VirtualBox

source: vbox/trunk/doc/manual/fr_FR/user_AdvancedTopics.xml@ 44123

最後變更 在這個檔案從44123是 42552,由 vboxsync 提交於 12 年 前

doc/manual: fr_FR fix

檔案大小: 88.1 KB
 
1<?xml version="1.0" encoding="UTF-8"?>
2<!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.4//EN"
3"http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
4<chapter id="AdvancedTopics">
5 <title>Advanced topics</title>
6
7 <sect1 id="vboxsdl">
8 <title>VBoxSDL, the simplified VM displayer</title>
9
10 <sect2>
11 <title>Introduction</title>
12
13 <para>VBoxSDL is a simple graphical user interface (GUI) that lacks the
14 nice point-and-click support which VirtualBox, our main GUI, provides.
15 VBoxSDL is currently primarily used internally for debugging VirtualBox
16 and therefore not officially supported. Still, you may find it useful
17 for environments where the virtual machines are not necessarily
18 controlled by the same person that uses the virtual machine.<note>
19 <para>VBoxSDL is not available on the Mac OS X host platform.</para>
20 </note></para>
21
22 <para>As you can see in the following screenshot, VBoxSDL does indeed
23 only provide a simple window that contains only the "pure" virtual
24 machine, without menus or other controls to click upon and no additional
25 indicators of virtual machine activity:</para>
26
27 <para><mediaobject>
28 <imageobject>
29 <imagedata align="center" fileref="images/vbox-sdl.png"
30 width="10cm" />
31 </imageobject>
32 </mediaobject></para>
33
34 <para>To start a virtual machine with VBoxSDL instead of the VirtualBox
35 GUI, enter the following on a command line:<screen>VBoxSDL --startvm &lt;vm&gt;</screen></para>
36
37 <para>where <computeroutput>&lt;vm&gt;</computeroutput> is, as usual
38 with VirtualBox command line parameters, the name or UUID of an existing
39 virtual machine.</para>
40 </sect2>
41
42 <sect2>
43 <title>Secure labeling with VBoxSDL</title>
44
45 <para>When running guest operating systems in fullscreen mode, the guest
46 operating system usually has control over the whole screen. This could
47 present a security risk as the guest operating system might fool the
48 user into thinking that it is either a different system (which might
49 have a higher security level) or it might present messages on the screen
50 that appear to stem from the host operating system.</para>
51
52 <para>In order to protect the user against the above mentioned security
53 risks, the secure labeling feature has been developed. Secure labeling
54 is currently available only for VBoxSDL. When enabled, a portion of the
55 display area is reserved for a label in which a user defined message is
56 displayed. The label height in set to 20 pixels in VBoxSDL. The label
57 font color and background color can be optionally set as hexadecimal RGB
58 color values. The following syntax is used to enable secure
59 labeling:</para>
60
61 <screen>VBoxSDL --startvm "VM name"
62 --securelabel --seclabelfnt ~/fonts/arial.ttf
63 --seclabelsiz 14 --seclabelfgcol 00FF00 --seclabelbgcol 00FFFF</screen>
64
65 <para>In addition to enabling secure labeling, a TrueType font has to be
66 supplied. To use another font size than 12 point use the parameter
67 <computeroutput>--seclabelsiz</computeroutput>.</para>
68
69 <para>The label text can be set with <screen>VBoxManage setextradata "VM name" "VBoxSDL/SecureLabel" "The Label"</screen>
70 Changing this label will take effect immediately.</para>
71
72 <para>Typically, full screen resolutions are limited to certain
73 "standard" geometries such as 1024 x 768. Increasing this by twenty
74 lines is not usually feasible, so in most cases, VBoxSDL will chose the
75 next higher resolution, e.g. 1280 x 1024 and the guest's screen will not
76 cover the whole display surface. If VBoxSDL is unable to choose a higher
77 resolution, the secure label will be painted on top of the guest's
78 screen surface. In order to address the problem of the bottom part of
79 the guest screen being hidden, VBoxSDL can provide custom video modes to
80 the guest that are reduced by the height of the label. For Windows
81 guests and recent Solaris and Linux guests, the VirtualBox Guest
82 Additions automatically provide the reduced video modes. Additionally,
83 the VESA BIOS has been adjusted to duplicate its standard mode table
84 with adjusted resolutions. The adjusted mode IDs can be calculated using
85 the following formula:</para>
86
87 <screen>reduced_modeid = modeid + 0x30</screen>
88
89 <para>For example, in order to start Linux with 1024 x 748 x 16, the
90 standard mode 0x117 (1024 x 768 x 16) is used as a base. The Linux video
91 mode kernel parameter can then be calculated using:</para>
92
93 <screen>vga = 0x200 | 0x117 + 0x30
94vga = 839</screen>
95
96 <para>The reason for duplicating the standard modes instead of only
97 supplying the adjusted modes is that most guest operating systems
98 require the standard VESA modes to be fixed and refuse to start with
99 different modes.</para>
100
101 <para>When using the X.org VESA driver, custom modelines have to be
102 calculated and added to the configuration (usually in
103 <literal>/etc/X11/xorg.conf</literal>. A handy tool to determine
104 modeline entries can be found at <literal><ulink
105 url="http://www.tkk.fi/Misc/Electronics/faq/vga2rgb/calc.html">http://www.tkk.fi/Misc/Electronics/faq/vga2rgb/calc.html</ulink></literal>.)</para>
106 </sect2>
107
108 <sect2>
109 <title>Releasing modifiers with VBoxSDL on Linux</title>
110
111 <para>When switching from a X virtual terminal (VT) to another VT using
112 Ctrl-Alt-Fx while the VBoxSDL window has the input focus, the guest will
113 receive Ctrl and Alt keypress events without receiving the corresponding
114 key release events. This is an architectural limitation of Linux. In
115 order to reset the modifier keys, it is possible to send
116 <computeroutput>SIGUSR1</computeroutput> to the VBoxSDL main thread
117 (first entry in the <computeroutput>ps</computeroutput> list). For
118 example, when switching away to another VT and saving the virtual
119 machine from this terminal, the following sequence can be used to make
120 sure the VM is not saved with stuck modifiers:</para>
121
122 <para><screen>kill -usr1 &lt;pid&gt;
123VBoxManage controlvm "Windows 2000" savestate</screen></para>
124 </sect2>
125 </sect1>
126
127 <sect1>
128 <title id="autologon">Automated guest logons</title>
129
130 <para>VirtualBox provides Guest Addition modules for Windows, Linux and
131 Solaris to enable automated logons on the guest.</para>
132
133 <para>When a guest operating system is running in a virtual machine, it
134 might be desirable to perform coordinated and automated logons using
135 credentials from a master logon system. (With "credentials", we are
136 referring to logon information consisting of user name, password and
137 domain name, where each value might be empty.)</para>
138
139 <sect2 id="autologon_win">
140 <title>Automated Windows guest logons</title>
141
142 <para>Since Windows NT, Windows has provided a modular system logon
143 subsystem ("Winlogon") which can be customized and extended by means of
144 so-called GINA modules (Graphical Identification and Authentication).
145 With Windows Vista and Windows 7, the GINA modules were replaced with a
146 new mechanism called "credential providers". The VirtualBox Guest
147 Additions for Windows come with both, a GINA and a credential provider
148 module, and therefore enable any Windows guest to perform automated
149 logons.</para>
150
151 <para>To activate the VirtualBox GINA or credential provider module,
152 install the Guest Additions with using the command line switch
153 <computeroutput>/with_autologon</computeroutput>. All the following
154 manual steps required for installing these modules will be then done by
155 the installer.</para>
156
157 <para>To manually install the VirtualBox GINA module, extract the Guest
158 Additions (see <xref linkend="windows-guest-file-extraction" />) and
159 copy the file <computeroutput>VBoxGINA.dll</computeroutput> to the
160 Windows <computeroutput>SYSTEM32</computeroutput> directory. Then, in
161 the registry, create the following key: <screen>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\GinaDLL</screen>
162 with a value of <computeroutput>VBoxGINA.dll</computeroutput>.</para>
163
164 <note>
165 <para>The VirtualBox GINA module is implemented as a wrapper around
166 the standard Windows GINA module
167 (<computeroutput>MSGINA.DLL</computeroutput>). As a result, it will
168 most likely not work correctly with 3rd party GINA modules.</para>
169 </note>
170
171 <para>To manually install the VirtualBox credential provider module, extract the
172 Guest Additions (see <xref linkend="windows-guest-file-extraction" />)
173 and copy the file <computeroutput>VBoxCredProv.dll</computeroutput> to
174 the Windows <computeroutput>SYSTEM32</computeroutput> directory. Then,
175 in the registry, create the following keys:<screen>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
176 Authentication\Credential Providers\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}
177
178HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}
179
180HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32</screen></para>
181
182 <para>with all default values (the key named
183 <computeroutput>(Default)</computeroutput> in each key) set to
184 <computeroutput>VBoxCredProv</computeroutput>. After that a new string
185 named <screen>HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32\ThreadingModel</screen>
186 with a value of <computeroutput>Apartment</computeroutput> has to be
187 created.</para>
188
189 <para>To set credentials, use the following command on a
190 <emphasis>running</emphasis> VM:</para>
191
192 <screen>VBoxManage controlvm "Windows XP" setcredentials "John Doe" "secretpassword" "DOMTEST"</screen>
193
194 <para>While the VM is running, the credentials can be queried by the
195 VirtualBox logon modules (GINA or credential provider) using the
196 VirtualBox Guest Additions device driver. When Windows is in "logged
197 out" mode, the logon modules will constantly poll for credentials and if
198 they are present, a logon will be attempted. After retrieving the
199 credentials, the logon modules will erase them so that the above command
200 will have to be repeated for subsequent logons.</para>
201
202 <para>For security reasons, credentials are not stored in any persistent
203 manner and will be lost when the VM is reset. Also, the credentials are
204 "write-only", i.e. there is no way to retrieve the credentials from the
205 host side. Credentials can be reset from the host side by setting empty
206 values.</para>
207
208 <para>Depending on the particular variant of the Windows guest, the
209 following restrictions apply: <orderedlist>
210 <listitem>
211 <para>For <emphasis role="bold">Windows XP guests,</emphasis> the
212 logon subsystem needs to be configured to use the classic logon
213 dialog as the VirtualBox GINA module does not support the XP-style
214 welcome dialog.</para>
215 </listitem>
216
217 <listitem>
218 <para>For <emphasis role="bold">Windows Vista and Windows 7
219 guests,</emphasis> the logon subsystem does not support the
220 so-called Secure Attention Sequence
221 (<computeroutput>CTRL+ALT+DEL</computeroutput>). As a result, the
222 guest's group policy settings need to be changed to not use the
223 Secure Attention Sequence. Also, the user name given is only
224 compared to the true user name, not the user friendly name. This
225 means that when you rename a user, you still have to supply the
226 original user name (internally, Windows never renames user
227 accounts).</para>
228 </listitem>
229
230 <listitem>
231 <para>Auto-logon handling of the built-in Windows Remote Desktop Service
232 (formerly known as Terminal Services) is disabled by default. To enable
233 it, create the registry key
234 <screen>HKEY_LOCAL_MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions\AutoLogon</screen>
235 with a <computeroutput>DWORD</computeroutput> value of <computeroutput>1</computeroutput>.</para>
236 </listitem>
237 </orderedlist></para>
238
239 <para>The following command forces VirtualBox to keep the credentials
240 after they were read by the guest and on VM reset: <screen>VBoxManage setextradata "Windows XP" VBoxInternal/Devices/VMMDev/0/Config/KeepCredentials 1</screen>Note
241 that this is a potential security risk as a malicious application
242 running on the guest could request this information using the proper
243 interface.</para>
244 </sect2>
245
246 <sect2 id="autologon_unix">
247 <title>Automated Linux/Unix guest logons</title>
248
249 <para>Starting with version 3.2, VirtualBox provides a custom PAM module
250 (Pluggable Authentication Module) which can be used to perform automated
251 guest logons on platforms which support this framework. Virtually all
252 modern Linux/Unix distributions rely on PAM.</para>
253
254 <para>The <computeroutput>pam_vbox.so</computeroutput> module itself
255 <emphasis role="bold">does not</emphasis> do an actual verification of
256 the credentials passed to the guest OS; instead it relies on other
257 modules such as <computeroutput>pam_unix.so</computeroutput> or
258 <computeroutput>pam_unix2.so</computeroutput> down in the PAM stack to
259 do the actual validation using the credentials retrieved by
260 <computeroutput>pam_vbox.so</computeroutput>. Therefore
261 <computeroutput>pam_vbox.so</computeroutput> has to be on top of the
262 authentication PAM service list.</para>
263
264 <note>
265 <para>The <computeroutput>pam_vbox.so</computeroutput> only supports
266 the <computeroutput>auth</computeroutput> primitive. Other primitives
267 such as <computeroutput>account</computeroutput>,
268 <computeroutput>session</computeroutput> or
269 <computeroutput>password</computeroutput> are not supported.</para>
270 </note>
271
272 <para>The <computeroutput>pam_vbox.so</computeroutput> module is shipped
273 as part of the Guest Additions but it is not installed and/or activated
274 on the guest OS by default. In order to install it, it has to be copied
275 from
276 <computeroutput>/opt/VBoxGuestAdditions-&lt;version&gt;/lib/VBoxGuestAdditions/</computeroutput>
277 to the security modules directory, usually
278 <computeroutput>/lib/security/</computeroutput> on 32-bit guest Linuxes or
279 <computeroutput>/lib64/security/</computeroutput> on 64-bit ones. Please refer to your
280 guest OS documentation for the correct PAM module directory.</para>
281
282 <para>For example, to use <computeroutput>pam_vbox.so</computeroutput>
283 with a Ubuntu Linux guest OS and GDM (the GNOME Desktop Manager) to
284 logon users automatically with the credentials passed by the host, the
285 guest OS has to be configured like the following:</para>
286
287 <orderedlist>
288 <listitem>
289 <para>The <computeroutput>pam_vbox.so</computeroutput> module has to
290 be copied to the security modules directory, in this case it is
291 <computeroutput>/lib/security</computeroutput>.</para>
292 </listitem>
293
294 <listitem>
295 <para>Edit the PAM configuration file for GDM found at
296 <computeroutput>/etc/pam.d/gdm</computeroutput>, adding the line
297 <computeroutput>auth requisite pam_vbox.so</computeroutput> at the
298 top. Additionaly, in most Linux distributions there is a file called
299 <computeroutput>/etc/pam.d/common-auth</computeroutput>. This file
300 is included in many other services (like the GDM file mentioned
301 above). There you also have to add the line <computeroutput>auth
302 requisite pam_vbox.so</computeroutput>.</para>
303 </listitem>
304
305 <listitem>
306 <para>If authentication against the shadow database using
307 <computeroutput>pam_unix.so</computeroutput> or
308 <computeroutput>pam_unix2.so</computeroutput> is desired, the
309 argument <computeroutput>try_first_pass</computeroutput> for
310 <computeroutput>pam_unix.so</computeroutput> or
311 <computeroutput>use_first_pass</computeroutput> for
312 <computeroutput>pam_unix2.so</computeroutput> is needed
313 in order to pass the credentials from the VirtualBox module to the
314 shadow database authentication module. For Ubuntu, this needs to be
315 added to <computeroutput>/etc/pam.d/common-auth</computeroutput>, to
316 the end of the line referencing
317 <computeroutput>pam_unix.so</computeroutput>. This argument tells
318 the PAM module to use credentials already present in the stack, i.e.
319 the ones provided by the VirtualBox PAM module.</para>
320 </listitem>
321 </orderedlist>
322
323 <para><warning>
324 <para>An incorrectly configured PAM stack can effectively prevent
325 you from logging into your guest system!</para>
326 </warning></para>
327
328 <para>To make deployment easier, you can pass the argument
329 <computeroutput>debug</computeroutput> right after the
330 <computeroutput>pam_vbox.so</computeroutput> statement. Debug log output
331 will then be recorded using syslog.</para>
332
333 <para><warning>
334 <para>At present, the GDM display manager only retrieves credentials
335 at startup so unless the credentials have been supplied to the guest
336 before GDM starts, automatic logon will not work. This limitation
337 needs to be addressed by the GDM developers or another display
338 manager must be used.</para>
339 </warning></para>
340 </sect2>
341 </sect1>
342
343 <sect1>
344 <title>Advanced configuration for Windows guests</title>
345
346 <sect2 id="sysprep">
347 <title>Automated Windows system preparation</title>
348
349 <para>Beginning with Windows NT 4.0, Microsoft offers a "system
350 preparation" tool (in short: Sysprep) to prepare a Windows system for
351 deployment or redistribution. Whereas Windows 2000 and XP ship with
352 Sysprep on the installation medium, the tool also is available for
353 download on the Microsoft web site. In a standard installation of
354 Windows Vista and 7, Sysprep is already included. Sysprep mainly
355 consists of an executable called
356 <computeroutput>sysprep.exe</computeroutput> which is invoked by the
357 user to put the Windows installation into preparation mode.</para>
358
359 <para>Starting with VirtualBox 3.2.2, the Guest Additions offer a way to
360 launch a system preparation on the guest operating system in an
361 automated way, controlled from the host system. To achieve that, see
362 <xref linkend="guestadd-guestcontrol" /> for using the feature with the
363 special identifier <computeroutput>sysprep</computeroutput> as the
364 program to execute, along with the user name
365 <computeroutput>sysprep</computeroutput> and password
366 <computeroutput>sysprep</computeroutput> for the credentials. Sysprep
367 then gets launched with the required system rights.</para>
368
369 <note>
370 <para>Specifying the location of "sysprep.exe" is <emphasis
371 role="bold">not possible</emphasis> -- instead the following paths are
372 used (based on the operating system): <itemizedlist>
373 <listitem>
374 <para><computeroutput>C:\sysprep\sysprep.exe</computeroutput>
375 for Windows NT 4.0, 2000 and XP</para>
376 </listitem>
377
378 <listitem>
379 <para><computeroutput>%WINDIR%\System32\Sysprep\sysprep.exe</computeroutput>
380 for Windows Vista, 2008 Server and 7</para>
381 </listitem>
382 </itemizedlist> The Guest Additions will automatically use the
383 appropriate path to execute the system preparation tool.</para>
384 </note>
385 </sect2>
386 </sect1>
387
388 <sect1>
389 <title>Advanced configuration for Linux and Solaris guests</title>
390
391 <sect2>
392 <title>Manual setup of selected guest services on Linux</title>
393
394 <para>The VirtualBox Guest Additions contain several different
395 drivers. If for any reason you do not wish to set them all up, you can
396 install the Guest Additions using the following command:</para>
397
398 <screen> sh ./VBoxLinuxAdditions.run no_setup</screen>
399
400 <para>After this, you will need to at least compile the kernel modules
401 by running the command <screen> /usr/lib/VBoxGuestAdditions/vboxadd setup</screen>
402 as root (you will need to replace <emphasis>lib</emphasis> by
403 <emphasis>lib64</emphasis> on some 64bit guests), and on older guests
404 without the udev service you will need to add the
405 <emphasis>vboxadd</emphasis> service to the default runlevel to ensure
406 that the modules get loaded.</para>
407
408 <para>To setup the time synchronization service, run the command
409 <screen> /usr/lib/VBoxGuestAdditions/vboxadd-service setup</screen>
410 and add the service vboxadd-service to the default runlevel. To set up
411 the X11 and OpenGL part of the Guest Additions, run the command
412 <screen> /usr/lib/VBoxGuestAdditions/vboxadd-x11 setup</screen> (you
413 do not need to enable any services for this).</para>
414
415 <para>To recompile the guest kernel modules, use this command:
416 <screen> /usr/lib/VBoxGuestAdditions/vboxadd setup</screen> After
417 compilation you should reboot your guest to ensure that the new
418 modules are actually used.</para>
419 </sect2>
420
421 <sect2 id="guestxorgsetup">
422 <title>Guest graphics and mouse driver setup in depth</title>
423
424 <para>This section assumes that you are familiar with configuring
425 the X.Org server using xorg.conf and optionally the newer mechanisms
426 using hal or udev and xorg.conf.d. If not you can learn about
427 them by studying the documentation which comes with X.Org.</para>
428
429 <para>The VirtualBox Guest Additions come with drivers for X.Org
430 versions
431 <itemizedlist>
432 <listitem>X11R6.8/X11R6.9 and XFree86 version 4.3
433 (vboxvideo_drv_68.o and vboxmouse_drv_68.o)</listitem>
434 <listitem>X11R7.0 (vboxvideo_drv_70.so and vboxmouse_drv_70.so)
435 </listitem>
436 <listitem>X11R7.1 (vboxvideo_drv_71.so and vboxmouse_drv_71.so)
437 </listitem>
438 <listitem>X.Org Server versions 1.3 and later (vboxvideo_drv_13.so
439 and vboxmouse_drv_13.so and so on).</listitem>
440 </itemizedlist>
441 By default these drivers can be found in the directory</para>
