VirtualBox

source: vbox/trunk/doc/manual/en_US/user_AdvancedTopics.xml@ 46464

Last change on this file since 46464 was 46355, checked in by vboxsync, 12 years ago

Devices/PC/DMI: added DmiChassisType and fixed documentation of DmiBoardBoardType

File size: 131.2 KB
Line 
1<?xml version="1.0" encoding="UTF-8"?>
2<!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.4//EN"
3"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
4<chapter id="AdvancedTopics">
5 <title>Advanced topics</title>
6
7 <sect1 id="vboxsdl">
8 <title>VBoxSDL, the simplified VM displayer</title>
9
10 <sect2>
11 <title>Introduction</title>
12
13 <para>VBoxSDL is a simple graphical user interface (GUI) that lacks the
14 nice point-and-click support which VirtualBox, our main GUI, provides.
15 VBoxSDL is currently primarily used internally for debugging VirtualBox
16 and therefore not officially supported. Still, you may find it useful
17 for environments where the virtual machines are not necessarily
18 controlled by the same person that uses the virtual machine.<note>
19 <para>VBoxSDL is not available on the Mac OS X host platform.</para>
20 </note></para>
21
22 <para>As you can see in the following screenshot, VBoxSDL does indeed
23 only provide a simple window that contains only the "pure" virtual
24 machine, without menus or other controls to click upon and no additional
25 indicators of virtual machine activity:</para>
26
27 <para><mediaobject>
28 <imageobject>
29 <imagedata align="center" fileref="images/vbox-sdl.png"
30 width="10cm" />
31 </imageobject>
32 </mediaobject></para>
33
34 <para>To start a virtual machine with VBoxSDL instead of the VirtualBox
35 GUI, enter the following on a command line:<screen>VBoxSDL --startvm &lt;vm&gt;</screen></para>
36
37 <para>where <computeroutput>&lt;vm&gt;</computeroutput> is, as usual
38 with VirtualBox command line parameters, the name or UUID of an existing
39 virtual machine.</para>
40 </sect2>
41
42 <sect2>
43 <title>Secure labeling with VBoxSDL</title>
44
45 <para>When running guest operating systems in full screen mode, the guest
46 operating system usually has control over the whole screen. This could
47 present a security risk as the guest operating system might fool the
48 user into thinking that it is either a different system (which might
49 have a higher security level) or it might present messages on the screen
50 that appear to stem from the host operating system.</para>
51
52 <para>In order to protect the user against the above mentioned security
53 risks, the secure labeling feature has been developed. Secure labeling
54 is currently available only for VBoxSDL. When enabled, a portion of the
55 display area is reserved for a label in which a user defined message is
56 displayed. The label height in set to 20 pixels in VBoxSDL. The label
57 font color and background color can be optionally set as hexadecimal RGB
58 color values. The following syntax is used to enable secure
59 labeling:</para>
60
61 <screen>VBoxSDL --startvm "VM name"
62 --securelabel --seclabelfnt ~/fonts/arial.ttf
63 --seclabelsiz 14 --seclabelfgcol 00FF00 --seclabelbgcol 00FFFF</screen>
64
65 <para>In addition to enabling secure labeling, a TrueType font has to be
66 supplied. To use another font size than 12 point use the parameter
67 <computeroutput>--seclabelsiz</computeroutput>.</para>
68
69 <para>The label text can be set with <screen>VBoxManage setextradata "VM name" "VBoxSDL/SecureLabel" "The Label"</screen>
70 Changing this label will take effect immediately.</para>
71
72 <para>Typically, full screen resolutions are limited to certain
73 "standard" geometries such as 1024 x 768. Increasing this by twenty
74 lines is not usually feasible, so in most cases, VBoxSDL will chose the
75 next higher resolution, e.g. 1280 x 1024 and the guest's screen will not
76 cover the whole display surface. If VBoxSDL is unable to choose a higher
77 resolution, the secure label will be painted on top of the guest's
78 screen surface. In order to address the problem of the bottom part of
79 the guest screen being hidden, VBoxSDL can provide custom video modes to
80 the guest that are reduced by the height of the label. For Windows
81 guests and recent Solaris and Linux guests, the VirtualBox Guest
82 Additions automatically provide the reduced video modes. Additionally,
83 the VESA BIOS has been adjusted to duplicate its standard mode table
84 with adjusted resolutions. The adjusted mode IDs can be calculated using
85 the following formula:</para>
86
87 <screen>reduced_modeid = modeid + 0x30</screen>
88
89 <para>For example, in order to start Linux with 1024 x 748 x 16, the
90 standard mode 0x117 (1024 x 768 x 16) is used as a base. The Linux video
91 mode kernel parameter can then be calculated using:</para>
92
93 <screen>vga = 0x200 | 0x117 + 0x30
94vga = 839</screen>
95
96 <para>The reason for duplicating the standard modes instead of only
97 supplying the adjusted modes is that most guest operating systems
98 require the standard VESA modes to be fixed and refuse to start with
99 different modes.</para>
100
101 <para>When using the X.org VESA driver, custom modelines have to be
102 calculated and added to the configuration (usually in
103 <literal>/etc/X11/xorg.conf</literal>. A handy tool to determine
104 modeline entries can be found at <literal><ulink
105 url="http://www.tkk.fi/Misc/Electronics/faq/vga2rgb/calc.html">http://www.tkk.fi/Misc/Electronics/faq/vga2rgb/calc.html</ulink></literal>.)</para>
106 </sect2>
107
108 <sect2>
109 <title>Releasing modifiers with VBoxSDL on Linux</title>
110
111 <para>When switching from a X virtual terminal (VT) to another VT using
112 Ctrl-Alt-Fx while the VBoxSDL window has the input focus, the guest will
113 receive Ctrl and Alt keypress events without receiving the corresponding
114 key release events. This is an architectural limitation of Linux. In
115 order to reset the modifier keys, it is possible to send
116 <computeroutput>SIGUSR1</computeroutput> to the VBoxSDL main thread
117 (first entry in the <computeroutput>ps</computeroutput> list). For
118 example, when switching away to another VT and saving the virtual
119 machine from this terminal, the following sequence can be used to make
120 sure the VM is not saved with stuck modifiers:</para>
121
122 <para><screen>kill -usr1 &lt;pid&gt;
123VBoxManage controlvm "Windows 2000" savestate</screen></para>
124 </sect2>
125 </sect1>
126
127 <sect1 id="autologon">
128 <title>Automated guest logons</title>
129
130 <para>VirtualBox provides Guest Addition modules for Windows, Linux and
131 Solaris to enable automated logons on the guest.</para>
132
133 <para>When a guest operating system is running in a virtual machine, it
134 might be desirable to perform coordinated and automated logons using
135 credentials from a master logon system. (With "credentials", we are
136 referring to logon information consisting of user name, password and
137 domain name, where each value might be empty.)</para>
138
139 <sect2 id="autologon_win">
140 <title>Automated Windows guest logons</title>
141
142 <para>Since Windows NT, Windows has provided a modular system logon
143 subsystem ("Winlogon") which can be customized and extended by means of
144 so-called GINA modules (Graphical Identification and Authentication).
145 With Windows Vista and Windows 7, the GINA modules were replaced with a
146 new mechanism called "credential providers". The VirtualBox Guest
147 Additions for Windows come with both, a GINA and a credential provider
148 module, and therefore enable any Windows guest to perform automated
149 logons.</para>
150
151 <para>To activate the VirtualBox GINA or credential provider module,
152 install the Guest Additions with using the command line switch
153 <computeroutput>/with_autologon</computeroutput>. All the following
154 manual steps required for installing these modules will be then done by
155 the installer.</para>
156
157 <para>To manually install the VirtualBox GINA module, extract the Guest
158 Additions (see <xref linkend="windows-guest-file-extraction" />) and
159 copy the file <computeroutput>VBoxGINA.dll</computeroutput> to the
160 Windows <computeroutput>SYSTEM32</computeroutput> directory. Then, in
161 the registry, create the following key: <screen>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GinaDLL</screen>
162 with a value of <computeroutput>VBoxGINA.dll</computeroutput>.</para>
163
164 <note>
165 <para>The VirtualBox GINA module is implemented as a wrapper around
166 the standard Windows GINA module
167 (<computeroutput>MSGINA.DLL</computeroutput>). As a result, it will
168 most likely not work correctly with 3rd party GINA modules.</para>
169 </note>
170
171 <para>To manually install the VirtualBox credential provider module,
172 extract the Guest Additions (see <xref
173 linkend="windows-guest-file-extraction" />) and copy the file
174 <computeroutput>VBoxCredProv.dll</computeroutput> to the Windows
175 <computeroutput>SYSTEM32</computeroutput> directory. Then, in the
176 registry, create the following keys:<screen>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
177 Authentication\Credential Providers\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}
178
179HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}
180
181HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32</screen></para>
182
183 <para>with all default values (the key named
184 <computeroutput>(Default)</computeroutput> in each key) set to
185 <computeroutput>VBoxCredProv</computeroutput>. After that a new string
186 named <screen>HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32\ThreadingModel</screen>
187 with a value of <computeroutput>Apartment</computeroutput> has to be
188 created.</para>
189
190 <para>To set credentials, use the following command on a
191 <emphasis>running</emphasis> VM:</para>
192
193 <screen>VBoxManage controlvm "Windows XP" setcredentials "John Doe" "secretpassword" "DOMTEST"</screen>
194
195 <para>While the VM is running, the credentials can be queried by the
196 VirtualBox logon modules (GINA or credential provider) using the
197 VirtualBox Guest Additions device driver. When Windows is in "logged
198 out" mode, the logon modules will constantly poll for credentials and if
199 they are present, a logon will be attempted. After retrieving the
200 credentials, the logon modules will erase them so that the above command
201 will have to be repeated for subsequent logons.</para>
202
203 <para>For security reasons, credentials are not stored in any persistent
204 manner and will be lost when the VM is reset. Also, the credentials are
205 "write-only", i.e. there is no way to retrieve the credentials from the
206 host side. Credentials can be reset from the host side by setting empty
207 values.</para>
208
209 <para>Depending on the particular variant of the Windows guest, the
210 following restrictions apply: <orderedlist>
211 <listitem>
212 <para>For <emphasis role="bold">Windows XP guests,</emphasis> the
213 logon subsystem needs to be configured to use the classic logon
214 dialog as the VirtualBox GINA module does not support the XP-style
215 welcome dialog.</para>
216 </listitem>
217
218 <listitem>
219 <para>For <emphasis role="bold">Windows Vista, Windows 7
220 and Windows 8 guests,</emphasis> the logon subsystem does not support
221 the so-called Secure Attention Sequence
222 (<computeroutput>CTRL+ALT+DEL</computeroutput>). As a result, the
223 guest's group policy settings need to be changed to not use the
224 Secure Attention Sequence. Also, the user name given is only
225 compared to the true user name, not the user friendly name. This
226 means that when you rename a user, you still have to supply the
227 original user name (internally, Windows never renames user
228 accounts).</para>
229 </listitem>
230
231 <listitem>
232 <para>Auto-logon handling of the built-in Windows Remote Desktop
233 Service (formerly known as Terminal Services) is disabled by
234 default. To enable it, create the registry key <screen>HKEY_LOCAL_MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions\AutoLogon</screen>
235 with a <computeroutput>DWORD</computeroutput> value of
236 <computeroutput>1</computeroutput>.</para>
237 </listitem>
238 </orderedlist></para>
239
240 <para>The following command forces VirtualBox to keep the credentials
241 after they were read by the guest and on VM reset: <screen>VBoxManage setextradata "Windows XP" VBoxInternal/Devices/VMMDev/0/Config/KeepCredentials 1</screen>Note
242 that this is a potential security risk as a malicious application
243 running on the guest could request this information using the proper
244 interface.</para>
245 </sect2>
246
247 <sect2 id="autologon_unix">
248 <title>Automated Linux/Unix guest logons</title>
249
250 <para>Starting with version 3.2, VirtualBox provides a custom PAM module
251 (Pluggable Authentication Module) which can be used to perform automated
252 guest logons on platforms which support this framework. Virtually all
253 modern Linux/Unix distributions rely on PAM.</para>
254
255 <para>For automated logons on Ubuntu (or Ubuntu-derived) distributions
256 using LightDM as the display manager, please see
257 <xref linkend="autologon_unix_lightdm" />.</para>
258
259 <para>The <computeroutput>pam_vbox.so</computeroutput> module itself
260 <emphasis role="bold">does not</emphasis> do an actual verification of
261 the credentials passed to the guest OS; instead it relies on other
262 modules such as <computeroutput>pam_unix.so</computeroutput> or
263 <computeroutput>pam_unix2.so</computeroutput> down in the PAM stack to
264 do the actual validation using the credentials retrieved by
265 <computeroutput>pam_vbox.so</computeroutput>. Therefore
266 <computeroutput>pam_vbox.so</computeroutput> has to be on top of the
267 authentication PAM service list.</para>
268
269 <note>
270 <para>The <computeroutput>pam_vbox.so</computeroutput> only supports
271 the <computeroutput>auth</computeroutput> primitive. Other primitives
272 such as <computeroutput>account</computeroutput>,
273 <computeroutput>session</computeroutput> or
274 <computeroutput>password</computeroutput> are not supported.</para>
275 </note>
276
277 <para>The <computeroutput>pam_vbox.so</computeroutput> module is shipped
278 as part of the Guest Additions but it is not installed and/or activated
279 on the guest OS by default. In order to install it, it has to be copied
280 from
281 <computeroutput>/opt/VBoxGuestAdditions-&lt;version&gt;/lib/VBoxGuestAdditions/</computeroutput>
282 to the security modules directory, usually
283 <computeroutput>/lib/security/</computeroutput> on 32-bit guest Linuxes
284 or <computeroutput>/lib64/security/</computeroutput> on 64-bit ones.
285 Please refer to your guest OS documentation for the correct PAM module
286 directory.</para>
287
288 <para>For example, to use <computeroutput>pam_vbox.so</computeroutput>
289 with a Ubuntu Linux guest OS and GDM (the GNOME Desktop Manager) to
290 logon users automatically with the credentials passed by the host, the
291 guest OS has to be configured like the following:</para>
292
293 <orderedlist>
294 <listitem>
295 <para>The <computeroutput>pam_vbox.so</computeroutput> module has to
296 be copied to the security modules directory, in this case it is
297 <computeroutput>/lib/security</computeroutput>.</para>
298 </listitem>
299
300 <listitem>
301 <para>Edit the PAM configuration file for GDM found at
302 <computeroutput>/etc/pam.d/gdm</computeroutput>, adding the line
303 <computeroutput>auth requisite pam_vbox.so</computeroutput> at the
304 top. Additionaly, in most Linux distributions there is a file called
305 <computeroutput>/etc/pam.d/common-auth</computeroutput>. This file
306 is included in many other services (like the GDM file mentioned
307 above). There you also have to add the line <computeroutput>auth
308 requisite pam_vbox.so</computeroutput>.</para>
309 </listitem>
310
311 <listitem>
312 <para>If authentication against the shadow database using
313 <computeroutput>pam_unix.so</computeroutput> or
314 <computeroutput>pam_unix2.so</computeroutput> is desired, the
315 argument <computeroutput>try_first_pass</computeroutput> for
316 <computeroutput>pam_unix.so</computeroutput> or
317 <computeroutput>use_first_pass</computeroutput> for
318 <computeroutput>pam_unix2.so</computeroutput> is needed in order to
319 pass the credentials from the VirtualBox module to the shadow
320 database authentication module. For Ubuntu, this needs to be added
321 to <computeroutput>/etc/pam.d/common-auth</computeroutput>, to the
322 end of the line referencing
323 <computeroutput>pam_unix.so</computeroutput>. This argument tells
324 the PAM module to use credentials already present in the stack, i.e.
