Opened 6 years ago
Last modified 11 months ago
#17987 reopened defect
VirtualBox 5.2.18 vulnerable to spectre/meltdown despite microcode being installed
| Reported by: | adrelanos | Owned by: | |
|---|---|---|---|
| Component: | other | Version: | VirtualBox 5.2.18 |
| Keywords: | Cc: | whonix-devel@… | |
| Guest type: | Linux | Host type: | Linux |
Description
How to reproduce:
A host running Debian stretch. Using VirtualBox version 5.2.18. A guest running Debian stretch.
Host using stretch-backports with get access to newer microcode. (Old versions are incapable to show spectre/meltdown fixed.)
spectre-meltdown-checker being installed on host and in guest from stretch-backports. (Old versions are incapable to show spectre/meltdown fixed.)
sudo su -c "echo -e 'deb http://http.debian.net/debian stretch-backports main contrib non-free' > /etc/apt/sources.list.d/backports.list"
sudo apt-get update
sudo apt-get -t stretch-backports install spectre-meltdown-checker
Suppose microcode being installed.
Intel:
sudo apt-get -t stretch-backports install intel-microcode
Amd:
sudo apt-get -t stretch-backports install amd64-microcode
Suppose running spectre-meltdown-checker on the host looks fine.
sudo spectre-meltdown-checker --paranoid ; echo $?
By fine I mean exit code 0 and not showing "vulnerable".
Suppose using all VirtualBox spectre/meltdown defense options.
VBoxManage modifyvm vm-name --ibpb-on-vm-entry on
VBoxManage modifyvm vm-name --ibpb-on-vm-exit on
VBoxManage modifyvm vm-name --spec-ctrl on
VBoxManage modifyvm vm-name --l1d-flush-on-sched off
(These options were introduced in VirtualBox version 5.2.18.)
Expected result:
spectre-meltdown-checker in guest VM saying "all fine".
sudo spectre-meltdown-checker --paranoid ; echo $?
By fine I mean exit code 0 and not showing "vulnerable".
Actual result:
spectre-meltdown-checker reporting vulnerable.
Questions:
Can you reproduce the same issue?
Were all necessary steps performed to protect the guest from spectre/meltdown?
Is this a VirtualBox issue or false-positive in spectre-meltdown-checker?
Change History (10)
follow-up: 2 comment:1 by , 6 years ago
| Resolution: | → worksforme |
|---|---|
| Status: | new → closed |
comment:2 by , 6 years ago
| Resolution: | worksforme |
|---|---|
| Status: | closed → reopened |
I hope you don't mind me reopening the ticket but mentioning VBoxManage modifyvm "foo" --spec-ctrl on while my bug report already contained VBoxManage modifyvm vm-name --spec-ctrl on makes me wonder if you might have overlooked that.
Replying to klaus:
If you want the mitigation to be available in a VM (default is not, because it comes at a cost) you can enable it. See the https://www.virtualbox.org/manual/ch08.html,
VBoxManage modifyvm "foo" --spec-ctrl on
My bug report in my post above contains
VBoxManage modifyvm vm-name --spec-ctrl on
So I did enable that setting already and yet sudo spectre-meltdown-checker --paranoid ; echo $? exits non-zero and shows "vulnerable". Is that expected?
comment:3 by , 6 years ago
Sorry, been reading not enough of your report it seems. No, this isn't expected. Looks like it needs dev attention (including having a look at what exactly goes wrong with specre-meltdown-checker.
comment:5 by , 6 years ago
Will provide soon.
Updated, full list of settings tried to fix this.
VBoxManage modifyvm vm-name --ibpb-on-vm-entry on VBoxManage modifyvm vm-name --ibpb-on-vm-exit on VBoxManage modifyvm vm-name --l1d-flush-on-vm-entry on VBoxManage modifyvm vm-name --l1d-flush-on-sched on VBoxManage modifyvm vm-name --spec-ctrl on VBoxManage modifyvm vm-name --nestedpaging off
(sudo spectre-meltdown-checker --paranoid ; echo $? still exists non-zero and shows "vulnerable".)
comment:6 by , 6 years ago
Debian host.
root@user:/home/user# spectre-meltdown-checker --paranoid ; echo $?
Spectre and Meltdown mitigation detection tool v0.39
Checking for vulnerabilities on current system
Kernel is Linux 4.9.0-8-amd64 #1 SMP Debian 4.9.110-3+deb9u4 (2018-08-21) x86_64
CPU is Intel(R) Core(TM) i5 CPU M 580 @ 2.67GHz
Hardware check
* Hardware support (CPU microcode) for mitigation techniques
* Indirect Branch Restricted Speculation (IBRS)
* SPEC_CTRL MSR is available: YES
* CPU indicates IBRS capability: YES (SPEC_CTRL feature bit)
* Indirect Branch Prediction Barrier (IBPB)
* PRED_CMD MSR is available: YES
* CPU indicates IBPB capability: YES (SPEC_CTRL feature bit)
* Single Thread Indirect Branch Predictors (STIBP)
* SPEC_CTRL MSR is available: YES
* CPU indicates STIBP capability: YES (Intel STIBP feature bit)
* Speculative Store Bypass Disable (SSBD)
* CPU indicates SSBD capability: YES (Intel SSBD)
* Enhanced IBRS (IBRS_ALL)
* CPU indicates ARCH_CAPABILITIES MSR availability: NO
* ARCH_CAPABILITIES MSR advertises IBRS_ALL capability: NO
* CPU explicitly indicates not being vulnerable to Meltdown (RDCL_NO): NO
* CPU explicitly indicates not being vulnerable to Variant 4 (SSB_NO): NO
* Hypervisor indicates host CPU might be vulnerable to RSB underflow (RSBA): NO
* CPU microcode is known to cause stability problems: NO (model 0x25 family 0x6 stepping 0x5 ucode 0x7 cpuid 0x20655)
* CPU vulnerability to the speculative execution attack variants
* Vulnerable to Variant 1: YES
* Vulnerable to Variant 2: YES
* Vulnerable to Variant 3: YES
* Vulnerable to Variant 3a: YES
* Vulnerable to Variant 4: YES
CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Mitigated according to the /sys interface: YES (Mitigation: __user pointer sanitization)
* Kernel has array_index_mask_nospec: YES (1 occurrence(s) found of x86 64 bits array_index_mask_nospec())
* Kernel has the Red Hat/Ubuntu patch: NO
* Kernel has mask_nospec64 (arm64): NO
> STATUS: NOT VULNERABLE (Mitigation: __user pointer sanitization)
CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigated according to the /sys interface: YES (Mitigation: Full generic retpoline, IBPB, IBRS_FW)
* Mitigation 1
* Kernel is compiled with IBRS support: YES
* IBRS enabled and active: YES (for kernel and firmware code)
* Kernel is compiled with IBPB support: YES
* IBPB enabled and active: YES
* Mitigation 2
* Kernel has branch predictor hardening (arm): NO
* Kernel compiled with retpoline option: YES
* Kernel compiled with a retpoline-aware compiler: YES (kernel reports full retpoline compilation)
> STATUS: NOT VULNERABLE (Full retpoline + IBPB are mitigating the vulnerability)
CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Mitigated according to the /sys interface: YES (Mitigation: PTI)
* Kernel supports Page Table Isolation (PTI): YES
* PTI enabled and active: YES
* Reduced performance impact of PTI: YES (CPU supports PCID, performance impact of PTI will be reduced)
* Running as a Xen PV DomU: NO
> STATUS: NOT VULNERABLE (Mitigation: PTI)
CVE-2018-3640 [rogue system register read] aka 'Variant 3a'
* CPU microcode mitigates the vulnerability: YES
> STATUS: NOT VULNERABLE (your CPU microcode mitigates the vulnerability)
CVE-2018-3639 [speculative store bypass] aka 'Variant 4'
* Mitigated according to the /sys interface: YES (Mitigation: Speculative Store Bypass disabled via prctl and seccomp)
* Kernel supports speculation store bypass: YES (found in /proc/self/status)
> STATUS: NOT VULNERABLE (Mitigation: Speculative Store Bypass disabled via prctl and seccomp)
Need more detailed information about mitigation options? Use --explain
A false sense of security is worse than no security at all, see --disclaimer
0
root@user:/home/user#
Debian guest VM.
user@debian:~$ su
Password:
root@debian:/home/user# spectre-meltdown-checker --paranoid -v -v -v
Spectre and Meltdown mitigation detection tool v0.39
(debug) attempted to load module cpuid, insmod_cpuid=1
(debug) cpuid: leaf1 on cpu0, eax-ebx-ecx-edx: 132693 2048 2151154185 126614527
(debug) cpuid: wanted register (1) has value 132693 aka 00020655
(debug) cpuid: shifted value by 0 is 132693 aka 20655
(debug) cpuid: after AND 0xFFFFFFFF, final value is 132693 aka 20655
Checking for vulnerabilities on current system
Kernel is Linux 4.9.0-8-amd64 #1 SMP Debian 4.9.110-3+deb9u4 (2018-08-21) x86_64
CPU is Intel(R) Core(TM) i5 CPU M 580 @ 2.67GHz
(debug) found opt_kernel=/boot/vmlinuz-4.9.0-8-amd64 in /proc/cmdline
(debug) opt_kernel is now /boot/vmlinuz-4.9.0-8-amd64
Will use kernel image /boot/vmlinuz-4.9.0-8-amd64
Will use kconfig /boot/config-4.9.0-8-amd64
Will use System.map file /proc/kallsyms
(debug) check_kernel: ret=0 size=4237088 sections=0 warnings=readelf: Error: Not an ELF file - it has the wrong magic bytes at the start/
(debug) check_kernel: ... file is invalid
(debug) try_decompress: looking for gunzip magic in /boot/vmlinuz-4.9.0-8-amd64
(debug) try_decompress: magic for gunzip found at offset 2668039:xy
(debug) try_decompress: decompression with gunzip failed (err=1)
(debug) try_decompress: looking for unxz magic in /boot/vmlinuz-4.9.0-8-amd64
(debug) try_decompress: magic for unxz found at offset 18357:abcde
(debug) check_kernel: ret=0 size=20161824 sections=10 warnings=
(debug) check_kernel: ... file is valid
(debug) try_decompress: decompressed with unxz successfully!
Kernel image is Linux version 4.9.0-8-amd64 (debian-kernel@lists.debian.org) (gcc version 6.3.0 20170516 (Debian 6.3.0-18+deb9u1) ) #1 SMP Debian 4.9.110-3+deb9u4 (2018-08-21)
Hardware check
* Hardware support (CPU microcode) for mitigation techniques
* Indirect Branch Restricted Speculation (IBRS)
* SPEC_CTRL MSR is available: (debug) attempted to load module msr, insmod_msr=1
(debug) read_msr: using perl
(debug) read_msr: MSR=0x48 value is 0
YES
* CPU indicates IBRS capability: (debug) cpuid: leaf7 on cpu0, eax-ebx-ecx-edx: 0 0 0 469762048
(debug) cpuid: wanted register (4) has value 469762048 aka 1c000000
(debug) cpuid: shifted value by 26 is 7 aka 7
(debug) cpuid: after AND 1, final value is 1 aka 1
(debug) cpuid: wanted 1 and got 1
YES (SPEC_CTRL feature bit)
* Indirect Branch Prediction Barrier (IBPB)
* PRED_CMD MSR is available: (debug) write_msr: using perl
(debug) write_msr: for cpu 0 on msr 73, ret=0
YES
* CPU indicates IBPB capability: YES (SPEC_CTRL feature bit)
* Single Thread Indirect Branch Predictors (STIBP)
* SPEC_CTRL MSR is available: YES
* CPU indicates STIBP capability: (debug) cpuid: leaf7 on cpu0, eax-ebx-ecx-edx: 0 0 0 469762048
(debug) cpuid: wanted register (4) has value 469762048 aka 1c000000
(debug) cpuid: shifted value by 27 is 3 aka 3
(debug) cpuid: after AND 1, final value is 1 aka 1
(debug) cpuid: wanted 1 and got 1
YES (Intel STIBP feature bit)
* Speculative Store Bypass Disable (SSBD)
* CPU indicates SSBD capability: (debug) cpuid: leaf7 on cpu0, eax-ebx-ecx-edx: 0 0 0 469762048
(debug) cpuid: wanted register (4) has value 469762048 aka 1c000000
(debug) cpuid: shifted value by 31 is 0 aka 0
(debug) cpuid: after AND 1, final value is 0 aka 0
(debug) cpuid: wanted 1 and got 0
NO
* Enhanced IBRS (IBRS_ALL)
* CPU indicates ARCH_CAPABILITIES MSR availability: (debug) cpuid: leaf7 on cpu0, eax-ebx-ecx-edx: 0 0 0 469762048
(debug) cpuid: wanted register (4) has value 469762048 aka 1c000000
(debug) cpuid: shifted value by 29 is 0 aka 0
(debug) cpuid: after AND 1, final value is 0 aka 0
(debug) cpuid: wanted 1 and got 0
NO
* ARCH_CAPABILITIES MSR advertises IBRS_ALL capability: NO
* CPU explicitly indicates not being vulnerable to Meltdown (RDCL_NO): NO
* CPU explicitly indicates not being vulnerable to Variant 4 (SSB_NO): NO
* Hypervisor indicates host CPU might be vulnerable to RSB underflow (RSBA): NO
* CPU microcode is known to cause stability problems: (debug) is_ucode_blacklisted: no (37/5/0x616)
NO (model 0x25 family 0x6 stepping 0x5 ucode 0x616 cpuid 0x20655)
* CPU vulnerability to the speculative execution attack variants
* Vulnerable to Variant 1: (debug) is_cpu_vulnerable: temp results are <> <> <> <> <>
(debug) is_cpu_vulnerable: final results are <0> <0> <0> <0> <0>
YES
* Vulnerable to Variant 2: YES
* Vulnerable to Variant 3: YES
* Vulnerable to Variant 3a: YES
* Vulnerable to Variant 4: YES
CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Mitigated according to the /sys interface: YES (Mitigation: __user pointer sanitization)
(debug) sys_interface_check: /sys/devices/system/cpu/vulnerabilities/spectre_v1=Mitigation: __user pointer sanitization
* Kernel has array_index_mask_nospec: YES (1 occurrence(s) found of x86 64 bits array_index_mask_nospec())
* Kernel has the Red Hat/Ubuntu patch: NO
* Kernel has mask_nospec64 (arm64): NO
* Checking count of LFENCE instructions following a jump in kernel... NO (only 3 jump-then-lfence instructions found, should be >= 30 (heuristic))
> STATUS: NOT VULNERABLE (Mitigation: __user pointer sanitization)
CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigated according to the /sys interface: YES (Mitigation: Full generic retpoline, IBPB, IBRS_FW)
(debug) sys_interface_check: /sys/devices/system/cpu/vulnerabilities/spectre_v2=Mitigation: Full generic retpoline, IBPB, IBRS_FW
* Mitigation 1
(debug) ibrs: /sys/kernel/debug/ibrs_enabled file doesn't exist
(debug) ibrs: /sys/kernel/debug/x86/ibrs_enabled file doesn't exist
(debug) ibrs: /proc/sys/kernel/ibrs_enabled file doesn't exist
(debug) ibpb: found enabled in sysfs
(debug) ibrs: found IBRS_FW in sysfs
(debug) ibrs: found IBRS in sysfs
* Kernel is compiled with IBRS support: YES (found IBRS_FW in sysfs)
* IBRS enabled and active: YES (for kernel and firmware code)
* Kernel is compiled with IBPB support: YES (IBPB found enabled in sysfs)
* IBPB enabled and active: YES
* Mitigation 2
