /* fIgnoreFailures */); log.printf("%s%cVBox.png.%u", logFolder.c_str(), RTPATH_DELIMITER, i); i_deleteFile(log, true /* fIgnoreFailures */); } log.printf("%s%cVBoxUI.log", logFolder.c_str(), RTPATH_DELIMITER); i_deleteFile(log, true /* fIgnoreFailures */); #if defined(RT_OS_WINDOWS) log.printf("%s%cVBoxStartup.log", logFolder.c_str(), RTPATH_DELIMITER); i_deleteFile(log, true /* fIgnoreFailures */); log.printf("%s%cVBoxHardening.log", logFolder.c_str(), RTPATH_DELIMITER); i_deleteFile(log, true /* fIgnoreFailures */); #endif RTDirRemove(logFolder.c_str()); } /* delete the Snapshots folder, nothing important should be left * there (we don't check for errors because the user might have * some private files there that we don't want to delete) */ Utf8Str strFullSnapshotFolder; i_calculateFullPath(mUserData->s.strSnapshotFolder, strFullSnapshotFolder); Assert(!strFullSnapshotFolder.isEmpty()); if (RTDirExists(strFullSnapshotFolder.c_str())) RTDirRemove(strFullSnapshotFolder.c_str()); // delete the directory that contains the settings file, but only // if it matches the VM name Utf8Str settingsDir; if (i_isInOwnDir(&settingsDir)) RTDirRemove(settingsDir.c_str()); } alock.release(); mParent->i_saveModifiedRegistries(); } catch (HRESULT aRC) { rc = aRC; } task.m_pProgress->i_notifyComplete(rc); LogFlowThisFuncLeave(); } HRESULT Machine::deleteConfig(const std::vector > &aMedia, ComPtr &aProgress) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; if (mData->mRegistered) return setError(VBOX_E_INVALID_VM_STATE, tr("Cannot delete settings of a registered machine")); // collect files to delete StringsList llFilesToDelete(mData->llFilesToDelete); // saved states and NVRAM files pushed here by Unregister() // machine config file if (mData->pMachineConfigFile->fileExists()) llFilesToDelete.push_back(mData->m_strConfigFileFull); // backup of machine config file Utf8Str strTmp(mData->m_strConfigFileFull); strTmp.append("-prev"); if (RTFileExists(strTmp.c_str())) llFilesToDelete.push_back(strTmp); RTCList > llMediums; for (size_t i = 0; i < aMedia.size(); ++i) { IMedium *pIMedium(aMedia[i]); ComObjPtr pMedium = static_cast(pIMedium); if (pMedium.isNull()) return setError(E_INVALIDARG, tr("The given medium pointer with index %d is invalid"), i); SafeArray ids; rc = pMedium->COMGETTER(MachineIds)(ComSafeArrayAsOutParam(ids)); if (FAILED(rc)) return rc; /* At this point the medium should not have any back references * anymore. If it has it is attached to another VM and *must* not * deleted. */ if (ids.size() < 1) llMediums.append(pMedium); } ComObjPtr pProgress; pProgress.createObject(); rc = pProgress->init(i_getVirtualBox(), static_cast(this) /* aInitiator */, tr("Deleting files"), true /* fCancellable */, (ULONG)(1 + llMediums.size() + llFilesToDelete.size() + 1), // cOperations tr("Collecting file inventory")); if (FAILED(rc)) return rc; /* create and start the task on a separate thread (note that it will not * start working until we release alock) */ DeleteConfigTask *pTask = new DeleteConfigTask(this, pProgress, "DeleteVM", llMediums, llFilesToDelete); rc = pTask->createThread(); pTask = NULL; if (FAILED(rc)) return rc; pProgress.queryInterfaceTo(aProgress.asOutParam()); LogFlowFuncLeave(); return S_OK; } HRESULT Machine::findSnapshot(const com::Utf8Str &aNameOrId, ComPtr &aSnapshot) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); ComObjPtr pSnapshot; HRESULT rc; if (aNameOrId.isEmpty()) // null case (caller wants root snapshot): i_findSnapshotById() handles this rc = i_findSnapshotById(Guid(), pSnapshot, true /* aSetError */); else { Guid uuid(aNameOrId); if (uuid.isValid()) rc = i_findSnapshotById(uuid, pSnapshot, true /* aSetError */); else rc = i_findSnapshotByName(aNameOrId, pSnapshot, true /* aSetError */); } pSnapshot.queryInterfaceTo(aSnapshot.asOutParam()); return rc; } HRESULT Machine::createSharedFolder(const com::Utf8Str &aName, const com::Utf8Str &aHostPath, BOOL aWritable, BOOL aAutomount, const com::Utf8Str &aAutoMountPoint) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; ComObjPtr sharedFolder; rc = i_findSharedFolder(aName, sharedFolder, false /* aSetError */); if (SUCCEEDED(rc)) return setError(VBOX_E_OBJECT_IN_USE, tr("Shared folder named '%s' already exists"), aName.c_str()); sharedFolder.createObject(); rc = sharedFolder->init(i_getMachine(), aName, aHostPath, !!aWritable, !!aAutomount, aAutoMountPoint, true /* fFailOnError */); if (FAILED(rc)) return rc; i_setModified(IsModified_SharedFolders); mHWData.backup(); mHWData->mSharedFolders.push_back(sharedFolder); /* inform the direct session if any */ alock.release(); i_onSharedFolderChange(); return S_OK; } HRESULT Machine::removeSharedFolder(const com::Utf8Str &aName) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; ComObjPtr sharedFolder; rc = i_findSharedFolder(aName, sharedFolder, true /* aSetError */); if (FAILED(rc)) return rc; i_setModified(IsModified_SharedFolders); mHWData.backup(); mHWData->mSharedFolders.remove(sharedFolder); /* inform the direct session if any */ alock.release(); i_onSharedFolderChange(); return S_OK; } HRESULT Machine::canShowConsoleWindow(BOOL *aCanShow) { /* start with No */ *aCanShow = FALSE; ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mState != SessionState_Locked) return setError(VBOX_E_INVALID_VM_STATE, tr("Machine is not locked for session (session state: %s)"), Global::stringifySessionState(mData->mSession.mState)); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore calls made after #OnSessionEnd() is called */ if (!directControl) return S_OK; LONG64 dummy; return directControl->OnShowWindow(TRUE /* aCheck */, aCanShow, &dummy); } HRESULT Machine::showConsoleWindow(LONG64 *aWinId) { ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mState != SessionState_Locked) return setError(E_FAIL, tr("Machine is not locked for session (session state: %s)"), Global::stringifySessionState(mData->mSession.mState)); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore calls made after #OnSessionEnd() is called */ if (!directControl) return S_OK; BOOL dummy; return directControl->OnShowWindow(FALSE /* aCheck */, &dummy, aWinId); } #ifdef VBOX_WITH_GUEST_PROPS /** * Look up a guest property in VBoxSVC's internal structures. */ HRESULT Machine::i_getGuestPropertyFromService(const com::Utf8Str &aName, com::Utf8Str &aValue, LONG64 *aTimestamp, com::Utf8Str &aFlags) const { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); HWData::GuestPropertyMap::const_iterator it = mHWData->mGuestProperties.find(aName); if (it != mHWData->mGuestProperties.end()) { char szFlags[GUEST_PROP_MAX_FLAGS_LEN + 1]; aValue = it->second.strValue; *aTimestamp = it->second.mTimestamp; GuestPropWriteFlags(it->second.mFlags, szFlags); aFlags = Utf8Str(szFlags); } return S_OK; } /** * Query the VM that a guest property belongs to for the property. * @returns E_ACCESSDENIED if the VM process is not available or not * currently handling queries and the lookup should then be done in * VBoxSVC. */ HRESULT Machine::i_getGuestPropertyFromVM(const com::Utf8Str &aName, com::Utf8Str &aValue, LONG64 *aTimestamp, com::Utf8Str &aFlags) const { HRESULT rc = S_OK; Bstr bstrValue; Bstr bstrFlags; ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore calls made after #OnSessionEnd() is called */ if (!directControl) rc = E_ACCESSDENIED; else rc = directControl->AccessGuestProperty(Bstr(aName).raw(), Bstr::Empty.raw(), Bstr::Empty.raw(), 0 /* accessMode */, bstrValue.asOutParam(), aTimestamp, bstrFlags.asOutParam()); aValue = bstrValue; aFlags = bstrFlags; return rc; } #endif // VBOX_WITH_GUEST_PROPS HRESULT Machine::getGuestProperty(const com::Utf8Str &aName, com::Utf8Str &aValue, LONG64 *aTimestamp, com::Utf8Str &aFlags) { #ifndef VBOX_WITH_GUEST_PROPS ReturnComNotImplemented(); #else // VBOX_WITH_GUEST_PROPS HRESULT rc = i_getGuestPropertyFromVM(aName, aValue, aTimestamp, aFlags); if (rc == E_ACCESSDENIED) /* The VM is not running or the service is not (yet) accessible */ rc = i_getGuestPropertyFromService(aName, aValue, aTimestamp, aFlags); return rc; #endif // VBOX_WITH_GUEST_PROPS } HRESULT Machine::getGuestPropertyValue(const com::Utf8Str &aProperty, com::Utf8Str &aValue) { LONG64 dummyTimestamp; com::Utf8Str dummyFlags; HRESULT rc = getGuestProperty(aProperty, aValue, &dummyTimestamp, dummyFlags); return rc; } HRESULT Machine::getGuestPropertyTimestamp(const com::Utf8Str &aProperty, LONG64 *aValue) { com::Utf8Str dummyFlags; com::Utf8Str dummyValue; HRESULT rc = getGuestProperty(aProperty, dummyValue, aValue, dummyFlags); return rc; } #ifdef VBOX_WITH_GUEST_PROPS /** * Set a guest property in VBoxSVC's internal structures. */ HRESULT Machine::i_setGuestPropertyToService(const com::Utf8Str &aName, const com::Utf8Str &aValue, const com::Utf8Str &aFlags, bool fDelete) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrSavedStateDep); if (FAILED(rc)) return rc; try { uint32_t fFlags = GUEST_PROP_F_NILFLAG; if (aFlags.length() && RT_FAILURE(GuestPropValidateFlags(aFlags.c_str(), &fFlags))) return setError(E_INVALIDARG, tr("Invalid guest property flag values: '%s'"), aFlags.c_str()); if (fFlags & (GUEST_PROP_F_TRANSIENT | GUEST_PROP_F_TRANSRESET)) return setError(E_INVALIDARG, tr("Properties with TRANSIENT or TRANSRESET flag cannot be set or modified if VM is not running")); HWData::GuestPropertyMap::iterator it = mHWData->mGuestProperties.find(aName); if (it == mHWData->mGuestProperties.end()) { if (!fDelete) { i_setModified(IsModified_MachineData); mHWData.backupEx(); RTTIMESPEC time; HWData::GuestProperty prop; prop.strValue = aValue; prop.mTimestamp = RTTimeSpecGetNano(RTTimeNow(&time)); prop.mFlags = fFlags; mHWData->mGuestProperties[aName] = prop; } } else { if (it->second.mFlags & (GUEST_PROP_F_RDONLYHOST)) { rc = setError(E_ACCESSDENIED, tr("The property '%s' cannot be changed by the host"), aName.c_str()); } else { i_setModified(IsModified_MachineData); mHWData.backupEx(); /* The backupEx() operation invalidates our iterator, * so get a new one. */ it = mHWData->mGuestProperties.find(aName); Assert(it != mHWData->mGuestProperties.end()); if (!fDelete) { RTTIMESPEC time; it->second.strValue = aValue; it->second.mTimestamp = RTTimeSpecGetNano(RTTimeNow(&time)); it->second.mFlags = fFlags; } else mHWData->mGuestProperties.erase(it); } } if (SUCCEEDED(rc)) { alock.release(); mParent->i_onGuestPropertyChanged(mData->mUuid, aName, aValue, aFlags, fDelete); } } catch (std::bad_alloc &) { rc = E_OUTOFMEMORY; } return rc; } /** * Set a property on the VM that that property belongs to. * @returns E_ACCESSDENIED if the VM process is not available or not * currently handling queries and the setting should then be done in * VBoxSVC. */ HRESULT Machine::i_setGuestPropertyToVM(const com::Utf8Str &aName, const com::Utf8Str &aValue, const com::Utf8Str &aFlags, bool fDelete) { HRESULT rc; try { ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } Bstr dummy1; /* will not be changed (setter) */ Bstr dummy2; /* will not be changed (setter) */ LONG64 dummy64; if (!directControl) rc = E_ACCESSDENIED; else /** @todo Fix when adding DeleteGuestProperty(), see defect. */ rc = directControl->AccessGuestProperty(Bstr(aName).raw(), Bstr(aValue).raw(), Bstr(aFlags).raw(), fDelete ? 2 : 1 /* accessMode */, dummy1.asOutParam(), &dummy64, dummy2.asOutParam()); } catch (std::bad_alloc &) { rc = E_OUTOFMEMORY; } return rc; } #endif // VBOX_WITH_GUEST_PROPS HRESULT Machine::setGuestProperty(const com::Utf8Str &aProperty, const com::Utf8Str &aValue, const com::Utf8Str &aFlags) { #ifndef VBOX_WITH_GUEST_PROPS ReturnComNotImplemented(); #else // VBOX_WITH_GUEST_PROPS int vrc = GuestPropValidateName(aProperty.c_str(), aProperty.length() + 1 /* '\0' */); AssertRCReturn(vrc, setErrorBoth(E_INVALIDARG, vrc)); vrc = GuestPropValidateValue(aValue.c_str(), aValue.length() + 1 /* '\0' */); AssertRCReturn(vrc, setErrorBoth(E_INVALIDARG, vrc)); HRESULT rc = i_setGuestPropertyToVM(aProperty, aValue, aFlags, /* fDelete = */ false); if (rc == E_ACCESSDENIED) /* The VM is not running or the service is not (yet) accessible */ rc = i_setGuestPropertyToService(aProperty, aValue, aFlags, /* fDelete = */ false); return rc; #endif // VBOX_WITH_GUEST_PROPS } HRESULT Machine::setGuestPropertyValue(const com::Utf8Str &aProperty, const com::Utf8Str &aValue) { return setGuestProperty(aProperty, aValue, ""); } HRESULT Machine::deleteGuestProperty(const com::Utf8Str &aName) { #ifndef VBOX_WITH_GUEST_PROPS ReturnComNotImplemented(); #else // VBOX_WITH_GUEST_PROPS HRESULT rc = i_setGuestPropertyToVM(aName, "", "", /* fDelete = */ true); if (rc == E_ACCESSDENIED) /* The VM is not running or the service is not (yet) accessible */ rc = i_setGuestPropertyToService(aName, "", "", /* fDelete = */ true); return rc; #endif // VBOX_WITH_GUEST_PROPS } #ifdef VBOX_WITH_GUEST_PROPS /** * Enumerate the guest properties in VBoxSVC's internal structures. */ HRESULT Machine::i_enumerateGuestPropertiesInService(const com::Utf8Str &aPatterns, std::vector &aNames, std::vector &aValues, std::vector &aTimestamps, std::vector &aFlags) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); Utf8Str strPatterns(aPatterns); /* * Look for matching patterns and build up a list. */ HWData::GuestPropertyMap propMap; for (HWData::GuestPropertyMap::const_iterator it = mHWData->mGuestProperties.begin(); it != mHWData->mGuestProperties.end(); ++it) { if ( strPatterns.isEmpty() || RTStrSimplePatternMultiMatch(strPatterns.c_str(), RTSTR_MAX, it->first.c_str(), RTSTR_MAX, NULL) ) propMap.insert(*it); } alock.release(); /* * And build up the arrays for returning the property information. */ size_t cEntries = propMap.size(); aNames.resize(cEntries); aValues.resize(cEntries); aTimestamps.resize(cEntries); aFlags.resize(cEntries); size_t i = 0; for (HWData::GuestPropertyMap::const_iterator it = propMap.begin(); it != propMap.end(); ++it, ++i) { aNames[i] = it->first; int vrc = GuestPropValidateName(aNames[i].c_str(), aNames[i].length() + 1 /* '\0' */); AssertRCReturn(vrc, setErrorBoth(E_INVALIDARG /*bad choice for internal error*/, vrc)); aValues[i] = it->second.strValue; vrc = GuestPropValidateValue(aValues[i].c_str(), aValues[i].length() + 1 /* '\0' */); AssertRCReturn(vrc, setErrorBoth(E_INVALIDARG /*bad choice for internal error*/, vrc)); aTimestamps[i] = it->second.mTimestamp; char szFlags[GUEST_PROP_MAX_FLAGS_LEN + 1]; GuestPropWriteFlags(it->second.mFlags, szFlags); aFlags[i] = szFlags; } return S_OK; } /** * Enumerate the properties managed by a VM. * @returns E_ACCESSDENIED if the VM process is not available or not * currently handling queries and the setting should then be done in * VBoxSVC. */ HRESULT Machine::i_enumerateGuestPropertiesOnVM(const com::Utf8Str &aPatterns, std::vector &aNames, std::vector &aValues, std::vector &aTimestamps, std::vector &aFlags) { HRESULT rc; ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } com::SafeArray bNames; com::SafeArray bValues; com::SafeArray bTimestamps; com::SafeArray bFlags; if (!directControl) rc = E_ACCESSDENIED; else rc = directControl->EnumerateGuestProperties(Bstr(aPatterns).raw(), ComSafeArrayAsOutParam(bNames), ComSafeArrayAsOutParam(bValues), ComSafeArrayAsOutParam(bTimestamps), ComSafeArrayAsOutParam(bFlags)); size_t i; aNames.resize(bNames.size()); for (i = 0; i < bNames.size(); ++i) aNames[i] = Utf8Str(bNames[i]); aValues.resize(bValues.size()); for (i = 0; i < bValues.size(); ++i) aValues[i] = Utf8Str(bValues[i]); aTimestamps.resize(bTimestamps.size()); for (i = 0; i < bTimestamps.size(); ++i) aTimestamps[i] = bTimestamps[i]; aFlags.resize(bFlags.size()); for (i = 0; i < bFlags.size(); ++i) aFlags[i] = Utf8Str(bFlags[i]); return rc; } #endif // VBOX_WITH_GUEST_PROPS HRESULT Machine::enumerateGuestProperties(const com::Utf8Str &aPatterns, std::vector &aNames, std::vector &aValues, std::vector &aTimestamps, std::vector &aFlags) { #ifndef VBOX_WITH_GUEST_PROPS ReturnComNotImplemented(); #else // VBOX_WITH_GUEST_PROPS HRESULT rc = i_enumerateGuestPropertiesOnVM(aPatterns, aNames, aValues, aTimestamps, aFlags); if (rc == E_ACCESSDENIED) /* The VM is not running or the service is not (yet) accessible */ rc = i_enumerateGuestPropertiesInService(aPatterns, aNames, aValues, aTimestamps, aFlags); return rc; #endif // VBOX_WITH_GUEST_PROPS } HRESULT Machine::getMediumAttachmentsOfController(const com::Utf8Str &aName, std::vector > &aMediumAttachments) { MediumAttachmentList atts; HRESULT rc = i_getMediumAttachmentsOfController(aName, atts); if (FAILED(rc)) return rc; aMediumAttachments.resize(atts.size()); size_t i = 0; for (MediumAttachmentList::const_iterator it = atts.begin(); it != atts.end(); ++it, ++i) (*it).queryInterfaceTo(aMediumAttachments[i].asOutParam()); return S_OK; } HRESULT Machine::getMediumAttachment(const com::Utf8Str &aName, LONG aControllerPort, LONG aDevice, ComPtr &aAttachment) { LogFlowThisFunc(("aControllerName=\"%s\" aControllerPort=%d aDevice=%d\n", aName.c_str(), aControllerPort, aDevice)); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aAttachment = NULL; ComObjPtr pAttach = i_findAttachment(*mMediumAttachments.data(), aName, aControllerPort, aDevice); if (pAttach.isNull()) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("No storage device attached to device slot %d on port %d of controller '%s'"), aDevice, aControllerPort, aName.c_str()); pAttach.queryInterfaceTo(aAttachment.asOutParam()); return S_OK; } HRESULT Machine::addStorageController(const com::Utf8Str &aName, StorageBus_T aConnectionType, ComPtr &aController) { if ( (aConnectionType <= StorageBus_Null) || (aConnectionType > StorageBus_VirtioSCSI)) return setError(E_INVALIDARG, tr("Invalid connection type: %d"), aConnectionType); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; /* try to find one with the name first. */ ComObjPtr ctrl; rc = i_getStorageControllerByName(aName, ctrl, false /* aSetError */); if (SUCCEEDED(rc)) return setError(VBOX_E_OBJECT_IN_USE, tr("Storage controller named '%s' already exists"), aName.c_str()); ctrl.createObject(); /* get a new instance number for the storage controller */ ULONG ulInstance = 0; bool fBootable = true; for (StorageControllerList::const_iterator it = mStorageControllers->begin(); it != mStorageControllers->end(); ++it) { if ((*it)->i_getStorageBus() == aConnectionType) { ULONG ulCurInst = (*it)->i_getInstance(); if (ulCurInst >= ulInstance) ulInstance = ulCurInst + 1; /* Only one controller of each type can be marked as bootable. */ if ((*it)->i_getBootable()) fBootable = false; } } rc = ctrl->init(this, aName, aConnectionType, ulInstance, fBootable); if (FAILED(rc)) return rc; i_setModified(IsModified_Storage); mStorageControllers.backup(); mStorageControllers->push_back(ctrl); ctrl.queryInterfaceTo(aController.asOutParam()); /* inform the direct session if any */ alock.release(); i_onStorageControllerChange(i_getId(), aName); return S_OK; } HRESULT Machine::getStorageControllerByName(const com::Utf8Str &aName, ComPtr &aStorageController) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); ComObjPtr ctrl; HRESULT rc = i_getStorageControllerByName(aName, ctrl, true /* aSetError */); if (SUCCEEDED(rc)) ctrl.queryInterfaceTo(aStorageController.asOutParam()); return rc; } HRESULT Machine::getStorageControllerByInstance(StorageBus_T aConnectionType, ULONG aInstance, ComPtr &aStorageController) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); for (StorageControllerList::const_iterator it = mStorageControllers->begin(); it != mStorageControllers->end(); ++it) { if ( (*it)->i_getStorageBus() == aConnectionType && (*it)->i_getInstance() == aInstance) { (*it).queryInterfaceTo(aStorageController.asOutParam()); return S_OK; } } return setError(VBOX_E_OBJECT_NOT_FOUND, tr("Could not find a storage controller with instance number '%lu'"), aInstance); } HRESULT Machine::setStorageControllerBootable(const com::Utf8Str &aName, BOOL aBootable) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; ComObjPtr ctrl; rc = i_getStorageControllerByName(aName, ctrl, true /* aSetError */); if (SUCCEEDED(rc)) { /* Ensure that only one controller of each type is marked as bootable. */ if (aBootable == TRUE) { for (StorageControllerList::const_iterator it = mStorageControllers->begin(); it != mStorageControllers->end(); ++it) { ComObjPtr aCtrl = (*it); if ( (aCtrl->i_getName() != aName) && aCtrl->i_getBootable() == TRUE && aCtrl->i_getStorageBus() == ctrl->i_getStorageBus() && aCtrl->i_getControllerType() == ctrl->i_getControllerType()) { aCtrl->i_setBootable(FALSE); break; } } } if (SUCCEEDED(rc)) { ctrl->i_setBootable(aBootable); i_setModified(IsModified_Storage); } } if (SUCCEEDED(rc)) { /* inform the direct session if any */ alock.release(); i_onStorageControllerChange(i_getId(), aName); } return rc; } HRESULT Machine::removeStorageController(const com::Utf8Str &aName) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; ComObjPtr ctrl; rc = i_getStorageControllerByName(aName, ctrl, true /* aSetError */); if (FAILED(rc)) return rc; MediumAttachmentList llDetachedAttachments; { /* find all attached devices to the appropriate storage controller and detach them all */ // make a temporary list because detachDevice invalidates iterators into // mMediumAttachments MediumAttachmentList llAttachments2 = *mMediumAttachments.data(); for (MediumAttachmentList::const_iterator it = llAttachments2.begin(); it != llAttachments2.end(); ++it) { MediumAttachment *pAttachTemp = *it; AutoCaller localAutoCaller(pAttachTemp); if (FAILED(localAutoCaller.rc())) return localAutoCaller.rc(); AutoReadLock local_alock(pAttachTemp COMMA_LOCKVAL_SRC_POS); if (pAttachTemp->i_getControllerName() == aName) { llDetachedAttachments.push_back(pAttachTemp); rc = i_detachDevice(pAttachTemp, alock, NULL); if (FAILED(rc)) return rc; } } } /* send event about detached devices before removing parent controller */ for (MediumAttachmentList::const_iterator it = llDetachedAttachments.begin(); it != llDetachedAttachments.end(); ++it) { mParent->i_onStorageDeviceChanged(*it, TRUE, FALSE); } /* We can remove it now. */ i_setModified(IsModified_Storage); mStorageControllers.backup(); ctrl->i_unshare(); mStorageControllers->remove(ctrl); /* inform the direct session if any */ alock.release(); i_onStorageControllerChange(i_getId(), aName); return S_OK; } HRESULT Machine::addUSBController(const com::Utf8Str &aName, USBControllerType_T aType, ComPtr &aController) { if ( (aType <= USBControllerType_Null) || (aType >= USBControllerType_Last)) return setError(E_INVALIDARG, tr("Invalid USB controller type: %d"), aType); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; /* try to find one with the same type first. */ ComObjPtr ctrl; rc = i_getUSBControllerByName(aName, ctrl, false /* aSetError */); if (SUCCEEDED(rc)) return setError(VBOX_E_OBJECT_IN_USE, tr("USB controller named '%s' already exists"), aName.c_str()); /* Check that we don't exceed the maximum number of USB controllers for the given type. */ ULONG maxInstances; rc = mParent->i_getSystemProperties()->GetMaxInstancesOfUSBControllerType(mHWData->mChipsetType, aType, &maxInstances); if (FAILED(rc)) return rc; ULONG cInstances = i_getUSBControllerCountByType(aType); if (cInstances >= maxInstances) return setError(E_INVALIDARG, tr("Too many USB controllers of this type")); ctrl.createObject(); rc = ctrl->init(this, aName, aType); if (FAILED(rc)) return rc; i_setModified(IsModified_USB); mUSBControllers.backup(); mUSBControllers->push_back(ctrl); ctrl.queryInterfaceTo(aController.asOutParam()); /* inform the direct session if any */ alock.release(); i_onUSBControllerChange(); return S_OK; } HRESULT Machine::getUSBControllerByName(const com::Utf8Str &aName, ComPtr &aController) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); ComObjPtr ctrl; HRESULT rc = i_getUSBControllerByName(aName, ctrl, true /* aSetError */); if (SUCCEEDED(rc)) ctrl.queryInterfaceTo(aController.asOutParam()); return rc; } HRESULT Machine::getUSBControllerCountByType(USBControllerType_T aType, ULONG *aControllers) { if ( (aType <= USBControllerType_Null) || (aType >= USBControllerType_Last)) return setError(E_INVALIDARG, tr("Invalid USB controller type: %d"), aType); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); ComObjPtr ctrl; *aControllers = i_getUSBControllerCountByType(aType); return S_OK; } HRESULT Machine::removeUSBController(const com::Utf8Str &aName) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; ComObjPtr ctrl; rc = i_getUSBControllerByName(aName, ctrl, true /* aSetError */); if (FAILED(rc)) return rc; i_setModified(IsModified_USB); mUSBControllers.backup(); ctrl->i_unshare(); mUSBControllers->remove(ctrl); /* inform the direct session if any */ alock.release(); i_onUSBControllerChange(); return S_OK; } HRESULT Machine::querySavedGuestScreenInfo(ULONG aScreenId, ULONG *aOriginX, ULONG *aOriginY, ULONG *aWidth, ULONG *aHeight, BOOL *aEnabled) { uint32_t u32OriginX= 0; uint32_t u32OriginY= 0; uint32_t u32Width = 0; uint32_t u32Height = 0; uint16_t u16Flags = 0; #ifdef VBOX_WITH_FULL_VM_ENCRYPTION SsmStream SavedStateStream(mParent, mData->mpKeyStore, mSSData->strStateKeyId, mSSData->strStateKeyStore); #else SsmStream SavedStateStream(mParent, NULL /*pKeyStore*/, Utf8Str::Empty, Utf8Str::Empty); #endif int vrc = readSavedGuestScreenInfo(SavedStateStream, mSSData->strStateFilePath, aScreenId, &u32OriginX, &u32OriginY, &u32Width, &u32Height, &u16Flags); if (RT_FAILURE(vrc)) { #ifdef RT_OS_WINDOWS /* HACK: GUI sets *pfEnabled to 'true' and expects it to stay so if the API fails. * This works with XPCOM. But Windows COM sets all output parameters to zero. * So just assign fEnable to TRUE again. * The right fix would be to change GUI API wrappers to make sure that parameters * are changed only if API succeeds. */ *aEnabled = TRUE; #endif return setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Saved guest size is not available (%Rrc)"), vrc); } *aOriginX = u32OriginX; *aOriginY = u32OriginY; *aWidth = u32Width; *aHeight = u32Height; *aEnabled = (u16Flags & VBVA_SCREEN_F_DISABLED) == 0; return S_OK; } HRESULT Machine::readSavedThumbnailToArray(ULONG aScreenId, BitmapFormat_T aBitmapFormat, ULONG *aWidth, ULONG *aHeight, std::vector &aData) { if (aScreenId != 0) return E_NOTIMPL; if ( aBitmapFormat != BitmapFormat_BGR0 && aBitmapFormat != BitmapFormat_BGRA && aBitmapFormat != BitmapFormat_RGBA && aBitmapFormat != BitmapFormat_PNG) return setError(E_NOTIMPL, tr("Unsupported saved thumbnail format 0x%08X"), aBitmapFormat); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); uint8_t *pu8Data = NULL; uint32_t cbData = 0; uint32_t u32Width = 0; uint32_t u32Height = 0; #ifdef VBOX_WITH_FULL_VM_ENCRYPTION SsmStream SavedStateStream(mParent, mData->mpKeyStore, mSSData->strStateKeyId, mSSData->strStateKeyStore); #else SsmStream SavedStateStream(mParent, NULL /*pKeyStore*/, Utf8Str::Empty, Utf8Str::Empty); #endif int vrc = readSavedDisplayScreenshot(SavedStateStream, mSSData->strStateFilePath, 0 /* u32Type */, &pu8Data, &cbData, &u32Width, &u32Height); if (RT_FAILURE(vrc)) return setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Saved thumbnail data is not available (%Rrc)"), vrc); HRESULT hr = S_OK; *aWidth = u32Width; *aHeight = u32Height; if (cbData > 0) { /* Convert pixels to the format expected by the API caller. */ if (aBitmapFormat == BitmapFormat_BGR0) { /* [0] B, [1] G, [2] R, [3] 0. */ aData.resize(cbData); memcpy(&aData.front(), pu8Data, cbData); } else if (aBitmapFormat == BitmapFormat_BGRA) { /* [0] B, [1] G, [2] R, [3] A. */ aData.resize(cbData); for (uint32_t i = 0; i < cbData; i += 4) { aData[i] = pu8Data[i]; aData[i + 1] = pu8Data[i + 1]; aData[i + 2] = pu8Data[i + 2]; aData[i + 3] = 0xff; } } else if (aBitmapFormat == BitmapFormat_RGBA) { /* [0] R, [1] G, [2] B, [3] A. */ aData.resize(cbData); for (uint32_t i = 0; i < cbData; i += 4) { aData[i] = pu8Data[i + 2]; aData[i + 1] = pu8Data[i + 1]; aData[i + 2] = pu8Data[i]; aData[i + 3] = 0xff; } } else if (aBitmapFormat == BitmapFormat_PNG) { uint8_t *pu8PNG = NULL; uint32_t cbPNG = 0; uint32_t cxPNG = 0; uint32_t cyPNG = 0; vrc = DisplayMakePNG(pu8Data, u32Width, u32Height, &pu8PNG, &cbPNG, &cxPNG, &cyPNG, 0); if (RT_SUCCESS(vrc)) { aData.resize(cbPNG); if (cbPNG) memcpy(&aData.front(), pu8PNG, cbPNG); } else hr = setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Could not convert saved thumbnail to PNG (%Rrc)"), vrc); RTMemFree(pu8PNG); } } freeSavedDisplayScreenshot(pu8Data); return hr; } HRESULT Machine::querySavedScreenshotInfo(ULONG aScreenId, ULONG *aWidth, ULONG *aHeight, std::vector &aBitmapFormats) { if (aScreenId != 0) return E_NOTIMPL; AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); uint8_t *pu8Data = NULL; uint32_t cbData = 0; uint32_t u32Width = 0; uint32_t u32Height = 0; #ifdef VBOX_WITH_FULL_VM_ENCRYPTION SsmStream SavedStateStream(mParent, mData->mpKeyStore, mSSData->strStateKeyId, mSSData->strStateKeyStore); #else SsmStream SavedStateStream(mParent, NULL /*pKeyStore*/, Utf8Str::Empty, Utf8Str::Empty); #endif int vrc = readSavedDisplayScreenshot(SavedStateStream, mSSData->strStateFilePath, 1 /* u32Type */, &pu8Data, &cbData, &u32Width, &u32Height); if (RT_FAILURE(vrc)) return setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Saved screenshot data is not available (%Rrc)"), vrc); *aWidth = u32Width; *aHeight = u32Height; aBitmapFormats.resize(1); aBitmapFormats[0] = BitmapFormat_PNG; freeSavedDisplayScreenshot(pu8Data); return S_OK; } HRESULT Machine::readSavedScreenshotToArray(ULONG aScreenId, BitmapFormat_T aBitmapFormat, ULONG *aWidth, ULONG *aHeight, std::vector &aData) { if (aScreenId != 0) return E_NOTIMPL; if (aBitmapFormat != BitmapFormat_PNG) return E_NOTIMPL; AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); uint8_t *pu8Data = NULL; uint32_t cbData = 0; uint32_t u32Width = 0; uint32_t u32Height = 0; #ifdef VBOX_WITH_FULL_VM_ENCRYPTION SsmStream SavedStateStream(mParent, mData->mpKeyStore, mSSData->strStateKeyId, mSSData->strStateKeyStore); #else SsmStream SavedStateStream(mParent, NULL /*pKeyStore*/, Utf8Str::Empty, Utf8Str::Empty); #endif int vrc = readSavedDisplayScreenshot(SavedStateStream, mSSData->strStateFilePath, 1 /* u32Type */, &pu8Data, &cbData, &u32Width, &u32Height); if (RT_FAILURE(vrc)) return setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Saved screenshot thumbnail data is not available (%Rrc)"), vrc); *aWidth = u32Width; *aHeight = u32Height; aData.resize(cbData); if (cbData) memcpy(&aData.front(), pu8Data, cbData); freeSavedDisplayScreenshot(pu8Data); return S_OK; } HRESULT Machine::hotPlugCPU(ULONG aCpu) { HRESULT rc = S_OK; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (!mHWData->mCPUHotPlugEnabled) return setError(E_INVALIDARG, tr("CPU hotplug is not enabled")); if (aCpu >= mHWData->mCPUCount) return setError(E_INVALIDARG, tr("CPU id exceeds number of possible CPUs [0:%lu]"), mHWData->mCPUCount-1); if (mHWData->mCPUAttached[aCpu]) return setError(VBOX_E_OBJECT_IN_USE, tr("CPU %lu is already attached"), aCpu); rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; alock.release(); rc = i_onCPUChange(aCpu, false); alock.acquire(); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mCPUAttached[aCpu] = true; /** Save settings if online - @todo why is this required? -- @bugref{6818} */ if (Global::IsOnline(mData->mMachineState)) i_saveSettings(NULL, alock); return S_OK; } HRESULT Machine::hotUnplugCPU(ULONG aCpu) { HRESULT rc = S_OK; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (!mHWData->mCPUHotPlugEnabled) return setError(E_INVALIDARG, tr("CPU hotplug is not enabled")); if (aCpu >= SchemaDefs::MaxCPUCount) return setError(E_INVALIDARG, tr("CPU index exceeds maximum CPU count (must be in range [0:%lu])"), SchemaDefs::MaxCPUCount); if (!mHWData->mCPUAttached[aCpu]) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("CPU %lu is not attached"), aCpu); /* CPU 0 can't be detached */ if (aCpu == 0) return setError(E_INVALIDARG, tr("It is not possible to detach CPU 0")); rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; alock.release(); rc = i_onCPUChange(aCpu, true); alock.acquire(); if (FAILED(rc)) return rc; i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mCPUAttached[aCpu] = false; /** Save settings if online - @todo why is this required? -- @bugref{6818} */ if (Global::IsOnline(mData->mMachineState)) i_saveSettings(NULL, alock); return S_OK; } HRESULT Machine::getCPUStatus(ULONG aCpu, BOOL *aAttached) { *aAttached = false; AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); /* If hotplug is enabled the CPU is always enabled. */ if (!mHWData->mCPUHotPlugEnabled) { if (aCpu < mHWData->mCPUCount) *aAttached = true; } else { if (aCpu < SchemaDefs::MaxCPUCount) *aAttached = mHWData->mCPUAttached[aCpu]; } return S_OK; } HRESULT Machine::queryLogFilename(ULONG aIdx, com::Utf8Str &aFilename) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); Utf8Str log = i_getLogFilename(aIdx); if (!RTFileExists(log.c_str())) log.setNull(); aFilename = log; return S_OK; } HRESULT Machine::readLog(ULONG aIdx, LONG64 aOffset, LONG64 aSize, std::vector &aData) { if (aSize < 0) return setError(E_INVALIDARG, tr("The size argument (%lld) is negative"), aSize); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = S_OK; Utf8Str log = i_getLogFilename(aIdx); /* do not unnecessarily hold the lock while doing something which does * not need the lock and potentially takes a long time. */ alock.release(); /* Limit the chunk size to 512K. Gives good performance over (XP)COM, and * keeps the SOAP reply size under 1M for the webservice (we're using * base64 encoded strings for binary data for years now, avoiding the * expansion of each byte array element to approx. 25 bytes of XML. */ size_t cbData = (size_t)RT_MIN(aSize, _512K); aData.resize(cbData); int vrc = VINF_SUCCESS; RTVFSIOSTREAM hVfsIosLog = NIL_RTVFSIOSTREAM; #ifdef VBOX_WITH_FULL_VM_ENCRYPTION if (mData->mstrLogKeyId.isNotEmpty() && mData->mstrLogKeyStore.isNotEmpty()) { PCVBOXCRYPTOIF pCryptoIf = NULL; rc = i_getVirtualBox()->i_retainCryptoIf(&pCryptoIf); if (SUCCEEDED(rc)) { alock.acquire(); SecretKey *pKey = NULL; vrc = mData->mpKeyStore->retainSecretKey(mData->mstrLogKeyId, &pKey); alock.release(); if (RT_SUCCESS(vrc)) { vrc = RTVfsIoStrmOpenNormal(log.c_str(), RTFILE_O_OPEN | RTFILE_O_READ | RTFILE_O_DENY_NONE, &hVfsIosLog); if (RT_SUCCESS(vrc)) { RTVFSIOSTREAM hVfsIosLogDec = NIL_RTVFSIOSTREAM; vrc = pCryptoIf->pfnCryptoIoStrmFromVfsIoStrmDecrypt(hVfsIosLog, mData->mstrLogKeyStore.c_str(), (const char *)pKey->getKeyBuffer(), &hVfsIosLogDec); if (RT_SUCCESS(vrc)) { RTVfsIoStrmRelease(hVfsIosLog); hVfsIosLog = hVfsIosLogDec; } } pKey->release(); } i_getVirtualBox()->i_releaseCryptoIf(pCryptoIf); } } else vrc = RTVfsIoStrmOpenNormal(log.c_str(), RTFILE_O_OPEN | RTFILE_O_READ | RTFILE_O_DENY_NONE, &hVfsIosLog); #else vrc = RTVfsIoStrmOpenNormal(log.c_str(), RTFILE_O_OPEN | RTFILE_O_READ | RTFILE_O_DENY_NONE, &hVfsIosLog); #endif if (RT_SUCCESS(vrc)) { vrc = RTVfsIoStrmReadAt(hVfsIosLog, aOffset, cbData ? &aData.front() : NULL, cbData, true /*fBlocking*/, &cbData); if (RT_SUCCESS(vrc)) aData.resize(cbData); else rc = setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Could not read log file '%s' (%Rrc)"), log.c_str(), vrc); RTVfsIoStrmRelease(hVfsIosLog); } else rc = setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Could not open log file '%s' (%Rrc)"), log.c_str(), vrc); if (FAILED(rc)) aData.resize(0); return rc; } /** * Currently this method doesn't attach device to the running VM, * just makes sure it's plugged on next VM start. */ HRESULT Machine::attachHostPCIDevice(LONG aHostAddress, LONG aDesiredGuestAddress, BOOL /* aTryToUnbind */) { // lock scope { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; ChipsetType_T aChipset = ChipsetType_PIIX3; COMGETTER(ChipsetType)(&aChipset); if (aChipset != ChipsetType_ICH9) { return setError(E_INVALIDARG, tr("Host PCI attachment only supported with ICH9 chipset")); } // check if device with this host PCI address already attached for (HWData::PCIDeviceAssignmentList::const_iterator it = mHWData->mPCIDeviceAssignments.begin(); it != mHWData->mPCIDeviceAssignments.end(); ++it) { LONG iHostAddress = -1; ComPtr pAttach; pAttach = *it; pAttach->COMGETTER(HostAddress)(&iHostAddress); if (iHostAddress == aHostAddress) return setError(E_INVALIDARG, tr("Device with host PCI address already attached to this VM")); } ComObjPtr pda; char name[32]; RTStrPrintf(name, sizeof(name), "host%02x:%02x.