VirtualBox

Custom Query (16363 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (1183 - 1185 of 16363)

Ticket Resolution Summary Owner Reporter
#5418 invalid no xinput support for X.org X11R7.5 Fryderyk Dziarmagowski
Description

The vboxmouse_drv input driver can't be used with latest official X11R7.5 release. It (vboxmouse_drv_16.so) fails with: module abi major version (4) doesn't match the server's version (7)

#9178 fixed no window repaint under Gnome Shell / Fedora 15 Ben Liblit
Description

I am running VirtualBox 4.0.10 on a RHEL 5 host, with Fedora 15 as the guest. VirtualBox's 3D support is good enough that I can use Gnome Shell in my guest login session. However, if a host OS window partially obscures VirtualBox's window, and then the VirtualBox window is exposed again, the VirtualBox window contents are not repainted. Instead, I am left with afterimages of the other host OS window that had previously been atop VirtualBox's window. This is especially extreme if the other host OS window is dragged across VirtualBox's window: it leaves a trail of host OS window afterimages behind where I should instead be seeing the virtual guest's video display.

Restoring the display to sanity requires doing something inside the host OS that causes a full screen repaint, such as bringing up the Gnome Shell Activities display.

This only happens when using the 3D-based Gnome Shell. If I use the non-3D-based fallback session (essentially, Gnome Panel), then VirtualBox does refresh its window properly.

#3054 fixed no way to limit outgoing IP traffic from a VM Rich Morin
Description

It appears that VirtualBox does not provide a way to limit the outgoing access from an app inside a VM. This means that other mechanisms must be found to (say) keep an app from spamming the host OS. If so, this is an unfortunate deficiency.

On OSX, the "sandbox" facility can be used to limit the IP access of an app, so I'll try to run VB under it. On Linux, however, the best answer I've found is to run iptables on the guest OS. This seems wrong, philosophically, because it is conceivable that the guest OS could be compromised by a malicious app.

Please consider putting in some configuration features that will allow a VM to be held to a sharply limited set of outgoing IP addresses and ports. BTW, although my need is related to the use of Debian Linux and iptables, the problem is not specific to the guest OS.

Batch Modify
Note: See TracBatchModify for help on using batch modify.
Note: See TracQuery for help on using queries.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy