[Whonix-devel] [Oracle VM VirtualBox] #17987: VirtualBox 5.2.18 vulnerable to spectre/meltdown despite microcode being installed
Oracle VM VirtualBox
trac at virtualbox.org
Fri Sep 14 22:18:58 CEST 2018
#17987: VirtualBox 5.2.18 vulnerable to spectre/meltdown despite microcode being
installed
-------------------------------+--------------------------------------------
Reporter: adrelanos | Owner:
Type: defect | Status: reopened
Priority: major | Component: other
Version: VirtualBox 5.2.18 | Resolution:
Keywords: | Guest type: Linux
Host type: Linux |
-------------------------------+--------------------------------------------
Comment (by adrelanos):
Debian host.
{{{
root at user :/home/user# spectre-meltdown-checker --paranoid ; echo $?
Spectre and Meltdown mitigation detection tool v0.39
Checking for vulnerabilities on current system
Kernel is Linux 4.9.0-8-amd64 #1 SMP Debian 4.9.110-3+deb9u4 (2018-08-21)
x86_64
CPU is Intel(R) Core(TM) i5 CPU M 580 @ 2.67GHz
Hardware check
* Hardware support (CPU microcode) for mitigation techniques
* Indirect Branch Restricted Speculation (IBRS)
* SPEC_CTRL MSR is available: YES
* CPU indicates IBRS capability: YES (SPEC_CTRL feature bit)
* Indirect Branch Prediction Barrier (IBPB)
* PRED_CMD MSR is available: YES
* CPU indicates IBPB capability: YES (SPEC_CTRL feature bit)
* Single Thread Indirect Branch Predictors (STIBP)
* SPEC_CTRL MSR is available: YES
* CPU indicates STIBP capability: YES (Intel STIBP feature bit)
* Speculative Store Bypass Disable (SSBD)
* CPU indicates SSBD capability: YES (Intel SSBD)
* Enhanced IBRS (IBRS_ALL)
* CPU indicates ARCH_CAPABILITIES MSR availability: NO
* ARCH_CAPABILITIES MSR advertises IBRS_ALL capability: NO
* CPU explicitly indicates not being vulnerable to Meltdown (RDCL_NO):
NO
* CPU explicitly indicates not being vulnerable to Variant 4 (SSB_NO):
NO
* Hypervisor indicates host CPU might be vulnerable to RSB underflow
(RSBA): NO
* CPU microcode is known to cause stability problems: NO (model 0x25
family 0x6 stepping 0x5 ucode 0x7 cpuid 0x20655)
* CPU vulnerability to the speculative execution attack variants
* Vulnerable to Variant 1: YES
* Vulnerable to Variant 2: YES
* Vulnerable to Variant 3: YES
* Vulnerable to Variant 3a: YES
* Vulnerable to Variant 4: YES
CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Mitigated according to the /sys interface: YES (Mitigation: __user
pointer sanitization)
* Kernel has array_index_mask_nospec: YES (1 occurrence(s) found of x86
64 bits array_index_mask_nospec())
* Kernel has the Red Hat/Ubuntu patch: NO
* Kernel has mask_nospec64 (arm64): NO
> STATUS: NOT VULNERABLE (Mitigation: __user pointer sanitization)
CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigated according to the /sys interface: YES (Mitigation: Full
generic retpoline, IBPB, IBRS_FW)
* Mitigation 1
* Kernel is compiled with IBRS support: YES
* IBRS enabled and active: YES (for kernel and firmware code)
* Kernel is compiled with IBPB support: YES
* IBPB enabled and active: YES
* Mitigation 2
* Kernel has branch predictor hardening (arm): NO
* Kernel compiled with retpoline option: YES
* Kernel compiled with a retpoline-aware compiler: YES (kernel
reports full retpoline compilation)
> STATUS: NOT VULNERABLE (Full retpoline + IBPB are mitigating the
vulnerability)
CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Mitigated according to the /sys interface: YES (Mitigation: PTI)
* Kernel supports Page Table Isolation (PTI): YES
* PTI enabled and active: YES
* Reduced performance impact of PTI: YES (CPU supports PCID,
performance impact of PTI will be reduced)
* Running as a Xen PV DomU: NO
> STATUS: NOT VULNERABLE (Mitigation: PTI)
CVE-2018-3640 [rogue system register read] aka 'Variant 3a'
* CPU microcode mitigates the vulnerability: YES
> STATUS: NOT VULNERABLE (your CPU microcode mitigates the
vulnerability)
CVE-2018-3639 [speculative store bypass] aka 'Variant 4'
* Mitigated according to the /sys interface: YES (Mitigation:
Speculative Store Bypass disabled via prctl and seccomp)
* Kernel supports speculation store bypass: YES (found in
/proc/self/status)
> STATUS: NOT VULNERABLE (Mitigation: Speculative Store Bypass disabled
via prctl and seccomp)
Need more detailed information about mitigation options? Use --explain
A false sense of security is worse than no security at all, see
--disclaimer
0
root at user :/home/user#
}}}
Debian guest VM.
{{{
user at debian :~$ su
Password:
root at debian :/home/user# spectre-meltdown-checker --paranoid -v -v -v
Spectre and Meltdown mitigation detection tool v0.39
(debug) attempted to load module cpuid, insmod_cpuid=1
(debug) cpuid: leaf1 on cpu0, eax-ebx-ecx-edx: 132693 2048
2151154185 126614527
(debug) cpuid: wanted register (1) has value 132693 aka 00020655
(debug) cpuid: shifted value by 0 is 132693 aka 20655
(debug) cpuid: after AND 0xFFFFFFFF, final value is 132693 aka 20655
Checking for vulnerabilities on current system
Kernel is Linux 4.9.0-8-amd64 #1 SMP Debian 4.9.110-3+deb9u4 (2018-08-21)
x86_64
CPU is Intel(R) Core(TM) i5 CPU M 580 @ 2.67GHz
(debug) found opt_kernel=/boot/vmlinuz-4.9.0-8-amd64 in /proc/cmdline
(debug) opt_kernel is now /boot/vmlinuz-4.9.0-8-amd64
Will use kernel image /boot/vmlinuz-4.9.0-8-amd64
Will use kconfig /boot/config-4.9.0-8-amd64
Will use System.map file /proc/kallsyms
(debug) check_kernel: ret=0 size=4237088 sections=0 warnings=readelf:
Error: Not an ELF file - it has the wrong magic bytes at the start/
(debug) check_kernel: ... file is invalid
(debug) try_decompress: looking for gunzip magic in
/boot/vmlinuz-4.9.0-8-amd64
(debug) try_decompress: magic for gunzip found at offset 2668039:xy
(debug) try_decompress: decompression with gunzip failed (err=1)
(debug) try_decompress: looking for unxz magic in
/boot/vmlinuz-4.9.0-8-amd64
(debug) try_decompress: magic for unxz found at offset 18357:abcde
(debug) check_kernel: ret=0 size=20161824 sections=10 warnings=
(debug) check_kernel: ... file is valid
(debug) try_decompress: decompressed with unxz successfully!
Kernel image is Linux version 4.9.0-8-amd64 (debian-
kernel at lists.debian.org ) (gcc version 6.3.0 20170516 (Debian
6.3.0-18+deb9u1) ) #1 SMP Debian 4.9.110-3+deb9u4 (2018-08-21)
Hardware check
* Hardware support (CPU microcode) for mitigation techniques
* Indirect Branch Restricted Speculation (IBRS)
* SPEC_CTRL MSR is available: (debug) attempted to load module msr,
insmod_msr=1
(debug) read_msr: using perl
(debug) read_msr: MSR=0x48 value is 0
YES
* CPU indicates IBRS capability: (debug) cpuid: leaf7 on cpu0, eax-
ebx-ecx-edx: 0 0 0 469762048
(debug) cpuid: wanted register (4) has value 469762048 aka 1c000000
(debug) cpuid: shifted value by 26 is 7 aka 7
(debug) cpuid: after AND 1, final value is 1 aka 1
(debug) cpuid: wanted 1 and got 1
YES (SPEC_CTRL feature bit)
* Indirect Branch Prediction Barrier (IBPB)
* PRED_CMD MSR is available: (debug) write_msr: using perl
(debug) write_msr: for cpu 0 on msr 73, ret=0
YES
* CPU indicates IBPB capability: YES (SPEC_CTRL feature bit)
* Single Thread Indirect Branch Predictors (STIBP)
* SPEC_CTRL MSR is available: YES
* CPU indicates STIBP capability: (debug) cpuid: leaf7 on cpu0, eax-
ebx-ecx-edx: 0 0 0 469762048
(debug) cpuid: wanted register (4) has value 469762048 aka 1c000000
(debug) cpuid: shifted value by 27 is 3 aka 3
(debug) cpuid: after AND 1, final value is 1 aka 1
(debug) cpuid: wanted 1 and got 1
YES (Intel STIBP feature bit)
* Speculative Store Bypass Disable (SSBD)
* CPU indicates SSBD capability: (debug) cpuid: leaf7 on cpu0, eax-
ebx-ecx-edx: 0 0 0 469762048
(debug) cpuid: wanted register (4) has value 469762048 aka 1c000000
(debug) cpuid: shifted value by 31 is 0 aka 0
(debug) cpuid: after AND 1, final value is 0 aka 0
(debug) cpuid: wanted 1 and got 0
NO
* Enhanced IBRS (IBRS_ALL)
* CPU indicates ARCH_CAPABILITIES MSR availability: (debug) cpuid:
leaf7 on cpu0, eax-ebx-ecx-edx: 0 0 0
469762048
(debug) cpuid: wanted register (4) has value 469762048 aka 1c000000
(debug) cpuid: shifted value by 29 is 0 aka 0
(debug) cpuid: after AND 1, final value is 0 aka 0
(debug) cpuid: wanted 1 and got 0
NO
* ARCH_CAPABILITIES MSR advertises IBRS_ALL capability: NO
* CPU explicitly indicates not being vulnerable to Meltdown (RDCL_NO):
NO
* CPU explicitly indicates not being vulnerable to Variant 4 (SSB_NO):
NO
* Hypervisor indicates host CPU might be vulnerable to RSB underflow
(RSBA): NO
* CPU microcode is known to cause stability problems: (debug)
is_ucode_blacklisted: no (37/5/0x616)
NO (model 0x25 family 0x6 stepping 0x5 ucode 0x616 cpuid 0x20655)
* CPU vulnerability to the speculative execution attack variants
* Vulnerable to Variant 1: (debug) is_cpu_vulnerable: temp results are
<> <> <> <> <>
(debug) is_cpu_vulnerable: final results are <0> <0> <0> <0> <0>
YES
* Vulnerable to Variant 2: YES
* Vulnerable to Variant 3: YES
* Vulnerable to Variant 3a: YES
* Vulnerable to Variant 4: YES
CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Mitigated according to the /sys interface: YES (Mitigation: __user
pointer sanitization)
(debug) sys_interface_check:
/sys/devices/system/cpu/vulnerabilities/spectre_v1=Mitigation: __user
pointer sanitization
* Kernel has array_index_mask_nospec: YES (1 occurrence(s) found of x86
64 bits array_index_mask_nospec())
* Kernel has the Red Hat/Ubuntu patch: NO
* Kernel has mask_nospec64 (arm64): NO
* Checking count of LFENCE instructions following a jump in kernel... NO
(only 3 jump-then-lfence instructions found, should be >= 30 (heuristic))
> STATUS: NOT VULNERABLE (Mitigation: __user pointer sanitization)
CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigated according to the /sys interface: YES (Mitigation: Full
generic retpoline, IBPB, IBRS_FW)
(debug) sys_interface_check:
/sys/devices/system/cpu/vulnerabilities/spectre_v2=Mitigation: Full
generic retpoline, IBPB, IBRS_FW
* Mitigation 1
(debug) ibrs: /sys/kernel/debug/ibrs_enabled file doesn't exist
(debug) ibrs: /sys/kernel/debug/x86/ibrs_enabled file doesn't exist
(debug) ibrs: /proc/sys/kernel/ibrs_enabled file doesn't exist
(debug) ibpb: found enabled in sysfs
(debug) ibrs: found IBRS_FW in sysfs
(debug) ibrs: found IBRS in sysfs
* Kernel is compiled with IBRS support: YES (found IBRS_FW in sysfs)
* IBRS enabled and active: YES (for kernel and firmware code)
* Kernel is compiled with IBPB support: YES (IBPB found enabled in
sysfs)
* IBPB enabled and active: YES
* Mitigation 2
* Kernel has branch predictor hardening (arm): NO
* Kernel compiled with retpoline option: YES
(debug) retpoline: found CONFIG_RETPOLINE=y in /boot/config-4.9.0-8-amd64
* Kernel compiled with a retpoline-aware compiler: YES (kernel
reports full retpoline compilation)
* Local gcc is retpoline-aware: YES
* Kernel supports RSB filling: YES
> STATUS: NOT VULNERABLE (Full retpoline + IBPB are mitigating the
vulnerability)
CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Mitigated according to the /sys interface: YES (Mitigation: PTI)
(debug) sys_interface_check:
/sys/devices/system/cpu/vulnerabilities/meltdown=Mitigation: PTI
* Kernel supports Page Table Isolation (PTI): (debug) kpti_support: found
option 'CONFIG_PAGE_TABLE_ISOLATION=y' in /boot/config-4.9.0-8-amd64
YES (found 'CONFIG_PAGE_TABLE_ISOLATION=y')
* PTI enabled and active: (debug) kpti_enabled: found 'kaiser' flag in
/proc/cpuinfo
YES
* Reduced performance impact of PTI: (debug) cpuid: leaf1 on cpu0, eax-
ebx-ecx-edx: 132693 2048 2151154185 126614527
(debug) cpuid: wanted register (3) has value 2151154185 aka 80380209
(debug) cpuid: shifted value by 17 is 16412 aka 401c
(debug) cpuid: after AND 1, final value is 0 aka 0
(debug) cpuid: wanted 1 and got 0
(debug) cpuid: leaf7 on cpu0, eax-ebx-ecx-edx: 0 0
0 469762048
(debug) cpuid: wanted register (2) has value 0 aka 00000000
(debug) cpuid: shifted value by 10 is 0 aka 0
(debug) cpuid: after AND 1, final value is 0 aka 0
(debug) cpuid: wanted 1 and got 0
NO (PCID/INVPCID not supported, performance impact of PTI will be
significant)
* Running as a Xen PV DomU: NO
> STATUS: NOT VULNERABLE (Mitigation: PTI)
CVE-2018-3640 [rogue system register read] aka 'Variant 3a'
* CPU microcode mitigates the vulnerability: NO
> STATUS: VULNERABLE (an up-to-date CPU microcode is needed to mitigate
this vulnerability)
CVE-2018-3639 [speculative store bypass] aka 'Variant 4'
* Mitigated according to the /sys interface: NO (Vulnerable)
(debug) sys_interface_check:
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass=Vulnerable
* Kernel supports speculation store bypass: (debug) found
Speculation.Store.Bypass: in /proc/self/status
YES (found in /proc/self/status)
> STATUS: VULNERABLE (Your CPU doesn't support SSBD)
(debug) variables at end of script:
'|bp_harden=''|bp_harden_can_tell='1'|capabilities_ibrs_all='0'|capabilities_rdcl_no='0'|capabilities_rsba='0'|capabilities_ssb_no='0'|cpu_family='6'|cpu_friendly_name='Intel(R)
Core(TM) i5 CPU M 580 @
2.67GHz'|cpuid='132693'|cpuid_arch_capabilities='0'|cpuid_ibpb='SPEC_CTRL'|cpuid_ibrs='SPEC_CTRL'|cpuid_spec_ctrl='1'|cpu_mismatch='0'|cpu_model='37'|cpu_stepping='5'|cpu_ucode='0x616'|cpu_ucode_decimal='1558'|cpu_vendor='GenuineIntel'|cve='CVE-2018-3639'|dir='/proc/sys/kernel'|dmesg_grep='Kernel/User
page tables isolation: enabled|Kernel page table isolation
enabled|x86/pti: Unmapping kernel while in
userspace'|echo_cmd_type='printf'|echo_cmd='/usr/bin/printf'|global_critical='1'|global_unknown='0'|i='0'|ibpb_can_tell='0'|ibpb_enabled='1'|ibpb_supported='IBPB
found enabled in
sysfs'|ibrs_can_tell='1'|ibrs_enabled='3'|ibrs_fw_enabled='1'|ibrs_supported='found
IBRS_FW in
sysfs'|idx_max_cpu='0'|insmod_cpuid='1'|insmod_msr='1'|is_cpu_vulnerable_cached='1'|kernel_err=''|kernel_ssb='found
in /proc/self/status'|kernel='/tmp/kernel-28LvlW'|kerneltmp='/tmp/kernel-
28LvlW'|kernel_version='Linux version 4.9.0-8-amd64 (debian-
kernel at lists.debian.org ) (gcc version 6.3.0 20170516 (Debian
6.3.0-18+deb9u1) ) #1 SMP Debian 4.9.110-3+deb9u4
(2018-08-21)'|kpti_can_tell='1'|kpti_enabled='1'|kpti_support='CONFIG_PAGE_TABLE_ISOLATION=y'|mode=''|model='45'|msg='Vulnerable'|n='1'|nb_lfence='3'|ncpus='1'|nrpe_vuln=''|opt=''|opt_allvariants='1'|opt_arch_prefix=''|opt_batch='0'|opt_batch_format='text'|opt_config='/boot/config-4.9.0-8-amd64'|opt_coreos='0'|opt_explain='0'|opt_hw_only='0'|opt_kernel='/boot/vmlinuz-4.9.0-8-amd64'|opt_live='1'|opt_live_explicit='0'|opt_map='/proc/kallsyms'|opt_no_color='0'|opt_no_hw='0'|opt_no_sysfs='0'|opt_paranoid='1'|opt_sysfs_only='0'|opt_variant1='0'|opt_variant2='0'|opt_variant3='0'|opt_variant3a='0'|opt_variant4='0'|opt_verbose='4'|os='Linux'|parse_cpu_details_done='1'|pos='18357'|procfs='/proc'|pvulnstatus_last_cve='CVE-2018-3639'|read_cpuid_value='0'|read_msr_value='
0'|redhat_canonical_spectre='0'|ret='1'|retpoline='1'|retpoline_compiler='1'|retpoline_compiler_reason='kernel
reports full retpoline compilation'|rsb_filling='6Spectre V2 : Spectre v2
mitigation: Filling RSB on context
switch'|spec_ctrl_msr='1'|status='VULN'|stepping='7'|sys_interface_available='1'|tuple='45,0x07,0x712'|ucode='0x712'|ucode_decimal='1810'|ucode_found='model
0x25 family 0x6 stepping 0x5 ucode 0x616 cpuid
0x20655'|v1_mask_nospec='x86 64 bits
array_index_mask_nospec'|v='4'|val='0'|variant1='0'|variant2='0'|variant3='0'|variant3a='0'|variant4='0'|vulnstatus='VULN'|
Need more detailed information about mitigation options? Use --explain
A false sense of security is worse than no security at all, see
--disclaimer
root at debian :/home/user#
}}}
vbox log:
{{{
VirtualBox VM 5.2.18_Debian r123745 linux.amd64 (Aug 16 2018 09:19:02)
release log
00:00:00.376824 Log opened 2018-09-14T19:03:13.275982000Z
00:00:00.376825 Build Type: release
00:00:00.376830 OS Product: Linux
00:00:00.376831 OS Release: 4.9.0-8-amd64
00:00:00.376832 OS Version: #1 SMP Debian 4.9.110-3+deb9u4 (2018-08-21)
00:00:00.376865 DMI Product Name: 3680LL9
00:00:00.376873 DMI Product Version: ThinkPad X201
00:00:00.376929 Host RAM: 3754MB (3.6GB) total, 3424MB (3.3GB) available
00:00:00.376934 Executable: /usr/lib/virtualbox/VirtualBox
00:00:00.376935 Process ID: 6701
00:00:00.376935 Package type: LINUX_64BITS_GENERIC (OSE)
00:00:00.435574 Installed Extension Packs:
00:00:00.435601 VNC (Version: 5.2.18 r123745; VRDE Module: VBoxVNC)
00:00:00.436970 Console: Machine state changed to 'Starting'
00:00:00.437374 Qt version: 5.7.1
00:00:00.437384 X11 Window Manager code: 0
00:00:00.446611 GUI: UIMediumEnumerator: Medium-enumeration finished!
00:00:00.448948 SUP: Loaded VMMR0.r0 (/usr/lib/virtualbox/VMMR0.r0) at
0xXXXXXXXXXXXXXXXX - ModuleInit at XXXXXXXXXXXXXXXX and ModuleTerm at
XXXXXXXXXXXXXXXX
00:00:00.448987 SUP: VMMR0EntryEx located at XXXXXXXXXXXXXXXX and
VMMR0EntryFast at XXXXXXXXXXXXXXXX
00:00:00.456270 Guest OS type: 'Debian_64'
00:00:00.460930 fHMForced=true - 64-bit guest
00:00:00.473412 X Server details: vendor: The X.Org Foundation, release:
11902000, protocol version: 11.0, display string: :0.0
00:00:00.473437 Using XKB for keycode to scan code conversion
00:00:00.474517 GUI:
UIDesktopWidgetWatchdog::sltHandleHostScreenAvailableGeometryCalculated:
Screen 0 work area is actually resized to: 0x0 x 1280x762
00:00:00.482648 File system of '/home/user/VirtualBox VMs/Debian-
Tester/Snapshots' (snapshots) is unknown
00:00:00.482676 File system of '/home/user/VirtualBox VMs/Debian-Tester
/Debian-Tester.vdi' is ext4
00:00:00.506355 Shared clipboard service loaded
00:00:00.506382 Shared clipboard mode: Off
00:00:00.508003 Drag and drop service loaded
00:00:00.508020 Drag and drop mode: Off
00:00:00.522240 Guest Control service loaded
00:00:00.524624 ************************* CFGM dump
*************************
00:00:00.524643 [/] (level 0)
00:00:00.524665 CSAMEnabled <integer> = 0x0000000000000001 (1)
00:00:00.524672 CpuExecutionCap <integer> = 0x0000000000000064 (100)
00:00:00.524673 EnablePAE <integer> = 0x0000000000000000 (0)
00:00:00.524674 HMEnabled <integer> = 0x0000000000000001 (1)
00:00:00.524675 MemBalloonSize <integer> = 0x0000000000000000 (0)
00:00:00.524676 Name <string> = "Debian-Tester" (cb=14)
00:00:00.524677 NumCPUs <integer> = 0x0000000000000001 (1)
00:00:00.524679 PATMEnabled <integer> = 0x0000000000000001 (1)
00:00:00.524680 PageFusionAllowed <integer> = 0x0000000000000000 (0)
00:00:00.524681 RamHoleSize <integer> = 0x0000000020000000 (536
870 912, 512 MB)
00:00:00.524682 RamSize <integer> = 0x00000000ac100000 (2 886
729 728, 2 753 MB, 2.6 GB)
00:00:00.524685 RawR0Enabled <integer> = 0x0000000000000001 (1)
00:00:00.524686 RawR3Enabled <integer> = 0x0000000000000001 (1)
00:00:00.524687 TimerMillies <integer> = 0x000000000000000a (10)
00:00:00.524688 UUID <bytes> = "05 bb 9c f8 b3 2f 40 4a
ba 1d 4f 99 d1 56 2c 79" (cb=16)
00:00:00.524692
00:00:00.524696 [/CPUM/] (level 1)
00:00:00.524698 GuestCpuName <string> = "host" (cb=5)
00:00:00.524699 PortableCpuIdLevel <integer> = 0x0000000000000000 (0)
00:00:00.524700 SpecCtrl <integer> = 0x0000000000000001 (1)
00:00:00.524701
00:00:00.524705 [/DBGC/] (level 1)
00:00:00.524706 GlobalInitScript <string> =
"/home/user/.config/VirtualBox/dbgc-init" (cb=40)
00:00:00.524707 HistoryFile <string> =
"/home/user/.config/VirtualBox/dbgc-history" (cb=43)
00:00:00.524708 LocalInitScript <string> = "/home/user/VirtualBox VMs
/Debian-Tester/dbgc-init" (cb=50)
00:00:00.524709
00:00:00.524710 [/DBGF/] (level 1)
00:00:00.524711 Path <string> = "/home/user/VirtualBox VMs/Debian-
Tester/debug/;/home/user/VirtualBox VMs/Debian-Tester/;/home/user/"
(cb=100)
00:00:00.524711
00:00:00.524712 [/Devices/] (level 1)
00:00:00.524713
00:00:00.524713 [/Devices/8237A/] (level 2)
00:00:00.524715
00:00:00.524715 [/Devices/8237A/0/] (level 3)
00:00:00.524716 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524718
00:00:00.524718 [/Devices/GIMDev/] (level 2)
00:00:00.524719
00:00:00.524720 [/Devices/GIMDev/0/] (level 3)
00:00:00.524721 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524722
00:00:00.524722 [/Devices/VMMDev/] (level 2)
00:00:00.524724
00:00:00.524724 [/Devices/VMMDev/0/] (level 3)
00:00:00.524726 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.524727 PCIDeviceNo <integer> = 0x0000000000000004 (4)
00:00:00.524728 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.524729 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524730
00:00:00.524730 [/Devices/VMMDev/0/Config/] (level 4)
00:00:00.524732 GuestCoreDumpDir <string> = "/home/user/VirtualBox VMs
/Debian-Tester/Snapshots" (cb=50)
00:00:00.524733
00:00:00.524733 [/Devices/VMMDev/0/LUN#0/] (level 4)
00:00:00.524735 Driver <string> = "HGCM" (cb=5)
00:00:00.524736
00:00:00.524736 [/Devices/VMMDev/0/LUN#0/Config/] (level 5)
00:00:00.524738 Object <integer> = 0x00007f6464000910 (140 069 151 181
072)
00:00:00.524739
00:00:00.524740 [/Devices/VMMDev/0/LUN#999/] (level 4)
00:00:00.524741 Driver <string> = "MainStatus" (cb=11)
00:00:00.524742
00:00:00.524743 [/Devices/VMMDev/0/LUN#999/Config/] (level 5)
00:00:00.524744 First <integer> = 0x0000000000000000 (0)
00:00:00.524745 Last <integer> = 0x0000000000000000 (0)
00:00:00.524746 papLeds <integer> = 0x00007f6488001968 (140 069 755 165
032)
00:00:00.524748
00:00:00.524748 [/Devices/acpi/] (level 2)
00:00:00.524750
00:00:00.524750 [/Devices/acpi/0/] (level 3)
00:00:00.524752 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.524753 PCIDeviceNo <integer> = 0x0000000000000007 (7)
00:00:00.524754 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.524754 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524755
00:00:00.524756 [/Devices/acpi/0/Config/] (level 4)
00:00:00.524758 CpuHotPlug <integer> = 0x0000000000000000 (0)
00:00:00.524759 FdcEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524760 HostBusPciAddress <integer> = 0x0000000000000000 (0)
00:00:00.524761 HpetEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524762 IOAPIC <integer> = 0x0000000000000001 (1)
00:00:00.524763 IocPciAddress <integer> = 0x0000000000010000 (65
536)
00:00:00.524764 NumCPUs <integer> = 0x0000000000000001 (1)
00:00:00.524765 Parallel0IoPortBase <integer> = 0x0000000000000000 (0)
00:00:00.524766 Parallel0Irq <integer> = 0x0000000000000000 (0)
00:00:00.524767 Parallel1IoPortBase <integer> = 0x0000000000000000 (0)
00:00:00.524768 Parallel1Irq <integer> = 0x0000000000000000 (0)
00:00:00.524769 Serial0IoPortBase <integer> = 0x0000000000000000 (0)
00:00:00.524769 Serial0Irq <integer> = 0x0000000000000000 (0)
00:00:00.524770 Serial1IoPortBase <integer> = 0x0000000000000000 (0)
00:00:00.524771 Serial1Irq <integer> = 0x0000000000000000 (0)
00:00:00.524772 ShowCpu <integer> = 0x0000000000000001 (1)
00:00:00.524773 ShowRtc <integer> = 0x0000000000000000 (0)
00:00:00.524774 SmcEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524775
00:00:00.524776 [/Devices/acpi/0/LUN#0/] (level 4)
00:00:00.524777 Driver <string> = "ACPIHost" (cb=9)
00:00:00.524778
00:00:00.524778 [/Devices/acpi/0/LUN#0/Config/] (level 5)
00:00:00.524780
00:00:00.524780 [/Devices/ahci/] (level 2)
00:00:00.524781
00:00:00.524782 [/Devices/ahci/0/] (level 3)
00:00:00.524783 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.524784 PCIDeviceNo <integer> = 0x000000000000000d (13)
00:00:00.524786 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.524786 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524787
00:00:00.524788 [/Devices/ahci/0/Config/] (level 4)
00:00:00.524789 Bootable <integer> = 0x0000000000000001 (1)
00:00:00.524790 PortCount <integer> = 0x0000000000000001 (1)
00:00:00.524791
00:00:00.524791 [/Devices/ahci/0/Config/Port0/] (level 5)
00:00:00.524793 Hotpluggable <integer> = 0x0000000000000000 (0)
00:00:00.524794
00:00:00.524794 [/Devices/ahci/0/LUN#0/] (level 4)
00:00:00.524796 Driver <string> = "VD" (cb=3)
00:00:00.524797
00:00:00.524797 [/Devices/ahci/0/LUN#0/Config/] (level 5)
00:00:00.524799 BlockCache <integer> = 0x0000000000000001 (1)
00:00:00.524800 Format <string> = "VDI" (cb=4)
00:00:00.524801 Mountable <integer> = 0x0000000000000000 (0)
00:00:00.524802 Path <string> = "/home/user/VirtualBox VMs
/Debian-Tester/Debian-Tester.vdi" (cb=58)
00:00:00.524803 Type <string> = "HardDisk" (cb=9)
00:00:00.524804 UseNewIo <integer> = 0x0000000000000001 (1)
00:00:00.524805
00:00:00.524805 [/Devices/ahci/0/LUN#999/] (level 4)
00:00:00.524807 Driver <string> = "MainStatus" (cb=11)
00:00:00.524808
00:00:00.524808 [/Devices/ahci/0/LUN#999/Config/] (level 5)
00:00:00.524810 DeviceInstance <string> = "ahci/0" (cb=7)
00:00:00.524811 First <integer> = 0x0000000000000000 (0)
00:00:00.524812 Last <integer> = 0x0000000000000000 (0)
00:00:00.524813 pConsole <integer> = 0x00007f6488001180
(140 069 755 163 008)
00:00:00.524815 papLeds <integer> = 0x00007f6488001568
(140 069 755 164 008)
00:00:00.524817 pmapMediumAttachments <integer> = 0x00007f6488001988
(140 069 755 165 064)
00:00:00.524818
00:00:00.524819 [/Devices/apic/] (level 2)
00:00:00.524820
00:00:00.524821 [/Devices/apic/0/] (level 3)
00:00:00.524822 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524823
00:00:00.524823 [/Devices/apic/0/Config/] (level 4)
00:00:00.524825 IOAPIC <integer> = 0x0000000000000001 (1)
00:00:00.524826 Mode <integer> = 0x0000000000000003 (3)
00:00:00.524827 NumCPUs <integer> = 0x0000000000000001 (1)
00:00:00.524828
00:00:00.524828 [/Devices/e1000/] (level 2)
00:00:00.524829
00:00:00.524830 [/Devices/e1000/0/] (level 3)
00:00:00.524831 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.524832 PCIDeviceNo <integer> = 0x0000000000000003 (3)
00:00:00.524833 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.524834 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524835
00:00:00.524835 [/Devices/e1000/0/Config/] (level 4)
00:00:00.524837 AdapterType <integer> = 0x0000000000000000 (0)
00:00:00.524838 CableConnected <integer> = 0x0000000000000001 (1)
00:00:00.524838 LineSpeed <integer> = 0x0000000000000000 (0)
00:00:00.524839 MAC <bytes> = "08 00 27 c4 70 22" (cb=6)
00:00:00.524841
00:00:00.524842 [/Devices/e1000/0/LUN#0/] (level 4)
00:00:00.524843 Driver <string> = "NAT" (cb=4)
00:00:00.524844
00:00:00.524845 [/Devices/e1000/0/LUN#0/Config/] (level 5)
00:00:00.524847 AliasMode <integer> = 0x0000000000000000 (0)
00:00:00.524848 BootFile <string> = "Debian-Tester.pxe" (cb=18)
00:00:00.524849 DNSProxy <integer> = 0x0000000000000000 (0)
00:00:00.524850 Network <string> = "10.0.2.0/24" (cb=12)
00:00:00.524851 PassDomain <integer> = 0x0000000000000001 (1)
00:00:00.524852 TFTPPrefix <string> =
"/home/user/.config/VirtualBox/TFTP" (cb=35)
00:00:00.524853 UseHostResolver <integer> = 0x0000000000000000 (0)
00:00:00.524854
00:00:00.524854 [/Devices/e1000/0/LUN#999/] (level 4)
00:00:00.524856 Driver <string> = "MainStatus" (cb=11)
00:00:00.524856
00:00:00.524857 [/Devices/e1000/0/LUN#999/Config/] (level 5)
00:00:00.524858 First <integer> = 0x0000000000000000 (0)
00:00:00.524859 Last <integer> = 0x0000000000000000 (0)
00:00:00.524860 papLeds <integer> = 0x00007f6488001848 (140 069 755 164
744)
00:00:00.524862
00:00:00.524862 [/Devices/i8254/] (level 2)
00:00:00.524864
00:00:00.524864 [/Devices/i8254/0/] (level 3)
00:00:00.524865
00:00:00.524866 [/Devices/i8254/0/Config/] (level 4)
00:00:00.524867
00:00:00.524868 [/Devices/i8259/] (level 2)
00:00:00.524869
00:00:00.524869 [/Devices/i8259/0/] (level 3)
00:00:00.524870 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524871
00:00:00.524872 [/Devices/i8259/0/Config/] (level 4)
00:00:00.524873
00:00:00.524873 [/Devices/ichac97/] (level 2)
00:00:00.524875
00:00:00.524875 [/Devices/ichac97/0/] (level 3)
00:00:00.524877 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.524878 PCIDeviceNo <integer> = 0x0000000000000005 (5)
00:00:00.524879 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.524880 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524881
00:00:00.524881 [/Devices/ichac97/0/AudioConfig/] (level 4)
00:00:00.524882
00:00:00.524883 [/Devices/ichac97/0/Config/] (level 4)
00:00:00.524884 Codec <string> = "AD1980" (cb=7)
00:00:00.524885
00:00:00.524886 [/Devices/ichac97/0/LUN#0/] (level 4)
00:00:00.524887 Driver <string> = "AUDIO" (cb=6)
00:00:00.524888
00:00:00.524888 [/Devices/ichac97/0/LUN#0/AttachedDriver/] (level 5)
00:00:00.524890 Driver <string> = "PulseAudio" (cb=11)
00:00:00.524891
00:00:00.524891 [/Devices/ichac97/0/LUN#0/AttachedDriver/Config/] (level
6)
00:00:00.524893 StreamName <string> = "Debian-Tester" (cb=14)
00:00:00.524894
00:00:00.524894 [/Devices/ichac97/0/LUN#0/Config/] (level 5)
00:00:00.524896 DebugEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524897 DebugPathOut <string> = "" (cb=1)
00:00:00.524898 DriverName <string> = "PulseAudio" (cb=11)
00:00:00.524898 InputEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524899 OutputEnabled <integer> = 0x0000000000000001 (1)
00:00:00.524900
00:00:00.524900 [/Devices/ichac97/0/LUN#1/] (level 4)
00:00:00.524902 Driver <string> = "AUDIO" (cb=6)
00:00:00.524903
00:00:00.524903 [/Devices/ichac97/0/LUN#1/AttachedDriver/] (level 5)
00:00:00.524905 Driver <string> = "AudioVRDE" (cb=10)
00:00:00.524906
00:00:00.524906 [/Devices/ichac97/0/LUN#1/AttachedDriver/Config/] (level
6)
00:00:00.524908 Object <integer> = 0x00007f6488005fd0 (140 069
755 183 056)
00:00:00.524909 ObjectVRDPServer <integer> = 0x00007f64880060b0 (140 069
755 183 280)
00:00:00.524911 StreamName <string> = "Debian-Tester" (cb=14)
00:00:00.524912
00:00:00.524912 [/Devices/ichac97/0/LUN#1/Config/] (level 5)
00:00:00.524914 DebugEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524915 DebugPathOut <string> = "" (cb=1)
00:00:00.524916 DriverName <string> = "AudioVRDE" (cb=10)
00:00:00.524917 InputEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524917 OutputEnabled <integer> = 0x0000000000000001 (1)
00:00:00.524918
00:00:00.524919 [/Devices/ioapic/] (level 2)
00:00:00.524920
00:00:00.524920 [/Devices/ioapic/0/] (level 3)
00:00:00.524922 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524923
00:00:00.524923 [/Devices/ioapic/0/Config/] (level 4)
00:00:00.524925 NumCPUs <integer> = 0x0000000000000001 (1)
00:00:00.524926
00:00:00.524926 [/Devices/mc146818/] (level 2)
00:00:00.524927
00:00:00.524928 [/Devices/mc146818/0/] (level 3)
00:00:00.524929
00:00:00.524930 [/Devices/mc146818/0/Config/] (level 4)
00:00:00.524931 UseUTC <integer> = 0x0000000000000001 (1)
00:00:00.524932
00:00:00.524932 [/Devices/parallel/] (level 2)
00:00:00.524934
00:00:00.524934 [/Devices/pcarch/] (level 2)
00:00:00.524935
00:00:00.524936 [/Devices/pcarch/0/] (level 3)
00:00:00.524937 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524938
00:00:00.524938 [/Devices/pcarch/0/Config/] (level 4)
00:00:00.524939
00:00:00.524940 [/Devices/pcbios/] (level 2)
00:00:00.524941
00:00:00.524942 [/Devices/pcbios/0/] (level 3)
00:00:00.524943 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524944
00:00:00.524945 [/Devices/pcbios/0/Config/] (level 4)
00:00:00.524947 APIC <integer> = 0x0000000000000001 (1)
00:00:00.524948 BootDevice0 <string> = "FLOPPY" (cb=7)
00:00:00.524949 BootDevice1 <string> = "DVD" (cb=4)
00:00:00.524950 BootDevice2 <string> = "IDE" (cb=4)
00:00:00.524951 BootDevice3 <string> = "NONE" (cb=5)
00:00:00.524952 FloppyDevice <string> = "i82078" (cb=7)
00:00:00.524952 HardDiskDevice <string> = "piix3ide" (cb=9)
00:00:00.524953 IOAPIC <integer> = 0x0000000000000001 (1)
00:00:00.524954 McfgBase <integer> = 0x0000000000000000 (0)
00:00:00.524955 McfgLength <integer> = 0x0000000000000000 (0)
00:00:00.524956 NumCPUs <integer> = 0x0000000000000001 (1)
00:00:00.524957 PXEDebug <integer> = 0x0000000000000000 (0)
00:00:00.524958 SataHardDiskDevice <string> = "ahci" (cb=5)
00:00:00.524959 SataLUN1 <integer> = 0x0000000000000000 (0)
00:00:00.524960 UUID <bytes> = "05 bb 9c f8 b3 2f 40 4a
ba 1d 4f 99 d1 56 2c 79" (cb=16)
00:00:00.524963
00:00:00.524964 [/Devices/pcbios/0/Config/NetBoot/] (level 5)
00:00:00.524965
00:00:00.524966 [/Devices/pcbios/0/Config/NetBoot/0/] (level 6)
00:00:00.524968 NIC <integer> = 0x0000000000000000 (0)
00:00:00.524969 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.524969 PCIDeviceNo <integer> = 0x0000000000000003 (3)
00:00:00.524970 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.524971
00:00:00.524972 [/Devices/pci/] (level 2)
00:00:00.524973
00:00:00.524974 [/Devices/pci/0/] (level 3)
00:00:00.524975 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524976
00:00:00.524976 [/Devices/pci/0/Config/] (level 4)
00:00:00.524978 IOAPIC <integer> = 0x0000000000000001 (1)
00:00:00.524978
00:00:00.524979 [/Devices/pcibridge/] (level 2)
00:00:00.524980
00:00:00.524981 [/Devices/pckbd/] (level 2)
00:00:00.524982
00:00:00.524982 [/Devices/pckbd/0/] (level 3)
00:00:00.524983 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524984
00:00:00.524985 [/Devices/pckbd/0/Config/] (level 4)
00:00:00.524986
00:00:00.524987 [/Devices/pckbd/0/LUN#0/] (level 4)
00:00:00.524988 Driver <string> = "KeyboardQueue" (cb=14)
00:00:00.524989
00:00:00.524989 [/Devices/pckbd/0/LUN#0/AttachedDriver/] (level 5)
00:00:00.524991 Driver <string> = "MainKeyboard" (cb=13)
00:00:00.524992
00:00:00.524992 [/Devices/pckbd/0/LUN#0/AttachedDriver/Config/] (level 6)
00:00:00.524994 Object <integer> = 0x00007f648800dbd0 (140 069 755 214
800)
00:00:00.524995
00:00:00.524996 [/Devices/pckbd/0/LUN#0/Config/] (level 5)
00:00:00.524997 QueueSize <integer> = 0x0000000000000040 (64)
00:00:00.524998
00:00:00.524999 [/Devices/pckbd/0/LUN#1/] (level 4)
00:00:00.525000 Driver <string> = "MouseQueue" (cb=11)
00:00:00.525001
00:00:00.525001 [/Devices/pckbd/0/LUN#1/AttachedDriver/] (level 5)
00:00:00.525003 Driver <string> = "MainMouse" (cb=10)
00:00:00.525004
00:00:00.525004 [/Devices/pckbd/0/LUN#1/AttachedDriver/Config/] (level 6)
00:00:00.525006 Object <integer> = 0x00007f648800e3d0 (140 069 755 216
848)
00:00:00.525007
00:00:00.525008 [/Devices/pckbd/0/LUN#1/Config/] (level 5)
00:00:00.525010 QueueSize <integer> = 0x0000000000000080 (128)
00:00:00.525011
00:00:00.525011 [/Devices/pcnet/] (level 2)
00:00:00.525012
00:00:00.525013 [/Devices/piix3ide/] (level 2)
00:00:00.525014
00:00:00.525014 [/Devices/piix3ide/0/] (level 3)
00:00:00.525016 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.525017 PCIDeviceNo <integer> = 0x0000000000000001 (1)
00:00:00.525018 PCIFunctionNo <integer> = 0x0000000000000001 (1)
00:00:00.525019 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.525020
00:00:00.525020 [/Devices/piix3ide/0/Config/] (level 4)
00:00:00.525021 Type <string> = "PIIX4" (cb=6)
00:00:00.525022
00:00:00.525023 [/Devices/piix3ide/0/LUN#2/] (level 4)
00:00:00.525024 Driver <string> = "VD" (cb=3)
00:00:00.525025
00:00:00.525026 [/Devices/piix3ide/0/LUN#2/Config/] (level 5)
00:00:00.525027 EmptyDrive <integer> = 0x0000000000000001 (1)
00:00:00.525028 Mountable <integer> = 0x0000000000000001 (1)
00:00:00.525029 Type <string> = "DVD" (cb=4)
00:00:00.525030
00:00:00.525030 [/Devices/piix3ide/0/LUN#999/] (level 4)
00:00:00.525032 Driver <string> = "MainStatus" (cb=11)
00:00:00.525032
00:00:00.525033 [/Devices/piix3ide/0/LUN#999/Config/] (level 5)
00:00:00.525035 DeviceInstance <string> = "piix3ide/0" (cb=11)
00:00:00.525036 First <integer> = 0x0000000000000000 (0)
00:00:00.525037 Last <integer> = 0x0000000000000003 (3)
00:00:00.525038 pConsole <integer> = 0x00007f6488001180
(140 069 755 163 008)
00:00:00.525040 papLeds <integer> = 0x00007f6488001548
(140 069 755 163 976)
00:00:00.525042 pmapMediumAttachments <integer> = 0x00007f6488001988
(140 069 755 165 064)
00:00:00.525043
00:00:00.525044 [/Devices/serial/] (level 2)
00:00:00.525045
00:00:00.525045 [/Devices/usb-ohci/] (level 2)
00:00:00.525046
00:00:00.525047 [/Devices/usb-ohci/0/] (level 3)
00:00:00.525048 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.525049 PCIDeviceNo <integer> = 0x0000000000000006 (6)
00:00:00.525050 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.525051 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.525052
00:00:00.525052 [/Devices/usb-ohci/0/Config/] (level 4)
00:00:00.525054
00:00:00.525054 [/Devices/usb-ohci/0/LUN#0/] (level 4)
00:00:00.525056 Driver <string> = "VUSBRootHub" (cb=12)
00:00:00.525057
00:00:00.525057 [/Devices/usb-ohci/0/LUN#0/Config/] (level 5)
00:00:00.525059
00:00:00.525059 [/Devices/usb-ohci/0/LUN#999/] (level 4)
00:00:00.525060 Driver <string> = "MainStatus" (cb=11)
00:00:00.525061
00:00:00.525062 [/Devices/usb-ohci/0/LUN#999/Config/] (level 5)
00:00:00.525063 First <integer> = 0x0000000000000000 (0)
00:00:00.525064 Last <integer> = 0x0000000000000000 (0)
00:00:00.525065 papLeds <integer> = 0x00007f6488001970 (140 069 755 165
040)
00:00:00.525067
00:00:00.525067 [/Devices/vga/] (level 2)
00:00:00.525068
00:00:00.525069 [/Devices/vga/0/] (level 3)
00:00:00.525070 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.525071 PCIDeviceNo <integer> = 0x0000000000000002 (2)
00:00:00.525072 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.525073 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.525074
00:00:00.525074 [/Devices/vga/0/Config/] (level 4)
00:00:00.525076 CustomVideoModes <integer> = 0x0000000000000000 (0)
00:00:00.525077 FadeIn <integer> = 0x0000000000000001 (1)
00:00:00.525078 FadeOut <integer> = 0x0000000000000001 (1)
00:00:00.525079 HeightReduction <integer> = 0x0000000000000000 (0)
00:00:00.525080 LogoFile <string> = "" (cb=1)
00:00:00.525081 LogoTime <integer> = 0x0000000000000000 (0)
00:00:00.525082 MonitorCount <integer> = 0x0000000000000001 (1)
00:00:00.525083 ShowBootMenu <integer> = 0x0000000000000002 (2)
00:00:00.525083 VRamSize <integer> = 0x0000000001000000 (16 777
216, 16 MB)
00:00:00.525085
00:00:00.525086 [/Devices/vga/0/LUN#0/] (level 4)
00:00:00.525087 Driver <string> = "MainDisplay" (cb=12)
00:00:00.525088
00:00:00.525088 [/Devices/vga/0/LUN#0/Config/] (level 5)
00:00:00.525090 Object <integer> = 0x00007f6488002340 (140 069 755 167
552)
00:00:00.525092
00:00:00.525092 [/Devices/vga/0/LUN#999/] (level 4)
00:00:00.525093 Driver <string> = "MainStatus" (cb=11)
00:00:00.525094
00:00:00.525095 [/Devices/vga/0/LUN#999/Config/] (level 5)
00:00:00.525096 First <integer> = 0x0000000000000000 (0)
00:00:00.525097 Last <integer> = 0x0000000000000000 (0)
00:00:00.525098 papLeds <integer> = 0x00007f6488001980 (140 069 755 165
056)
00:00:00.525100
00:00:00.525100 [/Devices/virtio-net/] (level 2)
00:00:00.525101
00:00:00.525102 [/EM/] (level 1)
00:00:00.525103 TripleFaultReset <integer> = 0x0000000000000000 (0)
00:00:00.525105
00:00:00.525105 [/GIM/] (level 1)
00:00:00.525106 Provider <string> = "KVM" (cb=4)
00:00:00.525107
00:00:00.525107 [/HM/] (level 1)
00:00:00.525109 64bitEnabled <integer> = 0x0000000000000001 (1)
00:00:00.525110 EnableLargePages <integer> = 0x0000000000000000 (0)
00:00:00.525111 EnableNestedPaging <integer> = 0x0000000000000000 (0)
00:00:00.525112 EnableUX <integer> = 0x0000000000000001 (1)
00:00:00.525113 EnableVPID <integer> = 0x0000000000000001 (1)
00:00:00.525113 Exclusive <integer> = 0x0000000000000001 (1)
00:00:00.525114 HMForced <integer> = 0x0000000000000001 (1)
00:00:00.525115 IBPBOnVMEntry <integer> = 0x0000000000000001 (1)
00:00:00.525116 IBPBOnVMExit <integer> = 0x0000000000000001 (1)
00:00:00.525117 L1DFlushOnSched <integer> = 0x0000000000000001 (1)
00:00:00.525118 L1DFlushOnVMEntry <integer> = 0x0000000000000001 (1)
00:00:00.525119 SpecCtrlByHost <integer> = 0x0000000000000000 (0)
00:00:00.525120
00:00:00.525120 [/MM/] (level 1)
00:00:00.525121 CanUseLargerHeap <integer> = 0x0000000000000000 (0)
00:00:00.525122
00:00:00.525122 [/PDM/] (level 1)
00:00:00.525123
00:00:00.525124 [/PDM/AsyncCompletion/] (level 2)
00:00:00.525125
00:00:00.525125 [/PDM/AsyncCompletion/File/] (level 3)
00:00:00.525127
00:00:00.525127 [/PDM/AsyncCompletion/File/BwGroups/] (level 4)
00:00:00.525129
00:00:00.525129 [/PDM/BlkCache/] (level 2)
00:00:00.525130 CacheSize <integer> = 0x0000000000500000 (5 242 880, 5
MB)
00:00:00.525132
00:00:00.525132 [/PDM/Devices/] (level 2)
00:00:00.525133
00:00:00.525134 [/PDM/Drivers/] (level 2)
00:00:00.525135
00:00:00.525135 [/PDM/Drivers/VBoxC/] (level 3)
00:00:00.525137 Path <string> = "/usr/lib/virtualbox/components/VBoxC"
(cb=37)
00:00:00.525138
00:00:00.525138 [/PDM/NetworkShaper/] (level 2)
00:00:00.525139
00:00:00.525140 [/PDM/NetworkShaper/BwGroups/] (level 3)
00:00:00.525141
00:00:00.525142 [/TM/] (level 1)
00:00:00.525142 UTCOffset <integer> = 0x0000000000000000 (0)
00:00:00.525143
00:00:00.525144 [/USB/] (level 1)
00:00:00.525145
00:00:00.525145 [/USB/HidMouse/] (level 2)
00:00:00.525146
00:00:00.525147 [/USB/HidMouse/0/] (level 3)
00:00:00.525148
00:00:00.525148 [/USB/HidMouse/0/Config/] (level 4)
00:00:00.525150 Mode <string> = "absolute" (cb=9)
00:00:00.525150
00:00:00.525151 [/USB/HidMouse/0/LUN#0/] (level 4)
00:00:00.525152 Driver <string> = "MouseQueue" (cb=11)
00:00:00.525153
00:00:00.525154 [/USB/HidMouse/0/LUN#0/AttachedDriver/] (level 5)
00:00:00.525155 Driver <string> = "MainMouse" (cb=10)
00:00:00.525156
00:00:00.525156 [/USB/HidMouse/0/LUN#0/AttachedDriver/Config/] (level 6)
00:00:00.525158 Object <integer> = 0x00007f648800e3d0 (140 069 755 216
848)
00:00:00.525160
00:00:00.525160 [/USB/HidMouse/0/LUN#0/Config/] (level 5)
00:00:00.525162 QueueSize <integer> = 0x0000000000000080 (128)
00:00:00.525163
00:00:00.525163 [/USB/USBProxy/] (level 2)
00:00:00.525164
00:00:00.525165 [/USB/USBProxy/GlobalConfig/] (level 3)
00:00:00.525166
00:00:00.525167 ********************* End of CFGM dump
**********************
00:00:00.525186 VM: fHMEnabled=true (configured) fRecompileUser=false
fRecompileSupervisor=false
00:00:00.525189 VM: fRawRing1Enabled=false CSAM=true PATM=true
00:00:00.525379 HM: HMR3Init: VT-x w/ nested paging and unrestricted guest
execution hw support
00:00:00.525441 MM: cbHyperHeap=0x100000 (1048576)
00:00:00.526018 CPUM: fXStateHostMask=0x0; initial: 0x0; host XCR0=0x0
00:00:00.526838 CPUM: Matched host CPU INTEL 0x6/0x25/0x5
Intel_Core7_Westmere with CPU DB entry 'Intel Core i7-3960X' (INTEL
0x6/0x2d/0x6 Intel_Core7_SandyBridge)
00:00:00.526968 CPUM: MXCSR_MASK=0xffff (host: 0xffff)
00:00:00.526978 CPUM: Disabled PCID without FSGSBASE to workaround buggy
guests
00:00:00.526988 CPUM: Microcode revision 0x00000007
00:00:00.526998 CPUM: MSR/CPUID reconciliation insert: 0x0000010b
IA32_FLUSH_CMD
00:00:00.527049 CPUM: SetGuestCpuIdFeature: Enabled Speculation Control.
00:00:00.527547 PGM: HCPhysInterPD=00000000952ec000
HCPhysInterPaePDPT=00000000952e9000 HCPhysInterPaePML4=00000000952e7000
00:00:00.527561 PGM: apInterPTs={00000000952eb000,00000000952ea000}
apInterPaePTs={0000000114099000,0000000119ca2000}
apInterPaePDs={0000000119ca3000,000000012ada6000,000000012ada7000,000000011daca000}
pInterPaePDPT64=00000000952e8000
00:00:00.527568 PGM: Host paging mode: AMD64+NX
00:00:00.527591 PGM: PGMPool: cMaxPages=1424 (u64MaxPages=1411)
00:00:00.527596 PGM: pgmR3PoolInit: cMaxPages=0x590 cMaxUsers=0xb20
cMaxPhysExts=0xb20 fCacheEnable=true
00:00:00.558881 TM: GIP - u32Mode=3 (Invariant) u32UpdateHz=83
u32UpdateIntervalNS=12000000 enmUseTscDelta=2 (Pratically Zero)
fGetGipCpu=0xb cCpus=2
00:00:00.558937 TM: GIP - u64CpuHz=2 659 997 869 (0x9e8c58ad)
SUPGetCpuHzFromGip => 2 659 997 869
00:00:00.558945 TM: GIP - CPU: iCpuSet=0x0 idCpu=0x0 idApic=0x0
iGipCpu=0x1 i64TSCDelta=0 enmState=3 u64CpuHz=2659993725(*) cErrors=0
00:00:00.558951 TM: GIP - CPU: iCpuSet=0x1 idCpu=0x1 idApic=0x4
iGipCpu=0x0 i64TSCDelta=0 enmState=3 u64CpuHz=2659997869(*) cErrors=0
00:00:00.559036 TM: cTSCTicksPerSecond=2 659 997 869 (0x9e8c58ad)
enmTSCMode=3 (Dynamic)
00:00:00.559038 TM: TSCTiedToExecution=false TSCNotTiedToHalt=false
00:00:00.559413 VMM: CoreCode: R3=00007f64b0000000 R0=XXXXXXXXXXXXXXXX
RC=a0c3c000 Phys=000000008b42c000 cb=0x1000
00:00:00.559579 IEM: TargetCpu=CURRENT, Microarch=Intel_Core7_Westmere
00:00:00.559659 GIM: Using provider 'KVM' (Implementation version: 0)
00:00:00.559669 CPUM: SetGuestCpuIdFeature: Enabled Hypervisor Present bit
00:00:00.595013 AIOMgr: Default manager type is 'Async'
00:00:00.595176 AIOMgr: Default file backend is 'NonBuffered'
00:00:00.595466 BlkCache: Cache successfully initialized. Cache size is
5242880 bytes
00:00:00.595488 BlkCache: Cache commit interval is 10000 ms
00:00:00.595499 BlkCache: Cache commit threshold is 2621440 bytes
00:00:00.597369 PcBios: [SMP] BIOS with 1 CPUs
00:00:00.597395 PcBios: Using the 386+ BIOS image.
00:00:00.597544 PcBios: MPS table at 000e1300
00:00:00.597985 PcBios: fCheckShutdownStatusForSoftReset=true
fClearShutdownStatusOnHardReset=true
00:00:00.603717 SUP: Loaded VBoxDDR0.r0 (/usr/lib/virtualbox/VBoxDDR0.r0)
at 0xXXXXXXXXXXXXXXXX - ModuleInit at XXXXXXXXXXXXXXXX and ModuleTerm at
XXXXXXXXXXXXXXXX
00:00:00.603982 CPUM: SetGuestCpuIdFeature: Enabled xAPIC
00:00:00.603990 CPUM: SetGuestCpuIdFeature: Enabled x2APIC
00:00:00.604352 IOAPIC: Using implementation 2.0!
00:00:00.604407 PIT: mode=3 count=0x10000 (65536) - 18.20 Hz (ch=0)
00:00:00.607941 Shared Folders service loaded
00:00:00.614073 VGA: Using the 386+ BIOS image.
00:00:00.614510 DrvVD: Flushes will be ignored
00:00:00.614519 DrvVD: Async flushes will be passed to the disk
00:00:00.617162 VD: VDInit finished with VINF_SUCCESS
00:00:00.617476 AIOMgr: Endpoint for file '/home/user/VirtualBox VMs
/Debian-Tester/Debian-Tester.vdi' (flags 000c0723) created successfully
00:00:00.654352 VD: Opening the disk took 37380446 ns
00:00:00.654465 AHCI: LUN#0: disk, PCHS=16383/16/63, total number of
sectors 25242768
00:00:00.654693 AHCI#0: Reset the HBA
00:00:00.654714 VD#0: Cancelling all active requests
00:00:00.654988 PIIX3 ATA: LUN#0: no unit
00:00:00.654997 PIIX3 ATA: LUN#1: no unit
00:00:00.655048 DrvVD: Flushes will be ignored
00:00:00.655055 DrvVD: Async flushes will be passed to the disk
00:00:00.655142 PIIX3 ATA: LUN#2: CD/DVD, total number of sectors 0,
passthrough disabled
00:00:00.655153 PIIX3 ATA: LUN#3: no unit
00:00:00.655201 PIIX3 ATA: Ctl#0: finished processing RESET
00:00:00.655241 PIIX3 ATA: Ctl#1: finished processing RESET
00:00:00.655346 E1000#0 Chip=82540EM LinkUpDelay=3000ms EthernetCRC=on
GSO=enabled Itr=disabled ItrRx=enabled TID=disabled R0=enabled GC=enabled
00:00:00.663726 NAT: Guest address guess set to 10.0.2.15 by
initialization
00:00:00.663873 NAT: resolv.conf: nameserver 152.200.55.90
00:00:00.663892 NAT: DNS#0: 152.200.55.90
00:00:00.665120 Audio: Initializing PulseAudio driver
00:00:00.670955 Audio: Initializing VRDE driver
00:00:00.670955 AC97: Reset
00:00:00.670955 VUSB: Attached 'HidMouse' to port 1 on RootHub#0
(FullSpeed)
00:00:00.670955 PGM: The CPU physical address width is 36 bits
00:00:00.670955 PGM: PGMR3InitFinalize: 4 MB PSE mask 0000000fffffffff
00:00:00.670955 TM: TMR3InitFinalize: fTSCModeSwitchAllowed=true
00:00:00.677648 VMM: Enabled thread-context hooks
00:00:00.677701 HM: fWorldSwitcher=0x7 (fIbpbOnVmExit=1 fIbpbOnVmEntry=1
fL1dFlushOnVmEntry=1); fL1dFlushOnSched=0
00:00:00.677721 HM: Using VT-x implementation 2.0
00:00:00.677722 HM: Host CR4 = 0x20670
00:00:00.677723 HM: Host EFER = 0xd01
00:00:00.677724 HM: MSR_IA32_SMM_MONITOR_CTL = 0x0
00:00:00.677725 HM: MSR_IA32_FEATURE_CONTROL = 0x5
00:00:00.677726 HM: MSR_IA32_VMX_BASIC_INFO = 0xda04000000000f
00:00:00.677727 HM: VMCS id = 0xf
00:00:00.677727 HM: VMCS size = 1024 bytes
00:00:00.677728 HM: VMCS physical address limit = None
00:00:00.677729 HM: VMCS memory type = 0x6
00:00:00.677730 HM: Dual-monitor treatment support = true
00:00:00.677731 HM: OUTS & INS instruction-info = true
00:00:00.677731 HM: Supports true capability MSRs = true
00:00:00.677732 HM: Max resume loops = 8192
00:00:00.677732 HM: MSR_IA32_VMX_PINBASED_CTLS = 0x7f00000016
00:00:00.677734 HM: EXT_INT_EXIT
00:00:00.677734 HM: NMI_EXIT
00:00:00.677735 HM: VIRTUAL_NMI
00:00:00.677735 HM: PREEMPT_TIMER
00:00:00.677736 HM: POSTED_INTR (must be cleared)
00:00:00.677737 HM: MSR_IA32_VMX_PROCBASED_CTLS = 0xfff9fffe0401e172
00:00:00.677738 HM: INT_WINDOW_EXIT
00:00:00.677739 HM: USE_TSC_OFFSETTING
00:00:00.677739 HM: HLT_EXIT
00:00:00.677740 HM: INVLPG_EXIT
00:00:00.677740 HM: MWAIT_EXIT
00:00:00.677741 HM: RDPMC_EXIT
00:00:00.677741 HM: RDTSC_EXIT
00:00:00.677742 HM: CR3_LOAD_EXIT (must be set)
00:00:00.677742 HM: CR3_STORE_EXIT (must be set)
00:00:00.677743 HM: CR8_LOAD_EXIT
00:00:00.677743 HM: CR8_STORE_EXIT
00:00:00.677744 HM: USE_TPR_SHADOW
00:00:00.677744 HM: NMI_WINDOW_EXIT
00:00:00.677744 HM: MOV_DR_EXIT
00:00:00.677745 HM: UNCOND_IO_EXIT
00:00:00.677745 HM: USE_IO_BITMAPS
00:00:00.677746 HM: MONITOR_TRAP_FLAG
00:00:00.677746 HM: USE_MSR_BITMAPS
00:00:00.677747 HM: MONITOR_EXIT
00:00:00.677747 HM: PAUSE_EXIT
00:00:00.677748 HM: USE_SECONDARY_EXEC_CTRL
00:00:00.677749 HM: MSR_IA32_VMX_PROCBASED_CTLS2 = 0xff00000000
00:00:00.677750 HM: VIRT_APIC
00:00:00.677750 HM: EPT
00:00:00.677751 HM: DESCRIPTOR_TABLE_EXIT
00:00:00.677752 HM: RDTSCP
00:00:00.677752 HM: VIRT_X2APIC
00:00:00.677753 HM: VPID
00:00:00.677753 HM: WBINVD_EXIT
00:00:00.677754 HM: UNRESTRICTED_GUEST
00:00:00.677754 HM: APIC_REG_VIRT (must be cleared)
00:00:00.677755 HM: VIRT_INTR_DELIVERY (must be cleared)
00:00:00.677755 HM: PAUSE_LOOP_EXIT (must be cleared)
00:00:00.677756 HM: RDRAND_EXIT (must be cleared)
00:00:00.677756 HM: INVPCID (must be cleared)
00:00:00.677757 HM: VMFUNC (must be cleared)
00:00:00.677757 HM: VMCS_SHADOWING (must be cleared)
00:00:00.677758 HM: ENCLS_EXIT (must be cleared)
00:00:00.677758 HM: RDSEED_EXIT (must be cleared)
00:00:00.677759 HM: PML (must be cleared)
00:00:00.677759 HM: EPT_VE (must be cleared)
00:00:00.677760 HM: CONCEAL_FROM_PT (must be cleared)
00:00:00.677760 HM: XSAVES_XRSTORS (must be cleared)
00:00:00.677761 HM: TSC_SCALING (must be cleared)
00:00:00.677761 HM: MSR_IA32_VMX_ENTRY_CTLS = 0xffff000011ff
00:00:00.677762 HM: LOAD_DEBUG (must be set)
00:00:00.677763 HM: IA32E_MODE_GUEST
00:00:00.677763 HM: ENTRY_SMM
00:00:00.677764 HM: DEACTIVATE_DUALMON
00:00:00.677764 HM: LOAD_GUEST_PERF_MSR
00:00:00.677765 HM: LOAD_GUEST_PAT_MSR
00:00:00.677765 HM: LOAD_GUEST_EFER_MSR
00:00:00.677766 HM: MSR_IA32_VMX_EXIT_CTLS = 0x7fffff00036dff
00:00:00.677767 HM: SAVE_DEBUG (must be set)
00:00:00.677767 HM: HOST_ADDR_SPACE_SIZE
00:00:00.677768 HM: LOAD_PERF_MSR
00:00:00.677768 HM: ACK_EXT_INT
00:00:00.677769 HM: SAVE_GUEST_PAT_MSR
00:00:00.677769 HM: LOAD_HOST_PAT_MSR
00:00:00.677770 HM: SAVE_GUEST_EFER_MSR
00:00:00.677770 HM: LOAD_HOST_EFER_MSR
00:00:00.677771 HM: SAVE_VMX_PREEMPT_TIMER
00:00:00.677771 HM: MSR_IA32_VMX_EPT_VPID_CAP = 0xf0106114141
00:00:00.677772 HM: RWX_X_ONLY
00:00:00.677773 HM: PAGE_WALK_LENGTH_4
00:00:00.677773 HM: EMT_UC
00:00:00.677774 HM: EMT_WB
00:00:00.677774 HM: PDE_2M
00:00:00.677775 HM: INVEPT
00:00:00.677775 HM: INVEPT_SINGLE_CONTEXT
00:00:00.677776 HM: INVEPT_ALL_CONTEXTS
00:00:00.677776 HM: INVVPID
00:00:00.677777 HM: INVVPID_INDIV_ADDR
00:00:00.677777 HM: INVVPID_SINGLE_CONTEXT
00:00:00.677778 HM: INVVPID_ALL_CONTEXTS
00:00:00.677778 HM: INVVPID_SINGLE_CONTEXT_RETAIN_GLOBALS
00:00:00.677779 HM: MSR_IA32_VMX_MISC = 0x401e7
00:00:00.677779 HM: PREEMPT_TSC_BIT = 0x7 - erratum
detected, using 0x0 instead
00:00:00.677780 HM: STORE_EFERLMA_VMEXIT = true
00:00:00.677781 HM: ACTIVITY_STATES = 0x7
00:00:00.677781 HM: CR3_TARGET = 0x4
00:00:00.677782 HM: MAX_MSR = 512
00:00:00.677783 HM: RDMSR_SMBASE_MSR_SMM = false
00:00:00.677783 HM: SMM_MONITOR_CTL_B2 = false
00:00:00.677784 HM: VMWRITE_VMEXIT_INFO = false
00:00:00.677785 HM: MSEG_ID = 0x0
00:00:00.677785 HM: MSR_IA32_VMX_CR0_FIXED0 = 0x80000021
00:00:00.677786 HM: MSR_IA32_VMX_CR0_FIXED1 = 0xffffffff
00:00:00.677787 HM: MSR_IA32_VMX_CR4_FIXED0 = 0x2000
00:00:00.677788 HM: MSR_IA32_VMX_CR4_FIXED1 = 0x267ff
00:00:00.677788 HM: MSR_IA32_VMX_VMCS_ENUM = 0x2a
00:00:00.677789 HM: HIGHEST_INDEX = 0x15
00:00:00.677790 HM: APIC-access page physaddr = 0x000000008b45d000
00:00:00.677791 HM: VCPU 0: MSR bitmap physaddr = 0x0000000013cf5000
00:00:00.677792 HM: VCPU 0: VMCS physaddr = 0x000000008b5d9000
00:00:00.677797 HM: Guest support: 32-bit and 64-bit
00:00:00.677802 HM: Supports VMCS EFER fields = true
00:00:00.677803 HM: Enabled VMX
00:00:00.677810 CPUM: SetGuestCpuIdFeature: Enabled SYSENTER/EXIT
00:00:00.677811 CPUM: SetGuestCpuIdFeature: Enabled PAE
00:00:00.677812 CPUM: SetGuestCpuIdFeature: Enabled LONG MODE
00:00:00.677813 CPUM: SetGuestCpuIdFeature: Enabled SYSCALL/RET
00:00:00.677813 CPUM: SetGuestCpuIdFeature: Enabled LAHF/SAHF
00:00:00.677814 CPUM: SetGuestCpuIdFeature: Enabled NX
00:00:00.677815 HM: Enabled VPID
00:00:00.677815 HM: VPID flush type =
VMXFLUSHVPID_SINGLE_CONTEXT
00:00:00.677816 HM: Enabled VMX-preemption timer (cPreemptTimerShift=0)
00:00:00.677817 HM: VT-x/AMD-V init method: GLOBAL
00:00:00.677818 VMM: fUsePeriodicPreemptionTimers=false
00:00:00.678528 CPUM: Logical host processors: 2 present, 2 max, 2 online,
online mask: 0000000000000003
00:00:00.678565 CPUM: Physical host cores: 2
00:00:00.678566 ************************* CPUID dump
************************
00:00:00.678583 Raw Standard CPUID Leaves
00:00:00.678583 Leaf/sub-leaf eax ebx ecx edx
00:00:00.678584 Gst: 00000000/0000 0000000b 756e6547 6c65746e 49656e69
00:00:00.678586 Hst: 0000000b 756e6547 6c65746e 49656e69
00:00:00.678588 Gst: 00000001/0000 00020655 00000800 80380209 078bfbff
00:00:00.678589 Hst: 00020655 04100800 029ae3ff bfebfbff
00:00:00.678591 Gst: 00000002/0000 55035a01 00f0b0dd 00000000 09ca212c
00:00:00.678592 Hst: 55035a01 00f0b0dd 00000000 09ca212c
00:00:00.678594 Gst: 00000003/0000 00000000 00000000 00000000 00000000
00:00:00.678595 Hst: 00000000 00000000 00000000 00000000
00:00:00.678596 Gst: 00000004/0000 00000121 01c0003f 0000003f 00000000
00:00:00.678597 Hst: 1c004121 01c0003f 0000003f 00000000
00:00:00.678599 Gst: 00000004/0001 00000122 00c0003f 0000007f 00000000
00:00:00.678600 Hst: 1c004122 00c0003f 0000007f 00000000
00:00:00.678601 Gst: 00000004/0002 00000143 01c0003f 000001ff 00000000
00:00:00.678602 Hst: 1c004143 01c0003f 000001ff 00000000
00:00:00.678604 Gst: 00000004/0003 00000163 02c0003f 00000fff 00000002
00:00:00.678605 Hst: 1c03c163 02c0003f 00000fff 00000002
00:00:00.678606 Gst: 00000004/0004 00000000 00000000 00000000 00000000
00:00:00.678607 Hst: 00000000 00000000 00000000 00000000
00:00:00.678609 Gst: 00000005/0000 00000040 00000040 00000000 00000000
00:00:00.678610 Hst: 00000040 00000040 00000003 00001120
00:00:00.678611 Gst: 00000006/0000 00000000 00000000 00000000 00000000
00:00:00.678612 Hst: 00000007 00000002 00000001 00000000
00:00:00.678613 Gst: 00000007/0000 00000000 00000000 00000000 1c000000
00:00:00.678614 Hst: 00000000 00000000 00000000 9c000000
00:00:00.678615 Gst: 00000007/0001 00000000 00000000 00000000 00000000
00:00:00.678616 Hst: 00000000 00000000 00000000 00000000
00:00:00.678617 Gst: 00000008/0000 00000000 00000000 00000000 00000000
00:00:00.678618 Hst: 00000000 00000000 00000000 00000000
00:00:00.678619 Gst: 00000009/0000 00000000 00000000 00000000 00000000
00:00:00.678620 Hst: 00000000 00000000 00000000 00000000
00:00:00.678621 Gst: 0000000a/0000 00000000 00000000 00000000 00000000
00:00:00.678621 Hst: 07300403 00000004 00000000 00000603
00:00:00.678623 Gst: 0000000b/0000 00000000 00000001 00000100 00000000
00:00:00.678624 Hst: 00000001 00000002 00000100 00000004
00:00:00.678625 Gst: 0000000b/0001 00000001 00000001 00000201 00000000
00:00:00.678626 Hst: 00000004 00000004 00000201 00000004
00:00:00.678627 Gst: 0000000b/0002 00000000 00000000 00000002 00000000
00:00:00.678628 Hst: 00000000 00000000 00000002 00000004
00:00:00.678629 Name: GenuineIntel
00:00:00.678631 Supports: 0x00000000-0x0000000b
00:00:00.678633 Family: 6 Extended:
0 Effective: 6
00:00:00.678634 Model: 5 Extended:
2 Effective: 37
00:00:00.678635 Stepping: 5
00:00:00.678636 Type: 0 (primary)
00:00:00.678638 APIC ID: 0x00
00:00:00.678639 Logical CPUs: 0
00:00:00.678640 CLFLUSH Size: 8
00:00:00.678641 Brand ID: 0x00
00:00:00.678642 Features
00:00:00.678643 Mnemonic - Description
= guest (host)
00:00:00.678644 FPU - x87 FPU on Chip
= 1 (1)
00:00:00.678645 VME - Virtual 8086 Mode Enhancements
= 1 (1)
00:00:00.678647 DE - Debugging extensions
= 1 (1)
00:00:00.678648 PSE - Page Size Extension
= 1 (1)
00:00:00.678649 TSC - Time Stamp Counter
= 1 (1)
00:00:00.678651 MSR - Model Specific Registers
= 1 (1)
00:00:00.678652 PAE - Physical Address Extension
= 1 (1)
00:00:00.678653 MCE - Machine Check Exception
= 1 (1)
00:00:00.678655 CX8 - CMPXCHG8B instruction
= 1 (1)
00:00:00.678656 APIC - APIC On-Chip
= 1 (1)
00:00:00.678657 SEP - SYSENTER and SYSEXIT Present
= 1 (1)
00:00:00.678658 MTRR - Memory Type Range Registers
= 1 (1)
00:00:00.678660 PGE - PTE Global Bit
= 1 (1)
00:00:00.678661 MCA - Machine Check Architecture
= 1 (1)
00:00:00.678662 CMOV - Conditional Move instructions
= 1 (1)
00:00:00.678663 PAT - Page Attribute Table
= 1 (1)
00:00:00.678665 PSE-36 - 36-bit Page Size Extension
= 1 (1)
00:00:00.678666 PSN - Processor Serial Number
= 0 (0)
00:00:00.678667 CLFSH - CLFLUSH instruction
= 1 (1)
00:00:00.678668 DS - Debug Store
= 0 (1)
00:00:00.678670 ACPI - Thermal Mon. & Soft. Clock Ctrl.
= 0 (1)
00:00:00.678671 MMX - Intel MMX Technology
= 1 (1)
00:00:00.678672 FXSR - FXSAVE and FXRSTOR instructions
= 1 (1)
00:00:00.678673 SSE - SSE support
= 1 (1)
00:00:00.678675 SSE2 - SSE2 support
= 1 (1)
00:00:00.678676 SS - Self Snoop
= 0 (1)
00:00:00.678677 HTT - Hyper-Threading Technology
= 0 (1)
00:00:00.678679 TM - Therm. Monitor
= 0 (1)
00:00:00.678680 PBE - Pending Break Enabled
= 0 (1)
00:00:00.678682 SSE3 - SSE3 support
= 1 (1)
00:00:00.678683 PCLMUL - PCLMULQDQ support (for AES-GCM)
= 0 (1)
00:00:00.678684 DTES64 - DS Area 64-bit Layout
= 0 (1)
00:00:00.678685 MONITOR - MONITOR/MWAIT instructions
= 1 (1)
00:00:00.678687 CPL-DS - CPL Qualified Debug Store
= 0 (1)
00:00:00.678688 VMX - Virtual Machine Extensions
= 0 (1)
00:00:00.678689 SMX - Safer Mode Extensions
= 0 (1)
00:00:00.678690 EST - Enhanced SpeedStep Technology
= 0 (1)
00:00:00.678691 TM2 - Terminal Monitor 2
= 0 (1)
00:00:00.678693 SSSE3 - Supplemental Streaming SIMD Extensions 3
= 1 (1)
00:00:00.678694 CNTX-ID - L1 Context ID
= 0 (0)
00:00:00.678695 SDBG - Silicon Debug interface
= 0 (0)
00:00:00.678696 FMA - Fused Multiply Add extensions
= 0 (0)
00:00:00.678698 CX16 - CMPXCHG16B instruction
= 0 (1)
00:00:00.678699 TPRUPDATE - xTPR Update Control
= 0 (1)
00:00:00.678700 PDCM - Perf/Debug Capability MSR
= 0 (1)
00:00:00.678701 PCID - Process Context Identifiers
= 0 (1)
00:00:00.678702 DCA - Direct Cache Access
= 0 (0)
00:00:00.678704 SSE4_1 - SSE4_1 support
= 1 (1)
00:00:00.678705 SSE4_2 - SSE4_2 support
= 1 (1)
00:00:00.678706 X2APIC - x2APIC support
= 1 (0)
00:00:00.678708 MOVBE - MOVBE instruction
= 0 (0)
00:00:00.678709 POPCNT - POPCNT instruction
= 0 (1)
00:00:00.678710 TSCDEADL - Time Stamp Counter Deadline
= 0 (0)
00:00:00.678711 AES - AES instructions
= 0 (1)
00:00:00.678713 XSAVE - XSAVE instruction
= 0 (0)
00:00:00.678714 OSXSAVE - OSXSAVE instruction
= 0 (0)
00:00:00.678715 AVX - AVX support
= 0 (0)
00:00:00.678717 F16C - 16-bit floating point conversion instructions
= 0 (0)
00:00:00.678718 RDRAND - RDRAND instruction
= 0 (0)
00:00:00.678719 HVP - Hypervisor Present (we're a guest)
= 1 (0)
00:00:00.678720 Structured Extended Feature Flags Enumeration (leaf 7):
00:00:00.678721 Mnemonic - Descriptio
--
Ticket URL: <https://www.virtualbox.org/ticket/17987#comment:6>
Oracle VM VirtualBox <https://www.virtualbox.org/>
More information about the Whonix-devel
mailing list
“Look here!” Dick began to chuckle. “We’ve got a queer combination to work with—our Sky Patrol has! Suspicious Sandy—and—Superstitious Jeff!” Sandy grinned ruefully, a little sheepishly. Larry smiled and shook his head, warning Dick not to carry his sarcasm any further, as Jeff frowned. 52 "You do doubt me. If you did not, it would never occur to you to deny it. You doubt me now, and you will doubt me still more if you don't read it. In justice to me you must." "That same. She was part Mescalero, anyway." This Act, as disgraceful as any which ever dishonoured the statute-book in the reigns of the Tudors or Stuarts, was introduced into the Commons, on the 12th of May, by Sir William Wyndham, and was resolutely opposed by the Whigs, amongst whom Sir Peter King, Sir Joseph Jekyll, Mr. Hampden, Robert Walpole, and General Stanhope distinguished themselves. They did not convince the majority, which amounted to no less than two hundred and thirty-seven to one hundred and twenty-six. In the Lords, Bolingbroke himself moved the second reading, and it was ably opposed by the Lords Cowper, Wharton, Halifax, Townshend, Nottingham, and others. The greatest curiosity was displayed regarding the part which Oxford would take, as it was known that in the Council he had endeavoured to soften the rigorous clauses; but in the House he followed his usual shuffling habit, declaring that he had not yet considered the question; and, having induced the Opposition to let the second reading pass without a division, he absented himself from the final voting, and thus disgusted both parties and hastened his own fall. The battle of Falkirk, which in itself appeared so brilliant an affair for Prince Charles, was really one of his most serious disasters. The Highlanders, according to their regular custom when loaded with plunder, went off in great numbers to their homes with their booty. His chief officers became furious against each other in discussing their respective merits in the battle. Lord George Murray, who had himself behaved most bravely in the field, complained that Lord John Drummond had not exerted himself, or pursuit might have been made and the royal army been utterly annihilated. This spirit of discontent was greatly aggravated by the siege of the castle of Stirling. Old General Blakeney, who commanded the garrison, declared he would hold out to the last man, in spite of the terrible threats of Lord George Murray if he did not surrender. The Highlanders grew disgusted with work so contrary to their habits; and, indeed, the French engineer, the so-called Marquis de Mirabelle, was so utterly ignorant of his profession, that the batteries which he constructed were commanded by the castle, and the men were so much exposed that they were in danger of being destroyed before they took the fortress. Accordingly, on the 24th of January they struck to a man, and refused to go any more into the trenches. "Haint we bit off more'n we kin chaw. Shorty?" asked Si, as he looked over the increasing gang. "Hadn't we better ask for some help?" "How far would it carry?" Corpril, Company Q, 2 Hundsrdth Injiamiy Volintear "He d?an't care much. F?ather, he likes to be comfortable, and this Inclosure w?an't make much difference to that. 'T?un't as if we wanted the pasture badly, and F?ather he d?an't care about land." "Byles," interrupted Calverley, speaking rapidly, "you are poor—you are in arrear with your rent; a distress will be levied, and then what will become of you—of your wife and the little one? Listen to me! I will give you money to keep a house over your head; and when I am steward, you shall have the first farm at my lord's disposal, if you will only aid me in my revenge! Revenge!" he repeated, vehemently—"but you hesitate—you refuse." "Yes, yes, there is little doubt of that: but how can we come at the truth? Sudbury still retains his wrath against us, and would oppose an arrest; and even could he be waylaid, and brought hither, he is stubborn, and might refuse to answer." HoME 一级做人爱c视正版免费
ENTER NUMBET 0017 www.gtavr.net.cn
tzron.com.cn
bisuo4.com.cn
www.xumu7.net.cn
www.mante8.com.cn
qunya2.com.cn
sixie2.net.cn
www.abcwallet.com.cn
www.0471r.com.cn
www.6662016.org.cn
大胆日本女优
ccc36狠狠撸小说
天天好逼a
WWW.9E9X.COM
WWW.VF2GG.COM
WWW.2773833.COM
WWW.TFKRQ.COM
WWW.JQSQL.COM
WWW.CRWMART.COM
WWW.HHH785.COM
WWW.SETIANTANG8.COM
WWW.W7PPPPP.COM
WWW.39YNU.COM
WWW.NJAORUN.COM
WWW.ZGTNBYB.COM
WWW.712100.COM
WWW.YZAV1.COM
WWW.TOUZ365.COM
裙底偷拍18p
爱逼av
81xAcon
星河大帝口述
操张帆医生
色图片图片区
偷拍自拍内衣12p
嘿秀直播
露小穴图片p
赵薇评价古巨基
成人高清教育av
搜索myoujizzcominfo
68人体艺术成人悠悠草裙社区
亚洲色大全
舒淇三级电影
3move视频大全
校园春色小说合集
怡春院图片欣赏图片库
调教性奴女教师
欧美色图wwwxxxx61com
狗奴天堂全
葵司三级片
使用q播的电影网站
黑丝支付影院
欧美电影校园春色
射姐姐手机在线影院
账户凭空多巨款
3344nq
wwwpp398comVR
色色射撸
天堂网2016avcom久草
日本无码高清在线q
变态极限调教性奴10p
嫩妹导航
超碰自拍图片
福利的特黄色电影
meinvtao
城崎麻理子
午夜大片厂
大香蕉巨乳专区
成人av不卡在线
av在线五毒
狠狠射鲁一鲁
好屌915
影音先锋乱伦动漫
大香焦动漫影院
在线看的免费播放AV
aomeisetu
99re6久久热在线观看3
日死你了
色萝莉ac
www456gancom
赎罪の教室在线观看
手机看片1024国内甚地
wwwbobo
domainwww720lucom
激情mmav
开心五月先锋影音资源
色尼姑官方网址中文
无毛妈妈H游戏
av毛片成人在线观看网站
果敢姑姑制服丝袜
在线丝袜色图
撸撸色av视频
wwwwwav
香港黄色无码视频
黄色图片大JJ
嫩逼穴成人美女
东方av在线电视
操微信少妇丝袜15p
和尚干少妇小说全集
自拍片牛牛视频
哥哥日逼影院
亚洲最新打炮色图片
么么影院呀~好多福利
黄色激情漫画色女人网站激情小游戏
偷拍丝袜亚洲欧美
黄色日逼紧逼医院护十
av按摩网址
操大肥嫩逼
韩国小妹服务20p
七七色七七色影院七七色在线影院一黄色片子
q2002电影在线观看m917mmcom
欧美性交成人网站
堕落新妻淫荡小说
在线sesese
撸二哥色人阁
caoliushequrg
ss111亚洲
啊鸡巴太大了使劲操屄儿啊
骚嫂子电影院
丰满乳房少妇性小说
WWW_FAMITSU_COM
日本乱伦图片种子
五月天社区亚洲色图
顶风网全裸体艺术照
黑鸡巴干逼图片 操逼
www1234成人网
大鸡巴日肥逼图片
操逼小说图片网站
连襟换妻乱伦
青木琳在线网站
WWW_CHEM99_COM
水越沙耶香动漫电子书
ribendanairenti
24美图吧日本女优
rct472
女同性爱快播
欧美性爱第九页爱淘爱咪咪
taosenvcom
女人鸡逼
美少女色片 第四色
吹箫动态图片
美利坚合众国涩涩图库
美女操逼30p图
品色堂域名
骚妹妹私穴
色色大波音影
农村人小说网乱伦故事
日本美女漏毛图片
穿上内衣挺丰满脱了就平了
欧美激情 熟妇人妻
狗狗‵′靠逼视频
农村熟妇露逼
治脚气最有效的方法
幽门螺旋菌如何治疗
五月天大香蕉欧美激情
淫香淫色插插插
五月天丁香妹妹
熟女合成48p
初中生和女同学插屁眼图片
偷怕人体艺术
daruoxue
www02ssss
苹果6怎么关扩音
男人大吊操逼图片
yqazhouseqing
熟女肛交30p
在线看片的软件你懂的
66rt人体艺术
泰国妹舔好
插女邻居
wwwsee78c0om
第一色库
射嫂子的高跟鞋
日本少妇无玛
后花园淫欲的漂亮超模
欧美激清阴道
94亚州色图
骚屄自拍自慰
新上的离妇少妇叫床声好听
日本激情内射黄片
日本人体艺术女人黑b
亚洲色图欧美色图校园纯情快播
瑟妃18部合集在线观看快播
日本女人美b
av快播欧美
sesemov
西瓜影院图片图库
操屄小说视频
狂插淫妻
日本少女全裸走秀
飞沙滩wwwooxxbbcom
操越南女人逼图
cos先锋影音
强奸幼女进得去
骚妇全裸开房
wwwitao94com
三次成人国产电影网站
仲平一家的乱伦生活
孕妇狠狠
看免费的艹美少女av片
就要哥哥爱爱AV
日本黄艳电影
一级全裸三级片
女生跪着漏出屄
欧美AV校长艹学生
揉胸吸奶150
wwwzooskoovdoscom
为淫民服务器
岛国调教magnet
xfplayzx影音先锋资源
xxx猫咪
嫩屄穴
juse五月
久久热新地址
乱伦偷情性交
聊城交通违章查询
玛利亚大棒
婷婷五月亚洲制服诱惑
ggbb日本一级黄色操逼
bt与奶奶做爱种子
潘金连淫乱
彩色丝袜足交漫画全彩
多毛姥姥性爱
欧美裸体Av图片
都市激情凌辱
空港magnet
情欲轮奸小说
寻春色
97开心五月天
在线看黄片
h网址
色男色女
欲望之都
大色魔电影
淫荡小妹妹
3A丝袜论坛
3P性爱电影
AV盒子谁有E谁有G
mejane在线
porn99在线
超碰下载
琪琪电影网
男人天天堂岛
色土豆五月激情综合网
黄色av网战
魔界骑士在线
里番3d一家人野外
电影午夜情视频
蛇精潮穴
ggg373
xo影片影集
情侣自拍内射
小湿影院
清纯萌妹子KIKI magnet xt urn btih
小黄瓜华人最强综合资源
情侣酒店自拍视频 magnet
清宫艳史h版
日常偷拍国产在线
孕交在线播放一本道
久久涩综合久久
我们是资源搬运工
水岛津实肉丝袜瑜伽
800av路cn
WWWAv马女交exx
xxooo168
西西人体rntnr国模吧
3344ve
免费无码福利影院
操在线无码视频
找一个无密码啪啪啪视频
熟女人妻aV
27电影院福利电影在线象播放
影院 肛 天海
国产 同事 校园 在线
国产做爱真实自拍
国产母精彩对白在线
国产卡戴珊
神马福利视频511x
泰迪影院
守望先锋AV网站
奇芭AV成人
mxgs733中文字幕迅雷下载
三浦惠里子热带夜
VR 日韩 亚洲 欧美
影音先锋371无码影院
涩涩二
阿v淘宝怼妹子在线观看
福利上瘾怎么播不了
东京干手机福利视频
饿肉文
xo168亚洲在线噜噜
迪丽热巴被取精视频
大B影院
碉堡了周末约单位肥臀离异大姐KTV唱歌直接在包厢里啪啪啪边唱边干真有情调开
老太 性爱自拍
搭讪 熟女 磁力
国产亚洲精品自拍偷拍野战视频
MILD-888
悠悠资源ak
丁香五月天小说网
极品星野遥在线播放bd
操逼在线播放
日日福利ririfulicom
鸡巴插入欧美美女的b舒服
xo 在线
k8经典邱淑贞
吻戏软件影院
ye321磁力 下载
喜爱夜蒲83
OVG-069
成人影片无码
好男人色视频
av免费官网
靓装爱神7在线播放
真人兔女郎福利视频
激情成人免费视频
自慰高潮自拍
黄色视频VA
一本道伦理电影esss手机版
日韩大香蕉在线口爆深喉
国产 视频爱 吉他 椅子 熟女
色和尚国产自拍
黄片儿15793
荷花在线播放自拍
憋高潮
vidsvids10岁小学生
尽余生百度云链接
情人自拍偷拍在线
新潘金连手机在线视欲
学生制服装的哈尔滨19岁小美女的器具自慰视频秀
校园附近特色房年轻学生情侣开房爱爱
阿娇 magnet
成人啪啪视濒 西安
kk原创在线观看
在线歌舞团福利
邪恶道Av
最新av直播软件资源29P
福利 下载
夜色影院日韩系例
少妇阴道流水视频
久久996re国产 在线
美女露点走光合集下载
av在线91
色琪琪影色 影音先锋
4438yy
蚯蚓 5566影视
波多野结衣av免费高清电影
操美女在哪里呢
操逼视频 ftp
宅男影院91
av谷露影院
最新素人J 在线播放
琪琪亚洲综合网
武藤兰av无播放器观看
浮力 西瓜影音
操你啦在线日小屄视频
Sex Dolls By りん- レイナ- 惠美梨 (黑人) mp4
ssni系列合集迅雷下载
欧美校园 mp4
ak18cn
午夜影院摸美女屁股视频
台湾艳妇磁力链 下载
色欲色相天天影视
熟女人妇 西瓜影音
老司机AV影院
国外A片 下载
杨钰莹红楼伦理片
二次元福利在线
骚货主播视频
沙滩多人Ⅹxoo视频
强姐撸偷拍自拍
苍井优黄片视频
做爱性交视频百度云
亚裔混血丝袜
被丈夫上司侵犯向井蓝视频
不卡顿自拍福利视频
不要App的A片网站 西瓜影音
国产自拍论坛
波罗野结衣四虎精品在线
操你在线视频观看
碰超p视频分类
欢淫阁 西瓜影音
露脸自拍92年p
大鸡巴操b视频
韓國熟女插入Kitamura-Office Lady
免费观看任你搞
就要dajiji午夜电影
最新自拍av
gav网
巨乳多毛视频日本人日人护士长在线直播视频
骚货国产在线
极欲燃烧 快播
GVG-225
做嗳视频免费试看
美女AV唐人社福利网视频
伦理片eeuss影院2018
深插性爱视频
金荷娜17部svip视频磁力
秋霞影院女生被叉全过程
奇米影视网站资源
玉女影院
91福利网红女主播首页
jjjj87
国产自拍午夜青青
老司机在视频国产
精品国产自在线拍400部
每日更新亚洲视频
华人ss在线视频
朋友辣妈泰勒菲斯影音先锋在线观看
黄色香港三级片日本三级片
黄色乱伦视频在线观看
黑人同性肛交视频 视频
黄片啪啪啪视频
欧美六月婷婷在线视频
后人动态图
黄色网 下载
女王SM阉割
松下荣纱子电影在线观看
中文字幕大香蕉人澡
放荡的女人2 ftp
三上悠亚tek067手机在线
韩国主播VIP ftp
言情激情爽片免费在线播放
国产姑娘自拍
抠阴唇喷水视频
野战国产在线视频
欧美尻屄视频
国产自拍偷拍啪啪啪
免费性交大视频播放
免费观看性视频软件
国产幼女aV
国外成人视频在线观看
qiangjianluanlun影院
国内自拍亚洲日韩av
色妞香蕉
亚洲色播影院在线电影
王者色网站 ed2k
欧美一本道无码高清视频
四虎演院
日本强奸乱伦动漫
sv成人视频
汤芳丝丝
女人的肥屄
电影宒男乱伦小说
怎呀操逼
操她娘的骚屄
春暖花开亚洲无码区老版
与五十多岁女人发生了
幼女幼穴
旬琳人体艺术人生
xxoo8us你懂的
猛男女在野外激情性交视频
大中华色厦门奸在线
uuuu5555
兄妹乱伦svs
加勒比阳台15p
人嘼性交视频
狠狠日故事
最新老妈插逼电影
李宗瑞不雅照外泄全套高清图片和视频
se网站贴吧
欧洲少女图片
477人体艺术
999苍井空电影
日夜干逼
日本色五小狗
林心如 三级片
全部数据qvod偷拍自拍
日本女优性侵艳照门图片
操妹妹的b
熟女与少年大尺度电影有哪些
色色成人阁新地址
love final 冈田真由香
熟女的肥屄图
冢本友希先锋
欧美裸体女性照艺术曝光刘
色星爱大屌
强奸乱伦做爱视频
色青五月激情五月
快播semm色五情月8888车保养常识结果xt全集下载
台湾美女人体艺术照片
mmmm1212六月天空
与女儿的性爱故事
女人的馒头b干
丰满美熟妇图片
李宗瑞视屏下载
男性露私人体艺术照
撸一撸李宗瑞系列
WWW_53QA_COM
狠狠路大香焦
淫色网淫人阁淫咪咪悠悠色爷
操逼 15种
花开半夏演员表
混合型血管瘤消退过程
2012年开奖记录
榛怎么读
北京雾霾什么时候结束
9517电影网
亚州桃花源成人小说
老太太吃鸡巴
人体美图
健身操thunderftp
嫩穴衅
韩国班主任skype连线教学生怎么自慰mp4233m5p77ct
快播日韩电车痴汉电影
女的操
无码xx电影
曰本成人电影网站
色老大撸一撸色奶奶
波多野结衣bt全集
淫乱的少妇
xxoo3us亚洲图片
成人激情图库
屄毛屄眼
快播韩国主播
亚洲图区大一的美女
黄色小说网站干
性福社区图片
人妻色图2
让母亲插入
色桥人体艺术抓美网抓拍美女美丽
影音先锋美臀写真
巨乳写真网站
奸妈屄
校园春色撸绿色
死神纹身血色天使图片
手操穴图片
明星瘾乱合成图片
美女oodyutfhf
苍井空三级全集西瓜
萝莉色导航
快播同志伦理电影在线观看
WWWK377COM
国产胖逼视频
色五月四房播
佐佐木春香
大鸡巴屄艺术图片
男裸照page2
外国女人和大公狗做视频
变态强奸伦理av片
性奴3
骚淫插入少妇
色吧色吧图片
小慧淫荡
成人视频只能看啊
五月无夜天
美国射十次
欧美女36p
极爽影院破解版
偷拍幼幼女
日本图书馆ed2k
日本群交图片搜索
西瓜影院天狼影院
亚洲龙腾小说图片专区
密桃影院图片大全
pppppwwww
口交中文字幕在线视频
www爱否图库
成人天天色
花与蛇www15yccom
变态另类狂人色
u影一族伦理片
超长头发做爱mp4
zxzy16cn
欧美bbi
绿色无毒的av电影网址
大巨乳近亲相奸
狠撸欧美嫩逼
亚洲色图综合图库
五月姐姐缴情人体网站
哥哥不要插了好粗受不了了3571色图
超碰淫妻小说
搜狗乱伦操小逼
激情电影网手机在线
淫荡艺术套图下载
免费自卫直播
在线免费观看动物敲门
都市激情公车
女人的鸡鸡直播
小早川怜子hd在线直播
快播日本乱伦
色欲性吧
AVTT暴风影音
超碰万部不用播放器免费视频
美白丈母娘乱伦
熟女鲍鱼鼓鼓
日本av少妇长江隆美
亚州做爱色图
亚洲色图幼幼性交
WWWXVIDEOSCOMed2k
舔肛门的文章
武侠古典爆乳精灵村
无毛二穴插入闷绝
性感妇
激情五月天色播网
wwwheitai
97蜜桃黄色电影图片
近亲相奸美尻と中出し
WWW_401111_COM
小旅店操鸡视频带时间
人体落体国
妓女人体图片
丝袜美腿美乳av视频
韩剧小姐无插件
亚洲色图双胞胎
潘金莲之前世今生
依人色
8撸撸
骑姐姐干姐姐姐也色
成人电影欲求不满
性感人妻老婆
swwwjj613comhtmmp4list12htm
淑女爆菊网
在线视频清纯唯美
av插小学生电影
夕夕影院
www306PPC0m
寂寞人妻居家自拍色图
AVAV熟女人妻
插插黄片
巨乳免费av
日韩制服丝片
四虎影库porn
性情
36d美女图片
男人天堂百度百度
日本黄色图片网站www99pipicom
怡红院操B
色色爱爱婷婷网
怡春院国语sesqwcom
少妇熟女色亚洲色图
色妹子综合
美女图片98c
制服诱惑伦理电影
swwwzy1188com
美女自摸内裤自慰视频
wwwhaleav
ww236zzzcom
wwwqq人兽com
无毛小穴
哥哥幼女色色色免费在线观看
骚少妇性爱野外啪啪图
新最终电车痴汉
5858p先锋音影
和老婆30p
汁婷婷
谷露影院121在线y
大学生爆菊在线视频
五月激情综合狠狠色
胸部丰满的公主|Akiho|口交阴茎在完美的礼仪美女操多多影音
色中色亚洲成人电影
啊啊哥哥鸡巴
日本一级免费黄片
99ff3hiyyin
裸女图片全身不遮无马塞克
西瓜影音最新av资源
乱伦人妻av
爸爸上了漂亮女儿淫荡老妈在线
法兰西妇人体艺术
天夜日逼片
小姨子ady
足交图片在线影院
免费色哥网站
jiujiu超碰
www789iicom
女人很享受被操的电影
色站电影图片
水莓偷拍自拍
日本AV无码免费
和少女啪啪30p
素人娘初同性体验绝顶4时间在线播放-另类重口-狼人干综合
古典色色
丝袜美脚番号
maomiav成人www786bbcom
亚洲色图撸撸MVwww
另类色婷婷综合激情
手机自拍视频在线免费
juliaanntubebiguznet
美女明星的人体素像
亚洲夜射猫
黄色淫荡性虐小说
冲田杏梨的巨乳舔频屏吧
我要看光屁股美女奶子
综合激情网乱伦小说
AV天下绝色
影音先锋急先锋
5656先锋
245BBcom
91popoc蟽m
动漫av网站m9922avcom
代价magnet
手机看片www542mmcom
果干色图
安全免费的av网站
韩国美女直播脱衣舞magnet
4388xx成人网
中文A级下载
制服丝袜在线c仔
女知青风流小说
白石瞳百度音影
168rengti
苍井空真实做爱
99大胆人艺体图片
性福写真
人体艺性交亚洲黄色在线
成人3p性爱图
最美骚妇性交图片
神琦沙耶香
撸撸吧乱伦
操穿丝裤搔逼
超级胖女人能不能过性生活呢为什么
色美女自拍偷拍
台湾女郎被干
成人动漫综合网第一页
我给儿子当情妇
色色综合视频
国外全裸演唱会视频
曰本艺术图片
女人与公犬做 图片
少女自述50p
父亲生植器女儿可以看吗
东京热bt种子1000部
洛丽塔txt
想着胜利前进
姐姐的骚逼图片
母子交媾
我和姐夫做爱
48pian在线
日本人体艺术插入图
母夜吟百度贴吧
聚色阁17P亚洲图片
韩国艳照门全集下载
黄色电子书色播
美女的裸体淫秽
操大奶少妇的屄
狗操人的小说
李宗瑞视频1720部合集影音先锋在线观看
东北换妻自拍图
人体射精艺术图30p
wwwpu820cmo
丝袜大黑逼图片
成年dianin
成人综合网图
亚洲毛逼图片区
操刘亦菲视频大全
最新女优合集dvd
色妹妹影视中文字幕
李宗瑞黄色电影网站
日本骚女人体艺术
岩佐あゆみ吉吉语音
与继母乱伦黄色小说
成人电影强奸是真的吗
人体艺术顶级艺术网
貌若天仙的富家千金水嫩美乳色中色在线小窗口视频
欧美激情校园春色www34qfcom
淫和尚新地址
骚货恶搞
激情三级片自拍
仓井空逼图片
重口味的爱爱视频网站
修仙淫妻
捆绑虐待电影网
强奸女老师av十八岁的天空
mm内射中出
wwwzooskoovdoscom
26uuu综合插吧网
q2002影视院magnet
xfplay亚洲自拍
亚洲无码伦理电影在线直播
www360tiantangcom
偷插入阴穴
日本人第一次性体验
最新chaopeng做爱自拍视频
AV免费线观成人做爱
骚熟丝足微博
第四色图wwwt4yycom
小蛮腰小视频偷拍
v101宅男最新
japanesecunt
大白定色五月天
神马播放电影
有声性小说mp3mp3
樱井莉亚电影下载
www油区二中com
金娇娘影院
小色孩导航
男丝吧
天天影视网
就是吻
欧美性爱av丁香
香港楼梯门视频在线播放
小明激情网
超碰下载界面在页面
激情有码
yitunhuo最新链接
暴力强制系列的AV
凤凰av无码
亚洲图片强奸乱伦
特级黄片性交
PTS-298 丸ノ内OL专业按摩治疗院 23
国产露脸成人手机在线
我看逼 西瓜影音
91prion免费chines
小自拍
秋霞电影eusee
迅雷链接
亲生姐弟i发生性交关系全身裸体视频
在线阿v免费观看直播2017
日本香港黄一级aa毛片
日本性交无码VC炮图
日本无码逆3p视频
日韩国产毛片
两对夫妇野外交换中文字幕
九草激情影院视频
拔插拔插8x8x7987
白石茉莉奈在线
抖音门在线观看
亚洲无码在线视频
小川亚纱美视频
色播五月视频
wwewexnxnxn
久久热免费福利视频
在线视频我肮脏的女仆
黄色无码免费视屏
操B姝视频
欧美 啄木鸟 在线
1经典smav番号
苍金控
公众号nqq499霸片
香港av尤物迅雷种子下载
69bvzy
z爱色影
123酒色财气网
www,57 ppp,com
韩国女主播直播福利视频
亚洲东方在线观看
日人电影
yu6080福利电影
本城小百合正在播放
日韩vr_k频道网络视频分享系统
亚洲图片京东热av
极品红人cutie queen
吉泽明步986先锋
影音先锋自拍偷拍AV资源
超碰视频天堂
福利上瘾怎么播不了
成人在线国产自拍
出差保定带新同事一起出差洗完澡来我房间要求教她报票乘机把她搞了
风间由美284先锋作品
成人影院 我的怡红院
破处视频 magnet xt urn btih
japanese自拍口交
免费在线日本av
955mmmcom
日本视频无码167
足控磁力 mp4
色片 下载
当着丈夫面被人强奸的日本AV番号
野战门主播磁力 magnet
澳门金光在线视频
高清无码 爱爱
偷拍 自拍 国产在线播放
k8经典邱淑贞
下海无马赛克在线
76zy
国内外成人免费激情视频
gan000com
主播网红在线影院
91萝莉转区
美女破处
欧美有码性爱
女友 自拍 动漫 欧美
美利国产福利视频
国产偷拍撸管在线
强奸乱伦亚洲电影欧美
午夜福利在线偷拍
x08xxx视频专辑
zzzzxxxx97
丝袜剧情Av
av在线免费年轻
小清色影视
易阳与老外15分钟茄子视频
姐婶子妈小姨
av淘宝2o19淘你喜欢
九卅影城tv777
韩国两性bd理论片重口味
压摩擦精子视频
小泽玛利亚丁冬影视
香蕉网络电视
迅雷下载福利视频
邪恶少漫画a邪恶道大全漫画全彩火影
写真午夜福利视频
日本中学生体内射精
颜射美女大学生
欧美日韩在线五码
Xxxxx161116骆驼祥子
男S做爱视频
622好看的电影
日月影视啪啪啪
草包网在钱精彩视频
成人宅男小视频DVD
偷拍视频成人app
午夜景院小视频
奶子不小的高挑美女见网友吃饭被灌醉带到宾馆
欧美黄A片天天影院
久久成人福利免费
立花美凉资源在线播放
波多野结衣末减版av
国产自拍gv
国内熟女偷拍福利视频
在线直播欧美双飞90后美女
www82cc
衣服AV
啵啵xo影库
超黄的操逼片
柏木由纪bt
百度云wanz813
wp福利视频
鲁鲁鲁干小妹在线视频
田佳秀三级电影 ed2k
正在播放美女自慰出水澳门葡京
色无极在线图片专区
国产视频在线看葡京
国产360针孔摄像头酒店偷拍视频
sm4321
邪恶道漫画a邪恶帝大全漫画全彩
福利直播视频在线
噜噜吧老司机免费影院
伦理片essuu
裸体狂欢在线
黄片视频无码片
北京屄屄屄屄屄屄屄
不卡成人啪啪
wwwse999
情欲房美女脱衣舞会
废柴影视
台湾瘦美美女种子
午夜福利视70
97超碰人妻在线视频
rois在线看
诱惑突起巨乳松下美雪在线
中曰韩黄色视频
WWw:zV789,Com
8k影院伦理电影
青青草原视频9191
优木伊织在线
在日本av线看
精品自拍 白石茉莉茶
秋霞影院eeussll
精彩国产在线
水岛津实协和影音
午夜成人影网在线观看
妈妈好紧好舒服视频
高抄离罩奶头贴吧
japanese hdschool
灰毛衣链接密码最新
黑人插pp 24p动态视频
女人屋福利视频免
户外女主播勾引外卖小哥打野炮
黑丝情人的挑逗让我欲罢不能大鸡巴每次都被伺候的软歪歪这样的女人一辈子也玩
黄色裸体特级免费视频
啪啪圈受伤
99福利男人的天堂
MIDE-582迅雷链接
一级毛片片aa'/
三邦影视AV电影
偷拍自拍A片中国
www,4438x7
96av免费视频在线播放
阿娇舔陈冠希1314
男女野外自拍磁力链接
内裤哥媛茜茜在线播放
名优女馆电影
国产鸭子av永久
戳逼视屏
ak福利资源
中国老奶奶yyy
laohantuiche
r18视频成人影院
国产无码偷拍小视频
sq880
全国最大的成人色青网
肛交在线免费视频
国产演绎在线
mimiskk
熟成熟女回春油视频
青娱乐成人国产
a阿vvt天堂2014在线
大香蕉猫咪媛高清视频
欧美一本道无码高清视频
国产熟女磁力链接讯雷下载 下载
6655qv
西西人全祼艺体图片大胆
嘻嘻色图五月天
空姐的多毛逼
亚洲美女逼图片15p
日本裸体漂亮美女大胆写真
人体艺术图打包下载
性都花花世界花世界
WWW_BBB4444_COM
璋佹湁鎴愪汉榛勮壊锷ㄦ极鐢靛奖缃戠珯
日本女优木下大奶人体
人体也看
我和少妇在车上
口交bt种子
亚洲熟女36p
淫荡的叫床声下载
超碰兽奸免费视频