Oracle VM Virtualbox: User Manual
Oracle VM Virtualbox: User Manual
Oracle VM Virtualbox: User Manual
VirtualBox R
User Manual
Version 6.1.8
c 2004-2020 Oracle Corporation
http://www.virtualbox.org
Contents
Preface i
1 First Steps 1
1.1 Why is Virtualization Useful? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Some Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Features Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 Supported Host Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.4.1 Host CPU Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.5 Installing Oracle VM VirtualBox and Extension Packs . . . . . . . . . . . . . . . 6
1.6 Starting Oracle VM VirtualBox . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.7 Creating Your First Virtual Machine . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.8 Running Your Virtual Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.8.1 Starting a New VM for the First Time . . . . . . . . . . . . . . . . . . . 11
1.8.2 Capturing and Releasing Keyboard and Mouse . . . . . . . . . . . . . . 12
1.8.3 Typing Special Characters . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.8.4 Changing Removable Media . . . . . . . . . . . . . . . . . . . . . . . . 13
1.8.5 Resizing the Machine’s Window . . . . . . . . . . . . . . . . . . . . . . 14
1.8.6 Saving the State of the Machine . . . . . . . . . . . . . . . . . . . . . . 14
1.9 Using VM Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.10 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.10.1 Taking, Restoring, and Deleting Snapshots . . . . . . . . . . . . . . . . 16
1.10.2 Snapshot Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.11 Virtual Machine Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.12 Removing and Moving Virtual Machines . . . . . . . . . . . . . . . . . . . . . . 19
1.13 Cloning Virtual Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.14 Importing and Exporting Virtual Machines . . . . . . . . . . . . . . . . . . . . . 21
1.14.1 About the OVF Format . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.14.2 Importing an Appliance in OVF Format . . . . . . . . . . . . . . . . . . 22
1.14.3 Exporting an Appliance in OVF Format . . . . . . . . . . . . . . . . . . 23
1.14.4 Preparing for Oracle Cloud Infrastructure Integration . . . . . . . . . . 23
1.14.5 Exporting an Appliance to Oracle Cloud Infrastructure . . . . . . . . . . 24
1.14.6 Importing an Instance from Oracle Cloud Infrastructure . . . . . . . . . 26
1.14.7 The Cloud Profile Manager . . . . . . . . . . . . . . . . . . . . . . . . . 27
1.14.8 Creating New Cloud Instances from a Custom Image . . . . . . . . . . . 29
1.15 Global Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
1.16 Alternative Front-Ends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
1.17 Soft Keyboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
1.17.1 Using the Soft Keyboard . . . . . . . . . . . . . . . . . . . . . . . . . . 31
1.17.2 Creating a Custom Keyboard Layout . . . . . . . . . . . . . . . . . . . . 32
2 Installation Details 33
2.1 Installing on Windows Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.1.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.1.2 Performing the Installation . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.1.3 Uninstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.1.4 Unattended Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2
Content
3
Configuring Virtual Machines 45
3.1 Supported Guest Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . 45
3.1.1 Mac OS X Guests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.1.2 64-bit Guests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.2 Unattended Guest Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.2.1 An Example of Unattended Guest Installation . . . . . . . . . . . . . . . 48
3.3 Emulated Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
3.4 General Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.4.1 Basic Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.4.2 Advanced Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.4.3 Description Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.4.4 Disk Encryption Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.5 System Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.5.1 Motherboard Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.5.2 Processor Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
3.5.3 Acceleration Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
3.6 Display Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
3.6.1 Screen Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
3.6.2 Remote Display Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
3.6.3 Recording Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
3.7 Storage Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
3.8 Audio Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
3.9 Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
3.10 Serial Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
3.11 USB Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.11.1 USB Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
3.11.2 Implementation Notes for Windows and Linux Hosts . . . . . . . . . . . 62
3.12 Shared Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.13 User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
3.14 Alternative Firmware (EFI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
3.14.1 Video Modes in EFI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
3.14.2 Specifying Boot Arguments . . . . . . . . . . . . . . . . . . . . . . . . . 66
4 Guest Additions 67
4.1 Introduction to Guest Additions . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
3
Content
5 Virtual Storage 88
5.1 Hard Disk Controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
5.2 Disk Image Files (VDI, VMDK, VHD, HDD) . . . . . . . . . . . . . . . . . . . . . 91
5.3 The Virtual Media Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
5.4 Special Image Write Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
5.5 Differencing Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.6 Cloning Disk Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
5.7 Host Input/Output Caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
5.8 Limiting Bandwidth for Disk Images . . . . . . . . . . . . . . . . . . . . . . . . . 99
5.9 CD/DVD Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
5.10 iSCSI Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
5.11 vboximg-mount: A Utility for FUSE Mounting a Virtual Disk Image . . . . . . . . 101
5.11.1 Viewing Detailed Information About a Virtual Disk Image . . . . . . . . 101
5.11.2 Mounting a Virtual Disk Image . . . . . . . . . . . . . . . . . . . . . . . 102
6 Virtual Networking 104
6.1 Virtual Networking Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
6.2 Introduction to Networking Modes . . . . . . . . . . . . . . . . . . . . . . . . . 105
6.3 Network Address Translation (NAT) . . . . . . . . . . . . . . . . . . . . . . . . . 106
6.3.1 Configuring Port Forwarding with NAT . . . . . . . . . . . . . . . . . . 106
6.3.2 PXE Booting with NAT . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
6.3.3 NAT Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
6.4 Network Address Translation Service . . . . . . . . . . . . . . . . . . . . . . . . 108
6.5 Bridged Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
6.6 Internal Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
6.7 Host-Only Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
6.8 UDP Tunnel Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
6.9 VDE Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
6.10 Limiting Bandwidth for Network Input/Output . . . . . . . . . . . . . . . . . . . 114
6.11 Improving Network Performance . . . . . . . . . . . . . . . . . . . . . . . . . . 114
4
Content
5
Content
6
Content
7
Content
12 Troubleshooting 309
12.1 Procedures and Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
12.1.1 Categorizing and Isolating Problems . . . . . . . . . . . . . . . . . . . . 309
12.1.2 Collecting Debugging Information . . . . . . . . . . . . . . . . . . . . . 310
12.1.3 Using the VBoxBugReport Command to Collect Debug Informatio n
Automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
12.1.4 The Built-In VM Debugger . . . . . . . . . . . . . . . . . . . . . . . . . 311
12.1.5 VM Core Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
12.2 General Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
12.2.1 Guest Shows IDE/SATA Errors for File-Based Images on Slow Hos t
File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
12.2.2 Responding to Guest IDE/SATA Flush Requests . . . . . . . . . . . . . . 314
12.2.3 Performance Variation with Frequency Boosting . . . . . . . . . . . . . 315
12.2.4 Frequency Scaling Effect on CPU Usage . . . . . . . . . . . . . . . . . . 315
12.2.5 Inaccurate Windows CPU Usage Reporting . . . . . . . . . . . . . . . . 315
12.2.6 Poor Performance Caused by Host Power Management . . . . . . . . . 315
12.2.7 GUI: 2D Video Acceleration Option is Grayed Out . . . . . . . . . . . . 316
12.3 Windows Guests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
12.3.1 No USB 3.0 Support in Windows 7 Guests . . . . . . . . . . . . . . . . . 316
12.3.2 Windows Bluescreens After Changing VM Configuration . . . . . . . . . 316
12.3.3 Windows 0x101 Bluescreens with SMP Enabled (IPI Timeout) . . . . . 317
12.3.4 Windows 2000 Installation Failures . . . . . . . . . . . . . . . . . . . . 317
12.3.5 How to Record Bluescreen Information from Windows Guests . . . . . 317
12.3.6 No Networking in Windows Vista Guests . . . . . . . . . . . . . . . . . 317
12.3.7 Windows Guests may Cause a High CPU Load . . . . . . . . . . . . . . 318
12.3.8 Long Delays When Accessing Shared Folders . . . . . . . . . . . . . . . 318
12.3.9 USB Tablet Coordinates Wrong in Windows 98 Guests . . . . . . . . . . 318
8
Content
9
Content
Glossary 379
1
Preface
The Oracle VM VirtualBox User Manual provides an introduction to using Oracle VM VirtualBox. The manual
provides information on how to install Oracle VM VirtualBox and use it to create and configure virtual
machines.
Audience
This document is intended for both new and existing users of Oracle VM VirtualBox. It is assumed that readers
are familiar with Web technologies and have a general understanding of Windows and UNIX platforms.
Related
Documents
The documentation for this product is available at:
https://docs.oracle.com/en/virtualization/virtualbox/index.html
Convention
s
The following text conventions are used in this document:
• boldface: Boldface type indicates graphical user interface elements associated with an action, or
terms defined in text or the glossary.
• italic: Italic type indicates book titles, emphasis, or placeholder variables for which you supply
particular values.
• monospace: Monospace type indicates commands within a paragraph, URLs, code in ex- amples,
text that appears on the screen, or text that you enter.
Documentation
Accessibility
For information about Oracle’s commitment to accessibility, visit the Oracle Accessibility Program website at
http://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc.
Access to Oracle
Support
Oracle customers that have purchased support have access to electronic support through My
Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info
or visit
http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.
i
1 First Steps
Welcome to Oracle VM VirtualBox.
Oracle VM VirtualBox is a cross-platform virtualization application. What does that mean? For one thing, it
installs on your existing Intel or AMD-based computers, whether they are running Windows, Mac OS X,
Linux, or Oracle Solaris operating systems (OSes). Secondly, it extends the capabilities of your existing
computer so that it can run multiple OSes, inside multiple virtual machines, at the same time. As an
example, you can run Windows and Linux on your Mac, run Windows Server 2016 on your Linux server,
run Linux on your Windows PC, and so on, all alongside your existing applications. You can install and
run as many virtual machines as you like. The only practical limits are disk space and memory.
Oracle VM VirtualBox is deceptively simple yet also very powerful. It can run everywhere from small
embedded systems or desktop class machines all the way up to datacenter deployments and even Cloud
environments.
The following screenshot shows how Oracle VM VirtualBox, installed on an Apple Mac OS X
computer, is running Windows Server 2016 in a virtual machine window.
In this User Manual, we will begin simply with a quick introduction to virtualization and how to get your
first virtual machine running with the easy-to-use Oracle VM VirtualBox graphical user interface.
Subsequent chapters will go into much more detail covering more powerful tools and features, but
fortunately, it is not necessary to read the entire User Manual before you can use Oracle VM VirtualBox.
You can find a summary of Oracle VM VirtualBox’s capabilities in chapter 1.3, Features Overview,
page 3. For existing Oracle VM VirtualBox users who just want to find out what is new in this release,
see the chapter 15, Change Log, page 333.
1
1 First Steps
1.2 Some
Terminology
When dealing with virtualization, and also for understanding the following chapters of this doc- umentation, it
helps to acquaint oneself with a bit of crucial terminology, especially the following terms:
• Host operating system (host OS). This is the OS of the physical computer on which Oracle VM
VirtualBox was installed. There are versions of Oracle VM VirtualBox for Windows, Mac OS X,
Linux, and Oracle Solaris hosts. See chapter 1.4, Supported Host Operating Systems, page 5.
Most of the time, this manual discusses all Oracle VM VirtualBox versions together. There may be
platform-specific differences which we will point out where appropriate.
• Guest operating system (guest OS). This is the OS that is running inside the virtual machine. Theoretically,
Oracle VM VirtualBox can run any x86 OS such as DOS, Windows, OS/2, FreeBSD, and OpenBSD.
But to achieve near-native performance of the guest code on your machine, we had to go through a lot
of optimizations that are specific to certain OSes. So
2
1 First Steps
while your favorite OS may run as a guest, we officially support and optimize for a select few, which
include the most common OSes.
See chapter 3.1, Supported Guest Operating Systems, page 45.
• Virtual machine (VM). This is the special environment that Oracle VM VirtualBox creates for your
guest OS while it is running. In other words, you run your guest OS in a VM. Normally, a VM is
shown as a window on your computer’s desktop. Depending on which of the various frontends of
Oracle VM VirtualBox you use, the VM might be shown in full screen mode or remotely on another
computer.
Internally, Oracle VM VirtualBox treats a VM as a set of parameters that specify its behavior. Some
parameters describe hardware settings, such as the amount of memory and number of CPUs assigned.
Other parameters describe the state information, such as whether the VM is running or saved.
You can view these VM settings in the VirtualBox Manager window, the Settings dialog, and by
running the VBoxManage command. See chapter 8, VBoxManage, page 128.
• Guest Additions. This refers to special software packages which are shipped with Oracle VM VirtualBox
but designed to be installed inside a VM to improve performance of the guest OS and to add extra
features. See chapter 4, Guest Additions, page 67.
• Portability. Oracle VM VirtualBox runs on a large number of 64-bit host operating systems. See
chapter 1.4, Supported Host Operating Systems, page 5.
Oracle VM VirtualBox is a so-called hosted hypervisor, sometimes referred to as a type 2 hypervisor.
Whereas a bare-metal or type 1 hypervisor would run directly on the hardware, Oracle VM VirtualBox
requires an existing OS to be installed. It can thus run alongside existing applications on that host.
To a very large degree, Oracle VM VirtualBox is functionally identical on all of the host platforms,
and the same file and image formats are used. This enables you to run virtual machines created on
one host on another host with a different host OS. For example, you can create a virtual machine on
Windows and then run it under Linux.
In addition, virtual machines can easily be imported and exported using the Open Vir- tualization
Format (OVF), an industry standard created for this purpose. You can even import OVFs that were
created with a different virtualization software. See chapter 1.14, Importing and Exporting Virtual
Machines, page 21.
For users of Oracle Cloud Infrastructure the functionality extends to exporting and import- ing virtual
machines to and from the cloud. This simplifies development of applications and deployment to the
production environment. See chapter 1.14.5, Exporting an Appliance to Oracle Cloud Infrastructure, page
24.
• Guest Additions: shared folders, seamless windows, 3D virtualization. The Oracle
VM VirtualBox Guest Additions are software packages which can be installed inside of sup- ported
guest systems to improve their performance and to provide additional integration and communication
with the host system. After installing the Guest Additions, a virtual machine will support automatic
adjustment of video resolutions, seamless windows, accel- erated 3D graphics and more. See chapter
4, Guest Additions, page 67.
In particular, Guest Additions provide for shared folders, which let you access files on the host system
from within a guest machine. See chapter 4.3, Shared Folders, page 74.
3
1 First Steps
• Great hardware support. Among other features, Oracle VM VirtualBox supports the fol- lowing:
– Guest multiprocessing (SMP). Oracle VM VirtualBox can present up to 32 virtual CPUs
to each virtual machine, irrespective of how many CPU cores are physically present on your
host.
– USB device support. Oracle VM VirtualBox implements a virtual USB controller and enables
you to connect arbitrary USB devices to your virtual machines without having to install device-
specific drivers on the host. USB support is not limited to certain device categories. See
chapter 3.11.1, USB Settings, page 60.
– Hardware compatibility. Oracle VM VirtualBox virtualizes a vast array of virtual
devices, among them many devices that are typically provided by other virtualization platforms.
That includes IDE, SCSI, and SATA hard disk controllers, several virtual network cards and
sound cards, virtual serial and parallel ports and an Input/Output Advanced Programmable
Interrupt Controller (I/O APIC), which is found in many computer systems. This enables easy
cloning of disk images from real machines and importing of third-party virtual machines into
Oracle VM VirtualBox.
– Full ACPI support. The Advanced Configuration and Power Interface (ACPI) is fully
supported by Oracle VM VirtualBox. This enables easy cloning of disk images from real machines
or third-party virtual machines into Oracle VM VirtualBox. With its unique ACPI power status
support, Oracle VM VirtualBox can even report to ACPI-aware guest OSes the power status of the
host. For mobile systems running on battery, the guest can thus enable energy saving and notify
the user of the remaining power, for example in full screen modes.
– Multiscreen resolutions. Oracle VM VirtualBox virtual machines support screen res- olutions
many times that of a physical screen, allowing them to be spread over a large number of screens
attached to the host system.
– Built-in iSCSI support. This unique feature enables you to connect a virtual ma- chine
directly to an iSCSI storage server without going through the host system. The VM accesses the
iSCSI target directly without the extra overhead that is required for virtualizing hard disks in
container files. See chapter 5.10, iSCSI Servers, page 100.
– PXE Network boot. The integrated virtual network cards of Oracle VM VirtualBox fully
support remote booting using the Preboot Execution Environment (PXE).
• Multigeneration branched snapshots. Oracle VM VirtualBox can save arbitrary snapshots of the
state of the virtual machine. You can go back in time and revert the virtual machine to any such
snapshot and start an alternative VM configuration from there, effectively creating a whole snapshot
tree. See chapter 1.10, Snapshots, page 16. You can create and delete snapshots while the virtual
machine is running.
• VM groups. Oracle VM VirtualBox provides a groups feature that enables the user to organize
and control virtual machines collectively, as well as individually. In addition to basic groups, it is
also possible for any VM to be in more than one group, and for groups to be nested in a hierarchy.
This means you can have groups of groups. In general, the operations that can be performed on
groups are the same as those that can be applied to individual VMs: Start, Pause, Reset, Close (Save
state, Send Shutdown, Poweroff), Discard Saved State, Show in File System, Sort.
• Clean architecture and unprecedented modularity. Oracle VM VirtualBox has an ex-
tremely modular design with well-defined internal programming interfaces and a clean separation of
client and server code. This makes it easy to control it from several interfaces at once. For example,
you can start a VM simply by clicking on a button in the Oracle VM VirtualBox graphical user
interface and then control that machine from the command line, or even remotely. See chapter 1.16,
Alternative Front-Ends, page 30.
4
1 First Steps
Due to its modular architecture, Oracle VM VirtualBox can also expose its full functionality and
configurability through a comprehensive software development kit (SDK), which enables
integration of Oracle VM VirtualBox with other software systems. See chapter 11, Oracle VM
VirtualBox Programming Interfaces, page 308.
• Remote machine display. The VirtualBox Remote Desktop Extension (VRDE) enables high-
performance remote access to any running virtual machine. This extension supports the Remote
Desktop Protocol (RDP) originally built into Microsoft Windows, with special additions for full client
USB support.
The VRDE does not rely on the RDP server that is built into Microsoft Windows. Instead, the VRDE
is plugged directly into the virtualization layer. As a result, it works with guest OSes other than
Windows, even in text mode, and does not require application support in the virtual machine either.
The VRDE is described in detail in chapter 7.1, Remote Display (VRDP Support), page 116.
On top of this special capacity, Oracle VM VirtualBox offers you more unique features:
– Extensible RDP authentication. Oracle VM VirtualBox already supports Winlogon on
Windows and PAM on Linux for RDP authentication. In addition, it includes an easy-to-use
SDK which enables you to create arbitrary interfaces for other methods of authentication. See
chapter 7.1.5, RDP Authentication, page 121.
– USB over RDP. Using RDP virtual channel support, Oracle VM VirtualBox also enables you to
connect arbitrary USB devices locally to a virtual machine which is running remotely on an
Oracle VM VirtualBox RDP server. See chapter 7.1.4, Remote USB, page 120.
5
1 First Steps
• Oracle Solaris hosts (64-bit only). The following versions are supported with the restric- tions
listed in chapter 14, Known Limitations, page 330:
– Oracle Solaris 11
Note that the above list is informal. Oracle support for customers who have a support contract is limited to
a subset of the listed host OSes. Also, any feature which is marked as experimental is not supported. Feedback
and suggestions about such features are welcome.
• Base package. The base package consists of all open source components and is licensed under
the GNU General Public License V2.
• Extension packs. Additional extension packs can be downloaded which extend the func- tionality
of the Oracle VM VirtualBox base package. Currently, Oracle provides a single extension pack,
available from: http://www.virtualbox.org. The extension pack pro- vides the following
added functionality:
1. The virtual USB 2.0 (EHCI) device. See chapter 3.11.1, USB Settings, page 60.
2. The virtual USB 3.0 (xHCI) device. See chapter 3.11.1, USB Settings, page 60.
3. VirtualBox Remote Desktop Protocol (VRDP) support. See chapter 7.1, Remote Display
(VRDP Support), page 116.
4. Host webcam passthrough. See chapter 9.5, Webcam Passthrough, page 247.
6
1 First Steps
• On a Windows host, in the Programs menu, click on the item in the VirtualBox group. On some
Windows platforms, you can also enter VirtualBox in the search box of the Start menu.
• On a Mac OS X host, in the Finder, double-click on the VirtualBox item in the Applications folder.
You may want to drag this item onto your Dock.
• On a Linux or Oracle Solaris host, depending on your desktop environment, an Oracle VM VirtualBox
item may have been placed in either the System or System Tools group of your Applications menu.
Alternatively, you can enter VirtualBox in a terminal window.
When you start Oracle VM VirtualBox for the first time, a window like the following is dis- played:
This window is called the VirtualBox Manager. The left pane will later list all your virtual
machines. Since you have not yet created any virtual machines, this list is empty. The Tools button
provides access to user tools, such as the Virtual Media Manager.
The pane on the right displays the properties of the currently selected virtual machine. Since you do not
have any machines yet, the pane displays a welcome message.
The buttons on the right pane are used to create and work with VMs.
7
1 First Steps
The following figure gives an idea of what Oracle VM VirtualBox might look like after you have created
some VMs.
On the following pages, the wizard will ask you for the bare minimum of information that is needed to
create a VM, in particular:
1. The Name of the VM you choose is shown in the machine list of the VirtualBox Manager window
and is also used for the VM’s files on disk.
Be sure to assign each VM an informative name that describes the OS and software running on the VM.
For example, Windows 10 with Visio.
8
1 First Steps
2. The Machine Folder is the location where VMs are stored on your computer. The default folder
location is shown.
3. For Operating System Type, select the OS that you want to install. The supported OSes are
grouped. If you want to install something very unusual that is not listed, select Other. Depending on
your selection, Oracle VM VirtualBox will enable or disable certain VM set- tings that your guest OS
may require. This is particularly important for 64-bit guests. See chapter 3.1.2, 64-bit Guests, page 47.
It is therefore recommended to always set it to the correct value.
4. On the next page, select the Memory (RAM) that Oracle VM VirtualBox should allocate every
time the virtual machine is started. The amount of memory given here will be taken away from your
host machine and presented to the guest OS, which will report this size as the virtual computer’s
installed RAM.
Choose this setting carefully. The memory you give to the VM will not be available to your host OS
while the VM is running, so do not specify more than you can spare.
For example, if your host machine has 4 GB of RAM and you enter 2048 MB as the amount of RAM
for a particular virtual machine, you will only have 2 GB left for all the other software on your
host while the VM is running. If you run two VMs at the same time, even more memory will be
allocated for the second VM, which may not even be able to start if that memory is not available.
On the other hand, you should specify as much as your guest OS and your applications will require to
run properly. A guest OS may require at least 1 or 2 GB of memory to install and boot up. For best
performance, more memory than that may be required.
Always ensure that the host OS has enough RAM remaining. If insufficient RAM remains, the system
might excessively swap memory to the hard disk, which effectively brings the host system to a
standstill.
As with the other settings, you can change this setting later, after you have created the VM.
5. Next, you must specify a Virtual Hard Disk for your VM.
There are many and potentially complicated ways in which Oracle VM VirtualBox can provide
hard disk space to a VM, see chapter 5, Virtual Storage, page 88, but the most common way is to
use a large image file on your physical hard disk, whose contents Oracle VM VirtualBox presents to
your VM as if it were a complete hard disk. This file then represents an entire hard disk, so you
can even copy it to another host and use it with another Oracle VM VirtualBox installation.
The wizard displays the following window:
9
1 First Steps
After having selected or created your image file, click Next to go to the next page.
10
1 First Steps
6. Click Create, to create your new virtual machine. The virtual machine is displayed in the list on the
left side of the VirtualBox Manager window, with the name that you entered initially.
Note: After becoming familiar with the use of wizards, consider using the Expert Mode available
in some wizards. Where available, this is selectable using a button, and speeds up the process
of using wizards.
11
1 First Steps
12
1 First Steps
• Host OSes reserve certain key combinations for themselves. For example, you cannot use the
Ctrl+Alt+Delete combination to reboot the guest OS in your VM because this key combination
is usually hard-wired into the host OS. So, even though both the Windows and Linux OSes intercept
this key combination, only the host OS would be rebooted.
On Linux and Oracle Solaris hosts, which use the X Window System, the key combination
Ctrl+Alt+Backspace normally resets the X server and restarts the entire graphical user interface.
As the X server intercepts this combination, pressing it will usually restart your host graphical user
interface and kill all running programs, including Oracle VM VirtualBox, in the process.
On Linux hosts supporting virtual terminals, the key combination Ctrl+Alt+Fx, where Fx is one of
the function keys from F1 to F12, normally enables you to switch between virtual terminals. As with
Ctrl+Alt+Delete, these combinations are intercepted by the host OS and therefore always switch
terminals on the host.
If, instead, you want to send these key combinations to the guest OS in the virtual machine, you will
need to use one of the following methods:
– Use the items in the Input, Keyboard menu of the virtual machine window. This menu
includes the settings Insert Ctrl+Alt+Delete and Insert Ctrl+Alt+Backspace. However,
the latter setting affects only Linux guests or Oracle Solaris guests.
This menu also includes an option for inserting the Host key combination.
– Use special key combinations with the Host key, which is normally the right Control key.
Oracle VM VirtualBox then translates the following key combinations for the VM:
∗ Host key + Del sends Ctrl+Alt+Del to reboot the guest OS.
∗ Host key + Backspace sends Ctrl+Alt+Backspace to restart the graphical user
interface of a Linux or Oracle Solaris guest.
∗ Host key + Function key. For example, use this key combination to simulate
Ctrl+Alt+Fx to switch between virtual terminals in a Linux guest.
• For some other keyboard combinations such as Alt+Tab to switch between open windows, Oracle
VM VirtualBox enables you to configure whether these combinations will affect the host or the guest,
if a virtual machine currently has the focus. This is a global setting for all virtual machines and can be
found under File, Preferences, Input.
• A soft keyboard can be used to input key combinations in the guest. See chapter 1.17, Soft
Keyboard, page 31.
13
1 First Steps
Using the Devices menu, you can attach the host drive to the guest or select a floppy or DVD
image, as described in chapter 3.7, Storage Settings, page 56.
The Devices menu also includes an option for creating a virtual ISO (VISO) from selected files on the
host.
1. If you have scaled mode enabled, then the virtual machine’s screen will be scaled to the size of the
window. This can be useful if you have many machines running and want to have a look at one of
them while it is running in the background. Alternatively, it might be useful to enlarge a window if
the VM’s output screen is very small, for example because you are running an old OS in it.
To enable scaled mode, press Host key + C, or select Scaled Mode from the View menu in the
VM window. To leave scaled mode, press Host key + C again.
The aspect ratio of the guest screen is preserved when resizing the window. To ignore the aspect ratio,
press Shift during the resize operation.
See chapter 14, Known Limitations, page 330 for additional remarks.
2. If you have the Guest Additions installed and they support automatic resizing, the Guest Additions
will automatically adjust the screen resolution of the guest OS. For example, if you are running a
Windows guest with a resolution of 1024x768 pixels and you then resize the VM window to make it
100 pixels wider, the Guest Additions will change the Windows display resolution to 1124x768.
See chapter 4, Guest Additions, page 67.
3. Otherwise, if the window is bigger than the VM’s screen, the screen will be centered. If it is smaller,
then scroll bars will be added to the machine window.
The difference between the three options is crucial. They mean the following:
14
1 First Steps
• Save the machine state: With this option, Oracle VM VirtualBox freezes the virtual ma- chine by
completely saving its state to your local disk.
When you start the VM again later, you will find that the VM continues exactly where it was left
off. All your programs will still be open, and your computer resumes operation. Saving the state of
a virtual machine is thus in some ways similar to suspending a laptop computer by closing its lid.
• Send the shutdown signal. This will send an ACPI shutdown signal to the virtual machine, which
has the same effect as if you had pressed the power button on a real computer. This should trigger a
proper shutdown mechanism from within the VM.
• Power off the machine: With this option, Oracle VM VirtualBox also stops running the virtual
machine, but without saving its state.
Warning: This is equivalent to pulling the power plug on a real computer without shutting it
down properly. If you start the machine again after powering it off, your OS will have to
reboot completely and may begin a lengthy check of its virtual system disks. As a result, this
should not normally be done, since it can potentially cause data loss or an inconsistent state of the
guest system on disk.
As an exception, if your virtual machine has any snapshots, see chapter 1.10, Snapshots, page 16,
you can use this option to quickly restore the current snapshot of the virtual machine. In that
case, powering off the machine will not disrupt its state, but any changes made since that snapshot was
taken will be lost.
The Discard button in the VirtualBox Manager window discards a virtual machine’s saved state. This
has the same effect as powering it off, and the same warnings apply.
15
1 First Steps
This command creates a group “TestGroup” and attaches the VM “vm01” to that group.
– Detach a VM from the group, and delete the group if empty. For example:
VBoxManage modifyvm "vm01" --groups ""
This command detaches all groups from the VM “vm01” and deletes the empty group.
• Create multiple groups. For example:
This command creates the groups “TestGroup” and “TestGroup2”, if they do not exist, and attaches the
VM “vm01” to both of them.
• Create nested groups, having a group hierarchy. For example:
This command attaches the VM “vm01” to the subgroup “TestGroup2” of the “TestGroup”
group.
• The following is a summary of group commands: Start, Pause, Reset, Close (save state, send
shutdown signal, poweroff), Discard Saved State, Show in File System, Sort.
1.10
Snapshots
With snapshots, you can save a particular state of a virtual machine for later use. At any later time, you can
revert to that state, even though you may have changed the VM considerably since then. A snapshot of a
virtual machine is thus similar to a machine in Saved state, but there can be many of them, and these saved
states are preserved.
To see the snapshots of a virtual machine, click on the machine name in VirtualBox Manager. Then click
the List icon next to the machine name, and select Snapshots. Until you take a snapshot of the
machine, the list of snapshots will be empty except for the Current State item, which represents the
“now” point in the lifetime of the virtual machine.
1. Take a snapshot. This makes a copy of the machine’s current state, to which you can go back at
any given time later.
• If your VM is running, select Take Snapshot from the Machine pull-down menu of the
VM window.
• If your VM is in either the Saved or the Powered Off state, as displayed next to the VM name
in the Oracle VM VirtualBox main window, click the List icon next to the machine name and
select Snapshots. The snapshots window is shown. Do one of the following:
16
1 First Steps
Oracle VM VirtualBox imposes no limits on the number of snapshots you can take. The only
practical limitation is disk space on your host. Each snapshot stores the state of the virtual machine
and thus occupies some disk space. See chapter 1.10.2, Snapshot Contents, page 18 for details on what
is stored in a snapshot.
2. Restore a snapshot. In the list of snapshots, right-click on any snapshot you have taken and select
Restore. By restoring a snapshot, you go back or forward in time. The current state of the machine
is lost, and the machine is restored to the exact state it was in when the snapshot was taken.
Note: Restoring a snapshot will affect the virtual hard drives that are connected to your VM,
as the entire state of the virtual hard drive will be reverted as well. This means also that all
files that have been created since the snapshot and all other file changes will be lost. In order
to prevent such data loss while still making use of the snapshot feature, it is possible to add a
second hard drive in write-through mode using the VBoxManage interface and use it to store
your data. As write-through hard drives are not included in snapshots, they remain unaltered when
a machine is reverted. See chapter 5.4, Special Image Write Modes, page 94.
To avoid losing the current state when restoring a snapshot, you can create a new snapshot before the
restore operation.
By restoring an earlier snapshot and taking more snapshots from there, it is even possible to create a
kind of alternate reality and to switch between these different histories of the virtual machine. This can
result in a whole tree of virtual machine snapshots, as shown in the screenshot above.
17
1 First Steps
3. Delete a snapshot. This does not affect the state of the virtual machine, but only releases the files
on disk that Oracle VM VirtualBox used to store the snapshot data, thus freeing disk space. To
delete a snapshot, right-click on the snapshot name in the snapshots tree and select Delete. Snapshots
can be deleted even while a machine is running.
Note: Whereas taking and restoring snapshots are fairly quick operations, deleting a snapshot can
take a considerable amount of time since large amounts of data may need to be copied between
several disk image files. Temporary disk files may also need large amounts of disk space while the
operation is in progress.
There are some situations which cannot be handled while a VM is running, and you will get an
appropriate message that you need to perform this snapshot deletion when the VM is shut down.
• The snapshot contains a complete copy of the VM settings, including the hardware con- figuration,
so that when you restore a snapshot, the VM settings are restored as well. For example, if you
changed the hard disk configuration or the VM’s system settings, that change is undone when you
restore the snapshot.
The copy of the settings is stored in the machine configuration, an XML text file, and thus occupies
very little space.
• The complete state of all the virtual disks attached to the machine is preserved. Going back to a snapshot
means that all changes that had been made to the machine’s disks, file by file and bit by bit, will be
undone as well. Files that were since created will disappear, files that were deleted will be restored,
changes to files will be reverted.
Strictly speaking, this is only true for virtual hard disks in “normal” mode. You can config- ure disks to
behave differently with snapshots, see chapter 5.4, Special Image Write Modes, page 94. In technical
terms, it is not the virtual disk itself that is restored when a snapshot is restored. Instead, when a
snapshot is taken, Oracle VM VirtualBox creates differencing images which contain only the changes
since the snapshot were taken. When the snapshot is restored, Oracle VM VirtualBox throws away that
differencing image, thus going back to the previous state. This is both faster and uses less disk space.
For the details, which can be complex, see chapter 5.5, Differencing Images, page 96.
Creating the differencing image as such does not occupy much space on the host disk initially,
since the differencing image will initially be empty and grow dynamically later with each write
operation to the disk. The longer you use the machine after having created the snapshot, however, the
more the differencing image will grow in size.
• If you took a snapshot while the machine was running, the memory state of the machine is also saved
in the snapshot. This is in the same way that memory can be saved when you close a VM window.
When you restore such a snapshot, execution resumes at exactly the point when the snapshot was
taken.
The memory state file can be as large as the memory size of the VM and will therefore occupy
considerable disk space.
18
1 First Steps
Note: The Settings button is disabled while a VM is either in the Running or Saved state.
This is because the Settings dialog enables you to change fundamental charac- teristics of the
virtual machine that is created for your guest OS. For example, the guest OS may not perform well
if half of its memory is taken away. As a result, if the Settings button is disabled, shut down the
current VM first.
Oracle VM VirtualBox provides a wide range of parameters that can be changed for a virtual machine.
The various settings that can be changed in the Settings window are described in detail in chapter 3,
Configuring Virtual Machines, page 45. Even more parameters are available when using the VBoxManage
command line interface. See chapter 8, VBoxManage, page 128.
• Removing a VM. To remove a VM, right-click on the VM in the VirtualBox Manager’s machine
list and select Remove.
The confirmation dialog enables you to specify whether to only remove the VM from the list of
machines or to remove the files associated with the VM.
Note that the Remove menu item is disabled while a VM is running.
• Moving a VM. To move a VM to a new location on the host, right-click on the VM in the
VirtualBox Manager’s machine list and select Move.
The file dialog prompts you to specify a new location for the VM.
When you move a VM, Oracle VM VirtualBox configuration files are updated automatically to use the
new location on the host.
Note that the Move menu item is disabled while a VM is running.
You can also use the VBoxManage movevm command to move a VM. See chapter 8.9, VBox-
Manage movevm, page 157.
For information about removing or moving a disk image file from Oracle VM VirtualBox, see chapter
5.3, The Virtual Media Manager, page 92.
19
1 First Steps
Start the wizard by clicking Clone in the right-click menu of the VirtualBox Manager’s machine list or in
the Snapshots view of the selected VM.
Specify a new Name for the clone. You can choose a Path for the cloned virtual machine, otherwise
Oracle VM VirtualBox uses the default machines folder.
The Clone Type option specifies whether to create a clone linked to the source VM or to create a fully
independent clone:
• Full Clone: Copies all dependent disk images to the new VM folder. A full clone can operate
fully without the source VM.
• Linked Clone: Creates new differencing disk images based on the source VM disk images. If you
select the current state of the source VM as the clone point, Oracle VM VirtualBox creates a new
snapshot.
The Snapshots option specifies whether to create a clone of the current machine state only or of
everything.
• Everything: Clones the current machine state and all its snapshots.
• Current Machine State and All Children:. Clones a VM snapshot and all its child snap- shots.
• MAC Address Policy: Specifies how to retain network card MAC addresses when cloning the VM.
For example, the Generate New MAC Addresses For All Network Adapters value assigns a
new MAC address to each network card during cloning. This is the default setting. This is the best
option when both the source VM and the cloned VM must operate on the same network. Other values
enable you to retain the existing MAC addresses in the cloned VM.
• Keep Disk Names: Retains the disk image names when cloning the VM.
• Keep Hardware UUIDs: Retains the hardware universally unique identifiers (UUIDs) when cloning
the VM.
The duration of the clone operation depends on the size and number of attached disk images. In addition,
the clone operation saves all the differencing disk images of a snapshot.
Note that the Clone menu item is disabled while a machine is running.
You can also use the VBoxManage clonevm command to clone a VM. See chapter 8.40, VBox-
Manage clonevm, page 208.
20
1 First Steps
• Open Virtualization Format (OVF). This is the industry-standard format. See chapter
1.14.1, About the OVF Format, page 21.
• Cloud service formats. Export to and import from cloud services such as Oracle Cloud
Infrastructure is supported. See the following topics:
– chapter 1.14.5, Exporting an Appliance to Oracle Cloud Infrastructure, page 24
– chapter 1.14.6, Importing an Instance from Oracle Cloud Infrastructure, page 26
Before using Oracle VM VirtualBox with Oracle Cloud Infrastructure there are some initial
configuration steps you need to consider. See chapter 1.14.4, Preparing for Oracle Cloud
Infrastructure Integration, page 23.
Oracle VM VirtualBox can also be used to create new instances from a custom image stored on Oracle
Cloud Infrastructure. See chapter 1.14.8, Creating New Cloud Instances from a Custom Image, page 29
Note: The OVF standard is complex, and support in Oracle VM VirtualBox is an ongoing process.
In particular, no guarantee is made that Oracle VM VirtualBox supports all appliances created by
other virtualization software. For a list of known limitations, see chapter 14, Known Limitations,
page 330.
• They can come in several files, as one or several disk images, typically in the widely-used VMDK
format. See chapter 5.2, Disk Image Files (VDI, VMDK, VHD, HDD), page 91. They also include a
textual description file in an XML dialect with an .ovf extension. These files must then reside in the
same directory for Oracle VM VirtualBox to be able to import them.
• Alternatively, the above files can be packed together into a single archive file, typically with an
.ova extension. Such archive files use a variant of the TAR archive format and can therefore be
unpacked outside of Oracle VM VirtualBox with any utility that can unpack standard TAR files.
Note: OVF cannot describe snapshots that were taken for a virtual machine. As a result, when
you export a virtual machine that has snapshots, only the current state of the machine will be
exported. The disk images in the export will have a flattened state identical to the current state of the
virtual machine.
21
1 First Steps
This screen shows the VMs described in the OVF or OVA file and enables you to change the
VM settings.
By default, membership of VM groups is preserved on import for VMs that were initially exported
from Oracle VM VirtualBox. You can change this behavior by using the Primary Group setting for
the VM.
The following global settings apply to all of the VMs that you import:
• Base Folder: Specifies the directory on the host in which to store the imported VMs. If an
appliance has multiple VMs, you can specify a different directory for each VM by
editing the Base Folder setting for the VM.
• MAC Address Policy: Reinitializes the MAC addresses of network cards in your VMs prior
to import, by default. You can override the default behavior and preserve the MAC addresses
on import.
• Import Hard Drives as VDI: Imports hard drives in the VDI format rather than in the default
VMDK format.
22
1 First Steps
You can use the VBoxManage import command to import an appliance. See chapter 8.10,
VBoxManage import, page 157.
1. Select File, Export Appliance to open the Export Virtual Appliance wizard.
From the initial window, you can combine several VMs into an OVF appliance. Select
one or more VMs to export, and click Next.
2. The Appliance Settings screen enables you to select the following settings:
• Format: Selects the Open Virtualization Format value for the output files.
The Oracle Cloud Infrastructure value exports the appliance to Oracle Cloud Infras-
tructure. See chapter 1.14.5, Exporting an Appliance to Oracle Cloud Infrastructure, page 24.
• File: Selects the location in which to store the exported files.
• MAC Address Policy: Specifies whether to retain or reassign network card MAC ad- dresses
on export.
• Write Manifest File: Enables you to include a manifest file in the exported archive file.
• Include ISO Image Files: Enables you to include ISO image files in the exported archive
file.
3. Click Next to show the Virtual System Settings screen.
You can edit settings for the virtual appliance. For example, you can change the name of the virtual
appliance or add product information, such as vendor details or license text.
Double-click the appropriate field to change its value.
4. Click Export to begin the export process. Note that this operation might take several minutes.
You can use the VBoxManage export command to export an appliance. See chapter 8.11,
VBoxManage export, page 159.
• Create a key pair. Generate an API signing key pair that is used for API requests to Oracle
Cloud Infrastructure.
23
1 First Steps
– The key pair is usually installed in the .oci folder in your home directory. For exam- ple,
~/.oci on a Linux system.
– Upload the public key of the key pair to the cloud service.
For step-by-step instructions for creating and uploading an API signing key for Oracle Cloud
Infrastructure, see:
https://docs.cloud.oracle.com/iaas/Content/API/Concepts/apisigningkey.
htm#How
• Create a cloud profile. The cloud profile contains resource identifiers for your cloud account,
such as your user OCID, and the fingerprint for your public key. You can create a cloud profile in the
following ways:
– Automatically, by using the Cloud Profile Manager. See chapter 1.14.7, The Cloud
Profile Manager, page 27.
– Automatically, by using the VBoxManage cloudprofile command. See chapter 8.44,
VBoxManage cloudprofile, page 228.
– Manually, by creating an oci_config file in your Oracle VM VirtualBox global config- uration
directory. For example, this is $HOME/.config/VirtualBox/oci_config on a Linux host.
– Manually, by creating a config file in your Oracle Cloud Infrastructure configuration directory.
For example, this is $HOME/.oci/config on a Linux host.
This is the same file that is used by the Oracle Cloud Infrastructure command line interface.
Oracle VM VirtualBox automatically uses the config file if no cloud profile file is present
in your global configuration directory. Alternatively, you can import this file manually into the
Cloud Profile Manager.
For more information about the cloud profile settings used by Oracle Cloud Infrastructure see:
https://docs.cloud.oracle.com/iaas/Content/API/Concepts/sdkconfig.htm
• Custom Linux images. To export a custom Linux image, prepare the VM as described here:
https://docs.cloud.oracle.com/iaas/Content/Compute/Tasks/
importingcustomimagelinux.htm
• Subnets. When exporting a VM to cloud, ensure that the subnets that are used by source
VMs are available in the target compartment on the cloud service.
1. Select File, Export Appliance to open the Export Virtual Appliance wizard.
Select a VM to export and click Next to open the Appliance Settings screen.
24
1 First Steps
In the Machine Creation field, select an option to configure settings for a cloud instance created
when you export to Oracle Cloud Infrastructure. The options enable you to do one of the following:
• Configure settings for the cloud instance after you have finished exporting the VM.
• Configure settings for the cloud instance before you start to export the VM.
• Do not create a cloud instance when you export the VM.
Click Next to make an API request to the Oracle Cloud Infrastructure service and open the
Virtual System Settings screen.
3. Optionally edit storage settings used for the exported virtual machine in Oracle Cloud
Infrastructure. You can change the following settings:
• The name of the bucket used to store the exported files.
• Whether to store the custom image in Oracle Cloud Infrastructure.
• The name for the custom image in Oracle Cloud Infrastructure.
• The launch mode for the custom image.
Paravirtualized mode gives improved performance and should be suitable for most
Oracle VM VirtualBox VMs.
Emulated mode is suitable for legacy OS images.
Click Export to export the VM to Oracle Cloud Infrastructure.
Depending on the selection in the Machine Creation field, the Cloud Virtual Machine Set- tings
screen may be displayed before or after export. This screen enables you to configure settings for the
cloud instance, such as Shape and Disk Size.
Click Create. The VM is exported to Oracle Cloud Infrastructure.
Depending on the Machine Creation setting, a cloud instance may be started after upload to Oracle
Cloud Infrastructure is completed.
25
1 First Steps
4. Monitor the export process by using the Oracle Cloud Infrastructure Console.
You can also use the VBoxManage export command to export a VM to Oracle Cloud Infras- tructure.
See chapter 8.11.2, Export to Oracle Cloud Infrastructure, page 160.
1. Select File, Import Appliance to open the Import Virtual Appliance wizard.
In the Source drop-down list, select Oracle Cloud Infrastructure.
In the Account drop-down list, select your Oracle Cloud Infrastructure account.
You can set up Oracle Cloud Infrastructure accounts by using the Cloud Profile Manager. The list
after the Account field shows the profile settings for your cloud account.
Choose the required cloud instance from the list in the Machines field.
Click Next to make an API request to the Oracle Cloud Infrastructure service and open the
Appliance Settings screen.
2. Optionally edit settings for the new local virtual machine.
For example, you can edit the VM name and description.
You can also use the VBoxManage import command to import an instance from Oracle Cloud
Infrastructure. See chapter 8.10.2, Import from Oracle Cloud Infrastructure, page 158.
26
1 First Steps
27
1 First Steps
To open the Cloud Profile Manager select File, Cloud Profile Manager from the VirtualBox
Manager window.
You can use the Cloud Profile Manager to create a new cloud profile automatically or to create a cloud
profile by importing settings from your Oracle Cloud Infrastructure configuration file.
Perform the following steps to create a new cloud profile automatically:
1. Click the Add icon and specify a Name for the profile.
2. Click Properties and specify the following property values for the profile:
• Compartment OCID
• Fingerprint of the public key
• Location of the private key on the client device
• (Optional) Passphrase for the private key, if the key is encrypted
• Region OCID
• Tenancy OCID
• User OCID
Some of these are settings for your Oracle Cloud Infrastructure account, which you can view from
the Oracle Cloud Infrastructure Console.
3. Click Apply to save your changes.
The cloud profile settings are saved in the oci_config file in your Oracle VM VirtualBox global
settings directory.
Perform the following steps to import an existing Oracle Cloud Infrastructure configuration file:
1. Ensure that a config file is present in your Oracle Cloud Infrastructure configuration di- rectory. For
example, this is $HOME/.oci/config on a Linux host.
2. Click the Import icon to open a dialog that prompts you to import cloud profiles from external
files.
Warning: This action overwrites any cloud profiles that are in your Oracle VM
VirtualBox global settings directory.
3. Click Import.
Your cloud profile settings are saved to the oci_config file in your Oracle VM VirtualBox global
settings directory.
4. Click Properties to show the cloud profile settings.
Double-click on the appropriate field to change the value.
5. Click Apply to save your changes.
28
1 First Steps
Click Next to make an API request to the Oracle Cloud Infrastructure service and open the
Cloud Virtual Machine Settings screen.
3. Optionally edit settings used for the instance on Oracle Cloud Infrastructure.
For example, you can edit the Disk Size and Shape used for the VM instance and the networking
configuration.
Click Create to create the new cloud instance.
4. Monitor the instance creation process by using the Oracle Cloud Infrastructure Console. You can also
use the VBoxManage cloud instance command to create and manage instances
on a cloud service. See chapter 8.46, VBoxManage cloud instance, page 230.
29
1 First Steps
1.15 Global
Settings
The Global Settings dialog can be displayed using the File menu, by clicking the Preferences item.
This dialog offers a selection of settings, most of which apply to all virtual machines of the current user. The
Extensions option applies to the entire system.
The following settings are available:
• General. Enables the user to specify the default folder or directory for VM files, and the
VRDP Authentication Library.
• Input. Enables the user to specify the Host key. This is the key that toggles whether the cursor is in
the focus of the VM or the Host OS windows, see chapter 1.8.2, Capturing and Releasing Keyboard and
Mouse, page 12. The Host key is also used to trigger certain VM actions, see chapter 1.8.3, Typing
Special Characters, page 13.
• Update. Enables the user to specify various settings for Automatic Updates.
• Language. Enables the user to specify the GUI language.
• Display. Enables the user to specify the screen resolution, and its width and height. A
default scale factor can be specified for all guest screens.
• Network. Enables the user to configure the details of Host Only Networks.
• Extensions. Enables the user to list and manage the installed extension packages.
• Proxy. Enables the user to configure a HTTP Proxy Server.
• VirtualBox. This is the VirtualBox Manager, a graphical user interface that uses the Qt toolkit.
This interface is described throughout this manual. While this is the simplest and easiest front-end to
use, some of the more advanced Oracle VM VirtualBox features are not included.
• VBoxManage. A command-line interface for automated and detailed control of every as- pect of
Oracle VM VirtualBox. See chapter 8, VBoxManage, page 128.
• VBoxHeadless. A front-end that produces no visible output on the host at all, but can act as a
RDP server if the VirtualBox Remote Desktop Extension (VRDE) is installed and enabled for the
VM. As opposed to the other graphical interfaces, the headless front-end requires no graphics
support. This is useful, for example, if you want to host your virtual machines on a headless Linux
server that has no X Window system installed. See chapter
7.1.2, VBoxHeadless, the Remote Desktop Server, page 117.
If the above front-ends still do not satisfy your particular needs, it is possible to create yet another front-
end to the complex virtualization engine that is the core of Oracle VM VirtualBox, as the Oracle VM
VirtualBox core neatly exposes all of its features in a clean API. See chapter 11, Oracle VM VirtualBox
Programming Interfaces, page 308.
30
1 First Steps
1.17 Soft
Keyboard
Oracle VM VirtualBox provides a soft keyboard that enables you to input keyboard characters on the guest.
A soft keyboard is an on-screen keyboard that can be used as an alternative to a physical keyboard. See
chapter 1.17.1, Using the Soft Keyboard, page 31 for details of how to use the soft keyboard.
For best results, ensure that the keyboard layout configured on the guest OS matches the keyboard
layout used by the soft keyboard. Oracle VM VirtualBox does not do this automatically.
• When the physical keyboard on the host is not the same as the keyboard layout configured on the
guest. For example, if the guest is configured to use an international keyboard, but the host keyboard is
US English.
• To send special key combinations to the guest. Note that some common key combinations are also
available in the Input, Keyboard menu of the guest VM window. See chapter
1.8.3, Typing Special Characters, page 13.
• For guests in kiosk mode, where a physical keyboard is not present.
• When using nested virtualization, the soft keyboard provides a method of sending key presses to a
guest.
By default, the soft keyboard includes some common international keyboard layouts. You can copy and
modify these to meet your own requirements. See chapter 1.17.2, Creating a Custom Keyboard Layout, page
32.
31
1 First Steps
• Modifier keys such as Shift, Ctrl, and Alt are available on the soft keyboard. Click once to
select the modifier key, click twice to lock the modifier key.
The Reset the Keyboard and Release All Keys icon can be used to release all pressed
modifier keys, both on the host and the guest.
• To change the look of the soft keyboard, click the Settings icon in the task bar. You can
change colors used in the keyboard graphic, and can hide or show sections of the keyboard, such
as the NumPad or multimedia keys.
Note: To permananently save a custom keyboard layout, you must save it to file. Oth- erwise,
any changes you make are discarded when you close down the Soft Keyboard window.
Custom keyboard layouts that you save are stored as an XML file on the host, in the
keyboardLayouts folder in the global configuration data directory. For example, in
$HOME/.config/VirtualBox/keyboardLayouts on a Linux host.
32
2 Installation Details
As installation of Oracle VM VirtualBox varies depending on your host operating system, the following
sections provide installation instructions for Windows, Mac OS X, Linux, and Oracle Solaris.
VirtualBox-<version>-<revision>-Win.exe -extract
This will extract the installer into a temporary directory, along with the .MSI file. Run the following
command to perform the installation:
msiexec /i VirtualBox-<version>-<revision>-Win.msi
Using either way displays the installation Welcome dialog and enables you to choose where to install
Oracle VM VirtualBox, and which components to install. In addition to the Oracle VM VirtualBox
application, the following components are available:
• USB support. This package contains special drivers for your Windows host that Oracle VM
VirtualBox requires to fully support USB devices inside your virtual machines.
• Networking. This package contains extra networking drivers for your Windows host that Oracle
VM VirtualBox needs to support Bridged Networking. This enables your VM’s virtual network cards to
be accessed from other machines on your physical network.
• Python support. This package contains Python scripting support for the Oracle VM
VirtualBox API, see chapter 11, Oracle VM VirtualBox Programming Interfaces, page 308. For this to
work, an already working Windows Python installation on the system is re- quired.
See, for example: http://www.python.org/download/windows/.
3
2 Installation Details
Depending on your Windows configuration, you may see warnings about unsigned drivers, or similar.
Click Continue for these warnings, as otherwise Oracle VM VirtualBox might not function correctly after
installation.
The installer will create an Oracle VM VirtualBox group in the Windows Start menu, which enables
you to launch the application and access its documentation.
With standard settings, Oracle VM VirtualBox will be installed for all users on the local system. If this is not
wanted, you must invoke the installer by first extracting as follows:
VirtualBox.exe -extract
Then, run either of the following commands on the extracted .MSI file. This will install Oracle
VM VirtualBox only for the current user.
VirtualBox.exe -msiparams ALLUSERS=2
If you do not want to install all features of Oracle VM VirtualBox, you can set the optional ADDLOCAL
parameter to explicitly name the features to be installed. The following features are available:
VBoxApplication
Note: This feature must not be absent, since it contains the minimum set of files to have
working Oracle VM VirtualBox installation.
VBoxUSB
USB support.
VBoxNetwork
All networking support. This includes the VBoxNetworkFlt and VBoxNetworkAdp features.
VBoxNetworkFlt
VBoxNetworkAdp
VBoxPython
Python support
For example, to only install USB support along with the main binaries, run either of the fol- lowing
commands:
VirtualBox.exe -msiparams ADDLOCAL=VBoxApplication,VBoxUSB
3
2 Installation Details
The user is able to choose between NDIS5 and NDIS6 host network filter drivers during the installation.
This is done using a command line parameter, NETWORKTYPE. The NDIS6 driver is the default for most
supported Windows hosts. For some legacy Windows versions, the installer will automatically select the
NDIS5 driver and this cannot be changed.
You can force an install of the legacy NDIS5 host network filter driver by specifying
NETWORKTYPE=NDIS5. For example, to install the NDIS5 driver on Windows 7 use either of the
following commands:
VirtualBox.exe -msiparams NETWORKTYPE=NDIS5
2.1.3 Uninstallation
As Oracle VM VirtualBox uses the standard Microsoft Windows installer, Oracle VM VirtualBox can be
safely uninstalled at any time. Click the program entry in the Add/Remove Programs list in the
Windows Control Panel.
• VBOX_INSTALLDESKTOPSHORTCUT
Specifies whether or not an Oracle VM VirtualBox icon on the desktop should be created. Set to 1 to
enable, 0 to disable. Default is 1.
• VBOX_INSTALLQUICKLAUNCHSHORTCUT
Specifies whether or not an Oracle VM VirtualBox icon in the Quick Launch Bar should be created.
Set to 1 to enable, 0 to disable. Default is 1.
• VBOX_REGISTERFILEEXTENSIONS
Specifies whether or not the file extensions .vbox, .vbox-extpack, .ovf, .ova, .vdi, .vmdk,
.vhd and .vdd should be associated with Oracle VM VirtualBox. Files of these types then will be
opened with Oracle VM VirtualBox.
Set to 1 to enable, 0 to disable. Default is 1.
• VBOX_START
Specifies whether to start Oracle VM VirtualBox right after successful installation. Set to 1 to
enable, 0 to disable. Default is 1.
3
2 Installation Details
2.2.2 Uninstallation
To uninstall Oracle VM VirtualBox, open the disk image dmg file and double-click on the uninstall icon
shown.
Note: These packages are only required if you want to run the Oracle VM VirtualBox graphical
user interfaces. In particular, VirtualBox, the graphical VirtualBox Manager, requires both Qt
and SDL. If you only want to run VBoxHeadless, neither Qt nor SDL are required.
3
2 Installation Details
Also ensure that all system updates have been installed and that your system is running the most up-to-
date kernel for the distribution.
Note: The running kernel and the kernel header files must be updated to matching versions.
The following list includes some details of the required files for some common distributions. Start by
finding the version name of your kernel, using the command uname -r in a terminal. The list assumes that
you have not changed too much from the original installation, in particular that you have not installed a
different kernel type.
• With Debian and Ubuntu-based distributions, you must install the correct version of the linux-
headers, usually whichever of linux-headers-generic, linux-headers-amd64, linux-
headers-i686 or linux-headers-i686-pae best matches the kernel version name. Also,
the linux-kbuild package if it exists. Basic Ubuntu releases should have the correct packages
installed by default.
• On Fedora, Red Hat, Oracle Linux and many other RPM-based systems, the kernel version sometimes
has a code of letters or a word close to the end of the version name. For example “uek” for the
Oracle Unbreakable Enterprise Kernel or “default” or “desktop” for the standard kernels. In this case,
the package name is kernel-uek-devel or equivalent. If there is no such code, it is usually
kernel-devel.
• On some SUSE and openSUSE Linux versions, you may need to install the kernel-source
and kernel-syms packages.
If you suspect that something has gone wrong with module installation, check that your system is set up as
described above and try running the following command, as root:
rcvboxdrv setup
3
2 Installation Details
• vboxdrv
• vboxnetadp
• vboxnetflt
• vboxpci
See your system documentation for details of the kernel module signing process.
The installer will also try to build kernel modules suitable for the current running kernel. If the build
process is not successful you will be shown a warning and the package will be left unconfigured. Look
at /var/log/vbox-install.log to find out why the compilation failed. You may have to install the
appropriate Linux kernel headers, see chapter 2.3.2, The Oracle VM VirtualBox Kernel Modules, page 37.
After correcting any problems, run the following command:
sudo rcvboxdrv setup
• Unpacks the application files to the target directory /opt/VirtualBox/, which cannot be changed.
• Builds and installs the Oracle VM VirtualBox kernel modules: vboxdrv, vboxnetflt, and
vboxnetadp.
• Creates /sbin/rcvboxdrv, an init script to start the Oracle VM VirtualBox kernel module.
• Creates a new system group called vboxusers.
3
2 Installation Details
• Creates symbolic links in /usr/bin to a shell script /opt/VirtualBox/VBox which does some
sanity checks and dispatches to the actual executables: VirtualBox, VBoxVRDP,
VBoxHeadless and VBoxManage.
The installer must be executed as root with either install or uninstall as the first parame- ter. For
example:
sudo ./VirtualBox.run install
Or if you do not have the sudo command available, run the following as root instead:
./VirtualBox.run install
Add every user who needs to access USB devices from a VirtualBox guests to the group
vboxusers. Either use the OS user management tools or run the following command as root:
Note: The usermod command of some older Linux distributions does not support the
-a option, which adds the user to the given group without affecting membership of
other groups. In this case, find out the current group memberships with the groups
command and add all these groups in a comma-separated list to the command line after
the -G option. For example: usermod -G group1,group2,vboxusers username.
This will unpack all the files needed for installation in the directory install under the current directory.
The Oracle VM VirtualBox application files are contained in VirtualBox.tar.bz2 which you can
unpack to any directory on your system. For example:
sudo mkdir /opt/VirtualBox
sudo tar jxf ./install/VirtualBox.tar.bz2 -C /opt/VirtualBox
The sources for Oracle VM VirtualBox’s kernel module are provided in the src directory. To build the
module, change to the directory and use the following command:
make
If everything builds correctly, run the following command to install the module to the appro- priate
module directory:
sudo make install
3
2 Installation Details
In case you do not have sudo, switch the user account to root and run the following command:
make install
The Oracle VM VirtualBox kernel module needs a device node to operate. The above make command
will tell you how to create the device node, depending on your Linux system. The procedure is slightly
different for a classical Linux setup with a /dev directory, a system with the now deprecated devfs and a
modern Linux system with udev.
On certain Linux distributions, you might experience difficulties building the module. You will have to
analyze the error messages from the build system to diagnose the cause of the problems. In general, make sure
that the correct Linux kernel sources are used for the build process.
Note that the /dev/vboxdrv kernel module device node must be owned by root:root and must be
read/writable only for the user.
Next, you install the system initialization script for the kernel module and activate the initial- ization script
using the right method for your distribution, as follows:
cp /opt/VirtualBox/vboxdrv.sh /sbin/rcvboxdrv
This example assumes you installed Oracle VM VirtualBox to the /opt/VirtualBox directory. Create a
configuration file for Oracle VM VirtualBox, as follows:
mkdir /etc/vbox
echo INSTALL_DIR=/opt/VirtualBox > /etc/vbox/vbox.cfg
To manually uninstall Oracle VM VirtualBox, perform the manual installation steps in reverse order.
4
2 Installation Details
The first line enables compilation of the vboxdrv kernel module if no module was found for the current
kernel. The second line enables the package to delete any old vboxdrv kernel modules compiled by
previous installations.
These default settings can be applied prior to the installation of the Oracle VM VirtualBox
Debian package, as follows:
debconf-set-selections vboxconf
In addition there are some common configuration options that can be set prior to the installa- tion. See
chapter 2.3.3.7, Automatic Installation Options, page 41.
If the following line is specified, the package installer will not try to build the vboxdrv kernel module if
no module fitting the current kernel was found.
INSTALL_NO_VBOXDRV=1
4
2 Installation Details
The Oracle VM VirtualBox kernel package is integrated into the main package. Install the
Oracle VM VirtualBox package as follows:
pkgadd -d VirtualBox-<version-number>-SunOS.pkg
The installer will then prompt you to enter the package you wish to install. Choose 1 or all and
proceed. Next the installer will ask you if you want to allow the postinstall script to be executed. Choose
y and proceed, as it is essential to execute this script which installs the Oracle VM VirtualBox kernel module.
Following this confirmation the installer will install Oracle VM VirtualBox and execute the postinstall setup
script.
Once the postinstall script has been executed your installation is now complete. You may now safely
delete the uncompressed package and autoresponse files from your system. Oracle VM VirtualBox is
installed in /opt/VirtualBox.
Note: If you need to use Oracle VM VirtualBox from non-global zones, see chapter
2.4.6, Configuring a Zone for Running Oracle VM VirtualBox, page 43.
Note that adding an active user to the vboxuser group will require the user to log out and then log in
again. This should be done manually after successful installation of the package.
4
2 Installation Details
2.4.4 Uninstallation
Uninstallation of Oracle VM VirtualBox on Oracle Solaris requires root permissions. To perform the
uninstallation, start a root terminal session and run the following command:
pkgrm SUNWvbox
After confirmation, this will remove Oracle VM VirtualBox from your system.
To perform a non-interactive uninstallation, open a root terminal session and run the following command:
pkgrm -n -a /opt/VirtualBox/autoresponse SUNWvbox
Replace vboxzone with the name of the zone where you intend to run Oracle VM VirtualBox. Use
zonecfg to add the device resource and match properties to the zone, as follows:
zonecfg:vboxzone>add device
zonecfg:vboxzone:device>set match=/dev/vboxdrv
zonecfg:vboxzone:device>end
zonecfg:vboxzone>add device
zonecfg:vboxzone:device>set match=/dev/vboxdrvu
zonecfg:vboxzone:device>end
zonecfg:vboxzone>exit
On Oracle Solaris 11 or later, you may also add a device for /dev/vboxusbmon, similar to that shown
above.
If you are not using sparse root zones, you will need to loopback mount /opt/VirtualBox from the
global zone into the non-global zone at the same path. This is specified below using the dir attribute and the
special attribute. For example:
4
2 Installation Details
zonecfg:vboxzone>add fs zonecfg:vboxzone:device>set
dir=/opt/VirtualBox zonecfg:vboxzone:device>set
special=/opt/VirtualBox zonecfg:vboxzone:device>set
type=lofs zonecfg:vboxzone:device>end
zonecfg:vboxzone>exit
Reboot the zone using zoneadm and you should be able to run Oracle VM VirtualBox from within
the configured zone.
4
3 Configuring Virtual Machines
This chapter provides detailed steps for configuring an Oracle VM VirtualBox virtual machine (VM). For
an introduction to Oracle VM VirtualBox and steps to get your first virtual machine running, see chapter 1,
First Steps, page 1.
You have considerable latitude when deciding what virtual hardware to provide to the guest. Use virtual
hardware to communicate with the host system or with other guests. For example, you can use virtual
hardware in the following ways:
• Have Oracle VM VirtualBox present an ISO CD-ROM image to a guest system as if it were a physical
CD-ROM.
• Provide a guest system access to the physical network through its virtual network card.
• Provide the host system, other guests, and computers on the Internet access to the guest system.
• Windows NT 4.0:
– Fully supports all versions, editions, and service packs. Note that you might encounter issues with
some older service packs, so install at least service pack 6a.
– Guest Additions are available with a limited feature set.
• Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server
2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Win-
dows 8.1, Windows Server 2012 R2, Windows 10 (non-Insider Preview releases), Win-
dows Server 2016, Windows Server 2019:
– Fully supports all versions, editions, and service packs, including 64-bit versions.
– Note that you must enable hardware virtualization when running at least Windows 8.
– Guest Additions are available.
• Linux 2.4:
Limited support.
• Linux 2.6:
– Fully supports all versions and editions, both 32-bit and 64-bit.
4
3 Configuring Virtual Machines
Note: Certain Linux kernel releases have bugs that prevent them from executing in a virtual
environment. See chapter 12.4.2, Buggy Linux 2.6 Kernel Versions, page 319.
• FreeBSD:
– Limited support.
– Note that you must enable hardware virtualization when running FreeBSD.
– Guest Additions are not available.
• OpenBSD:
– Supports at least version 3.7.
– Note that you must enable hardware virtualization when running OpenBSD.
– Guest Additions are not available.
• Mac OS X:
– Oracle VM VirtualBox 3.2 added experimental support for Mac OS X guests, with
restrictions. See chapter 3.1.1, Mac OS X Guests, page 46 and chapter 14, Known Limitations,
page 330.
– Guest Additions are not available.
4
3 Configuring Virtual Machines
• Mac OS X is commercial, licensed software and contains both license and technical re-
strictions that limit its use to certain hardware and usage scenarios. You must understand and comply
with these restrictions.
In particular, Apple prohibits the installation of most versions of Mac OS X on non-Apple hardware.
These license restrictions are also enforced on a technical level. Mac OS X verifies that it is running
on Apple hardware. Most DVDs that accompany Apple hardware check for the exact model. These
restrictions are not circumvented by Oracle VM VirtualBox and continue to apply.
• Only CPUs that are known and tested by Apple are supported. As a result, if your Intel CPU is newer
than the Mac OS X build, or if you have a non-Intel CPU, you will likely encounter a panic during
bootup with an “Unsupported CPU” exception.
Ensure that you use the Mac OS X DVD that comes with your Apple hardware.
• The Mac OS X installer expects the hard disk to be partitioned. So, the installer will not offer a
partition selection to you. Before you can install the software successfully, start the Disk Utility from
the Tools menu and partition the hard disk. Close the Disk Utility and proceed with the installation.
• In addition, Mac OS X support in Oracle VM VirtualBox is an experimental feature. See chapter 14,
Known Limitations, page 330.
Warning: Be sure to enable I/O APIC for virtual machines that you intend to use in 64-bit
mode. This is especially true for 64-bit Windows VMs. See chapter 3.4.2, Advanced Tab, page
50. For 64-bit Windows guests, ensure that the VM uses the Intel networking device because
there is no 64-bit driver support for the AMD PCNet card. See chapter 6.1, Virtual Networking
Hardware, page 104.
If you use the Create VM wizard of the VirtualBox Manager, Oracle VM VirtualBox automat- ically
uses the correct settings for each selected 64-bit OS type. See chapter 1.7, Creating Your First Virtual
Machine, page 8.
4
3 Configuring Virtual Machines
• Start the VM. Use the VirtualBox Manager or the VBoxManage startvm command.
When you start the VM, the unattended installation is performed automatically.
The installation operation changes the boot device order to boot the virtual hard disk first and then the
virtual DVD drive. If the virtual hard disk is empty prior to the automatic installation, the VM boots
from the virtual DVD drive and begins the installation.
If the virtual hard disk contains a bootable OS, the installation operation exits. In this case, change the
boot device order manually by pressing F12 during the BIOS splash screen.
chapter 3.2.1, An Example of Unattended Guest Installation, page 48 describes how to perform an unattended
guest installation for an Oracle Linux guest.
# VM="ol7-autoinstall"
# VBoxManage list ostypes
# VBoxManage createvm --name $VM --ostype "Oracle_64" --register
4
3 Configuring Virtual Machines
The VM starts in headless mode, which means that the VirtualBox Manager window does not open.
6. (Optional) Update the guest OS to use the latest Oracle Linux packages.
On the guest VM, run the following command:
# yum update
• Input devices. Oracle VM VirtualBox can emulate a standard PS/2 keyboard and mouse. These
devices are supported by most guest OSes.
In addition, Oracle VM VirtualBox can provide virtual USB input devices to avoid having to capture
mouse and keyboard, as described in chapter 1.8.2, Capturing and Releasing Keyboard and Mouse, page
12.
• Graphics. The default Oracle VM VirtualBox graphics device for Windows guests is an SVGA
device. For Linux guests, the default graphics device emulates a VMware SVGA graphics device.
See chapter 3.6.1, Screen Tab, page 54.
For legacy guest OSes, a VGA-compatible graphics device is available.
4
3 Configuring Virtual Machines
• Storage. Oracle VM VirtualBox emulates the most common types of hard disk controllers. See
chapter 5.1, Hard Disk Controllers, page 88. Whereas supporting only one of these controllers
would be enough for Oracle VM VirtualBox by itself, this multitude of storage adapters is required
for compatibility with other hypervisors. Windows is very selective about its boot devices, and
migrating VMs between hypervisors is very difficult or impossi- ble if the storage controllers are
different.
• Networking. See chapter 6.1, Virtual Networking Hardware, page 104.
• USB. Oracle VM VirtualBox emulates these types of USB host controllers: xHCI, EHCI, and OHCI.
While xHCI handles all USB transfer speeds, some legacy guest OSes may not sup- port xHCI. Note
that for some legacy Windows guests, third party drivers must be installed for xHCI support.
Legacy guest OSes typically support OHCI and EHCI. These two controllers are needed because
OHCI only handles USB low-speed and full-speed devices (both USB 1.x and 2.0), while EHCI only
handles high-speed devices (USB 2.0 only).
The emulated USB controllers do not communicate directly with devices on the host. In- stead they
communicate with a virtual USB layer which abstracts the USB protocol and enables the use of
remote USB devices.
• Audio. See chapter 3.8, Audio Settings, page 58.
• Name: The name of the the VM, as shown in the list of VMs in the main VirtualBox Manager window.
Using this name, Oracle VM VirtualBox also saves the VM’s configuration files. If you change the
name, Oracle VM VirtualBox renames these files as well. As a result, you can only use characters
which are allowed for file names on your host OS.
Note that internally, Oracle VM VirtualBox uses unique identifiers (UUIDs) to identify vir- tual
machines. You can display these using the VBoxManage commands.
• Type: The type of the guest OS for the VM. This is the same setting that is specified in the
New Virtual Machine wizard. See chapter 1.7, Creating Your First Virtual Machine, page
8.
Whereas the default settings of a newly created VM depend on the selected OS type, chang- ing the
type later has no effect on VM settings. This value is purely informational and decorative.
• Version: The version of the guest OS for the VM. This is the same setting that is specified in the
New Virtual Machine wizard. See chapter 1.7, Creating Your First Virtual Machine, page 8.
5
3 Configuring Virtual Machines
• Snapshot Folder: By default, Oracle VM VirtualBox saves snapshot data together with your
other Oracle VM VirtualBox configuration data. See chapter 10.1, Where Oracle VM VirtualBox Stores
its Files, page 301. With this setting, you can specify any other folder for each VM.
• Shared Clipboard: You can select here whether the clipboard of the guest OS should be shared
with that of your host. If you select Bidirectional, then Oracle VM VirtualBox will always make sure
that both clipboards contain the same data. If you select Host to Guest or Guest to Host, then
Oracle VM VirtualBox will only ever copy clipboard data in one direction.
Clipboard sharing requires that the Oracle VM VirtualBox Guest Additions be installed. In such a case,
this setting has no effect. See chapter 4, Guest Additions, page 67.
For security reasons, the shared clipboard is disabled by default. This setting can be changed at
any time using the Shared Clipboard menu item in the Devices menu of the virtual machine.
• Drag and Drop: This setting enables support for drag and drop. Select an object, such as a file, from
the host or guest and directly copy or open it on the guest or host. Multiple drag and drop modes for a
VM enable restricting of access in either direction.
For drag and drop to work the Guest Additions need to be installed on the guest.
Note: Drag and drop is disabled by default. This setting can be changed at any time using the
Drag and Drop menu item in the Devices menu of the virtual machine.
Note: All files related to the virtual machine except disk images are stored unencrypted.
5
3 Configuring Virtual Machines
• Base Memory: Sets the amount of RAM that is allocated and given to the VM when it is running.
The specified amount of memory will be requested from the host OS, so it must be available or made
available as free memory on the host when attempting to start the VM and will not be available to the
host while the VM is running. This is the same setting that was specified in the New Virtual
Machine wizard, as described in chapter 1.7, Creating Your First Virtual Machine, page 8.
Generally, it is possible to change the memory size after installing the guest OS. But you must not
reduce the memory to an amount where the OS would no longer boot.
• Boot Order: Determines the order in which the guest OS will attempt to boot from the various
virtual boot devices. Analogous to a real PC’s BIOS setting, Oracle VM VirtualBox can tell a guest OS
to start from the virtual floppy, the virtual CD/DVD drive, the virtual hard drive (each of these as
defined by the other VM settings), the network, or none of these.
If you select Network, the VM will attempt to boot from a network using the PXE mecha- nism.
This needs to be configured in detail on the command line. See chapter 8.8, VBox- Manage modifyvm,
page 144.
• Chipset: You can select which chipset will be presented to the virtual machine. PIIX3 is the
default chipset for most guests. For some guest OSes such as Mac OS X, the PIIX3 chipset is not
well supported. As a result, Oracle VM VirtualBox supports an emulation of the ICH9 chipset,
which supports PCI express, three PCI buses, PCI-to-PCI bridges and Message Signaled Interrupts
(MSI). This enables modern OSes to address more PCI devices and no longer requires IRQ sharing.
Using the ICH9 chipset it is also possible to configure up to 36 network cards, compared to a
maximum of eight network adapters with PIIX3. Note that ICH9 support is experimental and not
recommended for guest OSes which do not require it.
• Pointing Device: The default virtual pointing device for some guest OSes is the traditional PS/2
mouse. If set to USB Tablet, Oracle VM VirtualBox reports to the virtual machine that a USB
tablet device is present and communicates mouse events to the virtual machine through this device.
Another setting is USB Multi-Touch Tablet, which is suitable for guests running Windows 8 or later.
Using the virtual USB tablet has the advantage that movements are reported in absolute coordinates,
instead of as relative position changes. This enables Oracle VM VirtualBox to translate mouse events
over the VM window into tablet events without having to “capture” the mouse in the guest as
described in chapter 1.8.2, Capturing and Releasing Keyboard and Mouse, page 12. This makes using the
VM less tedious even if Guest Additions are not installed.
• Enable I/O APIC: Advanced Programmable Interrupt Controllers (APICs) are an x86 hard- ware
feature that have replaced Programmable Interrupt Controllers (PICs). With an I/O APIC, OSes can use
more than 16 interrupt requests (IRQs) and therefore avoid IRQ shar- ing for improved reliability.
Note: Enabling the I/O APIC is required, especially for 64-bit Windows guest OSes. It is also
required if you want to use more than one virtual CPU in a virtual machine.
5
3 Configuring Virtual Machines
However, software support for I/O APICs has been unreliable with some OSes other than Windows.
Also, the use of an I/O APIC slightly increases the overhead of virtualization and therefore slows down
the guest OS a little.
Warning: All Windows OSes install different kernels, depending on whether an I/O APIC is
available. As with ACPI, the I/O APIC therefore must not be turned off after installation of a
Windows guest OS. Turning it on after installation will have no effect however.
• Enable EFI: Enables Extensible Firmware Interface (EFI), which replaces the legacy BIOS and may
be useful for certain advanced use cases. See chapter 3.14, Alternative Firmware (EFI), page 63.
• Hardware Clock in UTC Time: If selected, Oracle VM VirtualBox will report the system time in
UTC format to the guest instead of the local (host) time. This affects how the virtual real-time clock
(RTC) operates and may be useful for UNIX-like guest OSes, which typically expect the hardware
clock to be set to UTC.
In addition, you can turn off the Advanced Configuration and Power Interface (ACPI) which
Oracle VM VirtualBox presents to the guest OS by default.
ACPI is the current industry standard to allow OSes to recognize hardware, configure moth- erboards and
other devices and manage power. As most computers contain this feature and Windows and Linux
support ACPI, it is also enabled by default in Oracle VM VirtualBox. ACPI can only be turned off using the
command line. See chapter 8.8, VBoxManage modifyvm, page
144.
Warning: All Windows OSes install different kernels, depending on whether ACPI is available.
This means that ACPI must not be turned off after installation of a Windows guest OS. However,
turning it on after installation will have no effect.
• Processor(s): Sets the number of virtual CPU cores the guest OSes can see. Oracle VM
VirtualBox supports symmetrical multiprocessing (SMP) and can present up to 32 virtual CPU cores
to each virtual machine.
You should not configure virtual machines to use more CPU cores than are available physi- cally. This
includes real cores, with no hyperthreads.
• Execution Cap: Configures the CPU execution cap. This limits the amount of time a host CPU
spends to emulate a virtual CPU. The default setting is 100%, meaning that there is no limitation. A
setting of 50% implies a single virtual CPU can use up to 50% of a single host CPU. Note that limiting
the execution time of the virtual CPUs may cause guest timing problems.
A warning is displayed at the bottom of the Processor tab if an Execution Cap setting is made that
may affect system performance.
• Enable PAE/NX: Determines whether the PAE and NX capabilities of the host CPU will be exposed
to the virtual machine.
5
3 Configuring Virtual Machines
PAE stands for Physical Address Extension. Normally, if enabled and supported by the OS, then even a
32-bit x86 CPU can access more than 4 GB of RAM. This is made possible by adding another 4
bits to memory addresses, so that with 36 bits, up to 64 GB can be addressed. Some OSes, such as
Ubuntu Server, require PAE support from the CPU and cannot be run in a virtual machine without it.
• Enable Nested VT-x/AMD-V: Enables nested virtualization, with passthrough of hardware
virtualization functions to the guest VM.
With virtual machines running modern server OSes, Oracle VM VirtualBox also supports CPU
hot-plugging. For details, see chapter 9.4, CPU Hot-Plugging, page 246.
5
3 Configuring Virtual Machines
• Monitor Count: With this setting, Oracle VM VirtualBox can provide more than one virtual monitor
to a virtual machine. If a guest OS supports multiple attached monitors, Oracle VM VirtualBox can
pretend that multiple virtual monitors are present. Up to eight such virtual monitors are supported.
The output of the multiple monitors are displayed on the host in multiple VM windows which are
running side by side. However, in full screen and seamless mode, they use the available physical
monitors attached to the host. As a result, for full screen and seamless modes to work with multiple
monitors, you will need at least as many physical monitors as you have virtual monitors configured, or
Oracle VM VirtualBox will report an error.
You can configure the relationship between guest and host monitors using the View menu by pressing
Host key + Home when you are in full screen or seamless mode.
See also chapter 14, Known Limitations, page 330.
• Scale Factor: Enables scaling of the display size. For multiple monitor displays, you can set the scale
factor for individual monitors, or globally for all of the monitors. Use the slider to select a scaling
factor up to 200%.
You can set a default scale factor for all VMs. Use the Display tab in the Global Settings dialogs.
• Graphics Controller: Specifies the graphics adapter type used by the guest VM. Note that you must
install the Guest Additions on the guest VM to specify the VBoxSVGA or VMSVGA graphics controller.
The following options are available:
– VBoxSVGA: The default graphics controller for new VMs that use Windows 7 or later. This
graphics controller improves performance and 3D support when compared to the
legacy VBoxVGA option.
– VBoxVGA: Use this graphics controller for legacy guest OSes. This is the default graphics
controller for Windows versions before Windows 7 and for Oracle Solaris.
3D acceleration is not supported for this graphics controller.
– VMSVGA: Use this graphics controller to emulate a VMware SVGA graphics device. This is the
default graphics controller for Linux guests.
– None: Does not emulate a graphics adapter type.
• Enable 3D Acceleration: If a virtual machine has Guest Additions installed, you can se- lect here
whether the guest should support accelerated 3D graphics. See chapter 4.5.1, Hardware 3D
Acceleration (OpenGL and Direct3D 8/9), page 79.
• Enable 2D Video Acceleration: If a virtual machine with Microsoft Windows has Guest
Additions installed, you can select here whether the guest should support accelerated 2D video
graphics. See chapter 4.5.2, Hardware 2D Video Acceleration for Windows Guests, page 80.
• Enable Server: Select this check box and configure settings for the remote display connec- tion.
5
3 Configuring Virtual Machines
• Enable Recording: Select this check box and select a Recording Mode option.
• Recording Mode: You can choose to record video, audio, or both video and audio.
Some settings on the Recording tab may be grayed out, depending on the Recording Mode
setting.
• File Path: The file where the recording is saved.
• Frame Size: The video resolution of the recorded video, in pixels. The drop-down list enables
you to select from common frame sizes.
• Frame Rate: Use the slider to set the maximum number of video frames per second (FPS) to record.
Frames that have a higher frequency are skipped. Increasing this value reduces the number of skipped
frames and increases the file size.
• Video Quality: Use the slider to set the the bit rate of the video in kilobits per second. Increasing
this value improves the appearance of the video at the cost of an increased file size.
• Audio Quality: Use the slider to set the quality of the audio recording. Increasing this value
improves the audio quality at the cost of an increased file size.
• Screens: For a multiple monitor display, you can select which screens to record video from. As you
adjust the video and audio recording settings, the approximate output file size for a
five minute video is shown.
3.7 Storage
Settings
The Storage category in the VM settings enables you to connect virtual hard disk, CD/DVD, and floppy
images and drives to your virtual machine.
In a real computer, so-called storage controllers connect physical disk drives to the rest of the
computer. Similarly, Oracle VM VirtualBox presents virtual storage controllers to a virtual machine.
Under each controller, the virtual devices, such as hard disks, CD/DVD or floppy drives, attached to the
controller are shown.
Note: This section gives a quick introduction to the Oracle VM VirtualBox storage settings.
See chapter 5, Virtual Storage, page 88 for a full description of the available storage settings in
Oracle VM VirtualBox.
If you have used the Create VM wizard to create a machine, you will normally see something like the
following:
5
3 Configuring Virtual Machines
Depending on the guest OS type that you selected when you created the VM, a new VM
includes the following storage devices:
• IDE controller. A virtual CD/DVD drive is attached to the secondary master port of the
IDE controller.
• SATA controller. This is a modern type of storage controller for higher hard disk data
throughput, to which the virtual hard disks are attached. Initially you will normally have one such
virtual disk, but as shown in the previous screenshot, you can have more than one. Each is
represented by a disk image file, such as a VDI file in this example.
If you created your VM with an older version of Oracle VM VirtualBox, the default storage layout may
differ. You might then only have an IDE controller to which both the CD/DVD drive and the hard disks
have been attached. This might also apply if you selected an older OS type when you created the VM.
Since older OSes do not support SATA without additional drivers, Oracle VM VirtualBox will make sure
that no such devices are present initially. See chapter 5.1, Hard Disk Controllers, page 88.
Oracle VM VirtualBox also provides a floppy controller. You cannot add devices other than floppy
drives to this controller. Virtual floppy drives, like virtual CD/DVD drives, can be con- nected to either a
host floppy drive, if you have one, or a disk image, which in this case must be in RAW format.
You can modify these media attachments freely. For example, if you wish to copy some files from
another virtual disk that you created, you can connect that disk as a second hard disk, as in the above
screenshot. You could also add a second virtual CD/DVD drive, or change where these items are attached.
The following options are available:
• To add another virtual hard disk, or a CD/DVD or floppy drive, select the storage con-
troller to which it should be added (such as IDE, SATA, SCSI, SAS, floppy controller) and then click
the Add Disk button below the tree. You can then either select Optical Drive or Hard Disk. If
you clicked on a floppy controller, you can add a floppy drive instead. Alternatively, right-click on
the storage controller and select a menu item there.
A dialog is displayed, enabling you to select an existing disk image file or to create a new disk image
file. Depending on the type of disk image, the dialog is called Hard Disk Selector, Optical
Disk Selector, or Floppy Disk Selector.
See chapter 5.2, Disk Image Files (VDI, VMDK, VHD, HDD), page 91 for information on the image
file types that are supported by Oracle VM VirtualBox.
5
3 Configuring Virtual Machines
For virtual CD/DVD drives, the image files will typically be in the standard ISO format instead.
Most commonly, you will select this option when installing an OS from an ISO file that you have
obtained from the Internet. For example, most Linux distributions are available in this way.
Depending on the type of disk image, you can set the following Attributes for the disk image in
the right part of the Storage settings page:
– The device slot of the controller that the virtual disk is connected to. IDE controllers have four
slots which have traditionally been called primary master, primary slave, secondary master, and
secondary slave. By contrast, SATA and SCSI controllers offer you up to 30 slots for attaching
virtual devices.
– Solid-state Drive presents a virtual disk to the guest as a solid-state device.
– Hot-pluggable presents a virtual disk to the guest as a hot-pluggable device.
– For virtual CD/DVD drives, you can select Live CD/DVD. This means that the virtual optical
disk is not removed from when the guest system ejects it.
• To remove an attachment, either select it and click on the Remove icon at the bottom, or right-
click on it and select the menu item.
Removable media, such as CD/DVDs and floppies, can be changed while the guest is running. Since the
Settings dialog is not available at that time, you can also access these settings from the Devices menu of
your virtual machine window.
• Host Audio Driver: The audio driver that Oracle VM VirtualBox uses on the host. On a Linux
host, depending on your host configuration, you can select between the OSS, ALSA, or the PulseAudio
subsystem. On newer Linux distributions, the PulseAudio subsystem is preferred.
Only OSS is supported on Oracle Solaris hosts. The Oracle Solaris Audio audio backend is no longer
supported on Oracle Solaris hosts.
• Audio Controller: You can choose between the emulation of an Intel AC’97 controller, an
Intel HD Audio controller, or a SoundBlaster 16 card.
• Enable Audio Output: Enables audio output only for the VM.
• Enable Audio Input: Enables audio input only for the VM.
5
3 Configuring Virtual Machines
This default setup is good for the majority of Oracle VM VirtualBox users. However, Oracle VM
VirtualBox is extremely flexible in how it can virtualize networking. It supports many virtual network cards
per virtual machine. The first four virtual network cards can be configured in detail in the VirtualBox
Manager window. Additional network cards can be configured using the VBoxManage command.
Many networking options are available. See chapter 6, Virtual Networking, page 104 for more
information.
1. Port Number: This determines the serial port that the virtual machine should see. For best results, use
the traditional values as follows:
• COM1: I/O base 0x3F8, IRQ 4
• COM2: I/O base 0x2F8, IRQ 3
• COM3: I/O base 0x3E8, IRQ 4
• COM4: I/O base 0x2E8, IRQ 3
You can also configure a user-defined serial port. Enter an I/O base address and interrupt
(IRQ).
2. Port Mode: What the virtual port is connected to. For each virtual serial port, you have the
following options:
• Disconnected: The guest will see the device, but it will behave as if no cable had been
connected to it.
• Host Device: Connects the virtual serial port to a physical serial port on your host. On a
Windows host, this will be a name like COM1. On Linux or Oracle Solaris hosts, it will be a device
node like /dev/ttyS0. Oracle VM VirtualBox will then simply redirect all data received from
and sent to the virtual serial port to the physical device.
• Host Pipe: Configure Oracle VM VirtualBox to connect the virtual serial port to a software
pipe on the host. This depends on your host OS, as follows:
5
3 Configuring Virtual Machines
– On a Windows host, data will be sent and received through a named pipe. The pipe name
must be in the format \\.\pipe\name where name should identify the virtual machine
but may be freely chosen.
– On a Mac OS, Linux, or Oracle Solaris host, a local domain socket is used in- stead. The
socket filename must be chosen such that the user running Oracle VM VirtualBox has
sufficient privileges to create and write to it. The /tmp directory is often a good candidate.
On Linux there are various tools which can connect to a local domain socket or create one
in server mode. The most flexible tool is socat and is available as part of many
distributions.
In this case, you can configure whether Oracle VM VirtualBox should create the named pipe, or
the local domain socket non-Windows hosts, itself or whether Oracle VM VirtualBox should
assume that the pipe or socket exists already. With the VBoxManage command-line options, this
is referred to as server mode or client mode, respectively.
For a direct connection between two virtual machines, corresponding to a null-modem cable,
simply configure one VM to create a pipe or socket and another to attach to it.
• Raw File: Send the virtual serial port output to a file. This option is very useful for capturing
diagnostic output from a guest. Any file may be used for this purpose, as long as the user
running Oracle VM VirtualBox has sufficient privileges to create and write to the file.
• TCP Socket: Useful for forwarding serial traffic over TCP/IP, acting as a server, or it can act
as a TCP client connecting to other servers. This option enables a remote machine to directly
connect to the guest’s serial port using TCP.
– TCP Server: Deselect the Connect to Existing Pipe/Socket check box and spec- ify
the port number in the Path/Address field. This is typically 23 or 2023. Note that on
UNIX-like systems you will have to use a port a number greater than 1024 for regular users.
The client can use software such as PuTTY or the telnet command line tool to access
the TCP Server.
– TCP Client: To create a virtual null-modem cable over the Internet or LAN, the
other side can connect using TCP by specifying hostname:port in the
Path/Address field. The TCP socket will act in client mode if you select the
Connect to Existing Pipe/Socket check box.
Up to four serial ports can be configured per virtual machine, but you can pick any port numbers out
of the above. However, serial ports cannot reliably share interrupts. If both ports are to be used at the same
time, they must use different interrupt levels, for example COM1 and COM2, but not COM1 and COM3.
6
3 Configuring Virtual Machines
Note:
• Be careful with USB devices that are currently in use on the host. For example, if you allow
your guest to connect to your USB hard disk that is currently mounted on the host, when
the guest is activated, it will be disconnected from the host without a proper shutdown.
This may cause data loss.
• Oracle Solaris hosts have a few known limitations regarding USB support. See chapter 14,
Known Limitations, page 330.
In addition to allowing a guest access to your local USB devices, Oracle VM VirtualBox even enables
your guests to connect to remote USB devices by use of the VirtualBox Remote Desktop Extension (VRDE).
See chapter 7.1.4, Remote USB, page 120.
To enable USB for a VM, select the Enable USB Controller check box. The following settings are
available:
• USB Controller: Selects a controller with the specified level of USB support, as follows:
– OHCI for USB 1.1
– EHCI for USB 2.0. This also enables OHCI.
– xHCI for USB 3.0. This supports all USB speeds.
Note: The xHCI and EHCI controllers are shipped as an Oracle VM VirtualBox extension package,
which must be installed separately. See chapter 1.5, Installing Oracle VM VirtualBox and
Extension Packs, page 6.
• USB Device Filters: When USB support is enabled for a VM, you can determine in detail which
devices will be automatically attached to the guest. For this, you can create filters by specifying certain
properties of the USB device. USB devices with a matching filter will be automatically passed to the
guest once they are attached to the host. USB devices without a matching filter can be passed manually
to the guest, for example by using the Devices, USB menu.
Clicking on the + button to the right of the USB Device Filters window creates a new filter.
You can give the filter a name, for later reference, and specify the filter criteria. The more criteria you
specify, the more precisely devices will be selected. For instance, if you specify only a vendor ID of
046d, all devices produced by Logitech will be available to the guest. If you fill in all fields, on the
other hand, the filter will only apply to a particular device model from a particular vendor, and not
even to other devices of the same type with a different revision and serial number.
In detail, the following criteria are available:
– Vendor and Product ID. With USB, each vendor of USB products carries an identi- fication
number that is unique world-wide, called the vendor ID. Similarly, each line of products is
assigned a product ID number. Both numbers are commonly written in hexadecimal, and a
colon separates the vendor from the product ID. For example,
046d:c016 stands for Logitech as a vendor, and the M-UV69a Optical Wheel Mouse product.
Alternatively, you can also specify Manufacturer and Product by name.
To list all the USB devices that are connected to your host machine with their respec- tive vendor
IDs and product IDs, use the following command:
VBoxManage list usbhost
6
3 Configuring Virtual Machines
On Windows, you can also see all USB devices that are attached to your system in the
Device Manager. On Linux, you can use the lsusb command.
– Serial Number. While vendor ID and product ID are quite specific to identify USB
devices, if you have two identical devices of the same brand and product line, you will also
need their serial numbers to filter them out correctly.
– Remote. This setting specifies whether the device will be local only, remote only, such as over
VRDP, or either.
On a Windows host, you will need to unplug and reconnect a USB device to use it after creating a
filter for it.
As an example, you could create a new USB filter and specify a vendor ID of 046d for Logitech,
Inc, a manufacturer index of 1, and “not remote”. Then any USB devices on the host system produced
by Logitech, Inc with a manufacturer index of 1 will be visible to the guest system.
Several filters can select a single device. For example, a filter which selects all Logitech devices,
and one which selects a particular webcam.
You can deactivate filters without deleting them by deselecting the check box next to the filter name.
3.12 Shared
Folders
Shared folders enable you to easily exchange data between a virtual machine and your host. This feature
requires that the Oracle VM VirtualBox Guest Additions be installed in a virtual machine and is described in
detail in chapter 4.3, Shared Folders, page 74.
3.13 User
Interface
The User Interface section enables you to change certain aspects of the user interface of this
VM.
• Menu Bar: This widget enables you to disable menus by clicking on the menu to release it, menu
entries by deselecting the check box of the entry to disable it and the complete menu bar by
deselecting the rightmost check box.
• Mini ToolBar: In full screen or seamless mode, Oracle VM VirtualBox can display a small toolbar
that contains some of the items that are normally available from the virtual ma- chine’s menu bar.
This toolbar reduces itself to a small gray line unless you move the mouse over it. With the toolbar,
you can return from full screen or seamless mode, control machine execution or enable certain
devices. If you do not want to see the toolbar, disable this setting.
6
3 Configuring Virtual Machines
The second setting enables you to show the toolbar at the top of the screen, instead of showing it at
the bottom.
• Status Bar: This widget enables you to disable icons on the status bar by deselecting the check box
of an icon to disable it, to rearrange icons by dragging and dropping the icon, and to disable the
complete status bar by deselecting the leftmost check box.
One notable user of EFI is Apple Mac OS X. More recent Linux versions and Windows releases, starting
with Vista, also offer special versions that can be booted using EFI.
Another possible use of EFI in Oracle VM VirtualBox is development and testing of EFI appli- cations,
without booting any OS.
Note that the Oracle VM VirtualBox EFI support is experimental and will be enhanced as EFI matures
and becomes more widespread. Mac OS X, Linux, and newer Windows guests are known to work fine.
Windows 7 guests are unable to boot with the Oracle VM VirtualBox EFI implementation.
Determine the horizontal resolution H and the vertical resolution V from the following list of default
resolutions:
VGA
6
3 Configuring Virtual Machines
XGA+
6
3 Configuring Virtual Machines
QH
6
3 Configuring Virtual Machines
If this list of default resolution does not cover your needs, see chapter 9.6.1, Custom VESA Resolutions,
page 248. Note that the color depth value specified in a custom video mode must be specified. Color
depths of 8, 16, 24, and 32 are accepted. EFI assumes a color depth of 32 by default.
The EFI default video resolution settings can only be changed when the VM is powered off.
6
4 Guest Additions
The previous chapter covered getting started with Oracle VM VirtualBox and installing operating systems in a
virtual machine. For any serious and interactive use, the Oracle VM VirtualBox Guest Additions will make
your life much easier by providing closer integration between host and guest and improving the interactive
performance of guest systems. This chapter describes the Guest Additions in detail.
6
4 Guest Additions
• Generic host/guest communication channels. The Guest Additions enable you to control and
monitor guest execution. The guest properties provide a generic string-based mecha- nism to exchange
data bits between a guest and a host, some of which have special mean- ings for controlling and
monitoring the guest. See chapter 4.7, Guest Properties, page 81.
Additionally, applications can be started in a guest from the host. See chapter 4.9, Guest
Control of Applications, page 84.
• Time synchronization. With the Guest Additions installed, Oracle VM VirtualBox can ensure
that the guest’s system time is better synchronized with that of the host.
For various reasons, the time in the guest might run at a slightly different rate than the time on the
host. The host could be receiving updates through NTP and its own time might not run linearly. A VM
could also be paused, which stops the flow of time in the guest for a shorter or longer period of time.
When the wall clock time between the guest and host only differs slightly, the time synchronization
service attempts to gradually and smoothly adjust the guest time in small increments to either catch up
or lose time. When the difference is too great, for example if a VM paused for hours or restored
from saved state, the guest time is changed immediately, without a gradual adjustment.
The Guest Additions will resynchronize the time regularly. See chapter 9.11.3, Tuning the Guest
Additions Time Synchronization Parameters, page 258 for how to configure the parameters of the time
synchronization mechanism.
• Shared clipboard. With the Guest Additions installed, the clipboard of the guest operating system
can optionally be shared with your host operating system. See chapter 3.4, General Settings, page 50.
• Automated logins. Also called credentials passing. See chapter 9.1, Automated Guest
Logins, page 240.
Each version of Oracle VM VirtualBox, even minor releases, ship with their own version of the Guest
Additions. While the interfaces through which the Oracle VM VirtualBox core communi- cates with the
Guest Additions are kept stable so that Guest Additions already installed in a VM should continue to work
when Oracle VM VirtualBox is upgraded on the host, for best results, it is recommended to keep the Guest
Additions at the same version.
The Windows and Linux Guest Additions therefore check automatically whether they have to be
updated. If the host is running a newer Oracle VM VirtualBox version than the Guest Additions, a
notification with further instructions is displayed in the guest.
To disable this update check for the Guest Additions of a given virtual machine, set the value of its
/VirtualBox/GuestAdd/CheckHostVersion guest property to 0. See chapter 4.7, Guest Properties,
page 81.
6
4 Guest Additions
Note: For the basic Direct3D acceleration to work in a Windows guest, you have to install the
WDDM video driver available for Windows Vista or later.
For Windows 8 and later, only the WDDM Direct3D video driver is available. For basic Direct3D
acceleration to work in Windows XP guests, you have to install the Guest Additions in Safe
Mode. See chapter 14, Known Limitations, page 330 for details.
If you prefer to mount the Guest Additions manually, you can perform the following steps:
6
4 Guest Additions
Unless you have the Autostart feature disabled in your Windows guest, Windows will now autostart the
Oracle VM VirtualBox Guest Additions installation program from the Additions ISO. If the Autostart
feature has been turned off, choose VBoxWindowsAdditions.exe from the CD/DVD drive inside the
guest to start the installer.
The installer will add several device drivers to the Windows driver database and then invoke the hardware
detection wizard.
Depending on your configuration, it might display warnings that the drivers are not digitally signed. You
must confirm these in order to continue the installation and properly install the Additions.
After installation, reboot your guest operating system to activate the Additions.
For each, choose the option to provide your own driver, click Have Disk and navigate to the
CD-ROM drive with the Guest Additions.
Note: On some Windows versions, such as Windows 2000 and Windows XP, the user
intervention popups mentioned above are always displayed, even after importing the Oracle
certificates.
Installing the code signing certificates on a Windows guest can be done automatically. Use the
VBoxCertUtil.exe utility from the cert folder on the Guest Additions installation CD. Use the
following steps:
This command installs the certificates to the certificate store. When installing the same certificate
more than once, an appropriate error will be displayed.
To allow for completely unattended guest installations, you can specify a command line pa- rameter to
the install launcher:
7
4 Guest Additions
VBoxWindowsAdditions.exe /S
This automatically installs the right files and drivers for the corresponding platform, either
32-bit or 64-bit.
Note: By default on an unattended installation on a Vista or Windows 7 guest, there will be the
XPDM graphics driver installed. This graphics driver does not support Win- dows Aero /
Direct3D on the guest. Instead, the WDDM graphics driver needs to be installed. To select this
driver by default, add the command line parameter /with_wddm when invoking the Windows
Guest Additions installer. This is only required for Vista and Windows 7.
Note: For Windows Aero to run correctly on a guest, the guest’s VRAM size needs to be
configured to at least 128 MB.
For more options regarding unattended guest installations, consult the command line help by using the
command:
VBoxWindowsAdditions.exe /?
To explicitly extract the Windows Guest Additions for another platform than the current run- ning one,
such as 64-bit files on a 32-bit system, you must use the appropriate platform in- staller. Use
VBoxWindowsAdditions-x86.exe or VBoxWindowsAdditions-amd64.exe with the
/extract parameter.
Many other distributions are known to work with the Guest Additions.
The version of the Linux kernel supplied by default in SUSE and openSUSE 10.2, Ubuntu 6.10 (all versions)
and Ubuntu 6.06 (server edition) contains a bug which can cause it to crash during startup when it is run in a
virtual machine. The Guest Additions work in those distributions.
Note that some Linux distributions already come with all or part of the Oracle VM VirtualBox
Guest Additions. You may choose to keep the distribution’s version of the Guest Additions but
7
4 Guest Additions
these are often not up to date and limited in functionality, so we recommend replacing them with the Guest
Additions that come with Oracle VM VirtualBox. The Oracle VM VirtualBox Linux Guest Additions installer
tries to detect an existing installation and replace them but depending on how the distribution integrates the
Guest Additions, this may require some manual interaction. It is highly recommended to take a snapshot of
the virtual machine before replacing preinstalled Guest Additions.
1. Before installing the Guest Additions, you prepare your guest system for building external kernel
modules. This works as described in chapter 2.3.2, The Oracle VM VirtualBox Kernel Modules, page
37, except that this step must be performed in your Linux guest instead of on a Linux host system.
If you suspect that something has gone wrong, check that your guest is set up correctly and run the
following command as root:
rcvboxadd setup
2. Insert the VBoxGuestAdditions.iso CD file into your Linux guest’s virtual CD-ROM drive, as
described for a Windows guest in chapter 4.2.1.1, Installing the Windows Guest Additions, page 69.
3. Change to the directory where your CD-ROM drive is mounted and run the following com- mand as
root:
sh ./VBoxLinuxAdditions.run
7
4 Guest Additions
While this will normally work without issues, you may need to do some manual cleanup of the guest in
some cases, especially of the XFree86Config or xorg.conf file. In particular, if the Additions version
installed or the guest operating system were very old, or if you made your own changes to the Guest Additions
setup after you installed them.
You can uninstall the Additions as follows:
/opt/VBoxGuestAdditions-<version>/uninstall.sh
1. Mount the VBoxGuestAdditions.iso file as your Oracle Solaris guest’s virtual CD-ROM drive,
exactly the same way as described for a Windows guest in chapter 4.2.1.1, Installing the Windows Guest
Additions, page 69.
If the CD-ROM drive on the guest does not get mounted, as seen with some versions of
Oracle Solaris 10, run the following command as root:
2. Change to the directory where your CD-ROM drive is mounted and run the following com- mand as
root:
7
4 Guest Additions
pkgadd -G -d ./VBoxSolarisAdditions.pkg
3. Choose 1 and confirm installation of the Guest Additions package. After the installation is complete,
log out and log in to X server on your guest, to activate the X11 Guest Additions.
4.3 Shared
Folders
With the shared folders feature of Oracle VM VirtualBox, you can access files of your host system from within
the guest system. This is similar to how you would use network shares in Windows networks, except that
shared folders do not require networking, only the Guest Additions. Shared folders are supported with
Windows 2000 or later, Linux, and Oracle Solaris guests. Oracle VM VirtualBox includes experimental
support for Mac OS X and OS/2 guests.
Shared folders physically reside on the host and are then shared with the guest, which uses a special file
system driver in the Guest Additions to talk to the host. For Windows guests, shared folders are implemented
as a pseudo-network redirector. For Linux and Oracle Solaris guests, the Guest Additions provide a virtual
file system.
To share a host folder with a virtual machine in Oracle VM VirtualBox, you must specify the path of the
folder and choose a share name that the guest can use to access the shared folder. This happens on the host.
In the guest you can then use the share name to connect to it and access files.
There are several ways in which shared folders can be set up for a virtual machine:
• In the window of a running VM, you select Shared Folders from the Devices menu, or click on
the folder icon on the status bar in the bottom right corner.
• If a VM is not currently running, you can configure shared folders in the virtual machine’s
Settings dialog.
• From the command line, you can create shared folders using VBoxManage, as follows:
7
4 Guest Additions
See chapter 8.31, VBoxManage sharedfolder add/remove, page 184. There are
Shared folders can either be read-write or read-only. This means that the guest is either allowed to
both read and write, or just read files on the host. By default, shared folders are read-write. Read-only
folders can be created using a checkbox in the VirtualBox Manager, or with the --readonly option of
the VBoxManage sharedfolder add command.
Oracle VM VirtualBox shared folders also support symbolic links, also called symlinks, under the
following conditions:
• The host operating system must support symlinks. For example, a Mac OS X, Linux, or
Oracle Solaris host is required.
• Currently only Linux and Oracle Solaris Guest Additions support symlinks.
• For security reasons the guest OS is not allowed to create symlinks by default. If you trust the guest OS
to not abuse the functionality, you can enable creation of symlinks for a shared folder as follows:
• In a Windows guest, shared folders are browseable and therefore visible in Windows Ex- plorer. To
attach the host’s shared folder to your Windows guest, open Windows Explorer and look for the
folder in My Networking Places, Entire Network, Oracle VM VirtualBox Shared Folders.
By right-clicking on a shared folder and selecting Map Network Drive from the menu that pops
up, you can assign a drive letter to that shared folder.
Alternatively, on the Windows command line, use the following command:
While vboxsvr is a fixed name, note that vboxsrv would also work, replace x: with the
drive letter that you want to use for the share, and sharename with the share name specified with
VBoxManage.
To mount a shared folder during boot, add the following entry to /etc/fstab:
7
4 Guest Additions
Replace sharename, use a lowercase string, with the share name specified with
VBoxManage or the VirtualBox Manager. Replace mountpoint with the path where you want
the share to be mounted on the guest, such as /mnt/share. The usual mount rules apply. For
example, create this directory first if it does not exist yet.
Here is an example of mounting the shared folder for the user jack on Oracle Solaris:
$ id
uid=5000(jack) gid=1(other)
$ mkdir /export/home/jack/mount
$ pfexec mount -F vboxfs -o uid=5000,gid=1 jackshare /export/home/jack/mount
$ cd ~/mount
$ ls
sharedfile1.mp3 sharedfile2.txt
$
Beyond the standard options supplied by the mount command, the following are available:
iocharset CHARSET
This option sets the character set used for I/O operations. Note that on Linux guests, if the iocharset
option is not specified, then the Guest Additions driver will attempt to use the character set specified
by the CONFIG_NLS_DEFAULT kernel option. If this option is not set either, then UTF-8 is used.
convertcp CHARSET
This option specifies the character set used for the shared folder name. This is UTF-8 by default.
The generic mount options, documented in the mount manual page, apply also. Especially useful are
the options uid, gid and mode, as they can allow access by normal users in read/write mode,
depending on the settings, even if root has mounted the filesystem.
• In an OS/2 guest, use the VBoxControl command to manage shared folders. For example:
As with Windows guests, shared folders can also be accessed via UNC using \\VBoxSF\,
\\VBoxSvr\ or \\VBoxSrv\ as the server name and the shared folder name as sharename.
• Windows and OS/2 guests. Search for a free drive letter, starting at Z:. If all drive letters are
assigned, the folder is not mounted.
7
4 Guest Additions
• Linux and Oracle Solaris guests. Folders are mounted under the /media directory. The
folder name is normalized (no spaces, slashes or colons) and is prefixed with sf_.
For example, if you have a shared folder called myfiles, it will appear as
/media/sf_myfiles in the guest.
The guest properties /VirtualBox/GuestAdd/SharedFolders/MountDir and the more
generic /VirtualBox/GuestAdd/SharedFolders/MountPrefix can be used to override the
automatic mount directory and prefix. See chapter 4.7, Guest Properties, page 81.
Access to an automatically mounted shared folder is granted to everyone in a Windows guest, including
the guest user. For Linux and Oracle Solaris guests, access is restricted to members of the group vboxsf and
the root user.
Note: At the moment only copying of data is supported. Moving or linking is not yet
implemented.
When transferring data from the host to the guest OS, the host in this case is the source, whereas the
guest OS is the target. However, when transferring data from the guest OS to the host, the guest OS this
time became the source and the host is the target.
For security reasons drag and drop can be configured at runtime on a per-VM basis either using the Drag
and Drop menu item in the Devices menu of the virtual machine, as shown below, or the VBoxManage
command.
7
4 Guest Additions
Note: Drag and drop support depends on the frontend being used. At the moment, only the
VirtualBox Manager frontend provides this functionality.
To use the VBoxManage command to control the current drag and drop mode, see chapter
8, VBoxManage, page 128. The modifyvm and controlvm commands enable setting of a VM’s
current drag and drop mode from the command line.
Note: When dragging files no data conversion is done in any way. For example, when
transferring a file from a Linux guest to a Windows host the Linux-specific line endings are not
converted to Windows line endings.
The following formats are handled by the Oracle VM VirtualBox drag and drop service:
• Plain text: From applications such as text editors, internet browsers and terminal win- dows.
• Files: From file managers such as Windows Explorer, Nautilus, and Finder.
• Directories: For directories, the same formats apply as for files.
7
4 Guest Additions
• It is only available for certain Windows, Linux, and Oracle Solaris guests. In particular:
– 3D acceleration with Windows guests requires Windows 2000 or later. Apart from on Windows
2000 guests, both OpenGL and Direct3D 8/9 are supported on an experi- mental basis.
– OpenGL on Linux requires kernel 2.6.27 or later, as well as X.org server version 1.5 or later.
Ubuntu 10.10 and Fedora 14 have been tested and confirmed as working.
– OpenGL on Oracle Solaris guests requires X.org server version 1.5 or later.
• The Guest Additions must be installed.
Note: For the basic Direct3D acceleration to work in a Windows Guest, Oracle VM
VirtualBox needs to replace Windows system files in the virtual machine. As a result, the Guest
Additions installation program offers Direct3D acceleration as an option that must be explicitly
enabled. Also, you must install the Guest Additions in Safe Mode. This does not apply to the
WDDM Direct3D video driver available for Windows Vista and later. See chapter 14, Known
Limitations, page 330 for details.
• Because 3D support is still experimental at this time, it is disabled by default and must be
manually enabled in the VM settings. See chapter 3.6, Display Settings, page 54.
Note: Untrusted guest systems should not be allowed to use the 3D acceleration fea- tures of
Oracle VM VirtualBox, just as untrusted host software should not be allowed to use 3D
acceleration. Drivers for 3D hardware are generally too complex to be made properly secure and
any software which is allowed to access them may be able to com- promise the operating system
running them. In addition, enabling 3D acceleration gives the guest direct access to a large
body of additional program code in the Ora- cle VM VirtualBox host process which it might
conceivably be able to use to crash the virtual machine.
7
4 Guest Additions
To enable Aero theme support, the Oracle VM VirtualBox WDDM video driver must be in- stalled,
which is available with the Guest Additions installation. The WDDM driver is not in- stalled by default for
Vista and Windows 7 guests and must be manually selected in the Guest Additions installer by clicking No
in the Would You Like to Install Basic Direct3D Support dialog displayed when the Direct3D
feature is selected.
The Aero theme is not enabled by default on Windows. See your Windows platform documen- tation for
details of how to enable the Aero theme.
Technically, Oracle VM VirtualBox implements 3D acceleration by installing an additional hard- ware 3D
driver inside the guest when the Guest Additions are installed. This driver acts as a hardware 3D driver and
reports to the guest operating system that the virtual hardware is ca- pable of 3D hardware acceleration.
When an application in the guest then requests hardware acceleration through the OpenGL or Direct3D
programming interfaces, these are sent to the host through a special communication tunnel implemented by
Oracle VM VirtualBox. The host then performs the requested 3D operation using the host’s programming
interfaces.
Technically, Oracle VM VirtualBox implements this by exposing video overlay DirectDraw ca- pabilities in
the Guest Additions video driver. The driver sends all overlay commands to the host through a special
communication tunnel implemented by Oracle VM VirtualBox. On the host side, OpenGL is then used to
implement color space transformation and scaling.
4.6 Seamless
Windows
With the seamless windows feature of Oracle VM VirtualBox, you can have the windows that are displayed
within a virtual machine appear side by side next to the windows of your host. This feature is supported for
the following guest operating systems, provided that the Guest Additions are installed:
• Windows guests.
• Supported Linux or Oracle Solaris guests running the X Window System.
After seamless windows are enabled, Oracle VM VirtualBox suppresses the display of the desk- top
background of your guest, allowing you to run the windows of your guest operating system seamlessly next
to the windows of your host.
8
4 Guest Additions
To enable seamless mode, after starting the virtual machine, press the Host key + L. The Host key is
normally the right control key. This will enlarge the size of the VM’s display to the size of your host
screen and mask out the guest operating system’s background. To disable seamless windows and go back to
the normal VM display, press the Host key + L again.
4.7 Guest
Properties
Oracle VM VirtualBox enables requests of some properties from a running guest, provided that the Oracle
VM VirtualBox Guest Additions are installed and the VM is running. This provides the following advantages:
To accomplish this, Oracle VM VirtualBox establishes a private communication channel be- tween the
Oracle VM VirtualBox Guest Additions and the host, and software on both sides can use this channel to
exchange string data for arbitrary purposes. Guest properties are simply string keys to which a value is
attached. They can be set, or written to, by either the host and the guest. They can also be read from both
sides.
In addition to establishing the general mechanism of reading and writing values, a set of prede- fined guest
properties is automatically maintained by the Oracle VM VirtualBox Guest Additions to allow for retrieving
interesting guest data such as the guest’s exact operating system and ser- vice pack level, the installed version
of the Guest Additions, users that are currently logged into the guest OS, network statistics and more.
These predefined properties are all prefixed with
/VirtualBox/ and organized into a hierarchical tree of keys.
Some of this runtime information is shown when you select Session Information Dialog from
a virtual machine’s Machine menu.
8
4 Guest Additions
A more flexible way to use this channel is with the VBoxManage guestproperty command. See
chapter 8.32, VBoxManage guestproperty, page 185. For example, to have all the available guest properties
for a given running VM listed with their respective values, use this command:
$ VBoxManage guestproperty enumerate "Windows Vista III"
VirtualBox Command Line Management Interface Version <version-number>
(C) 2005-2019 Oracle Corporation
All rights reserved.
To query the value of a single property, use the get subcommand as follows:
$ VBoxManage guestproperty get "Windows Vista III" "/VirtualBox/GuestInfo/OS/Product"
VirtualBox Command Line Management Interface Version <version-number>
(C) 2005-2019 Oracle Corporation
All rights reserved.
8
4 Guest Additions
To add or change guest properties from the guest, use the tool VBoxControl. This tool is in- cluded in
the Guest Additions. When started from a Linux guest, this tool requires root privileges for security reasons.
$ sudo VBoxControl guestproperty enumerate
VirtualBox Guest Additions Command Line Management Interface Version <version-number>
(C) 2005-2019 Oracle Corporation
All rights reserved.
For more complex needs, you can use the Oracle VM VirtualBox programming interfaces. See chapter 11,
Oracle VM VirtualBox Programming Interfaces, page 308.
8
4 Guest Additions
The Guest Control File Manager works by mounting the host file system. Guest users must authenticate
and create a guest session before they can transfer files.
8
4 Guest Additions
For this to work, the application needs to be installed on the guest. No additional software needs to be
installed on the host. Additionally, text mode output to stdout and stderr can be shown on the host for
further processing. There are options to specify user credentials and a timeout value, in milliseconds, to
limit the time the application is able to run.
The Guest Additions for Windows allow for automatic updating. This applies for already installed
Guest Additions versions. Also, copying files from host to the guest as well as remotely creating guest
directories is available.
To use these features, use the Oracle VM VirtualBox command line. See chapter 8.33, VBox- Manage
guestcontrol, page 186.
4.10 Memory
Overcommitment
In server environments with many VMs, the Guest Additions can be used to share physical host memory
between several VMs. This reduces the total amount of memory in use by the VMs. If memory usage is
the limiting factor and CPU resources are still available, this can help with running more VMs on each host.
Note:
• Oracle VM VirtualBox supports memory ballooning only on 64-bit hosts. It is not supported
on Mac OS X hosts.
• Memory ballooning does not work with large pages en-
abled. To turn off large pages support for a VM, run
VBoxManage modifyvm vmname --largepages off
Normally, to change the amount of memory allocated to a virtual machine, you have to shut down the
virtual machine entirely and modify its settings. With memory ballooning, memory that was allocated for a
virtual machine can be given to another virtual machine without having to shut the machine down.
When memory ballooning is requested, the Oracle VM VirtualBox Guest Additions, which run inside the
guest, allocate physical memory from the guest operating system on the kernel level and lock this memory
down in the guest. This ensures that the guest will not use that memory any longer. No guest applications
can allocate it, and the guest kernel will not use it either. Oracle VM VirtualBox can then reuse this memory
and give it to another virtual machine.
The memory made available through the ballooning mechanism is only available for reuse by Oracle VM
VirtualBox. It is not returned as free memory to the host. Requesting balloon memory from a running guest
will therefore not increase the amount of free, unallocated memory on the host. Effectively, memory
ballooning is therefore a memory overcommitment mechanism for multiple virtual machines while they
are running. This can be useful to temporarily start another machine, or in more complicated environments,
for sophisticated memory management of many virtual machines that may be running in parallel depending on
how memory is used by the guests.
At this time, memory ballooning is only supported through VBoxManage. Use the following command
to increase or decrease the size of the memory balloon within a running virtual ma- chine that has Guest
Additions installed:
VBoxManage controlvm "VM name" guestmemoryballoon n
8
4 Guest Additions
where VM name is the name or UUID of the virtual machine in question and n is the amount of
memory to allocate from the guest in megabytes. See chapter 8.13, VBoxManage controlvm, page 162.
You can also set a default balloon that will automatically be requested from the VM every time after it has
started up with the following command:
VBoxManage modifyvm "VM name" --guestmemoryballoon n
By default, no balloon memory is allocated. This is a VM setting, like other modifyvm settings, and
therefore can only be set while the machine is shut down. See chapter 8.8, VBoxManage modifyvm, page
144.
Note: Oracle VM VirtualBox supports Page Fusion only on 64-bit hosts, and it is not supported
on Mac OS X hosts. Page Fusion currently works only with Windows 2000 and later guests.
The more similar the VMs on a given host are, the more efficiently Page Fusion can reduce the amount of
host memory that is in use. It therefore works best if all VMs on a host run identical operating systems.
Instead of having a complete copy of each operating system in each VM, Page Fusion identifies the identical
memory pages in use by these operating systems and eliminates the duplicates, sharing host memory between
several machines. This is called deduplication. If a VM tries to modify a page that has been shared with other
VMs, a new page is allocated again for that VM with a copy of the shared page. This is called copy on write.
All this is fully transparent to the virtual machine.
You may be familiar with this kind of memory overcommitment from other hypervisor prod- ucts, which
call this feature page sharing or same page merging. However, Page Fusion differs significantly from those
other solutions, whose approaches have several drawbacks:
• Traditional hypervisors scan all guest memory and compute checksums, also called hashes, for every
single memory page. Then, they look for pages with identical hashes and compare the entire content of
those pages. If two pages produce the same hash, it is very likely that the pages are identical in content.
This process can take rather long, especially if the system is not idling. As a result, the additional
memory only becomes available after a significant amount of time, such as hours or sometimes days.
Even worse, this kind of page sharing algorithm generally consumes significant CPU resources and
increases the virtualization overhead by 10 to 20%.
Page Fusion in Oracle VM VirtualBox uses logic in the Oracle VM VirtualBox Guest Ad- ditions to
quickly identify memory cells that are most likely identical across VMs. It can therefore achieve most
of the possible savings of page sharing almost immediately and with almost no overhead.
• Page Fusion is also much less likely to be confused by identical memory that it will elimi- nate, just to
learn seconds later that the memory will now change and having to perform a highly expensive and
often service-disrupting reallocation.
8
4 Guest Additions
At this time, Page Fusion can only be controlled with VBoxManage, and only while a VM is shut down. To
enable Page Fusion for a VM, use the following command:
VBoxManage modifyvm "VM name" --pagefusion on
You can observe Page Fusion operation using some metrics. RAM/VMM/Shared shows the total amount
of fused pages, whereas the per-VM metric Guest/RAM/Usage/Shared will return the amount of fused
memory for a given VM. See chapter 8.34, VBoxManage metrics, page 197 for information on how to query
metrics.
Note: Enabling Page Fusion might indirectly increase the chances for malicious guests to
successfully attack other VMs running on the same host. See chapter 13.3.4, Poten- tially Insecure
Operations, page 327.
8
5 Virtual Storage
As the virtual machine will most probably expect to see a hard disk built into its virtual computer, Oracle VM
VirtualBox must be able to present real storage to the guest as a virtual hard disk. There are presently three
methods by which to achieve this:
• Oracle VM VirtualBox can use large image files on a real hard disk and present them to a guest as a
virtual hard disk. This is the most common method, described in chapter 5.2, Disk Image Files (VDI,
VMDK, VHD, HDD), page 91.
• iSCSI storage servers can be attached to Oracle VM VirtualBox. This is described in chapter
5.10, iSCSI Servers, page 100.
• You can allow a virtual machine to access one of your host disks directly. This is an ad- vanced
feature, described in chapter 9.7.1, Using a Raw Host Hard Disk From a Guest, page
249.
Each such virtual storage device, such as an image file, iSCSI target, or physical hard disk, needs to be
connected to the virtual hard disk controller that Oracle VM VirtualBox presents to a virtual machine. This is
explained in the next section.
• IDE (ATA) controllers are a backwards-compatible yet very advanced extension of the disk controller
in the IBM PC/AT (1984). Initially, this interface worked only with hard disks, but was later extended
to also support CD-ROM drives and other types of removable media. In physical PCs, this standard uses
flat ribbon parallel cables with 40 or 80 wires. Each such cable can connect two devices to a
controller, which have traditionally been called master and slave. Typical PCs had two connectors for
such cables. As a result, support for up to four IDE devices was most common.
In Oracle VM VirtualBox, each virtual machine may have one IDE controller enabled, which gives you
up to four virtual storage devices that you can attach to the machine. By default, one of these virtual
storage devices, the secondary master, is preconfigured to be the virtual machine’s virtual CD/DVD
drive. However, you can change the default setting.
Even if your guest OS has no support for SCSI or SATA devices, it should always be able to see an IDE
controller.
You can also select which exact type of IDE controller hardware Oracle VM VirtualBox should
present to the virtual machine: PIIX3, PIIX4, or ICH6. This makes no difference in terms of
performance, but if you import a virtual machine from another virtualization product, the OS in that
machine may expect a particular controller type and crash if it is not found.
After you have created a new virtual machine with the New Virtual Machine wizard of the
graphical user interface, you will typically see one IDE controller in the machine’s
8
5 Virtual Storage
Storage settings. The virtual CD/DVD drive will be attached to one of the four ports of this
controller.
• Serial ATA (SATA) is a more recent standard than IDE. Compared to IDE, it supports both much
higher speeds and more devices per controller. Also, with physical hardware, devices can be added and
removed while the system is running. The standard interface for SATA controllers is called Advanced
Host Controller Interface (AHCI).
Like a real SATA controller, Oracle VM VirtualBox’s virtual SATA controller operates faster and also
consumes fewer CPU resources than the virtual IDE controller. Also, this enables you to connect up
to 30 virtual hard disks to one machine instead of just three, when compared to the Oracle VM
VirtualBox IDE controller with a DVD drive attached.
For this reason, depending on the selected guest OS, Oracle VM VirtualBox uses SATA as the default
for newly created virtual machines. One virtual SATA controller is created by default, and the default
disk that is created with a new VM is attached to this controller.
Warning: The entire SATA controller and the virtual disks attached to it, including those in
IDE compatibility mode, will not be seen by OSes that do not have device support for AHCI.
In particular, there is no support for AHCI in Windows versions before Windows Vista. Legacy
Windows versions such as Windows XP, even with SP3 installed, will not see such disks unless you
install additional drivers. It is possible to switch from IDE to SATA after installation by installing the
SATA drivers and changing the controller type in the VM Settings dialog.
Oracle VM VirtualBox recommends the Intel Matrix Storage drivers, which can be
downloaded from http://downloadcenter.intel.com/Product_Filter.aspx?
ProductID=2101.
To add a SATA controller to a machine for which it has not been enabled by default, either because it
was created by an earlier version of Oracle VM VirtualBox, or because SATA is not supported by
default by the selected guest OS, do the following. Go to the Storage page of the machine’s
Settings dialog, click Add Controller under the Storage Tree box and then select Add SATA
Controller. The new controller appears as a separate PCI device in the virtual machine, and you can
add virtual disks to it.
To change the IDE compatibility mode settings for the SATA controller, see chapter 8.18,
VBoxManage storagectl, page 173.
• SCSI is another established industry standard, standing for Small Computer System Inter- face. SCSI is
as a generic interface for data transfer between all kinds of devices, including storage devices. SCSI is
still used for connecting some hard disks and tape devices, but it has mostly been displaced in
commodity hardware. It is still in common use in high- performance workstations and servers.
Primarily for compatibility with other virtualization software, Oracle VM VirtualBox op- tionally
supports LSI Logic and BusLogic SCSI controllers, to each of which up to fifteen virtual hard disks
can be attached.
To enable a SCSI controller, on the Storage page of a virtual machine’s Settings dialog, click
Add Controller under the Storage Tree box and then select Add SCSI Controller. The new
controller appears as a separate PCI device in the virtual machine.
Warning: As with the other controller types, a SCSI controller will only be seen by OSes
with device support for it. Windows 2003 and later ships with drivers for the LSI Logic controller,
while Windows NT 4.0 and Windows 2000 ships with drivers for the BusLogic controller.
Windows XP ships with drivers for neither.
8
5 Virtual Storage
• Serial Attached SCSI (SAS) is another bus standard which uses the SCSI command set. As
opposed to SCSI physical devices, serial cables are used instead of parallel cables. This simplifies
physical device connections. In some ways, therefore, SAS is to SCSI what SATA is to IDE: it enables
more reliable and faster connections.
To support high-end guests which require SAS controllers, Oracle VM VirtualBox emulates a LSI Logic
SAS controller, which can be enabled much the same way as a SCSI controller. At this time, up to 255
devices can be connected to the SAS controller.
Warning: As with SATA, the SAS controller will only be seen by OSes with device support
for it. In particular, there is no support for SAS in Windows before Windows Vista. So Windows
XP, even SP3, will not see such disks unless you install additional drivers.
• The USB mass storage device class is a standard to connect external storage devices like hard
disks or flash drives to a host through USB. All major OSes support these devices and ship generic
drivers making third-party drivers superfluous. In particular, legacy OSes without support for SATA
controllers may benefit from USB mass storage devices.
The virtual USB storage controller offered by Oracle VM VirtualBox works differently to the other
storage controller types. While most storage controllers appear as a single PCI device to the guest
with multiple disks attached to it, the USB-based storage controller does not appear as virtual storage
controller. Each disk attached to the controller appears as a dedicated USB device to the guest.
Warning: Booting from drives attached using USB is only supported when EFI is used as the
BIOS lacks USB support.
• Non volatile memory express (NVMe) is a standard for connecting non volatile memory
(NVM) directly over PCI Express to lift the bandwidth limitation of the previously used SATA
protocol for solid-state devices. Unlike other standards the command set is very simple in order to
achieve maximum throughput and is not compatible with ATA or SCSI. OSes need to support NVMe
devices to make use of them. For example, Windows 8.1 added native NVMe support. For
Windows 7, native support was added with an update.
The NVMe controller is part of the extension pack.
Warning: Booting from drives attached using NVMe is only supported when EFI is used as the
BIOS lacks the appropriate driver.
• Virtual I/O Device SCSI is a standard to connect virtual storage devices like hard disks or optical
drives to a VM. Recent Linux and Windows versions support these devices (Windows needs additional
drivers). Currently the virtio-scsi controller is experimental.
Warning: The virtio-scsi controller will only be seen by OSes with device support for it. In
particular, there is no built-in support in Windows. So Windows will not see such disks unless you
install additional drivers.
In summary, Oracle VM VirtualBox gives you the following categories of virtual storage slots:
9
5 Virtual Storage
• Four slots attached to the traditional IDE controller, which are always present. One of these is typically a
virtual CD/DVD drive.
• 30 slots attached to the SATA controller, if enabled and supported by the guest OS.
• 15 slots attached to the SCSI controller, if enabled and supported by the guest OS.
• Up to 255 slots attached to the SAS controller, if enabled and supported by the guest OS.
• Eight slots attached to the virtual USB controller, if enabled and supported by the guest
OS.
• Up to 255 slots attached to the NVMe controller, if enabled and supported by the guest OS.
• Up to 256 slots attached to the virtio-scsi controller, if enabled and supported by the guest
OS.
Given this large choice of storage controllers, you may not know which one to choose. In general,
you should avoid IDE unless it is the only controller supported by your guest. Whether you use SATA,
SCSI, or SAS does not make any real difference. The variety of controllers is only supplied by Oracle VM
VirtualBox for compatibility with existing hardware and other hypervisors.
• VDI. Normally, Oracle VM VirtualBox uses its own container format for guest hard disks. This is
called a Virtual Disk Image (VDI) file. This format is used when you create a new virtual machine
with a new disk.
• VMDK. Oracle VM VirtualBox also fully supports the popular and open VMDK container format
that is used by many other virtualization products, such as VMware.
• VHD. Oracle VM VirtualBox also fully supports the VHD format used by Microsoft.
• HDD. Image files of Parallels version 2 (HDD format) are also supported.
Due to lack of documentation of the format, newer versions such as 3 and 4 are not sup- ported.
You can however convert such image files to version 2 format using tools provided by Parallels.
Irrespective of the disk capacity and format, as mentioned in chapter 1.7, Creating Your First Virtual
Machine, page 8, there are two options for creating a disk image: fixed-size or dynamically allocated.
• Fixed-size. If you create a fixed-size image, an image file will be created on your host system
which has roughly the same size as the virtual disk’s capacity. So, for a 10 GB disk, you will have a 10
GB file. Note that the creation of a fixed-size image can take a long time depending on the size of the
image and the write performance of your hard disk.
9
5 Virtual Storage
• Dynamically allocated. For more flexible storage management, use a dynamically allo- cated
image. This will initially be very small and not occupy any space for unused virtual disk sectors, but
will grow every time a disk sector is written to for the first time, until the drive reaches the maximum
capacity chosen when the drive was created. While this format takes less space initially, the fact that
Oracle VM VirtualBox needs to expand the image file consumes additional computing resources, so
until the disk file size has stabilized, write operations may be slower than with fixed size disks.
However, after a time the rate of growth will slow and the average penalty for write operations will
be negligible.
The known media can be viewed and changed using the Virtual Media Manager, which you can
access from the File menu in the VirtualBox Manager window.
The known media are conveniently grouped in separate tabs for the supported formats. These formats are:
• Hard disk images, either in Oracle VM VirtualBox’s own Virtual Disk Image (VDI) format, or in the
third-party formats listed in chapter 5.2, Disk Image Files (VDI, VMDK, VHD, HDD), page 91.
• CD/DVD images in standard ISO format.
• Floppy images in standard RAW format.
For each image, the Virtual Media Manager shows you the full path of the image file and other information,
such as the virtual machine the image is currently attached to.
The Virtual Media Manager enables you to do the following:
9
5 Virtual Storage
Note: Always use the Virtual Media Manager or the VBoxManage modifymedium com- mand
to move a disk image.
If you use a file management feature of the host OS to move a disk image to a new location,
run the VBoxManage modifymedium --setlocation command to configure the new path
of the disk image on the host file system. This command updates the Oracle VM VirtualBox
configuration automatically.
• Remove an image from the known media. You can optionally delete the image file when removing
the image.
• Release an image to detach it from a VM. This action only applies if the image is currently attached
to a VM as a virtual hard disk.
• Search for an image by name or UUID.
• View and edit the Properties of a disk image.
Available properties include the following:
– Type: Specifies the snapshot behavior of the disk. See chapter 5.4, Special Image Write
Modes, page 94.
– Location: Specifies the location of the disk image file on the host system. You can use a file
dialog to browse for the disk image location.
– Description: Specifies a short description of the disk image.
– Size: Specifies the size of the disk image. You can use the slider to increase or decrease the disk
image size.
– Information: Specifies detailed information about the disk image.
• Refresh the property values of the selected disk image.
To perform these actions, highlight the medium in the Virtual Media Manager and then do one of the
following:
9
5 Virtual Storage
Use the Storage page in a VM’s Settings dialog to create a new disk image. By default, disk images
are stored in the VM’s folder.
You can copy hard disk image files to other host systems and then import them in to VMs from the host
system. However, some Windows guest OSes may require that you configure the new VM in a similar way
to the old one.
Note: Do not simply make copies of virtual disk images. If you import such a second copy into
a VM, Oracle VM VirtualBox issues an error because Oracle VM VirtualBox assigns a universally
unique identifier (UUID) to each disk image to ensure that it is only used one time. See chapter
5.6, Cloning Disk Images, page 98. Also, if you want to copy a VM to another system, use the
Oracle VM VirtualBox import and export features. See chapter 1.14, Importing and Exporting
Virtual Machines, page 21.
• Normal images have no restrictions on how guests can read from and write to the disk. This is the
default image mode.
When you take a snapshot of your virtual machine as described in chapter 1.10, Snapshots, page 16, the
state of a normal hard disk is recorded together with the snapshot, and when reverting to the snapshot,
its state will be fully reset.
The image file itself is not reset. Instead, when a snapshot is taken, Oracle VM VirtualBox freezes the
image file and no longer writes to it. For the write operations from the VM, a second, differencing
image file is created which receives only the changes to the original image. See chapter 5.5,
Differencing Images, page 96.
While you can attach the same normal image to more than one virtual machine, only one of these
virtual machines attached to the same image file can be executed simultaneously, as otherwise there
would be conflicts if several machines write to the same image file.
• Write-through hard disks are completely unaffected by snapshots. Their state is not saved when a
snapshot is taken, and not restored when a snapshot is restored.
• Shareable hard disks are a variant of write-through hard disks. In principle they behave exactly
the same. Their state is not saved when a snapshot is taken, and not restored when a snapshot is
restored. The difference only shows if you attach such disks to several VMs. Shareable disks may be
attached to several VMs which may run concurrently. This makes them suitable for use by cluster
filesystems between VMs and similar applications which are explicitly prepared to access a disk
concurrently. Only fixed size images can be used in this way, and dynamically allocated images are
rejected.
9
5 Virtual Storage
Warning: This is an expert feature, and misuse can lead to data loss, as regular filesys- tems are
not prepared to handle simultaneous changes by several parties.
• Immutable images only remember write accesses temporarily while the virtual machine is running.
All changes are lost when the virtual machine is powered on the next time. As a result, as opposed to
Normal images, the same immutable image can be used with several virtual machines without
restrictions.
Creating an immutable image makes little sense since it would be initially empty and lose its contents
with every machine restart. You would have a disk that is always unformatted when the machine starts
up. Instead, you can first create a normal image and then later mark it as immutable when you decide
that the contents are useful.
If you take a snapshot of a machine with immutable images, then on every machine power- up, those
images are reset to the state of the last (current) snapshot, instead of the state of the original immutable
image.
Note: As a special exception, immutable images are not reset if they are attached to a machine
in a saved state or whose last snapshot was taken while the machine was running. This is called
an online snapshot. As a result, if the machine’s current snapshot is an online snapshot, its
immutable images behave exactly like the a normal image. To reenable the automatic resetting of
such images, delete the current snapshot of the machine.
Oracle VM VirtualBox never writes to an immutable image directly at all. All write oper- ations from
the machine are directed to a differencing image. The next time the VM is powered on, the
differencing image is reset so that every time the VM starts, its immutable images have exactly the same
content.
The differencing image is only reset when the machine is powered on from within Oracle VM
VirtualBox, not when you reboot by requesting a reboot from within the machine. This is also why
immutable images behave as described above when snapshots are also present, which use differencing
images as well.
If the automatic discarding of the differencing image on VM startup does not fit your needs, you can
turn it off using the autoreset parameter of VBoxManage modifymedium. See chapter 8.22,
VBoxManage modifymedium, page 176.
• Multiattach mode images can be attached to more than one virtual machine at the same time,
even if these machines are running simultaneously. For each virtual machine to which such an image is
attached, a differencing image is created. As a result, data that is written to such a virtual disk by one
machine is not seen by the other machines to which the image is attached. Each machine creates its own
write history of the multiattach image.
Technically, a multiattach image behaves identically to an immutable image except the differencing
image is not reset every time the machine starts.
This mode is useful for sharing files which are almost never written, for instance picture galleries,
where every guest changes only a small amount of data and the majority of the disk content remains
unchanged. The modified blocks are stored in differencing images which remain relatively small and
the shared content is stored only once at the host.
• Read-only images are used automatically for CD/DVD images, since CDs/DVDs can never be
written to.
9
5 Virtual Storage
The following scenario illustrates the differences between the various image modes, with re- spect to
snapshots.
Assume you have installed your guest OS in your VM, and you have taken a snapshot. Later, your VM is
infected with a virus and you would like to go back to the snapshot. With a normal hard disk image, you
simply restore the snapshot, and the earlier state of your hard disk image will be restored as well and your
virus infection will be undone. With an immutable hard disk, all it takes is to shut down and power on
your VM, and the virus infection will be discarded. With a write-through image however, you cannot
easily undo the virus infection by means of virtualization, but will have to disinfect your virtual machine like
a real computer.
You might find write-through images useful if you want to preserve critical data irrespective of
snapshots. As you can attach more than one image to a VM, you may want to have one immutable
image for the OS and one write-through image for your data files.
5.5 Differencing
Images
The previous section mentioned differencing images and how they are used with snapshots, immutable
images, and multiple disk attachments. This section describes in more detail how differencing images
work.
A differencing image is a special disk image that only holds the differences to another image. A
differencing image by itself is useless, it must always refer to another image. The differencing image is then
typically referred to as a child, which holds the differences to its parent.
When a differencing image is active, it receives all write operations from the virtual machine instead of
its parent. The differencing image only contains the sectors of the virtual hard disk that have changed since
the differencing image was created. When the machine reads a sector from such a virtual hard disk, it looks
into the differencing image first. If the sector is present, it is returned from there. If not, Oracle VM
VirtualBox looks into the parent. In other words, the parent becomes read-only. It is never written to again,
but it is read from if a sector has not changed.
Differencing images can be chained. If another differencing image is created for a virtual disk that
already has a differencing image, then it becomes a grandchild of the original parent. The first differencing
image then becomes read-only as well, and write operations only go to the second-level differencing
image. When reading from the virtual disk, Oracle VM VirtualBox needs to look into the second
differencing image first, then into the first if the sector was not found, and then into the original image.
There can be an unlimited number of differencing images, and each image can have more than one child.
As a result, the differencing images can form a complex tree with parents, siblings, and children, depending
on how complex your machine configuration is. Write operations always go to the one active differencing
image that is attached to the machine, and for read operations, Oracle VM VirtualBox may need to look up all
the parents in the chain until the sector in question is found. You can view such a tree in the Virtual Media
Manager.
9
5 Virtual Storage
In all of these situations, from the point of view of the virtual machine, the virtual hard disk behaves like
any other disk. While the virtual machine is running, there is a slight run-time I/O overhead because Oracle
VM VirtualBox might need to look up sectors several times. This is not noticeable however since the tables
with sector information are always kept in memory and can be looked up quickly.
Differencing images are used in the following situations:
• Snapshots. When you create a snapshot, as explained in the previous section, Oracle VM
VirtualBox freezes the images attached to the virtual machine and creates differencing images for each
image that is not in write-through mode. From the point of view of the virtual machine, the virtual
disks continue to operate before, but all write operations go into the differencing images. Each time
you create another snapshot, for each hard disk attachment, another differencing image is created and
attached, forming a chain or tree.
In the above screenshot, you see that the original disk image is now attached to a snapshot, representing
the state of the disk when the snapshot was taken.
If you restore a snapshot, and want to go back to the exact machine state that was stored in the
snapshot, the following happens:
– Oracle VM VirtualBox copies the virtual machine settings that were copied into the snapshot
back to the virtual machine. As a result, if you have made changes to the machine
configuration since taking the snapshot, they are undone.
– If the snapshot was taken while the machine was running, it contains a saved machine state, and
that state is restored as well. After restoring the snapshot, the machine will then be in Saved
state and resume execution from there when it is next started. Otherwise the machine will be in
Powered Off state and do a full boot.
– For each disk image attached to the machine, the differencing image holding all the write
operations since the current snapshot was taken is thrown away, and the original parent image is
made active again. If you restored the root snapshot, then this will be the root disk image for
each attachment. Otherwise, some other differencing image descended from it. This effectively
restores the old machine state.
If you later delete a snapshot in order to free disk space, for each disk attachment, one of the
differencing images becomes obsolete. In this case, the differencing image of the disk attachment
cannot simply be deleted. Instead, Oracle VM VirtualBox needs to look at each sector of the
differencing image and needs to copy it back into its parent. This is called “merging” images and
can be a potentially lengthy process, depending on how large the differencing image is. It can also
temporarily need a considerable amount of extra disk space, before the differencing image obsoleted
by the merge operation is deleted.
9
5 Virtual Storage
• Immutable images. When an image is switched to immutable mode, a differencing im- age is
created as well. As with snapshots, the parent image then becomes read-only, and the differencing
image receives all the write operations. Every time the virtual machine is started, all the immutable
images which are attached to it have their respective differenc- ing image thrown away, effectively
resetting the virtual machine’s virtual disk with every restart.
• Delayed writing through the host OS cache is less secure. When the guest OS writes data, it considers
the data written even though it has not yet arrived on a physical disk. If for some reason the write
does not happen, such as power failure or host crash, the likelihood of data loss increases.
• Disk image files tend to be very large. Caching them can therefore quickly use up the entire host OS
cache. Depending on the efficiency of the host OS caching, this may slow down the host
immensely, especially if several VMs run at the same time. For example, on Linux hosts, host caching
may result in Linux delaying all writes until the host cache is nearly full
9
5 Virtual Storage
and then writing out all these changes at once, possibly stalling VM execution for minutes. This can
result in I/O errors in the guest as I/O requests time out there.
• Physical memory is often wasted as guest OSes typically have their own I/O caches, which may result
in the data being cached twice, in both the guest and the host caches, for little effect.
If you decide to disable host I/O caching for the above reasons, Oracle VM VirtualBox uses its own small
cache to buffer writes, but no read caching since this is typically already performed by the guest OS. In
addition, Oracle VM VirtualBox fully supports asynchronous I/O for its virtual SATA, SCSI, and SAS
controllers through multiple I/O threads.
Since asynchronous I/O is not supported by IDE controllers, for performance reasons, you may want to
leave host caching enabled for your VM’s virtual IDE controllers.
For this reason, Oracle VM VirtualBox enables you to configure whether the host I/O cache is used for
each I/O controller separately. Either select the Use Host I/O Cache check box in the Storage
settings for a given virtual storage controller, or use the following VBoxManage command to disable the
host I/O cache for a virtual storage controller:
VBoxManage storagectl "VM name" --name <controllername> --hostiocache off
All disks in a group share the bandwidth limit, meaning that in the example above the band- width of both
images combined can never exceed 20 MBps. However, if one disk does not require bandwidth the other can
use the remaining bandwidth of its group.
The limits for each group can be changed while the VM is running, with changes being picked up
immediately. The example below changes the limit for the group created in the example above to 10
MBps:
VBoxManage bandwidthctl "VM name" set Limit --limit 10M
5.9 CD/DVD
Support
Virtual CD/DVD drives by default support only reading. The medium configuration is changeable at runtime.
You can select between the following options to provide the medium data:
• Host Drive defines that the guest can read from the medium in the host drive.
9
5 Virtual Storage
• Image file gives the guest read-only access to the data in the image. This is typically an
ISO file.
• Empty means a drive without an inserted medium.
Changing between the above, or changing a medium in the host drive that is accessed by a machine, or
changing an image file will signal a medium change to the guest OS. The guest OS can then react to the
change, for example by starting an installation program.
Medium changes can be prevented by the guest, and Oracle VM VirtualBox reflects that by locking the
host drive if appropriate. You can force a medium removal in such situations by using the VirtualBox
Manager or the VBoxManage command line tool. Effectively this is the equivalent of the emergency
eject which many CD/DVD drives provide, with all associated side effects. The guest OS can issue error
messages, just like on real hardware, and guest applications may misbehave. Use this with caution.
Note: The identification string of the drive provided to the guest, displayed by con- figuration
tools such as the Windows Device Manager, is always VBOX CD-ROM, irre- spective of the
current configuration of the virtual drive. This is to prevent hardware detection from being
triggered in the guest OS every time the configuration is changed.
The standard CD/DVD emulation enables reading of standard data CD and DVD formats only. As an
experimental feature, for additional capabilities, it is possible to give the guest direct access to the CD/DVD
host drive by enabling passthrough mode. Depending on the host hardware, this may potentially enable the
following things to work:
• CD/DVD writing from within the guest, if the host DVD drive is a CD/DVD writer
• Playing audio CDs
• Playing encrypted DVDs
To enable host drive passthrough you can use the --passthrough option of the
VBoxManage storageattach command. See chapter 8.17, VBoxManage storageattach, page
169.
Even if passthrough is enabled, unsafe commands, such as updating the drive firmware, will be blocked.
Video CD formats are never supported, not even in passthrough mode, and cannot be played from a virtual
machine.
On Oracle Solaris hosts, passthrough requires running Oracle VM VirtualBox with real root permissions
due to security measures enforced by the host.
5.10 iSCSI
Servers
iSCSI stands for Internet SCSI and is a standard that supports use of the SCSI protocol over Internet
(TCP/IP) connections. Especially with the advent of Gigabit Ethernet, it has become affordable to attach
iSCSI storage servers simply as remote hard disks to a computer network. In iSCSI terminology, the server
providing storage resources is called an iSCSI target, while the client connecting to the server and accessing
its resources is called an iSCSI initiator.
Oracle VM VirtualBox can transparently present iSCSI remote storage to a virtual machine as a virtual hard
disk. The guest OS will not see any difference between a virtual disk image (VDI file) and an iSCSI target.
To achieve this, Oracle VM VirtualBox has an integrated iSCSI initiator. Oracle VM VirtualBox’s iSCSI support
has been developed according to the iSCSI standard and should work with all standard-conforming iSCSI
targets. To use an iSCSI target with Oracle VM VirtualBox, you must use the command line. See chapter
8.17, VBoxManage storageattach, page
169.
1
5 Virtual Storage
Note: When using vboximg-mount, ensure that the following conditions apply:
• The disk image is not being used by any other systems, such as by guest VMs.
• No VMs are running on the host system.
Raw access using FUSE is preferred over direct loopback mounting of virtual disk images, because it
is snapshot aware. It can selectively merge disk differencing images in an exposed virtual hard disk,
providing historical or up-to-date representations of the virtual disk contents.
vboximg-mount enables you to view information about registered VMs, their attached disk media, and
any snapshots. Also, you can view partition information for a disk image.
The vboximg-mount command includes experimental read-only access to file systems inside a VM
disk image. This feature enables you to extract some files from the disk image without starting the VM
and without requiring third-party file system drivers on the host system. FAT, NTFS, ext2, ext3, and ext4 file
systems are supported.
Use the --help option to view information about the vboximg-mount command usage. The
complete command reference is described in chapter 8.48, vboximg-mount, page 235.
When vboximg-mount mounts an Oracle VM VirtualBox disk image, it creates a one level deep file
system at a mount point that you specify. The file system includes a device node that repre- sents the
synthesized disk image as a readable or readable-writeable bytestream. This bytestream can be mounted either
by using the host OS or by using other FUSE-based file systems.
------------------------------------------------------
VM Name: "macOS High Sierra 10.13"
UUID: 3887d96d-831c-4187-a55a-567c504ff0e1
Location: /Volumes/work/vm_guests/macOS High Sierra 10.13/macOS High Sierra 10.13.vbox
-----------------------
HDD base: "macOS High Sierra 10.13.vdi"
UUID: f9ea7173-6869-4aa9-b487-68023a655980
Location: /Volumes/work/vm_guests/macOS High Sierra 10.13/macOS High Sierra 10.13.vdi
Diff 1:
UUID: 98c2bac9-cf37-443d-a935-4e879b70166d
Location: /Volumes/work/vm_guests/macOS High Sierra 10.13/
Snapshots/{98c2bac9-cf37-443d-a935-4e879b70166d}.vdi
Diff 2:
UUID: f401f381-7377-40b3-948e-3c61241b1a42
Location: /Volumes/work/vm_guests/macOS High Sierra 10.13/
Snapshots/{f401f381-7377-40b3-948e-3c61241b1a42}.vdi
1
5 Virtual Storage
-----------------------
HDD base: "simple_fixed_disk.vdi"
UUID: ffba4d7e-1277-489d-8173-22ca7660773d
Location: /Volumes/work/vm_guests/macOS High Sierra 10.13/simple_fixed_disk.vdi
Diff 1:
UUID: aecab681-0d2d-468b-8682-93f79dc97a48
Location: /Volumes/work/vm_guests/macOS High Sierra 10.13/
Snapshots/{aecab681-0d2d-468b-8682-93f79dc97a48}.vdi
Diff 2:
UUID: 70d6b34d-8422-47fa-8521-3b6929a1971c
Location: /Volumes/work/vm_guests/macOS High Sierra 10.13/
Snapshots/{70d6b34d-8422-47fa-8521-3b6929a1971c}.vdi
------------------------------------------------------
VM Name: "debian"
UUID: 5365ab5f-470d-44c0-9863-dad532ee5905
Location: /Volumes/work/vm_guests/debian/debian.vbox
-----------------------
HDD base: "debian.vdi"
UUID: 96d2e92e-0d4e-46ab-a0f1-008fdbf997e7
Location: /Volumes/work/vm_guests/debian/ol7.vdi
Diff 1:
UUID: f9cc866a-9166-42e9-a503-bbfe9b7312e8
Location: /Volumes/work/vm_guests/debian/Snapshots/
{f9cc866a-9166-42e9-a503-bbfe9b7312e8}.vdi
The following command outputs partition information about the specified disk image:
$ vboximg-mount --image=f9ea7173-6869-4aa9-b487-68023a655980 --list
$ mkdir macos_sysdisk
1
5 Virtual Storage
$ ls macos_sysdisk
macOS High Sierra 10.13.vdi vhdd
$ sudo mount macos_sysdisk/vhdd /mnt
1
6 Virtual Networking
As mentioned in chapter 3.9, Network Settings, page 58, Oracle VM VirtualBox provides up to eight virtual
PCI Ethernet cards for each virtual machine. For each such card, you can individually select the following:
Four of the network cards can be configured in the Network section of the Settings dialog in the
graphical user interface of Oracle VM VirtualBox. You can configure all eight network cards on the
command line using VBoxManage modifyvm. See chapter 8.8, VBoxManage modifyvm, page 144.
This chapter explains the various networking settings in more detail.
The PCNet FAST III is the default because it is supported by nearly all operating systems, as well as by
the GNU GRUB boot manager. As an exception, the Intel PRO/1000 family adapters are chosen for some
guest operating system types that no longer ship with drivers for the PCNet card, such as Windows Vista.
The Intel PRO/1000 MT Desktop type works with Windows Vista and later versions. The T Server
variant of the Intel PRO/1000 card is recognized by Windows XP guests without additional driver installation.
The MT Server variant facilitates OVF imports from other platforms.
The Paravirtualized network adapter (virtio-net) is special. If you select this adapter, then Oracle VM
VirtualBox does not virtualize common networking hardware that is supported by common guest operating
systems. Instead, Oracle VM VirtualBox expects a special software interface for virtualized environments
to be provided by the guest, thus avoiding the complexity of emulating networking hardware and improving
network performance. Oracle VM VirtualBox provides support for the industry-standard virtio networking
drivers, which are part of the open source KVM project.
The virtio networking drivers are available for the following guest operating systems:
10
6 Virtual Networking
• Linux kernels version 2.6.25 or later can be configured to provide virtio support. Some distributions
have also back-ported virtio to older kernels.
• For Windows 2000, XP, and Vista, virtio drivers can be downloaded and installed from the
KVM project web page:
http://www.linux-kvm.org/page/WindowsGuestDrivers.
Oracle VM VirtualBox also has limited support for jumbo frames. These are networking packets with more
than 1500 bytes of data, provided that you use the Intel card virtualization and bridged networking.
Jumbo frames are not supported with the AMD networking devices. In those cases, jumbo packets will silently
be dropped for both the transmit and the receive direction. Guest operating systems trying to use this feature
will observe this as a packet loss, which may lead to unexpected application behavior in the guest. This
does not cause problems with guest operating systems in their default configuration, as jumbo frames need to
be explicitly enabled.
• Not attached. In this mode, Oracle VM VirtualBox reports to the guest that a network card is
present, but that there is no connection. This is as if no Ethernet cable was plugged into the card. Using
this mode, it is possible to pull the virtual Ethernet cable and disrupt the connection, which can be
useful to inform a guest operating system that no network connection is available and enforce a
reconfiguration.
• Network Address Translation (NAT). If all you want is to browse the Web, download files, and
view email inside the guest, then this default mode should be sufficient for you, and you can skip the
rest of this section. Please note that there are certain limitations when using Windows file sharing.
See chapter 6.3.3, NAT Limitations, page 108.
• NAT Network. A NAT network is a type of internal network that allows outbound connec- tions.
See chapter 6.4, Network Address Translation Service, page 108.
• Bridged networking. This is for more advanced networking needs, such as network sim- ulations
and running servers in a guest. When enabled, Oracle VM VirtualBox connects to one of your installed
network cards and exchanges network packets directly, circumventing your host operating system’s
network stack.
• Internal networking. This can be used to create a different kind of software-based net- work
which is visible to selected virtual machines, but not to applications running on the host or to the
outside world.
• Host-only networking. This can be used to create a network containing the host and a set of virtual
machines, without the need for the host’s physical network interface. Instead, a virtual network
interface, similar to a loopback interface, is created on the host, providing connectivity among virtual
machines and the host.
• Generic networking. Rarely used modes which share the same generic network interface, by
allowing the user to select a driver which can be included with Oracle VM VirtualBox or be distributed
in an extension pack.
The following sub-modes are available:
– UDP Tunnel: Used to interconnect virtual machines running on different hosts di- rectly,
easily, and transparently, over an existing network infrastructure.
10
6 Virtual Networking
The following table provides an overview of the most important networking modes.
Host-only + + + – –
Internal – – + – –
Bridged + + + + +
The following sections describe the available network modes in more detail.
10
6 Virtual Networking
other computers on the same network. However, like a physical router, Oracle VM VirtualBox can make
selected services available to the world outside the guest through port forwarding. This means that Oracle
VM VirtualBox listens to certain ports on the host and resends all packets which arrive there to the guest, on the
same or a different port.
To an application on the host or other physical or virtual machines on the network, it looks as though the
service being proxied is actually running on the host. This also means that you cannot run the same service on
the same ports on the host. However, you still gain the advantages of running the service in a virtual
machine. For example, services on the host machine or on other virtual machines cannot be compromised or
crashed by a vulnerability or a bug in the service, and the service can run in a different operating system than
the host system.
To configure port forwarding you can use the graphical Port Forwarding editor which can be found in
the Network Settings dialog for network adaptors configured to use NAT. Here, you can map host ports
to guest ports to allow network traffic to be routed to a specific port in the guest.
Alternatively, the command line tool VBoxManage can be used. See chapter 8.8, VBoxManage modifyvm,
page 144.
You will need to know which ports on the guest the service uses and to decide which ports to use on the
host. You may want to use the same ports on the guest and on the host. You can use any ports on the host
which are not already in use by a service. For example, to set up incoming NAT connections to an ssh
server in the guest, use the following command:
VBoxManage modifyvm "VM name" --natpf1 "guestssh,tcp,,2222,,22"
In the above example, all TCP traffic arriving on port 2222 on any host interface will be forwarded to
port 22 in the guest. The protocol name tcp is a mandatory attribute defining which protocol should be
used for forwarding, udp could also be used. The name guestssh is purely descriptive and will be auto-
generated if omitted. The number after --natpf denotes the network card, as with other VBoxManage
commands.
To remove this forwarding rule, use the following command:
VBoxManage modifyvm "VM name" --natpf1 delete "guestssh"
If for some reason the guest uses a static assigned IP address not leased from the built-in DHCP
server, it is required to specify the guest IP when registering the forwarding rule, as follows:
VBoxManage modifyvm "VM name" --natpf1 "guestssh,tcp,,2222,10.0.2.19,22"
This example is identical to the previous one, except that the NAT engine is being told that the guest can be
found at the 10.0.2.19 address.
To forward all incoming traffic from a specific host interface to the guest, specify the IP of that host
interface as follows:
VBoxManage modifyvm "VM name" --natpf1 "guestssh,tcp,127.0.0.1,2222,,22"
This example forwards all TCP traffic arriving on the localhost interface at 127.0.0.1 through port 2222 to
port 22 in the guest.
It is possible to configure incoming NAT connections while the VM is running, see chapter
8.13, VBoxManage controlvm, page 162.
10
6 Virtual Networking
• ICMP protocol limitations. Some frequently used network debugging tools, such as ping or
traceroute, rely on the ICMP protocol for sending and receiving messages. Oracle VM VirtualBox
ICMP support has some limitations, meaning ping should work but some other tools may not work
reliably.
• Receiving of UDP broadcasts. The guest does not reliably receive UDP broadcasts. In order
to save resources, it only listens for a certain amount of time after the guest has sent UDP data on a
particular port. As a consequence, NetBios name resolution based on broadcasts does not always
work, but WINS always works. As a workaround, you can use the numeric IP of the desired server in
the \\server\share notation.
• Some protocols are not supported. Protocols other than TCP and UDP are not supported. GRE is
not supported. This means some VPN products, such as PPTP from Microsoft, cannot be used. There are
other VPN products which use only TCP and UDP.
• Forwarding host ports below 1024. On UNIX-based hosts, such as Linux, Oracle Solaris, and
Mac OS X, it is not possible to bind to ports below 1024 from applications that are not run by root.
As a result, if you try to configure such a port forwarding, the VM will refuse to start.
These limitations normally do not affect standard network use. But the presence of NAT has also subtle
effects that may interfere with protocols that are normally working. One example is NFS, where the server is
often configured to refuse connections from non-privileged ports, which are those ports not below 1024.
Here, natnet1 is the name of the internal network to be used and 192.168.15.0/24 is the network
address and mask of the NAT service interface. By default in this static configuration the gateway will be
assigned the address 192.168.15.1, the address following the interface address, though this is subject to
change. To attach a DHCP server to the internal network, modify the example command as follows:
VBoxManage natnetwork add --netname natnet1 --network "192.168.15.0/24" --enable --dhcp on
10
6 Virtual Networking
A DHCP server provides a list of registered nameservers, but does not map servers from the
127/8 network.
To start the NAT service, use the following command:
VBoxManage natnetwork start --netname natnet1
If the network has a DHCP server attached then it will start together with the NAT network service.
To stop the NAT network service, together with any DHCP server:
VBoxManage natnetwork stop --netname natnet1
This command does not remove the DHCP server if one is enabled on the internal network. Port-
forwarding is supported, using the --port-forward-4 switch for IPv4 and
--port-forward-6 for IPv6. For example:
VBoxManage natnetwork modify \
--netname natnet1 --port-forward-4 "ssh:tcp:[]:1022:[192.168.15.5]:22"
This adds a port-forwarding rule from the host’s TCP 1022 port to the port 22 on the guest with IP
address 192.168.15.5. Host port, guest port and guest IP are mandatory. To delete the rule, use the
following command:
VBoxManage natnetwork modify --netname natnet1 --port-forward-4 delete ssh
To see the list of registered NAT networks, use the following command:
VBoxManage list natnetworks
6.5 Bridged
Networking
With bridged networking, Oracle VM VirtualBox uses a device driver on your host system that filters data
from your physical network adapter. This driver is therefore called a net filter driver. This enables Oracle
VM VirtualBox to intercept data from the physical network and inject data into it, effectively creating a new
network interface in software. When a guest is using such a new software interface, it looks to the host
system as though the guest were physically connected to the interface using a network cable. The host can send
data to the guest through that interface and receive data from it. This means that you can set up routing or
bridging between the guest and the rest of your network.
Note: Even though TAP interfaces are no longer necessary on Linux for bridged net- working,
you can still use TAP interfaces for certain advanced setups, since you can connect a VM to any
host interface.
To enable bridged networking, open the Settings dialog of a virtual machine, go to the Net- work
page and select Bridged Network in the drop-down list for the Attached To field. Select a host interface
from the list at the bottom of the page, which contains the physical network inter- faces of your systems. On
a typical MacBook, for example, this will allow you to select between en1: AirPort, which is the wireless
interface, and en0: Ethernet, which represents the interface with a network cable.
10
6 Virtual Networking
Note: Bridging to a wireless interface is done differently from bridging to a wired in- terface,
because most wireless adapters do not support promiscuous mode. All traffic has to use the
MAC address of the host’s wireless adapter, and therefore Oracle VM VirtualBox needs to
replace the source MAC address in the Ethernet header of an out- going packet to make sure the
reply will be sent to the host interface. When Oracle VM VirtualBox sees an incoming packet with
a destination IP address that belongs to one of the virtual machine adapters it replaces the
destination MAC address in the Ether- net header with the VM adapter’s MAC address and passes it
on. Oracle VM VirtualBox examines ARP and DHCP packets in order to learn the IP addresses of
virtual machines.
• Mac OS X hosts. Functionality is limited when using AirPort, the Mac’s wireless networking system,
for bridged networking. Currently, Oracle VM VirtualBox supports only IPv4 and IPv6 over AirPort.
For other protocols, such as IPX, you must choose a wired interface.
• Linux hosts. Functionality is limited when using wireless interfaces for bridged network- ing.
Currently, Oracle VM VirtualBox supports only IPv4 and IPv6 over wireless. For other protocols, such
as IPX, you must choose a wired interface.
Also, setting the MTU to less than 1500 bytes on wired interfaces provided by the sky2 driver on
the Marvell Yukon II EC Ultra Ethernet NIC is known to cause packet losses under certain
conditions.
Some adapters strip VLAN tags in hardware. This does not allow you to use VLAN trunking between
VM and the external network with pre-2.6.27 Linux kernels, or with host operating systems other than
Linux.
• Oracle Solaris hosts. There is no support for using wireless interfaces. Filtering guest traffic
using IPFilter is also not completely supported due to technical restrictions of the Oracle Solaris
networking subsystem. These issues may be addressed in later releases of Oracle Solaris 11.
On Oracle Solaris 11 hosts build 159 and above, it is possible to use Oracle Solaris Cross- bow
Virtual Network Interfaces (VNICs) directly with Oracle VM VirtualBox without any additional
configuration other than each VNIC must be exclusive for every guest network interface.
When using VLAN interfaces with Oracle VM VirtualBox, they must be named according to the PPA-
hack naming scheme, such as e1000g513001. Otherwise, the guest may receive packets in an
unexpected format.
6.6 Internal
Networking
Internal Networking is similar to bridged networking in that the VM can directly communicate with the
outside world. However, the outside world is limited to other VMs on the same host which connect to the
same internal network.
Even though technically, everything that can be done using internal networking can also be done using
bridged networking, there are security advantages with internal networking. In bridged networking mode,
all traffic goes through a physical interface of the host system. It is therefore possible to attach a packet
sniffer such as Wireshark to the host interface and log all traffic that goes over it. If, for any reason, you
prefer two or more VMs on the same machine to communicate privately, hiding their data from both the
host system and the user, bridged networking therefore is not an option.
Internal networks are created automatically as needed. There is no central configuration. Every internal
network is identified simply by its name. Once there is more than one active
11
6 Virtual Networking
virtual network card with the same internal network ID, the Oracle VM VirtualBox support driver will
automatically wire the cards and act as a network switch. The Oracle VM VirtualBox support driver implements
a complete Ethernet switch and supports both broadcast/multicast frames and promiscuous mode.
In order to attach a VM’s network card to an internal network, set its networking mode to
Internal Networking. There are two ways to accomplish this:
• Use the VM’s Settings dialog in the Oracle VM VirtualBox graphical user interface. In the
Networking category of the settings dialog, select Internal Networking from the drop- down
list of networking modes. Select the name of an existing internal network from the drop-down list
below, or enter a new name into the Name field.
• Use the command line, for example:
If you do not specify a network name, the network card will be attached to the network
intnet by default.
Unless you configure the virtual network cards in the guest operating systems that are partici- pating in the
internal network to use static IP addresses, you may want to use the DHCP server that is built into Oracle
VM VirtualBox to manage IP addresses for the internal network. See chapter 8.42, VBoxManage dhcpserver,
page 212.
As a security measure, by default, the Linux implementation of internal networking only allows VMs running
under the same user ID to establish an internal network. However, it is possible to create a shared internal
networking interface, accessible by users with different user IDs.
6.7 Host-Only
Networking
Host-only networking can be thought of as a hybrid between the bridged and internal networking modes. As
with bridged networking, the virtual machines can talk to each other and the host as if they were
connected through a physical Ethernet switch. As with internal networking, a physical networking interface
need not be present, and the virtual machines cannot talk to the world outside the host since they are not
connected to a physical networking interface.
When host-only networking is used, Oracle VM VirtualBox creates a new software interface on the host
which then appears next to your existing network interfaces. In other words, whereas with bridged
networking an existing physical interface is used to attach virtual machines to, with host-only networking a
new loopback interface is created on the host. And whereas with internal networking, the traffic between the
virtual machines cannot be seen, the traffic on the loopback interface on the host can be intercepted.
Host-only networking is particularly useful for preconfigured virtual appliances, where multi- ple virtual
machines are shipped together and designed to cooperate. For example, one virtual machine may contain a
web server and a second one a database, and since they are intended to talk to each other, the appliance can
instruct Oracle VM VirtualBox to set up a host-only network for the two. A second, bridged, network would
then connect the web server to the outside world to serve data to, but the outside world cannot connect to the
database.
To change a virtual machine’s virtual network interface to Host Only mode, do either of the following:
• Go to the Network page in the virtual machine’s Settings dialog and select Host-Only
Networking.
11
6 Virtual Networking
• On the command line, enter VBoxManage modifyvm "vmname --nicx hostonly. See
chapter 8.8, VBoxManage modifyvm, page 144.
Before you can attach a VM to a host-only network you have to create at least one host-only interface.
You can use the VirtualBox Manager for this. Choose File, Preferences, Network, Host-Only
Network, (+)Add Host-Only Network.
Alternatively, you can use the command line:
VBoxManage hostonlyif create
• In the Oracle VM VirtualBox graphical user interface, you can configure all these items in the
global settings by choosing File, Preferences, Network. This lists all host-only networks
which are presently in use. Click on the network name and then on Edit. You can then modify the
adapter and DHCP settings.
• Alternatively, you can use VBoxManage dhcpserver on the command line. See chapter
8.42, VBoxManage dhcpserver, page 212.
Note: On Linux and Mac OS X hosts the number of host-only interfaces is limited to
128. There is no such limit for Oracle Solaris and Windows hosts.
• Source UDP port: The port on which the host listens. Datagrams arriving on this port from any
source address will be forwarded to the receiving part of the guest network card.
• Destination address: IP address of the target host of the transmitted data.
• Destination UDP port: Port number to which the transmitted data is sent.
When interconnecting two virtual machines on two different hosts, their IP addresses must be swapped. On
a single host, source and destination UDP ports must be swapped.
In the following example, host 1 uses the IP address 10.0.0.1 and host 2 uses IP address
10.0.0.2. To configure using the command-line:
VBoxManage modifyvm "VM 01 on host 1" --nic<x> generic
VBoxManage modifyvm "VM 01 on host 1" --nicgenericdrv<x> UDPTunnel
VBoxManage modifyvm "VM 01 on host 1" --nicproperty<x> dest=10.0.0.2
VBoxManage modifyvm "VM 01 on host 1" --nicproperty<x> sport=10001
VBoxManage modifyvm "VM 01 on host 1" --nicproperty<x> dport=10002
11
6 Virtual Networking
Of course, you can always interconnect two virtual machines on the same host, by setting the destination
address parameter to 127.0.0.1 on both. It will act similarly to an internal network in this case. However, the
host can see the network traffic which it could not in the normal internal network case.
Note: On UNIX-based hosts, such as Linux, Oracle Solaris, and Mac OS X, it is not possible
to bind to ports below 1024 from applications that are not run by root. As a result, if you try to
configure such a source UDP port, the VM will refuse to start.
6.9 VDE
Networking
Virtual Distributed Ethernet (VDE) is a flexible, virtual network infrastructure system, spanning across multiple
hosts in a secure way. It enables L2/L3 switching, including spanning-tree pro- tocol, VLANs, and WAN
emulation. It is an optional part of Oracle VM VirtualBox which is only included in the source code.
VDE is a project developed by Renzo Davoli, Associate Professor at the University of Bologna, Italy.
The basic building blocks of the infrastructure are VDE switches, VDE plugs, and VDE wires which
interconnect the switches.
The Oracle VM VirtualBox VDE driver has a single parameter: VDE network. This is the name of the VDE
network switch socket to which the VM will be connected.
The following basic example shows how to connect a virtual machine to a VDE switch.
1. Create a VDE switch:
vde_switch -s /tmp/switch1
VDE is available on Linux and FreeBSD hosts only. It is only available if the VDE software and the VDE
plugin library from the VirtualSquare project are installed on the host system.
11
6 Virtual Networking
Note: For Linux hosts, the shared library libvdeplug.so must be available in the search path for
shared libraries.
For more information on setting up VDE networks, please see the documentation accompany- ing the
software. See also http://wiki.virtualsquare.org/wiki/index.php/VDE_Basic_
Networking.
Note: Oracle VM VirtualBox shapes VM traffic only in the transmit direction, delaying the
packets being sent by virtual machines. It does not limit the traffic being received by virtual
machines.
Limits are configured through VBoxManage. The following example creates a bandwidth group named
Limit, sets the limit to 20 Mbps and assigns the group to the first and second adapters of the VM:
VBoxManage bandwidthctl "VM name" add Limit --type network --limit 20m
VBoxManage modifyvm "VM name" --nicbandwidthgroup1 Limit
VBoxManage modifyvm "VM name" --nicbandwidthgroup2 Limit
All adapters in a group share the bandwidth limit, meaning that in the example above the bandwidth of
both adapters combined can never exceed 20 Mbps. However, if one adapter does not require bandwidth the
other can use the remaining bandwidth of its group.
The limits for each group can be changed while the VM is running, with changes being picked up
immediately. The following example changes the limit for the group created in the previous example to
100 Kbps:
VBoxManage bandwidthctl "VM name" set Limit --limit 100k
To completely disable shaping for the first adapter of VM use the following command:
VBoxManage modifyvm "VM name" --nicbandwidthgroup1 none
It is also possible to disable shaping for all adapters assigned to a bandwidth group while VM is running,
by specifying the zero limit for the group. For example, for the bandwidth group named Limit:
VBoxManage bandwidthctl "VM name" set Limit --limit 0
11
6 Virtual Networking
Note: Neither virtio nor Intel PRO/1000 drivers for Windows XP support segmentation
offloading. Therefore Windows XP guests never reach the same transmission rates as other guest
types. Refer to MS Knowledge base article 842264 for additional informa- tion.
Three attachment types: Internal, Bridged, and Host-Only, have nearly identical performance. The Internal
type is a little bit faster and uses less CPU cycles as the packets never reach the host’s network stack. The
NAT attachment type is the slowest and most secure of all attachment types, as it provides network address
translation. The generic driver attachment is special and cannot be considered as an alternative to other
attachment types.
The number of CPUs assigned to VM does not improve network performance and in some cases may hurt it
due to increased concurrency in the guest.
Here is a short summary of things to check in order to improve network performance:
• Whenever possible use the virtio network adapter. Otherwise, use one of the Intel
PRO/1000 adapters.
• Use a Bridged attachment instead of NAT.
• Make sure segmentation offloading is enabled in the guest OS. Usually it will be enabled by default.
You can check and modify offloading settings using the ethtool command on Linux guests.
• Perform a full detailed analysis of network traffic on the VM’s network adaptor using a third party
tool such as Wireshark. To do this, a promiscuous mode policy needs to be used on the VM’s network
adaptor. Use of this mode is only possible on the following network types: NAT Network, Bridged
Adapter, Internal Network, and Host-Only Adapter.
To setup a promiscuous mode policy, either select from the drop down list located in the
Network Settings dialog for the network adaptor or use the command line tool
VBoxManage. See chapter 8.8, VBoxManage modifyvm, page 144.
Promiscuous mode policies are as follows:
– deny, which hides any traffic not intended for the VM’s network adaptor. This is the default
setting.
– allow-vms, which hides all host traffic from the VM’s network adaptor, but allows it to see
traffic from and to other VMs.
– allow-all, which removes all restrictions. The VM’s network adaptor sees all traffic.
11
7 Remote Virtual Machines
7.1 Remote Display (VRDP
Support)
Oracle VM VirtualBox can display virtual machines remotely, meaning that a virtual machine can execute on
one computer even though the machine will be displayed on a second computer, and the machine will be
controlled from there as well, as if the virtual machine was running on that second computer.
For maximum flexibility, Oracle VM VirtualBox implements remote machine display through a generic
extension interface called the VirtualBox Remote Desktop Extension (VRDE). The base open source Oracle
VM VirtualBox package only provides this interface, while implementations can be supplied by third parties
with Oracle VM VirtualBox extension packages, which must be installed separately from the base package.
See chapter 1.5, Installing Oracle VM VirtualBox and Extension Packs, page 6.
Oracle provides support for the VirtualBox Remote Display Protocol (VRDP) in such an Oracle
VM VirtualBox extension package.
VRDP is a backwards-compatible extension to Microsoft’s Remote Desktop Protocol (RDP). As a result,
you can use any standard RDP client to control the remote VM.
Even when the extension is installed, the VRDP server is disabled by default. It can easily be enabled on a
per-VM basis either in the VirtualBox Manager in the Display settings, see chapter
3.6, Display Settings, page 54, or with the VBoxManage command, as follows:
$ VBoxManage modifyvm <VM-name> --vrde on
By default, the VRDP server uses TCP port 3389. You will need to change the default port if you run
more than one VRDP server, since the port can only be used by one server at a time. You might also need to
change it on Windows hosts since the default port might already be used by the RDP server that is built into
Windows itself. Ports 5000 through 5050 are typically not used and might be a good choice.
The port can be changed either in the Display settings of the graphical user interface or with the --
vrdeport option of the VBoxManage modifyvm command. You can specify a comma- separated
list of ports or ranges of ports. Use a dash between two port numbers to specify a range. The VRDP server
will bind to one of the available ports from the specified list. For example, VBoxManage modifyvm VM-
name --vrdeport 5000,5010-5012 configures the server to bind to one of the ports 5000, 5010,
5011, or 5012. See chapter 8.8, VBoxManage modifyvm, page
144.
The actual port used by a running VM can be either queried with the VBoxManage showvminfo
command or seen in the GUI on the Runtime tab of the Session Information dialog, which is
accessible from the Machine menu of the VM window.
Oracle VM VirtualBox supports IPv6. If the host OS supports IPv6 the VRDP server will auto- matically
listen for IPv6 connections in addition to IPv4.
11
7 Remote Virtual Machines
• On Windows, you can use the Microsoft Terminal Services Connector, mstsc.exe, that is included
with Windows. Press the Windows key + R, to display the Run dialog. Enter mstsc to start the
program. You can also find the program in Start, All Programs, Acces- sories, Remote
Desktop Connection. If you use the Run dialog, you can enter options directly. For example:
mstsc 1.2.3.4:3389
Replace 1.2.3.4 with the host IP address, and 3389 with a different port, if necessary.
Note:
– IPv6 addresses must be enclosed in square brackets to specify a port. For example:
mstsc [fe80::1:2:3:4]:3389
• On other systems, you can use the standard open source rdesktop program. This ships with most
Linux distributions, but Oracle VM VirtualBox also comes with a modified variant of rdesktop for
remote USB support. See chapter 7.1.4, Remote USB, page 120.
With rdesktop, use a command line such as the following:
$ rdesktop -a 16 -N 1.2.3.4:3389
Replace 1.2.3.4 with the host IP address, and 3389 with a different port, if necessary. The
-a 16 option requests a color depth of 16 bits per pixel, which we recommend. For best
performance, after installation of the guest operating system, you should set its display
color depth to the same value. The -N option enables use of the NumPad keys.
• You can use the Remmina remote desktop client with VRDP. This application is included with some
Linux distributions, such as Debian and Ubuntu.
• If you run the KDE desktop, you can use krdc, the KDE RDP viewer. A typical command line is as
follows:
$ krdc rdp://1.2.3.4:3389
Replace 1.2.3.4 with the host IP address, and 3389 with a different port, if necessary. The
rdp:// prefix is required with krdc to switch it into RDP mode.
• With Sun Ray thin clients you can use uttsc, which is part of the Sun Ray Windows
Connector package. See the Sun Ray documentation for details.
11
7 Remote Virtual Machines
Solaris hosts, as the VirtualBox Manager comes with dependencies on the Qt and SDL libraries. This is
inconvenient if you would rather not have the X Window system on your server at all.
Oracle VM VirtualBox therefore comes with a front-end called VBoxHeadless, which produces no visible
output on the host at all, but still can optionally deliver VRDP data. This front-end has no dependencies on the
X Window system on Linux and Oracle Solaris hosts.
Note: In legacy releases of Oracle VM VirtualBox, the headless server was called
VBoxVRDP. For backwards compatibility, the Oracle VM VirtualBox installation still in- cludes an
executable with that name.
To start a virtual machine with VBoxHeadless, you have the following options:
The --type option causes Oracle VM VirtualBox to use VBoxHeadless as the front-end to the
internal virtualization engine, instead of the Qt front-end.
• Use the VBoxHeadless command, as follows:
When you use the VBoxHeadless command to start a VM, the VRDP server will be enabled
according to the VM configuration. You can override the VM’s setting using --vrde command line
parameter. To enable the VRDP server, start the VM as follows:
VBoxHeadless --startvm <uuid>|<vmname> --vrde on
To have the VRDP server enabled depending on the VM configuration, as for other front-ends:
VBoxHeadless --startvm <uuid>|<vmname> --vrde config
If you start the VM with VBoxManage startvm then the configuration settings of the VM are always
used.
11
7 Remote Virtual Machines
• Oracle VM VirtualBox on a server machine with a supported host operating system. The
Oracle VM VirtualBox Extension Pack for the VRDP server must be installed, see chapter
7.1, Remote Display (VRDP Support), page 116. The procedures assume a Linux server is used.
• An ISO file accessible from the server, containing the installation data for the guest operat- ing system
to install. Windows XP is used in the example.
• A terminal connection to that host through which you can access a command line, such as
ssh.
• An RDP viewer on the remote client. See chapter 7.1.1, Common Third-Party RDP Viewers, page 116
for examples.
Note that on the server machine, since we will only use the headless server, Qt and the X Window
system are not required.
If you do not specify --register, you will have to manually use the registervm command later.
You do not need to specify --ostype, but doing so selects some sensible default values for certain
VM parameters. For example, the RAM size and the type of the virtual network device. To get a
complete list of supported operating systems you can use the following command:
2. Make sure the settings for the VM are appropriate for the guest operating system that we will install.
For example:
VBoxManage modifyvm "Windows XP" --memory 256 --acpi on --boot1 dvd --nic1 nat
3. Create a virtual hard disk for the VM. For example, to create a 10 GB virtual hard disk:
5. Set the VDI file you created as the first virtual hard disk of the new VM. For example:
11
7 Remote Virtual Machines
6. Attach the ISO file that contains the operating system installation that you want to install later to the
virtual machine. This is done so that the VM can boot from it.
7. Enable the VirtualBox Remote Desktop Extension, the VRDP server, as follows:
If the configuration steps worked, you should see a copyright notice. If you are returned to the
command line, then something did not work correctly.
9. On the client machine, start the RDP viewer and connect to the server. See chapter 7.1.1, Common
Third-Party RDP Viewers, page 116 for details of how to use various common RDP viewers.
The installation routine of your guest operating system should be displayed in the RDP
viewer.
See chapter 12.7.5, USB Not Working, page 323 for further details on how to properly set up the
permissions for USB devices. Furthermore it is advisable to disable automatic loading of any host driver on
the remote host which might work on USB devices to ensure that the devices are accessible by the RDP
client. If the setup was properly done on the remote host, plug and unplug events are visible in the VBox.log
file of the VM.
12
7 Remote Virtual Machines
• The null method means that there is no authentication at all. Any client can connect to the VRDP
server and thus the virtual machine. This is very insecure and only to be recommended for private
networks.
• The external method provides external authentication through a special authentication library.
Oracle VM VirtualBox ships with two special authentication libraries:
1. The default authentication library, VBoxAuth, authenticates against user credentials of the hosts.
Depending on the host platform, this means the following:
– On Linux hosts, VBoxAuth.so authenticates users against the host’s PAM system.
– On Windows hosts, VBoxAuth.dll authenticates users against the host’s WinLo- gon
system.
– On Mac OS X hosts, VBoxAuth.dylib authenticates users against the host’s di- rectory
service.
In other words, the external method by default performs authentication with the user accounts that
exist on the host system. Any user with valid authentication credentials is accepted. For
example, the username does not have to correspond to the user running the VM.
2. An additional library called VBoxAuthSimple performs authentication against creden- tials
configured in the extradata section of a virtual machine’s XML settings file. This is probably
the simplest way to get authentication that does not depend on a running and supported guest.
The following steps are required:
a) Enable VBoxAuthSimple with the following command:
VBoxManage setproperty vrdeauthlibrary "VBoxAuthSimple"
b) To enable the library for a particular VM, you must switch authentication to ex- ternal, as
follows:
VBoxManage modifyvm <VM-name> --vrdeauthtype external
Replace VM-name with the VM name or UUID, user with the user name who should
be allowed to log in and hash with the encrypted password. The following command
example obtains the hash value for the password secret:
$ VBoxManage internalcommands passwordhash "secret"
2bb80d537b1da3e38bd30361aa855686bde0eacd7162fef6a25fe97bf527a25b
You then use VBoxManage setextradata to store this value in the machine’s
extradata section.
As a combined example, to set the password for the user john and the machine
My VM to secret, use this command:
VBoxManage setextradata "My VM" "VBoxAuthSimple/users/john"
2bb80d537b1da3e38bd30361aa855686bde0eacd7162fef6a25fe97bf527a25b
12
7 Remote Virtual Machines
• The guest authentication method performs authentication with a special component that comes with
the Guest Additions. As a result, authentication is not performed on the host, but with the guest user
accounts.
This method is currently still in testing and not yet supported.
In addition to the methods described above, you can replace the default external authenti- cation
module with any other module. For this, Oracle VM VirtualBox provides a well-defined interface that
enables you to write your own authentication module. This is described in detail in the Oracle VM
VirtualBox Software Development Kit (SDK) reference. See chapter 11, Oracle VM VirtualBox Programming
Interfaces, page 308.
• RDP 4 authentication was used historically. With RDP 4, the RDP client does not perform any checks
in order to verify the identity of the server it connects to. Since user credentials can be obtained using a
man in the middle (MITM) attack, RDP4 authentication is insecure and should generally not be used.
• RDP 5.1 authentication employs a server certificate for which the client possesses the pub- lic key.
This way it is guaranteed that the server possess the corresponding private key. However, as this
hard-coded private key became public some years ago, RDP 5.1 authenti- cation is also insecure.
• RDP 5.2 or later authentication uses Enhanced RDP Security, which means that an external security
protocol is used to secure the connection. RDP 4 and RDP 5.1 use Standard RDP Security. The
VRDP server supports Enhanced RDP Security with TLS protocol and, as a part of the TLS handshake,
sends the server certificate to the client.
The Security/Method VRDE property sets the desired security method, which is used for a
connection. Valid values are as follows:
– Negotiate. Both Enhanced (TLS) and Standard RDP Security connections are al- lowed.
The security method is negotiated with the client. This is the default setting.
– RDP. Only Standard RDP Security is accepted.
– TLS. Only Enhanced RDP Security is accepted. The client must support TLS.
The version of OpenSSL used by Oracle VM VirtualBox supports TLS versions 1.0, 1.1,
1.2, and 1.3.
For example, the following command enables a client to use either Standard or Enhanced
RDP Security connection:
If the Security/Method property is set to either Negotiate or TLS, the TLS protocol will be
automatically used by the server, if the client supports TLS. However, in order to use TLS the server
must possess the Server Certificate, the Server Private Key and the Certifi- cate Authority (CA)
Certificate. The following example shows how to generate a server certificate.
1. Create a CA self signed certificate.
openssl req -new -x509 -days 365 -extensions v3_ca \
-keyout ca_key_private.pem -out ca_cert.pem
12
7 Remote Virtual Machines
The server must be configured to access the required files. For example:
vboxmanage modifyvm <VM-name> \
--vrdeproperty "Security/CACertificate=path/ca_cert.pem"
As the client that connects to the server determines what type of encryption will be used, with
rdesktop, the Linux RDP viewer, use the -4 or -5 options.
12
7 Remote Virtual Machines
The quality of the video is defined as a value from 10 to 100 percent, representing a JPEG com- pression
level, where lower numbers mean lower quality but higher compression. The quality can be changed using
the following command:
VBoxManage modifyvm <VM-name> --vrdevideochannelquality 75
To reenable a feature, use a similar command without the trailing 1. For example:
$ VBoxManage modifyvm <VM-name> --vrdeproperty Client/DisableDisplay=
7.2
Teleporting
Oracle VM VirtualBox supports teleporting. Teleporting is moving a virtual machine over a net- work from
one Oracle VM VirtualBox host to another, while the virtual machine is running. This works regardless of the
host operating system that is running on the hosts. You can teleport virtual machines between Oracle
Solaris and Mac OS X hosts, for example.
Teleporting requires that a machine be currently running on one host, which is called the source. The
host to which the virtual machine will be teleported is called the target. The machine on the target is then
configured to wait for the source to contact the target. The machine’s running state will then be
transferred from the source to the target with minimal downtime.
Teleporting happens over any TCP/IP network. The source and the target only need to agree on a TCP/IP
port which is specified in the teleporting settings.
At this time, there are a few prerequisites for this to work, as follows:
• On the target host, you must configure a virtual machine in Oracle VM VirtualBox with exactly the
same hardware settings as the machine on the source that you want to teleport. This does not apply to
settings which are merely descriptive, such as the VM name, but ob- viously for teleporting to work, the
target machine must have the same amount of memory and other hardware settings. Otherwise
teleporting will fail with an error message.
• The two virtual machines on the source and the target must share the same storage, hard disks as well
as floppy disks and CD/DVD images. This means that they either use the same iSCSI targets or that the
storage resides somewhere on the network and both hosts have access to it using NFS or SMB/CIFS.
This also means that neither the source nor the target machine can have any snapshots. To configure
1. On the target host, configure the virtual machine to wait for a teleport request to arrive when it is
started, instead of actually attempting to start the machine. This is done with the following
VBoxManage command:
12
7 Remote Virtual Machines
targetvmname is the name of the virtual machine on the target host and port is a TCP/IP port
number to be used on both the source and the target hosts. For example, use 6000. See chapter 8.8,
VBoxManage modifyvm, page 144.
2. Start the VM on the target host. Instead of running, the VM shows a progress dialog, indicating
that it is waiting for a teleport request to arrive.
3. Start the VM on the source host as usual. When it is running and you want it to be tele- ported, issue
the following command on the source host:
where sourcevmname is the name of the virtual machine on the source host, which is the machine
that is currently running. targethost is the host or IP name of the target host on which the machine is
waiting for the teleport request, and port must be the same number as specified in the command on
the target host. See chapter 8.13, VBoxManage controlvm, page 162.
For testing, you can also teleport machines on the same host. In that case, use localhost as the hostname on
both the source and the target host.
Note: In rare cases, if the CPUs of the source and the target are very different, teleport- ing can fail
with an error message, or the target may hang. This may happen especially if the VM is running
application software that is highly optimized to run on a particular CPU without correctly checking
that certain CPU features are actually present. Ora- cle VM VirtualBox filters what CPU
capabilities are presented to the guest operating system. Advanced users can attempt to restrict
these virtual CPU capabilities with the VBoxManage modifyvm --cpuid command. See
chapter 8.8, VBoxManage modifyvm, page 144.
7.3
VBoxHeadless
Oracle VM VirtualBox remote desktop server.
Synopsis
VBoxHeadless [--startvm= [uuid | vmname] ] [--vrde= on | off | config ]
[--vrdeproperty=prop-name=[prop-value]] [--settingspw=[password]]
[--settingspwfile=password-file] [--start-paused=vmname]
[--capture] [--width=width] [--height=height] [--bitrate=bit-rate]
[--filename=filename]
Description
The VBoxHeadless command is an alternate front end that enables you to remotely manage virtual
machines (VMs). The front end is a CLI rather than the VirtualBox Manager graphical user interface
(GUI).
For information about using this command, see chapter 7.1.2, VBoxHeadless, the Remote Desk- top Server,
page 117.
12
7 Remote Virtual Machines
Command Options
--startvm=<uuid> | <vmname>
Specifies the Universally Unique Identifier (UUID) or name of the VM to start. Use the
VBoxManage list vms command to obtain VM information.
The short versions of this option are -s and -startvm.
--vrde=on | off | config
Specifies how to use the VRDP server. The default value is config. Valid values are as follows:
• on enables the VRDP server.
VBoxHeadless --startvm=<vmname> --vrde=on
Specifies a settings password to access encrypted settings. If you do not specify the pass- word on
the command line, VBoxHeadless prompts you for the password.
--settingspwfile=<password-file>
Records the VM screen output to a file. In addition to this option, you must use the
--filename option to specify the name of the file.
--width=<width>
Specifies the frame width of the recording in pixels. This option is associated with the
--capture option.
12
7 Remote Virtual Machines
--height=<height>
Specifies the frame height of the recording in pixels. This option is associated with the
--capture option.
--bitrate=<bit-rate>
Specifies the bit rate of the recording in kilobits per second. This option is associated with the --
capture option.
--filename=<filename>
Specifies the name of the file in which to store the recording. The codec used is based on the file
extension that you choose. You must specify this option if you use the --capture option.
Examples
The following command starts the ol7u4 VM:
$ VBoxHeadless --startvm "ol7u4"
The following command starts the ol7u6 VM and records the session. The recording is saved to the
ol7u6-recording WebM file.
See Also
chapter 8.4, VBoxManage list, page 141, chapter 8.12, VBoxManage startvm, page 161
12
8 VBoxManage
8.1
Introduction
As briefly mentioned in chapter 1.16, Alternative Front-Ends, page 30, VBoxManage is the command-
line interface to Oracle VM VirtualBox. With it, you can completely control Oracle VM VirtualBox from
the command line of your host operating system. VBoxManage supports all the features that the graphical
user interface gives you access to, but it supports a lot more than that. It exposes all the features of the
virtualization engine, even those that cannot be accessed from the GUI.
You will need to use the command line if you want to do the following:
• Use a different user interface than the main GUI such as the VBoxHeadless server.
• Control some of the more advanced and experimental configuration settings for a VM. There are two
main things to keep in mind when using VBoxManage. First, VBoxManage must
always be used with a specific subcommand, such as list or createvm or startvm. All the
subcommands that VBoxManage supports are described in detail in chapter 8, VBoxManage, page
128.
Second, most of these subcommands require that you specify a particular virtual machine after the
subcommand. There are two ways you can do this:
• You can specify the VM name, as it is shown in the Oracle VM VirtualBox GUI. Note that if that name
contains spaces, then you must enclose the entire name in double quotes. This is always required with
command line arguments that contain spaces. For example:
• You can specify the UUID, which is the internal unique identifier that Oracle VM VirtualBox uses to refer
to the virtual machine. Assuming that the VM called “Windows XP” has the UUID shown below, the
following command has the same effect as the previous example:
You can enter VBoxManage list vms to have all currently registered VMs listed with all their settings,
including their respective names and UUIDs.
Some typical examples of how to control Oracle VM VirtualBox from the command line are listed
below:
• To create a new virtual machine from the command line and immediately register it with
Oracle VM VirtualBox, use VBoxManage createvm with the --register option, as follows:
12
8 VBoxManage
As can be seen from the above output, a new virtual machine has been created with a new
UUID and a new XML settings file.
For more details, see chapter 8.7, VBoxManage createvm, page 144.
• To show the configuration of a particular VM, use VBoxManage showvminfo. See chapter
8.5, VBoxManage showvminfo, page 143 for details and an example.
• To change settings while a VM is powered off, use VBoxManage modifyvm. For example:
8.2 Commands
Overview
When running VBoxManage without parameters or when supplying an invalid command line, the following
command syntax list is shown. Note that the output will be slightly different depending on the host platform.
If in doubt, check the output of VBoxManage for the commands available on your particular host.
Usage:
General Options:
Commands:
registervm <filename>
12
8 VBoxManage
modifyvm <uuid|vmname>
[--name <name>]
[--groups <group>, ...]
[--description <desc>]
[--ostype <ostype>]
[--iconfile <filename>]
[--memory <memorysize in MB>]
[--pagefusion on|off]
[--vram <vramsize in MB>]
[--acpi on|off]
[--ioapic on|off]
[--hpet on|off]
[--triplefaultreset on|off]
[--apic on|off]
[--x2apic on|off]
[--paravirtprovider none|default|legacy|minimal|
hyperv|kvm]
[--paravirtdebug <key=value> [,<key=value> ...]]
[--hwvirtex on|off]
[--nestedpaging on|off]
[--largepages on|off]
[--vtxvpid on|off]
[--vtxux on|off]
[--pae on|off]
[--longmode on|off]
[--ibpb-on-vm-exit on|off]
[--ibpb-on-vm-entry on|off]
[--spec-ctrl on|off]
[--l1d-flush-on-sched on|off]
[--l1d-flush-on-vm-entry on|off]
[--mds-clear-on-sched on|off]
[--mds-clear-on-vm-entry on|off]
[--nested-hw-virt on|off]
[--cpu-profile "host|Intel 80[86|286|386]"]
[--cpuid-portability-level <0..3>]
[--cpuid-set <leaf[:subleaf]> <eax> <ebx> <ecx> <edx>]
[--cpuid-remove <leaf[:subleaf]>]
[--cpuidremoveall]
[--hardwareuuid <uuid>]
[--cpus <number>]
[--cpuhotplug on|off]
[--plugcpu <id>]
[--unplugcpu <id>]
[--cpuexecutioncap <1-100>]
[--rtcuseutc on|off]
[--graphicscontroller none|vboxvga|vmsvga|vboxsvga]
[--monitorcount <number>]
[--accelerate3d on|off]
[--accelerate2dvideo on|off]
[--firmware bios|efi|efi32|efi64]
[--chipset ich9|piix3]
[--bioslogofadein on|off]
[--bioslogofadeout on|off]
[--bioslogodisplaytime <msec>]
[--bioslogoimagepath <imagepath>]
[--biosbootmenu disabled|menuonly|messageandmenu]
[--biosapic disabled|apic|x2apic]
[--biossystemtimeoffset <msec>]
13
8 VBoxManage
[--biospxedebug on|off]
[--system-uuid-le on|off]
[--boot<1-4> none|floppy|dvd|disk|net>]
[--nic<1-N> none|null|nat|bridged|intnet|hostonly|
generic|natnetwork]
[--nictype<1-N> Am79C970A|Am79C973|Am79C960|
82540EM|82543GC|82545EM|
virtio]
[--cableconnected<1-N> on|off]
[--nictrace<1-N> on|off]
[--nictracefile<1-N> <filename>]
[--nicproperty<1-N> name=[value]]
[--nicspeed<1-N> <kbps>]
[--nicbootprio<1-N> <priority>]
[--nicpromisc<1-N> deny|allow-vms|allow-all]
[--nicbandwidthgroup<1-N> none|<name>]
[--bridgeadapter<1-N> none|<devicename>]
[--hostonlyadapter<1-N> none|<devicename>]
[--intnet<1-N> <network name>]
[--nat-network<1-N> <network name>]
[--nicgenericdrv<1-N> <driver>]
[--natnet<1-N> <network>|default]
[--natsettings<1-N> [<mtu>],[<socksnd>],
[<sockrcv>],[<tcpsnd>],
[<tcprcv>]]
[--natpf<1-N> [<rulename>],tcp|udp,[<hostip>],
<hostport>,[<guestip>],<guestport>]
[--natpf<1-N> delete <rulename>]
[--nattftpprefix<1-N> <prefix>]
[--nattftpfile<1-N> <file>]
[--nattftpserver<1-N> <ip>]
[--natbindip<1-N> <ip>]
[--natdnspassdomain<1-N> on|off]
[--natdnsproxy<1-N> on|off]
[--natdnshostresolver<1-N> on|off]
[--nataliasmode<1-N> default|[log],[proxyonly],
[sameports]]
[--macaddress<1-N> auto|<mac>]
[--mouse ps2|usb|usbtablet|usbmultitouch]
[--keyboard ps2|usb]
[--uart<1-N> off|<I/O base> <IRQ>]
[--uartmode<1-N> disconnected|
server <pipe>|
client <pipe>|
tcpserver <port>|
tcpclient <hostname:port>|
file <file>|
<devicename>]
[--uarttype<1-N> 16450|16550A|16750]
[--lpt<1-N> off|<I/O base> <IRQ>]
[--lptmode<1-N> <devicename>]
[--guestmemoryballoon <balloonsize in MB>]
[--vm-process-priority default|flat|low|normal|high]
[--audio none|null|dsound|oss|alsa|pulse|
oss|pulse|coreaudio]
[--audioin on|off]
[--audioout on|off]
[--audiocontroller ac97|hda|sb16]
[--audiocodec stac9700|ad1980|stac9221|sb16]
[--clipboard-mode disabled|hosttoguest|guesttohost|
bidirectional]
[--draganddrop disabled|hosttoguest|guesttohost|
bidirectional]
[--vrde on|off]
[--vrdeextpack default|<name>]
[--vrdeproperty <name=[value]>]
[--vrdeport <hostport>]
13
8 VBoxManage
[--vrdeaddress <hostip>]
[--vrdeauthtype null|external|guest]
[--vrdeauthlibrary default|<name>]
[--vrdemulticon on|off]
[--vrdereusecon on|off]
[--vrdevideochannel on|off]
[--vrdevideochannelquality <percent>]
[--usbohci on|off]
[--usbehci on|off]
[--usbxhci on|off]
[--usbrename <oldname> <newname>]
[--snapshotfolder default|<path>]
[--teleporter on|off]
[--teleporterport <port>]
[--teleporteraddress <address|empty>]
[--teleporterpassword <password>]
[--teleporterpasswordfile <file>|stdin]
[--tracing-enabled on|off]
[--tracing-config <config-string>]
[--tracing-allow-vm-access on|off]
[--usbcardreader on|off]
[--autostart-enabled on|off]
[--autostart-delay <seconds>]
[--recording on|off]
[--recordingscreens all|<screen ID> [<screen ID> ...]]
[--recordingfile <filename>]
[--recordingvideores <width> <height>]
[--recordingvideorate <rate>]
[--recordingvideofps <fps>]
[--recordingmaxtime <s>]
[--recordingmaxsize <MB>]
[--recordingopts <key=value> [,<key=value> ...]]
[--defaultfrontend default|<name>]
movevm <uuid|vmname>
--type basic
[--folder <path>]
import <ovfname/ovaname>
[--dry-run|-n]
[--options keepallmacs|keepnatmacs|importtovdi]
[--vmname <name>]
[--cloud]
[--cloudprofile <cloud profile name>]
[--cloudinstanceid <instance id>]
[--cloudbucket <bucket name>]
[more options]
(run with -n to have options displayed
for a particular OVF. It doesn’t work for the Cloud import.)
13
8 VBoxManage
startvm <uuid|vmname>...
[--type gui|sdl|headless|separate]
[-E|--putenv <NAME>[=<VALUE>]]
13
8 VBoxManage
--password <password>] |
plugcpu <id> |
unplugcpu <id> |
cpuexecutioncap <1-100>
webcam <attach [path [settings]]> | <detach [path]> | <list>
addencpassword <id>
<password file>|-
[--removeonsuspend <yes|no>]
removeencpassword <id>
removeallencpasswords
changeuartmode<1-N> disconnected|
server <pipe>|
client <pipe>|
tcpserver <port>|
tcpclient <hostname:port>|
file <file>|
<devicename>
vm-process-priority default|flat|low|normal|high
discardstate <uuid|vmname>
storageattach <uuid|vmname>
--storagectl <name>
[--port <number>]
[--device <number>]
[--type dvddrive|hdd|fdd]
[--medium none|emptydrive|additions|
<uuid|filename>|host:<drive>|iscsi]
[--mtype normal|writethrough|immutable|shareable|
readonly|multiattach]
[--comment <text>]
[--setuuid <uuid>]
[--setparentuuid <uuid>]
[--passthrough on|off]
[--tempeject on|off]
[--nonrotational on|off]
[--discard on|off]
[--hotpluggable on|off]
[--bandwidthgroup <name>]
[--forceunmount]
[--server <name>|<ip>]
[--target <target>]
[--tport <port>]
[--lun <lun>]
[--encodedlun <lun>]
[--username <username>]
[--password <password>]
[--passwordfile <file>]
[--initiator <initiator>]
[--intnet]
storagectl <uuid|vmname>
--name <name>
[--add ide|sata|scsi|floppy|sas|usb|pcie|virtio]
[--controller LSILogic|LSILogicSAS|BusLogic|
IntelAHCI|PIIX3|PIIX4|ICH6|I82078|
[ USB|NVMe|VirtIO]
[--portcount <1-n>]
[--hostiocache on|off]
[--bootable on|off]
[--rename <name>]
[--remove]
13
8 VBoxManage
bandwidthctl <uuid|vmname>
add <name> --type disk|network
--limit <megabytes per second>[k|m|g|K|M|G] |
set <name>
--limit <megabytes per second>[k|m|g|K|M|G] |
remove <name> |
list [--machinereadable]
(limit units: k=kilobit, m=megabit, g=gigabit,
K=kilobyte, M=megabyte, G=gigabyte)
encryptmedium <uuid|filename>
[--newpassword <file>|-]
[--oldpassword <file>|-]
[--cipher <cipher identifier>]
[--newpasswordid <password identifier>]
checkmediumpwd <uuid|filename>
<pwd file>|-
getextradata global|<uuid|vmname>
<key>|[enumerate]
setextradata global|<uuid|vmname>
13
8 VBoxManage
<key>
[<value>] (no value deletes key)
13
8 VBoxManage
run [common-options]
[--exe <path to executable>] [--timeout <msec>]
[-E|--putenv <NAME>[=<VALUE>]] [--unquoted-args]
[--ignore-operhaned-processes] [--profile]
[--no-wait-stdout|--wait-stdout]
[--no-wait-stderr|--wait-stderr]
[--dos2unix] [--unix2dos]
-- <program/arg0> [argument1] ... [argumentN]]
start [common-options]
[--exe <path to executable>] [--timeout <msec>]
[-E|--putenv <NAME>[=<VALUE>]] [--unquoted-args]
[--ignore-operhaned-processes] [--profile]
-- <program/arg0> [argument1] ... [argumentN]]
copyfrom [common-options]
[--follow] [-R|--recursive]
<guest-src0> [guest-src1 [...]] <host-dst>
copyfrom [common-options]
[--follow] [-R|--recursive]
[--target-directory <host-dst-dir>]
<guest-src0> [guest-src1 [...]]
copyto [common-options]
[--follow] [-R|--recursive]
<host-src0> [host-src1 [...]] <guest-dst>
copyto [common-options]
[--follow] [-R|--recursive]
[--target-directory <guest-dst>]
<host-src0> [host-src1 [...]]
mkdir|createdir[ectory] [common-options]
[--parents] [--mode <mode>]
<guest directory> [...]
rmdir|removedir[ectory] [common-options]
[-R|--recursive]
<guest directory> [...]
mv|move|ren[ame] [common-options]
<source> [source1 [...]] <dest>
mktemp|createtemp[orary] [common-options]
[--secure] [--mode <mode>] [--tmpdir <directory>]
<template>
stat [common-options]
<file> [...]
closeprocess [common-options]
< --session-id <ID>
| --session-name <name or pattern>
<PID1> [PID1 [...]]
13
8 VBoxManage
closesession [common-options]
< --all | --session-id <ID>
| --session-name <name or pattern> >
updatega|updateguestadditions|updateadditions
[--source <guest additions .ISO>]
[--wait-start] [common-options]
[-- [<argument1>] ... [<argumentN>]]
watch [common-options]
metrics setup
[--period <seconds>] (default: 1)
[--samples <count>] (default: 1)
[--list]
[*|host|<vmname> [<metric_list>]]
metrics enable
[--list]
[*|host|<vmname> [<metric_list>]]
metrics disable
[--list]
[*|host|<vmname> [<metric_list>]]
metrics collect
[--period <seconds>] (default: 1)
[--samples <count>] (default: 1)
[--list]
[--detach]
[*|host|<vmname> [<metric_list>]]
13
8 VBoxManage
[--dhcp |
--ip<ipv4> [--netmask<ipv4> (def: 255.255.255.0)] |
--ipv6<ipv6> [--netmasklengthv6<length> (def: 64)]]
create |
remove <name>
13
8 VBoxManage
14
8 VBoxManage
Each time VBoxManage is invoked, only one command can be executed. However, a command might
support several subcommands which then can be invoked in one single call. The following sections provide
detailed reference information on the different commands.
The settings password is used for certain settings which need to be stored in encrypted form for security
reasons. At the moment, the only encrypted setting is the iSCSI initiator secret, see chapter 8.17, VBoxManage
storageattach, page 169. As long as no settings password is specified, this information is stored in plain text.
After using the --settingspw|--settingspwfile option once, it must be always used. Otherwise, the
encrypted setting cannot be unencrypted.
• vms: Lists all virtual machines currently registered with Oracle VM VirtualBox. By default this displays
a compact list with each VM’s name and UUID. If you also specify --long or
-l, this will be a detailed list as with the showvminfo command, see chapter 8.5, VBox- Manage
showvminfo, page 143.
• runningvms: Lists all currently running virtual machines by their unique identifiers
(UUIDs) in the same format as with vms.
• ostypes: Lists all guest operating systems presently known to Oracle VM VirtualBox, along with the
identifiers used to refer to them with the modifyvm command.
14
8 VBoxManage
• hostdvds, hostfloppies: Lists the DVD, floppy, bridged networking, and host-only net-
working interfaces on the host, along with the name used to access them from within Oracle VM
VirtualBox.
• intnets: Displays information about the internal networks.
• bridgedifs, hostonlyifs, natnets, dhcpservers: Lists the bridged network interfaces, host-
only network interfaces, NAT network interfaces, and DHCP servers currently avail- able on the host.
See chapter 6, Virtual Networking, page 104.
• hostinfo: Displays information about the host system, such as CPUs, memory size, and operating
system version.
• hostcpuids: Lists the CPUID parameters for the host CPUs. This can be used for a more fine
grained analyis of the host’s virtualization capabilities.
• hddbackends: Lists all known virtual disk back-ends of Oracle VM VirtualBox. For each such
format, such as VDI, VMDK, or RAW, this subcommand lists the back-end’s capabilities and
configuration.
• hdds, dvds, floppies: Shows information about virtual disk images currently in use by Oracle
VM VirtualBox, including all their settings, the unique identifiers (UUIDs) associ- ated with them by
Oracle VM VirtualBox and all files associated with them. This is the command-line equivalent of the
Virtual Media Manager. See chapter 5.3, The Virtual Media Manager, page 92.
• usbhost: Shows information about USB devices attached to the host, including informa- tion useful
for constructing USB filters and whether they are currently in use by the host.
• usbfilters: Lists all global USB filters registered with Oracle VM VirtualBox and displays the filter
parameters. Global USB filters are for devices which are accessible to all virtual machines.
• systemproperties: Displays some global Oracle VM VirtualBox settings, such as mini- mum
and maximum guest RAM and virtual hard disk size, folder settings and the current authentication
library in use.
• extpacks: Displays all Oracle VM VirtualBox extension packs that are currently installed. See
chapter 1.5, Installing Oracle VM VirtualBox and Extension Packs, page 6 and chapter
8.41, VBoxManage extpack, page 210.
• groups: Displays details of the VM Groups. See chapter 1.9, Using VM Groups, page 15.
• webcams: Displays a list of webcams attached to the running VM. The output format is a list of
absolute paths or aliases that were used for attaching the webcams to the VM using the webcam attach
command.
• screenshotformats: Displays a list of available screenshot formats.
• cloudproviders: Displays a list of cloud providers that are supported by Oracle VM
VirtualBox. Oracle Cloud Infrastructure is an example of a cloud provider.
• cloudprofiles: Displays a list of cloud profiles that have been configured.
Cloud profiles are used when exporting VMs to a cloud service. See chapter 1.14.5, Export- ing an
Appliance to Oracle Cloud Infrastructure, page 24.
14
8 VBoxManage
8.5 VBoxManage
showvminfo
The showvminfo command shows information about a particular virtual machine. This is the same
information as VBoxManage list vms --long would show for all virtual machines.
You will see information as shown in the following example.
$ VBoxManage showvminfo "Windows XP"
VirtualBox Command Line Management Interface Version <version-number>
(C) 2005-2018 Oracle Corporation
All rights reserved.
Name: Windows XP
Guest OS: Other/Unknown
UUID: 1bf3464d-57c6-4d49-92a9-a5cc3816b7e7
Config file: /home/username/.config/VirtualBox/Machines/Windows XP/Windows XP.xml
Memory size: 512MB
VRAM size: 12MB
Number of CPUs: 2
Boot menu mode: message and menu
Boot Device (1): DVD
Boot Device (2): HardDisk
Boot Device (3): Not Assigned
Boot Device (4): Not Assigned
ACPI: on
IOAPIC: on
...
Use the --machinereadable option to produce the same output, but in machine readable format
with a property=value string on each line. For example:
...
groups="/"
ostype="Oracle (64-bit)"
UUID="457af700-bc0a-4258-aa3c-13b03da171f2"
...
8.6 VBoxManage
registervm/unregistervm
The registervm command enables you to import a virtual machine definition in an XML file into Oracle
VM VirtualBox. The machine must not conflict with one already registered in Oracle VM VirtualBox and it
may not have any hard or removable disks attached. It is advisable to place the definition file in the machines
folder before registering it.
Note: When creating a new virtual machine with VBoxManage createvm, as shown in chapter
8.7, VBoxManage createvm, page 144, you can directly specify the --register option to avoid
having to register it separately.
The unregistervm command unregisters a virtual machine. If --delete is also specified, the
following files will also be deleted automatically:
• All hard disk image files, including differencing files, which are used by the machine and not shared
with other machines.
• Saved state files that the machine created. One if the machine was in Saved state and one for each
online snapshot.
• The machine XML file and its backups.
14
8 VBoxManage
8.7 VBoxManage
createvm
The VBoxManage createvm command creates a new XML virtual machine definition file.
You must specify the name of the VM by using --name <name>. This name is used by default
as the file name of the settings file that has the .xml extension and the machine folder, which
is a subfolder of the .config/VirtualBox/Machines folder. Note that the machine folder path
name varies based on the OS type and the Oracle VM VirtualBox version.
Ensure that the VM name conforms to the host OS’s file name requirements. If you later rename the
VM, the file and folder names will be updated to match the new name automatically. The --basefolder
<path> option specifies the machine folder path name. Note that the
names of the file and the folder do not change if you rename the VM.
The --group <group-ID>, ... option assigns the VM to the specified groups. Note that group
IDs always start with / so that they can be nested. By default, each VM is assigned membership to the
/ group.
The --ostype <ostype> option specifies the guest OS to run in the VM. Run the
VBoxManage list ostypes command to see the available OS types.
The --uuid <uuid> option specifies the universal unique identifier (UUID) of the VM. The
UUID must be unique within the namespace of the host or of its VM group memberships. By
default, the VBoxManage command automatically generates the UUID.
The --default option applies a default hardware configuration for the specified guest OS. By
default, the VM is created with minimal hardware.
The --register option registers the VM with your Oracle VM VirtualBox installation. By default,
the VBoxManage createvm command creates only the XML configuration for the VM but does not
registered the VM. If you do not register the VM at creation, you can run the VBoxManage
registervm command after you create the VM.
8.8 VBoxManage
modifyvm
This command changes the properties of a registered virtual machine which is not running. Most of the
properties that this command makes available correspond to the VM settings that Oracle VM VirtualBox
graphical user interface displays in each VM’s Settings dialog. These are described in chapter 3,
Configuring Virtual Machines, page 45. However, some of the more advanced settings are only available
through the VBoxManage interface.
These commands require that the machine is powered off, neither running nor in a Saved state. Some
machine settings can also be changed while a machine is running. Those settings will then have a
corresponding subcommand with the VBoxManage controlvm subcommand. See chapter 8.13,
VBoxManage controlvm, page 162.
• --name <name>: Changes the VM’s name and can be used to rename the internal virtual machine
files, as described in chapter 8.7, VBoxManage createvm, page 144.
• --groups <group>, ...: Changes the group membership of a VM. Groups always start with a /
and can be nested. By default VMs are in group /.
14
8 VBoxManage
• --description <desc>: Changes the VM’s description, which is a way to record details about
the VM in a way which is meaningful for the user. The GUI interprets HTML format- ting, the command
line allows arbitrary strings potentially containing multiple lines.
• --ostype <ostype>: Specifies what guest operating system is supposed to run in the
VM. To learn about the various identifiers that can be used here, use VBoxManage list
ostypes.
• --iconfile <filename>: Specifies the absolute path on the host file system for the Oracle
VM VirtualBox icon to be displayed in the VM.
• --memory <memorysize>: Sets the amount of RAM, in MB, that the virtual machine should
allocate for itself from the host. See chapter 1.7, Creating Your First Virtual Ma- chine, page 8.
• --pagefusion on|off: Enables and disables the Page Fusion feature. Page Fusion is disabled
by default. The Page Fusion feature minimises memory duplication between VMs with similar
configurations running on the same host. See chapter 4.10.2, Page Fusion, page 86.
• --vram <vramsize>: Sets the amount of RAM that the virtual graphics card should have. See
chapter 3.6, Display Settings, page 54.
• --acpi on|off and --ioapic on|off: Determines whether the VM has ACPI and I/O APIC
support. See chapter 3.5.1, Motherboard Tab, page 52.
• --pciattach <host PCI address [@ guest PCI bus address]>: Attaches a speci-
fied PCI network controller on the host to a specified PCI bus on the guest.
• --pcidetach <host PCI address>: Detaches a specified PCI network controller on the host
from the attached PCI bus on the guest.
• --hardwareuuid <uuid>: The UUID presented to the guest through memory tables
(DMI/SMBIOS), hardware, and guest properties. By default this is the same as the VM UUID. This
setting is useful when cloning a VM. Teleporting takes care of this automati- cally.
• --cpus <cpucount>: Sets the number of virtual CPUs for the virtual machine, see chapter
3.5.2, Processor Tab, page 53. If CPU hot-plugging is enabled, this then sets the maximum
number of virtual CPUs that can be plugged into the virtual machines.
• --cpuhotplug on|off: Enables CPU hot-plugging. When enabled, virtual CPUs can be added to
and removed from a virtual machine while it is running. See chapter 9.4, CPU Hot-Plugging, page
246.
• --plugcpu|unplugcpu <id>: If CPU hot-plugging is enabled, this setting adds or removes a virtual
CPU on the virtual machine. <id> specifies the index of the virtual CPU to be added or removed
and must be a number from 0 to the maximum number of CPUs config- ured with the --cpus option.
CPU 0 can never be removed.
• --cpuexecutioncap <1-100>: Controls how much CPU time a virtual CPU can use. A
value of 50 implies a single virtual CPU can use up to 50% of a single host CPU.
• --pae on|off: Enables and disables PAE. See chapter 3.5.2, Processor Tab, page 53.
• --longmode on|off: Enables and disables long mode. See chapter 3.5.2, Processor Tab, page 53.
14
8 VBoxManage
• --spec-ctrl on|off: Enables and disables the exposure of speculation control interfaces to the
guest, provided they are available on the host. Depending on the host CPU and workload, enabling
speculation control may significantly reduce performance.
• --cpu-profile <host|intel 80[86|286|386]>: Enables specification of a profile for guest
CPU emulation. Specify either one based on the host system CPU (host), or one from a number of
older Intel Micro-architectures: 8086, 80286, 80386.
• --hpet on|off: Enables and disables a High Precision Event Timer (HPET) which can replace
the legacy system timers. This is turned off by default. Note that Windows supports a HPET only from
Vista onwards.
• --hwvirtex on|off: Enables and disables the use of hardware virtualization extensions, such as
Intel VT-x or AMD-V, in the processor of your host system. See chapter 10.3, Hardware
Virtualization, page 305.
• --triplefaultreset on|off: Enables resetting of the guest instead of triggering a Guru
Meditation. Some guests raise a triple fault to reset the CPU so sometimes this is desired behavior.
Works only for non-SMP guests.
• --apic on|off: Enables and disables I/O APIC. With I/O APIC, operating systems can use more than
16 interrupt requests (IRQs) thus avoiding IRQ sharing for improved reliability. This setting is enabled
by default. See chapter 3.5.1, Motherboard Tab, page 52.
• --x2apic on|off: Enables and disables CPU x2APIC support. CPU x2APIC support helps operating
systems run more efficiently on high core count configurations, and optimizes in- terrupt distribution in
virtualized environments. This setting is enabled by default. Disable this setting when using host or
guest operating systems that are incompatible with x2APIC support.
• --paravirtprovider none|default|legacy|minimal|hyperv|kvm: Specifies which
paravirtualization interface to provide to the guest operating system. Specifying none ex- plicitly turns
off exposing any paravirtualization interface. The option default selects an appropriate interface
when starting the VM, depending on the guest OS type. This is the default option chosen when
creating new VMs. The legacy option is used for VMs which were created with older Oracle VM
VirtualBox versions and will pick a paravirtualization interface when starting the VM with Oracle VM
VirtualBox 5.0 and newer. The minimal provider is mandatory for Mac OS X guests. kvm and
hyperv are recommended for Linux and Windows guests respectively. These options are explained
in chapter 10.5, Paravirtu- alization Providers, page 306.
• --paravirtdebug <keyword=value> [,<keyword=value> ...]: Specifies debugging
options specific to the paravirtualization provider configured for this VM. See the provider specific
options in chapter 9.29, Paravirtualized Debugging, page 288 for a list of supported keyword-value pairs
for each provider.
• --nestedpaging on|off: If hardware virtualization is enabled, this additional setting enables
or disables the use of the nested paging feature in the processor of your host system. See chapter
10.3, Hardware Virtualization, page 305 and chapter 13.4.1, CVE-
2018-3646, page 328.
• --largepages on|off: If hardware virtualization and nested paging are enabled, for Intel VT-x
only, an additional performance improvement of up to 5% can be obtained by enabling this setting. This
causes the hypervisor to use large pages to reduce TLB use and overhead.
• --vtxvpid on|off: If hardware virtualization is enabled, for Intel VT-x only, this addi- tional
setting enables or disables the use of the tagged TLB (VPID) feature in the processor of your host
system. See chapter 10.3, Hardware Virtualization, page 305.
14
8 VBoxManage
• --vtxux on|off: If hardware virtualization is enabled, for Intel VT-x only, this setting enables
or disables the use of the unrestricted guest mode feature for executing your guest.
• --nested-hw-virt on|off: If hardware virtualization is enabled, this setting enables or disables
passthrough of hardware virtualization features to the guest. See chapter 9.33, Nested Virtualization,
page 294.
• --accelerate3d on|off: If the Guest Additions are installed, this setting enables or dis- ables
hardware 3D acceleration. See chapter 4.5.1, Hardware 3D Acceleration (OpenGL and Direct3D 8/9), page
79.
• --accelerate2dvideo on|off: If the Guest Additions are installed, this setting enables or
disables 2D video acceleration. See chapter 4.5.2, Hardware 2D Video Acceleration for Windows Guests,
page 80.
• --chipset piix3|ich9: By default, Oracle VM VirtualBox emulates an Intel PIIX3 chipset.
Usually there is no reason to change the default setting unless this is required to relax some of its
constraints. See chapter 3.5.1, Motherboard Tab, page 52.
• You can influence the BIOS logo that is displayed when a virtual machine starts up with a number of
settings. By default, an Oracle VM VirtualBox logo is displayed.
With --bioslogofadein on|off and --bioslogofadeout on|off, you can determine
whether the logo should fade in and out, respectively.
With --bioslogodisplaytime <msec> you can set how long the logo should be visible, in
milliseconds.
With --bioslogoimagepath <imagepath> you can replace the image that is shown with your
own logo. The image must be an uncompressed 256 color BMP file without color space
information (Windows 3.0 format). The image must not be bigger than 640 x 480.
• --biosbootmenu disabled|menuonly|messageandmenu: Specifies whether the BIOS en-
ables the user to select a temporary boot device. The menuonly option suppresses the message,
but the user can still press F12 to select a temporary boot device.
• --biosapic x2apic|apic|disabled: Specifies the firmware APIC level to be used. Op- tions
are: x2apic, apic or disabled (no apic or x2apic) respectively.
Note that if x2apic is specified and x2APIC is unsupported by the VCPU, biosapic down- grades to
apic, if supported. Otherwise biosapic downgrades to disabled. Similarly, if apic is specified, and
APIC is unsupported, a downgrade to disabled results.
• --biossystemtimeoffset <ms>: Specifies a fixed time offset, in milliseconds, of the guest
relative to the host time. If the offset is positive, the guest time runs ahead of the host time.
• --biospxedebug on|off: Enables or disables additional debugging output when using the Intel
PXE boot ROM. The output is written to the release log file. See chapter 12.1.2, Collecting Debugging
Information, page 310.
• --system-uuid-le on|off: Enables or disables representing the system UUID in little endian
form. The default value is on for new VMs. For old VMs the setting is off to keep the content of
the DMI/SMBIOS table unchanged, which can be important for Windows license activation.
• --boot<1-4> none|floppy|dvd|disk|net: Specifies the boot order for the virtual ma- chine.
There are four slots, which the VM will try to access from 1 to 4, and for each of which you can
set a device that the VM should attempt to boot from.
• --rtcuseutc on|off: Sets the real-time clock (RTC) to operate in UTC time. See chapter
3.5.1, Motherboard Tab, page 52.
14
8 VBoxManage
• --snapshotfolder default|<path>: Specifies the folder where snapshots are kept for a virtual
machine.
• --firmware bios|efi|efi32|efi64: Specifies the firmware to be used to boot the VM:
Available options are: BIOS, or one of the EFI options: efi, efi32, or efi64. Use EFI options with care.
• --guestmemoryballoon <size> Sets the default size of the guest memory balloon. This is the
memory allocated by the Oracle VM VirtualBox Guest Additions from the guest op- erating system and
returned to the hypervisor for reuse by other virtual machines. <size> must be specified in
megabytes. The default size is 0 megabytes. See chapter 4.10.1, Memory Ballooning, page 85.
• --defaultfrontend default|<name>: Specifies the default frontend to be used when starting
this VM. See chapter 8.12, VBoxManage startvm, page 161.
• --vm-process-priority default|flat|low|normal|high: Specifies the priority
scheme of the VM process to be used when starting this VM and during VM execution. See
chapter 8.12, VBoxManage startvm, page 161.
14
8 VBoxManage
14
8 VBoxManage
• --natpf<1-N> [<name>],tcp|udp,[<hostip>],<hostport>,[<guestip>],
<guestport>: Defines a NAT port-forwarding rule. See chapter 6.3.1, Configuring
Port Forwarding with NAT, page 106.
• --natpf<1-N> delete <name>: Deletes a NAT port-forwarding rule. See chapter 6.3.1,
Configuring Port Forwarding with NAT, page 106.
• --nattftpprefix<1-N> <prefix>: Defines a prefix for the built-in TFTP server. For ex- ample,
where the boot file is located. See chapter 6.3.2, PXE Booting with NAT, page 107 and chapter
9.8.2, Configuring the Boot Server (Next Server) of a NAT Network Interface, page 253.
• --nattftpfile<1-N> <bootfile>: Defines the TFT boot file. See chapter 9.8.2, Config- uring
the Boot Server (Next Server) of a NAT Network Interface, page 253.
• --nattftpserver<1-N> <tftpserver>: Defines the TFTP server address to boot from. See
chapter 9.8.2, Configuring the Boot Server (Next Server) of a NAT Network Interface, page 253.
• --nattbindip<1-N> <ip;>: Oracle VM VirtualBox’s NAT engine normally routes TCP/IP
packets through the default interface assigned by the host’s TCP/IP stack. Use this setting to instruct
the NAT engine to bind to a specified IP address instead. See chapter 9.8.3, Tuning TCP/IP Buffers
for NAT, page 253.
• --natdnspassdomain<1-N> on|off: Specifies whether the built-in DHCP server passes the
domain name for network name resolution.
• --natdnsproxy<1-N> on|off: Makes the NAT engine proxy all guest DNS requests to the host’s
DNS servers. See chapter 9.8.5, Enabling DNS Proxy in NAT Mode, page 254.
• --natdnshostresolver<1-N> on|off: Makes the NAT engine use the host’s resolver
mechanisms to handle DNS requests. See chapter 9.8.5, Enabling DNS Proxy in NAT Mode, page 254.
• --natsettings<1-N> [<mtu>],[<socksnd>],[<sockrcv>],[<tcpsnd>],
[<tcprcv>]: Controls several NAT settings. See chapter 9.8.3, Tuning TCP/IP Buffers for
NAT, page 253.
• --nataliasmode<1-N> default|[log],[proxyonly],[sameports]: Defines behaviour of
the NAT engine core: log - enables logging, proxyonly - switches off aliasing mode and makes NAT
transparent, sameports - enforces the NAT engine to send packets through the same port as they
originated on, default - disable all aliasing modes. See chapter 9.8.7, Configuring Aliasing of the NAT
Engine, page 255.
15
8 VBoxManage
15
8 VBoxManage
15
8 VBoxManage
• --vrde on|off: Enables and disables the VirtualBox Remote Desktop Extension (VRDE)
server.
• --vrdeproperty "TCP/Ports|Address=<value>": Sets the port numbers and IP address on
the VM that the VRDE server can bind to.
– For TCP/Ports, <value> should be a port or a range of ports that the VRDE server can bind to.
default or 0 means port 3389, the standard port for RDP. See the description for the --
vrdeport option in chapter 8.8.5, Remote Machine Settings, page 153.
– For TCP/Address, <value> should be the IP address of the host network interface that the
VRDE server will bind to. If specified, the server will accept connections only on the specified
host network interface. See the description for the --vrdeaddress option in chapter 8.8.5,
Remote Machine Settings, page 153.
• --vrdeproperty "VideoChannel/Enabled|Quality|DownscaleProtection=<value>":
Sets the VRDP video redirection properties.
– For VideoChannel/Enabled, <value> can be set to “1”, switching the VRDP video channel
on. See chapter 7.1.9, VRDP Video Redirection, page 123.
– For VideoChannel/Quality, <value> should be set between 10 and 100% inclusive,
representing a JPEG compression level on the VRDE server video channel. Lower values
mean lower quality but higher compression. See chapter 7.1.9, VRDP Video Redirection, page
123.
– For VideoChannel/DownscaleProtection, <value> can be set to “1” to enable the
videochannel downscale protection feature. When enabled, if a video’s size equals the
shadow buffer size, then it is regarded as a full screen video, and is displayed. But if its size is
between fullscreen and the downscale threshold then it is not displayed, as it could be an
application window, which would be unreadable when downscaled. When the downscale
protection feature is disabled, an attempt is always made to display videos.
• --vrdeproperty "Client/DisableDisplay|DisableInput|DisableAudio|DisableUSB=1":
Disables one of the VRDE server features: Display, Input, Audio or USB respectively. To reenable a
feature, use “Client/DisableDisplay=“ for example. See chapter 7.1.10, VRDP Customization, page 124.
15
8 VBoxManage
15
8 VBoxManage
• --vrdeport default|<ports>: A port or a range of ports the VRDE server can bind to.
default or 0 means port 3389, the standard port for RDP. You can specify a comma- separated
list of ports or ranges of ports. Use a dash between two port numbers to specify a range. The VRDE
server will bind to one of the available ports from the specified list. Only one machine can use a
given port at a time. For example, the option --vrdeport
5000,5010-5012 will tell the server to bind to one of following ports: 5000, 5010, 5011, or
5012.
• --vrdeaddress <IP address>: The IP address of the host network interface the VRDE server
will bind to. If specified, the server will accept connections only on the specified host network
interface.
The setting can be used to specify whether the VRDP server should accept either IPv4, IPv6, or both
connections:
– Only IPv4: --vrdeaddress "0.0.0.0"
– Only IPv6: --vrdeaddress "::"
– Both IPv6 and IPv4: --vrdeaddress ""
This is the default setting.
• --vrdeauthtype null|external|guest: Enables you to indicate use of authorization, and
specify how authorization will be performed. See chapter 7.1.5, RDP Authentication, page 121.
• --vrdeauthlibrary default|<name>: Specifies the library used for RDP authentication. See
chapter 7.1.5, RDP Authentication, page 121.
• --vrdemulticon on|off: Enables multiple connections to be made to the same VRDE server,
if the server supports this feature. See chapter 7.1.7, Multiple Connections to the VRDP Server, page
123.
• --vrdereusecon on|off: This specifies the VRDE server behavior when multiple con- nections
are disabled. When this option is enabled, the server will allow a new client to connect and will
drop the existing connection. When this option is disabled, the default setting, a new connection
will not be accepted if there is already a client connected to the server.
• --vrdevideochannel on|off: Enables video redirection, if it is supported by the VRDE
server. See chapter 7.1.9, VRDP Video Redirection, page 123.
• --vrdevideochannelquality <percent>: Specifies the image quality for video redirec- tion.
See chapter 7.1.9, VRDP Video Redirection, page 123.
• --teleporter on|off: Enables and disables the teleporter feature whereby when the machine
is started, it waits to receive a teleporting request from the network instead of booting normally.
Teleporting requests are received on the port and address specified using the following parameters.
• --teleporterport <port>, --teleporteraddress <address>: These settings must be
used with --teleporter. They specify the port and address the virtual machine should listen to in
order to receive a teleporting request sent from another virtual machine. <port> can be any free
TCP/IP port number, such as 6000. <address> can be any IP address or
15
8 VBoxManage
hostname and specifies the TCP/IP socket to bind to. The default is 0.0.0.0, which means any
address.
• --teleporterpassword <password>: If this optional setting is used, then the teleporting request
will only succeed if the source machine specifies the same password as the one given with this
command.
• --teleporterpasswordfile <password>: If this optional setting is used, then the tele-
porting request will only succeed if the source machine specifies the same password as the one
specified in the file give with this command. Use stdin to read the password from stdin.
• --cpuid <leaf> <eax> <ebx> <ecx> <edx>: Advanced users can use this setting before a
teleporting operation, to restrict the virtual CPU capabilities that Oracle VM VirtualBox presents to the
guest operating system. This must be run on both the source and the target machines involved in the
teleporting and will then modify what the guest sees when it ex- ecutes the CPUID machine instruction.
This might help with misbehaving applications that wrongly assume that certain CPU capabilities are
present. The meaning of the parameters is hardware dependent, refer to the AMD or Intel processor
documentation.
• --tracing-enabled on|off: Enables the tracebuffer. This consumes some memory for the
tracebuffer and adds extra overhead.
• --tracing-config <config-string>: Enables tracing configuration. In particular, this defines
which group of tracepoints are enabled.
• --tracing-allow-vm-access on|off: Enables and disables VM access to the tracebuffer. By
default, this setting is disabled.
• --usbcardreader on|off: Enables and disables the USB card reader interface.
• --autostart-enabled on|off: Enables and disables VM autostart at host system boot- up,
using the specified user name.
• --autostart-delay <seconds>: Specifies a delay, in seconds, following host system boot-
up, before the VM autostarts.
15
8 VBoxManage
8.9 VBoxManage
movevm
This command moves a virtual machine to a new location on the host.
Associated files of the virtual machine, such as settings files and disk image files, are moved to the new
location. The Oracle VM VirtualBox configuration is updated automatically.
The movevm subcommand requires the name of the virtual machine which should be moved. Also required
is the type of move operation, specified by --type basic. Other types of move
operation may be supported in future releases.
The --folder setting configures the new location on the host file system. Enter a relative pathname
or a full pathname.
8.10 VBoxManage
import
This command imports one or more virtual machines into Oracle VM VirtualBox. You can import from either
of the following:
See chapter 1.14, Importing and Exporting Virtual Machines, page 21 for more details on im- porting VMs
into Oracle VM VirtualBox.
15
8 VBoxManage
The individual configuration items are numbered, and depending on their type support differ- ent command-
line options. The import subcommand can be directed to ignore many such items with a --vsys X --
unit Y --ignore option, where X is the number of the virtual system and Y the item number, as printed
on the screen. X is zero, unless there are several virtual system descriptions in the appliance.
In the above example, Item #1 specifies the name of the target machine in Oracle VM VirtualBox.
Items #12 and #13 specify hard disk controllers, respectively. Item #14 describes a hard disk image. In this
case, the additional --controller option indicates which item the disk image should be connected to,
with the default coming from the OVF file.
You can combine several items for the same virtual system using the --vsys option. For example,
to import a machine as described in the OVF, but without the sound card and without the USB controller,
and with the disk image connected to the IDE controller instead of the SCSI controller, use the following
command:
VBoxManage import WindowsXp.ovf
--vsys 0 --unit 8 --ignore --unit 9 --ignore --unit 14 --controller 13
To import a VM from a cloud service such as Oracle Cloud Infrastructure, use the --cloud
option to specify the import from the Cloud. Some of the following options are settings for the
15
8 VBoxManage
VM, for others you must enter an Oracle Cloud Identifier (OCID) for a resource. Use the Oracle
Cloud Infrastructure Console to view OCIDs. The
following parameters can be specified:
• --vmname: Specifies a new name for the imported VM. This name is used as the VM name by Oracle
VM VirtualBox.
• --cloudinstanceid: The ID of an existing instance in the Cloud.
• --cloudprofile: Specifies the cloud profile that is used to connect to the cloud service provider.
The cloud profile contains your Oracle Cloud Infrastructure account details, such as your user OCID and
the fingerprint for your public key. To use a cloud profile, you must have the required permissions on
Oracle Cloud Infrastructure.
• --cloudbucket: Specifies the bucket name in which to store the object created from an instance
bootable volume. In Oracle Cloud Infrastructure, a bucket is a logical container for storing objects.
The following import options have the same meaning as for OVF import:
The import options --disk, --controller, --scsitype, --unit, --settingsfile are not
valid for cloud import.
The following example shows a typical command line for importing an instance from Oracle
Cloud Infrastructure:
# VBoxManage import OCI:// --cloud --vmname import_from_oci --memory 4000
--cpus 3 --ostype FreeBSD_64 --cloudprofile "standard user"
--cloudinstanceid ocid1.instance.oc1.iad.abuwc... --cloudbucket myBucket
• A virtual appliance in OVF format, including copying their virtual disk images to com- pressed
VMDK.
• A cloud service, such as Oracle Cloud Infrastructure. A single VM can be exported in VMDK
format.
See chapter 1.14, Importing and Exporting Virtual Machines, page 21 for more details on ex- porting VMs
from Oracle VM VirtualBox.
15
8 VBoxManage
• --output/-o: Specifies the short name of the cloud service provider to which you export. For
Oracle Cloud Infrastructure, enter OCI://.
• --cloud number-of-virtual-system: Specifies a number that identifies the VM that you are
exporting. Numbering starts at 0 for the first VM.
• --vmname name: Specifies the name of the exported VM. This name is used as the VM
instance name in Oracle Cloud Infrastructure.
• --cloudprofile cloud-profile-name: Specifies the cloud profile that is used to connect to
the cloud service provider. The cloud profile contains your Oracle Cloud Infrastructure account
details, such as your user OCID and the fingerprint for your public key. See chapter
1.14.5, Exporting an Appliance to Oracle Cloud Infrastructure, page 24.
To use a cloud profile, you must have the required permissions on Oracle Cloud Infrastruc- ture.
• --cloudshape shape: Specifies the shape used for the VM instance. The shape defines the number
of CPUs and the amount of memory allocated to the VM instance. The shape must be compatible with
the exported image.
• --clouddomain domain: Specifies the availability domain to use for the VM instance. Enter the full
name of the availability domain.
16
8 VBoxManage
• --clouddisksize disk-size-in-GB: Specifies the disk size used for the exported disk image
in gigabytes. The minimum value is 50 GB and the maximum value is 300 GB.
• --cloudbucket bucket-name: Specifies the bucket in which to store the uploaded files. In
Oracle Cloud Infrastructure, a bucket is a logical container for storing objects.
• --cloudocivcn OCI-vcn-ID: Specifies the virtual cloud network (VCN) to use for the VM
instance. Enter the OCID for the VCN.
• --cloudocisubnet OCI-subnet-ID: Specifies the subnet of the VCN to use for the VM
instance. Enter the OCID for the subnet.
• --cloudkeepobject true | false: Specifies whether to store the exported disk image in
Oracle Object Storage.
• --cloudlaunchinstance true | false: Specifies whether to start the VM instance after the
export to Oracle Cloud Infrastructure completes.
• --cloudpublicip true | false: Specifies whether to enable a public IP address for the
VM instance.
The following example shows a typical command line for exporting a VM to Oracle Cloud
Infrastructure.
# VBoxManage export myVM --output OCI:// --cloud 0 --vmname myVM_Cloud \
--cloudprofile "standard user" --cloudbucket myBucket \
--cloudshape VM.Standard2.1 --clouddomain US-ASHBURN-AD-1 --clouddisksize 50 \
--cloudocivcn ocid1.vcn.oc1.iad.aaaa... --cloudocisubnet ocid1.subnet.oc1.iad.aaaa... \
--cloudkeepobject true --cloudlaunchinstance true --cloudpublicip true
gui
headless
Starts a VM with a detachable UI. Technically, it is a headless VM with user interface in a separate
process. This is an experimental feature as it lacks certain functionality, such as
3D acceleration.
16
8 VBoxManage
Note: If you experience problems with starting virtual machines with particular fron- tends and
there is no conclusive error information, consider starting virtual machines directly by running the
respective front-end, as this can give additional error informa- tion.
• VBoxManage controlvm <vm> pause: Temporarily puts a virtual machine on hold, with- out
permanently changing its state. The VM window is gray, to indicate that the VM is currently
paused. This is equivalent to selecting the Pause item in the Machine menu of the GUI.
• Use VBoxManage controlvm <vm> resume: Undoes a previous pause command. This is
equivalent to selecting the Resume item in the Machine menu of the GUI.
• VBoxManage controlvm <vm> reset: Has the same effect on a virtual machine as press- ing the
Reset button on a real computer. A cold reboot of the virtual machine is done, which immediately
restarts and reboots the guest operating system. The state of the VM is not saved beforehand, and data
may be lost. This is equivalent to selecting the Reset item in the Machine menu of the GUI.
• VBoxManage controlvm <vm> poweroff: Has the same effect on a virtual machine as pulling
the power cable on a real computer. The state of the VM is not saved beforehand, and data may be
lost. This is equivalent to selecting the Close item in the Machine menu of the GUI, or clicking the
VM window’s close button, and then selecting Power Off the Machine in the displayed dialog.
After this, the VM’s state will be Powered Off. From that state, it can be started again. See chapter
8.12, VBoxManage startvm, page 161.
• VBoxManage controlvm <vm> savestate: Saves the current state of the VM to disk and then
stops the VM. This is equivalent to selecting the Close item in the Machine menu of the GUI or
clicking the VM window’s close button, and then selecting Save the Machine State in the
displayed dialog.
After this, the VM’s state will be Saved. From this state, it can be started again. See chapter
8.12, VBoxManage startvm, page 161.
• VBoxManage controlvm <vm> acpipowerbutton: Sends an ACPI shutdown signal to the VM,
as if the power button on a real computer had been pressed. So long as the VM is running a fairly
modern guest operating system providing ACPI support, this should trigger a proper shutdown
mechanism from within the VM.
• VBoxManage controlvm <vm> keyboardputscancode <hex> [<hex>...]: Sends com-
mands using keycodes to the VM. Keycodes are documented in the public domain. For example:
http://www.win.tue.nl/~aeb/linux/kbd/scancodes-1.html.
• VBoxManage controlvm "VM name" teleport --hostname <name> --port <port> [--passwordfile <
Makes the machine the source of a teleporting operation and initiates a teleport to the
given target. See chapter 7.2, Teleporting, page 124. If the optional password is specified, it must
match the password that was given to the modifyvm command for the target machine. See
chapter 8.8.6, Teleporting Settings, page 155.
16
8 VBoxManage
The following extra options are available with controlvm that do not directly affect the VM’s running
state:
• setlinkstate<1-N> on|off: Connects or disconnects virtual network cables from their network
interfaces.
• nic<1-N> null|nat|bridged|intnet|hostonly|generic|natnetwork[<devicename>]:
Specifies the type of networking that should be made available on the specified VM virtual network card.
They available types are: not connected to the host (null), use network address translation (nat),
bridged networking (bridged), communicate with other virtual machines using internal networking
(intnet), host-only networking (hostonly), natnetwork networking (natnetwork), or access to
rarely used submodes (generic). These options correspond to the modes which are described in
detail in chapter 6.2, Introduction to Networking Modes, page 105.
• With the nictrace options, you can optionally trace network traffic by dumping it to a file, for
debugging purposes.
nictrace<1-N> on|off: Enables network tracing for a particular virtual network card. Before
enabling you should specify a file name to which the trace should
be logged. This can be done with the nictracefile<1-N> <filename> op-
tion to VBoxManage controlvm at runtime or with the <filename> option to
VBoxManage modifyvm otherwise.
16
8 VBoxManage
• audioout on: Selects whether audio playback from the guest is enabled or disabled.
• clipboard mode disabled|hosttoguest|guesttohost|bidirectional: Selects how
the guest or host operating system’s clipboard should be shared with the host or guest. See chapter 3.4,
General Settings, page 50. This requires that the Guest Additions be installed in the virtual machine.
• clipboard filetransfers enabled|disabled: Specifies if clipboard file transfers are
allowed between host and guest OSes or not.
• draganddrop disabled|hosttoguest|guesttohost|bidirectional: Selects the cur-
rent drag and drop mode being used between the host and the virtual machine. See chap- ter 4.4, Drag
and Drop, page 77. This requires that the Guest Additions be installed in the virtual machine.
• vrde on|off: Enables and disables the VRDE server, if it is installed.
• vrdeport default|<ports>: Changes the port or a range of ports that the VRDE server can bind
to. default or 0 means port 3389, the standard port for RDP. See the description for the --
vrdeport option in chapter 8.8.5, Remote Machine Settings, page 153.
16
8 VBoxManage
• vrdeproperty "Client/DisableRDPDR=1": Disables the VRDE server feature: RDP de- vice
redirection for smart cards. To reenable this feature, use “Client/DisableRDPR=“.
• vrdeproperty "H3DRedirect/Enabled=1": Enables the VRDE server feature: 3D redi-
rection. To disable this feature, use “H3DRedirect/Enabled=“.
• vrdeproperty "Security/Method|ServerCertificate|ServerPrivateKey|CACertificate=<value>":
Sets the desired security method, path of the server certificate, path of the server private
key, and path of CA certificate, used for a connection.
– vrdeproperty "Security/Method=<value>": Sets the desired security method,
which is used for a connection. Valid values are as follows:
∗ Negotiate: Both Enhanced (TLS) and Standard RDP Security connections are allowed.
The security method is negotiated with the client. This is the default setting.
∗ RDP: Only Standard RDP Security is accepted.
∗ TLS: Only Enhanced RDP Security is accepted. The client must support TLS. See
chapter 7.1.6, RDP Encryption, page 122.
– vrdeproperty "Security/ServerCertificate=<value>" where <value> is the
absolute path of the server certificate. See chapter 7.1.6, RDP Encryption, page 122.
– vrdeproperty "Security/ServerPrivateKey=<value>" where <value> is the
absolute path of the server private key. See chapter 7.1.6, RDP Encryption, page 122.
– vrdeproperty "Security/CACertificate=<value>" where <value> is the abso-
lute path of the CA self signed certificate. See chapter 7.1.6, RDP Encryption, page
122.
• vrdeproperty "Audio/RateCorrectionMode|LogPath=<value>": Sets the audio con-
nection mode, or path of the audio logfile.
– vrdeproperty "Audio/RateCorrectionMode=<value>" where <value> is the de-
sired rate correction mode, allowed values are:
∗ VRDP_AUDIO_MODE_VOID: No mode specified, use to unset any Audio mode al- ready
set.
∗ VRDP_AUDIO_MODE_RC: Rate correction mode.
∗ VRDP_AUDIO_MODE_LPF: Low pass filter mode.
∗ VRDP_AUDIO_MODE_CS: Client sync mode to prevent underflow or overflow of the client
queue.
– vrdeproperty "Audio/LogPath=<value>" where <value> is the absolute path of the
audio log file.
• vrdevideochannelquality <percent>: Sets the image quality for video redirection. See
chapter 7.1.9, VRDP Video Redirection, page 123.
• setvideomodehint: Requests that the guest system change to a particular video mode. This
requires that the Guest Additions be installed, and will not work for all guest systems.
• screenshotpng: Takes a screenshot of the guest display and saves it in PNG format.
16
8 VBoxManage
• recording on|off enables or disables the recording of a VM session into a WebM/VP8 file.
When this option value is on, recording begins when the VM session starts.
• recordingscreens all|screen-ID [screen-ID ...] enables you to specify which VM
screens to record. The recording for each screen that you specify is saved to its own file. You cannot
modify this setting while recording is enabled.
• recordingfile filename specifies the file in which to save the recording. You cannot modify
this setting while recording is enabled.
• recordingvideores widthxheight specifies the resolution of the recorded video in pix- els.
You cannot modify this setting while recording is enabled.
• recordingvideorate bit-rate specifies the bit rate of the video in kilobits per second.
Increasing this value improves the appearance of the video at the cost of an increased file size. You
cannot modify this setting while recording is enabled.
• recordingvideofps fps specifies the maximum number of video frames per second (FPS)
to record. Frames that have a higher frequency are skipped. Increasing this value reduces the number
of skipped frames and increases the file size. You cannot modify this setting while recording is
enabled.
• recordingmaxtime seconds specifies the maximum amount time to record in seconds. The
recording stops after the specified number of seconds elapses. If this value is zero, the recording
continues until you stop the recording.
• recordingmaxsize MB specifies the maximum size of the recorded video file in megabytes. The
recording stops when the file reaches the specified size. If this value is zero, the recording
continues until you stop the recording. You cannot modify this setting while recording is enabled.
• recordingopts keyword=value[,keyword=value ...] specifies additional recording
options in a comma-separated keyword-value format. For example, foo=bar,a=b. You cannot
modify this setting while recording is enabled.
Only use this option only if you are an advanced user. For information about keywords, see
Oracle VM VirtualBox Programming Guide and Reference.
• setcredentials: Used for remote logins on Windows guests. See chapter 9.1, Automated
Guest Logins, page 240.
• teleport --host <name> --port <port>: Configures a VM as a target for teleporting.
<name> specifies the virtual machine name. <port> specifies the port on the virtual
machine which should listen for teleporting requests from other virtual machines. It can be any free
TCP/IP port number, such as 6000. See chapter 7.2, Teleporting, page 124.
– --maxdowntime <msec>: Specifies the maximum downtime, in milliseconds, for the
teleporting target VM. Optional.
– --password <password>: The teleporting request will only succeed if the source
machine specifies the same password as the one given with this command. Optional.
– --passwordfile <password file>: The teleporting request will only succeed if the
source machine specifies the same password as the one specified in the password file with the
path specified with this command. Use stdin to read the password from stdin. Optional.
• plugcpu|unplugcpu <id>: If CPU hot-plugging is enabled, this setting adds and removes a virtual
CPU to the virtual machine. <id> specifies the index of the virtual CPU to be added or removed and
must be a number from 0 to the maximum number of CPUs configured. CPU 0 can never be
removed.
16
8 VBoxManage
• The cpuexecutioncap <1-100>: Controls how much CPU time a virtual CPU can use. A
value of 50 implies a single virtual CPU can use up to 50% of a single host CPU.
• webcam list: Lists webcams attached to the running VM. The output is a list of ab- solute
paths or aliases that were used for attaching the webcams to the VM using the webcam attach
command.
• addencpassword <id> <password file>|- [--removeonsuspend <yes|no>]: Sup-
plies an encrypted VM specified by <id> with the encryption password to enable a headless start. Either
specify the absolute path of a password file on the host file system: <password file>, or use - to
instruct VBoxManage to prompt the user for the encryption password.
--removeonsuspend <yes|no>: Specifies whether to remove the passsword or keep the
password in VM memory when the VM is suspended. If the VM has been suspended and the
password has been removed, the user needs to resupply the password before the VM
16
8 VBoxManage
can be resumed. This feature is useful in cases where the user does not want the password to be stored
in VM memory, and the VM is suspended by a host suspend event.
Note: On Oracle VM VirtualBox versions 5.0 and later, data stored on hard disk images can be
transparently encrypted for the guest. Oracle VM VirtualBox uses the AES algo- rithm in XTS
mode and supports 128 or 256 bit data encryption keys (DEK). The DEK is stored encrypted in
the medium properties, and is decrypted during VM startup by supplying the encryption
password.
The VBoxManage encryptmedium command is used to create a DEK encrypted medium. See
chapter 9.28.2, Encrypting Disk Images, page 287. When starting an encrypted VM from the Oracle VM
VirtualBox GUI, the user will be prompted for the encryption password.
For a headless encrypted VM start, use the following command:
8.14 VBoxManage
discardstate
This command discards the saved state of a virtual machine which is not currently running. This will cause the
VM’s operating system to restart next time you start it. This is the equivalent of pulling out the power cable
on a physical machine, and should be avoided if possible.
8.15 VBoxManage
adoptstate
If you have a Saved state file (.sav) that is separate from the VM configuration, you can use this command to
adopt the file. This will change the VM to saved state and when you start it, Oracle VM VirtualBox will
attempt to restore it from the saved state file you indicated. This command should only be used in special
setups.
8.16 VBoxManage
closemedium
This command removes a hard disk, DVD, or floppy image from a Oracle VM VirtualBox media registry.
VBoxManage closemedium [disk|dvd|floppy] <uuid|filename>
[--delete]
16
8 VBoxManage
Optionally, you can request that the image be deleted. You will get appropriate diagnostics that the
deletion failed, however the image will become unregistered in any case.
16
8 VBoxManage
A number of parameters are commonly required. Some parameters are required only for iSCSI
targets.
The common parameters are as follows:
uuid|vmname
Name of the storage controller. Mandatory. The list of the storage controllers currently attached to a
VM can be obtained with VBoxManage showvminfo. See chapter 8.5, VBox- Manage showvminfo,
page 143.
--port
The number of the storage controller’s port which is to be modified. Mandatory, unless the storage
controller has only a single port.
--device
The number of the port’s device which is to be modified. Mandatory, unless the storage controller
has only a single device per port.
17
8 VBoxManage
--type
Define the type of the drive to which the medium is being attached, detached, or modified. This
argument can only be omitted if the type of medium can be determined from either the medium
given with the --medium argument or from a previous medium attachment.
--medium
Defines how this medium behaves with respect to snapshots and write operations. See chapter 5.4,
Special Image Write Modes, page 94.
--comment
An optional description that you want to have stored with this medium. For example, for an iSCSI
target, “Big storage server downstairs”. This is purely descriptive and not needed for the medium to
function correctly.
--setuuid, --setparentuuid
Modifies the UUID or parent UUID of a medium before attaching it to a VM. This is an expert
option. Inappropriate use can make the medium unusable or lead to broken VM configurations if
any other VM is referring to the same media already. The most frequently used variant is --setuuid
"", which assigns a new random UUID to an image. This option is useful for resolving duplicate UUID
errors if you duplicated an image using a file copy utility.
--passthrough
For a virtual DVD drive only, you can enable DVD writing support. This feature is currently
experimental, see chapter 5.9, CD/DVD Support, page 99.
17
8 VBoxManage
--tempeject
For a virtual DVD drive only, you can configure the behavior for guest-triggered medium eject. If
this is set to on, the eject has only a temporary effect. If the VM is powered off and restarted the
originally configured medium will be still in the drive.
--nonrotational
Enables you to enable the non-rotational flag for virtual hard disks. Some guests, such as Windows 7
or later, treat such disks like SSDs and do not perform disk fragmentation on such media.
--discard
Enables the auto-discard feature for a virtual hard disks. This specifies that a VDI image will be shrunk in
response to the trim command from the guest OS. The following requirements must be met:
• The disk format must be VDI.
• The size of the cleared area must be at least 1 MB.
• Oracle VM VirtualBox will only trim whole 1 MB blocks. The VDIs themselves are
organized into 1 MB blocks, so this will only work if the space being trimmed is at least a 1
MB contiguous block at a 1 MB boundary. On Windows, occasional defrag- mentation with
defrag.exe /D, or on Linux running btrfs filesystem defrag as a background cron
job may be beneficial.
Note: The Guest OS must be configured to issue the trim command, and typically this
means that the guest OS is made to see the disk as an SSD. Ext4 supports the -o discard mount
flag. Mac OS X probably requires additional settings. Windows should automatically detect and
support SSDs, at least in versions 7, 8, and 10. The Linux exFAT driver from Samsung supports
the trim command.
It is unclear whether Microsoft’s implementation of exFAT supports this feature, even though that
file system was originally designed for flash.
Alternatively, there are other methods to issue trim. For example, the Linux fstrim com- mand, part
of the util-linux package. Earlier solutions required a user to zero out unused areas, using zerofree or
similar, and to compact the disk. This is only possible when the VM is offline.
--bandwidthgroup
Sets the bandwidth group to use for the given device. See chapter 5.8, Limiting Bandwidth for Disk
Images, page 99.
--forceunmount
For a virtual DVD or floppy drive only, this forcibly unmounts the DVD/CD/Floppy or mounts a
new DVD/CD/Floppy even if the previous one is locked down by the guest for reading. See chapter
5.9, CD/DVD Support, page 99.
When iscsi is used with the --medium parameter for iSCSI support, additional parameters must or
can be used. See also chapter 5.10, iSCSI Servers, page 100.
17
8 VBoxManage
--
Target name string. This is determined by the iSCSI target and used to identify the storage resource.
Required.
--tport
Logical Unit Number of the target resource. Optional. Often, this value is zero.
--encodedlun
Hex-encoded Logical Unit Number of the target resource. Optional. Often, this value is zero.
--username, --password, --passwordfile
Username and password, called the initiator secret, for target authentication, if required. Optional.
Note: Username and password are stored without encryption, in clear text, in the XML
machine configuration file if no settings password is provided. When a settings password is
specified for the first time, the password is stored in encrypted form. As an alternative to
providing the password on the command line, a reference to a file containing the text can be
provided using the passwordfile option.
--initiator
17
8 VBoxManage
--
If specified, connect to the iSCSI target using Internal Networking. This needs further
configuration, see chapter 9.7.3, Access iSCSI Targets Using Internal Networking, page 252.
uuid|vmname
--add
Specifies the type of the system bus to which the storage controller must be connected.
--controller
Enables a choice of chipset type being emulated for the given storage controller.
--portcount
This specifies the number of ports the storage controller should support.
--hostiocache
Configures the use of the host I/O cache for all disk images attached to this storage con- troller. See
chapter 5.7, Host Input/Output Caching, page 98.
--bootable
17
8 VBoxManage
--rename
uuid|vmname
Type of the bandwidth group. Mandatory. Two types are supported: disk and network. See
chapter 5.8, Limiting Bandwidth for Disk Images, page 99 or chapter 6.10, Limiting Bandwidth for
Network Input/Output, page 114 for the description of a particular type.
--limit
Specifies the limit for the given bandwidth group. This can be changed while the VM is running.
The default unit is megabytes per second. The unit can be changed by specifying one of the
following suffixes: k for kilobits per second, m for megabits per second, g for gigabits per second,
K for kilobytes per second, M for megabytes per second, G for gigabytes per second.
17
8 VBoxManage
Note: The network bandwidth limits apply only to the traffic being sent by virtual
machines. The traffic being received by VMs is unlimited.
Note: To remove a bandwidth group it must not be referenced by any disks or adapters in the
running VM.
8. 20 VBoxManage showmediuminfo
Thi and
the s command shows information about a medium, notably its size, its size on disk, its type, virtual
machines which use it.
The medium must be specified either by its UUID, if the medium is registered, or by its file- name.
Registered images can be listed using VBoxManage list hdds, VBoxManage list dvds, or
VBoxManage list floppies, as appropriate. See chapter 8.4, VBoxManage list, page 141.
Specifies a file name <filename> as an absolute path on the host file system. Mandatory.
--size <megabytes>
Specifies the differencing image parent, either as a UUID or by the absolute pathname of the file on
the host file system. Useful for sharing a base box disk image among several VMs.
--format VDI|VMDK|VHD
Specifies the file format for the output file. Available options are VDI, VMDK, VHD. The default
format is VDI. Optional.
17
8 VBoxManage
--variant
Specifies any required file format variants for the output file. This is a comma-separated list of variant
flags. Options are Standard,Fixed,Split2G,Stream,ESX. Not all combinations are supported, and
specifying mutually incompatible flags results in an error message. Optional.
The disk image to modify must be specified either by its UUID, if the medium is registered, or by its
filename. Registered images can be listed using VBoxManage list hdds, see chapter 8.4, VBoxManage
list, page 141. A filename must be specified as a valid path, either as an absolute path or as a relative path
starting from the current directory.
The following options are available:
• With the --type argument, you can change the type of an existing image between the normal,
immutable, write-through and other modes. See chapter 5.4, Special Image Write Modes, page 94.
• For immutable hard disks only, the --autoreset on|off option determines whether the disk is
automatically reset on every VM startup. See chapter 5.4, Special Image Write Modes, page 94. By default,
autoreset is on.
• The --compact option can be used to compact disk images. Compacting removes blocks that only
contains zeroes. Using this option will shrink a dynamically allocated image. It will reduce the
physical size of the image without affecting the logical size of the virtual disk. Compaction works
both for base images and for differencing images created as part of a snapshot.
For this operation to be effective, it is required that free space in the guest system first be zeroed out
using a suitable software tool. For Windows guests, you can use the sdelete
17
8 VBoxManage
tool provided by Microsoft. Run sdelete -z in the guest to zero the free disk space, before
compressing the virtual disk image. For Linux, use the zerofree utility which supports ext2/ext3
filesystems. For Mac OS X guests, use the diskutil secureErase freespace
0 / command from an elevated Terminal.
Please note that compacting is currently only available for VDI images. A similar effect can be achieved
by zeroing out free blocks and then cloning the disk to any other dynamically allocated format. You
can use this workaround until compacting is also supported for disk formats other than VDI.
• The --resize x option, where x is the desired new total space in megabytes enables you to change
the capacity of an existing image. This adjusts the logical size of a virtual disk without affecting the
physical size much.
This option currently works only for VDI and VHD formats, and only for the dynamically allocated
variants. It can only be used to expand, but not shrink, the capacity. For example, if you originally
created a 10 GB disk which is now full, you can use the --resize 15360 command to change the
capacity to 15 GB (15,360 MB) without having to create a new image and copy all data from within a
virtual machine. Note however that this only changes the drive capacity. You will typically next need
to use a partition management tool inside the guest to adjust the main partition to fill the drive.
The --resizebyte x option does almost the same thing, except that x is expressed in bytes
instead of megabytes.
• The --move <path> option can be used to relocate a medium to a different location
<path> on the host file system. The path can be either relative to the current directory or
absolute.
• The --setlocation <path> option can be used to set the new location <path> of the medium
on the host file system if the medium has been moved for any reasons. The path can be either relative
to the current directory or absolute.
Note: The new location is used as is, without any sanity checks. The user is responsible for setting
the correct path.
8.23 VBoxManage
clonemedium
This command duplicates a virtual disk, DVD, or floppy medium to a new medium, usually an image file,
with a new unique identifier (UUID). The new image can be transferred to another host system or
reimported into Oracle VM VirtualBox using the Virtual Media Manager. See chapter 5.3, The Virtual
Media Manager, page 92 and chapter 5.6, Cloning Disk Images, page 98. The syntax is as follows:
VBoxManage clonemedium [disk|dvd|floppy] <uuid|inputfile> <uuid|outputfile>
[--format VDI|VMDK|VHD|RAW|<other>]
[--variant Standard,Fixed,Split2G,Stream,ESX]
[--existing]
The medium to clone as well as the target image must be described either by its UUIDs, if the
mediums are registered, or by its filename. Registered images can be listed by VBoxManage
list hdds. See chapter 8.4, VBoxManage list, page 141. A filename must be specified as valid path,
either as an absolute path or as a relative path starting from the current directory.
The following options are available:
17
8 VBoxManage
--format
Set a file format for the output file different from the file format of the input file.
--variant
Set a file format variant for the output file. This is a comma-separated list of variant flags. Not all
combinations are supported, and specifying inconsistent flags will result in an error message.
--existing
Perform the clone operation to an already existing destination medium. Only the portion of the
source medium which fits into the destination medium is copied. This means if the destination
medium is smaller than the source only a part of it is copied, and if the destination medium is larger
than the source the remaining part of the destination medium is unchanged.
Note: For compatibility with earlier versions of Oracle VM VirtualBox, the clonevdi and
clonehd commands are still supported and mapped internally to the clonemedium command.
• Use <disk|dvd|floppy> to optionally specify the type of medium: disk (hard drive), dvd, or
floppy.
• Use <uuid|filename> to supply either the UUID or absolute path of the medium or image.
• Use <property> to supply the name of the property.
• Use <value> to supply the property value.
VBoxManage mediumproperty [disk|dvd|floppy] get <uuid|filename>
<property>
• Use <disk|dvd|floppy> to optionally specify the type of medium: disk (hard drive), dvd, or
floppy.
• Use <uuid|filename> to supply either the UUID or absolute path of the medium or image.
• Use <property> to supply the name of the property.
VBoxManage mediumproperty [disk|dvd|floppy] delete <uuid|filename>
<property>
• Use <disk|dvd|floppy> to optionally specify the type of medium: disk (hard drive), dvd, or
floppy.
• Use <uuid|filename> to supply either the UUID or absolute path of the medium or image.
• Use <property> to supply the name of the property.
17
8 VBoxManage
• Use <uuid|filename> to supply the UUID or absolute path of the medium or image to be
encrypted.
• Use --newpassword <file|-> to supply a new encryption password. Either specify the absolute
pathname of a password file on the host operating system, or - to prompt you for the password on the
command line. Always use the --newpasswordid option with this option.
• Use --oldpassword <file|-> to supply any old encryption password. Either specify the absolute
pathname of a password file on the host operating system, or - to prompt you for the old password on
the command line.
Use this option to gain access to an encrypted medium or image to either change its pass- word using
--newpassword or change its encryption using --cipher.
• Use --cipher <cipher> to specify the cipher to use for encryption. This can be either
AES-XTS128-PLAIN64 or AES-XTS256-PLAIN64.
Use this option to change any existing encryption on the medium or image, or to set up new
encryption on it for the first time.
• Use --newpasswordid <password id> to supply the new password identifier. This can be
chosen by the user, and is used for correct identification when supplying multiple pass- words during
VM startup.
If the user uses the same password when encrypting multiple images and also the same password
identifier, the user needs to supply the password only once during VM startup.
• Use <uuid|filename> to supply the UUID or absolute path of the medium or image to be checked.
• Use <pwd file|-> to supply the password identifier to be checked. Either specify the absolute
pathname of a password file on the host operating system, or - to prompt you for the password on the
command line.
18
8 VBoxManage
--bytes
Select the disk image format to create. The default format is VDI. Other options are VMDK
and VHD.
--variant
Choose a file format variant for the output file. This is a comma-separated list of variant flags. Not
all combinations are supported, and specifying inconsistent flags will result in an error message.
--uuid
The stdin form of the command forces VBoxManage to read the content of the disk image from
standard input. This useful when using the command in a pipe.
Note: For compatibility with earlier versions of Oracle VM VirtualBox, the convertdd
command is also supported and mapped internally to the convertfromraw command.
8.28 VBoxManage
getextradata/setextradata
These commands enable you to attach and retrieve string data for a virtual machine or for an Oracle VM
VirtualBox configuration, by specifying global instead of a virtual machine name. You must specify a
keyword as a text string to associate the data with, which you can later use to retrieve it. For example:
VBoxManage setextradata Fedora5 installdate 2006.01.01
VBoxManage setextradata SUSE10 installdate 2006.02.02
This example would associate the string “2006.01.01” with the keyword installdate for the virtual
machine Fedora5, and “2006.02.02” on the machine SUSE10. You could then retrieve the information as
follows:
18
8 VBoxManage
Value: 2006.01.01
To remove a keyword, the setextradata command must be run without specifying data, only the
keyword. For example:
VBoxManage setextradata Fedora5 installdate
8.29 VBoxManage
setproperty
This command is used to change global settings which affect the entire Oracle VM VirtualBox in- stallation.
Some of these correspond to the settings in the Global Settings dialog in the graphical user interface. The
following properties are available:
machinefolder
Specifies the default folder in which virtual machine definitions are kept. See chapter 10.1,
Where Oracle VM VirtualBox Stores its Files, page 301.
hwvirtexclusive
Specifies whether Oracle VM VirtualBox will make exclusive use of the hardware virtual- ization
extensions (Intel VT-x or AMD-V) of the host system’s processor. See chapter 10.3, Hardware
Virtualization, page 305. If you wish to share these extensions with other hy- pervisors running at
the same time, you must disable this setting. Doing so has negative performance implications.
vrdeauthlibrary
Specifies which library to use when external authentication has been selected for a partic- ular virtual
machine. See chapter 7.1.5, RDP Authentication, page 121.
websrvauthlibrary
Specifies which library the web service uses to authenticate users. For details about the
Oracle VM VirtualBox web service, see the Oracle VM VirtualBox SDK reference, chapter
11, Oracle VM VirtualBox Programming Interfaces, page 308.
vrdeextpack
18
8 VBoxManage
autostartdbpath
Selects the path to the autostart database. See chapter 9.21, Starting Virtual Machines
During System Boot, page 282.
defaultfrontend
Selects the global default VM frontend setting. See chapter 8.12, VBoxManage startvm, page 161.
logginglevel
proxymode
Configures the URL for an HTTP proxy server. Used when a manual proxy is configured using the
manual setting of the proxymode property.
18
8 VBoxManage
The usbfilter commands are used for working with USB filters in virtual machines, or global filters
which affect the whole Oracle VM VirtualBox setup. Global filters are applied before machine-specific
filters, and may be used to prevent devices from being captured by any virtual machine. Global filters are
always applied in a particular order, and only the first filter which fits a device is applied. For example, if
the first global filter says to hold, or make available, a particular Kingston memory stick device and the
second filter says to ignore all Kingston devices. That particular Kingston memory stick will be available to
any machine with the appropriate filter, but no other Kingston device will.
When creating a USB filter using usbfilter add, you must supply three or four mandatory
parameters. The index specifies the position in the list at which the filter should be placed. If there is
already a filter at that position, then it and the following ones will be shifted back one place. Otherwise,
the new filter will be added onto the end of the list. The target parameter selects the virtual machine that
the filter should be attached to or use global to apply it to all virtual machines. name is a name for the
new filter. For global filters, action says whether to allow VMs access to devices that fit the filter
description (hold) or not to give them access (ignore). In addition, you should specify parameters to filter
by. You can find the parameters for devices attached to your system using VBoxManage list
usbhost. Finally, you can specify whether the filter should be active. For local filters, whether they are for
local devices, remote devices over an RDP connection, or either.
When you modify a USB filter using usbfilter modify, you must specify the filter by index
and by target, which is either a virtual machine or global. See the output of VBoxManage
list usbfilters to find global filter indexes and VBoxManage showvminfo to find indexes for
individual machines. The properties which can be changed are the same as for usbfilter add. To
remove a filter, use usbfilter remove and specify the index and the target. The following is a list of the
additional usbfilter add and usbfilter modify options, with
details of how to use them.
• --action ignore|hold: Specifies whether devices that fit the filter description are al- lowed
access by machines (hold), or have access denied (ignore). Applies to global filters only.
• --active yes|no: Specifies whether the USB Filter is active or temporarily disabled. For
usbfilter create the default is active.
• --vendorid <XXXX>|"": Specifies a vendor ID filter. The string representation for an exact match
has the form XXXX, where X is the hexadecimal digit, including leading zeroes.
• --productid <XXXX>|"": Specifies a product ID filter. The string representation for an exact
match has the form XXXX, where X is the hexadecimal digit, including leading zeroes.
• --revision <IIFF>|"": Specifies a revision ID filter. The string representation for an exact
match has the form IIFF, where I is the decimal digit of the integer part of the revision, and F is the
decimal digit of its fractional part, including leading and trailing zeros. Note that for interval filters, it is
best to use the hexadecimal form, because the revision is stored as a 16-bit packed BCD value.
Therefore, the expression int:0x0100-0x0199 will match any revision from 1.0 to 1.99 inclusive.
• --manufacturer <string>|"": Specifies a manufacturer ID filter, as a string.
• --product <string>|"": Specifies a product ID filter, as a string.
• --remote yes|no"": Specifies a remote filter, indicating whether the device is physically
connected to a remote VRDE client or to a local host machine. Applies to VM filters only.
• --serialnumber <string>|"": Specifies a serial number filter, as a string.
18
8 VBoxManage
• --maskedinterfaces <XXXXXXXX>: Specifies a masked interface filter, for hiding one or more
USB interfaces from the guest. The value is a bit mask where the set bits correspond to the USB
interfaces that should be hidden, or masked off. This feature only works on Linux hosts.
This command enables you to share folders on the host computer with guest operating systems. For this, the
guest systems must have a version of the Oracle VM VirtualBox Guest Additions installed which supports
this functionality.
Parameters are as follows:
• <uuid|vmname>: Specifies the UUID or name of the VM whose guest operating system will be
sharing folders with the host computer. Mandatory.
• --name <name>: Specifies the name of the share. Each share has a unique name within the
namespace of the host operating system. Mandatory.
• -hostpath <hostpath>: Specifies the absolute path on the host operating system of the directory
to be shared with the guest operating system. Mandatory.
• -transient: Specifies that the share is transient, meaning that it can be added and re- moved at
runtime and does not persist after the VM has stopped. Optional.
• -readonly: Specifies that the share has only read-only access to files at the host path.
By default, shared folders have read/write access to the files on the host path. On Linux
distributions, shared folders are mounted with 770 file permissions with root user and vboxsf as the
group. Using this option the file permissions change to 700. Optional.
• -automount: Specifies that the share will be automatically mounted. On Linux distri- butions,
this will be to either /media/USER/sf_share-name or /media/sf_share-name, where
share-name is the share named. The actual location depends on the guest OS. Optional.
This command enables you to delete shared folders on the host computer shares with the guest operating
systems. For this, the guest systems must have a version of the Oracle VM VirtualBox Guest Additions
installed which supports this functionality.
Parameters are as follows:
• <uuid|vmname>: Specifies the UUID or name of the VM whose guest operating system is sharing
folders with the host computer. Mandatory.
• --name <name>: Specifies the name of the share to be removed. Each share has a unique name
within the namespace of the host operating system. Mandatory.
• -transient: Specifies that the share is transient, meaning that it can be added and re- moved at
runtime and does not persist after the VM has stopped. Optional.
Shared folders are described in chapter 4.3, Shared Folders, page 74.
18
8 VBoxManage
8.32 VBoxManage
guestproperty
The guestproperty commands enable you to get or set properties of a running virtual machine. See
chapter 4.7, Guest Properties, page 81. Guest properties are arbitrary keyword-value string pairs which can
be written to and read from by either the guest or the host, so they can be used as a low-volume
communication channel for strings, provided that a guest is running and has the Guest Additions installed. In
addition, a number of values whose keywords begin with
/VirtualBox/are automatically set and maintained by the Guest Additions.
The following subcommands are available, where <vm> can either be a VM name or a VM
UUID, as with the other VBoxManage commands:
• enumerate <vm> [--patterns <pattern>]: Lists all the guest properties that are avail- able
for the given VM, including the value. This list will be very limited if the guest’s service process
cannot be contacted, for example because the VM is not running or the Guest Additions are not
installed.
If --patterns <pattern> is specified, it acts as a filter to only list properties that match the
given pattern. The pattern can contain the following wildcard characters:
– * (asterisk): Represents any number of characters. For example, “/VirtualBox*“
would match all properties beginning with “/VirtualBox”.
– ? (question mark): Represents a single arbitrary character. For example, “fo?“ would match
both “foo” and “for”.
– | (pipe symbol): Can be used to specify multiple alternative patterns. For example, “s*|t*“
would match anything starting with either “s” or “t”.
• get <vm> <property>: Retrieves the value of a single property only. If the property can- not be
found, for example because the guest is not running, the following message is shown:
No value set!
• set <vm> <property> [<value> [--flags <flags>]]: Enables you to set a guest
property by specifying the keyword and value. If <value> is omitted, the property is deleted.
With --flags, you can specify additional behavior. You can combine several flags by separating
them with commas.
– TRANSIENT: The value will not be stored with the VM data when the VM exits.
– TRANSRESET: The value will be deleted as soon as the VM restarts or exits.
– RDONLYGUEST: The value can only be changed by the host, but the guest can only read it.
– RDONLYHOST: The value can only be changed by the guest, but the host can only read it.
– READONLY: The value cannot be changed at all.
• wait <vm> <pattern> --timeout <timeout>: Waits for a particular value described by the
pattern string to change or to be deleted or created. The pattern rules are the same as for the
enumerate subcommand.
• delete <vm> <property>: Deletes a guest property which has been set previously.
18
8 VBoxManage
[--username <name> ]
[--passwordfile <file> | --password <password>]
[--domain <domain> ]
[-v|--verbose] [-q|quiet]
The common options for the first set of subcommands are explained in the following list.
<uuid|vmname>
--username <name>
Specifies the user name on guest OS under which the process should run. This user name must already
exist on the guest OS. If unspecified, the host user name is used. Optional
--passwordfile <file>|--password
Specifies the absolute path on guest file system of password file containing the password for the
specified user account or password for the specified user account. Optional. If both are omitted, empty
password is assumed.
--domain <domain>
-q|--quiet
• run: Executes a guest program, forwarding stdout, stderr, and stdin to and from the host until it
completes.
18
8 VBoxManage
<uuid|vmname>
Specifies the absolute path of the executable on the guest OS file system. Mandatory. For
example: C:\Windows\System32\calc.exe.
--timeout <msec>
Specifies the maximum time, in microseconds, that the executable can run, during which
VBoxManage receives its output. Optional. If unspecified, VBoxManage waits indefinitely for
the process to end, or an error occurs.
-E|--putenv <NAME>=<VALUE>
Sets, modifies, and unsets environment variables in the environment in which the program will
run. Optional.
The guest process is created with the standard default guest OS environment. Use this option
to modify that default environment. To set or modify a variable use:
<NAME>=<VALUE>. To unset a variable use: <NAME>=
Any spaces in names and values should be enclosed by quotes.
To set, modify, and unset multiple variables, use multiple instances of the
--E|--putenv option.
--unquoted-args
Disables escaped double quoting, such as \“fred\“, on arguments passed to the exe- cuted
program. Optional.
--ignore-operhaned-processes
Does not wait or waits until the guest process ends and receives its exit code and
reason/flags. In the case of --wait-stdout, VBoxManage receives its stdout while the
process runs. Optional.
--no-wait-stderr|--wait-stderr
18
8 VBoxManage
Does not wait or waits until the guest process ends and receives its exit code, error messages,
and flags. In the case of --wait-stderr, VBoxManage receives its stderr while the process
runs. Optional.
--dos2unix
Specifies the program name, followed by one or more arguments to pass to the pro- gram.
Optional.
Any spaces in arguments should be enclosed by quotes.
Note: On Windows there are certain limitations for graphical applications. See chapter
14, Known Limitations, page 330.
Note that the double backslashes in the second example are only required on UNIX hosts.
Note: For certain commands a user name of an existing user account on the guest must be
specified. Anonymous executions are not supported for security reasons. A user account
password, however, is optional and depends on the guest’s OS security policy or rules. If no
password is specified for a given user name, an empty password will be used. On certain OSes
like Windows the security policy may needs to be adjusted in order to allow user accounts with
an empty password set. Also, global domain rules might apply and therefore cannot be changed.
Starting at Oracle VM VirtualBox 4.1.2 guest process execution by default is limited to serve up to five
guest processes at a time. If a new guest process gets started which would exceed this limit, the oldest
not running guest process will be discarded in order to be able to run that new process. Also,
retrieving output from this old guest process will not be possible anymore then. If all five guest
processes are still active and running, starting a new guest process will result in an appropriate error
message.
To raise or lower the guest process execution limit, either use the guest property
/VirtualBox/GuestAdd/VBoxService/--control-procs-max-kept or VBoxService
command line by specifying --control-procs-max-kept needs to be modified. A restart of the
guest OS is required afterwards. To serve unlimited guest processes, a value of 0 needs to be set,
but this is not recommended.
18
8 VBoxManage
Specifies the absolute path of the executable on the guest OS file system. Mandatory. For
example: C:\Windows\System32\calc.exe
--timeout <msec>
Specifies the maximum time, in microseconds, that the executable can run. Optional. If
unspecified, VBoxManage waits indefinitely for the process to end, or an error occurs.
-E|--putenv <NAME>=<VALUE>
Sets, modifies, and unsets environment variables in the environment in which the program will
run. Optional.
The guest process is created with the standard default guest OS environment. Use this option
to modify that default environment. To set or modify a variable use:
<NAME>=<VALUE>. To unset a variable use: <NAME>=
Any spaces in names and values should be enclosed by quotes.
To set, modify, or unset multiple variables, use multiple instances of the
--E|--putenv option.
--unquoted-args
Disables escaped double quoting, such as \“fred\“, on arguments passed to the exe- cuted
program. Optional.
--ignore-operhaned-processes
Specifies the program name, followed by one or more arguments to pass to the pro- gram.
Optional.
Any spaces in arguments should be enclosed by quotes.
19
8 VBoxManage
Note: On Windows there are certain limitations for graphical applications. See chapter
14, Known Limitations, page 330.
Note that the double backslashes in the second example are only required on UNIX hosts.
Note: For certain commands a user name of an existing user account on the guest must be
specified. Anonymous executions are not supported for security reasons. A user account
password, however, is optional and depends on the guest’s OS security policy or rules. If no
password is specified for a given user name, an empty password will be used. On certain OSes
like Windows the security policy may needs to be adjusted in order to allow user accounts with
an empty password set. Also, global domain rules might apply and therefore cannot be changed.
Starting at Oracle VM VirtualBox 4.1.2 guest process execution by default is limited to serve up to five
guest processes at a time. If a new guest process gets started which would exceed this limit, the oldest
not running guest process will be discarded in order to be able to run that new process. Also,
retrieving output from this old guest process will not be possible anymore then. If all five guest
processes are still active and running, starting a new guest process will result in an appropriate error
message.
To raise or lower the guest process execution limit, either use the guest property
/VirtualBox/GuestAdd/VBoxService/--control-procs-max-kept or VBoxService
command line by specifying --control-procs-max-kept needs to be modified. A restart of the
guest OS is required afterwards. To serve unlimited guest processes, a value of 0 needs to be set,
but this is not recommended.
• copyfrom: Copies files from the guest to the host file system. Only available with Guest
Additions 4.0 or later installed.
Enables recursive copying of files and directories from the specified guest file system directory.
Optional.
19
8 VBoxManage
--target-directory <host-dst-dir>
Specifies the absolute path of the host file system destination directory. Mandatory. For
example: C:\Temp.
<guest-src0> [<guest-src1> [...]]
Specifies the absolute paths of guest file system files to be copied. Mandatory. For ex- ample:
C:\Windows\System32\calc.exe. Wildcards can be used in the expressions. For example:
C:\Windows\System*\*.dll.
• copyto: Copies files from the host to the guest file system. Only available with Guest
Additions 4.0 or later installed.
Enables recursive copying of files and directories from the specified host file system directory.
Optional.
--target-directory <guest-dst>
Specifies the absolute path of the guest file system destination directory. Mandatory. For
example: C:\Temp.
<host-src0> [<host-src1> [...]]
Specifies the absolute paths of host file system files to be copied. Mandatory. For ex- ample:
C:\Windows\System32\calc.exe. Wildcards can be used in the expressions. For example:
C:\Windows\System*\*.dll.
19
8 VBoxManage
--
Specifies the permission mode on the specified directories, and any parents, if the
--parents option is used. Currently octal modes only, such as. 0755, are supported.
<guest-dir0> [<guest-dir1> [...]]
Specifies a list of the absolute paths of directories to be deleted on guest file system.
Mandatory. Wildcards are allowed. For example: D:\Foo\*Bar. The specified user must
have sufficient rights to delete the specified directories.
• rm|removefile: Deletes specified files on the guest file system. Only available with in- stalled
Guest Additions 4.3.2 and later.
19
8 VBoxManage
-f|--
Specifies a list of absolute paths of files to be deleted on guest file system. Mandatory. Wildcards
are allowed. For example: D:\Foo\Bar\text*.txt. The specified user should have
sufficient rights to delete the specified files.
• mv|move|ren|rename: Renames files and/or directories on the guest file system. Only available
with installed Guest Additions 4.3.2 and later.
Specifies absolute paths of files or a single directory to be moved and renamed on guest file
system. Mandatory. Wildcards are allowed in file names. The specified user should have
sufficient rights to access the specified files.
<dest>
Specifies the absolute path of the destination file or directory to which the files are to be moved.
Mandatory. If only one file to be moved, <dest> can be file or directory, else it must be a
directory. The specified user must have sufficient rights to access the destination file or directory.
• mktemp|createtemp|createtemporary: Creates a temporary file or directory on the guest
file system, to assist subsequent copying of files from the host to the guest file systems. By default, the
file or directory is created in the guest’s platform specific temp directory. Not currently supported.
Only available with installed Guest Additions 4.2 and later.
Creates a temporary directory instead of a file, specified by the <template> parame- ter.
Optional.
19
8 VBoxManage
--secure
Enforces secure file and directory creation. Optional. The permission mode is set to
0755. Operation fails if it cannot be performed securely.
--mode <mode>
Specifies the permission mode of the specified directory. Optional. Currently only octal
modes, such as 0755, are supported.
--tmpdir <directory>
Specifies the absolute path of the directory on the guest file system where the file or directory
specified will be created. Optional. If unspecified, the platform-specific temp directory is used.
<template>
Specifies a file name without a directory path, containing at least one sequence of three
consecutive X characters, or ending in X. Mandatory.
• stat: Displays file or file system statuses on the guest.
Specifies absolute paths of files or file systems on the guest file system. Mandatory. For
example: /home/foo/a.out. The specified user should have sufficient rights to access the
specified files or file systems.
The second set of subcommands is of the form:
VBoxManage guestcontrol <uuid|vmname> <sub-command>
[-v|--verbose] [-q|quiet] ...
[-v|--verbose] [-q|--quiet]
Details of the common options for the second set of subcommands are as follows:
-v|--verbose
19
8 VBoxManage
• list: Lists guest control configuration and status data. For example: open guest sessions, guest
processes, and files.
Indicates whether to list all available data or guest sessions, processes or files. Manda- tory.
• closeprocess: Terminates guest processes specified by PIDs running in a guest session, specified
by the session ID or name.
Specifies the guest session by its name, or multiple sessions using a pattern containing wildcards.
Optional.
<PID0> [<PID1> [...]]
19
8 VBoxManage
--session-id <ID>
Specifies the guest session to be closed by name. Optional. Multiple sessions can be specified
by using a pattern containing wildcards.
--all
Specifies the absolute path on the guest file system of the .ISO file for the Guest
Additions update. Mandatory.
--wait-start
Indicates that VBoxManage starts the usual updating process on the guest and then waits until
the actual Guest Additions updating begins, at which point VBoxManage self-terminates.
Optional.
Default behavior is that VBoxManage waits for completion of the Guest Additions up- date
before terminating. Use of this option is sometimes necessary, as a running VBoxManage
can affect the interaction between the installer and the guest OS.
[-- <argument0> [<argument1> [...]]]
Specifies optional command line arguments to be supplied to the Guest Additions updater.
Useful for retrofitting features which are not currently installed.
Arguments containing spaces should be enclosed by quotes.
• watch: Prints current guest control activity.
19
8 VBoxManage
8.34 VBoxManage
metrics
This command supports monitoring the usage of system resources. Resources are represented by various
metrics associated with the host system or a particular VM. For example, the host system has a
CPU/Load/User metric that shows the percentage of time CPUs spend executing in user mode over a
specific sampling period.
Metric data is collected and retained internally. It may be retrieved at any time with the VBoxManage
metrics query subcommand. The data is available as long as the background VBoxSVC process is
alive. That process terminates shortly after all VMs and frontends have been closed.
By default no metrics are collected at all. Metrics collection does not start until
VBoxManage metrics setup is invoked with a proper sampling interval and the number of metrics
to be retained. The interval is measured in seconds. For example, to enable collecting the host processor
and memory usage metrics every second and keeping the five most current samples, the following
command can be used:
VBoxManage metrics setup --period 1 --samples 5 host CPU/Load,RAM/Usage
Metric collection can only be enabled for started VMs. Collected data and collection settings for a
particular VM will disappear as soon as it shuts down. Use the VBoxManage metrics list subcommand
to see which metrics are currently available. You can also use the --list option with any subcommand
that modifies metric settings to find out which metrics were affected.
Note that the VBoxManage metrics setup subcommand discards all samples that may have been
previously collected for the specified set of objects and metrics.
To enable or disable metrics collection without discarding the data,
VBoxManage metrics enable and VBoxManage metrics disable subcommands can be used.
Note that these subcommands expect metrics as parameters, not submetrics such as CPU/Load or
RAM/Usage. In other words enabling CPU/Load/User while disabling CPU/Load/Kernel is not
supported.
The host and VMs have different sets of associated metrics. Available metrics can be listed with
VBoxManage metrics list subcommand.
A complete metric name may include an aggregate function. The name has the following form:
Category/Metric[/SubMetric][:aggregate] . For example, RAM/Usage/Free:min stands for the
minimum amount of available memory over all retained data if applied to the host object.
Subcommands may apply to all objects and metrics or can be limited to one object and a list of metrics.
If no objects or metrics are given in the parameters, the subcommands will apply to all available metrics of
all objects. You may use an asterisk “*“ to explicitly specify that the command should be applied to all
objects or metrics. Use host as the object name to limit the scope of the command to host-related
metrics. To limit the scope to a subset of metrics, use a metric list with names separated by commas.
For example, to query metric data on the CPU time spent in user and kernel modes by the virtual
machine named test, use the following command:
VBoxManage metrics query test CPU/Load/User,CPU/Load/Kernel
list
Shows the parameters of the currently existing metrics. Note that VM-specific metrics are only
available when a particular VM is running.
setup
19
8 VBoxManage
Sets the interval between taking two samples of metric data and the number of samples retained
internally. The retained data is available for displaying with the query subcom- mand. The --
list option shows which metrics have been modified as the result of the command execution.
enable
Resumes data collection after it has been stopped with the disable subcommand. Note that
specifying submetrics as parameters will not enable underlying metrics. Use --list to find out if
the command worked as expected.
disable
Suspends data collection without affecting collection parameters or collected data. Note that
specifying submetrics as parameters will not disable underlying metrics. Use --list to find out if
the command worked as expected.
query
Note: The query subcommand does not remove or flush retained data. If you query often
enough you will see how old samples are gradually being phased out by new samples.
collect
Sets the interval between taking two samples of metric data and the number of samples retained
internally. The collected data is displayed periodically until Ctrl+C is pressed, unless the --
detach option is specified. With the --detach option, this subcommand operates the same
way as setup does. The --list option shows which metrics match the specified filter.
8.35 VBoxManage
natnetwork
NAT networks use the Network Address Translation (NAT) service, which works in a similar way to a home
router. It groups systems using it into a network and prevents outside systems from directly accessing those
inside, while letting systems inside communicate with each other and outside systems using TCP and UDP
over IPv4 and IPv6.
A NAT service is attached to an internal network. Virtual machines to make use of one should be attached
to it. The name of an internal network is chosen when the NAT service is created, and the internal network
will be created if it does not already exist. The following is an example command to create a NAT network:
VBoxManage natnetwork add --netname natnet1 --network "192.168.15.0/24" --enable
Here, natnet1 is the name of the internal network to be used and 192.168.15.0/24 is the network
address and mask of the NAT service interface. By default, in this static configuration the gateway will be
assigned the address 192.168.15.1, the address after the interface address, though this is subject to change.
To add a DHCP server to the NAT network after creation, run the following command:
19
8 VBoxManage
VBoxManage natnetwork add: Creates a new internal network interface, and adds a NAT network
service. This command is a prerequisite for enabling attachment of VMs to the NAT network. Parameters
are as follows:
--netname <name>
Where <name> is the name of the new internal network interface on the host OS.
--network <network>
Where <network> specifies the static or DHCP network address and mask of the NAT
service interface. The default is a static network address.
--enable|--disable
Enables and disables a DHCP server specified by --netname. Use of this option also indi- cates that
it is a DHCP server.
--port-forward-4 <rule>
--ipv6 on|off
Enables and disables IPv6. The default setting is IPv4, disabling IPv6 enables IPv4.
--port-forward-6 <rule>
--loopback-6 <rule>
20
8 VBoxManage
VBoxManage natnetwork remove: Removes a NAT network service. Parameters are as fol- lows:
--netname <name>
Where <name> specifies an existing NAT network service. Does not remove any DHCP
server enabled on the network.
VBoxManage natnetwork modify --netname <name>
[--network <network>]
[--enable|--disable]
[--dhcp on|off]
[--port-forward-4 <rule>]
[--loopback-4 <rule>]
[--ipv6 on|off]
[--port-forward-6 <rule>]
[--loopback-6 <rule>]
VBoxManage natnetwork modify: Modifies an existing NAT network service. Parameters are as
follows:
--netname <name>
Where <network> specifies the new static or DHCP network address and mask of the NAT
service interface. The default is a static network address.
--enable|--disable
Enables and disables a DHCP server. If a DHCP server is not present, using enable adds a new DHCP
server.
--port-forward-4 <rule>
Enables and disables IPv6. The default setting is IPv4, disabling IPv6 enables IPv4.
--port-forward-6 <rule>
20
8 VBoxManage
--loopback-6 <rule>
VBoxManage natnetwork start: Starts the specified NAT network service and any associated
DHCP server. Parameters are as follows:
--netname <name>
VBoxManage natnetwork stop: Stops the specified NAT network service and any DHCP
server. Parameters are as follows:
--netname <name>
VBoxManage natnetwork list: Lists all NAT network services, with optional filtering. Pa-
rameters are as follows:
[<pattern>]
ipconfig "<name>"
create
Creates a new vboxnet<N> interface on the host OS. This command is essential before you can
attach VMs to a host-only network.
remove vboxnet<N>
20
8 VBoxManage
Synopsis
VBoxManage unattended detect <--iso=install-iso> [--machine-readable]
VBoxManage unattended install <uuid|vmname> <--iso=install-iso>
[--user=login] [--password=password] [--password-file=file]
[--full-user-name=name] [--key=product-key] [--install-additions]
[--no-install-additions] [--additions-iso=add-iso] [--install-txs]
[--no-install-txs] [--validation-kit-iso=testing-iso]
[--locale=ll_CC] [--country=CC] [--time-zone=tz] [--hostname=fqdn]
[--package-selection-adjustment=keyword] [--dry-run]
[--auxiliary-base-path=path] [--image-index=number]
[--script-template=file] [--post-install-template=file]
[--post-install-command=command] [--extra-install-kernel-parameters=params]
[--language=lang] [--start-vm=session-type]
Description
unattended detect
VBoxManage unattended detect <--iso=install-iso> [--machine-readable]
Detects the guest operating system (OS) on the specified installation ISO and displays the result. This
can be used as input when creating a VM for the ISO to be installed in.
--iso=<install-iso>
The installation ISO to run the detection on.
--machine-readable
Produce output that is simpler to parse from a script.
20
8 VBoxManage
unattended install
VBoxManage unattended install <uuid|vmname> <--iso=install-iso>
[--user=login] [--password=password] [--password-file=file]
[--full-user-name=name] [--key=product-key] [--install-additions]
[--no-install-additions] [--additions-iso=add-iso] [--install-txs]
[--no-install-txs] [--validation-kit-iso=testing-iso]
[--locale=ll_CC] [--country=CC] [--time-zone=tz] [--hostname=fqdn]
[--package-selection-adjustment=keyword] [--dry-run]
[--auxiliary-base-path=path] [--image-index=number]
[--script-template=file] [--post-install-template=file]
[--post-install-command=command] [--extra-install-kernel-parameters=params]
[--language=lang] [--start-vm=session-type]
uuid|vmname
Either the UUID or the name (case sensitive) of a VM.
--iso=<install-iso>
The installation ISO to run the detection on.
--user=<login>
The login name. (default: vboxuser)
--password=<password>
The login password. This is used for the user given by --user as well as the
root/administrator user. (default: changeme)
--password-file=<file>
Alternative to --password for providing the password. Special filename stdin can be used
to read the password from standard input.
--full-user-name=<name>
The full user name. (default: –user)
--key=<product-key>
The guest OS product key. Not all guest OSes requires this.
--install-additions, --no-install-additions
Whether to install the VirtualBox guest additions. (default: –no-install-addations)
--additions-iso=<add-iso>
Path to the VirtualBox guest additions ISO. (default: installed/downloaded GAs)
--install-txs, --no-install-txs
Whether to install the test execution service (TXS) from the VirtualBox ValidationKit. This
is useful when preparing VMs for testing or similar. (default: –no-install-txs)
--validation-kit-iso=<testing-iso>
Path to the VirtualBox ValidationKit ISO. This is required if --install-txs is specified.
--locale=<ll_CC>
The base locale specification for the guest, like en_US, de_CH, or nn_NO. (default: host or
en_US)
--country=<CC>
The two letter country code if it differs from the specified by --location.
20
8 VBoxManage
--time-zone=<tz>
The time zone to set up the guest OS with. (default: host time zone or UTC)
--hostname=<fqdn>
The fully qualified domain name of the guest machine. (default:
vmname.myguest.virtualbox.org)
--package-selection-adjustment=<keyword>
Adjustments to the guest OS packages/components selection. This can be specfied more
than once. Currently the only recognized keyword is minimal which triggers a minimal
installation for some of the guest OSes.
--dry-run
Do not create any files or make any changes to the VM configuration.
--start-vm=<session-type>
Start the VM using the front end given by session-type. This is the same as the --type
option for the startvm command, but we have add none for indicating that the VM should
not be started. (default: none)
Advanced options:
--auxiliary-base-path=<path>
The path prefix to the media related files generated for the installation. (default:
vm-config-dir/Unattended-vm-uuid-)
--image-index=<number>
Windows installation image index. (default: 1)
--script-template=<file>
The unattended installation script template. (default: IMachine::OSTypeId dependent)
--post-install-template=<file>
The post installation script template. (default: IMachine::OSTypeId dependent)
--post-install-command=<command>
A single command to run after the installation is completed. The exact format and exactly
when this is run is guest OS installer dependent.
--extra-install-kernel-parameters=<params>
List of extra linux kernel parameters to use during the installation. (default: IMa-
chine::OSTypeId dependent)
--language=<lang>
Specifies the UI language for a Windows installation. The lang is generally on the form
{ll}-{CC}. See detectedOSLanguages results from VBoxManage unattended detect. (de-
fault: detectedOSLanguages[0])
20
8 VBoxManage
Synopsis
VBoxManage snapshot <uuid|vmname>
VBoxManage snapshot <uuid|vmname> take <snapshot-name>
[--description=description] [--live] [--uniquename Number,Timestamp,Space,Force]
VBoxManage snapshot <uuid|vmname> delete <snapshot-name>
VBoxManage snapshot <uuid|vmname> restore <snapshot-name>
VBoxManage snapshot <uuid|vmname> restorecurrent
VBoxManage snapshot <uuid|vmname> edit <snapshot-name | --current>
[--description=description] [--name=new-name]
VBoxManage snapshot <uuid|vmname> list [--details | --machinereadable]
VBoxManage snapshot <uuid|vmname> showvminfo <snapshot-name>
Description
The VBoxManage snapshot command manages snapshots.
Oracle VM VirtualBox uses the snapshot to capture the state of a virtual machine (VM). You
can later use the snapshot to revert to the state described by the snapshot.
A snapshot is a complete copy of a VM’s settings. If you take the snapshot while the VM is running, the
snapshot also includes the VM’s state file.
After you take a snapshot, Oracle VM VirtualBox creates a differencing hard disk for each normal hard
disk that is associated with the host machine. When you restore a snapshot, Oracle VM VirtualBox uses these
differencing files to quickly reset the contents of the VM’s virtual hard disks.
For each VBoxManage snapshot command, you must specify the name or the universal unique
identifier (UUID) of the VM for which you want to take a snapshot.
The VBoxManage snapshot take command takes a snapshot of the current state of the VM. You
must supply a name for the snapshot and can optionally supply a description. The new snapshot is
inserted into the snapshots tree as a child of the current snapshot and then becomes the new current snapshot.
--description=<description>
Specifies that the VM is not stopped while you create the snapshot. This operation is know as live
snapshotting.
20
8 VBoxManage
--uniquename Number,Timestamp,Space,Force
TBD.
snapshot-name
Delete a Snapshot
VBoxManage snapshot <uuid|vmname> delete <snapshot-name>
snapshot-name
Restore a Snapshot
VBoxManage snapshot <uuid|vmname> restore <snapshot-name>
The VBoxManage snapshot restore command restores the specified snapshot. This opera- tion
resets the VM’s settings and current state to that of the snapshot. The state of the VM on which you restore
a snapshot is lost. When restored, the specified snapshot becomes the new current snapshot and subsequent
snapshots are children of that snapshot.
snapshot-name
The VBoxManage snapshot restorecurrent command restores the current snapshot. The current
snapshot is the one from which the current state is derived. This command is equivalent to using the
VBoxManage snapshot restore command and specifying the name or UUID of the current snapshot.
The VBoxManage snapshot edit command enables you to change the name or the descrip- tion of
a specified snapshot.
snapshot-name
20
8 VBoxManage
--current
--name=<new-name>
The VBoxManage snapshot list command lists all the snapshots for a VM.
--details
Specifies that the output shows detailed information about the snapshot. This
option is mutually exclusive with the --machinereadable option.
--machinereadable
The VBoxManage snapshot showvminfo command enables you to view the VM settings that are
part of an existing snapshot.
snapshot-name
Examples
The following command creates a snapshot of the ol7u4 VM. The snapshot is called ol7u4-
snap-001. The command uses the --description option to provide a description of the snapshot
contents.
The following command lists the snapshots for the ol7u4 VM.
20
8 VBoxManage
The following command changes the description for the ol7u4-snap-001 snapshot of the
ol7u4 VM.
The following command shows VM settings for the ol7u1-snap-001 snapshot of the ol7u4
VM.
Synopsis
VBoxManage clonevm <vmname|uuid> [--basefolder=basefolder]
[--groups=group,...] [--mode=machine | --mode=machinechildren |
--mode=all] [--name=name] [--options=option,...] [--register]
[--snapshot=snapshot-name] [--uuid=uuid]
Description
The VBoxManage clonevm command creates a clone of an existing virtual machine (VM). The clone
can be a full copy of the VM or a linked copy of a VM.
You must specify the name or the universal unique identifier (UUID) of the VM you want to clone.
vmname|uuid
20
8 VBoxManage
--basefolder=<basefolder>
Specifies the name of the folder in which to save the configuration for the new VM.
--groups=<group>,...
Assigns the clone to the specified group or groups. If you specify more than one group, separate
each group name with a comma.
Note that each group is identified by a group ID that starts with a slash character (/) so that groups
can be nested. By default, a clone is always assigned membership to the / group.
--mode=machine|machineandchildren|all
Specifies a new name for the new VM. The default value is original-name Clone where
original-name is the original name of the VM.
--options=<option>,...
Specifies that the new clone reuses the MAC addresses of each virtual network card from the
existing VM.
If you do not specify this option or the --options=keepnatmacs option, the default
behavior is to reinitialize the MAC addresses of each virtual network card.
KeepNATMACs
Specifies that the new clone reuses the MAC addresses of each virtual network card from the
existing VM when the network type is NAT.
If you do not specify this option or the KeepAllMACs option, the default behavior is to
reinitialize the MAC addresses of each virtual network card.
21
8 VBoxManage
KeepDiskNames
Specifies that the new clone reuses the disk image names from the existing VM. By default,
disk images are renamed.
KeepHwUUIDs
Specifies that the new clone reuses the hardware IDs from the existing VM. By default, new UUIDs
are used.
--register
Automatically registers the new clone in this Oracle VM VirtualBox installation. You can manually
register the new VM later by using the VBoxManage registervm command. See chapter 8.6,
VBoxManage registervm/unregistervm, page 143.
--snapshot=<snapshot-name>
Specifies the snapshot on which to base the new VM. By default, the clone is created from the current
state of the specified VM.
--uuid=<uuid>
Specifies the UUID for the new VM. Ensure that this ID is unique for the Oracle VM VirtualBox
instance if you decide to register this new VM. By default, Oracle VM VirtualBox provides a new
UUID.
Examples
The following command creates and registers an exact clone of the ol7 VM. The clone is called
ol7-dev-001.
The new clone includes all of the source VM’s snapshots. The new VM also reuses all network
interface MAC addresses, disk names, and UUIDs from the source VM.
The following command creates and registers a clone of the Snapshot 1 snapshot of the ol7
VM. The clone is called ol7-dev-002.
See Also
chapter 8.6, VBoxManage registervm/unregistervm, page 143
21
8 VBoxManage
Synopsis
VBoxManage extpack install [--replace] [--accept-license=sha256] <tarball>
VBoxManage extpack uninstall [--force] <name>
VBoxManage extpack cleanup
Description
extpack install
VBoxManage extpack install [--replace] [--accept-license=sha256] <tarball>
Installs a new extension pack on the system. This command will fail if an older version of the same
extension pack is already installed. The --replace option can be used to uninstall any old package before
the new one is installed.
--replace
Uninstall existing extension pack version.
--accept-license=<sha256>
Accept the license text with the given SHA-256 hash value.
VBoxManage will display the SHA-256 value when performing a manual installation. The hash can of
course be calculated by looking inside the extension pack and using sha256sum or similar on the license
file.
tarball
The file containing the extension pack to be installed.
extpack uninstall
VBoxManage extpack uninstall [--force] <name>
Uninstalls an extension pack from the system. The subcommand will also succeed in the case where the
specified extension pack is not present on the system. You can use VBoxManage list extpacks to
show the names of the extension packs which are currently installed.
--force
Overrides most refusals to uninstall an extension pack
name
The name of the extension pack to be uninstalled.
extpack cleanup
VBoxManage extpack cleanup
Used to remove temporary files and directories that may have been left behind if a previous install or
uninstall command failed.
Examples
How to list extension packs:
21
8 VBoxManage
Synopsis
VBoxManage dhcpserver add <--network=netname | --interface=ifname>
<--server-ip=address> <--netmask=mask> <--lower-ip=address>
<--upper-ip=address> <--enable | --disable>
[[--global] [--set-opt=dhcp-opt-no value...] [--set-opt-hex=dhcp-opt-no
hexstring...] [--force-opt=dhcp-opt-no...] [--supress-opt=dhcp-opt-no...]
[--min-lease-time=seconds] [--default-lease-time=seconds]
[--max-lease-time=seconds] ...]
[<--group=name> [--set-opt=dhcp-opt-no value...]
[--set-opt-hex=dhcp-opt-no hexstring...] [--force-opt=dhcp-opt-no...]
[--supress-opt=dhcp-opt-no...] [--incl-mac=address...]
[--excl-mac=address...] [--incl-mac-wild=pattern...]
[--excl-mac-wild=pattern...] [--incl-vendor=string...]
[--excl-vendor=string...] [--incl-vendor-wild=pattern...]
[--excl-vendor-wild=pattern...] [--incl-user=string...]
[--excl-user=string...] [--incl-user-wild=pattern...]
[--excl-user-wild=pattern...] [--min-lease-time=seconds]
[--default-lease-time=seconds] [--max-lease-time=seconds] ...]
[<--vm=name|uuid> [--nic=1-N] [--set-opt=dhcp-opt-no value...]
[--set-opt-hex=dhcp-opt-no hexstring...] [--force-opt=dhcp-opt-no...]
[--supress-opt=dhcp-opt-no...] [--min-lease-time=seconds]
[--default-lease-time=seconds] [--max-lease-time=seconds]
[--fixed-address=address] ...]
[<--mac-address=address> [--set-opt=dhcp-opt-no value...]
[--set-opt-hex=dhcp-opt-no hexstring...] [--force-opt=dhcp-opt-no...]
[--supress-opt=dhcp-opt-no...] [--min-lease-time=seconds]
[--default-lease-time=seconds] [--max-lease-time=seconds]
[--fixed-address=address] ...]
VBoxManage dhcpserver modify <--network=netname | --interface=ifname>
[--server-ip=address] [--lower-ip=address] [--upper-ip=address]
[--netmask=mask] [--enable | --disable]
[[--global] [--del-opt=dhcp-opt-no...] [--set-opt=dhcp-opt-no
value...] [--set-opt-hex=dhcp-opt-no hexstring...]
[--force-opt=dhcp-opt-no...] [--unforce-opt=dhcp-opt-no...]
21
8 VBoxManage
[--supress-opt=dhcp-opt-no...] [--unsupress-opt=dhcp-opt-no...]
[--min-lease-time=seconds] [--default-lease-time=seconds]
[--max-lease-time=seconds] [--remove-config] ...]
[<--group=name> [--set-opt=dhcp-opt-no value...]
[--set-opt-hex=dhcp-opt-no hexstring...] [--force-opt=dhcp-opt-no...]
[--unforce-opt=dhcp-opt-no...] [--supress-opt=dhcp-opt-no...]
[--unsupress-opt=dhcp-opt-no...] [--del-mac=address...]
[--incl-mac=address...] [--excl-mac=address...]
[--del-mac-wild=pattern...] [--incl-mac-wild=pattern...]
[--excl-mac-wild=pattern...] [--del-vendor=string...]
[--incl-vendor=string...] [--excl-vendor=string...]
[--del-vendor-wild=pattern...] [--incl-vendor-wild=pattern...]
[--excl-vendor-wild=pattern...] [--del-user=string...]
[--incl-user=string...] [--excl-user=string...]
[--del-user-wild=pattern...] [--incl-user-wild=pattern...]
[--excl-user-wild=pattern...] [--zap-conditions]
[--min-lease-time=seconds] [--default-lease-time=seconds]
[--max-lease-time=seconds] [--remove-config] ...]
[<--vm=name|uuid> [--nic=1-N] [--del-opt=dhcp-opt-no...]
[--set-opt=dhcp-opt-no value...] [--set-opt-hex=dhcp-opt-no
hexstring...] [--force-opt=dhcp-opt-no...] [--unforce-opt=dhcp-opt-no...]
[--supress-opt=dhcp-opt-no...] [--unsupress-opt=dhcp-opt-no...]
[--min-lease-time=seconds] [--default-lease-time=seconds]
[--max-lease-time=seconds] [--fixed-address=address] [--remove-config]
...]
[<--mac-address=address> [--del-opt=dhcp-opt-no...]
[--set-opt=dhcp-opt-no value...] [--set-opt-hex=dhcp-opt-no
hexstring...] [--force-opt=dhcp-opt-no...] [--unforce-opt=dhcp-opt-no...]
[--supress-opt=dhcp-opt-no...] [--unsupress-opt=dhcp-opt-no...]
[--min-lease-time=seconds] [--default-lease-time=seconds]
[--max-lease-time=seconds] [--fixed-address=address] [--remove-config]
...]
VBoxManage dhcpserver remove <--network=netname | --interface=ifname>
VBoxManage dhcpserver restart <--network=netname | --interface=ifname>
VBoxManage dhcpserver findlease <--network=netname | --interface=ifname>
<--mac-address=mac>
Description
The dhcpserver commands enable you to control the DHCP server that is built into VirtualBox. You may
find this useful when using internal or host-only networking. Theoretically, you can also enable it for a
bridged network, but that may cause conflicts with other DHCP servers in your physical network.
Common options
The subcommands of dhcpserver all operate on an internal network that can be identified via its name or
in the host-only case via the host-only interface name:
–network=netname
The internal network name. This is the same as you would use as value to the
VBoxManage modifyvm --intnet option when configuring a VM for internal network- ing.
Or you see as VBoxNetworkName in the output from VBoxManage list intnets,
VBoxManage list natnets, or VBoxManage list hostonlyifs.
21
8 VBoxManage
–interface=ifname
The host only interface name. This would be same value as you would use
for the VBoxManage modifyvm --hostonlyadapter option when configuring a VM to
use a host-only network. The value can also be found in the Name row in VBoxManage
list hostonlyifs.
dhcpserver add
VBoxManage dhcpserver add <--network=netname | --interface=ifname>
<--server-ip=address> <--netmask=mask> <--lower-ip=address>
<--upper-ip=address> <--enable | --disable>
[[--global] [--set-opt=dhcp-opt-no value...] [--set-opt-hex=dhcp-opt-no
hexstring...] [--force-opt=dhcp-opt-no...] [--supress-opt=dhcp-opt-no...]
[--min-lease-time=seconds] [--default-lease-time=seconds]
[--max-lease-time=seconds] ...]
[<--group=name> [--set-opt=dhcp-opt-no value...]
[--set-opt-hex=dhcp-opt-no hexstring...] [--force-opt=dhcp-opt-no...]
[--supress-opt=dhcp-opt-no...] [--incl-mac=address...]
[--excl-mac=address...] [--incl-mac-wild=pattern...]
[--excl-mac-wild=pattern...] [--incl-vendor=string...]
[--excl-vendor=string...] [--incl-vendor-wild=pattern...]
[--excl-vendor-wild=pattern...] [--incl-user=string...]
[--excl-user=string...] [--incl-user-wild=pattern...]
[--excl-user-wild=pattern...] [--min-lease-time=seconds]
[--default-lease-time=seconds] [--max-lease-time=seconds] ...]
[<--vm=name|uuid> [--nic=1-N] [--set-opt=dhcp-opt-no value...]
[--set-opt-hex=dhcp-opt-no hexstring...] [--force-opt=dhcp-opt-no...]
[--supress-opt=dhcp-opt-no...] [--min-lease-time=seconds]
[--default-lease-time=seconds] [--max-lease-time=seconds]
[--fixed-address=address] ...]
[<--mac-address=address> [--set-opt=dhcp-opt-no value...]
[--set-opt-hex=dhcp-opt-no hexstring...] [--force-opt=dhcp-opt-no...]
[--supress-opt=dhcp-opt-no...] [--min-lease-time=seconds]
[--default-lease-time=seconds] [--max-lease-time=seconds]
[--fixed-address=address] ...]
--server-ip=<address>
The IP address the DHCP server should use.
--lower-ip=<address>, --upper-ip=<address>
The IP address range for the DHCP server to manage. This should not include the address
of the DHCP server itself, but it must be in the same network as it. The boundraries are inclusive, so
both the lower and upper addresses will be handed out to clients.
--netmask=<mask>
The network mask. Typically 255.255.255.0.
--enable, –disable
Whether to enable the DHCP server or disable it. If not specified, the server will be created
in disabled state and no IP addresses handed out.
21
8 VBoxManage
--global
Set the configuration scope to global. Any subsequent --set-opt options will be apply to
all the DHCP clients.
--vm=<vmname|uuid>
Set the configuration scope to the first NIC of the specified VM. Any subsequent --set-opt
options will apply just to that interface, nothing else.
--nic=<1-N>
Set the configuration scope to a NIC other than first of the VM specified the in --vm.
--mac-address=<address>
Set the configuration scope to the specified MAC address.
--group=<name>
Set the configuration scope to the specified group.
--set-opt=<dhcp-opt-no value>
Adds the specified DHCP option number (0-255) and value. The value format is option
specific (typically human readable) and will be validated by the API and the DHCP server.
--set-opt-hex=<dhcp-opt-no hexstring>
Adds the specified DHCP option number (0-255) and value. The option value is specified
as a raw series of hex bytes, optionally separated by colons. No validation is performed on these by the
API or the DHCP server, they will be pass as specified to the client.
--force-opt=<dhcp-opt-no>
Forces the specified DHCP option number (0-255) onto to be sent to the client whether it
requested it or not (provided the option is configured with a value at some level).
--suppress-opt=<dhcp-opt-no>
Prevents the specified DHCP option number (0-255) from being sent to the client when
present in this or a high configuration scope.
--min-lease-time=<seconds>
Sets the minimum lease time for the current scope in seconds. Zero means taking the value
from a higher option level or use default.
--default-lease-time=<seconds>
Sets the default lease time for the current scope in seconds. Zero means taking the value
from a higher option level or use default.
--max-lease-time=<seconds>
Sets the maximum lease time for the current scope in seconds. Zero means taking the value
from a higher option level or use default.
--fixed-address=<address>
Fixed address assignment for a --vm or --mac-address configuration scope. Any empty
address turns it back to dynamic address assignment.
--incl-mac=<address>
Include the specific MAC address in the group.
--excl-mac=<address>
Exclude the specific MAC address from the group.
21
8 VBoxManage
--incl-mac-wild=<pattern>
Include the specific MAC address pattern in the group.
--excl-mac-wild=<pattern>
Exclude the specific MAC address pattern from the group.
--incl-vendor=<string>
Include the specific vendor class ID in the group.
--excl-vendor=<string>
Exclude the specific vendor class ID from the group.
--incl-vendor-wild=<pattern>
Include the specific vendor class ID pattern in the group.
--excl-vendor-wild=<pattern>
Exclude the specific vendor class ID pattern from the group.
--incl-user=<string>
Include the specific user class ID in the group.
--excl-user=<string>
Exclude the specific user class ID from the group.
--incl-user-wild=<pattern>
Include the specific user class ID pattern in the group.
--excl-user-wild=<pattern>
Exclude the specific user class ID pattern from the group.
dhcpserver modify
VBoxManage dhcpserver modify <--network=netname | --interface=ifname>
[--server-ip=address] [--lower-ip=address] [--upper-ip=address]
[--netmask=mask] [--enable | --disable]
[[--global] [--del-opt=dhcp-opt-no...] [--set-opt=dhcp-opt-no
value...] [--set-opt-hex=dhcp-opt-no hexstring...]
[--force-opt=dhcp-opt-no...] [--unforce-opt=dhcp-opt-no...]
[--supress-opt=dhcp-opt-no...] [--unsupress-opt=dhcp-opt-no...]
[--min-lease-time=seconds] [--default-lease-time=seconds]
[--max-lease-time=seconds] [--remove-config] ...]
[<--group=name> [--set-opt=dhcp-opt-no value...]
[--set-opt-hex=dhcp-opt-no hexstring...] [--force-opt=dhcp-opt-no...]
[--unforce-opt=dhcp-opt-no...] [--supress-opt=dhcp-opt-no...]
[--unsupress-opt=dhcp-opt-no...] [--del-mac=address...]
[--incl-mac=address...] [--excl-mac=address...]
[--del-mac-wild=pattern...] [--incl-mac-wild=pattern...]
[--excl-mac-wild=pattern...] [--del-vendor=string...]
[--incl-vendor=string...] [--excl-vendor=string...]
[--del-vendor-wild=pattern...] [--incl-vendor-wild=pattern...]
[--excl-vendor-wild=pattern...] [--del-user=string...]
[--incl-user=string...] [--excl-user=string...]
[--del-user-wild=pattern...] [--incl-user-wild=pattern...]
[--excl-user-wild=pattern...] [--zap-conditions]
[--min-lease-time=seconds] [--default-lease-time=seconds]
[--max-lease-time=seconds] [--remove-config] ...]
[<--vm=name|uuid> [--nic=1-N] [--del-opt=dhcp-opt-no...]
21
8 VBoxManage
This modifies an existing DHCP server configuration. It takes the same options as the add
command with the addition of the following on scope configuration:
--del-opt=<dhcp-opt-no>
Counterpart to --set-opt that will cause the specified DHCP option number (0-255) to be
deleted from the server settings. Like with --set-opt the scope of the deletion is governed
by the --global, --vm, --mac-address and --group options.
--unforce-opt=<dhcp-opt-no>
Removes the specified DHCP option number (0-255) from the forced option list (i.e. the
reverse of --force-opt). Like with --set-opt the scope of the deletion is governed by the --
global, --vm, --mac-address and --group options.
--unsuppress-opt=<dhcp-opt-no>
Removes the specified DHCP option number (0-255) from the supressed option list (i.e. the
reverse of --suppress-opt). Like with --set-opt the scope of the deletion is governed by the
--global, --vm, --mac-address and --group options.
--remove-config
Removes the configuration currently being scoped. The --global scope is not removable.
The configuration scope will change to --global after this option.
--del-mac=<address>
Delete the specific MAC address from the group conditions.
--del-mac-wild=<pattern>
Delete the specific MAC address pattern from the group conditions.
--del-vendor=<string>
Delete the specific vendor class ID from the group conditions.
--del-vendor-wild=<pattern>
Delete the specific vendor class ID pattern from the group conditions.
--del-user=<string>
Delete the specific user class ID pattern from the group conditions.
--del-user-wild=<pattern>
Delete the specific user class ID pattern from the group conditions.
--zap-conditions
Deletes all the group conditions.
21
8 VBoxManage
dhcpserver remove
VBoxManage dhcpserver remove <--network=netname | --interface=ifname>
dhcpserver restart
VBoxManage dhcpserver restart <--network=netname | --interface=ifname>
Restarts the specified DHCP server. The DHCP server must be running.
dhcpserver findlease
VBoxManage dhcpserver findlease <--network=netname | --interface=ifname>
<--mac-address=mac>
Performs a lease database lookup. This is mainly for getting the IP address of a running VM.
--mac-address=<mac>
The MAC address to lookup in the lease database.
21
8 VBoxManage
13 - BootFileSize
Number of 512 byte blocks making up the boot file (16-bit decimal value).
14 - MeritDumpFile
Client core file.
15 - DomainName
Domain name for the client.
16 - SwapServer
IPv4 address of the swap server that the client should use.
17 - RootPath
The path to the root disk the client should use.
18 - ExtensionPath
Path to a file containing additional DHCP options (RFC2123).
19 - IPForwarding
Whether IP forwarding should be enabled by the client (boolean).
20 - OptNonLocalSourceRouting
Whether non-local datagrams should be forwarded by the client (boolean)
21 - PolicyFilter
List of IPv4 addresses and masks paris controlling non-local source routing.
22 - MaxDgramReassemblySize
The maximum datagram size the client should reassemble (16-bit decimal value).
23 - DefaultIPTTL
The default time-to-leave on outgoing (IP) datagrams (8-bit decimal value).
24 - PathMTUAgingTimeout
RFC1191 path MTU discovery timeout value in seconds (32-bit decimal value).
25 - PathMTUPlateauTable
RFC1191 path MTU discovery size table, sorted in ascending order (list of 16-bit decimal values).
26 - InterfaceMTU
The MTU size for the interface (16-bit decimal value).
27 - AllSubnetsAreLocal
Indicates whether the MTU size is the same for all subnets (boolean).
28 - BroadcastAddress
Broadcast address (RFC1122) for the client to use (IPv4 address).
29 - PerformMaskDiscovery
Whether to perform subnet mask discovery via ICMP (boolean).
30 - MaskSupplier
Whether to respond to subnet mask requests via ICMP (boolean).
31 - PerformRouterDiscovery
Whether to perform router discovery (RFC1256) (boolean).
32 - RouterSolicitationAddress
Where to send router solicitation requests (RFC1256) (IPv4 address).
22
8 VBoxManage
33 - StaticRoute
List of network and router address pairs addresses.
34 - TrailerEncapsulation
Whether to negotiate the use of trailers for ARP (RTF893) (boolean).
35 - ARPCacheTimeout
The timeout in seconds for ARP cache entries (32-bit decimal value).
36 - EthernetEncapsulation
Whether to use IEEE 802.3 (RTF1042) rather than of v2 (RFC894) ethernet encapsulation
(boolean).
37 - TCPDefaultTTL
Default time-to-live for TCP sends (non-zero 8-bit decimal value).
38 - TCPKeepaliveInterval
The interface in seconds between TCP keepalive messages (32-bit decimal value).
39 - TCPKeepaliveGarbage
Whether to include a byte of garbage in TCP keepalive messages for backward compatibility
(boolean).
40 - NISDomain
The NIS (Sun Network Information Services) domain name (string).
41 - NISServers
Space separated list of IPv4 NIS server addresses.
42 - NTPServers
Space separated list of IPv4 NTP (RFC1035) server addresses.
43 - VendorSpecificInfo
Vendor specific information. Only accessible using –set-opt-hex.
44 - NetBIOSNameServers
Space separated list of IPv4 NetBIOS name server (NBNS) addresses (RFC1001,RFC1002).
45 - NetBIOSDatagramServers
Space separated list of IPv4 NetBIOS datagram distribution server (NBDD) addresses
(RFC1001,RFC1002).
46 - NetBIOSNodeType
NetBIOS node type (RFC1001,RFC1002): 1=B-node, 2=P-node, 4=M-node, and 8=H- node (8-
bit decimal value).
47 - NetBIOSScope
NetBIOS scope (RFC1001,RFC1002). Only accessible using –set-opt-hex.
48 - XWindowsFontServers
Space separated list of IPv4 X windows font server addresses.
49 - XWindowsDisplayManager
Space separated list of IPv4 X windows display manager addresses.
62 - NetWareIPDomainName
Netware IP domain name (RFC2242) (string).
63 - NetWareIPInformation
Netware IP information (RFC2242). Only accessible using –set-opt-hex.
22
8 VBoxManage
64 - NISPlusDomain
The NIS+ domain name (string).
65 - NISPlusServers
Space separated list of IPv4 NIS+ server addresses.
66 - TFTPServerName
TFTP server name (string).
67 - BootfileName
Bootfile name (string).
68 - MobileIPHomeAgents
Space separated list of IPv4 mobile IP agent addresses.
69 - SMTPServers
Space separated list of IPv4 simple mail transport protocol (SMPT) server addresses.
70 - POP3Servers
Space separated list of IPv4 post office protocol 3 (POP3) server addresses.
71 - NNTPServers
Space separated list of IPv4 network news transport protocol (NTTP) server addresses.
72 - WWWServers
Space separated list of default IPv4 world wide web (WWW) server addresses.
73 - FingerServers
Space separated list of default IPv4 finger server addresses.
74 - IRCServers
Space separated list of default IPv4 internet relay chat (IRC) server addresses.
75 - StreetTalkServers
Space separated list of IPv4 StreetTalk server addresses.
76 - STDAServers
Space separated list of IPv4 StreetTalk directory assistance (STDA) server addresses.
78 - SLPDirectoryAgent
Addresses of one or more service location protocol (SLP) directory agent, and an indicator of whether
their use is mandatory. Only accessible using –set-opt-hex.
79 - SLPServiceScope
List of service scopes for the service location protocol (SLP) and whether using the list is mandator.
Only accessible using –set-opt-hex.
119 - DomainSearch
Domain search list, see RFC3397 and section 4.1.4 in RFC1035 for encoding. Only acces- sible using
–set-opt-hex.
22
8 VBoxManage
Synopsis
VBoxManage debugvm <uuid|vmname> dumpvmcore [--filename=name]
VBoxManage debugvm <uuid|vmname> info <item> [args...]
VBoxManage debugvm <uuid|vmname> injectnmi
VBoxManage debugvm <uuid|vmname> log [--release | --debug]
[group-settings...]
VBoxManage debugvm <uuid|vmname> logdest [--release | --debug]
[destinations...]
VBoxManage debugvm <uuid|vmname> logflags [--release | --debug] [flags...]
VBoxManage debugvm <uuid|vmname> osdetect
VBoxManage debugvm <uuid|vmname> osinfo
VBoxManage debugvm <uuid|vmname> osdmesg [--lines=lines]
VBoxManage debugvm <uuid|vmname> getregisters [--cpu=id]
[reg-set.reg-name...]
VBoxManage debugvm <uuid|vmname> setregisters [--cpu=id]
[reg-set.reg-name=value...]
VBoxManage debugvm <uuid|vmname> show [--human-readable | --sh-export |
--sh-eval | --cmd-set] [settings-item...]
VBoxManage debugvm <uuid|vmname> stack [--cpu=id]
VBoxManage debugvm <uuid|vmname> statistics [--reset] [--descriptions]
[--pattern=pattern]
Description
The “debugvm” commands are for experts who want to tinker with the exact details of virtual machine
execution. Like the VM debugger described in chapter 12.1.4, The Built-In VM Debugger, page 311, these
commands are only useful if you are very familiar with the details of the PC architecture and how to debug
software.
Common options
The subcommands of debugvm all operate on a running virtual machine:
uuid|vmname
Either the UUID or the name (case sensitive) of a VM.
debugvm dumpvmcore
VBoxManage debugvm <uuid|vmname> dumpvmcore [--filename=name]
Creates a system dump file of the specified VM. This file will have the standard ELF core format
(with custom sections); see chapter 12.1.5, VM Core Format, page 313. This
corresponds to the writecore command in the debugger.
--filename=<filename>
The name of the output file.
debugvm info
VBoxManage debugvm <uuid|vmname> info <item> [args...]
Displays info items relating to the VMM, device emulations and associated drivers. This
corresponds to the info command in the debugger.
22
8 VBoxManage
info
Name of the info item to display. The special name help will list all the available info items and hints
about optional arguments.
args
Optional argument string for the info item handler. Most info items does not take any extra arguments.
Arguments not recognized are generally ignored.
debugvm injectnmi
VBoxManage debugvm <uuid|vmname> injectnmi
Causes a non-maskable interrupt (NMI) to be injected into the guest. This might be useful for certain
debugging scenarios. What happens exactly is dependent on the guest operating system, but an NMI can crash
the whole guest operating system. Do not use unless you know what you’re doing.
debugvm log
VBoxManage debugvm <uuid|vmname> log [--release | --debug]
[group-settings...]
Changes the group settings for either debug (--debug) or release (--release) logger of the
VM process.
The group-settings are typically strings on the form em.e.f.l, hm=~0 and -em.f. Basic
wildcards are supported for group matching. The all group is an alias for all the groups.
Please do keep in mind that the group settings are applied as modifications to the current ones. This
corresponds to the log command in the debugger.
debugvm logdest
VBoxManage debugvm <uuid|vmname> logdest [--release | --debug]
[destinations...]
Changes the destination settings for either debug (--debug) or release (--release) logger of
the VM process. For details on the destination format, the best source is
src/VBox/Runtime/common/log/log.cpp.
The destinations is one or more mnemonics, optionally prefixed by “no” to disable them. Some of
them take values after a “:“ or “=“ separator. Multiple mnemonics can be separated by space or given as
separate arguments on the command line.
List of available destination:
file[=<file>], nofile
Specifies a log file. It no filname is given, one will be generated based on the current UTC
time and VM process name and placed in the current directory of the VM process. Note that this will
currently not have any effect if the log file has already been opened.
dir=<directory>, nodir
Specifies the output directory for log files. Note that this will currently not have any effect
if the log file has already been opened.
history=<count>, nohistory
A non-zero value enables log historization, with the value specifying how many old log files
to keep.
22
8 VBoxManage
histsize=<bytes>
The max size of a log file before it is historized. Default is infinite.
histtime=<seconds>
The max age (in seconds) of a log file before it is historized. Default is infinite.
ringbuffer, noringbuffer
Only log to the log buffer until an explicit flush (e.g. via an assertion) occurs. This is fast
and saves diskspace.
stdout, nostdout
Write the log content to standard output.
stdout, nostdout
Write the log content to standard error.
debugger, nodebugger
Write the log content to the debugger, if supported by the host OS.
com, nocom
Writes logging to the COM port. This is only applicable for raw-mode and ring-0 logging.
user, nouser
Custom destination which has no meaning to VM processes..
debugvm logflags
VBoxManage debugvm <uuid|vmname> logflags [--release | --debug] [flags...]
Changes the flags on either debug (--debug) or release (--release) logger of the VM process. Please
note that the modifications are applied onto the existing changes, they are not replacing them.
The flags are a list of flag mnemonics, optionally prefixed by a “no”, “¡‘, “~“ or “-“ to negate their
meaning. The “+“ prefix can be used to undo previous negation or use as a separator, though better use
whitespace or separate arguments for that.
List of log flag mnemonics, with their counter form where applicable (asterisk indicates de- faults):
enabled*, disabled
Enables or disables logging.
buffered, unbuffered*
Enabling buffering of log output before it hits the destinations.
writethrough(/writethru)
Whether to open the destination file with writethru buffering settings or not.
flush
Enables flushing of the output file (to disk) after each log statement.
lockcnts
Prefix each log line with lock counts for the current thread.
cpuid
Prefix each log line with the ID of the current CPU.
22
8 VBoxManage
pid
Prefix each log line with the current process ID.
flagno
Prefix each log line with the numberic flags corresponding to the log statement.
flag
Prefix each log line with the flag mnemonics corresponding to the log statement.
groupno
Prefix each log line with the log group number for the log statement producing it.
group
Prefix each log line with the log group name for the log statement producing it.
tid
Prefix each log line with the current thread identifier.
thread
Prefix each log line with the current thread name.
time
Prefix each log line with the current UTC wall time.
timeprog
Prefix each log line with the current monotonic time since the start of the program.
msprog
Prefix each log line with the current monotonic timestamp value in milliseconds since the
start of the program.
ts
Prefix each log line with the current monotonic timestamp value in nanoseconds.
tsc
Prefix each log line with the current CPU timestamp counter (TSC) value.
rel, abs*
Selects the whether ts and tsc prefixes should be displayed as relative to the previous log
line or as absolute time.
hex*, dec
Selects the whether the ts and tsc prefixes should be formatted as hexadecimal or deci-
mal.
custom
Custom log prefix, has by default no meaning for VM processes.
usecrlf, uself*
Output with DOS style (CRLF) or just UNIX style (LF) line endings.
overwrite*, append
Overwrite the destination file or append to it.
22
8 VBoxManage
debugvm osdetect
VBoxManage debugvm <uuid|vmname> osdetect
Make the VMM’s debugger facility (re)-detect the guest operating system (OS). This will first load all
debugger plug-ins.
This corresponds to the detect command in the debugger.
debugvm osinfo
VBoxManage debugvm <uuid|vmname> osinfo
Displays information about the guest operating system (OS) previously detected by the VMM’s debugger
facility.
debugvm osdmesg
VBoxManage debugvm <uuid|vmname> osdmesg [--lines=lines]
--lines=<lines>
Number of lines of the log to display, counting from the end. The default is infinite.
debugvm getregisters
VBoxManage debugvm <uuid|vmname> getregisters [--cpu=id]
[reg-set.reg-name...]
reg-set.reg-name
One of more registers, each having one of the following forms:
1. register-set.register-name.sub-field
2. register-set.register-name
3. cpu-register-name.sub-field
4. cpu-register-name
5. all
The all form will cause all registers to be shown (no sub-fields). The registers names are case-
insensitive.
--cpu=<id>
Selects the CPU register set when specifying just a CPU register (3rd and 4th form). The
default is 0.
debugvm setregisters
VBoxManage debugvm <uuid|vmname> setregisters [--cpu=id]
[reg-set.reg-name=value...]
reg-set.reg-name=value
One of more register assignment, each having one of the following forms:
22
8 VBoxManage
1. register-set.register-name.sub-field=value
2. register-set.register-name=value
3. cpu-register-name.sub-field=value
4. cpu-register-name=value
The value format should be in the same style as what getregisters displays, with the exception
that both octal and decimal can be used instead of hexadecimal.
--cpu=<id>
Selects the CPU register set when specifying just a CPU register (3rd and 4th form). The
default is 0.
debugvm show
VBoxManage debugvm <uuid|vmname> show [--human-readable |
--sh-export | --sh-eval | --cmd-set] [settings-item...]
--human-readable
Selects human readable output.
--sh-export
Selects output format as bourne shell style export commands.
--sh-eval
Selects output format as bourne shell style eval command input.
--cmd-set
Selects output format as DOS style SET commands.
settings-item
What to display. One or more of the following:
• logdbg-settings - debug log settings.
• logrel-settings - release log settings.
• log-settings - alias for both debug and release log settings.
debugvm stack
VBoxManage debugvm <uuid|vmname> stack [--cpu=id]
Unwinds the guest CPU stacks to the best of our ability. It is recommended to first run the
osdetect command, as this gives both symbols and perhaps unwind information.
--cpu=<id>
Selects a single guest CPU to display the stack for. The default is all CPUs.
debugvm statistics
VBoxManage debugvm <uuid|vmname> statistics [--reset] [--descriptions]
[--pattern=pattern]
22
8 VBoxManage
--pattern=<pattern>
DOS/NT-style wildcards patterns for selecting statistics. Multiple patterns can be specified
by using the ’|’ (pipe) character as separator.
--reset
Select reset instead of display mode.
8.44 VBoxManage
cloudprofile
Manage the cloud profiles.
Synopsis
VBoxManage cloudprofile <--provider=name> <--profile=name> add
[--clouduser=unique id] [--fingerprint=MD5 string] [--keyfile=path]
[--passphrase=string] [--tenancy=unique id] [--compartment=unique id]
[--region=string]
VBoxManage cloudprofile <--provider=name> <--profile=name> update
[--clouduser=unique id] [--fingerprint=MD5 string] [--keyfile=path]
[--passphrase=string] [--tenancy=unique id] [--compartment=unique id]
[--region=string]
VBoxManage cloudprofile <--provider=name> <--profile=name> delete
VBoxManage cloudprofile <--provider=name> <--profile=name> show
Description
Common options
The subcommands of cloudprofile implement the standard CRUD operations for a cloud pro- file. The
next common options must be placed between the “cloud” and the following sub- commands:
–provider=name
Short cloud provider name.
–profile=name
Cloud profile name.
cloudprofile add
VBoxManage cloudprofile <--provider=name> <--profile=name> add
[--clouduser=unique id] [--fingerprint=MD5 string] [--keyfile=path]
[--passphrase=string] [--tenancy=unique id] [--compartment=unique id]
[--region=string]
--clouduser
The name which fully identifies the user in the specified cloud provider.
--fingerprint
Fingerprint for the key pair being used.
--keyfile
Full path and filename of the private key.
22
8 VBoxManage
--passphrase
Passphrase used for the key, if it is encrypted.
--tenancy
ID of your tenancy.
--compartment
ID of your compartment.
--region
Region name. Region is where you plan to deploy an application.
cloudprofile show
VBoxManage cloudprofile <--provider=name> <--profile=name> show
cloudprofile update
VBoxManage cloudprofile <--provider=name> <--profile=name> update
[--clouduser=unique id] [--fingerprint=MD5 string] [--keyfile=path]
[--passphrase=string] [--tenancy=unique id] [--compartment=unique id]
[--region=string]
cloudprofile delete
VBoxManage cloudprofile <--provider=name> <--profile=name> delete
23
8 VBoxManage
Synopsi
VBoxManage cloud <--provider=name> <--profile=name> list instances
[--state=string] [--compartment-id=string]
VBoxManage cloud <--provider=name> <--profile=name> list images
[--state=string] [--compartment-id=string]
Description
Common options
The word “cloud” is an umbrella for all commands related to the interconnection with the Cloud. The
following common options must be placed between the “cloud” and the following command, in our case
“list”:
–provider=name
Short cloud provider name.
–profile=name
Cloud profile name.
–state"running/paused/terminated"
The state of cloud instance. The possible states are “running/paused/terminated” at mo-
ment. If the state isn’t provided the list of instances with all possible states is returned.
--compartment-id
A compartment is the logical container used to organize and isolate cloud resources. The
different cloud providers can have the different names for this entity.
–state"available/disabled/deleted"
The state of cloud image. The possible states are “available/disabled/deleted” at moment.
If the state isn’t provided the list of images with all possible states is returned.
--compartment-id
A compartment is the logical container used to organize and isolate cloud resources. The
different cloud providers can have the different names for this entity.
23
8 VBoxManage
Synopsi
VBoxManage cloud <--provider=name> <--profile=name> instance create
<--domain-name=name> <--image-id=id | --boot-volume-id=id>
<--display-name=name> <--shape=type> <--subnet=id>
[--boot-disk-size=size in GB] [--publicip=true/false]
[--privateip=IP address] [--public-ssh-key=key string...]
[--launch-mode=NATIVE/EMULATED/PARAVIRTUALIZED]
VBoxManage cloud <--provider=name> <--profile=name> instance info
<--id=unique id>
VBoxManage cloud <--provider=name> <--profile=name> instance terminate
<--id=unique id>
VBoxManage cloud <--provider=name> <--profile=name> instance start
<--id=unique id>
VBoxManage cloud <--provider=name> <--profile=name> instance pause
<--id=unique id>
Description
Common options
The subcommands of cloudinstance implement the standard operations for a cloud instance like
start/pause/show/terminate. The next common options must be placed between the “cloud” and the
following sub-commands:
–provider=name
Short cloud provider name.
–profile=name
Cloud profile name.
Creates new instance in the Cloud. There are two standard ways to create an instance in the Cloud: 1.
Create an instance from an existing custom image. 2. Create an instance from an existing bootable
volume. This bootable volume shouldn’t be attached to any instance. For the
1st approach next parameters are required: image-id and boot-disk-size. For the 2nd approach next
parameters are required: boot-volume-id; The rest parameters are common for both cases: display-name,
launch-mode, subnet-id, publicIP, privateIP, shape, domain.
--domain-name
Cloud domain where new instance is created.
--image-id
Unique identifier which fully identifies a custom image in the Cloud.
--boot-volume-id
Unique identifier which fully identifies a boot volume in the Cloud.
23
8 VBoxManage
--display-name
Name for new instance in the Cloud.
--shape
The shape of instance, defines the number of CPUs and RAM memory.
--subnet
Unique identifier which fully identifies an existing subnet in the Cloud which will be used
by the instance.
--boot-disk-size
The size of bootable image in GB. Default is 50GB.
--publicip
Whether the instance will have a public IP or not.
--privateip
Private IP address for the created instance.
--public-ssh-key
Public SSH key used to connect to the instance via SSH. This parameter may be re-
peated if you plan to use more than one key as: “–public-ssh-key=firstSSHKey –public- ssh-
key=secondSSHKey”.
--launch-mode
The most known values here may be EMULATED, NATIVE, PARAVIRTUALIZED.
23
8 VBoxManage
Synopsis
VBoxManage cloud <--provider=name> <--profile=name> image create
<--display-name=name> [--bucket-name=name] [--object-name=name]
[--instance-id=unique id]
VBoxManage cloud <--provider=name> <--profile=name> image info <--id=unique
id>
VBoxManage cloud <--provider=name> <--profile=name> image delete
<--id=unique id>
VBoxManage cloud <--provider=name> <--profile=name> image import
<--id=unique id> [--bucket-name=name] [--object-name=name]
VBoxManage cloud <--provider=name> <--profile=name> image export
<--id=unique id> <--display-name=name> [--bucket-name=name]
[--object-name=name]
Description
Common options
The subcommands of cloudimage implement the standard operations for a cloud image like cre-
ate/delete/show/import/export. The next common options must be placed between the “cloud” and the
following sub-commands:
–provider=name
Short cloud provider name.
–profile=name
Cloud profile name.
Creates new image in the Cloud. There are two standard ways to create an image in the Cloud: 1.
Create an image from an object in the Cloud Storage; 2. Create an image from an existing cloud instance.
For the 1st approach next parameters are required: bucket-name - cloud bucket name where an object is
located; object-name - name of object in the bucket; display- name - name for new image in the Cloud.
For the 2d approach next parameters are required: instance-id - Id of instance in the Cloud; display-name -
name for new image in the Cloud.
--display-name
Name for new image in the Cloud.
--bucket-name
Cloud bucket name where an object is located.
--object-name
Name of object in the bucket.
--instance-id
Unique identifier which fully identifies the instance in the Cloud.
23
8 VBoxManage
Import an image with a specified id from the Cloud to a local host. The result is an object in the local
“temp” folder on the local host. Possible approach may have two general steps: 1. Create an object from
an image in the Cloud Storage; 2. Download the object to the local host. So the next parameters may be
required: bucket-name - cloud bucket name where the object will be created; object-name - name of object
in the bucket. if parameter “object-name” is absent a displayed image name is used. If the first step isn’t
needed only the parameter “id” is required.
--id
Unique identifier which fully identifies the image in the Cloud.
--bucket-name
Cloud bucket name where an object will be created.
--object-name
Name of created object in the bucket. The downloaded object will have this name.
Export an existing VBox image with a specified uuid from a local host to the Cloud. The result is new
image in the Cloud. Possible approach may have two general steps: 1. Upload VBox image to the Cloud
Storage; 2. Create an image from the uploaded object. So the next parameters may be required: bucket-name
-cloud bucket name where the object will be uploaded; object-name - name of object in the bucket. If
parameter “object-name” is absent the image id is used; display- name - name for new image in the Cloud.
If the first step isn’t needed the parameters “id” and “display-name” are required only.
23
8 VBoxManage
--id
Unique identifier of the image in the VirtualBox.
--display-name
Name for new image in the Cloud.
--bucket-name
Cloud bucket name where the image (object) will be uploaded.
--object-name
Name of object in the bucket.
8.48 vboximg-mount
FUSE mount a virtual disk image for Mac OS and Linux hosts.
Synopsis
vboximg-mount <-? | -h | --help>
vboximg-mount <--image=image-UUID> [--guest-filesystem]
[-o=FUSE-option[,FUSE-option]] [--root] [--rw] <mountpoint>
vboximg-mount <--list> [--image=image-UUID] [--guest-filesystem]
[--verbose] [--vm=vm-UUID] [--wide]
Description
The vboximg-mount command enables you to make Oracle VM VirtualBox disk images available to a Mac
OS or Linux host operating system (OS) for privileged or non-priviliged access. You can mount any
version of the disk from its available history of snapshots. Use this command to mount, view, and optionally
modify the contents of an Oracle VM VirtualBox virtual disk image, and you can also use this command to
view information about registered virtual machines (VMs). This command uses the Filesystem in Userspace
(FUSE) technology to provide raw access to
an Oracle VM VirtualBox virtual disk image.
When you use the --image option to specify a base image identifier, only the base image is mounted.
Any related snapshots are disregarded. Alternatively, if you use the --image option to specify a snapshot,
the state of the FUSE-mounted virtual disk is synthesized from the implied chain of snapshots, including the
base image.
The vboximg-mount command includes experimental read-only access to file systems inside a VM disk
image. This feature enables you to extract some files from the VM disk image without starting the VM and
without requiring third-party file system drivers on the host system. Oracle VM VirtualBox supports the FAT,
NTFS, ext2, ext3, and ext4 file systems.
The virtual disk is exposed as a device node within a FUSE-based file system that overlays the specified
mount point.
The FUSE file system includes a directory that contains a number of files. The file system can also
contain a directory that includes a symbolic link that has the same base name (see the basename(1) man
page) as the virtual disk base image and points to the location of the virtual disk base image. The directory
can be of the following types:
• vhdd provides access to the raw disk image data as a flat image
• volID provides access to an individual volume on the specified disk image
• fsID provides access to a supported file system without requiring a host file system driver
23
8 VBoxManage
Use the following options to obtain information about the vboximg-mount command and its options.
Use the vboximg-mount command to mount an Oracle VM VirtualBox virtual disk image on a Mac OS
or Linux host system. When mounted, you can view the contents of the disk image or modify the contents
of the disk image.
You can use the vboximg-mount command to restrict FUSE-based access to a subsection of the virtual
disk.
--image=<disk-image>
Specifies the Universally Unique Identifier (UUID), name, or path of the Oracle VM VirtualBox
disk image.
The short form of the --image option is -i.
--guest-filesystem
Enables experimental read-only support for guest file systems. When you specify this op- tion, all
known file systems are made available to access.
The short form of the --guest-filesystem option is -g.
-o=<FUSE-option>[,<FUSE-option>...]
--root
Overrides the security measure that restricts file access to the file system owner by also granting file
access to the root user.
Same as the -o allow_root option. See the -o option description. This
option is incompatible with the -o allow_other option.
--rw
Mounts the specified image as read-write, which is required if you want to modify its contents. By
default, images are mounted as read-only.
23
8 VBoxManage
mount-point
Specifies the path name of a directory on which to mount the Oracle VM VirtualBox disk image.
Use the vboximg-mount command to view information about registered VMs or an Oracle VM
VirtualBox virtual disk image.
--image=<disk-image>
Specifies the UUID, name, or path of the Oracle VM VirtualBox disk image. The short
form of the --image option is -i.
--guest-filesystem
Enables experimental read-only support for guest file systems. When you specify this op- tion, all
known file systems are made available to access.
The short form of the --guest-filesystem option is -g.
--list
Shows information about the disks that are associated with the registered VMs. If you specify a
disk image, this option shows information about the partitions of the specified image.
When you specify the --verbose option, the output includes detailed information about the VMs
and media, including snapshot images and file paths.
The short form of the --list option is -l.
--verbose
Outputs information about the VM that is associated with the specified UUID.
--wide
Outputs information in a wide format. This output includes the lock state information of running VMs.
For VMs that are not running, the state is created.
The wide output uses a tree-like structure in the VM column to show the relationship between a
VM base image and its snapshots.
23
8 VBoxManage
Examples
The following example shows how to mount a virtual disk image on the host operating system
(OS).
$ mkdir fuse_mount_point
$ vboximg-mount --image=b490e578-08be-4f7d-98e9-4c0ef0952377 fuse_mount_point
$ ls fuse_mount_point
ubu.vdi[32256:2053029880] vhdd
$ sudo mount fuse_mount_point/vhdd /mnt
The mkdir command creates a mount point called fuse_mount_point on the host OS. The
vboximg-mount command is then used to mount the specified disk image on the
fuse_mount_point mount point. The mount includes all snapshots for the disk image.
The ls command shows the contents of fuse_mount_point. The mount command is then used to
mount the FUSE-mounted device node, vhdd, on the /mnt mount point. The vhdd device node represents
the virtual disk image.
The following example shows how to make the known file systems of the b490e578-
08be-4f7d-98e9-4c0ef0952377 disk image accessible when the image is mounted on the
fuse_mount_point mount point:
$ vboximg-mount --image=b490e578-08be-4f7d-98e9-4c0ef0952377 \
--guest-filesystem fuse_mount_point
The following command outputs detailed information about all registered VMs and their snap- shots:
$ vboximg-mount --list --verbose
The following command shows an excerpt of the list output in wide format.
$ vboximg-mount --list --wide
------------------------------------------ ------------------------------------
Oracle Linux 7 5365ab5f-470d-44c0-9863-dad532ee5905
|
+- Oracle Linux 7.vdi 7.0G VDI created 96d2e92e-0d4e-46ab-a0f1-008fdbf997e7
| +- <snapshot> 15.9G VDI created f9cc866a-9166-42e9-a503-bbfe9b7312e8
|
+- kernel.vdi 11.1G VDI created 79a370bd-0c4f-480a-30bb-10cdea68423f
The output shows that the Proxy VM is running the fourth snapshot of the Proxy.vdi virtual disk image.
The running state is indicated by the wlock value in the State column.
The Oracle Linux 7 VM is not running. It has two images: Oracle Linux 7.vdi and
kernel.vdi. The Oracle Linux 7.vdi image has a snapshot.
The following command shows information about the VM with the specified UUID:
23
8 VBoxManage
UUID: b1d5563b-2a5b-4013-89f1-26c81d6bbfa0
Image: ubu.vdi
UUID: b490e578-08be-4f7d-98e9-4c0ef0952377
Snapshot: 35afe1e0-0a51-44f3-a228-caf172f3306f
Size: 12.1G
Snapshot: 874279c1-4425-4282-ada8-a9c07c00bbf9
Size: 13.6G
Image: kernel.vdi
UUID: 79a370bd-6eb7-4dbf-8bc6-d29118f127e0
24
9 Advanced Topics
9.1 Automated Guest
Logins
Oracle VM VirtualBox provides Guest Addition modules for Windows, Linux, and Oracle Solaris to enable
automated logins on the guest.
When a guest operating system is running in a virtual machine, it might be desirable to perform coordinated
and automated logins using credentials from a master login system. Credentials are user name, password, and
domain name, where each value might be empty.
Note: The Oracle VM VirtualBox GINA module is implemented as a wrapper around the
MSGINA.DLL standard Windows GINA module. As a result, it might not work correctly with
third-party GINA modules.
To manually install the Oracle VM VirtualBox credential provider module, extract the Guest
Additions as shown in chapter 4.2.1.4, Manual File Extraction, page 71 and copy the
VBoxCredProv.dll file to the Windows SYSTEM32 directory. In the registry, create the following keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
Authentication\Credential Providers\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}
HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}
HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32
All default values, the key named Default, must be set to VBoxCredProv.
Create the following string and assign it a value of Apartment.
HKEY_CLASSES_ROOT\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32\ThreadingModel
24
9 Advanced
While the VM is running, the credentials can be queried by the Oracle VM VirtualBox login modules,
GINA or credential provider, using the Oracle VM VirtualBox Guest Additions device driver. When
Windows is in logged out mode, the login modules will constantly poll for creden- tials and if they are
present, a login will be attempted. After retrieving the credentials, the login modules will erase them so that
the above command will have to be repeated for subsequent logins.
For security reasons, credentials are not stored in any persistent manner and will be lost when the VM is
reset. Also, the credentials are write-only. There is no way to retrieve the credentials from the host side.
Credentials can be reset from the host side by setting empty values.
Depending on the Windows guest version, the following restrictions apply:
• For Windows XP guests. The login subsystem needs to be configured to use the classic login
dialog, as the Oracle VM VirtualBox GINA module does not support the Windows XP-style
welcome dialog.
• Windows Vista, Windows 7, Windows 8, and Windows 10 guests. The login subsystem
does not support the so-called Secure Attention Sequence, Ctrl+Alt+Del. As a result, the guest’s
group policy settings need to be changed to not use the Secure Attention Sequence. Also, the user
name given is only compared to the true user name, not the user friendly name. This means that
when you rename a user, you still have to supply the original user name as Windows never renames
user accounts internally.
• Automatic login handling of the built-in Windows Remote Desktop Service, formerly known
as Terminal Services, is disabled by default. To enable it, create the following registry key with a
DWORD value of 1.
The following command forces Oracle VM VirtualBox to keep the credentials after they were read by the
guest and on VM reset:
$ VBoxManage setextradata "Windows XP" VBoxInternal/Devices/VMMDev/0/Config/KeepCredentials 1
Note that this is a potential security risk, as a malicious application running on the guest could request this
information using the proper interface.
Note: The pam_vbox.so module only supports the auth primitive. Other primitives such as
account, session, or password are not supported.
24
9 Advanced
The pam_vbox.so module is shipped as part of the Guest Additions but it is not installed and/or
activated on the guest OS by default. In order to install it, it has to be copied from
/opt/VBoxGuestAdditions-version/other/ to the security modules directory. This is usually
/lib/security/ on 32-bit Linux guests or /lib64/security/ on 64-bit Linux guests. Please
refer to your guest OS documentation for the correct PAM module directory.
For example, to use pam_vbox.so with a Ubuntu Linux guest OS and the GNOME Desktop Manager
(GDM) to log in users automatically with the credentials passed by the host, configure the guest OS as
follows:
1. Copy the pam_vbox.so module to the security modules directory. In this case,
/lib/security.
2. Edit the PAM configuration file for GDM, found at /etc/pam.d/gdm. Add the line auth
requisite pam_vbox.so at the top. Additionally, in most Linux distributions there is a file
called /etc/pam.d/common-auth. This file is included in many other services, like the GDM
file mentioned above. There you also have to add the line auth requisite pam_vbox.so.
3. If authentication against the shadow database using pam_unix.so or pam_unix2.so is
desired, the argument try_first_pass for pam_unix.so or use_first_pass for
pam_unix2.so is needed in order to pass the credentials from the Oracle VM VirtualBox module to
the shadow database authentication module. For Ubuntu, this needs to be added to
/etc/pam.d/common-auth, to the end of the line referencing pam_unix.so. This argu- ment tells
the PAM module to use credentials already present in the stack, such as the ones provided by the Oracle
VM VirtualBox PAM module.
Warning: An incorrectly configured PAM stack can effectively prevent you from logging into
your guest system.
To make deployment easier, you can pass the argument debug right after the pam_vbox.so
statement. Debug log output will then be recorded using syslog.
Note: By default, pam_vbox does not wait for credentials to arrive from the host. When a
login prompt is shown, for example by GDM/KDM or the text console, and pam_vbox does
not yet have credentials it does not wait until they arrive. Instead the next module in the PAM
stack, depending on the PAM configuration, will have the chance for authentication.
• CredsWait: Set to 1 if pam_vbox should start waiting until credentials arrive from the host.
Until then no other authentication methods such as manually logging in will be available. If this
property is empty or gets deleted no waiting for credentials will be per- formed and pam_vbox will
act like before. This property must be set read-only for the guest (RDONLYGUEST).
• CredsWaitAbort: Aborts waiting for credentials when set to any value. Can be set from host and
the guest.
24
9 Advanced
• CredsWaitTimeout: Timeout, in seconds, to let pam_vbox wait for credentials to arrive. When
no credentials arrive within this timeout, authentication of pam_vbox will be set to failed and the
next PAM module in chain will be asked. If this property is not specified, set to 0 or an invalid
value, an infinite timeout will be used. This property must be set read-only for the guest
(RDONLYGUEST).
To customize pam_vbox further there are the following guest properties:
• CredsMsgWaiting: Custom message showed while pam_vbox is waiting for credentials from the
host. This property must be set read-only for the guest (RDONLYGUEST).
• CredsMsgWaitTimeout: Custom message showed when waiting for credentials by
pam_vbox has timed out. For example, they did not arrive within time. This property must be
set read-only for the guest (RDONLYGUEST).
Note: If a pam_vbox guest property does not have the correct flag set (RDONLYGUEST) the
property is ignored and, depending on the property, a default value will be used. This can result
in pam_vbox not waiting for credentials. Consult the appropriate syslog file for more information
and use the debug option.
Note:
24
9 Advanced
There are numerous guest properties which can be used to further customize the login experi- ence. For
automatically logging in users, the same guest properties apply as for pam_vbox. See chapter 9.1.2,
Automated Linux and UNIX Guest Logins, page 241.
In addition to the previously mentioned guest properties, vbox-greeter enables you to further
customize its user interface. The following guest properties are located in the
/VirtualBox/GuestAdd/Greeter/ directory:
• HideRestart: Set to 1 if vbox-greeter should hide the button to restart the guest. This property
must be set read-only for the guest (RDONLYGUEST).
• HideShutdown: Set to 1 if vbox-greeter should hide the button to shutdown the guest. This
property must be set read-only for the guest (RDONLYGUEST).
• BannerPath: Path to a .PNG file to use as a banner image on the top of the greeter. The image
size must be 460 x 90 pixels, any bit depth. This property must be set read-only for the guest
(RDONLYGUEST).
• UseTheming: Set to 1 for turning on the following theming options. This property must be set read-
only for the guest (RDONLYGUEST).
• Theme/BackgroundColor: Hexadecimal RRGGBB color for the background. This property must be
set read-only for the guest (RDONLYGUEST).
• Theme/LogonDialog/HeaderColor: Hexadecimal RRGGBB foreground color for the header
text. This property must be set read-only for the guest (RDONLYGUEST).
• Theme/LogonDialog/BackgroundColor: Hexadecimal RRGGBB color for the login dialog
background. This property must be set read-only for the guest (RDONLYGUEST).
• Theme/LogonDialog/ButtonColor: Hexadecimal RRGGBB background color for the login dialog
button. This property must be set read-only for the guest (RDONLYGUEST).
Note: The same restrictions for the guest properties above apply as for the ones speci- fied in the
pam_vbox section.
24
9 Advanced
Note: Specifying the location of sysprep.exe is not possible. Instead the following paths
are used, based on the Windows release:
The Guest Additions will automatically use the appropriate path to execute the system preparation
tool.
After running this script, run the rcvboxadd setup command as root to compile the kernel
modules.
On some 64-bit guests, you must replace lib with lib64. On older guests that do not run the udev
service, you must add the vboxadd service to the default runlevel to ensure that the modules are loaded.
To set up the time synchronization service, add the vboxadd-service service to the de- fault
runlevel. To set up the X11 and OpenGL part of the Guest Additions, run the rcvboxadd-x11
setup command. Note that you do not need to enable additional services.
Use the rcvboxadd setup to recompile the guest kernel modules.
After compilation, reboot your guest to ensure that the new modules are loaded.
24
9 Advanced
guest monitors. The default mode can be changed by setting the output property VBOX_MODE to
“<width>x<height>“ for any guest monitor. When VBoxClient and the kernel drivers are active this is
done automatically when the host requests a mode change. The driver for older versions can only receive
new modes by querying the host for requests at regular intervals.
With legacy X Servers before version 1.3, you can also add your own modes to the X server
configuration file. Add them to the “Modes” list in the “Display” subsection of the “Screen” section.
For example, the following section has a custom 2048x800 resolution mode added:
Section "Screen"
Identifier "Default Screen"
Device "VirtualBox graphics card"
Monitor "Generic Monitor"
DefaultDepth 24
SubSection "Display"
Depth 24
Modes "2048x800" "800x600" "640x480"
EndSubSection
EndSection
The --cpus option is used to specify the maximum number of CPUs that the virtual machine can have:
$ VBoxManage modifyvm <VM-name> --cpus 8
When the VM is off, you can then add and remove virtual CPUs with the
VBoxManage modifyvm --plugcpu and VBoxManage modifyvm --unplugcpu commands,
which take the number of the virtual CPU as a parameter, as follows:
$ VBoxManage modifyvm <VM-name> --plugcpu 3
$ VBoxManage modifyvm <VM-name> --unplugcpu 3
See chapter 8.8, VBoxManage modifyvm, page 144 and chapter 8.13, VBoxManage controlvm, page 162 for
details.
With Linux guests, the following applies:
24
9 Advanced
To prevent ejection while the CPU is still used it has to be ejected from within the guest before. The Linux
Guest Additions contain a service which receives hot-remove events and ejects the CPU. Also, after a CPU
is added to the VM it is not automatically used by Linux. The Linux Guest Additions service will take care of
that if installed. If not a CPU can be started with the following command:
$ echo 1 > /sys/devices/system/cpu/cpu<id>/online
9.5 Webcam
Passthrough
9.5.1 Using a Host Webcam in the Guest
Oracle VM VirtualBox includes a feature called webcam passthrough, which enables a guest to use a host
webcam. This complements the general USB passthrough support which was the typical way of using host
webcams in legacy releases. The webcam passthrough support can handle non-USB video sources in
theory, but this is completely untested.
Note: The webcam passthrough module is shipped as part of the Oracle VM VirtualBox extension
pack, which must be installed separately. See chapter 1.5, Installing Oracle VM VirtualBox and
Extension Packs, page 6.
The host webcam can be attached to the VM using the Devices menu in the VM menu bar. The
Webcams menu contains a list of available video input devices on the host. Clicking on a webcam name
attaches or detaches the corresponding host device.
The VBoxManage command line tool can be used to enable webcam passthrough. Please see the host-
specific sections below for additional details. The following commands are available:
The alias can be used as a shortcut in other commands. Alias ’.0’ means the default video input
device on the host. Alias ’.1’, ’.2’means first, second video input device, and so on. The device
order is host-specific.
• Attach a webcam to a running VM, as follows:
24
9 Advanced
– MaxPayloadTransferSize: How many bytes the emulated webcam can send to the guest at
a time. Default value is 3060 bytes, which is used by some webcams. Higher values can slightly
reduce CPU load, if the guest is able to use larger buffers. However, a high
MaxPayloadTransferSize might be not supported by some guests.
The output contains the path or alias which was used in the webcam attach command for each
attached webcam.
24
9 Advanced
The VESA mode IDs for custom video modes start at 0x160. In order to use the above defined custom
video mode, the following command line has to be supplied to Linux:
vga = 0x200 | 0x160
vga = 864
For guest operating systems with Oracle VM VirtualBox Guest Additions, a custom video mode can be set
using the video mode hint feature.
Warning: Raw hard disk access is for expert users only. Incorrect use or use of an outdated
configuration can lead to total loss of data on the physical disk. Most impor- tantly, do not
attempt to boot the partition with the currently running host operating system in a guest. This will
lead to severe data corruption.
Raw hard disk access, both for entire disks and individual partitions, is implemented as part of the VMDK
image format support. As a result, you will need to create a special VMDK image file which defines where
the data will be stored. After creating such a special VMDK image, you can use it like a regular virtual disk
image. For example, you can use the VirtualBox Manager, see chapter 5.3, The Virtual Media Manager, page
92, or VBoxManage to assign the image to a virtual machine.
24
9 Advanced
This creates the /path-to-file.vmdk file image that must be an absolute path. All data is read and
written from /dev/sda.
On a Windows host, instead of the above device specification, for example use
\\.\PhysicalDrive0. On a Mac OS X host, instead of the above device specification use for example
/dev/disk1. Note that on Mac OS X you can only get access to an entire disk if no volume is mounted
from it.
Creating the image requires read/write access for the given device. Read/write access is also later needed
when using the image from a virtual machine. On some host platforms, such as Windows, raw disk access
may be restricted and not permitted by the host OS in some situations. Just like with regular disk images, this
does not automatically attach the newly created image
to a virtual machine. This can be done as follows:
$ VBoxManage storageattach WindowsXP --storagectl "IDE Controller" \
--port 0 --device 0 --type hdd --medium /path/to/file.vmdk
When this is done the selected virtual machine will boot from the specified physical disk.
The command is identical to the one for full hard disk access, except for the additional
-partitions parameter. This example would create the image /path-to-file.vmdk, which must be
absolute, and partitions 1 and 5 of /dev/sda would be made accessible to the guest.
Oracle VM VirtualBox uses the same partition numbering as your Linux host. As a result, the numbers
given in the above example would refer to the first primary partition and the first logical drive in the extended
partition, respectively.
On a Windows host, instead of the above device specification, use for example
\\.\PhysicalDrive0. On a Mac OS X host, instead of the above device specification use
/dev/disk1, for example. Note that on OS X you can only use partitions which are not mounted.
Eject the respective volume first. Partition numbers are the same on Linux, Windows, and Mac
OS X hosts.
The numbers for the list of partitions can be taken from the output of the following command:
25
9 Advanced
The output lists the partition types and sizes to give the user enough information to identify the partitions
necessary for the guest.
Images which give access to individual partitions are specific to a particular host disk setup. You cannot
transfer these images to another host. Also, whenever the host partitioning changes, the image must be
recreated.
Creating the image requires read/write access for the given device. Read/write access is also later needed
when using the image from a virtual machine. If this is not feasible, there is a special variant for raw partition
access, currently only available on Linux hosts, that avoids having to give the current user access to the
entire disk. To set up such an image, use:
$ VBoxManage internalcommands createrawvmdk -filename \
/path/to/file.vmdk -rawdisk /dev/sda -partitions 1,5 -relative
When used from a virtual machine, the image will then refer not to the entire disk, but only to the
individual partitions. In this example, /dev/sda1 and /dev/sda5. As a consequence, read/write
access is only required for the affected partitions, not for the entire disk. During creation however, read-
only access to the entire disk is required to obtain the partitioning infor- mation.
In some configurations it may be necessary to change the MBR code of the created image. For example, to
replace the Linux boot loader that is used on the host by another boot loader. This enables for example the
guest to boot directly to Windows, while the host boots Linux from the “same” disk. For this purpose the -
mbr option is provided. It specifies a file name from which to take the MBR code. The partition table is not
modified at all, so a MBR file from a system with totally different partitioning can be used. An example of
this is:
$ VBoxManage internalcommands createrawvmdk -filename
/path/to/file.vmdk -rawdisk /dev/sda -partitions 1,5 -mbr winxp.mbr
The modified MBR will be stored inside the image, not on the host disk.
The created image can be attached to a storage controller in a VM configuration as usual.
The serial number is a 20 byte alphanumeric string, the firmware revision an 8 byte alphanu- meric string
and the model number a 40 byte alphanumeric string. Instead of Port0, referring to the first port, specify the
desired SATA hard disk port.
The above commands apply to virtual machines with an AHCI (SATA) controller. The com- mands for
virtual machines with an IDE controller are:
$ VBoxManage setextradata <VM-name> \
"VBoxInternal/Devices/piix3ide/0/Config/PrimaryMaster/SerialNumber" "serial"
$ VBoxManage setextradata <VM-name> \
"VBoxInternal/Devices/piix3ide/0/Config/PrimaryMaster/FirmwareRevision" "firmware"
$ VBoxManage setextradata <VM-name> \
"VBoxInternal/Devices/piix3ide/0/Config/PrimaryMaster/ModelNumber" "model"
25
9 Advanced
For hard disks, you can mark the drive as having a non-rotational medium by using the fol- lowing
command:
$ VBoxManage setextradata <VM-name> \
"VBoxInternal/Devices/ahci/0/Config/Port0/NonRotational" "1"
Additional three parameters are needed for CD/DVD drives to report the vendor product data:
$ VBoxManage setextradata <VM-name> \
"VBoxInternal/Devices/ahci/0/Config/Port0/ATAPIVendorId" "vendor"
VBoxManage setextradata <VM-name> \
"VBoxInternal/Devices/ahci/0/Config/Port0/ATAPIProductId" "product"
VBoxManage setextradata <VM-name> \
"VBoxInternal/Devices/ahci/0/Config/Port0/ATAPIRevision" "revision"
The vendor id is an 8 byte alphanumeric string, the product id an 16 byte alphanumeric string and the
revision a 4 byte alphanumeric string. Instead of Port0, referring to the first port, specify the desired SATA hard
disk port.
Finally the iSCSI disk must be attached with the --intnet option to tell the iSCSI initiator to use internal
networking, as follows:
$ VBoxManage storageattach ... --medium iscsi --server 10.0.9.30 \
--target iqn.2008-12.com.sun:sampletarget --intnet
Compared to a regular iSCSI setup, the IP address of the target must be specified as a numeric
IP address, as there is no DNS resolver for internal networking.
The virtual machine with the iSCSI target should be started before the VM using it is powered on. If a
virtual machine using an iSCSI disk is started without having the iSCSI target powered up, it can take up to
200 seconds to detect this situation. The VM will fail to power up.
25
9 Advanced
This command would reserve the network addresses from 192.168.0.0 to 192.168.254.254 for the
first NAT network instance of VM-name The guest IP would be assigned to 192.168.0.15 and the default
gateway could be found at 192.168.0.2.
This example illustrates tuning the NAT settings. The first parameter is the MTU, then the size of the
socket’s send buffer and the size of the socket’s receive buffer, the initial size of the TCP send window,
and lastly the initial size of the TCP receive window. Note that specifying zero means fallback to the
default value.
Each of these buffers has a default size of 64KB and default MTU is 1500.
After this, all outgoing traffic will be sent through the interface with the IP address 10.45.0.2. Ensure that
this interface is up and running before changing the NAT bind address.
25
9 Advanced
Note that this setting is similar to the DNS proxy mode, however whereas the proxy mode just forwards
DNS requests to the appropriate servers, the resolver mode will interpret the DNS requests and use the host’s
DNS API to query the information and return it to the guest.
The following command sets a rule for mapping a pattern name to a specified IP:
VBoxManage setextradata <VM-name> \
"VBoxInternal/Devices/{pcnet,e1000}/0/LUN#0/AttachedDriver/Config/HostResolverMappings/ \
<unique-rule-name>/HostIP" <IPv4>
The host name pattern can include the following wildcard characters: pipe (|), question mark
(?), and asterisk (*).
This example demonstrates how to instruct the host-resolver mechanism to resolve all domain
and probably some mirrors of www.blocked-site.info site with IP 127.0.0.1:
$ VBoxManage setextradata <VM-name> \
"VBoxInternal/Devices/e1000/0/LUN#0/AttachedDriver/Config/HostResolverMappings/all_blocked_site/HostIP" 127.0.0.1
$ VBoxManage setextradata <VM-name> \ "VBoxInternal/Devices/e1000/0/LUN#0/AttachedDriver/Config/HostResolverMappings/
all_blocked_site/HostNamePattern" "*.b
The host resolver mechanism should be enabled to use user-defined mapping rules, otherwise they do not
have any effect.
25
9 Advanced
The first example disables aliasing and switches NAT into transparent mode, the second exam- ple enforces
preserving of port values. These modes can be combined if necessary.
25
9 Advanced
If a DMI string is not set, the default value of Oracle VM VirtualBox is used. To set an empty string use
“<EMPTY>“.
Note that in the above list, all quoted parameters (DmiBIOSVendor, DmiBIOSVersion but not
DmiBIOSReleaseMajor) are expected to be strings. If such a string is a valid number, the parameter is
treated as number and the VM will most probably refuse to start with an VERR_CFGM_NOT_STRING
error. In that case, use “string:value“. For example:
$ VBoxManage setextradata <VM-name> \
"VBoxInternal/Devices/pcbios/0/Config/DmiSystemSerial" "string:1234"
Changing this information can be necessary to provide the DMI information of the host to the guest to
prevent Windows from asking for a new product key. On Linux hosts, the DMI BIOS information can be
obtained with the following command:
$ dmidecode -t0
25
9 Advanced
Configuring custom ACPI tables can for example avoid the need for asking for a new product key on
Windows Vista, Windows 7, Windows 8 and later guests. On Linux hosts, one of the system’s ACPI
tables can be read from /sys/firmware/acpi/tables/.
Note that if you use the special TSC handling mode with a guest operating system which is very strict about
the consistency of time sources you may get a warning or error message about the timing inconsistency. It
may also cause clocks to become unreliable with some guest operating systems depending on how they use
the TSC.
The above example will double the speed of the guest clock while
$ VBoxManage setextradata <VM-name> "VBoxInternal/TM/WarpDrivePercentage" 50
will halve the speed of the guest clock. Note that changing the rate of the virtual clock can confuse the
guest and can even lead to abnormal guest behavior. For instance, a higher clock rate means shorter
timeouts for virtual devices with the result that a slightly increased response time of a virtual device due to
an increased host load can cause guest failures. Note further that any time synchronization mechanism
will frequently try to resynchronize the guest clock with the reference clock, which is the host clock if the
Oracle VM VirtualBox Guest Additions are active. Therefore any time synchronization should be disabled if
the rate of the guest clock is changed as described above. See chapter 9.11.3, Tuning the Guest Additions
Time Synchronization Parameters, page 258.
25
9 Advanced
--timesync-interval
Specifies the interval at which to synchronize the time with the host. The default is 10000 ms (10
seconds).
--timesync-min-adjust
The minimum absolute drift value measured in milliseconds to make adjustments for. The default is
1000 ms on OS/2 and 100 ms elsewhere.
--timesync-latency-factor
The factor to multiply the time query latency with to calculate the dynamic minimum adjust time. The
default is 8 times, which means as follows:
Measure the time it takes to determine the host time, the guest has to contact the VM host service which
may take some time. Multiply this value by 8 and do an adjustment only if the time difference
between host and guest is bigger than this value. Do not do any time adjustment otherwise.
--timesync-max-latency
The max host timer query latency to accept. The default is 250 ms.
--timesync-set-threshold
The absolute drift threshold, given as milliseconds where to start setting the time instead of trying to
smoothly adjust it. The default is 20 minutes.
--timesync-set-start
Set the time after the VM was restored from a saved state when passing 1 as parameter. This is the
default. Disable by passing 0. In the latter case, the time will be adjusted smoothly, which can
take a long time.
All these parameters can be specified as command line parameters to VBoxService as well.
25
9 Advanced
To force installation of the Crossbow based network filter driver, execute as root the following command
before installing the Oracle VM VirtualBox package:
$ touch /etc/vboxinst_vboxbow
If the output contains “vboxbow”, it indicates Oracle VM VirtualBox is using the Crossbow network
filter driver, while the name “vboxflt” indicates usage of the older STREAMS network filter.
This will create a temporary VNIC template over interface nge0 with the VLAN ID 23. To create
VNIC templates that are persistent across host reboots, skip the -t parameter in the above command. You may
check the current state of links using the following command:
$ dladm show-link
LINK CLASS MTU STATE BRIDGE OVER
nge0 phys 1500 up -- --
nge1 phys 1500 down -- --
vboxvnic_template0 vnic 1500 up -- nge0
$ dladm show-vnic
LINK OVER SPEED MACADDRESS MACADDRTYPE VID
vboxvnic_template0 nge0 1000 2:8:20:25:12:75 random 23
Once the VNIC template is created, any VMs that need to be on VLAN 23 over the interface
nge0 can be configured to bridge using this VNIC template.
VNIC templates makes managing VMs on VLANs simpler and efficient. The VLAN details are
not stored as part of every VM’s configuration but rather inherited from the VNIC template while starting the
VM. The VNIC template itself can be modified anytime using the dladm command.
25
9 Advanced
VNIC templates can be created with additional properties such as bandwidth limits and CPU fanout. Refer
to your Oracle Solaris network documentation for details. The additional proper- ties are also applied to VMs
which bridge using the VNIC template.
26
9 Advanced
If you have several vboxnet interfaces, you will need to unplumb all of them. Once all vboxnet interfaces
are unplumbed, remove the driver by executing the following command as root:
# rem_drv vboxnet
Edit the file /platform/i86pc/kernel/drv/vboxnet.conf and add a line for the new inter- face
we want to add as shown below:
name="vboxnet" parent="pseudo" instance=1;
name="vboxnet" parent="pseudo" instance=2;
Add as many of these lines as required with each line having a unique instance number. Next, reload
the vboxnet driver by executing the following command as root:
# add_drv vboxnet
On Oracle Solaris 11.1 and newer hosts you may want to rename the default vanity interface name. To
check what name has been assigned, execute:
$ dladm show-phys
LINK MEDIA STATE SPEED DUPLEX DEVICE
net0 Ethernet up 100 full e1000g0
net2 Ethernet up 1000 full vboxnet1
net1 Ethernet up 1000 full vboxnet0
In the above example, we can rename “net2” to “vboxnet1” before proceeding to plumb the interface.
This can be done by executing as root:
# dladm rename-link net2 vboxnet1
Now plumb all the interfaces using ifconfig vboxnetX plumb, where X would be 1 in this case.
Once the interface is plumbed, it may be configured like any other network interface. Refer to the ifconfig
documentation for further details.
To make the settings for the newly added interfaces persistent across reboots, you will need to edit the
files /etc/inet/netmasks, and if you are using NWAM /etc/nwam/llp and add the appropriate
entries to set the netmask and static IP for each of those interfaces. The Oracle VM VirtualBox installer only
updates these configuration files for the one “vboxnet0” interface it creates by default.
26
9 Advanced
You can specify which directory to use for core dumps with this command, as follows:
$ VBoxManage setextradata <VM-name> VBoxInternal2/CoreDumpDir <path-to-directory>
Make sure the directory you specify is on a volume with sufficient free space and that the Oracle VM
VirtualBox process has sufficient permissions to write files to this directory. If you skip this command
and do not specify any core dump directory, the current directory of the Oracle VM VirtualBox
executable will be used. This would most likely fail when writing cores as they are protected with root
permissions. It is recommended you explicitly set a core dump directory.
You must specify when the Oracle VM VirtualBox CoreDumper should be triggered. This is done using
the following commands:
$ VBoxManage setextradata <VM-name> VBoxInternal2/CoreDumpReplaceSystemDump 1
$ VBoxManage setextradata <VM-name> VBoxInternal2/CoreDumpLive 1
At least one of the above two commands will have to be provided if you have enabled the
Oracle VM VirtualBox CoreDumper.
Setting CoreDumpReplaceSystemDump sets up the VM to override the host’s core dumping
mechanism and in the event of any crash only the Oracle VM VirtualBox CoreDumper would produce the
core file.
Setting CoreDumpLive sets up the VM to produce cores whenever the VM process receives a SIGUSR2
signal. After producing the core file, the VM will not be terminated and will continue to run. You can thus
take cores of the VM process using the following command:
$ kill -s SIGUSR2 <VM-process-id>
This command needs to be executed only once as the setting is stored as part of the global Oracle VM
VirtualBox settings which will continue to persist across host-reboots and Oracle VM VirtualBox upgrades.
26
9 Advanced
noSelector
Do not allow users to start the VirtualBox Manager. Trying to do so will show a window containing
a proper error message.
noMenuBar
To disable any of these VirtualBox Manager customizations use the following command:
$ VBoxManage setextradata global GUI/Customizations
GUI/HideDetails
Do not show the VM configuration of a certain VM. The details window will remain just empty if
this VM is selected.
GUI/PreventReconfiguration
Do not allow the user to open the Settings dialog for a certain VM.
GUI/PreventSnapshotOperations
Prevent snapshot operations for a VM from the GUI, either at runtime or when the VM is powered
off.
GUI/HideFromManager
26
9 Advanced
GUI/PreventApplicationUpdate
Disable the automatic update check and hide the corresponding menu item.
Note that these settings do not prevent the user from reconfiguring the VM by using the
VBoxManage modifyvm command.
General
Update
Display
Extensions
This is a global setting. You can specify any combination of properties. To restore the default behavior,
use the following command:
$ VBoxManage setextradata global GUI/RestrictedGlobalSettingsPages
26
9 Advanced
All
Do not show the Debug menu in the VM window. The Debug menu is only visible if the
GUI was started with special command line parameters or environment variable settings.
This is a per-VM or global setting. Any combination of the above is allowed. To restore the default
behavior, use the following command:
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeMenus
You can also disable, or blacklist, certain menu actions of certain menus. Use the following command
to disable certain actions of the Application menu. This is only available on Mac OS X hosts.
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeApplicationMenuActions OPTION[,OPTION...]
All
26
9 Advanced
About
Preferences
Do not show the Network Operations Manager menu item in this menu.
ResetWarnings
Do not show the Reset All Warnings menu item in this menu.
Close
This is a per-VM or global setting. Any combination of the above is allowed. To restore the default
behavior, use the following command:
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeMenus
Use the following command to disable certain actions of the Machine menu:
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeMachineMenuActions OPTION[,OPTION...]
All
SettingsDialog
InformationDialog
Pause
26
9 Advanced
Res
Shutdown
This is a per-VM or global setting. Any combination of the above is allowed. To restore the default
behavior, use
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeMachineMenuActions
Use the following command to disable certain actions of the View menu:
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeViewMenuActions OPTION[,OPTION...]
All
Seamless
GuestAutoresize
Do not show the Auto-resize Guest Display menu item in this menu.
AdjustWindow
Do not show the Adjust Window Size menu item in this menu.
TakeScreenshot
VRDEServer
26
9 Advanced
MenuB
MenuBarSettings
Do not show the Menu Bar Settings... menu item in this menu.
StatusBar
StatusbarSettings
This is a per-VM or global setting. Any combination of the above is allowed. To restore the default
behavior, use
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeViewMenuActions
Use the following command to disable certain actions of the Input menu:
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeInputMenuActions OPTION[,OPTION...]
All
KeyboardSettings
TypeCAD
TypeCtrlBreak
26
9 Advanced
TypeInse
TypePrintScreen
Do not show the Insert Print Screen menu item in this menu.
TypeAltPrintScreen
Do not show the Insert Alt Print Screen menu item in this menu.
TypeHostKeyCombo
Do not show the Insert Host Key Combo menu item in this menu.
MouseIntegration
This is a per-VM or global setting. Any combination of the above is allowed. To restore the default
behavior, use
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeInputMenuActions
Use the following command to disable certain actions of the Devices menu:
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeDevicesMenuActions OPTION[,OPTION...]
where OPTION is one of the following keywords to disable actions in the Devices menu:
All
HardDrives
FloppyDevices
Network
26
9 Advanced
NetworkSettin
Do not show the Shared Folders Settings... menu item in this menu.
SharedClipboard
Do not show the Drag and Drop menu item in this menu.
InstallGuestTools
Do not show the Insert Guest Additions CD image... menu item in this menu.
This is a per-VM or global or global setting. Any combination of the above is allowed. To restore the
default behavior, use
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeDevicesMenuActions
Use the following command to disable certain actions of the Debug menu:
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeDebuggerMenuActions OPTION[,OPTION...]
where OPTION is one of the following keywords to disable actions in the Debug menu, which is normally
completely disabled:
All
27
9 Advanced
Logging
Do not show the Guest Control Terminal... menu item in this menu.
This is a per-VM or global setting. Any combination of the above is allowed. To restore the default
behavior, use
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeDebuggerMenuActions
Use the following command to disable certain actions of the View menu:
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeHelpMenuActions OPTION[,OPTION...]
where OPTION is one of the following keywords to disable actions in the Help menu, which is normally
completely disabled:
All
Do not show the VirtualBox Web Site... menu item in this menu.
BugTracker
Do not show the VirtualBox Bug Tracker... menu item in this menu.
Forums
Do not show the Oracle Web Site... menu item in this menu.
About
Do not show the About VirtualBox... menu item in this menu. Only for non-Mac OS X
hosts.
This is a per-VM or global setting. Any combination of the above is allowed. To restore the default
behavior, use
VBoxManage setextradata "VM name"|global GUI/RestrictedRuntimeHelpMenuActions
27
9 Advanced
Do not show the hard disk icon in the VM window status bar. By default the hard disk icon is only
shown if the VM configuration contains one or more hard disks.
OpticalDisks
Do not show the CD icon in the VM window status bar. By default the CD icon is only shown if
the VM configuration contains one or more CD drives.
FloppyDisks
Do not show the floppy icon in the VM window status bar. By default the floppy icon is only
shown if the VM configuration contains one or more floppy drives.
Network
Do not show the network icon in the VM window status bar. By default the network icon is only
shown if the VM configuration contains one or more active network adapters.
USB
27
9 Advanced
Fullscreen
Seamless
This is a per-VM setting. You can specify any combination of properties. To restore the default behavior,
use the following command:
$ VBoxManage setextradata <VM-name> GUI/RestrictedVisualStates
The following table shows the possible Host key actions, together with their default Host key shortcut.
Setting an action to None will disable that Host key action.
27
9 Advanced
PopupMenu Home Show the popup menu in full screen mode and
seamless mode
To disable full screen mode and seamless mode, use the following command:
$ VBoxManage setextradata global GUI/Input/MachineShortcuts "FullscreenMode=None,SeamlessMode=None"
27
9 Advanced
SaveState
Do not allow the user to save the VM state when terminating the VM.
Shutdown
Do not allow the user to shutdown the VM by sending the ACPI power-off event to the guest.
PowerOff
Do not allow the user to return to the last snapshot when powering off the VM.
Detach
Do not allow the user to detach from the VM process if the VM was started in separate mode.
This is a per-VM setting. You can specify any combination of properties. If all properties are specified,
the VM cannot be shut down.
SaveState
The VM is shut down by sending the ACPI power-off event to the guest.
PowerOff
The VM is powered off and the saved state returns to the last snapshot.
Detach
27
9 Advanced
Default
PowerOff
The VM is immediately powered-off without showing any message window. The VM logfile will show
information about what happened.
Ignore
The VM is left in stuck mode. Execution is stopped but no message window is shown. The
VM has to be powered off manually.
Default
HostComboOnly
The mouse is never captured, also not by toggling the Host Key
27
9 Advanced
You can go back to the default method by using the following command:
VBoxManage setextradata global GUI/Fullscreen/LegacyMode
NAT
BridgedAdapter
HostOnlyAdapter
This is a global setting. You can specify any combination of properties. To restore the default behavior,
use the following command:
VBoxManage setextradata global GUI/RestrictedNetworkAttachmentTypes
27
9 Advanced
Setting the parameter SSL_KEYFILE enables the SSL/TLS support. Using encryption is strongly
encouraged, as otherwise everything, including passwords, is transferred in clear text.
27
9 Advanced
The table in chapter 9.18.1, Linux: Starting the Web Service With init, page 277 showing the parameter
names and defaults also applies for Oracle Solaris. The parameter names must be changed to lowercase
and a prefix of config/ has to be added. For example: config/user or config/ssl_keyfile. If
you make any change, do not forget to run the following command to put the changes into effect
immediately:
svcadm refresh svc:/application/virtualbox/webservice:default
If you forget the above command then the previous settings are used when enabling the ser- vice. Check
the current property settings as follows:
svcprop -p config svc:/application/virtualbox/webservice:default
When everything is configured correctly you can start the Oracle VM VirtualBox web service with the
following command:
svcadm enable svc:/application/virtualbox/webservice:default
For more information about SMF, please refer to the Oracle Solaris documentation.
27
9 Advanced
Note: If no maximum ballooning size is specified by at least one of the parameters above, no
ballooning will be performed at all.
Setting the ballooning increment in MB can be either done using command line, as follows:
--balloon-inc <Size in MB>
28
9 Advanced
Set the host isolation timeout using the following command line:
--apimon-isln-timeout=<ms>
Set the actual host isolation response using the following command line:
--apimon-isln-response=<cmd>
28
9 Advanced
BALLOON_SAFETYMARG INFree memory required for decreasing the balloon size, in 1024
megabytes
chapter 9.19.4, Linux: Starting the Watchdog Service With init, page 281 also applies for Oracle Solaris.
The parameter names must be changed to lowercase and a prefix of config/ has to be added. For
example: config/user or config/balloon_safetymargin. If you made any change, do not forget
to run the following command to put the changes into effect immediately:
svcadm refresh svc:/application/virtualbox/balloonctrl:default
If you forget the above command then the previous settings will be used when enabling the service.
Check the current property settings with the following command:
svcprop -p config svc:/application/virtualbox/balloonctrl:default
When everything is configured correctly you can start the Oracle VM VirtualBox watchdog service with
the following command:
svcadm enable svc:/application/virtualbox/balloonctrl:default
For more information about SMF, please refer to the Oracle Solaris documentation.
28
9 Advanced
Configuring the remote access works very similarly to VRDP, see chapter 7.1, Remote Display (VRDP
Support), page 116, with some limitations. VNC does not support specifying several port numbers, and
the authentication is done differently. VNC can only deal with password authentication, and there is no
option to use password hashes. This leaves no other choice than having a clear-text password in the VM
configuration, which can be set with the following command:
VBoxManage modifyvm <VM-name> --vrdeproperty VNCPassword=secret
The user is responsible for keeping this password secret, and it should be removed when a VM
configuration is passed to another person, for whatever purpose. Some VNC servers claim to have encrypted
passwords in the configuration. This is not true encryption, it is only concealing the passwords, which is
only as secure as using clear-text passwords.
The following command switches back to VRDP, if installed:
VBoxManage setproperty vrdeextpack "Oracle VM VirtualBox Extension Pack"
28
9 Advanced
# Alice is not allowed to start virtual machines, useful to exclude certain users
# if the default policy is set to allow.
alice = {
allow = false
}
Any user who wants to enable autostart for individual machines must set the path to the autostart
database directory with the following command:
VBoxManage setproperty autostartdbpath <autostart-directory>
When everything is configured correctly you can start the Oracle VM VirtualBox autostart service with
the following command:
# svcadm enable svc:/application/virtualbox/autostart:default
For more information about SMF, see the Oracle Solaris documentation.
28
9 Advanced
# Alice is not allowed to start virtual machines, useful to exclude certain users
# if the default policy is set to allow.
alice = {
allow = false
}
The user name can be specified using the following forms: “user”, “domain\user”, “.\user” and
“user@domain”. Administrator must add the VBOXAUTOSTART_CONFIG environment variable into system
variables containing the path to the configuration file described above. The environment variable tells the
autostart services what configuration file is used.
Second component of autostart functionality is Windows service, every instance of it works on behalf of
particular user using its own credentials.
To enable autostarting for a particular user, a member of the administrators group must run the following
command:
VBoxAutostartSvc install --user=<user> [--password-file=<password_file>]
The password file should contain the password followed by a line break. The rest of the file is ignored.
The user will be asked for a password if the password file is not specified.
To disable autostarting for particular user, a member of the administrators group must run the following
command:
VBoxAutostartSvc delete --user=<user>
If a user has changed their password then a member of the administrators group must either reinstall the
service or change the service credentials using Windows Service Manager. Due to Windows security
policies, the autostart service cannot be installed for users with empty pass- words.
Finally, the particular user should define which VM should be started at boot or not. The user should run
the following command for every VM it desired to start at boot:
VBoxManage modifyvm <VM name or UUID> --autostart-enabled on
The user can remove the particular VM from the VMs starting at boot by running the following command:
VBoxManage modifyvm <VM name or UUID> --autostart-enabled off
28
9 Advanced
You can reconfigure storage attachments later while the VM is paused by using the
VBoxManage storageattach command.
This is a global setting as well as a per-VM setting. The per-VM value has higher precedence than the
global value. The following command will save the state of all VMs but will not save the state of
VM “foo”:
$ VBoxManage setextradata global "VBoxInternal2/SavestateOnBatteryLow" 1
$ VBoxManage setextradata "foo" "VBoxInternal2/SavestateOnBatteryLow" 0
The first line is actually not required as by default the savestate action is performed.
28
9 Advanced
These are per-VM settings which are enabled by default.
28
9 Advanced
In order to enable capturing on the root hub use the following command while the VM is not running:
VBoxManage setextradata <VM-name> \
VBoxInternal/Devices/usb-ehci/0/LUN#0/Config/CaptureFilename <filename>
The command above enables capturing on the root hub attached to the EHCI controller. To enable it for
the OHCI or XHCI controller replace usb-ehci with usb-ohci or usb-xhci, respec- tively.
The heartbeat timeout defines the time the host waits starting from the last heartbeat ping before it defines
the guest as unresponsive. The default value is 2 times the heartbeat interval (4 seconds) and can be configured
as following, in nanoseconds:
VBoxManage setextradata <VM-name> \
VBoxInternal/Devices/VMMDev/0/Config/HeartbeatTimeout 4000000000
If the heartbeat timeout expires, there will be a log message like VMMDev: HeartBeatCheck- Timer: Guest
seems to be unresponsive. Last heartbeat received 5 seconds ago. If another heartbeat ping arrives after this warning,
there will be a log message like VMMDev: GuestHeartBeat: Guest is alive.
28
9 Advanced
• This feature is part of the Oracle VM VirtualBox Extension Pack, which needs to be installed. Otherwise
disk encryption is unavailable.
• Since encryption works only on the stored user data, it is currently not possible to check for metadata
integrity of the disk image. Attackers might destroy data by removing or changing blocks of data in
the image or change metadata items such as the disk size.
• Exporting appliances which contain encrypted disk images is not possible because the OVF
specification does not support this. All images are therefore decrypted during export.
• The DEK is kept in memory while the VM is running to be able to decrypt data read and encrypt data
written by the guest. While this should be obvious the user needs to be aware of this because an
attacker might be able to extract the key on a compromised host and decrypt the data.
• When encrypting or decrypting the images, the password is passed in clear text using the Oracle VM
VirtualBox API. This needs to be kept in mind, especially when using third party API clients which
make use of the webservice where the password might be transmitted over the network. The use of
HTTPS is mandatory in such a case.
• Encrypting images with differencing images is only possible if there are no snapshots or a linear
chain of snapshots. This limitation may be addressed in a future Oracle VM VirtualBox version.
• The disk encryption feature can protect the content of the disks configured for a VM only. It does not
cover any other data related to a VM, including saved state or the configuration file itself.
28
9 Advanced
To supply the encryption password point VBoxManage to the file where the password is stored or specify
- to let VBoxManage ask you for the password on the command line.
The cipher parameter specifies the cipher to use for encryption and can be either AES-
XTS128-PLAIN64 or AES-XTS256-PLAIN64. The specified password identifier can be freely chosen by
the user and is used for correct identification when supplying multiple passwords during VM startup.
If the user uses the same password when encrypting multiple images and also the same pass- word
identifier, the user needs to supply the password only once during VM startup.
ID must be the same as the password identifier supplied when encrypting the images.
password is the password used when encrypting the images. Optionally, you can specify
--removeonsuspend yes|no to specify whether to remove the password from VM memory
when the VM is suspended. Before the VM can be resumed, the user needs to supply the pass-
words again. This is useful when a VM is suspended by a host suspend event and the user does not want the
password to remain in memory.
The only required parameter is the password the image was encrypted with. The options are the same as
for encrypting images.
9.29 Paravirtualized
Debugging
This section covers debugging of guest operating systems using interfaces supported by paravir- tualization
providers.
Note: Paravirtualized debugging significantly alter guest operating system behaviour and should
only be used by expert users for debugging and diagnostics.
These debug options are specified as a string of key-value pairs separated by commas. An empty string
disables paravirtualized debugging.
29
9 Advanced
• Key: enabled
Value: 0 or 1
Default: 0
Specify 1 to enable the Hyper-V debug interface. If this key-value pair is not specified or the value
is not 1, the Hyper-V debug interface is disabled regardless of other key-value pairs being present.
• Key: address
Value: IPv4 address
Default: 127.0.0.1
Specify the IPv4 address where the remote debugger is connected.
• Key: port
Value: UDP port number
Default: 50000
Specify the UDP port number where the remote debugger is connected.
• Key: vendor
Value: Hyper-V vendor signature reported by CPUID to the guest
Default: When debugging is enabled: Microsoft Hv, otherwise: VBoxVBoxVBox
Specify the Hyper-V vendor signature which is exposed to the guest by CPUID. For debug- ging
Microsoft Windows guests, it is required the hypervisor reports the Microsoft vendor.
• Key: hypercallinterface
Value: 0 or 1
Default: 0
Specify whether hypercalls should be suggested for initiating debug data transfers between host and
guest rather than MSRs when requested by the guest.
• Key: vsinterface
Value: 0 or 1
Default: When debugging is enabled, 1, otherwise 0
Specify whether to expose the VS#1 virtualization service interface to the guest. This interface is
required for debugging Microsoft Windows 10 32-bit guests, but is optional for other Windows
versions.
9.29.1.1 Setting up Windows Guests for Debugging with the Hyper-V Paravirtualization
Provider
Windows supports debugging over a serial cable, USB, IEEE 1394 Firewire, and Ethernet. USB and IEEE
1394 are not applicable for virtual machines, and Ethernet requires Windows 8 or later. While a serial
connection is universally usable, it is slow.
Debugging using the Hyper-V debug transport, supported on Windows Vista and later, offers significant
benefits. It provides excellent performance due to direct host-to-guest transfers, it is easy to set up and
requires minimal support from the hypervisor. It can be used with the debugger running on the same host as
the VM or with the debugger and VM on separate machines connected over a network.
Prerequisites
29
9 Advanced
• A VM configured for Hyper-V paravirtualization running a Windows Vista or newer Win- dows
guest. You can check the effective paravirtualization provider for your VM with the output of the
following VBoxManage command:
• A sufficiently up-to-date version of the Microsoft WinDbg debugger required to debug the version of
Windows in your VM.
• While Windows 8 and newer Windows guests ship with Hyper-V debug support, Win- dows 7
and Vista do not. To use Hyper-V debugging with a Windows 7 or Vista guest, copy the file
kdvm.dll from a Windows 8.0 installation. This file is typically located in C:\Windows\
System32. Copy it to the same location in your Windows 7/Vista guest. Make sure you copy the 32-
bit or 64-bit version of the DLL which matches your guest OS.
Note: Only Windows 8.0 ships kdvm.dll. Windows 8.1 and newer Windows versions do not.
The above command assumes your debugger will connect to your host machine on UDP port
50000. However, if you need to run the debugger on a remote machine you may specify the
remote address and port here. For example:
See chapter 9.29.1, Hyper-V Debug Options, page 288 for the complete set of options.
3. Start the VM.
4. In the guest, start an elevated command prompt and execute the following commands:
• For a Windows 8 or newer Windows guest:
bcdedit /dbgsettings net hostip:5.5.5.5 port:50000 key:1.2.3.4
The IP address and port in the bcdedit command are ignored when using the Hyper- V debug
transport. Any valid IP and a port number greater than 49151 and lower
than 65536 can be entered.
The encryption key in the bcdedit command is relevant and must be valid. The key
“1.2.3.4” used in the above example is valid and may be used if security is not a concern. If
you do not specify any encryption key, bcdedit will generate one for you and you will
need to copy this key to later enter in Microsoft WinDbg on the remote end. This encryption
key is used to encrypt the debug data exchanged between Windows and the debugger.
29
9 Advanced
• Run one or more of the following commands to enable debugging for the appropriate phase or
component of your Windows guest:
bcdedit /set debug on
Please note that the bootdebug options are only effective on Windows 8 or newer when
using the Hyper-V debug transport. Refer to Microsoft Windows documentation for detailed
explanation of bcdedit options.
5. Start Microsoft WinDbg on your host machine or remote host.
From the File menu, select Kernel Debug. On the NET tab, specify the UDP port number you
used in the paravirtdebug options. If you did not specify any, leave it as 50000. Ensure that
the UDP port is not blocked by a firewall or other security software.
In the Key field, enter 1.2.3.4 or the encryption key from the bcdedit command in your
Windows guest.
Click OK to start listening for connections. Microsoft WinDbg typically shows a Waiting to
Reconnect message during this phase.
Alternatively, to directly start a debug session, run WinDbg from the command line as follows :
windbg.exe -k net:port=50000,key=1.2.3.4
See the WinDbg documentation for the complete command line syntax.
6. Reboot your Windows guest and it should then connect as a debuggee with Microsoft
WinDbg.
9.30 PC Speaker
Passthrough
As an experimental feature, primarily due to being limited to Linux host only and unknown Linux distribution
coverage, Oracle VM VirtualBox supports passing through the PC speaker to the host. The PC speaker,
sometimes called the system speaker, is a way to produce audible feedback such as beeps without the need for
regular audio and sound card support.
The PC speaker passthrough feature in Oracle VM VirtualBox handles beeps only. Advanced PC
speaker use by the VM, such as PCM audio, will not work, resulting in undefined host behavior. Producing
beeps on Linux is a very complex topic. Oracle VM VirtualBox offers a collection
of options, in an attempt to make this work deterministically and reliably on as many Linux distributions
and system configurations as possible. These are summarized in the following table.
29
9 Advanced
79 A user-specified terminal As for code 70, but with a custom device path.
device path.
100 All of the above. Tries all the available codes.
Replace N with the code representing the case you want to use. Changing this setting takes effect when
you next start the VM. It is safe to enable PC speaker passthrough on all host OSes. It will only have an effect
on Linux.
The VM log file, VBox.log, contains lines with the prefix PIT: speaker: showing the PC
speaker passthrough setup activities. It gives hints which device it picked or why it failed.
Enabling PC speaker passthrough for the VM is usually the simple part. The real difficulty is making
sure that Oracle VM VirtualBox can access the necessary device, because in a typical Linux install most of
them can only be accessed by user root. You should follow the preferred way to persistently change this,
such as by referring to your distribution’s documentation. Since there are countless Linux distribution
variants, we can only give the general hints that there is often a way to give the X11 session user access
to additional devices, or you need to find a working solution using a udev configuration file. If everything
fails you might try setting the permissions using a script which is run late enough in the host system startup.
Sometimes additional rules are applied by the kernel to limit access. For example, that the VM process
must have the same controlling terminal as the device configured to be used for beeping, something which
is often very difficult to achieve for GUI applications such as Oracle VM VirtualBox. The table above contains
some hints, but in general refer to the Linux documentation. If you have trouble getting any beeps even if the
device permissions are set up and VBox.log confirms that it uses evdev or console for the PC speaker
control, check if your system has a PC speaker. Some systems do not have one. Other complications can
arise from Linux rerouting the PC speaker output to a sound card. Check if the beeps are audible if you
connect speakers to your sound card. Today almost all systems have one. Finally, check if the audio mixer
control has
a channel named “beep”, which could be hidden in the mixer settings, and that it is not muted.
29
9 Advanced
To enable support for passing through USB/IP devices, use the following command to add the device
server that exports the devices:
VBoxManage usbdevsource add <unique-name> --backend <USB-IP> --address <device-server>[:<port>]
USB devices exported on the device server are then accessible through the GUI or VBoxManage, like any
USB devices attached locally. This can be used multiple times to access different device servers.
To remove a device server, the following command can be used:
$ VBoxManage usbdevsource remove <unique-name>
To check whether the necessary tools are already installed use the following command:
$ usbip list -l
This should produce output similar to that shown in the example below:
If everything is installed, the USB/IP server needs to be started as root using the following command:
# usbipd -D
See the documentation for the installed distribution to determine how to start the service when the system
boots.
By default, no device on the server is exported. This must be done manually for each device. To export a
device use the following command:
# usbip bind -b "bus identifier"
29
9 Advanced
Note: When using this feature, some host systems might experience significant Oracle
VM VirtualBox performance degradation.
9.33 Nested
Virtualization
Oracle VM VirtualBox supports nested virtualization. This feature enables the passthrough of hardware
virtualization functions to the guest VM. That means that you can install a hypervisor, such as Oracle VM
VirtualBox, Oracle VM Server or KVM, on an Oracle VM VirtualBox guest. You can then create and run VMs
within the guest VM.
Hardware virtualization features not present on the host CPU will not be exposed to the guest. In addition,
some features such as nested paging are not yet supported for passthrough to the guest.
You can enable the nested virtualization feature in one of the following ways:
• From the VirtualBox Manager, select the Enable Nested VT-x/AMD-V check box on the
Processor tab. To disable the feature, deselect the check box.
• Use the --nested-hw-virt option of the VBoxManage modifyvm command to enable or
disable nested virtualization. See chapter 8.8, VBoxManage modifyvm, page 144.
Synopsis
RTIsoMaker [options] [@commands.rsp] <filespec...>
Description
Construct a virtual ISO 9660 / Joliet / UDF / HFS hybrid image and either write it to a file
(RTIsoMaker) or serve it as a virtual image (VISO).
29
9 Advanced
Options
General
-o <output-file>
--output=<output-file>
The output filename. This option is not supported in VISO mode.
--name-setup <spec>
Configures active namespaces and how file specifications are to be interpreted. The speci-
fication is a comma separated list. Each element in the list is a sub-list separated by space,
’+’ or ’|’ giving the namespaces that elements controls. Namespaces are divied into two major and
minor ones, you cannot specifying a minor before the major it belongs to.
Major namespaces and aliases in parentheses:
29
9 Advanced
--pop
Pops a --push-iso of the source file system stack.
--import-iso=<iso-file>
Imports everything on the given ISO file, including boot configuration and system area
(first 16 sectors) content. You can use --name-setup to omit namespaces.
Namespaces
--iso-level=<0|1|2|3>
Sets the ISO level:
• 0: Disable primary ISO namespace.
• 1: ISO level 1: Filenames 8.3 format and limited to 4GB - 1.
• 2: ISO level 2: 31 char long names and limited to 4GB - 1.
• 3: ISO level 3: 31 char long names and support for >=4GB files. (default)
• 4: Fictive level used by other tools. Not yet implemented.
--rock-ridge
--limited-rock-ridge
--no-rock-ridge
Enables or disables rock ridge support for the primary ISO 9660 namespace. The
--limited-rock-ridge option omits a couple of bits in the root directory that would make
Linux pick rock ridge over joliet.
Default: --limited-rock-ridge
-J
--joliet
--no-joliet
Enables or disable the joliet namespace. This option must precede any file specifications.
Default: --joliet
29
9 Advanced
--joliet-ucs-level=<1|2|3>
--ucs-level=<1|2|3>
Set the Joliet UCS support level. This is currently only flagged in the image but not enforced
on the actual path names.
Default level: 3
File Attributes
--rational-attribs
Enables rational file attribute handling (default):
• Owner ID is set to zero
• Group ID is set to zero
• Mode is set to 0444 for non-executable files.
• Mode is set to 0555 for executable files.
• Mode is set to 0555 for directories, preserving stick bits.
--strict-attribs
Counters --rational-attribs and causes attributes to be recorded exactly as they appear
in the source.
--file-mode=<mode>
--no-file-mode
Controls the forced file mode mask for rock ridge, UDF and HFS.
--dir-mode=<mode>
--no-dir-mode
Controls the forced directory mode mask for rock ridge, UDF and HFS.
--new-dir-mode=<mode>
Controls the default mode mask (rock ridge, UDF, HFS) for directories that are created
implicitly. The --dir-mode option overrides this.
--chmod=<mode>:<on-iso-file>
Explictily sets the rock ridge, UDF and HFS file mode for a file/dir/whatever that has
already been added to the ISO. The mode can be octal, ra+x, a+r, or a+rx. (Support for more
complicated mode specifications may be implemented at a later point.)
Note that only namespaces in the current –name-setup are affected.
--chown=<owner-id>:<on-iso-file>
Explictily sets the rock ridge, UDF and HFS file owner ID (numeric) for a file/dir/whatever
that has already been added to the ISO.
Note that only namespaces in the current –name-setup are affected.
–chgrp=group-id:on-iso-file
Explictily sets the rock ridge, UDF and HFS file group ID (numeric) for a file/dir/whatever
that has already been added to the ISO.
Note that only namespaces in the current –name-setup are affected.
Booting
--eltorito-new-entry
--eltorito-alt-boot
Starts a new El Torito boot entry.
--eltorito-add-image=<filespec>
File specification of a file that should be added to the image and used as the El Torito boot
image of the current boot entry.
29
9 Advanced
-b <on-iso-file>
--eltorito-boot=<on-iso-file>
Specifies a file on the ISO as the El Torito boot image for the current boot entry.
--eltorito-floppy-12
--eltorito-floppy-144
--eltorito-floppy-288
--no-emulation-boot
--hard-disk-boot
Sets the boot image emulation type of the current El Torito boot entry.
--boot-load-seg=<seg>
Specify the image load segment for the current El Torito boot entry.
Default: 0x7c0
--boot-load-size=<sectors>
Specify the image load size in emulated sectors for the current El Torito boot entry.
Default: 4 (sectors of 512 bytes)
--no-boot
Indicates that the current El Torito boot entry isn’t bootable. (The BIOS will allegedly
configure the emulation, but not attempt booting.)
--boot-info-table
Write a isolinux/syslinux boot info table into the boot image for the current El Torito boot
entry.
--eltorito-platform-id=<id>
Set the El Torito platform ID of the current entry, a new entry of the verification entry
depending on when it’s used. The ID must be one of: x86, PPC, Mac, efi
-c <namespec>
--boot-catalog=<namespec>
Enters the El Torito boot catalog into the namespaces as a file. The namespec uses the
same format as a ’filespec’, but omits the final source file system name component.
-G <file>
--generic-boot=<file>
Specifies a file that should be loaded at offset 0 in the ISO image. The file must not be larger
than 32KB. When creating a hybrid image, parts of this may be regenerated by partition tables and
such.
30
9 Advanced
-P <text|_file-id>
--publisher=<text|_file-id>
Publisher ID string or root file name. The latter must be prefixed with an underscore.
-p <text|_file-id>
--preparer=<text|_file-id>
Data preparer ID string or root file name. The latter must be prefixed with an underscore.
--sysid=<text>
System ID string.
--volid=<text>
--volume-id=<text>
Volume ID string (label). (It is possible to set different labels for primary ISO 9660, joliet,
UDF and HFS by changing the active namespaces using the --name-setup option between
--volume-id occurences.)
--volset=<text>
Volume set ID string.
Compatibility:
--graft-points
Alias for –name-setup iso+joliet+udf+hfs.
-l
--long-names
Allow 31 charater filenames. Just ensure ISO level >= 2 here.
-R
--rock
Same as --rock-ridge and --strict-attribs.
-r
--rational-rock
Same as --rock-ridge and --rational-attribs.
VISO Specific:
--iprt-iso-maker-file-marker=<UUID>
--iprt-iso-maker-file-marker-bourne=<UUID>
--iprt-iso-maker-file-marker-bourne-sh=<UUID>
Used as first option in a VISO file to specify the file UUID and that it is formatted using
bourne-shell argument quoting & escaping style.
--iprt-iso-maker-file-marker-ms=<UUID>
--iprt-iso-maker-file-marker-ms-sh=<UUID>
Used as first option in a VISO file to specify the file UUID and that it is formatted using
microsoft CRT argument quoting & escaping style.
30
9 Advanced
--random-order-verification=<size>
Enables verification pass of the image that compares blocks of the given size in random
order from the virtual and output images.
30
10 Technical Background
This chapter provides additional information for readers who are familiar with computer ar- chitecture
and technology and wish to find out more about how Oracle VM VirtualBox works under the hood. The
contents of this chapter are not required reading in order to use Oracle VM VirtualBox successfully.
• On Linux, Mac OS X, and Oracle Solaris, this is generally taken from the environment variable
$HOME, except for the user root where it is taken from the account database. This is a workaround
for the frequent trouble caused by users using Oracle VM VirtualBox in combination with the tool
sudo, which by default does not reset the environment variable
$HOME.
A typical location on Linux and Oracle Solaris is /home/username and on Mac OS X is
/Users/username.
For simplicity, we abbreviate the location of the home directory as $HOME. Using that conven- tion, the
common folder for all virtual machines is $HOME/VirtualBox VMs.
As an example, when you create a virtual machine called “Example VM”, Oracle VM VirtualBox creates the
following:
30
10 Technical Background
This is the default layout if you use the Create New Virtual Machine wizard described in chapter
1.7, Creating Your First Virtual Machine, page 8. Once you start working with the VM, additional files are
added. Log files are in a subfolder called Logs, and if you have taken snap- shots, they are in a
Snapshots subfolder. For each VM, you can change the location of its snapshots folder in the VM
settings.
You can change the default machine folder by selecting Preferences from the File menu in the Oracle
VM VirtualBox main window. Then, in the displayed window, click on the General tab. Alternatively, use
the VBoxManage setproperty machinefolder command. See chapter 8.29, VBoxManage setproperty,
page 181.
Oracle VM VirtualBox creates this configuration directory automatically, if necessary. You can specify
an alternate configuration directory by either setting the VBOX_USER_HOME environ- ment variable, or on
Linux or Oracle Solaris by using the standard XDG_CONFIG_HOME variable. Since the global
VirtualBox.xml settings file points to all other configuration files, this enables switching between several
Oracle VM VirtualBox configurations.
In this configuration directory, Oracle VM VirtualBox stores its global settings file, an XML file called
VirtualBox.xml. This file includes global configuration options and a list of registered virtual machines
with pointers to their XML settings files.
30
10 Technical Background
VirtualBox encounters a settings file from an earlier version, such as after upgrading Oracle VM VirtualBox, it
attempts to preserve the settings format as much as possible. It will only silently upgrade the settings format
if the current settings cannot be expressed in the old format, for example because you enabled a feature
that was not present in an earlier version of Oracle VM VirtualBox.
In such cases, Oracle VM VirtualBox backs up the old settings file in the virtual machine’s
configuration directory. If you need to go back to the earlier version of Oracle VM VirtualBox, then you
will need to manually copy these backup files back.
We intentionally do not document the specifications of the Oracle VM VirtualBox XML files, as we must
reserve the right to modify them in the future. We therefore strongly suggest that you do not edit these files
manually. Oracle VM VirtualBox provides complete access to its configuration data through its the
VBoxManage command line tool, see chapter 8, VBoxManage, page 128 and its API, see chapter 11, Oracle
VM VirtualBox Programming Interfaces, page 308.
• VBoxSVC, the Oracle VM VirtualBox service process which always runs in the background. This
process is started automatically by the first Oracle VM VirtualBox client process and exits a short
time after the last client exits. The first Oracle VM VirtualBox service can be the GUI,
VBoxManage, VBoxHeadless, the web service amongst others. The service is responsible for
bookkeeping, maintaining the state of all VMs, and for providing commu- nication between Oracle
VM VirtualBox components. This communication is implemented using COM/XPCOM.
Note: When we refer to clients here, we mean the local clients of a particular VBoxSVC server
process, not clients in a network. Oracle VM VirtualBox employs its own client/server
design to allow its processes to cooperate, but all these processes run un- der the same user account
on the host operating system, and this is totally transparent to the user.
• The GUI process, VirtualBoxVM, a client application based on the cross-platform Qt li- brary.
When started without the --startvm option, this application acts as the VirtualBox Manager,
displaying the VMs and their settings. It then communicates settings and state changes to VBoxSVC
and also reflects changes effected through other means, such as the VBoxManage command.
• If the VirtualBoxVM client application is started with the --startvm argument, it loads the
VMM library which includes the actual hypervisor and then runs a virtual machine and provides the input
and output for the guest.
Any Oracle VM VirtualBox front-end, or client, will communicate with the service process and can
both control and reflect the current state. For example, either the VM selector or the VM window or
VBoxManage can be used to pause the running VM, and other components will always reflect the changed
state.
The Oracle VM VirtualBox GUI application is only one of several available front ends, or clients. The
complete list shipped with Oracle VM VirtualBox is as follows:
• VirtualBoxVM: The Qt front end implementing the VirtualBox Manager and running VMs.
30
10 Technical Background
• VBoxManage: A less user-friendly but more powerful alternative. See chapter 8, VBoxMan- age, page
128.
• VBoxHeadless: A VM front end which does not directly provide any video output and keyboard
or mouse input, but enables redirection through the VirtualBox Remote Desktop Extension. See chapter
7.1.2, VBoxHeadless, the Remote Desktop Server, page 117.
• vboxwebsrv: The Oracle VM VirtualBox web service process which enables control of an Oracle
VM VirtualBox host remotely. This is described in detail in the Oracle VM VirtualBox Software
Development Kit (SDK) reference. See chapter 11, Oracle VM VirtualBox Program- ming Interfaces, page
308.
• The Oracle VM VirtualBox Python shell: A Python alternative to VBoxManage. This is also described
in the SDK reference.
Internally, Oracle VM VirtualBox consists of many more or less separate components. You may encounter
these when analyzing Oracle VM VirtualBox internal error messages or log files. These include the following:
• IPRT: A portable runtime library which abstracts file access, threading, and string manipu- lation.
Whenever Oracle VM VirtualBox accesses host operating features, it does so through this library for
cross-platform portability.
• VMM (Virtual Machine Monitor): The heart of the hypervisor.
• EM (Execution Manager): Controls execution of guest code.
• TRPM (Trap Manager): Intercepts and processes guest traps and exceptions.
• HM (Hardware Acceleration Manager): Provides support for VT-x and AMD-V.
• GIM (Guest Interface Manager): Provides support for various paravirtualization interfaces to the guest.
• PDM (Pluggable Device Manager): An abstract interface between the VMM and emulated devices
which separates device implementations from VMM internals and makes it easy to add new emulated
devices. Through PDM, third-party developers can add new virtual devices to Oracle VM VirtualBox
without having to change Oracle VM VirtualBox itself.
• PGM (Page Manager): A component that controls guest paging.
• TM (Time Manager): Handles timers and all aspects of time inside guests.
• CFGM (Configuration Manager): Provides a tree structure which holds configuration set- tings for the
VM and all emulated devices.
• SSM (Saved State Manager): Saves and loads VM state.
• VUSB (Virtual USB): A USB layer which separates emulated USB controllers from the con- trollers on
the host and from USB devices. This component also enables remote USB.
• DBGF (Debug Facility): A built-in VM debugger.
• Oracle VM VirtualBox emulates a number of devices to provide the hardware environment that various
guests need. Most of these are standard devices found in many PC compati- ble machines and
widely supported by guest operating systems. For network and storage devices in particular, there are
several options for the emulated devices to access the un- derlying hardware. These devices are
managed by PDM.
• Guest Additions for various guest operating systems. This is code that is installed from within a
virtual machine. See chapter 4, Guest Additions, page 67.
30
10 Technical Background
• The “Main” component is special. It ties all the above bits together and is the only public API that
Oracle VM VirtualBox provides. All the client processes listed above use only this API and never
access the hypervisor components directly. As a result, third-party appli- cations that use the Oracle
VM VirtualBox Main API can rely on the fact that it is always well-tested and that all capabilities of
Oracle VM VirtualBox are fully exposed. It is this API that is described in the Oracle VM VirtualBox
SDK. See chapter 11, Oracle VM VirtualBox Programming Interfaces, page 308.
10.3 Hardware
Virtualization
Oracle VM VirtualBox enables software in the virtual machine to run directly on the processor of the host,
but an array of complex techniques is employed to intercept operations that would interfere with your host.
Whenever the guest attempts to do something that could be harmful to your computer and its data, Oracle
VM VirtualBox steps in and takes action. In particular, for lots of hardware that the guest believes to be
accessing, Oracle VM VirtualBox simulates a certain virtual environment according to how you have
configured a virtual machine. For example, when the guest attempts to access a hard disk, Oracle VM
VirtualBox redirects these requests to whatever you have configured to be the virtual machine’s virtual hard
disk. This is normally an image file on your host.
Unfortunately, the x86 platform was never designed to be virtualized. Detecting situations in which
Oracle VM VirtualBox needs to take control over the guest code that is executing, as described above, is
difficult. To achieve this, Oracle VM VirtualBox uses hardware virtualization. Intel and AMD processors
have support for hardware virtualization. This means that these processors can help Oracle VM VirtualBox
to intercept potentially dangerous operations that a guest operating system may be attempting and also makes
it easier to present virtual hardware
to a virtual machine.
These hardware features differ between Intel and AMD processors. Intel named its technology VT-x, AMD
calls theirs AMD-V. The Intel and AMD support for virtualization is very different in detail, but not very
different in principle.
Note: On many systems, the hardware virtualization features first need to be enabled in the BIOS
before Oracle VM VirtualBox can use them.
Warning: Do not run other hypervisors, either open source or commercial virtual- ization
products, together with Oracle VM VirtualBox. While several hypervisors can normally be
installed in parallel, do not attempt to run several virtual machines from competing hypervisors
at the same time. Oracle VM VirtualBox cannot track what another hypervisor is currently
attempting to do on the same host, and especially if several products attempt to use hardware
virtualization features such as VT-x, this can crash the entire host.
See chapter 10.4, Details About Hardware Virtualization, page 306 for a technical discussion of hardware
virtualization.
30
10 Technical Background
• In root mode, the CPU operates much like older generations of processors without VT- x support.
There are four privilege levels, called rings, and the same instruction set is supported, with the
addition of several virtualization specific instruction. Root mode is what a host operating system
without virtualization uses, and it is also used by a hypervisor when virtualization is active.
• In non-root mode, CPU operation is significantly different. There are still four privilege rings and the
same instruction set, but a new structure called VMCS (Virtual Machine Con- trol Structure) now
controls the CPU operation and determines how certain instructions behave. Non-root mode is where
guest systems run.
Switching from root mode to non-root mode is called “VM entry”, the switch back is “VM exit”. The
VMCS includes a guest and host state area which is saved/restored at VM entry and exit. Most importantly,
the VMCS controls which guest operations will cause VM exits.
The VMCS provides fairly fine-grained control over what the guests can and cannot do. For example, a
hypervisor can allow a guest to write certain bits in shadowed control registers, but not others. This enables
efficient virtualization in cases where guests can be allowed to write control bits without disrupting the
hypervisor, while preventing them from altering control bits over which the hypervisor needs to retain full
control. The VMCS also provides control over interrupt delivery and exceptions.
Whenever an instruction or event causes a VM exit, the VMCS contains information about the exit
reason, often with accompanying detail. For example, if a write to the CR0 register causes an exit, the
offending instruction is recorded, along with the fact that a write access to a control register caused the
exit, and information about source and destination register. Thus the hypervisor can efficiently handle the
condition without needing advanced techniques such as CSAM and PATM described above.
VT-x inherently avoids several of the problems which software virtualization faces. The guest has its own
completely separate address space not shared with the hypervisor, which eliminates potential clashes.
Additionally, guest OS kernel code runs at privilege ring 0 in VMX non-root mode, obviating the problems
by running ring 0 code at less privileged levels. For example the SYSENTER instruction can transition to ring
0 without causing problems. Naturally, even at ring
0 in VMX non-root mode, any I/O access by guest code still causes a VM exit, allowing for device
emulation.
The biggest difference between VT-x and AMD-V is that AMD-V provides a more complete
virtualization environment. VT-x requires the VMX non-root code to run with paging enabled, which
precludes hardware virtualization of real-mode code and non-paged protected-mode soft- ware. This typically
only includes firmware and OS loaders, but nevertheless complicates VT-x hypervisor implementation.
AMD-V does not have this restriction.
Of course hardware virtualization is not perfect. Compared to software virtualization, the overhead of
VM exits is relatively high. This causes problems for devices whose emulation re- quires high number of
traps. One example is a VGA device in 16-color mode, where not only every I/O port access but also
every access to the framebuffer memory must be trapped.
10.5 Paravirtualization
Providers
Oracle VM VirtualBox enables the exposure of a paravirtualization interface, to facilitate accurate and efficient
execution of software within a virtual machine. These interfaces require the guest operating system to
recognize their presence and make use of them in order to leverage the benefits of communicating with
the Oracle VM VirtualBox hypervisor.
30
10 Technical Background
Most modern, mainstream guest operating systems, including Windows and Linux, ship with support for
one or more paravirtualization interfaces. Hence, there is typically no need to install additional software in
the guest to take advantage of this feature.
Exposing a paravirtualization provider to the guest operating system does not rely on the choice of
host platforms. For example, the Hyper-V paravirtualization provider can be used for VMs to run on any host
platform supported by Oracle VM VirtualBox and not just Windows.
Oracle VM VirtualBox provides the following interfaces:
• Minimal: Announces the presence of a virtualized environment. Additionally, reports the TSC and
APIC frequency to the guest operating system. This provider is mandatory for running any Mac OS X
guests.
• KVM: Presents a Linux KVM hypervisor interface which is recognized by Linux kernels version
2.6.25 or later. Oracle VM VirtualBox’s implementation currently supports paravir- tualized clocks and
SMP spinlocks. This provider is recommended for Linux guests.
• Hyper-V: Presents a Microsoft Hyper-V hypervisor interface which is recognized by Win- dows 7
and newer operating systems. Oracle VM VirtualBox’s implementation currently supports
paravirtualized clocks, APIC frequency reporting, guest debugging, guest crash reporting and relaxed
timer checks. This provider is recommended for Windows guests.
30
11 Oracle VM VirtualBox Programming
Interfaces
Oracle VM VirtualBox comes with comprehensive support for third-party developers. The so- called
Main API of Oracle VM VirtualBox exposes the entire feature set of the virtualization engine. It is
completely documented and available to anyone who wishes to control Oracle VM VirtualBox
programmatically.
The Main API is made available to C++ clients through COM on Windows hosts or XPCOM
on other hosts. Bridges also exist for SOAP, Java and Python.
All programming information such as documentation, reference information, header and other interface
files, as well as samples have been split out to a separate Software Development Kit (SDK). The SDK
is available for download from http://www.virtualbox.org. In particular, the SDK comes with a
Programming Guide and Reference manual in PDF format. This manual contains, among other things, the
information that was previously in this chapter of the User Manual.
30
12 Troubleshooting
This chapter provides answers to commonly asked questions. In order to improve your user experience
with Oracle VM VirtualBox, it is recommended to read this section to learn more about common pitfalls
and get recommendations on how to use the product.
• Is the problem specific to a certain guest OS? Or a specific release of a guest OS? Especially with Linux
guest related problems, the issue may be specific to a certain distribution and version of Linux.
• Is the problem specific to a certain host OS? Problems are usually not host OS specific, be- cause most
of the Oracle VM VirtualBox code base is shared across all supported platforms, but especially in the
areas of networking and USB support, there are significant differences between host platforms. Some
GUI related issues are also host specific.
• Is the problem specific to certain host hardware? This category of issues is typically related to the host
CPU. Because of significant differences between VT-x and AMD-V, problems may be specific to one or
the other technology. The exact CPU model may also make a difference because different CPUs support
different features, which may affect certain aspects of guest CPU operation.
• Is the problem specific to guest SMP? That is, is it related to the number of virtual CPUs (VCPUs) in
the guest? Using more than one CPU usually significantly affects the internal operation of a guest OS.
• Is the problem specific to the Guest Additions? In some cases, this is obvious, such as a shared
folders problem. In other cases such as display problems, it may be less obvious. If the problem is
Guest Additions specific, is it also specific to a certain version of the Guest Additions?
• Is the problem specific to a certain environment? Some problems are related to a particular environment
external to the VM. This usually involves network setup. Certain configura- tions of external servers
such as DHCP or PXE may expose problems which do not occur with other, similar servers.
• Is the problem a regression? Knowing that an issue is a regression usually makes it signifi- cantly easier
to find the solution. In this case, it is crucial to know which version is affected and which is not.
30
12 Troubleshooting
31
12 Troubleshooting
The results are saved as a compressed tar file archive in the same directory where the command is run.
To specify a different output file location:
$ VBoxBugReport --output ~/debug/bug004.tgz
To output all debug information to a single text file, rather than a tgz file:
$ VBoxBugReport --text
This command collects machine settings, guest properties, and log files for the specified VM. Global
configuration information for the host is also included.
To collect information for several VMs, called Windows_7, Windows_8, and Windows_10:
$ VBoxBugReport Windows_7 Windows_8 Windows_10
To show a full list of the available command options, run VBoxBugReport --help.
Warning: Use the VM debugger at your own risk. There is no support for it, and the
following documentation is only made available for advanced users with a very high level of
familiarity with the x86/AMD64 machine instruction set, as well as detailed knowledge of the
PC architecture. A degree of familiarity with the internals of the guest OS in question may also
be very helpful.
The VM debugger is available in all regular production versions of Oracle VM VirtualBox, but it is
disabled by default because the average user will have little use for it. There are two ways to access the
debugger:
31
12 Troubleshooting
A new Debug menu entry is added to the Oracle VM VirtualBox application. This menu enables the user to
open the debugger console.
The VM debugger command syntax is loosely modeled on Microsoft and IBM debuggers used on DOS,
OS/2, and Windows. Users familiar with symdeb, CodeView, or the OS/2 kernel debug- ger will find the
Oracle VM VirtualBox VM debugger familiar.
The most important command is help. This will print brief usage help for all debugger com- mands.
The set of commands supported by the VM debugger changes frequently and the help command is always
up-to-date.
A brief summary of frequently used commands is as follows:
31
12 Troubleshooting
Note that the kallsyms file contains the symbols for the currently loaded modules. If the guest’s
configuration changes, the symbols will change as well and must be updated.
For all guests, a simple way to verify that the correct symbols are loaded is the k command. The guest
is normally idling and it should be clear from the symbolic information that the guest operating system’s idle
loop is being executed.
Another group of debugger commands is the set of info commands. Running info help provides
complete usage information. The information commands provide ad-hoc data pertinent to various emulated
devices and aspects of the VMM. There is no general guideline for using the info commands, the right
command to use depends entirely on the problem being investigated. Some of the info commands are as
follows:
• cfgm: Print a branch of the configuration tree
• cpuid: Display the guest CPUID leaves
• ioport: Print registered I/O port ranges
• mmio: Print registered MMIO ranges
• mode: Print the current paging mode
• pit: Print the i8254 PIT state
• pic: Print the i8259A PIC state
• ohci, ehci, xhci: Print a subset of the OHCI, EHCI, and xHCI USB controller state
• pcnet0: Print the PCnet state
• vgatext: Print the contents of the VGA framebuffer formatted as standard text mode
• timers: Print all VM timers
The output of the info commands generally requires in-depth knowledge of the emulated device or
Oracle VM VirtualBox VMM internals. However, when used properly, the information provided can be
invaluable.
31
12 Troubleshooting
The memory descriptors contain physical addresses relative to the guest and not virtual ad- dresses.
Regions of memory such as MMIO regions are not included in the core file.
The relevant data structures and definitions can be found in the Oracle VM VirtualBox sources under the
following header files: include/VBox/dbgfcorefmt.h, include/iprt/x86.h and
src/VBox/Runtime/include/internal/ldrELFCommon.h.
The VM core file can be inspected using elfdump and GNU readelf or other similar utilities.
12.2 General
Troubleshooting
12.2.1 Guest Shows IDE/SATA Errors for File-Based Images on Slow Host
File System
Occasionally, some host file systems provide very poor writing performance and as a consequence cause the
guest to time out IDE/SATA commands. This is normal behavior and should normally cause no real
problems, as the guest should repeat commands that have timed out. However, guests such as some Linux
versions have severe problems if a write to an image file takes longer than about 15 seconds. Some file
systems however require more than a minute to complete a single write, if the host cache contains a large
amount of data that needs to be written.
The symptom for this problem is that the guest can no longer access its files during large write or copying
operations, usually leading to an immediate hang of the guest.
In order to work around this problem, the true fix is to use a faster file system that does not exhibit
such unacceptable write performance, it is possible to flush the image file after a certain amount of data
has been written. This interval is normally infinite, but can be configured individually for each disk of a VM.
For IDE disks use the following command:
VBoxManage setextradata <VM-name>
"VBoxInternal/Devices/piix3ide/0/LUN#[<x>]/Config/FlushInterval" [<b>]
[x] specifies the disk for IDE. 0 represents the master device on the first channel, 1 represents the slave
device on the first channel, 2 represents the master device on the second channel, and
3 represents the slave device on the second channel. For SATA, use values between 0 and 29. This
configuration option applies to disks only. Do not use this option for CD or DVD drives.
The unit of the interval ([b]) is the number of bytes written since the last flush. The value for it must
be selected so that the occasional long write delays do not occur. Since the proper flush interval depends
on the performance of the host and the host filesystem, finding the op- timal value that makes the problem
disappear requires some experimentation. Values between
1000000 and 10000000 (1 to 10 megabytes) are a good starting point. Decreasing the interval both
decreases the probability of the problem and the write performance of the guest. Setting the value
unnecessarily low will cost performance without providing any benefits. An interval of
1 will cause a flush for each write operation and should solve the problem in any case, but has a severe write
performance penalty.
Providing a value of 0 for [b] is treated as an infinite flush interval, effectively disabling this
workaround. Removing the extra data key by specifying no value for [b] has the same effect.
31
12 Troubleshooting
[x] specifies the disk. is 0 for the master device on the first channel, 1 for the slave device on the first
channel, 2 for the master device on the second channel or 3 for the master device on the second channel.
To enable flushing for SATA disks, issue the following command:
$ VBoxManage setextradata <VM-name> "VBoxInternal/Devices/ahci/0/LUN#[x]/Config/IgnoreFlush" 0
The value [x] that selects the disk can be a value between 0 and 29.
Note that this does not affect the flushes performed according to the configuration described in chapter
12.2.1, Guest Shows IDE/SATA Errors for File-Based Images on Slow Host File System, page 314. Restoring
the default of ignoring flush commands is possible by setting the value to 1 or by removing the key.
31
12 Troubleshooting
Some of the problems may be caused by firmware and/or host operating system bugs. There- fore,
updating the firmware and applying operating systems fixes is recommended.
For optimal virtualization performance, the C1E power state support in the system’s BIOS should be
disabled, if such a setting is available. Not all systems support the C1E power state. On Intel systems, the
Intel C State setting should be disabled. Disabling other power man- agement settings may also
improve performance. However, a balance between performance and power consumption must always be
considered.
It will list the required OpenGL extensions one by one and will show you which one failed the test. This
usually means that you are running an outdated or misconfigured OpenGL driver on your host. It can also
mean that your video chip is lacking required functionality.
12.3 Windows
Guests
12.3.1 No USB 3.0 Support in Windows 7 Guests
If a Windows 7 or Windows Server 2008 R2 guest is configured for USB 3.0 (xHCI) support, the guest
OS will not have any USB support at all. This happens because Windows 7 predates USB 3.0 and therefore
does not ship with any xHCI drivers. Microsoft also does not offer any vendor-provided xHCI drivers
through Windows Update.
To solve this problem, it is necessary to download and install the Intel xHCI driver in the guest. Intel
offers the driver as the USB 3.0 eXtensible Host Controller (xHCI) driver for Intel 7
Series/C216 chipsets.
Note that the driver only supports Windows 7 and Windows Server 2008 R2. The driver package
includes support for both 32-bit and 64-bit OS variants.
• The ACPI and I/O APIC settings should never be changed after installing Windows. De- pending
on the presence of these hardware features, the Windows installation program chooses special kernel
and device driver versions and will fail to startup should these hard- ware features be removed. Enabling
them for a Windows VM which was installed without them does not cause any harm. However,
Windows will not use these features in this case.
• Changing the storage controller hardware will cause bootup failures as well. This might also apply
to you if you copy a disk image from an older version of Oracle VM VirtualBox to a new virtual
machine. The default subtype of IDE controller hardware used by Oracle VM VirtualBox is PIIX4.
Make sure that the storage controller settings are identical.
31
12 Troubleshooting
These problems are all caused by a bug in the hard disk driver of Windows 2000. After issuing a hard disk
request, there is a race condition in the Windows driver code which leads to corruption if the operation
completes too fast. For example, the hardware interrupt from the IDE controller arrives too soon. With
physical hardware, there is a guaranteed delay in most systems so the problem is usually hidden there.
However, it should be possible to also reproduce it on physical hardware. In a virtual environment, it is
possible for the operation to be done immediately, especially on very fast systems with multiple CPUs,
and the interrupt is signaled sooner than on a physical system. The solution is to introduce an artificial
delay before delivering such interrupts. This delay can be configured for a VM using the following
command:
$ VBoxManage setextradata <VM-name> "VBoxInternal/Devices/piix3ide/0/Config/IRQDelay" 1
This sets the delay to one millisecond. In case this does not help, increase it to a value between
1 and 5 milliseconds. Please note that this slows down disk performance. After installation, you should be
able to remove the key, or set it to 0.
31
12 Troubleshooting
To restore the default behavior, remove the key or set its value to 1.
31
12 Troubleshooting
• The Linux kernel version 2.6.18, and some 2.6.17 versions, introduced a race condition that can
cause boot crashes in Oracle VM VirtualBox. Please use a kernel version 2.6.19 or later.
• With hardware virtualization and the I/O APIC enabled, kernels before 2.6.24-rc6 may panic on
boot with the following message:
Kernel panic - not syncing: IO-APIC + timer doesn’t work! Boot with
apic=debug and send a report. Then try booting with the ’noapic’ option
If you see this message, either disable hardware virtualization or the I/O APIC as described in chapter
3.5, System Settings, page 51, or upgrade the guest to a newer kernel.
See http://www.mail-archive.com/[email protected]/
msg30813.html for details about the kernel fix.
If a particular desktop service is not working correctly, it is worth checking whether the process which
should provide it is running.
The VBoxClient processes create files in the user’s home directory with names of the form
.vboxclient-*.pid when they are running in order to prevent a given service from being started
twice. It can happen due to misconfiguration that these files are created owned by root and not deleted
when the services are stopped, which will prevent them from being started in
future sessions. If the services cannot be started, you may wish to check whether these files still exist.
31
12 Troubleshooting
12.6 Windows
Hosts
12.6.1 VBoxSVC Out-of-Process COM Server Issues
Oracle VM VirtualBox makes use of the Microsoft Component Object Model (COM) for interpro- cess and
intraprocess communication. This enables Oracle VM VirtualBox to share a common configuration among
different virtual machine processes and provide several user interface op- tions based on a common
architecture. All global status information and configuration is main- tained by the process VBoxSVC.exe,
which is an out-of-process COM server. Whenever an Oracle VM VirtualBox process is started, it requests
access to the COM server and Windows automati- cally starts the process. Note that it should never be started
by the end user.
When the last process disconnects from the COM server, it will terminate itself after some seconds.
The Oracle VM VirtualBox configuration XML files are maintained and owned by the COM server and the
files are locked whenever the server runs.
In some cases, such as when a virtual machine is terminated unexpectedly, the COM server will not
notice that the client is disconnected and stay active for a longer period of 10 minutes or so, keeping the
configuration files locked. In other rare cases the COM server might experience an internal error and
subsequently other processes fail to initialize it. In these situations, it is recommended to use the Windows
task manager to kill the process VBoxSVC.exe.
Certain applications may disable this key against Microsoft’s advice. If it is set to 0, change it to 1 and
reboot your system. Oracle VM VirtualBox relies on Windows notifying it of media changes.
32
12 Troubleshooting
The interval can be decreased by setting a Windows registry key to smaller values than the default of
100. The key does not exist initially and must be of type DWORD. The unit for its values is milliseconds.
Values around 20 are suitable for low-bandwidth connections between the RDP client and server. Values
around 4 can be used for a gigabit Ethernet connection. Generally values below 10 achieve a performance
that is very close to that of the local input devices and screen of the host on which the Virtual Machine is
running.
Depending whether the setting should be changed for an individual user or for the system, set either of the
following.
HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Min Send Interval
While this will decrease guest disk performance, especially writes, it does not affect the per- formance of
other applications running on the host.
• The maximum allowed filter count was reached on the host. In this case, the MSI log would
mention the 0x8004a029 error code returned on NetFlt network component install, as follows:
You can try to increase the maximum filter count in the Windows registry using the follow- ing key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Network\MaxNumFilters
The maximum number allowed is 14. After a reboot, try to reinstall Oracle VM VirtualBox.
• The INF cache is corrupt. In this case, the install log at %windir%\inf\setupapi.dev.log would
typically mention the failure to find a suitable driver package for either the sun_VBoxNetFlt
or sun_VBoxNetFltmp components. The solution then is to uninstall Oracle VM VirtualBox,
remove the INF cache (%windir%\inf\INFCACHE.1), reboot and try to reinstall Oracle VM
VirtualBox.
32
12 Troubleshooting
12.7 Linux
Hosts
12.7.1 Linux Kernel Module Refuses to Load
If the Oracle VM VirtualBox kernel module, vboxdrv, refuses to load you may see an Error
inserting vboxdrv: Invalid argument message. As root, check the output of the dmesg
command to find out why the load failed. Most probably the kernel disagrees with the version of gcc
used to compile the module. Make sure that you use the same compiler that was used to build the kernel.
32
12 Troubleshooting
32
13 Security Guide
13.1 General Security
Principles
The following principles are fundamental to using any application securely.
• Keep software up to date. One of the principles of good security practise is to keep all software
versions and patches up to date. Activate the Oracle VM VirtualBox update no- tification to get
notified when a new Oracle VM VirtualBox release is available. When updating Oracle VM
VirtualBox, do not forget to update the Guest Additions. Keep the host operating system as well as the
guest operating system up to date.
• Restrict network access to critical services. Use proper means, for instance a firewall, to protect your
computer and your guests from accesses from the outside. Choosing the proper networking mode
for VMs helps to separate host networking from the guest and vice versa.
• Follow the principle of least privilege. The principle of least privilege states that users should be given the
least amount of privilege necessary to perform their jobs. Always execute Oracle VM VirtualBox
as a regular user. We strongly discourage anyone from executing Oracle VM VirtualBox with system
privileges.
Choose restrictive permissions when creating configuration files, for instance when creating
/etc/default/virtualbox, see chapter 2.3.3.7, Automatic Installation Options, page 41. Mode
0600 is preferred.
• Monitor system activity. System security builds on three pillars: good security protocols, proper
system configuration and system monitoring. Auditing and reviewing audit records address the third
requirement. Each component within a system has some degree of moni- toring capability. Follow audit
advice in this document and regularly monitor audit records.
• Keep up to date on latest security information. Oracle continually improves its software and
documentation. Check this note yearly for revisions.
32
13 Security Guide
disabling those selected features can not only be used to restrict the user to certain functionality but also to
minimize the surface provided to a potential attacker.
The general case is to install the complete Oracle VM VirtualBox package. The installation must be
done with system privileges. All Oracle VM VirtualBox binaries should be executed as a regular user and never
as a privileged user.
The Oracle VM VirtualBox Extension Pack provides additional features and must be down- loaded and
installed separately, see chapter 1.5, Installing Oracle VM VirtualBox and Extension Packs, page 6. As for the
base package, the SHA256 checksum of the extension pack should be verified. As the installation requires
system privileges, Oracle VM VirtualBox will ask for the system password during the installation of the
extension pack.
13.3 Security
Features
This section outlines the specific security mechanisms offered by Oracle VM VirtualBox.
13.3.2.1 Networking
The default networking mode for VMs is NAT which means that the VM acts like a computer behind a
router, see chapter 6.3, Network Address Translation (NAT), page 106. The guest is part of a private subnet
belonging to this VM and the guest IP is not visible from the outside. This networking mode works without
any additional setup and is sufficient for many purposes.
If bridged networking is used, the VM acts like a computer inside the same network as the host, see
chapter 6.5, Bridged Networking, page 109. In this case, the guest has the same network access as the host and
a firewall might be necessary to protect other computers on the subnet from a potential malicious guest as
well as to protect the guest from a direct access from other computers. In some cases it is worth
considering using a forwarding rule for a specific port in NAT mode instead of using bridged networking.
32
13 Security Guide
Some setups do not require a VM to be connected to the public network at all. Internal networking,
see chapter 6.6, Internal Networking, page 110, or host-only networking, see chapter
6.7, Host-Only Networking, page 111, are often sufficient to connect VMs among each other or to connect
VMs only with the host but not with the public network.
13.3.2.3 Clipboard
The shared clipboard enables users to share data between the host and the guest. Enabling the clipboard in
Bidirectional mode enables the guest to read and write the host clipboard. The Host to Guest mode and the
Guest to Host mode limit the access to one direction. If the guest is able to access the host clipboard it can
also potentially access sensitive data from the host which is shared over the clipboard.
If the guest is able to read from and/or write to the host clipboard then a remote user con- necting to
the guest over the network will also gain this ability, which may not be desirable. As a consequence, the
shared clipboard is disabled for new machines.
• When using remote iSCSI storage and the storage server requires authentication, an initiator
secret can optionally be supplied with the VBoxManage storageattach com- mand. As long
as no settings password is provided, by using the command line option
32
13 Security Guide
--settingspwfile, then this secret is stored unencrypted in the machine configuration and is
therefore potentially readable on the host. See chapter 5.10, iSCSI Servers, page 100 and chapter 8.17,
VBoxManage storageattach, page 169.
• When using the Oracle VM VirtualBox web service to control an Oracle VM VirtualBox host
remotely, connections to the web service are authenticated in various ways. This is described in detail
in the Oracle VM VirtualBox Software Development Kit (SDK) reference. See chapter 11, Oracle VM
VirtualBox Programming Interfaces, page 308.
13.3.5 Encryption
The following components of Oracle VM VirtualBox use encryption to protect sensitive data:
• When using the Oracle VM VirtualBox Extension Pack provided by Oracle for VRDP remote desktop
support, RDP data can optionally be encrypted. See chapter 7.1.6, RDP Encryption, page 122. Only the
Enhanced RDP Security method (RDP5.2) with TLS protocol provides a secure connection. Standard
RDP Security (RDP4 and RDP5.1) is vulnerable to a man- in-the-middle attack.
32
13 Security Guide
• When using the Oracle VM VirtualBox Extension Pack provided by Oracle for disk encryp- tion, the
data stored in disk images can optionally be encrypted. See chapter 9.28, Encryp- tion of Disk Images,
page 287. This feature covers disk image content only. All other data for a virtual machine is stored
unencrypted, including the VM’s memory and device state which is stored as part of a saved state,
both when created explicitly or part of a snapshot of a running VM.
13.4 Security
Recommendations
This section contains security recommendations for specific issues. By default VirtualBox will configure
the VMs to run in a secure manner, however this may not always be possible without additional user actions
(e.g. host OS / firmware configuration changes).
13.4.1 CVE-2018-3646
This security issue affect a range of Intel CPUs with nested paging. AMD CPUs are expected not to be
impacted (pending direct confirmation by AMD). Also the issue does not affect VMs running with
hardware virtualization disabled or with nested paging disabled.
For more information about nested paging, see chapter 10.6, Nested Paging and VPIDs, page
307.
The following mitigation options are available.
32
13 Security Guide
on every VM entry. The performance impact is greater than with the default option, though this of course
depends on the workload. Workloads producing a lot of VM exits (like networking, VGA access, and
similiar) will probably be most impacted.
For users not concerned by this security issue, the default mitigation can be disabled using the
VBoxManage modifyvm name --l1d-flush-on-sched off command.
32
14 Known Limitations
14.1 Experimental
Features
Some Oracle VM VirtualBox features are labeled as experimental. Such features are provided on an “as-is”
basis and are not formally supported. However, feedback and suggestions about such features are welcome.
A comprehensive list of experimental features is as follows:
• Hardware 3D acceleration support for Windows, Linux, and Oracle Solaris guests
• Hardware 2D video playback acceleration support for Windows guests
• Mac OS X guests (Mac OS X hosts only)
• ICH9 chipset emulation
• EFI firmware
• Host CD/DVD drive passthrough
• Support of iSCSI using internal networking
• Using Oracle VM VirtualBox and Hyper-V on the same host
14.2 Known
Issues
The following section describes known problems with this release of Oracle VM VirtualBox. Un- less marked
otherwise, these issues are planned to be fixed in later releases.
• The following Guest SMP (multiprocessor) limitations exist:
– Poor performance with 32-bit guests on AMD CPUs. This affects mainly Windows and Oracle
Solaris guests, but possibly also some Linux kernel revisions. Partially solved for 32-bit
Windows NT, 2000, XP, and 2003 guests. Requires the Guest Additions to be installed.
– Poor performance with 32-bit guests on certain Intel CPU models that do not include virtual
APIC hardware optimization support. This affects mainly Windows and Oracle Solaris guests, but
possibly also some Linux kernel revisions. Partially solved for 32-bit Windows NT, 2000, XP, and
2003 guests. Requires the Guest Additions to be installed.
• NX (no execute, data execution prevention) only works for guests running on 64-bit hosts
and requires that hardware virtualization be enabled.
• Guest control. On Windows guests, a process started using the guest control execute support
will not be able to display a graphical user interface unless the user account under which it is running is
currently logged in and has a desktop session.
Also, to use accounts without or with an empty password, the guest’s group pol- icy must
be changed. To do so, open the group policy editor on the com- mand line by
typing gpedit.msc, open the key Computer Configuration\Windows Settings\
Security Settings\Local Policies\Security Options and change the value of
Accounts: Limit local account use of blank passwords to console logon
only to Disabled.
33
14 Known Limitations
• OVF import/export:
– OVF localization, with multiple languages in a single OVF file, is not yet supported.
– Some OVF sections like StartupSection, DeploymentOptionSection, and InstallSection are
ignored.
– OVF environment documents, including their property sections and appliance config- uration with
ISO images, are not yet supported.
– Remote files using HTTP or other mechanisms are not yet supported.
• Neither scale mode nor seamless mode work correctly with guests using OpenGL 3D
features, such as with Compiz-enabled window managers.
• The RDP server in the Oracle VM VirtualBox extension pack supports only audio streams in format
22.05kHz stereo 16-bit. If the RDP client requests any other audio format there will be no audio.
• Preserving the aspect ratio in scale mode works only on Windows hosts and on Mac OS X
hosts.
• On Mac OS X hosts, the following features are not yet implemented:
– Numlock emulation
– CPU frequency metric
– Memory ballooning
• Mac OS X guests:
– Mac OS X guests can only run on a certain host hardware. For details about license and host
hardware limitations. See chapter 3.1.1, Mac OS X Guests, page 46 and check the Apple software
license conditions.
– Oracle VM VirtualBox does not provide Guest Additions for Mac OS X at this time.
– The graphics resolution currently defaults to 1024x768 as Mac OS X falls back to the built-in EFI
display support. See chapter 3.14.1, Video Modes in EFI, page 63 for more information on how
to change EFI video modes.
– Mac OS X guests only work with one CPU assigned to the VM. Support for SMP will be
provided in a future release.
– Depending on your system and version of Mac OS X, you might experience guest hangs
after some time. This can be fixed by turning off energy saving. Set the timeout to “Never” in the
system preferences.
– By default, the Oracle VM VirtualBox EFI enables debug output of the Mac OS X kernel to
help you diagnose boot problems. Note that there is a lot of output and not all errors are fatal.
They would also show when using a physical Apple Macintosh computer. You can turn off
these messages by using the following command:
$ VBoxManage setextradata <VM-name> "VBoxInternal2/EfiBootArgs" " "
33
14 Known Limitations
– It is currently not possible to start a Mac OS X guest in safe mode by specifying the -x
option in VBoxInternal2/EfiBootArgs extradata.
• Oracle Solaris hosts:
– USB support on Oracle Solaris hosts requires Oracle Solaris 11 version snv_124 or later.
Webcams and other isochronous devices are known to have poor performance.
– Host Webcam passthrough is restricted to 640x480 frames at 20 frames per second due to
limitations in the Oracle Solaris V4L2 API. This may be addressed in a future Oracle Solaris
release.
– No ACPI information, such as battery status or power source, is reported to the guest.
– No support for using wireless adapters with bridged networking.
– Crossbow-based bridged networking on Oracle Solaris 11 hosts does not work directly with
aggregate links. However, you can use dladm to manually create a VNIC over the aggregate link
and use that with a VM. This limitation does not exist in Oracle Solaris
11u1 build 17 and later.
• Neither virtio nor Intel PRO/1000 drivers for Windows XP guests support segmentation
offloading. Therefore Windows XP guests have slower transmission rates comparing to other guest
types. Refer to MS Knowledge base article 842264 for additional information.
• Guest Additions for OS/2. Seamless windows and automatic guest resizing will probably never be
implemented due to inherent limitations of the OS/2 graphics system.
• Some guest operating systems predating ATAPI CD-ROMs may exhibit long delays or en- tirely fail to
boot in certain configurations. This is most likely to happen when an IDE/ATAPI CD-ROM exists alone
on a primary or secondary IDE channel.
Affected operating systems are MS OS/2 1.21: fails to boot with an error message referenc- ing
COUNTRY.SYS and MS OS/2 1.3: long boot delays. To avoid such problems, disable the emulated
IDE/ATAPI CD-ROM. The guest OS cannot use this device, anyway.
33
15 Change Log
This section summarizes the changes between Oracle VM VirtualBox versions. Note that this change log
is not exhaustive and not all changes are listed.
Oracle VM VirtualBox version numbers consist of three numbers separated by dots where the first and
second number represent the major version and the third number the minor version. Minor version numbers
of official releases are always even. An odd minor version number repre- sents an internal development or test
build. In addition, each build contains a revision number.
• GUI: Fix several layout and mouse position handling bugs with soft keyboard
• GUI: Fixed crash on last VM removed (6.1.4 regression; bug #19568, #19525, #19506,
#19490, #19481, #19397)
• GUI and API: Allow renaming VMs which are in saved state
• Serial: Fixed slow guest output when using the TCP server mode without anyone being connected
• Guest Additions: Restored ’VBoxClient–checkhostversion’ functionality (6.1.0 regression;
bug #19470)
• Guest Additions: Fixed resizing and multi monitor handling for X11 guests. (6.1.0 regres- sion; bug
#19496)
• Guest Additions: Build problems fix with Oracle Linux 8.2 (Red Hat compatible kernel) / Red Hat
Enterprise Linux 8.2 / CentOS 8.2 (bug #19391)
• Guest Control/VBoxManage: Fixed handling of multiple environment variables supplied to
’VBoxManage guestcontrol VM run’ (6.1.6/6.0.20 regression; bug #19518)
• Guest Control: Implemented support for long(er) command lines
• Guest Control: Various stability improvements
33
15 Change
• Serial port: Improve error handling and fix hang when host port disappears
• VBoxManage: Multiple fixes for guestcontrol operations
• API: Fix for exception handling bug in Python bindings
• Shared clipboard: Multiple fixes including possible crash and HTML data support
• Linux host and guest: Support Linux kernel 5.6 (bug #19312)
• Virtualization core: Fixed a rare issue with ICEBP instruction causing guru meditations on
Intel hosts (6.1.0 regression; bug #19171)
• Virtualization core: Fixed macOS Catalina guests failing to boot after upgrading to 10.15.2 onwards
(bug #19188)
• GUI: Recent NLS integration and bug fixes for GUI and Qt translation tags
• USB: Fixed isochronous transfers to the VM for xHCI
• Serial: Fixed buffer handling, avoiding receiving stale data when the receive queue is flushed (bug
#18671)
• Serial: Improve host serial port passthrough handling on Windows host
• VBoxManage: Restore old –clipboard option for modifyvm command
• macOS host: Use hardened runtime and request the needed entitlements, meeting latest notarization
rules which also required moving VirtualBoxVM executable
• macOS host: Update osxfuse to v3.10.4
• Windows host: Update Italian translation of installer
• Windows host: Improve shared folder compatibility with POSIX append semantic (bug
#19003)
• Windows host: Restore the ability to run VMs through Hyper-V, at the expense of perfor- mance
• Linux guest: Support Linux 5.5 (bug #19145)
• Linux guest: Shared folder fix for loopback mounting of images
• BIOS: Always report non-ATA disks as ready
• BIOS: Report EFI support through DMI table (bug 19144)
• VGA BIOS: Reduce stack space usage for INT 10h handlers
33
15 Change
• Virtualization core: Fixed performance issue observed with Windows XP guests on AMD
hosts (6.0.0 regression; bug #19152)
• Virtualization core: Consistent IBRS/IBPB CPUID feature reporting, avoids crash of NetBSD
9.0 RC1 installer (bug #19146)
• GUI: Fixed updating of runtime info
• GUI: In Display settings, do not show “2D video acceleration” checkbox if it is meaningless for the
selected graphics adapter
• Audio: Fixed audio input handling when VRDE is enabled
• Audio: Fixed crash in the HDA emulation when using multi-speaker configurations
• Storage: Fixed use of encrypted disks with snapshots involved (6.1.0 regression; bug
#19160)
• Storage: Improve performance of virtio-scsi
• Storage: Read-only support for compressed clusters in QCOW2 images
• Windows installer: Include unintentionally dropped vbox-img.exe utility again
• Windows host: When installing or removing an extension pack, retry the sometimes failing directory
renaming (usually caused by anti-virus software accessing the directory)
• Linux host: Support Linux 5.5 (guest additions not yet)
• Windows guest: Accelerate 2D video decoding (scaling and color space conversion) if the
VM is configured to use VBoxSVGA with 3D enabled
• Windows guest: Fix guest additions installer to upgrade the mouse filter driver reliably
• Windows guest: When uninstalling older Guest Additions with old 3D support enabled try restoring
original Direct3D files
• Linux guest: Improve resize and multi-monitor handling for VMs using VMSVGA (known remaining
issue: do not disable a monitor “in the middle”, causes confusion)
• Implemented support for importing a virtual machine from Oracle Cloud Infrastructure
• Extended support for exporting a virtual machine to Oracle Cloud Infrastructure, allowing the creation
of multiple virtual machines without re-uploading. Also added option to export a VM to the cloud using
the more efficient variant “paravirtialized”, and to specify free-form tags for cloud images
• Virtualization core: Support for nested hardware-virtualization on Intel CPUs (starting with 5th
generation Core i, codename Broadwell), so far tested only with guest running VirtualBox
33
15 Change
• Graphics: New style 3D support (with VBoxSVGA and VMSVGA) remains, old style 3D
support (with VBoxVGA) has been completely removed
• Shared Clipboard: Implemented experimental support for file transfers (Windows hosts/guests
only at the moment). Needs to be enabled via VBoxManage (disabled by default).
• Virtualization core: Drop recompiler, i.e. running VMs now needs a CPU supporting hard- ware
virtualization
• Runtime: Works now on hosts with many CPUs (limit now 1024)
• Appliance and Cloud Import: Add field for defining firmware type (not part of OVF spec and thus
manual in the Appliance case, for OCI it is automatically taken from the instance information)
• GUI: Improved the VISO creation and file manager dialogs
• GUI: Virtual machine list of VirtualBox Manager was improved. Machine groups are now more
obvious visually and VM search functionality has been improved. Global Tools ele- ment can now
be pinned in place, to avoid scrolling it with rest of machine list
• GUI: Virtual machine details pane is now extended with embedded editors for selected VM
attributes, allowing user to edit them on-the-fly byi clicking corresponding hyper-links without opening
VM settings dialog
• GUI: Details pane provides more complete information
• GUI: Internal medium enumeration routines were optimized to reduce the load and opti- mize the
performance in cases when user have lots of media registered. Also, we again allowed to add
existing media (and create new) via Virtual Media Manager
• GUI: More consistent medium selection (both showing known images and allowing to se- lect using
the file picker)
• GUI: VM storage settings page was adjusted a bit in usability regard. User is now allowed to change
controller bus type and can move attachments between the controllers by using drag and drop
• GUI: Storage and Network settings pages bug-fixes and usability optimization
• GUI: Added a new soft (virtual) keyboard enabling arbitrary keyboard input to guests, including
multimedia keys
• GUI: Fixed crash in cloud related wizards when accessibility functionality was enabled
• GUI: Show VM CPU load as part of status bar CPU indicator
• GUI: Improved and extended the Session Information dialog
• GUI: Fixed/improved mouse pointer scaling
• GUI: Some issues related to mouse integration cursor scaling were addressed (bug
#14366), more to go
• GUI: Fix and unify geometry save/restore in various dialogs
• GUI: Added the missing restriction options for disabling new functionality such as the VISO
creator
33
15 Change
33
15 Change
• SMBIOS: Store system UUID in little endian format which is the default for new VMs, while existing
VMs stick to the old VirtualBox behavior of storing them in big endian format for backwards
compatibility to avoid breaking the activation status of Windows VMs
• VBoxSDL frontend: Fixed running on Windows hosts
• macOS host: Fix VM crashes (most visible on macOS Catalina)
• Linux host: Improve vboxweb systemd service dependency information
• Linux host: Drop PCI passthrough, the current code is too incomplete (cannot handle PCIe devices at
all), i.e. not useful enough
• Linux host and guest: Support Linux 5.4 (bug #18945)
• Linux host and guest: Force disabling of kernel module signing during build (user can do it
afterwards)
• Windows host: When possible, distinguish USB devices by port number; helps with accu- rate
capturing of devices when multiple otherwise identical devices are connected
• Windows Guest Additions: Many fixes for drawing problems in the driver for VBoxSVGA
• Windows Guest Additions: Fixes for legacy VBoxVGA adapter, restore previously working cases
• Windows Guest Additions: Restore VHWA functionality for VBoxSVGA
• Windows guest: DXVA implementation for WDDM driver
• Documentation: Updated supported host operating systems, added few new manual pages
(more to come later)
• EFI: Switch to newer firmware code base and add NVRAM support, should improve com- patibility
with OSes significantly
• EFI: Added support for booting from APFS
• EFI: Added support for non-standard SATA and NVMe boot device paths created by OS X
• EFI: Modified updated EFI code base to support older OS X guests again
33
16 Third-Party Materials and Licenses
Oracle VM VirtualBox incorporates materials from several Open Source software projects. There- fore the use
of these materials by Oracle VM VirtualBox is governed by different Open Source licenses. This document
reproduces these licenses and provides a list of the materials used and their respective licensing conditions.
Section 1 contains a list of the materials used. Section 2 reproduces the applicable Open Source licenses.
For each material, a reference to its license is provided.
The source code for the materials listed below as well as the rest of the Oracle VM VirtualBox code which
is released as open source are available at http://www.virtualbox.org, both as tarballs for particular
releases and as a live SVN repository.
16.1 Third-Party
Materials
• Oracle VM VirtualBox contains portions of QEMU which is governed by the licenses in chap- ter 16.2.5,
X Consortium License (X11), page 357 and chapter 16.2.2, GNU Lesser General Public License (LGPL),
page 346 and
(C) 2003-2005 Fabrice Bellard; Copyright (C) 2004-2005 Vassili Karpov (malc); Copyright
(c) 2004 Antony T Curtis; Copyright (C) 2003 Jocelyn Mayer
• Oracle VM VirtualBox contains code which is governed by the license in chapter 16.2.5, X Consortium
License (X11), page 357 and
Copyright 2004 by the Massachusetts Institute of Technology.
• Oracle VM VirtualBox contains code of the BOCHS VGA BIOS which is governed by the license in
chapter 16.2.2, GNU Lesser General Public License (LGPL), page 346 and
Copyright (C) 2001, 2002 the LGPL VGABios developers Team.
• Oracle VM VirtualBox contains code of the BOCHS ROM BIOS which is governed by the license in
chapter 16.2.2, GNU Lesser General Public License (LGPL), page 346 and
Copyright (C) 2002 MandrakeSoft S.A.; Copyright (C) 2004 Fabrice Bellard; Copyright (C)
2005 Struan Bartlett.
• Oracle VM VirtualBox contains the zlib library which is governed by the license in chapter
16.2.6, zlib License, page 357 and
Copyright (C) 1995-2003 Jean-loup Gailly and Mark Adler.
• Oracle VM VirtualBox may contain OpenSSL which is governed by the license in chapter
16.2.7, OpenSSL License, page 358 and
Copyright (C) 1995-1998 Eric Young ([email protected]). This product includes software written
by Tim Hudson ([email protected]).
• Oracle VM VirtualBox may contain NSPR and XPCOM which is governed by the license in chapter
16.2.3, Mozilla Public License (MPL), page 351 and
Copyright (C) The Authors.
• Oracle VM VirtualBox contains Slirp which is governed by the license in chapter 16.2.8,
Slirp License, page 359 and was written by Danny Gasparovski.
Copyright (C) 1995, 1996 All Rights Reserved.
33
16 Third-Party Materials and Licenses
• Oracle VM VirtualBox contains liblzf which is governed by the license in chapter 16.2.9,
liblzf License, page 359 and
Copyright (C) 2000-2005 Marc Alexander Lehmann <[email protected]>
• Oracle VM VirtualBox may ship with a modified copy of rdesktop which is governed by the license in
chapter 16.2.1, GNU General Public License (GPL), page 342 and
Copyright (C) Matthew Chapman and others.
• Oracle VM VirtualBox may ship with a copy of kchmviewer which is governed by the license in chapter
16.2.1, GNU General Public License (GPL), page 342 and
Copyright (C) George Yunaev and others.
• Oracle VM VirtualBox may contain Etherboot which is governed by the license in chapter
16.2.1, GNU General Public License (GPL), page 342 with the exception that aggregating Etherboot
with another work does not require the other work to be released under the same license (see
http://etherboot.sourceforge.net/clinks.html). Etherboot is
Copyright (C) Etherboot team.
• Oracle VM VirtualBox may contain iPXE which is governed by the license in chapter 16.2.1,
GNU General Public License (GPL), page 342 and
Copyright (C) Michael Brown <[email protected]> and others.
• Oracle VM VirtualBox contains code from Wine which is governed by the license in chapter
16.2.2, GNU Lesser General Public License (LGPL), page 346 and
Copyright 1993 Bob Amstadt, Copyright 1996 Albrecht Kleine, Copyright 1997 David
Faure, Copyright 1998 Morten Welinder, Copyright 1998 Ulrich Weigand, Copyright 1999
Ove Koven
• Oracle VM VirtualBox contains code from lwIP which is governed by the license in chapter
16.2.11, lwIP License, page 360 and
Copyright (C) 2001, 2002 Swedish Institute of Computer Science.
• Oracle VM VirtualBox contains libxml which is governed by the license in chapter 16.2.12,
libxml License, page 360 and
Copyright (C) 1998-2003 Daniel Veillard.
• Oracle VM VirtualBox contains libxslt which is governed by the license in chapter 16.2.13,
libxslt Licenses, page 361 and
Copyright (C) 2001-2002 Daniel Veillard and Copyright (C) 2001-2002 Thomas Broyer, Charlie
Bozeman and Daniel Veillard.
• Oracle VM VirtualBox contains code from the gSOAP XML web services tools, which are licensed
under the license in chapter 16.2.14, gSOAP Public License Version 1.3a, page 361 and
Copyright (C) 2000-2007, Robert van Engelen, Genivia Inc., and others.
• Oracle VM VirtualBox ships with the application tunctl (shipped as VBoxTunctl) from the User-mode
Linux suite which is governed by the license in chapter 16.2.1, GNU General Public License (GPL),
page 342 and
Copyright (C) 2002 Jeff Dike.
• Oracle VM VirtualBox contains code from Chromium, an OpenGL implementation, which is
goverened by the licenses in chapter 16.2.15, Chromium Licenses, page 366 and
Copyright (C) Stanford University, The Regents of the University of California, Red Hat, and others.
34
16 Third-Party Materials and Licenses
• Oracle VM VirtualBox contains libcurl which is governed by the license in chapter 16.2.16,
curl License, page 368 and
Copyright (C) 1996-2009, Daniel Stenberg.
• Oracle VM VirtualBox contains dnsproxy which is governed by the license in chapter 16.2.4,
MIT License, page 357 and
Copyright (c) 2003, 2004, 2005 Armin Wolfermann.
• Oracle VM VirtualBox may contain iniparser which is governed by the license in chapter
16.2.4, MIT License, page 357 and
Copyright (c) 2000-2008 by Nicolas Devillard.
• Oracle VM VirtualBox contains some code from libgd which is governed by the license in chapter
16.2.17, libgd License, page 369 and
Copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 Pierre-Alain Joye
([email protected]).
• Oracle VM VirtualBox contains code from the EFI Development Kit II which is governed by the license
in chapter 16.2.18, BSD License from Intel, page 369 and
Copyright (c) 2004-2008, Intel Corporation.
• Oracle VM VirtualBox contains libjpeg which is governed by the license in chapter 16.2.19,
libjpeg License, page 370 and
Copyright (C) 1991-2010, Thomas G. Lane, Guido Vollbeding.
• Oracle VM VirtualBox may contain x86 SIMD extension for IJG JPEG library which is gov- erned by
the license in chapter 16.2.20, x86 SIMD Extension for IJG JPEG Library License, page 370 and
Copyright 2009 Pierre Ossman <[email protected]> for Cendio AB; Copyright 2010 D. R.
Commander; Copyright (C) 1999-2006, MIYASAKA Masaru.
• Oracle VM VirtualBox may ship a copy of Qt which is governed by the license in chapter
16.2.2, GNU Lesser General Public License (LGPL), page 346 and
Copyright (C) 2010, 2011 Nokia Corporation and/or its subsidiary(-ies).
• Oracle VM VirtualBox contains parts of the FreeBSD kernel which is governed by the license in chapter
16.2.21, FreeBSD License, page 371.
• Oracle VM VirtualBox contains parts of the NetBSD kernel which is governed by the license in chapter
16.2.22, NetBSD License, page 371.
• Oracle VM VirtualBox contains portions of liblightdm-gobject which is governed by the license in
chapter 16.2.2, GNU Lesser General Public License (LGPL), page 346 and
Copyright (C) 2010-2013 Canonical Ltd.; Copyright (C) 2010-2011 Robert Ancell.
• Oracle VM VirtualBox contains portions of glib which is governed by the license in chapter
16.2.2, GNU Lesser General Public License (LGPL), page 346 and
Copyright (C) 1995-2011 The Glib team
• Oracle VM VirtualBox contains portions of PCRE which is governed by the license in chapter
16.2.23, PCRE License, page 372 and
Copyright (c) 1997-2012 University of Cambridge; Copyright(c) 2009-2012 Zoltan Her- czeg;
Copyright (c) 2007-2012, Google Inc.
34
16 Third-Party Materials and Licenses
• Oracle VM VirtualBox contains portions of libffi which is governed by the license in chapter
16.2.24, libffi License, page 373 and
Copyright (c) 1996-2012 Anthony Green, Red Hat, Inc and others. See source files for details.
• Oracle VM VirtualBox contains portions of FLTK which is governed by the licenses in chap- ter
16.2.25, FLTK License, page 373 and chapter 16.2.2, GNU Lesser General Public License (LGPL),
page 346 and
Copyright (C) 1991-2012 The FLTK team
• Oracle VM VirtualBox contains portions of Expat which is governed by the license in chapter
16.2.26, Expat License, page 373 and
Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd and Clark Cooper; Copyright
(c) 2001, 2002, 2003, 2004, 2005, 2006 Expat maintainers.
• Oracle VM VirtualBox contains portions of Fontconfig which is governed by the license in chapter
16.2.27, Fontconfig License, page 374 and
Copyright (C) 2001, 2003 Keith Packard
• Oracle VM VirtualBox contains portions of Freetype which is governed by the license in chapter
16.2.28, Freetype License, page 374 and
Copyright 2012 The FreeType Project (www.freetype.org). All rights reserved.
• Oracle VM VirtualBox may contain code from the WebM VP8 Codec SDK which is governed by the
license in chapter 16.2.29, VPX License, page 376 and
Copyright (c) 2010, The WebM Project authors. All rights reserved.
• Oracle VM VirtualBox may contain code from libopus (“Opus”) which is governed by the license in
chapter 16.2.30, Opus License, page 376 and
Copyright 2001-2011 Xiph.Org, Skype Limited, Octasic, Jean-Marc Valin, Timothy B. Ter- riberry,
CSIRO, Gregory Maxwell, Mark Borgerding, Erik de Castro Lopo
• Oracle VM VirtualBox may contain portions of FUSE for macOS which is governed by the licenses in
chapter 16.2.31, FUSE for macOS License, page 377 and chapter 16.2.2, GNU Lesser General Public
License (LGPL), page 346 and
Copyright (c) 2011-2017 Benjamin Fleischer; Copyright (c) 2011-2012 Erik Larsson All rights
reserved.
34
16 Third-Party Materials and Licenses
whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU
Library General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are
designed to make sure that you have the freedom to distribute copies of free software (and charge for this
service if you wish), that you receive source code or can get it if you want it, that you can change the
software or use pieces of it in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to
ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute
copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the
recipients all the rights that you have. You must make sure that they, too, receive or can get the source code.
And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which
gives you legal permission to copy, distribute and/or modify the software.
Also, for each author’s protection and ours, we want to make certain that everyone under- stands that
there is no warranty for this free software. If the software is modified by someone else and passed on, we
want its recipients to know that what they have is not the original, so that any problems introduced by
others will not reflect on the original authors’ reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that
redistributors of a free program will individually obtain patent licenses, in effect making the program
proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone’s free use or
not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND
MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright
holder saying it may be distributed under the terms of this General Public License. The “Program”, below,
refers to any such program or work, and a “work based on the Program” means either the Program or any
derivative work under copyright law: that is to say, a work containing the Program or a portion of it,
either verbatim or with modifications and/or trans- lated into another language. (Hereinafter, translation is
included without limitation in the term “modification”.) Each licensee is addressed as “you”.
Activities other than copying, distribution and modification are not covered by this License; they are
outside its scope. The act of running the Program is not restricted, and the output from the Program is covered
only if its contents constitute a work based on the Program (independent of having been made by running
the Program). Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any
medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright
notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of
any warranty; and give any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer
warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work
based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above,
provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the
date of any change.
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived
from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the
terms of this License.
34
16 Third-Party Materials and Licenses
c) If the modified program normally reads commands interactively when run, you must cause it, when
started running for such interactive use in the most ordinary way, to print or display an announcement
including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you
provide a warranty) and that users may redistribute the program under these conditions, and telling the user
how to view a copy of this License. (Exception: if the Program itself is interactive but does not
normally print such an announcement, your work based on the Program is not required to print an
announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not
derived from the Program, and can be reasonably considered independent and separate works in themselves,
then this License, and its terms, do not apply to those sections when you distribute them as separate works.
But when you distribute the same sections as part of a whole which is a work based on the Program, the
distribution of the whole must be on the terms of this License, whose permissions for other licensees extend
to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by
you; rather, the intent is to exercise the right to control the distribution of derivative or collective works
based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a
work based on the Program) on a volume of a storage or distribution medium does not bring the other
work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or
executable form under the terms of Sections 1 and 2 above provided that you also do one of the
following:
a) Accompany it with the complete corresponding machine-readable source code, which must be
distributed under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge
no more than your cost of physically performing source distribution, a complete machine-readable copy of
the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer to distribute correspond- ing source
code. (This alternative is allowed only for noncommercial distribution and only if you received the
program in object code or executable form with such an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an
executable work, complete source code means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to control compilation and installation of the
executable. However, as a special exception, the source code distributed need not include anything that is
normally distributed (in either source or binary form) with the major components (compiler, kernel, and so
on) of the operating system on which the executable runs, unless that component itself accompanies the
executable.
If distribution of executable or object code is made by offering access to copy from a designated place,
then offering equivalent access to copy the source code from the same place counts as distribution of the
source code, even though third parties are not compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this
License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will
automatically terminate your rights under this License. However, parties who have received copies, or rights,
from you under this License will not have their licenses terminated so long as such parties remain in full
compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants
you permission to modify or distribute the Program or its derivative works. These actions are prohibited
by law if you do not accept this License. Therefore, by modifying or
34
16 Third-Party Materials and Licenses
distributing the Program (or any work based on the Program), you indicate your acceptance of this License
to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based
on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically
receives a license from the original licensor to copy, distribute or modify the Pro- gram subject to these
terms and conditions. You may not impose any further restrictions on the recipients’ exercise of the rights
granted herein. You are not responsible for enforcing compliance by third parties to this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason
(not limited to patent issues), conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this
License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any
other pertinent obligations, then as a consequence you may not distribute the Program at all. For example,
if a patent license would not permit royalty-free redistribution of the Program by all those who receive
copies directly or indirectly through you, then the only way you could satisfy both it and this License
would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circum- stance, the
balance of the section is intended to apply and the section as a whole is intended to apply in other
circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims
or to contest validity of any such claims; this section has the sole purpose of pro- tecting the integrity of
the free software distribution system, which is implemented by public license practices. Many people have
made generous contributions to the wide range of software distributed through that system in reliance on
consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute
software through any other system and a licensee cannot impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this
License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by
copyrighted interfaces, the original copyright holder who places the Program under this License may add an
explicit geographical distribution limitation excluding those countries, so that distribution is permitted only
in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in
the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public
License from time to time. Such new versions will be similar in spirit to the present version, but may
differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version num- ber of this
License which applies to it and “any later version”, you have the option of following the terms and
conditions either of that version or of any later version published by the Free Software Foundation. If the
Program does not specify a version number of this License, you may choose any version ever published by
the Free Software Foundation.
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions
are different, write to the author to ask for permission. For software which is copy- righted by the Free
Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our
decision will be guided by the two goals of preserving the free status of all derivatives of our free software
and of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTH- ERWISE STATED
IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS”
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IM-
34
16 Third-Party Materials and Licenses
PLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABIL- ITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE
OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFEC- TIVE, YOU ASSUME THE
COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR RE- DISTRIBUTE
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PRO- GRAMS), EVEN IF SUCH HOLDER
OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
34
16 Third-Party Materials and Licenses
restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of
the library must be consistent with the full freedom of use specified in this license.
Most GNU software, including some libraries, is covered by the ordinary GNU General Public License.
This license, the GNU Lesser General Public License, applies to certain designated li- braries, and is quite
different from the ordinary General Public License. We use this license for certain libraries in order to permit
linking those libraries into non-free programs.
When a program is linked with a library, whether statically or using a shared library, the combination
of the two is legally speaking a combined work, a derivative of the original library. The ordinary General
Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The
Lesser General Public License permits more lax criteria for linking other code with the library.
We call this license the “Lesser” General Public License because it does Less to protect the user’s
freedom than the ordinary General Public License. It also provides other free software developers Less of
an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary
General Public License for many libraries. However, the Lesser license provides advantages in certain special
circumstances.
For example, on rare occasions, there may be a special need to encourage the widest possible use of a
certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to
use the library. A more frequent case is that a free library does the same job as widely used non-free
libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the
Lesser General Public License.
In other cases, permission to use a particular library in non-free programs enables a greater number of
people to use a large body of free software. For example, permission to use the GNU C Library in non-free
programs enables many more people to use the whole GNU operating system, as well as its variant, the
GNU/Linux operating system.
Although the Lesser General Public License is Less protective of the users’ freedom, it does ensure that
the user of a program that is linked with the Library has the freedom and the where- withal to run that program
using a modified version of the Library.
The precise terms and conditions for copying, distribution and modification follow. Pay close attention to
the difference between a “work based on the library” and a “work that uses the library”. The former
contains code derived from the library, whereas the latter must be combined with the library in order to run.
GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRI- BUTION
AND MODIFICATION
0. This License Agreement applies to any software library or other program which contains a notice
placed by the copyright holder or other authorized party saying it may be distributed under the terms of this
Lesser General Public License (also called “this License”). Each licensee is addressed as “you”.
A “library” means a collection of software functions and/or data prepared so as to be conve- niently
linked with application programs (which use some of those functions and data) to form executables.
The “Library”, below, refers to any such software library or work which has been distributed under these
terms. A “work based on the Library” means either the Library or any derivative work under copyright
law: that is to say, a work containing the Library or a portion of it, ei- ther verbatim or with modifications
and/or translated straightforwardly into another language. (Hereinafter, translation is included without
limitation in the term “modification”.)
“Source code” for a work means the preferred form of the work for making modifications to it. For a
library, complete source code means all the source code for all modules it contains, plus any associated
interface definition files, plus the scripts used to control compilation and installation of the library.
Activities other than copying, distribution and modification are not covered by this License; they are
outside its scope. The act of running a program using the Library is not restricted, and output from such a
program is covered only if its contents constitute a work based on the Library
34
16 Third-Party Materials and Licenses
(independent of the use of the Library in a tool for writing it). Whether that is true depends on what the
Library does and what the program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library’s complete source code as you receive it,
in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the
absence of any warranty; and distribute a copy of this License along with the Library.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer
warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work
based on the Library, and copy and distribute such modifications or work under the terms of Section 1
above, provided that you also meet all of these conditions:
a) The modified work must itself be a software library.
b) You must cause the files modified to carry prominent notices stating that you changed the files and the
date of any change.
c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of
this License.
d) If a facility in the modified Library refers to a function or a table of data to be supplied by an
application program that uses the facility, other than as an argument passed when the facility is invoked, then
you must make a good faith effort to ensure that, in the event an application does not supply such function
or table, the facility still operates, and performs whatever part of its purpose remains meaningful.
(For example, a function in a library to compute square roots has a purpose that is entirely well- defined
independent of the application. Therefore, Subsection 2d requires that any application- supplied function or
table used by this function must be optional: if the application does not supply it, the square root function
must still compute square roots.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not
derived from the Library, and can be reasonably considered independent and separate works in themselves,
then this License, and its terms, do not apply to those sections when you distribute them as separate works.
But when you distribute the same sections as part of a whole which is a work based on the Library, the
distribution of the whole must be on the terms of this License, whose permissions for other licensees extend
to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by
you; rather, the intent is to exercise the right to control the distribution of derivative or collective works
based on the Library.
In addition, mere aggregation of another work not based on the Library with the Library (or with a work
based on the Library) on a volume of a storage or distribution medium does not bring the other work under
the scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a
given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they
refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version
than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version
instead if you wish.) Do not make any other change in these notices.
Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General
Public License applies to all subsequent copies and derivative works made from that copy.
This option is useful when you wish to copy part of the code of the Library into a program that is not a
library.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section
2) in object code or executable form under the terms of Sections 1 and 2 above provided that you
accompany it with the complete corresponding machine-readable source code, which must
34
16 Third-Party Materials and Licenses
be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange.
If distribution of object code is made by offering access to copy from a designated place, then offering
equivalent access to copy the source code from the same place satisfies the requirement to distribute the
source code, even though third parties are not compelled to copy the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is designed to work with the
Library by being compiled or linked with it, is called a “work that uses the Library”. Such a work, in
isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.
However, linking a “work that uses the Library” with the Library creates an executable that is a derivative
of the Library (because it contains portions of the Library), rather than a “work that uses the library”. The
executable is therefore covered by this License. Section 6 states terms for distribution of such executables.
When a “work that uses the Library” uses material from a header file that is part of the Library, the object
code for the work may be a derivative work of the Library even though the source code is not. Whether this is
true is especially significant if the work can be linked without the Library, or if the work is itself a library. The
threshold for this to be true is not precisely defined by law.
If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros
and small inline functions (ten lines or less in length), then the use of the object file is unrestricted,
regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of
the Library will still fall under Section 6.) Otherwise, if the work is a derivative of the Library, you may
distribute the object code for the work under the terms of Section 6. Any executables containing that work
also fall under Section 6, whether or not they are linked directly with the Library itself.
6. As an exception to the Sections above, you may also combine or link a “work that uses the Library”
with the Library to produce a work containing portions of the Library, and distribute that work under terms
of your choice, provided that the terms permit modification of the work for the customer’s own use and
reverse engineering for debugging such modifications.
You must give prominent notice with each copy of the work that the Library is used in it and that the
Library and its use are covered by this License. You must supply a copy of this License. If the work during
execution displays copyright notices, you must include the copyright notice for the Library among them, as
well as a reference directing the user to the copy of this License. Also, you must do one of these things:
a) Accompany the work with the complete corresponding machine-readable source code for the Library
including whatever changes were used in the work (which must be distributed under Sections 1 and 2
above); and, if the work is an executable linked with the Library, with the complete machine-readable
“work that uses the Library”, as object code and/or source code, so that the user can modify the Library and
then relink to produce a modified executable containing the modified Library. (It is understood that the
user who changes the contents of definitions files in the Library will not necessarily be able to recompile
the application to use the modified definitions.)
b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that
(1) uses at run time a copy of the library already present on the user’s computer system, rather than
copying library functions into the executable, and (2) will operate properly with a modified version of the
library, if the user installs one, as long as the modified version is interface-compatible with the version that
the work was made with.
c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials
specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution.
d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent
access to copy the above specified materials from the same place.
34
16 Third-Party Materials and Licenses
e) Verify that the user has already received a copy of these materials or that you have already sent this user
a copy.
For an executable, the required form of the “work that uses the Library” must include any data and
utility programs needed for reproducing the executable from it. However, as a special exception, the
materials to be distributed need not include anything that is normally distributed (in either source or binary
form) with the major components (compiler, kernel, and so on) of the operating system on which the
executable runs, unless that component itself accompanies the executable.
It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do
not normally accompany the operating system. Such a contradiction means you cannot use both them and the
Library together in an executable that you distribute.
7. You may place library facilities that are a work based on the Library side-by-side in a single library
together with other library facilities not covered by this License, and distribute such a combined library,
provided that the separate distribution of the work based on the Library and of the other library facilities is
otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a
copy of the same work based on the Library, uncom- bined with any other library facilities. This must be
distributed under the terms of the Sections
above.
b) Give prominent notice with the combined library of the fact that part of it is a work based on the
Library, and explaining where to find the accompanying uncombined form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided
under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library
is void, and will automatically terminate your rights under this License. However, parties who have received
copies, or rights, from you under this License will not have their licenses terminated so long as such parties
remain in full compliance.
9. You are not required to accept this License, since you have not signed it. However, nothing else grants
you permission to modify or distribute the Library or its derivative works. These actions are prohibited
by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any
work based on the Library), you indicate your acceptance of this License to do so, and all its terms and
conditions for copying, distributing or modifying the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the Library), the recipient
automatically receives a license from the original licensor to copy, distribute, link with or modify the Library
subject to these terms and conditions. You may not impose any further restrictions on the recipients’
exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties
with this License.
11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason
(not limited to patent issues), conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this
License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any
other pertinent obligations, then as a consequence you may not distribute the Library at all. For example,
if a patent license would not permit royalty-free redistribution of the Library by all those who receive
copies directly or indirectly through you, then the only way you could satisfy both it and this License
would be to refrain entirely from distribution of the Library.
If any portion of this section is held invalid or unenforceable under any particular circum- stance, the
balance of the section is intended to apply, and the section as a whole is intended to apply in other
circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims
or to contest validity of any such claims; this section has the sole purpose of protect- ing the integrity of the
free software distribution system which is implemented by public license practices. Many people have
made generous contributions to the wide range of software dis-
35
16 Third-Party Materials and Licenses
tributed through that system in reliance on consistent application of that system; it is up to the author/donor
to decide if he or she is willing to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this
License.
12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by
copyrighted interfaces, the original copyright holder who places the Library under this License may add an
explicit geographical distribution limitation excluding those countries, so that distribution is permitted only
in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in
the body of this License.
13. The Free Software Foundation may publish revised and/or new versions of the Lesser General
Public License from time to time. Such new versions will be similar in spirit to the present version, but
may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Library specifies a version number of this
License which applies to it and “any later version”, you have the option of following the terms and
conditions either of that version or of any later version published by the Free Software Foundation. If the
Library does not specify a license version number, you may choose any version ever published by the Free
Software Foundation.
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions
are incompatible with these, write to the author to ask for permission. For software which is copyrighted by
the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this.
Our decision will be guided by the two goals of preserving the free status of all derivatives of our free
software and of promoting the sharing and reuse of software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE
LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHER- WISE STATED
IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY “AS IS”
WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PER- FORMANCE OF THE LIBRARY IS WITH
YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY
SERVICING, REPAIR OR CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDIS- TRIBUTE
THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUD- ING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE
OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
35
16 Third-Party Materials and Licenses
1.2. “Contributor Version” means the combination of the Original Code, prior Modifications used by a
Contributor, and the Modifications made by that particular Contributor.
1.3. “Covered Code” means the Original Code or Modifications or the combination of the
Original Code and Modifications, in each case including portions thereof.
1.4. “Electronic Distribution Mechanism” means a mechanism generally accepted in the soft- ware
development community for the electronic transfer of data.
1.5. “Executable” means Covered Code in any form other than Source Code.
1.6. “Initial Developer” means the individual or entity identified as the Initial Developer in the
Source Code notice required by Exhibit A.
1.7. “Larger Work” means a work which combines Covered Code or portions thereof with code not
governed by the terms of this License.
1.8. “License” means this document.
1.8.1. “Licensable” means having the right to grant, to the maximum extent possible, whether at the time of
the initial grant or subsequently acquired, any and all of the rights conveyed herein.
1.9. “Modifications” means any addition to or deletion from the substance or structure of either the
Original Code or any previous Modifications. When Covered Code is released as a series of files, a
Modification is:
A. Any addition to or deletion from the contents of a file containing Original Code or previous
Modifications.
B. Any new file that contains any part of the Original Code or previous Modifications.
1.10. “Original Code” means Source Code of computer software code which is described in the Source
Code notice required by Exhibit A as Original Code, and which, at the time of its release under this License
is not already Covered Code governed by this License.
1.10.1. “Patent Claims” means any patent claim(s), now owned or hereafter acquired, in- cluding
without limitation, method, process, and apparatus claims, in any patent Licensable by grantor.
1.11. “Source Code” means the preferred form of the Covered Code for making modifications to it,
including all modules it contains, plus any associated interface definition files, scripts used to control
compilation and installation of an Executable, or source code differential comparisons against either the
Original Code or another well known, available Covered Code of the Contribu- tor’s choice. The Source
Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving
software is widely available for no charge.
1.12. “You” (or “Your”) means an individual or a legal entity exercising rights under, and complying
with all of the terms of, this License or a future version of this License issued under Section 6.1. For legal
entities, “You” includes any entity which controls, is controlled by, or is under common control with You.
For purposes of this definition, “control” means (a) the power, direct or indirect, to cause the direction or
management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty
percent (50%) of the outstanding shares or beneficial ownership of such entity.
2. Source Code License.
2.1. The Initial Developer Grant. The Initial Developer hereby grants You a world-wide, royalty-free,
non-exclusive license, subject to third party intellectual property claims:
(a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to
use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions
thereof) with or without Modifications, and/or as part of a Larger Work; and
(b) under Patents Claims infringed by the making, using or selling of Original Code, to make, have made,
use, practice, sell, and offer for sale, and/or otherwise dispose of the Original Code (or portions thereof).
(c) the licenses granted in this Section 2.1(a) and (b) are effective on the date Initial Developer first
distributes Original Code under the terms of this License.
(d) Notwithstanding Section 2.1(b) above, no patent license is granted: 1) for code that You delete from
the Original Code; 2) separate from the Original Code; or 3) for infringements
35
16 Third-Party Materials and Licenses
caused by: i) the modification of the Original Code or ii) the combination of the Original Code with other
software or devices.
2.2. Contributor Grant. Subject to third party intellectual property claims, each Contributor hereby grants
You a world-wide, royalty-free, non-exclusive license
(a) under intellectual property rights (other than patent or trademark) Licensable by Con- tributor, to
use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such
Contributor (or portions thereof) either on an unmodified basis, with other Modifications, as Covered
Code and/or as part of a Larger Work; and
(b) under Patent Claims infringed by the making, using, or selling of Modifications made by that
Contributor either alone and/or in combination with its Contributor Version (or portions of such
combination), to make, use, sell, offer for sale, have made, and/or otherwise dispose of: 1)
Modifications made by that Contributor (or portions thereof); and 2) the combination of Modifications
made by that Contributor with its Contributor Version (or portions of such combination).
(c) the licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first makes
Commercial Use of the Covered Code.
(d) Notwithstanding Section 2.2(b) above, no patent license is granted: 1) for any code that
Contributor has deleted from the Contributor Version; 2) separate from the Contributor Version;
3) for infringements caused by: i) third party modifications of Contributor Version or ii) the combination
of Modifications made by that Contributor with other software (except as part of the Contributor Version)
or other devices; or 4) under Patent Claims infringed by Covered Code in the absence of Modifications made
by that Contributor.
3. Distribution Obligations.
3.1. Application of License. The Modifications which You create or to which You contribute are
governed by the terms of this License, including without limitation Section 2.2. The Source Code version of
Covered Code may be distributed only under the terms of this License or a future version of this License
released under Section 6.1, and You must include a copy of this License with every copy of the Source
Code You distribute. You may not offer or impose any terms on any Source Code version that alters or
restricts the applicable version of this License or the recipients’ rights hereunder. However, You may include
an additional document offering the additional rights described in Section 3.5.
3.2. Availability of Source Code. Any Modification which You create or to which You con- tribute
must be made available in Source Code form under the terms of this License either on the same media as an
Executable version or via an accepted Electronic Distribution Mechanism to anyone to whom you made an
Executable version available; and if made available via Electronic Distribution Mechanism, must remain
available for at least twelve (12) months after the date it initially became available, or at least six (6)
months after a subsequent version of that partic- ular Modification has been made available to such
recipients. You are responsible for ensuring that the Source Code version remains available even if the
Electronic Distribution Mechanism is maintained by a third party.
3.3. Description of Modifications. You must cause all Covered Code to which You contribute to contain
a file documenting the changes You made to create that Covered Code and the date of any change. You must
include a prominent statement that the Modification is derived, directly or indirectly, from Original Code
provided by the Initial Developer and including the name of the Initial Developer in (a) the Source Code,
and (b) in any notice in an Executable version or related documentation in which You describe the origin or
ownership of the Covered Code.
3.4. Intellectual Property Matters
(a) Third Party Claims. If Contributor has knowledge that a license under a third party’s in- tellectual
property rights is required to exercise the rights granted by such Contributor under Sections 2.1 or 2.2,
Contributor must include a text file with the Source Code distribution titled “LEGAL” which describes the
claim and the party making the claim in sufficient detail that a re- cipient will know whom to contact. If
Contributor obtains such knowledge after the Modification is made available as described in Section 3.2,
Contributor shall promptly modify the LEGAL file
35
16 Third-Party Materials and Licenses
in all copies Contributor makes available thereafter and shall take other steps (such as notifying appropriate
mailing lists or newsgroups) reasonably calculated to inform those who received the Covered Code that new
knowledge has been obtained.
(b) Contributor APIs. If Contributor’s Modifications include an application programming in- terface and
Contributor has knowledge of patent licenses which are reasonably necessary to implement that API,
Contributor must also include this information in the LEGAL file.
3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code. If it
is not possible to put such notice in a particular Source Code file due to its structure, then You must include
such notice in a location (such as a relevant directory) where a user would be likely to look for such a notice.
If You created one or more Modification(s) You may add your name as a Contributor to the notice described
in Exhibit A. You must also duplicate this License in any documentation for the Source Code where You
describe recipients’ rights or ownership rights relating to Covered Code. You may choose to offer, and to
charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered
Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any
Contributor. You must make it absolutely clear than any such warranty, support, indemnity or liability
obligation is offered by You alone, and You hereby agree to indemnify the Initial Developer and every
Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty,
support, indemnity or liability terms You offer.
3.6. Distribution of Executable Versions. You may distribute Covered Code in Executable form only
if the requirements of Section 3.1-3.5 have been met for that Covered Code, and if You include a
notice stating that the Source Code version of the Covered Code is available under the terms of this
License, including a description of how and where You have fulfilled the obligations of Section 3.2. The
notice must be conspicuously included in any notice in an Executable version, related documentation or
collateral in which You describe recipients’ rights relating to the Covered Code. You may distribute the
Executable version of Covered Code or ownership rights under a license of Your choice, which may
contain terms different from this License, provided that You are in compliance with the terms of this License
and that the license for the Executable version does not attempt to limit or alter the recipient’s rights in the
Source Code version from the rights set forth in this License. If You distribute the Executable version
under a different license You must make it absolutely clear that any terms which differ from this License are
offered by You alone, not by the Initial Developer or any Contributor. You hereby agree to indemnify the
Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor
as a result of any such terms You offer.
3.7. Larger Works. You may create a Larger Work by combining Covered Code with other code not
governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You
must make sure the requirements of this License are fulfilled for the Covered Code.
4. Inability to Comply Due to Statute or Regulation.If it is impossible for You to comply with any of the
terms of this License with respect to some or all of the Covered Code due to statute, judicial order, or
regulation then You must: (a) comply with the terms of this License to the max- imum extent possible; and (b)
describe the limitations and the code they affect. Such description must be included in the LEGAL file
described in Section 3.4 and must be included with all dis- tributions of the Source Code. Except to the
extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of
ordinary skill to be able to understand it.
5. Application of this License. This License applies to code to which the Initial Developer has attached the
notice in Exhibit A and to related Covered Code.
6. Versions of the License.
6.1. New Versions. Netscape Communications Corporation (“Netscape”) may publish revised and/or new
versions of the License from time to time. Each version will be given a distinguishing version number.
35
16 Third-Party Materials and Licenses
6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the
License, You may always continue to use it under the terms of that version. You may also choose to use
such Covered Code under the terms of any subsequent version of the License published by Netscape. No one
other than Netscape has the right to modify the terms applicable to Covered Code created under this License.
6.3. Derivative Works. If You create or use a modified version of this License (which you may only
do in order to apply it to code which is not already Covered Code governed by this Li- cense), You must (a)
rename Your license so that the phrases “Mozilla”, “MOZILLAPL”, “MOZPL”, “Netscape”, “MPL”, “NPL” or
any confusingly similar phrase do not appear in your license (ex- cept to note that your license differs from
this License) and (b) otherwise make it clear that Your version of the license contains terms which differ from
the Mozilla Public License and Netscape Public License. (Filling in the name of the Initial Developer,
Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be
modifications of this License.)
7. DISCLAIMER OF WARRANTY.
COVERED CODE IS PROVIDED UNDER THIS LICENSE ON AN “AS IS” BASIS, WITHOUT WAR- RANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, WARRANTIES
THAT THE COVERED CODE IS FREE OF DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE
OR NON-INFRINGING. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
COVERED CODE IS WITH YOU. SHOULD ANY COVERED CODE PROVE DEFECTIVE IN ANY RESPECT,
YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER CONTRIB- UTOR) ASSUME THE COST OF ANY
NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY CONSTITUTES
AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED CODE IS AUTHORIZED
HEREUNDER EXCEPT UNDER THIS DISCLAIMER.
8. TERMINATION.
8.1. This License and the rights granted hereunder will terminate automatically if You fail to comply
with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. All
sublicenses to the Covered Code which are properly granted shall survive any termination of this License.
Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive.
8.2. If You initiate litigation by asserting a patent infringement claim (excluding declaratory judgment
actions) against Initial Developer or a Contributor (the Initial Developer or Contributor against whom You file
such action is referred to as “Participant”) alleging that:
(a) such Participant’s Contributor Version directly or indirectly infringes any patent, then any and all rights
granted by such Participant to You under Sections 2.1 and/or 2.2 of this License shall, upon 60 days
notice from Participant terminate prospectively, unless if within 60 days after receipt of notice You either:
(i) agree in writing to pay Participant a mutually agreeable reasonable royalty for Your past and future use of
Modifications made by such Participant, or (ii) withdraw Your litigation claim with respect to the Contributor
Version against such Participant. If within 60 days of notice, a reasonable royalty and payment arrangement
are not mutually agreed upon in writing by the parties or the litigation claim is not withdrawn, the rights
granted by Participant to You under Sections 2.1 and/or 2.2 automatically terminate at the expiration of the
60 day notice period specified above.
(b) any software, hardware, or device, other than such Participant’s Contributor Version, di- rectly or
indirectly infringes any patent, then any rights granted to You by such Participant under Sections 2.1(b) and
2.2(b) are revoked effective as of the date You first made, used, sold, dis- tributed, or had made,
Modifications made by that Participant.
8.3. If You assert a patent infringement claim against Participant alleging that such Partici- pant’s
Contributor Version directly or indirectly infringes any patent where such claim is resolved (such as by license
or settlement) prior to the initiation of patent infringement litigation, then the reasonable value of the
licenses granted by such Participant under Sections 2.1 or 2.2 shall be taken into account in determining the
amount or value of any payment or license.
35
16 Third-Party Materials and Licenses
8.4. In the event of termination under Sections 8.1 or 8.2 above, all end user license agree- ments
(excluding distributors and resellers) which have been validly granted by You or any distributor hereunder
prior to termination shall survive termination.
9. LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THE- ORY,
WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL
DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED CODE, OR ANY
SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL,
INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER IN- CLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR
MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAM- AGES OR LOSSES, EVEN IF SUCH
PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF
LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM
SUCH PARTY’S NEGLIGENCE TO THE EX- TENT APPLICABLE LAW PROHIBITS SUCH LIMITATION.
SOME JURISDICTIONS DO NOT AL- LOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR
CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.
10. U.S. GOVERNMENT END USERS. The Covered Code is a “commercial item,“ as that term is defined
in 48 C.F.R. 2.101 (Oct. 1995), consisting of “commercial computer software” and “commercial
computer software documentation,“ as such terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent
with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government
End Users acquire Covered Code with only those rights set forth herein.
11. MISCELLANEOUS. This License represents the complete agreement concerning subject matter
hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only
to the extent necessary to make it enforceable. This License shall be governed by California law provisions
(except to the extent applicable law, if any, provides otherwise), excluding its conflict-of-law provisions.
With respect to disputes in which at least one party is a citizen of, or an entity chartered or registered to do
business in the United States of America, any litigation relating to this License shall be subject to the
jurisdiction of the Federal Courts of the Northern District of California, with venue lying in Santa Clara
County, California, with the losing party responsible for costs, including without limitation, court costs and
reasonable attorneys’ fees and expenses. The application of the United Nations Convention on Contracts for
the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language
of a contract shall be construed against the drafter shall not apply to this License.
12. RESPONSIBILITY FOR CLAIMS. As between Initial Developer and the Contributors, each party is
responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this
License and You agree to work with Initial Developer and Contributors to dis- tribute such responsibility on
an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability.
13. MULTIPLE-LICENSED CODE. Initial Developer may designate portions of the Covered Code as
“Multiple-Licensed”. “Multiple-Licensed” means that the Initial Developer permits you to utilize portions of
the Covered Code under Your choice of the NPL or the alternative licenses, if any, specified by the Initial
Developer in the file described in Exhibit A.
EXHIBIT A -Mozilla Public License.
“The contents of this file are subject to the Mozilla Public License Version 1.1 (the “License”); you may
not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.mozilla.org/MPL/
Software distributed under the License is distributed on an “AS IS” basis, WITHOUT WAR- RANTY OF
ANY KIND, either express or implied. See the License for the specific language gov- erning rights and
limitations under the License.
The Original Code is .
35
16 Third-Party Materials and Licenses
35
16 Third-Party Materials and Licenses
Permission is granted to anyone to use this software for any purpose, including commercial applications,
and to alter it and redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original
software. If you use this software in a product, an acknowledgment in the product documentation would be
appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the
original software.
3. This notice may not be removed or altered from any source distribution.
Jean-loup Gailly Mark Adler
[email protected] [email protected]
35
16 Third-Party Materials and Licenses
35
16 Third-Party Materials and Licenses
Permission is hereby granted to use, copy, modify, and distribute this source code, or portions hereof, for
any purpose, without fee, subject to the following restrictions:
1. The origin of this source code must not be misrepresented.
2. Altered versions must be plainly marked as such and must not be misrepresented as being the original
source.
3. This Copyright notice may not be removed or altered from any source or altered source
distribution.
The Contributing Authors and Group 42, Inc. specifically permit, without fee, and encourage the use of
this source code as a component to supporting the PNG file format in commercial products. If you use
this source code in a product, acknowledgment is not required but would be appreciated.
36
16 Third-Party Materials and Licenses
Except as contained in this notice, the name of Daniel Veillard shall not be used in advertising or otherwise
to promote the sale, use or other dealings in this Software without prior written authorization from him.
36
16 Third-Party Materials and Licenses
1.2. “Contributor Version” means the combination of the Original Code, prior Modifications used by a
Contributor, and the Modifications made by that particular Contributor.
1.3. “Covered Code” means the Original Code, or Modifications or the combination of the
Original Code, and Modifications, in each case including portions thereof.
1.4. “Electronic Distribution Mechanism” means a mechanism generally accepted in the soft- ware
development community for the electronic transfer of data.
1.5. “Executable” means Covered Code in any form other than Source Code.
1.6. “Initial Developer” means the individual or entity identified as the Initial Developer in the
Source Code notice required by Exhibit A.
1.7. “Larger Work” means a work which combines Covered Code or portions thereof with code not
governed by the terms of this License.
1.8. “License” means this document.
1.8.1. “Licensable” means having the right to grant, to the maximum extent possible, whether at the time of
the initial grant or subsequently acquired, any and all of the rights conveyed herein.
1.9. “Modifications” means any addition to or deletion from the substance or structure of either the
Original Code or any previous Modifications. When Covered Code is released as a series of files, a
Modification is:
A. Any addition to or deletion from the contents of a file containing Original Code or previous
Modifications.
B. Any new file that contains any part of the Original Code, or previous Modifications.
1.10. “Original Code” means Source Code of computer software code which is described in the Source
Code notice required by Exhibit A as Original Code, and which, at the time of its release under this License
is not already Covered Code governed by this License.
1.10.1. “Patent Claims” means any patent claim(s), now owned or hereafter acquired, in- cluding
without limitation, method, process, and apparatus claims, in any patent Licensable by grantor.
1.11. “Source Code” means the preferred form of the Covered Code for making modifications to it,
including all modules it contains, plus any associated interface definition files, scripts used to control
compilation and installation of an Executable, or source code differential comparisons against either the
Original Code or another well known, available Covered Code of the Contribu- tor’s choice. The Source
Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving
software is widely available for no charge.
1.12. “You” (or “Your”) means an individual or a legal entity exercising rights under, and complying
with all of the terms of, this License or a future version of this License issued under Section 6.1. For legal
entities, “You” includes any entity which controls, is controlled by, or is under common control with You.
For purposes of this definition, “control” means (a) the power, direct or indirect, to cause the direction or
management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty
percent (50%) of the outstanding shares or beneficial ownership of such entity.
2 SOURCE CODE LICENSE.
2.1. The Initial Developer Grant.
The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license, sub- ject to third
party intellectual property claims:
(a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to
use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions
thereof) with or without Modifications, and/or as part of a Larger Work; and
(b) under patents now or hereafter owned or controlled by Initial Developer, to make, have made, use
and sell (“offer to sell and import”) the Original Code, Modifications, or portions thereof, but solely to
the extent that any such patent is reasonably necessary to enable You to utilize, alone or in combination
with other software, the Original Code, Modifications, or any combination or portions thereof.
(c)
(d)
36
16 Third-Party Materials and Licenses
36
16 Third-Party Materials and Licenses
any documentation for the Source Code where You describe recipients’ rights or ownership rights relating to
Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability
obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf,
and not on behalf of the Initial Developer or any Contributor.
3.6. Distribution of Executable Versions. You may distribute Covered Code in Executable form only if the
requirements of Section 3.1-3.5 have been met for that Covered Code. You may distribute the
Executable version of Covered Code or ownership rights under a license of Your choice, which may contain
terms different from this License, provided that You are in compliance with the terms of this License and that
the license for the Executable version does not attempt to limit or alter the recipient’s rights in the Source
Code version from the rights set forth in this License. If You distribute the Executable version under a
different license You must make it absolutely clear that any terms which differ from this License are offered by
You alone, not by the Initial Developer or any Contributor. If you distribute executable versions containing
Covered Code as part of a product, you must reproduce the notice in Exhibit B in the documentation
and/or other materials provided with the product.
3.7. Larger Works. You may create a Larger Work by combining Covered Code with other code not
governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You
must make sure the requirements of this License are fulfilled for the Covered Code.
3.8. Restrictions. You may not remove any product identification, copyright, proprietary no- tices or
labels from gSOAP.
4 INABILITY TO COMPLY DUE TO STATUTE OR REGULATION.
If it is impossible for You to comply with any of the terms of this License with respect to some or all of
the Covered Code due to statute, judicial order, or regulation then You must: (a) comply with the terms of
this License to the maximum extent possible; and (b) describe the limitations and the code they affect.
Such description must be included in the LEGAL file described in Section 3.4 and must be included with
all distributions of the Source Code. Except to the extent prohibited by statute or regulation, such description
must be sufficiently detailed for a recipient of ordinary skill to be able to understand it.
5 APPLICATION OF THIS LICENSE.
This License applies to code to which the Initial Developer has attached the notice in Exhibit
A and to related Covered Code.
6 VERSIONS OF THE LICENSE.
6.1. New Versions.
Grantor may publish revised and/or new versions of the License from time to time. Each version will
be given a distinguishing version number.
6.2. Effect of New Versions.
Once Covered Code has been published under a particular version of the License, You may always
continue to use it under the terms of that version. You may also choose to use such Covered Code under
the terms of any subsequent version of the License.
6.3. Derivative Works.
If You create or use a modified version of this License (which you may only do in order to apply it to code
which is not already Covered Code governed by this License), You must (a) rename Your license so that
the phrase “gSOAP” or any confusingly similar phrase do not appear in your license (except to note that
your license differs from this License) and (b) otherwise make it clear that Your version of the license
contains terms which differ from the gSOAP Public License. (Filling in the name of the Initial Developer,
Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be
modifications of this License.)
7 DISCLAIMER OF WARRANTY.
COVERED CODE IS PROVIDED UNDER THIS LICENSE ON AN “AS IS” BASIS, WITHOUT WAR- RANTY
OF ANY KIND, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION,
THE IMPLIED WARRANTIES OF MERCHANTABILITY, OF FITNESS FOR A PARTIC- ULAR PURPOSE,
NONINFRINGEMENT OF THIRD PARTY INTELLECTUAL PROPERTY RIGHTS,
36
16 Third-Party Materials and Licenses
AND ANY WARRANTY THAT MAY ARISE BY REASON OF TRADE USAGE, CUSTOM, OR COURSE OF
DEALING. WITHOUT LIMITING THE FOREGOING, YOU ACKNOWLEDGE THAT THE SOFT- WARE IS
PROVIDED “AS IS” AND THAT THE AUTHORS DO NOT WARRANT THE SOFTWARE WILL RUN
UNINTERRUPTED OR ERROR FREE. LIMITED LIABILITY THE ENTIRE RISK AS TO RESULTS AND
PERFORMANCE OF THE SOFTWARE IS ASSUMED BY YOU. UNDER NO CIRCUMSTANCES WILL
THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDEN- TAL, EXEMPLARY OR
CONSEQUENTIAL DAMAGES OF ANY KIND OR NATURE WHATSOEVER, WHETHER BASED ON
CONTRACT, WARRANTY, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY OR OTHERWISE,
ARISING OUT OF OR IN ANY WAY RELATED TO THE SOFTWARE, EVEN IF THE AUTHORS HAVE
BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGE OR IF SUCH DAMAGE COULD HAVE BEEN
REASONABLY FORESEEN, AND NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY
EXCLUSIVE REMEDY PROVIDED. SUCH LIMI- TATION ON DAMAGES INCLUDES, BUT IS NOT LIMITED
TO, DAMAGES FOR LOSS OF GOOD- WILL, LOST PROFITS, LOSS OF DATA OR SOFTWARE, WORK
STOPPAGE, COMPUTER FAILURE OR MALFUNCTION OR IMPAIRMENT OF OTHER GOODS. IN NO
EVENT WILL THE AUTHORS BE LIABLE FOR THE COSTS OF PROCUREMENT OF SUBSTITUTE
SOFTWARE OR SERVICES. YOU ACKNOWLEDGE THAT THIS SOFTWARE IS NOT DESIGNED FOR USE
IN ON-LINE EQUIP- MENT IN HAZARDOUS ENVIRONMENTS SUCH AS OPERATION OF NUCLEAR
FACILITIES, AIR- CRAFT NAVIGATION OR CONTROL, OR LIFE-CRITICAL APPLICATIONS. THE
AUTHORS EX- PRESSLY DISCLAIM ANY LIABILITY RESULTING FROM USE OF THE SOFTWARE IN ANY
SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS AND ACCEPTS NO LIABILITY IN RE-
SPECT OF ANY ACTIONS OR CLAIMS BASED ON THE USE OF THE SOFTWARE IN ANY SUCH ON-LINE
EQUIPMENT IN HAZARDOUS ENVIRONMENTS BY YOU. FOR PURPOSES OF THIS PARAGRAPH, THE
TERM “LIFE-CRITICAL APPLICATION” MEANS AN APPLICATION IN WHICH THE FUNCTIONING OR
MALFUNCTIONING OF THE SOFTWARE MAY RESULT DIRECTLY OR INDIRECTLY IN PHYSICAL
INJURY OR LOSS OF HUMAN LIFE. THIS DISCLAIMER OF WAR- RANTY CONSTITUTES AN
ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER
EXCEPT UNDER THIS DISCLAIMER.
8 TERMINATION.
8.1.
This License and the rights granted hereunder will terminate automatically if You fail to comply with terms
herein and fail to cure such breach within 30 days of becoming aware of the breach. All sublicenses to the
Covered Code which are properly granted shall survive any termination of this License. Provisions which, by
their nature, must remain in effect beyond the termination of this License shall survive.
8.2.
8.3.
If You assert a patent infringement claim against Participant alleging that such Participant’s Contributor
Version directly or indirectly infringes any patent where such claim is resolved (such as by license or
settlement) prior to the initiation of patent infringement litigation, then the reasonable value of the licenses
granted by such Participant under Sections 2.1 or 2.2 shall be taken into account in determining the amount
or value of any payment or license.
8.4. In the event of termination under Sections 8.1 or 8.2 above, all end user license agree- ments
(excluding distributors and resellers) which have been validly granted by You or any distributor hereunder
prior to termination shall survive termination.
9 LIMITATION OF LIABILITY.
UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUD- ING
NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER
CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED CODE, OR ANY SUPPLIER OF ANY OF SUCH
PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDEN- TAL, OR
CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITA- TION, DAMAGES
FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MAL- FUNCTION, OR ANY
AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH
36
16 Third-Party Materials and Licenses
PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMI- TATION
OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RE- SULTING FROM
SUCH PARTY’S NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME
JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR
CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.
10 U.S. GOVERNMENT END USERS.
11 MISCELLANEOUS.
12 RESPONSIBILITY FOR CLAIMS.
As between Initial Developer and the Contributors, each party is responsible for claims and damages
arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with
Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is
intended or shall be deemed to constitute any admission of liability.
EXHIBIT A.
“The contents of this file are subject to the gSOAP Public License Version 1.3 (the “License”); you may
not use this file except in compliance with the License. You may obtain a copy of the License at
http://www.cs.fsu.edu/~engelen/soaplicense.html. Software distributed under the License is
distributed on an “AS IS” basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the
License for the specific language governing rights and limitations under the License.
The Original Code of the gSOAP Software is: stdsoap.h, stdsoap2.h, stdsoap.c, stdsoap2.c, stdsoap.cpp,
stdsoap2.cpp, soapcpp2.h, soapcpp2.c, soapcpp2_lex.l, soapcpp2_yacc.y, error2.h, error2.c, symbol2.c,
init2.c, soapdoc2.html, and soapdoc2.pdf, httpget.h, httpget.c, stl.h, stld- eque.h, stllist.h, stlvector.h,
stlset.h.
The Initial Developer of the Original Code is Robert A. van Engelen. Portions created by Robert A.
van Engelen are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved.
Contributor(s): “ .“ [Note: The text of this Exhibit A may differ slightly
form the text of the notices in the Source Code files of the Original code. You should use the text of this
Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.]
EXHIBIT B.
“Part of the software embedded in this product is gSOAP software. Portions created by gSOAP are
Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved. THE SOFTWARE
IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE- MENT OF SUBSTITUTE
GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSI- NESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARIS- ING IN ANY WAY OUT OF
THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBIL- ITY OF SUCH DAMAGE.“
36
16 Third-Party Materials and Licenses
Redistribution and use in source and binary forms, with or without modification, are permitted provided that
the following conditions are met:
• Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
• Redistributions in binary form must reproduce the above copyright notice, this list of con- ditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
• Neither the name of Stanford University nor the names of its contributors may be used to endorse or
promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS”
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LI- ABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
36
16 Third-Party Materials and Licenses
1. This notice is required to be provided under our contract with the U.S. Department of Energy
(DOE). This work was produced at the University of California, Lawrence Livermore National Laboratory
under Contract No. W-7405-ENG-48 with the DOE.
2. Neither the United States Government nor the University of California nor any of their employees,
makes any warranty, express or implied, or assumes any liability or responsibility for the accuracy,
completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its
use would not infringe privately-owned rights.
3. Also, reference herein to any specific commercial products, process, or services by trade name,
trademark, manufacturer or otherwise does not necessarily constitute or imply its en- dorsement,
recommendation, or favoring by the United States Government or the University of California. The views and
opinions of authors expressed herein do not necessarily state or reflect those of the United States Government
or the University of California, and shall not be used for advertising or product endorsement purposes.
36
16 Third-Party Materials and Licenses
• Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
• Redistributions in binary form must reproduce the above copyright notice, this list of con- ditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
• Neither the name of the Intel Corporation nor the names of its contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS”
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LI- ABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
36
16 Third-Party Materials and Licenses
37
16 Third-Party Materials and Licenses
This software is provided ’as-is’, without any express or implied warranty. In no event will the authors be
held liable for any damages arising from the use of this software.
Permission is granted to anyone to use this software for any purpose, including commercial applications,
and to alter it and redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original
software. If you use this software in a product, an acknowledgment in the product documentation would be
appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the
original software.
3. This notice may not be removed or altered from any source distribution.
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of con- ditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS “AS IS” AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DIS-
CLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DI- RECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (IN- CLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN- CLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of con- ditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
3. Neither the name of the University nor the names of its contributors may be used to endorse or promote
products derived from this software without specific prior written permission.
37
16 Third-Party Materials and Licenses
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS “AS IS” AND ANY
EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DIS-
CLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DI- RECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (IN- CLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (IN- CLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
37
16 Third-Party Materials and Licenses
1. Modifications to the FLTK configure script, config header file, and makefiles by themselves to support a
specific platform do not constitute a modified or derivative work.
The authors do request that such modifications be contributed to the FLTK project - send all
contributions through the “Software Trouble Report” on the following page:
http://www.fltk.org/str.php
2. Widgets that are subclassed from FLTK widgets do not constitute a derivative work.
3. Static linking of applications and widgets to the FLTK library does not constitute a deriva- tive work
and does not require the author to provide source code for the application or widget, use the shared
FLTK libraries, or link their applications or widgets against a user- supplied version of FLTK.
If you link the application or widget to a modified version of FLTK, then the changes to
FLTK must be provided under the terms of the LGPL in sections 1, 2, and 4.
4. You do not have to provide a copy of the FLTK license with programs that are linked to the FLTK
library, nor do you have to identify the FLTK license in your program or documenta- tion as required
by section 6 of the LGPL.
However, programs must still identify their use of FLTK. The following example statement can be
included in user documentation to satisfy this requirement:
[program/widget] is based in part on the work of the FLTK project (http://www.fltk.org).
37
16 Third-Party Materials and Licenses
sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to
do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or sub- stantial
portions of the Software.
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FIT- NESS
FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LI- ABILITY, WHETHER IN
AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
16.2.28.1 Introduction
The FreeType Project is distributed in several archive packages; some of them may contain, in addition to
the FreeType font engine, various tools and contributions which rely on, or relate to, the FreeType Project.
This license applies to all files found in such packages, and which do not fall under their own explicit
license. The license affects thus the FreeType font engine, the test programs, documen- tation and makefiles,
at the very least.
This license was inspired by the BSD, Artistic, and IJG (Independent JPEG Group) licenses, which all
encourage inclusion and use of free software in commercial and freeware products alike. As a
consequence, its main points are that:
• We don’t promise that this software works. However, we will be interested in any kind of bug
reports. (‘as is’ distribution)
• You can use this software for whatever you want, in parts or full form, without having to pay us.
(‘royalty-free’ usage)
• You may not pretend that you wrote this software. If you use it, or only parts of it, in a program,
you must acknowledge somewhere in your documentation that you have used the FreeType code.
(‘credits’)
37
16 Third-Party Materials and Licenses
We specifically permit and encourage the inclusion of this software, with or without modifi- cations, in
commercial products. We disclaim all warranties covering The FreeType Project and assume no liability
related to The FreeType Project.
Finally, many people asked us for a preferred form for a credit/disclaimer to use in compliance with this
license. We thus encourage you to use the following text:
Portions of this software are copyright (C) <year> The FreeType Project (www.freetype.org). All rights
reserved.
Please replace <year> with the value from the FreeType version you actually use.
• Redistribution of source code must retain this license file (‘FTL.TXT’) unaltered; any addi- tions,
deletions or changes to the original files must be clearly indicated in accompanying documentation.
The copyright notices of the unaltered, original files must be preserved in all copies of source files.
• Redistribution in binary form must provide a disclaimer that states that the software is based in part
of the work of the FreeType Team, in the distribution documentation. We also encourage you to put an
URL to the FreeType web page in your documentation, though this isn’t mandatory.
These conditions apply to any software derived from or based on the FreeType Project, not just the
unmodified files. If you use our work, you must acknowledge us. However, no fee need be paid to us.
3. Advertising
Neither the FreeType authors and contributors nor you shall use the name of the other for commercial,
advertising, or promotional purposes without specific prior written permission.
37
16 Third-Party Materials and Licenses
We suggest, but do not require, that you use one or more of the following phrases to refer to this
software in your documentation or advertising materials: ‘FreeType Project’, ‘FreeType Engine’, ‘FreeType
library’, or ‘FreeType Distribution’.
As you have not signed this license, you are not required to accept it. However, as the FreeType Project is
copyrighted material, only this license, or another one contracted with the authors, grants you the right to
use, distribute, and modify it. Therefore, by using, distributing, or mod- ifying the FreeType Project, you
indicate that you understand and accept all the terms of this license.
4. Contacts
There are two mailing lists related to FreeType:
• [email protected]
Discusses general use and applications of FreeType, as well as future and wanted additions to the library
and distribution. If you are looking for support, start in this list if you haven’t found anything to help
you in the documentation.
• [email protected]
Discusses bugs, as well as engine internals, design issues, specific licenses, porting, etc.
Our home page can be found at
http://www.freetype.org
37
16 Third-Party Materials and Licenses
• Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
• Redistributions in binary form must reproduce the above copyright notice, this list of con- ditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
• Neither the name of Internet Society, IETF or IETF Trust, nor the names of specific con- tributors,
may be used to endorse or promote products derived from this software without specific prior written
permission.
• Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
• Redistributions in binary form must reproduce the above copyright notice, this list of con- ditions and
the following disclaimer in the documentation and/or other materials provided with the distribution.
• Neither the name of the copyright holder nor the names of its contributors may be used to endorse
or promote products derived from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ”AS IS”
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LI- ABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
37
17 Oracle VM VirtualBox Privacy
Information
Version 5, Dec 13, 2012
The Oracle Privacy Policies posted on https://www.oracle.com/legal/privacy/
privacy-policy.html apply to your personal data collected and used by Oracle. The following privacy
information describes in more detail which information is exchanged between the Oracle VM VirtualBox
application and Oracle, and which information is collected by the virtualbox.org website.
§ 1 virtualbox.org. The “virtualbox.org” website logs anonymous usage information such as your IP
address, geographical location, browser type, referral source, length of visit and number of page views while
you visit (collectively, “anonymous data”). In addition, but only if you choose to register, the website’s
bug tracking and forum services store the data you choose to reveal upon registration, such as your user
name and contact information.
§ 2 Cookies. The virtualbox.org website, the bug tracker and the forum services use cookies to identify
and track the visiting web browser and, if you have registered, to facilitate login. Most browsers allow you
to refuse to accept cookies. While you can still visit the website with cookies disabled, logging into the bug
tracker and forum services will most likely not work without them.
§ 3 Oracle VM VirtualBox registration process. The Oracle VM VirtualBox application may ask
that the user optionally register with Oracle. If you choose to register, your name, e-mail ad- dress, country
and company will be submitted to Oracle and stored together with the IP address of the submitter as well as
product version and platform being used.
§ 4 Update notifications. The Oracle VM VirtualBox application may contact Oracle to find out
whether a new version of Oracle VM VirtualBox has been released and notify the user if that is the case.
In the process, anonymous data such as your IP address and a non-identifying counter, together with the
product version and the platform being used, is sent so that the server can find out whether an update is
available. By default, this check is performed once a day. You change this interval or disable these checks
altogether in the Oracle VM VirtualBox preferences.
§ 5 Usage of personal information. Oracle may use anonymous and personal data collected by the
means above for statistical purposes as well as to automatically inform you about new notices related to
your posts on the bug tracker and forum services, to administer the website and to contact you due to
technical issues. Oracle may also inform you about new product releases related to Oracle VM
VirtualBox.
In no event will personal data without your express consent be provided to any third parties, unless Oracle
may be required to do so by law or in connection with legal proceedings.
§ 6 Updates. Oracle may update the privacy policy at any time by posting a new version at
https://www.oracle.com/legal/privacy/privacy-policy.html and the privacy informa-
tion will be kept up to date in the documentation which comes with the Oracle VM VirtualBox ap- plication.
You should check these places occasionally to ensure you are happy with any changes.
37
Glossary
A
ACPI Advanced Configuration and Power Interface, an industry specification for BIOS and hard- ware
extensions to configure PC hardware and perform power management. Windows
2000 and later, as well as Linux 2.4 and later support ACPI. Windows can only enable or disable
ACPI support at installation time.
AHCI Advanced Host Controller Interface, the interface that supports SATA devices such as hard disks. See
chapter 5.1, Hard Disk Controllers, page 88.
AMD-V The hardware virtualization features built into modern AMD processors. See chapter
10.3, Hardware Virtualization, page 305.
API Application Programming Interface.
APIC Advanced Programmable Interrupt Controller, a newer version of the original PC PIC (pro- grammable
interrupt controller). Most modern CPUs contain an on-chip APIC, called a local APIC. Many
systems also contain an I/O APIC (input output APIC) as a separate chip which provides more than 16
IRQs. Windows 2000 and later use a different kernel if they detect an I/O APIC during installation.
Therefore, an I/O APIC must not be removed after installation.
ATA Advanced Technology Attachment, an industry standard for hard disk interfaces which is synonymous
with IDE. See chapter 5.1, Hard Disk Controllers, page 88.
B
BIOS Basic Input/Output System, the firmware built into most personal computers which is responsible
of initializing the hardware after the computer has been turned on and then booting an operating
system. Oracle VM VirtualBox ships with its own virtual BIOS that runs when a virtual machine is
started.
C
COM Microsoft Component Object Model, a programming infrastructure for modular software.
COM enables applications to provide application programming interfaces which can be ac- cessed from
various other programming languages and applications. Oracle VM VirtualBox makes use of COM both
internally and externally to provide a comprehensive API to 3rd party developers.
D
DHCP Dynamic Host Configuration Protocol. This enables a networking device in a network to acquire its
IP address and other networking details automatically, in order to avoid having
37
Glossar
to configure all devices in a network with fixed IP addresses. Oracle VM VirtualBox has a built-in
DHCP server that delivers an IP addresses to a virtual machine when networking is configured to NAT.
See chapter 6, Virtual Networking, page 104.
E
EFI Extensible Firmware Interface, a firmware built into computers which is designed to replace the aging
BIOS. Originally designed by Intel, most modern operating systems can now boot on computers
which have EFI instead of a BIOS built into them. See chapter 3.14, Alternative Firmware (EFI),
page 63.
EHCI Enhanced Host Controller Interface, the interface that implements the USB 2.0 standard.
G
GUI Graphical User Interface. Commonly used as an antonym to a “command line interface”. In the context
of Oracle VM VirtualBox, we sometimes refer to the main graphical VirtualBox program as the
“GUI”, to differentiate it from the VBoxManage interface.
GUID See UUID.
I
IDE Integrated Drive Electronics, an industry standard for hard disk interfaces. See chapter 5.1,
Hard Disk Controllers, page 88.
I/O APIC See APIC.
iSCSI Internet SCSI. See chapter 5.10, iSCSI Servers, page 100.
M
MAC Media Access Control, a part of an Ethernet network card. A MAC address is a 6-byte number
which identifies a network card. It is typically written in hexadecimal notation where the bytes are
separated by colons, such as 00:17:3A:5E:CB:08.
MSI Message Signaled Interrupts, as supported by modern chipsets such as the ICH9. See chap- ter 3.5.1,
Motherboard Tab, page 52. As opposed to traditional pin-based interrupts, with MSI, a small amount of
data can accompany the actual interrupt message. This reduces the amount of hardware pins required and
allows for more interrupts and better performance.
N
NAT Network Address Translation. A technique to share networking interfaces by which an interface
modifies the source and/or target IP addresses of network packets according to specific rules.
Commonly employed by routers and firewalls to shield an internal network from the Internet, Oracle
VM VirtualBox can use NAT to easily share a host’s physical net- working hardware with its virtual
machines. See chapter 6.3, Network Address Translation (NAT), page 106.
38
Glossar
O
OVF Open Virtualization Format, a cross-platform industry standard to exchange virtual appli- ances
between virtualization products. See chapter 1.14, Importing and Exporting Virtual Machines, page 21.
P
PAE Physical Address Extension. This enables access to more than 4 GB of RAM, even in 32-bit
environments. See chapter 3.4.2, Advanced Tab, page 50.
PIC See APIC.
PXE Preboot Execution Environment, an industry standard for booting PC systems from remote network
locations. It includes DHCP for IP configuration and TFTP for file transfer. Using UNDI, a hardware
independent driver stack for accessing the network card from bootstrap code is available.
R
RDP Remote Desktop Protocol, a protocol developed by Microsoft as an extension to the ITU T.128
and T.124 video conferencing protocol. With RDP, a PC system can be controlled from a remote
location using a network connection over which data is transferred in both directions. Typically
graphics updates and audio are sent from the remote machine and keyboard and mouse input events
are sent from the client. An Oracle VM VirtualBox ex- tension package by Oracle provides VRDP,
an enhanced implementation of the relevant standards which is largely compatible with Microsoft’s
RDP implementation. See chapter
7.1, Remote Display (VRDP Support), page 116 for details.
S
SAS Serial Attached SCSI, an industry standard for hard disk interfaces. See chapter 5.1, Hard
Disk Controllers, page 88.
SATA Serial ATA, an industry standard for hard disk interfaces. See chapter 5.1, Hard Disk
Controllers, page 88.
SCSI Small Computer System Interface. An industry standard for data transfer between devices, especially for
storage. See chapter 5.1, Hard Disk Controllers, page 88.
SMP Symmetrical Multiprocessing, meaning that the resources of a computer are shared be- tween
several processors. These can either be several processor chips or, as is more com- mon with modern
hardware, multiple CPU cores in one processor.
SSD Solid-state drive, uses microchips for storing data in a computer system. Compared to classical
hard-disks they are having no mechanical components like spinning disks.
T
TAR A widely used file format for archiving. Originally, this stood for Tape ARchive and was already
supported by very early UNIX versions for backing up data on tape. The file format
38
Glossar
is still widely used today. For example, with OVF archives using an .ova file extension. See chapter
1.14, Importing and Exporting Virtual Machines, page 21.
U
UUID A Universally Unique Identifier, often also called GUID (Globally Unique Identifier). A UUID is a
string of numbers and letters which can be computed dynamically and is guar- anteed to be unique.
Generally, it is used as a global handle to identify entities. Oracle VM VirtualBox makes use of UUIDs
to identify VMs, Virtual Disk Images (VDI files), and other entities.
V
VM Virtual Machine. A virtual computer that Oracle VM VirtualBox enables you to run on top of your actual
hardware. See chapter 1.2, Some Terminology, page 2 for details.
VMM Virtual Machine Manager. The component of Oracle VM VirtualBox that controls VM
execution. See chapter 10.2, Oracle VM VirtualBox Executables and Components, page 303 for a list of
Oracle VM VirtualBox components.
VRDE VirtualBox Remote Desktop Extension. This interface is built into Oracle VM VirtualBox to allow
Oracle VM VirtualBox extension packages to supply remote access to virtual ma- chines. An Oracle
VM VirtualBox extension package by Oracle provides VRDP support. See chapter 7.1, Remote Display
(VRDP Support), page 116.
VRDP See RDP.
VT-x The hardware virtualization features built into modern Intel processors. See chapter 10.3,
Hardware Virtualization, page 305.
X
xHCI eXtended Host Controller Interface, the interface that implements the USB 3.0 standard.
XML The eXtensible Markup Language, a metastandard for all kinds of textual information. XML only
specifies how data in the document is organized generally and does not prescribe how to semantically
organize content.
XPCOM Mozilla Cross Platform Component Object Model, a programming infrastructure de- veloped by
the Mozilla browser project which is similar to Microsoft COM and enables applications to
provide a modular programming interface. Oracle VM VirtualBox makes use of XPCOM on Linux
both internally and externally to provide a comprehensive API to third-party developers.
38