* Kernel has branch predictor hardening (arm): NO
* Kernel compiled with retpoline option: YES
(debug) retpoline: found CONFIG_RETPOLINE=y in /boot/config-4.9.0-8-amd64
* Kernel compiled with a retpoline-aware compiler: YES (kernel reports full retpoline compilation)
* Local gcc is retpoline-aware: YES
* Kernel supports RSB filling: YES
> STATUS: NOT VULNERABLE (Full retpoline + IBPB are mitigating the vulnerability)
CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Mitigated according to the /sys interface: YES (Mitigation: PTI)
(debug) sys_interface_check: /sys/devices/system/cpu/vulnerabilities/meltdown=Mitigation: PTI
* Kernel supports Page Table Isolation (PTI): (debug) kpti_support: found option 'CONFIG_PAGE_TABLE_ISOLATION=y' in /boot/config-4.9.0-8-amd64
YES (found 'CONFIG_PAGE_TABLE_ISOLATION=y')
* PTI enabled and active: (debug) kpti_enabled: found 'kaiser' flag in /proc/cpuinfo
YES
* Reduced performance impact of PTI: (debug) cpuid: leaf1 on cpu0, eax-ebx-ecx-edx: 132693 2048 2151154185 126614527
(debug) cpuid: wanted register (3) has value 2151154185 aka 80380209
(debug) cpuid: shifted value by 17 is 16412 aka 401c
(debug) cpuid: after AND 1, final value is 0 aka 0
(debug) cpuid: wanted 1 and got 0
(debug) cpuid: leaf7 on cpu0, eax-ebx-ecx-edx: 0 0 0 469762048
(debug) cpuid: wanted register (2) has value 0 aka 00000000
(debug) cpuid: shifted value by 10 is 0 aka 0
(debug) cpuid: after AND 1, final value is 0 aka 0
(debug) cpuid: wanted 1 and got 0
NO (PCID/INVPCID not supported, performance impact of PTI will be significant)
* Running as a Xen PV DomU: NO
> STATUS: NOT VULNERABLE (Mitigation: PTI)
CVE-2018-3640 [rogue system register read] aka 'Variant 3a'
* CPU microcode mitigates the vulnerability: NO
> STATUS: VULNERABLE (an up-to-date CPU microcode is needed to mitigate this vulnerability)
CVE-2018-3639 [speculative store bypass] aka 'Variant 4'
* Mitigated according to the /sys interface: NO (Vulnerable)
(debug) sys_interface_check: /sys/devices/system/cpu/vulnerabilities/spec_store_bypass=Vulnerable
* Kernel supports speculation store bypass: (debug) found Speculation.Store.Bypass: in /proc/self/status
YES (found in /proc/self/status)
> STATUS: VULNERABLE (Your CPU doesn't support SSBD)
(debug) variables at end of script: '|bp_harden=''|bp_harden_can_tell='1'|capabilities_ibrs_all='0'|capabilities_rdcl_no='0'|capabilities_rsba='0'|capabilities_ssb_no='0'|cpu_family='6'|cpu_friendly_name='Intel(R) Core(TM) i5 CPU M 580 @ 2.67GHz'|cpuid='132693'|cpuid_arch_capabilities='0'|cpuid_ibpb='SPEC_CTRL'|cpuid_ibrs='SPEC_CTRL'|cpuid_spec_ctrl='1'|cpu_mismatch='0'|cpu_model='37'|cpu_stepping='5'|cpu_ucode='0x616'|cpu_ucode_decimal='1558'|cpu_vendor='GenuineIntel'|cve='CVE-2018-3639'|dir='/proc/sys/kernel'|dmesg_grep='Kernel/User page tables isolation: enabled|Kernel page table isolation enabled|x86/pti: Unmapping kernel while in userspace'|echo_cmd_type='printf'|echo_cmd='/usr/bin/printf'|global_critical='1'|global_unknown='0'|i='0'|ibpb_can_tell='0'|ibpb_enabled='1'|ibpb_supported='IBPB found enabled in sysfs'|ibrs_can_tell='1'|ibrs_enabled='3'|ibrs_fw_enabled='1'|ibrs_supported='found IBRS_FW in sysfs'|idx_max_cpu='0'|insmod_cpuid='1'|insmod_msr='1'|is_cpu_vulnerable_cached='1'|kernel_err=''|kernel_ssb='found in /proc/self/status'|kernel='/tmp/kernel-28LvlW'|kerneltmp='/tmp/kernel-28LvlW'|kernel_version='Linux version 4.9.0-8-amd64 (debian-kernel@lists.debian.org) (gcc version 6.3.0 20170516 (Debian 6.3.0-18+deb9u1) ) #1 SMP Debian 4.9.110-3+deb9u4 (2018-08-21)'|kpti_can_tell='1'|kpti_enabled='1'|kpti_support='CONFIG_PAGE_TABLE_ISOLATION=y'|mode=''|model='45'|msg='Vulnerable'|n='1'|nb_lfence='3'|ncpus='1'|nrpe_vuln=''|opt=''|opt_allvariants='1'|opt_arch_prefix=''|opt_batch='0'|opt_batch_format='text'|opt_config='/boot/config-4.9.0-8-amd64'|opt_coreos='0'|opt_explain='0'|opt_hw_only='0'|opt_kernel='/boot/vmlinuz-4.9.0-8-amd64'|opt_live='1'|opt_live_explicit='0'|opt_map='/proc/kallsyms'|opt_no_color='0'|opt_no_hw='0'|opt_no_sysfs='0'|opt_paranoid='1'|opt_sysfs_only='0'|opt_variant1='0'|opt_variant2='0'|opt_variant3='0'|opt_variant3a='0'|opt_variant4='0'|opt_verbose='4'|os='Linux'|parse_cpu_details_done='1'|pos='18357'|procfs='/proc'|pvulnstatus_last_cve='CVE-2018-3639'|read_cpuid_value='0'|read_msr_value=' 0'|redhat_canonical_spectre='0'|ret='1'|retpoline='1'|retpoline_compiler='1'|retpoline_compiler_reason='kernel reports full retpoline compilation'|rsb_filling='6Spectre V2 : Spectre v2 mitigation: Filling RSB on context switch'|spec_ctrl_msr='1'|status='VULN'|stepping='7'|sys_interface_available='1'|tuple='45,0x07,0x712'|ucode='0x712'|ucode_decimal='1810'|ucode_found='model 0x25 family 0x6 stepping 0x5 ucode 0x616 cpuid 0x20655'|v1_mask_nospec='x86 64 bits array_index_mask_nospec'|v='4'|val='0'|variant1='0'|variant2='0'|variant3='0'|variant3a='0'|variant4='0'|vulnstatus='VULN'|
Need more detailed information about mitigation options? Use --explain
A false sense of security is worse than no security at all, see --disclaimer
root@debian:/home/user#
vbox log:
VirtualBox VM 5.2.18_Debian r123745 linux.amd64 (Aug 16 2018 09:19:02) release log
00:00:00.376824 Log opened 2018-09-14T19:03:13.275982000Z
00:00:00.376825 Build Type: release
00:00:00.376830 OS Product: Linux
00:00:00.376831 OS Release: 4.9.0-8-amd64
00:00:00.376832 OS Version: #1 SMP Debian 4.9.110-3+deb9u4 (2018-08-21)
00:00:00.376865 DMI Product Name: 3680LL9
00:00:00.376873 DMI Product Version: ThinkPad X201
00:00:00.376929 Host RAM: 3754MB (3.6GB) total, 3424MB (3.3GB) available
00:00:00.376934 Executable: /usr/lib/virtualbox/VirtualBox
00:00:00.376935 Process ID: 6701
00:00:00.376935 Package type: LINUX_64BITS_GENERIC (OSE)
00:00:00.435574 Installed Extension Packs:
00:00:00.435601 VNC (Version: 5.2.18 r123745; VRDE Module: VBoxVNC)
00:00:00.436970 Console: Machine state changed to 'Starting'
00:00:00.437374 Qt version: 5.7.1
00:00:00.437384 X11 Window Manager code: 0
00:00:00.446611 GUI: UIMediumEnumerator: Medium-enumeration finished!
00:00:00.448948 SUP: Loaded VMMR0.r0 (/usr/lib/virtualbox/VMMR0.r0) at 0xXXXXXXXXXXXXXXXX - ModuleInit at XXXXXXXXXXXXXXXX and ModuleTerm at XXXXXXXXXXXXXXXX
00:00:00.448987 SUP: VMMR0EntryEx located at XXXXXXXXXXXXXXXX and VMMR0EntryFast at XXXXXXXXXXXXXXXX
00:00:00.456270 Guest OS type: 'Debian_64'
00:00:00.460930 fHMForced=true - 64-bit guest
00:00:00.473412 X Server details: vendor: The X.Org Foundation, release: 11902000, protocol version: 11.0, display string: :0.0
00:00:00.473437 Using XKB for keycode to scan code conversion
00:00:00.474517 GUI: UIDesktopWidgetWatchdog::sltHandleHostScreenAvailableGeometryCalculated: Screen 0 work area is actually resized to: 0x0 x 1280x762
00:00:00.482648 File system of '/home/user/VirtualBox VMs/Debian-Tester/Snapshots' (snapshots) is unknown
00:00:00.482676 File system of '/home/user/VirtualBox VMs/Debian-Tester/Debian-Tester.vdi' is ext4
00:00:00.506355 Shared clipboard service loaded
00:00:00.506382 Shared clipboard mode: Off
00:00:00.508003 Drag and drop service loaded
00:00:00.508020 Drag and drop mode: Off
00:00:00.522240 Guest Control service loaded
00:00:00.524624 ************************* CFGM dump *************************
00:00:00.524643 [/] (level 0)
00:00:00.524665 CSAMEnabled <integer> = 0x0000000000000001 (1)
00:00:00.524672 CpuExecutionCap <integer> = 0x0000000000000064 (100)
00:00:00.524673 EnablePAE <integer> = 0x0000000000000000 (0)
00:00:00.524674 HMEnabled <integer> = 0x0000000000000001 (1)
00:00:00.524675 MemBalloonSize <integer> = 0x0000000000000000 (0)
00:00:00.524676 Name <string> = "Debian-Tester" (cb=14)
00:00:00.524677 NumCPUs <integer> = 0x0000000000000001 (1)
00:00:00.524679 PATMEnabled <integer> = 0x0000000000000001 (1)
00:00:00.524680 PageFusionAllowed <integer> = 0x0000000000000000 (0)
00:00:00.524681 RamHoleSize <integer> = 0x0000000020000000 (536 870 912, 512 MB)
00:00:00.524682 RamSize <integer> = 0x00000000ac100000 (2 886 729 728, 2 753 MB, 2.6 GB)
00:00:00.524685 RawR0Enabled <integer> = 0x0000000000000001 (1)
00:00:00.524686 RawR3Enabled <integer> = 0x0000000000000001 (1)
00:00:00.524687 TimerMillies <integer> = 0x000000000000000a (10)
00:00:00.524688 UUID <bytes> = "05 bb 9c f8 b3 2f 40 4a ba 1d 4f 99 d1 56 2c 79" (cb=16)
00:00:00.524692
00:00:00.524696 [/CPUM/] (level 1)
00:00:00.524698 GuestCpuName <string> = "host" (cb=5)
00:00:00.524699 PortableCpuIdLevel <integer> = 0x0000000000000000 (0)
00:00:00.524700 SpecCtrl <integer> = 0x0000000000000001 (1)
00:00:00.524701
00:00:00.524705 [/DBGC/] (level 1)
00:00:00.524706 GlobalInitScript <string> = "/home/user/.config/VirtualBox/dbgc-init" (cb=40)
00:00:00.524707 HistoryFile <string> = "/home/user/.config/VirtualBox/dbgc-history" (cb=43)
00:00:00.524708 LocalInitScript <string> = "/home/user/VirtualBox VMs/Debian-Tester/dbgc-init" (cb=50)
00:00:00.524709
00:00:00.524710 [/DBGF/] (level 1)
00:00:00.524711 Path <string> = "/home/user/VirtualBox VMs/Debian-Tester/debug/;/home/user/VirtualBox VMs/Debian-Tester/;/home/user/" (cb=100)
00:00:00.524711
00:00:00.524712 [/Devices/] (level 1)
00:00:00.524713
00:00:00.524713 [/Devices/8237A/] (level 2)
00:00:00.524715
00:00:00.524715 [/Devices/8237A/0/] (level 3)
00:00:00.524716 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524718
00:00:00.524718 [/Devices/GIMDev/] (level 2)
00:00:00.524719
00:00:00.524720 [/Devices/GIMDev/0/] (level 3)
00:00:00.524721 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524722
00:00:00.524722 [/Devices/VMMDev/] (level 2)
00:00:00.524724
00:00:00.524724 [/Devices/VMMDev/0/] (level 3)
00:00:00.524726 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.524727 PCIDeviceNo <integer> = 0x0000000000000004 (4)
00:00:00.524728 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.524729 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524730
00:00:00.524730 [/Devices/VMMDev/0/Config/] (level 4)
00:00:00.524732 GuestCoreDumpDir <string> = "/home/user/VirtualBox VMs/Debian-Tester/Snapshots" (cb=50)
00:00:00.524733
00:00:00.524733 [/Devices/VMMDev/0/LUN#0/] (level 4)
00:00:00.524735 Driver <string> = "HGCM" (cb=5)
00:00:00.524736
00:00:00.524736 [/Devices/VMMDev/0/LUN#0/Config/] (level 5)
00:00:00.524738 Object <integer> = 0x00007f6464000910 (140 069 151 181 072)
00:00:00.524739
00:00:00.524740 [/Devices/VMMDev/0/LUN#999/] (level 4)
00:00:00.524741 Driver <string> = "MainStatus" (cb=11)
00:00:00.524742
00:00:00.524743 [/Devices/VMMDev/0/LUN#999/Config/] (level 5)
00:00:00.524744 First <integer> = 0x0000000000000000 (0)
00:00:00.524745 Last <integer> = 0x0000000000000000 (0)
00:00:00.524746 papLeds <integer> = 0x00007f6488001968 (140 069 755 165 032)
00:00:00.524748
00:00:00.524748 [/Devices/acpi/] (level 2)
00:00:00.524750
00:00:00.524750 [/Devices/acpi/0/] (level 3)
00:00:00.524752 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.524753 PCIDeviceNo <integer> = 0x0000000000000007 (7)
00:00:00.524754 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.524754 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524755
00:00:00.524756 [/Devices/acpi/0/Config/] (level 4)
00:00:00.524758 CpuHotPlug <integer> = 0x0000000000000000 (0)
00:00:00.524759 FdcEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524760 HostBusPciAddress <integer> = 0x0000000000000000 (0)
00:00:00.524761 HpetEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524762 IOAPIC <integer> = 0x0000000000000001 (1)
00:00:00.524763 IocPciAddress <integer> = 0x0000000000010000 (65 536)
00:00:00.524764 NumCPUs <integer> = 0x0000000000000001 (1)
00:00:00.524765 Parallel0IoPortBase <integer> = 0x0000000000000000 (0)
00:00:00.524766 Parallel0Irq <integer> = 0x0000000000000000 (0)
00:00:00.524767 Parallel1IoPortBase <integer> = 0x0000000000000000 (0)
00:00:00.524768 Parallel1Irq <integer> = 0x0000000000000000 (0)
00:00:00.524769 Serial0IoPortBase <integer> = 0x0000000000000000 (0)
00:00:00.524769 Serial0Irq <integer> = 0x0000000000000000 (0)
00:00:00.524770 Serial1IoPortBase <integer> = 0x0000000000000000 (0)
00:00:00.524771 Serial1Irq <integer> = 0x0000000000000000 (0)
00:00:00.524772 ShowCpu <integer> = 0x0000000000000001 (1)
00:00:00.524773 ShowRtc <integer> = 0x0000000000000000 (0)
00:00:00.524774 SmcEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524775
00:00:00.524776 [/Devices/acpi/0/LUN#0/] (level 4)
00:00:00.524777 Driver <string> = "ACPIHost" (cb=9)
00:00:00.524778
00:00:00.524778 [/Devices/acpi/0/LUN#0/Config/] (level 5)
00:00:00.524780
00:00:00.524780 [/Devices/ahci/] (level 2)
00:00:00.524781
00:00:00.524782 [/Devices/ahci/0/] (level 3)
00:00:00.524783 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.524784 PCIDeviceNo <integer> = 0x000000000000000d (13)
00:00:00.524786 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.524786 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524787
00:00:00.524788 [/Devices/ahci/0/Config/] (level 4)
00:00:00.524789 Bootable <integer> = 0x0000000000000001 (1)
00:00:00.524790 PortCount <integer> = 0x0000000000000001 (1)
00:00:00.524791
00:00:00.524791 [/Devices/ahci/0/Config/Port0/] (level 5)
00:00:00.524793 Hotpluggable <integer> = 0x0000000000000000 (0)
00:00:00.524794
00:00:00.524794 [/Devices/ahci/0/LUN#0/] (level 4)
00:00:00.524796 Driver <string> = "VD" (cb=3)
00:00:00.524797
00:00:00.524797 [/Devices/ahci/0/LUN#0/Config/] (level 5)
00:00:00.524799 BlockCache <integer> = 0x0000000000000001 (1)
00:00:00.524800 Format <string> = "VDI" (cb=4)
00:00:00.524801 Mountable <integer> = 0x0000000000000000 (0)
00:00:00.524802 Path <string> = "/home/user/VirtualBox VMs/Debian-Tester/Debian-Tester.vdi" (cb=58)
00:00:00.524803 Type <string> = "HardDisk" (cb=9)
00:00:00.524804 UseNewIo <integer> = 0x0000000000000001 (1)
00:00:00.524805
00:00:00.524805 [/Devices/ahci/0/LUN#999/] (level 4)
00:00:00.524807 Driver <string> = "MainStatus" (cb=11)
00:00:00.524808
00:00:00.524808 [/Devices/ahci/0/LUN#999/Config/] (level 5)
00:00:00.524810 DeviceInstance <string> = "ahci/0" (cb=7)
00:00:00.524811 First <integer> = 0x0000000000000000 (0)
00:00:00.524812 Last <integer> = 0x0000000000000000 (0)
00:00:00.524813 pConsole <integer> = 0x00007f6488001180 (140 069 755 163 008)
00:00:00.524815 papLeds <integer> = 0x00007f6488001568 (140 069 755 164 008)
00:00:00.524817 pmapMediumAttachments <integer> = 0x00007f6488001988 (140 069 755 165 064)
00:00:00.524818
00:00:00.524819 [/Devices/apic/] (level 2)
00:00:00.524820
00:00:00.524821 [/Devices/apic/0/] (level 3)
00:00:00.524822 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524823
00:00:00.524823 [/Devices/apic/0/Config/] (level 4)
00:00:00.524825 IOAPIC <integer> = 0x0000000000000001 (1)
00:00:00.524826 Mode <integer> = 0x0000000000000003 (3)
00:00:00.524827 NumCPUs <integer> = 0x0000000000000001 (1)
00:00:00.524828
00:00:00.524828 [/Devices/e1000/] (level 2)
00:00:00.524829
00:00:00.524830 [/Devices/e1000/0/] (level 3)
00:00:00.524831 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.524832 PCIDeviceNo <integer> = 0x0000000000000003 (3)
00:00:00.524833 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.524834 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524835
00:00:00.524835 [/Devices/e1000/0/Config/] (level 4)
00:00:00.524837 AdapterType <integer> = 0x0000000000000000 (0)
00:00:00.524838 CableConnected <integer> = 0x0000000000000001 (1)
00:00:00.524838 LineSpeed <integer> = 0x0000000000000000 (0)
00:00:00.524839 MAC <bytes> = "08 00 27 c4 70 22" (cb=6)
00:00:00.524841
00:00:00.524842 [/Devices/e1000/0/LUN#0/] (level 4)
00:00:00.524843 Driver <string> = "NAT" (cb=4)
00:00:00.524844
00:00:00.524845 [/Devices/e1000/0/LUN#0/Config/] (level 5)
00:00:00.524847 AliasMode <integer> = 0x0000000000000000 (0)
00:00:00.524848 BootFile <string> = "Debian-Tester.pxe" (cb=18)
00:00:00.524849 DNSProxy <integer> = 0x0000000000000000 (0)
00:00:00.524850 Network <string> = "10.0.2.0/24" (cb=12)
00:00:00.524851 PassDomain <integer> = 0x0000000000000001 (1)
00:00:00.524852 TFTPPrefix <string> = "/home/user/.config/VirtualBox/TFTP" (cb=35)
00:00:00.524853 UseHostResolver <integer> = 0x0000000000000000 (0)
00:00:00.524854
00:00:00.524854 [/Devices/e1000/0/LUN#999/] (level 4)
00:00:00.524856 Driver <string> = "MainStatus" (cb=11)
00:00:00.524856
00:00:00.524857 [/Devices/e1000/0/LUN#999/Config/] (level 5)
00:00:00.524858 First <integer> = 0x0000000000000000 (0)
00:00:00.524859 Last <integer> = 0x0000000000000000 (0)
00:00:00.524860 papLeds <integer> = 0x00007f6488001848 (140 069 755 164 744)
00:00:00.524862
00:00:00.524862 [/Devices/i8254/] (level 2)
00:00:00.524864
00:00:00.524864 [/Devices/i8254/0/] (level 3)
00:00:00.524865
00:00:00.524866 [/Devices/i8254/0/Config/] (level 4)
00:00:00.524867
00:00:00.524868 [/Devices/i8259/] (level 2)
00:00:00.524869
00:00:00.524869 [/Devices/i8259/0/] (level 3)
00:00:00.524870 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524871
00:00:00.524872 [/Devices/i8259/0/Config/] (level 4)
00:00:00.524873
00:00:00.524873 [/Devices/ichac97/] (level 2)
00:00:00.524875
00:00:00.524875 [/Devices/ichac97/0/] (level 3)
00:00:00.524877 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.524878 PCIDeviceNo <integer> = 0x0000000000000005 (5)
00:00:00.524879 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.524880 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524881
00:00:00.524881 [/Devices/ichac97/0/AudioConfig/] (level 4)
00:00:00.524882
00:00:00.524883 [/Devices/ichac97/0/Config/] (level 4)
00:00:00.524884 Codec <string> = "AD1980" (cb=7)
00:00:00.524885
00:00:00.524886 [/Devices/ichac97/0/LUN#0/] (level 4)
00:00:00.524887 Driver <string> = "AUDIO" (cb=6)
00:00:00.524888
00:00:00.524888 [/Devices/ichac97/0/LUN#0/AttachedDriver/] (level 5)
00:00:00.524890 Driver <string> = "PulseAudio" (cb=11)
00:00:00.524891
00:00:00.524891 [/Devices/ichac97/0/LUN#0/AttachedDriver/Config/] (level 6)
00:00:00.524893 StreamName <string> = "Debian-Tester" (cb=14)
00:00:00.524894
00:00:00.524894 [/Devices/ichac97/0/LUN#0/Config/] (level 5)
00:00:00.524896 DebugEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524897 DebugPathOut <string> = "" (cb=1)
00:00:00.524898 DriverName <string> = "PulseAudio" (cb=11)
00:00:00.524898 InputEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524899 OutputEnabled <integer> = 0x0000000000000001 (1)
00:00:00.524900
00:00:00.524900 [/Devices/ichac97/0/LUN#1/] (level 4)
00:00:00.524902 Driver <string> = "AUDIO" (cb=6)
00:00:00.524903
00:00:00.524903 [/Devices/ichac97/0/LUN#1/AttachedDriver/] (level 5)
00:00:00.524905 Driver <string> = "AudioVRDE" (cb=10)
00:00:00.524906
00:00:00.524906 [/Devices/ichac97/0/LUN#1/AttachedDriver/Config/] (level 6)
00:00:00.524908 Object <integer> = 0x00007f6488005fd0 (140 069 755 183 056)
00:00:00.524909 ObjectVRDPServer <integer> = 0x00007f64880060b0 (140 069 755 183 280)
00:00:00.524911 StreamName <string> = "Debian-Tester" (cb=14)
00:00:00.524912
00:00:00.524912 [/Devices/ichac97/0/LUN#1/Config/] (level 5)
00:00:00.524914 DebugEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524915 DebugPathOut <string> = "" (cb=1)
00:00:00.524916 DriverName <string> = "AudioVRDE" (cb=10)
00:00:00.524917 InputEnabled <integer> = 0x0000000000000000 (0)
00:00:00.524917 OutputEnabled <integer> = 0x0000000000000001 (1)
00:00:00.524918
00:00:00.524919 [/Devices/ioapic/] (level 2)
00:00:00.524920
00:00:00.524920 [/Devices/ioapic/0/] (level 3)
00:00:00.524922 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524923
00:00:00.524923 [/Devices/ioapic/0/Config/] (level 4)
00:00:00.524925 NumCPUs <integer> = 0x0000000000000001 (1)
00:00:00.524926
00:00:00.524926 [/Devices/mc146818/] (level 2)
00:00:00.524927
00:00:00.524928 [/Devices/mc146818/0/] (level 3)
00:00:00.524929
00:00:00.524930 [/Devices/mc146818/0/Config/] (level 4)
00:00:00.524931 UseUTC <integer> = 0x0000000000000001 (1)
00:00:00.524932
00:00:00.524932 [/Devices/parallel/] (level 2)
00:00:00.524934
00:00:00.524934 [/Devices/pcarch/] (level 2)
00:00:00.524935
00:00:00.524936 [/Devices/pcarch/0/] (level 3)
00:00:00.524937 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524938
00:00:00.524938 [/Devices/pcarch/0/Config/] (level 4)
00:00:00.524939
00:00:00.524940 [/Devices/pcbios/] (level 2)
00:00:00.524941
00:00:00.524942 [/Devices/pcbios/0/] (level 3)
00:00:00.524943 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524944
00:00:00.524945 [/Devices/pcbios/0/Config/] (level 4)
00:00:00.524947 APIC <integer> = 0x0000000000000001 (1)
00:00:00.524948 BootDevice0 <string> = "FLOPPY" (cb=7)
00:00:00.524949 BootDevice1 <string> = "DVD" (cb=4)
00:00:00.524950 BootDevice2 <string> = "IDE" (cb=4)
00:00:00.524951 BootDevice3 <string> = "NONE" (cb=5)
00:00:00.524952 FloppyDevice <string> = "i82078" (cb=7)
00:00:00.524952 HardDiskDevice <string> = "piix3ide" (cb=9)
00:00:00.524953 IOAPIC <integer> = 0x0000000000000001 (1)
00:00:00.524954 McfgBase <integer> = 0x0000000000000000 (0)
00:00:00.524955 McfgLength <integer> = 0x0000000000000000 (0)
00:00:00.524956 NumCPUs <integer> = 0x0000000000000001 (1)
00:00:00.524957 PXEDebug <integer> = 0x0000000000000000 (0)
00:00:00.524958 SataHardDiskDevice <string> = "ahci" (cb=5)
00:00:00.524959 SataLUN1 <integer> = 0x0000000000000000 (0)
00:00:00.524960 UUID <bytes> = "05 bb 9c f8 b3 2f 40 4a ba 1d 4f 99 d1 56 2c 79" (cb=16)
00:00:00.524963
00:00:00.524964 [/Devices/pcbios/0/Config/NetBoot/] (level 5)
00:00:00.524965
00:00:00.524966 [/Devices/pcbios/0/Config/NetBoot/0/] (level 6)
00:00:00.524968 NIC <integer> = 0x0000000000000000 (0)
00:00:00.524969 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.524969 PCIDeviceNo <integer> = 0x0000000000000003 (3)
00:00:00.524970 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.524971
00:00:00.524972 [/Devices/pci/] (level 2)
00:00:00.524973
00:00:00.524974 [/Devices/pci/0/] (level 3)
00:00:00.524975 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524976
00:00:00.524976 [/Devices/pci/0/Config/] (level 4)
00:00:00.524978 IOAPIC <integer> = 0x0000000000000001 (1)
00:00:00.524978
00:00:00.524979 [/Devices/pcibridge/] (level 2)
00:00:00.524980
00:00:00.524981 [/Devices/pckbd/] (level 2)
00:00:00.524982
00:00:00.524982 [/Devices/pckbd/0/] (level 3)
00:00:00.524983 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.524984
00:00:00.524985 [/Devices/pckbd/0/Config/] (level 4)
00:00:00.524986
00:00:00.524987 [/Devices/pckbd/0/LUN#0/] (level 4)
00:00:00.524988 Driver <string> = "KeyboardQueue" (cb=14)
00:00:00.524989
00:00:00.524989 [/Devices/pckbd/0/LUN#0/AttachedDriver/] (level 5)
00:00:00.524991 Driver <string> = "MainKeyboard" (cb=13)
00:00:00.524992
00:00:00.524992 [/Devices/pckbd/0/LUN#0/AttachedDriver/Config/] (level 6)
00:00:00.524994 Object <integer> = 0x00007f648800dbd0 (140 069 755 214 800)
00:00:00.524995
00:00:00.524996 [/Devices/pckbd/0/LUN#0/Config/] (level 5)
00:00:00.524997 QueueSize <integer> = 0x0000000000000040 (64)
00:00:00.524998
00:00:00.524999 [/Devices/pckbd/0/LUN#1/] (level 4)
00:00:00.525000 Driver <string> = "MouseQueue" (cb=11)
00:00:00.525001
00:00:00.525001 [/Devices/pckbd/0/LUN#1/AttachedDriver/] (level 5)
00:00:00.525003 Driver <string> = "MainMouse" (cb=10)
00:00:00.525004
00:00:00.525004 [/Devices/pckbd/0/LUN#1/AttachedDriver/Config/] (level 6)
00:00:00.525006 Object <integer> = 0x00007f648800e3d0 (140 069 755 216 848)
00:00:00.525007
00:00:00.525008 [/Devices/pckbd/0/LUN#1/Config/] (level 5)
00:00:00.525010 QueueSize <integer> = 0x0000000000000080 (128)
00:00:00.525011
00:00:00.525011 [/Devices/pcnet/] (level 2)
00:00:00.525012
00:00:00.525013 [/Devices/piix3ide/] (level 2)
00:00:00.525014
00:00:00.525014 [/Devices/piix3ide/0/] (level 3)
00:00:00.525016 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.525017 PCIDeviceNo <integer> = 0x0000000000000001 (1)
00:00:00.525018 PCIFunctionNo <integer> = 0x0000000000000001 (1)
00:00:00.525019 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.525020
00:00:00.525020 [/Devices/piix3ide/0/Config/] (level 4)
00:00:00.525021 Type <string> = "PIIX4" (cb=6)
00:00:00.525022
00:00:00.525023 [/Devices/piix3ide/0/LUN#2/] (level 4)
00:00:00.525024 Driver <string> = "VD" (cb=3)
00:00:00.525025
00:00:00.525026 [/Devices/piix3ide/0/LUN#2/Config/] (level 5)
00:00:00.525027 EmptyDrive <integer> = 0x0000000000000001 (1)
00:00:00.525028 Mountable <integer> = 0x0000000000000001 (1)
00:00:00.525029 Type <string> = "DVD" (cb=4)
00:00:00.525030
00:00:00.525030 [/Devices/piix3ide/0/LUN#999/] (level 4)
00:00:00.525032 Driver <string> = "MainStatus" (cb=11)
00:00:00.525032
00:00:00.525033 [/Devices/piix3ide/0/LUN#999/Config/] (level 5)
00:00:00.525035 DeviceInstance <string> = "piix3ide/0" (cb=11)
00:00:00.525036 First <integer> = 0x0000000000000000 (0)
00:00:00.525037 Last <integer> = 0x0000000000000003 (3)
00:00:00.525038 pConsole <integer> = 0x00007f6488001180 (140 069 755 163 008)
00:00:00.525040 papLeds <integer> = 0x00007f6488001548 (140 069 755 163 976)
00:00:00.525042 pmapMediumAttachments <integer> = 0x00007f6488001988 (140 069 755 165 064)
00:00:00.525043
00:00:00.525044 [/Devices/serial/] (level 2)
00:00:00.525045
00:00:00.525045 [/Devices/usb-ohci/] (level 2)
00:00:00.525046
00:00:00.525047 [/Devices/usb-ohci/0/] (level 3)
00:00:00.525048 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.525049 PCIDeviceNo <integer> = 0x0000000000000006 (6)
00:00:00.525050 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.525051 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.525052
00:00:00.525052 [/Devices/usb-ohci/0/Config/] (level 4)
00:00:00.525054
00:00:00.525054 [/Devices/usb-ohci/0/LUN#0/] (level 4)
00:00:00.525056 Driver <string> = "VUSBRootHub" (cb=12)
00:00:00.525057
00:00:00.525057 [/Devices/usb-ohci/0/LUN#0/Config/] (level 5)
00:00:00.525059
00:00:00.525059 [/Devices/usb-ohci/0/LUN#999/] (level 4)
00:00:00.525060 Driver <string> = "MainStatus" (cb=11)
00:00:00.525061
00:00:00.525062 [/Devices/usb-ohci/0/LUN#999/Config/] (level 5)
00:00:00.525063 First <integer> = 0x0000000000000000 (0)
00:00:00.525064 Last <integer> = 0x0000000000000000 (0)
00:00:00.525065 papLeds <integer> = 0x00007f6488001970 (140 069 755 165 040)
00:00:00.525067
00:00:00.525067 [/Devices/vga/] (level 2)
00:00:00.525068
00:00:00.525069 [/Devices/vga/0/] (level 3)
00:00:00.525070 PCIBusNo <integer> = 0x0000000000000000 (0)
00:00:00.525071 PCIDeviceNo <integer> = 0x0000000000000002 (2)
00:00:00.525072 PCIFunctionNo <integer> = 0x0000000000000000 (0)
00:00:00.525073 Trusted <integer> = 0x0000000000000001 (1)
00:00:00.525074
00:00:00.525074 [/Devices/vga/0/Config/] (level 4)
00:00:00.525076 CustomVideoModes <integer> = 0x0000000000000000 (0)
00:00:00.525077 FadeIn <integer> = 0x0000000000000001 (1)
00:00:00.525078 FadeOut <integer> = 0x0000000000000001 (1)
00:00:00.525079 HeightReduction <integer> = 0x0000000000000000 (0)
00:00:00.525080 LogoFile <string> = "" (cb=1)
00:00:00.525081 LogoTime <integer> = 0x0000000000000000 (0)
00:00:00.525082 MonitorCount <integer> = 0x0000000000000001 (1)
00:00:00.525083 ShowBootMenu <integer> = 0x0000000000000002 (2)
00:00:00.525083 VRamSize <integer> = 0x0000000001000000 (16 777 216, 16 MB)
00:00:00.525085
00:00:00.525086 [/Devices/vga/0/LUN#0/] (level 4)
00:00:00.525087 Driver <string> = "MainDisplay" (cb=12)
00:00:00.525088
00:00:00.525088 [/Devices/vga/0/LUN#0/Config/] (level 5)
00:00:00.525090 Object <integer> = 0x00007f6488002340 (140 069 755 167 552)
00:00:00.525092
00:00:00.525092 [/Devices/vga/0/LUN#999/] (level 4)
00:00:00.525093 Driver <string> = "MainStatus" (cb=11)
00:00:00.525094
00:00:00.525095 [/Devices/vga/0/LUN#999/Config/] (level 5)
00:00:00.525096 First <integer> = 0x0000000000000000 (0)
00:00:00.525097 Last <integer> = 0x0000000000000000 (0)
00:00:00.525098 papLeds <integer> = 0x00007f6488001980 (140 069 755 165 056)
00:00:00.525100
00:00:00.525100 [/Devices/virtio-net/] (level 2)
00:00:00.525101
00:00:00.525102 [/EM/] (level 1)
00:00:00.525103 TripleFaultReset <integer> = 0x0000000000000000 (0)
00:00:00.525105
00:00:00.525105 [/GIM/] (level 1)
00:00:00.525106 Provider <string> = "KVM" (cb=4)
00:00:00.525107
00:00:00.525107 [/HM/] (level 1)
00:00:00.525109 64bitEnabled <integer> = 0x0000000000000001 (1)
00:00:00.525110 EnableLargePages <integer> = 0x0000000000000000 (0)
00:00:00.525111 EnableNestedPaging <integer> = 0x0000000000000000 (0)
00:00:00.525112 EnableUX <integer> = 0x0000000000000001 (1)
00:00:00.525113 EnableVPID <integer> = 0x0000000000000001 (1)
00:00:00.525113 Exclusive <integer> = 0x0000000000000001 (1)
00:00:00.525114 HMForced <integer> = 0x0000000000000001 (1)
00:00:00.525115 IBPBOnVMEntry <integer> = 0x0000000000000001 (1)
00:00:00.525116 IBPBOnVMExit <integer> = 0x0000000000000001 (1)
00:00:00.525117 L1DFlushOnSched <integer> = 0x0000000000000001 (1)
00:00:00.525118 L1DFlushOnVMEntry <integer> = 0x0000000000000001 (1)
00:00:00.525119 SpecCtrlByHost <integer> = 0x0000000000000000 (0)
00:00:00.525120
00:00:00.525120 [/MM/] (level 1)
00:00:00.525121 CanUseLargerHeap <integer> = 0x0000000000000000 (0)
00:00:00.525122
00:00:00.525122 [/PDM/] (level 1)
00:00:00.525123
00:00:00.525124 [/PDM/AsyncCompletion/] (level 2)
00:00:00.525125
00:00:00.525125 [/PDM/AsyncCompletion/File/] (level 3)
00:00:00.525127
00:00:00.525127 [/PDM/AsyncCompletion/File/BwGroups/] (level 4)
00:00:00.525129
00:00:00.525129 [/PDM/BlkCache/] (level 2)
00:00:00.525130 CacheSize <integer> = 0x0000000000500000 (5 242 880, 5 MB)