442 <para>
443 <computeroutput>/opt/VBoxGuestAdditions-&lt;version&gt;/lib/VBoxGuestAdditions</computeroutput>
444 </para>
445 <para>and the correct versions for the X server are symbolically linked
446 into the X.Org driver directories.</para>
447
448 <para>For graphics integration to work correctly, the X server must
449 load the vboxvideo driver (many recent X server versions look for it
450 automatically if they see that they are running in VirtualBox) and for
451 an optimal user experience the guest kernel drivers must be loaded and
452 the Guest Additions tool VBoxClient must be running as a client in the
453 X session. For mouse integration to work correctly, the guest kernel
454 drivers must be loaded and in addition, in X servers from X.Org X11R6.8
455 to X11R7.1 and in XFree86 version 4.3 the right vboxmouse driver must
456 be loaded and associated with /dev/mouse or /dev/psaux; in X.Org server
457 1.3 or later a driver for a PS/2 mouse must be loaded and the right
458 vboxmouse driver must be associated with /dev/vboxguest.</para>
459
460 <para>The VirtualBox guest graphics driver can use any graphics
461 configuration for which the virtual resolution fits into the virtual
462 video memory allocated to the virtual machine (minus a small amount
463 used by the guest driver) as described in
464 <xref linkend="settings-display" />. The driver will offer a range of
465 standard modes at least up to the default guest resolution for all
466 active guest monitors. In X.Org Server 1.3 and later the default mode
467 can be changed by setting the output property VBOX_MODE to
468 "&lt;width&gt;x&lt;height&gt;" for any guest monitor. When VBoxClient
469 and the kernel drivers are active this is done automatically when the
470 host requests a mode change. The driver for older versions can only
471 receive new modes by querying the host for requests at regular
472 intervals.</para>
473
474 <para>With pre-1.3 X Servers you can also add your own modes to the X
475 server configuration file. You simply need to add them to the "Modes"
476 list in the "Display" subsection of the "Screen" section. For example,
477 the section shown here has a custom 2048x800 resolution mode added:
478 </para>
479
480 <screen>Section "Screen"
481 Identifier "Default Screen"
482 Device "VirtualBox graphics card"
483 Monitor "Generic Monitor"
484 DefaultDepth 24
485 SubSection "Display"
486 Depth 24
487 Modes "2048x800" "800x600" "640x480"
488 EndSubSection
489EndSection</screen>
490 </sect2>
491 </sect1>
492
493 <sect1 id="cpuhotplug">
494 <title>CPU hot-plugging</title>
495
496 <para>With virtual machines running modern server operating systems,
497 VirtualBox supports CPU hot-plugging.<footnote>
498 <para>Support for CPU hot-plugging was introduced with VirtualBox
499 3.2.</para>
500 </footnote> Whereas on a physical computer this would mean that a CPU
501 can be added or removed while the machine is running, VirtualBox supports
502 adding and removing virtual CPUs while a virtual machine is
503 running.</para>
504
505 <para>CPU hot-plugging works only with guest operating systems that
506 support it. So far this applies only to Linux and Windows Server 2008 x64
507 Data Center Edition. Windows supports only hot-add while Linux supports
508 hot-add and hot-remove but to use this feature with more than 8 CPUs a
509 64bit Linux guest is required.</para>
510
511 <para>At this time, CPU hot-plugging requires using the VBoxManage
512 command-line interface. First, hot-plugging needs to be enabled for a
513 virtual machine:<screen>VBoxManage modifyvm "VM name" --cpuhotplug on</screen></para>
514
515 <para>After that, the --cpus option specifies the maximum number of CPUs
516 that the virtual machine can have:<screen>VBoxManage modifyvm "VM name" --cpus 8</screen>When
517 the VM is off, you can then add and remove virtual CPUs with the modifyvm
518 --plugcpu and --unplugcpu subcommands, which take the number of the
519 virtual CPU as a parameter, like this:<screen>VBoxManage modifyvm "VM name" --plugcpu 3
520VBoxManage modifyvm "VM name" --unplugcpu 3</screen>Note that CPU 0 can never
521 be removed.</para>
522
523 <para>While the VM is running, CPUs can be added with the
524 <computeroutput>controlvm plugcpu/unplugcpu</computeroutput> commands
525 instead:<screen>VBoxManage controlvm "VM name" plugcpu 3
526VBoxManage controlvm "VM name" unplugcpu 3</screen></para>
527
528 <para>See <xref linkend="vboxmanage-modifyvm" /> and <xref
529 linkend="vboxmanage-controlvm" /> for details.</para>
530
531 <para>With Linux guests, the following applies: To prevent ejection while
532 the CPU is still used it has to be ejected from within the guest before.
533 The Linux Guest Additions contain a service which receives hot-remove
534 events and ejects the CPU. Also, after a CPU is added to the VM it is not
535 automatically used by Linux. The Linux Guest Additions service will take
536 care of that if installed. If not a CPU can be started with the following
537 command:<screen>echo 1 &gt; /sys/devices/system/cpu/cpu&lt;id&gt;/online</screen></para>
538 </sect1>
539
540 <sect1 id="pcipassthrough">
541 <title>PCI passthrough</title>
542
543 <para>When running on Linux hosts, with a recent enough kernel (at least version
544 <computeroutput>2.6.31</computeroutput>) experimental host PCI devices
545 passthrough is available.<footnote>
546 <para>Experimental support for PCI passthrough was introduced with VirtualBox
547 4.1.</para>
548 </footnote></para>
549
550 <note><para>The PCI passthrough module is shipped as a VirtualBox extension
551 package, which must be installed separately. See <xref
552 linkend="intro-installing" /> for more information.</para>
553 </note>
554
555 <para>Essentially this feature allows to directly use physical PCI
556 devices on the host by the guest even if host doesn't have drivers for this
557 particular device. Both, regular PCI and some PCI Express cards, are
558 supported. AGP and certain PCI Express cards are not supported at the
559 moment if they rely on GART (Graphics Address Remapping Table) unit
560 programming for texture management as it does rather nontrivial
561 operations with pages remapping interfering with IOMMU.
562 This limitation may be lifted in future releases.</para>
563
564 <para>To be fully functional, PCI passthrough support in VirtualBox depends upon
565 an IOMMU hardware unit which is not yet too widely available. If the device uses
566 bus mastering (i.e. it performs DMA to the OS memory on its
567 own), then an IOMMU is required, otherwise such DMA transactions may write to
568 the wrong physical memory address as the device DMA engine is programmed using
569 a device-specific protocol to perform memory transactions. The IOMMU functions
570 as translation unit mapping physical memory access requests from the device
571 using knowledge of the guest physical address to host physical addresses translation
572 rules.</para>
573
574 <para>Intel's solution for IOMMU is marketed as "Intel Virtualization Technology for
575 Directed I/O" (VT-d), and AMD's one is called AMD-Vi. So please check if your
576 motherboard datasheet has appropriate technology.
577 Even if your hardware doesn't have a IOMMU, certain PCI cards may work
578 (such as serial PCI adapters), but the guest will show a warning on boot and
579 the VM execution will terminate if the guest driver will attempt to enable card
580 bus mastering.</para>
581
582 <para>
583 It is very common that the BIOS or the host OS disables the IOMMU by default.
584 So before any attempt to use it please make sure that
585 <orderedlist>
586 <listitem>
587 <para>Your motherboard has an IOMMU unit.</para>
588 </listitem>
589 <listitem>
590 <para>Your CPU supports the IOMMU.</para>
591 </listitem>
592 <listitem>
593 <para>The IOMMU is enabled in the BIOS.</para>
594 </listitem>
595 <listitem>
596 <para>The VM must run with VT-x/AMD-V and nested paging enabled.</para>
597 </listitem>
598 <listitem>
599 <para>Your Linux kernel was compiled with IOMMU support (including DMA
600 remapping, see <computeroutput>CONFIG_DMAR</computeroutput> kernel
601 compilation option). The PCI stub driver
602 (<computeroutput>CONFIG_PCI_STUB</computeroutput>) is required
603 as well.</para>
604 </listitem>
605 <listitem>
606 <para>Your Linux kernel recognizes and uses the IOMMU unit
607 (<computeroutput>intel_iommu=on</computeroutput>
608 boot option could be needed). Search for DMAR and PCI-DMA in kernel boot
609 log.</para>
610 </listitem>
611 </orderedlist>
612 </para>
613
614 <para>Once you made sure that the host kernel supports the IOMMU, the next step is
615 to select the PCI card and attach it to the guest. To figure out the list of
616 available PCI devices, use the <computeroutput>lspci</computeroutput> command.
617 The output will look like this
618 <screen>
619 01:00.0 VGA compatible controller: ATI Technologies Inc Cedar PRO [Radeon HD 5450]
620 01:00.1 Audio device: ATI Technologies Inc Manhattan HDMI Audio [Mobility Radeon HD 5000 Series]
621 02:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd. RTL8111/8168B PCI Express Gigabit Ethernet controller (rev 03)
622 03:00.0 SATA controller: JMicron Technology Corp. JMB362/JMB363 Serial ATA Controller (rev 03)
623 03:00.1 IDE interface: JMicron Technology Corp. JMB362/JMB363 Serial ATA Controller (rev 03)
624 06:00.0 VGA compatible controller: nVidia Corporation G86 [GeForce 8500 GT] (rev a1)
625 </screen>
626 The first column is a PCI address (in format <computeroutput>bus:device.function</computeroutput>).
627 This address could be used to identify the device for further operations.
628 For example, to attach a PCI network controller on the system listed above
629 to the second PCI bus in the guest, as device 5, function 0, use the following command:
630 <screen>VBoxManage modifyvm "VM name" --pciattach 02:00.0@01:05.0</screen>
631 To detach same device, use
632 <screen>VBoxManage modifyvm "VM name" --pcidetach 02:00.0</screen>
633 Please note that both host and guest could freely assign a different PCI address to
634 the card attached during runtime, so those addresses only apply to the address of
635 the card at the moment of attachment (host), and during BIOS PCI init (guest).
636 </para>
637
638 <para>If the virtual machine has a PCI device attached, certain limitations apply:
639 <orderedlist>
640 <listitem>
641 Only PCI cards with non-shared interrupts (such as using MSI on host) are
642 supported at the moment.
643 </listitem>
644 <listitem>
645 No guest state can be reliably saved/restored (as the internal state of the PCI
646 card could not be retrieved).
647 </listitem>
648 <listitem>
649 Teleportation (live migration) doesn't work (for the same reason).
650 </listitem>
651 <listitem>
652 No lazy physical memory allocation. The host will preallocate the whole RAM
653 required for the VM on startup (as we cannot catch physical hardware accesses
654 to the physical memory).