%x", (aHostAddress>>8) & 0xff, (aHostAddress & 0xf8) >> 3, aHostAddress & 7); pda.createObject(); pda->init(this, name, aHostAddress, aDesiredGuestAddress, TRUE); i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mPCIDeviceAssignments.push_back(pda); } return S_OK; } /** * Currently this method doesn't detach device from the running VM, * just makes sure it's not plugged on next VM start. */ HRESULT Machine::detachHostPCIDevice(LONG aHostAddress) { ComObjPtr pAttach; bool fRemoved = false; HRESULT rc; // lock scope { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; for (HWData::PCIDeviceAssignmentList::const_iterator it = mHWData->mPCIDeviceAssignments.begin(); it != mHWData->mPCIDeviceAssignments.end(); ++it) { LONG iHostAddress = -1; pAttach = *it; pAttach->COMGETTER(HostAddress)(&iHostAddress); if (iHostAddress != -1 && iHostAddress == aHostAddress) { i_setModified(IsModified_MachineData); mHWData.backup(); mHWData->mPCIDeviceAssignments.remove(pAttach); fRemoved = true; break; } } } /* Fire event outside of the lock */ if (fRemoved) { Assert(!pAttach.isNull()); ComPtr es; rc = mParent->COMGETTER(EventSource)(es.asOutParam()); Assert(SUCCEEDED(rc)); Bstr mid; rc = this->COMGETTER(Id)(mid.asOutParam()); Assert(SUCCEEDED(rc)); ::FireHostPCIDevicePlugEvent(es, mid.raw(), false /* unplugged */, true /* success */, pAttach, NULL); } return fRemoved ? S_OK : setError(VBOX_E_OBJECT_NOT_FOUND, tr("No host PCI device %08x attached"), aHostAddress ); } HRESULT Machine::getPCIDeviceAssignments(std::vector > &aPCIDeviceAssignments) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aPCIDeviceAssignments.resize(mHWData->mPCIDeviceAssignments.size()); size_t i = 0; for (std::list >::const_iterator it = mHWData->mPCIDeviceAssignments.begin(); it != mHWData->mPCIDeviceAssignments.end(); ++it, ++i) (*it).queryInterfaceTo(aPCIDeviceAssignments[i].asOutParam()); return S_OK; } HRESULT Machine::getBandwidthControl(ComPtr &aBandwidthControl) { mBandwidthControl.queryInterfaceTo(aBandwidthControl.asOutParam()); return S_OK; } HRESULT Machine::getTracingEnabled(BOOL *aTracingEnabled) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aTracingEnabled = mHWData->mDebugging.fTracingEnabled; return S_OK; } HRESULT Machine::setTracingEnabled(BOOL aTracingEnabled) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableStateDep); if (SUCCEEDED(hrc)) { hrc = mHWData.backupEx(); if (SUCCEEDED(hrc)) { i_setModified(IsModified_MachineData); mHWData->mDebugging.fTracingEnabled = aTracingEnabled != FALSE; } } return hrc; } HRESULT Machine::getTracingConfig(com::Utf8Str &aTracingConfig) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aTracingConfig = mHWData->mDebugging.strTracingConfig; return S_OK; } HRESULT Machine::setTracingConfig(const com::Utf8Str &aTracingConfig) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableStateDep); if (SUCCEEDED(hrc)) { hrc = mHWData.backupEx(); if (SUCCEEDED(hrc)) { mHWData->mDebugging.strTracingConfig = aTracingConfig; if (SUCCEEDED(hrc)) i_setModified(IsModified_MachineData); } } return hrc; } HRESULT Machine::getAllowTracingToAccessVM(BOOL *aAllowTracingToAccessVM) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aAllowTracingToAccessVM = mHWData->mDebugging.fAllowTracingToAccessVM; return S_OK; } HRESULT Machine::setAllowTracingToAccessVM(BOOL aAllowTracingToAccessVM) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableStateDep); if (SUCCEEDED(hrc)) { hrc = mHWData.backupEx(); if (SUCCEEDED(hrc)) { i_setModified(IsModified_MachineData); mHWData->mDebugging.fAllowTracingToAccessVM = aAllowTracingToAccessVM != FALSE; } } return hrc; } HRESULT Machine::getAutostartEnabled(BOOL *aAutostartEnabled) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aAutostartEnabled = mHWData->mAutostart.fAutostartEnabled; return S_OK; } HRESULT Machine::setAutostartEnabled(BOOL aAutostartEnabled) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableOrSavedOrRunningStateDep); if ( SUCCEEDED(hrc) && mHWData->mAutostart.fAutostartEnabled != !!aAutostartEnabled) { AutostartDb *autostartDb = mParent->i_getAutostartDb(); int vrc; if (aAutostartEnabled) vrc = autostartDb->addAutostartVM(mUserData->s.strName.c_str()); else vrc = autostartDb->removeAutostartVM(mUserData->s.strName.c_str()); if (RT_SUCCESS(vrc)) { hrc = mHWData.backupEx(); if (SUCCEEDED(hrc)) { i_setModified(IsModified_MachineData); mHWData->mAutostart.fAutostartEnabled = aAutostartEnabled != FALSE; } } else if (vrc == VERR_NOT_SUPPORTED) hrc = setError(VBOX_E_NOT_SUPPORTED, tr("The VM autostart feature is not supported on this platform")); else if (vrc == VERR_PATH_NOT_FOUND) hrc = setError(E_FAIL, tr("The path to the autostart database is not set")); else hrc = setError(E_UNEXPECTED, aAutostartEnabled ? tr("Adding machine '%s' to the autostart database failed with %Rrc") : tr("Removing machine '%s' from the autostart database failed with %Rrc"), mUserData->s.strName.c_str(), vrc); } return hrc; } HRESULT Machine::getAutostartDelay(ULONG *aAutostartDelay) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aAutostartDelay = mHWData->mAutostart.uAutostartDelay; return S_OK; } HRESULT Machine::setAutostartDelay(ULONG aAutostartDelay) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableOrSavedOrRunningStateDep); if (SUCCEEDED(hrc)) { hrc = mHWData.backupEx(); if (SUCCEEDED(hrc)) { i_setModified(IsModified_MachineData); mHWData->mAutostart.uAutostartDelay = aAutostartDelay; } } return hrc; } HRESULT Machine::getAutostopType(AutostopType_T *aAutostopType) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aAutostopType = mHWData->mAutostart.enmAutostopType; return S_OK; } HRESULT Machine::setAutostopType(AutostopType_T aAutostopType) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableOrSavedOrRunningStateDep); if ( SUCCEEDED(hrc) && mHWData->mAutostart.enmAutostopType != aAutostopType) { AutostartDb *autostartDb = mParent->i_getAutostartDb(); int vrc; if (aAutostopType != AutostopType_Disabled) vrc = autostartDb->addAutostopVM(mUserData->s.strName.c_str()); else vrc = autostartDb->removeAutostopVM(mUserData->s.strName.c_str()); if (RT_SUCCESS(vrc)) { hrc = mHWData.backupEx(); if (SUCCEEDED(hrc)) { i_setModified(IsModified_MachineData); mHWData->mAutostart.enmAutostopType = aAutostopType; } } else if (vrc == VERR_NOT_SUPPORTED) hrc = setError(VBOX_E_NOT_SUPPORTED, tr("The VM autostop feature is not supported on this platform")); else if (vrc == VERR_PATH_NOT_FOUND) hrc = setError(E_FAIL, tr("The path to the autostart database is not set")); else hrc = setError(E_UNEXPECTED, aAutostopType != AutostopType_Disabled ? tr("Adding machine '%s' to the autostop database failed with %Rrc") : tr("Removing machine '%s' from the autostop database failed with %Rrc"), mUserData->s.strName.c_str(), vrc); } return hrc; } HRESULT Machine::getDefaultFrontend(com::Utf8Str &aDefaultFrontend) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); aDefaultFrontend = mHWData->mDefaultFrontend; return S_OK; } HRESULT Machine::setDefaultFrontend(const com::Utf8Str &aDefaultFrontend) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableOrSavedStateDep); if (SUCCEEDED(hrc)) { hrc = mHWData.backupEx(); if (SUCCEEDED(hrc)) { i_setModified(IsModified_MachineData); mHWData->mDefaultFrontend = aDefaultFrontend; } } return hrc; } HRESULT Machine::getIcon(std::vector &aIcon) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); size_t cbIcon = mUserData->s.ovIcon.size(); aIcon.resize(cbIcon); if (cbIcon) memcpy(&aIcon.front(), &mUserData->s.ovIcon[0], cbIcon); return S_OK; } HRESULT Machine::setIcon(const std::vector &aIcon) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableOrSavedStateDep); if (SUCCEEDED(hrc)) { i_setModified(IsModified_MachineData); mUserData.backup(); size_t cbIcon = aIcon.size(); mUserData->s.ovIcon.resize(cbIcon); if (cbIcon) memcpy(&mUserData->s.ovIcon[0], &aIcon.front(), cbIcon); } return hrc; } HRESULT Machine::getUSBProxyAvailable(BOOL *aUSBProxyAvailable) { #ifdef VBOX_WITH_USB *aUSBProxyAvailable = true; #else *aUSBProxyAvailable = false; #endif return S_OK; } HRESULT Machine::getVMProcessPriority(VMProcPriority_T *aVMProcessPriority) { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); *aVMProcessPriority = mUserData->s.enmVMPriority; return S_OK; } HRESULT Machine::setVMProcessPriority(VMProcPriority_T aVMProcessPriority) { RT_NOREF(aVMProcessPriority); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hrc = i_checkStateDependency(MutableOrSavedOrRunningStateDep); if (SUCCEEDED(hrc)) { hrc = mUserData.backupEx(); if (SUCCEEDED(hrc)) { i_setModified(IsModified_MachineData); mUserData->s.enmVMPriority = aVMProcessPriority; } } alock.release(); if (SUCCEEDED(hrc)) hrc = i_onVMProcessPriorityChange(aVMProcessPriority); return hrc; } HRESULT Machine::cloneTo(const ComPtr &aTarget, CloneMode_T aMode, const std::vector &aOptions, ComPtr &aProgress) { ComObjPtr pP; Progress *ppP = pP; IProgress *iP = static_cast(ppP); IProgress **pProgress = &iP; IMachine *pTarget = aTarget; /* Convert the options. */ RTCList optList; if (aOptions.size()) for (size_t i = 0; i < aOptions.size(); ++i) optList.append(aOptions[i]); if (optList.contains(CloneOptions_Link)) { if (!i_isSnapshotMachine()) return setError(E_INVALIDARG, tr("Linked clone can only be created from a snapshot")); if (aMode != CloneMode_MachineState) return setError(E_INVALIDARG, tr("Linked clone can only be created for a single machine state")); } AssertReturn(!(optList.contains(CloneOptions_KeepAllMACs) && optList.contains(CloneOptions_KeepNATMACs)), E_INVALIDARG); MachineCloneVM *pWorker = new MachineCloneVM(this, static_cast(pTarget), aMode, optList); HRESULT rc = pWorker->start(pProgress); pP = static_cast(*pProgress); pP.queryInterfaceTo(aProgress.asOutParam()); return rc; } HRESULT Machine::moveTo(const com::Utf8Str &aTargetPath, const com::Utf8Str &aType, ComPtr &aProgress) { LogFlowThisFuncEnter(); ComObjPtr ptrProgress; HRESULT hrc = ptrProgress.createObject(); if (SUCCEEDED(hrc)) { com::Utf8Str strDefaultPath; if (aTargetPath.isEmpty()) i_calculateFullPath(".", strDefaultPath); /* Initialize our worker task */ MachineMoveVM *pTask = NULL; try { pTask = new MachineMoveVM(this, aTargetPath.isEmpty() ? strDefaultPath : aTargetPath, aType, ptrProgress); } catch (std::bad_alloc &) { return E_OUTOFMEMORY; } hrc = pTask->init();//no exceptions are thrown if (SUCCEEDED(hrc)) { hrc = pTask->createThread(); pTask = NULL; /* Consumed by createThread(). */ if (SUCCEEDED(hrc)) ptrProgress.queryInterfaceTo(aProgress.asOutParam()); else setError(hrc, tr("Failed to create a worker thread for the MachineMoveVM task")); } else delete pTask; } LogFlowThisFuncLeave(); return hrc; } HRESULT Machine::saveState(ComPtr &aProgress) { NOREF(aProgress); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); // This check should always fail. HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; AssertFailedReturn(E_NOTIMPL); } HRESULT Machine::adoptSavedState(const com::Utf8Str &aSavedStateFile) { NOREF(aSavedStateFile); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); // This check should always fail. HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; AssertFailedReturn(E_NOTIMPL); } HRESULT Machine::discardSavedState(BOOL aFRemoveFile) { NOREF(aFRemoveFile); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); // This check should always fail. HRESULT rc = i_checkStateDependency(MutableOrSavedStateDep); if (FAILED(rc)) return rc; AssertFailedReturn(E_NOTIMPL); } // public methods for internal purposes ///////////////////////////////////////////////////////////////////////////// /** * Adds the given IsModified_* flag to the dirty flags of the machine. * This must be called either during i_loadSettings or under the machine write lock. * @param fl Flag * @param fAllowStateModification If state modifications are allowed. */ void Machine::i_setModified(uint32_t fl, bool fAllowStateModification /* = true */) { mData->flModifications |= fl; if (fAllowStateModification && i_isStateModificationAllowed()) mData->mCurrentStateModified = true; } /** * Adds the given IsModified_* flag to the dirty flags of the machine, taking * care of the write locking. * * @param fModification The flag to add. * @param fAllowStateModification If state modifications are allowed. */ void Machine::i_setModifiedLock(uint32_t fModification, bool fAllowStateModification /* = true */) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); i_setModified(fModification, fAllowStateModification); } /** * Saves the registry entry of this machine to the given configuration node. * * @param data Machine registry data. * * @note locks this object for reading. */ HRESULT Machine::i_saveRegistryEntry(settings::MachineRegistryEntry &data) { AutoLimitedCaller autoCaller(this); AssertComRCReturnRC(autoCaller.rc()); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); data.uuid = mData->mUuid; data.strSettingsFile = mData->m_strConfigFile; return S_OK; } /** * Calculates the absolute path of the given path taking the directory of the * machine settings file as the current directory. * * @param strPath Path to calculate the absolute path for. * @param aResult Where to put the result (used only on success, can be the * same Utf8Str instance as passed in @a aPath). * @return IPRT result. * * @note Locks this object for reading. */ int Machine::i_calculateFullPath(const Utf8Str &strPath, Utf8Str &aResult) { AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), Global::vboxStatusCodeFromCOM(autoCaller.rc())); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); AssertReturn(!mData->m_strConfigFileFull.isEmpty(), VERR_GENERAL_FAILURE); Utf8Str strSettingsDir = mData->m_strConfigFileFull; strSettingsDir.stripFilename(); char szFolder[RTPATH_MAX]; size_t cbFolder = sizeof(szFolder); int vrc = RTPathAbsEx(strSettingsDir.c_str(), strPath.c_str(), RTPATH_STR_F_STYLE_HOST, szFolder, &cbFolder); if (RT_SUCCESS(vrc)) aResult = szFolder; return vrc; } /** * Copies strSource to strTarget, making it relative to the machine folder * if it is a subdirectory thereof, or simply copying it otherwise. * * @param strSource Path to evaluate and copy. * @param strTarget Buffer to receive target path. * * @note Locks this object for reading. */ void Machine::i_copyPathRelativeToMachine(const Utf8Str &strSource, Utf8Str &strTarget) { AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), (void)0); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); AssertReturnVoid(!mData->m_strConfigFileFull.isEmpty()); // use strTarget as a temporary buffer to hold the machine settings dir strTarget = mData->m_strConfigFileFull; strTarget.stripFilename(); if (RTPathStartsWith(strSource.c_str(), strTarget.c_str())) { // is relative: then append what's left strTarget = strSource.substr(strTarget.length() + 1); // skip '/' // for empty paths (only possible for subdirs) use "." to avoid // triggering default settings for not present config attributes. if (strTarget.isEmpty()) strTarget = "."; } else // is not relative: then overwrite strTarget = strSource; } /** * Returns the full path to the machine's log folder in the * \a aLogFolder argument. */ void Machine::i_getLogFolder(Utf8Str &aLogFolder) { AutoCaller autoCaller(this); AssertComRCReturnVoid(autoCaller.rc()); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); char szTmp[RTPATH_MAX]; int vrc = RTEnvGetEx(RTENV_DEFAULT, "VBOX_USER_VMLOGDIR", szTmp, sizeof(szTmp), NULL); if (RT_SUCCESS(vrc)) { if (szTmp[0] && !mUserData.isNull()) { char szTmp2[RTPATH_MAX]; vrc = RTPathAbs(szTmp, szTmp2, sizeof(szTmp2)); if (RT_SUCCESS(vrc)) aLogFolder.printf("%s%c%s", szTmp2, RTPATH_DELIMITER, mUserData->s.strName.c_str()); // path/to/logfolder/vmname } else vrc = VERR_PATH_IS_RELATIVE; } if (RT_FAILURE(vrc)) { // fallback if VBOX_USER_LOGHOME is not set or invalid aLogFolder = mData->m_strConfigFileFull; // path/to/machinesfolder/vmname/vmname.vbox aLogFolder.stripFilename(); // path/to/machinesfolder/vmname aLogFolder.append(RTPATH_DELIMITER); aLogFolder.append("Logs"); // path/to/machinesfolder/vmname/Logs } } /** * Returns the full path to the machine's log file for an given index. */ Utf8Str Machine::i_getLogFilename(ULONG idx) { Utf8Str logFolder; getLogFolder(logFolder); Assert(logFolder.length()); Utf8Str log; if (idx == 0) log.printf("%s%cVBox.log", logFolder.c_str(), RTPATH_DELIMITER); #if defined(RT_OS_WINDOWS) && defined(VBOX_WITH_HARDENING) else if (idx == 1) log.printf("%s%cVBoxHardening.log", logFolder.c_str(), RTPATH_DELIMITER); else log.printf("%s%cVBox.log.%u", logFolder.c_str(), RTPATH_DELIMITER, idx - 1); #else else log.printf("%s%cVBox.log.%u", logFolder.c_str(), RTPATH_DELIMITER, idx); #endif return log; } /** * Returns the full path to the machine's hardened log file. */ Utf8Str Machine::i_getHardeningLogFilename(void) { Utf8Str strFilename; getLogFolder(strFilename); Assert(strFilename.length()); strFilename.append(RTPATH_SLASH_STR "VBoxHardening.log"); return strFilename; } /** * Returns the default NVRAM filename based on the location of the VM config. * Note that this is a relative path. */ Utf8Str Machine::i_getDefaultNVRAMFilename() { AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), Utf8Str::Empty); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (i_isSnapshotMachine()) return Utf8Str::Empty; Utf8Str strNVRAMFilePath = mData->m_strConfigFileFull; strNVRAMFilePath.stripPath(); strNVRAMFilePath.stripSuffix(); strNVRAMFilePath += ".nvram"; return strNVRAMFilePath; } /** * Returns the NVRAM filename for a new snapshot. This intentionally works * similarly to the saved state file naming. Note that this is usually * a relative path, unless the snapshot folder is absolute. */ Utf8Str Machine::i_getSnapshotNVRAMFilename() { AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), Utf8Str::Empty); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); RTTIMESPEC ts; RTTimeNow(&ts); RTTIME time; RTTimeExplode(&time, &ts); Utf8Str strNVRAMFilePath = mUserData->s.strSnapshotFolder; strNVRAMFilePath += RTPATH_DELIMITER; strNVRAMFilePath.appendPrintf("%04d-%02u-%02uT%02u-%02u-%02u-%09uZ.nvram", time.i32Year, time.u8Month, time.u8MonthDay, time.u8Hour, time.u8Minute, time.u8Second, time.u32Nanosecond); return strNVRAMFilePath; } /** * Returns the version of the settings file. */ SettingsVersion_T Machine::i_getSettingsVersion(void) { AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), SettingsVersion_Null); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); return mData->pMachineConfigFile->getSettingsVersion(); } /** * Composes a unique saved state filename based on the current system time. The filename is * granular to the second so this will work so long as no more than one snapshot is taken on * a machine per second. * * Before version 4.1, we used this formula for saved state files: * Utf8StrFmt("%s%c{%RTuuid}.sav", strFullSnapshotFolder.c_str(), RTPATH_DELIMITER, mData->mUuid.raw()) * which no longer works because saved state files can now be shared between the saved state of the * "saved" machine and an online snapshot, and the following would cause problems: * 1) save machine * 2) create online snapshot from that machine state --> reusing saved state file * 3) save machine again --> filename would be reused, breaking the online snapshot * * So instead we now use a timestamp. * * @param strStateFilePath */ void Machine::i_composeSavedStateFilename(Utf8Str &strStateFilePath) { AutoCaller autoCaller(this); AssertComRCReturnVoid(autoCaller.rc()); { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); i_calculateFullPath(mUserData->s.strSnapshotFolder, strStateFilePath); } RTTIMESPEC ts; RTTimeNow(&ts); RTTIME time; RTTimeExplode(&time, &ts); strStateFilePath += RTPATH_DELIMITER; strStateFilePath.appendPrintf("%04d-%02u-%02uT%02u-%02u-%02u-%09uZ.sav", time.i32Year, time.u8Month, time.u8MonthDay, time.u8Hour, time.u8Minute, time.u8Second, time.u32Nanosecond); } /** * Returns whether at least one USB controller is present for the VM. */ bool Machine::i_isUSBControllerPresent() { AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), false); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); return (mUSBControllers->size() > 0); } /** * @note Locks this object for writing, calls the client process * (inside the lock). */ HRESULT Machine::i_launchVMProcess(IInternalSessionControl *aControl, const Utf8Str &strFrontend, const std::vector &aEnvironmentChanges, ProgressProxy *aProgress) { LogFlowThisFuncEnter(); AssertReturn(aControl, E_FAIL); AssertReturn(aProgress, E_FAIL); AssertReturn(!strFrontend.isEmpty(), E_FAIL); AutoCaller autoCaller(this); if (FAILED(autoCaller.rc())) return autoCaller.rc(); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (!mData->mRegistered) return setError(E_UNEXPECTED, tr("The machine '%s' is not registered"), mUserData->s.strName.c_str()); LogFlowThisFunc(("mSession.mState=%s\n", ::stringifySessionState(mData->mSession.mState))); /* The process started when launching a VM with separate UI/VM processes is always * the UI process, i.e. needs special handling as it won't claim the session. */ bool fSeparate = strFrontend.endsWith("separate", Utf8Str::CaseInsensitive); if (fSeparate) { if (mData->mSession.mState != SessionState_Unlocked && mData->mSession.mName != "headless") return setError(VBOX_E_INVALID_OBJECT_STATE, tr("The machine '%s' is in a state which is incompatible with launching a separate UI process"), mUserData->s.strName.c_str()); } else { if ( mData->mSession.mState == SessionState_Locked || mData->mSession.mState == SessionState_Spawning || mData->mSession.mState == SessionState_Unlocking) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("The machine '%s' is already locked by a session (or being locked or unlocked)"), mUserData->s.strName.c_str()); /* may not be busy */ AssertReturn(!Global::IsOnlineOrTransient(mData->mMachineState), E_FAIL); } /* Hardening logging */ #if defined(RT_OS_WINDOWS) && defined(VBOX_WITH_HARDENING) Utf8Str strSupHardeningLogArg("--sup-hardening-log="); { Utf8Str strHardeningLogFile = i_getHardeningLogFilename(); int vrc2; /* ignore rc */ i_deleteFile(strHardeningLogFile, false /* fIgnoreFailures */, tr("hardening log file"), &vrc2); if (vrc2 == VERR_PATH_NOT_FOUND || vrc2 == VERR_FILE_NOT_FOUND) { Utf8Str strStartupLogDir = strHardeningLogFile; strStartupLogDir.stripFilename(); RTDirCreateFullPath(strStartupLogDir.c_str(), 0755); /** @todo add a variant for creating the path to a file without stripping the file. */ } strSupHardeningLogArg.append(strHardeningLogFile); /* Remove legacy log filename to avoid confusion. */ Utf8Str strOldStartupLogFile; getLogFolder(strOldStartupLogFile); strOldStartupLogFile.append(RTPATH_SLASH_STR "VBoxStartup.log"); i_deleteFile(strOldStartupLogFile, true /* fIgnoreFailures */); } #else Utf8Str strSupHardeningLogArg; #endif Utf8Str strAppOverride; #ifdef RT_OS_DARWIN /* Avoid Launch Services confusing this with the selector by using a helper app. */ strAppOverride = i_getExtraData(Utf8Str("VBoxInternal2/VirtualBoxVMAppOverride")); #endif bool fUseVBoxSDS = false; Utf8Str strCanonicalName; if (false) { } #ifdef VBOX_WITH_QTGUI else if ( !strFrontend.compare("gui", Utf8Str::CaseInsensitive) || !strFrontend.compare("GUI/Qt", Utf8Str::CaseInsensitive) || !strFrontend.compare("separate", Utf8Str::CaseInsensitive) || !strFrontend.compare("gui/separate", Utf8Str::CaseInsensitive) || !strFrontend.compare("GUI/Qt/separate", Utf8Str::CaseInsensitive)) { strCanonicalName = "GUI/Qt"; fUseVBoxSDS = true; } #endif #ifdef VBOX_WITH_VBOXSDL else if ( !strFrontend.compare("sdl", Utf8Str::CaseInsensitive) || !strFrontend.compare("GUI/SDL", Utf8Str::CaseInsensitive) || !strFrontend.compare("sdl/separate", Utf8Str::CaseInsensitive) || !strFrontend.compare("GUI/SDL/separate", Utf8Str::CaseInsensitive)) { strCanonicalName = "GUI/SDL"; fUseVBoxSDS = true; } #endif #ifdef VBOX_WITH_HEADLESS else if ( !strFrontend.compare("headless", Utf8Str::CaseInsensitive) || !strFrontend.compare("capture", Utf8Str::CaseInsensitive) || !strFrontend.compare("vrdp", Utf8Str::CaseInsensitive) /* Deprecated. Same as headless. */) { strCanonicalName = "headless"; } #endif else return setError(E_INVALIDARG, tr("Invalid frontend name: '%s'"), strFrontend.c_str()); Utf8Str idStr = mData->mUuid.toString(); Utf8Str const &strMachineName = mUserData->s.strName; RTPROCESS pid = NIL_RTPROCESS; #if !defined(VBOX_WITH_SDS) || !defined(RT_OS_WINDOWS) RT_NOREF(fUseVBoxSDS); #else DWORD idCallerSession = ~(DWORD)0; if (fUseVBoxSDS) { /* * The VBoxSDS should be used for process launching the VM with * GUI only if the caller and the VBoxSDS are in different Windows * sessions and the caller in the interactive one. */ fUseVBoxSDS = false; /* Get windows session of the current process. The process token used due to several reasons: 1. The token is absent for the current thread except someone set it for us. 2. Needs to get the id of the session where the process is started. We only need to do this once, though. */ static DWORD s_idCurrentSession = ~(DWORD)0; DWORD idCurrentSession = s_idCurrentSession; if (idCurrentSession == ~(DWORD)0) { HANDLE hCurrentProcessToken = NULL; if (OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY | TOKEN_READ, &hCurrentProcessToken)) { DWORD cbIgn = 0; if (GetTokenInformation(hCurrentProcessToken, TokenSessionId, &idCurrentSession, sizeof(idCurrentSession), &cbIgn)) s_idCurrentSession = idCurrentSession; else { idCurrentSession = ~(DWORD)0; LogRelFunc(("GetTokenInformation/TokenSessionId on self failed: %u\n", GetLastError())); } CloseHandle(hCurrentProcessToken); } else LogRelFunc(("OpenProcessToken/self failed: %u\n", GetLastError())); } /* get the caller's session */ HRESULT hrc = CoImpersonateClient(); if (SUCCEEDED(hrc)) { HANDLE hCallerThreadToken; if (OpenThreadToken(GetCurrentThread(), TOKEN_QUERY | TOKEN_READ, FALSE /* OpenAsSelf - for impersonation at SecurityIdentification level */, &hCallerThreadToken)) { SetLastError(NO_ERROR); DWORD cbIgn = 0; if (GetTokenInformation(hCallerThreadToken, TokenSessionId, &idCallerSession, sizeof(DWORD), &cbIgn)) { /* Only need to use SDS if the session ID differs: */ if (idCurrentSession != idCallerSession) { fUseVBoxSDS = false; /* Obtain the groups the access token belongs to so we can see if the session is interactive: */ DWORD cbTokenGroups = 0; PTOKEN_GROUPS pTokenGroups = NULL; if ( !GetTokenInformation(hCallerThreadToken, TokenGroups, pTokenGroups, 0, &cbTokenGroups) && GetLastError() == ERROR_INSUFFICIENT_BUFFER) pTokenGroups = (PTOKEN_GROUPS)RTMemTmpAllocZ(cbTokenGroups); if (GetTokenInformation(hCallerThreadToken, TokenGroups, pTokenGroups, cbTokenGroups, &cbTokenGroups)) { /* Well-known interactive SID: SECURITY_INTERACTIVE_RID, S-1-5-4: */ SID_IDENTIFIER_AUTHORITY sidIdNTAuthority = SECURITY_NT_AUTHORITY; PSID pInteractiveSid = NULL; if (AllocateAndInitializeSid(&sidIdNTAuthority, 1, 4, 0, 0, 0, 0, 0, 0, 0, &pInteractiveSid)) { /* Iterate over the groups looking for the interactive SID: */ fUseVBoxSDS = false; for (DWORD dwIndex = 0; dwIndex < pTokenGroups->GroupCount; dwIndex++) if (EqualSid(pTokenGroups->Groups[dwIndex].Sid, pInteractiveSid)) { fUseVBoxSDS = true; break; } FreeSid(pInteractiveSid); } } else LogRelFunc(("GetTokenInformation/TokenGroups failed: %u\n", GetLastError())); RTMemTmpFree(pTokenGroups); } } else LogRelFunc(("GetTokenInformation/TokenSessionId failed: %u\n", GetLastError())); CloseHandle(hCallerThreadToken); } else LogRelFunc(("OpenThreadToken/client failed: %u\n", GetLastError())); CoRevertToSelf(); } else LogRelFunc(("CoImpersonateClient failed: %Rhrc\n", hrc)); } if (fUseVBoxSDS) { /* connect to VBoxSDS */ ComPtr pVBoxSDS; HRESULT rc = pVBoxSDS.createLocalObject(CLSID_VirtualBoxSDS); if (FAILED(rc)) return setError(rc, tr("Failed to start the machine '%s'. A connection to VBoxSDS cannot be established"), strMachineName.c_str()); /* By default the RPC_C_IMP_LEVEL_IDENTIFY is used for impersonation the client. It allows ACL checking but restricts an access to system objects e.g. files. Call to CoSetProxyBlanket elevates the impersonation level up to RPC_C_IMP_LEVEL_IMPERSONATE allowing the VBoxSDS service to access the files. */ rc = CoSetProxyBlanket(pVBoxSDS, RPC_C_AUTHN_DEFAULT, RPC_C_AUTHZ_DEFAULT, COLE_DEFAULT_PRINCIPAL, RPC_C_AUTHN_LEVEL_DEFAULT, RPC_C_IMP_LEVEL_IMPERSONATE, NULL, EOAC_DEFAULT); if (FAILED(rc)) return setError(rc, tr("Failed to start the machine '%s'. CoSetProxyBlanket failed"), strMachineName.c_str()); size_t const cEnvVars = aEnvironmentChanges.size(); com::SafeArray aBstrEnvironmentChanges(cEnvVars); for (size_t i = 0; i < cEnvVars; i++) aBstrEnvironmentChanges[i] = Bstr(aEnvironmentChanges[i]).raw(); ULONG uPid = 0; rc = pVBoxSDS->LaunchVMProcess(Bstr(idStr).raw(), Bstr(strMachineName).raw(), Bstr(strFrontend).raw(), ComSafeArrayAsInParam(aBstrEnvironmentChanges), Bstr(strSupHardeningLogArg).raw(), idCallerSession, &uPid); if (FAILED(rc)) return setError(rc, tr("Failed to start the machine '%s'. Process creation failed"), strMachineName.c_str()); pid = (RTPROCESS)uPid; } else #endif /* VBOX_WITH_SDS && RT_OS_WINDOWS */ { int vrc = MachineLaunchVMCommonWorker(idStr, strMachineName, strFrontend, aEnvironmentChanges, strSupHardeningLogArg, strAppOverride, 0 /*fFlags*/, NULL /*pvExtraData*/, pid); if (RT_FAILURE(vrc)) return setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Could not launch the VM process for the machine '%s' (%Rrc)"), strMachineName.c_str(), vrc); } LogRel(("Launched VM: %u pid: %u (%#x) frontend: %s name: %s\n", idStr.c_str(), pid, pid, strFrontend.c_str(), strMachineName.c_str())); if (!fSeparate) { /* * Note that we don't release the lock here before calling the client, * because it doesn't need to call us back if called with a NULL argument. * Releasing the lock here is dangerous because we didn't prepare the * launch data yet, but the client we've just started may happen to be * too fast and call LockMachine() that will fail (because of PID, etc.), * so that the Machine will never get out of the Spawning session state. */ /* inform the session that it will be a remote one */ LogFlowThisFunc(("Calling AssignMachine (NULL)...\n")); #ifndef VBOX_WITH_GENERIC_SESSION_WATCHER HRESULT rc = aControl->AssignMachine(NULL, LockType_Write, Bstr::Empty.raw()); #else /* VBOX_WITH_GENERIC_SESSION_WATCHER */ HRESULT rc = aControl->AssignMachine(NULL, LockType_Write, NULL); #endif /* VBOX_WITH_GENERIC_SESSION_WATCHER */ LogFlowThisFunc(("AssignMachine (NULL) returned %08X\n", rc)); if (FAILED(rc)) { /* restore the session state */ mData->mSession.mState = SessionState_Unlocked; alock.release(); mParent->i_addProcessToReap(pid); /* The failure may occur w/o any error info (from RPC), so provide one */ return setError(VBOX_E_VM_ERROR, tr("Failed to assign the machine to the session (%Rhrc)"), rc); } /* attach launch data to the machine */ Assert(mData->mSession.mPID == NIL_RTPROCESS); mData->mSession.mRemoteControls.push_back(aControl); mData->mSession.mProgress = aProgress; mData->mSession.mPID = pid; mData->mSession.mState = SessionState_Spawning; Assert(strCanonicalName.isNotEmpty()); mData->mSession.mName = strCanonicalName; } else { /* For separate UI process we declare the launch as completed instantly, as the * actual headless VM start may or may not come. No point in remembering anything * yet, as what matters for us is when the headless VM gets started. */ aProgress->i_notifyComplete(S_OK); } alock.release(); mParent->i_addProcessToReap(pid); LogFlowThisFuncLeave(); return S_OK; } /** * Returns @c true if the given session machine instance has an open direct * session (and optionally also for direct sessions which are closing) and * returns the session control machine instance if so. * * Note that when the method returns @c false, the arguments remain unchanged. * * @param aMachine Session machine object. * @param aControl Direct session control object (optional). * @param aRequireVM If true then only allow VM sessions. * @param aAllowClosing If true then additionally a session which is currently * being closed will also be allowed. * * @note locks this object for reading. */ bool Machine::i_isSessionOpen(ComObjPtr &aMachine, ComPtr *aControl /*= NULL*/, bool aRequireVM /*= false*/, bool aAllowClosing /*= false*/) { AutoLimitedCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), false); /* just return false for inaccessible machines */ if (getObjectState().getState() != ObjectState::Ready) return false; AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if ( ( mData->mSession.mState == SessionState_Locked && (!aRequireVM || mData->mSession.mLockType == LockType_VM)) || (aAllowClosing && mData->mSession.mState == SessionState_Unlocking) ) { AssertReturn(!mData->mSession.mMachine.isNull(), false); aMachine = mData->mSession.mMachine; if (aControl != NULL) *aControl = mData->mSession.mDirectControl; return true; } return false; } /** * Returns @c true if the given machine has an spawning direct session. * * @note locks this object for reading. */ bool Machine::i_isSessionSpawning() { AutoLimitedCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), false); /* just return false for inaccessible machines */ if (getObjectState().getState() != ObjectState::Ready) return false; AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mState == SessionState_Spawning) return true; return false; } /** * Called from the client watcher thread to check for unexpected client process * death during Session_Spawning state (e.g. before it successfully opened a * direct session). * * On Win32 and on OS/2, this method is called only when we've got the * direct client's process termination notification, so it always returns @c * true. * * On other platforms, this method returns @c true if the client process is * terminated and @c false if it's still alive. * * @note Locks this object for writing. */ bool Machine::i_checkForSpawnFailure() { AutoCaller autoCaller(this); if (!autoCaller.isOk()) { /* nothing to do */ LogFlowThisFunc(("Already uninitialized!\n")); return true; } AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mState != SessionState_Spawning) { /* nothing to do */ LogFlowThisFunc(("Not spawning any more!\n")); return true; } HRESULT rc = S_OK; /* PID not yet initialized, skip check. */ if (mData->mSession.mPID == NIL_RTPROCESS) return false; RTPROCSTATUS status; int vrc = RTProcWait(mData->mSession.mPID, RTPROCWAIT_FLAGS_NOBLOCK, &status); if (vrc != VERR_PROCESS_RUNNING) { Utf8Str strExtraInfo; #if defined(RT_OS_WINDOWS) && defined(VBOX_WITH_HARDENING) /* If the startup logfile exists and is of non-zero length, tell the user to look there for more details to encourage them to attach it when reporting startup issues. */ Utf8Str strHardeningLogFile = i_getHardeningLogFilename(); uint64_t cbStartupLogFile = 0; int vrc2 = RTFileQuerySizeByPath(strHardeningLogFile.c_str(), &cbStartupLogFile); if (RT_SUCCESS(vrc2) && cbStartupLogFile > 0) strExtraInfo.appendPrintf(tr(". More details may be available in '%s'"), strHardeningLogFile.c_str()); #endif if (RT_SUCCESS(vrc) && status.enmReason == RTPROCEXITREASON_NORMAL) rc = setError(E_FAIL, tr("The virtual machine '%s' has terminated unexpectedly during startup with exit code %d (%#x)%s"), i_getName().c_str(), status.iStatus, status.iStatus, strExtraInfo.c_str()); else if (RT_SUCCESS(vrc) && status.enmReason == RTPROCEXITREASON_SIGNAL) rc = setError(E_FAIL, tr("The virtual machine '%s' has terminated unexpectedly during startup because of signal %d%s"), i_getName().c_str(), status.iStatus, strExtraInfo.c_str()); else if (RT_SUCCESS(vrc) && status.enmReason == RTPROCEXITREASON_ABEND) rc = setError(E_FAIL, tr("The virtual machine '%s' has terminated abnormally (iStatus=%#x)%s"), i_getName().c_str(), status.iStatus, strExtraInfo.c_str()); else rc = setErrorBoth(E_FAIL, vrc, tr("The virtual machine '%s' has terminated unexpectedly during startup (%Rrc)%s"), i_getName().c_str(), vrc, strExtraInfo.c_str()); } if (FAILED(rc)) { /* Close the remote session, remove the remote control from the list * and reset session state to Closed (@note keep the code in sync with * the relevant part in LockMachine()). */ Assert(mData->mSession.mRemoteControls.size() == 1); if (mData->mSession.mRemoteControls.size() == 1) { ErrorInfoKeeper eik; mData->mSession.mRemoteControls.front()->Uninitialize(); } mData->mSession.mRemoteControls.clear(); mData->mSession.mState = SessionState_Unlocked; /* finalize the progress after setting the state */ if (!mData->mSession.mProgress.isNull()) { mData->mSession.mProgress->notifyComplete(rc); mData->mSession.mProgress.setNull(); } mData->mSession.mPID = NIL_RTPROCESS; mParent->i_onSessionStateChanged(mData->mUuid, SessionState_Unlocked); return true; } return false; } /** * Checks whether the machine can be registered. If so, commits and saves * all settings. * * @note Must be called from mParent's write lock. Locks this object and * children for writing. */ HRESULT Machine::i_prepareRegister() { AssertReturn(mParent->isWriteLockOnCurrentThread(), E_FAIL); AutoLimitedCaller autoCaller(this); AssertComRCReturnRC(autoCaller.rc()); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); /* wait for state dependents to drop to zero */ i_ensureNoStateDependencies(alock); if (!mData->mAccessible) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("The machine '%s' with UUID {%s} is inaccessible and cannot be registered"), mUserData->s.strName.c_str(), mData->mUuid.toString().c_str()); AssertReturn(getObjectState().getState() == ObjectState::Ready, E_FAIL); if (mData->mRegistered) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("The machine '%s' with UUID {%s} is already registered"), mUserData->s.strName.c_str(), mData->mUuid.toString().c_str()); HRESULT rc = S_OK; // Ensure the settings are saved. If we are going to be registered and // no config file exists yet, create it by calling i_saveSettings() too. if ( (mData->flModifications) || (!mData->pMachineConfigFile->fileExists()) ) { rc = i_saveSettings(NULL, alock); // no need to check whether VirtualBox.xml needs saving too since // we can't have a machine XML file rename pending if (FAILED(rc)) return rc; } /* more config checking goes here */ if (SUCCEEDED(rc)) { /* we may have had implicit modifications we want to fix on success */ i_commit(); mData->mRegistered = true; } else { /* we may have had implicit modifications we want to cancel on failure*/ i_rollback(false /* aNotify */); } return rc; } /** * Increases the number of objects dependent on the machine state or on the * registered state. Guarantees that these two states will not change at least * until #i_releaseStateDependency() is called. * * Depending on the @a aDepType value, additional state checks may be made. * These checks will set extended error info on failure. See * #i_checkStateDependency() for more info. * * If this method returns a failure, the dependency is not added and the caller * is not allowed to rely on any particular machine state or registration state * value and may return the failed result code to the upper level. * * @param aDepType Dependency type to add. * @param aState Current machine state (NULL if not interested). * @param aRegistered Current registered state (NULL if not interested). * * @note Locks this object for writing. */ HRESULT Machine::i_addStateDependency(StateDependency aDepType /* = AnyStateDep */, MachineState_T *aState /* = NULL */, BOOL *aRegistered /* = NULL */) { AutoCaller autoCaller(this); AssertComRCReturnRC(autoCaller.rc()); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(aDepType); if (FAILED(rc)) return rc; { if (mData->mMachineStateChangePending != 0) { /* i_ensureNoStateDependencies() is waiting for state dependencies to * drop to zero so don't add more. It may make sense to wait a bit * and retry before reporting an error (since the pending state * transition should be really quick) but let's just assert for * now to see if it ever happens on practice. */ AssertFailed(); return setError(E_ACCESSDENIED, tr("Machine state change is in progress. Please retry the operation later.")); } ++mData->mMachineStateDeps; Assert(mData->mMachineStateDeps != 0 /* overflow */); } if (aState) *aState = mData->mMachineState; if (aRegistered) *aRegistered = mData->mRegistered; return S_OK; } /** * Decreases the number of objects dependent on the machine state. * Must always complete the #i_addStateDependency() call after the state * dependency is no more necessary. */ void Machine::i_releaseStateDependency() { AutoCaller autoCaller(this); AssertComRCReturnVoid(autoCaller.rc()); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); /* releaseStateDependency() w/o addStateDependency()? */ AssertReturnVoid(mData->mMachineStateDeps != 0); -- mData->mMachineStateDeps; if (mData->mMachineStateDeps == 0) { /* inform i_ensureNoStateDependencies() that there are no more deps */ if (mData->mMachineStateChangePending != 0) { Assert(mData->mMachineStateDepsSem != NIL_RTSEMEVENTMULTI); RTSemEventMultiSignal (mData->mMachineStateDepsSem); } } } Utf8Str Machine::i_getExtraData(const Utf8Str &strKey) { /* start with nothing found */ Utf8Str strResult(""); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); settings::StringsMap::const_iterator it = mData->pMachineConfigFile->mapExtraDataItems.find(strKey); if (it != mData->pMachineConfigFile->mapExtraDataItems.end()) // found: strResult = it->second; // source is a Utf8Str return strResult; } // protected methods ///////////////////////////////////////////////////////////////////////////// /** * Performs machine state checks based on the @a aDepType value. If a check * fails, this method will set extended error info, otherwise it will return * S_OK. It is supposed, that on failure, the caller will immediately return * the return value of this method to the upper level. * * When @a aDepType is AnyStateDep, this method always returns S_OK. * * When @a aDepType is MutableStateDep, this method returns S_OK only if the * current state of this machine object allows to change settings of the * machine (i.e. the machine is not registered, or registered but not running * and not saved). It is useful to call this method from Machine setters * before performing any change. * * When @a aDepType is MutableOrSavedStateDep, this method behaves the same * as for MutableStateDep except that if the machine is saved, S_OK is also * returned. This is useful in setters which allow changing machine * properties when it is in the saved state. * * When @a aDepType is MutableOrRunningStateDep, this method returns S_OK only * if the current state of this machine object allows to change runtime * changeable settings of the machine (i.e. the machine is not registered, or * registered but either running or not running and not saved). It is useful * to call this method from Machine setters before performing any changes to * runtime changeable settings. * * When @a aDepType is MutableOrSavedOrRunningStateDep, this method behaves * the same as for MutableOrRunningStateDep except that if the machine is * saved, S_OK is also returned. This is useful in setters which allow * changing runtime and saved state changeable machine properties. * * @param aDepType Dependency type to check. * * @note Non Machine based classes should use #i_addStateDependency() and * #i_releaseStateDependency() methods or the smart AutoStateDependency * template. * * @note This method must be called from under this object's read or write * lock. */ HRESULT Machine::i_checkStateDependency(StateDependency aDepType) { switch (aDepType) { case AnyStateDep: { break; } case MutableStateDep: { if ( mData->mRegistered && ( !i_isSessionMachine() || ( mData->mMachineState != MachineState_Aborted && mData->mMachineState != MachineState_Teleported && mData->mMachineState != MachineState_PoweredOff ) ) ) return setError(VBOX_E_INVALID_VM_STATE, tr("The machine is not mutable (state is %s)"), Global::stringifyMachineState(mData->mMachineState)); break; } case MutableOrSavedStateDep: { if ( mData->mRegistered && ( !i_isSessionMachine() || ( mData->mMachineState != MachineState_Aborted && mData->mMachineState != MachineState_Teleported && mData->mMachineState != MachineState_Saved && mData->mMachineState != MachineState_AbortedSaved && mData->mMachineState != MachineState_PoweredOff ) ) ) return setError(VBOX_E_INVALID_VM_STATE, tr("The machine is not mutable or saved (state is %s)"), Global::stringifyMachineState(mData->mMachineState)); break; } case MutableOrRunningStateDep: { if ( mData->mRegistered && ( !i_isSessionMachine() || ( mData->mMachineState != MachineState_Aborted && mData->mMachineState != MachineState_Teleported && mData->mMachineState != MachineState_PoweredOff && !Global::IsOnline(mData->mMachineState) ) ) ) return setError(VBOX_E_INVALID_VM_STATE, tr("The machine is not mutable or running (state is %s)"), Global::stringifyMachineState(mData->mMachineState)); break; } case MutableOrSavedOrRunningStateDep: { if ( mData->mRegistered && ( !i_isSessionMachine() || ( mData->mMachineState != MachineState_Aborted && mData->mMachineState != MachineState_Teleported && mData->mMachineState != MachineState_Saved && mData->mMachineState != MachineState_AbortedSaved && mData->mMachineState != MachineState_PoweredOff && !Global::IsOnline(mData->mMachineState) ) ) ) return setError(VBOX_E_INVALID_VM_STATE, tr("The machine is not mutable, saved or running (state is %s)"), Global::stringifyMachineState(mData->mMachineState)); break; } } return S_OK; } /** * Helper to initialize all associated child objects and allocate data * structures. * * This method must be called as a part of the object's initialization procedure * (usually done in the #init() method). * * @note Must be called only from #init() or from #i_registeredInit(). */ HRESULT Machine::initDataAndChildObjects() { AutoCaller autoCaller(this); AssertComRCReturnRC(autoCaller.rc()); AssertReturn( getObjectState().getState() == ObjectState::InInit || getObjectState().getState() == ObjectState::Limited, E_FAIL); AssertReturn(!mData->mAccessible, E_FAIL); /* allocate data structures */ mSSData.allocate(); mUserData.allocate(); mHWData.allocate(); mMediumAttachments.allocate(); mStorageControllers.allocate(); mUSBControllers.allocate(); /* initialize mOSTypeId */ mUserData->s.strOsType = mParent->i_getUnknownOSType()->i_id(); /** @todo r=bird: init() methods never fails, right? Why don't we make them * return void then! */ /* create associated BIOS settings object */ unconst(mBIOSSettings).createObject(); mBIOSSettings->init(this); /* create associated recording settings object */ unconst(mRecordingSettings).createObject(); mRecordingSettings->init(this); /* create associated trusted platform module object */ unconst(mTrustedPlatformModule).createObject(); mTrustedPlatformModule->init(this); /* create associated NVRAM store object */ unconst(mNvramStore).createObject(); mNvramStore->init(this); /* create the graphics adapter object (always present) */ unconst(mGraphicsAdapter).createObject(); mGraphicsAdapter->init(this); /* create an associated VRDE object (default is disabled) */ unconst(mVRDEServer).createObject(); mVRDEServer->init(this); /* create associated serial port objects */ for (ULONG slot = 0; slot < RT_ELEMENTS(mSerialPorts); ++slot) { unconst(mSerialPorts[slot]).createObject(); mSerialPorts[slot]->init(this, slot); } /* create associated parallel port objects */ for (ULONG slot = 0; slot < RT_ELEMENTS(mParallelPorts); ++slot) { unconst(mParallelPorts[slot]).createObject(); mParallelPorts[slot]->init(this, slot); } /* create the audio settings object */ unconst(mAudioSettings).createObject(); mAudioSettings->init(this); /* create the USB device filters object (always present) */ unconst(mUSBDeviceFilters).createObject(); mUSBDeviceFilters->init(this); /* create associated network adapter objects */ mNetworkAdapters.resize(Global::getMaxNetworkAdapters(mHWData->mChipsetType)); for (ULONG slot = 0; slot < mNetworkAdapters.size(); ++slot) { unconst(mNetworkAdapters[slot]).createObject(); mNetworkAdapters[slot]->init(this, slot); } /* create the bandwidth control */ unconst(mBandwidthControl).createObject(); mBandwidthControl->init(this); /* create the guest debug control object */ unconst(mGuestDebugControl).createObject(); mGuestDebugControl->init(this); return S_OK; } /** * Helper to uninitialize all associated child objects and to free all data * structures. * * This method must be called as a part of the object's uninitialization * procedure (usually done in the #uninit() method). * * @note Must be called only from #uninit() or from #i_registeredInit(). */ void Machine::uninitDataAndChildObjects() { AutoCaller autoCaller(this); AssertComRCReturnVoid(autoCaller.rc()); /* Machine object has state = ObjectState::InInit during registeredInit, even if it fails to get settings */ AssertReturnVoid( getObjectState().getState() == ObjectState::InInit || getObjectState().getState() == ObjectState::InUninit || getObjectState().getState() == ObjectState::Limited); /* tell all our other child objects we've been uninitialized */ if (mGuestDebugControl) { mGuestDebugControl->uninit(); unconst(mGuestDebugControl).setNull(); } if (mBandwidthControl) { mBandwidthControl->uninit(); unconst(mBandwidthControl).setNull(); } for (ULONG slot = 0; slot < mNetworkAdapters.size(); ++slot) { if (mNetworkAdapters[slot]) { mNetworkAdapters[slot]->uninit(); unconst(mNetworkAdapters[slot]).setNull(); } } if (mUSBDeviceFilters) { mUSBDeviceFilters->uninit(); unconst(mUSBDeviceFilters).setNull(); } if (mAudioSettings) { mAudioSettings->uninit(); unconst(mAudioSettings).setNull(); } for (ULONG slot = 0; slot < RT_ELEMENTS(mParallelPorts); ++slot) { if (mParallelPorts[slot]) { mParallelPorts[slot]->uninit(); unconst(mParallelPorts[slot]).setNull(); } } for (ULONG slot = 0; slot < RT_ELEMENTS(mSerialPorts); ++slot) { if (mSerialPorts[slot]) { mSerialPorts[slot]->uninit(); unconst(mSerialPorts[slot]).setNull(); } } if (mVRDEServer) { mVRDEServer->uninit(); unconst(mVRDEServer).setNull(); } if (mGraphicsAdapter) { mGraphicsAdapter->uninit(); unconst(mGraphicsAdapter).setNull(); } if (mBIOSSettings) { mBIOSSettings->uninit(); unconst(mBIOSSettings).setNull(); } if (mRecordingSettings) { mRecordingSettings->uninit(); unconst(mRecordingSettings).setNull(); } if (mTrustedPlatformModule) { mTrustedPlatformModule->uninit(); unconst(mTrustedPlatformModule).setNull(); } if (mNvramStore) { mNvramStore->uninit(); unconst(mNvramStore).setNull(); } /* Deassociate media (only when a real Machine or a SnapshotMachine * instance is uninitialized; SessionMachine instances refer to real * Machine media). This is necessary for a clean re-initialization of * the VM after successfully re-checking the accessibility state. Note * that in case of normal Machine or SnapshotMachine uninitialization (as * a result of unregistering or deleting the snapshot), outdated media * attachments will already be uninitialized and deleted, so this * code will not affect them. */ if ( !mMediumAttachments.isNull() && !i_isSessionMachine() ) { for (MediumAttachmentList::const_iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it) { ComObjPtr pMedium = (*it)->i_getMedium(); if (pMedium.isNull()) continue; HRESULT rc = pMedium->i_removeBackReference(mData->mUuid, i_getSnapshotId()); AssertComRC(rc); } } if (!i_isSessionMachine() && !i_isSnapshotMachine()) { // clean up the snapshots list (Snapshot::uninit() will handle the snapshot's children) if (mData->mFirstSnapshot) { // Snapshots tree is protected by machine write lock. // Otherwise we assert in Snapshot::uninit() AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); mData->mFirstSnapshot->uninit(); mData->mFirstSnapshot.setNull(); } mData->mCurrentSnapshot.setNull(); } /* free data structures (the essential mData structure is not freed here * since it may be still in use) */ mMediumAttachments.free(); mStorageControllers.free(); mUSBControllers.free(); mHWData.free(); mUserData.free(); mSSData.free(); } /** * Returns a pointer to the Machine object for this machine that acts like a * parent for complex machine data objects such as shared folders, etc. * * For primary Machine objects and for SnapshotMachine objects, returns this * object's pointer itself. For SessionMachine objects, returns the peer * (primary) machine pointer. */ Machine *Machine::i_getMachine() { if (i_isSessionMachine()) return (Machine*)mPeer; return this; } /** * Makes sure that there are no machine state dependents. If necessary, waits * for the number of dependents to drop to zero. * * Make sure this method is called from under this object's write lock to * guarantee that no new dependents may be added when this method returns * control to the caller. * * @note Receives a lock to this object for writing. The lock will be released * while waiting (if necessary). * * @warning To be used only in methods that change the machine state! */ void Machine::i_ensureNoStateDependencies(AutoWriteLock &alock) { AssertReturnVoid(isWriteLockOnCurrentThread()); /* Wait for all state dependents if necessary */ if (mData->mMachineStateDeps != 0) { /* lazy semaphore creation */ if (mData->mMachineStateDepsSem == NIL_RTSEMEVENTMULTI) RTSemEventMultiCreate(&mData->mMachineStateDepsSem); LogFlowThisFunc(("Waiting for state deps (%d) to drop to zero...\n", mData->mMachineStateDeps)); ++mData->mMachineStateChangePending; /* reset the semaphore before waiting, the last dependent will signal * it */ RTSemEventMultiReset(mData->mMachineStateDepsSem); alock.release(); RTSemEventMultiWait(mData->mMachineStateDepsSem, RT_INDEFINITE_WAIT); alock.acquire(); -- mData->mMachineStateChangePending; } } /** * Changes the machine state and informs callbacks. * * This method is not intended to fail so it either returns S_OK or asserts (and * returns a failure). * * @note Locks this object for writing. */ HRESULT Machine::i_setMachineState(MachineState_T aMachineState) { LogFlowThisFuncEnter(); LogFlowThisFunc(("aMachineState=%s\n", ::stringifyMachineState(aMachineState) )); Assert(aMachineState != MachineState_Null); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); /* wait for state dependents to drop to zero */ i_ensureNoStateDependencies(alock); MachineState_T const enmOldState = mData->mMachineState; if (enmOldState != aMachineState) { mData->mMachineState = aMachineState; RTTimeNow(&mData->mLastStateChange); #ifdef VBOX_WITH_DTRACE_R3_MAIN VBOXAPI_MACHINE_STATE_CHANGED(this, aMachineState, enmOldState, mData->mUuid.toStringCurly().c_str()); #endif mParent->i_onMachineStateChanged(mData->mUuid, aMachineState); } LogFlowThisFuncLeave(); return S_OK; } /** * Searches for a shared folder with the given logical name * in the collection of shared folders. * * @param aName logical name of the shared folder * @param aSharedFolder where to return the found object * @param aSetError whether to set the error info if the folder is * not found * @return * S_OK when found or VBOX_E_OBJECT_NOT_FOUND when not found * * @note * must be called from under the object's lock! */ HRESULT Machine::i_findSharedFolder(const Utf8Str &aName, ComObjPtr &aSharedFolder, bool aSetError /* = false */) { HRESULT rc = VBOX_E_OBJECT_NOT_FOUND; for (HWData::SharedFolderList::const_iterator it = mHWData->mSharedFolders.begin(); it != mHWData->mSharedFolders.end(); ++it) { SharedFolder *pSF = *it; AutoCaller autoCaller(pSF); if (pSF->i_getName() == aName) { aSharedFolder = pSF; rc = S_OK; break; } } if (aSetError && FAILED(rc)) setError(rc, tr("Could not find a shared folder named '%s'"), aName.c_str()); return rc; } /** * Initializes all machine instance data from the given settings structures * from XML. The exception is the machine UUID which needs special handling * depending on the caller's use case, so the caller needs to set that herself. * * This gets called in several contexts during machine initialization: * * -- When machine XML exists on disk already and needs to be loaded into memory, * for example, from #i_registeredInit() to load all registered machines on * VirtualBox startup. In this case, puuidRegistry is NULL because the media * attached to the machine should be part of some media registry already. * * -- During OVF import, when a machine config has been constructed from an * OVF file. In this case, puuidRegistry is set to the machine UUID to * ensure that the media listed as attachments in the config (which have * been imported from the OVF) receive the correct registry ID. * * -- During VM cloning. * * @param config Machine settings from XML. * @param puuidRegistry If != NULL, Medium::setRegistryIdIfFirst() gets called with this registry ID * for each attached medium in the config. * @return */ HRESULT Machine::i_loadMachineDataFromSettings(const settings::MachineConfigFile &config, const Guid *puuidRegistry) { // copy name, description, OS type, teleporter, UTC etc. mUserData->s = config.machineUserData; // look up the object by Id to check it is valid ComObjPtr pGuestOSType; mParent->i_findGuestOSType(mUserData->s.strOsType, pGuestOSType); if (!pGuestOSType.isNull()) mUserData->s.strOsType = pGuestOSType->i_id(); #ifdef VBOX_WITH_FULL_VM_ENCRYPTION // stateFile encryption (optional) mSSData->strStateKeyId = config.strStateKeyId; mSSData->strStateKeyStore = config.strStateKeyStore; mData->mstrLogKeyId = config.strLogKeyId; mData->mstrLogKeyStore = config.strLogKeyStore; #endif // stateFile (optional) if (config.strStateFile.isEmpty()) mSSData->strStateFilePath.setNull(); else { Utf8Str stateFilePathFull(config.strStateFile); int vrc = i_calculateFullPath(stateFilePathFull, stateFilePathFull); if (RT_FAILURE(vrc)) return setErrorBoth(E_FAIL, vrc, tr("Invalid saved state file path '%s' (%Rrc)"), config.strStateFile.c_str(), vrc); mSSData->strStateFilePath = stateFilePathFull; } // snapshot folder needs special processing so set it again HRESULT rc = COMSETTER(SnapshotFolder)(Bstr(config.machineUserData.strSnapshotFolder).raw()); if (FAILED(rc)) return rc; /* Copy the extra data items (config may or may not be the same as * mData->pMachineConfigFile) if necessary. When loading the XML files * from disk they are the same, but not for OVF import. */ if (mData->pMachineConfigFile != &config) mData->pMachineConfigFile->mapExtraDataItems = config.mapExtraDataItems; /* currentStateModified (optional, default is true) */ mData->mCurrentStateModified = config.fCurrentStateModified; mData->mLastStateChange = config.timeLastStateChange; /* * note: all mUserData members must be assigned prior this point because * we need to commit changes in order to let mUserData be shared by all * snapshot machine instances. */ mUserData.commitCopy(); // machine registry, if present (must be loaded before snapshots) if (config.canHaveOwnMediaRegistry()) { // determine machine folder Utf8Str strMachineFolder = i_getSettingsFileFull(); strMachineFolder.stripFilename(); rc = mParent->initMedia(i_getId(), // media registry ID == machine UUID config.mediaRegistry, strMachineFolder); if (FAILED(rc)) return rc; } /* Snapshot node (optional) */ size_t cRootSnapshots; if ((cRootSnapshots = config.llFirstSnapshot.size())) { // there must be only one root snapshot Assert(cRootSnapshots == 1); const settings::Snapshot &snap = config.llFirstSnapshot.front(); rc = i_loadSnapshot(snap, config.uuidCurrentSnapshot); if (FAILED(rc)) return rc; } // hardware data rc = i_loadHardware(puuidRegistry, NULL, config.hardwareMachine, &config.debugging, &config.autostart, config.recordingSettings); if (FAILED(rc)) return rc; /* * NOTE: the assignment below must be the last thing to do, * otherwise it will be not possible to change the settings * somewhere in the code above because all setters will be * blocked by i_checkStateDependency(MutableStateDep). */ /* set the machine state to either Aborted-Saved, Aborted, or Saved if appropriate */ if (config.fAborted && !mSSData->strStateFilePath.isEmpty()) { /* no need to use i_setMachineState() during init() */ mData->mMachineState = MachineState_AbortedSaved; } else if (config.fAborted) { mSSData->strStateFilePath.setNull(); /* no need to use i_setMachineState() during init() */ mData->mMachineState = MachineState_Aborted; } else if (!mSSData->strStateFilePath.isEmpty()) { /* no need to use i_setMachineState() during init() */ mData->mMachineState = MachineState_Saved; } // after loading settings, we are no longer different from the XML on disk mData->flModifications = 0; return S_OK; } /** * Loads all snapshots starting from the given settings. * * @param data snapshot settings. * @param aCurSnapshotId Current snapshot ID from the settings file. */ HRESULT Machine::i_loadSnapshot(const settings::Snapshot &data, const Guid &aCurSnapshotId) { AssertReturn(!i_isSnapshotMachine(), E_FAIL); AssertReturn(!i_isSessionMachine(), E_FAIL); HRESULT rc = S_OK; std::list llSettingsTodo; llSettingsTodo.push_back(&data); std::list llParentsTodo; llParentsTodo.push_back(NULL); while (llSettingsTodo.size() > 0) { const settings::Snapshot *current = llSettingsTodo.front(); llSettingsTodo.pop_front(); Snapshot *pParent = llParentsTodo.front(); llParentsTodo.pop_front(); Utf8Str strStateFile; if (!current->strStateFile.isEmpty()) { /* optional */ strStateFile = current->strStateFile; int vrc = i_calculateFullPath(strStateFile, strStateFile); if (RT_FAILURE(vrc)) { setErrorBoth(E_FAIL, vrc, tr("Invalid saved state file path '%s' (%Rrc)"), strStateFile.c_str(), vrc); } } /* create a snapshot machine object */ ComObjPtr pSnapshotMachine; pSnapshotMachine.createObject(); rc = pSnapshotMachine->initFromSettings(this, current->hardware, ¤t->debugging, ¤t->autostart, current->recordingSettings, current->uuid.ref(), strStateFile); if (FAILED(rc)) break; /* create a snapshot object */ ComObjPtr pSnapshot; pSnapshot.createObject(); /* initialize the snapshot */ rc = pSnapshot->init(mParent, // VirtualBox object current->uuid, current->strName, current->strDescription, current->timestamp, pSnapshotMachine, pParent); if (FAILED(rc)) break; /* memorize the first snapshot if necessary */ if (!mData->mFirstSnapshot) { Assert(pParent == NULL); mData->mFirstSnapshot = pSnapshot; } /* memorize the current snapshot when appropriate */ if ( !mData->mCurrentSnapshot && pSnapshot->i_getId() == aCurSnapshotId ) mData->mCurrentSnapshot = pSnapshot; /* create all children */ std::list::const_iterator itBegin = current->llChildSnapshots.begin(); std::list::const_iterator itEnd = current->llChildSnapshots.end(); for (std::list::const_iterator it = itBegin; it != itEnd; ++it) { llSettingsTodo.push_back(&*it); llParentsTodo.push_back(pSnapshot); } } return rc; } /** * Loads settings into mHWData. * * @param puuidRegistry Registry ID. * @param puuidSnapshot Snapshot ID * @param data Reference to the hardware settings. * @param pDbg Pointer to the debugging settings. * @param pAutostart Pointer to the autostart settings * @param recording Reference to recording settings. */ HRESULT Machine::i_loadHardware(const Guid *puuidRegistry, const Guid *puuidSnapshot, const settings::Hardware &data, const settings::Debugging *pDbg, const settings::Autostart *pAutostart, const settings::RecordingSettings &recording) { AssertReturn(!i_isSessionMachine(), E_FAIL); HRESULT rc = S_OK; try { ComObjPtr pGuestOSType; mParent->i_findGuestOSType(mUserData->s.strOsType, pGuestOSType); /* The hardware version attribute (optional). */ mHWData->mHWVersion = data.strVersion; mHWData->mHardwareUUID = data.uuid; mHWData->mHWVirtExEnabled = data.fHardwareVirt; mHWData->mHWVirtExNestedPagingEnabled = data.fNestedPaging; mHWData->mHWVirtExLargePagesEnabled = data.fLargePages; mHWData->mHWVirtExVPIDEnabled = data.fVPID; mHWData->mHWVirtExUXEnabled = data.fUnrestrictedExecution; mHWData->mHWVirtExForceEnabled = data.fHardwareVirtForce; mHWData->mHWVirtExUseNativeApi = data.fUseNativeApi; mHWData->mHWVirtExVirtVmsaveVmload = data.fVirtVmsaveVmload; mHWData->mPAEEnabled = data.fPAE; mHWData->mLongMode = data.enmLongMode; mHWData->mTripleFaultReset = data.fTripleFaultReset; mHWData->mAPIC = data.fAPIC; mHWData->mX2APIC = data.fX2APIC; mHWData->mIBPBOnVMExit = data.fIBPBOnVMExit; mHWData->mIBPBOnVMEntry = data.fIBPBOnVMEntry; mHWData->mSpecCtrl = data.fSpecCtrl; mHWData->mSpecCtrlByHost = data.fSpecCtrlByHost; mHWData->mL1DFlushOnSched = data.fL1DFlushOnSched; mHWData->mL1DFlushOnVMEntry = data.fL1DFlushOnVMEntry; mHWData->mMDSClearOnSched = data.fMDSClearOnSched; mHWData->mMDSClearOnVMEntry = data.fMDSClearOnVMEntry; mHWData->mNestedHWVirt = data.fNestedHWVirt; mHWData->mCPUCount = data.cCPUs; mHWData->mCPUHotPlugEnabled = data.fCpuHotPlug; mHWData->mCpuExecutionCap = data.ulCpuExecutionCap; mHWData->mCpuIdPortabilityLevel = data.uCpuIdPortabilityLevel; mHWData->mCpuProfile = data.strCpuProfile; // cpu if (mHWData->mCPUHotPlugEnabled) { for (settings::CpuList::const_iterator it = data.llCpus.begin(); it != data.llCpus.end(); ++it) { const settings::Cpu &cpu = *it; mHWData->mCPUAttached[cpu.ulId] = true; } } // cpuid leafs for (settings::CpuIdLeafsList::const_iterator it = data.llCpuIdLeafs.begin(); it != data.llCpuIdLeafs.end(); ++it) { const settings::CpuIdLeaf &rLeaf= *it; if ( rLeaf.idx < UINT32_C(0x20) || rLeaf.idx - UINT32_C(0x80000000) < UINT32_C(0x20) || rLeaf.idx - UINT32_C(0xc0000000) < UINT32_C(0x10) ) mHWData->mCpuIdLeafList.push_back(rLeaf); /* else: just ignore */ } mHWData->mMemorySize = data.ulMemorySizeMB; mHWData->mPageFusionEnabled = data.fPageFusionEnabled; // boot order for (unsigned i = 0; i < RT_ELEMENTS(mHWData->mBootOrder); ++i) { settings::BootOrderMap::const_iterator it = data.mapBootOrder.find(i); if (it == data.mapBootOrder.end()) mHWData->mBootOrder[i] = DeviceType_Null; else mHWData->mBootOrder[i] = it->second; } mHWData->mFirmwareType = data.firmwareType; mHWData->mPointingHIDType = data.pointingHIDType; mHWData->mKeyboardHIDType = data.keyboardHIDType; mHWData->mChipsetType = data.chipsetType; mHWData->mIommuType = data.iommuType; mHWData->mParavirtProvider = data.paravirtProvider; mHWData->mParavirtDebug = data.strParavirtDebug; mHWData->mEmulatedUSBCardReaderEnabled = data.fEmulatedUSBCardReader; mHWData->mHPETEnabled = data.fHPETEnabled; /* GraphicsAdapter */ rc = mGraphicsAdapter->i_loadSettings(data.graphicsAdapter); if (FAILED(rc)) return rc; /* VRDEServer */ rc = mVRDEServer->i_loadSettings(data.vrdeSettings); if (FAILED(rc)) return rc; /* BIOS */ rc = mBIOSSettings->i_loadSettings(data.biosSettings); if (FAILED(rc)) return rc; /* Recording */ rc = mRecordingSettings->i_loadSettings(recording); if (FAILED(rc)) return rc; /* Trusted Platform Module */ rc = mTrustedPlatformModule->i_loadSettings(data.tpmSettings); if (FAILED(rc)) return rc; rc = mNvramStore->i_loadSettings(data.nvramSettings); if (FAILED(rc)) return rc; // Bandwidth control (must come before network adapters) rc = mBandwidthControl->i_loadSettings(data.ioSettings); if (FAILED(rc)) return rc; /* USB controllers */ for (settings::USBControllerList::const_iterator it = data.usbSettings.llUSBControllers.begin(); it != data.usbSettings.llUSBControllers.end(); ++it) { const settings::USBController &settingsCtrl = *it; ComObjPtr newCtrl; newCtrl.createObject(); newCtrl->init(this, settingsCtrl.strName, settingsCtrl.enmType); mUSBControllers->push_back(newCtrl); } /* USB device filters */ rc = mUSBDeviceFilters->i_loadSettings(data.usbSettings); if (FAILED(rc)) return rc; // network adapters (establish array size first and apply defaults, to // ensure reading the same settings as we saved, since the list skips // adapters having defaults) size_t newCount = Global::getMaxNetworkAdapters(mHWData->mChipsetType); size_t oldCount = mNetworkAdapters.size(); if (newCount > oldCount) { mNetworkAdapters.resize(newCount); for (size_t slot = oldCount; slot < mNetworkAdapters.size(); ++slot) { unconst(mNetworkAdapters[slot]).createObject(); mNetworkAdapters[slot]->init(this, (ULONG)slot); } } else if (newCount < oldCount) mNetworkAdapters.resize(newCount); for (unsigned i = 0; i < mNetworkAdapters.size(); i++) mNetworkAdapters[i]->i_applyDefaults(pGuestOSType); for (settings::NetworkAdaptersList::const_iterator it = data.llNetworkAdapters.begin(); it != data.llNetworkAdapters.end(); ++it) { const settings::NetworkAdapter &nic = *it; /* slot uniqueness is guaranteed by XML Schema */ AssertBreak(nic.ulSlot < mNetworkAdapters.size()); rc = mNetworkAdapters[nic.ulSlot]->i_loadSettings(mBandwidthControl, nic); if (FAILED(rc)) return rc; } // serial ports (establish defaults first, to ensure reading the same // settings as we saved, since the list skips ports having defaults) for (unsigned i = 0; i < RT_ELEMENTS(mSerialPorts); i++) mSerialPorts[i]->i_applyDefaults(pGuestOSType); for (settings::SerialPortsList::const_iterator it = data.llSerialPorts.begin(); it != data.llSerialPorts.end(); ++it) { const settings::SerialPort &s = *it; AssertBreak(s.ulSlot < RT_ELEMENTS(mSerialPorts)); rc = mSerialPorts[s.ulSlot]->i_loadSettings(s); if (FAILED(rc)) return rc; } // parallel ports (establish defaults first, to ensure reading the same // settings as we saved, since the list skips ports having defaults) for (unsigned i = 0; i < RT_ELEMENTS(mParallelPorts); i++) mParallelPorts[i]->i_applyDefaults(); for (settings::ParallelPortsList::const_iterator it = data.llParallelPorts.begin(); it != data.llParallelPorts.end(); ++it) { const settings::ParallelPort &p = *it; AssertBreak(p.ulSlot < RT_ELEMENTS(mParallelPorts)); rc = mParallelPorts[p.ulSlot]->i_loadSettings(p); if (FAILED(rc)) return rc; } /* Audio settings */ rc = mAudioSettings->i_loadSettings(data.audioAdapter); if (FAILED(rc)) return rc; /* storage controllers */ rc = i_loadStorageControllers(data.storage, puuidRegistry, puuidSnapshot); if (FAILED(rc)) return rc; /* Shared folders */ for (settings::SharedFoldersList::const_iterator it = data.llSharedFolders.begin(); it != data.llSharedFolders.end(); ++it) { const settings::SharedFolder &sf = *it; ComObjPtr sharedFolder; /* Check for double entries. Not allowed! */ rc = i_findSharedFolder(sf.strName, sharedFolder, false /* aSetError */); if (SUCCEEDED(rc)) return setError(VBOX_E_OBJECT_IN_USE, tr("Shared folder named '%s' already exists"), sf.strName.c_str()); /* Create the new shared folder. Don't break on error. This will be * reported when the machine starts. */ sharedFolder.createObject(); rc = sharedFolder->init(i_getMachine(), sf.strName, sf.strHostPath, RT_BOOL(sf.fWritable), RT_BOOL(sf.fAutoMount), sf.strAutoMountPoint, false /* fFailOnError */); if (FAILED(rc)) return rc; mHWData->mSharedFolders.push_back(sharedFolder); } // Clipboard mHWData->mClipboardMode = data.clipboardMode; mHWData->mClipboardFileTransfersEnabled = data.fClipboardFileTransfersEnabled ? TRUE : FALSE; // drag'n'drop mHWData->mDnDMode = data.dndMode; // guest settings mHWData->mMemoryBalloonSize = data.ulMemoryBalloonSize; // IO settings mHWData->mIOCacheEnabled = data.ioSettings.fIOCacheEnabled; mHWData->mIOCacheSize = data.ioSettings.ulIOCacheSize; // Host PCI devices for (settings::HostPCIDeviceAttachmentList::const_iterator it = data.pciAttachments.begin(); it != data.pciAttachments.end(); ++it) { const settings::HostPCIDeviceAttachment &hpda = *it; ComObjPtr pda; pda.createObject(); pda->i_loadSettings(this, hpda); mHWData->mPCIDeviceAssignments.push_back(pda); } /* * (The following isn't really real hardware, but it lives in HWData * for reasons of convenience.) */ #ifdef VBOX_WITH_GUEST_PROPS /* Guest properties (optional) */ /* Only load transient guest properties for configs which have saved * state, because there shouldn't be any for powered off VMs. The same * logic applies for snapshots, as offline snapshots shouldn't have * any such properties. They confuse the code in various places. * Note: can't rely on the machine state, as it isn't set yet. */ bool fSkipTransientGuestProperties = mSSData->strStateFilePath.isEmpty(); /* apologies for the hacky unconst() usage, but this needs hacking * actually inconsistent settings into consistency, otherwise there * will be some corner cases where the inconsistency survives * surprisingly long without getting fixed, especially for snapshots * as there are no config changes. */ settings::GuestPropertiesList &llGuestProperties = unconst(data.llGuestProperties); for (settings::GuestPropertiesList::iterator it = llGuestProperties.begin(); it != llGuestProperties.end(); /*nothing*/) { const settings::GuestProperty &prop = *it; uint32_t fFlags = GUEST_PROP_F_NILFLAG; GuestPropValidateFlags(prop.strFlags.c_str(), &fFlags); if ( fSkipTransientGuestProperties && ( fFlags & GUEST_PROP_F_TRANSIENT || fFlags & GUEST_PROP_F_TRANSRESET)) { it = llGuestProperties.erase(it); continue; } HWData::GuestProperty property = { prop.strValue, (LONG64) prop.timestamp, fFlags }; mHWData->mGuestProperties[prop.strName] = property; ++it; } #endif /* VBOX_WITH_GUEST_PROPS defined */ rc = i_loadDebugging(pDbg); if (FAILED(rc)) return rc; mHWData->mAutostart = *pAutostart; /* default frontend */ mHWData->mDefaultFrontend = data.strDefaultFrontend; } catch (std::bad_alloc &) { return E_OUTOFMEMORY; } AssertComRC(rc); return rc; } /** * Called from i_loadHardware() to load the debugging settings of the * machine. * * @param pDbg Pointer to the settings. */ HRESULT Machine::i_loadDebugging(const settings::Debugging *pDbg) { mHWData->mDebugging = *pDbg; /* no more processing currently required, this will probably change. */ HRESULT rc = mGuestDebugControl->i_loadSettings(*pDbg); if (FAILED(rc)) return rc; return S_OK; } /** * Called from i_loadMachineDataFromSettings() for the storage controller data, including media. * * @param data storage settings. * @param puuidRegistry media registry ID to set media to or NULL; * see Machine::i_loadMachineDataFromSettings() * @param puuidSnapshot snapshot ID * @return */ HRESULT Machine::i_loadStorageControllers(const settings::Storage &data, const Guid *puuidRegistry, const Guid *puuidSnapshot) { AssertReturn(!i_isSessionMachine(), E_FAIL); HRESULT rc = S_OK; for (settings::StorageControllersList::const_iterator it = data.llStorageControllers.begin(); it != data.llStorageControllers.end(); ++it) { const settings::StorageController &ctlData = *it; ComObjPtr pCtl; /* Try to find one with the name first. */ rc = i_getStorageControllerByName(ctlData.strName, pCtl, false /* aSetError */); if (SUCCEEDED(rc)) return setError(VBOX_E_OBJECT_IN_USE, tr("Storage controller named '%s' already exists"), ctlData.strName.c_str()); pCtl.createObject(); rc = pCtl->init(this, ctlData.strName, ctlData.storageBus, ctlData.ulInstance, ctlData.fBootable); if (FAILED(rc)) return rc; mStorageControllers->push_back(pCtl); rc = pCtl->COMSETTER(ControllerType)(ctlData.controllerType); if (FAILED(rc)) return rc; rc = pCtl->COMSETTER(PortCount)(ctlData.ulPortCount); if (FAILED(rc)) return rc; rc = pCtl->COMSETTER(UseHostIOCache)(ctlData.fUseHostIOCache); if (FAILED(rc)) return rc; /* Load the attached devices now. */ rc = i_loadStorageDevices(pCtl, ctlData, puuidRegistry, puuidSnapshot); if (FAILED(rc)) return rc; } return S_OK; } /** * Called from i_loadStorageControllers for a controller's devices. * * @param aStorageController * @param data * @param puuidRegistry media registry ID to set media to or NULL; see * Machine::i_loadMachineDataFromSettings() * @param puuidSnapshot pointer to the snapshot ID if this is a snapshot machine * @return */ HRESULT Machine::i_loadStorageDevices(StorageController *aStorageController, const settings::StorageController &data, const Guid *puuidRegistry, const Guid *puuidSnapshot) { HRESULT rc = S_OK; /* paranoia: detect duplicate attachments */ for (settings::AttachedDevicesList::const_iterator it = data.llAttachedDevices.begin(); it != data.llAttachedDevices.end(); ++it) { const settings::AttachedDevice &ad = *it; for (settings::AttachedDevicesList::const_iterator it2 = it; it2 != data.llAttachedDevices.end(); ++it2) { if (it == it2) continue; const settings::AttachedDevice &ad2 = *it2; if ( ad.lPort == ad2.lPort && ad.lDevice == ad2.lDevice) { return setError(E_FAIL, tr("Duplicate attachments for storage controller '%s', port %d, device %d of the virtual machine '%s'"), aStorageController->i_getName().c_str(), ad.lPort, ad.lDevice, mUserData->s.strName.c_str()); } } } for (settings::AttachedDevicesList::const_iterator it = data.llAttachedDevices.begin(); it != data.llAttachedDevices.end(); ++it) { const settings::AttachedDevice &dev = *it; ComObjPtr medium; switch (dev.deviceType) { case DeviceType_Floppy: case DeviceType_DVD: if (dev.strHostDriveSrc.isNotEmpty()) rc = mParent->i_host()->i_findHostDriveByName(dev.deviceType, dev.strHostDriveSrc, false /* fRefresh */, medium); else rc = mParent->i_findRemoveableMedium(dev.deviceType, dev.uuid, false /* fRefresh */, false /* aSetError */, medium); if (rc == VBOX_E_OBJECT_NOT_FOUND) // This is not an error. The host drive or UUID might have vanished, so just go // ahead without this removeable medium attachment rc = S_OK; break; case DeviceType_HardDisk: { /* find a hard disk by UUID */ rc = mParent->i_findHardDiskById(dev.uuid, true /* aDoSetError */, &medium); if (FAILED(rc)) { if (i_isSnapshotMachine()) { // wrap another error message around the "cannot find hard disk" set by findHardDisk // so the user knows that the bad disk is in a snapshot somewhere com::ErrorInfo info; return setError(E_FAIL, tr("A differencing image of snapshot {%RTuuid} could not be found. %ls"), puuidSnapshot->raw(), info.getText().raw()); } else return rc; } AutoWriteLock hdLock(medium COMMA_LOCKVAL_SRC_POS); if (medium->i_getType() == MediumType_Immutable) { if (i_isSnapshotMachine()) return setError(E_FAIL, tr("Immutable hard disk '%s' with UUID {%RTuuid} cannot be directly attached to snapshot with UUID {%RTuuid} " "of the virtual machine '%s' ('%s')"), medium->i_getLocationFull().c_str(), dev.uuid.raw(), puuidSnapshot->raw(), mUserData->s.strName.c_str(), mData->m_strConfigFileFull.c_str()); return setError(E_FAIL, tr("Immutable hard disk '%s' with UUID {%RTuuid} cannot be directly attached to the virtual machine '%s' ('%s')"), medium->i_getLocationFull().c_str(), dev.uuid.raw(), mUserData->s.strName.c_str(), mData->m_strConfigFileFull.c_str()); } if (medium->i_getType() == MediumType_MultiAttach) { if (i_isSnapshotMachine()) return setError(E_FAIL, tr("Multi-attach hard disk '%s' with UUID {%RTuuid} cannot be directly attached to snapshot with UUID {%RTuuid} " "of the virtual machine '%s' ('%s')"), medium->i_getLocationFull().c_str(), dev.uuid.raw(), puuidSnapshot->raw(), mUserData->s.strName.c_str(), mData->m_strConfigFileFull.c_str()); return setError(E_FAIL, tr("Multi-attach hard disk '%s' with UUID {%RTuuid} cannot be directly attached to the virtual machine '%s' ('%s')"), medium->i_getLocationFull().c_str(), dev.uuid.raw(), mUserData->s.strName.c_str(), mData->m_strConfigFileFull.c_str()); } if ( !i_isSnapshotMachine() && medium->i_getChildren().size() != 0 ) return setError(E_FAIL, tr("Hard disk '%s' with UUID {%RTuuid} cannot be directly attached to the virtual machine '%s' ('%s') " "because it has %d differencing child hard disks"), medium->i_getLocationFull().c_str(), dev.uuid.raw(), mUserData->s.strName.c_str(), mData->m_strConfigFileFull.c_str(), medium->i_getChildren().size()); if (i_findAttachment(*mMediumAttachments.data(), medium)) return setError(E_FAIL, tr("Hard disk '%s' with UUID {%RTuuid} is already attached to the virtual machine '%s' ('%s')"), medium->i_getLocationFull().c_str(), dev.uuid.raw(), mUserData->s.strName.c_str(), mData->m_strConfigFileFull.c_str()); break; } default: return setError(E_FAIL, tr("Controller '%s' port %u unit %u has device with unknown type (%d) - virtual machine '%s' ('%s')"), data.strName.c_str(), dev.lPort, dev.lDevice, dev.deviceType, mUserData->s.strName.c_str(), mData->m_strConfigFileFull.c_str()); } if (FAILED(rc)) break; /* Bandwidth groups are loaded at this point. */ ComObjPtr pBwGroup; if (!dev.strBwGroup.isEmpty()) { rc = mBandwidthControl->i_getBandwidthGroupByName(dev.strBwGroup, pBwGroup, false /* aSetError */); if (FAILED(rc)) return setError(E_FAIL, tr("Device '%s' with unknown bandwidth group '%s' is attached to the virtual machine '%s' ('%s')"), medium->i_getLocationFull().c_str(), dev.strBwGroup.c_str(), mUserData->s.strName.c_str(), mData->m_strConfigFileFull.c_str()); pBwGroup->i_reference(); } const