VirtualBox

Custom Query (16363 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (880 - 882 of 16363)

Ticket Resolution Summary Owner Reporter
#7724 obsolete Animated Cursors Flicker, Jump, Bounce, etc. Mac Host louis
Description

This has been an ongoing problem with the Mac version of VirtualBox for as long as I can remember. There was a ticket about this issue by a user running a WIndows host a year ago which is closed. It still seems to be a problem with Mac hosts. At least my Mac. Every Linux guest I have ever installed that uses an animated cursor, jumps or bounces, or however you would like to describe it. It only happens once the guest additions are installed. Live CDs do not exhibit this behavior, except the few that come with OSE additions pre-installed. It also seems Linux specific because I also have a Windows XP guest and it doesn't have the same symptoms.

I am running VB 3.2.10 and Mac OSX 10.6.5 currently but it has been ongoing for at least a year.

#15770 fixed Anniversary update incompatibility / the instuction at ... referenced memory 0x0000000000000020. The memory could not be read Frank Bevers
Description

A quick way of REPLICATING this (for me) on my W10/64bit host with anniversay update & VB up to version 5.1.3 /build 109780 is to simply close a vm window & then select "power off the machine" in the popup window. I tested with W7 & W8.1 vm's , even with freshly created vm's.

Under normal working circumstances the error occurs USUALLY when I shutdown a vm from within the vm itself (orderly shutdown)

I tried reverting to an older build as well (5.0.26) and it has the same issue so it must be an incompatibility caused by the W10 anniversary update I guess.

#21398 duplicate Annoying DebugBreak (int 3) inside VBOXMRXNP.dll StSlam
Description

In the process of debugging my application, when working with WindowsAPI, an annoying debugger stop occurs due to the fact that your dll causes an int3 interrupt (i.e. DebugBreak) For example, when trying to expand the "Folders" combo box in the TOpenDialog

screenshot1: https://i.gyazo.com/ee0a4157b38510ee751f722eb1534670.png

screenshot2: https://i.gyazo.com/bbc8561a15a3634b30065c011c112564.png

EventLog: Thread Start: Thread ID: 0x000008A4. Process Project1.exe (0x8B4) Process Start: C:\Windows\system32\Project1.exe. Base Address: 0x00400000. Process Project1.exe (0x8B4) Module Load: Project1.exe. Has Debug Info. Base Address: 0x00400000. Process Project1.exe (0x8B4) Module Load: ntdll.dll. No Debug Info. Base Address: 0x77440000. Process Project1.exe (0x8B4) Module Load: KERNEL32.dll. No Debug Info. Base Address: 0x75670000. Process Project1.exe (0x8B4) Module Load: KERNELBASE.dll. No Debug Info. Base Address: 0x75420000. Process Project1.exe (0x8B4) Module Load: vcl60.bpl. No Debug Info. Base Address: 0x400B0000. Process Project1.exe (0x8B4) Module Load: rtl60.bpl. No Debug Info. Base Address: 0x40000000. Process Project1.exe (0x8B4) Module Load: USER32.dll. No Debug Info. Base Address: 0x75B20000. Process Project1.exe (0x8B4) Module Load: GDI32.dll. No Debug Info. Base Address: 0x75EF0000. Process Project1.exe (0x8B4) Module Load: LPK.dll. No Debug Info. Base Address: 0x75A90000. Process Project1.exe (0x8B4) Module Load: USP10.dll. No Debug Info. Base Address: 0x775A0000. Process Project1.exe (0x8B4) Module Load: msvcrt.dll. No Debug Info. Base Address: 0x758A0000. Process Project1.exe (0x8B4) Module Load: ADVAPI32.dll. No Debug Info. Base Address: 0x75E30000. Process Project1.exe (0x8B4) Module Load: SECHOST.dll. No Debug Info. Base Address: 0x75640000. Process Project1.exe (0x8B4) Module Load: RPCRT4.dll. No Debug Info. Base Address: 0x75950000. Process Project1.exe (0x8B4) Module Load: OLEAUT32.dll. No Debug Info. Base Address: 0x75780000. Process Project1.exe (0x8B4) Module Load: ole32.dll. No Debug Info. Base Address: 0x754E0000. Process Project1.exe (0x8B4) Module Load: MPR.dll. No Debug Info. Base Address: 0x74720000. Process Project1.exe (0x8B4) Module Load: WSOCK32.dll. No Debug Info. Base Address: 0x71140000. Process Project1.exe (0x8B4) Module Load: WS2_32.dll. No Debug Info. Base Address: 0x76540000. Process Project1.exe (0x8B4) Module Load: NSI.dll. No Debug Info. Base Address: 0x75EE0000. Process Project1.exe (0x8B4) Module Load: VERSION.dll. No Debug Info. Base Address: 0x74710000. Process Project1.exe (0x8B4) Module Load: COMCTL32.dll. No Debug Info. Base Address: 0x6E090000. Process Project1.exe (0x8B4) Module Load: WINSPOOL.DRV. No Debug Info. Base Address: 0x702B0000. Process Project1.exe (0x8B4) Module Load: COMDLG32.dll. No Debug Info. Base Address: 0x75AA0000. Process Project1.exe (0x8B4) Module Load: SHLWAPI.dll. No Debug Info. Base Address: 0x75840000. Process Project1.exe (0x8B4) Module Load: SHELL32.dll. No Debug Info. Base Address: 0x76650000. Process Project1.exe (0x8B4) Module Load: oledlg.dll. No Debug Info. Base Address: 0x6E070000. Process Project1.exe (0x8B4) Module Load: borlndmm.dll. No Debug Info. Base Address: 0x01190000. Process Project1.exe (0x8B4) Module Load: cc3260mt.dll. No Debug Info. Base Address: 0x32600000. Process Project1.exe (0x8B4) Module Load: IMM32.dll. No Debug Info. Base Address: 0x75820000. Process Project1.exe (0x8B4) Module Load: MSCTF.dll. No Debug Info. Base Address: 0x76580000. Process Project1.exe (0x8B4) Module Load: UxTheme.dll. No Debug Info. Base Address: 0x73B70000. Process Project1.exe (0x8B4) Module Load: BORdbk61.dll. No Debug Info. Base Address: 0x01A10000. Process Project1.exe (0x8B4) Module Load: dwmapi.dll. No Debug Info. Base Address: 0x73870000. Process Project1.exe (0x8B4) Module Load: COMCTL32.dll. No Debug Info. Base Address: 0x73BF0000. Process Project1.exe (0x8B4) Module Load: CRYPTBASE.dll. No Debug Info. Base Address: 0x750D0000. Process Project1.exe (0x8B4) Module Load: CLBCatQ.DLL. No Debug Info. Base Address: 0x75A00000. Process Project1.exe (0x8B4) Module Load: tiptsf.dll. No Debug Info. Base Address: 0x6EFA0000. Process Project1.exe (0x8B4) Module Load: WindowsCodecs.dll. No Debug Info. Base Address: 0x733F0000. Process Project1.exe (0x8B4) Module Load: apphelp.dll. No Debug Info. Base Address: 0x75080000. Process Project1.exe (0x8B4) Module Load: EhStorAPI.DLL. No Debug Info. Base Address: 0x6F8A0000. Process Project1.exe (0x8B4) Module Load: SETUPAPI.dll. No Debug Info. Base Address: 0x772A0000. Process Project1.exe (0x8B4) Module Load: CFGMGR32.dll. No Debug Info. Base Address: 0x75490000. Process Project1.exe (0x8B4) Module Load: DEVOBJ.dll. No Debug Info. Base Address: 0x75470000. Process Project1.exe (0x8B4) Module Load: PROPSYS.dll. No Debug Info. Base Address: 0x74050000. Process Project1.exe (0x8B4) Module Load: CSCUI.dll. No Debug Info. Base Address: 0x6F830000. Process Project1.exe (0x8B4) Module Load: CSCDLL.dll. No Debug Info. Base Address: 0x6F820000. Process Project1.exe (0x8B4) Module Load: CSCAPI.dll. No Debug Info. Base Address: 0x6F810000. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x0000074C. Process Project1.exe (0x8B4) Module Load: ntshrui.dll. No Debug Info. Base Address: 0x6F7A0000. Process Project1.exe (0x8B4) Module Load: srvcli.dll. No Debug Info. Base Address: 0x74FD0000. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x00000790. Process Project1.exe (0x8B4) Module Load: slc.dll. No Debug Info. Base Address: 0x73670000. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x0000068C. Process Project1.exe (0x8B4) Module Load: NTMARTA.dll. No Debug Info. Base Address: 0x746B0000. Process Project1.exe (0x8B4) Module Load: WLDAP32.dll. No Debug Info. Base Address: 0x77640000. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x00000FE4. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x0000071C. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x000007EC. Process Project1.exe (0x8B4) Module Load: XmlLite.dll. No Debug Info. Base Address: 0x73840000. Process Project1.exe (0x8B4) Module Load: LINKINFO.dll. No Debug Info. Base Address: 0x6F8F0000. Process Project1.exe (0x8B4) Module Load: CRYPTSP.dll. No Debug Info. Base Address: 0x74B70000. Process Project1.exe (0x8B4) Module Load: RSAENH.dll. No Debug Info. Base Address: 0x74900000. Process Project1.exe (0x8B4) Module Load: RpcRtRemote.dll. No Debug Info. Base Address: 0x75140000. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x00000704. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x00000680. Process Project1.exe (0x8B4) Module Load: SearchFolder.dll. No Debug Info. Base Address: 0x6DEB0000. Process Project1.exe (0x8B4) Module Load: profapi.dll. No Debug Info. Base Address: 0x751B0000. Process Project1.exe (0x8B4) Module Load: StructuredQuery.dll. No Debug Info. Base Address: 0x71600000. Process Project1.exe (0x8B4) Module Load: Secur32.dll. No Debug Info. Base Address: 0x75040000. Process Project1.exe (0x8B4) Module Load: SspiCli.dll. No Debug Info. Base Address: 0x75060000. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x00000A38. Process Project1.exe (0x8B4) Module Load: mssprxy.dll. No Debug Info. Base Address: 0x72FD0000. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x00000460. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x00000F98. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x00000CF0. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x000007B0. Process Project1.exe (0x8B4) Thread Exit: Thread ID: 0x00000F98. Process Project1.exe (0x8B4) Thread Exit: Thread ID: 0x00000460. Process Project1.exe (0x8B4) Module Load: thumbcache.dll. No Debug Info. Base Address: 0x71810000. Process Project1.exe (0x8B4) Module Load: PSAPI.DLL. No Debug Info. Base Address: 0x77590000. Process Project1.exe (0x8B4) Module Load: SHDOCVW.dll. No Debug Info. Base Address: 0x6F900000. Process Project1.exe (0x8B4) Module Load: IEFRAME.dll. No Debug Info. Base Address: 0x6D150000. Process Project1.exe (0x8B4) Module Load: api-ms-win-downlevel-advapi32-l1-1-0.dll. No Debug Info. Base Address: 0x75330000. Process Project1.exe (0x8B4) Module Load: api-ms-win-downlevel-shlwapi-l1-1-0.dll. No Debug Info. Base Address: 0x754C0000. Process Project1.exe (0x8B4) Module Load: api-ms-win-downlevel-user32-l1-1-0.dll. No Debug Info. Base Address: 0x75340000. Process Project1.exe (0x8B4) Module Load: api-ms-win-downlevel-shell32-l1-1-0.dll. No Debug Info. Base Address: 0x71A60000. Process Project1.exe (0x8B4) Module Load: api-ms-win-downlevel-version-l1-1-0.dll. No Debug Info. Base Address: 0x75410000. Process Project1.exe (0x8B4) Module Load: api-ms-win-downlevel-normaliz-l1-1-0.dll. No Debug Info. Base Address: 0x75400000. Process Project1.exe (0x8B4) Module Load: Normaliz.dll. No Debug Info. Base Address: 0x75660000. Process Project1.exe (0x8B4) Module Load: iertutil.dll. No Debug Info. Base Address: 0x75BF0000. Process Project1.exe (0x8B4) Module Load: USERENV.dll. No Debug Info. Base Address: 0x75350000. Process Project1.exe (0x8B4) Module Load: WINHTTP.dll. No Debug Info. Base Address: 0x72860000. Process Project1.exe (0x8B4) Module Load: webio.dll. No Debug Info. Base Address: 0x72640000. Process Project1.exe (0x8B4) Module Load: api-ms-win-downlevel-shlwapi-l2-1-0.dll. No Debug Info. Base Address: 0x71800000. Process Project1.exe (0x8B4) Thread Start: Thread ID: 0x00000870. Process Project1.exe (0x8B4) Module Load: samcli.dll. No Debug Info. Base Address: 0x730F0000. Process Project1.exe (0x8B4) Module Load: SAMLIB.dll. No Debug Info. Base Address: 0x73BB0000. Process Project1.exe (0x8B4) Module Load: netutils.dll. No Debug Info. Base Address: 0x736E0000. Process Project1.exe (0x8B4) Module Load: VBOXMRXNP.dll. No Debug Info. Base Address: 0x74600000. Process Project1.exe (0x8B4)

Batch Modify
Note: See TracBatchModify for help on using batch modify.
Note: See TracQuery for help on using queries.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy