VirtualBox UserManual
VirtualBox UserManual
VirtualBox R
User Manual
Version 3.2.8
c 2004-2010 Oracle Corporation
http://www.virtualbox.org
Contents
1 First steps 10
1.1 Why is virtualization useful? . . . . . . . . . . . . . . . . . . . . . . . . 11
1.2 Some terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
1.3 Features overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.4 Supported host operating systems . . . . . . . . . . . . . . . . . . . . . 15
1.5 Installing and starting VirtualBox . . . . . . . . . . . . . . . . . . . . . . 16
1.6 Creating your first virtual machine . . . . . . . . . . . . . . . . . . . . . 18
1.7 Running your virtual machine . . . . . . . . . . . . . . . . . . . . . . . . 22
1.7.1 Keyboard and mouse support in virtual machines . . . . . . . . . 22
1.7.2 Changing removable media . . . . . . . . . . . . . . . . . . . . . 25
1.7.3 Saving the state of the machine . . . . . . . . . . . . . . . . . . 25
1.8 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
1.9 Virtual machine configuration . . . . . . . . . . . . . . . . . . . . . . . . 29
1.10 Deleting virtual machines . . . . . . . . . . . . . . . . . . . . . . . . . . 30
1.11 Importing and exporting virtual machines . . . . . . . . . . . . . . . . . 30
1.12 Alternative front-ends . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2 Installation details 34
2.1 Installing on Windows hosts . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.1.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.1.2 Performing the installation . . . . . . . . . . . . . . . . . . . . . 34
2.1.3 Uninstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.1.4 Unattended installation . . . . . . . . . . . . . . . . . . . . . . . 36
2.2 Installing on Mac OS X hosts . . . . . . . . . . . . . . . . . . . . . . . . 36
2.2.1 Performing the installation . . . . . . . . . . . . . . . . . . . . . 36
2.2.2 Uninstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.2.3 Unattended installation . . . . . . . . . . . . . . . . . . . . . . . 36
2.3 Installing on Linux hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.3.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.3.2 The VirtualBox kernel module . . . . . . . . . . . . . . . . . . . 37
2.3.3 USB and advanced networking support . . . . . . . . . . . . . . 38
2.3.4 Performing the installation . . . . . . . . . . . . . . . . . . . . . 38
2.3.5 Starting VirtualBox on Linux . . . . . . . . . . . . . . . . . . . . 44
2.4 Installing on Solaris hosts . . . . . . . . . . . . . . . . . . . . . . . . . . 44
2.4.1 Performing the installation . . . . . . . . . . . . . . . . . . . . . 44
2.4.2 Starting VirtualBox on Solaris . . . . . . . . . . . . . . . . . . . 45
2.4.3 Uninstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2
Contents
4 Guest Additions 64
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
4.2 Installing and Maintaining Guest Additions . . . . . . . . . . . . . . . . 66
4.2.1 Guest Additions for Windows . . . . . . . . . . . . . . . . . . . . 66
4.2.2 Guest Additions for Linux . . . . . . . . . . . . . . . . . . . . . . 69
4.2.3 Guest Additions for Solaris . . . . . . . . . . . . . . . . . . . . . 75
4.2.4 Guest Additions for OS/2 . . . . . . . . . . . . . . . . . . . . . . 76
4.3 Shared folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
4.4 Seamless windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
4.5 Hardware-accelerated graphics . . . . . . . . . . . . . . . . . . . . . . . 79
4.5.1 Hardware 3D acceleration (OpenGL and Direct3D 8/9) . . . . . 79
4.5.2 Hardware 2D video acceleration for Windows guests . . . . . . . 81
4.6 Guest properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
4.7 Guest control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
4.8 Memory ballooning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
4.9 Page Fusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
3
Contents
5 Virtual storage 87
5.1 Hard disk controllers: IDE, SATA (AHCI), SCSI, SAS . . . . . . . . . . . 87
5.2 Disk image files (VDI, VMDK, VHD, HDD) . . . . . . . . . . . . . . . . . 90
5.3 The Virtual Media Manager . . . . . . . . . . . . . . . . . . . . . . . . . 91
5.4 Special image write modes . . . . . . . . . . . . . . . . . . . . . . . . . 93
5.5 Differencing images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.6 Cloning disk images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
5.7 Disk images and I/O caching . . . . . . . . . . . . . . . . . . . . . . . . 98
5.8 CD/DVD drive operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
5.9 Writing CDs and DVDs using the host drive . . . . . . . . . . . . . . . . 100
5.10 iSCSI servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
5.10.1 Access iSCSI targets via Internal Networking . . . . . . . . . . . 101
8 VBoxManage 121
8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
8.2 Commands overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
8.3 VBoxManage list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
8.4 VBoxManage showvminfo . . . . . . . . . . . . . . . . . . . . . . . . . . 129
8.5 VBoxManage registervm / unregistervm . . . . . . . . . . . . . . . . . . 131
8.6 VBoxManage createvm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
8.7 VBoxManage modifyvm . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
4
Contents
5
Contents
12 Troubleshooting 193
12.1 Procedures and tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
12.1.1 Categorizing and isolating problems . . . . . . . . . . . . . . . . 193
12.1.2 Collecting debugging information . . . . . . . . . . . . . . . . . 194
12.1.3 The built-in VM debugger . . . . . . . . . . . . . . . . . . . . . . 195
12.2 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
12.2.1 Guest shows IDE/SATA errors for file-based images on slow host
file system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
12.2.2 Responding to guest IDE/SATA flush requests . . . . . . . . . . . 198
12.3 Windows guests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
6
Contents
7
Contents
8
Contents
Glossary 308
9
1 First steps
Welcome to Oracle VM VirtualBox!
VirtualBox is a cross-platform virtualization application. What does that mean? For
one thing, it installs on your existing Intel or AMD-based computers, whether they are
running Windows, Mac, Linux or Solaris operating systems. Secondly, it extends the
capabilities of your existing computer so that it can run multiple operating systems
(inside multiple virtual machines) at the same time. So, for example, you can run
Windows and Linux on your Mac, run Windows Server 2008 on your Linux server, run
Linux on your Windows PC, and so on, all alongside your existing applications. You
can install and run as many virtual machines as you like – the only practical limits are
disk space and memory.
VirtualBox is deceptively simple yet also very powerful. It can run everywhere from
small embedded systems or desktop class machines all the way up to datacenter de-
ployments and even Cloud environments.
The following screenshot shows you how VirtualBox, installed on a Linux machine,
is running Windows 7 in a virtual machine window:
In this User Manual, we’ll begin simply with a quick introduction to virtualization
and how to get your first virtual machine running with the easy-to-use VirtualBox
graphical user interface. Subsequent chapters will go into much more detail covering
more powerful tools and features, but fortunately, it is not necessary to read the entire
User Manual before you can use VirtualBox.
10
1 First steps
You can find a summary of VirtualBox’s capabilities in chapter 1.3, Features overview,
page 13. For existing VirtualBox users who just want to see what’s new in this release,
there is a detailed list in chapter 14, Change log, page 213.
• Operating system support. With VirtualBox, one can run software written for
one operating system on another (for example, Windows software on Linux or
a Mac) without having to reboot to use it. Since you can configure what kinds
of hardware should be presented to each virtual machine, you can even install
an old operating system such as DOS or OS/2 in a virtual machine if your real
computer’s hardware is no longer supported by that operating system.
• Testing and disaster recovery. Once installed, a virtual machine and its virtual
hard disks can be considered a “container” that can be arbitrarily frozen, woken
up, copied, backed up, and transported between hosts.
On top of that, with the use of another VirtualBox feature called “snapshots”,
one can save a particular state of a virtual machine and revert back to that state,
if necessary. This way, one can freely experiment with a computing environment.
If something goes wrong (e.g. after installing misbehaving software or infecting
the guest with a virus), one can easily switch back to a previous snapshot and
avoid the need of frequent backups and restores.
Any number of snapshots can be created, allowing you to travel back and for-
ward in virtual machine time. You can delete snapshots while a VM is running
to reclaim disk space.
• Infrastructure consolidation. Virtualization can significantly reduce hardware
and electricity costs. Servers today typically run with fairly low average system
loads and are rarely used to their full potential. A lot of hardware potential as
well as electricity is thereby wasted. So, instead of running many such physical
computers that are only partially used, one can pack many virtual machines onto
a few powerful hosts and balance the loads between them.
With VirtualBox, you can even run virtual machines as mere servers for the
VirtualBox Remote Desktop Protocol (VRDP), with full client USB support. This
allows for consolidating the desktop machines in an enterprise on just a few RDP
servers, while the actual clients only have to be capable of displaying VRDP data.
• Easier software installations. Virtual machines can be used by software ven-
dors to ship entire software configurations. For example, installing a complete
mail server solution on a real machine can be a tedious task. With virtualization
it becomes possible to ship an entire software solution, possibly consisting of
many different components, in a virtual machine, which is then often called an
11
1 First steps
Host operating system (host OS): the operating system of the physical computer
on which VirtualBox was installed. There are versions of VirtualBox for Win-
dows, Mac OS X, Linux and Solaris hosts; for details, please see chapter 1.4,
Supported host operating systems, page 15. While the various VirtualBox versions
are usually discussed together in this document, there may be platform-specific
differences which we will point out where appropriate.
Guest operating system (guest OS): the operating system that is running inside
the virtual machine. Theoretically, VirtualBox can run any x86 operating sys-
tem (DOS, Windows, OS/2, FreeBSD, OpenBSD), but to achieve near-native
performance of the guest code on your machine, we had to go through a lot
of optimizations that are specific to certain operating systems. So while your
favorite operating system may run as a guest, we officially support and optimize
for a select few (which, however, include the most common ones).
See chapter 3.1, Supported guest operating systems, page 47 for details.
Virtual machine (VM). When running, a VM is the special environment that
VirtualBox creates for your guest operating system. So, in other words, you
run your guest operating system “in” a VM. Normally, a VM will be shown as
a window on your computer’s desktop, but depending on which of the vari-
ous frontends of VirtualBox you use, it can be displayed in full-screen mode or
remotely by use of the VirtualBox Remote Desktop Protocol (VRDP).
Sometimes we also use the term “virtual machine” in a more abstract way. Inter-
nally, VirtualBox thinks of a VM as a set of parameters that determine its behav-
ior. They include hardware settings (how much memory the VM should have,
what hard disks VirtualBox should virtualize through which container files, what
CDs are mounted etc.) as well as state information (whether the VM is currently
running, saved, its snapshots etc.).
These settings are mirrored in the VirtualBox graphical user interface as well as
the VBoxManage command line program; see chapter 8, VBoxManage, page 121.
In other words, a VM is also what you can see in its settings dialog.
Guest Additions. With “Guest Additions”, we refer to special software packages that
are shipped with VirtualBox. Even though they are part of VirtualBox, they are
designed to be installed inside a VM to improve performance of the guest OS and
12
1 First steps
• Portability. VirtualBox runs on a large number of 32-bit and 64-bit host oper-
ating systems (again, see chapter 1.4, Supported host operating systems, page 15
for details).
VirtualBox is a so-called “hosted” hypervisor (sometimes referred to as a “type 2”
hypervisor). Whereas a “bare-metal” or “type 1” hypervisor would run directly on
the hardware, VirtualBox requires an existing operating system to be installed.
It can thus run alongside existing applications on that host.
To a very large degree, VirtualBox is functionally identical on all of the host
platforms, and the same file and image formats are used. This allows you to
run virtual machines created on one host on another host with a different host
operating system; for example, you can create a virtual machine on Windows
and then run it under Linux.
In addition, virtual machines can easily be imported and exported using the
Open Virtualization Format (OVF, see chapter 1.11, Importing and exporting vir-
tual machines, page 30), an industry standard created for this purpose. You can
even import OVFs that were created with a different virtualization software.
• No hardware virtualization required. For many scenarios, VirtualBox does
not require the processor features built into newer hardware like Intel VT-x or
AMD-V. As opposed to many other virtualization solutions, you can therefore use
VirtualBox even on older hardware where these features are not present. More
details can be found in chapter 10.2, Hardware vs. software virtualization, page
185.
13
1 First steps
14
1 First steps
in the VirtualBox graphical user interface and then control that machine from the
command line, or even remotely. See chapter 1.12, Alternative front-ends, page
33 for details.
Due to its modular architecture, VirtualBox can also expose its full functionality
and configurability through a comprehensive software development kit (SDK),
which allows for integrating every aspect of VirtualBox with other software sys-
tems. Please see chapter 11, VirtualBox programming interfaces, page 192 for
details.
• Remote machine display. You can run any virtual machine in a special
VirtualBox program that acts as a server for the VirtualBox Remote Desktop Pro-
tocol (VRDP), a backward-compatible extension of the standard Remote Desk-
top Protocol. With this unique feature, VirtualBox provides high-performance
remote access to any virtual machine.
VirtualBox’s VRDP support does not rely on the RDP server that is built into
Microsoft Windows. Instead, a custom VRDP server has been built directly into
the virtualization layer. As a result, it works with any operating system (even
in text mode) and does not require application support in the virtual machine
either.
VRDP support is described in detail in chapter 7.1, Remote display (VRDP sup-
port), page 112.
On top of this special capacity, VirtualBox offers you more unique features:
– Extensible RDP authentication. VirtualBox already supports Winlogon
on Windows and PAM on Linux for RDP authentication. In addition, it
includes an easy-to-use SDK which allows you to create arbitrary interfaces
for other methods of authentication; see chapter 9.6.3, Custom external
VRDP authentication, page 169 for details.
– USB over RDP. Via RDP virtual channel support, VirtualBox also allows
you to connect arbitrary USB devices locally to a virtual machine which is
running remotely on a VirtualBox RDP server; see chapter 7.1.4, Remote
USB, page 116 for details.
• Windows hosts:
– Windows XP, all service packs (32-bit)
– Windows Server 2003 (32-bit)
– Windows Vista (32-bit and 64-bit1 ).
1 Support for 64-bit Windows was added with VirtualBox 1.5.
15
1 First steps
16
1 First steps
to chapter 2, Installation details, page 34 for details about the various installation
methods.
After installation, you can start VirtualBox as follows:
• On a Windows host, in the standard “Programs” menu, click on the item in the
“VirtualBox” group. On Vista or Windows 7, you can also type “VirtualBox” in
the search box of the “Start” menu.
When you start VirtualBox for the first time, a window like the following should
come up:
On the left, you can see a pane that will later list all your virtual machines. Since
you have not created any, the list is empty. A row of buttons above it allows you to
create new VMs and work on existing VMs, once you have some. The pane on the
right displays the properties of the virtual machine currently selected, if any. Again,
since you don’t have any machines yet, the pane displays a welcome message.
To give you an idea what VirtualBox might look like later, after you have created
many machines, here’s another example:
17
1 First steps
On the following pages, the wizard will ask you for the bare minimum of information
that is needed to create a VM, in particular:
18
1 First steps
1. A name for your VM, and the type of operating system (OS) you want to install.
The name is what you will later see in the VirtualBox main window, and what
your settings will be stored under. It is purely informational, but once you have
created a few VMs, you will appreciate if you have given your VMs informative
names. “My VM” probably is therefore not as useful as “Windows XP SP2”.
For “Operating System Type”, select the operating system that you want to install
later. Depending on your selection, VirtualBox will enable or disable certain
VM settings that your guest operating system may require. This is particularly
important for 64-bit guests (see chapter 3.1.2, 64-bit guests, page 49). It is
therefore recommended to always set it to the correct value.
2. The amount of memory (RAM) that the virtual machine should have for itself.
Every time a virtual machine is started, VirtualBox will allocate this much mem-
ory from your host machine and present it to the guest operating system, which
will report this size as the (virtual) computer’s installed RAM.
Note: Choose this setting carefully! The memory you give to the VM will
not be available to your host OS while the VM is running, so do not specify
more than you can spare. For example, if your host machine has 1 GB of
RAM and you enter 512 MB as the amount of RAM for a particular virtual
machine, while that VM is running, you will only have 512 MB left for all the
other software on your host. If you run two VMs at the same time, even more
memory will be allocated for the second VM (which may not even be able to
start if that memory is not available). On the other hand, you should specify
as much as your guest OS (and your applications) will require to run properly.
A Windows XP guest will require at least a few hundred MB RAM to run properly,
and Windows Vista will even refuse to install with less than 512 MB. Of course,
if you want to run graphics-intensive applications in your VM, you may require
even more RAM.
So, as a rule of thumb, if you have 1 GB of RAM or more in your host computer,
it is usually safe to allocate 512 MB to each VM. But, in any case, make sure you
always have at least 256 to 512 MB of RAM left on your host operating system.
Otherwise you may cause your host OS to excessively swap out memory to your
hard disk, effectively bringing your host system to a standstill.
As with the other settings, you can change this setting later, after you have cre-
ated the VM.
19
1 First steps
3. Next, you must specify a virtual hard disk for your VM.
There are many and potentially complicated ways in which VirtualBox can pro-
vide hard disk space to a VM (see chapter 5, Virtual storage, page 87 for details),
but the most common way is to use a large image file on your “real” hard disk,
whose contents VirtualBox presents to your VM as if it were a complete hard
disk.
The wizard shows you the following window:
The wizard allows you to create an image file or use an existing one. Note also
that the disk images can be separated from a particular VM, so even if you delete
a VM, you can keep the image, or copy it to another host and create a new VM
for it there.
In the wizard, you have the following options:
• If you have previously created any virtual hard disks which have not been
attached to other virtual machines, you can select those from the drop-
down list in the wizard window.
• Otherwise, to create a new virtual hard disk, press the “New” button.
• Finally, for more complicated operations with virtual disks, the “Existing...“
button will bring up the Virtual Media Manager, which is described in more
detail in chapter 5.3, The Virtual Media Manager, page 91.
Most probably, if you are using VirtualBox for the first time, you will want to
create a new disk image. Hence, press the “New” button.
This brings up another window, the “Create New Virtual Disk Wizard”.
VirtualBox supports two types of image files:
20
1 First steps
• A dynamically expanding file will only grow in size when the guest actu-
ally stores data on its virtual hard disk. It will therefore initially be small
on the host hard drive and only later grow to the size specified as it is filled
with data.
• A fixed-size file will immediately occupy the file specified, even if only a
fraction of the virtual hard disk space is actually in use. While occupying
much more space, a fixed-size file incurs less overhead and is therefore
slightly faster than a dynamically expanding file.
For details about the differences, please refer to chapter 5.2, Disk image files
(VDI, VMDK, VHD, HDD), page 90.
To prevent your physical hard disk from running full, VirtualBox limits the size
of the image file. Still, it needs to be large enough to hold the contents of
your operating system and the applications you want to install – for a modern
Windows or Linux guest, you will probably need several gigabytes for any serious
use:
After having selected or created your image file, again press “Next” to go to the
next page.
4. After clicking on “Finish”, your new virtual machine will be created. You will
then see it in the list on the left side of the main window, with the name you
have entered.
21
1 First steps
22
1 First steps
As this behavior can be inconvenient, VirtualBox provides a set of tools and device
drivers for guest systems called the “VirtualBox Guest Additions” which make VM key-
board and mouse operation a lot more seamless. Most importantly, the Additions will
23
1 First steps
get rid of the second “guest” mouse pointer and make your host mouse pointer work
directly in the guest.
This will be described later in chapter 4, Guest Additions, page 64.
• Host operating systems reserve certain key combinations for themselves. For
example, it is impossible to enter the Ctrl+Alt+Delete combination if you want
to reboot the guest operating system in your virtual machine, because this key
combination is usually hard-wired into the host OS (both Windows and Linux
intercept this), and pressing this key combination will therefore reboot your host.
Also, on Linux and Solairs hosts, which use the X Window System, the key com-
bination Ctrl+Alt+Backspace normally resets the X server (to restart the entire
graphical user interface in case it got stuck). As the X server intercepts this com-
bination, pressing it will usually restart your host graphical user interface (and
kill all running programs, including VirtualBox, in the process).
Third, on Linux hosts supporting virtual terminals, the key combination
Ctrl+Alt+Fx (where Fx is one of the function keys from F1 to F12) normally
allows to switch between virtual terminals. As with Ctrl+Alt+Delete, these
combinations are intercepted by the host operating system and therefore always
switch terminals on the host.
If, instead, you want to send these key combinations to the guest operating sys-
tem in the virtual machine, you will need to use one of the following methods:
– Use the items in the “Machine” menu of the virtual machine window. There
you will find “Insert Ctrl+Alt+Delete” and “Ctrl+Alt+Backspace”; the lat-
ter will only have an effect with Linux or Solaris guests, however.
– Press special key combinations with the Host key (normally the right Con-
trol key), which VirtualBox will then translate for the virtual machine:
∗ Host key + Del to send Ctrl+Alt+Del (to reboot the guest);
∗ Host key + Backspace to send Ctrl+Alt+Backspace (to restart the
graphical user interface of a Linux or Solaris guest);
∗ Host key + F1 (or other function keys) to simulate Ctrl+Alt+F1 (or
other function keys, i.e. to switch between virtual terminals in a Linux
guest).
• For some other keyboard combinations such as Alt-Tab (to switch between open
windows), VirtualBox allows you to configure whether these combinations will
affect the host or the guest, if a virtual machine currently has the focus. This
24
1 First steps
is a global setting for all virtual machines and can be found under “File” ->
“Preferences” -> “Input” -> “Auto-capture keyboard”.
25
1 First steps
• Send the shutdown signal. This will send an ACPI shutdown signal to the vir-
tual machine, which has the same effect as if you had pressed the power button
on a real computer. So long as a fairly modern operating system is installed and
running in the VM, this should trigger a proper shutdown mechanism in the VM.
• Power off the machine: With this option, VirtualBox also stops running the
virtual machine, but without saving its state.
This is equivalent to pulling the power plug on a real computer without shutting
it down properly. If you start the machine again after powering it off, your
operating system will have to reboot completely and may begin a lengthy check
of its (virtual) system disks.
As a result, this should not normally be done, since it can potentially cause data
loss or an inconsistent state of the guest system on disk.
As an exception, if your virtual machine has any snapshots (see the next chapter),
you can use this option to quickly restore the current snapshot of the virtual
machine. Only in that case, powering off the machine is not harmful.
The “Discard” button in the main VirtualBox window discards a virtual machine’s
saved state. This has the same effect as powering it off, and the same warnings apply.
1.8 Snapshots
With snapshots, you can save a particular state of a virtual machine for later use. At
any later time, you can revert to that state, even though you may have changed the
VM considerably since then.
You can see the snapshots of a virtual machine by first selecting a machine from
the list on the left of the VirtualBox main window and then selecting the “Snapshots”
tab on the right. Initially, until you take a snapshot of the machine, that list is empty
except for the “Current state” item, which represents the “Now” point in the lifetime
of the virtual machine.
There are three operations related to snapshots:
26
1 First steps
In any case, a window will pop up and ask you for a snapshot name. This
name is purely for reference purposes to help you remember the state of the
snapshot. For example, a useful name would be “Fresh installation from scratch,
no external drivers”. You can also add a longer text in the “Description” field if
you want.
Your new snapshot will then appear in the list of snapshots under the “Snapshots”
tab. Underneath, you will see an item called “Current state”, signifying that the
current state of your VM is a variation based on the snapshot you took earlier.
If you later take another snapshot, you will see that they will be displayed in
sequence, and each subsequent snapshot is a derivation of the earlier one:
VirtualBox allows you to take an unlimited number of snapshots – the only limi-
tation is the size of your disks. Keep in mind that each snapshot stores the state
of the virtual machine and thus takes some disk space.
2. You can restore a snapshot by right-clicking on any snapshot you have taken in
the list of snapshots. By restoring a snapshot, you go back (or forward) in time:
the current state of the machine is lost, and the machine is restored to exactly
the same state as it was when then snapshot was taken.5
5 Both the terminology and the functionality of restoring snapshots has changed with VirtualBox 3.1. Before
that version, it was only possible to go back to the very last snapshot taken – not earlier ones, and the
operation was called “Discard current state” instead of “Restore last snapshot”. The limitation has been
lifted with version 3.1. It is now possible to restore any snapshot, going backward and forward in time.
27
1 First steps
Note: Restoring a snapshot will affect the virtual hard drives that are con-
nected to your VM, as the entire state of the virtual hard drive will be reverted
as well. This means also that all files that have been created since the snap-
shot and all other file changes will be lost. In order to prevent such data loss
while still making use of the snapshot feature, it is possible to add a second
hard drive in “write-through” mode using the VBoxManage interface and use
it to store your data. As write-through hard drives are not included in snap-
shots, they remain unaltered when a machine is reverted. See chapter 5.4,
Special image write modes, page 93 for details.
By restoring an earlier snapshot and taking more snapshots from there, it is even
possible to create a kind of alternate reality and to switch between these different
histories of the virtual machine. This can result in a whole tree of virtual machine
snapshots, as shown in the screenshot above.
3. You can also delete a snapshot, which will not affect the state of the virtual
machine, but only release the files on disk that VirtualBox used to store the
snapshot data, thus freeing disk space. To delete a snapshot, right-click on it in
the snapshots tree and select “Delete”. As of VirtualBox 3.2, snapshots can be
deleted even while a machine is running.
Note: Whereas taking and restoring snapshots are fairly quick operations,
deleting a snapshot can take a considerable amount of time since large
amounts of data may need to be copied between several disk image files.
Temporary disk files may also need large amounts of disk space while the
operation is in progress.
There are some situations which cannot be handled while a VM is running, and
you will get an appropriate message that you need to perform this snapshot
deletion when the VM is shut down.
Think of a snapshot as a point in time that you have preserved. More formally, a
snapshot consists of three things:
• It contains a complete copy of the VM settings, so that when you restore a snap-
shot, the VM settings are restored as well. (For example, if you changed the hard
disk configuration, that change is undone when you restore the snapshot.)
• The state of all the virtual disks attached to the machine is preserved. Going
back to a snapshot means that all changes, bit by bit, that had been made to the
machine’s disks will be undone as well.
(Strictly speaking, this is only true for virtual hard disks in “normal” mode. As
mentioned above, you can configure disks to behave differently with snapshots;
28
1 First steps
see chapter 5.4, Special image write modes, page 93. Even more formally and
technically correct, it is not the virtual disk itself that is restored when a snapshot
is restored. Instead, when a snapshot is taken, VirtualBox creates differencing
images which contain only the changes since the snapshot were taken, and when
the snapshot is restored, VirtualBox throws away that differencing image, thus
going back to the previous state. This is both faster and uses less disk space. For
the details, which can be complex, please see chapter 5.5, Differencing images,
page 95.)
• Finally, if you took a snapshot while the machine was running, the memory state
of the machine is also saved in the snapshot (the same way the memory can be
saved when you close the VM window) so that when you restore the snapshot,
execution resumes at exactly the point when the snapshot was taken.
VirtualBox provides a plethora of parameters that can be changed for a virtual ma-
chine. The various settings that can be changed in the “Settings” window are described
in detail in chapter 3, Configuring virtual machines, page 47. Even more parameters
are available with the command line interface; see chapter 8, VBoxManage, page 121.
For now, if you have just created an empty VM, you will probably be most interested
in the settings presented by the “CD/DVD-ROM” section if you want to make a CD
or a DVD available the first time you start it, in order to install your guest operating
system.
For this, you have two options:
• If you have actual CD or DVD media from which you want to install your guest
operating system (e.g. in the case of a Windows installation CD or DVD), put the
media into your host’s CD or DVD drive.
29
1 First steps
Then, in the settings dialog, go to the “CD/DVD-ROM” section and select “Host
drive” with the correct drive letter (or, in the case of a Linux host, device file).
This will allow your VM to access the media in your host drive, and you can
proceed to install from there.
• If you have downloaded installation media from the Internet in the form of an
ISO image file (most probably in the case of a Linux distribution), you would
normally burn this file to an empty CD or DVD and proceed as just described.
With VirtualBox however, you can skip this step and mount the ISO file directly.
VirtualBox will then present this file as a CD or DVD-ROM drive to the virtual
machine, much like it does with virtual hard disk images.
In this case, in the settings dialog, go to the “CD/DVD-ROM” section and select
“ISO image file”. This brings up the Virtual Media Manager, where you perform
the following steps:
1. Press the “Add” button to add your ISO file to the list of registered images.
This will present an ordinary file dialog that allows you to find your ISO file
on your host machine.
2. Back to the manager window, select the ISO file that you just added and
press the “Select” button. This selects the ISO file for your VM.
The Virtual Media Manager is described in detail in chapter 5.3, The Virtual
Media Manager, page 91.
30
1 First steps
now supports OVF with an easy-to-use graphical user interface as well as using the
command line. This allows for packaging so-called virtual appliances: disk images
together with configuration settings that can be distributed easily. This way one can
offer complete ready-to-use software packages (operating systems with applications)
that need no configuration or installation except for importing into VirtualBox.
1. one or several disk images, typically in the widely-used VMDK format (see chap-
ter 5.2, Disk image files (VDI, VMDK, VHD, HDD), page 90) and
2. a textual description file in an XML dialect with an .ovf extension.
These files must reside in the same directory for VirtualBox to be able to import
them.
A future version of VirtualBox will also support packages that include the OVF XML
file and the disk images packed together in a single archive.
To import an appliance in OVF format, select “File” -> “Import appliance” from the
main window of the VirtualBox graphical user interface. Then open the file dialog and
navigate to the OVF text file with the .ovf file extension.
If VirtualBox can handle the file, a dialog similar to the following will appear:
31
1 First steps
This presents the virtual machines described in the OVF file and allows you to change
the virtual machine settings by double-clicking on the description items. Once you
click on “Import”, VirtualBox will copy the disk images and create local virtual ma-
chines with the settings described in the dialog. These will then show up in the list of
virtual machines.
Note that since disk images tend to be big, and VMDK images that come with virtual
appliances are typically shipped in a special compressed format that is unsuitable for
being used by virtual machines directly, the images will need to be unpacked and
copied first, which can take a few minutes.
For how to import an image at the command line, please see chapter 8.8, VBoxMan-
age import, page 139.
Conversely, to export virtual machines that you already have in VirtualBox, select
the machines and “File” -> “Export appliance”. A different dialog window shows up
that allows you to combine several virtual machines into an OVF appliance. Then, you
select the target location where the OVF and VMDK files should be stored, and the
conversion process begins. This can again take a while.
For how to export an image at the command line, please see chapter 8.9, VBoxMan-
age export, page 140.
32
1 First steps
Note: OVF cannot describe snapshots that were taken for a virtual machine.
As a result, when you export a virtual machine that has snapshots, only the
current state of the machine will be exported, and the disk images in the
export will have a “flattened” state identical to the current state of the virtual
machine.
33
2 Installation details
As installation of VirtualBox varies depending on your host operating system, we pro-
vide installation instructions in four separate chapters for Windows, Mac OS X, Linux
and Solaris, respectively.
• either by double-clicking on its executable file (contains both 32- and 64-bit
architectures)
• or by entering
VirtualBox.exe -extract
on the command line. This will extract both installers into a temporary directory
in which you’ll then find the usual .MSI files. Then you can do a
msiexec /i VirtualBox-<version>-MultiArch_<x86|amd64>.msi
In either case, this will display the installation welcome dialog and allow you to
choose where to install VirtualBox to and which components to install. In addition to
the VirtualBox application, the following components are available:
USB support This package contains special drivers for your Windows host that
VirtualBox requires to fully support USB devices inside your virtual machines.
Networking This package contains extra networking drivers for your Windows host
that VirtualBox needs to support Host Interface Networking (to make your VM’s
virtual network cards accessible from other machines on your physical network).
34
2 Installation details
Python Support This package contains Python scripting support for the VirtualBox
API (see chapter 11, VirtualBox programming interfaces, page 192). To get this
feature installed an already working Python installation on the system is re-
quired.
Depending on your Windows configuration, you may see warnings about “unsigned
drivers” or similar. Please select “Continue” on these warnings as otherwise VirtualBox
might not function correctly after installation.
The installer will create a “VirtualBox” group in the programs startup folder which
allows you to launch the application and access its documentation.
With standard settings, VirtualBox will be installed for all users on the local system.
In case this is not wanted, you have to invoke the installer by first extracting it by using
VirtualBox.exe -extract
or
msiexec /i VirtualBox-<version>-MultiArch_<x86|amd64>.msi ALLUSERS=2
on the extracted .MSI files. This will install VirtualBox only for the current user.
To not install certain features of VirtualBox there is an ADDLOCAL parameter that can
be specified additionally to explicitly name the features to be installed. The following
features are available:
VBoxApplication Main binaries of VirtualBox.
Note: This feature never can be absent, since it contains the minimum set of
files to have working VirtualBox installation!
or
msiexec /i VirtualBox-<version>-MultiArch_<x86|amd64>.msi ADDLOCAL=VBoxApplication,VBoxUSB
35
2 Installation details
2.1.3 Uninstallation
As we use the Microsoft Installer, VirtualBox can be safely uninstalled at any time by
choosing the program entry in the “Add/Remove Programs” applet in the Windows
Control Panel.
3. This will start the installer, which will allow you to select where to install
VirtualBox to.
After installation, you can find a VirtualBox icon in the “Applications” folder in the
Finder.
2.2.2 Uninstallation
To uninstall VirtualBox, open the disk image (dmg) file again and double-click on the
uninstall icon contained therein.
36
2 Installation details
• Qt 4.4.0 or higher;
• SDL 1.2.7 or higher (this graphics library is typically called libsdl or similar).
Note: To be precise, these packages are only required if you want to run
the VirtualBox graphical user interfaces. In particular, VirtualBox, our main
graphical user interface, requires both Qt and SDL; VBoxSDL, our simplified
GUI, requires only SDL. By contrast, if you only want to run the headless
VRDP server that comes with VirtualBox, neither Qt nor SDL are required.
• On an Ubuntu system:
sudo apt-get install dkms
• On a Fedora system:
yum install dkms
• On a Mandriva system:
37
2 Installation details
urpmi dkms
If DKMS is available and installed, the VirtualBox kernel module should always work
automatically, and it will be automatically rebuilt if your host kernel is updated.
Otherwise, there are only two situations in which you will need to worry about the
kernel module:
1. The original installation fails. This probably means that your Linux system is not
prepared for building external kernel modules.
Most Linux distributions can be set up simply by installing the right packages -
normally, these will be the GNU compiler (GCC), GNU Make (make) and pack-
ages containing header files for your kernel - and making sure that all system
updates are installed and that the system is running the most up-to-date kernel
included in the distribution. The version numbers of the header file packages must
be the same as that of the kernel you are using.
• With Debian and Ubuntu releases, you must install the right version of
the linux-headers and if it exists the linux-kbuild package. Current
Ubuntu releases should have the right packages installed by default.
• In even older Debian and Ubuntu releases, you must install the right version
of the kernel-headers package.
• On Fedora and Redhat systems, the package is kernel-devel.
• On SUSE and openSUSE Linux, you must install the right versions of the
kernel-source and kernel-syms packages.
• Alternatively, if you have built your own kernel, /usr/src/linux should
point to your kernel sources. If you have not removed the files created
during the build process, then your system will already be set up correctly.
2. The kernel of your Linux host got updated. In that case, the kernel module will
need to be reinstalled by executing (as root):
/etc/init.d/vboxdrv setup
38
2 Installation details
You will be asked to accept the VirtualBox Personal Use and Evaluation License.
Unless you answer “yes” here, the installation will be aborted.
The group vboxusers will be created during installation. Note that a user who is
going to run VirtualBox must be member of that group. A user can be made member
of the group vboxusers through the GUI user/group management or at the command
line with
sudo usermod -a -G vboxusers username
Also note that adding an active user to that group will require that user to log out
and back in again. This should be done manually after successful installation of the
package.
The installer will also search for a VirtualBox kernel module suitable for your
kernel. The package includes pre-compiled modules for the most common ker-
nel configurations. If no suitable kernel module is found, the installation script
tries to build a module itself. If the build process is not successful you will be
shown a warning and the package will be left unconfigured. Please have a look at
/var/log/vbox-install.log to find out why the compilation failed. You may have
to install the appropriate Linux kernel headers (see chapter 2.3.2, The VirtualBox ker-
nel module, page 37). After correcting any problems, do
sudo /etc/init.d/vboxdrv setup
will be used.
39
2 Installation details
The installer must be executed as root with either install or uninstall as the
first parameter. If you do not want the installer to ask you whether you wish to accept
the license agreement (for example, for performing unattended installations), you can
add the parameter license_accepted_unconditionally. Finally, if you want to use
a directory other than the default installation directory, add the desired path as an
extra parameter.
sudo ./VirtualBox.run install /opt/VirtualBox
Or if you do not have the “sudo” command available, run the following as root
instead:
./VirtualBox.run install /opt/VirtualBox
After that you need to put every user which should be able to use VirtualBox in the
group vboxusers, either through the GUI user management tools or by running the
following command as root:
sudo usermod -a -G vboxusers username
Note: The usermod command of some older Linux distributions does not sup-
port the -a option (which adds the user to the given group without affecting
membership of other groups). In this case, find out the current group mem-
berships with the groups command and add all these groups in a comma-
separated list to the command line after the -G option, e.g. like this: usermod
-G group1,group2,vboxusers username.
If any users on your system should be able to access host USB devices from within
VirtualBox guests, you should also add them to the appropriate user group that your
distribution uses for USB access, e.g. usb or usbusers.
40
2 Installation details
This will unpack all the files needed for installation in the directory install
under the current directory. The VirtualBox application files are contained in
VirtualBox.tar.bz2 which you can unpack to any directory on your system. For
example:
sudo mkdir /opt/VirtualBox
sudo tar jxf ./install/VirtualBox.tar.bz2 -C /opt/VirtualBox
or as root:
mkdir /opt/VirtualBox
tar jxf ./install/VirtualBox.tar.bz2 -C /opt/VirtualBox
The sources for VirtualBox’s kernel module are provided in the src directory. To
build the module, change to the directory and issue
make
If everything builds correctly, issue the following command to install the module to
the appropriate module directory:
sudo make install
In case you do not have sudo, switch the user account to root and perform
make install
The VirtualBox kernel module needs a device node to operate. The above make
command will tell you how to create the device node, depending on your Linux system.
The procedure is slightly different for a classical Linux setup with a /dev directory, a
system with the now deprecated devfs and a modern Linux system with udev.
On certain Linux distributions, you might experience difficulties building the mod-
ule. You will have to analyze the error messages from the build system to diagnose the
cause of the problems. In general, make sure that the correct Linux kernel sources are
used for the build process.
Note that the user who is going to run VirtualBox needs read and write permission
on the VirtualBox kernel module device node /dev/vboxdrv. You can either define a
vboxusers group by entering
groupadd vboxusers
chgrp vboxusers /dev/vboxdrv
chmod 660 /dev/vboxdrv
or, alternatively, simply give all users access (insecure, not recommended!)
41
2 Installation details
You should also add any users who will be allowed to use host USB devices in
VirtualBox guests to the appropriate USB users group for your distribution. This group
is often called usb or usbusers.
Next, you will have to install the system initialization script for the kernel module:
cp /opt/VirtualBox/vboxdrv.sh /etc/init.d/vboxdrv
or as root
./VirtualBox.run uninstall
. Starting with version 2.2.2, you can uninstall the .run package by invoking
/opt/VirtualBox/uninstall.sh
To manually uninstall VirtualBox, simply undo the steps in the manual installation in
reverse order.
42
2 Installation details
The first line allows compilation of the vboxdrv kernel module if no module was found
for the current kernel. The second line allows the package to delete any old vboxdrv
kernel modules compiled by previous installations.
These default settings can be applied with
debconf-set-selections vboxconf
If the line
INSTALL_NO_VBOXDRV=1
is specified, the package installer will not try to build the vboxdrv kernel module if
no module according to the current kernel was found.
43
2 Installation details
Starting with VirtualBox 3.1 the VirtualBox kernel package is no longer a separate
package and has been integrated into the main package. Install the VirtualBox package
using:
pkgadd -d VirtualBox-3.2.8-SunOS.pkg
44
2 Installation details
Note: If you are using Solaris Zones, to install VirtualBox only into the current
zone and not into any other zone, use pkgadd -G. For more information refer
to the pkgadd manual; see also chapter 2.4.5, Configuring a zone for running
VirtualBox, page 46.
The installer will then prompt you to enter the package you wish to install. Choose
“1” or “all” and proceed. Next the installer will ask you if you want to allow the
postinstall script to be executed. Choose “y” and proceed as it is essential to execute
this script which installs the VirtualBox kernel module. Following this confirmation
the installer will install VirtualBox and execute the postinstall setup script.
Once the postinstall script has been executed your installation is now complete. You
may now safely delete the uncompressed package and autoresponse files from your
system. VirtualBox would be installed in /opt/VirtualBox.
2.4.3 Uninstallation
Uninstallation of VirtualBox on Solaris requires root permissions. To perform the unin-
stallation, start a root terminal session and execute:
pkgrm SUNWvbox
45
2 Installation details
Inside the zonecfg prompt add the device resource and match properties to the
zone. Here’s how it can be done:
zonecfg:vboxzone>add device
zonecfg:vboxzone:device>set match=/dev/vboxdrv
zonecfg:vboxzone:device>end
zonecfg:vboxzone>verify
zonecfg:vboxzone>exit
If you are running VirtualBox 2.2.0 or above on OpenSolaris or Nevada hosts, you
should add a device for /dev/vboxusbmon too, similar to what was shown above. This
does not apply to Solaris 10 hosts due to lack of USB support.
Replace “vboxzone” with the name of the zone in which you intend to run
VirtualBox. Next reboot the zone using zoneadm and you should be able to run
VirtualBox from within the configured zone.
46
3 Configuring virtual machines
Whereas chapter 1, First steps, page 10 gave you a quick introduction to VirtualBox
and how to get your first virtual machine running, the following chapter describe in
detail how to configure virtual machines.
You have considerable latitude in deciding what virtual hardware will be provided to
the guest. The virtual hardware can be used for communicating with the host system
or with other guests. For instance, if you provide VirtualBox with the image of a CD-
ROM in an ISO file, VirtualBox can present this image to a guest system as if it were
a physical CD-ROM. Similarly, you can give a guest system access to the real network
via its virtual network card, and, if you choose, give the host system, other guests, or
computers on the Internet access to the guest system.
Note: Certain Linux kernel releases have bugs that prevent them from exe-
cuting in a virtual environment; please see chapter 12.4.3, Buggy Linux 2.6
kernel versions, page 202 for details.
47
3 Configuring virtual machines
Solaris 10, OpenSolaris Fully supported (32 bits and 64 bits). Guest Additions are
available.
FreeBSD Requires hardware virtualization to be enabled. Limited support. Guest
Additions are not available yet.
OpenBSD Requires hardware virtualization to be enabled. Versions 3.7 and later are
supported. Guest Additions are not available yet.
OS/2 Warp 4.5 Requires hardware virtualization to be enabled. We officially support
MCP2 only; other OS/2 versions may or may not work. Guest Additions are
available with a limited feature set.1
Mac OS X Server VirtualBox 3.2 added experimental support for Mac OS X Server
guests, but this comes with restrictions. Please see the following section as well
as chapter 13, Known limitations, page 210.
1. Mac OS X is commercial, licensed software and contains both license and tech-
nical restrictions that limit its use to certain hardware and usage scenarios. It is
important that you understand and obey these restrictions. Only the Mac OS X
Server is designed to be used in a virtual environment and therefore, VirtualBox
does not support Mac OS X client as a guest.
As a result, before attempting to install Mac OS X Server in a virtual machine,
make sure you understand the license restrictions of the Mac OS X version you
want to use. For most versions of Mac OS X Server, Apple prohibits installing
them on non-Apple hardware.
These license restrictions are also enforced on a technical level: Mac OS X Server
verifies whether it is running on Apple hardware, and most DVDs that that come
with Apple hardware even check for an exact model. These restrictions are not
circumvented by VirtualBox and continue to apply.
2. Only CPUs known and tested by Apple are supported. As a result, if the Intel
CPU is newer than the build of Mac OS X Server, it will most likely panic during
48
3 Configuring virtual machines
bootup with an “Unsupported CPU” exception. It is generally best to use the Mac
OS X Server DVD that came with your Apple hardware.
3. The Mac OS X Server installer expects the harddisk to be partitioned so when
it does not offer a selection, you have to launch the Disk Utility from the “Tools”
menu and partition the hard disk. Then close the Disk Utility and proceed with
the installation.
4. In addition, as Mac OS X Server support in VirtualBox is currently still experi-
mental, please refer also to chapter 13, Known limitations, page 210.
1. You need a 64-bit processor with hardware virtualization support (see chapter
10.2, Hardware vs. software virtualization, page 185).
2. You must enable hardware virtualization for the particular VM for which you
want 64-bit support; software virtualization is not supported for 64-bit VMs.
3. If you want to use 64-bit guest support on a 32-bit host operating system, you
must also select a 64-bit operating system for the particular VM. Since supporting
64 bits on 32-bit hosts incurs additional overhead, VirtualBox only enables this
support upon explicit request.
On 64-bit hosts, 64-bit guest support is always enabled, so you can simply install
a 64-bit operating system in the guest.
Warning: On any host, you should enable the I/O APIC for virtual machines
that you intend to use in 64-bit mode. This is especially true for 64-bit Win-
dows VMs. See chapter 3.3.2, “Advanced” tab, page 51. In addition, for 64-bit
Windows guests, you should make sure that the VM uses the Intel network-
ing device, since there is no 64-bit driver support for the AMD PCNet card;
see chapter 6.1, Virtual networking hardware, page 103.
If you use the “Create VM” wizard of the VirtualBox graphical user interface (see
chapter 1.6, Creating your first virtual machine, page 18), VirtualBox will automatically
use the correct settings for each selected 64-bit operating system type.
49
3 Configuring virtual machines
• Storage. VirtualBox currently emulates the standard ATA interface found on In-
tel PIIX3/PIIX4 chips, SATA (AHCI) interface, and two SCSI adapters (LSI Logic
and BusLogic); see chapter 5.1, Hard disk controllers: IDE, SATA (AHCI), SCSI,
SAS, page 87 for details. Whereas providing one of these would be enough for
VirtualBox by itself, this multitude of storage adapters is required for compatibil-
ity with other hypervisors. Windows is particularly picky about its boot devices,
and migrating VMs between hypervisors is very difficult or impossible if the stor-
age controllers are different.
• Networking. See chapter 6.1, Virtual networking hardware, page 103.
• USB. VirtualBox emulates two USB host controllers, EHCI and OHCI. There is a
need for two host controllers because OHCI only handles USB low- and full-speed
devices (both USB 1.x and 2.0), while EHCI only handles high-speed devices
(USB 2.0 only). The emulated USB controllers do not communicate directly with
devices on the host but rather with the VUSB layer (see below), which abstracts
the USB protocol and allows the use of remote USB devices (with VRDP).
• Audio. Two audio devices are emulated, an AC97 controller plus codec, and a
classic SoundBlaster 16 (digital audio only).
50
3 Configuring virtual machines
Name The name under which the VM is shown in the list of VMs in the main window.
Under this name, VirtualBox also saves the VM’s configuration files. By changing
the name, VirtualBox renames these files as well. As a result, you can only use
characters which are allowed in your host operating system’s file names.
Note that internally, VirtualBox uses unique identifiers (UUIDs) to identify virtual
machines. You can display these with VBoxManage.
Operating System / Version The type of the guest operating system that is (or will
be) installed in the VM. This is the same setting that was specified in the “New
Virtual Machine” wizard, as described with chapter 1.6, Creating your first virtual
machine, page 18 above.
Shared Clipboard If the virtual machine has Guest Additions installed, you can select
here whether the clipboard of the guest operating system should be shared with
that of your host. If you select “Bidirectional”, then VirtualBox will always make
sure that both clipboards contain the same data. If you select “Host to guest”
or “Guest to host”, then VirtualBox will only ever copy clipboard data in one
direction.
Removable Media: Remember Runtime Changes If this is checked, VirtualBox
will save the state of what media has been mounted between several runs of
a virtual machine.
Mini Toolbar In full screen or seamless mode, VirtualBox can display a small toolbar
that contains some of the items that are normally available from the virtual ma-
chine’s menu bar. This toolbar reduces itself to a small gray line unless you move
the mouse over it. With the toolbar, you can return from full screen or seamless
mode, control machine execution or enable certain devices. If you don’t want to
see the toolbar, disable this setting.
51
3 Configuring virtual machines
Note: Enabling the I/O APIC is required for 64-bit guest operating systems,
especially Windows Vista; it is also required if you want to use more than one
virtual CPU in a virtual machine.
52
3 Configuring virtual machines
However, software support for I/O APICs has been unreliable with some operat-
ing systems other than Windows. Also, the use of an I/O APIC slightly increases
the overhead of virtualization and therefore slows down the guest OS a little.
Warning: All Windows operating systems starting with Windows 2000 install
different kernels depending on whether an I/O APIC is available. As with
ACPI, the I/O APIC therefore must not be turned off after installation of a
Windows guest OS. Turning it on after installation will have no effect however.
Enable EFI This enables Extensible Firmware Interface (EFI), which replaces the
legacy BIOS, which may be useful for certain advanced use cases. Please refer to
chapter 3.12, Alternative firmware (EFI), page 62 for details.
Hardware clock in UTC time If checked, VirtualBox will report the system time in
UTC format to the guest instead of local (host) time. This affects how the virtual
real-time clock (RTC) operates and may be useful for Unix-like guest operating
systems, which typically expect the hardware clock to be set to UTC.
Enable absolute pointing device If enabled, VirtualBox reports to the virtual ma-
chine that a USB tablet device is present and communicates mouse events to the
virtual machine through this device. If disabled, mouse events are communi-
cated through a traditional PS/2 virtual mouse device.
Using the virtual USB tablet has the advantage that movements are reported
in absolute coordinates (instead of as relative position changes), which allows
VirtualBox to translate mouse events over the VM window into tablet events
without having to “capture” the mouse in the guest as described in chapter
1.7.1.1, Capturing and releasing keyboard and mouse, page 22. This makes using
the VM less tedious even if Guest Additions are not installed.2
In addition, you can turn off the Advanced Configuration and Power Interface
(ACPI) which VirtualBox presents to the guest operating system by default. ACPI is the
current industry standard to allow operating systems to recognize hardware, configure
motherboards and other devices and manage power. As all modern PCs contain this
feature and Windows and Linux have been supporting it for years, it is also enabled
by default in VirtualBox. It can only be turned off on the command line; see chapter
8.7, VBoxManage modifyvm, page 131.
Warning: All Windows operating systems starting with Windows 2000 install
different kernels depending on whether ACPI is available, so ACPI must not
be turned off after installation of a Windows guest OS. Turning it on after
installation will have no effect however.
2 The virtual USB tablet was added with VirtualBox 3.2. Depending on the guest operating system selected,
this is now enabled by default for new virtual machines.
53
3 Configuring virtual machines
3 Priorto VirtualBox version 2.2, software virtualization was the default; starting with version 2.2,
VirtualBox will enable hardware virtualization by default for new virtual machines that you create.
(Existing virtual machines are not automatically changed for compatibility reasons, and the default can
of course be changed for each virtual machine.)
54
3 Configuring virtual machines
Remote display Under the “Remote display” tab, you can enable the VRDP server
that is built into VirtualBox to allow you to connect to the virtual machine re-
motely. For this, you can use any standard RDP viewer, such as mstsc.exe that
comes with Microsoft Windows or, on Linux systems, the standard open-source
rdesktop program. These features are described in detail in chapter 7.1, Remote
display (VRDP support), page 112.
55
3 Configuring virtual machines
In a real PC, so-called “storage controllers” connect physical disk drives to the rest
of the computer. Similarly, VirtualBox presents virtual storage controllers to a virtual
machine. Under each controller, the virtual devices (hard disks, CD/DVD or floppy
drives) are shown that are attached to the controller.
If you have used the “Create VM” wizard to create a machine, you will normally see
the following devices:
• You will see an IDE controller, under which there are two devices:
– one virtual hard disk connected to the IDE slot called “primary master”; this
is represented by the disk images that you created with the machine;
– one virtual CD/DVD drive connected to the “secondary master”.
• In addition, there is a floppy controller to which a virtual floppy drive is attached.
You can modify these media attachments freely. For example, if you wish to copy
some files from another virtual disk that you created, you can connect that disk as a
second hard disk. You could also add a second virtual CD/DVD drive, or change where
these items are attached.
In addition to the IDE controller, VirtualBox can also present an SATA controller and
a SCSI controller to the guest, which gives you 30 or 16 additional slots to attach
devices to, respectively. This, however, may require that you run a modern guest
operating system. See chapter 5.1, Hard disk controllers: IDE, SATA (AHCI), SCSI, SAS,
page 87 for details.
To add another virtual hard disk or CD/DVD drive, select the storage controller to
which it should be added (IDE, SATA or SCSI) and then click on the “add disk” button
56
3 Configuring virtual machines
below the tree. You can then either select “Add CD/DVD device” or “Add Hard Disk”.
Alternatively, right-click on the storage controller and select a menu item there.
On the right part of the window, you can then select where the virtual disk should
be connected to on the controller and which image file to use.
• For virtual hard disks, a drop-down list appears on the right, listing all the hard
disk images that VirtualBox currently knows about. If you click on the “Open
Virtual Media Manager” icon to the right, this will bring up a window in which
you can select or create a different hard disk image (see chapter 5.3, The Virtual
Media Manager, page 91 for details).
• For virtual CD/DVD drives, there are two kinds of options in the drop-down list.
– If you select “Empty”, then VirtualBox will present a virtual CD/DVD drive
to the guest which has no media inserted.
– If you select “Host drive” from the list, then the physical device of the host
computer is connected to the VM, so that the guest operating system can
read from and write to your physical device. This is, for instance, useful if
you want to install Windows from a real installation CD. In this case, select
your host drive from the drop-down list presented.
Note: If you want to write CDs or DVDs using the host drive, you need to
enable a special setting first; see chapter 5.9, Writing CDs and DVDs using the
host drive, page 100.
– The other items in the list, like virtual hard disk images, will be image files
on your host. The file format here is the ISO format. Most commonly,
you will select this option when installing an operating system from an ISO
file that you have obtained from the Internet. For example, most Linux
distributions are available in this way.
Note: The identification string of the drive provided to the guest (which, in
the guest, would be displayed by configuration tools such as the Windows
Device Manager) is always “VBOX CD-ROM”, irrespective of the current con-
figuration of the virtual drive. This is to prevent hardware detection from
being triggered in the guest operating system every time the configuration is
changed.
Note that the floppy controller is special: you cannot add devices other than floppy
drives to it. Virtual floppy drives, like virtual CD/DVD drives, can be connected to
either a host floppy drive (if you have one) or a disk image, which in this case must be
in RAW format.
57
3 Configuring virtual machines
To remove a virtual disk or drive, select it and click on the “remove” icon at the
bottom (or right-click on it and select the menu item).
Removable media (CD/DVDs and floppies) can be changed while the guest is run-
ning. Since the “Settings” dialog is not available at that time, you can also access these
settings from the “Devices” menu of your virtual machine window.
We have dedicated an entire chapter of this User Manual to virtual storage: please
see chapter 5, Virtual storage, page 87 for every single detail about storage configura-
tion.
Note: Newer Windows versions do not ship with drivers for the virtual audio
hardware emulated by VirtualBox. This applies to Windows 7 (32-bit and 64-
bit versions) as well as 64-bit Windows Vista. See chapter 12.3.7, No audio in
Windows Vista (64-bit) and Windows 7 guests, page 201 for instructions how
to solve this problem.
58
3 Configuring virtual machines
1. what kind of serial port the virtual machine should see by selecting an I/O base
address and interrupt (IRQ). For these, we recommend to use the traditional
values6 , which are:
a) COM1: I/O base 0x3F8, IRQ 4
b) COM2: I/O base 0x2F8, IRQ 3
c) COM3: I/O base 0x3E8, IRQ 4
d) COM4: I/O base 0x2E8, IRQ 3
2. Then, you will need to determine what this virtual port should be connected to.
For each virtual serial port, you have the following options:
• You can elect to have the virtual serial port “disconnected”, which means
that the guest will see it as hardware, but it will behave as if no cable had
been connected to it.
• You can connect the virtual serial port to a physical serial port on your
host. (On a Windows host, this will be a name like COM1; on Linux or
OpenSolaris hosts, it will be a device node like /dev/ttyS0). VirtualBox
will then simply redirect all data received from and sent to the virtual serial
port to the physical device.
5 Serial port support was added with VirtualBox 1.5.
6 See, for example, http://en.wikipedia.org/wiki/COM_(hardware_interface).
59
3 Configuring virtual machines
• You can tell VirtualBox to connect the virtual serial port to a software pipe
on the host. This depends on your host operating system:
– On a Windows host, data will be sent and received through a named
pipe. You can use a helper program called VMware Serial Line
Gateway, available for download at http://www.l4ka.org/tools/
vmwaregateway.php. This tool provides a fixed server mode named
pipe at \\.\pipe\vmwaredebug and connects incoming TCP connec-
tions on port 567 with the named pipe.
– On a Mac, Linux or OpenSolaris host, a local domain socket is used
instead. On Linux there are various tools which can connect to a local
domain socket or create one in server mode. The most flexible tool is
socat and is available as part of many distributions.
In this case, you can configure whether VirtualBox should create the named
pipe (or, on non-Windows hosts, the local domain socket) itself or whether
VirtualBox should assume that the pipe (or socket) exists already. With the
VBoxManage command-line options, this is referred to as “server” or “client”
mode, respectively.
Up to two serial ports can be configured simultaneously per virtual machine, but you
can pick any port numbers out of the above. For example, you can configure two serial
ports to be able to work with COM2 and COM4 in the guest.
Note:
1. Be careful with USB devices that are currently in use on the host! For
example, if you allow your guest to connect to your USB hard disk that
is currently mounted on the host, when the guest is activated, it will be
disconnected from the host without a proper shutdown. This may cause
data loss.
2. Solaris hosts have a few known limitations regarding USB support;
please see chapter 13, Known limitations, page 210.
60
3 Configuring virtual machines
In addition to allowing a guest access to your local USB devices, VirtualBox even
allows your guests to connect to remote USB devices by use of the VRDP protocol. For
details about this, see chapter 7.1.4, Remote USB, page 116.
In the Settings dialog, you can first configure whether USB is available in the guest
at all, and in addition also optionally enable the USB 2.0 (EHCI) controller for the
guest. If so, you can determine in detail which devices are available. For this, you
must create so-called “filters” by specifying certain properties of the USB device.
Clicking on the “+“ button to the right of the “USB Device Filters” window creates a
new filter. You can give the filter a name (for referencing it later) and specify the filter
criteria. The more criteria you specify, the more precisely devices will be selected. For
instance, if you specify only a vendor ID of 046d, all devices produced by Logitech
will be available to the guest. If you fill in all fields, on the other hand, the filter will
only apply to a particular device model from a particular vendor, and not even to other
devices of the same type with a different revision and serial number.
In detail, the following criteria are available:
1. Vendor and product ID. With USB, each vendor of USB products carries an
identification number that is unique world-wide, the “vendor ID”. Similarly, each
line of products is assigned a “product ID” number. Both numbers are commonly
written in hexadecimal (that is, they are composed of the numbers 0-9 and the
letters A-F), and a colon separates the vendor from the product ID. For example,
046d:c016 stands for Logitech as a vendor, and the “M-UV69a Optical Wheel
Mouse” product.
Alternatively, you can also specify “Manufacturer” and “Product” by name.
To list all the USB devices that are connected to your host machine with their
respective vendor and product IDs, you can use the following command (see
chapter 8, VBoxManage, page 121):
VBoxManage list usbhost
On Windows, you can also see all USB devices that are attached to your system
in the Device Manager. On Linux, you can use the lsusb command.
2. Serial number. While vendor and product ID are already quite specific to iden-
tify USB devices, if you have two identical devices of the same brand and product
line, you will also need their serial numbers to filter them out correctly.
3. Remote. This setting specifies whether the device will be local only, or remote
only (over VRDP), or either.
On a Windows host, you will need to unplug and reconnect a USB device to use it
after creating a filter for it.
As an example, you could create a new USB filter and specify a vendor ID of 046d
(Logitech, Inc), a manufacturer index of 1, and “not remote”. Then any USB devices
on the host system produced by Logitech, Inc with a manufacturer index of 1 will be
visible to the guest system.
61
3 Configuring virtual machines
Several filters can select a single device – for example, a filter which selects all
Logitech devices, and one which selects a particular webcam.
You can deactivate filters without deleting them by clicking in the checkbox next to
the filter name.
62
3 Configuring virtual machines
One notable user of EFI is Apple’s Mac OS X, but recent Linuxes (such as Fedora 11)
and Windows (starting with Vista) can be booted using EFI as well.
Another possible use of EFI in VirtualBox is development and testing of EFI applica-
tions, without booting any OS.
Note that the VirtualBox EFI support is experimental and will be enhanced as EFI
matures and becomes more widespread. While Mac OS X and Linux guests are known
to work fine, Windows guests are currently unable to boot using EFI.
The video mode for both GOP and UGA can only be changed when the VM is pow-
ered off and remains persistent until changed.
63
4 Guest Additions
The previous chapter covered getting started with VirtualBox and installing operating
systems in a virtual machine. For any serious and interactive use, the VirtualBox Guest
Additions will make your life much easier by providing closer integration between host
and guest and improving the interactive performance of guest systems. This chapter
describes the Guest Additions in detail.
4.1 Introduction
As said in chapter 1.2, Some terminology, page 12, the Guest Additions are designed
to be installed inside a virtual machine after the guest operating system has been
installed. They consist of device drivers and system applications that optimize the
guest operating system for better performance and usability. Please see chapter 3.1,
Supported guest operating systems, page 47 for details on what guest operating systems
are fully supported with Guest Additions by VirtualBox.
The VirtualBox Guest Additions for all supported guest operating systems are pro-
vided as a single CD-ROM image file which is called VBoxGuestAdditions.iso. This
image file is located in the installation directory of VirtualBox. To install the Guest
Additions for a particular VM, you mount this ISO file in your VM as a virtual CD-ROM
and install from there.
The Guest Additions offer the following features:
Mouse pointer integration To overcome the limitations for mouse support that were
described in chapter 1.7.1.1, Capturing and releasing keyboard and mouse, page
22, this provides you with seamless mouse support. You will only have one
mouse pointer and pressing the Host key is no longer required to “free” the
mouse from being captured by the guest OS. To make this work, a special mouse
driver is installed in the guest that communicates with the “real” mouse driver
on your host and moves the guest mouse pointer accordingly.
Better video support While the virtual graphics card which VirtualBox emulates for
any guest operating system provides all the basic features, the custom video
drivers that are installed with the Guest Additions provide you with extra high
and non-standard video modes as well as accelerated video performance.
In addition, with Windows and recent Linux, Solaris and OpenSolaris guests, if
the Guest Additions are installed, you can resize the virtual machine’s window,
and the video resolution in the guest will be automatically adjusted (as if you
had manually entered an arbitrary resolution in the guest’s display settings).
64
4 Guest Additions
Finally, if the Guest Additions are installed, 3D graphics for guest applications
can be accelerated; see chapter 4.5.1, Hardware 3D acceleration (OpenGL and
Direct3D 8/9), page 79.
Time synchronization With the Guest Additions installed, VirtualBox can ensure that
the guest’s system time is better synchronized with that of the host.
For various reasons, the time in the guest might run at a slightly different rate
than the time on the host. The host could be receiving updates via NTP and its
own time might not run linearly. A VM could also be paused, which stops the
flow of time in the guest for a shorter or longer period of time. When the wall
clock time between the guest and host only differs slightly, the time synchroniza-
tion service attempts to gradually and smoothly adjust the guest time in small
increments to either “catch up” or “lose” time. When the difference is too great
(e.g., a VM paused for hours or restored from saved state), the guest time is
changed immediately, without a gradual adjustment.
The Guest Additions will re-synchronize the time regularly. See chapter 9.12.3,
Tuning the Guest Additions time synchronization parameters, page 180 for how to
configure the parameters of the time synchronization mechanism.
Shared folders These provide an easy way to exchange files between the host and
the guest. Much like ordinary Windows network shares, you can tell VirtualBox
to treat a certain host directory as a shared folder, and VirtualBox will make it
available to the guest operating system as a network share. For details, please
refer to chapter 4.3, Shared folders, page 76.
Seamless windows With this feature, the individual windows that are displayed on
the desktop of the virtual machine can be mapped on the host’s desktop, as if
the underlying application was actually running on the host. See chapter 4.4,
Seamless windows, page 78 for details.
Shared clipboard With the Guest Additions installed, the clipboard of the guest op-
erating system can optionally be shared with your host operating system; see
chapter 3.3, General settings, page 50.
Automated logons (credentials passing) For details, please see chapter 9.3, Auto-
mated guest logons, page 163.
Each version of VirtualBox, even minor releases, ship with their own version of the
Guest Additions. While the interfaces through which the VirtualBox core communi-
cates with the Guest Additions are kept stable so that Guest Additions already installed
in a VM should continue to work when VirtualBox is upgraded on the host, for best
results, it is recommended to keep the Guest Additions at the same version.
Starting with VirtualBox 3.1, the Windows and Linux Guest Additions therefore
check automatically whether they have to be updated. If the host is running a newer
VirtualBox version than the Guest Additions, a notification with further instructions is
displayed in the guest.
65
4 Guest Additions
To disable this update check for the Guest Additions of a given virtual machine, set
the value of its /VirtualBox/GuestAdd/CheckHostVersion guest property to 0; see
chapter 4.6, Guest properties, page 81 for details.
4.2.1.1 Installation
In the “Devices” menu in the virtual machine’s menu bar, VirtualBox has a handy
menu item named “Install guest additions”, which mounts the Guest Additions ISO
file inside your virtual machine. A Windows guest should then automatically start the
Guest Additions installer, which installs the Guest Additions into your Windows guest.
Note: For Direct 3D acceleration to work in a Windows Guest, you must install
the Guest Additions in “Safe Mode”; see chapter 13, Known limitations, page
210 for details.
If you prefer to mount the additions manually, you can perform the following steps:
66
4 Guest Additions
3. In the Virtual Media Manager, press the “Add” button and browse your host file
system for the VBoxGuestAdditions.iso file:
• On a Windows host, you can find this file in the VirtualBox installation
directory (usually under C:\Program files\Oracle\VirtualBox ).
• On Mac OS X hosts, you can find this file in the application bundle of
VirtualBox. (Right click on the VirtualBox icon in Finder and choose Show
Package Contents. There it is located in the Contents/MacOS folder.)
• On a Linux host, you can find this file in the additions folder under where
you installed VirtualBox (normally /opt/VirtualBox/).
• On Solaris hosts, you can find this file in the additions folder under where
you installed VirtualBox (normally /opt/VirtualBox).
4. Back in the Virtual Media Manager, select that ISO file and press the “Select”
button. This will mount the ISO file and present it to your Windows guest as a
CD-ROM.
Unless you have the Autostart feature disabled in your Windows guest, Windows will
now autostart the VirtualBox Guest Additions installation program from the Additions
ISO. If the Autostart feature has been turned off, choose VBoxWindowsAdditions.exe
from the CD/DVD drive inside the guest to start the installer.
The installer will add several device drivers to the Windows driver database and
then invoke the hardware detection wizard.
Depending on your configuration, it might display warnings that the drivers are
not digitally signed. You must confirm these in order to continue the installation and
properly install the Additions.
After installation, reboot your guest operating system to activate the Additions.
For each, choose to provide your own driver and use “Have Disk” to point the wizard
to the CD-ROM drive with the Guest Additions.
67
4 Guest Additions
VBoxWindowsAdditions.exe /S
This automatically installs the right files and drivers for the corresponding platform
(32- or 64-bit).
Note: Because of the drivers are not yet WHQL certified, you still might get
some driver installation popups, depending on the Windows guest version.
For more options regarding unattended guest installations, consult the command
line help by using the command:
VBoxWindowsAdditions.exe /?
To explicitly extract the Windows Guest Additions for another platform than
the current running one (e.g. 64-bit files on a 32-bit system), you have to
execute the appropriate platform installer (VBoxWindowsAdditions-x86.exe or
VBoxWindowsAdditions-amd64.exe) with the /extract parameter.
68
4 Guest Additions
Windows Guest Additions setup. Please consult chapter 4.2.1.4, Manual file extraction,
page 68 on how to achieve this. You will then find the AMD PCNet driver files in the
x86\Network\AMD\netamd.inf subdirectory of the default install directory.
Alternatively, change the Vista guest’s VM settings to use an Intel networking card
instead of the default AMD PCNet card; see chapter 3.8, Network settings, page 58 for
details.
Unfortunately, there is no 64-bit driver available for the AMD PCNet card. So for
64-bit Windows VMs, you should always use the Intel networking devices.
Many other distributions are known to work with the Guest Additions.
The version of the Linux kernel supplied by default in SUSE and openSUSE 10.2,
Ubuntu 6.10 (all versions) and Ubuntu 6.06 (server edition) contains a bug which
can cause it to crash during startup when it is run in a virtual machine. The Guest
Additions work in those distributions.
Note that some Linux distributions already come with VirtualBox Guest Additions or
a part thereof. You may keep the distribution’s version of the Guest Additions but of-
ten, these are not up to date and limited in functionality. Therefore, you can choose the
install the Guest Additions that come with VirtualBox, overriding the already installed
version. The VirtualBox Linux Guest Additions installer tries to detect existing instal-
lation and replace them but depending on how the distribution integrates the Guest
Additions, they may require some manual interaction. It is highly recommended to
take a snapshot of the virtual machine before overriding the installation.
69
4 Guest Additions
1. Before installing the Guest Additions, you will have to prepare your guest system
for building external kernel modules. This works similarly as described in chap-
ter 2.3.2, The VirtualBox kernel module, page 37, except that this step must now
be performed in your Linux guest instead of on a Linux host system, as described
there.
Again, as with Linux hosts, we recommend using DKMS for Linux guests as well.
If it is not installed, use this command for Ubuntu/Debian systems:
sudo apt-get install dkms
Make sure to nstall DKMS before installing the Linux Guest Additions.
2. Mount the VBoxGuestAdditions.iso file as your Linux guest’s virtual CD-ROM
drive, exactly the same way as described for a Windows guest in chapter 4.2.1.1,
Installation, page 66.
3. Change to the directory where your CD-ROM drive is mounted and execute as
root:
sh ./VBoxLinuxAdditions-x86.run
For your convenience, the following step-by-step instructions have been verified to
work for freshly installed copies of the most popular Linux distributions. After these
preparational steps, you can execute the VirtualBox Guest Additions installer as de-
scribed above.
followed by
apt-get upgrade
3. Reboot your guest system in order to activate the updates and then proceed as
described above.
70
4 Guest Additions
Fedora 13 (“Goddard”)
1. In order to update your system to the latest version of the packets, open a termi-
nal and as root, execute
yum update
followed by
yum install gcc
3. Reboot your guest system in order to activate the updates and then proceed as
described above.
openSUSE 11.2
1. In order to update your system to the latest version of the packets, open a termi-
nal and as root, execute
zypper update
5. Make sure that your running kernel (uname -a) and the kernel packages you
have installed (rpm -qa kernel\*) have the exact same version number. Pro-
ceed with the installation as described above.
71
4 Guest Additions
5. Make sure that your running kernel (uname -a) and the kernel packages you
have installed (rpm -qa kernel\*) have the exact same version number. Pro-
ceed with the installation as described above.
Mandrake 2010
1. Mandrake ships with the VirtualBox Guest Additions which will be replaced if
you follow these steps.
2. In order to update your system to the latest version of the packets, open a termi-
nal and as root and execute
urpmi --auto-update
and make sure the choose the correct kernel-devel package when asked by the
installer (use uname -a to compare).
CentOS 5.5, Red Hat Enterprise Linux 5.5 and Oracle Enterprise Linux 5.5
1. Add divider=10 to the kernel boot options in /etc/grub.conf to reduce the
idle CPU load.
2. To update your system to the latest version of the packets, open a terminal and
as root, execute
yum update
3. Install the GNU C compiler and the kernel development packages using
yum install gcc
followed by
yum install kernel-devel
4. Reboot your guest system in order to activate the updates and then proceed as
described above.
5. Note that OpenGL support is not available unless you update to a later Linux
kernel.
72
4 Guest Additions
Debian 5 (“Lenny”)
1. In order to update your system to the latest version of the packets, open a termi-
nal and as root, execute
apt-get update
followed by
apt-get upgrade
5. Note that OpenGL support is not available unless you update to a later Linux
kernel.
as root (you will need to replace lib by lib64 on some 64bit guests), and on older
guests without the udev service you will need to add the vboxadd service to the default
runlevel to ensure that the modules get loaded.
To setup the time synchronization service, run the command
/usr/lib/VBoxGuestAdditions/vboxadd-service setup
and add the service vboxadd-service to the default runlevel. To set up the X11 and
OpenGL part of the Guest Additions, run the command
/usr/lib/VBoxGuestAdditions/vboxadd-x11 setup
After compilation you should reboot your guest to ensure that the new modules are
actually used.
73
4 Guest Additions
74
4 Guest Additions
sh ./VBoxLinuxAdditions-x86.run uninstall
Other distributions may work if they are based on comparable software releases.
2. Change to the directory where your CD-ROM drive is mounted and execute as
root:
75
4 Guest Additions
pkgadd -G -d ./VBoxSolarisAdditions.pkg
3. Choose “1” and confirm installation of the Guest Additions package. After the
installation is complete, re-login to X server on your guest to activate the X11
Guest Additions.
76
4 Guest Additions
To share a host folder with a virtual machine in VirtualBox, you must specify the
path of that folder and choose for it a “share name” that the guest can use to access it.
Hence, first create the shared folder on the host; then, within the guest, connect to it.
There are several ways in which shared folders can be set up for a particular virtual
machine:
• In the graphical user interface of a running virtual machine, you can select
“Shared folders” from the “Devices” menu, or click on the folder icon on the
status bar in the bottom right corner of the virtual machine window.
• If a virtual machine is not currently running, you can configure shared folders in
each virtual machine’s “Settings” dialog.
• From the command line, you can create shared folders using the VBoxManage
command line interface; see chapter 8, VBoxManage, page 121. The command
is as follows:
VBoxManage sharedfolder add "VM name" --name "sharename" --hostpath "C:\test"
1. VM shares which are only available to the VM for which they have been defined;
2. transient VM shares, which can be added and removed at runtime and do not
persist after a VM has stopped; for these, add the --transient option to the
above command line.
Shared folders have read/write access to the files at the host path by default. To
restrict the guest to have read-only access, create a read-only shared folder. This can
either be achieved using the GUI or by appending the parameter --readonly when
creating the shared folder with VBoxManage.
Then, you can mount the shared folder from inside a VM the same way as you would
mount an ordinary network share:
While vboxsvr is a fixed name (note that vboxsrv would also work), replace
“x:“ with the drive letter that you want to use for the share, and sharename with
the share name specified with VBoxManage.
• In a Linux guest, use the following command:
77
4 Guest Additions
To mount a shared folder during boot, add the following entry to /etc/fstab:
sharename mountpoint vboxsf defaults 0 0
Replace sharename (use lowercase) with the share name specified with
VBoxManage or the GUI, and mountpoint with the path where you want the
share to be mounted on the guest (e.g. /mnt/share). The usual mount rules
apply, that is, create this directory first if it does not exist yet.
Here is an example of mounting the shared folder for the user “jack” on Open-
Solaris:
$ id
uid=5000(jack) gid=1(other)
$ mkdir /export/home/jack/mount
$ pfexec mount -F vboxfs -o uid=5000,gid=1 jackshare /export/home/jack/mount
$ cd ~/mount
$ ls
sharedfile1.mp3 sharedfile2.txt
$
Beyond the standard options supplied by the mount command, the following are
available:
iocharset CHARSET
to set the character set used for I/O operations (utf8 by default) and
convertcp CHARSET
to specify the character set used for the shared folder name (utf8 by default).
The generic mount options (documented in the mount manual page) apply also.
Especially useful are the options uid, gid and mode, as they allow access by
normal users (in read/write mode, depending on the settings) even if root has
mounted the filesystem.
78
4 Guest Additions
After seamless windows are enabled (see below), VirtualBox suppresses the display
of the Desktop background of your guest, allowing you to run the windows of your
guest operating system seamlessly next to the windows of your host:
To enable seamless mode, after starting the virtual machine, press the Host key (nor-
mally the right control key) together with “L”. This will enlarge the size of the VM’s
display to the size of your host screen and mask out the guest operating system’s back-
ground. To go back to the “normal” VM display (i.e. to disable seamless windows),
press the Host key and “L” again.
1 The X server version is not the same as the version of the entire X.org suite. You can type X -version in
a terminal to find out about the X.org server version level that is currently installed.
2 OpenGL support for Windows guests was added with VirtualBox 2.1; support for Linux and Solaris fol-
lowed with VirtualBox 2.2. With VirtualBox 3.0, Direct3D 8/9 support was added for Windows guests.
OpenGL 2.0 is now supported as well.
79
4 Guest Additions
With this feature, if an application inside your virtual machine uses 3D features
through the OpenGL or Direct3D 8/9 programming interfaces, instead of emulating
them in software (which would be slow), VirtualBox will attempt to use your host’s
3D hardware. This works for all supported host platforms (Windows, Mac, Linux,
Solaris), provided that your host operating system can make use of your accelerated
3D hardware in the first place.
The 3D acceleration currently has the following preconditions:
1. It is only available for certain Windows, Linux and Solaris guests. In particular:
• For Windows guests, support is restricted to 32-bit versions of XP and Vista.
Both OpenGL and Direct3D 8/9 are supported (experimental).
• OpenGL on Linux requires kernel 2.6.27 and higher as well as X.org server
version 1.5 and higher. Ubuntu 8.10 and Fedora 10 have been tested and
confirmed as working.
• OpenGL on Solaris guests requires X.org server version 1.5 and higher.
2. The Guest Additions must be installed.
80
4 Guest Additions
81
4 Guest Additions
that are currently logged into the guest OS, network statistics and more. These prede-
fined properties are all prefixed with /VirtualBox/ and organized into a hierarchical
tree of keys.
Some of this runtime information is shown when you select “Session Information
Dialog” from a virtual machine’s “Machine” menu.
A more flexible way to use this channel is via the VBoxManage guestproperty
command set; see chapter 8.27, VBoxManage guestproperty, page 154 for details. For
example, to have all the available guest properties for a given running VM listed with
their respective values, use this:
$ VBoxManage guestproperty enumerate "Windows Vista III"
VirtualBox Command Line Management Interface Version 3.2.8
(C) 2005-2010 Oracle Corporation
All rights reserved.
82
4 Guest Additions
To query the value of a single property, use the “get” subcommand like this:
$ VBoxManage guestproperty get "Windows Vista III"
"/VirtualBox/GuestInfo/OS/Product"
VirtualBox Command Line Management Interface Version 3.2.8
(C) 2005-2010 Oracle Corporation
All rights reserved.
To add or change guest properties from the guest, use the tool VBoxControl. This
tool is included in the Guest Additions of VirtualBox 2.2 or later. When started from a
Linux guest, this tool requires root privileges for security reasons:
$ sudo VBoxControl guestproperty enumerate
VirtualBox Guest Additions Command Line Management Interface Version 3.2.8
(C) 2009-2010 Oracle Corporation
All rights reserved.
For more complex needs, you can use the VirtualBox programming interfaces; see
chapter 11, VirtualBox programming interfaces, page 192.
83
4 Guest Additions
This feature can be used to automate deployment of software within the guest.
Note: On Windows guests, a process lauched via the guest control execute
support is only able to display a graphical user interface if the user account it is
started under, is currently logged in and has a desktop session. Otherwise, the
process will not be able to display its user interface. Also, for using accounts
without or with an empty password specified, the group policy needs to be
changed on the guest. To do so, open the group policy editor on the command
line by typing gpedit.msc, open the key Computer Configuration\Windows
Settings\Security Settings\Local Policies\Security Options and change the value
of Accounts: Limit local account use of blank passwords to console logon only to
Disabled.
To use this feature, use the VirtualBox command line. See chapter 8.28, VBoxManage
guestcontrol, page 155 for details.
84
4 Guest Additions
where "VM name" is the name or UUID of the virtual machine in question and <n>
is the amount of memory to allocate from the guest in megabytes; see chapter 8.11,
VBoxManage controlvm, page 141 for more information.
You can also set a default balloon that will automatically be requested from the VM
every time after it has started up with the following command:
VBoxManage modifyvm "VM name" --guestmemoryballoon <n>
85
4 Guest Additions
Page Fusion in VirtualBox uses the VirtualBox Guest Additions to identify memory
cells that are most likely identical across VMs and therefore achieves most of the pos-
sible savings of page sharing almost immediately and with almost no overhead. Page
Fusion is also much less likely to be tricked by identical memory that it will eliminate
just to learn seconds later that the memory will now change and having to perform a
highly expensive and often service disrupting reallocation.
Page Fusion can be enabled for a VM using:
VBoxManage modifyvm "VM name" --pagefusion on
You can observe Page Fusion operation using some metrics. RAM/VMM/Shared shows
the total amount of fused pages whereas the per VM metric Guest/RAM/Usage/Shared
will return the amount of fused memory for a given VM. Please refer to chapter 8.26,
VBoxManage metrics, page 152 for information on how to query metrics.
Note: VirtualBox supports Page Fusion only on 64-bit host operating systems.
Mac OS X hosts are currently not supported. Page Fusion is only available for
Windows 2000 and later guests with current Guest Additions.
86
5 Virtual storage
As the virtual machine will most probably expect to see a hard disk built into its virtual
computer, VirtualBox must be able to present “real” storage to the guest as a virtual
hard disk. There are presently three methods in which to achieve this:
1. Most commonly, VirtualBox will use large image files on a real hard disk and
present them to a guest as a virtual hard disk. This is described in chapter 5.2,
Disk image files (VDI, VMDK, VHD, HDD), page 90.
2. Alternatively, if you have iSCSI storage servers, you can attach such a server to
VirtualBox as well; this is described in chapter 5.10, iSCSI servers, page 101.
3. Finally, as an experimental feature, you can allow a virtual machine to access one
of your host disks directly; this advanced feature is described in chapter 9.7.1,
Using a raw host hard disk from a guest, page 171.
Each such virtual storage device (image file, iSCSI target or physical hard disk) will
need to be connected to the virtual hard disk controller that VirtualBox presents to a
virtual machine. This is explained in the next section.
• IDE (ATA) controllers have been in use since the 1980s. Initially, this type of
interface worked only with hard disks, but was later extended to also support
CD-ROM drives and other types of removable media. In physical PCs, this stan-
dard uses flat ribbon parallel cables with 40 or 80 wires. Each such cable can
connect two devices to a controller, which have traditionally been called “master”
and “slave”. Typical hard disk controllers have two connectors for such cables;
as a result, most PCs support up to four devices.
1 SATA support was added with VirtualBox 1.6; experimental SCSI support was added with 2.1 and fully
implemented with 2.2. Generally, storage attachments were made much more flexible with VirtualBox
3.1; see below.
87
5 Virtual storage
In VirtualBox, each virtual machine has one IDE controller enabled by default,
which gives you up to four virtual storage devices that you can attach to the
machine. (By default, one of these four – the secondary master – is preconfigured
to be the machine’s virtual CD/DVD drive, but this can be changed.2 )
So even if your guest operating system has no support for SCSI or SATA devices,
it should always be able to see the default IDE controller that is enabled by
default.
You can also select which exact type of IDE controller hardware VirtualBox
should present to the virtual machine (PIIX3, PIIX4 or ICH6). This makes no
difference in terms of performance, but if you import a virtual machine from
another virtualization product, the operating system in that machine may expect
a particular controller and crash if it isn’t found.
After you have created a new virtual machine with the “New Virtual Machine”
wizard of the graphical user interface, you will typically see one IDE controller in
the machine’s “Storage” settings where the virtual CD/DVD drive will be attached
to one of the four ports of this controller.
• Serial ATA (SATA) is a newer standard introduced in 2003. Compared to IDE,
it supports both much higher speeds and more devices per hard disk controller.
Also, with physical hardware, devices can be added and removed while the sys-
tem is running. The standard interface for SATA controllers is called Advanced
Host Controller Interface (AHCI).
For compatibility reasons, AHCI controllers by default operate the disks attached
to it in a so-called “IDE compatibility mode”, unless SATA support is explicitly
requested. “IDE compatibility mode” only means that the drives can be seen and
operated by the computer’s BIOS. Still, disks assigned to those slots will operate
in full-speed AHCI mode once the guest operating system has loaded its AHCI
device driver.
Like a real SATA controller, VirtualBox’s virtual SATA controller operates faster
and also consumes less CPU resources than the virtual IDE controller. Also, this
allows you to connect up to 30 virtual hard disks to one machine instead of
just three, as with the VirtualBox IDE controller (with the DVD drive already
attached). Of these, the first four (numbered 0-3 in the graphical user interface)
are operated in IDE compatibility mode by default.
For this reason, starting with version 3.2 and depending on the selected guest
operating system, VirtualBox uses SATA as the default for newly created virtual
machines. One virtual SATA controller is created by default, and the default disk
that is created with a new VM is attached to this controller.
2 The assignment of the machine’s CD/DVD drive to the secondary master was fixed before VirtualBox 3.1;
it is now changeable, and the drive can be at other slots of the IDE controller, and there can be more
than one such drive.
88
5 Virtual storage
Warning: The entire SATA controller and the virtual disks attached to it (in-
cluding those in IDE compatibility mode) will not be seen by operating sys-
tems that do not have device support for AHCI. In particular, there is no
support for AHCI in Windows before Windows Vista, so Windows XP (even
SP2) will not see such disks unless you install additional drivers. It is possible
to switch from IDE to SATA after installation by installing the SATA drivers
and changing the controller type in the VM settings dialog. a
a VirtualBoxrecommends the Intel Matrix Storage drivers which can be downloaded from
http://downloadcenter.intel.com/Product_Filter.aspx?ProductID=2101
To add a SATA controller to a machine for which it has not been enabled by
default (either because it was created by an earlier version of VirtualBox, or be-
cause SATA is not supported by default by the selected guest operating system),
go to the “Storage” page of of the machine’s settings dialog, click on the “Add
Controller” button under the “Storage Tree” box and then select “Add SATA Con-
troller”. After this, the additional controller will appear as a separate PCI device
in the virtual machine, and you can add virtual disks to it.
To change the IDE compatibility mode settings for the SATA controller, please see
chapter 8.15, VBoxManage storagectl / storageattach, page 144.
• SCSI is another established industry standard, standing for “Small Computer
System Interface”. This was established as early as 1986 as a generic interface for
data transfer between all kinds of devices, including storage devices. Today SCSI
is still used for connecting hard disks and tape devices, but it has mostly been
displaced in commodity hardware. It is still in common use in high-performance
workstations and servers.
Primarily for compatibility with other virtualization software, VirtualBox option-
ally supports LsiLogic and BusLogic SCSI controllers, to each of which up to 16
virtual hard disks can be attached.
To enable a SCSI controller, on the “Storage” page of a virtual machine’s set-
tings dialog, click on the “Add Controller” button under the “Storage Tree” box
and then select “Add SCSI Controller”. After this, the additional controller will
appear as a separate PCI device in the virtual machine.
Warning: There are limitations with the default SCSI drivers shipped with
some operating systems. Notably the BusLogic controller does not work with
Windows NT4 guests.
• Serial Attached SCSI (SAS) is another bus standard which uses the SCSI com-
mand set. As opposed to SCSI, however, with physical devices, serial cables are
used instead of parallel ones, which simplifies physical device connections. In
89
5 Virtual storage
some ways, therefore, SAS is to SCSI what SATA is to IDE: it allows for more
reliable and faster connections.
To support high-end guests which require SAS controllers, VirtualBox emulates
a LsiLogic SAS controller, which can be enabled much the same way as a SCSI
controller. At this time, up to eight devices can be connected to the SAS con-
troller.3
Warning: As with SATA, the SAS controller will only be seen by operating
systems with device support for it. In particular, there is no support for SAS
in Windows before Windows Vista, so Windows XP (even SP2) will not see
such disks unless you install additional drivers.
In summary, VirtualBox gives you the following categories of virtual storage slots:
1. four slots attached to the traditional IDE controller, which are always present
(one of which typically is a virtual CD/DVD drive);
2. 30 slots attached to the SATA controller, if enabled and provided that your guest
operating system can see it; these slots can either be
a) in IDE compatibility mode (by default, slots 0-3) or
b) in SATA mode;
3. 16 slots attached to the SCSI controller, if enabled and supported by the guest
operating system;
4. eight slots attached to the SAS controller, if enabled and supported by the guest
operating system.
Given this large choice of storage controllers, you may ask yourself which one to
choose. In general, you should avoid IDE unless it is the only controller supported by
your guest. Whether you use SATA, SCSI or SAS does not make any real difference.
90
5 Virtual storage
• Normally, VirtualBox uses its own container format for guest hard disks – Virtual
Disk Image (VDI) files. In particular, this format will be used when you create a
new virtual machine with a new disk.
• VirtualBox also fully supports the popular and open VMDK container format that
is used by many other virtualization products, in particular, by VMware.4
• VirtualBox also fully supports the VHD format used by Microsoft.
• Image files of Parallels version 2 (HDD format) are also supported.5 For lack of
documentation of the format, newer formats (3 and 4) are not supported. You
can however convert such image files to version 2 format using tools provided
by Parallels.
Irrespective of the disk format, as briefly mentioned in chapter 1.6, Creating your
first virtual machine, page 18, there are two options of how to create a disk image:
fixed-size or dynamically expanding.
• If you create a fixed-size image of e.g. 10 GB, an image file of roughly the same
size will be created on your host system. Note that the creation of a fixed-size
image can take a long time depending on the size of the image and the write
performance of your hard disk.
4 Initial support for VMDK was added with VirtualBox 1.4; since version 2.1, VirtualBox supports VMDK
fully, meaning that you can create snapshots and use all the other advanced features described above for
VDI images with VMDK also.
5 Support was added with VirtualBox 3.1.
91
5 Virtual storage
The window shows you all images that are currently registered with VirtualBox, con-
veniently grouped in three tabs for the three possible formats. These formats are:
• Hard disk images, either in VirtualBox’s own Virtual Disk Image (VDI) format or
in the third-party formats listed above;
As you can see in the screenshot above, for each image, the Virtual Media Manager
shows you the full path of the image file and other information, such as the virtual
machine the image is currently attached to, if any.
The Virtual Media Manager allows you to
• create new hard disk images using the “New” button; this will bring up the
“Create Disk Image” wizard already described in chapter 1.6, Creating your first
virtual machine, page 18;
• import existing image files from your hard drive into VirtualBox using the “Add”
button;
• remove an image from the registry (and optionally delete the image file when
doing so);
92
5 Virtual storage
We recommend that you maintain two special folders on your system for keeping
images: one for hard disk image files (which can, in the case of dynamically expand-
ing images, grow to considerable sizes), and one for ISO files (which were probably
downloaded from the Internet).
Hard disk image files can be copied onto other host systems and imported into
virtual machines there, although certain guest systems (notably Windows 2000 and
XP) will require that the new virtual machine be set up in a similar way to the old one.
Note: Do not simply make copies of virtual disk images. If you import such
a second copy into a virtual machine, VirtualBox will complain with an er-
ror, since VirtualBox assigns a unique identifier (UUID) to each disk image to
make sure it is only used once. See chapter 5.6, Cloning disk images, page 98
for instructions on this matter. Also, if you want to copy a virtual machine to
another system, VirtualBox has an import/export facility that might be bet-
ter suited for your needs; see chapter 1.11, Importing and exporting virtual
machines, page 30.
93
5 Virtual storage
94
5 Virtual storage
Note: As a special exception, immutable images are not reset if they are at-
tached to a machine whose last snapshot was taken while the machine was
running (a so-called “online” snapshot). As a result, if the machine’s current
snapshot is such an “online” snapshot, its immutable images behave exactly
like the “normal” images described previously. To re-enable the automatic
resetting of such images, delete the current snapshot of the machine.
To illustrate the differences between the various types with respect to snapshots:
Assume you have installed your guest operating system in your VM, and you have
taken a snapshot. Imagine you have accidentally infected your VM with a virus and
would like to go back to the snapshot. With a normal hard disk image, you simply
restore the snapshot, and the earlier state of your hard disk image will be restored
as well (and your virus infection will be undone). With an immutable hard disk,
all it takes is to shut down and power on your VM, and the virus infection will be
discarded. With a write-through image however, you cannot easily undo the virus
infection by means of virtualization, but will have to disinfect your virtual machine
like a real computer.
Still, you might find write-through images useful if you want to preserve critical
data irrespective of snapshots, and since you can attach more than one image to a VM,
you may want to have one immutable for the operating system and one write-through
for your data files.
95
5 Virtual storage
image. The differencing image is then typically referred to as a “child”, which holds
the differences to its “parent”.
When a differencing image is active, it receives all write operations from the virtual
machine instead of its parent. The differencing image only contains the sectors of the
virtual hard disk that have changed since the differencing image was created. When
the machine reads a sector from such a virtual hard disk, it looks into the differencing
image first. If the sector is present, it is returned from there; if not, VirtualBox looks
into the parent. In other words, the parent becomes “read-only”; it is never written to
again, but it is read from if a sector has not changed.
Differencing images can be chained. If another differencing image is created for a
virtual disk that already has a differencing image, then it becomes a “grandchild” of
the original parent. The first differencing image then becomes read-only as well, and
write operations only go to the second-level differencing image. When reading from
the virtual disk, VirtualBox needs to look into the second differencing image first, then
into the first if the sector was not found, and then into the original image.
There can be an unlimited number of differencing images, and each image can
have more than one child. As a result, the differencing images can form a complex
tree with parents, “siblings” and children, depending on how complex your machine
configuration is. Write operations always go to the one “active” differencing image
that is attached to the machine, and for read operations, VirtualBox may need to look
up all the parents in the chain until the sector in question is found. You can look at
such a tree in the Virtual Media Manager:
In all of these situations, from the point of view of the virtual machine, the virtual
hard disk behaves like any other disk. While the virtual machine is running, there
is a slight run-time I/O overhead because VirtualBox might need to look up sectors
96
5 Virtual storage
several times. This is not noticeable however since the tables with sector information
are always kept in memory and can be looked up quickly.
Differencing images are used in the following situations:
97
5 Virtual storage
scsi-SATA_VBOX_HARDDISK_VB5cfdb1e2-c251e503
98
5 Virtual storage
1. Delayed writing through the host OS cache is less secure. When the guest OS
writes data, it considers the data written even though it has not yet arrived on a
physical disk. If for some reason the write does not happen (power failure, host
crash), the likelihood of data loss increases.
2. Disk image files tend to be very large. Caching them can therefore quickly use
up the entire host OS cache. Depending on the efficiency of the host OS caching,
this may slow down the host immensely, especially if several VMs run at the same
time. For example, on Linux hosts, host caching may result in Linux delaying all
writes until the host cache is nearly full and then writing out all these changes
at once, possibly stalling VM execution for minutes. This can result in I/O errors
in the guest as I/O requests time out there.
3. Physical memory is often wasted as guest operating systems typically have their
own I/O caches, which may result in the data being cached twice (in both the
guest and the host caches) for little effect.
As a result, starting with version 3.2, VirtualBox allows you to optionally disable
host I/O caching of disk image files. In that case, VirtualBox uses its own small cache
to buffer writes, but there is no read caching since this is already performed by the
guest OS. In addition, VirtualBox fully supports asynchronous I/O for its virtual SATA,
SCSI and SAS controllers through multiple I/O threads.
Since asynchronous I/O is not supported by IDE controllers, for performance rea-
sons, you may want to leave host caching enabled for your VM’s virtual IDE controllers.
For this reason, VirtualBox allows you to configure whether the host I/O cache is
used for each I/O controller separately. Either uncheck the “Use host I/O cache” box
in the “Storage” settings for a given virtual storage controller, or use the following
VBoxManage command to disable the host I/O cache for a virtual storage controller:
VBoxManage storagectl <vm> --name <controllername> --hostiocache off
Note: Disabling the host I/O caches will currently yield poor performance
with VHD and sparse VMDK files. See chapter 13, Known limitations, page
210 for details.
99
5 Virtual storage
• Host Drive defines that the guest can read from the medium in the host drive.
Medium changes of the host drives are signalled to the guest.
• Image file gives the guest read-only access to the image data (often referred
to as ISO image). A medium change is signalled when switching to a different
image or selecting another option.
• Empty stands for a drive without an inserted medium. The drive responds as
usual to this situation, however no data can be read.
As mentioned, the medium change signalling depends on the selected option for
the medium. Medium changes can be prevented by the guest, and VirtualBox reflects
that by locking the host drive if appropriate. You can force a medium removal in such
situation via the VirtualBox GUI or the VBoxManage command line tool. Effectively
this is the equivalent of the emergency eject which many CD/DVD drives provide, with
all associated side effects. The guest OS can issue error messages in this case, just like
on real hardware. Use with caution.
In any case, only data media is supported for CD/DVD drives. This means that
all data CD formats and all DVD formats can be used in principle. Since host DVD
drives refuse to read encrypted DVD video media, you cannot play such videos with
the regular CD/DVD drive emulation. You may be able to get it working with the
experimental passthrough support described in chapter 5.9, Writing CDs and DVDs
using the host drive, page 100.
Audio CD and video CD formats are not supported, which means you cannot play
such media from a virtual machine.
100
5 Virtual storage
101
5 Virtual storage
VBoxInternal/Devices/IntNetIP/0/Config/IP 10.0.9.1
VBoxManage setextradata "VM name"
VBoxInternal/Devices/IntNetIP/0/Config/Netmask 255.255.255.0
VBoxManage setextradata "VM name"
VBoxInternal/Devices/IntNetIP/0/LUN#0/Driver IntNet
VBoxManage setextradata "VM name"
VBoxInternal/Devices/IntNetIP/0/LUN#0/Config/Network MyIntNet
VBoxManage setextradata "VM name"
VBoxInternal/Devices/IntNetIP/0/LUN#0/Config/IsService 1
Finally the iSCSI disk must be registered with the -intnet option to tell the iSCSI
initiator to use internal networking:
VBoxManage addiscsidisk --server 10.0.9.30
--target iqn.2008-12.com.sun:sampletarget --intnet
102
6 Virtual networking
As briefly mentioned in chapter 3.8, Network settings, page 58, VirtualBox provides up
to eight virtual PCI Ethernet cards for each virtual machine. For each such card, you
can individually select
1. the hardware that will be virtualized as well as
2. the virtualization mode that the virtual card will be operating in with respect to
your physical networking hardware on the host.
Four of the network cards can be configured in the “Network” section of the settings
dialog in the graphical user interface of VirtualBox. You can configure all eight network
cards on the command line via VBoxManage modifyvm; see chapter 8.7, VBoxManage
modifyvm, page 131.
This chapter explains the various networking settings in more detail.
103
6 Virtual networking
• Linux kernels version 2.6.25 or later can be configured to provide virtio support;
some distributions also back-ported virtio to older kernels.
• For Windows 2000, XP and Vista, virtio drivers can be downloaded and installed
from the KVM project web page.2
VirtualBox also has limited support for so-called jumbo frames, i.e. networking
packets with more than 1500 bytes of data, provided that you use the Intel card virtual-
ization and bridged networking. In other words, jumbo frames are not supported with
the AMD networking devices; in those cases, jumbo packets will silently be dropped
for both the transmit and the receive direction. Guest operating systems trying to use
this feature will observe this as a packet loss, which may lead to unexpected applica-
tion behavior in the guest. This does not cause problems with guest operating systems
in their default configuration, as jumbo frames need to be explicitly enabled.
Not attached In this mode, VirtualBox reports to the guest that a network card is
present, but that there is no connection – as if no Ethernet cable was plugged
into the card. This way it is possible to “pull” the virtual Ethernet cable and
disrupt the connection, which can be useful to inform a guest operating system
that no network connection is available and enforce a reconfiguration.
Network Address Translation (NAT) If all you want is to browse the Web, download
files and view e-mail inside the guest, then this default mode should be sufficient
for you, and you can safely skip the rest of this section. Please note that there
are certain limitations when using Windows file sharing (see chapter 6.3.3, NAT
limitations, page 107 for details).
2 http://www.linux-kvm.org/page/WindowsGuestDrivers.
104
6 Virtual networking
Bridged networking This is for more advanced networking needs such as network
simulations and running servers in a guest. When enabled, VirtualBox connects
to one of your installed network cards and exchanges network packets directly,
circumventing your host operating system’s network stack.
Internal networking This can be used to create a different kind of software-based
network which is visible to selected virtual machines, but not to applications
running on the host or to the outside world.
Host-only networking This can be used to create a network containing the host and
a set of virtual machines, without the need for the host’s physical network in-
terface. Instead, a virtual network interface (similar to a loopback interface) is
created on the host, providing connectivity among virtual machines and the host.
VDE (Virtual Distributed Ethernet) networking This option can be used to connect
to a Virtual Distributed Ethernet switch on a Linux or a FreeBSD host. It is only
available if the VDE software and the VDE plugin library from the VirtualSquare
project are installed on the host system. For more information on setting up VDE
networks, please see the documentation accompanying the software.
The following sections describe the available network modes in more detail.
105
6 Virtual networking
connected to the private network 10.0.2.0, the second card to the network 10.0.3.0
and so on. If you need to change the guest-assigned IP range for some reason, please
refer to chapter 9.10, Fine-tuning the VirtualBox NAT engine, page 175.
With the above example, all TCP traffic arriving on port 2222 on any host interface will
be forwarded to port 22 in the guest. The protocol name tcp is a mandatory attribute
defining which protocol should be used for forwarding (udp could also be used). The
name guestssh is purely descriptive and will be auto-generated if omitted. The num-
ber after --natpf denotes the network card, like in other parts of VBoxManage.
To remove this forwarding rule again, use the following command:
VBoxManage modifyvm "VM name" --natpf1 delete "guestssh"
If for some reason the guest uses a static assigned IP address not leased from the
built-in DHCP server, it is required to specify the guest IP when registering the for-
warding rule:
VBoxManage modifyvm "VM name" --natpf1 "guestssh,tcp,,2222,10.0.2.19,22"
This example is identical to the previous one, except that the NAT engine is being told
that the guest can be found at the 10.0.2.19 address.
To forward all incoming traffic from a specific host interface to the guest, specify the
IP of that host interface like this:
106
6 Virtual networking
This forwards all TCP traffic arriving on the localhost interface (127.0.0.1) via port
2222 to port 22 in the guest.
It is not possible to configure incoming NAT connections while the VM is running.
However, you can change the settings for a VM which is currently saved (or powered
off at a snapshot).
ICMP protocol limitations: Some frequently used network debugging tools (e.g.
ping or tracerouting) rely on the ICMP protocol for sending/receiving messages.
While ICMP support has been improved with VirtualBox 2.1 (ping should now
work), some other tools may not work reliably.
Receiving of UDP broadcasts is not reliable: The guest does not reliably receive
broadcasts, since, in order to save resources, it only listens for a certain amount
of time after the guest has sent UDP data on a particular port. As a consequence,
NetBios name resolution based on broadcasts does not always work (but WINS
always works). As a workaround, you can use the numeric IP of the desired
server in the \\server\share notation.
Protocols such as GRE are unsupported: Protocols other than TCP and UDP are
not supported. This means some VPN products (e.g. PPTP from Microsoft) can-
not be used. There are other VPN products which use simply TCP and UDP.
Forwarding host ports < 1024 impossible: On Unix-based hosts (e.g. Linux, So-
laris, Mac OS X) it is not possible to bind to ports below 1024 from applications
that are not run by root. As a result, if you try to configure such a port forward-
ing, the VM will refuse to start.
These limitations normally don’t affect standard network use. But the presence of
NAT has also subtle effects that may interfere with protocols that are normally work-
ing. One example is NFS, where the server is often configured to refuse connections
from non-privileged ports (i.e. ports not below 1024).
107
6 Virtual networking
Note: Even though TAP is no longer necessary on Linux with bridged network-
ing, you can still use TAP interfaces for certain advanced setups, since you can
connect a VM to any host interface – which could also be a TAP interface.
To enable bridged networking, all you need to do is to open the Settings dialog of
a virtual machine, go to the “Network” page and select “Bridged network” in the drop
down list for the “Attached to” field. Finally, select desired host interface from the
list at the bottom of the page, which contains the physical network interfaces of your
systems. On a typical MacBook, for example, this will allow you to select between
“en1: AirPort” (which is the wireless interface) and “en0: Ethernet”, which represents
the interface with a network cable.
Depending on your host operating system, the following limitations should be kept
in mind:
• On Macintosh hosts, functionality is limited when using AirPort (the Mac’s wire-
less networking) for bridged networking. Currently, VirtualBox supports only
IPv4 over AirPort. For other protocols such as IPv6 and IPX, you must choose a
wired interface.
108
6 Virtual networking
Also, setting the MTU to less than 1500 bytes on wired interfaces provided by
the sky2 driver on the Marvell Yukon II EC Ultra Ethernet NIC is known to cause
packet losses under certain conditions.
• On Solaris hosts, there is no support for using wireless interfaces. Filtering guest
traffic using IPFilter is also not completely supported due to technical restrictions
of the Solaris networking subsystem. These issues would be addressed in a future
release of OpenSolaris.
With VirtualBox 2.0.4 and above, it is possible to use Crossbow Virtual Network
Interfaces (VNICs) with bridged networking, but with the following caveats:
– A VNIC cannot be shared between multiple guest network interfaces, i.e.
each guest network interface must have its own, exclusive VNIC.
– The VNIC and the guest network interface that uses the VNIC must be as-
signed identical MAC addresses.
When using VLAN interfaces with VirtualBox, they must be named according to
the PPA-hack naming scheme (e.g. “e1000g513001”), as otherwise the guest
may receive packets in an unexpected format.
1. Security. In bridged networking mode, all traffic goes through a physical inter-
face of the host system. It is therefore possible to attach a packet sniffer (such
as Wireshark) to the host interface and log all traffic that goes over it. If, for
any reason, you prefer two or more VMs on the same machine to communi-
cate privately, hiding their data from both the host system and the user, bridged
networking therefore is not an option.
2. Speed. Internal networking is more efficient than bridged networking, as
VirtualBox can directly transmit the data without having to send it through the
host operating system’s networking stack.
Internal networks are created automatically as needed, i.e. there is no central con-
figuration. Every internal network is identified simply by its name. Once there is more
than one active virtual network card with the same internal network ID, the VirtualBox
support driver will automatically “wire” the cards and act as a network switch. The
VirtualBox support driver implements a complete Ethernet switch and supports both
broadcast/multicast frames and promiscuous mode.
109
6 Virtual networking
In order to attach a VM’s network card to an internal network, set its networking
mode to “internal networking”. There are two ways to accomplish this:
• You can use a VM’s “Settings” dialog in the VirtualBox graphical user interface.
In the “Networking” category of the settings dialog, select “Internal Networking”
from the drop-down list of networking modes. Now select the name of an exist-
ing internal network from the drop-down below or enter a new name into the
entry field.
• You can use
VBoxManage modifyvm "VM name" --nic<x> intnet
If you do not specify a network name, the network card will be attached to the
network intnet by default.
Unless you configure the (virtual) network cards in the guest operating systems that
are participating in the internal network to use static IP addresses, you may want to use
the DHCP server that is built into VirtualBox to manage IP addresses for the internal
network. Please see chapter 8.29, VBoxManage dhcpserver, page 157 for details.
As a security measure, the Linux implementation of internal networking only allows
VMs running under the same user ID to establish an internal network.
110
6 Virtual networking
to set up a host-only network for the two. A second (bridged) network would then
connect the web server to the outside world to serve data to, but the outside world
cannot connect to the database.
To change a virtual machine’s virtual network interface to “host only” mode:
• either go to the “Network” page in the virtual machine’s settings notebook in the
graphical user interface and select “Host-only networking”, or
• on the command line, type VBoxManage modifyvm "VM name" --nic<x>
hostonly; see chapter 8.7, VBoxManage modifyvm, page 131 for details.
For host-only networking, like with internal networking, you may find the DHCP
server useful that is built into VirtualBox. This can be enabled to then manage the IP
addresses in the host-only network since otherwise you would need to configure all IP
addresses statically.
• In the VirtualBox graphical user interface, you can configure all these items in
the global settings via “File” -> “Settings” -> “Network”, which lists all host-only
networks which are presently in use. Click on the network name and then on the
“Edit” button to the right, and you can modify the adapter and DHCP settings.
• Alternatively, you can use VBoxManage dhcpserver on the command line;
please see chapter 8.29, VBoxManage dhcpserver, page 157 for details.
111
7 Remote virtual machines
7.1 Remote display (VRDP support)
VirtualBox, the graphical user interface, has a built-in server for the VirtualBox Remote
Desktop Protocol (VRDP). This allows you to see the output of a virtual machine’s
window remotely on any other computer and control the virtual machine from there,
as if the virtual machine was running locally.
VRDP is a backwards-compatible extension to Microsoft’s Remote Desktop Protocol
(RDP). Typically graphics updates and audio are sent from the remote machine to the
client, while keyboard and mouse events are sent back. As a result, you can use any
standard RDP client to control the remote VM.
With VirtualBox, the graphical user interface, the VRDP server is disabled by de-
fault, but can easily be enabled on a per-VM basis either in the “Display” settings (see
chapter 3.5, Display settings, page 55) or with VBoxManage:
VBoxManage modifyvm "VM name" --vrdp on
If you use VBoxHeadless (described further below), VRDP support will be automat-
ically enabled since VBoxHeadless has no other means of output.
112
7 Remote virtual machines
The actual port used by a running VM can be either queried with VBoxManage
showvminfo command or seen in the GUI on the Runtime tab of the Session
Information Dialog, which is accessible via the Machine menu of the VM window.
Here follow examples for the most common RDP viewers:
Replace “1.2.3.4” with the host IP address, and 3389 with a different port if
necessary.
• On other systems, you can use the standard open-source rdesktop program.
This ships with most Linux distributions, but VirtualBox also comes with a modi-
fied variant of rdesktop for remote USB support (see chapter 7.1.4, Remote USB,
page 116 below).
With rdesktop, use a command line such as the following:
rdesktop -a 16 -N 1.2.3.4:3389
As said for the Microsoft viewer above, replace “1.2.3.4” with the host IP address,
and 3389 with a different port if necessary. The -a 16 option requests a color
depth of 16 bits per pixel, which we recommend. (For best performance, after
installation of the guest operating system, you should set its display color depth
to the same value). The -N option enables use of the NumPad keys.
• If you run the KDE desktop, you might prefer krdc, the KDE RDP viewer. The
command line would look like this:
krdc --window --high-quality rdp:/1.2.3.4[:3389]
Again, replace “1.2.3.4” with the host IP address, and 3389 with a different port
if necessary. The “rdp:/“ bit is required with krdc to switch it into RDP mode.
113
7 Remote virtual machines
VirtualBox therefore comes with yet another front-end called VBoxHeadless, which
produces no visible output on the host at all, but instead only delivers VRDP data.1
To start a virtual machine with VBoxHeadless, you have two options:
The extra --type option causes the VirtualBox core to use VBoxHeadless as the
front-end to the internal virtualization engine.
• The alternative is to use VBoxHeadless directly, as follows:
VBoxHeadless --startvm <uuid|name>
This way of starting the VM has the advantage that you can see more de-
tailed error messages, especially for early failures before the VM execution is
started. If you have trouble with VBoxManage startvm, it can help greatly to
start VBoxHeadless directly to diagnose the problem cause.
Note that when you use VBoxHeadless to start a VM, since the headless server has
no other means of output, the built-in VRDP server will always be enabled, regardless
of whether you have enabled the VRDP server in the VM’s settings. If this is undesirable
(for example because you want to access the VM via ssh only), start the VM like this:
VBoxHeadless --startvm <uuid|name> --vrdp=off
To have the VRDP server use the setting from the VM configuration, as the other front-
ends would, use this:
VBoxHeadless --startvm <uuid|name> --vrdp=config
1. VirtualBox on a server machine with a supported host operating system; for the
following example, we will assume a Linux server;
2. an ISO file on the server, containing the installation data for the guest operating
system to install (we will assume Windows XP in the following example);
3. a terminal connection to that host over which you can access a command line
(e.g. via telnet or ssh);
1 BeforeVirtualBox 1.6, the headless server was called VBoxVRDP. For the sake of backwards compatibility,
the VirtualBox installation still installs an executable with that name as well.
114
7 Remote virtual machines
4. an RDP viewer on the remote client; see chapter 7.1.1, Common third-party RDP
viewers, page 112 above for examples.
Note again that on the server machine, since we will only use the headless server,
neither Qt nor SDL nor the X Window system will be needed.
Note that if you do not specify --register, you will have to manually use the
registervm command later.
Note further that you do not need to specify --ostype but doing so selects some
sane default values for certain VM parameters, for example the RAM size and the
type of the virtual network device. To get a complete list of supported operating
systems you can use
VBoxManage list ostypes
2. Make sure the settings for this VM are appropriate for the guest operating system
that we will install. For example:
VBoxManage modifyvm "Windows XP" --memory 256 --acpi on --boot1 dvd --nic1 nat
3. Create a virtual hard disk for the VM (in this case, 10GB in size) and register it
with VirtualBox:
VBoxManage createhd --filename "WinXP.vdi" --size 10000 --remember
5. Set this newly created VDI file as the first virtual hard disk of the new VM:
VBoxManage storageattach "Windows XP" --storagectl "IDE Controller"
--port 0 --device 0 --type hdd --medium "WinXP.vdi"
6. Register the ISO file that contains the operating system installation that you want
to install later:
VBoxManage openmedium dvd /full/path/to/iso.iso
7. Attach this ISO to the virtual machine, so it can boot from it:
VBoxManage storageattach "Windows XP" --storagectl "IDE Controller"
--port 0 --device 1 --type dvddrive --medium /full/path/to/iso.iso
If everything worked, you should see a copyright notice. If, instead, you are
returned to the command line, then something went wrong.
115
7 Remote virtual machines
9. On the client machine, fire up the RDP viewer and try to connect to the server
(see chapter 7.1.1, Common third-party RDP viewers, page 112 above for how to
use various common RDP viewers).
You should now be seeing the installation routine of your guest operating system
in the RDP viewer.
Note that rdesktop-vrdp can access USB devices only through /proc/bus/usb.
Please refer to chapter 12.6.7, USB not working, page 207 for further details on how
to properly set up the permissions. Furthermore it is advisable to disable automatic
loading of any host driver on the remote host which might work on USB devices to
ensure that the devices are accessible by the RDP client. If the setup was properly
done on the remote host, plug/unplug events are visible on the VBox.log file of the
VM.
116
7 Remote virtual machines
• The “null” method means that there is no authentication at all; any client can
connect to the VRDP server and thus the virtual machine. This is, of course, very
insecure and only to be recommended for private networks.
In addition to the methods described above, you can replace the default “external
authentication module with any other module. For this, VirtualBox provides a well-
defined interface that allows you to write your own authentication module; see chapter
9.6.3, Custom external VRDP authentication, page 169 for details.
117
7 Remote virtual machines
1. Historically, RDP4 authentication was used, with which the RDP client does not
perform any checks in order to verify the identity of the server it connects to.
Since user credentials can be obtained using a man in the middle (MITM) attack,
RDP4 authentication is insecure and should generally not be used.
2. RDP5.1 authentication employs a server certificate for which the client possesses
the public key. This way it is guaranteed that the server possess the correspond-
ing private key. However, as this hard-coded private key became public some
years ago, RDP5.1 authentication is also insecure and cannot be recommended.
3. RDP5.2 authentication is based on TLS 1.0 with customer-supplied certificates.
The server supplies a certificate to the client which must be signed by a certificate
authority (CA) that the client trusts (for the Microsoft RDP Client 5.2, the CA
has to be added to the Windows Trusted Root Certificate Authorities database).
VirtualBox allows you to supply your own CA and server certificate and uses
OpenSSL for encryption.
While VirtualBox supports all of the above, only RDP5.2 authentication should be
used in environments where security is a concern. As the client that connects to the
server determines what type of encryption will be used, with rdesktop, the Linux RDP
viewer, use the -4 or -5 options.
118
7 Remote virtual machines
The MS RDP6 client does not let you specify a separate domain name. Instead,
use domain\username in the Username: field – for example, @2\name. name must be
supplied, and must be the name used to log in if the VRDP server is set up to require
credentials. If it is not, you may use any text as the username.
The quality of the video is defined as a value from 10 to 100 percent, as is common
with JPEG compression. The quality can be changed using the following command:
VBoxManage modifyvm "VM name" --vrdpvideochannelquality 75
7.2 Teleporting
Starting with version 3.1, VirtualBox supports “teleporting” – that is, moving a virtual
machine over a network from one VirtualBox host to another, while the virtual machine
is running. This works regardless of the host operating system that is running on the
hosts: you can teleport virtual machines between Solaris and Mac hosts, for example.
Teleporting requires that a machine be currently running on one host, which is then
called the “source”. The host to which the virtual machine will be teleported will
then be called the “target”; the machine on the target is then configured to wait for
the source to contact the target. The machine’s running state will then be transferred
from the source to the target with minimal downtime.
Teleporting happens over any TCP/IP network; the source and the target only need
to agree on a TCP/IP port which is specified in the teleporting settings.
At this time, there are a few prerequisites for this to work, however:
1. On the target host, you must configure a virtual machine in VirtualBox with ex-
actly the same hardware settings as the machine on the source that you want to
teleport. This does not apply to settings which are merely descriptive, such as the
VM name, but obviously for teleporting to work, the target machine must have
119
7 Remote virtual machines
the same amount of memory and other hardware settings. Otherwise teleporting
will fail with an error message.
2. The two virtual machines on the source and the target must share the same
storage (hard disks as well as floppy and CD/DVD images). This means that they
either use the same iSCSI targets or that the storage resides somewhere on the
network and both hosts have access to it via NFS or SMB/CIFS.
This also means that neither the source nor the target machine can have any
snapshots.
Then perform the following steps:
1. On the target host, configure the virtual machine to wait for a teleport request
to arrive when it is started, instead of actually attempting to start the machine.
This is done with the following VBoxManage command:
VBoxManage modifyvm <targetvmname> --teleporter on --teleporterport <port>
where <targetvmname> is the name of the virtual machine on the target host
and <port> is a TCP/IP port number to be used on both the source and the
target hosts. For example, use 6000. For details, see chapter 8.7.5, Teleporting
settings, page 138.
2. Start the VM on the target host. You will see that instead of actually running, it
will show a progress dialog. indicating that it is waiting for a teleport request to
arrive.
3. Start the machine on the source host as usual. When it is running and you want
it to be teleported, issue the following command on the source host:
VBoxManage controlvm <sourcevmname> teleport --host <targethost> --port <port>
where <sourcevmname> is the name of the virtual machine on the source host
(the machine that is currently running), <targethost> is the host or IP name
of the target host on which the machine is waiting for the teleport request, and
<port> must be the same number as specified in the command on the target
host. For details, see chapter 8.11, VBoxManage controlvm, page 141.
For testing, you can also teleport machines on the same host; in that case, use
“localhost” as the hostname on both the source and the target host.
Note: In rare cases, if the CPUs of the source and the target are very different,
teleporting can fail with an error message, or the target may hang. This may
happen especially if the VM is running application software that is highly
optimized to run on a particular CPU without correctly checking that certain
CPU features are actually present. VirtualBox filters what CPU capabilities
are presented to the guest operating system. Advanced users can attempt
to restrict these virtual CPU capabilities with the VBoxManage --modifyvm
--cpuid command; see chapter 8.7.5, Teleporting settings, page 138.
120
8 VBoxManage
8.1 Introduction
As briefly mentioned in chapter 1.12, Alternative front-ends, page 33, VBoxManage
is the command-line interface to VirtualBox. With it, you can completely control
VirtualBox from the command line of your host operating system. VBoxManage sup-
ports all the features that the graphical user interface gives you access to, but it sup-
ports a lot more than that. It exposes really all the features of the virtualization engine,
even those that cannot (yet) be accessed from the GUI.
You will need to use the command line if you want to
• use a different user interface than the main GUI (for example, VBoxSDL or the
VBoxHeadless server);
• control some of the more advanced and experimental configuration settings for
a VM.
There are two main things to keep in mind when using VBoxManage: First,
VBoxManage must always be used with a specific “subcommand”, such as “list” or “cre-
atevm” or “startvm”. All the subcommands that VBoxManage supports are described in
detail in chapter 8, VBoxManage, page 121.
Second, most of these subcommands require that you specify a particular virtual
machine after the subcommand. There are two ways you can do this:
• You can specify the VM name, as it is shown in the VirtualBox GUI. Note that
if that name contains spaces, then you must enclose the entire name in dou-
ble quotes (as it is always required with command line arguments that contain
spaces).
For example:
VBoxManage startvm "Windows XP"
• You can specify the UUID, which is the internal unique identifier that VirtualBox
uses to refer to the virtual machine. Assuming that the aforementioned VM
called “Windows XP” has the UUID shown below, the following command has
the same effect as the previous:
VBoxManage startvm 670e746d-abea-4ba6-ad02-2a3b043810a5
You can type VBoxManage list vms to have all currently registered VMs listed with
all their settings, including their respective names and UUIDs.
121
8 VBoxManage
Some typical examples of how to control VirtualBox from the command line are
listed below:
• To create a new virtual machine from the command line and immediately regis-
ter it with VirtualBox, use VBoxManage createvm with the --register option,1
like this:
$ VBoxManage createvm --name "SUSE 10.2" --register
VirtualBox Command Line Management Interface Version 3.2.8
(C) 2005-2010 Oracle Corporation
All rights reserved.
As can be seen from the above output, a new virtual machine has been created
with a new UUID and a new XML settings file.
Usage:
122
8 VBoxManage
123
8 VBoxManage
[--nic<1-N> none|null|nat|bridged|intnet]
[--nictype<1-N> Am79C970A|Am79C973]
[--cableconnected<1-N> on|off]
[--nictrace<1-N> on|off]
[--nictracefile<1-N> <filename>]
[--nicspeed<1-N> <kbps>]
[--nicbootprio<1-N> <priority>]
[--bridgeadapter<1-N> none|<devicename>]
[--intnet<1-N> <network name>]
[--natnet<1-N> <network>|default]
[--natsettings<1-N> [<mtu>],[<socksnd>],
[<sockrcv>],[<tcpsnd>],
[<tcprcv>]]
[--natpf<1-N> [<rulename>],tcp|udp,[<hostip>],
<hostport>,[<guestip>],<guestport>]
[--natpf<1-N> delete <rulename>]
[--nattftpprefix<1-N> <prefix>]
[--nattftpfile<1-N> <file>]
[--nattftpserver<1-N> <ip>]
[--natdnspassdomain<1-N> on|off]
[--natdnsproxy<1-N> on|off]
[--natdnshostresolver<1-N> on|off]
[--nataliasmode<1-N> default|[log],[proxyonly],
[sameports]]
[--macaddress<1-N> auto|<mac>]
[--mouse ps2|usb|usbtablet
[--keyboard ps2|usb
[--uart<1-N> off|<I/O base> <IRQ>]
[--uartmode<1-N> disconnected|
server <pipe>|
client <pipe>|
file <file>|
<devicename>]
[--guestmemoryballoon <balloonsize in MB>]
[--gueststatisticsinterval <seconds>]
[--audio none|null|dsound|solaudio|oss|
oss|coreaudio]
[--audiocontroller ac97|sb16]
[--clipboard disabled|hosttoguest|guesttohost|
bidirectional]
[--vrdp on|off]
[--vrdpport default|<ports>]
[--vrdpaddress <host>]
[--vrdpauthtype null|external|guest]
[--vrdpmulticon on|off]
[--vrdpreusecon on|off]
[--vrdpvideochannel on|off]
[--vrdpvideochannelquality <percent>]
[--usb on|off]
[--usbehci on|off]
[--snapshotfolder default|<path>]
[--teleporter on|off]
[--teleporterport <port>]
[--teleporteraddress <address|empty>
[--teleporterpassword <password>]
124
8 VBoxManage
125
8 VBoxManage
[--uuid <uuid>]
[--parentuuid <uuid>] (disk only)
126
8 VBoxManage
--target <target>
[--port <port>]
[--lun <lun>]
[--encodedlun <lun>]
[--username <username>]
[--password <password>]
[--type normal|writethrough|immutable|shareable]
[--intnet]
127
8 VBoxManage
Each time VBoxManage is invoked, only one command can be executed. However, a
command might support several subcommands which then can be invoked in one sin-
gle call. The following sections provide detailed reference information on the different
commands.
128
8 VBoxManage
• vms lists all virtual machines currently registered with VirtualBox. By default
this displays a compact list with each VM’s name and UUID; if you also specify
--long or -l, this will be a detailed list as with the showvminfo command (see
below).
• runningvms lists all currently running virtual machines by their unique identi-
fiers (UUIDs) in the same format as with vms.
• hdds, dvds and floppies all give you information about virtual disk images cur-
rently registered in VirtualBox, including all their settings, the unique identifiers
(UUIDs) associated with them by VirtualBox and all files associated with them.
• ostypes lists all guest operating systems presently known to VirtualBox, along
with the identifiers used to refer to them with the modifyvm command.
• hostdvds, hostfloppies and hostifs, respectively, list DVD, floppy and host
networking interfaces on the host, along with the name used to access them from
within VirtualBox.
• hostusb supplies information about USB devices attached to the host, notably
information useful for constructing USB filters and whether they are currently in
use by the host.
• usbfilters lists all global USB filters registered with VirtualBox – that is, filters
for devices which are accessible to all virtual machines – and displays the filter
parameters.
• systemproperties displays some global VirtualBox settings, such as minimum
and maximum guest RAM and virtual hard disk size, folder settings and the
current authentication library in use.
• hddbackends lists all known hdd backends of VirtualBox. Beside the name of
the backend itself, descriptions about the capabilities, configuration and other
useful informations are displayed.
129
8 VBoxManage
Name: Windows XP
Guest OS: Other/Unknown
UUID: 1bf3464d-57c6-4d49-92a9-a5cc3816b7e7
Config file: /home/username/.VirtualBox/Machines/Windows XP/Windows XP.xml
Memory size: 512MB
VRAM size: 12MB
Number of CPUs: 2
Synthetic Cpu: off
Boot menu mode: message and menu
Boot Device (1): DVD
Boot Device (2): HardDisk
Boot Device (3): Not Assigned
Boot Device (4): Not Assigned
ACPI: on
IOAPIC: on
PAE: on
Time offset: 0 ms
Hardw. virt.ext: on
Hardw. virt.ext exclusive: on
Nested Paging: on
VT-x VPID: off
State: powered off (since 2009-10-20T14:52:19.000000000)
Monitor count: 1
3D Acceleration: off
2D Video Acceleration: off
Teleporter Enabled: off
Teleporter Port: 0
Teleporter Address:
Teleporter Password:
Storage Controller (0): IDE Controller
Storage Controller Type (0): PIIX4
Storage Controller (1): Floppy Controller 1
Storage Controller Type (1): I82078
IDE Controller (0, 0): /home/user/windows.vdi (UUID: 46f6e53a-4557-460a-9b95-68b0f17d744b)
IDE Controller (0, 1): /home/user/openbsd-cd46.iso (UUID: 4335e162-59d3-4512-91d5-b63e94eebe0b)
Floppy Controller 1 (0, 0): /home/user/floppy.img (UUID: 62ac6ccb-df36-42f2-972e-22f836368137)
NIC 1: disabled
NIC 2: disabled
NIC 3: disabled
NIC 4: disabled
NIC 5: disabled
NIC 6: disabled
NIC 7: disabled
NIC 8: disabled
UART 1: disabled
UART 2: disabled
Audio: disabled (Driver: Unknown)
Clipboard Mode: Bidirectional
VRDP: disabled
USB: disabled
Shared folders:
130
8 VBoxManage
<none>
Note: When creating a new virtual machine with VBoxManage createvm (see
below), you can directly specify the --register option to avoid having to
register it separately.
131
8 VBoxManage
dialog; these were described in chapter 3, Configuring virtual machines, page 47. Some
of the more advanced settings, however, are only available through the VBoxManage
interface.
These commands require that the machine is powered off (neither running nor in
“saved” state). Some machine settings can also be changed while a machine is run-
ning; those settings will then have a corresponding subcommand with the VBoxManage
controlvm subcommand (see chapter 8.11, VBoxManage controlvm, page 141).
• --name <name>: This changes the VM’s name and possibly renames the internal
virtual machine files, as described with VBoxManage createvm above.
• --memory <memorysize>: This sets the amount of RAM, in MB, that the virtual
machine should allocate for itself from the host. See the remarks in chapter 1.6,
Creating your first virtual machine, page 18 for more information.
• --vram <vramsize>: This sets the amount of RAM that the virtual graphics card
should have. See chapter 3.5, Display settings, page 55 for details.
• --acpi on|off; --ioapic on|off: These two determine whether the VM
should have ACPI and I/O APIC support, respectively; see chapter 3.4.1, “Moth-
erboard” tab, page 52 for details.
• --hardwareuuid <uuid>: The UUID presented to the guest via memory tables
(DMI/SMBIOS), hardware and guest properties. By default this is the same as
the VM uuid. Useful when cloning a VM. Teleporting takes care of this automat-
ically.
• --cpus <cpucount>: This sets the number of virtual CPUs for the virtual ma-
chine (see chapter 3.4.2, “Processor” tab, page 54). If CPU hot-plugging is en-
abled (see below), this then sets the maximum number of virtual CPUs that can
be plugged into the virtual machines.
• --rtcuseutc on|off: This option lets the real-time clock (RTC) operate in UTC
time (see chapter 3.4.1, “Motherboard” tab, page 52).
• --cpuhotplug on|off: This enables CPU hot-plugging. When enabled, virtual
CPUs can be added to and removed from a virtual machine while it is running.
See chapter 9.5, CPU hot-plugging, page 167 for more information.
132
8 VBoxManage
• --pae on|off: This enables/disables PAE (see chapter 3.4.2, “Processor” tab,
page 54).
• --hpet on|off: This enables/disables a High Precision Event Timer (HPET)
which can replace the legacy system timers. This is turned off by default. Note
that Windows supports a HPET only from Vista onwards.
133
8 VBoxManage
• You can influence the BIOS logo that is displayed when a virtual machine starts
up with a number of settings. Per default, a VirtualBox logo is displayed.
With --bioslogofadein on|off and --bioslogofadeout on|off, you can
determine whether the logo should fade in and out, respectively.
With --bioslogodisplaytime <msec> you can set how long the logo should
be visible, in milliseconds.
With --bioslogoimagepath <imagepath> you can, if you are so inclined, re-
place the image that is shown, with your own logo. The image must be an
uncompressed 256 color BMP file.
• --biosbootmenu disabled|menuonly|messageandmenu: This specifies
whether the BIOS allows the user to select a temporary boot device. menuonly
suppresses the message, but the user can still press F12 to select a temporary
boot device.
• --boot<1-4> none|floppy|dvd|disk|net: This specifies the boot order for
the virtual machine. There are four “slots”, which the VM will try to access from
1 to 4, and for each of which you can set a device that the VM should attempt to
boot from.
• --snapshotfolder default|<path>: This allows you to specify the folder in
which snapshots will be kept for a virtual machine.
• --firmware efi|bios: Specifies which firmware is used to boot particular vir-
tual machine: EFI or BIOS. Use EFI only if your fully understand what you’re
doing.
• --guestmemoryballoon <size> sets the default size of the guest memory bal-
loon, that is, memory allocated by the VirtualBox Guest Additions from the guest
operating system and returned to the hypervisor for re-use by other virtual ma-
chines. <size> must be specified in megabytes. The default size is 0 megabytes.
For details, see chapter 4.8, Memory ballooning, page 84.
134
8 VBoxManage
135
8 VBoxManage
• --natpf<1-N> [<name>],tcp|udp,[<hostip>],<hostport>,[<guestip>],
<guestport>: This option defines a NAT port-forwarding rule (please see chap-
ter 6.3.1, Configuring port forwarding with NAT, page 106 for details).
• --natpf<1-N> delete <name>: This option deletes a NAT port-forwarding rule
(please see chapter 6.3.1, Configuring port forwarding with NAT, page 106 for
details).
• --nattftpprefix<1-N> <prefix>: This option defines a prefix for the built-in
TFTP server, i.e. where the boot file is located (please see chapter 6.3.2, PXE
booting with NAT, page 107 and chapter 9.10.2, Configuring the boot server (next
server) of a NAT network interface, page 176 for details).
• --nattftpfile<1-N> <bootfile>: This option defines the TFT boot file
(please see chapter 9.10.2, Configuring the boot server (next server) of a NAT
network interface, page 176 for details).
• --nattftpserver<1-N> <tftpserver>: This option defines the TFTP server
address to boot from (please see chapter 9.10.2, Configuring the boot server (next
server) of a NAT network interface, page 176 for details).
• --natdnspassdomain<1-N> on|off: This option specifies whether the built-in
DHCP server passes the domain name for network name resolution.
• --natdnsproxy<1-N> on|off: This option makes the NAT engine proxy all
guest DNS requests to the host’s DNS servers (please see chapter 9.10.5, En-
abling DNS proxy in NAT mode, page 177 for details).
• --natdnshostresolver<1-N> on|off: This option makes the NAT engine use
the host’s resolver mechanisms to handle DNS requests (please see chapter
9.10.5, Enabling DNS proxy in NAT mode, page 177 for details).
• --natnatsettings<1-N> [<mtu>],[<socksnd>],[<sockrcv>],[<tcpsnd>],
[<tcprcv>]: This option controls several NAT settings (please see chapter
9.10.3, Tuning TCP/IP buffers for NAT, page 176 for details).
• --nataliasmode<1-N> default|[log],[proxyonly],[sameports]: This
option defines behaviour of NAT engine core: log - enables logging, proxy-
only - switches of aliasing mode makes NAT transparent, sameports enforces
NAT engine to send packets via the same port as they originated on, default -
disable all mentioned modes above . (please see chapter 9.10.7, Configuring
aliasing of the NAT engine, page 177 for details).
136
8 VBoxManage
• --uart<1-N> off|<I/O base> <IRQ>: With this option you can configure vir-
tual serial ports for the VM; see chapter 3.9, Serial ports, page 59 for an intro-
duction.
– disconnected: Even though the serial port is shown to the guest, it has no
“other end” – like a real COM port without a cable.
– server <pipename>: On a Windows host, this tells VirtualBox to create a
named pipe on the host named <pipename> and connect the virtual serial
device to it. Note that Windows requires that the name of a named pipe
begin with \\.\pipe\.
On a Linux host, instead of a named pipe, a local domain socket is used.
– client <pipename>: This operates just like server ..., except that the
pipe (or local domain socket) is not created by VirtualBox, but assumed to
exist already.
– <devicename>: If, instead of the above, the device name of a physical hard-
ware serial port of the host is specified, the virtual serial port is connected
to that hardware port. On a Windows host, the device name will be a
COM port such as COM1; on a Linux host, the device name will look like
/dev/ttyS0. This allows you to “wire” a real serial port to a virtual ma-
chine.
• --audio none|null|oss: With this option, you can set whether the VM should
have audio support.
• --clipboard disabled|hosttoguest|guesttohost|bidirectional: With
this setting, you can select whether the guest operating system’s clipboard should
be shared with the host; see chapter 3.3, General settings, page 50. This requires
that the Guest Additions be installed in the virtual machine.
• --monitorcount <count>: This enables multi-monitor support; see chapter
3.5, Display settings, page 55.
• --usb on|off: This option enables or disables the VM’s virtual USB controller;
see chapter 3.10.1, USB settings, page 60 for details.
• --usbehci on|off: This option enables or disables the VM’s virtual USB 2.0
controller; see chapter 3.10.1, USB settings, page 60 for details.
137
8 VBoxManage
• --vrdp on|off: With the VirtualBox graphical user interface, this enables or
disables the built-in VRDP server. Note that if you are using VBoxHeadless (see
chapter 7.1.2, VBoxHeadless, the VRDP-only server, page 113), VRDP output is
always enabled.
• --vrdpport default|<ports>: A port or a range of ports the VRDP server
can bind to; “default” or “0” means port 3389, the standard port for RDP. You
can specify a comma-separated list of ports or ranges of ports. Use a dash be-
tween two port numbers to specify a range. The VRDP server will bind to one
of available ports from the specified list. Only one machine can use a given port
at a time. For example, the option --vrdpport 5000,5010-5012 will tell the
server to bind to one of following ports: 5000, 5010, 5011 or 5012.
• --vrdpaddress <IP address>: The IP address of the host network interface
the VRDP server will bind to. If specified, the VRDP server will accept connec-
tions only on the specified host network interface.
• --vrdpauthtype null|external|guest: This allows you to choose whether
and how authorization will be performed; see chapter 7.1.5, RDP authentication,
page 116 for details.
• --vrdpmulticon on|off: This enables multiple VRDP connections to the same
VRDP server; see chapter 7.1.7, Multiple VRDP connections, page 118.
• --vrdpreusecon on|off: This specifies the VRDP server behavior when multi-
ple connections are disabled. When this option is enabled, the VRDP server will
allow a new client to connect and drop the existing connection. When this option
is disabled (this is the default setting), a new connection will not be accepted if
there is already a client connected to the server.
• --vrdpvideochannel on|off: This enables VRDP video acceleration; see chap-
ter 7.1.9, VRDP video redirection, page 119.
• --vrdpvideochannelquality <percent>: Sets the image quality for VRDP
video acceleration; see chapter 7.1.9, VRDP video redirection, page 119.
138
8 VBoxManage
• --teleporter on|off: With this setting you turn on or off whether a machine
waits for a teleporting request to come in on the network when it is started. If
“on”, when the machine is started, it does not boot the virtual machine as it
would normally; instead, it then waits for a teleporting request to come in on
the port and address listed with the next two parameters.
• --teleporterport <port>, --teleporteraddress <address>: these must
be used with –teleporter and tell the virtual machine on which port and address
it should listen for a teleporting request from another virtual machine. <port>
can be any free TCP/IP port number (e.g. 6000); <address> can be any IP
address or hostname and specifies the TCP/IP socket to bind to. The default is
“0.0.0.0”, which means any address.
• --teleporterpassword <password>: if this optional argument is given, then
the teleporting request will only succeed if the source machine specifies the same
password as the one given with this command.
• --cpuid <leaf> <eax> <ebx> <ecx> <edx>: Advanced users can use this
command before a teleporting operation to restrict the virtual CPU capabilities
that VirtualBox presents to the guest operating system. This must be run on
both the source and the target machines involved in the teleporting and will
then modify what the guest sees when it executes the CPUID machine instruc-
tion. This might help with misbehaving applications that wrongly assume that
certain CPU capabilities are present. The meaning of the parameters is hardware
dependent; please refer to the AMD or Intel processor manuals.
139
8 VBoxManage
Virtual system 0:
0: Suggested OS type: "WindowsXP"
(change with "--vsys 0 --ostype <type>"; use "list ostypes" to list all)
1: Suggested VM name "Windows XP Professional_1"
(change with "--vsys 0 --vmname <name>")
3: Number of CPUs: 1
(change with "--vsys 0 --cpus <n>")
4: Guest memory: 956 MB (change with "--vsys 0 --memory <MB>")
5: Sound card (appliance expects "ensoniq1371", can change on import)
(disable with "--vsys 0 --unit 5 --ignore")
6: USB controller
(disable with "--vsys 0 --unit 6 --ignore")
7: Network adapter: orig bridged, config 2, extra type=bridged
8: Floppy
(disable with "--vsys 0 --unit 8 --ignore")
9: SCSI controller, type BusLogic
(change with "--vsys 0 --unit 9 --scsitype {BusLogic|LsiLogic}";
disable with "--vsys 0 --unit 9 --ignore")
10: IDE controller, type PIIX4
(disable with "--vsys 0 --unit 10 --ignore")
11: Hard disk image: source image=WindowsXp.vmdk,
target path=/home/user/disks/WindowsXp.vmdk, controller=9;channel=0
(change controller with "--vsys 0 --unit 11 --controller <id>";
disable with "--vsys 0 --unit 11 --ignore")
As you can see, the individual configuration items are numbered, and depending
on their type support different command-line options. The import subcommand can
be directed to ignore many such items with a --vsys X --unit Y --ignore option,
where X is the number of the virtual system (zero unless there are several virtual
system descriptions in the appliance) and Y the item number, as printed on the screen.
In the above example, Item #1 specifies the name of the target machine in
VirtualBox. Items #9 and #10 specify hard disk controllers, respectively. Item #11 de-
scribes a hard disk image; in this case, the additional --controller option indicates
which item the disk image should be connected to, with the default coming from the
OVF file.
You can combine several items for the same virtual system behind the same --vsys
option. For example, to import a machine as described in the OVF, but without the
sound card and without the USB controller, and with the disk image connected to the
IDE controller instead of the SCSI controller, use this:
VBoxManage import WindowsXp.ovf
--vsys 0 --unit 5 --ignore --unit 6 --ignore --unit 11 --controller 10
140
8 VBoxManage
The export command is simple to use: list the machine (or the machines) that
you would like to export to the same OVF file and specify the target OVF file after an
additional --output or -o option. Note that the directory of the target OVF file will
also receive the exported disk images in the compressed VMDK format (regardless of
the original format) and should have enough disk space left for them.
Beside a simple export of a given virtual machine, you can append several prod-
uct information to the appliance file. Use --product, --producturl, --vendor,
--vendorurl and --version to specify this additional information. For legal rea-
sons you may add a license text or the content of a license file by using the --eula
and --eulafile option respectively. As with OVF import, you must use the --vsys X
option to direct the previously mentioned options to the correct virtual machine.
For virtualization products which aren’t fully compatible with the OVF standard 1.0
you can enable a OVF 0.9 legacy mode with the --legacy09 option.
The optional --type specifier determines whether the machine will be started in a
window (GUI mode, which is the default) or whether the output should go through
VBoxHeadless, with VRDP enabled or not; see chapter 7.1.2, VBoxHeadless, the VRDP-
only server, page 113 for more information. The list of types is subject to change, and
it’s not guaranteed that all types are accepted by any product variant.
The following values are allowed:
gui Starts a VM showing a GUI window. This is the default.
vrdp Starts a VM showing a GUI window, with its graphics card output accessible by
an RDP client.
headless Starts a VM without a window for remote RDP display only.
141
8 VBoxManage
A few extra options are available with controlvm that do not directly affect the
VM’s running state:
142
8 VBoxManage
• usbattach and usbdettach make host USB devices visible to the virtual ma-
chine on the fly, without the need for creating filters first. The USB devices can
be specified by UUID (unique identifier) or by address on the host system.
You can use VBoxManage list usbhost to locate this information.
• vrdp on|off lets you enable or disable the built-in VRDP server.
• vrdpport default|<ports> changes the port or a range of ports that the VRDP
server can bind to; “default” or “0” means port 3389, the standard port for RDP.
For details, see the description for the --vrdpport option in chapter 8.7.3, Serial
port, audio, clipboard, VRDP and USB settings, page 137.
• The guestmemoryballoon operation changes the size of the guest memory bal-
loon, that is, memory allocated by the VirtualBox Guest Additions from the guest
operating system and returned to the hypervisor for re-use by other virtual ma-
chines. This must be specified in megabytes. For details, see chapter 4.8, Memory
ballooning, page 84.
143
8 VBoxManage
The take operation takes a snapshot of the current state of the virtual machine. You
must supply a name for the snapshot and can optionally supply a description. The new
snapshot is inserted into the snapshots tree as a child of the current snapshot and then
becomes the new current snapshot.
The delete operation deletes a snapshot (specified by name or by UUID). This can
take a while to finish since the differencing images associated with the snapshot might
need to be merged with their child differencing images.
The restore operation will restore the given snapshot (specified by name or by
UUID) by resetting the virtual machine’s settings and current state to that of the snap-
shot. The previous current state of the machine will be lost. After this, the given
snapshot becomes the new “current” snapshot so that subsequent snapshots are in-
serted under the snapshot from which was restored.
The restorecurrent operation is a shortcut to restore the current snapshot (i.e.
the snapshot from which the current state is derived). This subcommand is equivalent
to using the “restore” subcommand with the name or UUID of the current snapshot,
except that it avoids the extra step of determining that name or UUID.
With the edit operation, you can change the name or description of an existing
snapshot.
With the showvminfo operation, you can view the virtual machine settings that were
stored with an existing snapshot.
When you register an images you can optionally specify a new UUID for the image.
For hard disk images the parent UUID can be changed as well. You can also specify the
type of the medium, see chapter 5.4, Special image write modes, page 93 for details.
When you unregister an image, you can optionally specify that the image should
be deleted. You will get appropriate diagnostics that the deletion failed, however the
image will become unregistered in any case.
144
8 VBoxManage
images attached to them. The list of the storage controllers attached to the VM can be
found by the command:
VBoxManage showvminfo <vmname>
sataportcount This determines how many ports the SATA controller should support.
hostiocache Configures the use of the host I/O cache for all disk images attached to
this storage controller. For details, please see chapter 5.7, Disk images and I/O
caching, page 98.
145
8 VBoxManage
forceunmount If this option is specified then you can unmount the DVD/CD/Floppy
or mount a new DVD/CD/Floppy even if the previous one is locked down by the
guest for reading.
Note: The option “–medium none” doesn’t work when the VM is running
because you can’t remove DVD/Floppy Drives or Harddisks when the VM is
running.
146
8 VBoxManage
147
8 VBoxManage
For immutable (differencing) hard disks only, the modifyhd autoreset on|off
command determines whether the disk is automatically reset on every VM startup
(again, see chapter 5.4, Special image write modes, page 93). The default is “on”.
In addition, the modifyhd --compact command can be used to compact disk im-
ages, i.e. remove blocks that only contains zeroes. For this operation to be effective,
it is required to zero out free space in the guest system using a suitable software tool.
Microsoft provides the sdelete tool for Windows guests. Execute sdelete -c in the
guest to zero the free disk space before compressing the virtual disk image. Com-
paction works both for base images and for diff images created as part of a snapshot.
format Allow to choose a file format for the output file different from the file format
of the input file.
variant Allow to choose a file format variant for the output file. It is a comma-
separated list of variant flags. Not all combinations are supported, and specifying
inconsistent flags will result in an error message.
type Only honored if –remember is also specified. Defines what kind of hard disk type
this image should be.
148
8 VBoxManage
remember Keep the destination image registered after it was successfully written.
variant Allow to choose a file format variant for the output file. It is a comma-
separated list of variant flags. Not all combinations are supported, and specifying
inconsistent flags will result in an error message.
The second form forces VBoxManage to read the content for the disk image from
standard input (useful for using that command in a pipe).
149
8 VBoxManage
lun Logical Unit Number of the target resource (optional). Often, this value is zero.
username, password Username and password for target authentication, if required
(optional).
Note: Currently, username and password are stored without encryption (i.e.
in cleartext) in the machine configuration file.
type Defines what kind of hard disk type this image should be.
comment Any description that you want to have stored with this item (optional; e.g.
“Big storage server downstairs”). This is stored internally only and not needed
for operation.
intnet Connect to the iSCSI target via Internal Networking. This needs further con-
figuration which is described in chapter 5.10.1, Access iSCSI targets via Internal
Networking, page 101.
150
8 VBoxManage
would associate the string “2006.01.01” with the key installdate for the virtual ma-
chine Fedora5, and “2006.02.02” on the machine SUSE10. You could retrieve the
information as follows:
VBoxManage getextradata Fedora5 installdate
Value: 2006.01.01
hdfolder This specifies the default folder that is used to keep disk image files (.vdi,
.vmdk, .vhd).
machinefolder This specifies the default folder in which virtual machine definitions
are kept; see chapter 9.1, VirtualBox configuration data, page 159 for details.
vrdpauthlibrary This specifies which library to use when “external” VRDP authenti-
cation has been selected for a particular virtual machine; see chapter 7.1.5, RDP
authentication, page 116 for details.
websrvauthlibrary This specifies which library the web service uses to authenticate
users. For details about the VirtualBox web service, please refer to the separate
VirtualBox SDK reference (see chapter 11, VirtualBox programming interfaces,
page 192).
hwvirtexenabled This selects whether or not hardware virtualization support is en-
abled by default.
151
8 VBoxManage
ignore all Kingston devices, that memory stick will be available to any machine with
an appropriate filter, but no other Kingston device will.
When creating a USB filter using usbfilter add, you must supply three or four
mandatory parameters. The index specifies the position in the list at which the filter
should be placed. If there is already a filter at that position, then it and the following
ones will be shifted back one place. Otherwise the new filter will be added onto the
end of the list. The target parameter selects the virtual machine that the filter should
be attached to or use “global” to apply it to all virtual machines. name is a name for
the new filter and for global filters, action says whether to allow machines access to
devices that fit the filter description (“hold”) or not to give them access (“ignore”). In
addition, you should specify parameters to filter by. You can find the parameters for
devices attached to your system using VBoxManage list usbhost. Finally, you can
specify whether the filter should be active, and for local filters, whether they are for
local devices, remote (over an RDP connection) or either.
When you modify a USB filter using usbfilter modify, you must specify the filter
by index (see the output of VBoxManage list usbfilters to find global filter in-
dexes and that of VBoxManage showvminfo to find indexes for individual machines)
and by target, which is either a virtual machine or “global”. The properties which can
be changed are the same as for usbfilter add. To remove a filter, use usbfilter
remove and specify the index and the target.
152
8 VBoxManage
Metric collection can only be enabled for started VMs. Collected data and collection
settings for a particular VM will disappear as soon as it shuts down. Use VBoxManage
metrics list subcommand to see which metrics are currently available. You can
also use --list option with any subcommand that modifies metric settings to find out
which metrics were affected.
Note that the VBoxManage metrics setup subcommand discards all samples that
may have been previously collected for the specified set of objects and metrics.
To enable or disable metrics collection without discarding the data VBoxManage
metrics enable and VBoxManage metrics disable subcommands can be used.
Note that these subcommands expect metrics, not submetrics, like CPU/Load or
RAM/Usage as parameters. In other words enabling CPU/Load/User while disabling
CPU/Load/Kernel is not supported.
The host and VMs have different sets of associated metrics. Available metrics can be
listed with VBoxManage metrics list subcommand.
A complete metric name may include an aggregate function. The name has
the following form: Category/Metric[/SubMetric][:aggregate]. For example,
RAM/Usage/Free:min stands for the minimum amount of available memory over all
retained data if applied to the host object.
Subcommands may apply to all objects and metrics or can be limited to one object
or/and a list of metrics. If no objects or metrics are given in the parameters, the sub-
commands will apply to all available metrics of all objects. You may use an asterisk
(“*“) to explicitly specify that the command should be applied to all objects or metrics.
Use “host” as the object name to limit the scope of the command to host-related met-
rics. To limit the scope to a subset of metrics, use a metric list with names separated
by commas.
For example, to query metric data on the CPU time spent in user and kernel modes
by the virtual machine named “test”, you can use the following command:
VBoxManage query test CPU/Load/User,CPU/Load/Kernel
list This subcommand shows the parameters of the currently existing metrics. Note
that VM-specific metrics are only available when a particular VM is running.
setup This subcommand sets the interval between taking two samples of metric data
and the number of samples retained internally. The retained data is available
for displaying with the query subcommand. The --list option shows which
metrics have been modified as the result of the command execution.
enable This subcommand “resumes” data collection after it has been stopped with
disable subcommand. Note that specifying submetrics as parameters will not
enable underlying metrics. Use --list to find out if the command did what was
expected.
153
8 VBoxManage
disable This subcommand “suspends” data collection without affecting collection pa-
rameters or collected data. Note that specifying submetrics as parameters will
not disable underlying metrics. Use --list to find out if the command did what
was expected.
query This subcommand retrieves and displays the currently retained metric data.
Note: The query subcommand does not remove or “flush” retained data. If
you query often enough you will see how old samples are gradually being
“phased out” by new samples.
collect This subcommand sets the interval between taking two samples of metric data
and the number of samples retained internally. The collected data is displayed
periodically until Ctrl-C is pressed unless the --detach option is specified. With
the --detach option, this subcommand operates the same way as setup does.
The --list option shows which metrics match the specified filter.
• enumerate <vm> [-patterns <pattern>]: This lists all the guest properties
that are available for the given VM, including the value. This list will be very
limited if the guest’s service process cannot be contacted, e.g. because the VM is
not running or the Guest Additions are not installed.
If --patterns <pattern> is specified, it acts as a filter to only list properties
that match the given pattern. The pattern can contain the following wildcard
characters:
– * (asterisk): represents any number of characters; for example,
“/VirtualBox*“ would match all properties beginning with “/VirtualBox”.
– ? (question mark): represents a single arbitrary character; for example,
“fo?“ would match both “foo” and “for”.
– | (pipe symbol): can be used to specify multiple alternative patterns; for
example, “s*|t*“ would match anything starting with either “s” or “t”.
154
8 VBoxManage
• get <vm>: This retrieves the value of a single property only. If the property
cannot be found (e.g. because the guest is not running), this will print “No value
set¡‘.
• set <vm> <property> [<value> [-flags <flags>]]: This allows you to set
a guest property by specifying the key and value. If <value> is omitted, the
property is deleted. With --flags you can optionally specify additional behavior
(you can combine several by separating them with commas):
– TRANSIENT: the value will not be stored with the VM data when the VM
exits;
– RDONLYGUEST: the value can only be changed by the host, but the guest can
only read it;
– RDONLYHOST: reversely, the value can only be changed by the guest, but the
host can only read it;
– READONLY: a combination of the two, the value cannot be changed at all.
• wait <vm> <pattern> --timeout <timeout>: This waits for a particular
value described by “pattern” to change or to be deleted or created. The pattern
rules are the same as for the “enumerate” subcommand above.
At this time, the only available <command> is “execute”, which allows for executing
a program/script (process) which is already installed and runnable on the guest. This
command only works while a VM is up and running and has the following syntax:
VBoxManage guestcontrol execute <vmname>|<uuid>
<pathToProgram>
--username <name> --password <password>
[--arguments "<arguments>"]
[--environment "<NAME>=<VALUE> [<NAME>=<VALUE>]"]
[--flags <flags>] [--timeout <msec>]
[--verbose] [--wait-for exit,stdout,stderr||]
155
8 VBoxManage
–timeout <msec> Value (in milliseconds) that specifies the time how long the started
process is allowed to run and how long VBoxManage waits for getting output
from that process. If no timeout is specified, VBoxManage will wait forever until
the started process ends or an error occured.
–username <name> Name of the user the process should run under. This user must
exist on the guest OS.
–password <password> Password of the user account specified with --username.
If not given, an empty password is assumed.
–verbose Tells VBoxManage to be more verbose during the execution.
–wait-for <action> Tells VBoxManage to wait for a certain action to happen and react
to it. The following actions are available:
exit Waits until the process ends and outputs its exit code along with the exit
reason/flags.
stdout or stderr Waits until the process ends and outputs its exit code along
with the exit reason/flags. After that VBoxManage retrieves the output
collected from the guest process’s stdout and stderr.
Examples:
VBoxManage --nologo guestcontrol execute "My VM" "/bin/ls" --arguments "-l /usr"
--username foo --password bar --wait-for stdout
156
8 VBoxManage
Note that the double backslashes in the second example are only required on Unix
hosts.
• If you use host-only networking for a virtual network adapter of a virtual ma-
chine, use VBoxManage dhcpserver add --ifname <hostonly_if_name>
instead, where <hostonly_if_name> is the same host-only interface name
you used with VBoxManage modifyvm <vmname> --hostonlyadapter<X>
<hostonly_if_name>.
Alternatively, you can also use the –netname option as with internal net-
works if you know the host-only network’s name; you can see the names with
VBoxManage list hostonlyifs (see chapter 8.3, VBoxManage list, page 128
above).
The following additional parameters are required when first adding a DHCP server:
Finally, you must specify --enable or the DHCP server will be created in the dis-
abled state, doing nothing.
After this, VirtualBox will automatically start the DHCP server for given internal
or host-only network as soon as the first virtual machine which uses that network is
started.
Reversely, use VBoxManage dhcpserver remove with the given --netname
<network_name> or --ifname <hostonly_if_name> to remove the DHCP server
again for the given internal or host-only network.
157
8 VBoxManage
158
9 Advanced topics
9.1 VirtualBox configuration data
For each system user, VirtualBox stores configuration data in the user’s home directory,
as per the conventions of the host operating system:
159
9 Advanced topics
cases, VirtualBox backs up the old settings file in the virtual machine’s configuration
directory. If you need to go back to the earlier version of VirtualBox, then you will
need to manually copy these backup files back.
In detail, the following settings files are in use:
• VirtualBox keeps snapshots and saved states in another special folder for
each virtual machine. By default, this is a subfolder of the virtual machine
folder called Snapshots – in our example, .VirtualBox/Machines/Fedora
6/Snapshots. You can change this setting for each machine using VBoxManage
as well.
• VDI container files are, by default, created in the HardDisks directory under the
main configuration directory (see above). In particular, this directory is used
when the “Create new virtual disk” wizard is started to create a new VDI file.
Changing this default is probably most useful if the disk containing your home
directory does not have enough room to hold your VDI files, which can grow
very large.
160
9 Advanced topics
As you can see in the following screenshot, VBoxSDL does indeed only provide a
simple window that contains only the “pure” virtual machine, without menus or other
controls to click upon and no additional indicators of virtual machine activity:
To start a virtual machine with VBoxSDL instead of the VirtualBox GUI, enter the
following on a command line:
VBoxSDL --startvm <vm>
where <vm> is, as usual with VirtualBox command line parameters, the name or
UUID of an existing virtual machine.
161
9 Advanced topics
For example, in order to start Linux with 1024 x 748 x 16, the standard mode 0x117
(1024 x 768 x 16) is used as a base. The Linux video mode kernel parameter can then
be calculated using:
vga = 0x200 | 0x117 + 0x30
vga = 839
The reason for duplicating the standard modes instead of only supplying the ad-
justed modes is that most guest operating systems require the standard VESA modes
to be fixed and refuse to start with different modes.
162
9 Advanced topics
When using the X.org VESA driver, custom modelines have to be calculated and
added to the configuration (usually in /etc/X11/xorg.conf. A handy tool to deter-
mine modeline entries can be found at http://www.tkk.fi/Misc/Electronics/
faq/vga2rgb/calc.html.)
163
9 Advanced topics
To manually install the VirtualBox credential module, extract the Guest Ad-
ditions (see chapter 4.2.1.4, Manual file extraction, page 68) and copy the file
VBoxCredProv.dll to the Windows SYSTEM32 directory. Then, in the registry, cre-
ate the following keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Authentication\Credential Providers\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}
HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}
HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32
with all default values (the key named (Default) in each key) set to
VBoxCredProv. After that a new string named
HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32\ThreadingModel
While the VM is running, the credentials can be queried by the VirtualBox logon
modules (GINA or credential provider) using the VirtualBox Guest Additions device
driver. When Windows is in “logged out” mode, the logon modules will constantly poll
for credentials and if they are present, a logon will be attempted. After retrieving the
credentials, the logon modules will erase them so that the above command will have
to be repeated for subsequent logons.
For security reasons, credentials are not stored in any persistent manner and will be
lost when the VM is reset. Also, the credentials are “write-only”, i.e. there is no way to
retrieve the credentials from the host side. Credentials can be reset from the host side
by setting empty values.
Depending on the particular variant of the Windows guest, the following restrictions
apply:
1. For Windows XP guests, the logon subsystem needs to be configured to use the
classic logon dialog as the VirtualBox GINA module does not support the XP-style
welcome dialog.
164
9 Advanced topics
2. For Windows Vista and Windows 7 guests, the logon subsystem does not sup-
port the so-called Secure Attention Sequence (CTRL+ALT+DEL). As a result, the
guest’s group policy settings need to be changed to not use the Secure Attention
Sequence. Also, the user name given is only compared to the true user name,
not the user friendly name. This means that when you rename a user, you still
have to supply the original user name (internally, Windows never renames user
accounts).
The following command forces VirtualBox to keep the credentials after they were
read by the guest and on VM reset:
VBoxManage setextradata "Windows XP"
VBoxInternal/Devices/VMMDev/0/Config/KeepCredentials 1
Note that this is a potential security risk as a malicious application running on the
guest could request this information using the proper interface.
Note: The pam_vbox.so only supports the auth primitive. Other primitives
such as account, session or password are not supported.
The pam_vbox.so module is shipped as part of the Guest Additions but it is not
installed and/or activated on the guest OS by default. In order to install it, it has to be
copied from /opt/VBoxGuestAdditions-<version>/lib/VBoxGuestAdditions/
to the security modules directory, usually /lib/security/. Please refer to your guest
OS documentation for the correct PAM module directory.
For example, to use pam_vbox.so with a Ubuntu Linux guest OS and GDM (the
GNOME Desktop Manager) to logon users automatically with the credentials passed
by the host, the guest OS has to be configured like the following:
165
9 Advanced topics
2. Edit the PAM configuration file for GDM found at /etc/pam.d/gdm, adding the
line auth requisite pam_vbox.so at the top. Additionaly, in most Linux dis-
tributions there is a file called /etc/pam.d/common-auth. This file is included
in many other services (like the GDM file mentioned above). There you also
have to add add the line auth requisite pam_vbox.so.
3. If authentication against the shadow database using pam_unix.so or
pam_unix2.so is desired, the argument try_first_pass is needed in or-
der to pass the credentials from the VirtualBox module to the shadow
database authentication module. For Ubuntu, this needs to be added to
/etc/pam.d/common-auth, to the end of the line referencing pam_unix.so.
This argument tells the PAM module to use credentials already present in the
stack, i.e. the ones provided by the VirtualBox PAM module.
To make deployment easier, you can pass the argument debug right after the
pam_vbox.so statement. Debug log output will then be recorded using syslog.
166
9 Advanced topics
The Guest Additions will automatically use the appropriate path to execute
the system preparation tool.
After that, the –cpus option specifies the maximum number of CPUs that the virtual
machine can have:
VBoxManage modifyvm <vmname> --cpus 8
When the VM is off, you can then add and remove virtual CPUs with the modifyvm
–plugcpu and –unplugcpu subcommands, which take the number of the virtual CPU
as a parameter, like this:
VBoxManage modifyvm <vmname> --plugcpu 3
VBoxManage modifyvm <vmname> --unplugcpu 3
167
9 Advanced topics
See chapter 8.7, VBoxManage modifyvm, page 131 and chapter 8.11, VBoxManage
controlvm, page 141 for details.
With Linux guests, the following applies: To prevent ejection while the CPU is still
used it has to be ejected from within the guest before. The Linux Guest Additions
contain a service which receives hot-remove events and ejects the CPU. Also, after
a CPU is added to the VM it is not automatically used by Linux. The Linux Guest
Additions service will take care of that if installed. If not a CPU can be started with the
following command:
echo 1 > /sys/devices/system/cpu/cpu<id>/online
The VESA mode IDs for custom video modes start at 0x160. In order to use the
above defined custom video mode, the following command line has be supplied to
Linux:
vga = 0x200 | 0x160
vga = 864
For guest operating systems with VirtualBox Guest Additions, a custom video mode
can be set using the video mode hint feature.
168
9 Advanced topics
mode hint using VBoxManage. This behavior is what most users will want, but if
you have different needs, it is possible to change it by issuing one of the following
commands from the command line:
VBoxManage setextradata global GUI/MaxGuestResolution any
restores the default settings. Note that these settings apply globally to all guest
systems, not just to a single machine.
/**
* Authentication library entry point. Decides whether to allow
* a client connection.
*
* Parameters:
*
* pUuid Pointer to the UUID of the virtual machine
* which the client connected to.
* guestJudgement Result of the guest authentication.
* szUser User name passed in by the client (UTF8).
* szPassword Password passed in by the client (UTF8).
* szDomain Domain passed in by the client (UTF8).
* fLogon Boolean flag. Indicates whether the entry point is called
* for a client logon or the client disconnect.
* clientId Server side unique identifier of the client.
*
169
9 Advanced topics
* Return code:
*
* VRDPAuthAccessDenied Client access has been denied.
* VRDPAuthAccessGranted Client has the right to use the
* virtual machine.
* VRDPAuthDelegateToGuest Guest operating system must
* authenticate the client and the
* library must be called again with
* the result of the guest
* authentication.
*/
VRDPAuthResult VRDPAUTHCALL VRDPAuth2(
PVRDPAUTHUUID pUuid,
VRDPAuthGuestJudgement guestJudgement,
const char *szUser,
const char *szPassword
const char *szDomain
int fLogon,
unsigned clientId)
{
/* process request against your authentication source of choice */
return VRDPAuthAccessGranted;
}
A note regarding the UUID implementation of the first argument: VirtualBox uses a
consistent binary representation of UUIDs on all platforms. For this reason the integer
fields comprising the UUID are stored as little endian values. If you want to pass such
UUIDs to code which assumes that the integer fields are big endian (often also called
network byte order), you need to adjust the contents of the UUID to e.g. achieve the
same string representation. The required changes are:
Using this conversion you will get identical results when converting the binary UUID
to the string representation.
The second arguments contains information about the guest authentication status.
For the first call, it is always set to VRDPAuthGuestNotAsked. In case the function
returns VRDPAuthDelegateToGuest, a guest authentication will be attempted and
another call to the method is made with its result. This can be either granted / de-
nied or no judgement (the guest component chose for whatever reason to not make
a decision). In case there is a problem with the guest authentication module (e.g.
the Additions are not installed or not running or the guest did not respond within a
timeout), the “not reacted” status will be returned.
170
9 Advanced topics
Warning: Raw hard disk access is for expert users only. Incorrect use or use
of an outdated configuration can lead to total loss of data on the physical
disk. Most importantly, do not attempt to boot the partition with the cur-
rently running host operating system in a guest. This will lead to severe data
corruption.
Raw hard disk access – both for entire disks and individual partitions – is imple-
mented as part of the VMDK image format support. As a result, you will need to create
a special VMDK image file which defines where the data will be stored. After creating
such a special VMDK image, you can use it like a regular virtual disk image. For exam-
ple, you can use the Virtual Media Manager (chapter 5.3, The Virtual Media Manager,
page 91) or VBoxManage to assign the image to a virtual machine.
This creates the image /path/to/file.vmdk (must be absolute), and all data will be
read and written from /dev/sda.
171
9 Advanced topics
After registering, you can assign the newly created image to a virtual machine with
e.g.
VBoxManage storageattach WindowsXP --storagectl "IDE Controller"
--port 0 --device 0 --type hdd --medium /path/to/file.vmdk
When this is done the selected virtual machine will boot from the specified physical
disk.
As you can see, the command is identical to the one for “full hard disk” access,
except for the additional -partitions parameter. This example would create the
image /path/to/file.vmdk (which, again, must be absolute), and partitions 1 and 5
of /dev/sda would be made accessible to the guest.
VirtualBox uses the same partition numbering as your Linux host. As a result, the
numbers given in the above example would refer to the first primary partition and the
first logical drive in the extended partition, respectively.
On a Windows host, instead of the above device specification, use e.g.
\\.\PhysicalDrive0. On a Mac OS X host, instead of the above device specifi-
cation use e.g. /dev/disk1. Note that on OS X you can only use partitions which are
172
9 Advanced topics
not mounted (eject the respective volume first). Partition numbers are the same on
Linux, Windows and Mac OS X hosts.
The numbers for the list of partitions can be taken from the output of
VBoxManage internalcommands listpartitions -rawdisk /dev/sda
The output lists the partition types and sizes to give the user enough information to
identify the partitions necessary for the guest.
Images which give access to individual partitions are specific to a particular host
disk setup. You cannot transfer these images to another host; also, whenever the host
partitioning changes, the image must be recreated.
Creating the image requires read/write access for the given device. Read/write
access is also later needed when using the image from a virtual machine. If this is not
feasible, there is a special variant for raw partition access (currently only available on
Linux hosts) that avoids having to give the current user access to the entire disk. To
set up such an image, use
VBoxManage internalcommands createrawvmdk -filename /path/to/file.vmdk
-rawdisk /dev/sda -partitions 1,5 -relative
When used from a virtual machine, the image will then refer not to the entire disk,
but only to the individual partitions (in the example /dev/sda1 and /dev/sda5). As a
consequence, read/write access is only required for the affected partitions, not for the
entire disk. During creation however, read-only access to the entire disk is required to
obtain the partitioning information.
In some configurations it may be necessary to change the MBR code of the created
image, e.g. to replace the Linux boot loader that is used on the host by another boot
loader. This allows e.g. the guest to boot directly to Windows, while the host boots
Linux from the “same” disk. For this purpose the -mbr parameter is provided. It
specifies a file name from which to take the MBR code. The partition table is not
modified at all, so a MBR file from a system with totally different partitioning can be
used. An example of this is
VBoxManage internalcommands createrawvmdk -filename /path/to/file.vmdk
-rawdisk /dev/sda -partitions 1,5 -mbr winxp.mbr
The modified MBR will be stored inside the image, not on the host disk.
For each of the above variants, you can register the resulting image for immediate
use in VirtualBox by adding -register to the respective command line. The image
will then immediately appear in the list of registered disk images. An example is
VBoxManage internalcommands createrawvmdk -filename /path/to/file.vmdk
-rawdisk /dev/sda -partitions 1,5 -relative -register
which creates an image referring to individual partitions, and registers it when the
image is successfully created.
173
9 Advanced topics
The serial number is a 20 byte alphanumeric string, the firmware revision an 8 byte
alphanumeric string and the model number a 40 byte alphanumeric string. Instead of
“Port0” (referring to the first port), specify the desired SATA hard disk port.
Additional three parameters are needed for CD/DVD drives to report the vendor
product data:
VBoxManage setextradata "My VM"
"VBoxInternal/Devices/ahci/0/Config/Port0/ATAPIVendorId"
"vendor"
VBoxManage setextradata "My VM"
"VBoxInternal/Devices/ahci/0/Config/Port0/ATAPIProductId"
"product"
VBoxManage setextradata "My VM"
"VBoxInternal/Devices/ahci/0/Config/Port0/ATAPIRevision"
"revision"
174
9 Advanced topics
The old sequence of configuring a serial port used the following 6 commands:
VBoxManage setextradata "YourVM"
"VBoxInternal/Devices/serial/0/Config/IRQ" 4
VBoxManage setextradata "YourVM"
"VBoxInternal/Devices/serial/0/Config/IOBase" 0x3f8
VBoxManage setextradata "YourVM"
"VBoxInternal/Devices/serial/0/LUN#0/Driver" Char
VBoxManage setextradata "YourVM"
"VBoxInternal/Devices/serial/0/LUN#0/AttachedDriver/Driver" NamedPipe
VBoxManage setextradata "YourVM"
"VBoxInternal/Devices/serial/0/LUN#0/AttachedDriver/Config/Location"
"\\.\pipe\vboxCOM1"
VBoxManage setextradata "YourVM"
"VBoxInternal/Devices/serial/0/LUN#0/AttachedDriver/Config/IsServer"
1
This sets up a serial port in the guest with the default settings for COM1 (IRQ 4, I/O
address 0x3f8) and the Location setting assumes that this configuration is used on a
Windows host, because the Windows named pipe syntax is used. Keep in mind that
on Windows hosts a named pipe must always start with \\.\pipe\. On Linux the
same config settings apply, except that the path name for the Location can be chosen
more freely. Local domain sockets can be placed anywhere, provided the user running
VirtualBox has the permission to create a new file in the directory. The final command
above defines that VirtualBox acts as a server, i.e. it creates the named pipe itself
instead of connecting to an already existing one.
175
9 Advanced topics
when there is only one NAT instance active. In that case the guest is assigned to the
address 10.0.2.15, the gateway is set to 10.0.2.2 and the name server can be found
at 10.0.2.3.
If, for any reason, the NAT network needs to be changed, this can be achieved with
the following command:
VBoxManage modifyvm "My VM" --natnet1 "192.168/16"
This example illustrates tuning the NAT settings. The first parameter is the MTU,
then the size of the socket’s send buffer and the size of the socket’s receive buffer,
the initial size of the TCP send window, and lastly the initial size of the TCP receive
window. Note that specifying zero means fallback to the default value.
Each of these buffers has a default size of 64KB and default MTU is 1500.
176
9 Advanced topics
After this, all outgoing traffic will be sent through the interface with the IP address
10.45.0.2. Please make sure that this interface is up and running prior to this assign-
ment.
Note that this setting is similar to the DNS proxy mode, however whereas the proxy
mode just forwards DNS requests to the appropriate servers, the resolver mode will
interpret the DNS requests and use the host’s DNS API to query the information and
return it to the guest.
and
VBoxManage modifyvm "Linux Guest" --nataliasmode sameports
The first example disables aliasing and switches NAT into transparent mode, the
second example enforces preserving of port values. These modes can be combined if
necessary.
177
9 Advanced topics
If a DMI string is not set, the default value of VirtualBox is used. To set an empty
string use "<EMPTY>".
Note that in the above list, all quoted parameters (DmiBIOSVendor, DmiBIOSVersion
but not DmiBIOSReleaseMajor) are expected to be strings. If such a string is a valid
number, the parameter is treated as number and the VM will most probably refuse to
start with an VERR_CFGM_NOT_STRING error. In that case, use "string:<value>", for
instance
VBoxManage setextradata "My VM"
"VBoxInternal/Devices/pcbios/0/Config/DmiSystemSerial" "string:1234"
Changing this information can be necessary to provide the DMI information of the
host to the guest to prevent Windows from asking for a new product key. On Linux
hosts the DMI BIOS information can be obtained with
dmidecode -t0
178
9 Advanced topics
Note that if you use the special TSC handling mode with a guest operating system
which is very strict about the consistency of time sources you may get a warning or
error message about the timing inconsistency. It may also cause clocks to become
unreliable with some guest operating systems depending on they use the TSC.
The above example will double the speed of the guest clock while
VBoxManage setextradata "My VM"
"VBoxInternal/TM/WarpDrivePercentage" 50
will halve the speed of the guest clock. Note that changing the rate of the virtual
clock can confuse the guest and can even lead to abnormal guest behavior. For in-
stance, a higher clock rate means shorter timeouts for virtual devices with the result
that a slightly increased response time of a virtual device due to an increased host load
can cause guest failures. Note further that any time synchronization mechanism will
frequently try to resynchronize the guest clock with the reference clock (which is the
host clock if the VirtualBox Guest Additions are active). Therefore any time synchro-
nization should be disabled if the rate of the guest clock is changed as described above
(see chapter 9.12.3, Tuning the Guest Additions time synchronization parameters, page
180).
179
9 Advanced topics
180
9 Advanced topics
Once you make sure all vboxnet interfaces are unplumbed, remove the driver using:
rem_drv vboxnet
Add as many of these lines as required and make sure “instance” number is uniquely
incremented. Next reload the vboxnet driver using:
add_drv vboxnet
Now plumb all the interfaces using ifconfig vboxnetX plumb (where X can be 0,
1 or 2 in this case) and once plumbed you can then configure the interface like any
other network interface.
To make your newly added interfaces’ settings persistent across reboots you will
need to edit the files /etc/netmasks, and if you are using NWAM /etc/nwam/llp
and add the appropriate entries to set the netmask and static IP for each of those
interfaces. The VirtualBox installer only updates these configuration files for the one
“vboxnet0” interface it creates by default.
noSelector Don’t allow to start the VM selector GUI. Trying to do so will show a
window containing a proper error message.
noMenuBar The VM windows will not contain a menu bar.
To disable all host key combinations, open the global settings and change the host
key to None. This might be useful when using VirtualBox in a kiosk mode.
Furthermore, you can disallow certain actions when terminating a VM from the GUI.
To disallow specific actions, type:
181
9 Advanced topics
SaveState Don’t allow the user to save the VM state plus terminate the VM.
Shutdown Don’t allow the user to shutdown the VM by sending the ACPI power off
event to the guest.
PowerOff Don’t allow the user to power off the VM.
Restore Don’t allow the user to return to the last snapshot when powering off the
VM.
Combinations of all of these options are allowed. If all options are specified, the VM
cannot be shut down from the GUI.
182
10 Technical background
The contents of this chapter are not required to use VirtualBox successfully. The fol-
lowing is provided as additional information for readers who are more familiar with
computer architecture and technology and wish to find out more about how VirtualBox
works “under the hood”.
1. VBoxSVC, the VirtualBox service process which always runs in the background.
This process is started automatically by the first VirtualBox client process (the
GUI, VBoxManage, VBoxHeadless, the web service or others) and exits a short
time after the last client exits. The service is responsible for bookkeeping,
maintaining the state of all VMs, and for providing communication between
VirtualBox components. This communication is implemented via COM/XPCOM.
Note: When we refer to “clients” here, we mean the local clients of a par-
ticular VBoxSVC server process, not clients in a network. VirtualBox employs
its own client/server design to allow its processes to cooperate, but all these
processes run under the same user account on the host operating system, and
this is totally transparent to the user.
Any VirtualBox front-end (client) will communicate with the service process and
can both control and reflect the current state. For example, either the VM selector
183
10 Technical background
or the VM window or VBoxManage can be used to pause the running VM, and other
components will always reflect the changed state.
The VirtualBox GUI application is only one of several available front-ends (clients).
The complete list shipped with VirtualBox is:
Internally, VirtualBox consists of many more or less separate components. You may
encounter these when analyzing VirtualBox internal error messages or log files. These
include:
• IPRT, a portable runtime library which abstracts file access, threading, string
manipulation, etc. Whenever VirtualBox accesses host operating features, it does
so through this library for cross-platform portability.
• VMM (Virtual Machine Monitor), the heart of the hypervisor.
• EM (Execution Manager), controls execution of guest code.
• REM (Recompiled Execution Monitor), provides software emulation of CPU in-
structions.
• TRPM (Trap Manager), intercepts and processes guest traps and exceptions.
• HWACCM (Hardware Acceleration Manager), provides support for VT-x and
AMD-V.
• PDM (Pluggable Device Manager), an abstract interface between the VMM and
emulated devices which separates device implementations from VMM internals
and makes it easy to add new emulated devices. Through PDM, third-party
developers can add new virtual devices to VirtualBox without having to change
VirtualBox itself.
184
10 Technical background
185
10 Technical background
• Since 2006, Intel and AMD processors have had support for so-called “hard-
ware virtualization”. This means that these processors can help VirtualBox to
intercept potentially dangerous operations that a guest operating system may
be attempting and also makes it easier to present virtual hardware to a virtual
machine.
These hardware features differ between Intel and AMD processors. Intel named
its technology VT-x; AMD calls theirs AMD-V. The Intel and AMD support for
virtualization is very different in detail, but not very different in principle.
186
10 Technical background
187
10 Technical background
the guest or host OS. In guest context, VirtualBox can therefore be in one of three
states:
• Guest ring 3 code is run unmodified, at full speed, as much as possible. The
number of faults will generally be low (unless the guest allows port I/O from
ring 3, something we cannot do as we don’t want the guest to be able to access
real ports). This is also referred to as “raw mode”, as the guest ring-3 code runs
unmodified.
• For guest code in ring 0, VirtualBox employs a nasty trick: it actually reconfigures
the guest so that its ring-0 code is run in ring 1 instead (which is normally not
used in x86 operating systems). As a result, when guest ring-0 code (actually
running in ring 1) such as a guest device driver attempts to write to an I/O
register or execute a privileged instruction, the VirtualBox hypervisor in “real”
ring 0 can take over.
• The hypervisor (VMM) can be active. Every time a fault occurs, VirtualBox looks
at the offending instruction and can relegate it to a virtual device or the host OS
or the guest OS or run it in the recompiler.
In particular, the recompiler is used when guest code disables interrupts and
VirtualBox cannot figure out when they will be switched back on (in these situ-
ations, VirtualBox actually analyzes the guest code using its own disassembler).
Also, certain privileged instructions such as LIDT need to be handled specially.
Finally, any real-mode or protected-mode code (e.g. BIOS code, a DOS guest, or
any operating system startup) is run in the recompiler entirely.
Unfortunately this only works to a degree. Among others, the following situations
require special handling:
188
10 Technical background
To fix these performance and security issues, VirtualBox contains a Code Scanning
and Analysis Manager (CSAM), which disassembles guest code, and the Patch Manager
(PATM), which can replace it at runtime.
Before executing ring 0 code, CSAM scans it recursively to discover problematic
instructions. PATM then performs in-situ patching, i.e. it replaces the instruction with
a jump to hypervisor memory where an integrated code generator has placed a more
suitable implementation. In reality, this is a very complex task as there are lots of odd
situations to be discovered and handled correctly. So, with its current complexity, one
could argue that PATM is an advanced in-situ recompiler.
In addition, every time a fault occurs, VirtualBox analyzes the offending code to
determine if it is possible to patch it in order to prevent it from causing more faults in
the future. This approach works well in practice and dramatically improves software
virtualization performance.
• In root mode, the CPU operates much like older generations of processors with-
out VT-x support. There are four privilege levels (“rings”), and the same instruc-
tion set is supported, with the addition of several virtualization specific instruc-
tion. Root mode is what a host operating system without virtualization uses, and
it is also used by a hypervisor when virtualization is active.
• In non-root mode, CPU operation is significantly different. There are still four
privilege rings and the same instruction set, but a new structure called VMCS
(Virtual Machine Control Structure) now controls the CPU operation and deter-
mines how certain instructions behave. Non-root mode is where guest systems
run.
189
10 Technical background
Switching from root mode to non-root mode is called “VM entry”, the switch back is
“VM exit”. The VMCS includes a guest and host state area which is saved/restored at
VM entry and exit. Most importantly, the VMCS controls which guest operations will
cause VM exits.
The VMCS provides fairly fine-grained control over what the guests can and can’t
do. For example, a hypervisor can allow a guest to write certain bits in shadowed
control registers, but not others. This enables efficient virtualization in cases where
guests can be allowed to write control bits without disrupting the hypervisor, while
preventing them from altering control bits over which the hypervisor needs to retain
full control. The VMCS also provides control over interrupt delivery and exceptions.
Whenever an instruction or event causes a VM exit, the VMCS contains information
about the exit reason, often with accompanying detail. For example, if a write to the
CR0 register causes an exit, the offending instruction is recorded, along with the fact
that a write access to a control register caused the exit, and information about source
and destination register. Thus the hypervisor can efficiently handle the condition with-
out needing advanced techniques such as CSAM and PATM described above.
VT-x inherently avoids several of the problems which software virtualization faces.
The guest has its own completely separate address space not shared with the hyper-
visor, which eliminates potential clashes. Additionally, guest OS kernel code runs at
privilege ring 0 in VMX non-root mode, obviating the problems by running ring 0 code
at less privileged levels. For example the SYSENTER instruction can transition to ring
0 without causing problems. Naturally, even at ring 0 in VMX non-root mode, any I/O
access by guest code still causes a VM exit, allowing for device emulation.
The biggest difference between VT-x and AMD-V is that AMD-V provides a more
complete virtualization environment. VT-x requires the VMX non-root code to run
with paging enabled, which precludes hardware virtualization of real-mode code and
non-paged protected-mode software. This typically only includes firmware and OS
loaders, but nevertheless complicates VT-x hypervisor implementation. AMD-V does
not have this restriction.
Of course hardware virtualization is not perfect. Compared to software virtualiza-
tion, the overhead of VM exits is relatively high. This causes problems for devices
whose emulation requires high number of traps. One example is the VGA device in
16-color modes, where not only every I/O port access but also every access to the
framebuffer memory must be trapped.
1 VirtualBox2.0 added support for AMD’s nested paging; support for Intel’s EPT and VPIDs was added with
version 2.1.
190
10 Technical background
191
11 VirtualBox programming
interfaces
VirtualBox comes with comprehensive support for third-party developers. The so-
called “Main API” of VirtualBox exposes the entire feature set of the virtualization
engine. It is completely documented and available to anyone who wishes to control
VirtualBox programmatically.
The Main API is made available to C++ clients through COM (on Windows hosts)
or XPCOM (on other hosts). Bridges also exist for SOAP, Java and Python.
All programming information (documentation, reference information, header and
other interface files as well as samples) have been split out to a separate Soft-
ware Development Kit (SDK), which is available for download from http://www.
virtualbox.org. In particular, the SDK comes with a “Programming Guide and Ref-
erence” in PDF format, which contains, among other things, the information that was
previously in this chapter of the User Manual.
192
12 Troubleshooting
This chapter provides answers to commonly asked questions. In order to improve your
user experience with VirtualBox, it is recommended to read this section to learn more
about common pitfalls and get recommendations on how to use the product.
1. Is the problem specific to a certain guest OS? Specific release of a guest OS? Es-
pecially with Linux guest related problems, the issue may be specific to a certain
distribution and version of Linux.
2. Is the problem specific to a certain host OS? Problems are usually not host OS
specific (because most of the VirtualBox code base is shared across all supported
platforms), but especially in the areas of networking and USB support, there are
significant differences between host platforms. Some GUI related issues are also
host specific.
3. Is the problem specific to certain host hardware? This category of issues is typi-
cally related to the host CPU. Because of significant differences between VT-x and
AMD-V, problems may be specific to one or the other technology. The exact CPU
model may also make a difference (even for software virtualization) because dif-
ferent CPUs support different features, which may affect certain aspects of guest
CPU operation.
4. Is the problem specific to a certain virtualization mode? Some problems may
only occur in software virtualization mode, others may be specific to hardware
virtualization.
193
12 Troubleshooting
5. Is the problem specific to guest SMP? That is, is it related to the number of vir-
tual CPUs (VCPUs) in the guest? Using more than one CPU usually significantly
affects the internal operation of a guest OS.
6. Is the problem specific to the Guest Additions? In some cases, this is a given
(e.g., a shared folders problem), in other cases it may be less obvious (for exam-
ple, display problems). And if the problem is Guest Additions specific, is it also
specific to a certain version of the Additions?
7. Is the problem specific to a certain environment? Some problems are related
to a particular environment external to the VM; this usually involves network
setup. Certain configurations of external servers such as DHCP or PXE may ex-
pose problems which do not occur with other, similar servers.
8. Is the problem a regression? Knowing that an issue is a regression usually makes
it significantly easier to find the solution. In this case, it is crucial to know which
version is affected and which is not.
When starting a VM, the configuration file of the last run will be renamed to .1, up
to .3. Sometimes when there is a problem, it is useful to have a look at the logs.
Also when requesting support for VirtualBox, supplying the corresponding log file is
mandatory.
For convenience, for each virtual machine, the VirtualBox main window can show
these logs in a window. To access it, select a virtual machine from the list on the left
and select “Show logs...“ from the “Machine” window.
The release log file (VBox.log) contains a wealth of diagnostic information, such as
Host OS type and version, VirtualBox version and build (32-bit or 64-bit), a complete
dump of the guest’s configuration (CFGM), detailed information about the host CPU
type and supported features, whether hardware virtualization is enabled, information
about VT-x/AMD-V setup, state transitions (creating, running, paused, stopping, etc.),
guest BIOS messages, guest Additions messages, device specific log entries and at the
end of execution, final guest state and condensed statistics.
194
12 Troubleshooting
In case of crashes, it is very important to collect crash dumps. This is true for both
host and guest crashes. For information about enabling core dumps on Linux, Solaris,
and OS X systems, refer to the core dump article on the VirtualBox website.1
For network related problems, it is often helpful to capture a trace of network traffic.
If the traffic is routed through an adapter on the host, it is possible to use Wireshark
or a similar tool to capture the traffic there. However, this often also includes a lot of
traffic unrelated to the VM.
VirtualBox provides an ability to capture network traffic only on a specific VM’s
network adapter. Refer to the network tracing article on the VirtualBox website2 for
information on enabling this capture. Note that the trace files created by VirtualBox
are in .pcap format and can be easily analyzed with Wireshark.
Note: Use the VM debugger at your own risk. There is no support for it, and
the following documentation is only made available for advanced users with
a very high level of familiarity with the x86/AMD64 machine instruction set,
as well as detailed knowledge of the PC architecture. A degree of familiarity
with the internals of the guest OS in question is not required, but may be very
helpful.
195
12 Troubleshooting
A new ’Debug’ menu entry will be added to the VirtualBox application. This menu
allows the user to open the debugger console.
The VM debugger command syntax is loosely modeled on Microsoft and IBM debug-
gers used on DOS, OS/2 and Windows. Users familiar with symdeb, CodeView, or the
OS/2 kernel debugger will find the VirtualBox VM debugger familiar.
The most important command is help. This will print brief usage help for all de-
bugger commands. The set of commands supported by the VM debugger changes
frequently and the help command is always up-to-date.
A brief summary of frequently used commands follows:
196
12 Troubleshooting
file contains the symbols for the currently loaded modules; if the guest’s configuration
changes, the symbols will change as well and must be updated.
For all guests, a simple way to verify that the correct symbols are loaded is the
k command. The guest is normally idling and it should be clear from the symbolic
information that the guest operating system’s idle loop is being executed.
Another group of debugger commands is the set of info commands. Running info
help provides complete usage information. The information commands provide ad-
hoc data pertinent to various emulated devices and aspects of the VMM. There is no
general guideline for using the info commands, the right command to use depends
entirely on the problem being investigated. Some of the info commands are:
The output of the info commands generally requires in-depth knowledge of the
emulated device and/or VirtualBox VMM internals. However, when used properly, the
information provided can be invaluable.
12.2 General
12.2.1 Guest shows IDE/SATA errors for file-based images on
slow host file system
Occasionally, some host file systems provide very poor writing performance and as a
consequence cause the guest to time out IDE/SATA commands. This is normal behavior
and should normally cause no real problems, as the guest should repeat commands
that have timed out. However some guests (e.g. some Linux versions) have severe
problems if a write to an image file takes longer than about 15 seconds. Some file
197
12 Troubleshooting
systems however require more than a minute to complete a single write, if the host
cache contains a large amount of data that needs to be written.
The symptom for this problem is that the guest can no longer access its files during
large write or copying operations, usually leading to an immediate hang of the guest.
In order to work around this problem (the true fix is to use a faster file system that
doesn’t exhibit such unacceptable write performance), it is possible to flush the image
file after a certain amount of data has been written. This interval is normally infinite,
but can be configured individually for each disk of a VM.
For IDE disks use the following command:
VBoxManage setextradata "VM name"
"VBoxInternal/Devices/piix3ide/0/LUN#[x]/Config/FlushInterval" [b]
The value [x] that selects the disk for IDE is 0 for the master device on the first
channel, 1 for the slave device on the first channel, 2 for the master device on the
second channel or 3 for the master device on the second channel. For SATA use values
between 0 and 29. Only disks support this configuration option; it must not be set for
CD/DVD drives.
The unit of the interval [b] is the number of bytes written since the last flush. The
value for it must be selected so that the occasional long write delays do not occur.
Since the proper flush interval depends on the performance of the host and the host
filesystem, finding the optimal value that makes the problem disappear requires some
experimentation. Values between 1000000 and 10000000 (1 to 10 megabytes) are
a good starting point. Decreasing the interval both decreases the probability of the
problem and the write performance of the guest. Setting the value unnecessarily low
will cost performance without providing any benefits. An interval of 1 will cause a
flush for each write operation and should solve the problem in any case, but has a
severe write performance penalty.
Providing a value of 0 for [b] is treated as an infinite flush interval, effectively
disabling this workaround. Removing the extra data key by specifying no value for [b]
has the same effect.
198
12 Troubleshooting
The value [x] that selects the disk is 0 for the master device on the first channel, 1
for the slave device on the first channel, 2 for the master device on the second channel
or 3 for the master device on the second channel.
To enable flushing for SATA disks, issue the following command:
VBoxManage setextradata "VM name"
"VBoxInternal/Devices/ahci/0/LUN#[x]/Config/IgnoreFlush" 0
The value [x] that selects the disk can be a value between 0 and 29.
Note that this doesn’t affect the flushes performed according to the configuration
described in chapter 12.2.1, Guest shows IDE/SATA errors for file-based images on slow
host file system, page 197. Restoring the default of ignoring flush commands is possible
by setting the value to 1 or by removing the key.
• The ACPI and I/O APIC settings should never be changed after installing Win-
dows. Depending on the presence of these hardware features, the Windows
installation program chooses special kernel and device driver versions and will
fail to startup should these hardware features be removed. (Enabling them for a
Windows VM which was installed without them does not cause any harm. How-
ever, Windows will not use these features in this case.)
• Changing the storage controller hardware will cause bootup failures as well.
This might also apply to you if you copy a disk image from an older version of
VirtualBox to a virtual machine created with a newer VirtualBox version; the
default subtype of IDE controller hardware was changed from PIIX3 to PIIX4
with VirtualBox 2.2. Make sure these settings are identical.
199
12 Troubleshooting
• Installation fills the whole hard disk with empty log files.
• Installation complains about a failure installing msgina.dll.
These problems are all caused by a bug in the hard disk driver of Windows 2000.
After issuing a hard disk request, there is a race condition in the Windows driver code
which leads to corruption if the operation completes too fast, i.e. the hardware in-
terrupt from the IDE controller arrives too soon. With physical hardware, there is a
guaranteed delay in most systems so the problem is usually hidden there (however it
should be possible to reproduce it on physical hardware as well). In a virtual environ-
ment, it is possible for the operation to be done immediately (especially on very fast
systems with multiple CPUs) and the interrupt is signaled sooner than on a physical
system. The solution is to introduce an artificial delay before delivering such inter-
rupts. This delay can be configured for a VM using the following command:
VBoxManage setextradata "VM name"
"VBoxInternal/Devices/piix3ide/0/Config/IRQDelay" 1
This sets the delay to one millisecond. In case this doesn’t help, increase it to a value
between 1 and 5 milliseconds. Please note that this slows down disk performance.
After installation, you should be able to remove the key (or set it to 0).
3 See http://support.microsoft.com/kb/955076.
200
12 Troubleshooting
201
12 Troubleshooting
• The Linux kernel version 2.6.18 (and some 2.6.17 versions) introduced a race
condition that can cause boot crashes in VirtualBox. Please use a kernel version
2.6.19 or later.
• With hardware virtualization and the I/O APIC enabled, kernels before 2.6.24-
rc6 may panic on boot with the following message:
Kernel panic - not syncing: IO-APIC + timer doesn’t work! Boot with
apic=debug and send a report. Then try booting with the ’noapic’ option
If you see this message, either disable hardware virtualization or the I/O APIC
(see chapter 3.4, System settings, page 52), or upgrade the guest to a newer
kernel.4
202
12 Troubleshooting
when your X11 user session is started if you are using a common desktop environment
(Gnome, KDE and others). If a particular desktop service is not working correctly, it is
worth checking whether the process which should provide it is running.
The VBoxClient processes create files in the user’s home directory with names of
the form .vboxclient-*.pid when they are running in order to prevent a given
service from being started twice. It can happen due to misconfiguration that these
files are created owned by root and not deleted when the services are stopped, which
will prevent them from being started in future sessions. If the services cannot be
started, you may wish to check whether these files still exist.
Certain applications may disable this key against Microsoft’s advice. If it is set to 0,
change it to 1 and reboot your system. VirtualBox relies on Windows notifying it of
media changes.
203
12 Troubleshooting
or
HKEY_LOCAL_MACHINE\Software\Microsoft\Terminal Server
Client\Min Send Interval
While this will decrease guest disk performance (especially writes), it does not affect
the performance of other applications running on the host.
204
12 Troubleshooting
• With Linux 2.6.19 and higher, the NMI watchdog may be active. Add
nmi_watchdog=0 to the kernel command line (e.g. in your grub configura-
tion) and reboot. With the Debian and Ubuntu installation modules, execute
sudo dpkg-reconfigure virtualbox again.
• The kernel disagrees about the version of the gcc used to compile the module.
Make sure that you use the same compiler as used to build the kernel.
In other words, you can try to set VBOX_CDROM to contain a list of your CD/DVD
devices, separated by colons, for example as follows:
export VBOX_CDROM=’/dev/cdrom0:/dev/cdrom1’
On modern Linux distributions, VirtualBox uses the hardware abstraction layer (hal)
to locate CD and DVD hardware.
205
12 Troubleshooting
206
12 Troubleshooting
Replace 85 with the group ID that matches your system (search /etc/group for “usb”
or similar). Alternatively, if you don’t mind the security hole, give all users access to
USB by changing “664” to “666”.
The various distributions are very creative from which script the usbfs filesys-
tem is mounted. Sometimes the command is hidden in unexpected places.
For SuSE 10.0 the mount command is part of the udev configuration file
/etc/udev/rules.d/50-udev.rules. As this distribution has no user group called
usb, you may e.g. use the vboxusers group which was created by the VirtualBox
installer. Since group numbers are allocated dynamically, the following example uses
85 as a placeholder. Modify the line containing (a linebreak has been inserted to
improve readability)
DEVPATH="/module/usbcore", ACTION=="add",
RUN+="/bin/mount -t usbfs usbfs /proc/bus/usb"
and add the necessary options (make sure that everything is in a single line):
DEVPATH="/module/usbcore", ACTION=="add",
RUN+="/bin/mount -t usbfs usbfs /proc/bus/usb -o devgid=85,devmode=664"
207
12 Troubleshooting
so that it contains
domount usbfs usbdevfs /proc/bus/usb -onoexec,nosuid,nodev,devgid=85,devmode=664
As usual, replace the 85 with the actual group number which should get access to
USB devices.
Other distributions do similar operations in scripts stored in the /etc/init.d di-
rectory.
to /etc/system where xxxx bytes is the amount of memory usable for the ZFS cache.
208
12 Troubleshooting
209
13 Known limitations
This sections describes known problems with VirtualBox 3.2.8. Unless marked other-
wise, these issues are planned to be fixed in later releases.
210
13 Known limitations
• Seamless mode does not work correctly with Linux guests that have 3D effects
enabled (such as with compiz-enabled window managers).
• Mac OS X hosts. The following restrictions apply (all of which will be resolved
in future versions):
– The numlock emulation has not yet been implemented.
– The CPU frequency metric is not supported.
– 3D OpenGL acceleration, in particular with Linux guests that have 3D ef-
fects enabled (such as with compiz-enabled window managers).
– Memory ballooning is not supported.
211
13 Known limitations
– Even when idle, Mac OS X Server guests currently burn 100% CPU. This is
a power management issue that will be addressed in a future release.
– Mac OS X Server guests only work with one CPU assigned to the VM. Sup-
port for SMP will be provided in a future release.
– Depending on your system and version of Mac OS X Server, you might expe-
rience guest hangs after some time. This can be fixed by turning off energy
saving (set timeout to “Never”) in the system preferences.
– By default, the VirtualBox EFI enables debug output of the Mac OS X Server
kernel to help you diagnose boot problems. Note that there is a lot of output
and not all errors are fatal (they would also show on your physical Mac).
You can turn off these messages by issuing this command:
VBoxManage setextradata vmname "VBoxInternal2/EfiBootArgs" " "
• Solaris hosts. The following restrictions apply for OpenSolaris and Solaris 10:
– There is no support for USB on Solaris 10 hosts.
– USB support on OpenSolaris requires version snv_124 or higher. Webcams
and other isochronous devices are known to have poor performance.
– No ACPI information (battery status, power source) is reported to the guest.
– No support for using wireless with bridged networking.
• Guest Additions for OS/2. Shared folders are not yet supported with OS/2
guests. In addition, seamless windows and automatic guest resizing will prob-
ably never be implemented due to inherent limitations of the OS/2 graphics
system.
212
14 Change log
This section summarizes the changes between VirtualBox versions. Note that this
change log is not exhaustive; not all changes are listed.
VirtualBox version numbers consist of three numbers separated by dots where the
first and second number represent the major version and the 3rd number the minor
version. Minor version numbers of official releases are always even. An odd minor
version number represents an internal development or test build. In addition, each
build contains a revision number.
• VMM: properly terminate the VM with an error if the guest is trying to switch to
the PAE mode but PAE is disabled in the VM settings
• GUI: switch to native file dialogs (Windows hosts only; bug 5459)
• GUI: don’t use native file dialogs on KDE hosts (Linux hosts only; bug #6809)
• 3D support: fixed GL_EXT_texture_sRGB support
213
14 Change log
• Settings: properly store the NAT network setting in XML settings file version 1.10
and later (bug #6176)
• VBoxManage: handle differencing images with parent UUID correctly in sub-
command openmedium disk (bug #6751)
214
14 Change log
• VMM: fixed host crash when running 64-bit guests on 32-bit hosts with certain
Intel CPUs (VT-x only; bug #6166)
• VMM: allow 64-bit SMP guests on 32-bit hosts (VT-x and AMD-V only; does not
apply to Mac OS X, which already supports it)
• VMM: fixed Guru mediation if guests with more than 2GB are booted with VT-
x/AMD-V disabled (bug #5740)
• VMM: fixed TR limit trashing (VT-x and 64-bit host only; bug #7052)
• Page Fusion: several bug fixes for SMP guests (including bug #6964)
• Teleportation: several fixes and improvements
• Mac OS X server guests: compatibility fix
• EFI: fixed memory detection for guests with 2GB or more RAM assigned
• GUI: added a workaround for a Linux kernel bug which affecting asynchronous
I/O on ext4 / xfs file systems (Linux hosts only)
• GUI: added setting for multiple VRDP connections; useful if multiple screens are
enabled
• GUI: another fix for the keyboard capturing bug under metacity (bug #6727)
• GUI: fixed quit dialog when used in seamless or fullscreen mode (Mac OS X hosts
only; bug #6938)
• GUI: handle the extra key on the Brazilian keyboard on X11 hosts again (bug
#7022).
• 2D Video acceleration: fixed crashes when leaving the fullscreen mode (bug
#6768)
• VBoxManage: fixed storageattach error handling (bug #6927)
• VBoxManage: fixed dhcpserver add (3.2.0 regression; bug #7031)
• Storage: fixed hang with images located on filesystems which don’t support
async I/O (bug #6905)
• Storage: fixed raw disks on Windows hosts (3.2.0 regression; bug #6987)
• LsiLogic: fixed hang with older Linux guests
• BusLogic: fixed hang during I/O
215
14 Change log
• SATA: set initial number of ports to 1 as some guests can’t handle 30 ports (e.g.
CentOS 4 and FreeBSD; bug #6984)
• SATA: performance improvement
• SCSI: fixed error when using the full format option during Windows installation
(bug #5101)
• iSCSI: fixed authentication (bug #4031)
• Host-only/bridged networking: fixed excessive host kernel warnings under cer-
tain circumstances (Linux hosts only; 3.2.0 regression; bug #6872)
• NAT: fixed potential memory leaks
• NAT: increased the size of the memory pool for 16K Jumbo frames (performance
tweak)
• NAT: allow to link/unlink the network cable even if the VM is currently paused
• E1000: disconnect cable was not properly handled if the NIC was not yet initial-
ized by the guest
• OVF: export performance optimization
• OVF: upgraded OS type definitions to CIM 2.25.0 so that Windows 7 and other
OSes are now tagged correctly on export
• Settings: the setting for disabling the host I/O cache was sometimes not properly
saved
• Settings: save machine state into XML correctly even when snapshot folder has
been changed to a non-default location (bug #5656)
• USB: allow the guest to disable an EHCI port
• USB: find a valid language ID before querying strings (bug #7034)
216
14 Change log
• Linux Additions: install the DRI driver in the right location on ArchLinux guests
(bug #6937)
• X11 Additions: fixed spurious mouse movement events (bug #4260)
217
14 Change log
• VMM: fixed rare invalid guest state guru meditation (VT-x only)
• VMM: fixed poor performance with nested paging and unrestricted guest execu-
tion (VT-x only; bug #6716)
• VMM: fixed occasional guru meditation during Windows 7 bootup (bug #6728)
• GUI: keep the status for remote control in sync with the actual state
• Storage: fixed sporadic hang of SMP guests using SATA or LSI Logic SCSI and
asynchronous I/O
• Virtio-net: fix for guests with more than about 4GB RAM (bug #6784)
• Page Fusion: fixed VBoxService crash with enabled Page Fusion on Win64 guests
218
14 Change log
• Serial: updated the guest device emulation to 16550A and reduced the proba-
bility for lossing bytes during transmission (bug #1548)
• NAT: re-fetch the name server parameters from the host on guest DHCP requests
to handle host network switches more gracefully (bug #3847)
• NAT: fixed parsing of IPv4 addresses in CIDR notation (bug #6797)
• NAT: limit the number of name servers passed to the guest to four (non-Windows
hosts only; bug #4098)
• Linux guests: fix support for disabling mouse integration (bug #6714)
• Webservice: fixed a rare crash when calling IGuest methods from the webservice.
• OVF: fixed wrong hard disk UUIDs on export (bug #6802)
• OVF: fixed 3.2.0 regression importing legacy OVF 0.9 files
• Experimental support for Mac OS X Server guests (see chapter 3.1.1, Mac OS X
Server guests, page 48)
• Memory ballooning to dynamically in- or decrease the amount of RAM used by
a VM (64-bit hosts only) (see chapter 4.8, Memory ballooning, page 84)
219
14 Change log
• Page Fusion automatically de-duplicates RAM when running similar VMs thereby
increasing capacity. Currently supported for Windows guests on 64-bit hosts (see
chapter 4.9, Page Fusion, page 85)
• CPU hot-plugging for Linux (hot-add and hot-remove) and certain Windows
guests (hot-add only) (see chapter 9.5, CPU hot-plugging, page 167)
• New Hypervisor features: with both VT-x/AMD-V on 64-bit hosts, using large
pages can improve performance (see chapter 10.5, Nested paging and VPIDs, page
190); also, on VT-x, unrestricted guest execution is now supported (if nested
paging is enabled with VT-x, real mode and protected mode without paging code
runs faster, which mainly speeds up guest OS booting)
• Support for deleting snapshots while the VM is running
• Support for multi-monitor guest setups in the GUI for Windows guests (see chap-
ter 3.5, Display settings, page 55)
• USB tablet/keyboard emulation for improved user experience if no Guest Addi-
tions are available (see chapter 3.4.1, “Motherboard” tab, page 52)
• LsiLogic SAS controller emulation (see chapter 5.1, Hard disk controllers: IDE,
SATA (AHCI), SCSI, SAS, page 87)
• RDP video acceleration (see chapter 7.1.9, VRDP video redirection, page 119)
• NAT engine configuration via API and VBoxManage
• Use of host I/O cache is now configurable (see chapter 5.7, Disk images and I/O
caching, page 98)
• Guest Additions: added support for executing guest applications from the host
system (replaces the automatic system preparation feature; see chapter 4.7,
Guest control, page 83)
• OVF: enhanced OVF support with custom namespace to preserve settings that
are not part of the base OVF standard
• VMM: fixed Windows 2000 guest crash when configured with a large amount of
RAM (bug #5800)
• Linux/Solaris guests: PAM module for automatic logons added
• GUI: guess the OS type from the OS name when creating a new VM
• GUI: added VM setting for passing the time in UTC instead of passing the local
host time to the guest (bug #1310)
• GUI: fixed seamless mode on secondary monitors (bugs #1322 and #1669)
220
14 Change log
• GUI: offer to download the user manual in the OSE version (bug #6442)
• GUI: allow to set an empty host key to disallow any host key combination (bug
#684)
• GUI: allow to restrict the possible actions when shutting down the VM from the
GUI
• Main: allow to start a VM even if a virtual DVD or floppy medium is not accessible
• Settings: be more robust when saving the XML settings files
• Mac OS X: rewrite of the CoreAudio driver and added support for audio input
(bug #5869)
• Mac OS X: external VRDP authentication module support (bug #3106)
• Mac OS X: moved the realtime dock preview settings to the VM settings (no
global option anymore). Use the dock menu to configure it
• Mac OS X: added the VM menu to the dock menu
• 3D support: fixed corrupted surface rendering (bug #5695)
• 3D support: fixed VM crashes when using ARB_IMAGING (bug #6014)
• 3D support: fixed assertion when guest applications uses several windows with
single OpenGL context (bug #4598)
• 3D support: added GL_ARB_pixel_buffer_object support
• 3D support: added OpenGL 2.1 support
• 3D support: fixed Final frame of Compiz animation not updated to the screen
(Mac OS X only) (bug #4653)
• 3D support: fixed blank screen after loading snapshot of VM with enabled Com-
piz
• Added support for Virtual Distributed Ethernet (VDE) (Linux hosts only; see chap-
ter 6.2, Introduction to networking modes, page 104)
• Added support for virtual high precision event timer (HPET)
• OVF: fixed mapping between two IDE channels in OVF and the one IDE controller
in VirtualBox
• OVF: fix VMDK format string identifiers and sort XML elements from rasd:
namespace alphabetically as prescribed by standard
• VBoxShell: interactive Python shell extended to be fully functional TUI for
VirtualBox
221
14 Change log
• VMM: fixed crash with the OpenSUSE 11.3 milestone kernel during early boot
(software virtualization only)
• VMM: fixed invalid state during teleportation
• VMM: fixed OS/2 guest crash with nested paging enabled
• VMM: fixed massive display performance loss (AMD-V with nested paging only)
• GUI: fixed off-by-one bug when passing absolute mouse coordinates to the guest
(3.1.6 regression)
• GUI: show the real version of the Guest Additions, not the interface version
• GUI: when adding a DVD or floppy slot in the VM mass storage settings dialog,
don’t attach a random medium but just leave the slot empty
• GUI: added --seamless and --fullscreen command line switches (bug
#4220)
222
14 Change log
• Solaris Hosts: fixed a kernel panic when bridged networking might fail to initial-
ize
• Solaris Hosts: fixed priority tagged VLAN packets in bridged networking
• Shared folders: fixed issue with copying read-only files (Linux guests only; bug
#4890)
• Shared folders: renamed the guest kernel module from vboxvfs to vboxsf to
make it load on demand by the Linux kernel. Fixes mounting from /etc/fstab
in Ubuntu 10.04
• Windows hosts: make the bridged networking driver notify dll be correctly un-
registred on uninstall (bug #5780)
223
14 Change log
• Linux hosts: fixed timing issue on hosts with Linux kernels 2.6.31 or later with
certain CPUs (asynchronous timer mode; bug #6250)
• Linux hosts: properly handle host suspend/resume events on Linux kernels
2.6.30 or later (bug #5562)
• Mac OS X hosts: fixed VBoxSVC crash while enumerating the host network in-
terfaces under certain circumstances
• Snapshots: fixed image corruption after snapshot merge under certain circum-
stances (bug #6023)
• Snapshots: fixed crash with VBoxHeadless / OSE
224
14 Change log
• NAT: fixed memory corruption during ICMP traffic under certain circumstances
• Network: allow to switch the host interface or the internal network while a VM
is running (bug #5781)
• VHD: fix for images with a block size different than 2MB
• USB: fixed filtered device attach regression (bug #6251)
• USB: fixed crash in OHCI under rare circumstances (bug #3571)
• VRDP: fixed hang under rare circumstances when attaching USB devices
• ACPI: prevent guest freezes when accessing /proc/acpi for determining the state
of the host battery and the AC adapter (Linux hosts only; bug #2836)
• PulseAudio: fixed guest freezes under certain conditions (3.1.4 regression; bug
#6224)
225
14 Change log
• VMM: turn on nested paging by default for new VMs (if available; VT-x and
AMD-V only)
• VMM: turn on VPID by default for new VMs (if available; VT-x only)
• VMM: perform strict CPUID compatibility checks when teleporting; to get the
old behavior set “VBoxInternal/CPUM/StrictCpuIdChecks” to 0
• VMM: fixed VM crash with certain 16 bits Windows applications (software virtu-
alization only; bug #5399)
• Snapshots: fixed a 3.1 regression that broke deletion of snapshots when a ma-
chine had immutable or writethrough storage attached (bug #5727)
• GUI: fixed the broken “Reload” button that reloads the machine XML when a
machine is inaccessible
• GUI: fixed guest fullscreen mode after reboot (bug #5372)
226
14 Change log
227
14 Change log
• Solaris hosts: several USB fixes (including support for Apple iPod; bug #5873)
• Solaris installer: fixed USB module removal and Solaris 10 “id” binary incom-
patibility
• Guest Additions: fixed wrong guest time adjustment if the guest clock is ahead
(3.1 regression; non-Windows guests only)
• Linux Additions: fixed shared folders for Linux 2.6.32 guests (bug #5891)
• Linux Additions: make the mouse driver work on Debian 5.0.3 guests again
(3.1.2 regression, bug #5832)
• Windows Additions: fixed malfunctioning VBoxService that broke time-sync
(bug #5872)
• Windows Additions: fixed uninstallation issues on 64-bit guests
• USB: fixed USB related host crashes on 64 bits Windows hosts (bug #5237)
• Main: wrong default HWVirtExExclusive value for new VMs (bug #5664)
• Main: DVD passthrough setting was lost (bug #5681)
• OVF: fixed export of non standard storage controller names (bug #5643)
• Solaris hosts: several USB fixes (including support for Apple iPhone)
• Mac OS X hosts: several fixes for the 3D support
228
14 Change log
• Linux guests: increased the default memory for Redhat and Fedora guests
• Linux Guest Additions: fixed installation on RHEL 3.9 guests and on some 64bit
guests
• Linux Guest Additions: prevent SELinux warnings concerning text relocations in
VBoxOGL.so (bug #5690)
• X11 guests: fixed mouse support for some Xorg 1.4 guests (openSUSE 11.0)
• X11 guests: fixed xorg.conf modification for some older Xorg releases (open-
SUSE 11.1)
229
14 Change log
• 2D Video acceleration: fixed issues with video picture not displayed on playback
• Teleportation (aka live migration); migrate a live VM session from one host to
another (see chapter 7.2, Teleporting, page 119)
• VM states can now be restored from arbitrary snapshots instead of only the last
one, and new snapshots can be taken from other snapshots as well (“branched
snapshots”; see chapter 1.8, Snapshots, page 26)
• 2D video acceleration for Windows guests; use the host video hardware for over-
lay stretching and color conversion (see chapter 4.5.2, Hardware 2D video accel-
eration for Windows guests, page 81)
230
14 Change log
• GUI: the log window grabbed all key events from other GUI windows (bug
#5291)
• GUI: allow to disable USB filters (bug #5426)
• GUI: improved memory slider in the VM settings
• NAT: added host resolver DNS proxy (see chapter 9.10.6, Using the host’s resolver
as a DNS proxy in NAT mode, page 177)
• VMDK: fixed incorrectly rejected big images split into 2G pieces (bug #5523,
#2787)
• VMDK: fixed compatibility issue with fixed or raw disk VMDK files (bug #2723)
• VHD: fixed incompatibility with Hyper-V
• Support for Parallels version 2 disk image (HDD) files; see chapter 5.2, Disk
image files (VDI, VMDK, VHD, HDD), page 90
• OVF: create manifest files on export and verify the content of an optional mani-
fest file on import
• OVF: fixed memory setting during import (bug #4188)
• Mouse device: now five buttons are passed to the guest (bug #3773)
231
14 Change log
• X11 based hosts: allow the user to specify their own scan code layout (bug
#2302)
• Mac OS X hosts: don’t auto show the menu and dock in fullscreen (bug #4866)
• Mac OS X hosts (64 bit): don’t interpret mouse wheel events as left click (bug
#5049)
• Windows, Linux and Solaris Additions: added balloon tip notifier if VirtualBox
host version was updated and Additions are out of date
• Solaris guests: fixed keyboard emulation (bug #1589)
• Solaris Additions: fixed as_pagelock() failed errors affecting guest properties
(bug #5337)
• Windows Additions: added automatic logon support for Windows Vista and Win-
dows 7
• Windows Additions: improved file version lookup for guest OS information
• Linux guest shared folders: allow mounting a shared folder if a file of the same
name as the folder exists in the current directory (bug #928)
• SDK: added object-oriented web service bindings for PHP5
232
14 Change log
• GUI: never start a VM on a single click into the selector window (bug #2676)
• Serial: reduce the probability of lost bytes if the host end is connected to a raw
file
• VMDK: fixed handling of split image variants and fix a 3.0.10 regression (bug
#5355)
• Solaris Additions: fixed regression in Guest Additions driver which among other
things caused lost guest property updates and periodic error messages being
written to the system log
233
14 Change log
234
14 Change log
• Linux Additions: fixed incorrect disk usage value (non-Windows hosts only)
• Linux installer: register the module sources at DKMS even if the package pro-
vides proper modules for the current running kernel
• VHD: do not delay updating the footer when expanding the image to prevent
image inconsistency
• USB: stability fix for some USB 2.0 devices
• GUI: added a search index to the .chm help file
• VMM: fixed 64 bits guest on 32 bits host regression in 3.0.6 (VT-x only; bug
#4947)
• VMM: fixed a recompiler triple fault guru meditation (VT-x & AMD-V only; bug
#5058)
• VMM: fixed hang after guest state restore (AMD-V, 32 bits Windows guest and
IO-APIC enabled only; bug #5059)
• VMM: fixed paging issue with OS/2 guests
• VMM: fixed guru meditation in rare cases (2.0 regression; software virtualization
only)
• VMM: fixed release assertion during state restore when using the Sound Blaster
16 emulation (bug #5042)
• Security: fixed vulnerability that allowed to execute commands with root privi-
leges
235
14 Change log
• Solaris hosts: fixed a kernel panic with bridged and host-only networking (bug
#4775)
• Solaris hosts: fixed incorrectly persistent CD/DVD-ROMs when changing them
(bug #5077)
• Mac OS X hosts: fixed problem listing host-only adapter names with trailing
garbage (attached VMs won’t start)
• Windows Additions: now work with Vista 64-bit Home editions (bug #3865)
• Windows Additions: fixed screen corruption with ZoomText Magnifier
236
14 Change log
• VMM: fixed IO-APIC overhead for 32 bits Windows NT, 2000, XP and 2003
guests (AMD-V only; bug #4392)
• VMM: fixed a Guru meditation under certain circumstances when enabling a
disabled device (bug #4510)
• VMM: fixed a Guru meditation when booting certain Arch Linux guests (software
virtualization only; bug #2149)
• VMM: fixed hangs with 64 bits Solaris & OpenSolaris guests (bug #2258)
• VMM: fixed decreasing rdtsc values (AMD-V & VT-x only; bug #2869)
• VMM: small Solaris/OpenSolaris performance improvements (VT-x only)
• Solaris hosts: fixed a potential host system deadlock when CPUs were onlined or
offlined
• Solaris hosts installer: added missing dependency for UTF-8 package (bug
#4899)
• Linux hosts: don’t crash on Linux PAE kernels < 2.6.11 (in particular
RHEL/CentOS 4); disable VT-x on Linux kernels < 2.6.13 (bug #1842)
• Linux/Solaris hosts: correctly detect keyboards with fewer keys than usual (bug
#4799)
237
14 Change log
• Python WS: fixed issue with certain enumerations constants having wrong values
in Python webservices bindings
• Python API: several threading and platform issues fixed
• OVF: fixed XML comment handling that could lead to parser errors
• Main: fixed a rare parsing problem with port numbers of USB device filters in
machine settings XML
• Main: restrict guest RAM size to 1.5 GB (32 bits Windows hosts only)
• SATA: fixed hangs and BSODs introduced with 3.0.4 (bugs #4695, #4739,
#4710)
• SATA: fixed a bug which prevented Windows 7 from detecting more than one
hard disk
238
14 Change log
• Mouse: fixed weird mouse behaviour with SMP (Solaris) guests (bug #4538)
• HostOnly Network: fixed failure in CreateHostOnlyNetworkInterface() on Linux
(no GUID)
• HostOnly Network: fixed wrong DHCP server startup while hostonly interface
bringup on Linux
• HostOnly Network: fixed incorrect factory and default MAC address on Solaris
• HostOnly Network: fixed the problem with listing host-only interfaces on Mac
OS X when all physical interfaces are down (bugs #4698, #4790)
• DHCP: fixed a bug in the DHCP server where it allocated one IP address less than
the configured range
• E1000: fixed receiving of multicast packets
• Bridged Network: fixed packet queue issue which might cause DRIVER_POWER_STATE_FAILURE
BSOD for Windows hosts (bug #4821)
• Windows Additions: fixed a bug in VBoxGINA which prevented selecting the
right domain when logging in the first time
• Windows host installer: should now also work on unicode systems (like Korean,
bug #3707)
• Windows host installer: check for sufficient disk space
• Shared clipboard: do not send zero-terminated text to X11 guests and hosts (bug
#4712)
• Shared clipboard: use a less CPU intensive way of checking for new data on X11
guests and hosts (bug #4092)
• Guest Additions: do not hide the host mouse cursor when restoring a saved state
(bug #4700)
• Windows guests: fixed issues with the display of the mouse cursor image (bugs
#2603, #2660 and #4817)
• SUSE 11 guests: fixed Guest Additions installation (bug #4506)
• Guest Additions: support Fedora 12 Alpha guests (bugs #4731, #4733 and
#4734)
239
14 Change log
• VMM: 64 bits guest stability fixes (AMD-V only; bugs #3923 & #3666)
• GUI: the mini toolbar was only shown on the first host display (bug #4654)
• GUI: added a VM option to display the mini toolbar on top
• GUI: don’t crash when adding plus configuring host-only network interfaces
• Shared Folders: fixed selection of a drive root directory as a shared folder host
path in VirtualBox (Windows host only)
• USB: fixed a bug that may have rendered USB device filter settings inactive (3.0.2
regression, bug #4668)
240
14 Change log
• Guest Additions: report the Guest Additions version to the guest properties (bug
#3415)
• Mac OS X hosts: fix creation of VMDK files giving raw partition access (bug
#1461)
• Mac OS X hosts: improved support for Snow Leopard
• Linux hosts: fixed problems leading to wrong colors or transparency in host
windows with some graphics drivers (bug #3095)
• Linux hosts: hardware detection fallbacks if the hal service fails to find any DVD
drives.
• Linux and Solaris hosts: Work around color handling problems in Qt (bug
#4353)
• X11 guests: prevent windows from being skipped in seamless mode KDE guests
(bugs #1681 and #3574)
• X11 guests: fixed screen corruption in X11 guests when large amounts of video
RAM were allocated (bug #4430)
• X11 guests: some fixes when switching between host and guest-drawn mouse
pointers.
• X11 guests: fixed an issue which caused seamless mode to stop working as it
should (the main issue listed in bug #2238).
• VMM: fixed network regressions (guest hangs during network IO) (bug #4343)
241
14 Change log
• ACPI: fixed Windows 2000 kernel hangs with IO-APIC enabled (bug #4348)
• APIC: fixed high idle load for certain Linux guests (3.0 regression)
• BIOS: properly handle Ctrl-Alt-Del in real mode
• iSCSI: fixed configuration parsing (bug #4236)
• OVF: fix potential confusion when exporting networks
• OVF: compatibility fix (bug #4452)
• OVF: accept ovf:/disk/ specifiers with a single slash in addition to ovf://disk/
(bug #4452)
• NAT: fixed crashes under certain circumstances (bug #4330)
• 3D support: fixed dynamic linking on Solaris/OpenSolaris guests (bug #4399)
• 3D support: fixed incorrect context/window tracking for multithreaded apps
• Shared Folders: fixed loading from saved state (bug #1595)
• Shared Folders: host file permissions set to 0400 with Windows guest (bug
#4381)
• X11 host and guest clipboard: fixed a number of issues, including bug #4380
and #4344
• X11 Additions: fixed some issues with seamless windows in X11 guests (bug
#3727)
• Windows Additions: added VBoxServiceNT for NT4 guests (for time synchro-
nization and guest properties)
• Windows Additions: fixed version lookup
• Linux Installer: support Pardus Linux
• Linux hosts: workaround for buggy graphics drivers showing a black VM window
on recent distributions (bug #4335)
• Linux hosts: fixed typo in kernel module startup script (bug #4388)
• Solaris hosts: several installer fixes
• Solaris host: fixed a preemption issue causing VMs to never start on Solaris 10
(bug #4328).
• Solaris guest: fixed mouse integration for OpenSolaris 2009.06 (bug #4365)
• Windows hosts: fixed high CPU usage after resuming the host (bug #2978)
• Fixed a settings file conversion bug which sometimes caused hardware accelera-
tion to be enabled for virtual machines that had no explicit configuration in the
XML.
242
14 Change log
• Guest SMP with up to 32 virtual CPUs (VT-x and AMD-V only; see chapter 3.4.2,
“Processor” tab, page 54)
• Windows guests: ability to use Direct3D 8/9 applications / games (experimental;
see chapter 4.5.1, Hardware 3D acceleration (OpenGL and Direct3D 8/9), page
79)
• Support for OpenGL 2.0 for Windows, Linux and Solaris guests
• Solaris hosts: loosen the restriction for contiguous physical memory under cer-
tain conditions
• Mac OS X hosts: fixed guest PAE
• Linux hosts: kernel module compile fixes for 2.6.31 (bug #4264)
• VMM: fixed occasional guru meditation when loading a saved state (VT-x only)
• VMM: eliminated IO-APIC overhead with 32 bits guests (VT-x only, some Intel
CPUs don’t support this feature (most do); bug #638)
• VMM: fixed 64 bits CentOS guest hangs during early boot (AMD-V only; bug
#3927)
• VMM: performance improvements for certain PAE guests (e.g. Linux 2.6.29+
kernels)
• VMM: some Windows guests detected a completely wrong CPU frequency (bug
#2227)
• GUI: added mini toolbar for fullscreen and seamless mode (Thanks to Huihong
Luo)
• GUI: redesigned settings dialogs
243
14 Change log
• GUI: allow to create/remove more than one host-only network adapters (non
Windows hosts)
• GUI: display estimated time for long running operations (e.g. OVF im-
port/export)
• GUI: fixed rare hangs when open the OVF import/export wizards (bug #4157)
• 3D support: fixed VM crashes for client applications using incorrect OpenGL
states
• 3D support: fixed memory corruption when querying for supported texture com-
pression formats
• 3D support: fixed incorrect rendering of glDrawRangeElements
• 3D support: fixed memory leak when using VBOs
• 3D support: fixed glew library detection
• 3D support: fixed random textures corruption
• VRDP: support Windows 7 RDP client
• Networking: fixed another problem with TX checksum offloading with Linux
kernels up to version 2.6.18
• NAT: fixed “open ports on virtual router 10.0.2.2 - 513, 514” (forum)
• NAT: allow to configure socket and internal parameters
• NAT: allow to bind sockets to specific interface
• PXE boot: significant performance increase (VT-x/AMD-V only)
• VHD: properly write empty sectors when cloning of VHD images (bug #4080)
• VHD: fixed crash when discarding snapshots of a VHD image
• VHD: fixed access beyond the block bitmap which could lead to arbitrary crashes
• VBoxManage: fixed incorrect partition table processing when creating VMDK
files giving raw partition access (bug #3510)
• VBoxManage: support cloning to existing image file
• OVF: several OVF 1.0 compatibility fixes
• OVF: fixed exporting of disk images when multiple virtual machines are exported
at once
• Virtual mouse device: eliminated micro-movements of the virtual mouse which
were confusing some applications (bug #3782)
244
14 Change log
• Shared Folders: sometimes a file was created using the wrong permissions (2.2.0
regression; bug #3785)
• Shared Folders: allow to change file attributes from Linux guests and use the
correct file mode when creating files
• Shared Folders: some content was incorrectly written under certain conditions
(bug #1187)
• Shared Folders: fixed incorrect file timestamps, when using Windows guest on a
Linux host (bug #3404)
• X11 clipboard: fix duplicate end of lines (bug #4270)
• X11 guests: a number of shared clipboard fixes
• Linux guests: Guest Additions support for SUSE Linux Enterprise Desktop 11
• Windows host installer: VirtualBox Python API can now be installed automati-
cally (requires Python and Win32 Extensions installed)
• USB: Support for high-speed isochronous endpoints has been added. In addition,
read-ahead buffering is performed for input endpoints (currently Linux hosts
only). This should allow additional devices to work, notably webcams (bug
#242).
• USB: fixed error handling for some USB dongles
• Web service: fixed inability to handle NULL pointers for object arguments, which
are valid values for a lot of APIs, in both the raw and the object-oriented web
service.
• Web service: object-oriented bindings for JAX-WS did not exhibit interface inher-
itance correctly, fixed
• Web service: added support for IDisplay and IGuest interfaces, which were pre-
viously unavailable
245
14 Change log
246
14 Change log
• NAT: fixed a potential segfault if the host lost its connectivity (bug #3964)
• Shared Folders: deny access to parent directories on Windows hosts (bug
#4090)
• Shared Folders: make rm/rmdir work with Solaris guests on Windows hosts
• Networking: fixed the problem with blocked receiving thread when a broadcast
packet arrives too early to be handled by uninitialized e1000 adapter
• Networking: fixed the problem that caused host freezes/crashes when using
bridged mode with host’s interface having RX checksum offloading on (bug
#3926 and related). Fixes problems with TX offloading as well (bug #3870)
• Serial: allow to redirect the serial port to a raw file (bug #1023)
• VRDP: fixed a rare incorrect screen update
• VMDK: fixed creating snapshots
• Host and guest clipboard: fixed a number of issues affecting hosts and guests
running the X window system
• Guest Additions: make sure the virtual mouse autodetection works on first re-
boot after installing the Additions on X.Org server 1.5 and later
• Guest Additions: properly report process identity number of running services
247
14 Change log
• Solaris Additions: fixed a bug that could panic the guest when unmounting a
busy shared folder
• Windows Additions: fixed mouse pointer integration of some Windows guests
(2.2.0 regression, bug #3734)
• Windows Additions: fixed installation on Windows Server 2008 Core (bug
#2628)
• Main: do not try to use older versions of D-Bus (Linux hosts only, bug #3732)
• GUI: properly show the detailed settings dialog of NAT networks (bug #3702)
• GUI: HostKey could not be changed (2.2.0 regression, bug #3689)
• GUI: fixed memory textfield size (Windows hosts only; bug #3679)
• GUI: fixed crash when selecting a shared folder path (Windows hosts only; bugs
#3694, #3751, #3756)
• VBoxManage modifyhd --compact: implemented again for VDI files, and now
supports relative paths (bug #2180, #2833)
• VBoxManage snapshot discard: made it work again (2.1.0 regression; bug
#3714)
• NAT: on some Windows hosts, the guest didn’t receive a DHCP lease (bug #3655)
• NAT: fixed release assertion during poll() (bug #3667)
• Networking: fixed a deadlock caused by the PCnet network device emulation
(2.2.0 regression, bug #3676)
248
14 Change log
• CBindings: fixed possible memory leak while releasing the IVirtualBox and ISes-
sion Objects
• Solaris hosts: fixed host-only network interface incompatibility with nwam/dhcpagent
(bug #3754)
• Windows installer: fixed several install and uninstall issues (bugs #3659,
#3686, #1730, #3711, #3373, #3382, #3701, #3685, #3710)
• Mac OS X hosts: preliminary support for Snow Leopard
• OVF (Open Virtualization Format) appliance import and export (see chapter
1.11, Importing and exporting virtual machines, page 30)
• Host-only networking mode (see chapter 6.6, Host-only networking, page 110)
• Hypervisor optimizations with significant performance gains for high context
switching rates
• Raised the memory limit for VMs on 64-bit hosts to 16GB
• VT-x/AMD-V are enabled by default for newly created virtual machines
• USB (OHCI & EHCI) is enabled by default for newly created virtual machines
(Qt GUI only)
• Experimental USB support for OpenSolaris hosts
• Shared Folders for Solaris and OpenSolaris guests
• OpenGL 3D acceleration for Linux and Solaris guests (see chapter 4.5.1, Hard-
ware 3D acceleration (OpenGL and Direct3D 8/9), page 79)
• Added C API in addition to C++, Java, Python and Web Services
• VMM: FreeBSD guest related fix for V86 flags (bug #2342)
249
14 Change log
• VMM: significant speedup of certain GRUB boot loaders (e.g. Solaris) (VT-
x/AMD-V only)
• VMM: real-mode IOPL fix for DOS guests (VT-x only)
• VMM: fixed VT-x detection with certain BIOSes that enable VT-x, but don’t set
the lock bit in MSR_IA32_FEATURE_CONTROL
• VMM: fixed hibernation issues on Windows XP hosts (VT-x only; bug #1794)
• VMM: properly emulate RDMSR from the TSC MSR, should fix some NetBSD
guests
• VMM: emulate RDPMC; fixes Windows guests crashes when using the Kaspersky
virus scanner (bug #1778)
• NAT: fixed truncated downloads (FTP) (bug #3257)
• NAT: blocked UDP packets caused a crash (bug #3426)
• NAT: allow to configure the next server and the boot file via VBoxManage (bug
#2759)
• IDE: fixed hard disk upgrade from XML-1.2 settings (bug #1518)
• Hard disk: support more VMDK file variants (including fixed-size ESX server
images)
• Hard disks: refuse to start the VM if a disk image is not writable
• USB: further reduced host CPU utilization for OHCI and EHCI; the “VBoxInternal/Devices/usb-
ohci/0/Config/FrameRate” CFG key is no longer necessary and no longer sup-
ported
• USB: fixed BSOD on the host with certain USB devices (Windows hosts only; bug
#1654)
• E1000: properly handle cable disconnects (bug #3421)
250
14 Change log
• X11 guests: show the guest mouse pointer at the right position if the virtual
desktop is larger than the guest resolution (bug #2306)
• Linux Additions: fixed typo when detecting Xorg 1.6 (bug #3555)
• Windows hosts: fixed BSOD when starting a VM with enabled host interface
(bug #3414)
• Linux hosts: do proper reference counting to prevent unloading the vboxnetflt
module as long as this code is in use (bug #3104)
251
14 Change log
• GUI/Windows: re-enabled support for copy and paste (Windows hosts 2.0 re-
gression; bug #2065)
• 3D support: added OpenGL select/feedback support (bug #2920)
• 3D support: close OpenGL subsystem for terminated guest applications (bug
#3243)
• Windows hosts: fixed network component BSOD issue (bugs #3168, #2916)
• Windows hosts: fixed installation issues (bugs #2517, #1730, #3130)
• Linux hosts: fixed occasional kernel oopses (bug #2556)
• Linux hosts: fixed module dependency for shipped modules (bug #3115)
• Linux hosts: moved the udev rules for USB forward so that they don’t override
existing system rules (bug #3143)
• Linux hosts: fixed the issue with guest not being able to communicate with each
other when attached via TAP interfaces (bug #3215)
252
14 Change log
• Linux hosts: give up probing for USB gracefully if DBus or hal are not available
(bug #3136)
• Linux hosts: fixed warnings in installer when SELinux was disabled (bug #3098)
• Linux hosts: VirtualBox sometimes failed to start if it had been started using
sudo previously (bug #3270)
• Solaris hosts: fixed high CPU load while running many guests in parallel
• Solaris hosts: fixed inability to start more than 128 VMs
• NAT: fixed occasional crashes when the guest is doing traceroute (non-Windows
hosts; bug #3200)
• NAT: fixed crashes under high load (bug #3110)
• NAT: fixed truncated downloads (Windows hosts only, bug #3257)
• NAT: don’t intercept TFTP packages with a destination address different from the
builtin TFTP server (bug #3112)
• USB: several fixes for USB passthrough on Linux hosts
• USB: reduced host CPU utilization if EHCI is active
• VRDP: fixed VRDP server black screen after a client reconnect (bug #1989)
• VRDP: modified rdesktop client (rdesktop-vrdp) now uses NumLock state syn-
chronization (bug #3253)
• LsiLogic: make FreeBSD guests work (bug #3174)
253
14 Change log
• ATA: fixed deadlock when pausing VM due to problems with the virtual disk (e.g.
disk full, iSCSI target unavailable)
• iSCSI: fixed possible crash when pausing the VM
• Linux Additions: fixed occasional file corruption when writing files in O_APPEND
mode to a shared folder (bug #2844)
• Linux Additions: the mouse driver was not properly set up on X.Org release
candidates (bug #3212)
• Linux Additions: fixed installer to work with openSUSE 11.1 (bug #3213)
• Linux Additions: disable dynamic resizing if the X server is configured for fixed
resolutions
• Linux/Solaris Additions: handle virtual resolutions properly which are larger
than the actual guest resolution (bug #3096)
254
14 Change log
• VMM: fixed guru meditation when booting Novell Netware 4.11 (VT-x only; bug
#2898)
• VMM: fixed VERR_ADDRESS_TOO_BIG error on some Mac OS X systems when
starting a VM
• VMM: clear MSR_K6_EFER_SVME after probing for AMD-V (bug #3058)
• VMM: fixed guru meditation during Windows 7 boot with more than 2 GB guest
RAM (VT-x, nested paging only)
• VMM: fixed hang during OS/2 MCP2 boot (AMD-V and VT-x only)
• VMM: fixed loop during OpenBSD 4.0 boot (VT-x only)
• VMM: fixed random crashes related to FPU/XMM with 64 bits guests on 32 bits
hosts
• VMM: fixed occasional XMM state corruption with 64 bits guests
• GUI: raised the RAM limit for new VMs to 75% of the host memory
• GUI: added Windows 7 as operating system type
• VBoxSDL: fixed -fixed fixedmode parameter (bug #3067)
• Clipboard: stability fixes (Linux and Solaris hosts only, bug #2675 and #3003)
• 3D support: fixed VM crashes for certain guest applications (bugs #2781,
#2797, #2972, #3089)
• LsiLogic: improved support for Windows guests (still experimental)
• VGA: fixed a 2.1.0 regression where guest screen resize events were not properly
handled (bug #2783)
• VGA: significant performance improvements when using VT-x/AMD-V on Mac
OS X hosts
• VGA: better handling for VRAM offset changes (fixes GRUB2 and Dos DOOM
display issues)
• VGA: custom VESA modes with invalid widths are now rounded up to correct
ones (bug #2895)
• IDE: fixed ATAPI passthrough support (Linux hosts only; bug #2795)
• Networking: fixed kernel panics due to NULL pointer dereference in Linux ker-
nels < 2.6.20 (Linux hosts only; bug #2827)
• Networking: fixed intermittent BSODs when using the new host interface (Win-
dows hosts only; bugs #2832, #2937, #2929)
255
14 Change log
• Networking: fixed several issues with displaying hostif NICs in the GUI (Win-
dows hosts only; bugs 2814, #2842)
• Networking: fixed the issue with displaying hostif NICs without assigned IP ad-
dresses (Linux hosts only; bug #2780)
• Networking: fixed the issue with sent packets coming back to internal network
when using hostif (Linux hosts only; bug #3056).
• NAT: fixed port forwarding (Windows hosts only; bug #2808)
• NAT: fixed booting from the builtin TFTP server (bug #1959)
• NAT: fixed occasional crashes (bug #2709)
• SATA: vendor product data (VPD) is now configurable
• SATA: raw disk partitions were not recognized (2.1.0 regression, Windows host
only, bug #2778)
• SATA: fixed timeouts in the guest when using raw VMDK files (Linux host only,
bug #2796)
• SATA: huge speed up during certain I/O operations like formatting a drive
• VBoxManage clonehd: fixed garbled output image when creating VDI files (bug
#2813)
• VBoxManage guestproperty: fixed property enumeration (incorrect parame-
ters/exception)
• VHD: fixed error when attaching certain container files (bug #2768)
256
14 Change log
• Linux hosts: don’t drop any capability if the VM was started by root (2.1.0 re-
gression)
• Mac OS X hosts: save the state of running or paused VMs when the host ma-
chine’s battery reaches critical level
• Mac OS X hosts: improved window resizing of the VM window
• Mac OS X hosts: added GUI option to disable the dock icon realtime preview in
the GUI to decrease the host CPU load when the guest is doing 3D
• Mac OS X hosts: polished realtime preview dock icon
• Windows Additions: fixed guest property and logging OS type detection for Win-
dows 2008 and Windows 7 Beta
• Windows Additions: added support for Windows 7 Beta (bugs #2995, #3015)
• Windows Additions: fixed Windows 2000 guest freeze when accessing files on
shared folders (bug #2764)
257
14 Change log
• Support for 64-bit guests on 32-bit host operating systems (experimental; see
chapter 3.1.2, 64-bit guests, page 49)
• Added support for Intel Nehalem virtualization enhancements (EPT and VPID;
see chapter 10.2, Hardware vs. software virtualization, page 185)
• Full VMDK/VHD support including snapshots (see chapter 5.2, Disk image files
(VDI, VMDK, VHD, HDD), page 90)
• New NAT engine with significantly better performance, reliability and ICMP echo
(ping) support (bugs #1046, #2438, #2223, #1247)
• New Host Interface Networking implementations for Windows and Linux hosts
with easier setup (replaces TUN/TAP on Linux and manual bridging on Win-
dows)
• VMM: support for hardware breakpoints (VT-x and AMD-V only; bug #477)
• VMM: VGA performance improvements for VT-x and AMD-V
• VMM: Solaris and OpenSolaris guest performance improvements for AMD-V
(Barcelona family CPUs only)
• VMM: fixed guru meditation while running the Dr. Web virus scanner (software
virtualization only; bug #1439)
• VMM: deactivate VT-x and AMD-V when the host machine goes into suspend
mode; reactivate when the host machine resumes (Windows, Mac OS X & Linux
hosts; bug #1660)
• VMM: fixed guest hangs when restoring VT-x or AMD-V saved states/snapshots
• VMM: fixed guru meditation when executing a one byte debug instruction (VT-x
only; bug #2617)
258
14 Change log
• VMM: fixed guru meditation for PAE guests on non-PAE hosts (VT-x)
• VMM: disallow mixing of software and hardware virtualization execution in gen-
eral (bug #2404)
• VMM: fixed black screen when booting OS/2 1.x (AMD-V only)
• GUI: pause running VMs when the host machine goes into suspend mode (Win-
dows & Mac OS X hosts)
• GUI: resume previously paused VMs when the host machine resumes after sus-
pend (Windows & Mac OS X hosts)
• GUI: save the state of running or paused VMs when the host machine’s battery
reaches critical level (Windows hosts)
• GUI: properly restore the position of the selector window when running on the
compiz window manager
• GUI: properly restore the VM in seamless mode (2.0 regression)
• GUI: warn user about non optimal memory settings
• GUI: structure operating system list according to family and version for improved
usability
• GUI: predefined settings for QNX guests
• IDE: improved ATAPI passthrough support
• Networking: added support for up to 8 Ethernet adapters per VM
• Graphics: fixed handling of a guest video memory which is not a power of two
(bug #2724)
• VBoxManage: fixed bug which prevented setting up the serial port for direct
device access
• VBoxManage: added support for VMDK and VHD image creation
259
14 Change log
• VMM: fixed guest hangs when restoring VT-x or AMD-V saved states/snapshots
• VMM: fixed memory allocation issues which can cause VM start failures with
VERR_PGM_MAPPING_CONFLICT error
• VMM: fixed host crashes/hangs on certain 32 bits Windows systems when run-
ning Linux guests (bugs #1606, #2269, #2763)
260
14 Change log
• VMM: fixed Guru meditation when running 64 bits Windows guests (bug #2220)
• VMM: fixed Solaris 10U6 boot hangs (VT-x and AMD-V) bug #2565)
• VMM: fixed Solaris 10U6 reboot hangs (AMD-V only; bug #2565)
• GUI: the host key was sometimes not properly displayed (Windows hosts only,
bug #1996)
• GUI: the keyboard focus was lost after minimizing and restoring the VM window
via the Windows taskbar (bugs #784)
• VBoxManage: properly show SATA disks when showing the VM information (bug
#2624)
• SATA: fixed access if the buffer size is not sector-aligned (bug #2024)
• SATA: improved performance
• SATA: fixed snapshot function with ports>1 (bug #2510)
• Solaris hosts: fixed a rare race condition while powering off VMs with host in-
terface networking
• Solaris hosts: fixed VBoxSDL on Solaris 10 by shipping the required SDL library
(bug #2475)
261
14 Change log
• Windows Additions: fixed logged in users reporting via guest properties when
using native RDP connections
• Windows Additions: fixed Vista crashes when accessing shared folders under
certain circumstances (bug #2461)
• Windows Additions: fixed shared folders access with MS-Office (bug #2591)
• Linux Additions: fixed compilation of vboxvfs.ko for 64-bit guests (bug #2550)
• SDK: added JAX-WS port caching to speedup connections
• SATA: fixed Guru mediation when booting OpenSolaris/64; most likely applies
to other guests as well (bug #2292)
• Network: don’t crash when changing the adapter link state if no host driver is
attached (bug #2333)
• VHD: fixed bug which prevents booting from VHD images bigger than 4GB (bug
#2085)
• VRDP: fixed a repaint problem when the guest resolution was not equal to the
client resolution
• Clipboard: don’t crash when host service initialization takes longer than ex-
pected (Linux hosts only; bug #2001)
• Windows hosts: VBoxSVC.exe crash (bug #2212)
• Windows hosts: VBoxSVC.exe memory leak due to a Windows WMI memory
leak (Vista only) (bug #2242)
262
14 Change log
• Linux hosts: handle jiffies counter overflow (VM stuck after 300 seconds of host
uptime; bug #2247)
• Solaris hosts: fixed host or guest side networking going stale while using host
interface networking (bug #2474)
• Solaris hosts: added support for using unplumbed network interfaces and Cross-
bow Virtual Network Interfaces (VNICs) with host interface networking
• Solaris hosts: reworked threading model improves performance for host inter-
face networking
• Windows Additions: fixed crash when accessing deep directory structures in a
shared folder
• Windows Additions: improved shared folder name resolving (bug #1728)
• VMM: fixed inability to run more than one VM in parallel (AMD-V on CPUs with
erratum 170 only; bug #2167)
• VMM: VT-x stability fixes (bug #2179 and others)
• VMM: fixed Linux 2.6.26+ kernel crashes (used by Ubuntu 8.10 Alpha, Fedora
10 Alpha; bug #1875)
263
14 Change log
• GUI: fixed crash when trying to release an inaccessible image in the virtual disk
manager
• GUI: fixed invalid error message for a changed snapshot path even if that path
wasn’t changed (bug #2064)
• GUI: fixed crash when creating a new hard disk image (bug #2060)
• GUI: fixed crash when adding a hard disk in the VM settings (bug #2081)
• GUI: fixed a bug where VirtualBox isn’t working with the new QGtkStyle plugin
(bug #2066)
• GUI: fixed VM close dialog in seamless mode (Mac OS X hosts only; bug #2067)
• GUI: fixed standard menu entries for NLS versions (Mac OS X hosts only)
• GUI: disable the VT-x/AMD-V setting when it’s not supported by the CPU (or on
Mac OS X hosts)
• VBoxManage: fixed crash during internalcommands createrawvmdk (bug
#2184)
• VBoxManage: fixed output of snapshot showvminfo (bug #698)
• Linux hosts: fixed bug in vboxdrv.ko that could corrupt kernel memory and panic
the kernel (bug #2078)
• Linux hosts: compile fixes for kernel module on Linux 2.6.27
• Mac OS X hosts: added Python support
264
14 Change log
• Linux Additions: support Ubuntu 8.10 guests and Fedora 9 guests (dynamic
resizing disabled for the latter)
• Linux Additions: added installer check for the system architecture
• Linux Additions: fixed Xorg modules path for some Linux distributions (bug
#2128)
• VMDK: be more liberal with ambiguous parts of the format specification and
accept more format variants (bug #2062)
• VHD: fixed a bug in the VHD backend which resulted in reading the wrong data
(bug #2085)
• Solaris hosts: fixed kernel panic on certain machines when starting VMs with
host interface networking (bug #2183)
• Solaris hosts: fixed inability to access NFS shares on the host when host interface
networking was enabled
• Solaris hosts: installer now detects and reports when installing under the wrong
architecture
• Solaris hosts: fixed security hardening that prevented starting VMs from non-
global zones even as root (bug #1948)
• Solaris Additions: combined the 32 bit and 64 bit Additions installer into a single
package
• Mac OS X hosts: experimental support for attaching a real serial port to the guest
• Support for Nested Paging on modern AMD CPUs (major performance gain)
265
14 Change log
In VirtualBox 3.2, changelog information for versions before 2.0 were removed in
order to save space. To access this information, please consult the user manual of
VirtualBox 3.1 or earlier.
266
15 Third-party materials and licenses
VirtualBox incorporates materials from several Open Source software projects. There-
fore the use of these materials by VirtualBox is governed by different Open Source
licenses. This document reproduces these licenses and provides a list of the materials
used and their respective licensing conditions. Section 1 contains a list of the materials
used. Section 2 reproduces the applicable Open Source licenses. For each material, a
reference to its license is provided.
The source code for the materials listed below as well as the rest of the VirtualBox
code which is released as open source are available at http://www.virtualbox.org,
both as tarballs for particular releases and as a live SVN repository.
15.1 Materials
• VirtualBox contains portions of QEMU which is governed by the licenses in chap-
ter 15.2.5, X Consortium License (X11), page 289 and chapter 15.2.2, GNU Lesser
General Public License (LGPL), page 274 and
(C) 2003-2005 Fabrice Bellard; Copyright (C) 2004-2005 Vassili Karpov (malc);
Copyright (c) 2004 Antony T Curtis; Copyright (C) 2003 Jocelyn Mayer
• VirtualBox contains code which is governed by the license in chapter 15.2.5, X
Consortium License (X11), page 289 and
Copyright 2004 by the Massachusetts Institute of Technology.
• VirtualBox contains code of the BOCHS VGA BIOS which is governed by the
license in chapter 15.2.2, GNU Lesser General Public License (LGPL), page 274
and
Copyright (C) 2001, 2002 the LGPL VGABios developers Team.
• VirtualBox contains code of the BOCHS ROM BIOS which is governed by the
license in chapter 15.2.2, GNU Lesser General Public License (LGPL), page 274
and
Copyright (C) 2002 MandrakeSoft S.A.; Copyright (C) 2004 Fabrice Bellard;
Copyright (C) 2005 Struan Bartlett.
• VirtualBox contains the zlib library which is governed by the license in chapter
15.2.6, zlib license, page 289 and
Copyright (C) 1995-2003 Jean-loup Gailly and Mark Adler.
267
15 Third-party materials and licenses
268
15 Third-party materials and licenses
• VirtualBox ships with the application tunctl (shipped as VBoxTunctl) from the
User-mode Linux suite which is governed by the license in chapter 15.2.1, GNU
General Public License (GPL), page 270 and
Copyright (C) 2002 Jeff Dike.
269
15 Third-party materials and licenses
• VirtualBox may contain x86 SIMD extension for IJG JPEG library which is gov-
erned by the license in chapter 15.2.20, x86 SIMD extension for IJG JPEG library
license, page 306 and
Copyright 2009 Pierre Ossman <[email protected]> for Cendio AB; Copyright
2010 D. R. Commander; Copyright (C) 1999-2006, MIYASAKA Masaru.
15.2 Licenses
15.2.1 GNU General Public License (GPL)
GNU GENERAL PUBLIC LICENSE Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
Everyone is permitted to copy and distribute verbatim copies of this license docu-
ment, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share
and change it. By contrast, the GNU General Public License is intended to guarantee
your freedom to share and change free software–to make sure the software is free
for all its users. This General Public License applies to most of the Free Software
Foundation’s software and to any other program whose authors commit to using it.
(Some other Free Software Foundation software is covered by the GNU Library General
Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General
Public Licenses are designed to make sure that you have the freedom to distribute
copies of free software (and charge for this service if you wish), that you receive
source code or can get it if you want it, that you can change the software or use pieces
of it in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you
these rights or to ask you to surrender the rights. These restrictions translate to certain
responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee,
you must give the recipients all the rights that you have. You must make sure that
they, too, receive or can get the source code. And you must show them these terms so
they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer
you this license which gives you legal permission to copy, distribute and/or modify the
software.
Also, for each author’s protection and ours, we want to make certain that everyone
understands that there is no warranty for this free software. If the software is modified
by someone else and passed on, we want its recipients to know that what they have
is not the original, so that any problems introduced by others will not reflect on the
original authors’ reputations.
270
15 Third-party materials and licenses
271
15 Third-party materials and licenses
272
15 Third-party materials and licenses
this License will not have their licenses terminated so long as such parties remain in
full compliance.
5. You are not required to accept this License, since you have not signed it. However,
nothing else grants you permission to modify or distribute the Program or its derivative
works. These actions are prohibited by law if you do not accept this License. Therefore,
by modifying or distributing the Program (or any work based on the Program), you
indicate your acceptance of this License to do so, and all its terms and conditions for
copying, distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the
recipient automatically receives a license from the original licensor to copy, distribute
or modify the Program subject to these terms and conditions. You may not impose any
further restrictions on the recipients’ exercise of the rights granted herein. You are not
responsible for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement
or for any other reason (not limited to patent issues), conditions are imposed on you
(whether by court order, agreement or otherwise) that contradict the conditions of
this License, they do not excuse you from the conditions of this License. If you cannot
distribute so as to satisfy simultaneously your obligations under this License and any
other pertinent obligations, then as a consequence you may not distribute the Program
at all. For example, if a patent license would not permit royalty-free redistribution of
the Program by all those who receive copies directly or indirectly through you, then
the only way you could satisfy both it and this License would be to refrain entirely
from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular
circumstance, the balance of the section is intended to apply and the section as a whole
is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other
property right claims or to contest validity of any such claims; this section has the sole
purpose of protecting the integrity of the free software distribution system, which is
implemented by public license practices. Many people have made generous contri-
butions to the wide range of software distributed through that system in reliance on
consistent application of that system; it is up to the author/donor to decide if he or
she is willing to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to be a conse-
quence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries ei-
ther by patents or by copyrighted interfaces, the original copyright holder who places
the Program under this License may add an explicit geographical distribution limi-
tation excluding those countries, so that distribution is permitted only in or among
countries not thus excluded. In such case, this License incorporates the limitation as if
written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the
General Public License from time to time. Such new versions will be similar in spirit
to the present version, but may differ in detail to address new problems or concerns.
273
15 Third-party materials and licenses
274
15 Third-party materials and licenses
your freedom to share and change free software–to make sure the software is free for
all its users.
This license, the Lesser General Public License, applies to some specially designated
software packages–typically libraries–of the Free Software Foundation and other au-
thors who decide to use it. You can use it too, but we suggest you first think carefully
about whether this license or the ordinary General Public License is the better strategy
to use in any particular case, based on the explanations below.
When we speak of free software, we are referring to freedom of use, not price.
Our General Public Licenses are designed to make sure that you have the freedom to
distribute copies of free software (and charge for this service if you wish); that you
receive source code or can get it if you want it; that you can change the software and
use pieces of it in new free programs; and that you are informed that you can do these
things.
To protect your rights, we need to make restrictions that forbid distributors to deny
you these rights or to ask you to surrender these rights. These restrictions translate to
certain responsibilities for you if you distribute copies of the library or if you modify
it.
For example, if you distribute copies of the library, whether gratis or for a fee, you
must give the recipients all the rights that we gave you. You must make sure that they,
too, receive or can get the source code. If you link other code with the library, you
must provide complete object files to the recipients, so that they can relink them with
the library after making changes to the library and recompiling it. And you must show
them these terms so they know their rights.
We protect your rights with a two-step method: (1) we copyright the library, and (2)
we offer you this license, which gives you legal permission to copy, distribute and/or
modify the library.
To protect each distributor, we want to make it very clear that there is no warranty
for the free library. Also, if the library is modified by someone else and passed on,
the recipients should know that what they have is not the original version, so that the
original author’s reputation will not be affected by problems that might be introduced
by others.
Finally, software patents pose a constant threat to the existence of any free program.
We wish to make sure that a company cannot effectively restrict the users of a free
program by obtaining a restrictive license from a patent holder. Therefore, we insist
that any patent license obtained for a version of the library must be consistent with
the full freedom of use specified in this license.
Most GNU software, including some libraries, is covered by the ordinary GNU Gen-
eral Public License. This license, the GNU Lesser General Public License, applies to
certain designated libraries, and is quite different from the ordinary General Public Li-
cense. We use this license for certain libraries in order to permit linking those libraries
into non-free programs.
When a program is linked with a library, whether statically or using a shared library,
the combination of the two is legally speaking a combined work, a derivative of the
original library. The ordinary General Public License therefore permits such linking
275
15 Third-party materials and licenses
only if the entire combination fits its criteria of freedom. The Lesser General Public
License permits more lax criteria for linking other code with the library.
We call this license the “Lesser” General Public License because it does Less to protect
the user’s freedom than the ordinary General Public License. It also provides other
free software developers Less of an advantage over competing non-free programs.
These disadvantages are the reason we use the ordinary General Public License for
many libraries. However, the Lesser license provides advantages in certain special
circumstances.
For example, on rare occasions, there may be a special need to encourage the widest
possible use of a certain library, so that it becomes a de-facto standard. To achieve this,
non-free programs must be allowed to use the library. A more frequent case is that a
free library does the same job as widely used non-free libraries. In this case, there
is little to gain by limiting the free library to free software only, so we use the Lesser
General Public License.
In other cases, permission to use a particular library in non-free programs enables a
greater number of people to use a large body of free software. For example, permission
to use the GNU C Library in non-free programs enables many more people to use the
whole GNU operating system, as well as its variant, the GNU/Linux operating system.
Although the Lesser General Public License is Less protective of the users’ freedom, it
does ensure that the user of a program that is linked with the Library has the freedom
and the wherewithal to run that program using a modified version of the Library.
The precise terms and conditions for copying, distribution and modification follow.
Pay close attention to the difference between a “work based on the library” and a “work
that uses the library”. The former contains code derived from the library, whereas the
latter must be combined with the library in order to run.
GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPY-
ING, DISTRIBUTION AND MODIFICATION
0. This License Agreement applies to any software library or other program which
contains a notice placed by the copyright holder or other authorized party saying it
may be distributed under the terms of this Lesser General Public License (also called
“this License”). Each licensee is addressed as “you”.
A “library” means a collection of software functions and/or data prepared so as to
be conveniently linked with application programs (which use some of those functions
and data) to form executables.
The “Library”, below, refers to any such software library or work which has been
distributed under these terms. A “work based on the Library” means either the Library
or any derivative work under copyright law: that is to say, a work containing the
Library or a portion of it, either verbatim or with modifications and/or translated
straightforwardly into another language. (Hereinafter, translation is included without
limitation in the term “modification”.)
“Source code” for a work means the preferred form of the work for making mod-
ifications to it. For a library, complete source code means all the source code for all
modules it contains, plus any associated interface definition files, plus the scripts used
to control compilation and installation of the library.
276
15 Third-party materials and licenses
Activities other than copying, distribution and modification are not covered by this
License; they are outside its scope. The act of running a program using the Library is
not restricted, and output from such a program is covered only if its contents constitute
a work based on the Library (independent of the use of the Library in a tool for writing
it). Whether that is true depends on what the Library does and what the program that
uses the Library does.
1. You may copy and distribute verbatim copies of the Library’s complete source
code as you receive it, in any medium, provided that you conspicuously and appropri-
ately publish on each copy an appropriate copyright notice and disclaimer of warranty;
keep intact all the notices that refer to this License and to the absence of any warranty;
and distribute a copy of this License along with the Library.
You may charge a fee for the physical act of transferring a copy, and you may at your
option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus
forming a work based on the Library, and copy and distribute such modifications or
work under the terms of Section 1 above, provided that you also meet all of these
conditions:
a) The modified work must itself be a software library.
b) You must cause the files modified to carry prominent notices stating that you
changed the files and the date of any change.
c) You must cause the whole of the work to be licensed at no charge to all third
parties under the terms of this License.
d) If a facility in the modified Library refers to a function or a table of data to be
supplied by an application program that uses the facility, other than as an argument
passed when the facility is invoked, then you must make a good faith effort to ensure
that, in the event an application does not supply such function or table, the facility still
operates, and performs whatever part of its purpose remains meaningful.
(For example, a function in a library to compute square roots has a purpose that
is entirely well-defined independent of the application. Therefore, Subsection 2d re-
quires that any application-supplied function or table used by this function must be
optional: if the application does not supply it, the square root function must still com-
pute square roots.)
These requirements apply to the modified work as a whole. If identifiable sections
of that work are not derived from the Library, and can be reasonably considered in-
dependent and separate works in themselves, then this License, and its terms, do not
apply to those sections when you distribute them as separate works. But when you dis-
tribute the same sections as part of a whole which is a work based on the Library, the
distribution of the whole must be on the terms of this License, whose permissions for
other licensees extend to the entire whole, and thus to each and every part regardless
of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to
work written entirely by you; rather, the intent is to exercise the right to control the
distribution of derivative or collective works based on the Library.
277
15 Third-party materials and licenses
In addition, mere aggregation of another work not based on the Library with the
Library (or with a work based on the Library) on a volume of a storage or distribution
medium does not bring the other work under the scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public License
instead of this License to a given copy of the Library. To do this, you must alter all the
notices that refer to this License, so that they refer to the ordinary GNU General Public
License, version 2, instead of to this License. (If a newer version than version 2 of the
ordinary GNU General Public License has appeared, then you can specify that version
instead if you wish.) Do not make any other change in these notices.
Once this change is made in a given copy, it is irreversible for that copy, so the
ordinary GNU General Public License applies to all subsequent copies and derivative
works made from that copy.
This option is useful when you wish to copy part of the code of the Library into a
program that is not a library.
4. You may copy and distribute the Library (or a portion or derivative of it, under
Section 2) in object code or executable form under the terms of Sections 1 and 2 above
provided that you accompany it with the complete corresponding machine-readable
source code, which must be distributed under the terms of Sections 1 and 2 above on
a medium customarily used for software interchange.
If distribution of object code is made by offering access to copy from a designated
place, then offering equivalent access to copy the source code from the same place
satisfies the requirement to distribute the source code, even though third parties are
not compelled to copy the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is de-
signed to work with the Library by being compiled or linked with it, is called a “work
that uses the Library”. Such a work, in isolation, is not a derivative work of the Library,
and therefore falls outside the scope of this License.
However, linking a “work that uses the Library” with the Library creates an exe-
cutable that is a derivative of the Library (because it contains portions of the Library),
rather than a “work that uses the library”. The executable is therefore covered by this
License. Section 6 states terms for distribution of such executables.
When a “work that uses the Library” uses material from a header file that is part of
the Library, the object code for the work may be a derivative work of the Library even
though the source code is not. Whether this is true is especially significant if the work
can be linked without the Library, or if the work is itself a library. The threshold for
this to be true is not precisely defined by law.
If such an object file uses only numerical parameters, data structure layouts and
accessors, and small macros and small inline functions (ten lines or less in length),
then the use of the object file is unrestricted, regardless of whether it is legally a
derivative work. (Executables containing this object code plus portions of the Library
will still fall under Section 6.) Otherwise, if the work is a derivative of the Library,
you may distribute the object code for the work under the terms of Section 6. Any
executables containing that work also fall under Section 6, whether or not they are
linked directly with the Library itself.
278
15 Third-party materials and licenses
6. As an exception to the Sections above, you may also combine or link a “work
that uses the Library” with the Library to produce a work containing portions of the
Library, and distribute that work under terms of your choice, provided that the terms
permit modification of the work for the customer’s own use and reverse engineering
for debugging such modifications.
You must give prominent notice with each copy of the work that the Library is used
in it and that the Library and its use are covered by this License. You must supply
a copy of this License. If the work during execution displays copyright notices, you
must include the copyright notice for the Library among them, as well as a reference
directing the user to the copy of this License. Also, you must do one of these things:
a) Accompany the work with the complete corresponding machine-readable source
code for the Library including whatever changes were used in the work (which must
be distributed under Sections 1 and 2 above); and, if the work is an executable linked
with the Library, with the complete machine-readable “work that uses the Library”,
as object code and/or source code, so that the user can modify the Library and then
relink to produce a modified executable containing the modified Library. (It is under-
stood that the user who changes the contents of definitions files in the Library will not
necessarily be able to recompile the application to use the modified definitions.)
b) Use a suitable shared library mechanism for linking with the Library. A suitable
mechanism is one that (1) uses at run time a copy of the library already present on
the user’s computer system, rather than copying library functions into the executable,
and (2) will operate properly with a modified version of the library, if the user installs
one, as long as the modified version is interface-compatible with the version that the
work was made with.
c) Accompany the work with a written offer, valid for at least three years, to give
the same user the materials specified in Subsection 6a, above, for a charge no more
than the cost of performing this distribution.
d) If distribution of the work is made by offering access to copy from a designated
place, offer equivalent access to copy the above specified materials from the same
place.
e) Verify that the user has already received a copy of these materials or that you
have already sent this user a copy.
For an executable, the required form of the “work that uses the Library” must include
any data and utility programs needed for reproducing the executable from it. However,
as a special exception, the materials to be distributed need not include anything that
is normally distributed (in either source or binary form) with the major components
(compiler, kernel, and so on) of the operating system on which the executable runs,
unless that component itself accompanies the executable.
It may happen that this requirement contradicts the license restrictions of other pro-
prietary libraries that do not normally accompany the operating system. Such a con-
tradiction means you cannot use both them and the Library together in an executable
that you distribute.
7. You may place library facilities that are a work based on the Library side-by-side
in a single library together with other library facilities not covered by this License,
and distribute such a combined library, provided that the separate distribution of the
279
15 Third-party materials and licenses
work based on the Library and of the other library facilities is otherwise permitted,
and provided that you do these two things:
a) Accompany the combined library with a copy of the same work based on the
Library, uncombined with any other library facilities. This must be distributed under
the terms of the Sections above.
b) Give prominent notice with the combined library of the fact that part of it is a
work based on the Library, and explaining where to find the accompanying uncom-
bined form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the Library except
as expressly provided under this License. Any attempt otherwise to copy, modify, sub-
license, link with, or distribute the Library is void, and will automatically terminate
your rights under this License. However, parties who have received copies, or rights,
from you under this License will not have their licenses terminated so long as such
parties remain in full compliance.
9. You are not required to accept this License, since you have not signed it. However,
nothing else grants you permission to modify or distribute the Library or its derivative
works. These actions are prohibited by law if you do not accept this License. There-
fore, by modifying or distributing the Library (or any work based on the Library), you
indicate your acceptance of this License to do so, and all its terms and conditions for
copying, distributing or modifying the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the Library), the
recipient automatically receives a license from the original licensor to copy, distribute,
link with or modify the Library subject to these terms and conditions. You may not
impose any further restrictions on the recipients’ exercise of the rights granted herein.
You are not responsible for enforcing compliance by third parties with this License.
11. If, as a consequence of a court judgment or allegation of patent infringement
or for any other reason (not limited to patent issues), conditions are imposed on you
(whether by court order, agreement or otherwise) that contradict the conditions of
this License, they do not excuse you from the conditions of this License. If you cannot
distribute so as to satisfy simultaneously your obligations under this License and any
other pertinent obligations, then as a consequence you may not distribute the Library
at all. For example, if a patent license would not permit royalty-free redistribution of
the Library by all those who receive copies directly or indirectly through you, then the
only way you could satisfy both it and this License would be to refrain entirely from
distribution of the Library.
If any portion of this section is held invalid or unenforceable under any particular
circumstance, the balance of the section is intended to apply, and the section as a
whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other
property right claims or to contest validity of any such claims; this section has the
sole purpose of protecting the integrity of the free software distribution system which
is implemented by public license practices. Many people have made generous contri-
butions to the wide range of software distributed through that system in reliance on
consistent application of that system; it is up to the author/donor to decide if he or
280
15 Third-party materials and licenses
she is willing to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to be a conse-
quence of the rest of this License.
12. If the distribution and/or use of the Library is restricted in certain countries
either by patents or by copyrighted interfaces, the original copyright holder who places
the Library under this License may add an explicit geographical distribution limitation
excluding those countries, so that distribution is permitted only in or among countries
not thus excluded. In such case, this License incorporates the limitation as if written
in the body of this License.
13. The Free Software Foundation may publish revised and/or new versions of the
Lesser General Public License from time to time. Such new versions will be similar
in spirit to the present version, but may differ in detail to address new problems or
concerns.
Each version is given a distinguishing version number. If the Library specifies a
version number of this License which applies to it and “any later version”, you have
the option of following the terms and conditions either of that version or of any later
version published by the Free Software Foundation. If the Library does not specify
a license version number, you may choose any version ever published by the Free
Software Foundation.
14. If you wish to incorporate parts of the Library into other free programs whose
distribution conditions are incompatible with these, write to the author to ask for
permission. For software which is copyrighted by the Free Software Foundation, write
to the Free Software Foundation; we sometimes make exceptions for this. Our decision
will be guided by the two goals of preserving the free status of all derivatives of our
free software and of promoting the sharing and reuse of software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WAR-
RANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EX-
CEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
OTHER PARTIES PROVIDE THE LIBRARY “AS IS” WITHOUT WARRANTY OF ANY
KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME
THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MOD-
IFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO
YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CON-
SEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING REN-
DERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
281
15 Third-party materials and licenses
282
15 Third-party materials and licenses
or source code differential comparisons against either the Original Code or another
well known, available Covered Code of the Contributor’s choice. The Source Code
can be in a compressed or archival form, provided the appropriate decompression or
de-archiving software is widely available for no charge.
1.12. “You” (or “Your”) means an individual or a legal entity exercising rights under,
and complying with all of the terms of, this License or a future version of this License
issued under Section 6.1. For legal entities, “You” includes any entity which controls,
is controlled by, or is under common control with You. For purposes of this definition,
“control” means (a) the power, direct or indirect, to cause the direction or management
of such entity, whether by contract or otherwise, or (b) ownership of more than fifty
percent (50%) of the outstanding shares or beneficial ownership of such entity.
2. Source Code License.
2.1. The Initial Developer Grant. The Initial Developer hereby grants You a world-
wide, royalty-free, non-exclusive license, subject to third party intellectual property
claims:
(a) under intellectual property rights (other than patent or trademark) Licensable by
Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute
the Original Code (or portions thereof) with or without Modifications, and/or as part
of a Larger Work; and
(b) under Patents Claims infringed by the making, using or selling of Original Code,
to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of
the Original Code (or portions thereof).
(c) the licenses granted in this Section 2.1(a) and (b) are effective on the date Initial
Developer first distributes Original Code under the terms of this License.
(d) Notwithstanding Section 2.1(b) above, no patent license is granted: 1) for code
that You delete from the Original Code; 2) separate from the Original Code; or 3) for
infringements caused by: i) the modification of the Original Code or ii) the combina-
tion of the Original Code with other software or devices.
2.2. Contributor Grant. Subject to third party intellectual property claims, each
Contributor hereby grants You a world-wide, royalty-free, non-exclusive license
(a) under intellectual property rights (other than patent or trademark) Licensable
by Contributor, to use, reproduce, modify, display, perform, sublicense and distribute
the Modifications created by such Contributor (or portions thereof) either on an un-
modified basis, with other Modifications, as Covered Code and/or as part of a Larger
Work; and
(b) under Patent Claims infringed by the making, using, or selling of Modifications
made by that Contributor either alone and/or in combination with its Contributor
Version (or portions of such combination), to make, use, sell, offer for sale, have
made, and/or otherwise dispose of: 1) Modifications made by that Contributor (or
portions thereof); and 2) the combination of Modifications made by that Contributor
with its Contributor Version (or portions of such combination).
(c) the licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Con-
tributor first makes Commercial Use of the Covered Code.
(d) Notwithstanding Section 2.2(b) above, no patent license is granted: 1) for any
code that Contributor has deleted from the Contributor Version; 2) separate from the
283
15 Third-party materials and licenses
284
15 Third-party materials and licenses
necessary to implement that API, Contributor must also include this information in the
LEGAL file.
3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the
Source Code. If it is not possible to put such notice in a particular Source Code file due
to its structure, then You must include such notice in a location (such as a relevant
directory) where a user would be likely to look for such a notice. If You created
one or more Modification(s) You may add your name as a Contributor to the notice
described in Exhibit A. You must also duplicate this License in any documentation for
the Source Code where You describe recipients’ rights or ownership rights relating to
Covered Code. You may choose to offer, and to charge a fee for, warranty, support,
indemnity or liability obligations to one or more recipients of Covered Code. However,
You may do so only on Your own behalf, and not on behalf of the Initial Developer or
any Contributor. You must make it absolutely clear than any such warranty, support,
indemnity or liability obligation is offered by You alone, and You hereby agree to
indemnify the Initial Developer and every Contributor for any liability incurred by the
Initial Developer or such Contributor as a result of warranty, support, indemnity or
liability terms You offer.
3.6. Distribution of Executable Versions. You may distribute Covered Code in Exe-
cutable form only if the requirements of Section 3.1-3.5 have been met for that Cov-
ered Code, and if You include a notice stating that the Source Code version of the
Covered Code is available under the terms of this License, including a description of
how and where You have fulfilled the obligations of Section 3.2. The notice must be
conspicuously included in any notice in an Executable version, related documentation
or collateral in which You describe recipients’ rights relating to the Covered Code. You
may distribute the Executable version of Covered Code or ownership rights under a
license of Your choice, which may contain terms different from this License, provided
that You are in compliance with the terms of this License and that the license for the
Executable version does not attempt to limit or alter the recipient’s rights in the Source
Code version from the rights set forth in this License. If You distribute the Executable
version under a different license You must make it absolutely clear that any terms
which differ from this License are offered by You alone, not by the Initial Developer
or any Contributor. You hereby agree to indemnify the Initial Developer and every
Contributor for any liability incurred by the Initial Developer or such Contributor as a
result of any such terms You offer.
3.7. Larger Works. You may create a Larger Work by combining Covered Code with
other code not governed by the terms of this License and distribute the Larger Work as
a single product. In such a case, You must make sure the requirements of this License
are fulfilled for the Covered Code.
4. Inability to Comply Due to Statute or Regulation.If it is impossible for You to
comply with any of the terms of this License with respect to some or all of the Covered
Code due to statute, judicial order, or regulation then You must: (a) comply with the
terms of this License to the maximum extent possible; and (b) describe the limitations
and the code they affect. Such description must be included in the LEGAL file described
in Section 3.4 and must be included with all distributions of the Source Code. Except
285
15 Third-party materials and licenses
286
15 Third-party materials and licenses
(a) such Participant’s Contributor Version directly or indirectly infringes any patent,
then any and all rights granted by such Participant to You under Sections 2.1 and/or
2.2 of this License shall, upon 60 days notice from Participant terminate prospectively,
unless if within 60 days after receipt of notice You either: (i) agree in writing to pay
Participant a mutually agreeable reasonable royalty for Your past and future use of
Modifications made by such Participant, or (ii) withdraw Your litigation claim with re-
spect to the Contributor Version against such Participant. If within 60 days of notice, a
reasonable royalty and payment arrangement are not mutually agreed upon in writing
by the parties or the litigation claim is not withdrawn, the rights granted by Participant
to You under Sections 2.1 and/or 2.2 automatically terminate at the expiration of the
60 day notice period specified above.
(b) any software, hardware, or device, other than such Participant’s Contributor
Version, directly or indirectly infringes any patent, then any rights granted to You
by such Participant under Sections 2.1(b) and 2.2(b) are revoked effective as of the
date You first made, used, sold, distributed, or had made, Modifications made by that
Participant.
8.3. If You assert a patent infringement claim against Participant alleging that such
Participant’s Contributor Version directly or indirectly infringes any patent where such
claim is resolved (such as by license or settlement) prior to the initiation of patent in-
fringement litigation, then the reasonable value of the licenses granted by such Partic-
ipant under Sections 2.1 or 2.2 shall be taken into account in determining the amount
or value of any payment or license.
8.4. In the event of termination under Sections 8.1 or 8.2 above, all end user license
agreements (excluding distributors and resellers) which have been validly granted by
You or any distributor hereunder prior to termination shall survive termination.
9. LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LE-
GAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTH-
ERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR
ANY DISTRIBUTOR OF COVERED CODE, OR ANY SUPPLIER OF ANY OF SUCH PAR-
TIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR
CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITA-
TION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAIL-
URE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR
LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY
OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIA-
BILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTY’S NEG-
LIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME
JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL
OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT
APPLY TO YOU.
10. U.S. GOVERNMENT END USERS. The Covered Code is a “commercial item,“ as
that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of “commercial com-
puter software” and “commercial computer software documentation,“ as such terms
are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48
287
15 Third-party materials and licenses
C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users
acquire Covered Code with only those rights set forth herein.
11. MISCELLANEOUS. This License represents the complete agreement concerning
subject matter hereof. If any provision of this License is held to be unenforceable, such
provision shall be reformed only to the extent necessary to make it enforceable. This
License shall be governed by California law provisions (except to the extent applicable
law, if any, provides otherwise), excluding its conflict-of-law provisions. With respect
to disputes in which at least one party is a citizen of, or an entity chartered or reg-
istered to do business in the United States of America, any litigation relating to this
License shall be subject to the jurisdiction of the Federal Courts of the Northern Dis-
trict of California, with venue lying in Santa Clara County, California, with the losing
party responsible for costs, including without limitation, court costs and reasonable
attorneys’ fees and expenses. The application of the United Nations Convention on
Contracts for the International Sale of Goods is expressly excluded. Any law or reg-
ulation which provides that the language of a contract shall be construed against the
drafter shall not apply to this License.
12. RESPONSIBILITY FOR CLAIMS. As between Initial Developer and the Contribu-
tors, each party is responsible for claims and damages arising, directly or indirectly, out
of its utilization of rights under this License and You agree to work with Initial Devel-
oper and Contributors to distribute such responsibility on an equitable basis. Nothing
herein is intended or shall be deemed to constitute any admission of liability.
13. MULTIPLE-LICENSED CODE. Initial Developer may designate portions of the
Covered Code as “Multiple-Licensed”. “Multiple-Licensed” means that the Initial De-
veloper permits you to utilize portions of the Covered Code under Your choice of the
NPL or the alternative licenses, if any, specified by the Initial Developer in the file
described in Exhibit A.
EXHIBIT A -Mozilla Public License.
“The contents of this file are subject to the Mozilla Public License Version 1.1 (the
“License”); you may not use this file except in compliance with the License. You may
obtain a copy of the License at http://www.mozilla.org/MPL/
Software distributed under the License is distributed on an “AS IS” basis, WITHOUT
WARRANTY OF ANY KIND, either express or implied. See the License for the specific
language governing rights and limitations under the License.
The Original Code is ______________________________________.
The Initial Developer of the Original Code is ________________________. Portions
created by ______________________ are Copyright (C) ______ _______________________.
All Rights Reserved.
Contributor(s): ______________________________________.
Alternatively, the contents of this file may be used under the terms of the _____
license (the “[___] License”), in which case the provisions of [______] License are
applicable instead of those above. If you wish to allow use of your version of this file
only under the terms of the [____] License and not to allow others to use your version
of this file under the MPL, indicate your decision by deleting the provisions above and
replace them with the notice and other provisions required by the [___] License. If
288
15 Third-party materials and licenses
you do not delete the provisions above, a recipient may use your version of this file
under either the MPL or the [___] License.“
[NOTE: The text of this Exhibit A may differ slightly from the text of the notices in
the Source Code files of the Original Code. You should use the text of this Exhibit A
rather than the text found in the Original Code Source Code for Your Modifications.]
289
15 Third-party materials and licenses
Permission is granted to anyone to use this software for any purpose, including com-
mercial applications, and to alter it and redistribute it freely, subject to the following
restrictions:
1. The origin of this software must not be misrepresented; you must not claim that
you wrote the original software. If you use this software in a product, an acknowledg-
ment in the product documentation would be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrep-
resented as being the original software.
3. This notice may not be removed or altered from any source distribution.
Jean-loup Gailly Mark Adler
[email protected] [email protected]
290
15 Third-party materials and licenses
291
15 Third-party materials and licenses
3. The name of the author may not be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR “AS IS” AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, IN-
DIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (IN-
CLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOW-
EVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
292
15 Third-party materials and licenses
THIS SOFTWARE IS PROVIDED BY THE AUTHOR “AS IS” AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WAR-
RANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, IN-
DIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (IN-
CLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SER-
VICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOW-
EVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
POSSIBILITY OF SUCH DAMAGE.
293
15 Third-party materials and licenses
The above copyright notice and this permission notice shall be included in all copies
or substantial portions of the Software.
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EX-
PRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MER-
CHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE DANIEL VEILLARD BE LIABLE FOR ANY CLAIM, DAMAGES
OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHER-
WISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of Daniel Veillard shall not be used in
advertising or otherwise to promote the sale, use or other dealings in this Software
without prior written authorization from him.
Licence for libexslt:
Copyright (C) 2001-2002 Thomas Broyer, Charlie Bozeman and Daniel Veillard. All
Rights Reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of this
software and associated documentation files (the “Software”), to deal in the Software
without restriction, including without limitation the rights to use, copy, modify, merge,
publish, distribute, sublicense, and/or sell copies of the Software, and to permit per-
sons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies
or substantial portions of the Software.
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EX-
PRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MER-
CHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR
OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHER-
WISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR
THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of the authors shall not be used in
advertising or otherwise to promote the sale, use or other dealings in this Software
without prior written authorization from him.
294
15 Third-party materials and licenses
1.3. “Covered Code” means the Original Code, or Modifications or the combination
of the Original Code, and Modifications, in each case including portions thereof.
1.4. “Electronic Distribution Mechanism” means a mechanism generally accepted in
the software development community for the electronic transfer of data.
1.5. “Executable” means Covered Code in any form other than Source Code.
1.6. “Initial Developer” means the individual or entity identified as the Initial Devel-
oper in the Source Code notice required by Exhibit A.
1.7. “Larger Work” means a work which combines Covered Code or portions thereof
with code not governed by the terms of this License.
1.8. “License” means this document.
1.8.1. “Licensable” means having the right to grant, to the maximum extent possible,
whether at the time of the initial grant or subsequently acquired, any and all of the
rights conveyed herein.
1.9. “Modifications” means any addition to or deletion from the substance or struc-
ture of either the Original Code or any previous Modifications. When Covered Code is
released as a series of files, a Modification is:
A. Any addition to or deletion from the contents of a file containing Original Code
or previous Modifications.
B. Any new file that contains any part of the Original Code, or previous Modifica-
tions.
1.10. “Original Code” means Source Code of computer software code which is de-
scribed in the Source Code notice required by Exhibit A as Original Code, and which,
at the time of its release under this License is not already Covered Code governed by
this License.
1.10.1. “Patent Claims” means any patent claim(s), now owned or hereafter ac-
quired, including without limitation, method, process, and apparatus claims, in any
patent Licensable by grantor.
1.11. “Source Code” means the preferred form of the Covered Code for making
modifications to it, including all modules it contains, plus any associated interface
definition files, scripts used to control compilation and installation of an Executable,
or source code differential comparisons against either the Original Code or another
well known, available Covered Code of the Contributor’s choice. The Source Code
can be in a compressed or archival form, provided the appropriate decompression or
de-archiving software is widely available for no charge.
1.12. “You” (or “Your”) means an individual or a legal entity exercising rights under,
and complying with all of the terms of, this License or a future version of this License
issued under Section 6.1. For legal entities, “You” includes any entity which controls,
is controlled by, or is under common control with You. For purposes of this definition,
“control” means (a) the power, direct or indirect, to cause the direction or management
of such entity, whether by contract or otherwise, or (b) ownership of more than fifty
percent (50%) of the outstanding shares or beneficial ownership of such entity.
2 SOURCE CODE LICENSE.
2.1. The Initial Developer Grant.
The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive
license, subject to third party intellectual property claims:
295
15 Third-party materials and licenses
(a) under intellectual property rights (other than patent or trademark) Licensable by
Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute
the Original Code (or portions thereof) with or without Modifications, and/or as part
of a Larger Work; and
(b) under patents now or hereafter owned or controlled by Initial Developer, to
make, have made, use and sell (“offer to sell and import”) the Original Code, Modifi-
cations, or portions thereof, but solely to the extent that any such patent is reasonably
necessary to enable You to utilize, alone or in combination with other software, the
Original Code, Modifications, or any combination or portions thereof.
(c)
(d)
2.2. Contributor Grant.
Subject to third party intellectual property claims, each Contributor hereby grants
You a world-wide, royalty-free, non-exclusive license
(a) under intellectual property rights (other than patent or trademark) Licensable
by Contributor, to use, reproduce, modify, display, perform, sublicense and distribute
the Modifications created by such Contributor (or portions thereof) either on an un-
modified basis, with other Modifications, as Covered Code and/or as part of a Larger
Work; and
(b) under patents now or hereafter owned or controlled by Contributor, to make,
have made, use and sell (“offer to sell and import”) the Contributor Version (or por-
tions thereof), but solely to the extent that any such patent is reasonably necessary
to enable You to utilize, alone or in combination with other software, the Contributor
Version (or portions thereof).
(c)
(d)
3 DISTRIBUTION OBLIGATIONS.
3.1. Application of License.
The Modifications which You create or to which You contribute are governed by
the terms of this License, including without limitation Section 2.2. The Source Code
version of Covered Code may be distributed only under the terms of this License or a
future version of this License released under Section 6.1, and You must include a copy
of this License with every copy of the Source Code You distribute. You may not offer
or impose any terms on any Source Code version that alters or restricts the applicable
version of this License or the recipients’ rights hereunder. However, You may include
an additional document offering the additional rights described in Section 3.5.
3.2. Availability of Source Code.
Any Modification created by You will be provided to the Initial Developer in Source
Code form and are subject to the terms of the License. 3.3. Description of Modifica-
tions.
You must cause all Covered Code to which You contribute to contain a file document-
ing the changes You made to create that Covered Code and the date of any change. You
must include a prominent statement that the Modification is derived, directly or indi-
rectly, from Original Code provided by the Initial Developer and including the name
of the Initial Developer in (a) the Source Code, and (b) in any notice in an Executable
296
15 Third-party materials and licenses
version or related documentation in which You describe the origin or ownership of the
Covered Code.
3.4. Intellectual Property Matters.
(a) Third Party Claims. If Contributor has knowledge that a license under a third
party’s intellectual property rights is required to exercise the rights granted by such
Contributor under Sections 2.1 or 2.2, Contributor must include a text file with the
Source Code distribution titled “LEGAL” which describes the claim and the party mak-
ing the claim in sufficient detail that a recipient will know whom to contact. If Contrib-
utor obtains such knowledge after the Modification is made available as described in
Section 3.2, Contributor shall promptly modify the LEGAL file in all copies Contribu-
tor makes available thereafter and shall take other steps (such as notifying appropriate
mailing lists or newsgroups) reasonably calculated to inform those who received the
Covered Code that new knowledge has been obtained.
(b) Contributor APIs. If Contributor’s Modifications include an application program-
ming interface and Contributor has knowledge of patent licenses which are reasonably
necessary to implement that API, Contributor must also include this information in the
LEGAL file.
(c) Representations. Contributor represents that, except as disclosed pursuant to
Section 3.4(a) above, Contributor believes that Contributor’s Modifications are Con-
tributor’s original creation(s) and/or Contributor has sufficient rights to grant the
rights conveyed by this License.
3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the
Source Code. If it is not possible to put such notice in a particular Source Code file
due to its structure, then You must include such notice in a location (such as a relevant
directory) where a user would be likely to look for such a notice. If You created one or
more Modification(s) You may add your name as a Contributor to the notice described
in Exhibit A. You must also duplicate this License in any documentation for the Source
Code where You describe recipients’ rights or ownership rights relating to Covered
Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity
or liability obligations to one or more recipients of Covered Code. However, You may
do so only on Your own behalf, and not on behalf of the Initial Developer or any
Contributor.
3.6. Distribution of Executable Versions. You may distribute Covered Code in Exe-
cutable form only if the requirements of Section 3.1-3.5 have been met for that Cov-
ered Code. You may distribute the Executable version of Covered Code or ownership
rights under a license of Your choice, which may contain terms different from this
License, provided that You are in compliance with the terms of this License and that
the license for the Executable version does not attempt to limit or alter the recipient’s
rights in the Source Code version from the rights set forth in this License. If You dis-
tribute the Executable version under a different license You must make it absolutely
clear that any terms which differ from this License are offered by You alone, not by the
Initial Developer or any Contributor. If you distribute executable versions containing
Covered Code as part of a product, you must reproduce the notice in Exhibit B in the
documentation and/or other materials provided with the product.
297
15 Third-party materials and licenses
3.7. Larger Works. You may create a Larger Work by combining Covered Code with
other code not governed by the terms of this License and distribute the Larger Work as
a single product. In such a case, You must make sure the requirements of this License
are fulfilled for the Covered Code.
3.8. Restrictions. You may not remove any product identification, copyright, propri-
etary notices or labels from gSOAP.
4 INABILITY TO COMPLY DUE TO STATUTE OR REGULATION.
If it is impossible for You to comply with any of the terms of this License with respect
to some or all of the Covered Code due to statute, judicial order, or regulation then
You must: (a) comply with the terms of this License to the maximum extent possible;
and (b) describe the limitations and the code they affect. Such description must be
included in the LEGAL file described in Section 3.4 and must be included with all dis-
tributions of the Source Code. Except to the extent prohibited by statute or regulation,
such description must be sufficiently detailed for a recipient of ordinary skill to be able
to understand it.
5 APPLICATION OF THIS LICENSE.
This License applies to code to which the Initial Developer has attached the notice
in Exhibit A and to related Covered Code.
6 VERSIONS OF THE LICENSE.
6.1. New Versions.
Grantor may publish revised and/or new versions of the License from time to time.
Each version will be given a distinguishing version number.
6.2. Effect of New Versions.
Once Covered Code has been published under a particular version of the License,
You may always continue to use it under the terms of that version. You may also
choose to use such Covered Code under the terms of any subsequent version of the
License.
6.3. Derivative Works.
If You create or use a modified version of this License (which you may only do in
order to apply it to code which is not already Covered Code governed by this License),
You must (a) rename Your license so that the phrase “gSOAP” or any confusingly
similar phrase do not appear in your license (except to note that your license differs
from this License) and (b) otherwise make it clear that Your version of the license
contains terms which differ from the gSOAP Public License. (Filling in the name of
the Initial Developer, Original Code or Contributor in the notice described in Exhibit A
shall not of themselves be deemed to be modifications of this License.)
7 DISCLAIMER OF WARRANTY.
COVERED CODE IS PROVIDED UNDER THIS LICENSE ON AN “AS IS” BASIS, WITH-
OUT WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED OR STATUTORY, IN-
CLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABIL-
ITY, OF FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT OF THIRD
PARTY INTELLECTUAL PROPERTY RIGHTS, AND ANY WARRANTY THAT MAY ARISE
BY REASON OF TRADE USAGE, CUSTOM, OR COURSE OF DEALING. WITHOUT
LIMITING THE FOREGOING, YOU ACKNOWLEDGE THAT THE SOFTWARE IS PRO-
VIDED “AS IS” AND THAT THE AUTHORS DO NOT WARRANT THE SOFTWARE WILL
298
15 Third-party materials and licenses
299
15 Third-party materials and licenses
8.4. In the event of termination under Sections 8.1 or 8.2 above, all end user license
agreements (excluding distributors and resellers) which have been validly granted by
You or any distributor hereunder prior to termination shall survive termination.
9 LIMITATION OF LIABILITY.
UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT
(INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INI-
TIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COV-
ERED CODE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY
PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAM-
AGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR
LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION,
OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH
PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES.
THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR
PERSONAL INJURY RESULTING FROM SUCH PARTY’S NEGLIGENCE TO THE EX-
TENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO
NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUEN-
TIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.
10 U.S. GOVERNMENT END USERS.
11 MISCELLANEOUS.
12 RESPONSIBILITY FOR CLAIMS.
As between Initial Developer and the Contributors, each party is responsible for
claims and damages arising, directly or indirectly, out of its utilization of rights under
this License and You agree to work with Initial Developer and Contributors to dis-
tribute such responsibility on an equitable basis. Nothing herein is intended or shall
be deemed to constitute any admission of liability.
EXHIBIT A.
“The contents of this file are subject to the gSOAP Public License Version 1.3 (the
“License”); you may not use this file except in compliance with the License. You may
obtain a copy of the License at http://www.cs.fsu.edu/~engelen/soaplicense.
html. Software distributed under the License is distributed on an “AS IS” basis, WITH-
OUT WARRANTY OF ANY KIND, either express or implied. See the License for the
specific language governing rights and limitations under the License.
The Original Code of the gSOAP Software is: stdsoap.h, stdsoap2.h, stdsoap.c,
stdsoap2.c, stdsoap.cpp, stdsoap2.cpp, soapcpp2.h, soapcpp2.c, soapcpp2_lex.l,
soapcpp2_yacc.y, error2.h, error2.c, symbol2.c, init2.c, soapdoc2.html, and soap-
doc2.pdf, httpget.h, httpget.c, stl.h, stldeque.h, stllist.h, stlvector.h, stlset.h.
The Initial Developer of the Original Code is Robert A. van Engelen. Portions created
by Robert A. van Engelen are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia
inc. All Rights Reserved.
Contributor(s): “________________________.“ [Note: The text of this Exhibit A may
differ slightly form the text of the notices in the Source Code files of the Original code.
You should use the text of this Exhibit A rather than the text found in the Original
Code Source Code for Your Modifications.]
EXHIBIT B.
300
15 Third-party materials and licenses
“Part of the software embedded in this product is gSOAP software. Portions cre-
ated by gSOAP are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All
Rights Reserved. THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY
GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CON-
SEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSI-
NESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.“
301
15 Third-party materials and licenses
302
15 Third-party materials and licenses
not necessarily state or reflect those of the United States Government or the University
of California, and shall not be used for advertising or product endorsement purposes.
303
15 Third-party materials and licenses
• Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.
• Redistributions in binary form must reproduce the above copyright notice, this
list of conditions and the following disclaimer in the documentation and/or other
materials provided with the distribution.
304
15 Third-party materials and licenses
• Neither the name of the Intel Corporation nor the names of its contributors may
be used to endorse or promote products derived from this software without spe-
cific prior written permission.
305
15 Third-party materials and licenses
306
16 VirtualBox privacy policy
Policy version 4, Apr 22, 2010
This privacy policy sets out how Oracle Corporation (“Oracle”) treats personal in-
formation related to the virtualbox.org website and the VirtualBox application.
§ 1 virtualbox.org. The “virtualbox.org” website logs anonymous usage information
such as your IP address, geographical location, browser type, referral source, length
of visit and number of page views while you visit (collectively, “anonymous data”).
In addition, but only if you choose to register, the website’s bug tracking and forum
services store the data you choose to reveal upon registration, such as your user name
and contact information.
§ 2 Cookies. The virtualbox.org website, the bug tracker and the forum services use
cookies to identify and track the visiting web browser and, if you have registered, to
facilitate login. Most browsers allow you to refuse to accept cookies. While you can
still visit the website with cookies disabled, logging into the bug tracker and forum
services will most likely not work without them.
§ 3 VirtualBox registration process. The VirtualBox application may ask that
the user optinoally register with Oracle. in der If you choose to register, your
name, e-mail address, country and company will be submitted to Oracle and
stored together with the IP address of the submitter as well as product version
and platform being used. The standard Oracle Privacy Policies as posted on
http://www.oracle.com/html/privacy.html apply to this data.
§ 4 Update notifications. The VirtualBox application may contact Oracle to find out
whether a new version of VirtualBox has been released and notify the user if that is the
case. In the process, anonymous data such as your IP address and a non-identifying
counter, together with the product version and the platform being used, is sent so
that the server can find out whether an update is available. By default, this check is
performed once a day. You change this interval or disable these checks altogether in
the VirtualBox preferences.
§ 5 Usage of personal information. Oracle may use anonymous and personal data
collected by the means above for statistical purposes as well as to automatically inform
you about new notices related to your posts on the bug tracker and forum services, to
administer the website and to contact you due to technical issues. Oracle may also
inform you about new product releases related to VirtualBox.
In no event will personal data without your express consent be provided to any
third parties, unless Oracle may be required to do so by law or in connection with
legal proceedings.
§ 6 Updates. Oracle may update this privacy policy by posting a new version on
the virtualbox.org website. You should check this page occasionally to ensure you are
happy with any changes.
307
Glossary
A
ACPI Advanced Configuration and Power Interface, an industry specification for BIOS
and hardware extensions to configure PC hardware and perform power manage-
ment. Windows 2000 and higher as well as Linux 2.4 and higher support ACPI.
Windows can only enable or disable ACPI support at installation time.
AHCI Advanced Host Controller Interface, the interface that supports SATA devices
such as hard disks. See chapter 5.1, Hard disk controllers: IDE, SATA (AHCI),
SCSI, SAS, page 87.
AMD-V The hardware virtualization features built into modern AMD processors. See
chapter 10.2, Hardware vs. software virtualization, page 185.
B
BIOS Basic Input/Output System, the firmware built into most personal computers
which is responsible of initializing the hardware after the computer has been
turned on and then booting an operating system. VirtualBox ships with its own
virtual BIOS that runs when a virtual machine is started.
308
Glossary
C
COM Microsoft Component Object Model, a programming infrastructure for modular
software. COM allows applications to provide application programming inter-
faces which can be accessed from various other programming languages and
applications. VirtualBox makes use of COM both internally and externally to
provide a comprehensive API to 3rd party developers.
D
DHCP Dynamic Host Configuration Protocol. This allows a networking device in a
network to acquire its IP address (and other networking details) automatically,
in order to avoid having to configure all devices in a network with fixed IP ad-
dresses. VirtualBox has a built-in DHCP server that delivers an IP addresses to
a virtual machine when networking is configured to NAT; see chapter 6, Virtual
networking, page 103.
DKMS Dynamic Kernel Module Support. A framework that simplifies installing and
updating external kernel modules on Linux machines; see chapter 2.3.2, The
VirtualBox kernel module, page 37.
E
EFI Extensible Firmware Interface, a firmware built into computers which is designed
to replace the aging BIOS. Originally designed by Intel, most modern operating
systems can now boot on computers which have EFI instead of a BIOS built into
them; see chapter 3.12, Alternative firmware (EFI), page 62.
EHCI Enhanced Host Controller Interface, the interface that implements the USB 2.0
standard.
G
GUI Graphical User Interface. Commonly used as an antonym to a “command line
interface”, in the context of VirtualBox, we sometimes refer to the main graph-
ical VirtualBox program as the “GUI”, to differentiate it from the VBoxManage
interface.
GUID See UUID.
309
Glossary
I
IDE Integrated Drive Electronics, an industry standard for hard disk interfaces. See
chapter 5.1, Hard disk controllers: IDE, SATA (AHCI), SCSI, SAS, page 87.
I/O APIC See APIC.
iSCSI Internet SCSI; see chapter 5.10, iSCSI servers, page 101.
M
MAC Media Access Control, a part of an Ethernet network card. A MAC address
is a 6-byte number which identifies a network card. It is typically written
in hexadecimal notation where the bytes are separated by colons, such as
00:17:3A:5E:CB:08.
N
NAT Network Address Translation. A technique to share networking interfaces by
which an interface modifies the source and/or target IP addresses of network
packets according to specific rules. Commonly employed by routers and fire-
walls to shield an internal network from the Internet, VirtualBox can use NAT
to easily share a host’s physical networking hardware with its virtual machines.
See chapter 6.3, Network Address Translation (NAT), page 105.
O
OVF Open Virtualization Format, a cross-platform industry standard to exchange vir-
tual appliances between virtualization products; see chapter 1.11, Importing and
exporting virtual machines, page 30.
P
PAE Physical Address Extension. This allows accessing more than 4 GB of RAM even
in 32-bit environments; see chapter 3.3.2, “Advanced” tab, page 51.
PIC See APIC.
PXE Preboot Execution Environment, an industry standard for booting PC systems
from remote network locations. It includes DHCP for IP configuration and TFTP
for file transfer. Using UNDI, a hardware independent driver stack for accessing
the network card from bootstrap code is available.
310
Glossary
R
RDP Remote Desktop Protocol, a protocol developed by Microsoft as an extension
to the ITU T.128 and T.124 video conferencing protocol. With RDP, a PC sys-
tem can be controlled from a remote location using a network connection over
which data is transferred in both directions. Typically graphics updates and au-
dio are sent from the remote machine and keyboard and mouse input events are
sent from the client. VirtualBox contains an enhanced implementation of the
relevant standards called “VirtualBox RDP” (VRDP), which is largely compatible
with Microsoft’s RDP implementation. See chapter 7.1, Remote display (VRDP
support), page 112 for details.
S
SAS Serial Attached SCSI, an industry standard for hard disk interfaces. See chapter
5.1, Hard disk controllers: IDE, SATA (AHCI), SCSI, SAS, page 87.
SATA Serial ATA, an industry standard for hard disk interfaces. See chapter 5.1, Hard
disk controllers: IDE, SATA (AHCI), SCSI, SAS, page 87.
SCSI Small Computer System Interface. An industry standard for data transfer be-
tween devices, especially for storage. See chapter 5.1, Hard disk controllers: IDE,
SATA (AHCI), SCSI, SAS, page 87.
SMP Symmetrical Multiprocessing, meaning that the resources of a computer are
shared between several processors. These can either be several processor chips
or, as is more common with modern hardware, multiple CPU cores in one pro-
cessor.
U
UUID A Universally Unique Identifier – often also called GUID (Globally Unique Iden-
tifier) – is a string of numbers and letters which can be computed dynamically
and is guaranteed to be unique. Generally, it is used as a global handle to iden-
tify entities. VirtualBox makes use of UUIDs to identify VMs, Virtual Disk Images
(VDI files) and other entities.
V
VM Virtual Machine – a virtual computer that VirtualBox allows you to run on top of
your actual hardware. See chapter 1.2, Some terminology, page 12 for details.
VRDP See RDP.
311
Glossary
VT-x The hardware virtualization features built into modern Intel processors. See
chapter 10.2, Hardware vs. software virtualization, page 185.
X
XML The eXtensible Markup Language, a metastandard for all kinds of textual infor-
mation. XML only specifies how data in the document is organized generally and
does not prescribe how to semantically organize content.
XPCOM Mozilla Cross Platform Component Object Model, a programming infrastruc-
ture developed by the Mozilla browser project which is similar to Microsoft COM
and allows applications to provide a modular programming interface. VirtualBox
makes use of XPCOM on Linux both internally and externally to provide a com-
prehensive API to third-party developers.
312