Utf8Str controllerName = aStorageController->i_getName(); ComObjPtr pAttachment; pAttachment.createObject(); rc = pAttachment->init(this, medium, controllerName, dev.lPort, dev.lDevice, dev.deviceType, false, dev.fPassThrough, dev.fTempEject, dev.fNonRotational, dev.fDiscard, dev.fHotPluggable, pBwGroup.isNull() ? Utf8Str::Empty : pBwGroup->i_getName()); if (FAILED(rc)) break; /* associate the medium with this machine and snapshot */ if (!medium.isNull()) { AutoCaller medCaller(medium); if (FAILED(medCaller.rc())) return medCaller.rc(); AutoWriteLock mlock(medium COMMA_LOCKVAL_SRC_POS); if (i_isSnapshotMachine()) rc = medium->i_addBackReference(mData->mUuid, *puuidSnapshot); else rc = medium->i_addBackReference(mData->mUuid); /* If the medium->addBackReference fails it sets an appropriate * error message, so no need to do any guesswork here. */ if (puuidRegistry) // caller wants registry ID to be set on all attached media (OVF import case) medium->i_addRegistry(*puuidRegistry); } if (FAILED(rc)) break; /* back up mMediumAttachments to let registeredInit() properly rollback * on failure (= limited accessibility) */ i_setModified(IsModified_Storage); mMediumAttachments.backup(); mMediumAttachments->push_back(pAttachment); } return rc; } /** * Returns the snapshot with the given UUID or fails of no such snapshot exists. * * @param aId snapshot UUID to find (empty UUID refers the first snapshot) * @param aSnapshot where to return the found snapshot * @param aSetError true to set extended error info on failure */ HRESULT Machine::i_findSnapshotById(const Guid &aId, ComObjPtr &aSnapshot, bool aSetError /* = false */) { AutoReadLock chlock(this COMMA_LOCKVAL_SRC_POS); if (!mData->mFirstSnapshot) { if (aSetError) return setError(E_FAIL, tr("This machine does not have any snapshots")); return E_FAIL; } if (aId.isZero()) aSnapshot = mData->mFirstSnapshot; else aSnapshot = mData->mFirstSnapshot->i_findChildOrSelf(aId.ref()); if (!aSnapshot) { if (aSetError) return setError(E_FAIL, tr("Could not find a snapshot with UUID {%s}"), aId.toString().c_str()); return E_FAIL; } return S_OK; } /** * Returns the snapshot with the given name or fails of no such snapshot. * * @param strName snapshot name to find * @param aSnapshot where to return the found snapshot * @param aSetError true to set extended error info on failure */ HRESULT Machine::i_findSnapshotByName(const Utf8Str &strName, ComObjPtr &aSnapshot, bool aSetError /* = false */) { AssertReturn(!strName.isEmpty(), E_INVALIDARG); AutoReadLock chlock(this COMMA_LOCKVAL_SRC_POS); if (!mData->mFirstSnapshot) { if (aSetError) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("This machine does not have any snapshots")); return VBOX_E_OBJECT_NOT_FOUND; } aSnapshot = mData->mFirstSnapshot->i_findChildOrSelf(strName); if (!aSnapshot) { if (aSetError) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("Could not find a snapshot named '%s'"), strName.c_str()); return VBOX_E_OBJECT_NOT_FOUND; } return S_OK; } /** * Returns a storage controller object with the given name. * * @param aName storage controller name to find * @param aStorageController where to return the found storage controller * @param aSetError true to set extended error info on failure */ HRESULT Machine::i_getStorageControllerByName(const Utf8Str &aName, ComObjPtr &aStorageController, bool aSetError /* = false */) { AssertReturn(!aName.isEmpty(), E_INVALIDARG); for (StorageControllerList::const_iterator it = mStorageControllers->begin(); it != mStorageControllers->end(); ++it) { if ((*it)->i_getName() == aName) { aStorageController = (*it); return S_OK; } } if (aSetError) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("Could not find a storage controller named '%s'"), aName.c_str()); return VBOX_E_OBJECT_NOT_FOUND; } /** * Returns a USB controller object with the given name. * * @param aName USB controller name to find * @param aUSBController where to return the found USB controller * @param aSetError true to set extended error info on failure */ HRESULT Machine::i_getUSBControllerByName(const Utf8Str &aName, ComObjPtr &aUSBController, bool aSetError /* = false */) { AssertReturn(!aName.isEmpty(), E_INVALIDARG); for (USBControllerList::const_iterator it = mUSBControllers->begin(); it != mUSBControllers->end(); ++it) { if ((*it)->i_getName() == aName) { aUSBController = (*it); return S_OK; } } if (aSetError) return setError(VBOX_E_OBJECT_NOT_FOUND, tr("Could not find a storage controller named '%s'"), aName.c_str()); return VBOX_E_OBJECT_NOT_FOUND; } /** * Returns the number of USB controller instance of the given type. * * @param enmType USB controller type. */ ULONG Machine::i_getUSBControllerCountByType(USBControllerType_T enmType) { ULONG cCtrls = 0; for (USBControllerList::const_iterator it = mUSBControllers->begin(); it != mUSBControllers->end(); ++it) { if ((*it)->i_getControllerType() == enmType) cCtrls++; } return cCtrls; } HRESULT Machine::i_getMediumAttachmentsOfController(const Utf8Str &aName, MediumAttachmentList &atts) { AutoCaller autoCaller(this); if (FAILED(autoCaller.rc())) return autoCaller.rc(); AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); for (MediumAttachmentList::const_iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it) { const ComObjPtr &pAtt = *it; // should never happen, but deal with NULL pointers in the list. AssertContinue(!pAtt.isNull()); // getControllerName() needs caller+read lock AutoCaller autoAttCaller(pAtt); if (FAILED(autoAttCaller.rc())) { atts.clear(); return autoAttCaller.rc(); } AutoReadLock attLock(pAtt COMMA_LOCKVAL_SRC_POS); if (pAtt->i_getControllerName() == aName) atts.push_back(pAtt); } return S_OK; } /** * Helper for #i_saveSettings. Cares about renaming the settings directory and * file if the machine name was changed and about creating a new settings file * if this is a new machine. * * @note Must be never called directly but only from #saveSettings(). */ HRESULT Machine::i_prepareSaveSettings(bool *pfNeedsGlobalSaveSettings, bool *pfSettingsFileIsNew) { AssertReturn(isWriteLockOnCurrentThread(), E_FAIL); HRESULT rc = S_OK; bool fSettingsFileIsNew = !mData->pMachineConfigFile->fileExists(); /// @todo need to handle primary group change, too /* attempt to rename the settings file if machine name is changed */ if ( mUserData->s.fNameSync && mUserData.isBackedUp() && ( mUserData.backedUpData()->s.strName != mUserData->s.strName || mUserData.backedUpData()->s.llGroups.front() != mUserData->s.llGroups.front()) ) { bool dirRenamed = false; bool fileRenamed = false; Utf8Str configFile, newConfigFile; Utf8Str configFilePrev, newConfigFilePrev; Utf8Str NVRAMFile, newNVRAMFile; Utf8Str configDir, newConfigDir; do { int vrc = VINF_SUCCESS; Utf8Str name = mUserData.backedUpData()->s.strName; Utf8Str newName = mUserData->s.strName; Utf8Str group = mUserData.backedUpData()->s.llGroups.front(); if (group == "/") group.setNull(); Utf8Str newGroup = mUserData->s.llGroups.front(); if (newGroup == "/") newGroup.setNull(); configFile = mData->m_strConfigFileFull; /* first, rename the directory if it matches the group and machine name */ Utf8StrFmt groupPlusName("%s%c%s", group.c_str(), RTPATH_DELIMITER, name.c_str()); /** @todo hack, make somehow use of ComposeMachineFilename */ if (mUserData->s.fDirectoryIncludesUUID) groupPlusName.appendPrintf(" (%RTuuid)", mData->mUuid.raw()); Utf8StrFmt newGroupPlusName("%s%c%s", newGroup.c_str(), RTPATH_DELIMITER, newName.c_str()); /** @todo hack, make somehow use of ComposeMachineFilename */ if (mUserData->s.fDirectoryIncludesUUID) newGroupPlusName.appendPrintf(" (%RTuuid)", mData->mUuid.raw()); configDir = configFile; configDir.stripFilename(); newConfigDir = configDir; if ( configDir.length() >= groupPlusName.length() && !RTPathCompare(configDir.substr(configDir.length() - groupPlusName.length(), groupPlusName.length()).c_str(), groupPlusName.c_str())) { newConfigDir = newConfigDir.substr(0, configDir.length() - groupPlusName.length()); Utf8Str newConfigBaseDir(newConfigDir); newConfigDir.append(newGroupPlusName); /* consistency: use \ if appropriate on the platform */ RTPathChangeToDosSlashes(newConfigDir.mutableRaw(), false); /* new dir and old dir cannot be equal here because of 'if' * above and because name != newName */ Assert(configDir != newConfigDir); if (!fSettingsFileIsNew) { /* perform real rename only if the machine is not new */ vrc = RTPathRename(configDir.c_str(), newConfigDir.c_str(), 0); if ( vrc == VERR_FILE_NOT_FOUND || vrc == VERR_PATH_NOT_FOUND) { /* create the parent directory, then retry renaming */ Utf8Str parent(newConfigDir); parent.stripFilename(); (void)RTDirCreateFullPath(parent.c_str(), 0700); vrc = RTPathRename(configDir.c_str(), newConfigDir.c_str(), 0); } if (RT_FAILURE(vrc)) { rc = setErrorBoth(E_FAIL, vrc, tr("Could not rename the directory '%s' to '%s' to save the settings file (%Rrc)"), configDir.c_str(), newConfigDir.c_str(), vrc); break; } /* delete subdirectories which are no longer needed */ Utf8Str dir(configDir); dir.stripFilename(); while (dir != newConfigBaseDir && dir != ".") { vrc = RTDirRemove(dir.c_str()); if (RT_FAILURE(vrc)) break; dir.stripFilename(); } dirRenamed = true; } } newConfigFile.printf("%s%c%s.vbox", newConfigDir.c_str(), RTPATH_DELIMITER, newName.c_str()); /* then try to rename the settings file itself */ if (newConfigFile != configFile) { /* get the path to old settings file in renamed directory */ Assert(mData->m_strConfigFileFull == configFile); configFile.printf("%s%c%s", newConfigDir.c_str(), RTPATH_DELIMITER, RTPathFilename(mData->m_strConfigFileFull.c_str())); if (!fSettingsFileIsNew) { /* perform real rename only if the machine is not new */ vrc = RTFileRename(configFile.c_str(), newConfigFile.c_str(), 0); if (RT_FAILURE(vrc)) { rc = setErrorBoth(E_FAIL, vrc, tr("Could not rename the settings file '%s' to '%s' (%Rrc)"), configFile.c_str(), newConfigFile.c_str(), vrc); break; } fileRenamed = true; configFilePrev = configFile; configFilePrev += "-prev"; newConfigFilePrev = newConfigFile; newConfigFilePrev += "-prev"; RTFileRename(configFilePrev.c_str(), newConfigFilePrev.c_str(), 0); NVRAMFile = mNvramStore->i_getNonVolatileStorageFile(); if (NVRAMFile.isNotEmpty()) { // in the NVRAM file path, replace the old directory with the new directory if (RTPathStartsWith(NVRAMFile.c_str(), configDir.c_str())) { Utf8Str strNVRAMFile = NVRAMFile.c_str() + configDir.length(); NVRAMFile = newConfigDir + strNVRAMFile; } newNVRAMFile = newConfigFile; newNVRAMFile.stripSuffix(); newNVRAMFile += ".nvram"; RTFileRename(NVRAMFile.c_str(), newNVRAMFile.c_str(), 0); } } } // update m_strConfigFileFull amd mConfigFile mData->m_strConfigFileFull = newConfigFile; // compute the relative path too mParent->i_copyPathRelativeToConfig(newConfigFile, mData->m_strConfigFile); // store the old and new so that VirtualBox::i_saveSettings() can update // the media registry if ( mData->mRegistered && (configDir != newConfigDir || configFile != newConfigFile)) { mParent->i_rememberMachineNameChangeForMedia(configDir, newConfigDir); if (pfNeedsGlobalSaveSettings) *pfNeedsGlobalSaveSettings = true; } // in the saved state file path, replace the old directory with the new directory if (RTPathStartsWith(mSSData->strStateFilePath.c_str(), configDir.c_str())) { Utf8Str strStateFileName = mSSData->strStateFilePath.c_str() + configDir.length(); mSSData->strStateFilePath = newConfigDir + strStateFileName; } if (newNVRAMFile.isNotEmpty()) mNvramStore->i_updateNonVolatileStorageFile(newNVRAMFile); // and do the same thing for the saved state file paths of all the online snapshots and NVRAM files of all snapshots if (mData->mFirstSnapshot) { mData->mFirstSnapshot->i_updateSavedStatePaths(configDir.c_str(), newConfigDir.c_str()); mData->mFirstSnapshot->i_updateNVRAMPaths(configDir.c_str(), newConfigDir.c_str()); } } while (0); if (FAILED(rc)) { /* silently try to rename everything back */ if (fileRenamed) { RTFileRename(newConfigFilePrev.c_str(), configFilePrev.c_str(), 0); RTFileRename(newConfigFile.c_str(), configFile.c_str(), 0); if (NVRAMFile.isNotEmpty() && newNVRAMFile.isNotEmpty()) RTFileRename(newNVRAMFile.c_str(), NVRAMFile.c_str(), 0); } if (dirRenamed) RTPathRename(newConfigDir.c_str(), configDir.c_str(), 0); } if (FAILED(rc)) return rc; } if (fSettingsFileIsNew) { /* create a virgin config file */ int vrc = VINF_SUCCESS; /* ensure the settings directory exists */ Utf8Str path(mData->m_strConfigFileFull); path.stripFilename(); if (!RTDirExists(path.c_str())) { vrc = RTDirCreateFullPath(path.c_str(), 0700); if (RT_FAILURE(vrc)) { return setErrorBoth(E_FAIL, vrc, tr("Could not create a directory '%s' to save the settings file (%Rrc)"), path.c_str(), vrc); } } /* Note: open flags must correlate with RTFileOpen() in lockConfig() */ path = mData->m_strConfigFileFull; RTFILE f = NIL_RTFILE; vrc = RTFileOpen(&f, path.c_str(), RTFILE_O_READWRITE | RTFILE_O_CREATE | RTFILE_O_DENY_WRITE); if (RT_FAILURE(vrc)) return setErrorBoth(E_FAIL, vrc, tr("Could not create the settings file '%s' (%Rrc)"), path.c_str(), vrc); RTFileClose(f); } if (pfSettingsFileIsNew) *pfSettingsFileIsNew = fSettingsFileIsNew; return rc; } /** * Saves and commits machine data, user data and hardware data. * * Note that on failure, the data remains uncommitted. * * @a aFlags may combine the following flags: * * - SaveS_ResetCurStateModified: Resets mData->mCurrentStateModified to FALSE. * Used when saving settings after an operation that makes them 100% * correspond to the settings from the current snapshot. * - SaveS_Force: settings will be saved without doing a deep compare of the * settings structures. This is used when this is called because snapshots * have changed to avoid the overhead of the deep compare. * * @note Must be called from under this object's write lock. Locks children for * writing. * * @param pfNeedsGlobalSaveSettings Optional pointer to a bool that must have been * initialized to false and that will be set to true by this function if * the caller must invoke VirtualBox::i_saveSettings() because the global * settings have changed. This will happen if a machine rename has been * saved and the global machine and media registries will therefore need * updating. * @param alock Reference to the lock for this machine object. * @param aFlags Flags. */ HRESULT Machine::i_saveSettings(bool *pfNeedsGlobalSaveSettings, AutoWriteLock &alock, int aFlags /*= 0*/) { LogFlowThisFuncEnter(); AssertReturn(isWriteLockOnCurrentThread(), E_FAIL); /* make sure child objects are unable to modify the settings while we are * saving them */ i_ensureNoStateDependencies(alock); AssertReturn(!i_isSnapshotMachine(), E_FAIL); if (!mData->mAccessible) return setError(VBOX_E_INVALID_VM_STATE, tr("The machine is not accessible, so cannot save settings")); HRESULT rc = S_OK; PCVBOXCRYPTOIF pCryptoIf = NULL; const char *pszPassword = NULL; SecretKey *pKey = NULL; #ifdef VBOX_WITH_FULL_VM_ENCRYPTION if (mData->mstrKeyId.isNotEmpty()) { /* VM is going to be encrypted. */ alock.release(); /** @todo Revise the locking. */ rc = mParent->i_retainCryptoIf(&pCryptoIf); alock.acquire(); if (FAILED(rc)) return rc; /* Error is set. */ int vrc = mData->mpKeyStore->retainSecretKey(mData->mstrKeyId, &pKey); if (RT_SUCCESS(vrc)) pszPassword = (const char *)pKey->getKeyBuffer(); else { mParent->i_releaseCryptoIf(pCryptoIf); return setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Failed to retain VM encryption password using ID '%s' with %Rrc"), mData->mstrKeyId.c_str(), vrc); } } #else RT_NOREF(pKey); #endif bool fNeedsWrite = false; bool fSettingsFileIsNew = false; /* First, prepare to save settings. It will care about renaming the * settings directory and file if the machine name was changed and about * creating a new settings file if this is a new machine. */ rc = i_prepareSaveSettings(pfNeedsGlobalSaveSettings, &fSettingsFileIsNew); if (FAILED(rc)) { #ifdef VBOX_WITH_FULL_VM_ENCRYPTION if (pCryptoIf) { alock.release(); /** @todo Revise the locking. */ mParent->i_releaseCryptoIf(pCryptoIf); alock.acquire(); } if (pKey) mData->mpKeyStore->releaseSecretKey(mData->mstrKeyId); #endif return rc; } // keep a pointer to the current settings structures settings::MachineConfigFile *pOldConfig = mData->pMachineConfigFile; settings::MachineConfigFile *pNewConfig = NULL; try { // make a fresh one to have everyone write stuff into pNewConfig = new settings::MachineConfigFile(NULL); pNewConfig->copyBaseFrom(*mData->pMachineConfigFile); #ifdef VBOX_WITH_FULL_VM_ENCRYPTION pNewConfig->strKeyId = mData->mstrKeyId; pNewConfig->strKeyStore = mData->mstrKeyStore; #endif // now go and copy all the settings data from COM to the settings structures // (this calls i_saveSettings() on all the COM objects in the machine) i_copyMachineDataToSettings(*pNewConfig); if (aFlags & SaveS_ResetCurStateModified) { // this gets set by takeSnapshot() (if offline snapshot) and restoreSnapshot() mData->mCurrentStateModified = FALSE; fNeedsWrite = true; // always, no need to compare } else if (aFlags & SaveS_Force) { fNeedsWrite = true; // always, no need to compare } else { if (!mData->mCurrentStateModified) { // do a deep compare of the settings that we just saved with the settings // previously stored in the config file; this invokes MachineConfigFile::operator== // which does a deep compare of all the settings, which is expensive but less expensive // than writing out XML in vain bool fAnySettingsChanged = !(*pNewConfig == *pOldConfig); // could still be modified if any settings changed mData->mCurrentStateModified = fAnySettingsChanged; fNeedsWrite = fAnySettingsChanged; } else fNeedsWrite = true; } pNewConfig->fCurrentStateModified = !!mData->mCurrentStateModified; if (fNeedsWrite) { // now spit it all out! pNewConfig->write(mData->m_strConfigFileFull, pCryptoIf, pszPassword); if (aFlags & SaveS_RemoveBackup) i_deleteFile(mData->m_strConfigFileFull + "-prev", true /* fIgnoreFailures */); } mData->pMachineConfigFile = pNewConfig; delete pOldConfig; i_commit(); // after saving settings, we are no longer different from the XML on disk mData->flModifications = 0; } catch (HRESULT err) { // we assume that error info is set by the thrower rc = err; // delete any newly created settings file if (fSettingsFileIsNew) i_deleteFile(mData->m_strConfigFileFull, true /* fIgnoreFailures */); // restore old config delete pNewConfig; mData->pMachineConfigFile = pOldConfig; } catch (...) { rc = VirtualBoxBase::handleUnexpectedExceptions(this, RT_SRC_POS); } #ifdef VBOX_WITH_FULL_VM_ENCRYPTION if (pCryptoIf) { alock.release(); /** @todo Revise the locking. */ mParent->i_releaseCryptoIf(pCryptoIf); alock.acquire(); } if (pKey) mData->mpKeyStore->releaseSecretKey(mData->mstrKeyId); #endif if (fNeedsWrite) { /* Fire the data change event, even on failure (since we've already * committed all data). This is done only for SessionMachines because * mutable Machine instances are always not registered (i.e. private * to the client process that creates them) and thus don't need to * inform callbacks. */ if (i_isSessionMachine()) mParent->i_onMachineDataChanged(mData->mUuid); } LogFlowThisFunc(("rc=%08X\n", rc)); LogFlowThisFuncLeave(); return rc; } /** * Implementation for saving the machine settings into the given * settings::MachineConfigFile instance. This copies machine extradata * from the previous machine config file in the instance data, if any. * * This gets called from two locations: * * -- Machine::i_saveSettings(), during the regular XML writing; * * -- Appliance::buildXMLForOneVirtualSystem(), when a machine gets * exported to OVF and we write the VirtualBox proprietary XML * into a tag. * * This routine fills all the fields in there, including snapshots, *except* * for the following: * * -- fCurrentStateModified. There is some special logic associated with that. * * The caller can then call MachineConfigFile::write() or do something else * with it. * * Caller must hold the machine lock! * * This throws XML errors and HRESULT, so the caller must have a catch block! */ void Machine::i_copyMachineDataToSettings(settings::MachineConfigFile &config) { // deep copy extradata, being extra careful with self assignment (the STL // map assignment on Mac OS X clang based Xcode isn't checking) if (&config != mData->pMachineConfigFile) config.mapExtraDataItems = mData->pMachineConfigFile->mapExtraDataItems; config.uuid = mData->mUuid; // copy name, description, OS type, teleport, UTC etc. config.machineUserData = mUserData->s; #ifdef VBOX_WITH_FULL_VM_ENCRYPTION config.strStateKeyId = mSSData->strStateKeyId; config.strStateKeyStore = mSSData->strStateKeyStore; config.strLogKeyId = mData->mstrLogKeyId; config.strLogKeyStore = mData->mstrLogKeyStore; #endif if ( mData->mMachineState == MachineState_Saved || mData->mMachineState == MachineState_AbortedSaved || mData->mMachineState == MachineState_Restoring // when doing certain snapshot operations we may or may not have // a saved state in the current state, so keep everything as is || ( ( mData->mMachineState == MachineState_Snapshotting || mData->mMachineState == MachineState_DeletingSnapshot || mData->mMachineState == MachineState_RestoringSnapshot) && (!mSSData->strStateFilePath.isEmpty()) ) ) { Assert(!mSSData->strStateFilePath.isEmpty()); /* try to make the file name relative to the settings file dir */ i_copyPathRelativeToMachine(mSSData->strStateFilePath, config.strStateFile); } else { Assert(mSSData->strStateFilePath.isEmpty() || mData->mMachineState == MachineState_Saving); config.strStateFile.setNull(); } if (mData->mCurrentSnapshot) config.uuidCurrentSnapshot = mData->mCurrentSnapshot->i_getId(); else config.uuidCurrentSnapshot.clear(); config.timeLastStateChange = mData->mLastStateChange; config.fAborted = (mData->mMachineState == MachineState_Aborted || mData->mMachineState == MachineState_AbortedSaved); /// @todo Live Migration: config.fTeleported = (mData->mMachineState == MachineState_Teleported); HRESULT hrc = i_saveHardware(config.hardwareMachine, &config.debugging, &config.autostart, config.recordingSettings); if (FAILED(hrc)) throw hrc; // save machine's media registry if this is VirtualBox 4.0 or later if (config.canHaveOwnMediaRegistry()) { // determine machine folder Utf8Str strMachineFolder = i_getSettingsFileFull(); strMachineFolder.stripFilename(); mParent->i_saveMediaRegistry(config.mediaRegistry, i_getId(), // only media with registry ID == machine UUID strMachineFolder); // this throws HRESULT } // save snapshots hrc = i_saveAllSnapshots(config); if (FAILED(hrc)) throw hrc; } /** * Saves all snapshots of the machine into the given machine config file. Called * from Machine::buildMachineXML() and SessionMachine::deleteSnapshotHandler(). * @param config * @return */ HRESULT Machine::i_saveAllSnapshots(settings::MachineConfigFile &config) { AssertReturn(isWriteLockOnCurrentThread(), E_FAIL); HRESULT rc = S_OK; try { config.llFirstSnapshot.clear(); if (mData->mFirstSnapshot) { // the settings use a list for "the first snapshot" config.llFirstSnapshot.push_back(settings::Snapshot::Empty); // get reference to the snapshot on the list and work on that // element straight in the list to avoid excessive copying later rc = mData->mFirstSnapshot->i_saveSnapshot(config.llFirstSnapshot.back()); if (FAILED(rc)) throw rc; } // if (mType == IsSessionMachine) // mParent->onMachineDataChange(mData->mUuid); @todo is this necessary? } catch (HRESULT err) { /* we assume that error info is set by the thrower */ rc = err; } catch (...) { rc = VirtualBoxBase::handleUnexpectedExceptions(this, RT_SRC_POS); } return rc; } /** * Saves the VM hardware configuration. It is assumed that the * given node is empty. * * @param data Reference to the settings object for the hardware config. * @param pDbg Pointer to the settings object for the debugging config * which happens to live in mHWData. * @param pAutostart Pointer to the settings object for the autostart config * which happens to live in mHWData. * @param recording Reference to reecording settings. */ HRESULT Machine::i_saveHardware(settings::Hardware &data, settings::Debugging *pDbg, settings::Autostart *pAutostart, settings::RecordingSettings &recording) { HRESULT rc = S_OK; try { /* The hardware version attribute (optional). Automatically upgrade from 1 to current default hardware version when there is no saved state. (ugly!) */ if ( mHWData->mHWVersion == "1" && mSSData->strStateFilePath.isEmpty() ) mHWData->mHWVersion.printf("%d", SchemaDefs::DefaultHardwareVersion); data.strVersion = mHWData->mHWVersion; data.uuid = mHWData->mHardwareUUID; // CPU data.fHardwareVirt = !!mHWData->mHWVirtExEnabled; data.fNestedPaging = !!mHWData->mHWVirtExNestedPagingEnabled; data.fLargePages = !!mHWData->mHWVirtExLargePagesEnabled; data.fVPID = !!mHWData->mHWVirtExVPIDEnabled; data.fUnrestrictedExecution = !!mHWData->mHWVirtExUXEnabled; data.fHardwareVirtForce = !!mHWData->mHWVirtExForceEnabled; data.fUseNativeApi = !!mHWData->mHWVirtExUseNativeApi; data.fVirtVmsaveVmload = !!mHWData->mHWVirtExVirtVmsaveVmload; data.fPAE = !!mHWData->mPAEEnabled; data.enmLongMode = mHWData->mLongMode; data.fTripleFaultReset = !!mHWData->mTripleFaultReset; data.fAPIC = !!mHWData->mAPIC; data.fX2APIC = !!mHWData->mX2APIC; data.fIBPBOnVMExit = !!mHWData->mIBPBOnVMExit; data.fIBPBOnVMEntry = !!mHWData->mIBPBOnVMEntry; data.fSpecCtrl = !!mHWData->mSpecCtrl; data.fSpecCtrlByHost = !!mHWData->mSpecCtrlByHost; data.fL1DFlushOnSched = !!mHWData->mL1DFlushOnSched; data.fL1DFlushOnVMEntry = !!mHWData->mL1DFlushOnVMEntry; data.fMDSClearOnSched = !!mHWData->mMDSClearOnSched; data.fMDSClearOnVMEntry = !!mHWData->mMDSClearOnVMEntry; data.fNestedHWVirt = !!mHWData->mNestedHWVirt; data.cCPUs = mHWData->mCPUCount; data.fCpuHotPlug = !!mHWData->mCPUHotPlugEnabled; data.ulCpuExecutionCap = mHWData->mCpuExecutionCap; data.uCpuIdPortabilityLevel = mHWData->mCpuIdPortabilityLevel; data.strCpuProfile = mHWData->mCpuProfile; data.llCpus.clear(); if (data.fCpuHotPlug) { for (unsigned idx = 0; idx < data.cCPUs; ++idx) { if (mHWData->mCPUAttached[idx]) { settings::Cpu cpu; cpu.ulId = idx; data.llCpus.push_back(cpu); } } } /* Standard and Extended CPUID leafs. */ data.llCpuIdLeafs.clear(); data.llCpuIdLeafs = mHWData->mCpuIdLeafList; // memory data.ulMemorySizeMB = mHWData->mMemorySize; data.fPageFusionEnabled = !!mHWData->mPageFusionEnabled; // firmware data.firmwareType = mHWData->mFirmwareType; // HID data.pointingHIDType = mHWData->mPointingHIDType; data.keyboardHIDType = mHWData->mKeyboardHIDType; // chipset data.chipsetType = mHWData->mChipsetType; // iommu data.iommuType = mHWData->mIommuType; // paravirt data.paravirtProvider = mHWData->mParavirtProvider; data.strParavirtDebug = mHWData->mParavirtDebug; // emulated USB card reader data.fEmulatedUSBCardReader = !!mHWData->mEmulatedUSBCardReaderEnabled; // HPET data.fHPETEnabled = !!mHWData->mHPETEnabled; // boot order data.mapBootOrder.clear(); for (unsigned i = 0; i < RT_ELEMENTS(mHWData->mBootOrder); ++i) data.mapBootOrder[i] = mHWData->mBootOrder[i]; /* VRDEServer settings (optional) */ rc = mVRDEServer->i_saveSettings(data.vrdeSettings); if (FAILED(rc)) throw rc; /* BIOS settings (required) */ rc = mBIOSSettings->i_saveSettings(data.biosSettings); if (FAILED(rc)) throw rc; /* Recording settings. */ rc = mRecordingSettings->i_saveSettings(recording); if (FAILED(rc)) throw rc; /* Trusted Platform Module settings (required) */ rc = mTrustedPlatformModule->i_saveSettings(data.tpmSettings); if (FAILED(rc)) throw rc; /* NVRAM settings (required) */ rc = mNvramStore->i_saveSettings(data.nvramSettings); if (FAILED(rc)) throw rc; /* GraphicsAdapter settings (required) */ rc = mGraphicsAdapter->i_saveSettings(data.graphicsAdapter); if (FAILED(rc)) throw rc; /* USB Controller (required) */ data.usbSettings.llUSBControllers.clear(); for (USBControllerList::const_iterator it = mUSBControllers->begin(); it != mUSBControllers->end(); ++it) { ComObjPtr ctrl = *it; settings::USBController settingsCtrl; settingsCtrl.strName = ctrl->i_getName(); settingsCtrl.enmType = ctrl->i_getControllerType(); data.usbSettings.llUSBControllers.push_back(settingsCtrl); } /* USB device filters (required) */ rc = mUSBDeviceFilters->i_saveSettings(data.usbSettings); if (FAILED(rc)) throw rc; /* Network adapters (required) */ size_t uMaxNICs = RT_MIN(Global::getMaxNetworkAdapters(mHWData->mChipsetType), mNetworkAdapters.size()); data.llNetworkAdapters.clear(); /* Write out only the nominal number of network adapters for this * chipset type. Since Machine::commit() hasn't been called there * may be extra NIC settings in the vector. */ for (size_t slot = 0; slot < uMaxNICs; ++slot) { settings::NetworkAdapter nic; nic.ulSlot = (uint32_t)slot; /* paranoia check... must not be NULL, but must not crash either. */ if (mNetworkAdapters[slot]) { if (mNetworkAdapters[slot]->i_hasDefaults()) continue; rc = mNetworkAdapters[slot]->i_saveSettings(nic); if (FAILED(rc)) throw rc; data.llNetworkAdapters.push_back(nic); } } /* Serial ports */ data.llSerialPorts.clear(); for (ULONG slot = 0; slot < RT_ELEMENTS(mSerialPorts); ++slot) { if (mSerialPorts[slot]->i_hasDefaults()) continue; settings::SerialPort s; s.ulSlot = slot; rc = mSerialPorts[slot]->i_saveSettings(s); if (FAILED(rc)) return rc; data.llSerialPorts.push_back(s); } /* Parallel ports */ data.llParallelPorts.clear(); for (ULONG slot = 0; slot < RT_ELEMENTS(mParallelPorts); ++slot) { if (mParallelPorts[slot]->i_hasDefaults()) continue; settings::ParallelPort p; p.ulSlot = slot; rc = mParallelPorts[slot]->i_saveSettings(p); if (FAILED(rc)) return rc; data.llParallelPorts.push_back(p); } /* Audio settings */ rc = mAudioSettings->i_saveSettings(data.audioAdapter); if (FAILED(rc)) return rc; rc = i_saveStorageControllers(data.storage); if (FAILED(rc)) return rc; /* Shared folders */ data.llSharedFolders.clear(); for (HWData::SharedFolderList::const_iterator it = mHWData->mSharedFolders.begin(); it != mHWData->mSharedFolders.end(); ++it) { SharedFolder *pSF = *it; AutoCaller sfCaller(pSF); AutoReadLock sfLock(pSF COMMA_LOCKVAL_SRC_POS); settings::SharedFolder sf; sf.strName = pSF->i_getName(); sf.strHostPath = pSF->i_getHostPath(); sf.fWritable = !!pSF->i_isWritable(); sf.fAutoMount = !!pSF->i_isAutoMounted(); sf.strAutoMountPoint = pSF->i_getAutoMountPoint(); data.llSharedFolders.push_back(sf); } // clipboard data.clipboardMode = mHWData->mClipboardMode; data.fClipboardFileTransfersEnabled = RT_BOOL(mHWData->mClipboardFileTransfersEnabled); // drag'n'drop data.dndMode = mHWData->mDnDMode; /* Guest */ data.ulMemoryBalloonSize = mHWData->mMemoryBalloonSize; // IO settings data.ioSettings.fIOCacheEnabled = !!mHWData->mIOCacheEnabled; data.ioSettings.ulIOCacheSize = mHWData->mIOCacheSize; /* BandwidthControl (required) */ rc = mBandwidthControl->i_saveSettings(data.ioSettings); if (FAILED(rc)) throw rc; /* Host PCI devices */ data.pciAttachments.clear(); for (HWData::PCIDeviceAssignmentList::const_iterator it = mHWData->mPCIDeviceAssignments.begin(); it != mHWData->mPCIDeviceAssignments.end(); ++it) { ComObjPtr pda = *it; settings::HostPCIDeviceAttachment hpda; rc = pda->i_saveSettings(hpda); if (FAILED(rc)) throw rc; data.pciAttachments.push_back(hpda); } // guest properties data.llGuestProperties.clear(); #ifdef VBOX_WITH_GUEST_PROPS for (HWData::GuestPropertyMap::const_iterator it = mHWData->mGuestProperties.begin(); it != mHWData->mGuestProperties.end(); ++it) { HWData::GuestProperty property = it->second; /* Remove transient guest properties at shutdown unless we * are saving state. Note that restoring snapshot intentionally * keeps them, they will be removed if appropriate once the final * machine state is set (as crashes etc. need to work). */ if ( ( mData->mMachineState == MachineState_PoweredOff || mData->mMachineState == MachineState_Aborted || mData->mMachineState == MachineState_Teleported) && (property.mFlags & (GUEST_PROP_F_TRANSIENT | GUEST_PROP_F_TRANSRESET))) continue; settings::GuestProperty prop; /// @todo r=bird: some excellent variable name choices here: 'prop' and 'property'; No 'const' clue either. prop.strName = it->first; prop.strValue = property.strValue; prop.timestamp = (uint64_t)property.mTimestamp; char szFlags[GUEST_PROP_MAX_FLAGS_LEN + 1]; GuestPropWriteFlags(property.mFlags, szFlags); prop.strFlags = szFlags; data.llGuestProperties.push_back(prop); } /* I presume this doesn't require a backup(). */ mData->mGuestPropertiesModified = FALSE; #endif /* VBOX_WITH_GUEST_PROPS defined */ rc = mGuestDebugControl->i_saveSettings(mHWData->mDebugging); if (FAILED(rc)) throw rc; *pDbg = mHWData->mDebugging; /// @todo r=aeichner: Move this to guest debug control. */ *pAutostart = mHWData->mAutostart; data.strDefaultFrontend = mHWData->mDefaultFrontend; } catch (std::bad_alloc &) { return E_OUTOFMEMORY; } AssertComRC(rc); return rc; } /** * Saves the storage controller configuration. * * @param data storage settings. */ HRESULT Machine::i_saveStorageControllers(settings::Storage &data) { data.llStorageControllers.clear(); for (StorageControllerList::const_iterator it = mStorageControllers->begin(); it != mStorageControllers->end(); ++it) { HRESULT rc; ComObjPtr pCtl = *it; settings::StorageController ctl; ctl.strName = pCtl->i_getName(); ctl.controllerType = pCtl->i_getControllerType(); ctl.storageBus = pCtl->i_getStorageBus(); ctl.ulInstance = pCtl->i_getInstance(); ctl.fBootable = pCtl->i_getBootable(); /* Save the port count. */ ULONG portCount; rc = pCtl->COMGETTER(PortCount)(&portCount); ComAssertComRCRet(rc, rc); ctl.ulPortCount = portCount; /* Save fUseHostIOCache */ BOOL fUseHostIOCache; rc = pCtl->COMGETTER(UseHostIOCache)(&fUseHostIOCache); ComAssertComRCRet(rc, rc); ctl.fUseHostIOCache = !!fUseHostIOCache; /* save the devices now. */ rc = i_saveStorageDevices(pCtl, ctl); ComAssertComRCRet(rc, rc); data.llStorageControllers.push_back(ctl); } return S_OK; } /** * Saves the hard disk configuration. */ HRESULT Machine::i_saveStorageDevices(ComObjPtr aStorageController, settings::StorageController &data) { MediumAttachmentList atts; HRESULT rc = i_getMediumAttachmentsOfController(aStorageController->i_getName(), atts); if (FAILED(rc)) return rc; data.llAttachedDevices.clear(); for (MediumAttachmentList::const_iterator it = atts.begin(); it != atts.end(); ++it) { settings::AttachedDevice dev; IMediumAttachment *iA = *it; MediumAttachment *pAttach = static_cast(iA); Medium *pMedium = pAttach->i_getMedium(); dev.deviceType = pAttach->i_getType(); dev.lPort = pAttach->i_getPort(); dev.lDevice = pAttach->i_getDevice(); dev.fPassThrough = pAttach->i_getPassthrough(); dev.fHotPluggable = pAttach->i_getHotPluggable(); if (pMedium) { if (pMedium->i_isHostDrive()) dev.strHostDriveSrc = pMedium->i_getLocationFull(); else dev.uuid = pMedium->i_getId(); dev.fTempEject = pAttach->i_getTempEject(); dev.fNonRotational = pAttach->i_getNonRotational(); dev.fDiscard = pAttach->i_getDiscard(); } dev.strBwGroup = pAttach->i_getBandwidthGroup(); data.llAttachedDevices.push_back(dev); } return S_OK; } /** * Saves machine state settings as defined by aFlags * (SaveSTS_* values). * * @param aFlags Combination of SaveSTS_* flags. * * @note Locks objects for writing. */ HRESULT Machine::i_saveStateSettings(int aFlags) { if (aFlags == 0) return S_OK; AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); /* This object's write lock is also necessary to serialize file access * (prevent concurrent reads and writes) */ AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = S_OK; Assert(mData->pMachineConfigFile); try { if (aFlags & SaveSTS_CurStateModified) mData->pMachineConfigFile->fCurrentStateModified = true; if (aFlags & SaveSTS_StateFilePath) { if (!mSSData->strStateFilePath.isEmpty()) /* try to make the file name relative to the settings file dir */ i_copyPathRelativeToMachine(mSSData->strStateFilePath, mData->pMachineConfigFile->strStateFile); else mData->pMachineConfigFile->strStateFile.setNull(); } if (aFlags & SaveSTS_StateTimeStamp) { Assert( mData->mMachineState != MachineState_Aborted || mSSData->strStateFilePath.isEmpty()); mData->pMachineConfigFile->timeLastStateChange = mData->mLastStateChange; mData->pMachineConfigFile->fAborted = (mData->mMachineState == MachineState_Aborted || mData->mMachineState == MachineState_AbortedSaved); /// @todo live migration mData->pMachineConfigFile->fTeleported = (mData->mMachineState == MachineState_Teleported); } mData->pMachineConfigFile->write(mData->m_strConfigFileFull); } catch (...) { rc = VirtualBoxBase::handleUnexpectedExceptions(this, RT_SRC_POS); } return rc; } /** * Ensures that the given medium is added to a media registry. If this machine * was created with 4.0 or later, then the machine registry is used. Otherwise * the global VirtualBox media registry is used. * * Caller must NOT hold machine lock, media tree or any medium locks! * * @param pMedium */ void Machine::i_addMediumToRegistry(ComObjPtr &pMedium) { /* Paranoia checks: do not hold machine or media tree locks. */ AssertReturnVoid(!isWriteLockOnCurrentThread()); AssertReturnVoid(!mParent->i_getMediaTreeLockHandle().isWriteLockOnCurrentThread()); ComObjPtr pBase; { AutoReadLock treeLock(&mParent->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS); pBase = pMedium->i_getBase(); } /* Paranoia checks: do not hold medium locks. */ AssertReturnVoid(!pMedium->isWriteLockOnCurrentThread()); AssertReturnVoid(!pBase->isWriteLockOnCurrentThread()); // decide which medium registry to use now that the medium is attached: Guid uuid; bool fCanHaveOwnMediaRegistry = mData->pMachineConfigFile->canHaveOwnMediaRegistry(); if (fCanHaveOwnMediaRegistry) // machine XML is VirtualBox 4.0 or higher: uuid = i_getId(); // machine UUID else uuid = mParent->i_getGlobalRegistryId(); // VirtualBox global registry UUID if (fCanHaveOwnMediaRegistry && pMedium->i_removeRegistry(mParent->i_getGlobalRegistryId())) mParent->i_markRegistryModified(mParent->i_getGlobalRegistryId()); if (pMedium->i_addRegistry(uuid)) mParent->i_markRegistryModified(uuid); /* For more complex hard disk structures it can happen that the base * medium isn't yet associated with any medium registry. Do that now. */ if (pMedium != pBase) { /* Tree lock needed by Medium::addRegistryAll. */ AutoReadLock treeLock(&mParent->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS); if (fCanHaveOwnMediaRegistry && pBase->i_removeRegistryAll(mParent->i_getGlobalRegistryId())) { treeLock.release(); mParent->i_markRegistryModified(mParent->i_getGlobalRegistryId()); treeLock.acquire(); } if (pBase->i_addRegistryAll(uuid)) { treeLock.release(); mParent->i_markRegistryModified(uuid); } } } /** * Physically deletes a file belonging to a machine. * * @returns HRESULT * @retval VBOX_E_FILE_ERROR on failure. * @param strFile File to delete. * @param fIgnoreFailures Whether to ignore deletion failures. Defaults to \c false. * VERR_FILE_NOT_FOUND and VERR_PATH_NOT_FOUND always will be ignored. * @param strWhat File hint which will be used when setting an error. Optional. * @param prc Where to return IPRT's error code on failure. Optional and can be NULL. */ HRESULT Machine::i_deleteFile(const Utf8Str &strFile, bool fIgnoreFailures /* = false */, const Utf8Str &strWhat /* = "" */, int *prc /* = NULL */) { AssertReturn(strFile.isNotEmpty(), E_INVALIDARG); HRESULT hrc = S_OK; LogFunc(("Deleting file '%s'\n", strFile.c_str())); int vrc = RTFileDelete(strFile.c_str()); if (RT_FAILURE(vrc)) { if ( !fIgnoreFailures /* Don't (externally) bitch about stuff which doesn't exist. */ && ( vrc != VERR_FILE_NOT_FOUND && vrc != VERR_PATH_NOT_FOUND ) ) { LogRel(("Deleting file '%s' failed: %Rrc\n", strFile.c_str(), vrc)); Utf8StrFmt strError("Error deleting %s '%s' (%Rrc)", strWhat.isEmpty() ? tr("file") : strWhat.c_str(), strFile.c_str(), vrc); hrc = setErrorBoth(VBOX_E_FILE_ERROR, vrc, strError.c_str(), strFile.c_str(), vrc); } if (prc) *prc = vrc; } return hrc; } /** * Creates differencing hard disks for all normal hard disks attached to this * machine and a new set of attachments to refer to created disks. * * Used when taking a snapshot or when deleting the current state. Gets called * from SessionMachine::BeginTakingSnapshot() and SessionMachine::restoreSnapshotHandler(). * * This method assumes that mMediumAttachments contains the original hard disk * attachments it needs to create diffs for. On success, these attachments will * be replaced with the created diffs. * * Attachments with non-normal hard disks are left as is. * * If @a aOnline is @c false then the original hard disks that require implicit * diffs will be locked for reading. Otherwise it is assumed that they are * already locked for writing (when the VM was started). Note that in the latter * case it is responsibility of the caller to lock the newly created diffs for * writing if this method succeeds. * * @param aProgress Progress object to run (must contain at least as * many operations left as the number of hard disks * attached). * @param aWeight Weight of this operation. * @param aOnline Whether the VM was online prior to this operation. * * @note The progress object is not marked as completed, neither on success nor * on failure. This is a responsibility of the caller. * * @note Locks this object and the media tree for writing. */ HRESULT Machine::i_createImplicitDiffs(IProgress *aProgress, ULONG aWeight, bool aOnline) { LogFlowThisFunc(("aOnline=%d\n", aOnline)); ComPtr pProgressControl(aProgress); AssertReturn(!!pProgressControl, E_INVALIDARG); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); AutoMultiWriteLock2 alock(this->lockHandle(), &mParent->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS); /* must be in a protective state because we release the lock below */ AssertReturn( mData->mMachineState == MachineState_Snapshotting || mData->mMachineState == MachineState_OnlineSnapshotting || mData->mMachineState == MachineState_LiveSnapshotting || mData->mMachineState == MachineState_RestoringSnapshot || mData->mMachineState == MachineState_DeletingSnapshot , E_FAIL); HRESULT rc = S_OK; // use appropriate locked media map (online or offline) MediumLockListMap lockedMediaOffline; MediumLockListMap *lockedMediaMap; if (aOnline) lockedMediaMap = &mData->mSession.mLockedMedia; else lockedMediaMap = &lockedMediaOffline; try { if (!aOnline) { /* lock all attached hard disks early to detect "in use" * situations before creating actual diffs */ for (MediumAttachmentList::const_iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it) { MediumAttachment *pAtt = *it; if (pAtt->i_getType() == DeviceType_HardDisk) { Medium *pMedium = pAtt->i_getMedium(); Assert(pMedium); MediumLockList *pMediumLockList(new MediumLockList()); alock.release(); rc = pMedium->i_createMediumLockList(true /* fFailIfInaccessible */, NULL /* pToLockWrite */, false /* fMediumLockWriteAll */, NULL, *pMediumLockList); alock.acquire(); if (FAILED(rc)) { delete pMediumLockList; throw rc; } rc = lockedMediaMap->Insert(pAtt, pMediumLockList); if (FAILED(rc)) { throw setError(rc, tr("Collecting locking information for all attached media failed")); } } } /* Now lock all media. If this fails, nothing is locked. */ alock.release(); rc = lockedMediaMap->Lock(); alock.acquire(); if (FAILED(rc)) { throw setError(rc, tr("Locking of attached media failed")); } } /* remember the current list (note that we don't use backup() since * mMediumAttachments may be already backed up) */ MediumAttachmentList atts = *mMediumAttachments.data(); /* start from scratch */ mMediumAttachments->clear(); /* go through remembered attachments and create diffs for normal hard * disks and attach them */ for (MediumAttachmentList::const_iterator it = atts.begin(); it != atts.end(); ++it) { MediumAttachment *pAtt = *it; DeviceType_T devType = pAtt->i_getType(); Medium *pMedium = pAtt->i_getMedium(); if ( devType != DeviceType_HardDisk || pMedium == NULL || pMedium->i_getType() != MediumType_Normal) { /* copy the attachment as is */ /** @todo the progress object created in SessionMachine::TakeSnaphot * only expects operations for hard disks. Later other * device types need to show up in the progress as well. */ if (devType == DeviceType_HardDisk) { if (pMedium == NULL) pProgressControl->SetNextOperation(Bstr(tr("Skipping attachment without medium")).raw(), aWeight); // weight else pProgressControl->SetNextOperation(BstrFmt(tr("Skipping medium '%s'"), pMedium->i_getBase()->i_getName().c_str()).raw(), aWeight); // weight } mMediumAttachments->push_back(pAtt); continue; } /* need a diff */ pProgressControl->SetNextOperation(BstrFmt(tr("Creating differencing hard disk for '%s'"), pMedium->i_getBase()->i_getName().c_str()).raw(), aWeight); // weight Utf8Str strFullSnapshotFolder; i_calculateFullPath(mUserData->s.strSnapshotFolder, strFullSnapshotFolder); ComObjPtr diff; diff.createObject(); // store the diff in the same registry as the parent // (this cannot fail here because we can't create implicit diffs for // unregistered images) Guid uuidRegistryParent; bool fInRegistry = pMedium->i_getFirstRegistryMachineId(uuidRegistryParent); Assert(fInRegistry); NOREF(fInRegistry); rc = diff->init(mParent, pMedium->i_getPreferredDiffFormat(), strFullSnapshotFolder.append(RTPATH_SLASH_STR), uuidRegistryParent, DeviceType_HardDisk); if (FAILED(rc)) throw rc; /** @todo r=bird: How is the locking and diff image cleaned up if we fail before * the push_back? Looks like we're going to release medium with the * wrong kind of lock (general issue with if we fail anywhere at all) * and an orphaned VDI in the snapshots folder. */ /* update the appropriate lock list */ MediumLockList *pMediumLockList; rc = lockedMediaMap->Get(pAtt, pMediumLockList); AssertComRCThrowRC(rc); if (aOnline) { alock.release(); /* The currently attached medium will be read-only, change * the lock type to read. */ rc = pMediumLockList->Update(pMedium, false); alock.acquire(); AssertComRCThrowRC(rc); } /* release the locks before the potentially lengthy operation */ alock.release(); rc = pMedium->i_createDiffStorage(diff, pMedium->i_getPreferredDiffVariant(), pMediumLockList, NULL /* aProgress */, true /* aWait */, false /* aNotify */); alock.acquire(); if (FAILED(rc)) throw rc; /* actual lock list update is done in Machine::i_commitMedia */ rc = diff->i_addBackReference(mData->mUuid); AssertComRCThrowRC(rc); /* add a new attachment */ ComObjPtr attachment; attachment.createObject(); rc = attachment->init(this, diff, pAtt->i_getControllerName(), pAtt->i_getPort(), pAtt->i_getDevice(), DeviceType_HardDisk, true /* aImplicit */, false /* aPassthrough */, false /* aTempEject */, pAtt->i_getNonRotational(), pAtt->i_getDiscard(), pAtt->i_getHotPluggable(), pAtt->i_getBandwidthGroup()); if (FAILED(rc)) throw rc; rc = lockedMediaMap->ReplaceKey(pAtt, attachment); AssertComRCThrowRC(rc); mMediumAttachments->push_back(attachment); } } catch (HRESULT aRC) { rc = aRC; } /* unlock all hard disks we locked when there is no VM */ if (!aOnline) { ErrorInfoKeeper eik; HRESULT rc1 = lockedMediaMap->Clear(); AssertComRC(rc1); } return rc; } /** * Deletes implicit differencing hard disks created either by * #i_createImplicitDiffs() or by #attachDevice() and rolls back * mMediumAttachments. * * Note that to delete hard disks created by #attachDevice() this method is * called from #i_rollbackMedia() when the changes are rolled back. * * @note Locks this object and the media tree for writing. */ HRESULT Machine::i_deleteImplicitDiffs(bool aOnline) { LogFlowThisFunc(("aOnline=%d\n", aOnline)); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); AutoMultiWriteLock2 alock(this->lockHandle(), &mParent->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS); /* We absolutely must have backed up state. */ AssertReturn(mMediumAttachments.isBackedUp(), E_FAIL); /* Check if there are any implicitly created diff images. */ bool fImplicitDiffs = false; for (MediumAttachmentList::const_iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it) { const ComObjPtr &pAtt = *it; if (pAtt->i_isImplicit()) { fImplicitDiffs = true; break; } } /* If there is nothing to do, leave early. This saves lots of image locking * effort. It also avoids a MachineStateChanged event without real reason. * This is important e.g. when loading a VM config, because there should be * no events. Otherwise API clients can become thoroughly confused for * inaccessible VMs (the code for loading VM configs uses this method for * cleanup if the config makes no sense), as they take such events as an * indication that the VM is alive, and they would force the VM config to * be reread, leading to an endless loop. */ if (!fImplicitDiffs) return S_OK; HRESULT rc = S_OK; MachineState_T oldState = mData->mMachineState; /* will release the lock before the potentially lengthy operation, * so protect with the special state (unless already protected) */ if ( oldState != MachineState_Snapshotting && oldState != MachineState_OnlineSnapshotting && oldState != MachineState_LiveSnapshotting && oldState != MachineState_RestoringSnapshot && oldState != MachineState_DeletingSnapshot && oldState != MachineState_DeletingSnapshotOnline && oldState != MachineState_DeletingSnapshotPaused ) i_setMachineState(MachineState_SettingUp); // use appropriate locked media map (online or offline) MediumLockListMap lockedMediaOffline; MediumLockListMap *lockedMediaMap; if (aOnline) lockedMediaMap = &mData->mSession.mLockedMedia; else lockedMediaMap = &lockedMediaOffline; try { if (!aOnline) { /* lock all attached hard disks early to detect "in use" * situations before deleting actual diffs */ for (MediumAttachmentList::const_iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it) { MediumAttachment *pAtt = *it; if (pAtt->i_getType() == DeviceType_HardDisk) { Medium *pMedium = pAtt->i_getMedium(); Assert(pMedium); MediumLockList *pMediumLockList(new MediumLockList()); alock.release(); rc = pMedium->i_createMediumLockList(true /* fFailIfInaccessible */, NULL /* pToLockWrite */, false /* fMediumLockWriteAll */, NULL, *pMediumLockList); alock.acquire(); if (FAILED(rc)) { delete pMediumLockList; throw rc; } rc = lockedMediaMap->Insert(pAtt, pMediumLockList); if (FAILED(rc)) throw rc; } } if (FAILED(rc)) throw rc; } // end of offline /* Lock lists are now up to date and include implicitly created media */ /* Go through remembered attachments and delete all implicitly created * diffs and fix up the attachment information */ const MediumAttachmentList &oldAtts = *mMediumAttachments.backedUpData(); MediumAttachmentList implicitAtts; for (MediumAttachmentList::const_iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it) { ComObjPtr pAtt = *it; ComObjPtr pMedium = pAtt->i_getMedium(); if (pMedium.isNull()) continue; // Implicit attachments go on the list for deletion and back references are removed. if (pAtt->i_isImplicit()) { /* Deassociate and mark for deletion */ LogFlowThisFunc(("Detaching '%s', pending deletion\n", pAtt->i_getLogName())); rc = pMedium->i_removeBackReference(mData->mUuid); if (FAILED(rc)) throw rc; implicitAtts.push_back(pAtt); continue; } /* Was this medium attached before? */ if (!i_findAttachment(oldAtts, pMedium)) { /* no: de-associate */ LogFlowThisFunc(("Detaching '%s', no deletion\n", pAtt->i_getLogName())); rc = pMedium->i_removeBackReference(mData->mUuid); if (FAILED(rc)) throw rc; continue; } LogFlowThisFunc(("Not detaching '%s'\n", pAtt->i_getLogName())); } /* If there are implicit attachments to delete, throw away the lock * map contents (which will unlock all media) since the medium * attachments will be rolled back. Below we need to completely * recreate the lock map anyway since it is infinitely complex to * do this incrementally (would need reconstructing each attachment * change, which would be extremely hairy). */ if (implicitAtts.size() != 0) { ErrorInfoKeeper eik; HRESULT rc1 = lockedMediaMap->Clear(); AssertComRC(rc1); } /* rollback hard disk changes */ mMediumAttachments.rollback(); MultiResult mrc(S_OK); // Delete unused implicit diffs. if (implicitAtts.size() != 0) { alock.release(); for (MediumAttachmentList::const_iterator it = implicitAtts.begin(); it != implicitAtts.end(); ++it) { // Remove medium associated with this attachment. ComObjPtr pAtt = *it; Assert(pAtt); LogFlowThisFunc(("Deleting '%s'\n", pAtt->i_getLogName())); ComObjPtr pMedium = pAtt->i_getMedium(); Assert(pMedium); rc = pMedium->i_deleteStorage(NULL /*aProgress*/, true /*aWait*/, false /*aNotify*/); // continue on delete failure, just collect error messages AssertMsg(SUCCEEDED(rc), ("rc=%Rhrc it=%s hd=%s\n", rc, pAtt->i_getLogName(), pMedium->i_getLocationFull().c_str() )); mrc = rc; } // Clear the list of deleted implicit attachments now, while not // holding the lock, as it will ultimately trigger Medium::uninit() // calls which assume that the media tree lock isn't held. implicitAtts.clear(); alock.acquire(); /* if there is a VM recreate media lock map as mentioned above, * otherwise it is a waste of time and we leave things unlocked */ if (aOnline) { const ComObjPtr pMachine = mData->mSession.mMachine; /* must never be NULL, but better safe than sorry */ if (!pMachine.isNull()) { alock.release(); rc = mData->mSession.mMachine->i_lockMedia(); alock.acquire(); if (FAILED(rc)) throw rc; } } } } catch (HRESULT aRC) {rc = aRC;} if (mData->mMachineState == MachineState_SettingUp) i_setMachineState(oldState); /* unlock all hard disks we locked when there is no VM */ if (!aOnline) { ErrorInfoKeeper eik; HRESULT rc1 = lockedMediaMap->Clear(); AssertComRC(rc1); } return rc; } /** * Looks through the given list of media attachments for one with the given parameters * and returns it, or NULL if not found. The list is a parameter so that backup lists * can be searched as well if needed. * * @param ll * @param aControllerName * @param aControllerPort * @param aDevice * @return */ MediumAttachment *Machine::i_findAttachment(const MediumAttachmentList &ll, const Utf8Str &aControllerName, LONG aControllerPort, LONG aDevice) { for (MediumAttachmentList::const_iterator it = ll.begin(); it != ll.end(); ++it) { MediumAttachment *pAttach = *it; if (pAttach->i_matches(aControllerName, aControllerPort, aDevice)) return pAttach; } return NULL; } /** * Looks through the given list of media attachments for one with the given parameters * and returns it, or NULL if not found. The list is a parameter so that backup lists * can be searched as well if needed. * * @param ll * @param pMedium * @return */ MediumAttachment *Machine::i_findAttachment(const MediumAttachmentList &ll, ComObjPtr pMedium) { for (MediumAttachmentList::const_iterator it = ll.begin(); it != ll.end(); ++it) { MediumAttachment *pAttach = *it; ComObjPtr pMediumThis = pAttach->i_getMedium(); if (pMediumThis == pMedium) return pAttach; } return NULL; } /** * Looks through the given list of media attachments for one with the given parameters * and returns it, or NULL if not found. The list is a parameter so that backup lists * can be searched as well if needed. * * @param ll * @param id * @return */ MediumAttachment *Machine::i_findAttachment(const MediumAttachmentList &ll, Guid &id) { for (MediumAttachmentList::const_iterator it = ll.begin(); it != ll.end(); ++it) { MediumAttachment *pAttach = *it; ComObjPtr pMediumThis = pAttach->i_getMedium(); if (pMediumThis->i_getId() == id) return pAttach; } return NULL; } /** * Main implementation for Machine::DetachDevice. This also gets called * from Machine::prepareUnregister() so it has been taken out for simplicity. * * @param pAttach Medium attachment to detach. * @param writeLock Machine write lock which the caller must have locked once. * This may be released temporarily in here. * @param pSnapshot If NULL, then the detachment is for the current machine. * Otherwise this is for a SnapshotMachine, and this must be * its snapshot. * @return */ HRESULT Machine::i_detachDevice(MediumAttachment *pAttach, AutoWriteLock &writeLock, Snapshot *pSnapshot) { ComObjPtr oldmedium = pAttach->i_getMedium(); DeviceType_T mediumType = pAttach->i_getType(); LogFlowThisFunc(("Entering, medium of attachment is %s\n", oldmedium ? oldmedium->i_getLocationFull().c_str() : "NULL")); if (pAttach->i_isImplicit()) { /* attempt to implicitly delete the implicitly created diff */ /// @todo move the implicit flag from MediumAttachment to Medium /// and forbid any hard disk operation when it is implicit. Or maybe /// a special media state for it to make it even more simple. Assert(mMediumAttachments.isBackedUp()); /* will release the lock before the potentially lengthy operation, so * protect with the special state */ MachineState_T oldState = mData->mMachineState; i_setMachineState(MachineState_SettingUp); writeLock.release(); HRESULT rc = oldmedium->i_deleteStorage(NULL /*aProgress*/, true /*aWait*/, false /*aNotify*/); writeLock.acquire(); i_setMachineState(oldState); if (FAILED(rc)) return rc; } i_setModified(IsModified_Storage); mMediumAttachments.backup(); mMediumAttachments->remove(pAttach); if (!oldmedium.isNull()) { // if this is from a snapshot, do not defer detachment to i_commitMedia() if (pSnapshot) oldmedium->i_removeBackReference(mData->mUuid, pSnapshot->i_getId()); // else if non-hard disk media, do not defer detachment to i_commitMedia() either else if (mediumType != DeviceType_HardDisk) oldmedium->i_removeBackReference(mData->mUuid); } return S_OK; } /** * Goes thru all media of the given list and * * 1) calls i_detachDevice() on each of them for this machine and * 2) adds all Medium objects found in the process to the given list, * depending on cleanupMode. * * If cleanupMode is CleanupMode_DetachAllReturnHardDisksOnly, this only * adds hard disks to the list. If it is CleanupMode_Full, this adds all * media to the list. * CleanupMode_DetachAllReturnHardDisksAndVMRemovable adds hard disk and * also removable medias if they are located in the VM folder and referenced * only by this VM (media prepared by unattended installer). * * This gets called from Machine::Unregister, both for the actual Machine and * the SnapshotMachine objects that might be found in the snapshots. * * Requires caller and locking. The machine lock must be passed in because it * will be passed on to i_detachDevice which needs it for temporary unlocking. * * @param writeLock Machine lock from top-level caller; this gets passed to * i_detachDevice. * @param pSnapshot Must be NULL when called for a "real" Machine or a snapshot * object if called for a SnapshotMachine. * @param cleanupMode If DetachAllReturnHardDisksOnly, only hard disk media get * added to llMedia; if Full, then all media get added; * otherwise no media get added. * @param llMedia Caller's list to receive Medium objects which got detached so * caller can close() them, depending on cleanupMode. * @return */ HRESULT Machine::i_detachAllMedia(AutoWriteLock &writeLock, Snapshot *pSnapshot, CleanupMode_T cleanupMode, MediaList &llMedia) { Assert(isWriteLockOnCurrentThread()); HRESULT rc; // make a temporary list because i_detachDevice invalidates iterators into // mMediumAttachments MediumAttachmentList llAttachments2 = *mMediumAttachments.data(); for (MediumAttachmentList::iterator it = llAttachments2.begin(); it != llAttachments2.end(); ++it) { ComObjPtr &pAttach = *it; ComObjPtr pMedium = pAttach->i_getMedium(); if (!pMedium.isNull()) { AutoCaller mac(pMedium); if (FAILED(mac.rc())) return mac.rc(); AutoReadLock lock(pMedium COMMA_LOCKVAL_SRC_POS); DeviceType_T devType = pMedium->i_getDeviceType(); size_t cBackRefs = pMedium->i_getMachineBackRefCount(); Utf8Str strMediumLocation = pMedium->i_getLocationFull(); strMediumLocation.stripFilename(); Utf8Str strMachineFolder = i_getSettingsFileFull(); strMachineFolder.stripFilename(); if ( ( cleanupMode == CleanupMode_DetachAllReturnHardDisksOnly && devType == DeviceType_HardDisk) || ( cleanupMode == CleanupMode_DetachAllReturnHardDisksAndVMRemovable && ( devType == DeviceType_HardDisk || ( cBackRefs <= 1 && strMediumLocation == strMachineFolder && *pMedium->i_getFirstMachineBackrefId() == i_getId()))) || (cleanupMode == CleanupMode_Full) ) { llMedia.push_back(pMedium); ComObjPtr pParent = pMedium->i_getParent(); /* Not allowed to keep this lock as below we need the parent * medium lock, and the lock order is parent to child. */ lock.release(); /* * Search for medias which are not attached to any machine, but * in the chain to an attached disk. Mediums are only consided * if they are: * - have only one child * - no references to any machines * - are of normal medium type */ while (!pParent.isNull()) { AutoCaller mac1(pParent); if (FAILED(mac1.rc())) return mac1.rc(); AutoReadLock lock1(pParent COMMA_LOCKVAL_SRC_POS); if (pParent->i_getChildren().size() == 1) { if ( pParent->i_getMachineBackRefCount() == 0 && pParent->i_getType() == MediumType_Normal && find(llMedia.begin(), llMedia.end(), pParent) == llMedia.end()) llMedia.push_back(pParent); } else break; pParent = pParent->i_getParent(); } } } // real machine: then we need to use the proper method rc = i_detachDevice(pAttach, writeLock, pSnapshot); if (FAILED(rc)) return rc; } return S_OK; } /** * Perform deferred hard disk detachments. * * Does nothing if the hard disk attachment data (mMediumAttachments) is not * changed (not backed up). * * If @a aOnline is @c true then this method will also unlock the old hard * disks for which the new implicit diffs were created and will lock these new * diffs for writing. * * @param aOnline Whether the VM was online prior to this operation. * * @note Locks this object for writing! */ void Machine::i_commitMedia(bool aOnline /*= false*/) { AutoCaller autoCaller(this); AssertComRCReturnVoid(autoCaller.rc()); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); LogFlowThisFunc(("Entering, aOnline=%d\n", aOnline)); HRESULT rc = S_OK; /* no attach/detach operations -- nothing to do */ if (!mMediumAttachments.isBackedUp()) return; MediumAttachmentList &oldAtts = *mMediumAttachments.backedUpData(); bool fMediaNeedsLocking = false; /* enumerate new attachments */ for (MediumAttachmentList::const_iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it) { MediumAttachment *pAttach = *it; pAttach->i_commit(); Medium *pMedium = pAttach->i_getMedium(); bool fImplicit = pAttach->i_isImplicit(); LogFlowThisFunc(("Examining current medium '%s' (implicit: %d)\n", (pMedium) ? pMedium->i_getName().c_str() : "NULL", fImplicit)); /** @todo convert all this Machine-based voodoo to MediumAttachment * based commit logic. */ if (fImplicit) { /* convert implicit attachment to normal */ pAttach->i_setImplicit(false); if ( aOnline && pMedium && pAttach->i_getType() == DeviceType_HardDisk ) { /* update the appropriate lock list */ MediumLockList *pMediumLockList; rc = mData->mSession.mLockedMedia.Get(pAttach, pMediumLockList); AssertComRC(rc); if (pMediumLockList) { /* unlock if there's a need to change the locking */ if (!fMediaNeedsLocking) { Assert(mData->mSession.mLockedMedia.IsLocked()); rc = mData->mSession.mLockedMedia.Unlock(); AssertComRC(rc); fMediaNeedsLocking = true; } rc = pMediumLockList->Update(pMedium->i_getParent(), false); AssertComRC(rc); rc = pMediumLockList->Append(pMedium, true); AssertComRC(rc); } } continue; } if (pMedium) { /* was this medium attached before? */ for (MediumAttachmentList::iterator oldIt = oldAtts.begin(); oldIt != oldAtts.end(); ++oldIt) { MediumAttachment *pOldAttach = *oldIt; if (pOldAttach->i_getMedium() == pMedium) { LogFlowThisFunc(("--> medium '%s' was attached before, will not remove\n", pMedium->i_getName().c_str())); /* yes: remove from old to avoid de-association */ oldAtts.erase(oldIt); break; } } } } /* enumerate remaining old attachments and de-associate from the * current machine state */ for (MediumAttachmentList::const_iterator it = oldAtts.begin(); it != oldAtts.end(); ++it) { MediumAttachment *pAttach = *it; Medium *pMedium = pAttach->i_getMedium(); /* Detach only hard disks, since DVD/floppy media is detached * instantly in MountMedium. */ if (pAttach->i_getType() == DeviceType_HardDisk && pMedium) { LogFlowThisFunc(("detaching medium '%s' from machine\n", pMedium->i_getName().c_str())); /* now de-associate from the current machine state */ rc = pMedium->i_removeBackReference(mData->mUuid); AssertComRC(rc); if (aOnline) { /* unlock since medium is not used anymore */ MediumLockList *pMediumLockList; rc = mData->mSession.mLockedMedia.Get(pAttach, pMediumLockList); if (RT_UNLIKELY(rc == VBOX_E_INVALID_OBJECT_STATE)) { /* this happens for online snapshots, there the attachment * is changing, but only to a diff image created under * the old one, so there is no separate lock list */ Assert(!pMediumLockList); } else { AssertComRC(rc); if (pMediumLockList) { rc = mData->mSession.mLockedMedia.Remove(pAttach); AssertComRC(rc); } } } } } /* take media locks again so that the locking state is consistent */ if (fMediaNeedsLocking) { Assert(aOnline); rc = mData->mSession.mLockedMedia.Lock(); AssertComRC(rc); } /* commit the hard disk changes */ mMediumAttachments.commit(); if (i_isSessionMachine()) { /* * Update the parent machine to point to the new owner. * This is necessary because the stored parent will point to the * session machine otherwise and cause crashes or errors later * when the session machine gets invalid. */ /** @todo Change the MediumAttachment class to behave like any other * class in this regard by creating peer MediumAttachment * objects for session machines and share the data with the peer * machine. */ for (MediumAttachmentList::const_iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it) (*it)->i_updateParentMachine(mPeer); /* attach new data to the primary machine and reshare it */ mPeer->mMediumAttachments.attach(mMediumAttachments); } return; } /** * Perform deferred deletion of implicitly created diffs. * * Does nothing if the hard disk attachment data (mMediumAttachments) is not * changed (not backed up). * * @note Locks this object for writing! */ void Machine::i_rollbackMedia() { AutoCaller autoCaller(this); AssertComRCReturnVoid(autoCaller.rc()); // AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); LogFlowThisFunc(("Entering rollbackMedia\n")); HRESULT rc = S_OK; /* no attach/detach operations -- nothing to do */ if (!mMediumAttachments.isBackedUp()) return; /* enumerate new attachments */ for (MediumAttachmentList::const_iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it) { MediumAttachment *pAttach = *it; /* Fix up the backrefs for DVD/floppy media. */ if (pAttach->i_getType() != DeviceType_HardDisk) { Medium *pMedium = pAttach->i_getMedium(); if (pMedium) { rc = pMedium->i_removeBackReference(mData->mUuid); AssertComRC(rc); } } (*it)->i_rollback(); pAttach = *it; /* Fix up the backrefs for DVD/floppy media. */ if (pAttach->i_getType() != DeviceType_HardDisk) { Medium *pMedium = pAttach->i_getMedium(); if (pMedium) { rc = pMedium->i_addBackReference(mData->mUuid); AssertComRC(rc); } } } /** @todo convert all this Machine-based voodoo to MediumAttachment * based rollback logic. */ i_deleteImplicitDiffs(Global::IsOnline(mData->mMachineState)); return; } /** * Returns true if the settings file is located in the directory named exactly * as the machine; this means, among other things, that the machine directory * should be auto-renamed. * * @param aSettingsDir if not NULL, the full machine settings file directory * name will be assigned there. * * @note Doesn't lock anything. * @note Not thread safe (must be called from this object's lock). */ bool Machine::i_isInOwnDir(Utf8Str *aSettingsDir /* = NULL */) const { Utf8Str strMachineDirName(mData->m_strConfigFileFull); // path/to/machinesfolder/vmname/vmname.vbox strMachineDirName.stripFilename(); // path/to/machinesfolder/vmname if (aSettingsDir) *aSettingsDir = strMachineDirName; strMachineDirName.stripPath(); // vmname Utf8Str strConfigFileOnly(mData->m_strConfigFileFull); // path/to/machinesfolder/vmname/vmname.vbox strConfigFileOnly.stripPath() // vmname.vbox .stripSuffix(); // vmname /** @todo hack, make somehow use of ComposeMachineFilename */ if (mUserData->s.fDirectoryIncludesUUID) strConfigFileOnly.appendPrintf(" (%RTuuid)", mData->mUuid.raw()); AssertReturn(!strMachineDirName.isEmpty(), false); AssertReturn(!strConfigFileOnly.isEmpty(), false); return strMachineDirName == strConfigFileOnly; } /** * Discards all changes to machine settings. * * @param aNotify Whether to notify the direct session about changes or not. * * @note Locks objects for writing! */ void Machine::i_rollback(bool aNotify) { AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), (void)0); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (!mStorageControllers.isNull()) { if (mStorageControllers.isBackedUp()) { /* unitialize all new devices (absent in the backed up list). */ StorageControllerList *backedList = mStorageControllers.backedUpData(); for (StorageControllerList::const_iterator it = mStorageControllers->begin(); it != mStorageControllers->end(); ++it) { if ( std::find(backedList->begin(), backedList->end(), *it) == backedList->end() ) { (*it)->uninit(); } } /* restore the list */ mStorageControllers.rollback(); } /* rollback any changes to devices after restoring the list */ if (mData->flModifications & IsModified_Storage) { for (StorageControllerList::const_iterator it = mStorageControllers->begin(); it != mStorageControllers->end(); ++it) { (*it)->i_rollback(); } } } if (!mUSBControllers.isNull()) { if (mUSBControllers.isBackedUp()) { /* unitialize all new devices (absent in the backed up list). */ USBControllerList *backedList = mUSBControllers.backedUpData(); for (USBControllerList::const_iterator it = mUSBControllers->begin(); it != mUSBControllers->end(); ++it) { if ( std::find(backedList->begin(), backedList->end(), *it) == backedList->end() ) { (*it)->uninit(); } } /* restore the list */ mUSBControllers.rollback(); } /* rollback any changes to devices after restoring the list */ if (mData->flModifications & IsModified_USB) { for (USBControllerList::const_iterator it = mUSBControllers->begin(); it != mUSBControllers->end(); ++it) { (*it)->i_rollback(); } } } mUserData.rollback(); mHWData.rollback(); if (mData->flModifications & IsModified_Storage) i_rollbackMedia(); if (mBIOSSettings) mBIOSSettings->i_rollback(); if (mRecordingSettings && (mData->flModifications & IsModified_Recording)) mRecordingSettings->i_rollback(); if (mTrustedPlatformModule) mTrustedPlatformModule->i_rollback(); if (mNvramStore) mNvramStore->i_rollback(); if (mGraphicsAdapter && (mData->flModifications & IsModified_GraphicsAdapter)) mGraphicsAdapter->i_rollback(); if (mVRDEServer && (mData->flModifications & IsModified_VRDEServer)) mVRDEServer->i_rollback(); if (mAudioSettings && (mData->flModifications & IsModified_AudioSettings)) mAudioSettings->i_rollback(); if (mUSBDeviceFilters && (mData->flModifications & IsModified_USB)) mUSBDeviceFilters->i_rollback(); if (mBandwidthControl && (mData->flModifications & IsModified_BandwidthControl)) mBandwidthControl->i_rollback(); if (mGuestDebugControl && (mData->flModifications & IsModified_GuestDebugControl)) mGuestDebugControl->i_rollback(); if (!mHWData.isNull()) mNetworkAdapters.resize(Global::getMaxNetworkAdapters(mHWData->mChipsetType)); NetworkAdapterVector networkAdapters(mNetworkAdapters.size()); ComPtr serialPorts[RT_ELEMENTS(mSerialPorts)]; ComPtr parallelPorts[RT_ELEMENTS(mParallelPorts)]; if (mData->flModifications & IsModified_NetworkAdapters) for (ULONG slot = 0; slot < mNetworkAdapters.size(); ++slot) if ( mNetworkAdapters[slot] && mNetworkAdapters[slot]->i_isModified()) { mNetworkAdapters[slot]->i_rollback(); networkAdapters[slot] = mNetworkAdapters[slot]; } if (mData->flModifications & IsModified_SerialPorts) for (ULONG slot = 0; slot < RT_ELEMENTS(mSerialPorts); ++slot) if ( mSerialPorts[slot] && mSerialPorts[slot]->i_isModified()) { mSerialPorts[slot]->i_rollback(); serialPorts[slot] = mSerialPorts[slot]; } if (mData->flModifications & IsModified_ParallelPorts) for (ULONG slot = 0; slot < RT_ELEMENTS(mParallelPorts); ++slot) if ( mParallelPorts[slot] && mParallelPorts[slot]->i_isModified()) { mParallelPorts[slot]->i_rollback(); parallelPorts[slot] = mParallelPorts[slot]; } if (aNotify) { /* inform the direct session about changes */ ComObjPtr that = this; uint32_t flModifications = mData->flModifications; alock.release(); if (flModifications & IsModified_SharedFolders) that->i_onSharedFolderChange(); if (flModifications & IsModified_VRDEServer) that->i_onVRDEServerChange(/* aRestart */ TRUE); if (flModifications & IsModified_USB) that->i_onUSBControllerChange(); for (ULONG slot = 0; slot < networkAdapters.size(); ++slot) if (networkAdapters[slot]) that->i_onNetworkAdapterChange(networkAdapters[slot], FALSE); for (ULONG slot = 0; slot < RT_ELEMENTS(serialPorts); ++slot) if (serialPorts[slot]) that->i_onSerialPortChange(serialPorts[slot]); for (ULONG slot = 0; slot < RT_ELEMENTS(parallelPorts); ++slot) if (parallelPorts[slot]) that->i_onParallelPortChange(parallelPorts[slot]); if (flModifications & IsModified_Storage) { for (StorageControllerList::const_iterator it = mStorageControllers->begin(); it != mStorageControllers->end(); ++it) { that->i_onStorageControllerChange(that->i_getId(), (*it)->i_getName()); } } if (flModifications & IsModified_GuestDebugControl) that->i_onGuestDebugControlChange(mGuestDebugControl); #if 0 if (flModifications & IsModified_BandwidthControl) that->onBandwidthControlChange(); #endif } } /** * Commits all the changes to machine settings. * * Note that this operation is supposed to never fail. * * @note Locks this object and children for writing. */ void Machine::i_commit() { AutoCaller autoCaller(this); AssertComRCReturnVoid(autoCaller.rc()); AutoCaller peerCaller(mPeer); AssertComRCReturnVoid(peerCaller.rc()); AutoMultiWriteLock2 alock(mPeer, this COMMA_LOCKVAL_SRC_POS); /* * use safe commit to ensure Snapshot machines (that share mUserData) * will still refer to a valid memory location */ mUserData.commitCopy(); mHWData.commit(); if (mMediumAttachments.isBackedUp()) i_commitMedia(Global::IsOnline(mData->mMachineState)); mBIOSSettings->i_commit(); mRecordingSettings->i_commit(); mTrustedPlatformModule->i_commit(); mNvramStore->i_commit(); mGraphicsAdapter->i_commit(); mVRDEServer->i_commit(); mAudioSettings->i_commit(); mUSBDeviceFilters->i_commit(); mBandwidthControl->i_commit(); mGuestDebugControl->i_commit(); /* Since mNetworkAdapters is a list which might have been changed (resized) * without using the Backupable<> template we need to handle the copying * of the list entries manually, including the creation of peers for the * new objects. */ bool commitNetworkAdapters = false; size_t newSize = Global::getMaxNetworkAdapters(mHWData->mChipsetType); if (mPeer) { /* commit everything, even the ones which will go away */ for (size_t slot = 0; slot < mNetworkAdapters.size(); slot++) mNetworkAdapters[slot]->i_commit(); /* copy over the new entries, creating a peer and uninit the original */ mPeer->mNetworkAdapters.resize(RT_MAX(newSize, mPeer->mNetworkAdapters.size())); for (size_t slot = 0; slot < newSize; slot++) { /* look if this adapter has a peer device */ ComObjPtr peer = mNetworkAdapters[slot]->i_getPeer(); if (!peer) { /* no peer means the adapter is a newly created one; * create a peer owning data this data share it with */ peer.createObject(); peer->init(mPeer, mNetworkAdapters[slot], true /* aReshare */); } mPeer->mNetworkAdapters[slot] = peer; } /* uninit any no longer needed network adapters */ for (size_t slot = newSize; slot < mNetworkAdapters.size(); ++slot) mNetworkAdapters[slot]->uninit(); for (size_t slot = newSize; slot < mPeer->mNetworkAdapters.size(); ++slot) { if (mPeer->mNetworkAdapters[slot]) mPeer->mNetworkAdapters[slot]->uninit(); } /* Keep the original network adapter count until this point, so that * discarding a chipset type change will not lose settings. */ mNetworkAdapters.resize(newSize); mPeer->mNetworkAdapters.resize(newSize); } else { /* we have no peer (our parent is the newly created machine); * just commit changes to the network adapters */ commitNetworkAdapters = true; } if (commitNetworkAdapters) for (size_t slot = 0; slot < mNetworkAdapters.size(); ++slot) mNetworkAdapters[slot]->i_commit(); for (ULONG slot = 0; slot < RT_ELEMENTS(mSerialPorts); ++slot) mSerialPorts[slot]->i_commit(); for (ULONG slot = 0; slot < RT_ELEMENTS(mParallelPorts); ++slot) mParallelPorts[slot]->i_commit(); bool commitStorageControllers = false; if (mStorageControllers.isBackedUp()) { mStorageControllers.commit(); if (mPeer) { /* Commit all changes to new controllers (this will reshare data with * peers for those who have peers) */ StorageControllerList *newList = new StorageControllerList(); for (StorageControllerList::const_iterator it = mStorageControllers->begin(); it != mStorageControllers->end(); ++it) { (*it)->i_commit(); /* look if this controller has a peer device */ ComObjPtr peer = (*it)->i_getPeer(); if (!peer) { /* no peer means the device is a newly created one; * create a peer owning data this device share it with */ peer.createObject(); peer->init(mPeer, *it, true /* aReshare */); } else { /* remove peer from the old list */ mPeer->mStorageControllers->remove(peer); } /* and add it to the new list */ newList->push_back(peer); } /* uninit old peer's controllers that are left */ for (StorageControllerList::const_iterator it = mPeer->mStorageControllers->begin(); it != mPeer->mStorageControllers->end(); ++it) { (*it)->uninit(); } /* attach new list of controllers to our peer */ mPeer->mStorageControllers.attach(newList); } else { /* we have no peer (our parent is the newly created machine); * just commit changes to devices */ commitStorageControllers = true; } } else { /* the list of controllers itself is not changed, * just commit changes to controllers themselves */ commitStorageControllers = true; } if (commitStorageControllers) { for (StorageControllerList::const_iterator it = mStorageControllers->begin(); it != mStorageControllers->end(); ++it) { (*it)->i_commit(); } } bool commitUSBControllers = false; if (mUSBControllers.isBackedUp()) { mUSBControllers.commit(); if (mPeer) { /* Commit all changes to new controllers (this will reshare data with * peers for those who have peers) */ USBControllerList *newList = new USBControllerList(); for (USBControllerList::const_iterator it = mUSBControllers->begin(); it != mUSBControllers->end(); ++it) { (*it)->i_commit(); /* look if this controller has a peer device */ ComObjPtr peer = (*it)->i_getPeer(); if (!peer) { /* no peer means the device is a newly created one; * create a peer owning data this device share it with */ peer.createObject(); peer->init(mPeer, *it, true /* aReshare */); } else { /* remove peer from the old list */ mPeer->mUSBControllers->remove(peer); } /* and add it to the new list */ newList->push_back(peer); } /* uninit old peer's controllers that are left */ for (USBControllerList::const_iterator it = mPeer->mUSBControllers->begin(); it != mPeer->mUSBControllers->end(); ++it) { (*it)->uninit(); } /* attach new list of controllers to our peer */ mPeer->mUSBControllers.attach(newList); } else { /* we have no peer (our parent is the newly created machine); * just commit changes to devices */ commitUSBControllers = true; } } else { /* the list of controllers itself is not changed, * just commit changes to controllers themselves */ commitUSBControllers = true; } if (commitUSBControllers) { for (USBControllerList::const_iterator it = mUSBControllers->begin(); it != mUSBControllers->end(); ++it) { (*it)->i_commit(); } } if (i_isSessionMachine()) { /* attach new data to the primary machine and reshare it */ mPeer->mUserData.attach(mUserData); mPeer->mHWData.attach(mHWData); /* mmMediumAttachments is reshared by fixupMedia */ // mPeer->mMediumAttachments.attach(mMediumAttachments); Assert(mPeer->mMediumAttachments.data() == mMediumAttachments.data()); } } /** * Copies all the hardware data from the given machine. * * Currently, only called when the VM is being restored from a snapshot. In * particular, this implies that the VM is not running during this method's * call. * * @note This method must be called from under this object's lock. * * @note This method doesn't call #i_commit(), so all data remains backed up and * unsaved. */ void Machine::i_copyFrom(Machine *aThat) { AssertReturnVoid(!i_isSnapshotMachine()); AssertReturnVoid(aThat->i_isSnapshotMachine()); AssertReturnVoid(!Global::IsOnline(mData->mMachineState)); mHWData.assignCopy(aThat->mHWData); // create copies of all shared folders (mHWData after attaching a copy // contains just references to original objects) for (HWData::SharedFolderList::iterator it = mHWData->mSharedFolders.begin(); it != mHWData->mSharedFolders.end(); ++it) { ComObjPtr folder; folder.createObject(); HRESULT rc = folder->initCopy(i_getMachine(), *it); AssertComRC(rc); *it = folder; } mBIOSSettings->i_copyFrom(aThat->mBIOSSettings); mRecordingSettings->i_copyFrom(aThat->mRecordingSettings); mTrustedPlatformModule->i_copyFrom(aThat->mTrustedPlatformModule); mNvramStore->i_copyFrom(aThat->mNvramStore); mGraphicsAdapter->i_copyFrom(aThat->mGraphicsAdapter); mVRDEServer->i_copyFrom(aThat->mVRDEServer); mAudioSettings->i_copyFrom(aThat->mAudioSettings); mUSBDeviceFilters->i_copyFrom(aThat->mUSBDeviceFilters); mBandwidthControl->i_copyFrom(aThat->mBandwidthControl); mGuestDebugControl->i_copyFrom(aThat->mGuestDebugControl); /* create private copies of all controllers */ mStorageControllers.backup(); mStorageControllers->clear(); for (StorageControllerList::const_iterator it = aThat->mStorageControllers->begin(); it != aThat->mStorageControllers->end(); ++it) { ComObjPtr ctrl; ctrl.createObject(); ctrl->initCopy(this, *it); mStorageControllers->push_back(ctrl); } /* create private copies of all USB controllers */ mUSBControllers.backup(); mUSBControllers->clear(); for (USBControllerList::const_iterator it = aThat->mUSBControllers->begin(); it != aThat->mUSBControllers->end(); ++it) { ComObjPtr ctrl; ctrl.createObject(); ctrl->initCopy(this, *it); mUSBControllers->push_back(ctrl); } mNetworkAdapters.resize(aThat->mNetworkAdapters.size()); for (ULONG slot = 0; slot < mNetworkAdapters.size(); ++slot) { if (mNetworkAdapters[slot].isNotNull()) mNetworkAdapters[slot]->i_copyFrom(aThat->mNetworkAdapters[slot]); else { unconst(mNetworkAdapters[slot]).createObject(); mNetworkAdapters[slot]->initCopy(this, aThat->mNetworkAdapters[slot]); } } for (ULONG slot = 0; slot < RT_ELEMENTS(mSerialPorts); ++slot) mSerialPorts[slot]->i_copyFrom(aThat->mSerialPorts[slot]); for (ULONG slot = 0; slot < RT_ELEMENTS(mParallelPorts); ++slot) mParallelPorts[slot]->i_copyFrom(aThat->mParallelPorts[slot]); } /** * Returns whether the given storage controller is hotplug capable. * * @returns true if the controller supports hotplugging * false otherwise. * @param enmCtrlType The controller type to check for. */ bool Machine::i_isControllerHotplugCapable(StorageControllerType_T enmCtrlType) { ComPtr systemProperties; HRESULT rc = mParent->COMGETTER(SystemProperties)(systemProperties.asOutParam()); if (FAILED(rc)) return false; BOOL aHotplugCapable = FALSE; systemProperties->GetStorageControllerHotplugCapable(enmCtrlType, &aHotplugCapable); return RT_BOOL(aHotplugCapable); } #ifdef VBOX_WITH_RESOURCE_USAGE_API void Machine::i_getDiskList(MediaList &list) { for (MediumAttachmentList::const_iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it) { MediumAttachment *pAttach = *it; /* just in case */ AssertContinue(pAttach); AutoCaller localAutoCallerA(pAttach); if (FAILED(localAutoCallerA.rc())) continue; AutoReadLock local_alockA(pAttach COMMA_LOCKVAL_SRC_POS); if (pAttach->i_getType() == DeviceType_HardDisk) list.push_back(pAttach->i_getMedium()); } } void Machine::i_registerMetrics(PerformanceCollector *aCollector, Machine *aMachine, RTPROCESS pid) { AssertReturnVoid(isWriteLockOnCurrentThread()); AssertPtrReturnVoid(aCollector); pm::CollectorHAL *hal = aCollector->getHAL(); /* Create sub metrics */ pm::SubMetric *cpuLoadUser = new pm::SubMetric("CPU/Load/User", "Percentage of processor time spent in user mode by the VM process."); pm::SubMetric *cpuLoadKernel = new pm::SubMetric("CPU/Load/Kernel", "Percentage of processor time spent in kernel mode by the VM process."); pm::SubMetric *ramUsageUsed = new pm::SubMetric("RAM/Usage/Used", "Size of resident portion of VM process in memory."); pm::SubMetric *diskUsageUsed = new pm::SubMetric("Disk/Usage/Used", "Actual size of all VM disks combined."); pm::SubMetric *machineNetRx = new pm::SubMetric("Net/Rate/Rx", "Network receive rate."); pm::SubMetric *machineNetTx = new pm::SubMetric("Net/Rate/Tx", "Network transmit rate."); /* Create and register base metrics */ pm::BaseMetric *cpuLoad = new pm::MachineCpuLoadRaw(hal, aMachine, pid, cpuLoadUser, cpuLoadKernel); aCollector->registerBaseMetric(cpuLoad); pm::BaseMetric *ramUsage = new pm::MachineRamUsage(hal, aMachine, pid, ramUsageUsed); aCollector->registerBaseMetric(ramUsage); MediaList disks; i_getDiskList(disks); pm::BaseMetric *diskUsage = new pm::MachineDiskUsage(hal, aMachine, disks, diskUsageUsed); aCollector->registerBaseMetric(diskUsage); aCollector->registerMetric(new pm::Metric(cpuLoad, cpuLoadUser, 0)); aCollector->registerMetric(new pm::Metric(cpuLoad, cpuLoadUser, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(cpuLoad, cpuLoadUser, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(cpuLoad, cpuLoadUser, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(cpuLoad, cpuLoadKernel, 0)); aCollector->registerMetric(new pm::Metric(cpuLoad, cpuLoadKernel, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(cpuLoad, cpuLoadKernel, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(cpuLoad, cpuLoadKernel, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(ramUsage, ramUsageUsed, 0)); aCollector->registerMetric(new pm::Metric(ramUsage, ramUsageUsed, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(ramUsage, ramUsageUsed, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(ramUsage, ramUsageUsed, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(diskUsage, diskUsageUsed, 0)); aCollector->registerMetric(new pm::Metric(diskUsage, diskUsageUsed, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(diskUsage, diskUsageUsed, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(diskUsage, diskUsageUsed, new pm::AggregateMax())); /* Guest metrics collector */ mCollectorGuest = new pm::CollectorGuest(aMachine, pid); aCollector->registerGuest(mCollectorGuest); Log7Func(("{%p}: mCollectorGuest=%p\n", this, mCollectorGuest)); /* Create sub metrics */ pm::SubMetric *guestLoadUser = new pm::SubMetric("Guest/CPU/Load/User", "Percentage of processor time spent in user mode as seen by the guest."); pm::SubMetric *guestLoadKernel = new pm::SubMetric("Guest/CPU/Load/Kernel", "Percentage of processor time spent in kernel mode as seen by the guest."); pm::SubMetric *guestLoadIdle = new pm::SubMetric("Guest/CPU/Load/Idle", "Percentage of processor time spent idling as seen by the guest."); /* The total amount of physical ram is fixed now, but we'll support dynamic guest ram configurations in the future. */ pm::SubMetric *guestMemTotal = new pm::SubMetric("Guest/RAM/Usage/Total", "Total amount of physical guest RAM."); pm::SubMetric *guestMemFree = new pm::SubMetric("Guest/RAM/Usage/Free", "Free amount of physical guest RAM."); pm::SubMetric *guestMemBalloon = new pm::SubMetric("Guest/RAM/Usage/Balloon", "Amount of ballooned physical guest RAM."); pm::SubMetric *guestMemShared = new pm::SubMetric("Guest/RAM/Usage/Shared", "Amount of shared physical guest RAM."); pm::SubMetric *guestMemCache = new pm::SubMetric( "Guest/RAM/Usage/Cache", "Total amount of guest (disk) cache memory."); pm::SubMetric *guestPagedTotal = new pm::SubMetric( "Guest/Pagefile/Usage/Total", "Total amount of space in the page file."); /* Create and register base metrics */ pm::BaseMetric *machineNetRate = new pm::MachineNetRate(mCollectorGuest, aMachine, machineNetRx, machineNetTx); aCollector->registerBaseMetric(machineNetRate); pm::BaseMetric *guestCpuLoad = new pm::GuestCpuLoad(mCollectorGuest, aMachine, guestLoadUser, guestLoadKernel, guestLoadIdle); aCollector->registerBaseMetric(guestCpuLoad); pm::BaseMetric *guestCpuMem = new pm::GuestRamUsage(mCollectorGuest, aMachine, guestMemTotal, guestMemFree, guestMemBalloon, guestMemShared, guestMemCache, guestPagedTotal); aCollector->registerBaseMetric(guestCpuMem); aCollector->registerMetric(new pm::Metric(machineNetRate, machineNetRx, 0)); aCollector->registerMetric(new pm::Metric(machineNetRate, machineNetRx, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(machineNetRate, machineNetRx, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(machineNetRate, machineNetRx, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(machineNetRate, machineNetTx, 0)); aCollector->registerMetric(new pm::Metric(machineNetRate, machineNetTx, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(machineNetRate, machineNetTx, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(machineNetRate, machineNetTx, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(guestCpuLoad, guestLoadUser, 0)); aCollector->registerMetric(new pm::Metric(guestCpuLoad, guestLoadUser, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(guestCpuLoad, guestLoadUser, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(guestCpuLoad, guestLoadUser, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(guestCpuLoad, guestLoadKernel, 0)); aCollector->registerMetric(new pm::Metric(guestCpuLoad, guestLoadKernel, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(guestCpuLoad, guestLoadKernel, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(guestCpuLoad, guestLoadKernel, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(guestCpuLoad, guestLoadIdle, 0)); aCollector->registerMetric(new pm::Metric(guestCpuLoad, guestLoadIdle, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(guestCpuLoad, guestLoadIdle, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(guestCpuLoad, guestLoadIdle, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemTotal, 0)); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemTotal, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemTotal, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemTotal, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemFree, 0)); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemFree, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemFree, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemFree, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemBalloon, 0)); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemBalloon, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemBalloon, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemBalloon, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemShared, 0)); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemShared, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemShared, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemShared, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemCache, 0)); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemCache, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemCache, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestMemCache, new pm::AggregateMax())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestPagedTotal, 0)); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestPagedTotal, new pm::AggregateAvg())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestPagedTotal, new pm::AggregateMin())); aCollector->registerMetric(new pm::Metric(guestCpuMem, guestPagedTotal, new pm::AggregateMax())); } void Machine::i_unregisterMetrics(PerformanceCollector *aCollector, Machine *aMachine) { AssertReturnVoid(isWriteLockOnCurrentThread()); if (aCollector) { aCollector->unregisterMetricsFor(aMachine); aCollector->unregisterBaseMetricsFor(aMachine); } } #endif /* VBOX_WITH_RESOURCE_USAGE_API */ //////////////////////////////////////////////////////////////////////////////// DEFINE_EMPTY_CTOR_DTOR(SessionMachine) HRESULT SessionMachine::FinalConstruct() { LogFlowThisFunc(("\n")); mClientToken = NULL; return BaseFinalConstruct(); } void SessionMachine::FinalRelease() { LogFlowThisFunc(("\n")); Assert(!mClientToken); /* paranoia, should not hang around any more */ if (mClientToken) { delete mClientToken; mClientToken = NULL; } uninit(Uninit::Unexpected); BaseFinalRelease(); } /** * @note Must be called only by Machine::LockMachine() from its own write lock. */ HRESULT SessionMachine::init(Machine *aMachine) { LogFlowThisFuncEnter(); LogFlowThisFunc(("mName={%s}\n", aMachine->mUserData->s.strName.c_str())); AssertReturn(aMachine, E_INVALIDARG); AssertReturn(aMachine->lockHandle()->isWriteLockOnCurrentThread(), E_FAIL); /* Enclose the state transition NotReady->InInit->Ready */ AutoInitSpan autoInitSpan(this); AssertReturn(autoInitSpan.isOk(), E_FAIL); HRESULT rc = S_OK; RT_ZERO(mAuthLibCtx); /* create the machine client token */ try { mClientToken = new ClientToken(aMachine, this); if (!mClientToken->isReady()) { delete mClientToken; mClientToken = NULL; rc = E_FAIL; } } catch (std::bad_alloc &) { rc = E_OUTOFMEMORY; } if (FAILED(rc)) return rc; /* memorize the peer Machine */ unconst(mPeer) = aMachine; /* share the parent pointer */ unconst(mParent) = aMachine->mParent; /* take the pointers to data to share */ mData.share(aMachine->mData); mSSData.share(aMachine->mSSData); mUserData.share(aMachine->mUserData); mHWData.share(aMachine->mHWData); mMediumAttachments.share(aMachine->mMediumAttachments); mStorageControllers.allocate(); for (StorageControllerList::const_iterator it = aMachine->mStorageControllers->begin(); it != aMachine->mStorageControllers->end(); ++it) { ComObjPtr ctl; ctl.createObject(); ctl->init(this, *it); mStorageControllers->push_back(ctl); } mUSBControllers.allocate(); for (USBControllerList::const_iterator it = aMachine->mUSBControllers->begin(); it != aMachine->mUSBControllers->end(); ++it) { ComObjPtr ctl; ctl.createObject(); ctl->init(this, *it); mUSBControllers->push_back(ctl); } unconst(mBIOSSettings).createObject(); mBIOSSettings->init(this, aMachine->mBIOSSettings); unconst(mRecordingSettings).createObject(); mRecordingSettings->init(this, aMachine->mRecordingSettings); unconst(mTrustedPlatformModule).createObject(); mTrustedPlatformModule->init(this, aMachine->mTrustedPlatformModule); unconst(mNvramStore).createObject(); mNvramStore->init(this, aMachine->mNvramStore); /* create another GraphicsAdapter object that will be mutable */ unconst(mGraphicsAdapter).createObject(); mGraphicsAdapter->init(this, aMachine->mGraphicsAdapter); /* create another VRDEServer object that will be mutable */ unconst(mVRDEServer).createObject(); mVRDEServer->init(this, aMachine->mVRDEServer); /* create another audio settings object that will be mutable */ unconst(mAudioSettings).createObject(); mAudioSettings->init(this, aMachine->mAudioSettings); /* create a list of serial ports that will be mutable */ for (ULONG slot = 0; slot < RT_ELEMENTS(mSerialPorts); ++slot) { unconst(mSerialPorts[slot]).createObject(); mSerialPorts[slot]->init(this, aMachine->mSerialPorts[slot]); } /* create a list of parallel ports that will be mutable */ for (ULONG slot = 0; slot < RT_ELEMENTS(mParallelPorts); ++slot) { unconst(mParallelPorts[slot]).createObject(); mParallelPorts[slot]->init(this, aMachine->mParallelPorts[slot]); } /* create another USB device filters object that will be mutable */ unconst(mUSBDeviceFilters).createObject(); mUSBDeviceFilters->init(this, aMachine->mUSBDeviceFilters); /* create a list of network adapters that will be mutable */ mNetworkAdapters.resize(aMachine->mNetworkAdapters.size()); for (ULONG slot = 0; slot < mNetworkAdapters.size(); ++slot) { unconst(mNetworkAdapters[slot]).createObject(); mNetworkAdapters[slot]->init(this, aMachine->mNetworkAdapters[slot]); } /* create another bandwidth control object that will be mutable */ unconst(mBandwidthControl).createObject(); mBandwidthControl->init(this, aMachine->mBandwidthControl); unconst(mGuestDebugControl).createObject(); mGuestDebugControl->init(this, aMachine->mGuestDebugControl); /* default is to delete saved state on Saved -> PoweredOff transition */ mRemoveSavedState = true; /* Confirm a successful initialization when it's the case */ autoInitSpan.setSucceeded(); miNATNetworksStarted = 0; LogFlowThisFuncLeave(); return rc; } /** * Uninitializes this session object. If the reason is other than * Uninit::Unexpected, then this method MUST be called from #i_checkForDeath() * or the client watcher code. * * @param aReason uninitialization reason * * @note Locks mParent + this object for writing. */ void SessionMachine::uninit(Uninit::Reason aReason) { LogFlowThisFuncEnter(); LogFlowThisFunc(("reason=%d\n", aReason)); /* * Strongly reference ourselves to prevent this object deletion after * mData->mSession.mMachine.setNull() below (which can release the last * reference and call the destructor). Important: this must be done before * accessing any members (and before AutoUninitSpan that does it as well). * This self reference will be released as the very last step on return. */ ComObjPtr selfRef; if (aReason != Uninit::Unexpected) selfRef = this; /* Enclose the state transition Ready->InUninit->NotReady */ AutoUninitSpan autoUninitSpan(this); if (autoUninitSpan.uninitDone()) { LogFlowThisFunc(("Already uninitialized\n")); LogFlowThisFuncLeave(); return; } if (autoUninitSpan.initFailed()) { /* We've been called by init() because it's failed. It's not really * necessary (nor it's safe) to perform the regular uninit sequence * below, the following is enough. */ LogFlowThisFunc(("Initialization failed.\n")); /* destroy the machine client token */ if (mClientToken) { delete mClientToken; mClientToken = NULL; } uninitDataAndChildObjects(); mData.free(); unconst(mParent) = NULL; unconst(mPeer) = NULL; LogFlowThisFuncLeave(); return; } MachineState_T lastState; { AutoReadLock tempLock(this COMMA_LOCKVAL_SRC_POS); lastState = mData->mMachineState; } NOREF(lastState); #ifdef VBOX_WITH_USB // release all captured USB devices, but do this before requesting the locks below if (aReason == Uninit::Abnormal && Global::IsOnline(lastState)) { /* Console::captureUSBDevices() is called in the VM process only after * setting the machine state to Starting or Restoring. * Console::detachAllUSBDevices() will be called upon successful * termination. So, we need to release USB devices only if there was * an abnormal termination of a running VM. * * This is identical to SessionMachine::DetachAllUSBDevices except * for the aAbnormal argument. */ HRESULT rc = mUSBDeviceFilters->i_notifyProxy(false /* aInsertFilters */); AssertComRC(rc); NOREF(rc); USBProxyService *service = mParent->i_host()->i_usbProxyService(); if (service) service->detachAllDevicesFromVM(this, true /* aDone */, true /* aAbnormal */); } #endif /* VBOX_WITH_USB */ // we need to lock this object in uninit() because the lock is shared // with mPeer (as well as data we modify below). mParent lock is needed // by several calls to it. AutoMultiWriteLock2 multilock(mParent, this COMMA_LOCKVAL_SRC_POS); #ifdef VBOX_WITH_RESOURCE_USAGE_API /* * It is safe to call Machine::i_unregisterMetrics() here because * PerformanceCollector::samplerCallback no longer accesses guest methods * holding the lock. */ i_unregisterMetrics(mParent->i_performanceCollector(), mPeer); /* The guest must be unregistered after its metrics (@bugref{5949}). */ Log7Func(("{%p}: mCollectorGuest=%p\n", this, mCollectorGuest)); if (mCollectorGuest) { mParent->i_performanceCollector()->unregisterGuest(mCollectorGuest); // delete mCollectorGuest; => CollectorGuestManager::destroyUnregistered() mCollectorGuest = NULL; } #endif if (aReason == Uninit::Abnormal) { Log1WarningThisFunc(("ABNORMAL client termination! (wasBusy=%d)\n", Global::IsOnlineOrTransient(lastState))); /* * Move the VM to the 'Aborted' machine state unless we are restoring a * VM that was in the 'Saved' machine state. In that case, if the VM * fails before reaching either the 'Restoring' machine state or the * 'Running' machine state then we set the machine state to * 'AbortedSaved' in order to preserve the saved state file so that the * VM can be restored in the future. */ if (mData->mMachineState == MachineState_Saved || mData->mMachineState == MachineState_Restoring) i_setMachineState(MachineState_AbortedSaved); else if (mData->mMachineState != MachineState_Aborted && mData->mMachineState != MachineState_AbortedSaved) i_setMachineState(MachineState_Aborted); } // any machine settings modified? if (mData->flModifications) { Log1WarningThisFunc(("Discarding unsaved settings changes!\n")); i_rollback(false /* aNotify */); } mData->mSession.mPID = NIL_RTPROCESS; if (aReason == Uninit::Unexpected) { /* Uninitialization didn't come from #i_checkForDeath(), so tell the * client watcher thread to update the set of machines that have open * sessions. */ mParent->i_updateClientWatcher(); } /* uninitialize all remote controls */ if (mData->mSession.mRemoteControls.size()) { LogFlowThisFunc(("Closing remote sessions (%d):\n", mData->mSession.mRemoteControls.size())); /* Always restart a the beginning, since the iterator is invalidated * by using erase(). */ for (Data::Session::RemoteControlList::iterator it = mData->mSession.mRemoteControls.begin(); it != mData->mSession.mRemoteControls.end(); it = mData->mSession.mRemoteControls.begin()) { ComPtr pControl = *it; mData->mSession.mRemoteControls.erase(it); multilock.release(); LogFlowThisFunc((" Calling remoteControl->Uninitialize()...\n")); HRESULT rc = pControl->Uninitialize(); LogFlowThisFunc((" remoteControl->Uninitialize() returned %08X\n", rc)); if (FAILED(rc)) Log1WarningThisFunc(("Forgot to close the remote session?\n")); multilock.acquire(); } mData->mSession.mRemoteControls.clear(); } /* Remove all references to the NAT network service. The service will stop * if all references (also from other VMs) are removed. */ for (; miNATNetworksStarted > 0; miNATNetworksStarted--) { for (ULONG slot = 0; slot < mNetworkAdapters.size(); ++slot) { BOOL enabled; HRESULT hrc = mNetworkAdapters[slot]->COMGETTER(Enabled)(&enabled); if ( FAILED(hrc) || !enabled) continue; NetworkAttachmentType_T type; hrc = mNetworkAdapters[slot]->COMGETTER(AttachmentType)(&type); if ( SUCCEEDED(hrc) && type == NetworkAttachmentType_NATNetwork) { Bstr name; hrc = mNetworkAdapters[slot]->COMGETTER(NATNetwork)(name.asOutParam()); if (SUCCEEDED(hrc)) { multilock.release(); Utf8Str strName(name); LogRel(("VM '%s' stops using NAT network '%s'\n", mUserData->s.strName.c_str(), strName.c_str())); mParent->i_natNetworkRefDec(strName); multilock.acquire(); } } } } /* * An expected uninitialization can come only from #i_checkForDeath(). * Otherwise it means that something's gone really wrong (for example, * the Session implementation has released the VirtualBox reference * before it triggered #OnSessionEnd(), or before releasing IPC semaphore, * etc). However, it's also possible, that the client releases the IPC * semaphore correctly (i.e. before it releases the VirtualBox reference), * but the VirtualBox release event comes first to the server process. * This case is practically possible, so we should not assert on an * unexpected uninit, just log a warning. */ if (aReason == Uninit::Unexpected) Log1WarningThisFunc(("Unexpected SessionMachine uninitialization!\n")); if (aReason != Uninit::Normal) { mData->mSession.mDirectControl.setNull(); } else { /* this must be null here (see #OnSessionEnd()) */ Assert(mData->mSession.mDirectControl.isNull()); Assert(mData->mSession.mState == SessionState_Unlocking); Assert(!mData->mSession.mProgress.isNull()); } if (mData->mSession.mProgress) { if (aReason == Uninit::Normal) mData->mSession.mProgress->i_notifyComplete(S_OK); else mData->mSession.mProgress->i_notifyComplete(E_FAIL, COM_IIDOF(ISession), getComponentName(), tr("The VM session was aborted")); mData->mSession.mProgress.setNull(); } if (mConsoleTaskData.mProgress) { Assert(aReason == Uninit::Abnormal); mConsoleTaskData.mProgress->i_notifyComplete(E_FAIL, COM_IIDOF(ISession), getComponentName(), tr("The VM session was aborted")); mConsoleTaskData.mProgress.setNull(); } /* remove the association between the peer machine and this session machine */ Assert( (SessionMachine*)mData->mSession.mMachine == this || aReason == Uninit::Unexpected); /* reset the rest of session data */ mData->mSession.mLockType = LockType_Null; mData->mSession.mMachine.setNull(); mData->mSession.mState = SessionState_Unlocked; mData->mSession.mName.setNull(); /* destroy the machine client token before leaving the exclusive lock */ if (mClientToken) { delete mClientToken; mClientToken = NULL; } /* fire an event */ mParent->i_onSessionStateChanged(mData->mUuid, SessionState_Unlocked); uninitDataAndChildObjects(); /* free the essential data structure last */ mData.free(); /* release the exclusive lock before setting the below two to NULL */ multilock.release(); unconst(mParent) = NULL; unconst(mPeer) = NULL; AuthLibUnload(&mAuthLibCtx); LogFlowThisFuncLeave(); } // util::Lockable interface //////////////////////////////////////////////////////////////////////////////// /** * Overrides VirtualBoxBase::lockHandle() in order to share the lock handle * with the primary Machine instance (mPeer). */ RWLockHandle *SessionMachine::lockHandle() const { AssertReturn(mPeer != NULL, NULL); return mPeer->lockHandle(); } // IInternalMachineControl methods //////////////////////////////////////////////////////////////////////////////// /** * Passes collected guest statistics to performance collector object */ HRESULT SessionMachine::reportVmStatistics(ULONG aValidStats, ULONG aCpuUser, ULONG aCpuKernel, ULONG aCpuIdle, ULONG aMemTotal, ULONG aMemFree, ULONG aMemBalloon, ULONG aMemShared, ULONG aMemCache, ULONG aPageTotal, ULONG aAllocVMM, ULONG aFreeVMM, ULONG aBalloonedVMM, ULONG aSharedVMM, ULONG aVmNetRx, ULONG aVmNetTx) { #ifdef VBOX_WITH_RESOURCE_USAGE_API if (mCollectorGuest) mCollectorGuest->updateStats(aValidStats, aCpuUser, aCpuKernel, aCpuIdle, aMemTotal, aMemFree, aMemBalloon, aMemShared, aMemCache, aPageTotal, aAllocVMM, aFreeVMM, aBalloonedVMM, aSharedVMM, aVmNetRx, aVmNetTx); return S_OK; #else NOREF(aValidStats); NOREF(aCpuUser); NOREF(aCpuKernel); NOREF(aCpuIdle); NOREF(aMemTotal); NOREF(aMemFree); NOREF(aMemBalloon); NOREF(aMemShared); NOREF(aMemCache); NOREF(aPageTotal); NOREF(aAllocVMM); NOREF(aFreeVMM); NOREF(aBalloonedVMM); NOREF(aSharedVMM); NOREF(aVmNetRx); NOREF(aVmNetTx); return E_NOTIMPL; #endif } //////////////////////////////////////////////////////////////////////////////// // // SessionMachine task records // //////////////////////////////////////////////////////////////////////////////// /** * Task record for saving the machine state. */ class SessionMachine::SaveStateTask : public Machine::Task { public: SaveStateTask(SessionMachine *m, Progress *p, const Utf8Str &t, Reason_T enmReason, const Utf8Str &strStateFilePath) : Task(m, p, t), m_enmReason(enmReason), m_strStateFilePath(strStateFilePath) {} private: void handler() { ((SessionMachine *)(Machine *)m_pMachine)->i_saveStateHandler(*this); } Reason_T m_enmReason; Utf8Str m_strStateFilePath; friend class SessionMachine; }; /** * Task thread implementation for SessionMachine::SaveState(), called from * SessionMachine::taskHandler(). * * @note Locks this object for writing. * * @param task * @return */ void SessionMachine::i_saveStateHandler(SaveStateTask &task) { LogFlowThisFuncEnter(); AutoCaller autoCaller(this); LogFlowThisFunc(("state=%d\n", getObjectState().getState())); if (FAILED(autoCaller.rc())) { /* we might have been uninitialized because the session was accidentally * closed by the client, so don't assert */ HRESULT rc = setError(E_FAIL, tr("The session has been accidentally closed")); task.m_pProgress->i_notifyComplete(rc); LogFlowThisFuncLeave(); return; } AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = S_OK; try { ComPtr directControl; if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; if (directControl.isNull()) throw setError(VBOX_E_INVALID_VM_STATE, tr("Trying to save state without a running VM")); alock.release(); BOOL fSuspendedBySave; rc = directControl->SaveStateWithReason(task.m_enmReason, task.m_pProgress, NULL, Bstr(task.m_strStateFilePath).raw(), task.m_machineStateBackup != MachineState_Paused, &fSuspendedBySave); Assert(!fSuspendedBySave); alock.acquire(); AssertStmt( (SUCCEEDED(rc) && mData->mMachineState == MachineState_Saved) || (FAILED(rc) && mData->mMachineState == MachineState_Saving), throw E_FAIL); if (SUCCEEDED(rc)) { mSSData->strStateFilePath = task.m_strStateFilePath; /* save all VM settings */ rc = i_saveSettings(NULL, alock); // no need to check whether VirtualBox.xml needs saving also since // we can't have a name change pending at this point } else { // On failure, set the state to the state we had at the beginning. i_setMachineState(task.m_machineStateBackup); i_updateMachineStateOnClient(); // Delete the saved state file (might have been already created). // No need to check whether this is shared with a snapshot here // because we certainly created a fresh saved state file here. i_deleteFile(task.m_strStateFilePath, true /* fIgnoreFailures */); } } catch (HRESULT aRC) { rc = aRC; } task.m_pProgress->i_notifyComplete(rc); LogFlowThisFuncLeave(); } /** * @note Locks this object for writing. */ HRESULT SessionMachine::saveState(ComPtr &aProgress) { return i_saveStateWithReason(Reason_Unspecified, aProgress); } HRESULT SessionMachine::i_saveStateWithReason(Reason_T aReason, ComPtr &aProgress) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrRunningStateDep); if (FAILED(rc)) return rc; if ( mData->mMachineState != MachineState_Running && mData->mMachineState != MachineState_Paused ) return setError(VBOX_E_INVALID_VM_STATE, tr("Cannot save the execution state as the machine is not running or paused (machine state: %s)"), Global::stringifyMachineState(mData->mMachineState)); ComObjPtr pProgress; pProgress.createObject(); rc = pProgress->init(i_getVirtualBox(), static_cast(this) /* aInitiator */, tr("Saving the execution state of the virtual machine"), FALSE /* aCancelable */); if (FAILED(rc)) return rc; Utf8Str strStateFilePath; i_composeSavedStateFilename(strStateFilePath); /* create and start the task on a separate thread (note that it will not * start working until we release alock) */ SaveStateTask *pTask = new SaveStateTask(this, pProgress, "SaveState", aReason, strStateFilePath); rc = pTask->createThread(); if (FAILED(rc)) return rc; /* set the state to Saving (expected by Session::SaveStateWithReason()) */ i_setMachineState(MachineState_Saving); i_updateMachineStateOnClient(); pProgress.queryInterfaceTo(aProgress.asOutParam()); return S_OK; } /** * @note Locks this object for writing. */ HRESULT SessionMachine::adoptSavedState(const com::Utf8Str &aSavedStateFile) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableStateDep); if (FAILED(rc)) return rc; if ( mData->mMachineState != MachineState_PoweredOff && mData->mMachineState != MachineState_Teleported && mData->mMachineState != MachineState_Aborted ) return setError(VBOX_E_INVALID_VM_STATE, tr("Cannot adopt the saved machine state as the machine is not in Powered Off, Teleported or Aborted state (machine state: %s)"), Global::stringifyMachineState(mData->mMachineState)); com::Utf8Str stateFilePathFull; int vrc = i_calculateFullPath(aSavedStateFile, stateFilePathFull); if (RT_FAILURE(vrc)) return setErrorBoth(VBOX_E_FILE_ERROR, vrc, tr("Invalid saved state file path '%s' (%Rrc)"), aSavedStateFile.c_str(), vrc); mSSData->strStateFilePath = stateFilePathFull; /* The below i_setMachineState() will detect the state transition and will * update the settings file */ return i_setMachineState(MachineState_Saved); } /** * @note Locks this object for writing. */ HRESULT SessionMachine::discardSavedState(BOOL aFRemoveFile) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = i_checkStateDependency(MutableOrSavedStateDep); if (FAILED(rc)) return rc; if ( mData->mMachineState != MachineState_Saved && mData->mMachineState != MachineState_AbortedSaved) return setError(VBOX_E_INVALID_VM_STATE, tr("Cannot discard the saved state as the machine is not in the Saved or Aborted-Saved state (machine state: %s)"), Global::stringifyMachineState(mData->mMachineState)); mRemoveSavedState = RT_BOOL(aFRemoveFile); /* * Saved -> PoweredOff transition will be detected in the SessionMachine * and properly handled. */ rc = i_setMachineState(MachineState_PoweredOff); return rc; } /** * @note Locks the same as #i_setMachineState() does. */ HRESULT SessionMachine::updateState(MachineState_T aState) { return i_setMachineState(aState); } /** * @note Locks this object for writing. */ HRESULT SessionMachine::beginPowerUp(const ComPtr &aProgress) { IProgress *pProgress(aProgress); LogFlowThisFunc(("aProgress=%p\n", pProgress)); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mState != SessionState_Locked) return VBOX_E_INVALID_OBJECT_STATE; if (!mData->mSession.mProgress.isNull()) mData->mSession.mProgress->setOtherProgressObject(pProgress); /* If we didn't reference the NAT network service yet, add a reference to * force a start */ if (miNATNetworksStarted < 1) { for (ULONG slot = 0; slot < mNetworkAdapters.size(); ++slot) { BOOL enabled; HRESULT hrc = mNetworkAdapters[slot]->COMGETTER(Enabled)(&enabled); if ( FAILED(hrc) || !enabled) continue; NetworkAttachmentType_T type; hrc = mNetworkAdapters[slot]->COMGETTER(AttachmentType)(&type); if ( SUCCEEDED(hrc) && type == NetworkAttachmentType_NATNetwork) { Bstr name; hrc = mNetworkAdapters[slot]->COMGETTER(NATNetwork)(name.asOutParam()); if (SUCCEEDED(hrc)) { Utf8Str strName(name); LogRel(("VM '%s' starts using NAT network '%s'\n", mUserData->s.strName.c_str(), strName.c_str())); mPeer->lockHandle()->unlockWrite(); mParent->i_natNetworkRefInc(strName); #ifdef RT_LOCK_STRICT mPeer->lockHandle()->lockWrite(RT_SRC_POS); #else mPeer->lockHandle()->lockWrite(); #endif } } } miNATNetworksStarted++; } LogFlowThisFunc(("returns S_OK.\n")); return S_OK; } /** * @note Locks this object for writing. */ HRESULT SessionMachine::endPowerUp(LONG aResult) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mState != SessionState_Locked) return VBOX_E_INVALID_OBJECT_STATE; /* Finalize the LaunchVMProcess progress object. */ if (mData->mSession.mProgress) { mData->mSession.mProgress->notifyComplete((HRESULT)aResult); mData->mSession.mProgress.setNull(); } if (SUCCEEDED((HRESULT)aResult)) { #ifdef VBOX_WITH_RESOURCE_USAGE_API /* The VM has been powered up successfully, so it makes sense * now to offer the performance metrics for a running machine * object. Doing it earlier wouldn't be safe. */ i_registerMetrics(mParent->i_performanceCollector(), mPeer, mData->mSession.mPID); #endif /* VBOX_WITH_RESOURCE_USAGE_API */ } return S_OK; } /** * @note Locks this object for writing. */ HRESULT SessionMachine::beginPoweringDown(ComPtr &aProgress) { LogFlowThisFuncEnter(); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); AssertReturn(mConsoleTaskData.mLastState == MachineState_Null, E_FAIL); /* create a progress object to track operation completion */ ComObjPtr pProgress; pProgress.createObject(); pProgress->init(i_getVirtualBox(), static_cast(this) /* aInitiator */, tr("Stopping the virtual machine"), FALSE /* aCancelable */); /* fill in the console task data */ mConsoleTaskData.mLastState = mData->mMachineState; mConsoleTaskData.mProgress = pProgress; /* set the state to Stopping (this is expected by Console::PowerDown()) */ i_setMachineState(MachineState_Stopping); pProgress.queryInterfaceTo(aProgress.asOutParam()); return S_OK; } /** * @note Locks this object for writing. */ HRESULT SessionMachine::endPoweringDown(LONG aResult, const com::Utf8Str &aErrMsg) { HRESULT const hrcResult = (HRESULT)aResult; LogFlowThisFuncEnter(); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); AssertReturn( ( (SUCCEEDED(hrcResult) && mData->mMachineState == MachineState_PoweredOff) || (FAILED(hrcResult) && mData->mMachineState == MachineState_Stopping)) && mConsoleTaskData.mLastState != MachineState_Null, E_FAIL); /* * On failure, set the state to the state we had when BeginPoweringDown() * was called (this is expected by Console::PowerDown() and the associated * task). On success the VM process already changed the state to * MachineState_PoweredOff, so no need to do anything. */ if (FAILED(hrcResult)) i_setMachineState(mConsoleTaskData.mLastState); /* notify the progress object about operation completion */ Assert(mConsoleTaskData.mProgress); if (SUCCEEDED(hrcResult)) mConsoleTaskData.mProgress->i_notifyComplete(S_OK); else { if (aErrMsg.length()) mConsoleTaskData.mProgress->i_notifyComplete(hrcResult, COM_IIDOF(ISession), getComponentName(), aErrMsg.c_str()); else mConsoleTaskData.mProgress->i_notifyComplete(hrcResult); } /* clear out the temporary saved state data */ mConsoleTaskData.mLastState = MachineState_Null; mConsoleTaskData.mProgress.setNull(); LogFlowThisFuncLeave(); return S_OK; } /** * Goes through the USB filters of the given machine to see if the given * device matches any filter or not. * * @note Locks the same as USBController::hasMatchingFilter() does. */ HRESULT SessionMachine::runUSBDeviceFilters(const ComPtr &aDevice, BOOL *aMatched, ULONG *aMaskedInterfaces) { LogFlowThisFunc(("\n")); #ifdef VBOX_WITH_USB *aMatched = mUSBDeviceFilters->i_hasMatchingFilter(aDevice, aMaskedInterfaces); #else NOREF(aDevice); NOREF(aMaskedInterfaces); *aMatched = FALSE; #endif return S_OK; } /** * @note Locks the same as Host::captureUSBDevice() does. */ HRESULT SessionMachine::captureUSBDevice(const com::Guid &aId, const com::Utf8Str &aCaptureFilename) { LogFlowThisFunc(("\n")); #ifdef VBOX_WITH_USB /* if captureDeviceForVM() fails, it must have set extended error info */ clearError(); MultiResult rc = mParent->i_host()->i_checkUSBProxyService(); if (FAILED(rc) || SUCCEEDED_WARNING(rc)) return rc; USBProxyService *service = mParent->i_host()->i_usbProxyService(); AssertReturn(service, E_FAIL); return service->captureDeviceForVM(this, aId.ref(), aCaptureFilename); #else RT_NOREF(aId, aCaptureFilename); return E_NOTIMPL; #endif } /** * @note Locks the same as Host::detachUSBDevice() does. */ HRESULT SessionMachine::detachUSBDevice(const com::Guid &aId, BOOL aDone) { LogFlowThisFunc(("\n")); #ifdef VBOX_WITH_USB USBProxyService *service = mParent->i_host()->i_usbProxyService(); AssertReturn(service, E_FAIL); return service->detachDeviceFromVM(this, aId.ref(), !!aDone); #else NOREF(aId); NOREF(aDone); return E_NOTIMPL; #endif } /** * Inserts all machine filters to the USB proxy service and then calls * Host::autoCaptureUSBDevices(). * * Called by Console from the VM process upon VM startup. * * @note Locks what called methods lock. */ HRESULT SessionMachine::autoCaptureUSBDevices() { LogFlowThisFunc(("\n")); #ifdef VBOX_WITH_USB HRESULT rc = mUSBDeviceFilters->i_notifyProxy(true /* aInsertFilters */); AssertComRC(rc); NOREF(rc); USBProxyService *service = mParent->i_host()->i_usbProxyService(); AssertReturn(service, E_FAIL); return service->autoCaptureDevicesForVM(this); #else return S_OK; #endif } /** * Removes all machine filters from the USB proxy service and then calls * Host::detachAllUSBDevices(). * * Called by Console from the VM process upon normal VM termination or by * SessionMachine::uninit() upon abnormal VM termination (from under the * Machine/SessionMachine lock). * * @note Locks what called methods lock. */ HRESULT SessionMachine::detachAllUSBDevices(BOOL aDone) { LogFlowThisFunc(("\n")); #ifdef VBOX_WITH_USB HRESULT rc = mUSBDeviceFilters->i_notifyProxy(false /* aInsertFilters */); AssertComRC(rc); NOREF(rc); USBProxyService *service = mParent->i_host()->i_usbProxyService(); AssertReturn(service, E_FAIL); return service->detachAllDevicesFromVM(this, !!aDone, false /* aAbnormal */); #else NOREF(aDone); return S_OK; #endif } /** * @note Locks this object for writing. */ HRESULT SessionMachine::onSessionEnd(const ComPtr &aSession, ComPtr &aProgress) { LogFlowThisFuncEnter(); LogFlowThisFunc(("callerstate=%d\n", getObjectState().getState())); /* * We don't assert below because it might happen that a non-direct session * informs us it is closed right after we've been uninitialized -- it's ok. */ /* get IInternalSessionControl interface */ ComPtr control(aSession); ComAssertRet(!control.isNull(), E_INVALIDARG); /* Creating a Progress object requires the VirtualBox lock, and * thus locking it here is required by the lock order rules. */ AutoMultiWriteLock2 alock(mParent, this COMMA_LOCKVAL_SRC_POS); if (control == mData->mSession.mDirectControl) { /* The direct session is being normally closed by the client process * ----------------------------------------------------------------- */ /* go to the closing state (essential for all open*Session() calls and * for #i_checkForDeath()) */ Assert(mData->mSession.mState == SessionState_Locked); mData->mSession.mState = SessionState_Unlocking; /* set direct control to NULL to release the remote instance */ mData->mSession.mDirectControl.setNull(); LogFlowThisFunc(("Direct control is set to NULL\n")); if (mData->mSession.mProgress) { /* finalize the progress, someone might wait if a frontend * closes the session before powering on the VM. */ mData->mSession.mProgress->notifyComplete(E_FAIL, COM_IIDOF(ISession), getComponentName(), tr("The VM session was closed before any attempt to power it on")); mData->mSession.mProgress.setNull(); } /* Create the progress object the client will use to wait until * #i_checkForDeath() is called to uninitialize this session object after * it releases the IPC semaphore. * Note! Because we're "reusing" mProgress here, this must be a proxy * object just like for LaunchVMProcess. */ Assert(mData->mSession.mProgress.isNull()); ComObjPtr progress; progress.createObject(); ComPtr pPeer(mPeer); progress->init(mParent, pPeer, Bstr(tr("Closing session")).raw(), FALSE /* aCancelable */); progress.queryInterfaceTo(aProgress.asOutParam()); mData->mSession.mProgress = progress; } else { /* the remote session is being normally closed */ bool found = false; for (Data::Session::RemoteControlList::iterator it = mData->mSession.mRemoteControls.begin(); it != mData->mSession.mRemoteControls.end(); ++it) { if (control == *it) { found = true; // This MUST be erase(it), not remove(*it) as the latter // triggers a very nasty use after free due to the place where // the value "lives". mData->mSession.mRemoteControls.erase(it); break; } } ComAssertMsgRet(found, (tr("The session is not found in the session list!")), E_INVALIDARG); } /* signal the client watcher thread, because the client is going away */ mParent->i_updateClientWatcher(); LogFlowThisFuncLeave(); return S_OK; } HRESULT SessionMachine::pullGuestProperties(std::vector &aNames, std::vector &aValues, std::vector &aTimestamps, std::vector &aFlags) { LogFlowThisFunc(("\n")); #ifdef VBOX_WITH_GUEST_PROPS AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); size_t cEntries = mHWData->mGuestProperties.size(); aNames.resize(cEntries); aValues.resize(cEntries); aTimestamps.resize(cEntries); aFlags.resize(cEntries); size_t i = 0; for (HWData::GuestPropertyMap::const_iterator it = mHWData->mGuestProperties.begin(); it != mHWData->mGuestProperties.end(); ++it, ++i) { aNames[i] = it->first; int vrc = GuestPropValidateName(aNames[i].c_str(), aNames[i].length() + 1 /* '\0' */); AssertRCReturn(vrc, setErrorBoth(E_INVALIDARG /* bad choice */, vrc)); aValues[i] = it->second.strValue; vrc = GuestPropValidateValue(aValues[i].c_str(), aValues[i].length() + 1 /* '\0' */); AssertRCReturn(vrc, setErrorBoth(E_INVALIDARG /* bad choice */, vrc)); aTimestamps[i] = it->second.mTimestamp; /* If it is NULL, keep it NULL. */ if (it->second.mFlags) { char szFlags[GUEST_PROP_MAX_FLAGS_LEN + 1]; GuestPropWriteFlags(it->second.mFlags, szFlags); aFlags[i] = szFlags; } else aFlags[i] = ""; } return S_OK; #else ReturnComNotImplemented(); #endif } HRESULT SessionMachine::pushGuestProperty(const com::Utf8Str &aName, const com::Utf8Str &aValue, LONG64 aTimestamp, const com::Utf8Str &aFlags, BOOL fWasDeleted) { LogFlowThisFunc(("\n")); #ifdef VBOX_WITH_GUEST_PROPS try { /* * Convert input up front. */ uint32_t fFlags = GUEST_PROP_F_NILFLAG; if (aFlags.length()) { int vrc = GuestPropValidateFlags(aFlags.c_str(), &fFlags); AssertRCReturn(vrc, E_INVALIDARG); } /* * Now grab the object lock, validate the state and do the update. */ AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (!Global::IsOnline(mData->mMachineState)) AssertMsgFailedReturn(("%s\n", ::stringifyMachineState(mData->mMachineState)), VBOX_E_INVALID_VM_STATE); i_setModified(IsModified_MachineData); mHWData.backup(); HWData::GuestPropertyMap::iterator it = mHWData->mGuestProperties.find(aName); if (it != mHWData->mGuestProperties.end()) { if (!fWasDeleted) { it->second.strValue = aValue; it->second.mTimestamp = aTimestamp; it->second.mFlags = fFlags; } else mHWData->mGuestProperties.erase(it); mData->mGuestPropertiesModified = TRUE; } else if (!fWasDeleted) { HWData::GuestProperty prop; prop.strValue = aValue; prop.mTimestamp = aTimestamp; prop.mFlags = fFlags; mHWData->mGuestProperties[aName] = prop; mData->mGuestPropertiesModified = TRUE; } alock.release(); mParent->i_onGuestPropertyChanged(mData->mUuid, aName, aValue, aFlags, fWasDeleted); } catch (...) { return VirtualBoxBase::handleUnexpectedExceptions(this, RT_SRC_POS); } return S_OK; #else ReturnComNotImplemented(); #endif } HRESULT SessionMachine::lockMedia() { AutoMultiWriteLock2 alock(this->lockHandle(), &mParent->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS); AssertReturn( mData->mMachineState == MachineState_Starting || mData->mMachineState == MachineState_Restoring || mData->mMachineState == MachineState_TeleportingIn, E_FAIL); clearError(); alock.release(); return i_lockMedia(); } HRESULT SessionMachine::unlockMedia() { HRESULT hrc = i_unlockMedia(); return hrc; } HRESULT SessionMachine::ejectMedium(const ComPtr &aAttachment, ComPtr &aNewAttachment) { // request the host lock first, since might be calling Host methods for getting host drives; // next, protect the media tree all the while we're in here, as well as our member variables AutoMultiWriteLock3 multiLock(mParent->i_host()->lockHandle(), this->lockHandle(), &mParent->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS); IMediumAttachment *iAttach = aAttachment; ComObjPtr pAttach = static_cast(iAttach); Utf8Str ctrlName; LONG lPort; LONG lDevice; bool fTempEject; { AutoReadLock attLock(pAttach COMMA_LOCKVAL_SRC_POS); /* Need to query the details first, as the IMediumAttachment reference * might be to the original settings, which we are going to change. */ ctrlName = pAttach->i_getControllerName(); lPort = pAttach->i_getPort(); lDevice = pAttach->i_getDevice(); fTempEject = pAttach->i_getTempEject(); } if (!fTempEject) { /* Remember previously mounted medium. The medium before taking the * backup is not necessarily the same thing. */ ComObjPtr oldmedium; oldmedium = pAttach->i_getMedium(); i_setModified(IsModified_Storage); mMediumAttachments.backup(); // The backup operation makes the pAttach reference point to the // old settings. Re-get the correct reference. pAttach = i_findAttachment(*mMediumAttachments.data(), ctrlName, lPort, lDevice); { AutoCaller autoAttachCaller(this); if (FAILED(autoAttachCaller.rc())) return autoAttachCaller.rc(); AutoWriteLock attLock(pAttach COMMA_LOCKVAL_SRC_POS); if (!oldmedium.isNull()) oldmedium->i_removeBackReference(mData->mUuid); pAttach->i_updateMedium(NULL); pAttach->i_updateEjected(); } i_setModified(IsModified_Storage); } else { { AutoWriteLock attLock(pAttach COMMA_LOCKVAL_SRC_POS); pAttach->i_updateEjected(); } } pAttach.queryInterfaceTo(aNewAttachment.asOutParam()); return S_OK; } HRESULT SessionMachine::authenticateExternal(const std::vector &aAuthParams, com::Utf8Str &aResult) { AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT hr = S_OK; if (!mAuthLibCtx.hAuthLibrary) { /* Load the external authentication library. */ Bstr authLibrary; mVRDEServer->COMGETTER(AuthLibrary)(authLibrary.asOutParam()); Utf8Str filename = authLibrary; int vrc = AuthLibLoad(&mAuthLibCtx, filename.c_str()); if (RT_FAILURE(vrc)) hr = setErrorBoth(E_FAIL, vrc, tr("Could not load the external authentication library '%s' (%Rrc)"), filename.c_str(), vrc); } /* The auth library might need the machine lock. */ alock.release(); if (FAILED(hr)) return hr; if (aAuthParams[0] == "VRDEAUTH" && aAuthParams.size() == 7) { enum VRDEAuthParams { parmUuid = 1, parmGuestJudgement, parmUser, parmPassword, parmDomain, parmClientId }; AuthResult result = AuthResultAccessDenied; Guid uuid(aAuthParams[parmUuid]); AuthGuestJudgement guestJudgement = (AuthGuestJudgement)aAuthParams[parmGuestJudgement].toUInt32(); uint32_t u32ClientId = aAuthParams[parmClientId].toUInt32(); result = AuthLibAuthenticate(&mAuthLibCtx, uuid.raw(), guestJudgement, aAuthParams[parmUser].c_str(), aAuthParams[parmPassword].c_str(), aAuthParams[parmDomain].c_str(), u32ClientId); /* Hack: aAuthParams[parmPassword] is const but the code believes in writable memory. */ size_t cbPassword = aAuthParams[parmPassword].length(); if (cbPassword) { RTMemWipeThoroughly((void *)aAuthParams[parmPassword].c_str(), cbPassword, 10 /* cPasses */); memset((void *)aAuthParams[parmPassword].c_str(), 'x', cbPassword); } if (result == AuthResultAccessGranted) aResult = "granted"; else aResult = "denied"; LogRel(("AUTH: VRDE authentification for user '%s' result '%s'\n", aAuthParams[parmUser].c_str(), aResult.c_str())); } else if (aAuthParams[0] == "VRDEAUTHDISCONNECT" && aAuthParams.size() == 3) { enum VRDEAuthDisconnectParams { parmUuid = 1, parmClientId }; Guid uuid(aAuthParams[parmUuid]); uint32_t u32ClientId = 0; AuthLibDisconnect(&mAuthLibCtx, uuid.raw(), u32ClientId); } else { hr = E_INVALIDARG; } return hr; } // public methods only for internal purposes ///////////////////////////////////////////////////////////////////////////// #ifndef VBOX_WITH_GENERIC_SESSION_WATCHER /** * Called from the client watcher thread to check for expected or unexpected * death of the client process that has a direct session to this machine. * * On Win32 and on OS/2, this method is called only when we've got the * mutex (i.e. the client has either died or terminated normally) so it always * returns @c true (the client is terminated, the session machine is * uninitialized). * * On other platforms, the method returns @c true if the client process has * terminated normally or abnormally and the session machine was uninitialized, * and @c false if the client process is still alive. * * @note Locks this object for writing. */ bool SessionMachine::i_checkForDeath() { Uninit::Reason reason; bool terminated = false; /* Enclose autoCaller with a block because calling uninit() from under it * will deadlock. */ { AutoCaller autoCaller(this); if (!autoCaller.isOk()) { /* return true if not ready, to cause the client watcher to exclude * the corresponding session from watching */ LogFlowThisFunc(("Already uninitialized!\n")); return true; } AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); /* Determine the reason of death: if the session state is Closing here, * everything is fine. Otherwise it means that the client did not call * OnSessionEnd() before it released the IPC semaphore. This may happen * either because the client process has abnormally terminated, or * because it simply forgot to call ISession::Close() before exiting. We * threat the latter also as an abnormal termination (see * Session::uninit() for details). */ reason = mData->mSession.mState == SessionState_Unlocking ? Uninit::Normal : Uninit::Abnormal; if (mClientToken) terminated = mClientToken->release(); } /* AutoCaller block */ if (terminated) uninit(reason); return terminated; } void SessionMachine::i_getTokenId(Utf8Str &strTokenId) { LogFlowThisFunc(("\n")); strTokenId.setNull(); AutoCaller autoCaller(this); AssertComRCReturnVoid(autoCaller.rc()); Assert(mClientToken); if (mClientToken) mClientToken->getId(strTokenId); } #else /* VBOX_WITH_GENERIC_SESSION_WATCHER */ IToken *SessionMachine::i_getToken() { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), NULL); Assert(mClientToken); if (mClientToken) return mClientToken->getToken(); else return NULL; } #endif /* VBOX_WITH_GENERIC_SESSION_WATCHER */ Machine::ClientToken *SessionMachine::i_getClientToken() { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), NULL); return mClientToken; } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onNetworkAdapterChange(INetworkAdapter *networkAdapter, BOOL changeAdapter) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnNetworkAdapterChange(networkAdapter, changeAdapter); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onNATRedirectRuleChanged(ULONG ulSlot, BOOL aNatRuleRemove, const Utf8Str &aRuleName, NATProtocol_T aProto, const Utf8Str &aHostIp, LONG aHostPort, const Utf8Str &aGuestIp, LONG aGuestPort) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; /* * instead acting like callback we ask IVirtualBox deliver corresponding event */ mParent->i_onNatRedirectChanged(i_getId(), ulSlot, RT_BOOL(aNatRuleRemove), aRuleName, aProto, aHostIp, (uint16_t)aHostPort, aGuestIp, (uint16_t)aGuestPort); return S_OK; } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onAudioAdapterChange(IAudioAdapter *audioAdapter) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnAudioAdapterChange(audioAdapter); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onHostAudioDeviceChange(IHostAudioDevice *aDevice, BOOL aNew, AudioDeviceState_T aState, IVirtualBoxErrorInfo *aErrInfo) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnHostAudioDeviceChange(aDevice, aNew, aState, aErrInfo); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onSerialPortChange(ISerialPort *serialPort) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnSerialPortChange(serialPort); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onParallelPortChange(IParallelPort *parallelPort) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnParallelPortChange(parallelPort); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onStorageControllerChange(const Guid &aMachineId, const Utf8Str &aControllerName) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } mParent->i_onStorageControllerChanged(aMachineId, aControllerName); /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnStorageControllerChange(Bstr(aMachineId.toString()).raw(), Bstr(aControllerName).raw()); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onMediumChange(IMediumAttachment *aAttachment, BOOL aForce) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } mParent->i_onMediumChanged(aAttachment); /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnMediumChange(aAttachment, aForce); } HRESULT SessionMachine::i_onVMProcessPriorityChange(VMProcPriority_T aPriority) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnVMProcessPriorityChange(aPriority); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onCPUChange(ULONG aCPU, BOOL aRemove) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnCPUChange(aCPU, aRemove); } HRESULT SessionMachine::i_onCPUExecutionCapChange(ULONG aExecutionCap) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnCPUExecutionCapChange(aExecutionCap); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onVRDEServerChange(BOOL aRestart) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnVRDEServerChange(aRestart); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onRecordingChange(BOOL aEnable) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnRecordingChange(aEnable); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onUSBControllerChange() { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnUSBControllerChange(); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onSharedFolderChange() { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturnRC(autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnSharedFolderChange(FALSE /* aGlobal */); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onClipboardModeChange(ClipboardMode_T aClipboardMode) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturnRC(autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnClipboardModeChange(aClipboardMode); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onClipboardFileTransferModeChange(BOOL aEnable) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturnRC(autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnClipboardFileTransferModeChange(aEnable); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onDnDModeChange(DnDMode_T aDnDMode) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturnRC(autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnDnDModeChange(aDnDMode); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onBandwidthGroupChange(IBandwidthGroup *aBandwidthGroup) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnBandwidthGroupChange(aBandwidthGroup); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onStorageDeviceChange(IMediumAttachment *aAttachment, BOOL aRemove, BOOL aSilent) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnStorageDeviceChange(aAttachment, aRemove, aSilent); } /** * @note Locks this object for reading. */ HRESULT SessionMachine::i_onGuestDebugControlChange(IGuestDebugControl *guestDebugControl) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->OnGuestDebugControlChange(guestDebugControl); } /** * Returns @c true if this machine's USB controller reports it has a matching * filter for the given USB device and @c false otherwise. * * @note locks this object for reading. */ bool SessionMachine::i_hasMatchingUSBFilter(const ComObjPtr &aDevice, ULONG *aMaskedIfs) { AutoCaller autoCaller(this); /* silently return if not ready -- this method may be called after the * direct machine session has been called */ if (!autoCaller.isOk()) return false; #ifdef VBOX_WITH_USB AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); switch (mData->mMachineState) { case MachineState_Starting: case MachineState_Restoring: case MachineState_TeleportingIn: case MachineState_Paused: case MachineState_Running: /** @todo Live Migration: snapshoting & teleporting. Need to fend things of * elsewhere... */ alock.release(); return mUSBDeviceFilters->i_hasMatchingFilter(aDevice, aMaskedIfs); default: break; } #else NOREF(aDevice); NOREF(aMaskedIfs); #endif return false; } /** * @note The calls shall hold no locks. Will temporarily lock this object for reading. */ HRESULT SessionMachine::i_onUSBDeviceAttach(IUSBDevice *aDevice, IVirtualBoxErrorInfo *aError, ULONG aMaskedIfs, const com::Utf8Str &aCaptureFilename) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); /* This notification may happen after the machine object has been * uninitialized (the session was closed), so don't assert. */ if (FAILED(autoCaller.rc())) return autoCaller.rc(); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* fail on notifications sent after #OnSessionEnd() is called, it is * expected by the caller */ if (!directControl) return E_FAIL; /* No locks should be held at this point. */ AssertMsg(RTLockValidatorWriteLockGetCount(RTThreadSelf()) == 0, ("%d\n", RTLockValidatorWriteLockGetCount(RTThreadSelf()))); AssertMsg(RTLockValidatorReadLockGetCount(RTThreadSelf()) == 0, ("%d\n", RTLockValidatorReadLockGetCount(RTThreadSelf()))); return directControl->OnUSBDeviceAttach(aDevice, aError, aMaskedIfs, Bstr(aCaptureFilename).raw()); } /** * @note The calls shall hold no locks. Will temporarily lock this object for reading. */ HRESULT SessionMachine::i_onUSBDeviceDetach(IN_BSTR aId, IVirtualBoxErrorInfo *aError) { LogFlowThisFunc(("\n")); AutoCaller autoCaller(this); /* This notification may happen after the machine object has been * uninitialized (the session was closed), so don't assert. */ if (FAILED(autoCaller.rc())) return autoCaller.rc(); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; } /* fail on notifications sent after #OnSessionEnd() is called, it is * expected by the caller */ if (!directControl) return E_FAIL; /* No locks should be held at this point. */ AssertMsg(RTLockValidatorWriteLockGetCount(RTThreadSelf()) == 0, ("%d\n", RTLockValidatorWriteLockGetCount(RTThreadSelf()))); AssertMsg(RTLockValidatorReadLockGetCount(RTThreadSelf()) == 0, ("%d\n", RTLockValidatorReadLockGetCount(RTThreadSelf()))); return directControl->OnUSBDeviceDetach(aId, aError); } // protected methods ///////////////////////////////////////////////////////////////////////////// /** * Deletes the given file if it is no longer in use by either the current machine state * (if the machine is "saved") or any of the machine's snapshots. * * Note: This checks mSSData->strStateFilePath, which is shared by the Machine and SessionMachine * but is different for each SnapshotMachine. When calling this, the order of calling this * function on the one hand and changing that variable OR the snapshots tree on the other hand * is therefore critical. I know, it's all rather messy. * * @param strStateFile * @param pSnapshotToIgnore Passed to Snapshot::sharesSavedStateFile(); this snapshot is ignored in * the test for whether the saved state file is in use. */ void SessionMachine::i_releaseSavedStateFile(const Utf8Str &strStateFile, Snapshot *pSnapshotToIgnore) { // it is safe to delete this saved state file if it is not currently in use by the machine ... if ( (strStateFile.isNotEmpty()) && (strStateFile != mSSData->strStateFilePath) // session machine's saved state ) // ... and it must also not be shared with other snapshots if ( !mData->mFirstSnapshot || !mData->mFirstSnapshot->i_sharesSavedStateFile(strStateFile, pSnapshotToIgnore) // this checks the SnapshotMachine's state file paths ) i_deleteFile(strStateFile, true /* fIgnoreFailures */); } /** * Locks the attached media. * * All attached hard disks are locked for writing and DVD/floppy are locked for * reading. Parents of attached hard disks (if any) are locked for reading. * * This method also performs accessibility check of all media it locks: if some * media is inaccessible, the method will return a failure and a bunch of * extended error info objects per each inaccessible medium. * * Note that this method is atomic: if it returns a success, all media are * locked as described above; on failure no media is locked at all (all * succeeded individual locks will be undone). * * The caller is responsible for doing the necessary state sanity checks. * * The locks made by this method must be undone by calling #unlockMedia() when * no more needed. */ HRESULT SessionMachine::i_lockMedia() { AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); AutoMultiWriteLock2 alock(this->lockHandle(), &mParent->i_getMediaTreeLockHandle() COMMA_LOCKVAL_SRC_POS); /* bail out if trying to lock things with already set up locking */ AssertReturn(mData->mSession.mLockedMedia.IsEmpty(), E_FAIL); MultiResult mrc(S_OK); /* Collect locking information for all medium objects attached to the VM. */ for (MediumAttachmentList::const_iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it) { MediumAttachment *pAtt = *it; DeviceType_T devType = pAtt->i_getType(); Medium *pMedium = pAtt->i_getMedium(); MediumLockList *pMediumLockList(new MediumLockList()); // There can be attachments without a medium (floppy/dvd), and thus // it's impossible to create a medium lock list. It still makes sense // to have the empty medium lock list in the map in case a medium is // attached later. if (pMedium != NULL) { MediumType_T mediumType = pMedium->i_getType(); bool fIsReadOnlyLock = mediumType == MediumType_Readonly || mediumType == MediumType_Shareable; bool fIsVitalImage = (devType == DeviceType_HardDisk); alock.release(); mrc = pMedium->i_createMediumLockList(fIsVitalImage /* fFailIfInaccessible */, !fIsReadOnlyLock ? pMedium : NULL /* pToLockWrite */, false /* fMediumLockWriteAll */, NULL, *pMediumLockList); alock.acquire(); if (FAILED(mrc)) { delete pMediumLockList; mData->mSession.mLockedMedia.Clear(); break; } } HRESULT rc = mData->mSession.mLockedMedia.Insert(pAtt, pMediumLockList); if (FAILED(rc)) { mData->mSession.mLockedMedia.Clear(); mrc = setError(rc, tr("Collecting locking information for all attached media failed")); break; } } if (SUCCEEDED(mrc)) { /* Now lock all media. If this fails, nothing is locked. */ alock.release(); HRESULT rc = mData->mSession.mLockedMedia.Lock(); alock.acquire(); if (FAILED(rc)) { mrc = setError(rc, tr("Locking of attached media failed. A possible reason is that one of the media is attached to a running VM")); } } return mrc; } /** * Undoes the locks made by by #lockMedia(). */ HRESULT SessionMachine::i_unlockMedia() { AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(),autoCaller.rc()); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); /* we may be holding important error info on the current thread; * preserve it */ ErrorInfoKeeper eik; HRESULT rc = mData->mSession.mLockedMedia.Clear(); AssertComRC(rc); return rc; } /** * Helper to change the machine state (reimplementation). * * @note Locks this object for writing. * @note This method must not call i_saveSettings or SaveSettings, otherwise * it can cause crashes in random places due to unexpectedly committing * the current settings. The caller is responsible for that. The call * to saveStateSettings is fine, because this method does not commit. */ HRESULT SessionMachine::i_setMachineState(MachineState_T aMachineState) { LogFlowThisFuncEnter(); AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); MachineState_T oldMachineState = mData->mMachineState; AssertMsgReturn(oldMachineState != aMachineState, ("oldMachineState=%s, aMachineState=%s\n", ::stringifyMachineState(oldMachineState), ::stringifyMachineState(aMachineState)), E_FAIL); HRESULT rc = S_OK; int stsFlags = 0; bool deleteSavedState = false; /* detect some state transitions */ if ( ( ( oldMachineState == MachineState_Saved || oldMachineState == MachineState_AbortedSaved ) && aMachineState == MachineState_Restoring ) || ( ( oldMachineState == MachineState_PoweredOff || oldMachineState == MachineState_Teleported || oldMachineState == MachineState_Aborted ) && ( aMachineState == MachineState_TeleportingIn || aMachineState == MachineState_Starting ) ) ) { /* The EMT thread is about to start */ /* Nothing to do here for now... */ /// @todo NEWMEDIA don't let mDVDDrive and other children /// change anything when in the Starting/Restoring state } else if ( ( oldMachineState == MachineState_Running || oldMachineState == MachineState_Paused || oldMachineState == MachineState_Teleporting || oldMachineState == MachineState_OnlineSnapshotting || oldMachineState == MachineState_LiveSnapshotting || oldMachineState == MachineState_Stuck || oldMachineState == MachineState_Starting || oldMachineState == MachineState_Stopping || oldMachineState == MachineState_Saving || oldMachineState == MachineState_Restoring || oldMachineState == MachineState_TeleportingPausedVM || oldMachineState == MachineState_TeleportingIn ) && ( aMachineState == MachineState_PoweredOff || aMachineState == MachineState_Saved || aMachineState == MachineState_Teleported || aMachineState == MachineState_Aborted || aMachineState == MachineState_AbortedSaved ) ) { /* The EMT thread has just stopped, unlock attached media. Note that as * opposed to locking that is done from Console, we do unlocking here * because the VM process may have aborted before having a chance to * properly unlock all media it locked. */ unlockMedia(); } if (oldMachineState == MachineState_Restoring) { if (aMachineState != MachineState_Saved && aMachineState != MachineState_AbortedSaved) { /* * delete the saved state file once the machine has finished * restoring from it (note that Console sets the state from * Restoring to AbortedSaved if the VM couldn't restore successfully, * to give the user an ability to fix an error and retry -- * we keep the saved state file in this case) */ deleteSavedState = true; } } else if ( oldMachineState == MachineState_Saved && ( aMachineState == MachineState_PoweredOff || aMachineState == MachineState_Teleported ) ) { /* delete the saved state after SessionMachine::ForgetSavedState() is called */ deleteSavedState = true; mData->mCurrentStateModified = TRUE; stsFlags |= SaveSTS_CurStateModified; } /* failure to reach the restoring state should always go to MachineState_AbortedSaved */ Assert(!(oldMachineState == MachineState_Saved && aMachineState == MachineState_Aborted)); if ( aMachineState == MachineState_Starting || aMachineState == MachineState_Restoring || aMachineState == MachineState_TeleportingIn ) { /* set the current state modified flag to indicate that the current * state is no more identical to the state in the * current snapshot */ if (!mData->mCurrentSnapshot.isNull()) { mData->mCurrentStateModified = TRUE; stsFlags |= SaveSTS_CurStateModified; } } if (deleteSavedState) { if (mRemoveSavedState) { Assert(!mSSData->strStateFilePath.isEmpty()); // it is safe to delete the saved state file if ... if ( !mData->mFirstSnapshot // ... we have no snapshots or || !mData->mFirstSnapshot->i_sharesSavedStateFile(mSSData->strStateFilePath, NULL /* pSnapshotToIgnore */) // ... none of the snapshots share the saved state file ) i_deleteFile(mSSData->strStateFilePath, true /* fIgnoreFailures */); } mSSData->strStateFilePath.setNull(); stsFlags |= SaveSTS_StateFilePath; } /* redirect to the underlying peer machine */ mPeer->i_setMachineState(aMachineState); if ( oldMachineState != MachineState_RestoringSnapshot && ( aMachineState == MachineState_PoweredOff || aMachineState == MachineState_Teleported || aMachineState == MachineState_Aborted || aMachineState == MachineState_AbortedSaved || aMachineState == MachineState_Saved)) { /* the machine has stopped execution * (or the saved state file was adopted) */ stsFlags |= SaveSTS_StateTimeStamp; } if ( ( oldMachineState == MachineState_PoweredOff || oldMachineState == MachineState_Aborted || oldMachineState == MachineState_Teleported ) && aMachineState == MachineState_Saved) { /* the saved state file was adopted */ Assert(!mSSData->strStateFilePath.isEmpty()); stsFlags |= SaveSTS_StateFilePath; } #ifdef VBOX_WITH_GUEST_PROPS if ( aMachineState == MachineState_PoweredOff || aMachineState == MachineState_Aborted || aMachineState == MachineState_Teleported) { /* Make sure any transient guest properties get removed from the * property store on shutdown. */ BOOL fNeedsSaving = mData->mGuestPropertiesModified; /* remove it from the settings representation */ settings::GuestPropertiesList &llGuestProperties = mData->pMachineConfigFile->hardwareMachine.llGuestProperties; for (settings::GuestPropertiesList::iterator it = llGuestProperties.begin(); it != llGuestProperties.end(); /*nothing*/) { const settings::GuestProperty &prop = *it; if ( prop.strFlags.contains("TRANSRESET", Utf8Str::CaseInsensitive) || prop.strFlags.contains("TRANSIENT", Utf8Str::CaseInsensitive)) { it = llGuestProperties.erase(it); fNeedsSaving = true; } else { ++it; } } /* Additionally remove it from the HWData representation. Required to * keep everything in sync, as this is what the API keeps using. */ HWData::GuestPropertyMap &llHWGuestProperties = mHWData->mGuestProperties; for (HWData::GuestPropertyMap::iterator it = llHWGuestProperties.begin(); it != llHWGuestProperties.end(); /*nothing*/) { uint32_t fFlags = it->second.mFlags; if (fFlags & (GUEST_PROP_F_TRANSIENT | GUEST_PROP_F_TRANSRESET)) { /* iterator where we need to continue after the erase call * (C++03 is a fact still, and it doesn't return the iterator * which would allow continuing) */ HWData::GuestPropertyMap::iterator it2 = it; ++it2; llHWGuestProperties.erase(it); it = it2; fNeedsSaving = true; } else { ++it; } } if (fNeedsSaving) { mData->mCurrentStateModified = TRUE; stsFlags |= SaveSTS_CurStateModified; } } #endif /* VBOX_WITH_GUEST_PROPS */ rc = i_saveStateSettings(stsFlags); if ( ( oldMachineState != MachineState_PoweredOff && oldMachineState != MachineState_Aborted && oldMachineState != MachineState_Teleported ) && ( aMachineState == MachineState_PoweredOff || aMachineState == MachineState_Aborted || aMachineState == MachineState_Teleported ) ) { /* we've been shut down for any reason */ /* no special action so far */ } LogFlowThisFunc(("rc=%Rhrc [%s]\n", rc, ::stringifyMachineState(mData->mMachineState) )); LogFlowThisFuncLeave(); return rc; } /** * Sends the current machine state value to the VM process. * * @note Locks this object for reading, then calls a client process. */ HRESULT SessionMachine::i_updateMachineStateOnClient() { AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); ComPtr directControl; { AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); AssertReturn(!!mData, E_FAIL); if (mData->mSession.mLockType == LockType_VM) directControl = mData->mSession.mDirectControl; /* directControl may be already set to NULL here in #OnSessionEnd() * called too early by the direct session process while there is still * some operation (like deleting the snapshot) in progress. The client * process in this case is waiting inside Session::close() for the * "end session" process object to complete, while #uninit() called by * #i_checkForDeath() on the Watcher thread is waiting for the pending * operation to complete. For now, we accept this inconsistent behavior * and simply do nothing here. */ if (mData->mSession.mState == SessionState_Unlocking) return S_OK; } /* ignore notifications sent after #OnSessionEnd() is called */ if (!directControl) return S_OK; return directControl->UpdateMachineState(mData->mMachineState); } /*static*/ HRESULT Machine::i_setErrorStatic(HRESULT aResultCode, const char *pcszMsg, ...) { va_list args; va_start(args, pcszMsg); HRESULT rc = setErrorInternalV(aResultCode, getStaticClassIID(), getStaticComponentName(), pcszMsg, args, false /* aWarning */, true /* aLogIt */); va_end(args); return rc; } HRESULT Machine::updateState(MachineState_T aState) { NOREF(aState); ReturnComNotImplemented(); } HRESULT Machine::beginPowerUp(const ComPtr &aProgress) { NOREF(aProgress); ReturnComNotImplemented(); } HRESULT Machine::endPowerUp(LONG aResult) { NOREF(aResult); ReturnComNotImplemented(); } HRESULT Machine::beginPoweringDown(ComPtr &aProgress) { NOREF(aProgress); ReturnComNotImplemented(); } HRESULT Machine::endPoweringDown(LONG aResult, const com::Utf8Str &aErrMsg) { NOREF(aResult); NOREF(aErrMsg); ReturnComNotImplemented(); } HRESULT Machine::runUSBDeviceFilters(const ComPtr &aDevice, BOOL *aMatched, ULONG *aMaskedInterfaces) { NOREF(aDevice); NOREF(aMatched); NOREF(aMaskedInterfaces); ReturnComNotImplemented(); } HRESULT Machine::captureUSBDevice(const com::Guid &aId, const com::Utf8Str &aCaptureFilename) { NOREF(aId); NOREF(aCaptureFilename); ReturnComNotImplemented(); } HRESULT Machine::detachUSBDevice(const com::Guid &aId, BOOL aDone) { NOREF(aId); NOREF(aDone); ReturnComNotImplemented(); } HRESULT Machine::autoCaptureUSBDevices() { ReturnComNotImplemented(); } HRESULT Machine::detachAllUSBDevices(BOOL aDone) { NOREF(aDone); ReturnComNotImplemented(); } HRESULT Machine::onSessionEnd(const ComPtr &aSession, ComPtr &aProgress) { NOREF(aSession); NOREF(aProgress); ReturnComNotImplemented(); } HRESULT Machine::finishOnlineMergeMedium() { ReturnComNotImplemented(); } HRESULT Machine::pullGuestProperties(std::vector &aNames, std::vector &aValues, std::vector &aTimestamps, std::vector &aFlags) { NOREF(aNames); NOREF(aValues); NOREF(aTimestamps); NOREF(aFlags); ReturnComNotImplemented(); } HRESULT Machine::pushGuestProperty(const com::Utf8Str &aName, const com::Utf8Str &aValue, LONG64 aTimestamp, const com::Utf8Str &aFlags, BOOL fWasDeleted) { NOREF(aName); NOREF(aValue); NOREF(aTimestamp); NOREF(aFlags); NOREF(fWasDeleted); ReturnComNotImplemented(); } HRESULT Machine::lockMedia() { ReturnComNotImplemented(); } HRESULT Machine::unlockMedia() { ReturnComNotImplemented(); } HRESULT Machine::ejectMedium(const ComPtr &aAttachment, ComPtr &aNewAttachment) { NOREF(aAttachment); NOREF(aNewAttachment); ReturnComNotImplemented(); } HRESULT Machine::reportVmStatistics(ULONG aValidStats, ULONG aCpuUser, ULONG aCpuKernel, ULONG aCpuIdle, ULONG aMemTotal, ULONG aMemFree, ULONG aMemBalloon, ULONG aMemShared, ULONG aMemCache, ULONG aPagedTotal, ULONG aMemAllocTotal, ULONG aMemFreeTotal, ULONG aMemBalloonTotal, ULONG aMemSharedTotal, ULONG aVmNetRx, ULONG aVmNetTx) { NOREF(aValidStats); NOREF(aCpuUser); NOREF(aCpuKernel); NOREF(aCpuIdle); NOREF(aMemTotal); NOREF(aMemFree); NOREF(aMemBalloon); NOREF(aMemShared); NOREF(aMemCache); NOREF(aPagedTotal); NOREF(aMemAllocTotal); NOREF(aMemFreeTotal); NOREF(aMemBalloonTotal); NOREF(aMemSharedTotal); NOREF(aVmNetRx); NOREF(aVmNetTx); ReturnComNotImplemented(); } HRESULT Machine::authenticateExternal(const std::vector &aAuthParams, com::Utf8Str &aResult) { NOREF(aAuthParams); NOREF(aResult); ReturnComNotImplemented(); } com::Utf8Str Machine::i_controllerNameFromBusType(StorageBus_T aBusType) { com::Utf8Str strControllerName = "Unknown"; switch (aBusType) { case StorageBus_IDE: { strControllerName = "IDE"; break; } case StorageBus_SATA: { strControllerName = "SATA"; break; } case StorageBus_SCSI: { strControllerName = "SCSI"; break; } case StorageBus_Floppy: { strControllerName = "Floppy"; break; } case StorageBus_SAS: { strControllerName = "SAS"; break; } case StorageBus_USB: { strControllerName = "USB"; break; } default: break; } return strControllerName; } HRESULT Machine::applyDefaults(const com::Utf8Str &aFlags) { /* it's assumed the machine already registered. If not, it's a problem of the caller */ AutoCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(),autoCaller.rc()); HRESULT rc = S_OK; /* get usb device filters from host, before any writes occurred to avoid deadlock */ ComPtr usbDeviceFilters; rc = getUSBDeviceFilters(usbDeviceFilters); if (FAILED(rc)) return rc; NOREF(aFlags); com::Utf8Str osTypeId; ComObjPtr osType = NULL; /* Get the guest os type as a string from the VB. */ rc = getOSTypeId(osTypeId); if (FAILED(rc)) return rc; /* Get the os type obj that coresponds, can be used to get * the defaults for this guest OS. */ rc = mParent->i_findGuestOSType(Bstr(osTypeId), osType); if (FAILED(rc)) return rc; AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); /* Let the OS type select 64-bit ness. */ mHWData->mLongMode = osType->i_is64Bit() ? settings::Hardware::LongMode_Enabled : settings::Hardware::LongMode_Disabled; /* Let the OS type enable the X2APIC */ mHWData->mX2APIC = osType->i_recommendedX2APIC(); /* This one covers IOAPICEnabled. */ mBIOSSettings->i_applyDefaults(osType); /* Initialize default record settings. */ mRecordingSettings->i_applyDefaults(); /* Initialize default BIOS settings here */ /* Hardware virtualization must be ON by default */ mHWData->mAPIC = true; mHWData->mHWVirtExEnabled = true; rc = osType->COMGETTER(RecommendedRAM)(&mHWData->mMemorySize); if (FAILED(rc)) return rc; rc = osType->COMGETTER(RecommendedCPUCount)(&mHWData->mCPUCount); if (FAILED(rc)) return rc; /* Graphics stuff. */ GraphicsControllerType_T graphicsController; rc = osType->COMGETTER(RecommendedGraphicsController)(&graphicsController); if (FAILED(rc)) return rc; rc = mGraphicsAdapter->COMSETTER(GraphicsControllerType)(graphicsController); if (FAILED(rc)) return rc; ULONG vramSize; rc = osType->COMGETTER(RecommendedVRAM)(&vramSize); if (FAILED(rc)) return rc; rc = mGraphicsAdapter->COMSETTER(VRAMSize)(vramSize); if (FAILED(rc)) return rc; BOOL fAccelerate2DVideoEnabled; rc = osType->COMGETTER(Recommended2DVideoAcceleration)(&fAccelerate2DVideoEnabled); if (FAILED(rc)) return rc; rc = mGraphicsAdapter->COMSETTER(Accelerate2DVideoEnabled)(fAccelerate2DVideoEnabled); if (FAILED(rc)) return rc; BOOL fAccelerate3DEnabled; rc = osType->COMGETTER(Recommended3DAcceleration)(&fAccelerate3DEnabled); if (FAILED(rc)) return rc; rc = mGraphicsAdapter->COMSETTER(Accelerate3DEnabled)(fAccelerate3DEnabled); if (FAILED(rc)) return rc; rc = osType->COMGETTER(RecommendedFirmware)(&mHWData->mFirmwareType); if (FAILED(rc)) return rc; rc = osType->COMGETTER(RecommendedPAE)(&mHWData->mPAEEnabled); if (FAILED(rc)) return rc; rc = osType->COMGETTER(RecommendedHPET)(&mHWData->mHPETEnabled); if (FAILED(rc)) return rc; BOOL mRTCUseUTC; rc = osType->COMGETTER(RecommendedRTCUseUTC)(&mRTCUseUTC); if (FAILED(rc)) return rc; setRTCUseUTC(mRTCUseUTC); if (FAILED(rc)) return rc; /* the setter does more than just the assignment, so use it */ ChipsetType_T enmChipsetType; rc = osType->COMGETTER(RecommendedChipset)(&enmChipsetType); if (FAILED(rc)) return rc; rc = COMSETTER(ChipsetType)(enmChipsetType); if (FAILED(rc)) return rc; rc = osType->COMGETTER(RecommendedTFReset)(&mHWData->mTripleFaultReset); if (FAILED(rc)) return rc; /* Apply IOMMU defaults. */ IommuType_T enmIommuType; rc = osType->COMGETTER(RecommendedIommuType)(&enmIommuType); if (FAILED(rc)) return rc; rc = COMSETTER(IommuType)(enmIommuType); if (FAILED(rc)) return rc; /* Apply network adapters defaults */ for (ULONG slot = 0; slot < mNetworkAdapters.size(); ++slot) mNetworkAdapters[slot]->i_applyDefaults(osType); /* Apply serial port defaults */ for (ULONG slot = 0; slot < RT_ELEMENTS(mSerialPorts); ++slot) mSerialPorts[slot]->i_applyDefaults(osType); /* Apply parallel port defaults - not OS dependent*/ for (ULONG slot = 0; slot < RT_ELEMENTS(mParallelPorts); ++slot) mParallelPorts[slot]->i_applyDefaults(); /* This one covers the TPM type. */ mTrustedPlatformModule->i_applyDefaults(osType); /* This one covers secure boot. */ rc = mNvramStore->i_applyDefaults(osType); if (FAILED(rc)) return rc; /* Audio stuff. */ rc = mAudioSettings->i_applyDefaults(osType); if (FAILED(rc)) return rc; /* Storage Controllers */ StorageControllerType_T hdStorageControllerType; StorageBus_T hdStorageBusType; StorageControllerType_T dvdStorageControllerType; StorageBus_T dvdStorageBusType; BOOL recommendedFloppy; ComPtr floppyController; ComPtr hdController; ComPtr dvdController; Utf8Str strFloppyName, strDVDName, strHDName; /* GUI auto generates controller names using bus type. Do the same*/ strFloppyName = i_controllerNameFromBusType(StorageBus_Floppy); /* Floppy recommended? add one. */ rc = osType->COMGETTER(RecommendedFloppy(&recommendedFloppy)); if (FAILED(rc)) return rc; if (recommendedFloppy) { rc = addStorageController(strFloppyName, StorageBus_Floppy, floppyController); if (FAILED(rc)) return rc; } /* Setup one DVD storage controller. */ rc = osType->COMGETTER(RecommendedDVDStorageController)(&dvdStorageControllerType); if (FAILED(rc)) return rc; rc = osType->COMGETTER(RecommendedDVDStorageBus)(&dvdStorageBusType); if (FAILED(rc)) return rc; strDVDName = i_controllerNameFromBusType(dvdStorageBusType); rc = addStorageController(strDVDName, dvdStorageBusType, dvdController); if (FAILED(rc)) return rc; rc = dvdController->COMSETTER(ControllerType)(dvdStorageControllerType); if (FAILED(rc)) return rc; /* Setup one HDD storage controller. */ rc = osType->COMGETTER(RecommendedHDStorageController)(&hdStorageControllerType); if (FAILED(rc)) return rc; rc = osType->COMGETTER(RecommendedHDStorageBus)(&hdStorageBusType); if (FAILED(rc)) return rc; strHDName = i_controllerNameFromBusType(hdStorageBusType); if (hdStorageBusType != dvdStorageBusType && hdStorageControllerType != dvdStorageControllerType) { rc = addStorageController(strHDName, hdStorageBusType, hdController); if (FAILED(rc)) return rc; rc = hdController->COMSETTER(ControllerType)(hdStorageControllerType); if (FAILED(rc)) return rc; } else { /* The HD controller is the same as DVD: */ hdController = dvdController; } /* Limit the AHCI port count if it's used because windows has trouble with * too many ports and other guest (OS X in particular) may take extra long * boot: */ // pParent = static_cast(aP) IStorageController *temp = hdController; ComObjPtr storageController; storageController = static_cast(temp); // tempHDController = aHDController; if (hdStorageControllerType == StorageControllerType_IntelAhci) storageController->COMSETTER(PortCount)(1 + (dvdStorageControllerType == StorageControllerType_IntelAhci)); else if (dvdStorageControllerType == StorageControllerType_IntelAhci) storageController->COMSETTER(PortCount)(1); /* USB stuff */ bool ohciEnabled = false; ComPtr usbController; BOOL recommendedUSB3; BOOL recommendedUSB; BOOL usbProxyAvailable; getUSBProxyAvailable(&usbProxyAvailable); if (FAILED(rc)) return rc; rc = osType->COMGETTER(RecommendedUSB3)(&recommendedUSB3); if (FAILED(rc)) return rc; rc = osType->COMGETTER(RecommendedUSB)(&recommendedUSB); if (FAILED(rc)) return rc; if (!usbDeviceFilters.isNull() && recommendedUSB3 && usbProxyAvailable) { rc = addUSBController("XHCI", USBControllerType_XHCI, usbController); if (FAILED(rc)) return rc; /* xHci includes OHCI */ ohciEnabled = true; } if ( !ohciEnabled && !usbDeviceFilters.isNull() && recommendedUSB && usbProxyAvailable) { rc = addUSBController("OHCI", USBControllerType_OHCI, usbController); if (FAILED(rc)) return rc; ohciEnabled = true; rc = addUSBController("EHCI", USBControllerType_EHCI, usbController); if (FAILED(rc)) return rc; } /* Set recommended human interface device types: */ BOOL recommendedUSBHID; rc = osType->COMGETTER(RecommendedUSBHID)(&recommendedUSBHID); if (FAILED(rc)) return rc; if (recommendedUSBHID) { mHWData->mKeyboardHIDType = KeyboardHIDType_USBKeyboard; mHWData->mPointingHIDType = PointingHIDType_USBMouse; if (!ohciEnabled && !usbDeviceFilters.isNull()) { rc = addUSBController("OHCI", USBControllerType_OHCI, usbController); if (FAILED(rc)) return rc; } } BOOL recommendedUSBTablet; rc = osType->COMGETTER(RecommendedUSBTablet)(&recommendedUSBTablet); if (FAILED(rc)) return rc; if (recommendedUSBTablet) { mHWData->mPointingHIDType = PointingHIDType_USBTablet; if (!ohciEnabled && !usbDeviceFilters.isNull()) { rc = addUSBController("OHCI", USBControllerType_OHCI, usbController); if (FAILED(rc)) return rc; } } /* Enable the VMMDev testing feature for bootsector VMs: */ if (osTypeId == "VBoxBS_64") { rc = setExtraData("VBoxInternal/Devices/VMMDev/0/Config/TestingEnabled", "1"); if (FAILED(rc)) return rc; } return S_OK; } #ifdef VBOX_WITH_FULL_VM_ENCRYPTION /** * Task record for change encryption settins. */ class Machine::ChangeEncryptionTask : public Machine::Task { public: ChangeEncryptionTask(Machine *m, Progress *p, const Utf8Str &t, const com::Utf8Str &aCurrentPassword, const com::Utf8Str &aCipher, const com::Utf8Str &aNewPassword, const com::Utf8Str &aNewPasswordId, const BOOL aForce, const MediaList &llMedia) : Task(m, p, t), mstrNewPassword(aNewPassword), mstrCurrentPassword(aCurrentPassword), mstrCipher(aCipher), mstrNewPasswordId(aNewPasswordId), mForce(aForce), mllMedia(llMedia) {} ~ChangeEncryptionTask() { if (mstrNewPassword.length()) RTMemWipeThoroughly(mstrNewPassword.mutableRaw(), mstrNewPassword.length(), 10 /* cPasses */); if (mstrCurrentPassword.length()) RTMemWipeThoroughly(mstrCurrentPassword.mutableRaw(), mstrCurrentPassword.length(), 10 /* cPasses */); if (m_pCryptoIf) { m_pMachine->i_getVirtualBox()->i_releaseCryptoIf(m_pCryptoIf); m_pCryptoIf = NULL; } } Utf8Str mstrNewPassword; Utf8Str mstrCurrentPassword; Utf8Str mstrCipher; Utf8Str mstrNewPasswordId; BOOL mForce; MediaList mllMedia; PCVBOXCRYPTOIF m_pCryptoIf; private: void handler() { try { m_pMachine->i_changeEncryptionHandler(*this); } catch (...) { LogRel(("Some exception in the function Machine::i_changeEncryptionHandler()\n")); } } friend void Machine::i_changeEncryptionHandler(ChangeEncryptionTask &task); }; /** * Scans specified directory and fills list by files found * * @returns VBox status code. * @param lstFiles * @param strDir * @param filePattern */ int Machine::i_findFiles(std::list &lstFiles, const com::Utf8Str &strDir, const com::Utf8Str &strPattern) { /* To get all entries including subdirectories. */ char *pszFilePattern = RTPathJoinA(strDir.c_str(), "*"); if (!pszFilePattern) return VERR_NO_STR_MEMORY; PRTDIRENTRYEX pDirEntry = NULL; RTDIR hDir; size_t cbDirEntry = sizeof(RTDIRENTRYEX); int rc = RTDirOpenFiltered(&hDir, pszFilePattern, RTDIRFILTER_WINNT, 0 /*fFlags*/); if (RT_SUCCESS(rc)) { pDirEntry = (PRTDIRENTRYEX)RTMemAllocZ(sizeof(RTDIRENTRYEX)); if (pDirEntry) { while ( (rc = RTDirReadEx(hDir, pDirEntry, &cbDirEntry, RTFSOBJATTRADD_NOTHING, RTPATH_F_ON_LINK)) != VERR_NO_MORE_FILES) { char *pszFilePath = NULL; if (rc == VERR_BUFFER_OVERFLOW) { /* allocate new buffer. */ RTMemFree(pDirEntry); pDirEntry = (PRTDIRENTRYEX)RTMemAllocZ(cbDirEntry); if (!pDirEntry) { rc = VERR_NO_MEMORY; break; } /* Retry. */ rc = RTDirReadEx(hDir, pDirEntry, &cbDirEntry, RTFSOBJATTRADD_NOTHING, RTPATH_F_ON_LINK); if (RT_FAILURE(rc)) break; } else if (RT_FAILURE(rc)) break; /* Exclude . and .. */ if ( (pDirEntry->szName[0] == '.' && pDirEntry->szName[1] == '\0') || (pDirEntry->szName[0] == '.' && pDirEntry->szName[1] == '.' && pDirEntry->szName[2] == '\0')) continue; if (RTFS_IS_DIRECTORY(pDirEntry->Info.Attr.fMode)) { char *pszSubDirPath = RTPathJoinA(strDir.c_str(), pDirEntry->szName); if (!pszSubDirPath) { rc = VERR_NO_STR_MEMORY; break; } rc = i_findFiles(lstFiles, pszSubDirPath, strPattern); RTMemFree(pszSubDirPath); if (RT_FAILURE(rc)) break; continue; } /* We got the new entry. */ if (!RTFS_IS_FILE(pDirEntry->Info.Attr.fMode)) continue; if (!RTStrSimplePatternMatch(strPattern.c_str(), pDirEntry->szName)) continue; /* Prepend the path to the libraries. */ pszFilePath = RTPathJoinA(strDir.c_str(), pDirEntry->szName); if (!pszFilePath) { rc = VERR_NO_STR_MEMORY; break; } lstFiles.push_back(pszFilePath); RTStrFree(pszFilePath); } RTMemFree(pDirEntry); } else rc = VERR_NO_MEMORY; RTDirClose(hDir); } else { /* On Windows the above immediately signals that there are no * files matching, while on other platforms enumerating the * files below fails. Either way: stop searching. */ } if ( rc == VERR_NO_MORE_FILES || rc == VERR_FILE_NOT_FOUND || rc == VERR_PATH_NOT_FOUND) rc = VINF_SUCCESS; RTStrFree(pszFilePattern); return rc; } /** * Helper to set up an I/O stream to read or write a possibly encrypted file. * * @returns VBox status code. * @param pszFilename The file to open. * @param pCryptoIf Pointer to the cryptographic interface if the file should be encrypted or contains encrypted data. * @param pszKeyStore The keystore if the file should be encrypted or contains encrypted data. * @param pszPassword The password if the file should be encrypted or contains encrypted data. * @param fOpen The open flags for the file. * @param phVfsIos Where to store the handle to the I/O stream on success. */ int Machine::i_createIoStreamForFile(const char *pszFilename, PCVBOXCRYPTOIF pCryptoIf, const char *pszKeyStore, const char *pszPassword, uint64_t fOpen, PRTVFSIOSTREAM phVfsIos) { RTVFSFILE hVfsFile = NIL_RTVFSFILE; int vrc = RTVfsFileOpenNormal(pszFilename, fOpen, &hVfsFile); if (RT_SUCCESS(vrc)) { if (pCryptoIf) { RTVFSFILE hVfsFileCrypto = NIL_RTVFSFILE; vrc = pCryptoIf->pfnCryptoFileFromVfsFile(hVfsFile, pszKeyStore, pszPassword, &hVfsFileCrypto); if (RT_SUCCESS(vrc)) { RTVfsFileRelease(hVfsFile); hVfsFile = hVfsFileCrypto; } } *phVfsIos = RTVfsFileToIoStream(hVfsFile); RTVfsFileRelease(hVfsFile); } return vrc; } /** * Helper function processing all actions for one component (saved state files, * NVRAM files, etc). Used by Machine::i_changeEncryptionHandler only. * * @param task * @param strDirectory * @param strFilePattern * @param strMagic * @param strKeyStore * @param strKeyId * @return */ HRESULT Machine::i_changeEncryptionForComponent(ChangeEncryptionTask &task, const com::Utf8Str strDirectory, const com::Utf8Str strFilePattern, com::Utf8Str &strKeyStore, com::Utf8Str &strKeyId, int iCipherMode) { bool fDecrypt = task.mstrCurrentPassword.isNotEmpty() && task.mstrCipher.isEmpty() && task.mstrNewPassword.isEmpty() && task.mstrNewPasswordId.isEmpty(); bool fEncrypt = task.mstrCurrentPassword.isEmpty() && task.mstrCipher.isNotEmpty() && task.mstrNewPassword.isNotEmpty() && task.mstrNewPasswordId.isNotEmpty(); /* check if the cipher is changed which causes the reencryption*/ const char *pszTaskCipher = NULL; if (task.mstrCipher.isNotEmpty()) pszTaskCipher = getCipherString(task.mstrCipher.c_str(), iCipherMode); if (!task.mForce && !fDecrypt && !fEncrypt) { char *pszCipher = NULL; int vrc = task.m_pCryptoIf->pfnCryptoKeyStoreGetDekFromEncoded(strKeyStore.c_str(), NULL /*pszPassword*/, NULL /*ppbKey*/, NULL /*pcbKey*/, &pszCipher); if (RT_SUCCESS(vrc)) { task.mForce = strcmp(pszTaskCipher, pszCipher) != 0; RTMemFree(pszCipher); } else return setErrorBoth(E_FAIL, vrc, tr("Obtain cipher for '%s' files failed (%Rrc)"), strFilePattern.c_str(), vrc); } /* Only the password needs to be changed */ if (!task.mForce && !fDecrypt && !fEncrypt) { Assert(task.m_pCryptoIf); VBOXCRYPTOCTX hCryptoCtx; int vrc = task.m_pCryptoIf->pfnCryptoCtxLoad(strKeyStore.c_str(), task.mstrCurrentPassword.c_str(), &hCryptoCtx); if (RT_FAILURE(vrc)) return setErrorBoth(E_FAIL, vrc, tr("Loading old key store for '%s' files failed, (%Rrc)"), strFilePattern.c_str(), vrc); vrc = task.m_pCryptoIf->pfnCryptoCtxPasswordChange(hCryptoCtx, task.mstrNewPassword.c_str()); if (RT_FAILURE(vrc)) return setErrorBoth(E_FAIL, vrc, tr("Changing the password for '%s' files failed, (%Rrc)"), strFilePattern.c_str(), vrc); char *pszKeyStore = NULL; vrc = task.m_pCryptoIf->pfnCryptoCtxSave(hCryptoCtx, &pszKeyStore); task.m_pCryptoIf->pfnCryptoCtxDestroy(hCryptoCtx); if (RT_FAILURE(vrc)) return setErrorBoth(E_FAIL, vrc, tr("Saving the key store for '%s' files failed, (%Rrc)"), strFilePattern.c_str(), vrc); strKeyStore = pszKeyStore; RTMemFree(pszKeyStore); strKeyId = task.mstrNewPasswordId; return S_OK; } /* Reencryption required */ HRESULT rc = S_OK; int vrc = VINF_SUCCESS; std::list lstFiles; if (SUCCEEDED(rc)) { vrc = i_findFiles(lstFiles, strDirectory, strFilePattern); if (RT_FAILURE(vrc)) rc = setErrorBoth(E_FAIL, vrc, tr("Getting file list for '%s' files failed, (%Rrc)"), strFilePattern.c_str(), vrc); } com::Utf8Str strNewKeyStore; if (SUCCEEDED(rc)) { if (!fDecrypt) { VBOXCRYPTOCTX hCryptoCtx; vrc = task.m_pCryptoIf->pfnCryptoCtxCreate(pszTaskCipher, task.mstrNewPassword.c_str(), &hCryptoCtx); if (RT_FAILURE(vrc)) return setErrorBoth(E_FAIL, vrc, tr("Create new key store for '%s' files failed, (%Rrc)"), strFilePattern.c_str(), vrc); char *pszKeyStore = NULL; vrc = task.m_pCryptoIf->pfnCryptoCtxSave(hCryptoCtx, &pszKeyStore); task.m_pCryptoIf->pfnCryptoCtxDestroy(hCryptoCtx); if (RT_FAILURE(vrc)) return setErrorBoth(E_FAIL, vrc, tr("Saving the new key store for '%s' files failed, (%Rrc)"), strFilePattern.c_str(), vrc); strNewKeyStore = pszKeyStore; RTMemFree(pszKeyStore); } for (std::list::iterator it = lstFiles.begin(); it != lstFiles.end(); ++it) { RTVFSIOSTREAM hVfsIosOld = NIL_RTVFSIOSTREAM; RTVFSIOSTREAM hVfsIosNew = NIL_RTVFSIOSTREAM; uint64_t fOpenForRead = RTFILE_O_READ | RTFILE_O_OPEN | RTFILE_O_DENY_WRITE; uint64_t fOpenForWrite = RTFILE_O_READWRITE | RTFILE_O_OPEN_CREATE | RTFILE_O_DENY_WRITE; vrc = i_createIoStreamForFile((*it).c_str(), fEncrypt ? NULL : task.m_pCryptoIf, fEncrypt ? NULL : strKeyStore.c_str(), fEncrypt ? NULL : task.mstrCurrentPassword.c_str(), fOpenForRead, &hVfsIosOld); if (RT_SUCCESS(vrc)) { vrc = i_createIoStreamForFile((*it + ".tmp").c_str(), fDecrypt ? NULL : task.m_pCryptoIf, fDecrypt ? NULL : strNewKeyStore.c_str(), fDecrypt ? NULL : task.mstrNewPassword.c_str(), fOpenForWrite, &hVfsIosNew); if (RT_FAILURE(vrc)) rc = setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Opening file '%s' failed, (%Rrc)"), (*it + ".tmp").c_str(), vrc); } else rc = setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Opening file '%s' failed, (%Rrc)"), (*it).c_str(), vrc); if (RT_SUCCESS(vrc)) { vrc = RTVfsUtilPumpIoStreams(hVfsIosOld, hVfsIosNew, BUF_DATA_SIZE); if (RT_FAILURE(vrc)) rc = setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Changing encryption of the file '%s' failed with %Rrc"), (*it).c_str(), vrc); } if (hVfsIosOld != NIL_RTVFSIOSTREAM) RTVfsIoStrmRelease(hVfsIosOld); if (hVfsIosNew != NIL_RTVFSIOSTREAM) RTVfsIoStrmRelease(hVfsIosNew); } } if (SUCCEEDED(rc)) { for (std::list::iterator it = lstFiles.begin(); it != lstFiles.end(); ++it) { vrc = RTFileRename((*it + ".tmp").c_str(), (*it).c_str(), RTPATHRENAME_FLAGS_REPLACE); if (RT_FAILURE(vrc)) { rc = setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Renaming the file '%s' failed, (%Rrc)"), (*it + ".tmp").c_str(), vrc); break; } } } if (SUCCEEDED(rc)) { strKeyStore = strNewKeyStore; strKeyId = task.mstrNewPasswordId; } return rc; } /** * Task thread implementation for Machine::changeEncryption(), called from * Machine::taskHandler(). * * @note Locks this object for writing. * * @param task * @return */ void Machine::i_changeEncryptionHandler(ChangeEncryptionTask &task) { LogFlowThisFuncEnter(); AutoCaller autoCaller(this); LogFlowThisFunc(("state=%d\n", getObjectState().getState())); if (FAILED(autoCaller.rc())) { /* we might have been uninitialized because the session was accidentally * closed by the client, so don't assert */ HRESULT rc = setError(E_FAIL, tr("The session has been accidentally closed")); task.m_pProgress->i_notifyComplete(rc); LogFlowThisFuncLeave(); return; } AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); HRESULT rc = S_OK; com::Utf8Str strOldKeyId = mData->mstrKeyId; com::Utf8Str strOldKeyStore = mData->mstrKeyStore; try { rc = this->i_getVirtualBox()->i_retainCryptoIf(&task.m_pCryptoIf); if (FAILED(rc)) throw rc; if (task.mstrCurrentPassword.isEmpty()) { if (mData->mstrKeyStore.isNotEmpty()) throw setError(VBOX_E_PASSWORD_INCORRECT, tr("The password given for the encrypted VM is incorrect")); } else { if (mData->mstrKeyStore.isEmpty()) throw setError(VBOX_E_INVALID_OBJECT_STATE, tr("The VM is not configured for encryption")); rc = checkEncryptionPassword(task.mstrCurrentPassword); if (rc == VBOX_E_PASSWORD_INCORRECT) throw setError(VBOX_E_PASSWORD_INCORRECT, tr("The password to decrypt the VM is incorrect")); } if (task.mstrCipher.isNotEmpty()) { if ( task.mstrNewPassword.isEmpty() && task.mstrNewPasswordId.isEmpty() && task.mstrCurrentPassword.isNotEmpty()) { /* An empty password and password ID will default to the current password. */ task.mstrNewPassword = task.mstrCurrentPassword; } else if (task.mstrNewPassword.isEmpty()) throw setError(VBOX_E_OBJECT_NOT_FOUND, tr("A password must be given for the VM encryption")); else if (task.mstrNewPasswordId.isEmpty()) throw setError(VBOX_E_INVALID_OBJECT_STATE, tr("A valid identifier for the password must be given")); } else if (task.mstrNewPasswordId.isNotEmpty() || task.mstrNewPassword.isNotEmpty()) throw setError(VBOX_E_INVALID_OBJECT_STATE, tr("The password and password identifier must be empty if the output should be unencrypted")); /* * Save config. * Must be first operation to prevent making encrypted copies * for old version of the config file. */ int fSave = Machine::SaveS_Force; if (task.mstrNewPassword.isNotEmpty()) { VBOXCRYPTOCTX hCryptoCtx; int vrc = VINF_SUCCESS; if (task.mForce || task.mstrCurrentPassword.isEmpty() || task.mstrCipher.isNotEmpty()) { vrc = task.m_pCryptoIf->pfnCryptoCtxCreate(getCipherString(task.mstrCipher.c_str(), CipherModeGcm), task.mstrNewPassword.c_str(), &hCryptoCtx); if (RT_FAILURE(vrc)) throw setErrorBoth(E_FAIL, vrc, tr("New key store creation failed, (%Rrc)"), vrc); } else { vrc = task.m_pCryptoIf->pfnCryptoCtxLoad(mData->mstrKeyStore.c_str(), task.mstrCurrentPassword.c_str(), &hCryptoCtx); if (RT_FAILURE(vrc)) throw setErrorBoth(E_FAIL, vrc, tr("Loading old key store failed, (%Rrc)"), vrc); vrc = task.m_pCryptoIf->pfnCryptoCtxPasswordChange(hCryptoCtx, task.mstrNewPassword.c_str()); if (RT_FAILURE(vrc)) throw setErrorBoth(E_FAIL, vrc, tr("Changing the password failed, (%Rrc)"), vrc); } char *pszKeyStore; vrc = task.m_pCryptoIf->pfnCryptoCtxSave(hCryptoCtx, &pszKeyStore); task.m_pCryptoIf->pfnCryptoCtxDestroy(hCryptoCtx); if (RT_FAILURE(vrc)) throw setErrorBoth(E_FAIL, vrc, tr("Saving the key store failed, (%Rrc)"), vrc); mData->mstrKeyStore = pszKeyStore; RTStrFree(pszKeyStore); mData->mstrKeyId = task.mstrNewPasswordId; size_t cbPassword = task.mstrNewPassword.length() + 1; uint8_t *pbPassword = (uint8_t *)task.mstrNewPassword.c_str(); mData->mpKeyStore->deleteSecretKey(task.mstrNewPasswordId); mData->mpKeyStore->addSecretKey(task.mstrNewPasswordId, pbPassword, cbPassword); mNvramStore->i_addPassword(task.mstrNewPasswordId, task.mstrNewPassword); /* * Remove backuped config after saving because it can contain * unencrypted version of the config */ fSave |= Machine::SaveS_RemoveBackup; } else { mData->mstrKeyId.setNull(); mData->mstrKeyStore.setNull(); } Bstr bstrCurrentPassword(task.mstrCurrentPassword); Bstr bstrCipher(getCipherString(task.mstrCipher.c_str(), CipherModeXts)); Bstr bstrNewPassword(task.mstrNewPassword); Bstr bstrNewPasswordId(task.mstrNewPasswordId); /* encrypt mediums */ alock.release(); for (MediaList::iterator it = task.mllMedia.begin(); it != task.mllMedia.end(); ++it) { ComPtr pProgress1; HRESULT hrc = (*it)->ChangeEncryption(bstrCurrentPassword.raw(), bstrCipher.raw(), bstrNewPassword.raw(), bstrNewPasswordId.raw(), pProgress1.asOutParam()); if (FAILED(hrc)) throw hrc; hrc = task.m_pProgress->WaitForOtherProgressCompletion(pProgress1, 0 /* indefinite wait */); if (FAILED(hrc)) throw hrc; } alock.acquire(); task.m_pProgress->SetNextOperation(Bstr(tr("Change encryption of the SAV files")).raw(), 1); Utf8Str strFullSnapshotFolder; i_calculateFullPath(mUserData->s.strSnapshotFolder, strFullSnapshotFolder); /* .sav files (main and snapshots) */ rc = i_changeEncryptionForComponent(task, strFullSnapshotFolder, "*.sav", mSSData->strStateKeyStore, mSSData->strStateKeyId, CipherModeGcm); if (FAILED(rc)) /* the helper function already sets error object */ throw rc; task.m_pProgress->SetNextOperation(Bstr(tr("Change encryption of the NVRAM files")).raw(), 1); /* .nvram files */ com::Utf8Str strNVRAMKeyId; com::Utf8Str strNVRAMKeyStore; rc = mNvramStore->i_getEncryptionSettings(strNVRAMKeyId, strNVRAMKeyStore); if (FAILED(rc)) throw setError(rc, tr("Getting NVRAM encryption settings failed (%Rhrc)"), rc); Utf8Str strMachineFolder; i_calculateFullPath(".", strMachineFolder); rc = i_changeEncryptionForComponent(task, strMachineFolder, "*.nvram", strNVRAMKeyStore, strNVRAMKeyId, CipherModeGcm); if (FAILED(rc)) /* the helper function already sets error object */ throw rc; rc = mNvramStore->i_updateEncryptionSettings(strNVRAMKeyId, strNVRAMKeyStore); if (FAILED(rc)) throw setError(rc, tr("Setting NVRAM encryption settings failed (%Rhrc)"), rc); task.m_pProgress->SetNextOperation(Bstr(tr("Change encryption of log files")).raw(), 1); /* .log files */ com::Utf8Str strLogFolder; i_getLogFolder(strLogFolder); rc = i_changeEncryptionForComponent(task, strLogFolder, "VBox.log*", mData->mstrLogKeyStore, mData->mstrLogKeyId, CipherModeCtr); if (FAILED(rc)) /* the helper function already sets error object */ throw rc; task.m_pProgress->SetNextOperation(Bstr(tr("Change encryption of the config file")).raw(), 1); i_saveSettings(NULL, alock, fSave); } catch (HRESULT aRC) { rc = aRC; mData->mstrKeyId = strOldKeyId; mData->mstrKeyStore = strOldKeyStore; } task.m_pProgress->i_notifyComplete(rc); LogFlowThisFuncLeave(); } #endif /*!VBOX_WITH_FULL_VM_ENCRYPTION*/ HRESULT Machine::changeEncryption(const com::Utf8Str &aCurrentPassword, const com::Utf8Str &aCipher, const com::Utf8Str &aNewPassword, const com::Utf8Str &aNewPasswordId, BOOL aForce, ComPtr &aProgress) { LogFlowFuncEnter(); #ifndef VBOX_WITH_FULL_VM_ENCRYPTION RT_NOREF(aCurrentPassword, aCipher, aNewPassword, aNewPasswordId, aForce, aProgress); return setError(VBOX_E_NOT_SUPPORTED, tr("Full VM encryption is not available with this build")); #else /* make the VM accessible */ if (!mData->mAccessible) { if ( aCurrentPassword.isEmpty() || mData->mstrKeyId.isEmpty()) return setError(E_ACCESSDENIED, tr("Machine is inaccessible")); HRESULT rc = addEncryptionPassword(mData->mstrKeyId, aCurrentPassword); if (FAILED(rc)) return rc; } AutoLimitedCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); /* define mediums to be change encryption */ MediaList llMedia; for (MediumAttachmentList::iterator it = mMediumAttachments->begin(); it != mMediumAttachments->end(); ++it) { ComObjPtr &pAttach = *it; ComObjPtr pMedium = pAttach->i_getMedium(); if (!pMedium.isNull()) { AutoCaller mac(pMedium); if (FAILED(mac.rc())) return mac.rc(); AutoReadLock lock(pMedium COMMA_LOCKVAL_SRC_POS); DeviceType_T devType = pMedium->i_getDeviceType(); if (devType == DeviceType_HardDisk) { /* * We need to move to last child because the Medium::changeEncryption * encrypts all chain of specified medium with its parents. * Also we perform cheking of back reference and children for * all media in the chain to raise error before we start any action. * So, we first move into root parent and then we will move to last child * keeping latter in the list for encryption. */ /* move to root parent */ ComObjPtr pTmpMedium = pMedium; while (pTmpMedium.isNotNull()) { AutoCaller mediumAC(pTmpMedium); if (FAILED(mediumAC.rc())) return mac.rc(); AutoReadLock mlock(pTmpMedium COMMA_LOCKVAL_SRC_POS); /* Cannot encrypt media which are attached to more than one virtual machine. */ size_t cBackRefs = pTmpMedium->i_getMachineBackRefCount(); if (cBackRefs > 1) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("Cannot encrypt medium '%s' because it is attached to %d virtual machines", "", cBackRefs), pTmpMedium->i_getName().c_str(), cBackRefs); size_t cChildren = pTmpMedium->i_getChildren().size(); if (cChildren > 1) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("Cannot encrypt medium '%s' because it has %d children", "", cChildren), pTmpMedium->i_getName().c_str(), cChildren); pTmpMedium = pTmpMedium->i_getParent(); } /* move to last child */ pTmpMedium = pMedium; while (pTmpMedium.isNotNull() && pTmpMedium->i_getChildren().size() != 0) { AutoCaller mediumAC(pTmpMedium); if (FAILED(mediumAC.rc())) return mac.rc(); AutoReadLock mlock(pTmpMedium COMMA_LOCKVAL_SRC_POS); /* Cannot encrypt media which are attached to more than one virtual machine. */ size_t cBackRefs = pTmpMedium->i_getMachineBackRefCount(); if (cBackRefs > 1) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("Cannot encrypt medium '%s' because it is attached to %d virtual machines", "", cBackRefs), pTmpMedium->i_getName().c_str(), cBackRefs); size_t cChildren = pTmpMedium->i_getChildren().size(); if (cChildren > 1) return setError(VBOX_E_INVALID_OBJECT_STATE, tr("Cannot encrypt medium '%s' because it has %d children", "", cChildren), pTmpMedium->i_getName().c_str(), cChildren); pTmpMedium = pTmpMedium->i_getChildren().front(); } llMedia.push_back(pTmpMedium); } } } ComObjPtr pProgress; pProgress.createObject(); HRESULT rc = pProgress->init(i_getVirtualBox(), static_cast(this) /* aInitiator */, tr("Change encryption"), TRUE /* fCancellable */, (ULONG)(4 + + llMedia.size()), // cOperations tr("Change encryption of the mediuma")); if (FAILED(rc)) return rc; /* create and start the task on a separate thread (note that it will not * start working until we release alock) */ ChangeEncryptionTask *pTask = new ChangeEncryptionTask(this, pProgress, "VM encryption", aCurrentPassword, aCipher, aNewPassword, aNewPasswordId, aForce, llMedia); rc = pTask->createThread(); pTask = NULL; if (FAILED(rc)) return rc; pProgress.queryInterfaceTo(aProgress.asOutParam()); LogFlowFuncLeave(); return S_OK; #endif } HRESULT Machine::getEncryptionSettings(com::Utf8Str &aCipher, com::Utf8Str &aPasswordId) { #ifndef VBOX_WITH_FULL_VM_ENCRYPTION RT_NOREF(aCipher, aPasswordId); return setError(VBOX_E_NOT_SUPPORTED, tr("Full VM encryption is not available with this build")); #else AutoLimitedCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); PCVBOXCRYPTOIF pCryptoIf = NULL; HRESULT hrc = mParent->i_retainCryptoIf(&pCryptoIf); if (FAILED(hrc)) return hrc; /* Error is set */ AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mstrKeyStore.isNotEmpty()) { char *pszCipher = NULL; int vrc = pCryptoIf->pfnCryptoKeyStoreGetDekFromEncoded(mData->mstrKeyStore.c_str(), NULL /*pszPassword*/, NULL /*ppbKey*/, NULL /*pcbKey*/, &pszCipher); if (RT_SUCCESS(vrc)) { aCipher = getCipherStringWithoutMode(pszCipher); RTStrFree(pszCipher); aPasswordId = mData->mstrKeyId; } else hrc = setErrorBoth(VBOX_E_IPRT_ERROR, vrc, tr("Failed to query the encryption settings with %Rrc"), vrc); } else hrc = setError(VBOX_E_NOT_SUPPORTED, tr("This VM is not encrypted")); mParent->i_releaseCryptoIf(pCryptoIf); return hrc; #endif } HRESULT Machine::checkEncryptionPassword(const com::Utf8Str &aPassword) { #ifndef VBOX_WITH_FULL_VM_ENCRYPTION RT_NOREF(aPassword); return setError(VBOX_E_NOT_SUPPORTED, tr("Full VM encryption is not available with this build")); #else AutoLimitedCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); PCVBOXCRYPTOIF pCryptoIf = NULL; HRESULT hrc = mParent->i_retainCryptoIf(&pCryptoIf); if (FAILED(hrc)) return hrc; /* Error is set */ AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mstrKeyStore.isNotEmpty()) { char *pszCipher = NULL; uint8_t *pbDek = NULL; size_t cbDek = 0; int vrc = pCryptoIf->pfnCryptoKeyStoreGetDekFromEncoded(mData->mstrKeyStore.c_str(), aPassword.c_str(), &pbDek, &cbDek, &pszCipher); if (RT_SUCCESS(vrc)) { RTStrFree(pszCipher); RTMemSaferFree(pbDek, cbDek); } else hrc = setErrorBoth(VBOX_E_PASSWORD_INCORRECT, vrc, tr("The password supplied for the encrypted machine is incorrect")); } else hrc = setError(VBOX_E_NOT_SUPPORTED, tr("This VM is not encrypted")); mParent->i_releaseCryptoIf(pCryptoIf); return hrc; #endif } HRESULT Machine::addEncryptionPassword(const com::Utf8Str &aId, const com::Utf8Str &aPassword) { #ifndef VBOX_WITH_FULL_VM_ENCRYPTION RT_NOREF(aId, aPassword); return setError(VBOX_E_NOT_SUPPORTED, tr("Full VM encryption is not available with this build")); #else AutoLimitedCaller autoCaller(this); AssertComRCReturn(autoCaller.rc(), autoCaller.rc()); AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); size_t cbPassword = aPassword.length() + 1; uint8_t *pbPassword = (uint8_t *)aPassword.c_str(); mData->mpKeyStore->addSecretKey(aId, pbPassword, cbPassword); if ( mData->mAccessible && mData->mSession.mState == SessionState_Locked && mData->mSession.mLockType == LockType_VM && mData->mSession.mDirectControl != NULL) { /* get the console from the direct session */ ComPtr console; HRESULT rc = mData->mSession.mDirectControl->COMGETTER(RemoteConsole)(console.asOutParam()); ComAssertComRC(rc); /* send passsword to console */ console->AddEncryptionPassword(Bstr(aId).raw(), Bstr(aPassword).raw(), TRUE); } if (mData->mstrKeyId == aId) { HRESULT hrc = checkEncryptionPassword(aPassword); if (FAILED(hrc)) return hrc; if (SUCCEEDED(hrc)) { /* * Encryption is used and password is correct, * Reinit the machine if required. */ BOOL fAccessible; alock.release(); getAccessible(&fAccessible); alock.acquire(); } } /* * Add the password into the NvramStore only after * the machine becomes accessible and the NvramStore * contains key id and key store. */ if (mNvramStore.isNotNull()) mNvramStore->i_addPassword(aId, aPassword); return S_OK; #endif } HRESULT Machine::addEncryptionPasswords(const std::vector &aIds, const std::vector &aPasswords) { #ifndef VBOX_WITH_FULL_VM_ENCRYPTION RT_NOREF(aIds, aPasswords); return setError(VBOX_E_NOT_SUPPORTED, tr("Full VM encryption is not available with this build")); #else if (aIds.size() != aPasswords.size()) return setError(E_INVALIDARG, tr("Id and passwords arrays must have the same size")); HRESULT hrc = S_OK; for (size_t i = 0; i < aIds.size() && SUCCEEDED(hrc); ++i) hrc = addEncryptionPassword(aIds[i], aPasswords[i]); return hrc; #endif } HRESULT Machine::removeEncryptionPassword(AutoCaller &autoCaller, const com::Utf8Str &aId) { #ifndef VBOX_WITH_FULL_VM_ENCRYPTION RT_NOREF(autoCaller, aId); return setError(VBOX_E_NOT_SUPPORTED, tr("Full VM encryption is not available with this build")); #else AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if ( mData->mAccessible && mData->mSession.mState == SessionState_Locked && mData->mSession.mLockType == LockType_VM && mData->mSession.mDirectControl != NULL) { /* get the console from the direct session */ ComPtr console; HRESULT rc = mData->mSession.mDirectControl->COMGETTER(RemoteConsole)(console.asOutParam()); ComAssertComRC(rc); /* send passsword to console */ console->RemoveEncryptionPassword(Bstr(aId).raw()); } if (mData->mAccessible && mData->mstrKeyStore.isNotEmpty() && mData->mstrKeyId == aId) { if (Global::IsOnlineOrTransient(mData->mMachineState)) return setError(VBOX_E_INVALID_VM_STATE, tr("The machine is in online or transient state")); alock.release(); autoCaller.release(); /* return because all passwords are purged when machine becomes inaccessible; */ return i_setInaccessible(); } if (mNvramStore.isNotNull()) mNvramStore->i_removePassword(aId); mData->mpKeyStore->deleteSecretKey(aId); return S_OK; #endif } HRESULT Machine::clearAllEncryptionPasswords(AutoCaller &autoCaller) { #ifndef VBOX_WITH_FULL_VM_ENCRYPTION RT_NOREF(autoCaller); return setError(VBOX_E_NOT_SUPPORTED, tr("Full VM encryption is not available with this build")); #else AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS); if (mData->mAccessible && mData->mstrKeyStore.isNotEmpty()) { if (Global::IsOnlineOrTransient(mData->mMachineState)) return setError(VBOX_E_INVALID_VM_STATE, tr("The machine is in online or transient state")); alock.release(); autoCaller.release(); /* return because all passwords are purged when machine becomes inaccessible; */ return i_setInaccessible(); } mNvramStore->i_removeAllPasswords(); mData->mpKeyStore->deleteAllSecretKeys(false, true); return S_OK; #endif } #ifdef VBOX_WITH_FULL_VM_ENCRYPTION HRESULT Machine::i_setInaccessible() { if (!mData->mAccessible) return S_OK; AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS); VirtualBox *pParent = mParent; com::Utf8Str strConfigFile = mData->m_strConfigFile; Guid id(i_getId()); alock.release(); uninit(); HRESULT rc = initFromSettings(pParent, strConfigFile, &id, com::Utf8Str()); alock.acquire(); mParent->i_onMachineStateChanged(mData->mUuid, mData->mMachineState); return rc; } #endif /* This isn't handled entirely by the wrapper generator yet. */ #ifdef VBOX_WITH_XPCOM NS_DECL_CLASSINFO(SessionMachine) NS_IMPL_THREADSAFE_ISUPPORTS2_CI(SessionMachine, IMachine, IInternalMachineControl) NS_DECL_CLASSINFO(SnapshotMachine) NS_IMPL_THREADSAFE_ISUPPORTS1_CI(SnapshotMachine, IMachine) #endif