325 the ones provided by the VirtualBox PAM module.</para>
326 </listitem>
327 </orderedlist>
328
329 <para><warning>
330 <para>An incorrectly configured PAM stack can effectively prevent
331 you from logging into your guest system!</para>
332 </warning></para>
333
334 <para>To make deployment easier, you can pass the argument
335 <computeroutput>debug</computeroutput> right after the
336 <computeroutput>pam_vbox.so</computeroutput> statement. Debug log output
337 will then be recorded using syslog.</para>
338
339 <para><note>
340 <para>By default, pam_vbox will not wait for credentials to arrive
341 from the host, in other words: When a login prompt is shown (for
342 example by GDM/KDM or the text console) and pam_vbox does not yet
343 have credentials it does not wait until they arrive. Instead the
344 next module in the PAM stack (depending on the PAM configuration)
345 will have the chance for authentication.</para>
346 </note></para>
347
348 <para>Starting with VirtualBox 4.1.4 pam_vbox supports various guest
349 property parameters which all reside in
350 <computeroutput>/VirtualBox/GuestAdd/PAM/</computeroutput>. These
351 parameters allow pam_vbox to wait for credentials to be provided by the
352 host and optionally can show a message while waiting for those. The
353 following guest properties can be set:</para>
354
355 <orderedlist>
356 <listitem>
357 <para><computeroutput>CredsWait</computeroutput>: Set to "1" if
358 pam_vbox should start waiting until credentials arrive from the
359 host. Until then no other authentication methods such as manually
360 logging in will be available. If this property is empty or get
361 deleted no waiting for credentials will be performed and pam_vbox
362 will act like before (see paragraph above). This property must be
363 set read-only for the guest
364 (<computeroutput>RDONLYGUEST</computeroutput>).</para>
365 </listitem>
366
367 <listitem>
368 <para><computeroutput>CredsWaitAbort</computeroutput>: Aborts waiting
369 for credentials when set to any value. Can be set from host and the
370 guest.</para>
371 </listitem>
372
373 <listitem>
374 <para><computeroutput>CredsWaitTimeout</computeroutput>: Timeout (in
375 seconds) to let pam_vbox wait for credentials to arrive. When no
376 credentials arrive within this timeout, authentication of pam_vbox
377 will be set to failed and the next PAM module in chain will be
378 asked. If this property is not specified, set to "0" or an invalid
379 value, an infinite timeout will be used. This property must be set
380 read-only for the guest
381 (<computeroutput>RDONLYGUEST</computeroutput>).</para>
382 </listitem>
383 </orderedlist>
384
385 <para>To customize pam_vbox further there are the following guest
386 properties:</para>
387
388 <orderedlist>
389 <listitem>
390 <para><computeroutput>CredsMsgWaiting</computeroutput>: Custom
391 message showed while pam_vbox is waiting for credentials from the
392 host. This property must be set read-only for the guest
393 (<computeroutput>RDONLYGUEST</computeroutput>).</para>
394 </listitem>
395
396 <listitem>
397 <para><computeroutput>CredsMsgWaitTimeout</computeroutput>: Custom
398 message showed when waiting for credentials by pam_vbox timed out,
399 e.g. did not arrive within time. This property must be set read-only
400 for the guest (<computeroutput>RDONLYGUEST</computeroutput>).</para>
401 </listitem>
402 </orderedlist>
403
404 <para><note>
405 <para>If a pam_vbox guest property does not have set the right flags
406 (<computeroutput>RDONLYGUEST</computeroutput>) this property will be
407 ignored then and - depending on the property - a default value will
408 be set. This can result in pam_vbox not waiting for credentials.
409 Consult the appropriate syslog file for more information and use the
410 <computeroutput>debug</computeroutput> option.</para>
411 </note></para>
412
413 <sect3 id="autologon_unix_lightdm">
414 <title>VirtualBox Greeter for Ubuntu / LightDM</title>
415
416 <para>Starting with version 4.2.12, VirtualBox comes with an own greeter
417 module named vbox-greeter which can be used with LightDM 1.0.1 or later.
418 LightDM is the default display manager since Ubuntu 10.11 and therefore
419 also can be used for automated guest logons.</para>
420
421 <para>vbox-greeter does not need the pam_vbox module described above
422 in order to function -- it comes with its own authentication mechanism
423 provided by LightDM. However, to provide maximum of flexibility both
424 modules can be used together on the same guest.</para>
425
426 <para>As for the pam_vbox module, vbox-greeter is shipped as part of
427 the Guest Additions but it is not installed and/or activated on the
428 guest OS by default For installing vbox-greeter automatically upon
429 Guest Additions installation, use the
430 <computeroutput>--with-autologon</computeroutput> switch when starting
431 the VBoxLinuxAdditions.run file:<screen>
432 # ./VBoxLinuxAdditions.run -- --with-autologon</screen></para>
433
434 <para>For manual or postponed installation, the
435 <computeroutput>vbox-greeter.desktop</computeroutput>
436 file has to be copied from
437 <computeroutput>/opt/VBoxGuestAdditions-&lt;version&gt;/shared/VBoxGuestAdditions/</computeroutput>
438 to the <computeroutput>xgreeters</computeroutput> directory, usually
439 <computeroutput>/usr/share/xgreeters/</computeroutput>.
440 Please refer to your guest OS documentation for the correct LightDM
441 greeter directory.</para>
442
443 <para>The vbox-greeter module itself already was installed by the
444 VirtualBox Guest Additions installer and resides in
445 <computeroutput>/usr/sbin/</computeroutput>. To enable vbox-greeter as
446 the standard greeter module, the file
447 <computeroutput>/etc/lightdm/lightdm.conf</computeroutput> needs to be
448 edited:</para>
449
450 <para><screen>
451 [SeatDefaults]
452 greeter-session=vbox-greeter</screen></para>
453
454 <note><para>The LightDM server needs to be fully restarted in order to
455 get vbox-greeter used as the default greeter. As root, do a
456 <computeroutput>service lightdm --full-restart</computeroutput> on
457 Ubuntu, or simply restart the guest.</para></note>
458
459 <note><para>vbox-greeter is independent of the graphical session chosen
460 by the user (like Gnome, KDE, Unity etc). However it requires FLTK 1.3
461 for representing its own user interface.</para></note>
462
463 <para>There are numerous guest properties which can be used to further
464 customize the login experience. For automatically logging in users, the
465 same guest properties apply as for pam_vbox, see
466 <xref linkend="autologon_unix" />.</para>
467
468 <para>In addition to the above mentioned guest properties, vbox-greeter
469 allows further customization of its user interface. These special guest
470 properties all reside in
471 <computeroutput>/VirtualBox/GuestAdd/Greeter/</computeroutput>:</para>
472
473 <orderedlist>
474 <listitem>
475 <para><computeroutput>HideRestart</computeroutput>: Set to "1" if
476 vbox-greeter should hide the button to restart the guest. This
477 property must be set read-only for the guest
478 (<computeroutput>RDONLYGUEST</computeroutput>).</para>
479 </listitem>
480
481 <listitem>
482 <para><computeroutput>HideShutdown</computeroutput>: Set to "1" if
483 vbox-greeter should hide the button to shutdown the guest. This
484 property must be set read-only for the guest
485 (<computeroutput>RDONLYGUEST</computeroutput>).</para>
486 </listitem>
487
488 <listitem>
489 <para><computeroutput>BannerPath</computeroutput>: Path to a .PNG
490 file for using it as a banner on the top. The image size must be
491 460 x 90 pixels, any bit depth. This property must be
492 set read-only for the guest
493 (<computeroutput>RDONLYGUEST</computeroutput>).</para>
494 </listitem>
495
496 <listitem>
497 <para><computeroutput>UseTheming</computeroutput>: Set to "1" for
498 turning on the following theming options. This property must be
499 set read-only for the guest
500 (<computeroutput>RDONLYGUEST</computeroutput>).</para>
501 </listitem>
502
503 <listitem>
504 <para><computeroutput>Theme/BackgroundColor</computeroutput>:
505 Hexadecimal RRGGBB color for the background. This property must be
506 set read-only for the guest
507 (<computeroutput>RDONLYGUEST</computeroutput>).</para>
508 </listitem>
509
510 <listitem>
511 <para><computeroutput>Theme/LogonDialog/HeaderColor</computeroutput>:
512 Hexadecimal RRGGBB foreground color for the header text. This
513 property must be set read-only for the guest
514 (<computeroutput>RDONLYGUEST</computeroutput>).</para>
515 </listitem>
516
517 <listitem>
518 <para><computeroutput>Theme/LogonDialog/BackgroundColor</computeroutput>:
519 Hexadecimal RRGGBB color for the logon dialog background. This
520 property must be set read-only for the guest
521 (<computeroutput>RDONLYGUEST</computeroutput>).</para>
522 </listitem>
523
524 <listitem>
525 <para><computeroutput>Theme/LogonDialog/ButtonColor</computeroutput>:
526 Hexadecimal RRGGBB background color for the logon dialog button. This
527 property must be set read-only for the guest
528 (<computeroutput>RDONLYGUEST</computeroutput>).</para>
529 </listitem>
530 </orderedlist>
531
532 <note><para>The same restrictions for the guest properties above apply
533 as for the ones specified in the pam_vbox section.</para></note>
534 </sect3>
535 </sect2>
536 </sect1>
537
538 <sect1>
539 <title>Advanced configuration for Windows guests</title>
540
541 <sect2 id="sysprep">
542 <title>Automated Windows system preparation</title>
543
544 <para>Beginning with Windows NT 4.0, Microsoft offers a "system
545 preparation" tool (in short: Sysprep) to prepare a Windows system for
546 deployment or redistribution. Whereas Windows 2000 and XP ship with
547 Sysprep on the installation medium, the tool also is available for
548 download on the Microsoft web site. In a standard installation of
549 Windows Vista and 7, Sysprep is already included. Sysprep mainly
550 consists of an executable called
551 <computeroutput>sysprep.exe</computeroutput> which is invoked by the
552 user to put the Windows installation into preparation mode.</para>
553
554 <para>Starting with VirtualBox 3.2.2, the Guest Additions offer a way to
555 launch a system preparation on the guest operating system in an
556 automated way, controlled from the host system. To achieve that, see
557 <xref linkend="guestadd-guestcontrol" /> for using the feature with the
558 special identifier <computeroutput>sysprep</computeroutput> as the
559 program to execute, along with the user name
560 <computeroutput>sysprep</computeroutput> and password
561 <computeroutput>sysprep</computeroutput> for the credentials. Sysprep
562 then gets launched with the required system rights.</para>
563
564 <note>
565 <para>Specifying the location of "sysprep.exe" is <emphasis
566 role="bold">not possible</emphasis> -- instead the following paths are
567 used (based on the operating system): <itemizedlist>
568 <listitem>
569 <para><computeroutput>C:\sysprep\sysprep.exe</computeroutput>
570 for Windows NT 4.0, 2000 and XP</para>
571 </listitem>
572
573 <listitem>
574 <para><computeroutput>%WINDIR%\System32\Sysprep\sysprep.exe</computeroutput>
575 for Windows Vista, 2008 Server and 7</para>
576 </listitem>
577 </itemizedlist> The Guest Additions will automatically use the
578 appropriate path to execute the system preparation tool.</para>
579 </note>
580 </sect2>
581 </sect1>
582
583 <sect1>
584 <title>Advanced configuration for Linux and Solaris guests</title>
585
586 <sect2>
587 <title>Manual setup of selected guest services on Linux</title>
588
589 <para>The VirtualBox Guest Additions contain several different drivers.
590 If for any reason you do not wish to set them all up, you can install
591 the Guest Additions using the following command:</para>
592
593 <screen> sh ./VBoxLinuxAdditions.run no_setup</screen>
594
595 <para>After this, you will need to at least compile the kernel modules
596 by running the command <screen> /usr/lib/VBoxGuestAdditions/vboxadd setup</screen>
597 as root (you will need to replace <emphasis>lib</emphasis> by
598 <emphasis>lib64</emphasis> on some 64bit guests), and on older guests
599 without the udev service you will need to add the
600 <emphasis>vboxadd</emphasis> service to the default runlevel to ensure
601 that the modules get loaded.</para>
602
603 <para>To setup the time synchronization service, run the command
604 <screen> /usr/lib/VBoxGuestAdditions/vboxadd-service setup</screen> and
605 add the service vboxadd-service to the default runlevel. To set up the
606 X11 and OpenGL part of the Guest Additions, run the command <screen> /usr/lib/VBoxGuestAdditions/vboxadd-x11 setup</screen>
607 (you do not need to enable any services for this).</para>
608
609 <para>To recompile the guest kernel modules, use this command: <screen> /usr/lib/VBoxGuestAdditions/vboxadd setup</screen>
610 After compilation you should reboot your guest to ensure that the new
611 modules are actually used.</para>
612 </sect2>
613
614 <sect2 id="guestxorgsetup">
615 <title>Guest graphics and mouse driver setup in depth</title>
616
617 <para>This section assumes that you are familiar with configuring the
618 X.Org server using xorg.conf and optionally the newer mechanisms using
619 hal or udev and xorg.conf.d. If not you can learn about them by studying
620 the documentation which comes with X.Org.</para>
621
622 <para>The VirtualBox Guest Additions come with drivers for X.Org
623 versions <itemizedlist>
624 <listitem>
625 X11R6.8/X11R6.9 and XFree86 version 4.3 (vboxvideo_drv_68.o and vboxmouse_drv_68.o)
626 </listitem>
627
628 <listitem>
629 X11R7.0 (vboxvideo_drv_70.so and vboxmouse_drv_70.so)
630 </listitem>
631
632 <listitem>
633 X11R7.1 (vboxvideo_drv_71.so and vboxmouse_drv_71.so)
634 </listitem>
635
636 <listitem>
637 X.Org Server versions 1.3 and later (vboxvideo_drv_13.so and vboxmouse_drv_13.so and so on).
638 </listitem>
639 </itemizedlist> By default these drivers can be found in the
640 directory</para>
641
642 <para><computeroutput>/opt/VBoxGuestAdditions-&lt;version&gt;/lib/VBoxGuestAdditions</computeroutput></para>
643
644 <para>and the correct versions for the X server are symbolically linked
645 into the X.Org driver directories.</para>
646
647 <para>For graphics integration to work correctly, the X server must load
648 the vboxvideo driver (many recent X server versions look for it
649 automatically if they see that they are running in VirtualBox) and for
650 an optimal user experience the guest kernel drivers must be loaded and
651 the Guest Additions tool VBoxClient must be running as a client in the X
652 session. For mouse integration to work correctly, the guest kernel
653 drivers must be loaded and in addition, in X servers from X.Org X11R6.8
654 to X11R7.1 and in XFree86 version 4.3 the right vboxmouse driver must be
655 loaded and associated with /dev/mouse or /dev/psaux; in X.Org server 1.3
656 or later a driver for a PS/2 mouse must be loaded and the right
657 vboxmouse driver must be associated with /dev/vboxguest.</para>
658
659 <para>The VirtualBox guest graphics driver can use any graphics
660 configuration for which the virtual resolution fits into the virtual
661 video memory allocated to the virtual machine (minus a small amount used
662 by the guest driver) as described in <xref
663 linkend="settings-display" />. The driver will offer a range of standard
664 modes at least up to the default guest resolution for all active guest
665 monitors. In X.Org Server 1.3 and later the default mode can be changed
666 by setting the output property VBOX_MODE to
667 "&lt;width&gt;x&lt;height&gt;" for any guest monitor. When VBoxClient
668 and the kernel drivers are active this is done automatically when the
669 host requests a mode change. The driver for older versions can only
670 receive new modes by querying the host for requests at regular
671 intervals.</para>
672
673 <para>With pre-1.3 X Servers you can also add your own modes to the X
674 server configuration file. You simply need to add them to the "Modes"
675 list in the "Display" subsection of the "Screen" section. For example,
676 the section shown here has a custom 2048x800 resolution mode
677 added:</para>
678
679 <screen>Section "Screen"
680 Identifier "Default Screen"
681 Device "VirtualBox graphics card"
682 Monitor "Generic Monitor"
683 DefaultDepth 24
684 SubSection "Display"
685 Depth 24
686 Modes "2048x800" "800x600" "640x480"
687 EndSubSection
688EndSection</screen>
689 </sect2>
690 </sect1>
691
692 <sect1 id="cpuhotplug">
693 <title>CPU hot-plugging</title>
694
695 <para>With virtual machines running modern server operating systems,
696 VirtualBox supports CPU hot-plugging.<footnote>
697 <para>Support for CPU hot-plugging was introduced with VirtualBox
698 3.2.</para>
699 </footnote> Whereas on a physical computer this would mean that a CPU
700 can be added or removed while the machine is running, VirtualBox supports
701 adding and removing virtual CPUs while a virtual machine is
702 running.</para>
703
704 <para>CPU hot-plugging works only with guest operating systems that
705 support it. So far this applies only to Linux and Windows Server 2008 x64
706 Data Center Edition. Windows supports only hot-add while Linux supports
707 hot-add and hot-remove but to use this feature with more than 8 CPUs a
708 64bit Linux guest is required.</para>
709
710 <para>At this time, CPU hot-plugging requires using the VBoxManage
711 command-line interface. First, hot-plugging needs to be enabled for a
712 virtual machine:<screen>VBoxManage modifyvm "VM name" --cpuhotplug on</screen></para>
713
714 <para>After that, the --cpus option specifies the maximum number of CPUs
715 that the virtual machine can have:<screen>VBoxManage modifyvm "VM name" --cpus 8</screen>When
716 the VM is off, you can then add and remove virtual CPUs with the modifyvm
717 --plugcpu and --unplugcpu subcommands, which take the number of the
718 virtual CPU as a parameter, like this:<screen>VBoxManage modifyvm "VM name" --plugcpu 3
719VBoxManage modifyvm "VM name" --unplugcpu 3</screen>Note that CPU 0 can never
720 be removed.</para>
721
722 <para>While the VM is running, CPUs can be added with the
723 <computeroutput>controlvm plugcpu/unplugcpu</computeroutput> commands
724 instead:<screen>VBoxManage controlvm "VM name" plugcpu 3
725VBoxManage controlvm "VM name" unplugcpu 3</screen></para>
726
727 <para>See <xref linkend="vboxmanage-modifyvm" /> and <xref
728 linkend="vboxmanage-controlvm" /> for details.</para>
729
730 <para>With Linux guests, the following applies: To prevent ejection while
731 the CPU is still used it has to be ejected from within the guest before.
732 The Linux Guest Additions contain a service which receives hot-remove
733 events and ejects the CPU. Also, after a CPU is added to the VM it is not
734 automatically used by Linux. The Linux Guest Additions service will take
735 care of that if installed. If not a CPU can be started with the following
736 command:<screen>echo 1 &gt; /sys/devices/system/cpu/cpu&lt;id&gt;/online</screen></para>
737 </sect1>
738
739 <sect1 id="pcipassthrough">
740 <title>PCI passthrough</title>
741
742 <para>When running on Linux hosts, with a recent enough kernel (at least
743 version <computeroutput>2.6.31</computeroutput>) experimental host PCI
744 devices passthrough is available.<footnote>
745 <para>Experimental support for PCI passthrough was introduced with
746 VirtualBox 4.1.</para>
747 </footnote></para>
748
749 <note>
750 <para>The PCI passthrough module is shipped as a VirtualBox extension
751 package, which must be installed separately. See <xref
752 linkend="intro-installing" /> for more information.</para>
753 </note>
754
755 <para>Essentially this feature allows to directly use physical PCI devices
756 on the host by the guest even if host doesn't have drivers for this
757 particular device. Both, regular PCI and some PCI Express cards, are
758 supported. AGP and certain PCI Express cards are not supported at the
759 moment if they rely on GART (Graphics Address Remapping Table) unit
760 programming for texture management as it does rather nontrivial operations
761 with pages remapping interfering with IOMMU. This limitation may be lifted
762 in future releases.</para>
763
764 <para>To be fully functional, PCI passthrough support in VirtualBox
765 depends upon an IOMMU hardware unit which is not yet too widely available.
766 If the device uses bus mastering (i.e. it performs DMA to the OS memory on
767 its own), then an IOMMU is required, otherwise such DMA transactions may
768 write to the wrong physical memory address as the device DMA engine is
769 programmed using a device-specific protocol to perform memory
770 transactions. The IOMMU functions as translation unit mapping physical
771 memory access requests from the device using knowledge of the guest
772 physical address to host physical addresses translation rules.</para>
773
774 <para>Intel's solution for IOMMU is marketed as "Intel Virtualization
775 Technology for Directed I/O" (VT-d), and AMD's one is called AMD-Vi. So
776 please check if your motherboard datasheet has appropriate technology.
777 Even if your hardware doesn't have a IOMMU, certain PCI cards may work
778 (such as serial PCI adapters), but the guest will show a warning on boot
779 and the VM execution will terminate if the guest driver will attempt to
780 enable card bus mastering.</para>
781
782 <para>It is very common that the BIOS or the host OS disables the IOMMU by
783 default. So before any attempt to use it please make sure that
784 <orderedlist>
785 <listitem>
786 <para>Your motherboard has an IOMMU unit.</para>
787 </listitem>
788
789 <listitem>
790 <para>Your CPU supports the IOMMU.</para>
791 </listitem>
792
793 <listitem>
794 <para>The IOMMU is enabled in the BIOS.</para>
795 </listitem>
796
797 <listitem>
798 <para>The VM must run with VT-x/AMD-V and nested paging
799 enabled.</para>
800 </listitem>
801
802 <listitem>
803 <para>Your Linux kernel was compiled with IOMMU support (including
804 DMA remapping, see <computeroutput>CONFIG_DMAR</computeroutput>
805 kernel compilation option). The PCI stub driver
806 (<computeroutput>CONFIG_PCI_STUB</computeroutput>) is required as
807 well.</para>
808 </listitem>
809
810 <listitem>
811 <para>Your Linux kernel recognizes and uses the IOMMU unit
812 (<computeroutput>intel_iommu=on</computeroutput> boot option could
813 be needed). Search for DMAR and PCI-DMA in kernel boot log.</para>
814 </listitem>
815 </orderedlist></para>
816
817 <para>Once you made sure that the host kernel supports the IOMMU, the next
818 step is to select the PCI card and attach it to the guest. To figure out
819 the list of available PCI devices, use the
820 <computeroutput>lspci</computeroutput> command. The output will look like
821 this:</para>
822 <screen>01:00.0 VGA compatible controller: ATI Technologies Inc Cedar PRO [Radeon HD 5450]
82301:00.1 Audio device: ATI Technologies Inc Manhattan HDMI Audio [Mobility Radeon HD 5000 Series]
82402:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd. RTL8111/8168B PCI Express Gigabit
825 Ethernet controller (rev 03)
82603:00.0 SATA controller: JMicron Technology Corp. JMB362/JMB363 Serial ATA Controller (rev 03)
82703:00.1 IDE interface: JMicron Technology Corp. JMB362/JMB363 Serial ATA Controller (rev 03)
82806:00.0 VGA compatible controller: nVidia Corporation G86 [GeForce 8500 GT] (rev a1)</screen>
829 <para>The first column is a PCI address (in format
830 <computeroutput>bus:device.function</computeroutput>). This address could
831 be used to identify the device for further operations. For example, to
832 attach a PCI network controller on the system listed above to the second
833 PCI bus in the guest, as device 5, function 0, use the following command:
834 <screen>VBoxManage modifyvm "VM name" --pciattach 02:00.0@01:05.0</screen>
835 To detach same device, use <screen>VBoxManage modifyvm "VM name" --pcidetach 02:00.0</screen>
836 Please note that both host and guest could freely assign a different PCI
837 address to the card attached during runtime, so those addresses only apply
838 to the address of the card at the moment of attachment (host), and during
839 BIOS PCI init (guest).</para>
840
841 <para>If the virtual machine has a PCI device attached, certain
842 limitations apply: <orderedlist>
843 <listitem>
844 Only PCI cards with non-shared interrupts (such as using MSI on host) are supported at the moment.
845 </listitem>
846
847 <listitem>
848 No guest state can be reliably saved/restored (as the internal state of the PCI card could not be retrieved).
849 </listitem>
850
851 <listitem>
852 Teleportation (live migration) doesn't work (for the same reason).
853 </listitem>
854
855 <listitem>
856 No lazy physical memory allocation. The host will preallocate the whole RAM required for the VM on startup (as we cannot catch physical hardware accesses to the physical memory).
857 </listitem>
858 </orderedlist></para>
859 </sect1>
860
861 <sect1>
862 <title>Advanced display configuration</title>
863
864 <sect2>
865 <title>Custom VESA resolutions</title>
866
867 <para>Apart from the standard VESA resolutions, the VirtualBox VESA BIOS
868 allows you to add up to 16 custom video modes which will be reported to
869 the guest operating system. When using Windows guests with the
870 VirtualBox Guest Additions, a custom graphics driver will be used
871 instead of the fallback VESA solution so this information does not
872 apply.</para>
873
874 <para>Additional video modes can be configured for each VM using the
875 extra data facility. The extra data key is called
876 <literal>CustomVideoMode&lt;x&gt;</literal> with <literal>x</literal>
877 being a number from 1 to 16. Please note that modes will be read from 1
878 until either the following number is not defined or 16 is reached. The
879 following example adds a video mode that corresponds to the native
880 display resolution of many notebook computers:</para>
881
882 <screen>VBoxManage setextradata "VM name" "CustomVideoMode1" "1400x1050x16"</screen>
883
884 <para>The VESA mode IDs for custom video modes start at
885 <literal>0x160</literal>. In order to use the above defined custom video
886 mode, the following command line has be supplied to Linux:</para>
887
888 <screen>vga = 0x200 | 0x160
889vga = 864</screen>
890
891 <para>For guest operating systems with VirtualBox Guest Additions, a
892 custom video mode can be set using the video mode hint feature.</para>
893 </sect2>
894
895 <sect2>
896 <title>Configuring the maximum resolution of guests when using the
897 graphical frontend</title>
898
899 <para>When guest systems with the Guest Additions installed are started
900 using the graphical frontend (the normal VirtualBox application), they
901 will not be allowed to use screen resolutions greater than the host's
902 screen size unless the user manually resizes them by dragging the
903 window, switching to full screen or seamless mode or sending a video mode
904 hint using VBoxManage. This behavior is what most users will want, but
905 if you have different needs, it is possible to change it by issuing one
906 of the following commands from the command line:</para>
907
908 <screen>VBoxManage setextradata global GUI/MaxGuestResolution any</screen>
909
910 <para>will remove all limits on guest resolutions.</para>
911
912 <screen>VBoxManage setextradata global GUI/MaxGuestResolution &gt;width,height&lt;</screen>
913
914 <para>manually specifies a maximum resolution.</para>
915
916 <screen>VBoxManage setextradata global GUI/MaxGuestResolution auto</screen>
917
918 <para>restores the default settings. Note that these settings apply
919 globally to all guest systems, not just to a single machine.</para>
920 </sect2>
921 </sect1>
922
923 <sect1>
924 <title>Advanced storage configuration</title>
925
926 <sect2 id="rawdisk">
927 <title>Using a raw host hard disk from a guest</title>
928
929 <para>Starting with version 1.4, as an alternative to using virtual disk
930 images (as described in detail in <xref linkend="storage" />),
931 VirtualBox can also present either entire physical hard disks or
932 selected partitions thereof as virtual disks to virtual machines.</para>
933
934 <para>With VirtualBox, this type of access is called "raw hard disk
935 access"; it allows a guest operating system to access its virtual hard
936 disk without going through the host OS file system. The actual
937 performance difference for image files vs. raw disk varies greatly
938 depending on the overhead of the host file system, whether dynamically
939 growing images are used, and on host OS caching strategies. The caching
940 indirectly also affects other aspects such as failure behavior, i.e.
941 whether the virtual disk contains all data written before a host OS
942 crash. Consult your host OS documentation for details on this.</para>
943
944 <para><warning>
945 <para>Raw hard disk access is for expert users only. Incorrect use
946 or use of an outdated configuration can lead to <emphasis
947 role="bold">total loss of data </emphasis>on the physical disk. Most
948 importantly, <emphasis>do not</emphasis> attempt to boot the
949 partition with the currently running host operating system in a
950 guest. This will lead to severe data corruption.</para>
951 </warning></para>
952
953 <para>Raw hard disk access -- both for entire disks and individual
954 partitions -- is implemented as part of the VMDK image format support.
955 As a result, you will need to create a special VMDK image file which
956 defines where the data will be stored. After creating such a special
957 VMDK image, you can use it like a regular virtual disk image. For
958 example, you can use the VirtualBox Manager (<xref linkend="vdis" />)
959 or <computeroutput>VBoxManage</computeroutput> to assign the image to a
960 virtual machine.</para>
961
962 <sect3>
963 <title>Access to entire physical hard disk</title>
964
965 <para>While this variant is the simplest to set up, you must be aware
966 that this will give a guest operating system direct and full access to
967 an <emphasis>entire physical disk</emphasis>. If your
968 <emphasis>host</emphasis> operating system is also booted from this
969 disk, please take special care to not access the partition from the
970 guest at all. On the positive side, the physical disk can be
971 repartitioned in arbitrary ways without having to recreate the image
972 file that gives access to the raw disk.</para>
973
974 <para>To create an image that represents an entire physical hard disk
975 (which will not contain any actual data, as this will all be stored on
976 the physical disk), on a Linux host, use the command<screen>VBoxManage internalcommands createrawvmdk -filename /path/to/file.vmdk
977 -rawdisk /dev/sda</screen>This creates the image
978 <code>/path/to/file.vmdk</code> (must be absolute), and all data will
979 be read and written from <code>/dev/sda</code>.</para>
980
981 <para>On a Windows host, instead of the above device specification,
982 use e.g. <code>\\.\PhysicalDrive0</code>. On a Mac OS X host, instead
983 of the above device specification use e.g. <code>/dev/disk1</code>.
984 Note that on OS X you can only get access to an entire disk if no
985 volume is mounted from it.</para>
986
987 <para>Creating the image requires read/write access for the given
988 device. Read/write access is also later needed when using the image
989 from a virtual machine. On some host platforms (e.g. Windows Vista
990 and later), raw disk access may be restricted and not permitted by
991 the host OS in some situations.</para>
992
993 <para>Just like with regular disk images, this does not automatically
994 attach the newly created image to a virtual machine. This can be done
995 with e.g. <screen>VBoxManage storageattach WindowsXP --storagectl "IDE Controller"
996 --port 0 --device 0 --type hdd --medium /path/to/file.vmdk</screen>When
997 this is done the selected virtual machine will boot from the specified
998 physical disk.</para>
999 </sect3>
1000
1001 <sect3>
1002 <title>Access to individual physical hard disk partitions</title>
1003
1004 <para>This "raw partition support" is quite similar to the "full hard
1005 disk" access described above. However, in this case, any partitioning
1006 information will be stored inside the VMDK image, so you can e.g.
1007 install a different boot loader in the virtual hard disk without
1008 affecting the host's partitioning information. While the guest will be
1009 able to <emphasis>see</emphasis> all partitions that exist on the
1010 physical disk, access will be filtered in that reading from partitions
1011 for which no access is allowed the partitions will only yield zeroes,
1012 and all writes to them are ignored.</para>
1013
1014 <para>To create a special image for raw partition support (which will
1015 contain a small amount of data, as already mentioned), on a Linux
1016 host, use the command<screen>VBoxManage internalcommands createrawvmdk -filename /path/to/file.vmdk
1017 -rawdisk /dev/sda -partitions 1,5</screen></para>
1018
1019 <para>As you can see, the command is identical to the one for "full
1020 hard disk" access, except for the additional
1021 <computeroutput>-partitions</computeroutput> parameter. This example
1022 would create the image <code>/path/to/file.vmdk</code> (which, again,
1023 must be absolute), and partitions 1 and 5 of <code>/dev/sda</code>
1024 would be made accessible to the guest.</para>
1025
1026 <para>VirtualBox uses the same partition numbering as your Linux host.
1027 As a result, the numbers given in the above example would refer to the
1028 first primary partition and the first logical drive in the extended
1029 partition, respectively.</para>
1030
1031 <para>On a Windows host, instead of the above device specification,
1032 use e.g. <code>\\.\PhysicalDrive0</code>. On a Mac OS X host, instead
1033 of the above device specification use e.g. <code>/dev/disk1</code>.
1034 Note that on OS X you can only use partitions which are not mounted
1035 (eject the respective volume first). Partition numbers are the same on
1036 Linux, Windows and Mac OS X hosts.</para>
1037
1038 <para>The numbers for the list of partitions can be taken from the
1039 output of<screen>VBoxManage internalcommands listpartitions -rawdisk /dev/sda</screen>The
1040 output lists the partition types and sizes to give the user enough
1041 information to identify the partitions necessary for the guest.</para>
1042
1043 <para>Images which give access to individual partitions are specific
1044 to a particular host disk setup. You cannot transfer these images to
1045 another host; also, whenever the host partitioning changes, the image
1046 <emphasis>must be recreated</emphasis>.</para>
1047
1048 <para>Creating the image requires read/write access for the given
1049 device. Read/write access is also later needed when using the image
1050 from a virtual machine. If this is not feasible, there is a special
1051 variant for raw partition access (currently only available on Linux
1052 hosts) that avoids having to give the current user access to the
1053 entire disk. To set up such an image, use<screen>VBoxManage internalcommands createrawvmdk -filename /path/to/file.vmdk
1054 -rawdisk /dev/sda -partitions 1,5 -relative</screen>When used from a
1055 virtual machine, the image will then refer not to the entire disk, but
1056 only to the individual partitions (in the example
1057 <code>/dev/sda1</code> and <code>/dev/sda5</code>). As a consequence,
1058 read/write access is only required for the affected partitions, not
1059 for the entire disk. During creation however, read-only access to the
1060 entire disk is required to obtain the partitioning information.</para>
1061
1062 <para>In some configurations it may be necessary to change the MBR
1063 code of the created image, e.g. to replace the Linux boot loader that
1064 is used on the host by another boot loader. This allows e.g. the guest
1065 to boot directly to Windows, while the host boots Linux from the
1066 "same" disk. For this purpose the
1067 <computeroutput>-mbr</computeroutput> parameter is provided. It
1068 specifies a file name from which to take the MBR code. The partition
1069 table is not modified at all, so a MBR file from a system with totally
1070 different partitioning can be used. An example of this is<screen>VBoxManage internalcommands createrawvmdk -filename /path/to/file.vmdk
1071 -rawdisk /dev/sda -partitions 1,5 -mbr winxp.mbr</screen>The modified
1072 MBR will be stored inside the image, not on the host disk.</para>
1073
1074 <para>The created image can be attached to a storage controller in a
1075 VM configuration as usual.</para>
1076 </sect3>
1077 </sect2>
1078
1079 <sect2 id="changevpd">
1080 <title>Configuring the hard disk vendor product data (VPD)</title>
1081
1082 <para>VirtualBox reports vendor product data for its virtual hard disks
1083 which consist of hard disk serial number, firmware revision and model
1084 number. These can be changed using the following commands:</para>
1085
1086 <screen>VBoxManage setextradata "VM name"
1087 "VBoxInternal/Devices/ahci/0/Config/Port0/SerialNumber" "serial"
1088VBoxManage setextradata "VM name"
1089 "VBoxInternal/Devices/ahci/0/Config/Port0/FirmwareRevision" "firmware"
1090VBoxManage setextradata "VM name"
1091 "VBoxInternal/Devices/ahci/0/Config/Port0/ModelNumber" "model"</screen>
1092
1093 <para>The serial number is a 20 byte alphanumeric string, the firmware
1094 revision an 8 byte alphanumeric string and the model number a 40 byte
1095 alphanumeric string. Instead of "Port0" (referring to the first port),
1096 specify the desired SATA hard disk port.</para>
1097
1098 <para>The above commands apply to virtual machines with an AHCI (SATA)
1099 controller. The commands for virtual machines with an IDE controller
1100 are:</para>
1101
1102 <screen>VBoxManage setextradata "VM name"
1103 "VBoxInternal/Devices/piix3ide/0/Config/PrimaryMaster/SerialNumber" "serial"
1104VBoxManage setextradata "VM name"
1105 "VBoxInternal/Devices/piix3ide/0/Config/PrimaryMaster/FirmwareRevision" "firmware"
1106VBoxManage setextradata "VM name"
1107 "VBoxInternal/Devices/piix3ide/0/Config/PrimaryMaster/ModelNumber" "model"</screen>
1108
1109 <para>For hard disks it's also possible to mark the
1110 drive as having a non-rotational medium with:</para>
1111
1112 <screen>VBoxManage setextradata "VM name"
1113 "VBoxInternal/Devices/ahci/0/Config/Port0/NonRotational" "1"</screen>
1114
1115 <para>Additional three parameters are needed for CD/DVD drives to report
1116 the vendor product data:</para>
1117
1118 <screen>VBoxManage setextradata "VM name"
1119 "VBoxInternal/Devices/ahci/0/Config/Port0/ATAPIVendorId" "vendor"
1120VBoxManage setextradata "VM name"
1121 "VBoxInternal/Devices/ahci/0/Config/Port0/ATAPIProductId" "product"
1122VBoxManage setextradata "VM name"
1123 "VBoxInternal/Devices/ahci/0/Config/Port0/ATAPIRevision" "revision"</screen>
1124
1125 <para>The vendor id is an 8 byte alphanumeric string, the product id an
1126 16 byte alphanumeric string and the revision a 4 byte alphanumeric
1127 string. Instead of "Port0" (referring to the first port), specify the
1128 desired SATA hard disk port.</para>
1129 </sect2>
1130
1131 <sect2 id="iscsi-intnet">
1132 <title>Access iSCSI targets via Internal Networking</title>
1133
1134 <para>As an experimental feature, VirtualBox allows for accessing an
1135 iSCSI target running in a virtual machine which is configured for using
1136 Internal Networking mode. Please see <xref linkend="storage-iscsi" />;
1137 <xref linkend="network_internal" />; and <xref
1138 linkend="vboxmanage-storageattach" /> for additional information.</para>
1139
1140 <para>The IP stack accessing Internal Networking must be configured in
1141 the virtual machine which accesses the iSCSI target. A free static IP
1142 and a MAC address not used by other virtual machines must be chosen. In
1143 the example below, adapt the name of the virtual machine, the MAC
1144 address, the IP configuration and the Internal Networking name
1145 ("MyIntNet") according to your needs. The following eight commands must
1146 first be issued:<screen>VBoxManage setextradata "VM name" VBoxInternal/Devices/IntNetIP/0/Trusted 1
1147VBoxManage setextradata "VM name" VBoxInternal/Devices/IntNetIP/0/Config/MAC 08:00:27:01:02:0f
1148VBoxManage setextradata "VM name" VBoxInternal/Devices/IntNetIP/0/Config/IP 10.0.9.1
1149VBoxManage setextradata "VM name" VBoxInternal/Devices/IntNetIP/0/Config/Netmask 255.255.255.0
1150VBoxManage setextradata "VM name" VBoxInternal/Devices/IntNetIP/0/LUN#0/Driver IntNet
1151VBoxManage setextradata "VM name" VBoxInternal/Devices/IntNetIP/0/LUN#0/Config/Network MyIntNet
1152VBoxManage setextradata "VM name" VBoxInternal/Devices/IntNetIP/0/LUN#0/Config/TrunkType 2
1153VBoxManage setextradata "VM name" VBoxInternal/Devices/IntNetIP/0/LUN#0/Config/IsService 1</screen></para>
1154
1155 <para>Finally the iSCSI disk must be attached with the
1156 <computeroutput>--intnet</computeroutput> option to tell the iSCSI
1157 initiator to use internal networking:<screen>VBoxManage storageattach ... --medium iscsi
1158 --server 10.0.9.30 --target iqn.2008-12.com.sun:sampletarget --intnet</screen></para>
1159
1160 <para>Compared to a "regular" iSCSI setup, IP address of the target
1161 <emphasis>must</emphasis> be specified as a numeric IP address, as there
1162 is no DNS resolver for internal networking.</para>
1163
1164 <para>The virtual machine with the iSCSI target should be started before
1165 the VM using it is powered on. If a virtual machine using an iSCSI disk
1166 is started without having the iSCSI target powered up, it can take up to
1167 200 seconds to detect this situation. The VM will fail to power
1168 up.</para>
1169 </sect2>
1170 </sect1>
1171
1172 <sect1>
1173 <title>Launching more than 128 VMs on Linux hosts</title>
1174
1175 <para>Linux hosts have a fixed number of IPC semaphores IDs per process
1176 preventing users from starting substantially many VMs. The exact number
1177 may vary with each Linux distribution. While trying to launch more VMs you
1178 would be shown a "Cannot create IPC semaphore" error. In order to run more
1179 VMs, you will need to increase the semaphore ID limit of the VBoxSVC
1180 process. Find the current semaphore limits imposed by the kernel by
1181 executing as root:<screen>#/sbin/sysctl kernel.sem
1182kernel.sem = 250 32000 32 128</screen></para>
1183
1184 <para>The "kernel.sem" parameter bundles together 4 values, the one we are
1185 interested in is called "SEMMNI", the maximum number of semaphore IDs
1186 which is 128 in the above example. Increase this semaphore ID limit by
1187 executing as root:<screen>echo "kernel.sem = 250 32000 32 2048" &gt;&gt; /etc/sysctl.conf
1188/sbin/sysctl -p</screen></para>
1189
1190 <para>The above commands will add the new limits to the configuration file, thus
1191 making the effect persistent across reboots, and will activate the new
1192 limits into the currently running kernel.</para>
1193 </sect1>
1194
1195 <sect1>
1196 <title>Launching more than 120 VMs on Solaris hosts</title>
1197
1198 <para>Solaris hosts have a fixed number of IPC semaphores IDs per process
1199 preventing users from starting more than 120 VMs. While trying to launch
1200 more VMs you would be shown a "Cannot create IPC semaphore" error. In
1201 order to run more VMs, you will need to increase the semaphore ID limit of
1202 the VBoxSVC process.</para>
1203
1204 <sect2>
1205 <title>Temporary solution while VirtualBox is running</title>
1206
1207 <para>Execute as root the <computeroutput>prctl</computeroutput> command
1208 as shown below for the currently running VBoxSVC process. The process ID
1209 of VBoxSVC can be obtained using the <computeroutput>ps</computeroutput>
1210 command.</para>
1211
1212 <screen>prctl -r -n project.max-sem-ids -v 2048 &lt;pid-of-VBoxSVC&gt;</screen>
1213
1214 <para>This will immediately increase the semaphore limit of the
1215 currently running VBoxSVC process and allow you to launch more VMs.
1216 However, this change is not persistent and will be lost when VBoxSVC
1217 terminates.</para>
1218 </sect2>
1219
1220 <sect2>
1221 <title>Persistent solution, requires user to re-login</title>
1222
1223 <para>If the user running VirtualBox is root, execute the following
1224 command:</para>
1225
1226 <screen>prctl -n project.max-sem-ids -v 2048 -r -i project user.root</screen>
1227
1228 <para>From this point, starting new processes will have the increased
1229 limit of 2048. You may then re-login or close all VMs and restart
1230 VBoxSVC. You can check the current VBoxSVC semaphore ID limit using the
1231 following command:</para>
1232
1233 <screen>prctl -n project.max-sem-ids -i process &lt;pid-of-VBoxSVC&gt;</screen>
1234
1235 <para>If the user running VirtualBox is not root, you must add the
1236 property to the user's default project. Create the default project and
1237 set the limit by executing as root:</para>
1238
1239 <screen>projadd -U &lt;username&gt; user.&lt;username&gt;
1240projmod -s -K "project.max-sem-ids=(priv,2048,deny)" user.&lt;username&gt;</screen>
1241
1242 <para>Substitute "&lt;username&gt;" with the name of the user running
1243 VirtualBox. Then re-login as this user to be able to run more than 120
1244 VMs.</para>
1245 </sect2>
1246 </sect1>
1247
1248 <sect1>
1249 <title>Legacy commands for using serial ports</title>
1250
1251 <para>Starting with version 1.4, VirtualBox provided support for virtual
1252 serial ports, which, at the time, was rather complicated to set up with a
1253 sequence of <computeroutput>VBoxManage setextradata</computeroutput>
1254 statements. Since version 1.5, that way of setting up serial ports is no
1255 longer necessary and <emphasis>deprecated.</emphasis> To set up virtual
1256 serial ports, use the methods now described in <xref
1257 linkend="serialports" />.<note>
1258 <para>For backwards compatibility, the old
1259 <computeroutput>setextradata</computeroutput> statements, whose
1260 description is retained below from the old version of the manual, take
1261 <emphasis>precedence</emphasis> over the new way of configuring serial
1262 ports. As a result, if configuring serial ports the new way doesn't
1263 work, make sure the VM in question does not have old configuration
1264 data such as below still active.</para>
1265 </note></para>
1266
1267 <para>The old sequence of configuring a serial port used the following 6
1268 commands:</para>
1269
1270 <screen>VBoxManage setextradata "VM name"
1271 "VBoxInternal/Devices/serial/0/Config/IRQ" 4
1272VBoxManage setextradata "VM name"
1273 "VBoxInternal/Devices/serial/0/Config/IOBase" 0x3f8
1274VBoxManage setextradata "VM name"
1275 "VBoxInternal/Devices/serial/0/LUN#0/Driver" Char
1276VBoxManage setextradata "VM name"
1277 "VBoxInternal/Devices/serial/0/LUN#0/AttachedDriver/Driver" NamedPipe
1278VBoxManage setextradata "VM name"
1279 "VBoxInternal/Devices/serial/0/LUN#0/AttachedDriver/Config/Location" "\\.\pipe\vboxCOM1"
1280VBoxManage setextradata "VM name"
1281 "VBoxInternal/Devices/serial/0/LUN#0/AttachedDriver/Config/IsServer" 1</screen>
1282
1283 <para>This sets up a serial port in the guest with the default settings
1284 for COM1 (IRQ 4, I/O address 0x3f8) and the
1285 <computeroutput>Location</computeroutput> setting assumes that this
1286 configuration is used on a Windows host, because the Windows named pipe
1287 syntax is used. Keep in mind that on Windows hosts a named pipe must
1288 always start with <computeroutput>\\.\pipe\</computeroutput>. On Linux the
1289 same configuration settings apply, except that the path name for the
1290 <computeroutput>Location</computeroutput> can be chosen more freely. Local
1291 domain sockets can be placed anywhere, provided the user running
1292 VirtualBox has the permission to create a new file in the directory. The
1293 final command above defines that VirtualBox acts as a server, i.e. it
1294 creates the named pipe itself instead of connecting to an already existing
1295 one.</para>
1296 </sect1>
1297
1298 <sect1 id="changenat">
1299 <title>Fine-tuning the VirtualBox NAT engine</title>
1300
1301 <sect2>
1302 <title>Configuring the address of a NAT network interface</title>
1303
1304 <para>In NAT mode, the guest network interface is assigned to the IPv4
1305 range <computeroutput>10.0.x.0/24</computeroutput> by default where
1306 <computeroutput>x</computeroutput> corresponds to the instance of the
1307 NAT interface +2. So <computeroutput>x</computeroutput> is 2 when there
1308 is only one NAT instance active. In that case the guest is assigned to
1309 the address <computeroutput>10.0.2.15</computeroutput>, the gateway is
1310 set to <computeroutput>10.0.2.2</computeroutput> and the name server can
1311 be found at <computeroutput>10.0.2.3</computeroutput>.</para>
1312
1313 <para>If, for any reason, the NAT network needs to be changed, this can
1314 be achieved with the following command:</para>
1315
1316 <screen>VBoxManage modifyvm "VM name" --natnet1 "192.168/16"</screen>
1317
1318 <para>This command would reserve the network addresses from
1319 <computeroutput>192.168.0.0</computeroutput> to
1320 <computeroutput>192.168.254.254</computeroutput> for the first NAT
1321 network instance of "VM name". The guest IP would be assigned to
1322 <computeroutput>192.168.0.15</computeroutput> and the default gateway
1323 could be found at <computeroutput>192.168.0.2</computeroutput>.</para>
1324 </sect2>
1325
1326 <sect2 id="nat-adv-tftp">
1327 <title>Configuring the boot server (next server) of a NAT network
1328 interface</title>
1329
1330 <para>For network booting in NAT mode, by default VirtualBox uses a
1331 built-in TFTP server at the IP address 10.0.2.4. This default behavior
1332 should work fine for typical remote-booting scenarios. However, it is
1333 possible to change the boot server IP and the location of the boot image
1334 with the following commands: <screen>VBoxManage modifyvm "VM name" --nattftpserver1 10.0.2.2
1335VBoxManage modifyvm "VM name" --nattftpfile1 /srv/tftp/boot/MyPXEBoot.pxe</screen></para>
1336 </sect2>
1337
1338 <sect2 id="nat-adv-settings">
1339 <title>Tuning TCP/IP buffers for NAT</title>
1340
1341 <para>The VirtualBox NAT stack performance is often determined by its
1342 interaction with the host's TCP/IP stack and the size of several buffers
1343 (<computeroutput>SO_RCVBUF</computeroutput> and
1344 <computeroutput>SO_SNDBUF</computeroutput>). For certain setups users
1345 might want to adjust the buffer size for a better performance. This can
1346 by achieved using the following commands (values are in kilobytes and
1347 can range from 8 to 1024): <screen>VBoxManage modifyvm "VM name" --natsettings1 16000,128,128,0,0</screen>
1348 This example illustrates tuning the NAT settings. The first parameter is
1349 the MTU, then the size of the socket's send buffer and the size of the
1350 socket's receive buffer, the initial size of the TCP send window, and
1351 lastly the initial size of the TCP receive window. Note that specifying
1352 zero means fallback to the default value.</para>
1353
1354 <para>Each of these buffers has a default size of 64KB and default MTU
1355 is 1500.</para>
1356 </sect2>
1357
1358 <sect2>
1359 <title>Binding NAT sockets to a specific interface</title>
1360
1361 <para>By default, VirtualBox's NAT engine will route TCP/IP packets
1362 through the default interface assigned by the host's TCP/IP stack. (The
1363 technical reason for this is that the NAT engine uses sockets for
1364 communication.) If, for some reason, you want to change this behavior,
1365 you can tell the NAT engine to bind to a particular IP address instead.
