GuestCtrlImpl.cpp revision cd5df721f068659172f3bf95de8fedeb465f057d
/* $Id$ */
/** @file
* VirtualBox COM class implementation: Guest
*/
/*
* Copyright (C) 2006-2013 Oracle Corporation
*
* This file is part of VirtualBox Open Source Edition (OSE), as
* available from http://www.virtualbox.org. This file is free software;
* you can redistribute it and/or modify it under the terms of the GNU
* General Public License (GPL) as published by the Free Software
* Foundation, in version 2 as it comes in the "COPYING" file of the
* VirtualBox OSE distribution. VirtualBox OSE is distributed in the
* hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
*/
#include "GuestImpl.h"
#include "GuestSessionImpl.h"
#include "GuestCtrlImplPrivate.h"
#include "Global.h"
#include "ConsoleImpl.h"
#include "ProgressImpl.h"
#include "VBoxEvents.h"
#include "VMMDev.h"
#include "AutoCaller.h"
#include <VBox/VMMDev.h>
#ifdef VBOX_WITH_GUEST_CONTROL
# include <VBox/com/array.h>
# include <VBox/com/ErrorInfo.h>
#endif
#include <iprt/cpp/utils.h>
#include <iprt/file.h>
#include <iprt/getopt.h>
#include <iprt/isofs.h>
#include <iprt/list.h>
#include <iprt/path.h>
#include <VBox/vmm/pgm.h>
#include <memory>
#ifdef LOG_GROUP
#undef LOG_GROUP
#endif
#define LOG_GROUP LOG_GROUP_GUEST_CONTROL
#include <VBox/log.h>
// public methods only for internal purposes
/////////////////////////////////////////////////////////////////////////////
#ifdef VBOX_WITH_GUEST_CONTROL
/**
* Static callback function for receiving updates on guest control commands
* from the guest. Acts as a dispatcher for the actual class instance.
*
* @returns VBox status code.
*
* @todo
*
*/
/* static */
DECLCALLBACK(int) Guest::notifyCtrlDispatcher(void *pvExtension,
uint32_t u32Function,
void *pvData,
uint32_t cbData)
{
using namespace guestControl;
/*
* No locking, as this is purely a notification which does not make any
* changes to the object state.
*/
LogFlowFunc(("pvExtension=%p, u32Function=%RU32, pvParms=%p, cbParms=%RU32\n",
pvExtension, u32Function, pvData, cbData));
ComObjPtr<Guest> pGuest = reinterpret_cast<Guest *>(pvExtension);
Assert(!pGuest.isNull());
/*
* For guest control 2.0 using the legacy commands we need to do the following here:
* - Get the callback header to access the context ID
* - Get the context ID of the callback
* - Extract the session ID out of the context ID
* - Dispatch the whole stuff to the appropriate session (if still exists)
*/
if (cbData != sizeof(VBOXGUESTCTRLHOSTCALLBACK))
return VERR_NOT_SUPPORTED;
PVBOXGUESTCTRLHOSTCALLBACK pSvcCb = (PVBOXGUESTCTRLHOSTCALLBACK)pvData;
AssertPtr(pSvcCb);
if (!pSvcCb->mParms) /* At least context ID must be present. */
return VERR_INVALID_PARAMETER;
uint32_t uContextID;
int rc = pSvcCb->mpaParms[0].getUInt32(&uContextID);
AssertMsgRC(rc, ("Unable to extract callback context ID, pvData=%p\n", pSvcCb));
if (RT_FAILURE(rc))
return rc;
#ifdef DEBUG
LogFlowFunc(("CID=%RU32, uSession=%RU32, uObject=%RU32, uCount=%RU32\n",
uContextID,
VBOX_GUESTCTRL_CONTEXTID_GET_SESSION(uContextID),
VBOX_GUESTCTRL_CONTEXTID_GET_OBJECT(uContextID),
VBOX_GUESTCTRL_CONTEXTID_GET_COUNT(uContextID)));
#endif
VBOXGUESTCTRLHOSTCBCTX ctxCb = { u32Function, uContextID };
rc = pGuest->dispatchToSession(&ctxCb, pSvcCb);
LogFlowFuncLeaveRC(rc);
return rc;
}
#endif /* VBOX_WITH_GUEST_CONTROL */
STDMETHODIMP Guest::UpdateGuestAdditions(IN_BSTR aSource, ComSafeArrayIn(IN_BSTR, aArguments),
ComSafeArrayIn(AdditionsUpdateFlag_T, aFlags), IProgress **aProgress)
{
#ifndef VBOX_WITH_GUEST_CONTROL
ReturnComNotImplemented();
#else /* VBOX_WITH_GUEST_CONTROL */
CheckComArgStrNotEmptyOrNull(aSource);
CheckComArgOutPointerValid(aProgress);
AutoCaller autoCaller(this);
if (FAILED(autoCaller.rc())) return autoCaller.rc();
/* Validate flags. */
uint32_t fFlags = AdditionsUpdateFlag_None;
if (aFlags)
{
com::SafeArray<CopyFileFlag_T> flags(ComSafeArrayInArg(aFlags));
for (size_t i = 0; i < flags.size(); i++)
fFlags |= flags[i];
}
if (fFlags)
{
if (!(fFlags & AdditionsUpdateFlag_WaitForUpdateStartOnly))
return setError(E_INVALIDARG, tr("Unknown flags (%#x)"), aFlags);
}
int rc = VINF_SUCCESS;
ProcessArguments aArgs;
if (aArguments)
{
try
{
com::SafeArray<IN_BSTR> arguments(ComSafeArrayInArg(aArguments));
for (size_t i = 0; i < arguments.size(); i++)
aArgs.push_back(Utf8Str(arguments[i]));
}
catch(std::bad_alloc &)
{
rc = VERR_NO_MEMORY;
}
}
HRESULT hr = S_OK;
/*
* Create an anonymous session. This is required to run the Guest Additions
* update process with administrative rights.
*/
GuestSessionStartupInfo startupInfo;
startupInfo.mName = "Updating Guest Additions";
GuestCredentials guestCreds;
RT_ZERO(guestCreds);
ComObjPtr<GuestSession> pSession;
if (RT_SUCCESS(rc))
rc = sessionCreate(startupInfo, guestCreds, pSession);
if (RT_FAILURE(rc))
{
switch (rc)
{
case VERR_MAX_PROCS_REACHED:
hr = setError(VBOX_E_IPRT_ERROR, tr("Maximum number of concurrent guest sessions (%ld) reached"),
VBOX_GUESTCTRL_MAX_SESSIONS);
break;
/** @todo Add more errors here. */
default:
hr = setError(VBOX_E_IPRT_ERROR, tr("Could not create guest session: %Rrc"), rc);
break;
}
}
else
{
Assert(!pSession.isNull());
int guestRc;
rc = pSession->startSessionInternal(&guestRc);
if (RT_FAILURE(rc))
{
/** @todo Handle guestRc! */
hr = setError(VBOX_E_IPRT_ERROR, tr("Could not open guest session: %Rrc"), rc);
}
else
{
try
{
ComObjPtr<Progress> pProgress;
SessionTaskUpdateAdditions *pTask = new SessionTaskUpdateAdditions(pSession /* GuestSession */,
Utf8Str(aSource), aArgs, fFlags);
rc = pSession->startTaskAsync(tr("Updating Guest Additions"), pTask, pProgress);
if (RT_SUCCESS(rc))
{
/* Return progress to the caller. */
hr = pProgress.queryInterfaceTo(aProgress);
}
else
hr = setError(VBOX_E_IPRT_ERROR,
tr("Starting task for updating Guest Additions on the guest failed: %Rrc"), rc);
}
catch(std::bad_alloc &)
{
hr = E_OUTOFMEMORY;
}
}
}
return hr;
#endif /* VBOX_WITH_GUEST_CONTROL */
}
// private methods
/////////////////////////////////////////////////////////////////////////////
int Guest::dispatchToSession(PVBOXGUESTCTRLHOSTCBCTX pCtxCb, PVBOXGUESTCTRLHOSTCALLBACK pSvcCb)
{
LogFlowFunc(("pCtxCb=%p, pSvcCb=%p\n", pCtxCb, pSvcCb));
AssertPtrReturn(pCtxCb, VERR_INVALID_POINTER);
AssertPtrReturn(pSvcCb, VERR_INVALID_POINTER);
LogFlowFunc(("uFunction=%RU32, uContextID=%RU32, uProtocol=%RU32\n",
pCtxCb->uFunction, pCtxCb->uContextID, pCtxCb->uProtocol));
AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
uint32_t uSessionID = VBOX_GUESTCTRL_CONTEXTID_GET_SESSION(pCtxCb->uContextID);
#ifdef DEBUG
LogFlowFunc(("uSessionID=%RU32 (%zu total)\n",
uSessionID, mData.mGuestSessions.size()));
#endif
GuestSessions::const_iterator itSession
= mData.mGuestSessions.find(uSessionID);
int rc;
if (itSession != mData.mGuestSessions.end())
{
ComObjPtr<GuestSession> pSession(itSession->second);
Assert(!pSession.isNull());
alock.release();
bool fDispatch = true;
#ifdef DEBUG
/*
* Pre-check: If we got a status message with an error and VERR_TOO_MUCH_DATA
* it means that that guest could not handle the entire message
* because of its exceeding size. This should not happen on daily
* use but testcases might try this. It then makes no sense to dispatch
* this further because we don't have a valid context ID.
*/
if ( pCtxCb->uFunction == GUEST_EXEC_STATUS
&& pSvcCb->mParms >= 5)
{
CALLBACKDATA_PROC_STATUS dataCb;
/* pSvcCb->mpaParms[0] always contains the context ID. */
pSvcCb->mpaParms[1].getUInt32(&dataCb.uPID);
pSvcCb->mpaParms[2].getUInt32(&dataCb.uStatus);
pSvcCb->mpaParms[3].getUInt32(&dataCb.uFlags);
pSvcCb->mpaParms[4].getPointer(&dataCb.pvData, &dataCb.cbData);
if ( (dataCb.uStatus == PROC_STS_ERROR)
&& (dataCb.uFlags == VERR_TOO_MUCH_DATA))
{
LogFlowFunc(("Requested command with too much data, skipping dispatching ...\n"));
Assert(dataCb.uPID == 0);
fDispatch = false;
}
}
#endif
if (fDispatch)
{
switch (pCtxCb->uFunction)
{
case GUEST_DISCONNECTED:
rc = pSession->dispatchToThis(pCtxCb, pSvcCb);
break;
case GUEST_SESSION_NOTIFY:
rc = pSession->dispatchToThis(pCtxCb, pSvcCb);
break;
case GUEST_EXEC_STATUS:
case GUEST_EXEC_OUTPUT:
case GUEST_EXEC_INPUT_STATUS:
case GUEST_EXEC_IO_NOTIFY:
rc = pSession->dispatchToProcess(pCtxCb, pSvcCb);
break;
case GUEST_FILE_NOTIFY:
rc = pSession->dispatchToFile(pCtxCb, pSvcCb);
break;
default:
rc = VERR_NOT_SUPPORTED;
break;
}
}
else
rc = VERR_NOT_FOUND;
}
else
rc = VERR_NOT_FOUND;
LogFlowFuncLeaveRC(rc);
return rc;
}
int Guest::sessionRemove(GuestSession *pSession)
{
LogFlowThisFuncEnter();
AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
int rc = VERR_NOT_FOUND;
LogFlowFunc(("Closing session (ID=%RU32) ...\n", pSession->getId()));
GuestSessions::iterator itSessions = mData.mGuestSessions.begin();
while (itSessions != mData.mGuestSessions.end())
{
if (pSession == itSessions->second)
{
GuestSession *pCurSession = itSessions->second;
AssertPtr(pCurSession);
LogFlowFunc(("Removing session (pSession=%p, ID=%RU32) (now total %ld sessions)\n",
pCurSession, pCurSession->getId(), mData.mGuestSessions.size() - 1));
itSessions->second->Release();
mData.mGuestSessions.erase(itSessions);
fireGuestSessionRegisteredEvent(mEventSource, pSession,
false /* Unregistered */);
rc = VINF_SUCCESS;
break;
}
itSessions++;
}
LogFlowFuncLeaveRC(rc);
return rc;
}
int Guest::sessionCreate(const GuestSessionStartupInfo &ssInfo,
const GuestCredentials &guestCreds, ComObjPtr<GuestSession> &pGuestSession)
{
AutoWriteLock alock(this COMMA_LOCKVAL_SRC_POS);
int rc = VERR_MAX_PROCS_REACHED;
if (mData.mGuestSessions.size() >= VBOX_GUESTCTRL_MAX_SESSIONS)
return rc;
try
{
/* Create a new session ID and assign it. */
uint32_t uNewSessionID = 0;
uint32_t uTries = 0;
for (;;)
{
/* Is the context ID already used? */
if (!sessionExists(uNewSessionID))
{
rc = VINF_SUCCESS;
break;
}
uNewSessionID++;
if (uNewSessionID >= VBOX_GUESTCTRL_MAX_SESSIONS)
uNewSessionID = 0;
if (++uTries == VBOX_GUESTCTRL_MAX_SESSIONS)
break; /* Don't try too hard. */
}
if (RT_FAILURE(rc)) throw rc;
/* Create the session object. */
HRESULT hr = pGuestSession.createObject();
if (FAILED(hr)) throw VERR_COM_UNEXPECTED;
/** @todo Use an overloaded copy operator. Later. */
GuestSessionStartupInfo startupInfo;
startupInfo.mID = uNewSessionID; /* Assign new session ID. */
startupInfo.mName = ssInfo.mName;
startupInfo.mOpenFlags = ssInfo.mOpenFlags;
startupInfo.mOpenTimeoutMS = ssInfo.mOpenTimeoutMS;
GuestCredentials guestCredentials;
if (!guestCreds.mUser.isEmpty())
{
/** @todo Use an overloaded copy operator. Later. */
guestCredentials.mUser = guestCreds.mUser;
guestCredentials.mPassword = guestCreds.mPassword;
guestCredentials.mDomain = guestCreds.mDomain;
}
else
{
/* Internal (annonymous) session. */
startupInfo.mIsInternal = true;
}
rc = pGuestSession->init(this, startupInfo, guestCredentials);
if (RT_FAILURE(rc)) throw rc;
/*
* Add session object to our session map. This is necessary
* before calling openSession because the guest calls back
* with the creation result of this session.
*/
mData.mGuestSessions[uNewSessionID] = pGuestSession;
fireGuestSessionRegisteredEvent(mEventSource, pGuestSession,
true /* Registered */);
}
catch (int rc2)
{
rc = rc2;
}
LogFlowFuncLeaveRC(rc);
return rc;
}
inline bool Guest::sessionExists(uint32_t uSessionID)
{
GuestSessions::const_iterator itSessions = mData.mGuestSessions.find(uSessionID);
return (itSessions == mData.mGuestSessions.end()) ? false : true;
}
// implementation of public methods
/////////////////////////////////////////////////////////////////////////////
STDMETHODIMP Guest::CreateSession(IN_BSTR aUser, IN_BSTR aPassword, IN_BSTR aDomain, IN_BSTR aSessionName, IGuestSession **aGuestSession)
{
#ifndef VBOX_WITH_GUEST_CONTROL
ReturnComNotImplemented();
#else /* VBOX_WITH_GUEST_CONTROL */
LogFlowFuncEnter();
/* Do not allow anonymous sessions (with system rights) with public API. */
if (RT_UNLIKELY((aUser) == NULL || *(aUser) == '\0'))
return setError(E_INVALIDARG, tr("No user name specified"));
if (RT_UNLIKELY((aPassword) == NULL || *(aPassword) == '\0'))
return setError(E_INVALIDARG, tr("No password specified"));
CheckComArgOutPointerValid(aGuestSession);
/* Rest is optional. */
AutoCaller autoCaller(this);
if (FAILED(autoCaller.rc())) return autoCaller.rc();
GuestSessionStartupInfo startupInfo;
startupInfo.mName = aSessionName;
GuestCredentials guestCreds;
guestCreds.mUser = aUser;
guestCreds.mPassword = aPassword;
guestCreds.mDomain = aDomain;
ComObjPtr<GuestSession> pSession;
int rc = sessionCreate(startupInfo, guestCreds, pSession);
if (RT_SUCCESS(rc))
{
/* Return guest session to the caller. */
HRESULT hr2 = pSession.queryInterfaceTo(aGuestSession);
if (FAILED(hr2))
rc = VERR_COM_OBJECT_NOT_FOUND;
}
if (RT_SUCCESS(rc))
{
/* Start (fork) the session asynchronously
* on the guest. */
rc = pSession->startSessionAsync();
}
HRESULT hr = S_OK;
if (RT_FAILURE(rc))
{
switch (rc)
{
case VERR_MAX_PROCS_REACHED:
hr = setError(VBOX_E_IPRT_ERROR, tr("Maximum number of concurrent guest sessions (%ld) reached"),
VBOX_GUESTCTRL_MAX_SESSIONS);
break;
/** @todo Add more errors here. */
default:
hr = setError(VBOX_E_IPRT_ERROR, tr("Could not create guest session: %Rrc"), rc);
break;
}
}
LogFlowFuncLeaveRC(rc);
return hr;
#endif /* VBOX_WITH_GUEST_CONTROL */
}
STDMETHODIMP Guest::FindSession(IN_BSTR aSessionName, ComSafeArrayOut(IGuestSession *, aSessions))
{
#ifndef VBOX_WITH_GUEST_CONTROL
ReturnComNotImplemented();
#else /* VBOX_WITH_GUEST_CONTROL */
CheckComArgOutSafeArrayPointerValid(aSessions);
LogFlowFuncEnter();
AutoReadLock alock(this COMMA_LOCKVAL_SRC_POS);
Utf8Str strName(aSessionName);
std::list < ComObjPtr<GuestSession> > listSessions;
GuestSessions::const_iterator itSessions = mData.mGuestSessions.begin();
while (itSessions != mData.mGuestSessions.end())
{
if (strName.contains(itSessions->second->getName())) /** @todo Use a (simple) pattern match (IPRT?). */
listSessions.push_back(itSessions->second);
itSessions++;
}
LogFlowFunc(("Sessions with \"%ls\" = %RU32\n",
aSessionName, listSessions.size()));
if (listSessions.size())
{
SafeIfaceArray<IGuestSession> sessionIfacs(listSessions);
sessionIfacs.detachTo(ComSafeArrayOutArg(aSessions));
return S_OK;
}
return setErrorNoLog(VBOX_E_OBJECT_NOT_FOUND,
tr("Could not find sessions with name '%ls'"),
aSessionName);
#endif /* VBOX_WITH_GUEST_CONTROL */
}