ConsoleImpl2.cpp revision a9315925c69e4c3bb342bb317ca5b6d29e1ee467
/* $Id$ */
/** @file
* VBox Console COM Class implementation - VM Configuration Bits.
*
* @remark We've split out the code that the 64-bit VC++ v8 compiler finds
* problematic to optimize so we can disable optimizations and later,
* perhaps, find a real solution for it (like rewriting the code and
* to stop resemble a tonne of spaghetti).
*/
/*
* Copyright (C) 2006-2012 Oracle Corporation
*
* This file is part of VirtualBox Open Source Edition (OSE), as
* available from http://www.virtualbox.org. This file is free software;
* you can redistribute it and/or modify it under the terms of the GNU
* General Public License (GPL) as published by the Free Software
* Foundation, in version 2 as it comes in the "COPYING" file of the
* VirtualBox OSE distribution. VirtualBox OSE is distributed in the
* hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
*/
/*******************************************************************************
* Header Files *
*******************************************************************************/
// for some reason Windows burns in sdk\...\winsock.h if this isn't included first
#include "VBox/com/ptr.h"
#include "ConsoleImpl.h"
#include "DisplayImpl.h"
#ifdef VBOX_WITH_GUEST_CONTROL
# include "GuestImpl.h"
#endif
#ifdef VBOX_WITH_DRAG_AND_DROP
# include "GuestDnDImpl.h"
#endif
#include "VMMDev.h"
#include "Global.h"
#ifdef VBOX_WITH_PCI_PASSTHROUGH
# include "PciRawDevImpl.h"
#endif
// generated header
#include "SchemaDefs.h"
#include "AutoCaller.h"
#include "Logging.h"
#include <iprt/buildconfig.h>
#include <iprt/ctype.h>
#include <iprt/dir.h>
#include <iprt/file.h>
#include <iprt/param.h>
#include <iprt/path.h>
#include <iprt/string.h>
#include <iprt/system.h>
#include <iprt/cpp/exception.h>
#if 0 /* enable to play with lots of memory. */
# include <iprt/env.h>
#endif
#include <iprt/stream.h>
#include <VBox/vmm/vmapi.h>
#include <VBox/err.h>
#include <VBox/param.h>
#include <VBox/vmm/pdmapi.h> /* For PDMR3DriverAttach/PDMR3DriverDetach */
#include <VBox/version.h>
#include <VBox/HostServices/VBoxClipboardSvc.h>
#ifdef VBOX_WITH_CROGL
# include <VBox/HostServices/VBoxCrOpenGLSvc.h>
#endif
#ifdef VBOX_WITH_GUEST_PROPS
# include <VBox/HostServices/GuestPropertySvc.h>
# include <VBox/com/defs.h>
# include <VBox/com/array.h>
# include "HGCM.h" /** @todo it should be possible to register a service
* extension using a VMMDev callback. */
# include <vector>
#endif /* VBOX_WITH_GUEST_PROPS */
#include <VBox/intnet.h>
#include <VBox/com/com.h>
#include <VBox/com/string.h>
#include <VBox/com/array.h>
#ifdef VBOX_WITH_NETFLT
# if defined(RT_OS_SOLARIS)
# include <zone.h>
# elif defined(RT_OS_LINUX)
# include <unistd.h>
# include <sys/ioctl.h>
# include <sys/socket.h>
# include <linux/types.h>
# include <linux/if.h>
# include <linux/wireless.h>
# elif defined(RT_OS_FREEBSD)
# include <unistd.h>
# include <sys/types.h>
# include <sys/ioctl.h>
# include <sys/socket.h>
# include <net/if.h>
# include <net80211/ieee80211_ioctl.h>
# endif
# if defined(RT_OS_WINDOWS)
# include <VBox/VBoxNetCfg-win.h>
# include <Ntddndis.h>
# include <devguid.h>
# else
# include <HostNetworkInterfaceImpl.h>
# include <netif.h>
# include <stdlib.h>
# endif
#endif /* VBOX_WITH_NETFLT */
#include "DHCPServerRunner.h"
#include "BusAssignmentManager.h"
#ifdef VBOX_WITH_EXTPACK
# include "ExtPackManagerImpl.h"
#endif
#if defined(RT_OS_DARWIN)
# include "IOKit/IOKitLib.h"
static int DarwinSmcKey(char *pabKey, uint32_t cbKey)
{
/*
* Method as described in Amit Singh's article:
* http://osxbook.com/book/bonus/chapter7/tpmdrmmyth/
*/
typedef struct
{
uint32_t key;
uint8_t pad0[22];
uint32_t datasize;
uint8_t pad1[10];
uint8_t cmd;
uint32_t pad2;
uint8_t data[32];
} AppleSMCBuffer;
AssertReturn(cbKey >= 65, VERR_INTERNAL_ERROR);
io_service_t service = IOServiceGetMatchingService(kIOMasterPortDefault,
IOServiceMatching("AppleSMC"));
if (!service)
return VERR_NOT_FOUND;
io_connect_t port = (io_connect_t)0;
kern_return_t kr = IOServiceOpen(service, mach_task_self(), 0, &port);
IOObjectRelease(service);
if (kr != kIOReturnSuccess)
return RTErrConvertFromDarwin(kr);
AppleSMCBuffer inputStruct = { 0, {0}, 32, {0}, 5, };
AppleSMCBuffer outputStruct;
size_t cbOutputStruct = sizeof(outputStruct);
for (int i = 0; i < 2; i++)
{
inputStruct.key = (uint32_t)((i == 0) ? 'OSK0' : 'OSK1');
kr = IOConnectCallStructMethod((mach_port_t)port,
(uint32_t)2,
(const void *)&inputStruct,
sizeof(inputStruct),
(void *)&outputStruct,
&cbOutputStruct);
if (kr != kIOReturnSuccess)
{
IOServiceClose(port);
return RTErrConvertFromDarwin(kr);
}
for (int j = 0; j < 32; j++)
pabKey[j + i*32] = outputStruct.data[j];
}
IOServiceClose(port);
pabKey[64] = 0;
return VINF_SUCCESS;
}
#endif /* RT_OS_DARWIN */
/* Darwin compile kludge */
#undef PVM
/* Comment out the following line to remove VMWare compatibility hack. */
#define VMWARE_NET_IN_SLOT_11
/**
* Translate IDE StorageControllerType_T to string representation.
*/
const char* controllerString(StorageControllerType_T enmType)
{
switch (enmType)
{
case StorageControllerType_PIIX3:
return "PIIX3";
case StorageControllerType_PIIX4:
return "PIIX4";
case StorageControllerType_ICH6:
return "ICH6";
default:
return "Unknown";
}
}
/**
* Simple class for storing network boot information.
*/
struct BootNic
{
ULONG mInstance;
PciBusAddress mPciAddress;
ULONG mBootPrio;
bool operator < (const BootNic &rhs) const
{
ULONG lval = mBootPrio - 1; /* 0 will wrap around and get the lowest priority. */
ULONG rval = rhs.mBootPrio - 1;
return lval < rval; /* Zero compares as highest number (lowest prio). */
}
};
static int findEfiRom(IVirtualBox* vbox, FirmwareType_T aFirmwareType, Utf8Str *pEfiRomFile)
{
Bstr aFilePath, empty;
BOOL fPresent = FALSE;
HRESULT hrc = vbox->CheckFirmwarePresent(aFirmwareType, empty.raw(),
empty.asOutParam(), aFilePath.asOutParam(), &fPresent);
AssertComRCReturn(hrc, Global::vboxStatusCodeFromCOM(hrc));
if (!fPresent)
{
LogRel(("Failed to find an EFI ROM file.\n"));
return VERR_FILE_NOT_FOUND;
}
*pEfiRomFile = Utf8Str(aFilePath);
return VINF_SUCCESS;
}
static int getSmcDeviceKey(IMachine *pMachine, BSTR *aKey, bool *pfGetKeyFromRealSMC)
{
*pfGetKeyFromRealSMC = false;
/*
* The extra data takes precedence (if non-zero).
*/
HRESULT hrc = pMachine->GetExtraData(Bstr("VBoxInternal2/SmcDeviceKey").raw(),
aKey);
if (FAILED(hrc))
return Global::vboxStatusCodeFromCOM(hrc);
if ( SUCCEEDED(hrc)
&& *aKey
&& **aKey)
return VINF_SUCCESS;
#ifdef RT_OS_DARWIN
/*
* Query it here and now.
*/
char abKeyBuf[65];
int rc = DarwinSmcKey(abKeyBuf, sizeof(abKeyBuf));
if (SUCCEEDED(rc))
{
Bstr(abKeyBuf).detachTo(aKey);
return rc;
}
LogRel(("Warning: DarwinSmcKey failed with rc=%Rrc!\n", rc));
#else
/*
* Is it apple hardware in bootcamp?
*/
/** @todo implement + test RTSYSDMISTR_MANUFACTURER on all hosts.
* Currently falling back on the product name. */
char szManufacturer[256];
szManufacturer[0] = '\0';
RTSystemQueryDmiString(RTSYSDMISTR_MANUFACTURER, szManufacturer, sizeof(szManufacturer));
if (szManufacturer[0] != '\0')
{
if ( !strcmp(szManufacturer, "Apple Computer, Inc.")
|| !strcmp(szManufacturer, "Apple Inc.")
)
*pfGetKeyFromRealSMC = true;
}
else
{
char szProdName[256];
szProdName[0] = '\0';
RTSystemQueryDmiString(RTSYSDMISTR_PRODUCT_NAME, szProdName, sizeof(szProdName));
if ( ( !strncmp(szProdName, "Mac", 3)
|| !strncmp(szProdName, "iMac", 4)
|| !strncmp(szProdName, "iMac", 4)
|| !strncmp(szProdName, "Xserve", 6)
)
&& !strchr(szProdName, ' ') /* no spaces */
&& RT_C_IS_DIGIT(szProdName[strlen(szProdName) - 1]) /* version number */
)
*pfGetKeyFromRealSMC = true;
}
int rc = VINF_SUCCESS;
#endif
return rc;
}
/*
* VC++ 8 / amd64 has some serious trouble with the next functions.
* As a temporary measure, we'll drop global optimizations.
*/
#if defined(_MSC_VER) && defined(RT_ARCH_AMD64)
# pragma optimize("g", off)
#endif
static const char *const g_apszIDEDrives[4] =
{ "PrimaryMaster", "PrimarySlave", "SecondaryMaster", "SecondarySlave" };
class ConfigError : public RTCError
{
public:
ConfigError(const char *pcszFunction,
int vrc,
const char *pcszName)
: RTCError(Utf8StrFmt("%s failed: rc=%Rrc, pcszName=%s", pcszFunction, vrc, pcszName)),
m_vrc(vrc)
{
AssertMsgFailed(("%s\n", what())); // in strict mode, hit a breakpoint here
}
int m_vrc;
};
/**
* Helper that calls CFGMR3InsertString and throws an RTCError if that
* fails (C-string variant).
* @param pParent See CFGMR3InsertStringN.
* @param pcszNodeName See CFGMR3InsertStringN.
* @param pcszValue The string value.
*/
static void InsertConfigString(PCFGMNODE pNode,
const char *pcszName,
const char *pcszValue)
{
int vrc = CFGMR3InsertString(pNode,
pcszName,
pcszValue);
if (RT_FAILURE(vrc))
throw ConfigError("CFGMR3InsertString", vrc, pcszName);
}
/**
* Helper that calls CFGMR3InsertString and throws an RTCError if that
* fails (Utf8Str variant).
* @param pParent See CFGMR3InsertStringN.
* @param pcszNodeName See CFGMR3InsertStringN.
* @param rStrValue The string value.
*/
static void InsertConfigString(PCFGMNODE pNode,
const char *pcszName,
const Utf8Str &rStrValue)
{
int vrc = CFGMR3InsertStringN(pNode,
pcszName,
rStrValue.c_str(),
rStrValue.length());
if (RT_FAILURE(vrc))
throw ConfigError("CFGMR3InsertStringLengthKnown", vrc, pcszName);
}
/**
* Helper that calls CFGMR3InsertString and throws an RTCError if that
* fails (Bstr variant).
*
* @param pParent See CFGMR3InsertStringN.
* @param pcszNodeName See CFGMR3InsertStringN.
* @param rBstrValue The string value.
*/
static void InsertConfigString(PCFGMNODE pNode,
const char *pcszName,
const Bstr &rBstrValue)
{
InsertConfigString(pNode, pcszName, Utf8Str(rBstrValue));
}
/**
* Helper that calls CFGMR3InsertBytes and throws an RTCError if that fails.
*
* @param pNode See CFGMR3InsertBytes.
* @param pcszName See CFGMR3InsertBytes.
* @param pvBytes See CFGMR3InsertBytes.
* @param cbBytes See CFGMR3InsertBytes.
*/
static void InsertConfigBytes(PCFGMNODE pNode,
const char *pcszName,
const void *pvBytes,
size_t cbBytes)
{
int vrc = CFGMR3InsertBytes(pNode,
pcszName,
pvBytes,
cbBytes);
if (RT_FAILURE(vrc))
throw ConfigError("CFGMR3InsertBytes", vrc, pcszName);
}
/**
* Helper that calls CFGMR3InsertInteger and throws an RTCError if that
* fails.
*
* @param pNode See CFGMR3InsertInteger.
* @param pcszName See CFGMR3InsertInteger.
* @param u64Integer See CFGMR3InsertInteger.
*/
static void InsertConfigInteger(PCFGMNODE pNode,
const char *pcszName,
uint64_t u64Integer)
{
int vrc = CFGMR3InsertInteger(pNode,
pcszName,
u64Integer);
if (RT_FAILURE(vrc))
throw ConfigError("CFGMR3InsertInteger", vrc, pcszName);
}
/**
* Helper that calls CFGMR3InsertNode and throws an RTCError if that fails.
*
* @param pNode See CFGMR3InsertNode.
* @param pcszName See CFGMR3InsertNode.
* @param ppChild See CFGMR3InsertNode.
*/
static void InsertConfigNode(PCFGMNODE pNode,
const char *pcszName,
PCFGMNODE *ppChild)
{
int vrc = CFGMR3InsertNode(pNode, pcszName, ppChild);
if (RT_FAILURE(vrc))
throw ConfigError("CFGMR3InsertNode", vrc, pcszName);
}
/**
* Helper that calls CFGMR3RemoveValue and throws an RTCError if that fails.
*
* @param pNode See CFGMR3RemoveValue.
* @param pcszName See CFGMR3RemoveValue.
*/
static void RemoveConfigValue(PCFGMNODE pNode,
const char *pcszName)
{
int vrc = CFGMR3RemoveValue(pNode, pcszName);
if (RT_FAILURE(vrc))
throw ConfigError("CFGMR3RemoveValue", vrc, pcszName);
}
#ifdef VBOX_WITH_PCI_PASSTHROUGH
HRESULT Console::attachRawPciDevices(PVM pVM,
BusAssignmentManager *BusMgr,
PCFGMNODE pDevices)
{
HRESULT hrc = S_OK;
PCFGMNODE pInst, pCfg, pLunL0, pLunL1;
SafeIfaceArray<IPciDeviceAttachment> assignments;
ComPtr<IMachine> aMachine = machine();
hrc = aMachine->COMGETTER(PciDeviceAssignments)(ComSafeArrayAsOutParam(assignments));
if ( hrc != S_OK
|| assignments.size() < 1)
return hrc;
/*
* PCI passthrough is only available if the proper ExtPack is installed.
*
* Note. Configuring PCI passthrough here and providing messages about
* the missing extpack isn't exactly clean, but it is a necessary evil
* to patch over legacy compatability issues introduced by the new
* distribution model.
*/
# ifdef VBOX_WITH_EXTPACK
static const char *s_pszPciRawExtPackName = "Oracle VM VirtualBox Extension Pack";
if (!mptrExtPackManager->isExtPackUsable(s_pszPciRawExtPackName))
{
/* Always fatal! */
return VMSetError(pVM, VERR_NOT_FOUND, RT_SRC_POS,
N_("Implementation of the PCI passthrough framework not found!\n"
"The VM cannot be started. To fix this problem, either "
"install the '%s' or disable PCI passthrough via VBoxManage"),
s_pszPciRawExtPackName);
}
# endif
PCFGMNODE pBridges = CFGMR3GetChild(pDevices, "ich9pcibridge");
Assert(pBridges);
/* Find required bridges, and add missing ones */
for (size_t iDev = 0; iDev < assignments.size(); iDev++)
{
ComPtr<IPciDeviceAttachment> assignment = assignments[iDev];
LONG guest = 0;
PciBusAddress GuestPciAddress;
assignment->COMGETTER(GuestAddress)(&guest);
GuestPciAddress.fromLong(guest);
Assert(GuestPciAddress.valid());
if (GuestPciAddress.miBus > 0)
{
int iBridgesMissed = 0;
int iBase = GuestPciAddress.miBus - 1;
while (!BusMgr->hasPciDevice("ich9pcibridge", iBase) && iBase > 0)
{
iBridgesMissed++; iBase--;
}
iBase++;
for (int iBridge = 0; iBridge < iBridgesMissed; iBridge++)
{
InsertConfigNode(pBridges, Utf8StrFmt("%d", iBase + iBridge).c_str(), &pInst);
InsertConfigInteger(pInst, "Trusted", 1);
hrc = BusMgr->assignPciDevice("ich9pcibridge", pInst);
}
}
}
/* Now actually add devices */
PCFGMNODE pPciDevs = NULL;
if (assignments.size() > 0)
{
InsertConfigNode(pDevices, "pciraw", &pPciDevs);
PCFGMNODE pRoot = CFGMR3GetParent(pDevices); Assert(pRoot);
/* Tell PGM to tell GPciRaw about guest mappings. */
CFGMR3InsertNode(pRoot, "PGM", NULL);
InsertConfigInteger(CFGMR3GetChild(pRoot, "PGM"), "PciPassThrough", 1);
/*
* Currently, using IOMMU needed for PCI passthrough
* requires RAM preallocation.
*/
/** @todo: check if we can lift this requirement */
CFGMR3RemoveValue(pRoot, "RamPreAlloc");
InsertConfigInteger(pRoot, "RamPreAlloc", 1);
}
for (size_t iDev = 0; iDev < assignments.size(); iDev++)
{
PciBusAddress HostPciAddress, GuestPciAddress;
ComPtr<IPciDeviceAttachment> assignment = assignments[iDev];
LONG host, guest;
Bstr aDevName;
assignment->COMGETTER(HostAddress)(&host);
assignment->COMGETTER(GuestAddress)(&guest);
assignment->COMGETTER(Name)(aDevName.asOutParam());
InsertConfigNode(pPciDevs, Utf8StrFmt("%d", iDev).c_str(), &pInst);
InsertConfigInteger(pInst, "Trusted", 1);
HostPciAddress.fromLong(host);
Assert(HostPciAddress.valid());
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigString(pCfg, "DeviceName", aDevName);
InsertConfigInteger(pCfg, "DetachHostDriver", 1);
InsertConfigInteger(pCfg, "HostPCIBusNo", HostPciAddress.miBus);
InsertConfigInteger(pCfg, "HostPCIDeviceNo", HostPciAddress.miDevice);
InsertConfigInteger(pCfg, "HostPCIFunctionNo", HostPciAddress.miFn);
GuestPciAddress.fromLong(guest);
Assert(GuestPciAddress.valid());
hrc = BusMgr->assignHostPciDevice("pciraw", pInst, HostPciAddress, GuestPciAddress, true);
if (hrc != S_OK)
return hrc;
InsertConfigInteger(pCfg, "GuestPCIBusNo", GuestPciAddress.miBus);
InsertConfigInteger(pCfg, "GuestPCIDeviceNo", GuestPciAddress.miDevice);
InsertConfigInteger(pCfg, "GuestPCIFunctionNo", GuestPciAddress.miFn);
/* the driver */
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "pciraw");
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL1);
/* the Main driver */
InsertConfigString(pLunL1, "Driver", "MainPciRaw");
InsertConfigNode(pLunL1, "Config", &pCfg);
PciRawDev* pMainDev = new PciRawDev(this);
InsertConfigInteger(pCfg, "Object", (uintptr_t)pMainDev);
}
return hrc;
}
#endif
void Console::attachStatusDriver(PCFGMNODE pCtlInst, PPDMLED *papLeds,
uint64_t uFirst, uint64_t uLast,
Console::MediumAttachmentMap *pmapMediumAttachments,
const char *pcszDevice, unsigned uInstance)
{
PCFGMNODE pLunL0, pCfg;
InsertConfigNode(pCtlInst, "LUN#999", &pLunL0);
InsertConfigString(pLunL0, "Driver", "MainStatus");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigInteger(pCfg, "papLeds", (uintptr_t)papLeds);
if (pmapMediumAttachments)
{
InsertConfigInteger(pCfg, "pmapMediumAttachments", (uintptr_t)pmapMediumAttachments);
InsertConfigInteger(pCfg, "pConsole", (uintptr_t)this);
AssertPtr(pcszDevice);
Utf8Str deviceInstance = Utf8StrFmt("%s/%u", pcszDevice, uInstance);
InsertConfigString(pCfg, "DeviceInstance", deviceInstance.c_str());
}
InsertConfigInteger(pCfg, "First", uFirst);
InsertConfigInteger(pCfg, "Last", uLast);
}
/**
* Construct the VM configuration tree (CFGM).
*
* This is a callback for VMR3Create() call. It is called from CFGMR3Init()
* in the emulation thread (EMT). Any per thread COM/XPCOM initialization
* is done here.
*
* @param pVM VM handle.
* @param pvConsole Pointer to the VMPowerUpTask object.
* @return VBox status code.
*
* @note Locks the Console object for writing.
*/
DECLCALLBACK(int) Console::configConstructor(PVM pVM, void *pvConsole)
{
LogFlowFuncEnter();
AssertReturn(pvConsole, VERR_GENERAL_FAILURE);
ComObjPtr<Console> pConsole = static_cast<Console *>(pvConsole);
AutoCaller autoCaller(pConsole);
AssertComRCReturn(autoCaller.rc(), VERR_ACCESS_DENIED);
/* lock the console because we widely use internal fields and methods */
AutoWriteLock alock(pConsole COMMA_LOCKVAL_SRC_POS);
/*
* Set the VM handle and do the rest of the job in an worker method so we
* can easily reset the VM handle on failure.
*/
PUVM pUVM = pConsole->mpUVM = VMR3GetUVM(pVM);
VMR3RetainUVM(pUVM);
int vrc;
try
{
vrc = pConsole->configConstructorInner(pVM, &alock);
}
catch (...)
{
vrc = VERR_UNEXPECTED_EXCEPTION;
}
if (RT_FAILURE(vrc))
{
pConsole->mpUVM = NULL;
VMR3ReleaseUVM(pUVM);
}
return vrc;
}
/**
* Worker for configConstructor.
*
* @return VBox status code.
* @param pVM The VM handle.
* @param pAlock The automatic lock instance. This is for when we have
* to leave it in order to avoid deadlocks (ext packs and
* more).