1366 Use the following command: <screen>VBoxManage modifyvm "VM name" --natbindip1 "10.45.0.2"</screen></para>
1367
1368 <para>After this, all outgoing traffic will be sent through the
1369 interface with the IP address 10.45.0.2. Please make sure that this
1370 interface is up and running prior to this assignment.</para>
1371 </sect2>
1372
1373 <sect2 id="nat-adv-dns">
1374 <title>Enabling DNS proxy in NAT mode</title>
1375
1376 <para>The NAT engine by default offers the same DNS servers to the guest
1377 that are configured on the host. In some scenarios, it can be desirable
1378 to hide the DNS server IPs from the guest, for example when this
1379 information can change on the host due to expiring DHCP leases. In this
1380 case, you can tell the NAT engine to act as DNS proxy using the
1381 following command: <screen>VBoxManage modifyvm "VM name" --natdnsproxy1 on</screen></para>
1382 </sect2>
1383
1384 <sect2 id="nat_host_resolver_proxy">
1385 <title>Using the host's resolver as a DNS proxy in NAT mode</title>
1386
1387 <para>For resolving network names, the DHCP server of the NAT engine
1388 offers a list of registered DNS servers of the host. If for some reason
1389 you need to hide this DNS server list and use the host's resolver
1390 settings, thereby forcing the VirtualBox NAT engine to intercept DNS
1391 requests and forward them to host's resolver, use the following command:
1392 <screen>VBoxManage modifyvm "VM name" --natdnshostresolver1 on</screen>
1393 Note that this setting is similar to the DNS proxy mode, however whereas
1394 the proxy mode just forwards DNS requests to the appropriate servers,
1395 the resolver mode will interpret the DNS requests and use the host's DNS
1396 API to query the information and return it to the guest.</para>
1397
1398 <sect3 id="nat_host_resolver_name_intercepting">
1399 <title>User-defined host name resolving</title>
1400 <para>In some cases it might be useful to intercept the name resolving mechanism,
1401 providing a user-defined IP address on a particular DNS request. The intercepting
1402 mechanism allows the user to map not only a single host but domains and even more
1403 complex namings conventions if required.</para>
1404 <para>
1405 The following command sets a rule for mapping a name to a specified IP:</para>
1406 <screen>VBoxManage setextradata "VM name" \
1407 "VBoxInternal/Devices/{pcnet,e1000}/0/LUN#0/Config/HostResolverMappings/ \
1408 &lt;uniq name of interception rule&gt;/HostIP" &lt;IPv4&gt;
1409VBoxManage setextradata "VM name" \
1410 "VBoxInternal/Devices/{pcnet,e1000}/0/LUN#0/Config/HostResolverMappings/ \
1411 &lt;uniq name of interception rule&gt;/HostName" &lt;name of host&gt;</screen>
1412 <para>The following command sets a rule for mapping a pattern name to a specified IP:</para>
1413 <screen>VBoxManage setextradata "VM name" \
1414 "VBoxInternal/Devices/{pcnet,e1000}/0/LUN#0/Config/HostResolverMappings/ \
1415 &lt;uniq name of interception rule&gt;/HostIP" &lt;IPv4&gt;
1416VBoxManage setextradata "VM name" \
1417 "VBoxInternal/Devices/{pcnet,e1000}/0/LUN#0/Config/HostResolverMappings/ \
1418 &lt;uniq name of interception rule&gt;/HostNamePattern" &lt;hostpattern&gt;</screen>
1419 <para>The host pattern may include <computeroutput>"|", "?" and "*"</computeroutput>.</para>
1420 <para>This example demonstrates how to instruct the host-resolver mechanism to resolve
1421 all domain and probably some mirrors of www.blocked-site.info site with IP 127.0.0.1:</para>
1422 <screen>VBoxManage setextradata "VM name" \
1423 "VBoxInternal/Devices/e1000/0/LUN#0/Config/HostResolverMappings/ \
1424 all_blocked_site/HostIP" 127.0.0.1
1425VBoxManage setextradata "VM name" \
1426 "VBoxInternal/Devices/e1000/0/LUN#0/Config/HostResolverMappings/ \
1427 all_blocked_site/HostNamePattern" "*.blocked-site.*|*.fb.org"</screen>
1428 <note><para>The host resolver mechanism should be enabled to use user-defined
1429 mapping rules (please see
1430 <xref linkend="nat_host_resolver_proxy" /> for more details).</para></note>
1431 </sect3>
1432 </sect2>
1433
1434 <sect2 id="nat-adv-alias">
1435 <title>Configuring aliasing of the NAT engine</title>
1436
1437 <para>By default, the NAT core uses aliasing and uses random ports when
1438 generating an alias for a connection. This works well for the most
1439 protocols like SSH, FTP and so on. Though some protocols might need a
1440 more transparent behavior or may depend on the real port number the
1441 packet was sent from. It is possible to change the NAT mode via the
1442 VBoxManage frontend with the following commands: <screen>VBoxManage modifyvm "VM name" --nataliasmode1 proxyonly</screen>
1443 and <screen>VBoxManage modifyvm "Linux Guest" --nataliasmode1 sameports</screen>
1444 The first example disables aliasing and switches NAT into transparent
1445 mode, the second example enforces preserving of port values. These modes
1446 can be combined if necessary.</para>
1447 </sect2>
1448 </sect1>
1449
1450 <sect1 id="changedmi">
1451 <title>Configuring the BIOS DMI information</title>
1452
1453 <para>The DMI data VirtualBox provides to guests can be changed for a
1454 specific VM. Use the following commands to configure the DMI BIOS
1455 information:</para>
1456
1457 <sect2>
1458 <title>DMI BIOS information (type 0)</title>
1459 <screen>VBoxManage setextradata "VM name"
1460 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSVendor" "BIOS Vendor"
1461VBoxManage setextradata "VM name"
1462 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSVersion" "BIOS Version"
1463VBoxManage setextradata "VM name"
1464 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSReleaseDate" "BIOS Release Date"
1465VBoxManage setextradata "VM name"
1466 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSReleaseMajor" 1
1467VBoxManage setextradata "VM name"
1468 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSReleaseMinor" 2
1469VBoxManage setextradata "VM name"
1470 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSFirmwareMajor" 3
1471VBoxManage setextradata "VM name"
1472 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSFirmwareMinor" 4</screen>
1473 </sect2>
1474 <sect2>
1475 <title>DMI system information (type 1)</title>
1476 <screen>VBoxManage setextradata "VM name"
1477 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemVendor" "System Vendor"
1478VBoxManage setextradata "VM name"
1479 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemProduct" "System Product"
1480VBoxManage setextradata "VM name"
1481 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemVersion" "System Version"
1482VBoxManage setextradata "VM name"
1483 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemSerial" "System Serial"
1484VBoxManage setextradata "VM name"
1485 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemSKU" "System SKU"
1486VBoxManage setextradata "VM name"
1487 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemFamily" "System Family"
1488VBoxManage setextradata "VM name"
1489 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemUuid"
1490 "9852bf98-b83c-49db-a8de-182c42c7226b"</screen>
1491 </sect2>
1492 <sect2>
1493 <title>DMI board information (type 2)</title>
1494 <screen>VBoxManage setextradata "VM name"
1495 "VBoxInternal/Devices/pcbios/0/Config/DmiBoardVendor" "Board Vendor"
1496VBoxManage setextradata "VM name"
1497 "VBoxInternal/Devices/pcbios/0/Config/DmiBoardProduct" "Board Product"
1498VBoxManage setextradata "VM name"
1499 "VBoxInternal/Devices/pcbios/0/Config/DmiBoardVersion" "Board Version"
1500VBoxManage setextradata "VM name"
1501 "VBoxInternal/Devices/pcbios/0/Config/DmiBoardSerial" "Board Serial"
1502VBoxManage setextradata "VM name"
1503 "VBoxInternal/Devices/pcbios/0/Config/DmiBoardAssetTag" "Board Tag"
1504VBoxManage setextradata "VM name"
1505 "VBoxInternal/Devices/pcbios/0/Config/DmiBoardLocInChass" "Board Location"
1506VBoxManage setextradata "VM name"
1507 "VBoxInternal/Devices/pcbios/0/Config/DmiBoardBoardType" 10</screen>
1508 </sect2>
1509 <sect2>
1510 <title>DMI system enclosure or chassis (type 3)</title>
1511 <screen>VBoxManage setextradata "VM name"
1512 "VBoxInternal/Devices/pcbios/0/Config/DmiChassisVendor" "Chassis Vendor"
1513VBoxManage setextradata "VM name"
1514 "VBoxInternal/Devices/pcbios/0/Config/DmiChassisType" 3
1515VBoxManage setextradata "VM name"
1516 "VBoxInternal/Devices/pcbios/0/Config/DmiChassisVersion" "Chassis Version"
1517VBoxManage setextradata "VM name"
1518 "VBoxInternal/Devices/pcbios/0/Config/DmiChassisSerial" "Chassis Serial"
1519VBoxManage setextradata "VM name"
1520 "VBoxInternal/Devices/pcbios/0/Config/DmiChassisAssetTag" "Chassis Tag"</screen>
1521 </sect2>
1522 <sect2>
1523 <title>DMI processor informatiion (type 4)</title>
1524 <screen>VBoxManage setextradata "VM name"
1525 "VBoxInternal/Devices/pcbios/0/Config/DmiProcManufacturer" "GenuineIntel"
1526VBoxManage setextradata "VM name"
1527 "VBoxInternal/Devices/pcbios/0/Config/DmiProcVersion" "Pentium(R) III"</screen>
1528 </sect2>
1529 <sect2>
1530 <title>DMI OEM strings (type 11)</title>
1531 <screen>VBoxManage setextradata "VM name"
1532 "VBoxInternal/Devices/pcbios/0/Config/DmiOEMVBoxVer" "vboxVer_1.2.3"
1533VBoxManage setextradata "VM name"
1534 "VBoxInternal/Devices/pcbios/0/Config/DmiOEMVBoxRev" "vboxRev_12345"</screen>
1535 </sect2>
1536 <para>If a DMI string is not set, the default value of VirtualBox is used.
1537 To set an empty string use
1538 <computeroutput>"&lt;EMPTY&gt;"</computeroutput>.</para>
1539
1540 <para>Note that in the above list, all quoted parameters (DmiBIOSVendor,
1541 DmiBIOSVersion but not DmiBIOSReleaseMajor) are expected to be strings. If
1542 such a string is a valid number, the parameter is treated as number and
1543 the VM will most probably refuse to start with an
1544 <computeroutput>VERR_CFGM_NOT_STRING</computeroutput> error. In that case,
1545 use <computeroutput>"string:&lt;value&gt;"</computeroutput>, for instance
1546 <screen>VBoxManage setextradata "VM name"
1547 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemSerial" "string:1234"</screen></para>
1548
1549 <para>Changing this information can be necessary to provide the DMI
1550 information of the host to the guest to prevent Windows from asking for a
1551 new product key. On Linux hosts the DMI BIOS information can be obtained
1552 with <screen>dmidecode -t0</screen>and the DMI system information can be
1553 obtained with <screen>dmidecode -t1</screen></para>
1554 </sect1>
1555
1556 <sect1 id="changeacpicust">
1557 <title>Configuring the custom ACPI table</title>
1558
1559 <para>VirtualBox can be configured to present an custom ACPI table to
1560 the guest. Use the following command to configure this:</para>
1561
1562 <screen>VBoxManage setextradata "VM name"
1563 "VBoxInternal/Devices/acpi/0/Config/CustomTable" "/path/to/table.bin"</screen>
1564
1565 <para>Configuring a custom ACPI table can prevent Windows
1566 Vista and Windows 7 from asking for a new product key. On Linux hosts,
1567 one of the host tables can be read from
1568 <filename>/sys/firmware/acpi/tables/</filename>.</para>
1569 </sect1>
1570
1571 <sect1>
1572 <title>Fine-tuning timers and time synchronization</title>
1573
1574 <sect2 id="changetscmode">
1575 <title>Configuring the guest time stamp counter (TSC) to reflect guest
1576 execution</title>
1577
1578 <para>By default, VirtualBox keeps all sources of time visible to the
1579 guest synchronized to a single time source, the monotonic host time.
1580 This reflects the assumptions of many guest operating systems, which
1581 expect all time sources to reflect "wall clock" time. In special
1582 circumstances it may be useful however to make the TSC (time stamp
1583 counter) in the guest reflect the time actually spent executing the
1584 guest.</para>
1585
1586 <para>This special TSC handling mode can be enabled on a per-VM basis,
1587 and for best results must be used only in combination with hardware
1588 virtualization. To enable this mode use the following command:</para>
1589
1590 <screen>VBoxManage setextradata "VM name" "VBoxInternal/TM/TSCTiedToExecution" 1</screen>
1591
1592 <para>To revert to the default TSC handling mode use:</para>
1593
1594 <screen>VBoxManage setextradata "VM name" "VBoxInternal/TM/TSCTiedToExecution"</screen>
1595
1596 <para>Note that if you use the special TSC handling mode with a guest
1597 operating system which is very strict about the consistency of time
1598 sources you may get a warning or error message about the timing
1599 inconsistency. It may also cause clocks to become unreliable with some
1600 guest operating systems depending on how they use the TSC.</para>
1601 </sect2>
1602
1603 <sect2 id="warpguest">
1604 <title>Accelerate or slow down the guest clock</title>
1605
1606 <para>For certain purposes it can be useful to accelerate or to slow
1607 down the (virtual) guest clock. This can be achieved as follows:</para>
1608
1609 <screen>VBoxManage setextradata "VM name" "VBoxInternal/TM/WarpDrivePercentage" 200</screen>
1610
1611 <para>The above example will double the speed of the guest clock
1612 while</para>
1613
1614 <screen>VBoxManage setextradata "VM name" "VBoxInternal/TM/WarpDrivePercentage" 50</screen>
1615
1616 <para>will halve the speed of the guest clock. Note that changing the
1617 rate of the virtual clock can confuse the guest and can even lead to
1618 abnormal guest behavior. For instance, a higher clock rate means shorter
1619 timeouts for virtual devices with the result that a slightly increased
1620 response time of a virtual device due to an increased host load can
1621 cause guest failures. Note further that any time synchronization
1622 mechanism will frequently try to resynchronize the guest clock with the
1623 reference clock (which is the host clock if the VirtualBox Guest
1624 Additions are active). Therefore any time synchronization should be
1625 disabled if the rate of the guest clock is changed as described above
1626 (see <xref linkend="changetimesync" />).</para>
1627 </sect2>
1628
1629 <sect2 id="changetimesync">
1630 <title>Tuning the Guest Additions time synchronization
1631 parameters</title>
1632
1633 <para>The VirtualBox Guest Additions ensure that the guest's system time
1634 is synchronized with the host time. There are several parameters which
1635 can be tuned. The parameters can be set for a specific VM using the
1636 following command:</para>
1637
1638 <screen>VBoxManage guestproperty set "VM name" "/VirtualBox/GuestAdd/VBoxService/PARAMETER" VALUE</screen>
1639
1640 <para>where <computeroutput>PARAMETER</computeroutput> is one of the
1641 following:</para>
1642
1643 <para><glosslist>
1644 <glossentry>
1645 <glossterm><computeroutput>--timesync-interval</computeroutput></glossterm>
1646
1647 <glossdef>
1648 <para>Specifies the interval at which to synchronize the time
1649 with the host. The default is 10000 ms (10 seconds).</para>
1650 </glossdef>
1651 </glossentry>
1652
1653 <glossentry>
1654 <glossterm><computeroutput>--timesync-min-adjust</computeroutput></glossterm>
1655
1656 <glossdef>
1657 <para>The minimum absolute drift value measured in milliseconds
1658 to make adjustments for. The default is 1000 ms on OS/2 and 100
1659 ms elsewhere.</para>
1660 </glossdef>
1661 </glossentry>
1662
1663 <glossentry>
1664 <glossterm><computeroutput>--timesync-latency-factor</computeroutput></glossterm>
1665
1666 <glossdef>
1667 <para>The factor to multiply the time query latency with to
1668 calculate the dynamic minimum adjust time. The default is 8
1669 times, that means in detail: Measure the time it takes to
1670 determine the host time (the guest has to contact the VM host
1671 service which may take some time), multiply this value by 8 and
1672 do an adjustment only if the time difference between host and
1673 guest is bigger than this value. Don't do any time adjustment
1674 otherwise.</para>
1675 </glossdef>
1676 </glossentry>
1677
1678 <glossentry>
1679 <glossterm><computeroutput>--timesync-max-latency</computeroutput></glossterm>
1680
1681 <glossdef>
1682 <para>The max host timer query latency to accept. The default is
1683 250 ms.</para>
1684 </glossdef>
1685 </glossentry>
1686
1687 <glossentry>
1688 <glossterm><computeroutput>--timesync-set-threshold</computeroutput></glossterm>
1689
1690 <glossdef>
1691 <para>The absolute drift threshold, given as milliseconds where
1692 to start setting the time instead of trying to smoothly adjust
1693 it. The default is 20 minutes.</para>
1694 </glossdef>
1695 </glossentry>
1696
1697 <glossentry>
1698 <glossterm><computeroutput>--timesync-set-start</computeroutput></glossterm>
1699
1700 <glossdef>
1701 <para>Set the time when starting the time sync service.</para>
1702 </glossdef>
1703 </glossentry>
1704
1705 <glossentry>
1706 <glossterm><computeroutput>--timesync-set-on-restore
1707 0|1</computeroutput></glossterm>
1708
1709 <glossdef>
1710 <para>Set the time after the VM was restored from a saved state
1711 when passing 1 as parameter (default). Disable by passing 0. In
1712 the latter case, the time will be adjusted smoothly which can
1713 take a long time.</para>
1714 </glossdef>
1715 </glossentry>
1716 </glosslist></para>
1717
1718 <para>All these parameters can be specified as command line parameters
1719 to VBoxService as well.</para>
1720 </sect2>
1721
1722 <sect2 id="disabletimesync">
1723
1724 <title>Disabling the Guest Additions time synchronization</title>
1725
1726 <para>Once installed and started, the VirtualBox Guest Additions will
1727 try to synchronize the guest time with the host time. This can be
1728 prevented by forbidding the guest service from reading the host
1729 clock:</para>
1730
1731 <screen>VBoxManage setextradata "VM name" "VBoxInternal/Devices/VMMDev/0/Config/GetHostTimeDisabled" 1</screen>
1732
1733 </sect2>
1734
1735 </sect1>
1736
1737 <sect1 id="vboxbowsolaris11">
1738 <title>Installing the alternate bridged networking driver on Solaris 11
1739 hosts</title>
1740
1741 <para>Starting with VirtualBox 4.1, VirtualBox ships a new network filter
1742 driver that utilizes Solaris 11's Crossbow functionality. By default, this
1743 new driver is installed for Solaris 11 hosts (builds 159 and above) that
1744 has support for it.</para>
1745
1746 <para>To force installation of the older STREAMS based network filter
1747 driver, execute as root the following command before installing the
1748 VirtualBox package:</para>
1749
1750 <screen>touch /etc/vboxinst_vboxflt</screen>
1751
1752 <para>To force installation of the Crossbow based network filter driver,
1753 execute as root the following command before installing the VirtualBox
1754 package:</para>
1755
1756 <screen>touch /etc/vboxinst_vboxbow</screen>
1757
1758 <para>To check which driver is currently being used by VirtualBox,
1759 execute:</para>
1760
1761 <screen>modinfo | grep vbox</screen>
1762
1763 <para>If the output contains "vboxbow", it indicates VirtualBox is using
1764 the Crossbow network filter driver, while the name "vboxflt" indicates
1765 usage of the older STREAMS network filter.</para>
1766 </sect1>
1767
1768 <sect1 id="vboxbowvnictemplates">
1769 <title>VirtualBox VNIC templates for VLANs on Solaris 11 hosts</title>
1770
1771 <para>VirtualBox supports VNIC (Virtual Network Interface) templates for
1772 configuring VMs over VLANs.<footnote>
1773 <para>Support for Crossbow based bridged networking was introduced
1774 with VirtualBox 4.1 and requires Solaris 11 build 159 or above.</para>
1775 </footnote> A VirtualBox VNIC template is a VNIC whose name starts with
1776 "vboxvnic_template".</para>
1777
1778 <para>Here is an example of how to use a VNIC template to configure a VLAN
1779 for VMs. Create a VirtualBox VNIC template, by executing as root:</para>
1780
1781 <screen>dladm create-vnic -t -l nge0 -v 23 vboxvnic_template0
1782</screen>
1783
1784 <para>This will create a temporary VNIC over interface "nge0" with the
1785 VLAN ID 23. To create VNIC templates that are persistent across host
1786 reboots, skip the <computeroutput>-t</computeroutput> parameter in the
1787 above command. You may check the current state of links using:</para>
1788
1789 <para><screen>$ dladm show-link
1790LINK CLASS MTU STATE BRIDGE OVER
1791nge0 phys 1500 up -- --
1792nge1 phys 1500 down -- --
1793vboxvnic_template0 vnic 1500 up -- nge0
1794
1795$ dladm show-vnic
1796LINK OVER SPEED MACADDRESS MACADDRTYPE VID
1797vboxvnic_template0 nge0 1000 2:8:20:25:12:75 random 23
1798</screen></para>
1799
1800 <para>Once the VNIC template is created, all VMs that need to be part of
1801 VLAN 23 over the physical interface "nge0" can use the same VNIC template.
1802 This makes managing VMs on VLANs simpler and efficient, as the VLAN
1803 details are not stored as part of every VM's configuration but rather
1804 picked from the VNIC template which can be modified anytime using
1805 <computeroutput>dladm</computeroutput>. Apart from the VLAN ID, VNIC
1806 templates can be created with additional properties such as bandwidth
1807 limits, CPU fanout etc. Refer to your Solaris network documentation on how
1808 to accomplish this. These additional properties, if any, are also applied
1809 to VMs which use the VNIC template.</para>
1810 </sect1>
1811
1812 <sect1 id="addhostonlysolaris">
1813 <title>Configuring multiple host-only network interfaces on Solaris
1814 hosts</title>
1815
1816 <para>By default VirtualBox provides you with one host-only network
1817 interface. Adding more host-only network interfaces on Solaris hosts
1818 requires manual configuration. Here's how to add two more host-only
1819 network interfaces.</para>
1820
1821 <para>You first need to stop all running VMs and unplumb all existing
1822 "vboxnet" interfaces. Execute the following commands as root:</para>
1823
1824 <screen>ifconfig vboxnet0 unplumb</screen>
1825
1826 <para>Once you make sure all vboxnet interfaces are unplumbed, remove the
1827 driver using:</para>
1828
1829 <para><screen>rem_drv vboxnet</screen>then edit the file
1830 <computeroutput>/platform/i86pc/kernel/drv/vboxnet.conf</computeroutput>
1831 and add a line for the new interfaces:</para>
1832
1833 <para><screen>name="vboxnet" parent="pseudo" instance=1;
1834name="vboxnet" parent="pseudo" instance=2;</screen>Add as many of these lines
1835 as required and make sure "instance" number is uniquely incremented. Next
1836 reload the vboxnet driver using:</para>
1837
1838 <para><screen>add_drv vboxnet</screen>Now plumb all the interfaces using
1839 <computeroutput>ifconfig vboxnetX plumb</computeroutput> (where X can be
1840 0, 1 or 2 in this case) and once plumbed you can then configure the
1841 interface like any other network interface.</para>
1842
1843 <para>To make your newly added interfaces' settings persistent across
1844 reboots you will need to edit the files
1845 <computeroutput>/etc/netmasks</computeroutput>, and if you are using NWAM
1846 <computeroutput>/etc/nwam/llp</computeroutput> and add the appropriate
1847 entries to set the netmask and static IP for each of those interfaces. The
1848 VirtualBox installer only updates these configuration files for the one
1849 "vboxnet0" interface it creates by default.</para>
1850 </sect1>
1851
1852 <sect1 id="solariscodedumper">
1853 <title>Configuring the VirtualBox CoreDumper on Solaris hosts</title>
1854
1855 <para>VirtualBox is capable of producing its own core files for extensive
1856 debugging when things go wrong. Currently this is only available on
1857 Solaris hosts.</para>
1858
1859 <para>The VirtualBox CoreDumper can be enabled using the following
1860 command:</para>
1861
1862 <para><screen>VBoxManage setextradata "VM name" VBoxInternal2/CoreDumpEnabled 1</screen></para>
1863
1864 <para>You can specify which directory to use for core dumps with this
1865 command:</para>
1866
1867 <para><screen>VBoxManage setextradata "VM name" VBoxInternal2/CoreDumpDir &lt;path-to-directory&gt;</screen>Make
1868 sure the directory you specify is on a volume with sufficient free space
1869 and that the VirtualBox process has sufficient permissions to write files
1870 to this directory. If you skip this command and don't specify any core
1871 dump directory, the current directory of the VirtualBox executable will be
1872 used (which would most likely fail when writing cores as they are
1873 protected with root permissions). It is recommended you explicitly set a
1874 core dump directory.</para>
1875
1876 <para>You must specify when the VirtualBox CoreDumper should be triggered.
1877 This is done using the following commands:</para>
1878
1879 <para><screen>VBoxManage setextradata "VM name" VBoxInternal2/CoreDumpReplaceSystemDump 1
1880VBoxManage setextradata "VM name" VBoxInternal2/CoreDumpLive 1</screen>At
1881 least one of the above two commands will have to be provided if you have
1882 enabled the VirtualBox CoreDumper.</para>
1883
1884 <para>Setting <computeroutput>CoreDumpReplaceSystemDump</computeroutput>
1885 sets up the VM to override the host's core dumping mechanism and in the
1886 event of any crash only the VirtualBox CoreDumper would produce the core
1887 file.</para>
1888
1889 <para>Setting <computeroutput>CoreDumpLive</computeroutput> sets up the VM
1890 to produce cores whenever the VM process receives a
1891 <computeroutput>SIGUSR2</computeroutput> signal. After producing the core
1892 file, the VM will not be terminated and will continue to run. You can thus
1893 take cores of the VM process using:</para>
1894
1895 <para><screen>kill -s SIGUSR2 &lt;VM-process-id&gt;</screen></para>
1896
1897 <para>Core files produced by the VirtualBox CoreDumper are of the form
1898 <computeroutput>core.vb.&lt;ProcessName&gt;.&lt;ProcessID&gt;</computeroutput>,
1899 for example <computeroutput>core.vb.VBoxHeadless.11321</computeroutput>.</para>
1900 </sect1>
1901
1902 <sect1 id="guitweaks">
1903 <title>Locking down the VirtualBox manager GUI</title>
1904
1905 <sect2>
1906 <title>GUI customization</title>
1907
1908 <para>There are several advanced customization settings for locking down
1909 the VirtualBox manager, that is, removing some features that the user
1910 should not see.</para>
1911
1912 <para><screen>VBoxManage setextradata global GUI/Customizations OPTION[,OPTION...]</screen></para>
1913
1914 <para>where <computeroutput>OPTION</computeroutput> is one of the
1915 following keywords:<glosslist>
1916 <glossentry>
1917 <glossterm><computeroutput>noSelector</computeroutput></glossterm>
1918
1919 <glossdef>
1920 <para>Don't allow to start the VirtualBox manager. Trying to do so
1921 will show a window containing a proper error message.</para>
1922 </glossdef>
1923 </glossentry>
1924
1925 <glossentry>
1926 <glossterm><computeroutput>noMenuBar</computeroutput></glossterm>
1927
1928 <glossdef>
1929 <para>VM windows will not contain a menu bar.</para>
1930 </glossdef>
1931 </glossentry>
1932
1933 <glossentry>
1934 <glossterm><computeroutput>noStatusBar</computeroutput></glossterm>
1935
1936 <glossdef>
1937 <para>VM windows will not contain a status bar.</para>
1938 </glossdef>
1939 </glossentry>
1940 </glosslist></para>
1941
1942 <para>To disable any GUI customization do
1943 <screen>VBoxManage setextradata global GUI/Customizations</screen></para>
1944
1945 <title>VM selector customization</title>
1946 <para>The following per-machine VM extradata settings can be used to change the
1947 behavior of the VM selector window in respect of certain VMs:</para>
1948 <screen>VBoxManage setextradata VM_NAME SETTING true</screen>
1949 <para>where <computeroutput>SETTING</computeroutput> can be:</para>
1950 <glosslist>
1951 <glossentry>
1952 <glossterm><computeroutput>GUI/HideDetails</computeroutput></glossterm>
1953 <glossdef>
1954 <para>Don't show the VM configuration of a certain VM. The details
1955 window will remain just empty if this VM is selected.</para>
1956 </glossdef>
1957 </glossentry>
1958 <glossentry>
1959 <glossterm><computeroutput>GUI/PreventReconfiguration</computeroutput></glossterm>
1960 <glossdef>
1961 <para>Don't allow the user to open the settings dialog for a certain VM.</para>
1962 </glossdef>
1963 </glossentry>
1964 <glossentry>
1965 <glossterm><computeroutput>GUI/HideFromManager</computeroutput></glossterm>
1966 <glossdef>
1967 <para>Hide a certain VM in the VM selector window.</para>
1968 </glossdef>
1969 </glossentry>
1970 </glosslist>
1971 <para>Please note that these settings wouldn't prevent the user from
1972 reconfiguring the VM by <computeroutput>VBoxManage modifyvm</computeroutput>.</para>
1973
1974 </sect2>
1975
1976 <sect2>
1977 <title>Host Key customization</title>
1978
1979 <para>To disable all host key combinations, open the preferences and
1980 change the host key to <emphasis>None</emphasis>. This might be useful
1981 when using VirtualBox in a kiosk mode.</para>
1982
1983 <para>To redefine or disable certain host key actions, use the following command:</para>
1984
1985 <screen>VBoxManage setextradata global GUI/Input/MachineShortcuts "FullscreenMode=F,...."</screen>
1986
1987 <para>The following list shows the possible host key actions together with their default
1988 host key shortcut. Setting an action to <emphasis>None</emphasis> will disable
1989 that host key action.</para>
1990 <table>
1991 <title>ignoreme</title>
1992 <tgroup cols="3">
1993 <tbody>
1994 <row>
1995 <entry><emphasis role="bold">Action</emphasis></entry>
1996 <entry><emphasis role="bold">Default Key</emphasis></entry>
1997 <entry><emphasis role="bold">Action</emphasis></entry>
1998 </row>
1999 <row>
2000 <entry>TakeSnapshot</entry>
2001 <entry>T</entry>
2002 <entry>take a snapshot</entry>
2003 </row>
2004 <row>
2005 <entry>TakeScreenshot</entry>
2006 <entry>E</entry>
2007 <entry>take a screenshot</entry>
2008 </row>
2009 <row>
2010 <entry>MouseIntegration</entry>
2011 <entry>I</entry>
2012 <entry>toggle mouse integration</entry>
2013 </row>
2014 <row>
2015 <entry>TypeCAD</entry>
2016 <entry>Del</entry>
2017 <entry>inject Ctrl+Alt+Del</entry>
2018 </row>
2019 <row>
2020 <entry>TypeCABS</entry>
2021 <entry>Backspace</entry>
2022 <entry>inject Ctrl+Alt+Backspace</entry>
2023 </row>
2024 <row>
2025 <entry>Pause</entry>
2026 <entry>P</entry>
2027 <entry>Pause the VM</entry>
2028 </row>
2029 <row>
2030 <entry>Reset</entry>
2031 <entry>R</entry>
2032 <entry>(hard) reset the guest</entry>
2033 </row>
2034 <row>
2035 <entry>Save</entry>
2036 <entry></entry>
2037 <entry>save the VM state and terminate the VM</entry>
2038 </row>
2039 <row>
2040 <entry>Shutdown</entry>
2041 <entry>H</entry>
2042 <entry>press the (virtual) ACPI power button</entry>
2043 </row>
2044 <row>
2045 <entry>PowerOff</entry>
2046 <entry></entry>
2047 <entry>power the VM off (without saving the state!)</entry>
2048 </row>
2049 <row>
2050 <entry>Close</entry>
2051 <entry>Q</entry>
2052 <entry>show the VM close dialog</entry>
2053 </row>
2054 <row>
2055 <entry>FullscreenMode</entry>
2056 <entry>F</entry>
2057 <entry>switch the VM into fullscreen</entry>
2058 </row>
2059 <row>
2060 <entry>SeamlessMode</entry>
2061 <entry>L</entry>
2062 <entry>switch the VM into seamless mode</entry>
2063 </row>
2064 <row>
2065 <entry>ScaleMode</entry>
2066 <entry>C</entry>
2067 <entry>switch the VM into scale mode</entry>
2068 </row>
2069 <row>
2070 <entry>GuestAutoResize</entry>
2071 <entry>G</entry>
2072 <entry>automatically resize the guest window</entry>
2073 </row>
2074 <row>
2075 <entry>WindowAdjust</entry>
2076 <entry>A</entry>
2077 <entry>immediately resize the guest window</entry>
2078 </row>
2079 <row>
2080 <entry>PopupMenu</entry>
2081 <entry>Home</entry>
2082 <entry>show popup menu in fullscreen / seamless mode</entry>
2083 </row>
2084 <row>
2085 <entry>SettingsDialog</entry>
2086 <entry>S</entry>
2087 <entry>open the VM settings dialog</entry>
2088 </row>
2089 <row>
2090 <entry>InformationsDialog</entry>
2091 <entry>N</entry>
2092 <entry>show the VM information window</entry>
2093 </row>
2094 <row>
2095 <entry>NetworkAdaptersDialog</entry>
2096 <entry></entry>
2097 <entry>show the VM network adapters dialog</entry>
2098 </row>
2099 <row>
2100 <entry>SharedFoldersDialog</entry>
2101 <entry></entry>
2102 <entry>show the VM shared folders dialog</entry>
2103 </row>
2104 <row>
2105 <entry>InstallGuestAdditions</entry>
2106 <entry>D</entry>
2107 <entry>mount the ISO containing the Guest Additions</entry>
2108 </row>
2109 </tbody>
2110 </tgroup>
2111 </table>
2112
2113 <para>To disable the fullscreen mode as well as the seamless mode, use the following command:
2114 <screen>VBoxManage setextradata global GUI/Input/MachineShortcuts "FullscreenMode=None,SeamlessMode=None"</screen>
2115 </para>
2116
2117 </sect2>
2118 <sect2>
2119 <title>Action when terminating the VM</title>
2120
2121 <para>You can disallow certain actions when terminating a VM. To disallow specific actions, type:</para>
2122
2123 <para><screen>VBoxManage setextradata "VM name" GUI/RestrictedCloseActions OPTION[,OPTION...]</screen></para>
2124
2125 <para>where <computeroutput>OPTION</computeroutput> is one of the
2126 following keywords:<glosslist>
2127 <glossentry>
2128 <glossterm><computeroutput>SaveState</computeroutput></glossterm>
2129
2130 <glossdef>
2131 <para>Don't allow the user to save the VM state when terminating
2132 the VM.</para>
2133 </glossdef>
2134 </glossentry>
2135
2136 <glossentry>
2137 <glossterm><computeroutput>Shutdown</computeroutput></glossterm>
2138
2139 <glossdef>
2140 <para>Don't allow the user to shutdown the VM by sending the ACPI
2141 power-off event to the guest.</para>
2142 </glossdef>
2143 </glossentry>
2144
2145 <glossentry>
2146 <glossterm><computeroutput>PowerOff</computeroutput></glossterm>
2147
2148 <glossdef>
2149 <para>Don't allow the user to power off the VM.</para>
2150 </glossdef>
2151 </glossentry>
2152
2153 <glossentry>
2154 <glossterm><computeroutput>Restore</computeroutput></glossterm>
2155
2156 <glossdef>
2157 <para>Don't allow the user to return to the last snapshot when
2158 powering off the VM.</para>
2159 </glossdef>
2160 </glossentry>
2161 </glosslist></para>
2162
2163 <para>Any combination of the above is allowed. If all options are
2164 specified, the VM cannot be shut down at all.</para>
2165 </sect2>
2166 </sect1>
2167
2168 <sect1 id="vboxwebsrv-daemon">
2169 <title>Starting the VirtualBox web service automatically</title>
2170
2171 <para>The VirtualBox web service
2172 (<computeroutput>vboxwebsrv</computeroutput>) is used for controlling
2173 VirtualBox remotely. It is documented in detail in the VirtualBox Software
2174 Development Kit (SDK); please see <xref linkend="VirtualBoxAPI" />. As the
2175 client base using this interface is growing, we added start scripts for
2176 the various operation systems we support. The following sections describe
2177 how to use them. The VirtualBox web service is never started automatically
2178 as a result of a standard installation.</para>
2179
2180 <sect2 id="vboxwebsrv-linux">
2181 <title>Linux: starting the webservice via <computeroutput>init</computeroutput></title>
2182
2183 <para>On Linux, the web service can be automatically started during
2184 host boot by adding appropriate parameters to the file
2185 <computeroutput>/etc/default/virtualbox</computeroutput>.
2186 There is one mandatory parameter, <computeroutput>VBOXWEB_USER</computeroutput>,
2187 which must be set to the user which will later start the VMs. The
2188 parameters in the table below all start with <computeroutput>VBOXWEB_</computeroutput>
2189 (<computeroutput>VBOXWEB_HOST</computeroutput>,
2190 <computeroutput>VBOXWEB_PORT</computeroutput> etc.):
2191 <table>
2192 <title>ignored</title>
2193 <tgroup cols="3">
2194 <tbody>
2195 <row>
2196 <entry><emphasis role="bold">Parameter</emphasis></entry>
2197 <entry><emphasis role="bold">Description</emphasis></entry>
2198 <entry><emphasis role="bold">Default</emphasis></entry>
2199 </row>
2200 <row>
2201 <entry>USER</entry>
2202 <entry>The user as which the web service runs</entry>
2203 <entry></entry>
2204 </row>
2205 <row>
2206 <entry>HOST</entry>
2207 <entry>The host to bind the web service to</entry>
2208 <entry>localhost</entry>
2209 </row>
2210 <row>
2211 <entry>PORT</entry>
2212 <entry>The port to bind the web service to</entry>
2213 <entry>18083</entry>
2214 </row>
2215 <row>
2216 <entry>SSL_KEYFILE</entry>
2217 <entry>Server key and certificate file, PEM format</entry>
2218 <entry></entry>
2219 </row>
2220 <row>
2221 <entry>SSL_PASSWORDFILE</entry>
2222 <entry>File name for password to server key</entry>
2223 <entry></entry>
2224 </row>
2225 <row>
2226 <entry>SSL_CACERT</entry>
2227 <entry>CA certificate file, PEM format</entry>
2228 <entry></entry>
2229 </row>
2230 <row>
2231 <entry>SSL_CAPATH</entry>
2232 <entry>CA certificate path</entry>
2233 <entry></entry>
2234 </row>
2235 <row>
2236 <entry>SSL_DHFILE</entry>
2237 <entry>DH file name or DH key length in bits</entry>
2238 <entry></entry>
2239 </row>
2240 <row>
2241 <entry>SSL_RANDFILE</entry>
2242 <entry>File containing seed for random number generator</entry>
2243 <entry></entry>
2244 </row>
2245 <row>
2246 <entry>TIMEOUT</entry>
2247 <entry>Session timeout in seconds; 0 disables timeouts</entry>
2248 <entry>300</entry>
2249 </row>
2250 <row>
2251 <entry>CHECK_INTERVAL</entry>
2252 <entry>Frequency of timeout checks in seconds</entry>
2253 <entry>5</entry>
2254 </row>
2255 <row>
2256 <entry>THREADS</entry>
2257 <entry>Maximum number of worker threads to run in parallel</entry>
2258 <entry>100</entry>
2259 </row>
2260 <row>
2261 <entry>KEEPALIVE</entry>
2262 <entry>Maximum number of requests before a socket will be closed</entry>
2263 <entry>100</entry>
2264 </row>
2265 <row>
2266 <entry>ROTATE</entry>
2267 <entry>Number of log files; 0 disables log rotation</entry>
2268 <entry>10</entry>
2269 </row>
2270 <row>
2271 <entry>LOGSIZE</entry>
2272 <entry>Maximum size of a log file in bytes to trigger rotation</entry>
2273 <entry>1MB</entry>
2274 </row>
2275 <row>
2276 <entry>LOGINTERVAL</entry>
2277 <entry>Maximum time interval in seconds to trigger log rotation</entry>
2278 <entry>1 day</entry>
2279 </row>
2280 </tbody>
2281 </tgroup>
2282 </table>
2283 </para>
2284
2285 <para>Setting the parameter <computeroutput>SSL_KEYFILE</computeroutput>
2286 enables the SSL/TLS support. Using encryption is strongly encouraged, as
2287 otherwise everything (including passwords) is transferred in clear
2288 text.</para>
2289 </sect2>
2290
2291 <sect2 id="vboxwebsrv-solaris">
2292 <title>Solaris: starting the web service via SMF</title>
2293
2294 <para>On Solaris hosts, the VirtualBox web service daemon is
2295 integrated into the SMF framework. You can change the parameters, but
2296 don't have to if the defaults below already match your needs:<screen>svccfg -s svc:/application/virtualbox/webservice:default setprop config/host=localhost
2297svccfg -s svc:/application/virtualbox/webservice:default setprop config/port=18083
2298svccfg -s svc:/application/virtualbox/webservice:default setprop config/user=root</screen></para>
2299
2300 <para>The table in the previous section showing the parameter names and
2301 defaults also applies to Solaris. The parameter names must be changed
2302 to lowercase and a prefix of <computeroutput>config/</computeroutput>
2303 has to be added, e.g. <computeroutput>config/user</computeroutput> or
2304 <computeroutput>config/ssl_keyfile</computeroutput>. If you made any
2305 change, don't forget to run the following command to put the changes into
2306 effect immediately:<screen>svcadm refresh svc:/application/virtualbox/webservice:default</screen></para>
2307
2308 <para>If you forget the above command then the previous settings will
2309 be used when enabling the service. Check the current property settings
2310 with:<screen>svcprop -p config svc:/application/virtualbox/webservice:default</screen></para>
2311
2312 <para>When everything is configured correctly you can start the
2313 VirtualBox web service with the following command:<screen>svcadm enable svc:/application/virtualbox/webservice:default</screen></para>
2314
2315 <para>For more information about SMF, please refer to the Solaris
2316 documentation.</para>
2317 </sect2>
2318
2319 <sect2 id="vboxwebsrv-osx">
2320 <title>Mac OS X: starting the webservice via launchd</title>
2321
2322 <para>On Mac OS X, launchd is used to start the VirtualBox webservice. An
2323 example configuration file can be found in
2324 <computeroutput>$HOME/Library/LaunchAgents/org.virtualbox.vboxwebsrv.plist</computeroutput>.
2325 It can be enabled by changing the
2326 <computeroutput>Disabled</computeroutput> key from
2327 <computeroutput>true</computeroutput> to
2328 <computeroutput>false</computeroutput>. To manually start the
2329 service use the following command: <screen>launchctl load ~/Library/LaunchAgents/org.virtualbox.vboxwebsrv.plist</screen>
2330 For additional information on how launchd services could be
2331 configured see <literal><ulink
2332 url="http://developer.apple.com/mac/library/documentation/MacOSX/Conceptual/BPSystemStartup/BPSystemStartup.html">http://developer.apple.com/mac/library/documentation/MacOSX/Conceptual/BPSystemStartup/BPSystemStartup.html</ulink></literal>.</para>
2333 </sect2>
2334 </sect1>
2335
2336 <sect1 id="vboxwatchdog">
2337 <title>VirtualBox Watchdog</title>
2338 <para>Starting with VirtualBox 4.2 the memory ballooning service formerly
2339 known as <computeroutput>VBoxBalloonCtrl</computeroutput> was renamed to
2340 VBoxWatchdog, which now incorporates several host services that are meant
2341 to be run in a server environment.</para>
2342
2343 <para>These services are: <itemizedlist>
2344 <listitem>
2345 <para>Memory ballooning control, which automatically takes care of
2346 a VM's configured memory balloon (see <xref linkend="guestadd-balloon" />
2347 for an introduction to memory ballooning). This especially is useful
2348 for server environments where VMs may dynamically require more or
2349 less memory during runtime.</para>
2350
2351 <para>The service periodically checks a VM's current memory balloon
2352 and its free guest RAM and automatically adjusts the current memory
2353 balloon by inflating or deflating it accordingly. This handling only
2354 applies to running VMs having recent Guest Additions installed.</para>
2355 </listitem>
2356 <listitem>
2357 <para>Host isolation detection, which provides a way to detect whether
2358 the host cannot reach the specific VirtualBox server instance anymore
2359 and take appropriate actions, such as shutting down, saving the
2360 current state or even powering down certain VMs.</para>
2361 </listitem>
2362 </itemizedlist></para>
2363
2364 <para>
2365 All configuration values can be either specified via command line or global
2366 extradata, whereas command line values always have a higher priority when set.
2367 Some of the configuration values also be be specified on a per-VM basis. So
2368 the overall lookup order is: command line, per-VM basis extradata (if available),
2369 global extradata.
2370 </para>
2371
2372 <sect2 id="vboxwatchdog-ballonctrl">
2373 <title>Memory ballooning control</title>
2374 <para>The memory ballooning control inflates and deflates the memory balloon
2375 of VMs based on the VMs free memory and the desired maximum balloon size.</para>
2376
2377 <para>To set up the memory ballooning control the maximum ballooning size a
2378 VM can reach needs to be set. This can be specified via command line with
2379 <screen>--balloon-max &lt;Size in MB&gt;</screen>, on a per-VM basis extradata value with
2380 <screen>VBoxManage setextradata &lt;VM-Name&gt; VBoxInternal2/Watchdog/BalloonCtrl/BalloonSizeMax &lt;Size in MB&gt;</screen>
2381 or using a global extradata value with
2382 <screen>VBoxManage setextradata global VBoxInternal2/Watchdog/BalloonCtrl/BalloonSizeMax &lt;Size in MB&gt;</screen>
2383 <note><para>If no maximum ballooning size is specified by at least one of
2384 the parameters above, no ballooning will be performed at all.</para></note>
2385 </para>
2386
2387 <para>Setting the ballooning increment in MB can be either done via
2388 command line with
2389 <screen>--balloon-inc &lt;Size in MB&gt;</screen> or using a global
2390 extradata value with
2391 <screen>VBoxManage setextradata global VBoxInternal2/Watchdog/BalloonCtrl/BalloonIncrementMB &lt;Size in MB&gt;</screen>
2392 Default ballooning increment is 256 MB if not specified.</para>
2393
2394 <para>Same goes with the ballooning decrement: Via command line with
2395 <screen>--balloon-dec &lt;Size in MB&gt;</screen> or using a global
2396 extradata value with
2397 <screen>VBoxManage setextradata global VBoxInternal2/Watchdog/BalloonCtrl/BalloonDecrementMB &lt;Size in MB&gt;</screen>
2398 Default ballooning decrement is 128 MB if not specified.</para>
2399
2400 <para>To define the lower limit in MB a balloon can be the command line with
2401 <screen>--balloon-lower-limit &lt;Size in MB&gt;</screen> can be used or using a global
2402 extradata value with
2403 <screen>VBoxManage setextradata global VBoxInternal2/Watchdog/BalloonCtrl/BalloonLowerLimitMB &lt;Size in MB&gt;</screen>
2404 is available. Default lower limit is 128 if not specified.</para>
2405 </sect2>
2406
2407 <sect2 id="vboxwatchdog-hostisln">
2408 <title>Host isolation detection</title>
2409 <para>To detect whether a host is being isolated, that is, the host cannot
2410 reach the VirtualBox server instance anymore, the host needs to set an
2411 alternating value to a global extradata value within a time period. If
2412 this value is not set within that time period a timeout occurred and the
2413 so-called host isolation response will be performed to the VMs handled.
2414 Which VMs are handled can be controlled by defining VM groups and assigning
2415 VMs to those groups. By default no groups are set, meaning that all VMs
2416 on the server will be handled when no host response is received within
2417 30 seconds.</para>
2418
2419 <para>To set the groups handled by the host isolation detection via
2420 command line:
2421 <screen>--apimon-groups=&lt;string[,stringN]&gt;</screen> or using a global
2422 extradata value with
2423 <screen>VBoxManage setextradata global VBoxInternal2/Watchdog/APIMonitor/Groups &lt;string[,stringN]&gt;</screen>
2424 </para>
2425
2426 <para>To set the host isolation timeout via command line:
2427 <screen>--apimon-isln-timeout=&lt;ms&gt;</screen> or using a global
2428 extradata value with
2429 <screen>VBoxManage setextradata global VBoxInternal2/Watchdog/APIMonitor/IsolationTimeoutMS &lt;ms&gt;</screen>
2430 </para>
2431
2432 <para>To set the actual host isolation response via command line:
2433 <screen>--apimon-isln-response=&lt;cmd&gt;</screen> or using a global
2434 extradata value with
2435 <screen>VBoxManage setextradata global VBoxInternal2/Watchdog/APIMonitor/IsolationResponse &lt;cmd&gt;</screen>
2436 The following response commands are available:
2437 <itemizedlist>
2438 <listitem>
2439 <para><computeroutput>none</computeroutput>, which does nothing.</para>
2440 </listitem>
2441 <listitem>
2442 <para><computeroutput>pause</computeroutput>, which pauses the
2443 execution of a VM.</para>
2444 </listitem>
2445 <listitem>
2446 <para><computeroutput>poweroff</computeroutput>, which shuts down
2447 the VM by pressing the virtual power button. The VM will not have
2448 the chance of saving any data or veto the shutdown process.</para>
2449 </listitem>
2450 <listitem>
2451 <para><computeroutput>save</computeroutput>, which saves the current
2452 machine state and powers off the VM afterwards. If saving the machine
2453 state fails the VM will be paused.</para>
2454 </listitem>
2455 <listitem>
2456 <para><computeroutput>shutdown</computeroutput>, which shuts down
2457 the VM in a gentle way by sending an <computeroutput>ACPI</computeroutput>
2458 shutdown event to the VM's operating system. The OS then has the
2459 chance of doing a clean shutdown.</para>
2460 </listitem>
2461 </itemizedlist>
2462 </para>
2463 </sect2>
2464
2465 <sect2 id="vboxwatchdog-moreinfo">
2466 <title>More information</title>
2467 <para>For more advanced options and parameters like verbose logging check
2468 the built-in command line help accessible with
2469 <computeroutput>--help</computeroutput>.</para>
2470 </sect2>
2471
2472 <sect2 id="vboxwatchdog-linux">
2473 <title>Linux: starting the watchdog service via <computeroutput>init</computeroutput></title>
2474
2475 <para>On Linux, the watchdog service can be automatically started during
2476 host boot by adding appropriate parameters to the file
2477 <computeroutput>/etc/default/virtualbox</computeroutput>.
2478 There is one mandatory parameter, <computeroutput>VBOXWATCHDOG_USER</computeroutput>,
2479 which must be set to the user which will later start the VMs. For backward
2480 compatibility you can also specify <computeroutput>VBOXBALLOONCTRL_USER</computeroutput>The
2481 parameters in the table below all start with <computeroutput>VBOXWATCHDOG_</computeroutput>
2482 (<computeroutput>VBOXWATCHDOG_BALLOON_INTERVAL</computeroutput>,
2483 <computeroutput>VBOXWATCHDOG_LOGSIZE</computeroutput> etc., and for
2484 previously existing parameters the
2485 <computeroutput>VBOXBALLOONCTRL_INTERVAL</computeroutput> etc. parameters
2486 can still be used):
2487 <table>
2488 <title>ignored</title>
2489 <tgroup cols="3">
2490 <tbody>
2491 <row>
2492 <entry><emphasis role="bold">Parameter</emphasis></entry>
2493 <entry><emphasis role="bold">Description</emphasis></entry>
2494 <entry><emphasis role="bold">Default</emphasis></entry>
2495 </row>
2496 <row>
2497 <entry>USER</entry>
2498 <entry>The user as which the watchdog service runs</entry>
2499 <entry></entry>
2500 </row>
2501 <row>
2502 <entry>ROTATE</entry>
2503 <entry>Number of log files; 0 disables log rotation</entry>
2504 <entry>10</entry>
2505 </row>
2506 <row>
2507 <entry>LOGSIZE</entry>
2508 <entry>Maximum size of a log file in bytes to trigger rotation</entry>
2509 <entry>1MB</entry>
2510 </row>
2511 <row>
2512 <entry>LOGINTERVAL</entry>
2513 <entry>Maximum time interval in seconds to trigger log rotation</entry>
2514 <entry>1 day</entry>
2515 </row>
2516 <row>
2517 <entry>BALLOON_INTERVAL</entry>
2518 <entry>Interval for checking the balloon size (msec)</entry>
2519 <entry>30000</entry>
2520 </row>
2521 <row>
2522 <entry>BALLOON_INCREMENT</entry>
2523 <entry>Balloon size increment (MByte)</entry>
2524 <entry>256</entry>
2525 </row>
2526 <row>
2527 <entry>BALLOON_DECREMENT</entry>
2528 <entry>Balloon size decrement (MByte)</entry>
2529 <entry>128</entry>
2530 </row>
2531 <row>
2532 <entry>BALLOON_LOWERLIMIT</entry>
2533 <entry>Balloon size lower limit (MByte)</entry>
2534 <entry>64</entry>
2535 </row>
2536 <row>
2537 <entry>BALLOON_SAFETYMARGIN</entry>
2538 <entry>Free memory required for decreasing the balloon size (MByte)</entry>
2539 <entry>1024</entry>
2540 </row>
2541 </tbody>
2542 </tgroup>
2543 </table>
2544 </para>
2545 </sect2>
2546
2547 <sect2 id="vboxwatchdog-solaris">
2548 <title>Solaris: starting the watchdog service via SMF</title>
2549
2550 <para>On Solaris hosts, the VirtualBox watchdog service daemon is
2551 integrated into the SMF framework. You can change the parameters, but
2552 don't have to if the defaults already match your needs:<screen>svccfg -s svc:/application/virtualbox/balloonctrl:default setprop config/balloon_interval=10000
2553svccfg -s svc:/application/virtualbox/balloonctrl:default setprop config/balloon_safetymargin=134217728</screen></para>
2554
2555 <para>The table in the previous section showing the parameter names and
2556 defaults also applies to Solaris. The parameter names must be changed
2557 to lowercase and a prefix of <computeroutput>config/</computeroutput>
2558 has to be added, e.g. <computeroutput>config/user</computeroutput> or
2559 <computeroutput>config/balloon_safetymargin</computeroutput>. If you made any
2560 change, don't forget to run the following command to put the changes into
2561 effect immediately:<screen>svcadm refresh svc:/application/virtualbox/balloonctrl:default</screen></para>
2562
2563 <para>If you forget the above command then the previous settings will
2564 be used when enabling the service. Check the current property settings
2565 with:<screen>svcprop -p config svc:/application/virtualbox/balloonctrl:default</screen></para>
2566
2567 <para>When everything is configured correctly you can start the
2568 VirtualBox watchdog service with the following command:<screen>svcadm enable svc:/application/virtualbox/balloonctrl:default</screen></para>
2569
2570 <para>For more information about SMF, please refer to the Solaris
2571 documentation.</para>
2572 </sect2>
2573
2574 </sect1>
2575
2576 <sect1 id="otherextpacks">
2577 <title>Other extension packs</title>
2578
2579 <para>Starting with VirtualBox 4.2.0 there is another extension pack,
2580 <code>VNC</code>, which is open source and replaces the previous
2581 integration of the VNC remote access protocol. This is experimental code,
2582 and will be initially available in the VirtualBox source code package only.
2583 It is to a large portion code contributed by users, and is not supported
2584 in any way by Oracle.</para>
2585
2586 <para>The keyboard handling is severely limited, and only the US keyboard
2587 layout works. Other keyboard layouts will have at least some keys which
2588 produce the wrong results (often quite surprising effects), and for layouts
2589 which have significant differences to the US keyboard layout it is most
2590 likely unusable.</para>
2591
2592 <para>It is possible to install both the Oracle VM VirtualBox Extension
2593 Pack and VNC, but only one VRDE module can be active at any time. The
2594 following command switches to the VNC VRDE module in
2595 VNC:<screen>VBoxManage setproperty vrdeextpack VNC</screen></para>
2596
2597 <para>Configuring the remote access works very similarly to VRDP (see
2598 <xref linkend="vrde" />), with some limitations: VNC does not
2599 support specifying several port numbers, and the authentication is done
2600 differently. VNC can only deal with password authentication, and there
2601 is no option to use password hashes. This leaves no other choice than
2602 having a clear-text password in the VM configuration, which can be set with
2603 the following command:<screen>VBoxManage modifyvm VMNAME --vrdeproperty VNCPassword=secret</screen></para>
2604
2605 <para>The user is responsible for keeping this password secret, and it
2606 should be removed when a VM configuration is passed to another person,
2607 for whatever purpose. Some VNC servers claim to have "encrypted" passwords
2608 in the configuration. This is not true encryption, it is only concealing
2609 the passwords, which is exactly as secure as clear-text passwords.</para>
2610
2611 <para>The following command switches back to VRDP (if
2612 installed):<screen>VBoxManage setproperty vrdeextpack "Oracle VM VirtualBox Extension Pack"</screen></para>
2613 </sect1>
2614
2615 <sect1 id="autostart">
2616 <title>Starting virtual machines during system boot</title>
2617
2618 <para>Starting with VirtualBox 4.2.0 it is possible to start VMs automatically during
2619 system boot on Linux, Solaris and Mac OS X for all users. </para>
2620
2621 <sect2 id="autostart-linux">
2622 <title>Linux: starting the autostart service via <computeroutput>init</computeroutput></title>
2623
2624 <para>On Linux, the autostart service is activated by setting two variables in
2625 <computeroutput>/etc/default/virtualbox</computeroutput>.
2626 The first one is <computeroutput>VBOXAUTOSTART_DB</computeroutput> which
2627 contains an absolute path to the autostart database directory.
2628 The directory should have write access for every user who should be able to
2629 start virtual machines automatically. Furthermore the directory should have the
2630 sticky bit set.
2631 The second variable is <computeroutput>VBOXAUTOSTART_CONFIG</computeroutput>
2632 which points the service to the autostart configuration file which is used
2633 during boot to determine whether to allow individual users to start a VM
2634 automatically and configure startup delays.
2635 The configuration file can be placed in <computeroutput>/etc/vbox</computeroutput>
2636 and contains several options. One is <computeroutput>default_policy</computeroutput>
2637 which controls whether the autostart service allows or denies to start a VM
2638 for users which are not in the exception list.
2639 The exception list starts with <computeroutput>exception_list</computeroutput>
2640 and contains a comma seperated list with usernames. Furthermore a separate
2641 startup delay can be configured for every user to avoid overloading the host.
2642 A sample configuration is given below:</para>
2643
2644 <para><screen>
2645# Default policy is to deny starting a VM, the other option is "allow".
2646default_policy = deny
2647
2648# Bob is allowed to start virtual machines but starting them
2649# will be delayed for 10 seconds
2650bob = {
2651 allow = true
2652 startup_delay = 10
2653}
2654
2655# Alice is not allowed to start virtual machines, useful to exclude certain users
2656# if the default policy is set to allow.
2657alice = {
2658 allow = false
2659}
2660 </screen></para>
2661
2662 <para>Every user who wants to enable autostart for individual machines
2663 has to set the path to the autostart database directory with
2664 <screen>VBoxManage setproperty autostartdbpath &lt;Autostart directory&gt;</screen>
2665 </para>
2666 </sect2>
2667
2668 <sect2 id="autostart-solaris">
2669 <title>Solaris: starting the autostart service via SMF</title>
2670
2671 <para>On Solaris hosts, the VirtualBox autostart daemon is
2672 integrated into the SMF framework. To enable it you have to point the service
2673 to an existing configuration file which has the same format as on Linux (see <xref linkend="autostart-linux" />):
2674 <screen>svccfg -s svc:/application/virtualbox/autostart:default setprop config/config=/etc/vbox/autostart.cfg</screen>
2675 </para>
2676
2677 <para>When everything is configured correctly you can start the
2678 VirtualBox autostart service with the following command:<screen>svcadm enable svc:/application/virtualbox/autostart:default</screen></para>
2679
2680 <para>For more information about SMF, please refer to the Solaris
2681 documentation.</para>
2682 </sect2>
2683
2684 <sect2 id="autostart-osx">
2685 <title>Mac OS X: starting the autostart service via launchd</title>
2686
2687 <para>On Mac OS X, launchd is used to start the VirtualBox autostart service. An
2688 example configuration file can be found in
2689 <computeroutput>/Applications/VirtualBox.app/Contents/MacOS/org.virtualbox.vboxautostart.plist</computeroutput>.
2690 To enable the service copy the file to <computeroutput>/Library/LaunchDaemons</computeroutput> and change the
2691 <computeroutput>Disabled</computeroutput> key from
2692 <computeroutput>true</computeroutput> to
2693 <computeroutput>false</computeroutput>. Furthermore replace the second parameter
2694 to an existing configuration file which has the same format as on Linux (see <xref linkend="autostart-linux" />).
2695 To manually start the service use the following command:
2696 <screen>launchctl load /Library/LaunchDaemons/org.virtualbox.vboxautostart.plist</screen>
2697 For additional information on how launchd services could be
2698 configured see <literal><ulink
2699 url="http://developer.apple.com/mac/library/documentation/MacOSX/Conceptual/BPSystemStartup/BPSystemStartup.html">http://developer.apple.com/mac/library/documentation/MacOSX/Conceptual/BPSystemStartup/BPSystemStartup.html</ulink></literal>.</para>
2700 </sect2>
2701 </sect1>
2702
2703 <sect1 id="vboxexpertstoragemgmt">
2704 <title>VirtualBox expert storage management</title>
2705
2706 <para>In case the snapshot model of VirtualBox is not sufficient
2707 it is possible to enable a special mode which makes it possible to
2708 reconfigure storage attachments while the VM is paused.
2709 The user has to make sure that the disk data stays consistent to the guest
2710 because unlike with hotplugging the guest is not informed about detached
2711 or newly attached media.</para>
2712
2713 <para>The expert storage management mode can be enabled per VM executing:</para>
2714
2715 <screen>VBoxManage setextradata vmname "VBoxInternal2/SilentReconfigureWhilePaused" 1
2716</screen>
2717
2718 <para>Storage attachments can be reconfigured while the VM is paused afterwards using:</para>
2719 <screen>VBoxManage storageattach ...</screen>
2720 </sect1>
2721</chapter>
Note: See TracBrowser for help on using the repository browser.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette