Custom Query (16363 matches)
Results (1183 - 1185 of 16363)
| Ticket | Resolution | Summary | Owner | Reporter |
|---|---|---|---|---|
| #5418 | invalid | no xinput support for X.org X11R7.5 | ||
| Description |
The vboxmouse_drv input driver can't be used with latest official X11R7.5 release. It (vboxmouse_drv_16.so) fails with: module abi major version (4) doesn't match the server's version (7) |
|||
| #9178 | fixed | no window repaint under Gnome Shell / Fedora 15 | ||
| Description |
I am running VirtualBox 4.0.10 on a RHEL 5 host, with Fedora 15 as the guest. VirtualBox's 3D support is good enough that I can use Gnome Shell in my guest login session. However, if a host OS window partially obscures VirtualBox's window, and then the VirtualBox window is exposed again, the VirtualBox window contents are not repainted. Instead, I am left with afterimages of the other host OS window that had previously been atop VirtualBox's window. This is especially extreme if the other host OS window is dragged across VirtualBox's window: it leaves a trail of host OS window afterimages behind where I should instead be seeing the virtual guest's video display. Restoring the display to sanity requires doing something inside the host OS that causes a full screen repaint, such as bringing up the Gnome Shell Activities display. This only happens when using the 3D-based Gnome Shell. If I use the non-3D-based fallback session (essentially, Gnome Panel), then VirtualBox does refresh its window properly. |
|||
| #3054 | fixed | no way to limit outgoing IP traffic from a VM | ||
| Description |
It appears that VirtualBox does not provide a way to limit the outgoing access from an app inside a VM. This means that other mechanisms must be found to (say) keep an app from spamming the host OS. If so, this is an unfortunate deficiency. On OSX, the "sandbox" facility can be used to limit the IP access of an app, so I'll try to run VB under it. On Linux, however, the best answer I've found is to run iptables on the guest OS. This seems wrong, philosophically, because it is conceivable that the guest OS could be compromised by a malicious app. Please consider putting in some configuration features that will allow a VM to be held to a sharply limited set of outgoing IP addresses and ports. BTW, although my need is related to the use of Debian Linux and iptables, the problem is not specific to the guest OS. |
|||

