Changeset 38502 in vbox for trunk/doc/manual/en_US
- Timestamp:
- Aug 19, 2011 3:04:45 PM (13 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/doc/manual/en_US/user_AdvancedTopics.xml
r38483 r38502 169 169 </note> 170 170 171 <para>To manually install the VirtualBox credential provider module, extract the 172 Guest Additions (see <xref linkend="windows-guest-file-extraction" />) 173 and copy the file <computeroutput>VBoxCredProv.dll</computeroutput> to 174 the Windows <computeroutput>SYSTEM32</computeroutput> directory. Then, 175 in the registry, create the following keys:<screen>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ 171 <para>To manually install the VirtualBox credential provider module, 172 extract the Guest Additions (see <xref 173 linkend="windows-guest-file-extraction" />) and copy the file 174 <computeroutput>VBoxCredProv.dll</computeroutput> to the Windows 175 <computeroutput>SYSTEM32</computeroutput> directory. Then, in the 176 registry, create the following keys:<screen>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ 176 177 Authentication\Credential Providers\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B} 177 178 … … 229 230 230 231 <listitem> 231 <para>Auto-logon handling of the built-in Windows Remote Desktop Service232 (formerly known as Terminal Services) is disabled by default. To enable233 it, create the registry key234 <screen>HKEY_LOCAL_MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions\AutoLogon</screen>235 with a <computeroutput>DWORD</computeroutput> value of<computeroutput>1</computeroutput>.</para>232 <para>Auto-logon handling of the built-in Windows Remote Desktop 233 Service (formerly known as Terminal Services) is disabled by 234 default. To enable it, create the registry key <screen>HKEY_LOCAL_MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions\AutoLogon</screen> 235 with a <computeroutput>DWORD</computeroutput> value of 236 <computeroutput>1</computeroutput>.</para> 236 237 </listitem> 237 238 </orderedlist></para> … … 276 277 <computeroutput>/opt/VBoxGuestAdditions-<version>/lib/VBoxGuestAdditions/</computeroutput> 277 278 to the security modules directory, usually 278 <computeroutput>/lib/security/</computeroutput> on 32-bit guest Linuxes or 279 <computeroutput>/lib64/security/</computeroutput> on 64-bit ones. Please refer to your 280 guest OS documentation for the correct PAM module directory.</para> 279 <computeroutput>/lib/security/</computeroutput> on 32-bit guest Linuxes 280 or <computeroutput>/lib64/security/</computeroutput> on 64-bit ones. 281 Please refer to your guest OS documentation for the correct PAM module 282 directory.</para> 281 283 282 284 <para>For example, to use <computeroutput>pam_vbox.so</computeroutput> … … 310 312 <computeroutput>pam_unix.so</computeroutput> or 311 313 <computeroutput>use_first_pass</computeroutput> for 312 <computeroutput>pam_unix2.so</computeroutput> is needed 313 in order to pass the credentials from the VirtualBox module to the314 shadow database authentication module. For Ubuntu, this needs to be315 added to <computeroutput>/etc/pam.d/common-auth</computeroutput>, to316 theend of the line referencing314 <computeroutput>pam_unix2.so</computeroutput> is needed in order to 315 pass the credentials from the VirtualBox module to the shadow 316 database authentication module. For Ubuntu, this needs to be added 317 to <computeroutput>/etc/pam.d/common-auth</computeroutput>, to the 318 end of the line referencing 317 319 <computeroutput>pam_unix.so</computeroutput>. This argument tells 318 320 the PAM module to use credentials already present in the stack, i.e. … … 332 334 333 335 <para><note> 334 <para>By default, pam_vbox will not wait for credentials to arrive from335 the host, in other words: When a login prompt is shown (for example by336 GDM/KDM or the text console) and pam_vbox does not yet have credentials337 it does not wait until they arrive. Instead the next module in the PAM338 stack (depending on the PAM configuration) will have the chance for339 authentication.</para>336 <para>By default, pam_vbox will not wait for credentials to arrive 337 from the host, in other words: When a login prompt is shown (for 338 example by GDM/KDM or the text console) and pam_vbox does not yet 339 have credentials it does not wait until they arrive. Instead the 340 next module in the PAM stack (depending on the PAM configuration) 341 will have the chance for authentication.</para> 340 342 </note></para> 341 343 342 <para>Starting with VirtualBox 4.1.4 pam_vbox supports various guest property 343 parameters which all reside in <computeroutput>/VirtualBox/GuestAdd/PAM/</computeroutput>. 344 These parameters allow pam_vbox to wait for credentials to be provided by the 345 host and optionally can show a message while waiting for those. The following 346 guest properties can be set:</para> 344 <para>Starting with VirtualBox 4.1.4 pam_vbox supports various guest 345 property parameters which all reside in 346 <computeroutput>/VirtualBox/GuestAdd/PAM/</computeroutput>. These 347 parameters allow pam_vbox to wait for credentials to be provided by the 348 host and optionally can show a message while waiting for those. The 349 following guest properties can be set:</para> 347 350 348 351 <orderedlist> 349 350 <listitem> 351 <para><computeroutput>CredsWait</computeroutput>: Set to "1" if pam_vbox should 352 start waiting until credentials arrive from the host. Until then no other authentication 353 methods such as manually logging in will be available. If this property is empty or get 354 deleted no waiting for credentials will be performed and pam_vbox will act like before (see 355 paragraph above). This property must be set read-only for the guest 352 <listitem> 353 <para><computeroutput>CredsWait</computeroutput>: Set to "1" if 354 pam_vbox should start waiting until credentials arrive from the 355 host. Until then no other authentication methods such as manually 356 logging in will be available. If this property is empty or get 357 deleted no waiting for credentials will be performed and pam_vbox 358 will act like before (see paragraph above). This property must be 359 set read-only for the guest 356 360 (<computeroutput>RDONLYGUEST</computeroutput>).</para> 357 361 </listitem> 358 362 359 363 <listitem> 360 <para><computeroutput>CredsChanged</computeroutput>: Acts as "beacon" and is also 361 read- and writeable from the guest. If set o any value (e.g. to "1") waiting 362 for credentials will be aborted. If credentials are provided before 363 setting <computeroutput>CredsChanged</computeroutput>, these credentials will be taken for 364 authentication. To disable another round of waiting for new credentials to arrive 365 the property <computeroutput>CredsWait</computeroutput> can be set to empty (deleted) before.</para> 366 </listitem> 367 368 <listitem> 369 <para><computeroutput>CredsWaitTimeout</computeroutput>: Timeout (in seconds) to let pam_vbox 370 wait for credentials to arrive. When no credentials arrive within this timeout, authentication 371 of pam_vbox will be set to failed and the next PAM module in chain will be asked. If this 372 property is not specified, set to "0" or an invalid value, an infinite timeout will be used. 373 This property must be set read-only for the guest (<computeroutput>RDONLYGUEST</computeroutput>).</para> 374 </listitem> 375 364 <para><computeroutput>CredsChanged</computeroutput>: Acts as 365 "beacon" and is also read- and writeable from the guest. If set o 366 any value (e.g. to "1") waiting for credentials will be aborted. If 367 credentials are provided before setting 368 <computeroutput>CredsChanged</computeroutput>, these credentials 369 will be taken for authentication. To disable another round of 370 waiting for new credentials to arrive the property 371 <computeroutput>CredsWait</computeroutput> can be set to empty 372 (deleted) before.</para> 373 </listitem> 374 375 <listitem> 376 <para><computeroutput>CredsWaitTimeout</computeroutput>: Timeout (in 377 seconds) to let pam_vbox wait for credentials to arrive. When no 378 credentials arrive within this timeout, authentication of pam_vbox 379 will be set to failed and the next PAM module in chain will be 380 asked. If this property is not specified, set to "0" or an invalid 381 value, an infinite timeout will be used. This property must be set 382 read-only for the guest 383 (<computeroutput>RDONLYGUEST</computeroutput>).</para> 384 </listitem> 376 385 </orderedlist> 377 386 378 <para>To customize pam_vbox further there are the following guest properties:</para> 387 <para>To customize pam_vbox further there are the following guest 388 properties:</para> 379 389 380 390 <orderedlist> 381 382 <listitem>383 <para><computeroutput>CredsMsgWaiting</computeroutput>: Custom message showed while pam_vbox is384 waiting for credentials from thehost. This property must be set read-only for the guest391 <listitem> 392 <para><computeroutput>CredsMsgWaiting</computeroutput>: Custom 393 message showed while pam_vbox is waiting for credentials from the 394 host. This property must be set read-only for the guest 385 395 (<computeroutput>RDONLYGUEST</computeroutput>).</para> 386 396 </listitem> 387 397 388 398 <listitem> 389 <para><computeroutput>CredsMsgWaitTimeout</computeroutput>: Custom message showed when waiting390 for credentials by pam_vbox timed out, e.g. did not arrive within time. This property must be set391 read-only for the guest (<computeroutput>RDONLYGUEST</computeroutput>).</para>392 </listitem>393 399 <para><computeroutput>CredsMsgWaitTimeout</computeroutput>: Custom 400 message showed when waiting for credentials by pam_vbox timed out, 401 e.g. did not arrive within time. This property must be set read-only 402 for the guest (<computeroutput>RDONLYGUEST</computeroutput>).</para> 403 </listitem> 394 404 </orderedlist> 395 405 396 406 <para><note> 397 <para>If a pam_vbox guest property does not have set the right flags (<computeroutput>RDONLYGUEST</computeroutput>) 398 this property will be ignored then and - depending on the property - a default value will be 399 set. This can result in pam_vbox not waiting for credentials. Consult the appropriate syslog file for 400 more information and use the <computeroutput>debug</computeroutput> option.</para> 407 <para>If a pam_vbox guest property does not have set the right flags 408 (<computeroutput>RDONLYGUEST</computeroutput>) this property will be 409 ignored then and - depending on the property - a default value will 410 be set. This can result in pam_vbox not waiting for credentials. 411 Consult the appropriate syslog file for more information and use the 412 <computeroutput>debug</computeroutput> option.</para> 401 413 </note></para> 402 403 414 </sect2> 404 415 </sect1> … … 452 463 <title>Advanced configuration for Linux and Solaris guests</title> 453 464 454 <sect2> 455 <title>Manual setup of selected guest services on Linux</title> 456 457 <para>The VirtualBox Guest Additions contain several different 458 drivers. If for any reason you do not wish to set them all up, you can 459 install the Guest Additions using the following command:</para> 460 461 <screen> sh ./VBoxLinuxAdditions.run no_setup</screen> 462 463 <para>After this, you will need to at least compile the kernel modules 464 by running the command <screen> /usr/lib/VBoxGuestAdditions/vboxadd setup</screen> 465 as root (you will need to replace <emphasis>lib</emphasis> by 466 <emphasis>lib64</emphasis> on some 64bit guests), and on older guests 467 without the udev service you will need to add the 468 <emphasis>vboxadd</emphasis> service to the default runlevel to ensure 469 that the modules get loaded.</para> 470 471 <para>To setup the time synchronization service, run the command 472 <screen> /usr/lib/VBoxGuestAdditions/vboxadd-service setup</screen> 473 and add the service vboxadd-service to the default runlevel. To set up 474 the X11 and OpenGL part of the Guest Additions, run the command 475 <screen> /usr/lib/VBoxGuestAdditions/vboxadd-x11 setup</screen> (you 476 do not need to enable any services for this).</para> 477 478 <para>To recompile the guest kernel modules, use this command: 479 <screen> /usr/lib/VBoxGuestAdditions/vboxadd setup</screen> After 480 compilation you should reboot your guest to ensure that the new 481 modules are actually used.</para> 482 </sect2> 465 <sect2> 466 <title>Manual setup of selected guest services on Linux</title> 467 468 <para>The VirtualBox Guest Additions contain several different drivers. 469 If for any reason you do not wish to set them all up, you can install 470 the Guest Additions using the following command:</para> 471 472 <screen> sh ./VBoxLinuxAdditions.run no_setup</screen> 473 474 <para>After this, you will need to at least compile the kernel modules 475 by running the command <screen> /usr/lib/VBoxGuestAdditions/vboxadd setup</screen> 476 as root (you will need to replace <emphasis>lib</emphasis> by 477 <emphasis>lib64</emphasis> on some 64bit guests), and on older guests 478 without the udev service you will need to add the 479 <emphasis>vboxadd</emphasis> service to the default runlevel to ensure 480 that the modules get loaded.</para> 481 482 <para>To setup the time synchronization service, run the command 483 <screen> /usr/lib/VBoxGuestAdditions/vboxadd-service setup</screen> and 484 add the service vboxadd-service to the default runlevel. To set up the 485 X11 and OpenGL part of the Guest Additions, run the command <screen> /usr/lib/VBoxGuestAdditions/vboxadd-x11 setup</screen> 486 (you do not need to enable any services for this).</para> 487 488 <para>To recompile the guest kernel modules, use this command: <screen> /usr/lib/VBoxGuestAdditions/vboxadd setup</screen> 489 After compilation you should reboot your guest to ensure that the new 490 modules are actually used.</para> 491 </sect2> 483 492 484 493 <sect2 id="guestxorgsetup"> 485 494 <title>Guest graphics and mouse driver setup in depth</title> 486 495 487 <para>This section assumes that you are familiar with configuring 488 the X.Org server using xorg.conf and optionally the newer mechanisms 489 using hal or udev and xorg.conf.d. If not you can learn about 490 them by studying the documentation which comes with X.Org.</para> 491 492 <para>The VirtualBox Guest Additions come with drivers for X.Org 493 versions 494 <itemizedlist> 495 <listitem>X11R6.8/X11R6.9 and XFree86 version 4.3 496 (vboxvideo_drv_68.o and vboxmouse_drv_68.o)</listitem> 497 <listitem>X11R7.0 (vboxvideo_drv_70.so and vboxmouse_drv_70.so) 498 </listitem> 499 <listitem>X11R7.1 (vboxvideo_drv_71.so and vboxmouse_drv_71.so) 500 </listitem> 501 <listitem>X.Org Server versions 1.3 and later (vboxvideo_drv_13.so 502 and vboxmouse_drv_13.so and so on).</listitem> 503 </itemizedlist> 504 By default these drivers can be found in the directory</para> 505 <para> 506 <computeroutput>/opt/VBoxGuestAdditions-<version>/lib/VBoxGuestAdditions</computeroutput> 507 </para> 508 <para>and the correct versions for the X server are symbolically linked 509 into the X.Org driver directories.</para> 510 511 <para>For graphics integration to work correctly, the X server must 512 load the vboxvideo driver (many recent X server versions look for it 513 automatically if they see that they are running in VirtualBox) and for 514 an optimal user experience the guest kernel drivers must be loaded and 515 the Guest Additions tool VBoxClient must be running as a client in the 516 X session. For mouse integration to work correctly, the guest kernel 517 drivers must be loaded and in addition, in X servers from X.Org X11R6.8 518 to X11R7.1 and in XFree86 version 4.3 the right vboxmouse driver must 519 be loaded and associated with /dev/mouse or /dev/psaux; in X.Org server 520 1.3 or later a driver for a PS/2 mouse must be loaded and the right 521 vboxmouse driver must be associated with /dev/vboxguest.</para> 522 523 <para>The VirtualBox guest graphics driver can use any graphics 524 configuration for which the virtual resolution fits into the virtual 525 video memory allocated to the virtual machine (minus a small amount 526 used by the guest driver) as described in 527 <xref linkend="settings-display" />. The driver will offer a range of 528 standard modes at least up to the default guest resolution for all 529 active guest monitors. In X.Org Server 1.3 and later the default mode 530 can be changed by setting the output property VBOX_MODE to 531 "<width>x<height>" for any guest monitor. When VBoxClient 532 and the kernel drivers are active this is done automatically when the 533 host requests a mode change. The driver for older versions can only 534 receive new modes by querying the host for requests at regular 535 intervals.</para> 536 537 <para>With pre-1.3 X Servers you can also add your own modes to the X 538 server configuration file. You simply need to add them to the "Modes" 539 list in the "Display" subsection of the "Screen" section. For example, 540 the section shown here has a custom 2048x800 resolution mode added: 541 </para> 542 543 <screen>Section "Screen" 496 <para>This section assumes that you are familiar with configuring the 497 X.Org server using xorg.conf and optionally the newer mechanisms using 498 hal or udev and xorg.conf.d. If not you can learn about them by studying 499 the documentation which comes with X.Org.</para> 500 501 <para>The VirtualBox Guest Additions come with drivers for X.Org 502 versions <itemizedlist> 503 <listitem> 504 X11R6.8/X11R6.9 and XFree86 version 4.3 (vboxvideo_drv_68.o and vboxmouse_drv_68.o) 505 </listitem> 506 507 <listitem> 508 X11R7.0 (vboxvideo_drv_70.so and vboxmouse_drv_70.so) 509 </listitem> 510 511 <listitem> 512 X11R7.1 (vboxvideo_drv_71.so and vboxmouse_drv_71.so) 513 </listitem> 514 515 <listitem> 516 X.Org Server versions 1.3 and later (vboxvideo_drv_13.so and vboxmouse_drv_13.so and so on). 517 </listitem> 518 </itemizedlist> By default these drivers can be found in the 519 directory</para> 520 521 <para><computeroutput>/opt/VBoxGuestAdditions-<version>/lib/VBoxGuestAdditions</computeroutput></para> 522 523 <para>and the correct versions for the X server are symbolically linked 524 into the X.Org driver directories.</para> 525 526 <para>For graphics integration to work correctly, the X server must load 527 the vboxvideo driver (many recent X server versions look for it 528 automatically if they see that they are running in VirtualBox) and for 529 an optimal user experience the guest kernel drivers must be loaded and 530 the Guest Additions tool VBoxClient must be running as a client in the X 531 session. For mouse integration to work correctly, the guest kernel 532 drivers must be loaded and in addition, in X servers from X.Org X11R6.8 533 to X11R7.1 and in XFree86 version 4.3 the right vboxmouse driver must be 534 loaded and associated with /dev/mouse or /dev/psaux; in X.Org server 1.3 535 or later a driver for a PS/2 mouse must be loaded and the right 536 vboxmouse driver must be associated with /dev/vboxguest.</para> 537 538 <para>The VirtualBox guest graphics driver can use any graphics 539 configuration for which the virtual resolution fits into the virtual 540 video memory allocated to the virtual machine (minus a small amount used 541 by the guest driver) as described in <xref 542 linkend="settings-display" />. The driver will offer a range of standard 543 modes at least up to the default guest resolution for all active guest 544 monitors. In X.Org Server 1.3 and later the default mode can be changed 545 by setting the output property VBOX_MODE to 546 "<width>x<height>" for any guest monitor. When VBoxClient 547 and the kernel drivers are active this is done automatically when the 548 host requests a mode change. The driver for older versions can only 549 receive new modes by querying the host for requests at regular 550 intervals.</para> 551 552 <para>With pre-1.3 X Servers you can also add your own modes to the X 553 server configuration file. You simply need to add them to the "Modes" 554 list in the "Display" subsection of the "Screen" section. For example, 555 the section shown here has a custom 2048x800 resolution mode 556 added:</para> 557 558 <screen>Section "Screen" 544 559 Identifier "Default Screen" 545 560 Device "VirtualBox graphics card" … … 604 619 <title>PCI passthrough</title> 605 620 606 <para>When running on Linux hosts, with a recent enough kernel (at least version 607 <computeroutput>2.6.31</computeroutput>) experimental host PCI devices 608 passthrough is available.<footnote> 609 <para>Experimental support for PCI passthrough was introduced with VirtualBox 610 4.1.</para> 611 </footnote></para> 612 613 <note><para>The PCI passthrough module is shipped as a VirtualBox extension 621 <para>When running on Linux hosts, with a recent enough kernel (at least 622 version <computeroutput>2.6.31</computeroutput>) experimental host PCI 623 devices passthrough is available.<footnote> 624 <para>Experimental support for PCI passthrough was introduced with 625 VirtualBox 4.1.</para> 626 </footnote></para> 627 628 <note> 629 <para>The PCI passthrough module is shipped as a VirtualBox extension 614 630 package, which must be installed separately. See <xref 615 631 linkend="intro-installing" /> for more information.</para> 616 </note> 617 618 <para>Essentially this feature allows to directly use physical PCI 619 devices on the host by the guest even if host doesn't have drivers for this 620 particular device. Both, regular PCI and some PCI Express cards, are 621 supported. AGP and certain PCI Express cards are not supported at the 622 moment if they rely on GART (Graphics Address Remapping Table) unit 623 programming for texture management as it does rather nontrivial 624 operations with pages remapping interfering with IOMMU. 625 This limitation may be lifted in future releases.</para> 626 627 <para>To be fully functional, PCI passthrough support in VirtualBox depends upon 628 an IOMMU hardware unit which is not yet too widely available. If the device uses 629 bus mastering (i.e. it performs DMA to the OS memory on its 630 own), then an IOMMU is required, otherwise such DMA transactions may write to 631 the wrong physical memory address as the device DMA engine is programmed using 632 a device-specific protocol to perform memory transactions. The IOMMU functions 633 as translation unit mapping physical memory access requests from the device 634 using knowledge of the guest physical address to host physical addresses translation 635 rules.</para> 636 637 <para>Intel's solution for IOMMU is marketed as "Intel Virtualization Technology for 638 Directed I/O" (VT-d), and AMD's one is called AMD-Vi. So please check if your 639 motherboard datasheet has appropriate technology. 640 Even if your hardware doesn't have a IOMMU, certain PCI cards may work 641 (such as serial PCI adapters), but the guest will show a warning on boot and 642 the VM execution will terminate if the guest driver will attempt to enable card 643 bus mastering.</para> 644 645 <para> 646 It is very common that the BIOS or the host OS disables the IOMMU by default. 647 So before any attempt to use it please make sure that 648 <orderedlist> 632 </note> 633 634 <para>Essentially this feature allows to directly use physical PCI devices 635 on the host by the guest even if host doesn't have drivers for this 636 particular device. Both, regular PCI and some PCI Express cards, are 637 supported. AGP and certain PCI Express cards are not supported at the 638 moment if they rely on GART (Graphics Address Remapping Table) unit 639 programming for texture management as it does rather nontrivial operations 640 with pages remapping interfering with IOMMU. This limitation may be lifted 641 in future releases.</para> 642 643 <para>To be fully functional, PCI passthrough support in VirtualBox 644 depends upon an IOMMU hardware unit which is not yet too widely available. 645 If the device uses bus mastering (i.e. it performs DMA to the OS memory on 646 its own), then an IOMMU is required, otherwise such DMA transactions may 647 write to the wrong physical memory address as the device DMA engine is 648 programmed using a device-specific protocol to perform memory 649 transactions. The IOMMU functions as translation unit mapping physical 650 memory access requests from the device using knowledge of the guest 651 physical address to host physical addresses translation rules.</para> 652 653 <para>Intel's solution for IOMMU is marketed as "Intel Virtualization 654 Technology for Directed I/O" (VT-d), and AMD's one is called AMD-Vi. So 655 please check if your motherboard datasheet has appropriate technology. 656 Even if your hardware doesn't have a IOMMU, certain PCI cards may work 657 (such as serial PCI adapters), but the guest will show a warning on boot 658 and the VM execution will terminate if the guest driver will attempt to 659 enable card bus mastering.</para> 660 661 <para>It is very common that the BIOS or the host OS disables the IOMMU by 662 default. So before any attempt to use it please make sure that 663 <orderedlist> 649 664 <listitem> 650 665 <para>Your motherboard has an IOMMU unit.</para> 651 666 </listitem> 667 652 668 <listitem> 653 669 <para>Your CPU supports the IOMMU.</para> 654 670 </listitem> 671 655 672 <listitem> 656 673 <para>The IOMMU is enabled in the BIOS.</para> 657 674 </listitem> 658 <listitem> 659 <para>The VM must run with VT-x/AMD-V and nested paging enabled.</para> 660 </listitem> 661 <listitem> 662 <para>Your Linux kernel was compiled with IOMMU support (including DMA 663 remapping, see <computeroutput>CONFIG_DMAR</computeroutput> kernel 664 compilation option). The PCI stub driver 665 (<computeroutput>CONFIG_PCI_STUB</computeroutput>) is required 666 as well.</para> 667 </listitem> 675 676 <listitem> 677 <para>The VM must run with VT-x/AMD-V and nested paging 678 enabled.</para> 679 </listitem> 680 681 <listitem> 682 <para>Your Linux kernel was compiled with IOMMU support (including 683 DMA remapping, see <computeroutput>CONFIG_DMAR</computeroutput> 684 kernel compilation option). The PCI stub driver 685 (<computeroutput>CONFIG_PCI_STUB</computeroutput>) is required as 686 well.</para> 687 </listitem> 688 668 689 <listitem> 669 690 <para>Your Linux kernel recognizes and uses the IOMMU unit 670 (<computeroutput>intel_iommu=on</computeroutput> 671 boot option could be needed). Search for DMAR and PCI-DMA in kernel boot 672 log.</para> 673 </listitem> 674 </orderedlist> 675 </para> 676 677 <para>Once you made sure that the host kernel supports the IOMMU, the next step is 678 to select the PCI card and attach it to the guest. To figure out the list of 679 available PCI devices, use the <computeroutput>lspci</computeroutput> command. 680 The output will look like this 681 <screen> 691 (<computeroutput>intel_iommu=on</computeroutput> boot option could 692 be needed). Search for DMAR and PCI-DMA in kernel boot log.</para> 693 </listitem> 694 </orderedlist></para> 695 696 <para>Once you made sure that the host kernel supports the IOMMU, the next 697 step is to select the PCI card and attach it to the guest. To figure out 698 the list of available PCI devices, use the 699 <computeroutput>lspci</computeroutput> command. The output will look like 700 this <screen> 682 701 01:00.0 VGA compatible controller: ATI Technologies Inc Cedar PRO [Radeon HD 5450] 683 702 01:00.1 Audio device: ATI Technologies Inc Manhattan HDMI Audio [Mobility Radeon HD 5000 Series] … … 686 705 03:00.1 IDE interface: JMicron Technology Corp. JMB362/JMB363 Serial ATA Controller (rev 03) 687 706 06:00.0 VGA compatible controller: nVidia Corporation G86 [GeForce 8500 GT] (rev a1) 688 </screen> 689 The first column is a PCI address (in format <computeroutput>bus:device.function</computeroutput>). 690 This address could be used to identify the device for further operations. 691 For example, to attach a PCI network controller on the system listed above 692 to the second PCI bus in the guest, as device 5, function 0, use the following command: 693 <screen>VBoxManage modifyvm "VM name" --pciattach 02:00.0@01:05.0</screen> 694 To detach same device, use 695 <screen>VBoxManage modifyvm "VM name" --pcidetach 02:00.0</screen> 696 Please note that both host and guest could freely assign a different PCI address to 697 the card attached during runtime, so those addresses only apply to the address of 698 the card at the moment of attachment (host), and during BIOS PCI init (guest). 699 </para> 700 701 <para>If the virtual machine has a PCI device attached, certain limitations apply: 702 <orderedlist> 703 <listitem> 704 Only PCI cards with non-shared interrupts (such as using MSI on host) are 705 supported at the moment. 706 </listitem> 707 <listitem> 708 No guest state can be reliably saved/restored (as the internal state of the PCI 709 card could not be retrieved). 710 </listitem> 711 <listitem> 712 Teleportation (live migration) doesn't work (for the same reason). 713 </listitem> 714 <listitem> 715 No lazy physical memory allocation. The host will preallocate the whole RAM 716 required for the VM on startup (as we cannot catch physical hardware accesses 717 to the physical memory). 718 </listitem> 719 </orderedlist> 720 </para> 721 722 </sect1> 723 707 </screen> The first column is a PCI address (in format 708 <computeroutput>bus:device.function</computeroutput>). This address could 709 be used to identify the device for further operations. For example, to 710 attach a PCI network controller on the system listed above to the second 711 PCI bus in the guest, as device 5, function 0, use the following command: 712 <screen>VBoxManage modifyvm "VM name" --pciattach 02:00.0@01:05.0</screen> 713 To detach same device, use <screen>VBoxManage modifyvm "VM name" --pcidetach 02:00.0</screen> 714 Please note that both host and guest could freely assign a different PCI 715 address to the card attached during runtime, so those addresses only apply 716 to the address of the card at the moment of attachment (host), and during 717 BIOS PCI init (guest).</para> 718 719 <para>If the virtual machine has a PCI device attached, certain 720 limitations apply: <orderedlist> 721 <listitem> 722 Only PCI cards with non-shared interrupts (such as using MSI on host) are supported at the moment. 723 </listitem> 724 725 <listitem> 726 No guest state can be reliably saved/restored (as the internal state of the PCI card could not be retrieved). 727 </listitem> 728 729 <listitem> 730 Teleportation (live migration) doesn't work (for the same reason). 731 </listitem> 732 733 <listitem> 734 No lazy physical memory allocation. The host will preallocate the whole RAM required for the VM on startup (as we cannot catch physical hardware accesses to the physical memory). 735 </listitem> 736 </orderedlist></para> 737 </sect1> 724 738 725 739 <sect1> … … 783 797 globally to all guest systems, not just to a single machine.</para> 784 798 </sect2> 785 786 799 </sect1> 787 800 … … 935 948 MBR will be stored inside the image, not on the host disk.</para> 936 949 937 <para>The created image can be attached to a storage controller in 938 aVM configuration as usual.</para>950 <para>The created image can be attached to a storage controller in a 951 VM configuration as usual.</para> 939 952 </sect3> 940 953 </sect2> … … 970 983 "VBoxInternal/Devices/piix3ide/0/Config/PrimaryMaster/ModelNumber" "model"</screen> 971 984 972 <para>For hard disks it's also possible (experimental!) to mark the drive973 as having a non-rotational medium with:</para>985 <para>For hard disks it's also possible (experimental!) to mark the 986 drive as having a non-rotational medium with:</para> 974 987 975 988 <screen>VBoxManage setextradata "VM name" … … 1208 1221 more transparent behavior or may depend on the real port number the 1209 1222 packet was sent from. It is possible to change the NAT mode via the 1210 VBoxManage frontend with the following commands: 1211 <screen>VBoxManage modifyvm "VM name" --nataliasmode1 proxyonly</screen> 1223 VBoxManage frontend with the following commands: <screen>VBoxManage modifyvm "VM name" --nataliasmode1 proxyonly</screen> 1212 1224 and <screen>VBoxManage modifyvm "Linux Guest" --nataliasmode1 sameports</screen> 1213 1225 The first example disables aliasing and switches NAT into transparent … … 1441 1453 <screen>touch /etc/vboxinst_vboxflt</screen> 1442 1454 1443 <para>To force installation of the Crossbow based network filter 1444 driver,execute as root the below command before installing the VirtualBox1455 <para>To force installation of the Crossbow based network filter driver, 1456 execute as root the below command before installing the VirtualBox 1445 1457 package:</para> 1446 1458 … … 1493 1505 This makes managing VMs on VLANs simpler and efficient, as the VLAN 1494 1506 details are not stored as part of every VM's configuration but rather 1495 picked up viathe VNIC template which can be modified anytime using1507 picked from the VNIC template which can be modified anytime using 1496 1508 <computeroutput>dladm</computeroutput>. Apart from the VLAN ID, VNIC 1497 1509 templates can be created with additional properties such as bandwidth … … 1544 1556 <title>Configuring the VirtualBox CoreDumper on Solaris hosts</title> 1545 1557 1546 <para>VirtualBox is capable of producing its own core files when things go1547 wrong and for more extensive debugging. Currently this is only available1548 onSolaris hosts.</para>1558 <para>VirtualBox is capable of producing its own core files for extensive 1559 debugging when things go wrong. Currently this is only available on 1560 Solaris hosts.</para> 1549 1561 1550 1562 <para>The VirtualBox CoreDumper can be enabled using the following … … 1562 1574 dump directory, the current directory of the VirtualBox executable will be 1563 1575 used (which would most likely fail when writing cores as they are 1564 protected with root permissions). It is recommended you explicit y set a1576 protected with root permissions). It is recommended you explicitly set a 1565 1577 core dump directory.</para> 1566 1578 … … 1579 1591 1580 1592 <para>Setting <computeroutput>CoreDumpLive</computeroutput> sets up the VM 1581 to produce cores whenever the VM receives a1593 to produce cores whenever the VM process receives a 1582 1594 <computeroutput>SIGUSR2</computeroutput> signal. After producing the core 1583 file, the VM will not be terminated and will continue to run. You can th en1595 file, the VM will not be terminated and will continue to run. You can thus 1584 1596 take cores of the VM process using:</para> 1585 1597 … … 1697 1709 <computeroutput>true</computeroutput> to 1698 1710 <computeroutput>false</computeroutput>. To manually start the 1699 service use the following command: 1700 <screen>launchctl load ~/Library/LaunchAgents/org.virtualbox.vboxwebsrv.plist</screen> 1711 service use the following command: <screen>launchctl load ~/Library/LaunchAgents/org.virtualbox.vboxwebsrv.plist</screen> 1701 1712 For additional information on how launchd services could be 1702 1713 configured see <literal><ulink … … 1710 1721 1711 1722 <para>Starting with VirtualBox 4.0.8 a new host executable called 1712 1713 automatically take care of a VM's configured memory balloon1714 (see <xref linkend="guestadd-balloon" /> for an introduction to memory1715 ballooning). This is especially useful for server environments where1716 VMs maydynamically require more or less memory during runtime.</para>1723 <computeroutput>VBoxBalloonCtrl</computeroutput> is available to 1724 automatically take care of a VM's configured memory balloon (see <xref 1725 linkend="guestadd-balloon" /> for an introduction to memory ballooning). 1726 This is especially useful for server environments where VMs may 1727 dynamically require more or less memory during runtime.</para> 1717 1728 1718 1729 <para>VBoxBalloonCtrl periodically checks a VM's current memory balloon 1719 1720 1721 1730 and its free guest RAM and automatically adjusts the current memory 1731 balloon by inflating or deflating it accordingly. This handling only 1732 applies to running VMs having recent Guest Additions installed.</para> 1722 1733 1723 1734 <para>To set up VBoxBalloonCtrl and adjust the maximum ballooning size a 1724 VM can reach the following parameters will be checked in the following 1725 order: 1726 <itemizedlist> 1727 <listitem>specified via VBoxBalloonCtrl command line parameter 1728 <computeroutput>--balloon-max</computeroutput></listitem> 1729 <listitem>per-VM parameter using 1730 <screen>VBoxManage setextradata "VM-Name" VBoxInternal/Guest/BalloonSizeMax <Size in MB></screen></listitem> 1731 <listitem>global parameter for all VMs using 1732 <screen>VBoxManage setextradata global VBoxInternal/Guest/BalloonSizeMax <Size in MB></screen></listitem> 1733 </itemizedlist> 1734 <note> 1735 <para>If no maximum ballooning size is specified by at least one of the 1736 parameters above, no ballooning will be performed at all.</para> 1737 </note> 1738 </para> 1735 VM can reach the following parameters will be checked in the following 1736 order: <itemizedlist> 1737 <listitem> 1738 specified via VBoxBalloonCtrl command line parameter 1739 1740 <computeroutput>--balloon-max</computeroutput> 1741 </listitem> 1742 1743 <listitem> 1744 per-VM parameter using 1745 1746 <screen>VBoxManage setextradata "VM-Name" VBoxInternal/Guest/BalloonSizeMax <Size in MB></screen> 1747 </listitem> 1748 1749 <listitem> 1750 global parameter for all VMs using 1751 1752 <screen>VBoxManage setextradata global VBoxInternal/Guest/BalloonSizeMax <Size in MB></screen> 1753 </listitem> 1754 </itemizedlist> <note> 1755 <para>If no maximum ballooning size is specified by at least one of 1756 the parameters above, no ballooning will be performed at all.</para> 1757 </note></para> 1739 1758 1740 1759 <para>For more options and parameters check the built-in command line help 1741 1760 accessible with <computeroutput>--help</computeroutput>.</para> 1742 1761 </sect1> 1743 1762 </chapter>
Note:
See TracChangeset
for help on using the changeset viewer.