655 </listitem>
656 </orderedlist>
657 </para>
658
659 </sect1>
660
661
662 <sect1>
663 <title>Advanced display configuration</title>
664
665 <sect2>
666 <title>Custom VESA resolutions</title>
667
668 <para>Apart from the standard VESA resolutions, the VirtualBox VESA BIOS
669 allows you to add up to 16 custom video modes which will be reported to
670 the guest operating system. When using Windows guests with the
671 VirtualBox Guest Additions, a custom graphics driver will be used
672 instead of the fallback VESA solution so this information does not
673 apply.</para>
674
675 <para>Additional video modes can be configured for each VM using the
676 extra data facility. The extra data key is called
677 <literal>CustomVideoMode&lt;x&gt;</literal> with <literal>x</literal>
678 being a number from 1 to 16. Please note that modes will be read from 1
679 until either the following number is not defined or 16 is reached. The
680 following example adds a video mode that corresponds to the native
681 display resolution of many notebook computers:</para>
682
683 <screen>VBoxManage setextradata "VM name" "CustomVideoMode1" "1400x1050x16"</screen>
684
685 <para>The VESA mode IDs for custom video modes start at
686 <literal>0x160</literal>. In order to use the above defined custom video
687 mode, the following command line has be supplied to Linux:</para>
688
689 <screen>vga = 0x200 | 0x160
690vga = 864</screen>
691
692 <para>For guest operating systems with VirtualBox Guest Additions, a
693 custom video mode can be set using the video mode hint feature.</para>
694 </sect2>
695
696 <sect2>
697 <title>Configuring the maximum resolution of guests when using the
698 graphical frontend</title>
699
700 <para>When guest systems with the Guest Additions installed are started
701 using the graphical frontend (the normal VirtualBox application), they
702 will not be allowed to use screen resolutions greater than the host's
703 screen size unless the user manually resizes them by dragging the
704 window, switching to fullscreen or seamless mode or sending a video mode
705 hint using VBoxManage. This behavior is what most users will want, but
706 if you have different needs, it is possible to change it by issuing one
707 of the following commands from the command line:</para>
708
709 <screen>VBoxManage setextradata global GUI/MaxGuestResolution any</screen>
710
711 <para>will remove all limits on guest resolutions.</para>
712
713 <screen>VBoxManage setextradata global GUI/MaxGuestResolution &gt;width,height&lt;</screen>
714
715 <para>manually specifies a maximum resolution.</para>
716
717 <screen>VBoxManage setextradata global GUI/MaxGuestResolution auto</screen>
718
719 <para>restores the default settings. Note that these settings apply
720 globally to all guest systems, not just to a single machine.</para>
721 </sect2>
722
723 </sect1>
724
725 <sect1>
726 <title>Advanced storage configuration</title>
727
728 <sect2 id="rawdisk">
729 <title>Using a raw host hard disk from a guest</title>
730
731 <para>Starting with version 1.4, as an alternative to using virtual disk
732 images (as described in detail in <xref linkend="storage" />),
733 VirtualBox can also present either entire physical hard disks or
734 selected partitions thereof as virtual disks to virtual machines.</para>
735
736 <para>With VirtualBox, this type of access is called "raw hard disk
737 access"; it allows a guest operating system to access its virtual hard
738 disk without going through the host OS file system. The actual
739 performance difference for image files vs. raw disk varies greatly
740 depending on the overhead of the host file system, whether dynamically
741 growing images are used and on host OS caching strategies. The caching
742 indirectly also affects other aspects such as failure behavior, i.e.
743 whether the virtual disk contains all data written before a host OS
744 crash. Consult your host OS documentation for details on this.</para>
745
746 <para><warning>
747 <para>Raw hard disk access is for expert users only. Incorrect use
748 or use of an outdated configuration can lead to <emphasis
749 role="bold">total loss of data </emphasis>on the physical disk. Most
750 importantly, <emphasis>do not</emphasis> attempt to boot the
751 partition with the currently running host operating system in a
752 guest. This will lead to severe data corruption.</para>
753 </warning></para>
754
755 <para>Raw hard disk access -- both for entire disks and individual
756 partitions -- is implemented as part of the VMDK image format support.
757 As a result, you will need to create a special VMDK image file which
758 defines where the data will be stored. After creating such a special
759 VMDK image, you can use it like a regular virtual disk image. For
760 example, you can use the Virtual Media Manager (<xref linkend="vdis" />)
761 or <computeroutput>VBoxManage</computeroutput> to assign the image to a
762 virtual machine.</para>
763
764 <sect3>
765 <title>Access to entire physical hard disk</title>
766
767 <para>While this variant is the simplest to set up, you must be aware
768 that this will give a guest operating system direct and full access to
769 an <emphasis>entire physical disk</emphasis>. If your
770 <emphasis>host</emphasis> operating system is also booted from this
771 disk, please take special care to not access the partition from the
772 guest at all. On the positive side, the physical disk can be
773 repartitioned in arbitrary ways without having to recreate the image
774 file that gives access to the raw disk.</para>
775
776 <para>To create an image that represents an entire physical hard disk
777 (which will not contain any actual data, as this will all be stored on
778 the physical disk), on a Linux host, use the command<screen>VBoxManage internalcommands createrawvmdk -filename /path/to/file.vmdk
779 -rawdisk /dev/sda</screen>This creates the image
780 <code>/path/to/file.vmdk</code> (must be absolute), and all data will
781 be read and written from <code>/dev/sda</code>.</para>
782
783 <para>On a Windows host, instead of the above device specification,
784 use e.g. <code>\\.\PhysicalDrive0</code>. On a Mac OS X host, instead
785 of the above device specification use e.g. <code>/dev/disk1</code>.
786 Note that on OS X you can only get access to an entire disk if no
787 volume is mounted from it.</para>
788
789 <para>Creating the image requires read/write access for the given
790 device. Read/write access is also later needed when using the image
791 from a virtual machine.</para>
792
793 <para>Just like with regular disk images, this does not automatically
794 attach the newly created image to a virtual machine. This can be done
795 with e.g. <screen>VBoxManage storageattach WindowsXP --storagectl "IDE Controller"
796 --port 0 --device 0 --type hdd --medium /path/to/file.vmdk</screen>When
797 this is done the selected virtual machine will boot from the specified
798 physical disk.</para>
799 </sect3>
800
801 <sect3>
802 <title>Access to individual physical hard disk partitions</title>
803
804 <para>This "raw partition support" is quite similar to the "full hard
805 disk" access described above. However, in this case, any partitioning
806 information will be stored inside the VMDK image, so you can e.g.
807 install a different boot loader in the virtual hard disk without
808 affecting the host's partitioning information. While the guest will be
809 able to <emphasis>see</emphasis> all partitions that exist on the
810 physical disk, access will be filtered in that reading from partitions
811 for which no access is allowed the partitions will only yield zeroes,
812 and all writes to them are ignored.</para>
813
814 <para>To create a special image for raw partition support (which will
815 contain a small amount of data, as already mentioned), on a Linux
816 host, use the command<screen>VBoxManage internalcommands createrawvmdk -filename /path/to/file.vmdk
817 -rawdisk /dev/sda -partitions 1,5</screen></para>
818
819 <para>As you can see, the command is identical to the one for "full
820 hard disk" access, except for the additional
821 <computeroutput>-partitions</computeroutput> parameter. This example
822 would create the image <code>/path/to/file.vmdk</code> (which, again,
823 must be absolute), and partitions 1 and 5 of <code>/dev/sda</code>
824 would be made accessible to the guest.</para>
825
826 <para>VirtualBox uses the same partition numbering as your Linux host.
827 As a result, the numbers given in the above example would refer to the
828 first primary partition and the first logical drive in the extended
829 partition, respectively.</para>
830
831 <para>On a Windows host, instead of the above device specification,
832 use e.g. <code>\\.\PhysicalDrive0</code>. On a Mac OS X host, instead
833 of the above device specification use e.g. <code>/dev/disk1</code>.
834 Note that on OS X you can only use partitions which are not mounted
835 (eject the respective volume first). Partition numbers are the same on
836 Linux, Windows and Mac OS X hosts.</para>
837
838 <para>The numbers for the list of partitions can be taken from the
839 output of<screen>VBoxManage internalcommands listpartitions -rawdisk /dev/sda</screen>The
840 output lists the partition types and sizes to give the user enough
841 information to identify the partitions necessary for the guest.</para>
842
843 <para>Images which give access to individual partitions are specific
844 to a particular host disk setup. You cannot transfer these images to
845 another host; also, whenever the host partitioning changes, the image
846 <emphasis>must be recreated</emphasis>.</para>
847
848 <para>Creating the image requires read/write access for the given
849 device. Read/write access is also later needed when using the image
850 from a virtual machine. If this is not feasible, there is a special
851 variant for raw partition access (currently only available on Linux
852 hosts) that avoids having to give the current user access to the
853 entire disk. To set up such an image, use<screen>VBoxManage internalcommands createrawvmdk -filename /path/to/file.vmdk
854 -rawdisk /dev/sda -partitions 1,5 -relative</screen>When used from a
855 virtual machine, the image will then refer not to the entire disk, but
856 only to the individual partitions (in the example
857 <code>/dev/sda1</code> and <code>/dev/sda5</code>). As a consequence,
858 read/write access is only required for the affected partitions, not
859 for the entire disk. During creation however, read-only access to the
860 entire disk is required to obtain the partitioning information.</para>
861
862 <para>In some configurations it may be necessary to change the MBR
863 code of the created image, e.g. to replace the Linux boot loader that
864 is used on the host by another boot loader. This allows e.g. the guest
865 to boot directly to Windows, while the host boots Linux from the
866 "same" disk. For this purpose the
867 <computeroutput>-mbr</computeroutput> parameter is provided. It
868 specifies a file name from which to take the MBR code. The partition
869 table is not modified at all, so a MBR file from a system with totally
870 different partitioning can be used. An example of this is<screen>VBoxManage internalcommands createrawvmdk -filename /path/to/file.vmdk
871 -rawdisk /dev/sda -partitions 1,5 -mbr winxp.mbr</screen>The modified
872 MBR will be stored inside the image, not on the host disk.</para>
873
874 <para>The created image can be attached to a storage controller in
875 a VM configuration as usual.</para>
876 </sect3>
877 </sect2>
878
879 <sect2 id="changevpd">
880 <title>Configuring the hard disk vendor product data (VPD)</title>
881
882 <para>VirtualBox reports vendor product data for its virtual hard disks
883 which consist of hard disk serial number, firmware revision and model
884 number. These can be changed using the following commands:</para>
885
886 <screen>VBoxManage setextradata "VM name"
887 "VBoxInternal/Devices/ahci/0/Config/Port0/SerialNumber" "serial"
888VBoxManage setextradata "VM name"
889 "VBoxInternal/Devices/ahci/0/Config/Port0/FirmwareRevision" "firmware"
890VBoxManage setextradata "VM name"
891 "VBoxInternal/Devices/ahci/0/Config/Port0/ModelNumber" "model"</screen>
892
893 <para>The serial number is a 20 byte alphanumeric string, the firmware
894 revision an 8 byte alphanumeric string and the model number a 40 byte
895 alphanumeric string. Instead of "Port0" (referring to the first port),
896 specify the desired SATA hard disk port.</para>
897
898 <para>The above commands apply to virtual machines with an AHCI (SATA)
899 controller. The commands for virtual machines with an IDE controller
900 are:</para>
901
902 <screen>VBoxManage setextradata "VM name"
903 "VBoxInternal/Devices/piix3ide/0/Config/PrimaryMaster/SerialNumber" "serial"
904VBoxManage setextradata "VM name"
905 "VBoxInternal/Devices/piix3ide/0/Config/PrimaryMaster/FirmwareRevision" "firmware"
906VBoxManage setextradata "VM name"
907 "VBoxInternal/Devices/piix3ide/0/Config/PrimaryMaster/ModelNumber" "model"</screen>
908
909 <para>For hard disks it's also possible (experimental!) to mark the drive
910 as having a non-rotational medium with:</para>
911
912 <screen>VBoxManage setextradata "VM name"
913 "VBoxInternal/Devices/ahci/0/Config/Port0/NonRotational" "1"</screen>
914
915 <para>Additional three parameters are needed for CD/DVD drives to report
916 the vendor product data:</para>
917
918 <screen>VBoxManage setextradata "VM name"
919 "VBoxInternal/Devices/ahci/0/Config/Port0/ATAPIVendorId" "vendor"
920VBoxManage setextradata "VM name"
921 "VBoxInternal/Devices/ahci/0/Config/Port0/ATAPIProductId" "product"
922VBoxManage setextradata "VM name"
923 "VBoxInternal/Devices/ahci/0/Config/Port0/ATAPIRevision" "revision"</screen>
924
925 <para>The vendor id is an 8 byte alphanumeric string, the product id an
926 16 byte alphanumeric string and the revision a 4 byte alphanumeric
927 string. Instead of "Port0" (referring to the first port), specify the
928 desired SATA hard disk port.</para>
929 </sect2>
930
931 <sect2>
932 <title id="iscsi-intnet">Accès à des cibles iSCSI à travers le réseau interne</title>
933
934 <para>En tant que fonctionnalité expérimentale, VirtualBox permet l'accès
935 à une cible iSCSI en exécutant dans une machine virtuelle ce qui est
936 configuré pour utiliser le mode Réseau interne (comme décrit au <xref
937 linkend="network_internal" />). Le paramétrage de la machine virtuelle qui
938 utilise une telle cible iSCSI se fait comme décrit ci-dessous. La seule
939 différence est que l'adresse IP de la cible doit être spécifiée comme
940 adresse IP numérique.</para>
941
942 <para>La pile IP qui accède au réseau interne doit être configurée dans la
943 machine virtuelle qui accède à la cible iSCSI. Vous devez choisir une
944 adresse IP statique libre et une adresse MAC non utilisée par d'autres
945 machines virtuelles. Dans l'exemple ci-dessous, adaptez le nom de la
946 machine virtuelle, l'adresse MAC et la configuration IP et le nom du
947 réseau interne (« MyIntNet ») selon vos besoins. Vous devez exécuter les
948 sept commandes suivantes :<screen>VBoxManage setextradata "nom VM" VBoxInternal/Devices/IntNetIP/0/Trusted 1
949VBoxManage setextradata "nom VM" VBoxInternal/Devices/IntNetIP/0/Config/MAC 08:00:27:01:02:0f
950VBoxManage setextradata "nom VM" VBoxInternal/Devices/IntNetIP/0/Config/IP 10.0.9.1
951VBoxManage setextradata "nom VM" VBoxInternal/Devices/IntNetIP/0/Config/Netmask 255.255.255.0
952VBoxManage setextradata "nom VM" VBoxInternal/Devices/IntNetIP/0/LUN#0/Driver IntNet
953VBoxManage setextradata "nom VM" VBoxInternal/Devices/IntNetIP/0/LUN#0/Config/Network MyIntNet
954VBoxManage setextradata "nom VM" VBoxInternal/Devices/IntNetIP/0/LUN#0/Config/IsService 1</screen></para>
955
956 <para>Enfin, le disque iSCSI doit être enregistré avec l'option
957 <code>--intnet</code> pour dire à l'initiateur iSCSI d'utiliser le réseau
958 interne :<screen>VBoxManage addiscsidisk --server 10.0.9.30 --target iqn.2008-12.com.sun:sampletarget --intnet</screen></para>
959
960 <para>L'adresse cible doit être spécifiée en tant qu'adresse IP numérique
961 vu qu'il n'y a pas de résolution DNS pour le réseau interne.</para>
962
963 <para>La machine virtuelle avec la cible iSCSI devrait être démarrée avant
964 que la machine qui l'utilise ne soit allumée. Si une machine virtuelle
965 utilisant un disque iSCSI est démarrée sans que la cible iSCSI ne soit
966 allumée, cela peut prendre jusqu'à 200 secondes pour détecter cette
967 situation. La VM échouera pour s'allumer.</para>
968 </sect2>
969 </sect1>
970
971 <sect1>
972 <title>Launching more than 120 VMs on Solaris hosts</title>
973
974 <para>Solaris hosts have a fixed number of IPC semaphores IDs per process
975 preventing users from starting more than 120 VMs. While trying to launch
976 more VMs you would be shown a "Cannot create IPC semaphore" error.</para>
977
978 <para>In order to run more VMs, you will need to bump the semaphore ID
979 limit of the VBoxSVC process. Execute as root the
980 <computeroutput>prctl</computeroutput> command as shown below. The process
981 ID of VBoxSVC can be obtained using the
982 <computeroutput>ps</computeroutput> list command.</para>
983
984 <para><screen>prctl -r -n project.max-sem-ids -v 2048 &lt;pid-of-VBoxSVC&gt;</screen></para>
985 </sect1>
986
987 <sect1>
988 <title>Legacy commands for using serial ports</title>
989
990 <para>Starting with version 1.4, VirtualBox provided support for virtual
991 serial ports, which, at the time, was rather complicated to set up with a
992 sequence of <computeroutput>VBoxManage setextradata</computeroutput>
993 statements. Since version 1.5, that way of setting up serial ports is no
994 longer necessary and <emphasis>deprecated.</emphasis> To set up virtual
995 serial ports, use the methods now described in <xref
996 linkend="serialports" />.<note>
997 <para>For backwards compatibility, the old
998 <computeroutput>setextradata</computeroutput> statements, whose
999 description is retained below from the old version of the manual, take
1000 <emphasis>precedence</emphasis> over the new way of configuring serial
1001 ports. As a result, if configuring serial ports the new way doesn't
1002 work, make sure the VM in question does not have old configuration
1003 data such as below still active.</para>
1004 </note></para>
1005
1006 <para>The old sequence of configuring a serial port used the following 6
1007 commands:</para>
1008
1009 <screen>VBoxManage setextradata "VM name"
1010 "VBoxInternal/Devices/serial/0/Config/IRQ" 4
1011VBoxManage setextradata "VM name"
1012 "VBoxInternal/Devices/serial/0/Config/IOBase" 0x3f8
1013VBoxManage setextradata "VM name"
1014 "VBoxInternal/Devices/serial/0/LUN#0/Driver" Char
1015VBoxManage setextradata "VM name"
1016 "VBoxInternal/Devices/serial/0/LUN#0/AttachedDriver/Driver" NamedPipe
1017VBoxManage setextradata "VM name"
1018 "VBoxInternal/Devices/serial/0/LUN#0/AttachedDriver/Config/Location" "\\.\pipe\vboxCOM1"
1019VBoxManage setextradata "VM name"
1020 "VBoxInternal/Devices/serial/0/LUN#0/AttachedDriver/Config/IsServer" 1</screen>
1021
1022 <para>This sets up a serial port in the guest with the default settings
1023 for COM1 (IRQ 4, I/O address 0x3f8) and the
1024 <computeroutput>Location</computeroutput> setting assumes that this
1025 configuration is used on a Windows host, because the Windows named pipe
1026 syntax is used. Keep in mind that on Windows hosts a named pipe must
1027 always start with <computeroutput>\\.\pipe\</computeroutput>. On Linux the
1028 same config settings apply, except that the path name for the
1029 <computeroutput>Location</computeroutput> can be chosen more freely. Local
1030 domain sockets can be placed anywhere, provided the user running
1031 VirtualBox has the permission to create a new file in the directory. The
1032 final command above defines that VirtualBox acts as a server, i.e. it
1033 creates the named pipe itself instead of connecting to an already existing
1034 one.</para>
1035 </sect1>
1036
1037 <sect1 id="changenat">
1038 <title>Fine-tuning the VirtualBox NAT engine</title>
1039
1040 <sect2>
1041 <title>Configuring the address of a NAT network interface</title>
1042
1043 <para>In NAT mode, the guest network interface is assigned to the IPv4
1044 range <computeroutput>10.0.x.0/24</computeroutput> by default where
1045 <computeroutput>x</computeroutput> corresponds to the instance of the
1046 NAT interface +2. So <computeroutput>x</computeroutput> is 2 when there
1047 is only one NAT instance active. In that case the guest is assigned to
1048 the address <computeroutput>10.0.2.15</computeroutput>, the gateway is
1049 set to <computeroutput>10.0.2.2</computeroutput> and the name server can
1050 be found at <computeroutput>10.0.2.3</computeroutput>.</para>
1051
1052 <para>If, for any reason, the NAT network needs to be changed, this can
1053 be achieved with the following command:</para>
1054
1055 <screen>VBoxManage modifyvm "VM name" --natnet1 "192.168/16"</screen>
1056
1057 <para>This command would reserve the network addresses from
1058 <computeroutput>192.168.0.0</computeroutput> to
1059 <computeroutput>192.168.254.254</computeroutput> for the first NAT
1060 network instance of "VM name". The guest IP would be assigned to
1061 <computeroutput>192.168.0.15</computeroutput> and the default gateway
1062 could be found at <computeroutput>192.168.0.2</computeroutput>.</para>
1063 </sect2>
1064
1065 <sect2 id="nat-adv-tftp">
1066 <title>Configuring the boot server (next server) of a NAT network
1067 interface</title>
1068
1069 <para>For network booting in NAT mode, by default VirtualBox uses a
1070 built-in TFTP server at the IP address 10.0.2.3. This default behavior
1071 should work fine for typical remote-booting scenarios. However, it is
1072 possible to change the boot server IP and the location of the boot image
1073 with the following commands: <screen>VBoxManage modifyvm "VM name" --nattftpserver1 10.0.2.2
1074VBoxManage modifyvm "VM name" --nattftpfile1 /srv/tftp/boot/MyPXEBoot.pxe</screen></para>
1075 </sect2>
1076
1077 <sect2 id="nat-adv-settings">
1078 <title>Tuning TCP/IP buffers for NAT</title>
1079
1080 <para>The VirtualBox NAT stack performance is often determined by its
1081 interaction with the host's TCP/IP stack and the size of several buffers
1082 (<computeroutput>SO_RCVBUF</computeroutput> and
1083 <computeroutput>SO_SNDBUF</computeroutput>). For certain setups users
1084 might want to adjust the buffer size for a better performance. This can
1085 by achieved using the following commands (values are in kilobytes and
1086 can range from 8 to 1024): <screen>VBoxManage modifyvm "VM name" --natsettings1 16000,128,128,0,0</screen>
1087 This example illustrates tuning the NAT settings. The first parameter is
1088 the MTU, then the size of the socket's send buffer and the size of the
1089 socket's receive buffer, the initial size of the TCP send window, and
1090 lastly the initial size of the TCP receive window. Note that specifying
1091 zero means fallback to the default value.</para>
1092
1093 <para>Each of these buffers has a default size of 64KB and default MTU
1094 is 1500.</para>
1095 </sect2>
1096
1097 <sect2>
1098 <title>Binding NAT sockets to a specific interface</title>
1099
1100 <para>By default, VirtualBox's NAT engine will route TCP/IP packets
1101 through the default interface assigned by the host's TCP/IP stack. (The
1102 technical reason for this is that the NAT engine uses sockets for
1103 communication.) If, for some reason, you want to change this behavior,
1104 you can tell the NAT engine to bind to a particular IP address instead.
1105 Use the following command: <screen>VBoxManage modifyvm "VM name" --natbindip1 "10.45.0.2"</screen></para>
1106
1107 <para>After this, all outgoing traffic will be sent through the
1108 interface with the IP address 10.45.0.2. Please make sure that this
1109 interface is up and running prior to this assignment.</para>
1110 </sect2>
1111
1112 <sect2 id="nat-adv-dns">
1113 <title>Enabling DNS proxy in NAT mode</title>
1114
1115 <para>The NAT engine by default offers the same DNS servers to the guest
1116 that are configured on the host. In some scenarios, it can be desirable
1117 to hide the DNS server IPs from the guest, for example when this
1118 information can change on the host due to expiring DHCP leases. In this
1119 case, you can tell the NAT engine to act as DNS proxy using the
1120 following command: <screen>VBoxManage modifyvm "VM name" --natdnsproxy1 on</screen></para>
1121 </sect2>
1122
1123 <sect2 id="nat_host_resolver_proxy">
1124 <title>Using the host's resolver as a DNS proxy in NAT mode</title>
1125
1126 <para>For resolving network names, the DHCP server of the NAT engine
1127 offers a list of registered DNS servers of the host. If for some reason
1128 you need to hide this DNS server list and use the host's resolver
1129 settings, thereby forcing the VirtualBox NAT engine to intercept DNS
1130 requests and forward them to host's resolver, use the following command:
1131 <screen>VBoxManage modifyvm "VM name" --natdnshostresolver1 on</screen>
1132 Note that this setting is similar to the DNS proxy mode, however whereas
1133 the proxy mode just forwards DNS requests to the appropriate servers,
1134 the resolver mode will interpret the DNS requests and use the host's DNS
1135 API to query the information and return it to the guest.</para>
1136 </sect2>
1137
1138 <sect2 id="nat-adv-alias">
1139 <title>Configuring aliasing of the NAT engine</title>
1140
1141 <para>By default, the NAT core uses aliasing and uses random ports when
1142 generating an alias for a connection. This works well for the most
1143 protocols like SSH, FTP and so on. Though some protocols might need a
1144 more transparent behavior or may depend on the real port number the
1145 packet was sent from. It is possible to change the NAT mode via the
1146 VBoxManage frontend with the following commands:
1147 <screen>VBoxManage modifyvm "VM name" --nataliasmode1 proxyonly</screen>
1148 and <screen>VBoxManage modifyvm "Linux Guest" --nataliasmode1 sameports</screen>
1149 The first example disables aliasing and switches NAT into transparent
1150 mode, the second example enforces preserving of port values. These modes
1151 can be combined if necessary.</para>
1152 </sect2>
1153 </sect1>
1154
1155 <sect1 id="changedmi">
1156 <title>Configuring the BIOS DMI information</title>
1157
1158 <para>The DMI data VirtualBox provides to guests can be changed for a
1159 specific VM. Use the following commands to configure the DMI BIOS
1160 information:</para>
1161
1162 <screen>VBoxManage setextradata "VM name"
1163 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSVendor" "BIOS Vendor"
1164VBoxManage setextradata "VM name"
1165 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSVersion" "BIOS Version"
1166VBoxManage setextradata "VM name"
1167 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSReleaseDate" "BIOS Release Date"
1168VBoxManage setextradata "VM name"
1169 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSReleaseMajor" 1
1170VBoxManage setextradata "VM name"
1171 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSReleaseMinor" 2
1172VBoxManage setextradata "VM name"
1173 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSFirmwareMajor" 3
1174VBoxManage setextradata "VM name"
1175 "VBoxInternal/Devices/pcbios/0/Config/DmiBIOSFirmwareMinor" 4
1176VBoxManage setextradata "VM name"
1177 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemVendor" "System Vendor"
1178VBoxManage setextradata "VM name"
1179 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemProduct" "System Product"
1180VBoxManage setextradata "VM name"
1181 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemVersion" "System Version"
1182VBoxManage setextradata "VM name"
1183 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemSerial" "System Serial"
1184VBoxManage setextradata "VM name"
1185 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemSKU" "System SKU"
1186VBoxManage setextradata "VM name"
1187 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemFamily" "System Family"
1188VBoxManage setextradata "VM name"
1189 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemUuid"
1190 "9852bf98-b83c-49db-a8de-182c42c7226b"</screen>
1191
1192 <para>If a DMI string is not set, the default value of VirtualBox is used.
1193 To set an empty string use
1194 <computeroutput>"&lt;EMPTY&gt;"</computeroutput>.</para>
1195
1196 <para>Note that in the above list, all quoted parameters (DmiBIOSVendor,
1197 DmiBIOSVersion but not DmiBIOSReleaseMajor) are expected to be strings. If
1198 such a string is a valid number, the parameter is treated as number and
1199 the VM will most probably refuse to start with an
1200 <computeroutput>VERR_CFGM_NOT_STRING</computeroutput> error. In that case,
1201 use <computeroutput>"string:&lt;value&gt;"</computeroutput>, for instance
1202 <screen>VBoxManage setextradata "VM name"
1203 "VBoxInternal/Devices/pcbios/0/Config/DmiSystemSerial" "string:1234"</screen></para>
1204
1205 <para>Changing this information can be necessary to provide the DMI
1206 information of the host to the guest to prevent Windows from asking for a
1207 new product key. On Linux hosts the DMI BIOS information can be obtained
1208 with <screen>dmidecode -t0</screen>and the DMI system information can be
1209 obtained with <screen>dmidecode -t1</screen></para>
1210 </sect1>
1211
1212 <sect1>
1213 <title>Fine-tuning timers and time synchronization</title>
1214
1215 <sect2 id="changetscmode">
1216 <title>Configuring the guest time stamp counter (TSC) to reflect guest
1217 execution</title>
1218
1219 <para>By default, VirtualBox keeps all sources of time visible to the
1220 guest synchronized to a single time source, the monotonic host time.
1221 This reflects the assumptions of many guest operating systems, which
1222 expect all time sources to reflect "wall clock" time. In special
1223 circumstances it may be useful however to make the TSC (time stamp
1224 counter) in the guest reflect the time actually spent executing the
1225 guest.</para>
1226
1227 <para>This special TSC handling mode can be enabled on a per-VM basis,
1228 and for best results must be used only in combination with hardware
1229 virtualization. To enable this mode use the following command:</para>
1230
1231 <screen>VBoxManage setextradata "VM name" "VBoxInternal/TM/TSCTiedToExecution" 1</screen>
1232
1233 <para>To revert to the default TSC handling mode use:</para>
1234
1235 <screen>VBoxManage setextradata "VM name" "VBoxInternal/TM/TSCTiedToExecution"</screen>
1236
1237 <para>Note that if you use the special TSC handling mode with a guest
1238 operating system which is very strict about the consistency of time
1239 sources you may get a warning or error message about the timing
1240 inconsistency. It may also cause clocks to become unreliable with some
1241 guest operating systems depending on they use the TSC.</para>
1242 </sect2>
1243
1244 <sect2 id="warpguest">
1245 <title>Accelerate or slow down the guest clock</title>
1246
1247 <para>For certain purposes it can be useful to accelerate or to slow
1248 down the (virtual) guest clock. This can be achieved as follows:</para>
1249
1250 <screen>VBoxManage setextradata "VM name" "VBoxInternal/TM/WarpDrivePercentage" 200</screen>
1251
1252 <para>The above example will double the speed of the guest clock
1253 while</para>
1254
1255 <screen>VBoxManage setextradata "VM name" "VBoxInternal/TM/WarpDrivePercentage" 50</screen>
1256
1257 <para>will halve the speed of the guest clock. Note that changing the
1258 rate of the virtual clock can confuse the guest and can even lead to
1259 abnormal guest behavior. For instance, a higher clock rate means shorter
1260 timeouts for virtual devices with the result that a slightly increased
1261 response time of a virtual device due to an increased host load can
1262 cause guest failures. Note further that any time synchronization
1263 mechanism will frequently try to resynchronize the guest clock with the
1264 reference clock (which is the host clock if the VirtualBox Guest
1265 Additions are active). Therefore any time synchronization should be
1266 disabled if the rate of the guest clock is changed as described above
1267 (see <xref linkend="changetimesync" />).</para>
1268 </sect2>
1269
1270 <sect2 id="changetimesync">
1271 <title>Tuning the Guest Additions time synchronization
1272 parameters</title>
1273
1274 <para>The VirtualBox Guest Additions ensure that the guest's system time
1275 is synchronized with the host time. There are several parameters which
1276 can be tuned. The parameters can be set for a specific VM using the
1277 following command:</para>
1278
1279 <screen>VBoxManage guestproperty set VM_NAME "/VirtualBox/GuestAdd/VBoxService/PARAMETER" VALUE</screen>
1280
1281 <para>where <computeroutput>PARAMETER</computeroutput> is one of the
1282 following:</para>
1283
1284 <para><glosslist>
1285 <glossentry>
1286 <glossterm><computeroutput>--timesync-interval</computeroutput></glossterm>
1287
1288 <glossdef>
1289 <para>Specifies the interval at which to synchronize the time
1290 with the host. The default is 10000 ms (10 seconds).</para>
1291 </glossdef>
1292 </glossentry>
1293
1294 <glossentry>
1295 <glossterm><computeroutput>--timesync-min-adjust</computeroutput></glossterm>
1296
1297 <glossdef>
1298 <para>The minimum absolute drift value measured in milliseconds
1299 to make adjustments for. The default is 1000 ms on OS/2 and 100
1300 ms elsewhere.</para>
1301 </glossdef>
1302 </glossentry>
1303
1304 <glossentry>
1305 <glossterm><computeroutput>--timesync-latency-factor</computeroutput></glossterm>
1306
1307 <glossdef>
1308 <para>The factor to multiply the time query latency with to
1309 calculate the dynamic minimum adjust time. The default is 8
1310 times, that means in detail: Measure the time it takes to
1311 determine the host time (the guest has to contact the VM host
1312 service which may take some time), multiply this value by 8 and
1313 do an adjustment only if the time difference between host and
1314 guest is bigger than this value. Don't do any time adjustment
1315 otherwise.</para>
1316 </glossdef>
1317 </glossentry>
1318
1319 <glossentry>
1320 <glossterm><computeroutput>--timesync-max-latency</computeroutput></glossterm>
1321
1322 <glossdef>
1323 <para>The max host timer query latency to accept. The default is
1324 250 ms.</para>
1325 </glossdef>
1326 </glossentry>
1327
1328 <glossentry>
1329 <glossterm><computeroutput>--timesync-set-threshold</computeroutput></glossterm>
1330
1331 <glossdef>
1332 <para>The absolute drift threshold, given as milliseconds where
1333 to start setting the time instead of trying to smoothly adjust
1334 it. The default is 20 minutes.</para>
1335 </glossdef>
1336 </glossentry>
1337
1338 <glossentry>
1339 <glossterm><computeroutput>--timesync-set-start</computeroutput></glossterm>
1340
1341 <glossdef>
1342 <para>Set the time when starting the time sync service.</para>
1343 </glossdef>
1344 </glossentry>
1345
1346 <glossentry>
1347 <glossterm><computeroutput>--timesync-set-on-restore
1348 0|1</computeroutput></glossterm>
1349
1350 <glossdef>
1351 <para>Set the time after the VM was restored from a saved state
1352 when passing 1 as parameter (default). Disable by passing 0. In
1353 the latter case, the time will be adjusted smoothly which can
1354 take a long time.</para>
1355 </glossdef>
1356 </glossentry>
1357 </glosslist></para>
1358
1359 <para>All these parameters can be specified as command line parameters
1360 to VBoxService as well.</para>
1361 </sect2>
1362 </sect1>
1363
1364 <sect1 id="vboxbowsolaris11">
1365 <title>Installing the alternate bridged networking driver on Solaris 11
1366 hosts</title>
1367
1368 <para>Starting with VirtualBox 4.1, VirtualBox ships a new network filter
1369 driver that utilizes Solaris 11's Crossbow functionality. By default, this
1370 new driver is installed for Solaris 11 hosts (builds 159 and above) that
1371 has support for it.</para>
1372
1373 <para>To force installation of the older STREAMS based network filter
1374 driver, execute as root execute the below command before installing the
1375 VirtualBox package:</para>
1376
1377 <screen>touch /etc/vboxinst_vboxflt</screen>
1378
1379 <para>To force installation of the Crossbow based network filter
1380 driver, execute as root the below command before installing the VirtualBox
1381 package:</para>
1382
1383 <screen>touch /etc/vboxinst_vboxbow</screen>
1384
1385 <para>To check which driver is currently being used by VirtualBox,
1386 execute:</para>
1387
1388 <screen>modinfo | grep vbox</screen>
1389
1390 <para>If the output contains "vboxbow", it indicates VirtualBox is using
1391 the Crossbow network filter driver, while the name "vboxflt" indicates
1392 usage of the older STREAMS network filter.</para>
1393 </sect1>
1394
1395 <sect1 id="vboxbowvnictemplates">
1396 <title>VirtualBox VNIC templates for VLANs on Solaris 11 hosts</title>
1397
1398 <para>VirtualBox supports VNIC (Virtual Network Interface) templates for
1399 configuring VMs over VLANs.<footnote>
1400 <para>Support for Crossbow based bridged networking was introduced
1401 with VirtualBox 4.1 and requires Solaris 11 build 159 or above.</para>
1402 </footnote> A VirtualBox VNIC template is a VNIC whose name starts with
1403 "vboxvnic_template".</para>
1404
1405 <para>Here is an example of how to use a VNIC template to configure a VLAN
1406 for VMs. Create a VirtualBox VNIC template, by executing as root:</para>
1407
1408 <screen>dladm create-vnic -t -l nge0 -v 23 vboxvnic_template0
1409</screen>
1410
1411 <para>This will create a temporary VNIC over interface "nge0" with the
1412 VLAN ID 23. To create VNIC templates that are persistent across host
1413 reboots, skip the <computeroutput>-t</computeroutput> parameter in the
1414 above command. You may check the current state of links using:</para>
1415
1416 <para><screen>$ dladm show-link
1417LINK CLASS MTU STATE BRIDGE OVER
1418nge0 phys 1500 up -- --
1419nge1 phys 1500 down -- --
1420vboxvnic_template0 vnic 1500 up -- nge0
1421
1422$ dladm show-vnic
1423LINK OVER SPEED MACADDRESS MACADDRTYPE VID
1424vboxvnic_template0 nge0 1000 2:8:20:25:12:75 random 23
1425</screen></para>
1426
1427 <para>Once the VNIC template is created, all VMs that need to be part of
1428 VLAN 23 over the physical interface "nge0" can use the same VNIC template.
1429 This makes managing VMs on VLANs simpler and efficient, as the VLAN
1430 details are not stored as part of every VM's configuration but rather
1431 picked up via the VNIC template which can be modified anytime using
1432 <computeroutput>dladm</computeroutput>. Apart from the VLAN ID, VNIC
1433 templates can be created with additional properties such as bandwidth
1434 limits, CPU fanout etc. Refer to your Solaris network documentation on how
1435 to accomplish this. These additional properties, if any, are also applied
1436 to VMs which use the VNIC template.</para>
1437 </sect1>
1438
1439 <sect1 id="addhostonlysolaris">
1440 <title>Configuring multiple host-only network interfaces on Solaris
1441 hosts</title>
1442
1443 <para>By default VirtualBox provides you with one host-only network
1444 interface. Adding more host-only network interfaces on Solaris hosts
1445 requires manual configuration. Here's how to add two more host-only
1446 network interfaces.</para>
1447
1448 <para>You first need to stop all running VMs and unplumb all existing
1449 "vboxnet" interfaces. Execute the following commands as root:</para>
1450
1451 <screen>ifconfig vboxnet0 unplumb</screen>
1452
1453 <para>Once you make sure all vboxnet interfaces are unplumbed, remove the
1454 driver using:</para>
1455
1456 <para><screen>rem_drv vboxnet</screen>then edit the file
1457 <computeroutput>/platform/i86pc/kernel/drv/vboxnet.conf</computeroutput>
1458 and add a line for the new interfaces:</para>
1459
1460 <para><screen>name="vboxnet" parent="pseudo" instance=1;
1461name="vboxnet" parent="pseudo" instance=2;</screen>Add as many of these lines
1462 as required and make sure "instance" number is uniquely incremented. Next
1463 reload the vboxnet driver using:</para>
1464
1465 <para><screen>add_drv vboxnet</screen>Now plumb all the interfaces using
1466 <computeroutput>ifconfig vboxnetX plumb</computeroutput> (where X can be
1467 0, 1 or 2 in this case) and once plumbed you can then configure the
1468 interface like any other network interface.</para>
1469
1470 <para>To make your newly added interfaces' settings persistent across
1471 reboots you will need to edit the files
1472 <computeroutput>/etc/netmasks</computeroutput>, and if you are using NWAM
1473 <computeroutput>/etc/nwam/llp</computeroutput> and add the appropriate
1474 entries to set the netmask and static IP for each of those interfaces. The
1475 VirtualBox installer only updates these configuration files for the one
1476 "vboxnet0" interface it creates by default.</para>
1477 </sect1>
1478
1479 <sect1 id="solariscodedumper">
1480 <title>Configuring the VirtualBox CoreDumper on Solaris hosts</title>
1481
1482 <para>VirtualBox is capable of producing its own core files when things go
1483 wrong and for more extensive debugging. Currently this is only available
1484 on Solaris hosts.</para>
1485
1486 <para>The VirtualBox CoreDumper can be enabled using the following
1487 command:</para>
1488
1489 <para><screen>VBoxManage setextradata "VM name" VBoxInternal2/CoreDumpEnabled 1</screen></para>
1490
1491 <para>You can specify which directory to use for core dumps with this
1492 command:</para>
1493
1494 <para><screen>VBoxManage setextradata "VM name" VBoxInternal2/CoreDumpDir &lt;path-to-directory&gt;</screen>Make
1495 sure the directory you specify is on a volume with sufficient free space
1496 and that the VirtualBox process has sufficient permissions to write files
1497 to this directory. If you skip this command and don't specify any core
1498 dump directory, the current directory of the VirtualBox executable will be
1499 used (which would most likely fail when writing cores as they are
1500 protected with root permissions). It is recommended you explicity set a
1501 core dump directory.</para>
1502
1503 <para>You must specify when the VirtualBox CoreDumper should be triggered.
1504 This is done using the following commands:</para>
1505
1506 <para><screen>VBoxManage setextradata "VM name" VBoxInternal2/CoreDumpReplaceSystemDump 1
1507VBoxManage setextradata "VM name" VBoxInternal2/CoreDumpLive 1</screen>At
1508 least one of the above two commands will have to be provided if you have
1509 enabled the VirtualBox CoreDumper.</para>
1510
1511 <para>Setting <computeroutput>CoreDumpReplaceSystemDump</computeroutput>
1512 sets up the VM to override the host's core dumping mechanism and in the
1513 event of any crash only the VirtualBox CoreDumper would produce the core
1514 file.</para>
1515
1516 <para>Setting <computeroutput>CoreDumpLive</computeroutput> sets up the VM
1517 to produce cores whenever the VM receives a
1518 <computeroutput>SIGUSR2</computeroutput> signal. After producing the core
1519 file, the VM will not be terminated and will continue to run. You can then
1520 take cores of the VM process using:</para>
1521
1522 <para><screen>kill -s SIGUSR2 &lt;VM-process-id&gt;</screen></para>
1523
1524 <para>Core files produced by the VirtualBox CoreDumper are of the form
1525 <computeroutput>core.vb.&lt;ProcessName&gt;.&lt;ProcessID&gt;</computeroutput>,
1526 e.g.<computeroutput>core.vb.VBoxHeadless.11321</computeroutput>.</para>
1527 </sect1>
1528
1529 <sect1 id="guitweaks">
1530 <title>Locking down the VirtualBox manager GUI</title>
1531
1532 <para>There are several advanced customization settings for locking down
1533 the VirtualBox manager, that is, removing some features that the user
1534 should not see.<screen>VBoxManage setextradata global GUI/Customizations OPTION[,OPTION...]</screen></para>
1535
1536 <para>where <computeroutput>OPTION</computeroutput> is one of the
1537 following keywords:<glosslist>
1538 <glossentry>
1539 <glossterm><computeroutput>noSelector</computeroutput></glossterm>
1540
1541 <glossdef>
1542 <para>Don't allow to start the VirtualBox manager. Trying to do so
1543 will show a window containing a proper error message.</para>
1544 </glossdef>
1545 </glossentry>
1546
1547 <glossentry>
1548 <glossterm><computeroutput>noMenuBar</computeroutput></glossterm>
1549
1550 <glossdef>
1551 <para>VM windows will not contain a menu bar.</para>
1552 </glossdef>
1553 </glossentry>
1554
1555 <glossentry>
1556 <glossterm><computeroutput>noStatusBar</computeroutput></glossterm>
1557
1558 <glossdef>
1559 <para>VM windows will not contain a status bar.</para>
1560 </glossdef>
1561 </glossentry>
1562 </glosslist></para>
1563
1564 <para>To disable any GUI customization do <screen>VBoxManage setextradata global GUI/Customizations</screen></para>
1565
1566 <para>To disable all host key combinations, open the preferences and
1567 change the host key to <emphasis>None</emphasis>. This might be useful
1568 when using VirtualBox in a kiosk mode.</para>
1569
1570 <para>Furthermore, you can disallow certain actions when terminating a VM.
1571 To disallow specific actions, type:</para>
1572
1573 <para><screen>VBoxManage setextradata "VM name" GUI/RestrictedCloseActions OPTION[,OPTION...]</screen></para>
1574
1575 <para>where <computeroutput>OPTION</computeroutput> is one of the
1576 following keywords:<glosslist>
1577 <glossentry>
1578 <glossterm><computeroutput>SaveState</computeroutput></glossterm>
1579
1580 <glossdef>
1581 <para>Don't allow the user to save the VM state when terminating
1582 the VM.</para>
1583 </glossdef>
1584 </glossentry>
1585
1586 <glossentry>
1587 <glossterm><computeroutput>Shutdown</computeroutput></glossterm>
1588
1589 <glossdef>
1590 <para>Don't allow the user to shutdown the VM by sending the ACPI
1591 power-off event to the guest.</para>
1592 </glossdef>
1593 </glossentry>
1594
1595 <glossentry>
1596 <glossterm><computeroutput>PowerOff</computeroutput></glossterm>
1597
1598 <glossdef>
1599 <para>Don't allow the user to power off the VM.</para>
1600 </glossdef>
1601 </glossentry>
1602
1603 <glossentry>
1604 <glossterm><computeroutput>Restore</computeroutput></glossterm>
1605
1606 <glossdef>
1607 <para>Don't allow the user to return to the last snapshot when
1608 powering off the VM.</para>
1609 </glossdef>
1610 </glossentry>
1611 </glosslist></para>
1612
1613 <para>Any combination of the above is allowed. If all options are
1614 specified, the VM cannot be shut down at all.</para>
1615 </sect1>
1616
1617 <sect1 id="vboxwebsrv-daemon">
1618 <title>Starting the VirtualBox web service automatically</title>
1619
1620 <para>The VirtualBox web service
1621 (<computeroutput>vboxwebsrv</computeroutput>) is used for controlling
1622 VirtualBox remotely. It is documented in detail in the VirtualBox Software
1623 Development Kit (SDK); please see <xref linkend="VirtualBoxAPI" />. As the
1624 client base using this interface is growing, we added start scripts for
1625 the various operation systems we support. The following describes how to
1626 use them. <itemizedlist>
1627 <listitem>
1628 <para>On Mac OS X, launchd is used. An example configuration file
1629 can be found in
1630 <computeroutput>$HOME/Library/LaunchAgents/org.virtualbox.vboxwebsrv.plist</computeroutput>.
1631 It can be enabled by changing the
1632 <computeroutput>Disabled</computeroutput> key from
1633 <computeroutput>true</computeroutput> to
1634 <computeroutput>false</computeroutput>. To manually start the
1635 service use the following command:
1636 <screen>launchctl load ~/Library/LaunchAgents/org.virtualbox.vboxwebsrv.plist</screen>
1637 For additional information on how launchd services could be
1638 configured see <literal><ulink
1639 url="http://developer.apple.com/mac/library/documentation/MacOSX/Conceptual/BPSystemStartup/BPSystemStartup.html">http://developer.apple.com/mac/library/documentation/MacOSX/Conceptual/BPSystemStartup/BPSystemStartup.html</ulink></literal>.</para>
1640 </listitem>
1641 </itemizedlist></para>
1642 </sect1>
1643
1644 <sect1 id="vboxballoonctrl">
1645 <title>Memory Ballooning Service</title>
1646
1647 <para>Starting with VirtualBox 4.0.8 a new host executable called
1648 <computeroutput>VBoxBalloonCtrl</computeroutput> is available to
1649 automatically take care of a VM's configured memory balloon
1650 (see <xref linkend="guestadd-balloon" /> for an introduction to memory
1651 ballooning). This is especially useful for server environments where
1652 VMs may dynamically require more or less memory during runtime.</para>
1653
1654 <para>VBoxBalloonCtrl periodically checks a VM's current memory balloon
1655 and its free guest RAM and automatically adjusts the current memory
1656 balloon by inflating or deflating it accordingly. This handling only
1657 applies to running VMs having recent Guest Additions installed.</para>
1658
1659 <para>To set up VBoxBalloonCtrl and adjust the maximum ballooning size a
1660 VM can reach the following parameters will be checked in the following
1661 order:
1662 <itemizedlist>
1663 <listitem>specified via VBoxBalloonCtrl command line parameter
1664 <computeroutput>--balloon-max</computeroutput></listitem>
1665 <listitem>per-VM parameter using
1666 <screen>VBoxManage setextradata "VM-Name" VBoxInternal/Guest/BalloonSizeMax &lt;Size in MB&gt;</screen></listitem>
1667 <listitem>global parameter for all VMs using
1668 <screen>VBoxManage setextradata global VBoxInternal/Guest/BalloonSizeMax &lt;Size in MB&gt;</screen></listitem>
1669 </itemizedlist>
1670 <note>
1671 <para>If no maximum ballooning size is specified by at least one of the
1672 parameters above, no ballooning will be performed at all.</para>
1673 </note>
1674 </para>
1675
1676 <para>For more options and parameters check the built-in command line help
1677 accessible with <computeroutput>--help</computeroutput>.</para>
1678 </sect1>
1679
1680 <sect1 id="autostart">
1681 <title>Starting virtual machines during system boot</title>
1682
1683 <para>Starting with VirtualBox 4.2.0 it is possible to start VMs automatically during
1684 system boot on Linux and Mac OS X for all users. </para>
1685
1686 <sect2 id="autostart-linux">
1687 <title>Linux: starting the autostart service via <computeroutput>init</computeroutput></title>
1688
1689 <para>On Linux, the autostart service is activated by setting two variables in
1690 <computeroutput>/etc/default/virtualbox</computeroutput>.
1691 The first one is <computeroutput>VBOXAUTOSTART_DB</computeroutput> which
1692 contains an absolute path to the autostart database directory.
1693 The directory should have write access for every user who should be able to
1694 start virtual machines automatically. Furthermore the directory should have the
1695 sticky bit set.
1696 The second variable is <computeroutput>VBOXAUTOSTART_CONFIG</computeroutput>
1697 which points the service to the autostart configuration file which is used
1698 during boot to determine whether to allow individual users to start a VM
1699 automatically and configure startup delays.
1700 The config file can be placed in <computeroutput>/etc/vbox</computeroutput>
1701 and contains several options. One is <computeroutput>default_policy</computeroutput>
1702 which controls whether the autostart service allows or denies to start a VM
1703 for users which are not in the exception list.
1704 The exception list starts with <computeroutput>exception_list</computeroutput>
1705 and contains a comma seperated list with usernames. Furthermore a separate
1706 startup delay can be configured for every user to avoid overloading the host.
1707 A sample configuration is given below:</para>
1708
1709 <para><screen>
1710# Default policy is to deny starting a VM, the other option is "allow".
1711default_policy = deny
1712# Users which are allowed are given below.
1713# If the default policy is to allow starting a VM is not allowed for the users below.
1714exception_list = bob, alice, joe
1715
1716bob = 30 # Bobs machines will be started 30 seconds after the autostart service started
1717alice = 180 # Alice machines will be started 180 seconds after the autostart service started
1718joe = 240 # Joes machines will be started 240 seconds after the autostart service started
1719 </screen></para>
1720
1721 <para>Every user who wants to enable autostart for individual machines
1722 has to set the path to the autostart database directory with
1723 <screen>VBoxManage setproperty autostartdbpath &lt;Autostart directory&gt;</screen>
1724 </para>
1725 </sect2>
1726
1727 <sect2 id="autostart-solaris">
1728 <title>Solaris: starting the autostart service via SMF</title>
1729
1730 <para>On Solaris hosts, the VirtualBox autostart daemon is
1731 integrated into the SMF framework. To enable it you have to point the service
1732 to an existing configuration file which has the same format as on Linux (see <xref linkend="autostart-linux" />):
1733 <screen>svccfg -s svc:/application/virtualbox/autostart:default setprop config/config=/etc/vbox/autostart.cfg</screen>
1734 </para>
1735
1736 <para>When everything is configured correctly you can start the
1737 VirtualBox autostart service with the following command:<screen>svcadm enable svc:/application/virtualbox/autostart:default</screen></para>
1738
1739 <para>For more information about SMF, please refer to the Solaris
1740 documentation.</para>
1741 </sect2>
1742
1743 <sect2 id="autostart-osx">
1744 <title>Mac OS X: starting the autostart service via launchd</title>
1745
1746 <para>On Mac OS X, launchd is used to start the VirtualBox autostart service. An
1747 example configuration file can be found in
1748 <computeroutput>/Applications/VirtualBox.app/Contents/MacOS/org.virtualbox.vboxautostart.plist</computeroutput>.
1749 To enable the service copy the file to <computeroutput>/Library/LaunchDaemons</computeroutput> and change the
1750 <computeroutput>Disabled</computeroutput> key from
1751 <computeroutput>true</computeroutput> to
1752 <computeroutput>false</computeroutput>. Furthermore replace the second parameter
1753 to an existing configuration file which has the same format as on Linux (see <xref linkend="autostart-linux" />).
1754 To manually start the service use the following command:
1755 <screen>launchctl load /Library/LaunchDaemons/org.virtualbox.vboxautostart.plist</screen>
1756 For additional information on how launchd services could be
1757 configured see <literal><ulink
1758 url="http://developer.apple.com/mac/library/documentation/MacOSX/Conceptual/BPSystemStartup/BPSystemStartup.html">http://developer.apple.com/mac/library/documentation/MacOSX/Conceptual/BPSystemStartup/BPSystemStartup.html</ulink></literal>.</para>
1759 </sect2>
1760 </sect1>
1761</chapter>
注意: 瀏覽 TracBrowser 來幫助您使用儲存庫瀏覽器

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette