-
Notifications
You must be signed in to change notification settings - Fork 0
Virtualbox issue History
Per usual Microsoft Windows is a mess and it is hard to know for sure what is what.
What we need to know is not only if AMD SVM is enabled but also if Microsoft Virtualisation Based Security is disabled. Take note this imposes a real security downgrade.
run
msinfo32.cpl
and watch for **virtualisation based security** and see if is being executed or is enabled.
The AMD Ryzen Master software the AMD Ryzen homepage does NOT run with VBS enabled which is how I found about about VBS (virtualisation based security) still being enabled despite disablying the hypervisorallocation and stopping all Hyper-V services.
At this point, i am quite certain it is VBS which stops VirtualBox from running 64 bit machines. (18/08/2018)
- Possible interplay with Hyper-V (disable all hyper-v services by setting them to manual or disable)
- Possible interplay with Microsoft Windows Defender or other Anti Virus
- One one forums a bios version is reported to actually disable svm when enabled is selected, sigh
- Unclear real root causes, most likely bugs
This page has valuable information
The FAQ page contains a number of clues which are well thought.
The additional notes copied below are reliable and worth testing
Additional Notes for Windows Hosts ( check and/or correct both, then reboot)
-
To check the status of Hyper-v in Windows 10, | Run | OptionalFeatures.exe, and look for the "Hyper-V" option. The box should be empty, not checked or shaded. If you want to be absolutely sure that Hyper-v is gone then open an administrator command console and type "bcdedit /set hypervisorlaunchtype off". Make sure to fully power down and reboot the host after changing the Hyper-v setting.
-
On some Windows hosts with an EFI BIOS, DeviceGuard or CredentialGuard may be active by default, and interferes with OS level virtualization apps in the same way that Hyper-v does. These features need to be disabled. On Pro versions of Windows you can do this using gpedit.msc (set Local Computer Policy > Computer Configuration > Administrative Templates > System > Device Guard > Turn on Virtualization Based Security to Disabled. CredentialGuard should be similar. On non-Pro version of Windows you'll need to Google for the equivalent registry hacks.
Go to programs, select virtualbox and choose to change it, then select repair, then reboot
Resource: https://download.virtualbox.org/virtualbox/
-
Download the VirtualBox executable of choice and open a cmd shell on the download location
-
Extract the executable from cmd ( Virtualbox....exe -extract)
-
cd %HOMEPATH%\Local Settings\Temp\VirtualBox
make sure you are at the right drive where %HOMEPATH% is located
cd to the appropriate drive letter if you do not see the virtualbox installers (x86 and amd64 files)
Regarding the .msi file various options are possible
use msiexec to execute the .msi file
The installation option will fresh install or offer to repair or remove
msiexec /i VirtualBox-.....-MultiArch_amd64.msi
The option to reinstall also has various options
msiexec /fa VirtualBox-.....-MultiArch_amd64.msi
will perform a full reinstall, a reboot is suggested
msiexec /fu VirtualBox-.....-MultiArch_amd64.msi
will repair the registry settings, a reboot is suggested
In case you like to investigate
msiexec /?
show all extra options
welcome to the blues, commandline.be at your service