*/
int Console::configConstructorInner(PVM pVM, AutoWriteLock *pAlock)
{
VMMDev *pVMMDev = m_pVMMDev;
Assert(pVMMDev);
ComPtr<IMachine> pMachine = machine();
int rc;
HRESULT hrc;
Bstr bstr;
#define H() AssertMsgReturn(!FAILED(hrc), ("hrc=%Rhrc\n", hrc), VERR_GENERAL_FAILURE)
/*
* Get necessary objects and frequently used parameters.
*/
ComPtr<IVirtualBox> virtualBox;
hrc = pMachine->COMGETTER(Parent)(virtualBox.asOutParam()); H();
ComPtr<IHost> host;
hrc = virtualBox->COMGETTER(Host)(host.asOutParam()); H();
ComPtr<ISystemProperties> systemProperties;
hrc = virtualBox->COMGETTER(SystemProperties)(systemProperties.asOutParam()); H();
ComPtr<IBIOSSettings> biosSettings;
hrc = pMachine->COMGETTER(BIOSSettings)(biosSettings.asOutParam()); H();
hrc = pMachine->COMGETTER(HardwareUUID)(bstr.asOutParam()); H();
RTUUID HardwareUuid;
rc = RTUuidFromUtf16(&HardwareUuid, bstr.raw());
AssertRCReturn(rc, rc);
ULONG cRamMBs;
hrc = pMachine->COMGETTER(MemorySize)(&cRamMBs); H();
#if 0 /* enable to play with lots of memory. */
if (RTEnvExist("VBOX_RAM_SIZE"))
cRamMBs = RTStrToUInt64(RTEnvGet("VBOX_RAM_SIZE"));
#endif
uint64_t const cbRam = cRamMBs * (uint64_t)_1M;
uint32_t cbRamHole = MM_RAM_HOLE_SIZE_DEFAULT;
uint64_t uMcfgBase = 0;
uint32_t cbMcfgLength = 0;
ChipsetType_T chipsetType;
hrc = pMachine->COMGETTER(ChipsetType)(&chipsetType); H();
if (chipsetType == ChipsetType_ICH9)
{
/* We'd better have 0x10000000 region, to cover 256 buses
but this put too much load on hypervisor heap */
cbMcfgLength = 0x4000000; //0x10000000;
cbRamHole += cbMcfgLength;
uMcfgBase = _4G - cbRamHole;
}
BusAssignmentManager* BusMgr = mBusMgr = BusAssignmentManager::createInstance(chipsetType);
ULONG cCpus = 1;
hrc = pMachine->COMGETTER(CPUCount)(&cCpus); H();
ULONG ulCpuExecutionCap = 100;
hrc = pMachine->COMGETTER(CPUExecutionCap)(&ulCpuExecutionCap); H();
Bstr osTypeId;
hrc = pMachine->COMGETTER(OSTypeId)(osTypeId.asOutParam()); H();
BOOL fIOAPIC;
hrc = biosSettings->COMGETTER(IOAPICEnabled)(&fIOAPIC); H();
ComPtr<IGuestOSType> guestOSType;
hrc = virtualBox->GetGuestOSType(osTypeId.raw(), guestOSType.asOutParam()); H();
Bstr guestTypeFamilyId;
hrc = guestOSType->COMGETTER(FamilyId)(guestTypeFamilyId.asOutParam()); H();
BOOL fOsXGuest = guestTypeFamilyId == Bstr("MacOS");
ULONG maxNetworkAdapters;
hrc = systemProperties->GetMaxNetworkAdapters(chipsetType, &maxNetworkAdapters); H();
/*
* Get root node first.
* This is the only node in the tree.
*/
PCFGMNODE pRoot = CFGMR3GetRoot(pVM);
Assert(pRoot);
// InsertConfigString throws
try
{
/*
* Set the root (and VMM) level values.
*/
hrc = pMachine->COMGETTER(Name)(bstr.asOutParam()); H();
InsertConfigString(pRoot, "Name", bstr);
InsertConfigBytes(pRoot, "UUID", &HardwareUuid, sizeof(HardwareUuid));
InsertConfigInteger(pRoot, "RamSize", cbRam);
InsertConfigInteger(pRoot, "RamHoleSize", cbRamHole);
InsertConfigInteger(pRoot, "NumCPUs", cCpus);
InsertConfigInteger(pRoot, "CpuExecutionCap", ulCpuExecutionCap);
InsertConfigInteger(pRoot, "TimerMillies", 10);
#ifdef VBOX_WITH_RAW_MODE
InsertConfigInteger(pRoot, "RawR3Enabled", 1); /* boolean */
InsertConfigInteger(pRoot, "RawR0Enabled", 1); /* boolean */
/** @todo Config: RawR0, PATMEnabled and CSAMEnabled needs attention later. */
InsertConfigInteger(pRoot, "PATMEnabled", 1); /* boolean */
InsertConfigInteger(pRoot, "CSAMEnabled", 1); /* boolean */
#endif
/* Not necessary, but to make sure these two settings end up in the release log. */
BOOL fPageFusion = FALSE;
hrc = pMachine->COMGETTER(PageFusionEnabled)(&fPageFusion); H();
InsertConfigInteger(pRoot, "PageFusion", fPageFusion); /* boolean */
ULONG ulBalloonSize = 0;
hrc = pMachine->COMGETTER(MemoryBalloonSize)(&ulBalloonSize); H();
InsertConfigInteger(pRoot, "MemBalloonSize", ulBalloonSize);
/*
* CPUM values.
*/
PCFGMNODE pCPUM;
InsertConfigNode(pRoot, "CPUM", &pCPUM);
/* cpuid leaf overrides. */
static uint32_t const s_auCpuIdRanges[] =
{
UINT32_C(0x00000000), UINT32_C(0x0000000a),
UINT32_C(0x80000000), UINT32_C(0x8000000a)
};
for (unsigned i = 0; i < RT_ELEMENTS(s_auCpuIdRanges); i += 2)
for (uint32_t uLeaf = s_auCpuIdRanges[i]; uLeaf < s_auCpuIdRanges[i + 1]; uLeaf++)
{
ULONG ulEax, ulEbx, ulEcx, ulEdx;
hrc = pMachine->GetCPUIDLeaf(uLeaf, &ulEax, &ulEbx, &ulEcx, &ulEdx);
if (SUCCEEDED(hrc))
{
PCFGMNODE pLeaf;
InsertConfigNode(pCPUM, Utf8StrFmt("HostCPUID/%RX32", uLeaf).c_str(), &pLeaf);
InsertConfigInteger(pLeaf, "eax", ulEax);
InsertConfigInteger(pLeaf, "ebx", ulEbx);
InsertConfigInteger(pLeaf, "ecx", ulEcx);
InsertConfigInteger(pLeaf, "edx", ulEdx);
}
else if (hrc != E_INVALIDARG) H();
}
/* We must limit CPUID count for Windows NT 4, as otherwise it stops
with error 0x3e (MULTIPROCESSOR_CONFIGURATION_NOT_SUPPORTED). */
if (osTypeId == "WindowsNT4")
{
LogRel(("Limiting CPUID leaf count for NT4 guests\n"));
InsertConfigInteger(pCPUM, "NT4LeafLimit", true);
}
/* Expose extended MWAIT features to Mac OS X guests. */
if (fOsXGuest)
{
LogRel(("Using MWAIT extensions\n"));
InsertConfigInteger(pCPUM, "MWaitExtensions", true);
}
/*
* Hardware virtualization extensions.
*/
BOOL fHWVirtExEnabled;
BOOL fHwVirtExtForced = false;
#ifdef VBOX_WITH_RAW_MODE
hrc = pMachine->GetHWVirtExProperty(HWVirtExPropertyType_Enabled, &fHWVirtExEnabled); H();
if (cCpus > 1) /** @todo SMP: This isn't nice, but things won't work on mac otherwise. */
fHWVirtExEnabled = TRUE;
# ifdef RT_OS_DARWIN
fHwVirtExtForced = fHWVirtExEnabled;
# else
/* - With more than 4GB PGM will use different RAMRANGE sizes for raw
mode and hv mode to optimize lookup times.
- With more than one virtual CPU, raw-mode isn't a fallback option. */
fHwVirtExtForced = fHWVirtExEnabled
&& ( cbRam + cbRamHole > _4G
|| cCpus > 1);
# endif
#else /* !VBOX_WITH_RAW_MODE */
fHWVirtExEnabled = fHwVirtExtForced = true;
#endif /* !VBOX_WITH_RAW_MODE */
/* only honor the property value if there was no other reason to enable it */
if (!fHwVirtExtForced)
{
hrc = pMachine->GetHWVirtExProperty(HWVirtExPropertyType_Force, &fHwVirtExtForced); H();
}
InsertConfigInteger(pRoot, "HwVirtExtForced", fHwVirtExtForced);
/*
* MM values.
*/
PCFGMNODE pMM;
InsertConfigNode(pRoot, "MM", &pMM);
InsertConfigInteger(pMM, "CanUseLargerHeap", chipsetType == ChipsetType_ICH9);
/*
* Hardware virtualization settings.
*/
BOOL fIsGuest64Bit = false;
PCFGMNODE pHWVirtExt;
InsertConfigNode(pRoot, "HWVirtExt", &pHWVirtExt);
if (fHWVirtExEnabled)
{
InsertConfigInteger(pHWVirtExt, "Enabled", 1);
/* Indicate whether 64-bit guests are supported or not. */
/** @todo This is currently only forced off on 32-bit hosts only because it
* makes a lof of difference there (REM and Solaris performance).
*/
BOOL fSupportsLongMode = false;
hrc = host->GetProcessorFeature(ProcessorFeature_LongMode,
&fSupportsLongMode); H();
hrc = guestOSType->COMGETTER(Is64Bit)(&fIsGuest64Bit); H();
if (fSupportsLongMode && fIsGuest64Bit)
{
InsertConfigInteger(pHWVirtExt, "64bitEnabled", 1);
#if ARCH_BITS == 32 /* The recompiler must use VBoxREM64 (32-bit host only). */
PCFGMNODE pREM;
InsertConfigNode(pRoot, "REM", &pREM);
InsertConfigInteger(pREM, "64bitEnabled", 1);
#endif
}
#if ARCH_BITS == 32 /* 32-bit guests only. */
else
{
InsertConfigInteger(pHWVirtExt, "64bitEnabled", 0);
}
#endif
/** @todo Not exactly pretty to check strings; VBOXOSTYPE would be better, but that requires quite a bit of API change in Main. */
if ( !fIsGuest64Bit
&& fIOAPIC
&& ( osTypeId == "WindowsNT4"
|| osTypeId == "Windows2000"
|| osTypeId == "WindowsXP"
|| osTypeId == "Windows2003"))
{
/* Only allow TPR patching for NT, Win2k, XP and Windows Server 2003. (32 bits mode)
* We may want to consider adding more guest OSes (Solaris) later on.
*/
InsertConfigInteger(pHWVirtExt, "TPRPatchingEnabled", 1);
}
}
/* HWVirtEx exclusive mode */
BOOL fHWVirtExExclusive = true;
hrc = pMachine->GetHWVirtExProperty(HWVirtExPropertyType_Exclusive, &fHWVirtExExclusive); H();
InsertConfigInteger(pHWVirtExt, "Exclusive", fHWVirtExExclusive);
/* Nested paging (VT-x/AMD-V) */
BOOL fEnableNestedPaging = false;
hrc = pMachine->GetHWVirtExProperty(HWVirtExPropertyType_NestedPaging, &fEnableNestedPaging); H();
InsertConfigInteger(pHWVirtExt, "EnableNestedPaging", fEnableNestedPaging);
/* Large pages; requires nested paging */
BOOL fEnableLargePages = false;
hrc = pMachine->GetHWVirtExProperty(HWVirtExPropertyType_LargePages, &fEnableLargePages); H();
InsertConfigInteger(pHWVirtExt, "EnableLargePages", fEnableLargePages);
/* VPID (VT-x) */
BOOL fEnableVPID = false;
hrc = pMachine->GetHWVirtExProperty(HWVirtExPropertyType_VPID, &fEnableVPID); H();
InsertConfigInteger(pHWVirtExt, "EnableVPID", fEnableVPID);
/* Physical Address Extension (PAE) */
BOOL fEnablePAE = false;
hrc = pMachine->GetCPUProperty(CPUPropertyType_PAE, &fEnablePAE); H();
InsertConfigInteger(pRoot, "EnablePAE", fEnablePAE);
/* Synthetic CPU */
BOOL fSyntheticCpu = false;
hrc = pMachine->GetCPUProperty(CPUPropertyType_Synthetic, &fSyntheticCpu); H();
InsertConfigInteger(pCPUM, "SyntheticCpu", fSyntheticCpu);
BOOL fPXEDebug;
hrc = biosSettings->COMGETTER(PXEDebugEnabled)(&fPXEDebug); H();
/*
* PDM config.
* Load drivers in VBoxC.[so|dll]
*/
PCFGMNODE pPDM;
PCFGMNODE pNode;
PCFGMNODE pMod;
InsertConfigNode(pRoot, "PDM", &pPDM);
InsertConfigNode(pPDM, "Devices", &pNode);
InsertConfigNode(pPDM, "Drivers", &pNode);
InsertConfigNode(pNode, "VBoxC", &pMod);
#ifdef VBOX_WITH_XPCOM
// VBoxC is located in the components subdirectory
char szPathVBoxC[RTPATH_MAX];
rc = RTPathAppPrivateArch(szPathVBoxC, RTPATH_MAX - sizeof("/components/VBoxC")); AssertRC(rc);
strcat(szPathVBoxC, "/components/VBoxC");
InsertConfigString(pMod, "Path", szPathVBoxC);
#else
InsertConfigString(pMod, "Path", "VBoxC");
#endif
/*
* Block cache settings.
*/
PCFGMNODE pPDMBlkCache;
InsertConfigNode(pPDM, "BlkCache", &pPDMBlkCache);
/* I/O cache size */
ULONG ioCacheSize = 5;
hrc = pMachine->COMGETTER(IoCacheSize)(&ioCacheSize); H();
InsertConfigInteger(pPDMBlkCache, "CacheSize", ioCacheSize * _1M);
/*
* Bandwidth groups.
*/
PCFGMNODE pAc;
PCFGMNODE pAcFile;
PCFGMNODE pAcFileBwGroups;
ComPtr<IBandwidthControl> bwCtrl;
com::SafeIfaceArray<IBandwidthGroup> bwGroups;
hrc = pMachine->COMGETTER(BandwidthControl)(bwCtrl.asOutParam()); H();
hrc = bwCtrl->GetAllBandwidthGroups(ComSafeArrayAsOutParam(bwGroups)); H();
InsertConfigNode(pPDM, "AsyncCompletion", &pAc);
InsertConfigNode(pAc, "File", &pAcFile);
InsertConfigNode(pAcFile, "BwGroups", &pAcFileBwGroups);
for (size_t i = 0; i < bwGroups.size(); i++)
{
Bstr strName;
ULONG cMaxMbPerSec;
BandwidthGroupType_T enmType;
hrc = bwGroups[i]->COMGETTER(Name)(strName.asOutParam()); H();
hrc = bwGroups[i]->COMGETTER(Type)(&enmType); H();
hrc = bwGroups[i]->COMGETTER(MaxMbPerSec)(&cMaxMbPerSec); H();
if (enmType == BandwidthGroupType_Disk)
{
PCFGMNODE pBwGroup;
InsertConfigNode(pAcFileBwGroups, Utf8Str(strName).c_str(), &pBwGroup);
InsertConfigInteger(pBwGroup, "Max", cMaxMbPerSec * _1M);
InsertConfigInteger(pBwGroup, "Start", cMaxMbPerSec * _1M);
InsertConfigInteger(pBwGroup, "Step", 0);
}
}
/*
* Devices
*/
PCFGMNODE pDevices = NULL; /* /Devices */
PCFGMNODE pDev = NULL; /* /Devices/Dev/ */
PCFGMNODE pInst = NULL; /* /Devices/Dev/0/ */
PCFGMNODE pCfg = NULL; /* /Devices/Dev/.../Config/ */
PCFGMNODE pLunL0 = NULL; /* /Devices/Dev/0/LUN#0/ */
PCFGMNODE pLunL1 = NULL; /* /Devices/Dev/0/LUN#0/AttachedDriver/ */
PCFGMNODE pLunL2 = NULL; /* /Devices/Dev/0/LUN#0/AttachedDriver/Config/ */
PCFGMNODE pBiosCfg = NULL; /* /Devices/pcbios/0/Config/ */
PCFGMNODE pNetBootCfg = NULL; /* /Devices/pcbios/0/Config/NetBoot/ */
InsertConfigNode(pRoot, "Devices", &pDevices);
/*
* PC Arch.
*/
InsertConfigNode(pDevices, "pcarch", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
InsertConfigNode(pInst, "Config", &pCfg);
/*
* The time offset
*/
LONG64 timeOffset;
hrc = biosSettings->COMGETTER(TimeOffset)(&timeOffset); H();
PCFGMNODE pTMNode;
InsertConfigNode(pRoot, "TM", &pTMNode);
InsertConfigInteger(pTMNode, "UTCOffset", timeOffset * 1000000);
/*
* DMA
*/
InsertConfigNode(pDevices, "8237A", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
/*
* PCI buses.
*/
uint32_t uIocPciAddress, uHbcPciAddress;
switch (chipsetType)
{
default:
Assert(false);
case ChipsetType_PIIX3:
InsertConfigNode(pDevices, "pci", &pDev);
uHbcPciAddress = (0x0 << 16) | 0;
uIocPciAddress = (0x1 << 16) | 0; // ISA controller
break;
case ChipsetType_ICH9:
InsertConfigNode(pDevices, "ich9pci", &pDev);
uHbcPciAddress = (0x1e << 16) | 0;
uIocPciAddress = (0x1f << 16) | 0; // LPC controller
break;
}
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigInteger(pCfg, "IOAPIC", fIOAPIC);
if (chipsetType == ChipsetType_ICH9)
{
/* Provide MCFG info */
InsertConfigInteger(pCfg, "McfgBase", uMcfgBase);
InsertConfigInteger(pCfg, "McfgLength", cbMcfgLength);
/* And register 2 bridges */
InsertConfigNode(pDevices, "ich9pcibridge", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
hrc = BusMgr->assignPciDevice("ich9pcibridge", pInst); H();
InsertConfigNode(pDev, "1", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
hrc = BusMgr->assignPciDevice("ich9pcibridge", pInst); H();
#ifdef VBOX_WITH_PCI_PASSTHROUGH
/* Add PCI passthrough devices */
hrc = attachRawPciDevices(pVM, BusMgr, pDevices); H();
#endif
}
/*
* Enable the following devices: HPET, SMC and LPC on MacOS X guests or on ICH9 chipset
*/
/*
* High Precision Event Timer (HPET)
*/
BOOL fHpetEnabled;
/* Other guests may wish to use HPET too, but MacOS X not functional without it */
hrc = pMachine->COMGETTER(HpetEnabled)(&fHpetEnabled); H();
/* so always enable HPET in extended profile */
fHpetEnabled |= fOsXGuest;
/* HPET is always present on ICH9 */
fHpetEnabled |= (chipsetType == ChipsetType_ICH9);
if (fHpetEnabled)
{
InsertConfigNode(pDevices, "hpet", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigInteger(pCfg, "ICH9", (chipsetType == ChipsetType_ICH9) ? 1 : 0); /* boolean */
}
/*
* System Management Controller (SMC)
*/
BOOL fSmcEnabled;
fSmcEnabled = fOsXGuest;
if (fSmcEnabled)
{
InsertConfigNode(pDevices, "smc", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
InsertConfigNode(pInst, "Config", &pCfg);
bool fGetKeyFromRealSMC;
Bstr bstrKey;
rc = getSmcDeviceKey(pMachine, bstrKey.asOutParam(), &fGetKeyFromRealSMC);
AssertRCReturn(rc, rc);
InsertConfigString(pCfg, "DeviceKey", bstrKey);
InsertConfigInteger(pCfg, "GetKeyFromRealSMC", fGetKeyFromRealSMC);
}
/*
* Low Pin Count (LPC) bus
*/
BOOL fLpcEnabled;
/** @todo: implement appropriate getter */
fLpcEnabled = fOsXGuest || (chipsetType == ChipsetType_ICH9);
if (fLpcEnabled)
{
InsertConfigNode(pDevices, "lpc", &pDev);
InsertConfigNode(pDev, "0", &pInst);
hrc = BusMgr->assignPciDevice("lpc", pInst); H();
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
}
BOOL fShowRtc;
fShowRtc = fOsXGuest || (chipsetType == ChipsetType_ICH9);
/*
* PS/2 keyboard & mouse.
*/
InsertConfigNode(pDevices, "pckbd", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "KeyboardQueue");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigInteger(pCfg, "QueueSize", 64);
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL1);
InsertConfigString(pLunL1, "Driver", "MainKeyboard");
InsertConfigNode(pLunL1, "Config", &pCfg);
Keyboard *pKeyboard = mKeyboard;
InsertConfigInteger(pCfg, "Object", (uintptr_t)pKeyboard);
InsertConfigNode(pInst, "LUN#1", &pLunL0);
InsertConfigString(pLunL0, "Driver", "MouseQueue");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigInteger(pCfg, "QueueSize", 128);
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL1);
InsertConfigString(pLunL1, "Driver", "MainMouse");
InsertConfigNode(pLunL1, "Config", &pCfg);
Mouse *pMouse = mMouse;
InsertConfigInteger(pCfg, "Object", (uintptr_t)pMouse);
/*
* i8254 Programmable Interval Timer And Dummy Speaker
*/
InsertConfigNode(pDevices, "i8254", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
#ifdef DEBUG
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
#endif
/*
* i8259 Programmable Interrupt Controller.
*/
InsertConfigNode(pDevices, "i8259", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
InsertConfigNode(pInst, "Config", &pCfg);
/*
* Advanced Programmable Interrupt Controller.
* SMP: Each CPU has a LAPIC, but we have a single device representing all LAPICs states,
* thus only single insert
*/
InsertConfigNode(pDevices, "apic", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigInteger(pCfg, "IOAPIC", fIOAPIC);
InsertConfigInteger(pCfg, "NumCPUs", cCpus);
if (fIOAPIC)
{
/*
* I/O Advanced Programmable Interrupt Controller.
*/
InsertConfigNode(pDevices, "ioapic", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigInteger(pCfg, "NumCPUs", cCpus);
}
/*
* RTC MC146818.
*/
InsertConfigNode(pDevices, "mc146818", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
BOOL fRTCUseUTC;
hrc = pMachine->COMGETTER(RTCUseUTC)(&fRTCUseUTC); H();
InsertConfigInteger(pCfg, "UseUTC", fRTCUseUTC ? 1 : 0);
/*
* VGA.
*/
InsertConfigNode(pDevices, "vga", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
hrc = BusMgr->assignPciDevice("vga", pInst); H();
InsertConfigNode(pInst, "Config", &pCfg);
ULONG cVRamMBs;
hrc = pMachine->COMGETTER(VRAMSize)(&cVRamMBs); H();
InsertConfigInteger(pCfg, "VRamSize", cVRamMBs * _1M);
ULONG cMonitorCount;
hrc = pMachine->COMGETTER(MonitorCount)(&cMonitorCount); H();
InsertConfigInteger(pCfg, "MonitorCount", cMonitorCount);
#ifdef VBOX_WITH_2X_4GB_ADDR_SPACE
InsertConfigInteger(pCfg, "R0Enabled", fHWVirtExEnabled);
#endif
/*
* BIOS logo
*/
BOOL fFadeIn;
hrc = biosSettings->COMGETTER(LogoFadeIn)(&fFadeIn); H();
InsertConfigInteger(pCfg, "FadeIn", fFadeIn ? 1 : 0);
BOOL fFadeOut;
hrc = biosSettings->COMGETTER(LogoFadeOut)(&fFadeOut); H();
InsertConfigInteger(pCfg, "FadeOut", fFadeOut ? 1: 0);
ULONG logoDisplayTime;
hrc = biosSettings->COMGETTER(LogoDisplayTime)(&logoDisplayTime); H();
InsertConfigInteger(pCfg, "LogoTime", logoDisplayTime);
Bstr logoImagePath;
hrc = biosSettings->COMGETTER(LogoImagePath)(logoImagePath.asOutParam()); H();
InsertConfigString(pCfg, "LogoFile", Utf8Str(!logoImagePath.isEmpty() ? logoImagePath : "") );
/*
* Boot menu
*/
BIOSBootMenuMode_T eBootMenuMode;
int iShowBootMenu;
biosSettings->COMGETTER(BootMenuMode)(&eBootMenuMode);
switch (eBootMenuMode)
{
case BIOSBootMenuMode_Disabled: iShowBootMenu = 0; break;
case BIOSBootMenuMode_MenuOnly: iShowBootMenu = 1; break;
default: iShowBootMenu = 2; break;
}
InsertConfigInteger(pCfg, "ShowBootMenu", iShowBootMenu);
/* Custom VESA mode list */
unsigned cModes = 0;
for (unsigned iMode = 1; iMode <= 16; ++iMode)
{
char szExtraDataKey[sizeof("CustomVideoModeXX")];
RTStrPrintf(szExtraDataKey, sizeof(szExtraDataKey), "CustomVideoMode%u", iMode);
hrc = pMachine->GetExtraData(Bstr(szExtraDataKey).raw(), bstr.asOutParam()); H();
if (bstr.isEmpty())
break;
InsertConfigString(pCfg, szExtraDataKey, bstr);
++cModes;
}
InsertConfigInteger(pCfg, "CustomVideoModes", cModes);
/* VESA height reduction */
ULONG ulHeightReduction;
IFramebuffer *pFramebuffer = getDisplay()->getFramebuffer();
if (pFramebuffer)
{
hrc = pFramebuffer->COMGETTER(HeightReduction)(&ulHeightReduction); H();
}
else
{
/* If framebuffer is not available, there is no height reduction. */
ulHeightReduction = 0;
}
InsertConfigInteger(pCfg, "HeightReduction", ulHeightReduction);
/* Attach the display. */
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "MainDisplay");
InsertConfigNode(pLunL0, "Config", &pCfg);
Display *pDisplay = mDisplay;
InsertConfigInteger(pCfg, "Object", (uintptr_t)pDisplay);
/*
* Firmware.
*/
FirmwareType_T eFwType = FirmwareType_BIOS;
hrc = pMachine->COMGETTER(FirmwareType)(&eFwType); H();
#ifdef VBOX_WITH_EFI
BOOL fEfiEnabled = (eFwType >= FirmwareType_EFI) && (eFwType <= FirmwareType_EFIDUAL);
#else
BOOL fEfiEnabled = false;
#endif
if (!fEfiEnabled)
{
/*
* PC Bios.
*/
InsertConfigNode(pDevices, "pcbios", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
InsertConfigNode(pInst, "Config", &pBiosCfg);
InsertConfigInteger(pBiosCfg, "RamSize", cbRam);
InsertConfigInteger(pBiosCfg, "RamHoleSize", cbRamHole);
InsertConfigInteger(pBiosCfg, "NumCPUs", cCpus);
InsertConfigString(pBiosCfg, "HardDiskDevice", "piix3ide");
InsertConfigString(pBiosCfg, "FloppyDevice", "i82078");
InsertConfigInteger(pBiosCfg, "IOAPIC", fIOAPIC);
InsertConfigInteger(pBiosCfg, "PXEDebug", fPXEDebug);
InsertConfigBytes(pBiosCfg, "UUID", &HardwareUuid,sizeof(HardwareUuid));
InsertConfigNode(pBiosCfg, "NetBoot", &pNetBootCfg);
InsertConfigInteger(pBiosCfg, "McfgBase", uMcfgBase);
InsertConfigInteger(pBiosCfg, "McfgLength", cbMcfgLength);
DeviceType_T bootDevice;
if (SchemaDefs::MaxBootPosition > 9)
{
AssertMsgFailed(("Too many boot devices %d\n",
SchemaDefs::MaxBootPosition));
return VERR_INVALID_PARAMETER;
}
for (ULONG pos = 1; pos <= SchemaDefs::MaxBootPosition; ++pos)
{
hrc = pMachine->GetBootOrder(pos, &bootDevice); H();
char szParamName[] = "BootDeviceX";
szParamName[sizeof(szParamName) - 2] = ((char (pos - 1)) + '0');
const char *pszBootDevice;
switch (bootDevice)
{
case DeviceType_Null:
pszBootDevice = "NONE";
break;
case DeviceType_HardDisk:
pszBootDevice = "IDE";
break;
case DeviceType_DVD:
pszBootDevice = "DVD";
break;
case DeviceType_Floppy:
pszBootDevice = "FLOPPY";
break;
case DeviceType_Network:
pszBootDevice = "LAN";
break;
default:
AssertMsgFailed(("Invalid bootDevice=%d\n", bootDevice));
return VMSetError(pVM, VERR_INVALID_PARAMETER, RT_SRC_POS,
N_("Invalid boot device '%d'"), bootDevice);
}
InsertConfigString(pBiosCfg, szParamName, pszBootDevice);
}
}
else
{
/* Autodetect firmware type, basing on guest type */
if (eFwType == FirmwareType_EFI)
{
eFwType = fIsGuest64Bit
? (FirmwareType_T)FirmwareType_EFI64
: (FirmwareType_T)FirmwareType_EFI32;
}
bool const f64BitEntry = eFwType == FirmwareType_EFI64;
Utf8Str efiRomFile;
rc = findEfiRom(virtualBox, eFwType, &efiRomFile);
AssertRCReturn(rc, rc);
/* Get boot args */
Bstr bootArgs;
hrc = pMachine->GetExtraData(Bstr("VBoxInternal2/EfiBootArgs").raw(), bootArgs.asOutParam()); H();
/* Get device props */
Bstr deviceProps;
hrc = pMachine->GetExtraData(Bstr("VBoxInternal2/EfiDeviceProps").raw(), deviceProps.asOutParam()); H();
/* Get GOP mode settings */
uint32_t u32GopMode = UINT32_MAX;
hrc = pMachine->GetExtraData(Bstr("VBoxInternal2/EfiGopMode").raw(), bstr.asOutParam()); H();
if (!bstr.isEmpty())
u32GopMode = Utf8Str(bstr).toUInt32();
/* UGA mode settings */
uint32_t u32UgaHorisontal = 0;
hrc = pMachine->GetExtraData(Bstr("VBoxInternal2/EfiUgaHorizontalResolution").raw(), bstr.asOutParam()); H();
if (!bstr.isEmpty())
u32UgaHorisontal = Utf8Str(bstr).toUInt32();
uint32_t u32UgaVertical = 0;
hrc = pMachine->GetExtraData(Bstr("VBoxInternal2/EfiUgaVerticalResolution").raw(), bstr.asOutParam()); H();
if (!bstr.isEmpty())
u32UgaVertical = Utf8Str(bstr).toUInt32();
/*
* EFI subtree.
*/
InsertConfigNode(pDevices, "efi", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigInteger(pCfg, "RamSize", cbRam);
InsertConfigInteger(pCfg, "RamHoleSize", cbRamHole);
InsertConfigInteger(pCfg, "NumCPUs", cCpus);
InsertConfigString(pCfg, "EfiRom", efiRomFile);
InsertConfigString(pCfg, "BootArgs", bootArgs);
InsertConfigString(pCfg, "DeviceProps", deviceProps);
InsertConfigInteger(pCfg, "IOAPIC", fIOAPIC);
InsertConfigBytes(pCfg, "UUID", &HardwareUuid,sizeof(HardwareUuid));
InsertConfigInteger(pCfg, "64BitEntry", f64BitEntry); /* boolean */
InsertConfigInteger(pCfg, "GopMode", u32GopMode);
InsertConfigInteger(pCfg, "UgaHorizontalResolution", u32UgaHorisontal);
InsertConfigInteger(pCfg, "UgaVerticalResolution", u32UgaVertical);
/* For OS X guests we'll force passing host's DMI info to the guest */
if (fOsXGuest)
{
InsertConfigInteger(pCfg, "DmiUseHostInfo", 1);
InsertConfigInteger(pCfg, "DmiExposeMemoryTable", 1);
}
}
/*
* Storage controllers.
*/
com::SafeIfaceArray<IStorageController> ctrls;
PCFGMNODE aCtrlNodes[StorageControllerType_LsiLogicSas + 1] = {};
hrc = pMachine->COMGETTER(StorageControllers)(ComSafeArrayAsOutParam(ctrls)); H();
bool fFdcEnabled = false;
for (size_t i = 0; i < ctrls.size(); ++i)
{
DeviceType_T *paLedDevType = NULL;
StorageControllerType_T enmCtrlType;
rc = ctrls[i]->COMGETTER(ControllerType)(&enmCtrlType); H();
AssertRelease((unsigned)enmCtrlType < RT_ELEMENTS(aCtrlNodes));
StorageBus_T enmBus;
rc = ctrls[i]->COMGETTER(Bus)(&enmBus); H();
Bstr controllerName;
rc = ctrls[i]->COMGETTER(Name)(controllerName.asOutParam()); H();
ULONG ulInstance = 999;
rc = ctrls[i]->COMGETTER(Instance)(&ulInstance); H();
BOOL fUseHostIOCache;
rc = ctrls[i]->COMGETTER(UseHostIOCache)(&fUseHostIOCache); H();
BOOL fBootable;
rc = ctrls[i]->COMGETTER(Bootable)(&fBootable); H();
/* /Devices/<ctrldev>/ */
const char *pszCtrlDev = convertControllerTypeToDev(enmCtrlType);
pDev = aCtrlNodes[enmCtrlType];
if (!pDev)
{
InsertConfigNode(pDevices, pszCtrlDev, &pDev);
aCtrlNodes[enmCtrlType] = pDev; /* IDE variants are handled in the switch */
}
/* /Devices/<ctrldev>/<instance>/ */
PCFGMNODE pCtlInst = NULL;
InsertConfigNode(pDev, Utf8StrFmt("%u", ulInstance).c_str(), &pCtlInst);
/* Device config: /Devices/<ctrldev>/<instance>/<values> & /ditto/Config/<values> */
InsertConfigInteger(pCtlInst, "Trusted", 1);
InsertConfigNode(pCtlInst, "Config", &pCfg);
switch (enmCtrlType)
{
case StorageControllerType_LsiLogic:
{
hrc = BusMgr->assignPciDevice("lsilogic", pCtlInst); H();
InsertConfigInteger(pCfg, "Bootable", fBootable);
/* Attach the status driver */
Assert(cLedScsi >= 16);
attachStatusDriver(pCtlInst, &mapStorageLeds[iLedScsi], 0, 15,
&mapMediumAttachments, pszCtrlDev, ulInstance);
paLedDevType = &maStorageDevType[iLedScsi];
break;
}
case StorageControllerType_BusLogic:
{
hrc = BusMgr->assignPciDevice("buslogic", pCtlInst); H();
InsertConfigInteger(pCfg, "Bootable", fBootable);
/* Attach the status driver */
Assert(cLedScsi >= 16);
attachStatusDriver(pCtlInst, &mapStorageLeds[iLedScsi], 0, 15,
&mapMediumAttachments, pszCtrlDev, ulInstance);
paLedDevType = &maStorageDevType[iLedScsi];
break;
}
case StorageControllerType_IntelAhci:
{
hrc = BusMgr->assignPciDevice("ahci", pCtlInst); H();
ULONG cPorts = 0;
hrc = ctrls[i]->COMGETTER(PortCount)(&cPorts); H();
InsertConfigInteger(pCfg, "PortCount", cPorts);
InsertConfigInteger(pCfg, "Bootable", fBootable);
/* Needed configuration values for the bios, only first controller. */
if (!BusMgr->hasPciDevice("ahci", 1))
{
if (pBiosCfg)
{
InsertConfigString(pBiosCfg, "SataHardDiskDevice", "ahci");
}
for (uint32_t j = 0; j < 4; ++j)
{
static const char * const s_apszBiosConfig[4] =
{ "SataPrimaryMasterLUN", "SataPrimarySlaveLUN", "SataSecondaryMasterLUN", "SataSecondarySlaveLUN" };
LONG lPortNumber = -1;
hrc = ctrls[i]->GetIDEEmulationPort(j, &lPortNumber); H();
InsertConfigInteger(pCfg, g_apszIDEDrives[j], lPortNumber);
if (pBiosCfg)
InsertConfigInteger(pBiosCfg, s_apszBiosConfig[j], lPortNumber);
}
}
/* Attach the status driver */
AssertRelease(cPorts <= cLedSata);
attachStatusDriver(pCtlInst, &mapStorageLeds[iLedSata], 0, cPorts - 1,
&mapMediumAttachments, pszCtrlDev, ulInstance);
paLedDevType = &maStorageDevType[iLedSata];
break;
}
case StorageControllerType_PIIX3:
case StorageControllerType_PIIX4:
case StorageControllerType_ICH6:
{
/*
* IDE (update this when the main interface changes)
*/
hrc = BusMgr->assignPciDevice("piix3ide", pCtlInst); H();
InsertConfigString(pCfg, "Type", controllerString(enmCtrlType));
/* Attach the status driver */
Assert(cLedIde >= 4);
attachStatusDriver(pCtlInst, &mapStorageLeds[iLedIde], 0, 3,
&mapMediumAttachments, pszCtrlDev, ulInstance);
paLedDevType = &maStorageDevType[iLedIde];
/* IDE flavors */
aCtrlNodes[StorageControllerType_PIIX3] = pDev;
aCtrlNodes[StorageControllerType_PIIX4] = pDev;
aCtrlNodes[StorageControllerType_ICH6] = pDev;
break;
}
case StorageControllerType_I82078:
{
/*
* i82078 Floppy drive controller
*/
fFdcEnabled = true;
InsertConfigInteger(pCfg, "IRQ", 6);
InsertConfigInteger(pCfg, "DMA", 2);
InsertConfigInteger(pCfg, "MemMapped", 0 );
InsertConfigInteger(pCfg, "IOBase", 0x3f0);
/* Attach the status driver */
Assert(cLedFloppy >= 2);
attachStatusDriver(pCtlInst, &mapStorageLeds[iLedFloppy], 0, 1,
&mapMediumAttachments, pszCtrlDev, ulInstance);
paLedDevType = &maStorageDevType[iLedFloppy];
break;
}
case StorageControllerType_LsiLogicSas:
{
hrc = BusMgr->assignPciDevice("lsilogicsas", pCtlInst); H();
InsertConfigString(pCfg, "ControllerType", "SAS1068");
InsertConfigInteger(pCfg, "Bootable", fBootable);
/* Attach the status driver */
Assert(cLedSas >= 8);
attachStatusDriver(pCtlInst, &mapStorageLeds[iLedSas], 0, 7,
&mapMediumAttachments, pszCtrlDev, ulInstance);
paLedDevType = &maStorageDevType[iLedSas];
break;
}
default:
AssertMsgFailedReturn(("invalid storage controller type: %d\n", enmCtrlType), VERR_GENERAL_FAILURE);
}
/* Attach the media to the storage controllers. */
com::SafeIfaceArray<IMediumAttachment> atts;
hrc = pMachine->GetMediumAttachmentsOfController(controllerName.raw(),
ComSafeArrayAsOutParam(atts)); H();
/* Builtin I/O cache - per device setting. */
BOOL fBuiltinIoCache = true;
hrc = pMachine->COMGETTER(IoCacheEnabled)(&fBuiltinIoCache); H();
for (size_t j = 0; j < atts.size(); ++j)
{
IMediumAttachment *pMediumAtt = atts[j];
rc = configMediumAttachment(pCtlInst,
pszCtrlDev,
ulInstance,
enmBus,
!!fUseHostIOCache,
!!fBuiltinIoCache,
false /* fSetupMerge */,
0 /* uMergeSource */,
0 /* uMergeTarget */,
pMediumAtt,
mMachineState,
NULL /* phrc */,
false /* fAttachDetach */,
false /* fForceUnmount */,
false /* fHotplug */,
pVM,
paLedDevType);
if (RT_FAILURE(rc))
return rc;
}
H();
}
H();
/*
* Network adapters
*/
#ifdef VMWARE_NET_IN_SLOT_11
bool fSwapSlots3and11 = false;
#endif
PCFGMNODE pDevPCNet = NULL; /* PCNet-type devices */
InsertConfigNode(pDevices, "pcnet", &pDevPCNet);
#ifdef VBOX_WITH_E1000
PCFGMNODE pDevE1000 = NULL; /* E1000-type devices */
InsertConfigNode(pDevices, "e1000", &pDevE1000);
#endif
#ifdef VBOX_WITH_VIRTIO
PCFGMNODE pDevVirtioNet = NULL; /* Virtio network devices */
InsertConfigNode(pDevices, "virtio-net", &pDevVirtioNet);
#endif /* VBOX_WITH_VIRTIO */
std::list<BootNic> llBootNics;
for (ULONG ulInstance = 0; ulInstance < maxNetworkAdapters; ++ulInstance)
{
ComPtr<INetworkAdapter> networkAdapter;
hrc = pMachine->GetNetworkAdapter(ulInstance, networkAdapter.asOutParam()); H();
BOOL fEnabledNetAdapter = FALSE;
hrc = networkAdapter->COMGETTER(Enabled)(&fEnabledNetAdapter); H();
if (!fEnabledNetAdapter)
continue;
/*
* The virtual hardware type. Create appropriate device first.
*/
const char *pszAdapterName = "pcnet";
NetworkAdapterType_T adapterType;
hrc = networkAdapter->COMGETTER(AdapterType)(&adapterType); H();
switch (adapterType)
{
case NetworkAdapterType_Am79C970A:
case NetworkAdapterType_Am79C973:
pDev = pDevPCNet;
break;
#ifdef VBOX_WITH_E1000
case NetworkAdapterType_I82540EM:
case NetworkAdapterType_I82543GC:
case NetworkAdapterType_I82545EM:
pDev = pDevE1000;
pszAdapterName = "e1000";
break;
#endif
#ifdef VBOX_WITH_VIRTIO
case NetworkAdapterType_Virtio:
pDev = pDevVirtioNet;
pszAdapterName = "virtio-net";
break;
#endif /* VBOX_WITH_VIRTIO */
default:
AssertMsgFailed(("Invalid network adapter type '%d' for slot '%d'",
adapterType, ulInstance));
return VMSetError(pVM, VERR_INVALID_PARAMETER, RT_SRC_POS,
N_("Invalid network adapter type '%d' for slot '%d'"),
adapterType, ulInstance);
}
InsertConfigNode(pDev, Utf8StrFmt("%u", ulInstance).c_str(), &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
/* the first network card gets the PCI ID 3, the next 3 gets 8..10,
* next 4 get 16..19. */
int iPciDeviceNo;
switch (ulInstance)
{
case 0:
iPciDeviceNo = 3;
break;
case 1: case 2: case 3:
iPciDeviceNo = ulInstance - 1 + 8;
break;
case 4: case 5: case 6: case 7:
iPciDeviceNo = ulInstance - 4 + 16;
break;
default:
/* auto assignment */
iPciDeviceNo = -1;
break;
}
#ifdef VMWARE_NET_IN_SLOT_11
/*
* Dirty hack for PCI slot compatibility with VMWare,
* it assigns slot 11 to the first network controller.
*/
if (iPciDeviceNo == 3 && adapterType == NetworkAdapterType_I82545EM)
{
iPciDeviceNo = 0x11;
fSwapSlots3and11 = true;
}
else if (iPciDeviceNo == 0x11 && fSwapSlots3and11)
iPciDeviceNo = 3;
#endif
PciBusAddress PciAddr = PciBusAddress(0, iPciDeviceNo, 0);
hrc = BusMgr->assignPciDevice(pszAdapterName, pInst, PciAddr); H();
InsertConfigNode(pInst, "Config", &pCfg);
#ifdef VBOX_WITH_2X_4GB_ADDR_SPACE /* not safe here yet. */ /** @todo Make PCNet ring-0 safe on 32-bit mac kernels! */
if (pDev == pDevPCNet)
{
InsertConfigInteger(pCfg, "R0Enabled", false);
}
#endif
/*
* Collect information needed for network booting and add it to the list.
*/
BootNic nic;
nic.mInstance = ulInstance;
/* Could be updated by reference, if auto assigned */
nic.mPciAddress = PciAddr;
hrc = networkAdapter->COMGETTER(BootPriority)(&nic.mBootPrio); H();
llBootNics.push_back(nic);
/*
* The virtual hardware type. PCNet supports two types.
*/
switch (adapterType)
{
case NetworkAdapterType_Am79C970A:
InsertConfigInteger(pCfg, "Am79C973", 0);
break;
case NetworkAdapterType_Am79C973:
InsertConfigInteger(pCfg, "Am79C973", 1);
break;
case NetworkAdapterType_I82540EM:
InsertConfigInteger(pCfg, "AdapterType", 0);
break;
case NetworkAdapterType_I82543GC:
InsertConfigInteger(pCfg, "AdapterType", 1);
break;
case NetworkAdapterType_I82545EM:
InsertConfigInteger(pCfg, "AdapterType", 2);
break;
}
/*
* Get the MAC address and convert it to binary representation
*/
Bstr macAddr;
hrc = networkAdapter->COMGETTER(MACAddress)(macAddr.asOutParam()); H();
Assert(!macAddr.isEmpty());
Utf8Str macAddrUtf8 = macAddr;
char *macStr = (char*)macAddrUtf8.c_str();
Assert(strlen(macStr) == 12);
RTMAC Mac;
memset(&Mac, 0, sizeof(Mac));
char *pMac = (char*)&Mac;
for (uint32_t i = 0; i < 6; ++i)
{
char c1 = *macStr++ - '0';
if (c1 > 9)
c1 -= 7;
char c2 = *macStr++ - '0';
if (c2 > 9)
c2 -= 7;
*pMac++ = ((c1 & 0x0f) << 4) | (c2 & 0x0f);
}
InsertConfigBytes(pCfg, "MAC", &Mac, sizeof(Mac));
/*
* Check if the cable is supposed to be unplugged
*/
BOOL fCableConnected;
hrc = networkAdapter->COMGETTER(CableConnected)(&fCableConnected); H();
InsertConfigInteger(pCfg, "CableConnected", fCableConnected ? 1 : 0);
/*
* Line speed to report from custom drivers
*/
ULONG ulLineSpeed;
hrc = networkAdapter->COMGETTER(LineSpeed)(&ulLineSpeed); H();
InsertConfigInteger(pCfg, "LineSpeed", ulLineSpeed);
/*
* Attach the status driver.
*/
attachStatusDriver(pInst, &mapNetworkLeds[ulInstance], 0, 0, NULL, NULL, 0);
/*
* Configure the network card now
*/
bool fIgnoreConnectFailure = mMachineState == MachineState_Restoring;
rc = configNetwork(pszAdapterName,
ulInstance,
0,
networkAdapter,
pCfg,
pLunL0,
pInst,
false /*fAttachDetach*/,
fIgnoreConnectFailure);
if (RT_FAILURE(rc))
return rc;
}
/*
* Build network boot information and transfer it to the BIOS.
*/
if (pNetBootCfg && !llBootNics.empty()) /* NetBoot node doesn't exist for EFI! */
{
llBootNics.sort(); /* Sort the list by boot priority. */
char achBootIdx[] = "0";
unsigned uBootIdx = 0;
for (std::list<BootNic>::iterator it = llBootNics.begin(); it != llBootNics.end(); ++it)
{
/* A NIC with priority 0 is only used if it's first in the list. */
if (it->mBootPrio == 0 && uBootIdx != 0)
break;
PCFGMNODE pNetBtDevCfg;
achBootIdx[0] = '0' + uBootIdx++; /* Boot device order. */
InsertConfigNode(pNetBootCfg, achBootIdx, &pNetBtDevCfg);
InsertConfigInteger(pNetBtDevCfg, "NIC", it->mInstance);
InsertConfigInteger(pNetBtDevCfg, "PCIBusNo", it->mPciAddress.miBus);
InsertConfigInteger(pNetBtDevCfg, "PCIDeviceNo", it->mPciAddress.miDevice);
InsertConfigInteger(pNetBtDevCfg, "PCIFunctionNo", it->mPciAddress.miFn);
}
}
/*
* Serial (UART) Ports
*/
/* serial enabled mask to be passed to dev ACPI */
uint16_t auSerialIoPortBase[SchemaDefs::SerialPortCount] = {0};
uint8_t auSerialIrq[SchemaDefs::SerialPortCount] = {0};
InsertConfigNode(pDevices, "serial", &pDev);
for (ULONG ulInstance = 0; ulInstance < SchemaDefs::SerialPortCount; ++ulInstance)
{
ComPtr<ISerialPort> serialPort;
hrc = pMachine->GetSerialPort(ulInstance, serialPort.asOutParam()); H();
BOOL fEnabledSerPort = FALSE;
if (serialPort)
hrc = serialPort->COMGETTER(Enabled)(&fEnabledSerPort); H();
if (!fEnabledSerPort)
continue;
InsertConfigNode(pDev, Utf8StrFmt("%u", ulInstance).c_str(), &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
ULONG ulIRQ;
hrc = serialPort->COMGETTER(IRQ)(&ulIRQ); H();
InsertConfigInteger(pCfg, "IRQ", ulIRQ);
auSerialIrq[ulInstance] = (uint8_t)ulIRQ;
ULONG ulIOBase;
hrc = serialPort->COMGETTER(IOBase)(&ulIOBase); H();
InsertConfigInteger(pCfg, "IOBase", ulIOBase);
auSerialIoPortBase[ulInstance] = (uint16_t)ulIOBase;
BOOL fServer;
hrc = serialPort->COMGETTER(Server)(&fServer); H();
hrc = serialPort->COMGETTER(Path)(bstr.asOutParam()); H();
PortMode_T eHostMode;
hrc = serialPort->COMGETTER(HostMode)(&eHostMode); H();
if (eHostMode != PortMode_Disconnected)
{
InsertConfigNode(pInst, "LUN#0", &pLunL0);
if (eHostMode == PortMode_HostPipe)
{
InsertConfigString(pLunL0, "Driver", "Char");
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL1);
InsertConfigString(pLunL1, "Driver", "NamedPipe");
InsertConfigNode(pLunL1, "Config", &pLunL2);
InsertConfigString(pLunL2, "Location", bstr);
InsertConfigInteger(pLunL2, "IsServer", fServer);
}
else if (eHostMode == PortMode_HostDevice)
{
InsertConfigString(pLunL0, "Driver", "Host Serial");
InsertConfigNode(pLunL0, "Config", &pLunL1);
InsertConfigString(pLunL1, "DevicePath", bstr);
}
else if (eHostMode == PortMode_RawFile)
{
InsertConfigString(pLunL0, "Driver", "Char");
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL1);
InsertConfigString(pLunL1, "Driver", "RawFile");
InsertConfigNode(pLunL1, "Config", &pLunL2);
InsertConfigString(pLunL2, "Location", bstr);
}
}
}
/*
* Parallel (LPT) Ports
*/
InsertConfigNode(pDevices, "parallel", &pDev);
for (ULONG ulInstance = 0; ulInstance < SchemaDefs::ParallelPortCount; ++ulInstance)
{
ComPtr<IParallelPort> parallelPort;
hrc = pMachine->GetParallelPort(ulInstance, parallelPort.asOutParam()); H();
BOOL fEnabledParPort = FALSE;
if (parallelPort)
{
hrc = parallelPort->COMGETTER(Enabled)(&fEnabledParPort); H();
}
if (!fEnabledParPort)
continue;
InsertConfigNode(pDev, Utf8StrFmt("%u", ulInstance).c_str(), &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
ULONG ulIRQ;
hrc = parallelPort->COMGETTER(IRQ)(&ulIRQ); H();
InsertConfigInteger(pCfg, "IRQ", ulIRQ);
ULONG ulIOBase;
hrc = parallelPort->COMGETTER(IOBase)(&ulIOBase); H();
InsertConfigInteger(pCfg, "IOBase", ulIOBase);
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "HostParallel");
InsertConfigNode(pLunL0, "Config", &pLunL1);
hrc = parallelPort->COMGETTER(Path)(bstr.asOutParam()); H();
InsertConfigString(pLunL1, "DevicePath", bstr);
}
/*
* VMM Device
*/
InsertConfigNode(pDevices, "VMMDev", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
hrc = BusMgr->assignPciDevice("VMMDev", pInst); H();
Bstr hwVersion;
hrc = pMachine->COMGETTER(HardwareVersion)(hwVersion.asOutParam()); H();
InsertConfigInteger(pCfg, "RamSize", cbRam);
if (hwVersion.compare(Bstr("1").raw()) == 0) /* <= 2.0.x */
InsertConfigInteger(pCfg, "HeapEnabled", 0);
Bstr snapshotFolder;
hrc = pMachine->COMGETTER(SnapshotFolder)(snapshotFolder.asOutParam()); H();
InsertConfigString(pCfg, "GuestCoreDumpDir", snapshotFolder);
/* the VMM device's Main driver */
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "HGCM");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigInteger(pCfg, "Object", (uintptr_t)pVMMDev);
/*
* Attach the status driver.
*/
attachStatusDriver(pInst, &mapSharedFolderLed, 0, 0, NULL, NULL, 0);
/*
* Audio Sniffer Device
*/
InsertConfigNode(pDevices, "AudioSniffer", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
/* the Audio Sniffer device's Main driver */
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "MainAudioSniffer");
InsertConfigNode(pLunL0, "Config", &pCfg);
AudioSniffer *pAudioSniffer = mAudioSniffer;
InsertConfigInteger(pCfg, "Object", (uintptr_t)pAudioSniffer);
/*
* AC'97 ICH / SoundBlaster16 audio / Intel HD Audio
*/
BOOL fAudioEnabled = FALSE;
ComPtr<IAudioAdapter> audioAdapter;
hrc = pMachine->COMGETTER(AudioAdapter)(audioAdapter.asOutParam()); H();
if (audioAdapter)
hrc = audioAdapter->COMGETTER(Enabled)(&fAudioEnabled); H();
if (fAudioEnabled)
{
AudioControllerType_T audioController;
hrc = audioAdapter->COMGETTER(AudioController)(&audioController); H();
switch (audioController)
{
case AudioControllerType_AC97:
{
/* default: ICH AC97 */
InsertConfigNode(pDevices, "ichac97", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
hrc = BusMgr->assignPciDevice("ichac97", pInst); H();
InsertConfigNode(pInst, "Config", &pCfg);
break;
}
case AudioControllerType_SB16:
{
/* legacy SoundBlaster16 */
InsertConfigNode(pDevices, "sb16", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigInteger(pCfg, "IRQ", 5);
InsertConfigInteger(pCfg, "DMA", 1);
InsertConfigInteger(pCfg, "DMA16", 5);
InsertConfigInteger(pCfg, "Port", 0x220);
InsertConfigInteger(pCfg, "Version", 0x0405);
break;
}
case AudioControllerType_HDA:
{
/* Intel HD Audio */
InsertConfigNode(pDevices, "hda", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
hrc = BusMgr->assignPciDevice("hda", pInst); H();
InsertConfigNode(pInst, "Config", &pCfg);
}
}
/* the Audio driver */
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "AUDIO");
InsertConfigNode(pLunL0, "Config", &pCfg);
AudioDriverType_T audioDriver;
hrc = audioAdapter->COMGETTER(AudioDriver)(&audioDriver); H();
switch (audioDriver)
{
case AudioDriverType_Null:
{
InsertConfigString(pCfg, "AudioDriver", "null");
break;
}
#ifdef RT_OS_WINDOWS
#ifdef VBOX_WITH_WINMM
case AudioDriverType_WinMM:
{
InsertConfigString(pCfg, "AudioDriver", "winmm");
break;
}
#endif
case AudioDriverType_DirectSound:
{
InsertConfigString(pCfg, "AudioDriver", "dsound");
break;
}
#endif /* RT_OS_WINDOWS */
#ifdef RT_OS_SOLARIS
case AudioDriverType_SolAudio:
{
InsertConfigString(pCfg, "AudioDriver", "solaudio");
break;
}
#endif
#ifdef RT_OS_LINUX
# ifdef VBOX_WITH_ALSA
case AudioDriverType_ALSA:
{
InsertConfigString(pCfg, "AudioDriver", "alsa");
break;
}
# endif
# ifdef VBOX_WITH_PULSE
case AudioDriverType_Pulse:
{
InsertConfigString(pCfg, "AudioDriver", "pulse");
break;
}
# endif
#endif /* RT_OS_LINUX */
#if defined(RT_OS_LINUX) || defined(RT_OS_FREEBSD) || defined(VBOX_WITH_SOLARIS_OSS)
case AudioDriverType_OSS:
{
InsertConfigString(pCfg, "AudioDriver", "oss");
break;
}
#endif
#ifdef RT_OS_FREEBSD
# ifdef VBOX_WITH_PULSE
case AudioDriverType_Pulse:
{
InsertConfigString(pCfg, "AudioDriver", "pulse");
break;
}
# endif
#endif
#ifdef RT_OS_DARWIN
case AudioDriverType_CoreAudio:
{
InsertConfigString(pCfg, "AudioDriver", "coreaudio");
break;
}
#endif
}
hrc = pMachine->COMGETTER(Name)(bstr.asOutParam()); H();
InsertConfigString(pCfg, "StreamName", bstr);
}
/*
* The USB Controller.
*/
ComPtr<IUSBController> USBCtlPtr;
hrc = pMachine->COMGETTER(USBController)(USBCtlPtr.asOutParam());
if (USBCtlPtr)
{
BOOL fOhciEnabled;
hrc = USBCtlPtr->COMGETTER(Enabled)(&fOhciEnabled); H();
if (fOhciEnabled)
{
InsertConfigNode(pDevices, "usb-ohci", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
hrc = BusMgr->assignPciDevice("usb-ohci", pInst); H();
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "VUSBRootHub");
InsertConfigNode(pLunL0, "Config", &pCfg);
/*
* Attach the status driver.
*/
attachStatusDriver(pInst, &mapUSBLed[0], 0, 0, NULL, NULL, 0);
#ifdef VBOX_WITH_EHCI
BOOL fEhciEnabled;
hrc = USBCtlPtr->COMGETTER(EnabledEhci)(&fEhciEnabled); H();
if (fEhciEnabled)
{
/*
* USB 2.0 is only available if the proper ExtPack is installed.
*
* Note. Configuring EHCI here and providing messages about
* the missing extpack isn't exactly clean, but it is a
* necessary evil to patch over legacy compatability issues
* introduced by the new distribution model.
*/
static const char *s_pszUsbExtPackName = "Oracle VM VirtualBox Extension Pack";
# ifdef VBOX_WITH_EXTPACK
if (mptrExtPackManager->isExtPackUsable(s_pszUsbExtPackName))
# endif
{
InsertConfigNode(pDevices, "usb-ehci", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
hrc = BusMgr->assignPciDevice("usb-ehci", pInst); H();
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "VUSBRootHub");
InsertConfigNode(pLunL0, "Config", &pCfg);
/*
* Attach the status driver.
*/
attachStatusDriver(pInst, &mapUSBLed[1], 0, 0, NULL, NULL, 0);
}
# ifdef VBOX_WITH_EXTPACK
else
{
/* Always fatal! Up to VBox 4.0.4 we allowed to start the VM anyway
* but this induced problems when the user saved + restored the VM! */
return VMSetError(pVM, VERR_NOT_FOUND, RT_SRC_POS,
N_("Implementation of the USB 2.0 controller not found!\n"
"Because the USB 2.0 controller state is part of the saved "
"VM state, the VM cannot be started. To fix "
"this problem, either install the '%s' or disable USB 2.0 "
"support in the VM settings"),
s_pszUsbExtPackName);
}
# endif
}
#endif
/*
* Virtual USB Devices.
*/
PCFGMNODE pUsbDevices = NULL;
InsertConfigNode(pRoot, "USB", &pUsbDevices);
#ifdef VBOX_WITH_USB
{
/*
* Global USB options, currently unused as we'll apply the 2.0 -> 1.1 morphing
* on a per device level now.
*/
InsertConfigNode(pUsbDevices, "USBProxy", &pCfg);
InsertConfigNode(pCfg, "GlobalConfig", &pCfg);
// This globally enables the 2.0 -> 1.1 device morphing of proxied devices to keep windows quiet.
//InsertConfigInteger(pCfg, "Force11Device", true);
// The following breaks stuff, but it makes MSDs work in vista. (I include it here so
// that it's documented somewhere.) Users needing it can use:
// VBoxManage setextradata "myvm" "VBoxInternal/USB/USBProxy/GlobalConfig/Force11PacketSize" 1
//InsertConfigInteger(pCfg, "Force11PacketSize", true);
}
#endif
#ifdef VBOX_WITH_USB_VIDEO
InsertConfigNode(pUsbDevices, "Webcam", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
# if 0 /* Experiments with attaching */
InsertConfigInteger(pCfg, "USBVER", RT_BIT(2));
# endif
InsertConfigNode(pInst, "LUN#0", &pLunL0);
# ifdef VBOX_WITH_USB_VIDEO_TEST
InsertConfigString(pLunL0, "Driver", "WebcamFileFeeder");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigString(pCfg, "DirToFeed", "out");
# else
InsertConfigString(pLunL0, "Driver", "UsbWebcamInterface");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigInteger(pCfg, "Object", mUsbWebcamInterface);
# endif
#endif
#ifdef VBOX_WITH_USB_CARDREADER
InsertConfigNode(pUsbDevices, "CardReader", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigNode(pInst, "LUN#0", &pLunL0);
# ifdef VBOX_WITH_USB_CARDREADER_TEST
InsertConfigString(pLunL0, "Driver", "DrvDirectCardReader");
InsertConfigNode(pLunL0, "Config", &pCfg);
# endif
#endif
# if 0 /* Virtual MSD*/
InsertConfigNode(pUsbDevices, "Msd", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "SCSI");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL1);
InsertConfigString(pLunL1, "Driver", "Block");
InsertConfigNode(pLunL1, "Config", &pCfg);
InsertConfigString(pCfg, "Type", "HardDisk");
InsertConfigInteger(pCfg, "Mountable", 0);
InsertConfigNode(pLunL1, "AttachedDriver", &pLunL2);
InsertConfigString(pLunL2, "Driver", "VD");
InsertConfigNode(pLunL2, "Config", &pCfg);
InsertConfigString(pCfg, "Path", "/Volumes/DataHFS/bird/VDIs/linux.vdi");
InsertConfigString(pCfg, "Format", "VDI");
# endif
/* Virtual USB Mouse/Tablet */
PointingHidType_T aPointingHid;
hrc = pMachine->COMGETTER(PointingHidType)(&aPointingHid); H();
if (aPointingHid == PointingHidType_USBMouse || aPointingHid == PointingHidType_USBTablet)
{
InsertConfigNode(pUsbDevices, "HidMouse", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
if (aPointingHid == PointingHidType_USBTablet)
{
InsertConfigInteger(pCfg, "Absolute", 1);
}
else
{
InsertConfigInteger(pCfg, "Absolute", 0);
}
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "MouseQueue");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigInteger(pCfg, "QueueSize", 128);
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL1);
InsertConfigString(pLunL1, "Driver", "MainMouse");
InsertConfigNode(pLunL1, "Config", &pCfg);
pMouse = mMouse;
InsertConfigInteger(pCfg, "Object", (uintptr_t)pMouse);
}
/* Virtual USB Keyboard */
KeyboardHidType_T aKbdHid;
hrc = pMachine->COMGETTER(KeyboardHidType)(&aKbdHid); H();
if (aKbdHid == KeyboardHidType_USBKeyboard)
{
InsertConfigNode(pUsbDevices, "HidKeyboard", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigNode(pInst, "Config", &pCfg);
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "KeyboardQueue");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigInteger(pCfg, "QueueSize", 64);
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL1);
InsertConfigString(pLunL1, "Driver", "MainKeyboard");
InsertConfigNode(pLunL1, "Config", &pCfg);
pKeyboard = mKeyboard;
InsertConfigInteger(pCfg, "Object", (uintptr_t)pKeyboard);
}
}
}
/*
* Clipboard
*/
{
ClipboardMode_T mode = ClipboardMode_Disabled;
hrc = pMachine->COMGETTER(ClipboardMode)(&mode); H();
if (mode != ClipboardMode_Disabled)
{
/* Load the service */
rc = pVMMDev->hgcmLoadService("VBoxSharedClipboard", "VBoxSharedClipboard");
if (RT_FAILURE(rc))
{
LogRel(("VBoxSharedClipboard is not available. rc = %Rrc\n", rc));
/* That is not a fatal failure. */
rc = VINF_SUCCESS;
}
else
{
/* Setup the service. */
VBOXHGCMSVCPARM parm;
parm.type = VBOX_HGCM_SVC_PARM_32BIT;
switch (mode)
{
default:
case ClipboardMode_Disabled:
{
LogRel(("VBoxSharedClipboard mode: Off\n"));
parm.u.uint32 = VBOX_SHARED_CLIPBOARD_MODE_OFF;
break;
}
case ClipboardMode_GuestToHost:
{
LogRel(("VBoxSharedClipboard mode: Guest to Host\n"));
parm.u.uint32 = VBOX_SHARED_CLIPBOARD_MODE_GUEST_TO_HOST;
break;
}
case ClipboardMode_HostToGuest:
{
LogRel(("VBoxSharedClipboard mode: Host to Guest\n"));
parm.u.uint32 = VBOX_SHARED_CLIPBOARD_MODE_HOST_TO_GUEST;
break;
}
case ClipboardMode_Bidirectional:
{
LogRel(("VBoxSharedClipboard mode: Bidirectional\n"));
parm.u.uint32 = VBOX_SHARED_CLIPBOARD_MODE_BIDIRECTIONAL;
break;
}
}
pVMMDev->hgcmHostCall("VBoxSharedClipboard", VBOX_SHARED_CLIPBOARD_HOST_FN_SET_MODE, 1, &parm);
parm.setUInt32(!useHostClipboard());
pVMMDev->hgcmHostCall("VBoxSharedClipboard", VBOX_SHARED_CLIPBOARD_HOST_FN_SET_HEADLESS, 1, &parm);
Log(("Set VBoxSharedClipboard mode\n"));
}
}
}
#ifdef VBOX_WITH_DRAG_AND_DROP
/*
* Drag & Drop
*/
{
/* Load the service */
rc = pVMMDev->hgcmLoadService("VBoxDragAndDropSvc", "VBoxDragAndDropSvc");
if (RT_FAILURE(rc))
{
LogRel(("VBoxDragAndDropService is not available. rc = %Rrc\n", rc));
/* That is not a fatal failure. */
rc = VINF_SUCCESS;
}
else
{
HGCMSVCEXTHANDLE hDummy;
rc = HGCMHostRegisterServiceExtension(&hDummy, "VBoxDragAndDropSvc",
&GuestDnD::notifyGuestDragAndDropEvent,
getGuest());
if (RT_FAILURE(rc))
Log(("Cannot register VBoxDragAndDropSvc extension!\n"));
else
Log(("VBoxDragAndDropSvc loaded\n"));
}
}
#endif /* VBOX_WITH_DRAG_AND_DROP */
#ifdef VBOX_WITH_CROGL
/*
* crOpenGL
*/
{
BOOL fEnabled3D = false;
hrc = pMachine->COMGETTER(Accelerate3DEnabled)(&fEnabled3D); H();
if (fEnabled3D)
{
BOOL fSupports3D = false;
hrc = host->COMGETTER(Acceleration3DAvailable)(&fSupports3D); H();
if (!fSupports3D)
return VMSetError(pVM, VERR_NOT_AVAILABLE, RT_SRC_POS,
N_("This VM was configured to use 3D acceleration. However, the "
"3D support of the host is not working properly and the "
"VM cannot be started. To fix this problem, either "
"fix the host 3D support (update the host graphics driver?) "
"or disable 3D acceleration in the VM settings"));
/* Load the service */
rc = pVMMDev->hgcmLoadService("VBoxSharedCrOpenGL", "VBoxSharedCrOpenGL");
if (RT_FAILURE(rc))
{
LogRel(("Failed to load Shared OpenGL service %Rrc\n", rc));
/* That is not a fatal failure. */
rc = VINF_SUCCESS;
}
else
{
LogRel(("Shared crOpenGL service loaded.\n"));
/* Setup the service. */
VBOXHGCMSVCPARM parm;
parm.type = VBOX_HGCM_SVC_PARM_PTR;
parm.u.pointer.addr = (IConsole *)(Console *)this;
parm.u.pointer.size = sizeof(IConsole *);
rc = pVMMDev->hgcmHostCall("VBoxSharedCrOpenGL", SHCRGL_HOST_FN_SET_CONSOLE, SHCRGL_CPARMS_SET_CONSOLE, &parm);
if (!RT_SUCCESS(rc))
AssertMsgFailed(("SHCRGL_HOST_FN_SET_CONSOLE failed with %Rrc\n", rc));
parm.u.pointer.addr = pVM;
parm.u.pointer.size = sizeof(pVM);
rc = pVMMDev->hgcmHostCall("VBoxSharedCrOpenGL", SHCRGL_HOST_FN_SET_VM, SHCRGL_CPARMS_SET_VM, &parm);
if (!RT_SUCCESS(rc))
AssertMsgFailed(("SHCRGL_HOST_FN_SET_VM failed with %Rrc\n", rc));
}
}
}
#endif
#ifdef VBOX_WITH_GUEST_PROPS
/*
* Guest property service
*/
rc = configGuestProperties(this);
#endif /* VBOX_WITH_GUEST_PROPS defined */
#ifdef VBOX_WITH_GUEST_CONTROL
/*
* Guest control service
*/
rc = configGuestControl(this);
#endif /* VBOX_WITH_GUEST_CONTROL defined */
/*
* ACPI
*/
BOOL fACPI;
hrc = biosSettings->COMGETTER(ACPIEnabled)(&fACPI); H();
if (fACPI)
{
BOOL fCpuHotPlug = false;
BOOL fShowCpu = fOsXGuest;
/* Always show the CPU leafs when we have multiple VCPUs or when the IO-APIC is enabled.
* The Windows SMP kernel needs a CPU leaf or else its idle loop will burn cpu cycles; the
* intelppm driver refuses to register an idle state handler.
*/
if ((cCpus > 1) || fIOAPIC)
fShowCpu = true;
hrc = pMachine->COMGETTER(CPUHotPlugEnabled)(&fCpuHotPlug); H();
InsertConfigNode(pDevices, "acpi", &pDev);
InsertConfigNode(pDev, "0", &pInst);
InsertConfigInteger(pInst, "Trusted", 1); /* boolean */
InsertConfigNode(pInst, "Config", &pCfg);
hrc = BusMgr->assignPciDevice("acpi", pInst); H();
InsertConfigInteger(pCfg, "RamSize", cbRam);
InsertConfigInteger(pCfg, "RamHoleSize", cbRamHole);
InsertConfigInteger(pCfg, "NumCPUs", cCpus);
InsertConfigInteger(pCfg, "IOAPIC", fIOAPIC);
InsertConfigInteger(pCfg, "FdcEnabled", fFdcEnabled);
InsertConfigInteger(pCfg, "HpetEnabled", fHpetEnabled);
InsertConfigInteger(pCfg, "SmcEnabled", fSmcEnabled);
InsertConfigInteger(pCfg, "ShowRtc", fShowRtc);
if (fOsXGuest && !llBootNics.empty())
{
BootNic aNic = llBootNics.front();
uint32_t u32NicPciAddr = (aNic.mPciAddress.miDevice << 16) | aNic.mPciAddress.miFn;
InsertConfigInteger(pCfg, "NicPciAddress", u32NicPciAddr);
}
if (fOsXGuest && fAudioEnabled)
{
PciBusAddress Address;
if (BusMgr->findPciAddress("hda", 0, Address))
{
uint32_t u32AudioPciAddr = (Address.miDevice << 16) | Address.miFn;
InsertConfigInteger(pCfg, "AudioPciAddress", u32AudioPciAddr);
}
}
InsertConfigInteger(pCfg, "IocPciAddress", uIocPciAddress);
if (chipsetType == ChipsetType_ICH9)
{
InsertConfigInteger(pCfg, "McfgBase", uMcfgBase);
InsertConfigInteger(pCfg, "McfgLength", cbMcfgLength);
}
InsertConfigInteger(pCfg, "HostBusPciAddress", uHbcPciAddress);
InsertConfigInteger(pCfg, "ShowCpu", fShowCpu);
InsertConfigInteger(pCfg, "CpuHotPlug", fCpuHotPlug);
InsertConfigInteger(pCfg, "Serial0IoPortBase", auSerialIoPortBase[0]);
InsertConfigInteger(pCfg, "Serial0Irq", auSerialIrq[0]);
InsertConfigInteger(pCfg, "Serial1IoPortBase", auSerialIoPortBase[1]);
InsertConfigInteger(pCfg, "Serial1Irq", auSerialIrq[1]);
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "ACPIHost");
InsertConfigNode(pLunL0, "Config", &pCfg);
/* Attach the dummy CPU drivers */
for (ULONG iCpuCurr = 1; iCpuCurr < cCpus; iCpuCurr++)
{
BOOL fCpuAttached = true;
if (fCpuHotPlug)
{
hrc = pMachine->GetCPUStatus(iCpuCurr, &fCpuAttached); H();
}
if (fCpuAttached)
{
InsertConfigNode(pInst, Utf8StrFmt("LUN#%u", iCpuCurr).c_str(), &pLunL0);
InsertConfigString(pLunL0, "Driver", "ACPICpu");
InsertConfigNode(pLunL0, "Config", &pCfg);
}
}
}
/*
* Configure DBGF (Debug(ger) Facility).
*/
{
PCFGMNODE pDbgf;
InsertConfigNode(pRoot, "DBGF", &pDbgf);
/* Paths to search for debug info and such things. */
hrc = pMachine->COMGETTER(SettingsFilePath)(bstr.asOutParam()); H();
Utf8Str strSettingsPath(bstr);
bstr.setNull();
strSettingsPath.stripFilename();
char szHomeDir[RTPATH_MAX];
rc = RTPathUserHome(szHomeDir, sizeof(szHomeDir));
if (RT_FAILURE(rc))
szHomeDir[0] = '\0';
Utf8Str strPath;
strPath.append(strSettingsPath).append("/debug/;");
strPath.append(strSettingsPath).append("/;");
strPath.append(szHomeDir).append("/");
InsertConfigString(pDbgf, "Path", strPath.c_str());
/* Tracing configuration. */
BOOL fTracingEnabled;
hrc = pMachine->COMGETTER(TracingEnabled)(&fTracingEnabled); H();
if (fTracingEnabled)
InsertConfigInteger(pDbgf, "TracingEnabled", 1);
hrc = pMachine->COMGETTER(TracingConfig)(bstr.asOutParam()); H();
if (fTracingEnabled)
InsertConfigString(pDbgf, "TracingConfig", bstr);
BOOL fAllowTracingToAccessVM;
hrc = pMachine->COMGETTER(AllowTracingToAccessVM)(&fAllowTracingToAccessVM); H();
if (fAllowTracingToAccessVM)
InsertConfigInteger(pPDM, "AllowTracingToAccessVM", 1);
}
}
catch (ConfigError &x)
{
// InsertConfig threw something:
return x.m_vrc;
}
#ifdef VBOX_WITH_EXTPACK
/*
* Call the extension pack hooks if everything went well thus far.
*/
if (RT_SUCCESS(rc))
{
pAlock->release();
rc = mptrExtPackManager->callAllVmConfigureVmmHooks(this, pVM);
pAlock->acquire();
}
#endif
/*
* Apply the CFGM overlay.
*/
if (RT_SUCCESS(rc))
rc = configCfgmOverlay(pVM, virtualBox, pMachine);
#undef H
pAlock->release(); /* Avoid triggering the lock order inversion check. */
/*
* Register VM state change handler.
*/
int rc2 = VMR3AtStateRegister(pVM, Console::vmstateChangeCallback, this);
AssertRC(rc2);
if (RT_SUCCESS(rc))
rc = rc2;
/*
* Register VM runtime error handler.
*/
rc2 = VMR3AtRuntimeErrorRegister(pVM, Console::setVMRuntimeErrorCallback, this);
AssertRC(rc2);
if (RT_SUCCESS(rc))
rc = rc2;
pAlock->acquire();
LogFlowFunc(("vrc = %Rrc\n", rc));
LogFlowFuncLeave();
return rc;
}
/**
* Applies the CFGM overlay as specified by /VBoxInternal/XXX extra data
* values.
*
* @returns VBox status code.
* @param pVM The VM handle.
* @param pVirtualBox Pointer to the IVirtualBox interface.
* @param pMachine Pointer to the IMachine interface.
*/
/* static */
int Console::configCfgmOverlay(PVM pVM, IVirtualBox *pVirtualBox, IMachine *pMachine)
{
/*
* CFGM overlay handling.
*
* Here we check the extra data entries for CFGM values
* and create the nodes and insert the values on the fly. Existing
* values will be removed and reinserted. CFGM is typed, so by default
* we will guess whether it's a string or an integer (byte arrays are
* not currently supported). It's possible to override this autodetection
* by adding "string:", "integer:" or "bytes:" (future).
*
* We first perform a run on global extra data, then on the machine
* extra data to support global settings with local overrides.
*/
PCFGMNODE pRoot = CFGMR3GetRoot(pVM);
int rc = VINF_SUCCESS;
try
{
/** @todo add support for removing nodes and byte blobs. */
/*
* Get the next key
*/
SafeArray<BSTR> aGlobalExtraDataKeys;
SafeArray<BSTR> aMachineExtraDataKeys;
HRESULT hrc = pVirtualBox->GetExtraDataKeys(ComSafeArrayAsOutParam(aGlobalExtraDataKeys));
AssertMsg(SUCCEEDED(hrc), ("VirtualBox::GetExtraDataKeys failed with %Rhrc\n", hrc));
// remember the no. of global values so we can call the correct method below
size_t cGlobalValues = aGlobalExtraDataKeys.size();
hrc = pMachine->GetExtraDataKeys(ComSafeArrayAsOutParam(aMachineExtraDataKeys));
AssertMsg(SUCCEEDED(hrc), ("VirtualBox::GetExtraDataKeys failed with %Rhrc\n", hrc));
// build a combined list from global keys...
std::list<Utf8Str> llExtraDataKeys;
for (size_t i = 0; i < aGlobalExtraDataKeys.size(); ++i)
llExtraDataKeys.push_back(Utf8Str(aGlobalExtraDataKeys[i]));
// ... and machine keys
for (size_t i = 0; i < aMachineExtraDataKeys.size(); ++i)
llExtraDataKeys.push_back(Utf8Str(aMachineExtraDataKeys[i]));
size_t i2 = 0;
for (std::list<Utf8Str>::const_iterator it = llExtraDataKeys.begin();
it != llExtraDataKeys.end();
++it, ++i2)
{
const Utf8Str &strKey = *it;
/*
* We only care about keys starting with "VBoxInternal/" (skip "G:" or "M:")
*/
if (!strKey.startsWith("VBoxInternal/"))
continue;
const char *pszExtraDataKey = strKey.c_str() + sizeof("VBoxInternal/") - 1;
// get the value
Bstr bstrExtraDataValue;
if (i2 < cGlobalValues)
// this is still one of the global values:
hrc = pVirtualBox->GetExtraData(Bstr(strKey).raw(),
bstrExtraDataValue.asOutParam());
else
hrc = pMachine->GetExtraData(Bstr(strKey).raw(),
bstrExtraDataValue.asOutParam());
if (FAILED(hrc))
LogRel(("Warning: Cannot get extra data key %s, rc = %Rrc\n", strKey.c_str(), hrc));
/*
* The key will be in the format "Node1/Node2/Value" or simply "Value".
* Split the two and get the node, delete the value and create the node
* if necessary.
*/
PCFGMNODE pNode;
const char *pszCFGMValueName = strrchr(pszExtraDataKey, '/');
if (pszCFGMValueName)
{
/* terminate the node and advance to the value (Utf8Str might not
offically like this but wtf) */
*(char*)pszCFGMValueName = '\0';
++pszCFGMValueName;
/* does the node already exist? */
pNode = CFGMR3GetChild(pRoot, pszExtraDataKey);
if (pNode)
CFGMR3RemoveValue(pNode, pszCFGMValueName);
else
{
/* create the node */
rc = CFGMR3InsertNode(pRoot, pszExtraDataKey, &pNode);
if (RT_FAILURE(rc))
{
AssertLogRelMsgRC(rc, ("failed to insert node '%s'\n", pszExtraDataKey));
continue;
}
Assert(pNode);
}
}
else
{
/* root value (no node path). */
pNode = pRoot;
pszCFGMValueName = pszExtraDataKey;
pszExtraDataKey--;
CFGMR3RemoveValue(pNode, pszCFGMValueName);
}
/*
* Now let's have a look at the value.
* Empty strings means that we should remove the value, which we've
* already done above.
*/
Utf8Str strCFGMValueUtf8(bstrExtraDataValue);
if (!strCFGMValueUtf8.isEmpty())
{
uint64_t u64Value;
/* check for type prefix first. */
if (!strncmp(strCFGMValueUtf8.c_str(), "string:", sizeof("string:") - 1))
InsertConfigString(pNode, pszCFGMValueName, strCFGMValueUtf8.c_str() + sizeof("string:") - 1);
else if (!strncmp(strCFGMValueUtf8.c_str(), "integer:", sizeof("integer:") - 1))
{
rc = RTStrToUInt64Full(strCFGMValueUtf8.c_str() + sizeof("integer:") - 1, 0, &u64Value);
if (RT_SUCCESS(rc))
rc = CFGMR3InsertInteger(pNode, pszCFGMValueName, u64Value);
}
else if (!strncmp(strCFGMValueUtf8.c_str(), "bytes:", sizeof("bytes:") - 1))
rc = VERR_NOT_IMPLEMENTED;
/* auto detect type. */
else if (RT_SUCCESS(RTStrToUInt64Full(strCFGMValueUtf8.c_str(), 0, &u64Value)))
rc = CFGMR3InsertInteger(pNode, pszCFGMValueName, u64Value);
else
InsertConfigString(pNode, pszCFGMValueName, strCFGMValueUtf8);
AssertLogRelMsgRCBreak(rc, ("failed to insert CFGM value '%s' to key '%s'\n", strCFGMValueUtf8.c_str(), pszExtraDataKey));
}
}
}
catch (ConfigError &x)
{
// InsertConfig threw something:
return x.m_vrc;
}
return rc;
}
/**
* Ellipsis to va_list wrapper for calling setVMRuntimeErrorCallback.
*/
/*static*/
void Console::setVMRuntimeErrorCallbackF(PVM pVM, void *pvConsole, uint32_t fFlags, const char *pszErrorId, const char *pszFormat, ...)
{
va_list va;
va_start(va, pszFormat);
setVMRuntimeErrorCallback(pVM, pvConsole, fFlags, pszErrorId, pszFormat, va);
va_end(va);
}
/* XXX introduce RT format specifier */
static uint64_t formatDiskSize(uint64_t u64Size, const char **pszUnit)
{
if (u64Size > INT64_C(5000)*_1G)
{
*pszUnit = "TB";
return u64Size / _1T;
}
else if (u64Size > INT64_C(5000)*_1M)
{
*pszUnit = "GB";
return u64Size / _1G;
}
else
{
*pszUnit = "MB";
return u64Size / _1M;
}
}
int Console::configMediumAttachment(PCFGMNODE pCtlInst,
const char *pcszDevice,
unsigned uInstance,
StorageBus_T enmBus,
bool fUseHostIOCache,
bool fBuiltinIoCache,
bool fSetupMerge,
unsigned uMergeSource,
unsigned uMergeTarget,
IMediumAttachment *pMediumAtt,
MachineState_T aMachineState,
HRESULT *phrc,
bool fAttachDetach,
bool fForceUnmount,
bool fHotplug,
PVM pVM,
DeviceType_T *paLedDevType)
{
// InsertConfig* throws
try
{
int rc = VINF_SUCCESS;
HRESULT hrc;
Bstr bstr;
// #define RC_CHECK() AssertMsgReturn(RT_SUCCESS(rc), ("rc=%Rrc\n", rc), rc)
#define H() AssertMsgReturn(!FAILED(hrc), ("hrc=%Rhrc\n", hrc), VERR_GENERAL_FAILURE)
LONG lDev;
hrc = pMediumAtt->COMGETTER(Device)(&lDev); H();
LONG lPort;
hrc = pMediumAtt->COMGETTER(Port)(&lPort); H();
DeviceType_T lType;
hrc = pMediumAtt->COMGETTER(Type)(&lType); H();
BOOL fNonRotational;
hrc = pMediumAtt->COMGETTER(NonRotational)(&fNonRotational); H();
BOOL fDiscard;
hrc = pMediumAtt->COMGETTER(Discard)(&fDiscard); H();
unsigned uLUN;
PCFGMNODE pLunL0 = NULL;
hrc = Console::convertBusPortDeviceToLun(enmBus, lPort, lDev, uLUN); H();
/* First check if the LUN already exists. */
pLunL0 = CFGMR3GetChildF(pCtlInst, "LUN#%u", uLUN);
if (pLunL0)
{
if (fAttachDetach)
{
if (lType != DeviceType_HardDisk)
{
/* Unmount existing media only for floppy and DVD drives. */
PPDMIBASE pBase;
rc = PDMR3QueryLun(pVM, pcszDevice, uInstance, uLUN, &pBase);
if (RT_FAILURE(rc))
{
if (rc == VERR_PDM_LUN_NOT_FOUND || rc == VERR_PDM_NO_DRIVER_ATTACHED_TO_LUN)
rc = VINF_SUCCESS;
AssertRC(rc);
}
else
{
PPDMIMOUNT pIMount = PDMIBASE_QUERY_INTERFACE(pBase, PDMIMOUNT);
AssertReturn(pIMount, VERR_INVALID_POINTER);
/* Unmount the media (but do not eject the medium!) */
rc = pIMount->pfnUnmount(pIMount, fForceUnmount, false /*=fEject*/);
if (rc == VERR_PDM_MEDIA_NOT_MOUNTED)
rc = VINF_SUCCESS;
/* for example if the medium is locked */
else if (RT_FAILURE(rc))
return rc;
}
}
rc = PDMR3DeviceDetach(pVM, pcszDevice, uInstance, uLUN, fHotplug ? 0 : PDM_TACH_FLAGS_NOT_HOT_PLUG);
if (rc == VERR_PDM_NO_DRIVER_ATTACHED_TO_LUN)
rc = VINF_SUCCESS;
AssertRCReturn(rc, rc);
CFGMR3RemoveNode(pLunL0);
}
else
AssertFailedReturn(VERR_INTERNAL_ERROR);
}
InsertConfigNode(pCtlInst, Utf8StrFmt("LUN#%u", uLUN).c_str(), &pLunL0);
PCFGMNODE pCfg = CFGMR3GetChild(pCtlInst, "Config");
if (pCfg)
{
if (!strcmp(pcszDevice, "piix3ide"))
{
PCFGMNODE pDrive = CFGMR3GetChild(pCfg, g_apszIDEDrives[uLUN]);
if (!pDrive)
InsertConfigNode(pCfg, g_apszIDEDrives[uLUN], &pDrive);
/* Don't use the RemoveConfigValue wrapper above, as we don't
* know if the leaf is present or not. */
CFGMR3RemoveValue(pDrive, "NonRotationalMedium");
InsertConfigInteger(pDrive, "NonRotationalMedium", !!fNonRotational);
}
else if (!strcmp(pcszDevice, "ahci"))
{
Utf8Str strPort = Utf8StrFmt("Port%u", uLUN);
PCFGMNODE pDrive = CFGMR3GetChild(pCfg, strPort.c_str());
if (!pDrive)
InsertConfigNode(pCfg, strPort.c_str(), &pDrive);
/* Don't use the RemoveConfigValue wrapper above, as we don't
* know if the leaf is present or not. */
CFGMR3RemoveValue(pDrive, "NonRotationalMedium");
InsertConfigInteger(pDrive, "NonRotationalMedium", !!fNonRotational);
}
}
Utf8Str devicePath = Utf8StrFmt("%s/%u/LUN#%u", pcszDevice, uInstance, uLUN);
mapMediumAttachments[devicePath] = pMediumAtt;
/* SCSI has a another driver between device and block. */
if (enmBus == StorageBus_SCSI || enmBus == StorageBus_SAS)
{
InsertConfigString(pLunL0, "Driver", "SCSI");
PCFGMNODE pL1Cfg = NULL;
InsertConfigNode(pLunL0, "Config", &pL1Cfg);
InsertConfigInteger(pL1Cfg, "NonRotationalMedium", !!fNonRotational);
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL0);
}
ComPtr<IMedium> pMedium;
hrc = pMediumAtt->COMGETTER(Medium)(pMedium.asOutParam()); H();
/*
* 1. Only check this for hard disk images.
* 2. Only check during VM creation and not later, especially not during
* taking an online snapshot!
*/
if ( lType == DeviceType_HardDisk
&& ( aMachineState == MachineState_Starting
|| aMachineState == MachineState_Restoring))
{
/*
* Some sanity checks.
*/
ComPtr<IMediumFormat> pMediumFormat;
hrc = pMedium->COMGETTER(MediumFormat)(pMediumFormat.asOutParam()); H();
ULONG uCaps;
hrc = pMediumFormat->COMGETTER(Capabilities)(&uCaps); H();
if (uCaps & MediumFormatCapabilities_File)
{
Bstr strFile;
hrc = pMedium->COMGETTER(Location)(strFile.asOutParam()); H();
Utf8Str utfFile = Utf8Str(strFile);
Bstr strSnap;
ComPtr<IMachine> pMachine = machine();
hrc = pMachine->COMGETTER(SnapshotFolder)(strSnap.asOutParam()); H();
Utf8Str utfSnap = Utf8Str(strSnap);
RTFSTYPE enmFsTypeFile = RTFSTYPE_UNKNOWN;
RTFSTYPE enmFsTypeSnap = RTFSTYPE_UNKNOWN;
int rc2 = RTFsQueryType(utfFile.c_str(), &enmFsTypeFile);
AssertMsgRCReturn(rc2, ("Querying the file type of '%s' failed!\n", utfFile.c_str()), rc2);
/* Ignore the error code. On error, the file system type is still 'unknown' so
* none of the following paths are taken. This can happen for new VMs which
* still don't have a snapshot folder. */
(void)RTFsQueryType(utfSnap.c_str(), &enmFsTypeSnap);
if (!mfSnapshotFolderDiskTypeShown)
{
LogRel(("File system of '%s' (snapshots) is %s\n", utfSnap.c_str(), RTFsTypeName(enmFsTypeSnap)));
mfSnapshotFolderDiskTypeShown = true;
}
LogRel(("File system of '%s' is %s\n", utfFile.c_str(), RTFsTypeName(enmFsTypeFile)));
LONG64 i64Size;
hrc = pMedium->COMGETTER(LogicalSize)(&i64Size); H();
#ifdef RT_OS_WINDOWS
if ( enmFsTypeFile == RTFSTYPE_FAT
&& i64Size >= _4G)
{
const char *pszUnit;
uint64_t u64Print = formatDiskSize((uint64_t)i64Size, &pszUnit);
setVMRuntimeErrorCallbackF(pVM, this, 0,
"FatPartitionDetected",
N_("The medium '%ls' has a logical size of %RU64%s "
"but the file system the medium is located on seems "
"to be FAT(32) which cannot handle files bigger than 4GB.\n"
"We strongly recommend to put all your virtual disk images and "
"the snapshot folder onto an NTFS partition"),
strFile.raw(), u64Print, pszUnit);
}
#else /* !RT_OS_WINDOWS */
if ( enmFsTypeFile == RTFSTYPE_FAT
|| enmFsTypeFile == RTFSTYPE_EXT
|| enmFsTypeFile == RTFSTYPE_EXT2
|| enmFsTypeFile == RTFSTYPE_EXT3
|| enmFsTypeFile == RTFSTYPE_EXT4)
{
RTFILE file;
rc = RTFileOpen(&file, utfFile.c_str(), RTFILE_O_READ | RTFILE_O_OPEN | RTFILE_O_DENY_NONE);
if (RT_SUCCESS(rc))
{
RTFOFF maxSize;
/* Careful: This function will work only on selected local file systems! */
rc = RTFileGetMaxSizeEx(file, &maxSize);
RTFileClose(file);
if ( RT_SUCCESS(rc)
&& maxSize > 0
&& i64Size > (LONG64)maxSize)
{
const char *pszUnitSiz;
const char *pszUnitMax;
uint64_t u64PrintSiz = formatDiskSize((LONG64)i64Size, &pszUnitSiz);
uint64_t u64PrintMax = formatDiskSize(maxSize, &pszUnitMax);
setVMRuntimeErrorCallbackF(pVM, this, 0,
"FatPartitionDetected", /* <= not exact but ... */
N_("The medium '%ls' has a logical size of %RU64%s "
"but the file system the medium is located on can "
"only handle files up to %RU64%s in theory.\n"
"We strongly recommend to put all your virtual disk "
"images and the snapshot folder onto a proper "
"file system (e.g. ext3) with a sufficient size"),
strFile.raw(), u64PrintSiz, pszUnitSiz, u64PrintMax, pszUnitMax);
}
}
}
#endif /* !RT_OS_WINDOWS */
/*
* Snapshot folder:
* Here we test only for a FAT partition as we had to create a dummy file otherwise
*/
if ( enmFsTypeSnap == RTFSTYPE_FAT
&& i64Size >= _4G
&& !mfSnapshotFolderSizeWarningShown)
{
const char *pszUnit;
uint64_t u64Print = formatDiskSize(i64Size, &pszUnit);
setVMRuntimeErrorCallbackF(pVM, this, 0,
"FatPartitionDetected",
#ifdef RT_OS_WINDOWS
N_("The snapshot folder of this VM '%ls' seems to be located on "
"a FAT(32) file system. The logical size of the medium '%ls' "
"(%RU64%s) is bigger than the maximum file size this file "
"system can handle (4GB).\n"
"We strongly recommend to put all your virtual disk images and "
"the snapshot folder onto an NTFS partition"),
#else
N_("The snapshot folder of this VM '%ls' seems to be located on "
"a FAT(32) file system. The logical size of the medium '%ls' "
"(%RU64%s) is bigger than the maximum file size this file "
"system can handle (4GB).\n"
"We strongly recommend to put all your virtual disk images and "
"the snapshot folder onto a proper file system (e.g. ext3)"),
#endif
strSnap.raw(), strFile.raw(), u64Print, pszUnit);
/* Show this particular warning only once */
mfSnapshotFolderSizeWarningShown = true;
}
#ifdef RT_OS_LINUX
/*
* Ext4 bug: Check if the host I/O cache is disabled and the disk image is located
* on an ext4 partition. Later we have to check the Linux kernel version!
* This bug apparently applies to the XFS file system as well.
* Linux 2.6.36 is known to be fixed (tested with 2.6.36-rc4).
*/
char szOsRelease[128];
rc = RTSystemQueryOSInfo(RTSYSOSINFO_RELEASE, szOsRelease, sizeof(szOsRelease));
bool fKernelHasODirectBug = RT_FAILURE(rc)
|| (RTStrVersionCompare(szOsRelease, "2.6.36-rc4") < 0);
if ( (uCaps & MediumFormatCapabilities_Asynchronous)
&& !fUseHostIOCache
&& fKernelHasODirectBug)
{
if ( enmFsTypeFile == RTFSTYPE_EXT4
|| enmFsTypeFile == RTFSTYPE_XFS)
{
setVMRuntimeErrorCallbackF(pVM, this, 0,
"Ext4PartitionDetected",
N_("The host I/O cache for at least one controller is disabled "
"and the medium '%ls' for this VM "
"is located on an %s partition. There is a known Linux "
"kernel bug which can lead to the corruption of the virtual "
"disk image under these conditions.\n"
"Either enable the host I/O cache permanently in the VM "
"settings or put the disk image and the snapshot folder "
"onto a different file system.\n"
"The host I/O cache will now be enabled for this medium"),
strFile.raw(), enmFsTypeFile == RTFSTYPE_EXT4 ? "ext4" : "xfs");
fUseHostIOCache = true;
}
else if ( ( enmFsTypeSnap == RTFSTYPE_EXT4
|| enmFsTypeSnap == RTFSTYPE_XFS)
&& !mfSnapshotFolderExt4WarningShown)
{
setVMRuntimeErrorCallbackF(pVM, this, 0,
"Ext4PartitionDetected",
N_("The host I/O cache for at least one controller is disabled "
"and the snapshot folder for this VM "
"is located on an %s partition. There is a known Linux "
"kernel bug which can lead to the corruption of the virtual "
"disk image under these conditions.\n"
"Either enable the host I/O cache permanently in the VM "
"settings or put the disk image and the snapshot folder "
"onto a different file system.\n"
"The host I/O cache will now be enabled for this medium"),
enmFsTypeSnap == RTFSTYPE_EXT4 ? "ext4" : "xfs");
fUseHostIOCache = true;
mfSnapshotFolderExt4WarningShown = true;
}
}
#endif
}
}
BOOL fPassthrough;
hrc = pMediumAtt->COMGETTER(Passthrough)(&fPassthrough); H();
ComObjPtr<IBandwidthGroup> pBwGroup;
Bstr strBwGroup;
hrc = pMediumAtt->COMGETTER(BandwidthGroup)(pBwGroup.asOutParam()); H();
if (!pBwGroup.isNull())
{
hrc = pBwGroup->COMGETTER(Name)(strBwGroup.asOutParam()); H();
}
rc = configMedium(pLunL0,
!!fPassthrough,
lType,
fUseHostIOCache,
fBuiltinIoCache,
fSetupMerge,
uMergeSource,
uMergeTarget,
strBwGroup.isEmpty() ? NULL : Utf8Str(strBwGroup).c_str(),
fDiscard,
pMedium,
aMachineState,
phrc);
if (RT_FAILURE(rc))
return rc;
if (fAttachDetach)
{
/* Attach the new driver. */
rc = PDMR3DeviceAttach(pVM, pcszDevice, uInstance, uLUN,
fHotplug ? 0 : PDM_TACH_FLAGS_NOT_HOT_PLUG, NULL /*ppBase*/);
AssertRCReturn(rc, rc);
/* There is no need to handle removable medium mounting, as we
* unconditionally replace everthing including the block driver level.
* This means the new medium will be picked up automatically. */
}
if (paLedDevType)
paLedDevType[uLUN] = lType;
}
catch (ConfigError &x)
{
// InsertConfig threw something:
return x.m_vrc;
}
#undef H
return VINF_SUCCESS;;
}
int Console::configMedium(PCFGMNODE pLunL0,
bool fPassthrough,
DeviceType_T enmType,
bool fUseHostIOCache,
bool fBuiltinIoCache,
bool fSetupMerge,
unsigned uMergeSource,
unsigned uMergeTarget,
const char *pcszBwGroup,
bool fDiscard,
IMedium *pMedium,
MachineState_T aMachineState,
HRESULT *phrc)
{
// InsertConfig* throws
try
{
int rc = VINF_SUCCESS;
HRESULT hrc;
Bstr bstr;
PCFGMNODE pLunL1 = NULL;
PCFGMNODE pCfg = NULL;
#define H() \
AssertMsgReturnStmt(SUCCEEDED(hrc), ("hrc=%Rhrc\n", hrc), if (phrc) *phrc = hrc, Global::vboxStatusCodeFromCOM(hrc))
BOOL fHostDrive = FALSE;
MediumType_T mediumType = MediumType_Normal;
if (pMedium)
{
hrc = pMedium->COMGETTER(HostDrive)(&fHostDrive); H();
hrc = pMedium->COMGETTER(Type)(&mediumType); H();
}
if (fHostDrive)
{
Assert(pMedium);
if (enmType == DeviceType_DVD)
{
InsertConfigString(pLunL0, "Driver", "HostDVD");
InsertConfigNode(pLunL0, "Config", &pCfg);
hrc = pMedium->COMGETTER(Location)(bstr.asOutParam()); H();
InsertConfigString(pCfg, "Path", bstr);
InsertConfigInteger(pCfg, "Passthrough", fPassthrough);
}
else if (enmType == DeviceType_Floppy)
{
InsertConfigString(pLunL0, "Driver", "HostFloppy");
InsertConfigNode(pLunL0, "Config", &pCfg);
hrc = pMedium->COMGETTER(Location)(bstr.asOutParam()); H();
InsertConfigString(pCfg, "Path", bstr);
}
}
else
{
InsertConfigString(pLunL0, "Driver", "Block");
InsertConfigNode(pLunL0, "Config", &pCfg);
switch (enmType)
{
case DeviceType_DVD:
InsertConfigString(pCfg, "Type", "DVD");
InsertConfigInteger(pCfg, "Mountable", 1);
break;
case DeviceType_Floppy:
InsertConfigString(pCfg, "Type", "Floppy 1.44");
InsertConfigInteger(pCfg, "Mountable", 1);
break;
case DeviceType_HardDisk:
default:
InsertConfigString(pCfg, "Type", "HardDisk");
InsertConfigInteger(pCfg, "Mountable", 0);
}
if ( pMedium
&& ( enmType == DeviceType_DVD
|| enmType == DeviceType_Floppy)
)
{
// if this medium represents an ISO image and this image is inaccessible,
// the ignore it instead of causing a failure; this can happen when we
// restore a VM state and the ISO has disappeared, e.g. because the Guest
// Additions were mounted and the user upgraded VirtualBox. Previously
// we failed on startup, but that's not good because the only way out then
// would be to discard the VM state...
MediumState_T mediumState;
hrc = pMedium->RefreshState(&mediumState); H();
if (mediumState == MediumState_Inaccessible)
{
Bstr loc;
hrc = pMedium->COMGETTER(Location)(loc.asOutParam()); H();
setVMRuntimeErrorCallbackF(VMR3GetVM(mpUVM),
this,
0,
"DvdOrFloppyImageInaccessible",
"The image file '%ls' is inaccessible and is being ignored. Please select a different image file for the virtual %s drive.",
loc.raw(),
enmType == DeviceType_DVD ? "DVD" : "floppy");
pMedium = NULL;
}
}
if (pMedium)
{
/* Start with length of parent chain, as the list is reversed */
unsigned uImage = 0;
IMedium *pTmp = pMedium;
while (pTmp)
{
uImage++;
hrc = pTmp->COMGETTER(Parent)(&pTmp); H();
}
/* Index of last image */
uImage--;
#if 0 /* Enable for I/O debugging */
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL0);
InsertConfigString(pLunL0, "Driver", "DiskIntegrity");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigInteger(pCfg, "CheckConsistency", 0);
InsertConfigInteger(pCfg, "CheckDoubleCompletions", 1);
#endif
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL1);
InsertConfigString(pLunL1, "Driver", "VD");
InsertConfigNode(pLunL1, "Config", &pCfg);
hrc = pMedium->COMGETTER(Location)(bstr.asOutParam()); H();
InsertConfigString(pCfg, "Path", bstr);
hrc = pMedium->COMGETTER(Format)(bstr.asOutParam()); H();
InsertConfigString(pCfg, "Format", bstr);
if (mediumType == MediumType_Readonly)
InsertConfigInteger(pCfg, "ReadOnly", 1);
else if (enmType == DeviceType_Floppy)
InsertConfigInteger(pCfg, "MaybeReadOnly", 1);
/* Start without exclusive write access to the images. */
/** @todo Live Migration: I don't quite like this, we risk screwing up when
* we're resuming the VM if some 3rd dude have any of the VDIs open
* with write sharing denied. However, if the two VMs are sharing a
* image it really is necessary....
*
* So, on the "lock-media" command, the target teleporter should also
* make DrvVD undo TempReadOnly. It gets interesting if we fail after
* that. Grumble. */
if ( enmType == DeviceType_HardDisk
&& ( aMachineState == MachineState_TeleportingIn
|| aMachineState == MachineState_FaultTolerantSyncing))
InsertConfigInteger(pCfg, "TempReadOnly", 1);
/* Flag for opening the medium for sharing between VMs. This
* is done at the moment only for the first (and only) medium
* in the chain, as shared media can have no diffs. */
if (mediumType == MediumType_Shareable)
InsertConfigInteger(pCfg, "Shareable", 1);
if (!fUseHostIOCache)
{
InsertConfigInteger(pCfg, "UseNewIo", 1);
/*
* Activate the builtin I/O cache for harddisks only.
* It caches writes only which doesn't make sense for DVD drives
* and just increases the overhead.
*/
if ( fBuiltinIoCache
&& (enmType == DeviceType_HardDisk))
InsertConfigInteger(pCfg, "BlockCache", 1);
}
if (fSetupMerge)
{
InsertConfigInteger(pCfg, "SetupMerge", 1);
if (uImage == uMergeSource)
InsertConfigInteger(pCfg, "MergeSource", 1);
else if (uImage == uMergeTarget)
InsertConfigInteger(pCfg, "MergeTarget", 1);
}
switch (enmType)
{
case DeviceType_DVD:
InsertConfigString(pCfg, "Type", "DVD");
break;
case DeviceType_Floppy:
InsertConfigString(pCfg, "Type", "Floppy");
break;
case DeviceType_HardDisk:
default:
InsertConfigString(pCfg, "Type", "HardDisk");
}
if (pcszBwGroup)
InsertConfigString(pCfg, "BwGroup", pcszBwGroup);
if (fDiscard)
InsertConfigInteger(pCfg, "Discard", 1);
/* Pass all custom parameters. */
bool fHostIP = true;
SafeArray<BSTR> names;
SafeArray<BSTR> values;
hrc = pMedium->GetProperties(Bstr().raw(),
ComSafeArrayAsOutParam(names),
ComSafeArrayAsOutParam(values)); H();
if (names.size() != 0)
{
PCFGMNODE pVDC;
InsertConfigNode(pCfg, "VDConfig", &pVDC);
for (size_t ii = 0; ii < names.size(); ++ii)
{
if (values[ii] && *values[ii])
{
Utf8Str name = names[ii];
Utf8Str value = values[ii];
InsertConfigString(pVDC, name.c_str(), value);
if ( name.compare("HostIPStack") == 0
&& value.compare("0") == 0)
fHostIP = false;
}
}
}
/* Create an inverted list of parents. */
uImage--;
IMedium *pParentMedium = pMedium;
for (PCFGMNODE pParent = pCfg;; uImage--)
{
hrc = pParentMedium->COMGETTER(Parent)(&pMedium); H();
if (!pMedium)
break;
PCFGMNODE pCur;
InsertConfigNode(pParent, "Parent", &pCur);
hrc = pMedium->COMGETTER(Location)(bstr.asOutParam()); H();
InsertConfigString(pCur, "Path", bstr);
hrc = pMedium->COMGETTER(Format)(bstr.asOutParam()); H();
InsertConfigString(pCur, "Format", bstr);
if (fSetupMerge)
{
if (uImage == uMergeSource)
InsertConfigInteger(pCur, "MergeSource", 1);
else if (uImage == uMergeTarget)
InsertConfigInteger(pCur, "MergeTarget", 1);
}
/* Pass all custom parameters. */
SafeArray<BSTR> aNames;
SafeArray<BSTR> aValues;
hrc = pMedium->GetProperties(NULL,
ComSafeArrayAsOutParam(aNames),
ComSafeArrayAsOutParam(aValues)); H();
if (aNames.size() != 0)
{
PCFGMNODE pVDC;
InsertConfigNode(pCur, "VDConfig", &pVDC);
for (size_t ii = 0; ii < aNames.size(); ++ii)
{
if (aValues[ii] && *aValues[ii])
{
Utf8Str name = aNames[ii];
Utf8Str value = aValues[ii];
InsertConfigString(pVDC, name.c_str(), value);
if ( name.compare("HostIPStack") == 0
&& value.compare("0") == 0)
fHostIP = false;
}
}
}
/* next */
pParent = pCur;
pParentMedium = pMedium;
}
/* Custom code: put marker to not use host IP stack to driver
* configuration node. Simplifies life of DrvVD a bit. */
if (!fHostIP)
InsertConfigInteger(pCfg, "HostIPStack", 0);
}
}
#undef H
}
catch (ConfigError &x)
{
// InsertConfig threw something:
return x.m_vrc;
}
return VINF_SUCCESS;
}
/**
* Construct the Network configuration tree
*
* @returns VBox status code.
*
* @param pszDevice The PDM device name.
* @param uInstance The PDM device instance.
* @param uLun The PDM LUN number of the drive.
* @param aNetworkAdapter The network adapter whose attachment needs to be changed
* @param pCfg Configuration node for the device
* @param pLunL0 To store the pointer to the LUN#0.
* @param pInst The instance CFGM node
* @param fAttachDetach To determine if the network attachment should
* be attached/detached after/before
* configuration.
* @param fIgnoreConnectFailure
* True if connection failures should be ignored
* (makes only sense for bridged/host-only networks).
*
* @note Locks this object for writing.
* @thread EMT
*/
int Console::configNetwork(const char *pszDevice,
unsigned uInstance,
unsigned uLun,
INetworkAdapter *aNetworkAdapter,
PCFGMNODE pCfg,
PCFGMNODE pLunL0,
PCFGMNODE pInst,
bool fAttachDetach,
bool fIgnoreConnectFailure)
{
AutoCaller autoCaller(this);
AssertComRCReturn(autoCaller.rc(), VERR_ACCESS_DENIED);
// InsertConfig* throws
try
{
int rc = VINF_SUCCESS;
HRESULT hrc;
Bstr bstr;
#define H() AssertMsgReturn(!FAILED(hrc), ("hrc=%Rhrc\n", hrc), VERR_GENERAL_FAILURE)
/*
* Locking the object before doing VMR3* calls is quite safe here, since
* we're on EMT. Write lock is necessary because we indirectly modify the
* meAttachmentType member.
*/
AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
PVM pVM = VMR3GetVM(mpUVM); /* We're on an EMT, so this is safe. */
ComPtr<IMachine> pMachine = machine();
ComPtr<IVirtualBox> virtualBox;
hrc = pMachine->COMGETTER(Parent)(virtualBox.asOutParam()); H();
ComPtr<IHost> host;
hrc = virtualBox->COMGETTER(Host)(host.asOutParam()); H();
BOOL fSniffer;
hrc = aNetworkAdapter->COMGETTER(TraceEnabled)(&fSniffer); H();
NetworkAdapterPromiscModePolicy_T enmPromiscModePolicy;
hrc = aNetworkAdapter->COMGETTER(PromiscModePolicy)(&enmPromiscModePolicy); H();
const char *pszPromiscuousGuestPolicy;
switch (enmPromiscModePolicy)
{
case NetworkAdapterPromiscModePolicy_Deny: pszPromiscuousGuestPolicy = "deny"; break;
case NetworkAdapterPromiscModePolicy_AllowNetwork: pszPromiscuousGuestPolicy = "allow-network"; break;
case NetworkAdapterPromiscModePolicy_AllowAll: pszPromiscuousGuestPolicy = "allow-all"; break;
default: AssertFailedReturn(VERR_INTERNAL_ERROR_4);
}
Utf8Str strNetDriver;
if (fAttachDetach && fSniffer)
{
const char *pszNetDriver = "IntNet";
if (meAttachmentType[uInstance] == NetworkAttachmentType_NAT)
pszNetDriver = "NAT";
#if !defined(VBOX_WITH_NETFLT) && defined(RT_OS_LINUX)
if (meAttachmentType[uInstance] == NetworkAttachmentType_Bridged)
pszNetDriver = "HostInterface";
#endif
if (meAttachmentType[uInstance] == NetworkAttachmentType_Generic)
{
hrc = aNetworkAdapter->COMGETTER(GenericDriver)(bstr.asOutParam()); H();
strNetDriver = bstr;
pszNetDriver = strNetDriver.c_str();
}
rc = PDMR3DriverDetach(pVM, pszDevice, uInstance, uLun, pszNetDriver, 0, 0 /*fFlags*/);
if (rc == VINF_PDM_NO_DRIVER_ATTACHED_TO_LUN)
rc = VINF_SUCCESS;
AssertLogRelRCReturn(rc, rc);
pLunL0 = CFGMR3GetChildF(pInst, "LUN#%u", uLun);
PCFGMNODE pLunAD = CFGMR3GetChildF(pLunL0, "AttachedDriver");
if (pLunAD)
{
CFGMR3RemoveNode(pLunAD);
}
else
{
CFGMR3RemoveNode(pLunL0);
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "NetSniffer");
InsertConfigNode(pLunL0, "Config", &pCfg);
hrc = aNetworkAdapter->COMGETTER(TraceFile)(bstr.asOutParam()); H();
if (!bstr.isEmpty()) /* check convention for indicating default file. */
InsertConfigString(pCfg, "File", bstr);
}
}
else if (fAttachDetach && !fSniffer)
{
rc = PDMR3DeviceDetach(pVM, pszDevice, uInstance, uLun, 0 /*fFlags*/);
if (rc == VINF_PDM_NO_DRIVER_ATTACHED_TO_LUN)
rc = VINF_SUCCESS;
AssertLogRelRCReturn(rc, rc);
/* nuke anything which might have been left behind. */
CFGMR3RemoveNode(CFGMR3GetChildF(pInst, "LUN#%u", uLun));
}
else if (!fAttachDetach && fSniffer)
{
/* insert the sniffer filter driver. */
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "NetSniffer");
InsertConfigNode(pLunL0, "Config", &pCfg);
hrc = aNetworkAdapter->COMGETTER(TraceFile)(bstr.asOutParam()); H();
if (!bstr.isEmpty()) /* check convention for indicating default file. */
InsertConfigString(pCfg, "File", bstr);
}
Bstr networkName, trunkName, trunkType;
NetworkAttachmentType_T eAttachmentType;
hrc = aNetworkAdapter->COMGETTER(AttachmentType)(&eAttachmentType); H();
switch (eAttachmentType)
{
case NetworkAttachmentType_Null:
break;
case NetworkAttachmentType_NAT:
{
ComPtr<INATEngine> natDriver;
hrc = aNetworkAdapter->COMGETTER(NatDriver)(natDriver.asOutParam()); H();
if (fSniffer)
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL0);
else
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "NAT");
InsertConfigNode(pLunL0, "Config", &pCfg);
/* Configure TFTP prefix and boot filename. */
hrc = virtualBox->COMGETTER(HomeFolder)(bstr.asOutParam()); H();
if (!bstr.isEmpty())
InsertConfigString(pCfg, "TFTPPrefix", Utf8StrFmt("%ls%c%s", bstr.raw(), RTPATH_DELIMITER, "TFTP"));
hrc = pMachine->COMGETTER(Name)(bstr.asOutParam()); H();
InsertConfigString(pCfg, "BootFile", Utf8StrFmt("%ls.pxe", bstr.raw()));
hrc = natDriver->COMGETTER(Network)(bstr.asOutParam()); H();
if (!bstr.isEmpty())
InsertConfigString(pCfg, "Network", bstr);
else
{
ULONG uSlot;
hrc = aNetworkAdapter->COMGETTER(Slot)(&uSlot); H();
InsertConfigString(pCfg, "Network", Utf8StrFmt("10.0.%d.0/24", uSlot+2));
}
hrc = natDriver->COMGETTER(HostIP)(bstr.asOutParam()); H();
if (!bstr.isEmpty())
InsertConfigString(pCfg, "BindIP", bstr);
ULONG mtu = 0;
ULONG sockSnd = 0;
ULONG sockRcv = 0;
ULONG tcpSnd = 0;
ULONG tcpRcv = 0;
hrc = natDriver->GetNetworkSettings(&mtu, &sockSnd, &sockRcv, &tcpSnd, &tcpRcv); H();
if (mtu)
InsertConfigInteger(pCfg, "SlirpMTU", mtu);
if (sockRcv)
InsertConfigInteger(pCfg, "SockRcv", sockRcv);
if (sockSnd)
InsertConfigInteger(pCfg, "SockSnd", sockSnd);
if (tcpRcv)
InsertConfigInteger(pCfg, "TcpRcv", tcpRcv);
if (tcpSnd)
InsertConfigInteger(pCfg, "TcpSnd", tcpSnd);
hrc = natDriver->COMGETTER(TftpPrefix)(bstr.asOutParam()); H();
if (!bstr.isEmpty())
{
RemoveConfigValue(pCfg, "TFTPPrefix");
InsertConfigString(pCfg, "TFTPPrefix", bstr);
}
hrc = natDriver->COMGETTER(TftpBootFile)(bstr.asOutParam()); H();
if (!bstr.isEmpty())
{
RemoveConfigValue(pCfg, "BootFile");
InsertConfigString(pCfg, "BootFile", bstr);
}
hrc = natDriver->COMGETTER(TftpNextServer)(bstr.asOutParam()); H();
if (!bstr.isEmpty())
InsertConfigString(pCfg, "NextServer", bstr);
BOOL fDnsFlag;
hrc = natDriver->COMGETTER(DnsPassDomain)(&fDnsFlag); H();
InsertConfigInteger(pCfg, "PassDomain", fDnsFlag);
hrc = natDriver->COMGETTER(DnsProxy)(&fDnsFlag); H();
InsertConfigInteger(pCfg, "DNSProxy", fDnsFlag);
hrc = natDriver->COMGETTER(DnsUseHostResolver)(&fDnsFlag); H();
InsertConfigInteger(pCfg, "UseHostResolver", fDnsFlag);
ULONG aliasMode;
hrc = natDriver->COMGETTER(AliasMode)(&aliasMode); H();
InsertConfigInteger(pCfg, "AliasMode", aliasMode);
/* port-forwarding */
SafeArray<BSTR> pfs;
hrc = natDriver->COMGETTER(Redirects)(ComSafeArrayAsOutParam(pfs)); H();
PCFGMNODE pPF = NULL; /* /Devices/Dev/.../Config/PF#0/ */
for (unsigned int i = 0; i < pfs.size(); ++i)
{
uint16_t port = 0;
BSTR r = pfs[i];
Utf8Str utf = Utf8Str(r);
Utf8Str strName;
Utf8Str strProto;
Utf8Str strHostPort;
Utf8Str strHostIP;
Utf8Str strGuestPort;
Utf8Str strGuestIP;
size_t pos, ppos;
pos = ppos = 0;
#define ITERATE_TO_NEXT_TERM(res, str, pos, ppos) \
do { \
pos = str.find(",", ppos); \
if (pos == Utf8Str::npos) \
{ \
Log(( #res " extracting from %s is failed\n", str.c_str())); \
continue; \
} \
res = str.substr(ppos, pos - ppos); \
Log2((#res " %s pos:%d, ppos:%d\n", res.c_str(), pos, ppos)); \
ppos = pos + 1; \
} while (0)
ITERATE_TO_NEXT_TERM(strName, utf, pos, ppos);
ITERATE_TO_NEXT_TERM(strProto, utf, pos, ppos);
ITERATE_TO_NEXT_TERM(strHostIP, utf, pos, ppos);
ITERATE_TO_NEXT_TERM(strHostPort, utf, pos, ppos);
ITERATE_TO_NEXT_TERM(strGuestIP, utf, pos, ppos);
strGuestPort = utf.substr(ppos, utf.length() - ppos);
#undef ITERATE_TO_NEXT_TERM
uint32_t proto = strProto.toUInt32();
bool fValid = true;
switch (proto)
{
case NATProtocol_UDP:
strProto = "UDP";
break;
case NATProtocol_TCP:
strProto = "TCP";
break;
default:
fValid = false;
}
/* continue with next rule if no valid proto was passed */
if (!fValid)
continue;
InsertConfigNode(pCfg, strName.c_str(), &pPF);
InsertConfigString(pPF, "Protocol", strProto);
if (!strHostIP.isEmpty())
InsertConfigString(pPF, "BindIP", strHostIP);
if (!strGuestIP.isEmpty())
InsertConfigString(pPF, "GuestIP", strGuestIP);
port = RTStrToUInt16(strHostPort.c_str());
if (port)
InsertConfigInteger(pPF, "HostPort", port);
port = RTStrToUInt16(strGuestPort.c_str());
if (port)
InsertConfigInteger(pPF, "GuestPort", port);
}
break;
}
case NetworkAttachmentType_Bridged:
{
#if (defined(RT_OS_LINUX) || defined(RT_OS_FREEBSD)) && !defined(VBOX_WITH_NETFLT)
hrc = attachToTapInterface(aNetworkAdapter);
if (FAILED(hrc))
{
switch (hrc)
{
case VERR_ACCESS_DENIED:
return VMSetError(pVM, VERR_HOSTIF_INIT_FAILED, RT_SRC_POS, N_(
"Failed to open '/dev/net/tun' for read/write access. Please check the "
"permissions of that node. Either run 'chmod 0666 /dev/net/tun' or "
"change the group of that node and make yourself a member of that group. Make "
"sure that these changes are permanent, especially if you are "
"using udev"));
default:
AssertMsgFailed(("Could not attach to host interface! Bad!\n"));
return VMSetError(pVM, VERR_HOSTIF_INIT_FAILED, RT_SRC_POS, N_(
"Failed to initialize Host Interface Networking"));
}
}
Assert((int)maTapFD[uInstance] >= 0);
if ((int)maTapFD[uInstance] >= 0)
{
if (fSniffer)
{
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL0);
}
else
{
InsertConfigNode(pInst, "LUN#0", &pLunL0);
}
InsertConfigString(pLunL0, "Driver", "HostInterface");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigInteger(pCfg, "FileHandle", maTapFD[uInstance]);
}
#elif defined(VBOX_WITH_NETFLT)
/*
* This is the new VBoxNetFlt+IntNet stuff.
*/
if (fSniffer)
{
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL0);
}
else
{
InsertConfigNode(pInst, "LUN#0", &pLunL0);
}
Bstr BridgedIfName;
hrc = aNetworkAdapter->COMGETTER(BridgedInterface)(BridgedIfName.asOutParam());
if (FAILED(hrc))
{
LogRel(("NetworkAttachmentType_Bridged: COMGETTER(BridgedInterface) failed, hrc (0x%x)", hrc));
H();
}
Utf8Str BridgedIfNameUtf8(BridgedIfName);
const char *pszBridgedIfName = BridgedIfNameUtf8.c_str();
# if defined(RT_OS_DARWIN)
/* The name is on the form 'ifX: long name', chop it off at the colon. */
char szTrunk[8];
RTStrCopy(szTrunk, sizeof(szTrunk), pszBridgedIfName);
char *pszColon = (char *)memchr(szTrunk, ':', sizeof(szTrunk));
// Quick fix for #5633
// if (!pszColon)
// {
// /*
// * Dynamic changing of attachment causes an attempt to configure
// * network with invalid host adapter (as it is must be changed before
// * the attachment), calling Detach here will cause a deadlock.
// * See #4750.
// * hrc = aNetworkAdapter->Detach(); H();
// */
// return VMSetError(pVM, VERR_INTERNAL_ERROR, RT_SRC_POS,
// N_("Malformed host interface networking name '%ls'"),
// BridgedIfName.raw());
// }
if (pszColon)
*pszColon = '\0';
const char *pszTrunk = szTrunk;
# elif defined(RT_OS_SOLARIS)
/* The name is on the form format 'ifX[:1] - long name, chop it off at space. */
char szTrunk[256];
strlcpy(szTrunk, pszBridgedIfName, sizeof(szTrunk));
char *pszSpace = (char *)memchr(szTrunk, ' ', sizeof(szTrunk));
/*
* Currently don't bother about malformed names here for the sake of people using
* VBoxManage and setting only the NIC name from there. If there is a space we
* chop it off and proceed, otherwise just use whatever we've got.
*/
if (pszSpace)
*pszSpace = '\0';
/* Chop it off at the colon (zone naming eg: e1000g:1 we need only the e1000g) */
char *pszColon = (char *)memchr(szTrunk, ':', sizeof(szTrunk));
if (pszColon)
*pszColon = '\0';
const char *pszTrunk = szTrunk;
# elif defined(RT_OS_WINDOWS)
ComPtr<IHostNetworkInterface> hostInterface;
hrc = host->FindHostNetworkInterfaceByName(BridgedIfName.raw(),
hostInterface.asOutParam());
if (!SUCCEEDED(hrc))
{
AssertLogRelMsgFailed(("NetworkAttachmentType_Bridged: FindByName failed, rc=%Rhrc (0x%x)", hrc, hrc));
return VMSetError(pVM, VERR_INTERNAL_ERROR, RT_SRC_POS,
N_("Nonexistent host networking interface, name '%ls'"),
BridgedIfName.raw());
}
HostNetworkInterfaceType_T eIfType;
hrc = hostInterface->COMGETTER(InterfaceType)(&eIfType);
if (FAILED(hrc))
{
LogRel(("NetworkAttachmentType_Bridged: COMGETTER(InterfaceType) failed, hrc (0x%x)", hrc));
H();
}
if (eIfType != HostNetworkInterfaceType_Bridged)
{
return VMSetError(pVM, VERR_INTERNAL_ERROR, RT_SRC_POS,
N_("Interface ('%ls') is not a Bridged Adapter interface"),
BridgedIfName.raw());
}
hrc = hostInterface->COMGETTER(Id)(bstr.asOutParam());
if (FAILED(hrc))
{
LogRel(("NetworkAttachmentType_Bridged: COMGETTER(Id) failed, hrc (0x%x)", hrc));
H();
}
Guid hostIFGuid(bstr);
INetCfg *pNc;
ComPtr<INetCfgComponent> pAdaptorComponent;
LPWSTR pszApp;
hrc = VBoxNetCfgWinQueryINetCfg(&pNc, FALSE, L"VirtualBox", 10, &pszApp);
Assert(hrc == S_OK);
if (hrc != S_OK)
{
LogRel(("NetworkAttachmentType_Bridged: Failed to get NetCfg, hrc=%Rhrc (0x%x)\n", hrc, hrc));
H();
}
/* get the adapter's INetCfgComponent*/
hrc = VBoxNetCfgWinGetComponentByGuid(pNc, &GUID_DEVCLASS_NET, (GUID*)hostIFGuid.raw(), pAdaptorComponent.asOutParam());
if (hrc != S_OK)
{
VBoxNetCfgWinReleaseINetCfg(pNc, FALSE /*fHasWriteLock*/);
LogRel(("NetworkAttachmentType_Bridged: VBoxNetCfgWinGetComponentByGuid failed, hrc (0x%x)", hrc));
H();
}
#define VBOX_WIN_BINDNAME_PREFIX "\\DEVICE\\"
char szTrunkName[INTNET_MAX_TRUNK_NAME];
char *pszTrunkName = szTrunkName;
wchar_t * pswzBindName;
hrc = pAdaptorComponent->GetBindName(&pswzBindName);
Assert(hrc == S_OK);
if (hrc == S_OK)
{
int cwBindName = (int)wcslen(pswzBindName) + 1;
int cbFullBindNamePrefix = sizeof(VBOX_WIN_BINDNAME_PREFIX);
if (sizeof(szTrunkName) > cbFullBindNamePrefix + cwBindName)
{
strcpy(szTrunkName, VBOX_WIN_BINDNAME_PREFIX);
pszTrunkName += cbFullBindNamePrefix-1;
if (!WideCharToMultiByte(CP_ACP, 0, pswzBindName, cwBindName, pszTrunkName,
sizeof(szTrunkName) - cbFullBindNamePrefix + 1, NULL, NULL))
{
DWORD err = GetLastError();
hrc = HRESULT_FROM_WIN32(err);
AssertMsgFailed(("%hrc=%Rhrc %#x\n", hrc, hrc));
AssertLogRelMsgFailed(("NetworkAttachmentType_Bridged: WideCharToMultiByte failed, hr=%Rhrc (0x%x) err=%u\n", hrc, hrc, err));
}
}
else
{
AssertLogRelMsgFailed(("NetworkAttachmentType_Bridged: insufficient szTrunkName buffer space\n"));
/** @todo set appropriate error code */
hrc = E_FAIL;
}
if (hrc != S_OK)
{
AssertFailed();
CoTaskMemFree(pswzBindName);
VBoxNetCfgWinReleaseINetCfg(pNc, FALSE /*fHasWriteLock*/);
H();
}
/* we're not freeing the bind name since we'll use it later for detecting wireless*/
}
else
{
VBoxNetCfgWinReleaseINetCfg(pNc, FALSE /*fHasWriteLock*/);
AssertLogRelMsgFailed(("NetworkAttachmentType_Bridged: VBoxNetCfgWinGetComponentByGuid failed, hrc (0x%x)", hrc));
H();
}
const char *pszTrunk = szTrunkName;
/* we're not releasing the INetCfg stuff here since we use it later to figure out whether it is wireless */
# elif defined(RT_OS_LINUX) || defined(RT_OS_FREEBSD)
# if defined(RT_OS_FREEBSD)
/*
* If we bridge to a tap interface open it the `old' direct way.
* This works and performs better than bridging a physical
* interface via the current FreeBSD vboxnetflt implementation.
*/
if (!strncmp(pszBridgedIfName, "tap", sizeof "tap" - 1)) {
hrc = attachToTapInterface(aNetworkAdapter);
if (FAILED(hrc))
{
switch (hrc)
{
case VERR_ACCESS_DENIED:
return VMSetError(pVM, VERR_HOSTIF_INIT_FAILED, RT_SRC_POS, N_(
"Failed to open '/dev/%s' for read/write access. Please check the "
"permissions of that node, and that the net.link.tap.user_open "
"sysctl is set. Either run 'chmod 0666 /dev/%s' or "
"change the group of that node to vboxusers and make yourself "
"a member of that group. Make sure that these changes are permanent."), pszBridgedIfName, pszBridgedIfName);
default:
AssertMsgFailed(("Could not attach to tap interface! Bad!\n"));
return VMSetError(pVM, VERR_HOSTIF_INIT_FAILED, RT_SRC_POS, N_(
"Failed to initialize Host Interface Networking"));
}
}
Assert((int)maTapFD[uInstance] >= 0);
if ((int)maTapFD[uInstance] >= 0)
{
InsertConfigString(pLunL0, "Driver", "HostInterface");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigInteger(pCfg, "FileHandle", maTapFD[uInstance]);
}
break;
}
# endif
/** @todo Check for malformed names. */
const char *pszTrunk = pszBridgedIfName;
/* Issue a warning if the interface is down */
{
int iSock = socket(AF_INET, SOCK_DGRAM, 0);
if (iSock >= 0)
{
struct ifreq Req;
RT_ZERO(Req);
strncpy(Req.ifr_name, pszBridgedIfName, sizeof(Req.ifr_name) - 1);
if (ioctl(iSock, SIOCGIFFLAGS, &Req) >= 0)
if ((Req.ifr_flags & IFF_UP) == 0)
setVMRuntimeErrorCallbackF(pVM, this, 0, "BridgedInterfaceDown",
"Bridged interface %s is down. Guest will not be able to use this interface",
pszBridgedIfName);
close(iSock);
}
}
# else
# error "PORTME (VBOX_WITH_NETFLT)"
# endif
InsertConfigString(pLunL0, "Driver", "IntNet");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigString(pCfg, "Trunk", pszTrunk);
InsertConfigInteger(pCfg, "TrunkType", kIntNetTrunkType_NetFlt);
InsertConfigInteger(pCfg, "IgnoreConnectFailure", (uint64_t)fIgnoreConnectFailure);
InsertConfigString(pCfg, "IfPolicyPromisc", pszPromiscuousGuestPolicy);
char szNetwork[INTNET_MAX_NETWORK_NAME];
#if defined(RT_OS_SOLARIS) || defined(RT_OS_DARWIN)
/*
* 'pszTrunk' contains just the interface name required in ring-0, while 'pszBridgedIfName' contains
* interface name + optional description. We must not pass any description to the VM as it can differ
* for the same interface name, eg: "nge0 - ethernet" (GUI) vs "nge0" (VBoxManage).
*/
RTStrPrintf(szNetwork, sizeof(szNetwork), "HostInterfaceNetworking-%s", pszTrunk);
#else
RTStrPrintf(szNetwork, sizeof(szNetwork), "HostInterfaceNetworking-%s", pszBridgedIfName);
#endif
InsertConfigString(pCfg, "Network", szNetwork);
networkName = Bstr(szNetwork);
trunkName = Bstr(pszTrunk);
trunkType = Bstr(TRUNKTYPE_NETFLT);
# if defined(RT_OS_DARWIN)
/** @todo Come up with a better deal here. Problem is that IHostNetworkInterface is completely useless here. */
if ( strstr(pszBridgedIfName, "Wireless")
|| strstr(pszBridgedIfName, "AirPort" ))
InsertConfigInteger(pCfg, "SharedMacOnWire", true);
# elif defined(RT_OS_LINUX)
int iSock = socket(AF_INET, SOCK_DGRAM, 0);
if (iSock >= 0)
{
struct iwreq WRq;
memset(&WRq, 0, sizeof(WRq));
strncpy(WRq.ifr_name, pszBridgedIfName, IFNAMSIZ);
bool fSharedMacOnWire = ioctl(iSock, SIOCGIWNAME, &WRq) >= 0;
close(iSock);
if (fSharedMacOnWire)
{
InsertConfigInteger(pCfg, "SharedMacOnWire", true);
Log(("Set SharedMacOnWire\n"));
}
else
Log(("Failed to get wireless name\n"));
}
else
Log(("Failed to open wireless socket\n"));
# elif defined(RT_OS_FREEBSD)
int iSock = socket(AF_INET, SOCK_DGRAM, 0);
if (iSock >= 0)
{
struct ieee80211req WReq;
uint8_t abData[32];
memset(&WReq, 0, sizeof(WReq));
strncpy(WReq.i_name, pszBridgedIfName, sizeof(WReq.i_name));
WReq.i_type = IEEE80211_IOC_SSID;
WReq.i_val = -1;
WReq.i_data = abData;
WReq.i_len = sizeof(abData);
bool fSharedMacOnWire = ioctl(iSock, SIOCG80211, &WReq) >= 0;
close(iSock);
if (fSharedMacOnWire)
{
InsertConfigInteger(pCfg, "SharedMacOnWire", true);
Log(("Set SharedMacOnWire\n"));
}
else
Log(("Failed to get wireless name\n"));
}
else
Log(("Failed to open wireless socket\n"));
# elif defined(RT_OS_WINDOWS)
# define DEVNAME_PREFIX L"\\\\.\\"
/* we are getting the medium type via IOCTL_NDIS_QUERY_GLOBAL_STATS Io Control
* there is a pretty long way till there though since we need to obtain the symbolic link name
* for the adapter device we are going to query given the device Guid */
/* prepend the "\\\\.\\" to the bind name to obtain the link name */
wchar_t FileName[MAX_PATH];
wcscpy(FileName, DEVNAME_PREFIX);
wcscpy((wchar_t*)(((char*)FileName) + sizeof(DEVNAME_PREFIX) - sizeof(FileName[0])), pswzBindName);
/* open the device */
HANDLE hDevice = CreateFile(FileName,
GENERIC_READ | GENERIC_WRITE, FILE_SHARE_READ | FILE_SHARE_WRITE,
NULL,
OPEN_EXISTING,
FILE_ATTRIBUTE_NORMAL,
NULL);
if (hDevice != INVALID_HANDLE_VALUE)
{
bool fSharedMacOnWire = false;
/* now issue the OID_GEN_PHYSICAL_MEDIUM query */
DWORD Oid = OID_GEN_PHYSICAL_MEDIUM;
NDIS_PHYSICAL_MEDIUM PhMedium;
DWORD cbResult;
if (DeviceIoControl(hDevice,
IOCTL_NDIS_QUERY_GLOBAL_STATS,
&Oid,
sizeof(Oid),
&PhMedium,
sizeof(PhMedium),
&cbResult,
NULL))
{
/* that was simple, now examine PhMedium */
if ( PhMedium == NdisPhysicalMediumWirelessWan
|| PhMedium == NdisPhysicalMediumWirelessLan
|| PhMedium == NdisPhysicalMediumNative802_11
|| PhMedium == NdisPhysicalMediumBluetooth)
fSharedMacOnWire = true;
}
else
{
int winEr = GetLastError();
LogRel(("Console::configNetwork: DeviceIoControl failed, err (0x%x), ignoring\n", winEr));
Assert(winEr == ERROR_INVALID_PARAMETER || winEr == ERROR_NOT_SUPPORTED || winEr == ERROR_BAD_COMMAND);
}
CloseHandle(hDevice);
if (fSharedMacOnWire)
{
Log(("this is a wireless adapter"));
InsertConfigInteger(pCfg, "SharedMacOnWire", true);
Log(("Set SharedMacOnWire\n"));
}
else
Log(("this is NOT a wireless adapter"));
}
else
{
int winEr = GetLastError();
AssertLogRelMsgFailed(("Console::configNetwork: CreateFile failed, err (0x%x), ignoring\n", winEr));
}
CoTaskMemFree(pswzBindName);
pAdaptorComponent.setNull();
/* release the pNc finally */
VBoxNetCfgWinReleaseINetCfg(pNc, FALSE /*fHasWriteLock*/);
# else
/** @todo PORTME: wireless detection */
# endif
# if defined(RT_OS_SOLARIS)
# if 0 /* bird: this is a bit questionable and might cause more trouble than its worth. */
/* Zone access restriction, don't allow snooping the global zone. */
zoneid_t ZoneId = getzoneid();
if (ZoneId != GLOBAL_ZONEID)
{
InsertConfigInteger(pCfg, "IgnoreAllPromisc", true);
}
# endif
# endif
#elif defined(RT_OS_WINDOWS) /* not defined NetFlt */
/* NOTHING TO DO HERE */
#elif defined(RT_OS_LINUX)
/// @todo aleksey: is there anything to be done here?
#elif defined(RT_OS_FREEBSD)
/** @todo FreeBSD: Check out this later (HIF networking). */
#else
# error "Port me"
#endif
break;
}
case NetworkAttachmentType_Internal:
{
hrc = aNetworkAdapter->COMGETTER(InternalNetwork)(bstr.asOutParam()); H();
if (!bstr.isEmpty())
{
if (fSniffer)
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL0);
else
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "IntNet");
InsertConfigNode(pLunL0, "Config", &pCfg);
InsertConfigString(pCfg, "Network", bstr);
InsertConfigInteger(pCfg, "TrunkType", kIntNetTrunkType_WhateverNone);
InsertConfigString(pCfg, "IfPolicyPromisc", pszPromiscuousGuestPolicy);
networkName = bstr;
trunkType = Bstr(TRUNKTYPE_WHATEVER);
}
break;
}
case NetworkAttachmentType_HostOnly:
{
if (fSniffer)
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL0);
else
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", "IntNet");
InsertConfigNode(pLunL0, "Config", &pCfg);
Bstr HostOnlyName;
hrc = aNetworkAdapter->COMGETTER(HostOnlyInterface)(HostOnlyName.asOutParam());
if (FAILED(hrc))
{
LogRel(("NetworkAttachmentType_HostOnly: COMGETTER(HostOnlyInterface) failed, hrc (0x%x)\n", hrc));
H();
}
Utf8Str HostOnlyNameUtf8(HostOnlyName);
const char *pszHostOnlyName = HostOnlyNameUtf8.c_str();
ComPtr<IHostNetworkInterface> hostInterface;
rc = host->FindHostNetworkInterfaceByName(HostOnlyName.raw(),
hostInterface.asOutParam());
if (!SUCCEEDED(rc))
{
LogRel(("NetworkAttachmentType_HostOnly: FindByName failed, rc (0x%x)\n", rc));
return VMSetError(pVM, VERR_INTERNAL_ERROR, RT_SRC_POS,
N_("Nonexistent host networking interface, name '%ls'"),
HostOnlyName.raw());
}
char szNetwork[INTNET_MAX_NETWORK_NAME];
RTStrPrintf(szNetwork, sizeof(szNetwork), "HostInterfaceNetworking-%s", pszHostOnlyName);
#if defined(RT_OS_WINDOWS)
# ifndef VBOX_WITH_NETFLT
hrc = E_NOTIMPL;
LogRel(("NetworkAttachmentType_HostOnly: Not Implemented\n"));
H();
# else /* defined VBOX_WITH_NETFLT*/
/** @todo r=bird: Put this in a function. */
HostNetworkInterfaceType_T eIfType;
hrc = hostInterface->COMGETTER(InterfaceType)(&eIfType);
if (FAILED(hrc))
{
LogRel(("NetworkAttachmentType_HostOnly: COMGETTER(InterfaceType) failed, hrc (0x%x)\n", hrc));
H();
}
if (eIfType != HostNetworkInterfaceType_HostOnly)
return VMSetError(pVM, VERR_INTERNAL_ERROR, RT_SRC_POS,
N_("Interface ('%ls') is not a Host-Only Adapter interface"),
HostOnlyName.raw());
hrc = hostInterface->COMGETTER(Id)(bstr.asOutParam());
if (FAILED(hrc))
{
LogRel(("NetworkAttachmentType_HostOnly: COMGETTER(Id) failed, hrc (0x%x)\n", hrc));
H();
}
Guid hostIFGuid(bstr);
INetCfg *pNc;
ComPtr<INetCfgComponent> pAdaptorComponent;
LPWSTR pszApp;
hrc = VBoxNetCfgWinQueryINetCfg(&pNc, FALSE, L"VirtualBox", 10, &pszApp);
Assert(hrc == S_OK);
if (hrc != S_OK)
{
LogRel(("NetworkAttachmentType_HostOnly: Failed to get NetCfg, hrc=%Rhrc (0x%x)\n", hrc, hrc));
H();
}
/* get the adapter's INetCfgComponent*/
hrc = VBoxNetCfgWinGetComponentByGuid(pNc, &GUID_DEVCLASS_NET, (GUID*)hostIFGuid.raw(), pAdaptorComponent.asOutParam());
if (hrc != S_OK)
{
VBoxNetCfgWinReleaseINetCfg(pNc, FALSE /*fHasWriteLock*/);
LogRel(("NetworkAttachmentType_HostOnly: VBoxNetCfgWinGetComponentByGuid failed, hrc=%Rhrc (0x%x)\n", hrc, hrc));
H();
}
# define VBOX_WIN_BINDNAME_PREFIX "\\DEVICE\\"
char szTrunkName[INTNET_MAX_TRUNK_NAME];
char *pszTrunkName = szTrunkName;
wchar_t * pswzBindName;
hrc = pAdaptorComponent->GetBindName(&pswzBindName);
Assert(hrc == S_OK);
if (hrc == S_OK)
{
int cwBindName = (int)wcslen(pswzBindName) + 1;
int cbFullBindNamePrefix = sizeof(VBOX_WIN_BINDNAME_PREFIX);
if (sizeof(szTrunkName) > cbFullBindNamePrefix + cwBindName)
{
strcpy(szTrunkName, VBOX_WIN_BINDNAME_PREFIX);
pszTrunkName += cbFullBindNamePrefix-1;
if (!WideCharToMultiByte(CP_ACP, 0, pswzBindName, cwBindName, pszTrunkName,
sizeof(szTrunkName) - cbFullBindNamePrefix + 1, NULL, NULL))
{
DWORD err = GetLastError();
hrc = HRESULT_FROM_WIN32(err);
AssertLogRelMsgFailed(("NetworkAttachmentType_HostOnly: WideCharToMultiByte failed, hr=%Rhrc (0x%x) err=%u\n", hrc, hrc, err));
}
}
else
{
AssertLogRelMsgFailed(("NetworkAttachmentType_HostOnly: insufficient szTrunkName buffer space\n"));
/** @todo set appropriate error code */
hrc = E_FAIL;
}
if (hrc != S_OK)
{
AssertFailed();
CoTaskMemFree(pswzBindName);
VBoxNetCfgWinReleaseINetCfg(pNc, FALSE /*fHasWriteLock*/);
H();
}
}
else
{
VBoxNetCfgWinReleaseINetCfg(pNc, FALSE /*fHasWriteLock*/);
AssertLogRelMsgFailed(("NetworkAttachmentType_HostOnly: VBoxNetCfgWinGetComponentByGuid failed, hrc=%Rhrc (0x%x)\n", hrc, hrc));
H();
}
CoTaskMemFree(pswzBindName);
pAdaptorComponent.setNull();
/* release the pNc finally */
VBoxNetCfgWinReleaseINetCfg(pNc, FALSE /*fHasWriteLock*/);
const char *pszTrunk = szTrunkName;
InsertConfigInteger(pCfg, "TrunkType", kIntNetTrunkType_NetAdp);
InsertConfigString(pCfg, "Trunk", pszTrunk);
InsertConfigString(pCfg, "Network", szNetwork);
InsertConfigInteger(pCfg, "IgnoreConnectFailure", (uint64_t)fIgnoreConnectFailure); /** @todo why is this windows only?? */
networkName = Bstr(szNetwork);
trunkName = Bstr(pszTrunk);
trunkType = TRUNKTYPE_NETADP;
# endif /* defined VBOX_WITH_NETFLT*/
#elif defined(RT_OS_DARWIN)
InsertConfigString(pCfg, "Trunk", pszHostOnlyName);
InsertConfigString(pCfg, "Network", szNetwork);
InsertConfigInteger(pCfg, "TrunkType", kIntNetTrunkType_NetAdp);
networkName = Bstr(szNetwork);
trunkName = Bstr(pszHostOnlyName);
trunkType = TRUNKTYPE_NETADP;
#else
InsertConfigString(pCfg, "Trunk", pszHostOnlyName);
InsertConfigString(pCfg, "Network", szNetwork);
InsertConfigInteger(pCfg, "TrunkType", kIntNetTrunkType_NetFlt);
networkName = Bstr(szNetwork);
trunkName = Bstr(pszHostOnlyName);
trunkType = TRUNKTYPE_NETFLT;
#endif
InsertConfigString(pCfg, "IfPolicyPromisc", pszPromiscuousGuestPolicy);
#if !defined(RT_OS_WINDOWS) && defined(VBOX_WITH_NETFLT)
Bstr tmpAddr, tmpMask;
hrc = virtualBox->GetExtraData(BstrFmt("HostOnly/%s/IPAddress",
pszHostOnlyName).raw(),
tmpAddr.asOutParam());
if (SUCCEEDED(hrc) && !tmpAddr.isEmpty())
{
hrc = virtualBox->GetExtraData(BstrFmt("HostOnly/%s/IPNetMask",
pszHostOnlyName).raw(),
tmpMask.asOutParam());
if (SUCCEEDED(hrc) && !tmpMask.isEmpty())
hrc = hostInterface->EnableStaticIpConfig(tmpAddr.raw(),
tmpMask.raw());
else
hrc = hostInterface->EnableStaticIpConfig(tmpAddr.raw(),
Bstr(VBOXNET_IPV4MASK_DEFAULT).raw());
}
else
{
/* Grab the IP number from the 'vboxnetX' instance number (see netif.h) */
hrc = hostInterface->EnableStaticIpConfig(getDefaultIPv4Address(Bstr(pszHostOnlyName)).raw(),
Bstr(VBOXNET_IPV4MASK_DEFAULT).raw());
}
ComAssertComRC(hrc); /** @todo r=bird: Why this isn't fatal? (H()) */
hrc = virtualBox->GetExtraData(BstrFmt("HostOnly/%s/IPV6Address",
pszHostOnlyName).raw(),
tmpAddr.asOutParam());
if (SUCCEEDED(hrc))
hrc = virtualBox->GetExtraData(BstrFmt("HostOnly/%s/IPV6NetMask", pszHostOnlyName).raw(),
tmpMask.asOutParam());
if (SUCCEEDED(hrc) && !tmpAddr.isEmpty() && !tmpMask.isEmpty())
{
hrc = hostInterface->EnableStaticIpConfigV6(tmpAddr.raw(),
Utf8Str(tmpMask).toUInt32());
ComAssertComRC(hrc); /** @todo r=bird: Why this isn't fatal? (H()) */
}
#endif
break;
}
case NetworkAttachmentType_Generic:
{
hrc = aNetworkAdapter->COMGETTER(GenericDriver)(bstr.asOutParam()); H();
SafeArray<BSTR> names;
SafeArray<BSTR> values;
hrc = aNetworkAdapter->GetProperties(Bstr().raw(),
ComSafeArrayAsOutParam(names),
ComSafeArrayAsOutParam(values)); H();
if (fSniffer)
InsertConfigNode(pLunL0, "AttachedDriver", &pLunL0);
else
InsertConfigNode(pInst, "LUN#0", &pLunL0);
InsertConfigString(pLunL0, "Driver", bstr);
InsertConfigNode(pLunL0, "Config", &pCfg);
for (size_t ii = 0; ii < names.size(); ++ii)
{
if (values[ii] && *values[ii])
{
Utf8Str name = names[ii];
Utf8Str value = values[ii];
InsertConfigString(pCfg, name.c_str(), value);
}
}
break;
}
default:
AssertMsgFailed(("should not get here!\n"));
break;
}
/*
* Attempt to attach the driver.
*/
switch (eAttachmentType)
{
case NetworkAttachmentType_Null:
break;
case NetworkAttachmentType_Bridged:
case NetworkAttachmentType_Internal:
case NetworkAttachmentType_HostOnly:
case NetworkAttachmentType_NAT:
case NetworkAttachmentType_Generic:
{
if (SUCCEEDED(hrc) && SUCCEEDED(rc))
{
if (fAttachDetach)
{
rc = PDMR3DriverAttach(pVM, pszDevice, uInstance, uLun, 0 /*fFlags*/, NULL /* ppBase */);
//AssertRC(rc);
}
{
/** @todo pritesh: get the dhcp server name from the
* previous network configuration and then stop the server
* else it may conflict with the dhcp server running with
* the current attachment type
*/
/* Stop the hostonly DHCP Server */
}
if (!networkName.isEmpty())
{
/*
* Until we implement service reference counters DHCP Server will be stopped
* by DHCPServerRunner destructor.
*/
ComPtr<IDHCPServer> dhcpServer;
hrc = virtualBox->FindDHCPServerByNetworkName(networkName.raw(),
dhcpServer.asOutParam());
if (SUCCEEDED(hrc))
{
/* there is a DHCP server available for this network */
BOOL fEnabledDhcp;
hrc = dhcpServer->COMGETTER(Enabled)(&fEnabledDhcp);
if (FAILED(hrc))
{
LogRel(("DHCP svr: COMGETTER(Enabled) failed, hrc (%Rhrc)", hrc));
H();
}
if (fEnabledDhcp)
hrc = dhcpServer->Start(networkName.raw(),
trunkName.raw(),
trunkType.raw());
}
else
hrc = S_OK;
}
}
break;
}
default:
AssertMsgFailed(("should not get here!\n"));
break;
}
meAttachmentType[uInstance] = eAttachmentType;
}
catch (ConfigError &x)
{
// InsertConfig threw something:
return x.m_vrc;
}
#undef H
return VINF_SUCCESS;
}
#ifdef VBOX_WITH_GUEST_PROPS
/**
* Set an array of guest properties
*/
static void configSetProperties(VMMDev * const pVMMDev,
void *names,
void *values,
void *timestamps,
void *flags)
{
VBOXHGCMSVCPARM parms[4];
parms[0].type = VBOX_HGCM_SVC_PARM_PTR;
parms[0].u.pointer.addr = names;
parms[0].u.pointer.size = 0; /* We don't actually care. */
parms[1].type = VBOX_HGCM_SVC_PARM_PTR;
parms[1].u.pointer.addr = values;
parms[1].u.pointer.size = 0; /* We don't actually care. */
parms[2].type = VBOX_HGCM_SVC_PARM_PTR;
parms[2].u.pointer.addr = timestamps;
parms[2].u.pointer.size = 0; /* We don't actually care. */
parms[3].type = VBOX_HGCM_SVC_PARM_PTR;
parms[3].u.pointer.addr = flags;
parms[3].u.pointer.size = 0; /* We don't actually care. */
pVMMDev->hgcmHostCall("VBoxGuestPropSvc",
guestProp::SET_PROPS_HOST,
4,
&parms[0]);
}
/**
* Set a single guest property
*/
static void configSetProperty(VMMDev * const pVMMDev,
const char *pszName,
const char *pszValue,
const char *pszFlags)
{
VBOXHGCMSVCPARM parms[4];
AssertPtrReturnVoid(pszName);
AssertPtrReturnVoid(pszValue);
AssertPtrReturnVoid(pszFlags);
parms[0].type = VBOX_HGCM_SVC_PARM_PTR;
parms[0].u.pointer.addr = (void *)pszName;
parms[0].u.pointer.size = strlen(pszName) + 1;
parms[1].type = VBOX_HGCM_SVC_PARM_PTR;
parms[1].u.pointer.addr = (void *)pszValue;
parms[1].u.pointer.size = strlen(pszValue) + 1;
parms[2].type = VBOX_HGCM_SVC_PARM_PTR;
parms[2].u.pointer.addr = (void *)pszFlags;
parms[2].u.pointer.size = strlen(pszFlags) + 1;
pVMMDev->hgcmHostCall("VBoxGuestPropSvc", guestProp::SET_PROP_HOST, 3,
&parms[0]);
}
/**
* Set the global flags value by calling the service
* @returns the status returned by the call to the service
*
* @param pTable the service instance handle
* @param eFlags the flags to set
*/
int configSetGlobalPropertyFlags(VMMDev * const pVMMDev,
guestProp::ePropFlags eFlags)
{
VBOXHGCMSVCPARM paParm;
paParm.setUInt32(eFlags);
int rc = pVMMDev->hgcmHostCall("VBoxGuestPropSvc",
guestProp::SET_GLOBAL_FLAGS_HOST, 1,
&paParm);
if (RT_FAILURE(rc))
{
char szFlags[guestProp::MAX_FLAGS_LEN];
if (RT_FAILURE(writeFlags(eFlags, szFlags)))
Log(("Failed to set the global flags.\n"));
else
Log(("Failed to set the global flags \"%s\".\n", szFlags));
}
return rc;
}
#endif /* VBOX_WITH_GUEST_PROPS */
/**
* Set up the Guest Property service, populate it with properties read from
* the machine XML and set a couple of initial properties.
*/
/* static */ int Console::configGuestProperties(void *pvConsole)
{
#ifdef VBOX_WITH_GUEST_PROPS
AssertReturn(pvConsole, VERR_GENERAL_FAILURE);
ComObjPtr<Console> pConsole = static_cast<Console *>(pvConsole);
AssertReturn(pConsole->m_pVMMDev, VERR_GENERAL_FAILURE);
/* Load the service */
int rc = pConsole->m_pVMMDev->hgcmLoadService("VBoxGuestPropSvc", "VBoxGuestPropSvc");
if (RT_FAILURE(rc))
{
LogRel(("VBoxGuestPropSvc is not available. rc = %Rrc\n", rc));
/* That is not a fatal failure. */
rc = VINF_SUCCESS;
}
else
{
/*
* Initialize built-in properties that can be changed and saved.
*
* These are typically transient properties that the guest cannot
* change.
*/
/* Sysprep execution by VBoxService. */
configSetProperty(pConsole->m_pVMMDev,
"/VirtualBox/HostGuest/SysprepExec", "",
"TRANSIENT, RDONLYGUEST");
configSetProperty(pConsole->m_pVMMDev,
"/VirtualBox/HostGuest/SysprepArgs", "",
"TRANSIENT, RDONLYGUEST");
/*
* Pull over the properties from the server.
*/
SafeArray<BSTR> namesOut;
SafeArray<BSTR> valuesOut;
SafeArray<LONG64> timestampsOut;
SafeArray<BSTR> flagsOut;
HRESULT hrc;
hrc = pConsole->mControl->PullGuestProperties(ComSafeArrayAsOutParam(namesOut),
ComSafeArrayAsOutParam(valuesOut),
ComSafeArrayAsOutParam(timestampsOut),
ComSafeArrayAsOutParam(flagsOut));
AssertMsgReturn(SUCCEEDED(hrc), ("hrc=%Rrc\n", hrc), VERR_GENERAL_FAILURE);
size_t cProps = namesOut.size();
size_t cAlloc = cProps + 1;
if ( valuesOut.size() != cProps
|| timestampsOut.size() != cProps
|| flagsOut.size() != cProps
)
AssertFailedReturn(VERR_INVALID_PARAMETER);
char **papszNames, **papszValues, **papszFlags;
char szEmpty[] = "";
LONG64 *pai64Timestamps;
papszNames = (char **)RTMemTmpAllocZ(sizeof(void *) * cAlloc);
papszValues = (char **)RTMemTmpAllocZ(sizeof(void *) * cAlloc);
pai64Timestamps = (LONG64 *)RTMemTmpAllocZ(sizeof(LONG64) * cAlloc);
papszFlags = (char **)RTMemTmpAllocZ(sizeof(void *) * cAlloc);
if (papszNames && papszValues && pai64Timestamps && papszFlags)
{
for (unsigned i = 0; RT_SUCCESS(rc) && i < cProps; ++i)
{
AssertPtrReturn(namesOut[i], VERR_INVALID_PARAMETER);
rc = RTUtf16ToUtf8(namesOut[i], &papszNames[i]);
if (RT_FAILURE(rc))
break;
if (valuesOut[i])
rc = RTUtf16ToUtf8(valuesOut[i], &papszValues[i]);
else
papszValues[i] = szEmpty;
if (RT_FAILURE(rc))
break;
pai64Timestamps[i] = timestampsOut[i];
if (flagsOut[i])
rc = RTUtf16ToUtf8(flagsOut[i], &papszFlags[i]);
else
papszFlags[i] = szEmpty;
}
if (RT_SUCCESS(rc))
configSetProperties(pConsole->m_pVMMDev,
(void *)papszNames,
(void *)papszValues,
(void *)pai64Timestamps,
(void *)papszFlags);
for (unsigned i = 0; i < cProps; ++i)
{
RTStrFree(papszNames[i]);
if (valuesOut[i])
RTStrFree(papszValues[i]);
if (flagsOut[i])
RTStrFree(papszFlags[i]);
}
}
else
rc = VERR_NO_MEMORY;
RTMemTmpFree(papszNames);
RTMemTmpFree(papszValues);
RTMemTmpFree(pai64Timestamps);
RTMemTmpFree(papszFlags);
AssertRCReturn(rc, rc);
/*
* These properties have to be set before pulling over the properties
* from the machine XML, to ensure that properties saved in the XML
* will override them.
*/
/* Set the raw VBox version string as a guest property. Used for host/guest
* version comparison. */
configSetProperty(pConsole->m_pVMMDev, "/VirtualBox/HostInfo/VBoxVer",
VBOX_VERSION_STRING_RAW, "TRANSIENT, RDONLYGUEST");
/* Set the full VBox version string as a guest property. Can contain vendor-specific
* information/branding and/or pre-release tags. */
configSetProperty(pConsole->m_pVMMDev, "/VirtualBox/HostInfo/VBoxVerExt",
VBOX_VERSION_STRING, "TRANSIENT, RDONLYGUEST");
/* Set the VBox SVN revision as a guest property */
configSetProperty(pConsole->m_pVMMDev, "/VirtualBox/HostInfo/VBoxRev",
RTBldCfgRevisionStr(), "TRANSIENT, RDONLYGUEST");
/*
* Register the host notification callback
*/
HGCMSVCEXTHANDLE hDummy;
HGCMHostRegisterServiceExtension(&hDummy, "VBoxGuestPropSvc",
Console::doGuestPropNotification,
pvConsole);
#ifdef VBOX_WITH_GUEST_PROPS_RDONLY_GUEST
rc = configSetGlobalPropertyFlags(pConsole->m_pVMMDev,
guestProp::RDONLYGUEST);
AssertRCReturn(rc, rc);
#endif
Log(("Set VBoxGuestPropSvc property store\n"));
}
return VINF_SUCCESS;
#else /* !VBOX_WITH_GUEST_PROPS */
return VERR_NOT_SUPPORTED;
#endif /* !VBOX_WITH_GUEST_PROPS */
}
/**
* Set up the Guest Control service.
*/
/* static */ int Console::configGuestControl(void *pvConsole)
{
#ifdef VBOX_WITH_GUEST_CONTROL
AssertReturn(pvConsole, VERR_GENERAL_FAILURE);
ComObjPtr<Console> pConsole = static_cast<Console *>(pvConsole);
/* Load the service */
int rc = pConsole->m_pVMMDev->hgcmLoadService("VBoxGuestControlSvc", "VBoxGuestControlSvc");
if (RT_FAILURE(rc))
{
LogRel(("VBoxGuestControlSvc is not available. rc = %Rrc\n", rc));
/* That is not a fatal failure. */
rc = VINF_SUCCESS;
}
else
{
HGCMSVCEXTHANDLE hDummy;
rc = HGCMHostRegisterServiceExtension(&hDummy, "VBoxGuestControlSvc",
&Guest::notifyCtrlDispatcher,
pConsole->getGuest());
if (RT_FAILURE(rc))
Log(("Cannot register VBoxGuestControlSvc extension!\n"));
else
Log(("VBoxGuestControlSvc loaded\n"));
}
return rc;
#else /* !VBOX_WITH_GUEST_CONTROL */
return VERR_NOT_SUPPORTED;
#endif /* !VBOX_WITH_GUEST_CONTROL */
}