00:00:00.525132
00:00:00.525132 [/PDM/Devices/] (level 2)
00:00:00.525133
00:00:00.525134 [/PDM/Drivers/] (level 2)
00:00:00.525135
00:00:00.525135 [/PDM/Drivers/VBoxC/] (level 3)
00:00:00.525137 Path <string> = "/usr/lib/virtualbox/components/VBoxC" (cb=37)
00:00:00.525138
00:00:00.525138 [/PDM/NetworkShaper/] (level 2)
00:00:00.525139
00:00:00.525140 [/PDM/NetworkShaper/BwGroups/] (level 3)
00:00:00.525141
00:00:00.525142 [/TM/] (level 1)
00:00:00.525142 UTCOffset <integer> = 0x0000000000000000 (0)
00:00:00.525143
00:00:00.525144 [/USB/] (level 1)
00:00:00.525145
00:00:00.525145 [/USB/HidMouse/] (level 2)
00:00:00.525146
00:00:00.525147 [/USB/HidMouse/0/] (level 3)
00:00:00.525148
00:00:00.525148 [/USB/HidMouse/0/Config/] (level 4)
00:00:00.525150 Mode <string> = "absolute" (cb=9)
00:00:00.525150
00:00:00.525151 [/USB/HidMouse/0/LUN#0/] (level 4)
00:00:00.525152 Driver <string> = "MouseQueue" (cb=11)
00:00:00.525153
00:00:00.525154 [/USB/HidMouse/0/LUN#0/AttachedDriver/] (level 5)
00:00:00.525155 Driver <string> = "MainMouse" (cb=10)
00:00:00.525156
00:00:00.525156 [/USB/HidMouse/0/LUN#0/AttachedDriver/Config/] (level 6)
00:00:00.525158 Object <integer> = 0x00007f648800e3d0 (140 069 755 216 848)
00:00:00.525160
00:00:00.525160 [/USB/HidMouse/0/LUN#0/Config/] (level 5)
00:00:00.525162 QueueSize <integer> = 0x0000000000000080 (128)
00:00:00.525163
00:00:00.525163 [/USB/USBProxy/] (level 2)
00:00:00.525164
00:00:00.525165 [/USB/USBProxy/GlobalConfig/] (level 3)
00:00:00.525166
00:00:00.525167 ********************* End of CFGM dump **********************
00:00:00.525186 VM: fHMEnabled=true (configured) fRecompileUser=false fRecompileSupervisor=false
00:00:00.525189 VM: fRawRing1Enabled=false CSAM=true PATM=true
00:00:00.525379 HM: HMR3Init: VT-x w/ nested paging and unrestricted guest execution hw support
00:00:00.525441 MM: cbHyperHeap=0x100000 (1048576)
00:00:00.526018 CPUM: fXStateHostMask=0x0; initial: 0x0; host XCR0=0x0
00:00:00.526838 CPUM: Matched host CPU INTEL 0x6/0x25/0x5 Intel_Core7_Westmere with CPU DB entry 'Intel Core i7-3960X' (INTEL 0x6/0x2d/0x6 Intel_Core7_SandyBridge)
00:00:00.526968 CPUM: MXCSR_MASK=0xffff (host: 0xffff)
00:00:00.526978 CPUM: Disabled PCID without FSGSBASE to workaround buggy guests
00:00:00.526988 CPUM: Microcode revision 0x00000007
00:00:00.526998 CPUM: MSR/CPUID reconciliation insert: 0x0000010b IA32_FLUSH_CMD
00:00:00.527049 CPUM: SetGuestCpuIdFeature: Enabled Speculation Control.
00:00:00.527547 PGM: HCPhysInterPD=00000000952ec000 HCPhysInterPaePDPT=00000000952e9000 HCPhysInterPaePML4=00000000952e7000
00:00:00.527561 PGM: apInterPTs={00000000952eb000,00000000952ea000} apInterPaePTs={0000000114099000,0000000119ca2000} apInterPaePDs={0000000119ca3000,000000012ada6000,000000012ada7000,000000011daca000} pInterPaePDPT64=00000000952e8000
00:00:00.527568 PGM: Host paging mode: AMD64+NX
00:00:00.527591 PGM: PGMPool: cMaxPages=1424 (u64MaxPages=1411)
00:00:00.527596 PGM: pgmR3PoolInit: cMaxPages=0x590 cMaxUsers=0xb20 cMaxPhysExts=0xb20 fCacheEnable=true
00:00:00.558881 TM: GIP - u32Mode=3 (Invariant) u32UpdateHz=83 u32UpdateIntervalNS=12000000 enmUseTscDelta=2 (Pratically Zero) fGetGipCpu=0xb cCpus=2
00:00:00.558937 TM: GIP - u64CpuHz=2 659 997 869 (0x9e8c58ad) SUPGetCpuHzFromGip => 2 659 997 869
00:00:00.558945 TM: GIP - CPU: iCpuSet=0x0 idCpu=0x0 idApic=0x0 iGipCpu=0x1 i64TSCDelta=0 enmState=3 u64CpuHz=2659993725(*) cErrors=0
00:00:00.558951 TM: GIP - CPU: iCpuSet=0x1 idCpu=0x1 idApic=0x4 iGipCpu=0x0 i64TSCDelta=0 enmState=3 u64CpuHz=2659997869(*) cErrors=0
00:00:00.559036 TM: cTSCTicksPerSecond=2 659 997 869 (0x9e8c58ad) enmTSCMode=3 (Dynamic)
00:00:00.559038 TM: TSCTiedToExecution=false TSCNotTiedToHalt=false
00:00:00.559413 VMM: CoreCode: R3=00007f64b0000000 R0=XXXXXXXXXXXXXXXX RC=a0c3c000 Phys=000000008b42c000 cb=0x1000
00:00:00.559579 IEM: TargetCpu=CURRENT, Microarch=Intel_Core7_Westmere
00:00:00.559659 GIM: Using provider 'KVM' (Implementation version: 0)
00:00:00.559669 CPUM: SetGuestCpuIdFeature: Enabled Hypervisor Present bit
00:00:00.595013 AIOMgr: Default manager type is 'Async'
00:00:00.595176 AIOMgr: Default file backend is 'NonBuffered'
00:00:00.595466 BlkCache: Cache successfully initialized. Cache size is 5242880 bytes
00:00:00.595488 BlkCache: Cache commit interval is 10000 ms
00:00:00.595499 BlkCache: Cache commit threshold is 2621440 bytes
00:00:00.597369 PcBios: [SMP] BIOS with 1 CPUs
00:00:00.597395 PcBios: Using the 386+ BIOS image.
00:00:00.597544 PcBios: MPS table at 000e1300
00:00:00.597985 PcBios: fCheckShutdownStatusForSoftReset=true fClearShutdownStatusOnHardReset=true
00:00:00.603717 SUP: Loaded VBoxDDR0.r0 (/usr/lib/virtualbox/VBoxDDR0.r0) at 0xXXXXXXXXXXXXXXXX - ModuleInit at XXXXXXXXXXXXXXXX and ModuleTerm at XXXXXXXXXXXXXXXX
00:00:00.603982 CPUM: SetGuestCpuIdFeature: Enabled xAPIC
00:00:00.603990 CPUM: SetGuestCpuIdFeature: Enabled x2APIC
00:00:00.604352 IOAPIC: Using implementation 2.0!
00:00:00.604407 PIT: mode=3 count=0x10000 (65536) - 18.20 Hz (ch=0)
00:00:00.607941 Shared Folders service loaded
00:00:00.614073 VGA: Using the 386+ BIOS image.
00:00:00.614510 DrvVD: Flushes will be ignored
00:00:00.614519 DrvVD: Async flushes will be passed to the disk
00:00:00.617162 VD: VDInit finished with VINF_SUCCESS
00:00:00.617476 AIOMgr: Endpoint for file '/home/user/VirtualBox VMs/Debian-Tester/Debian-Tester.vdi' (flags 000c0723) created successfully
00:00:00.654352 VD: Opening the disk took 37380446 ns
00:00:00.654465 AHCI: LUN#0: disk, PCHS=16383/16/63, total number of sectors 25242768
00:00:00.654693 AHCI#0: Reset the HBA
00:00:00.654714 VD#0: Cancelling all active requests
00:00:00.654988 PIIX3 ATA: LUN#0: no unit
00:00:00.654997 PIIX3 ATA: LUN#1: no unit
00:00:00.655048 DrvVD: Flushes will be ignored
00:00:00.655055 DrvVD: Async flushes will be passed to the disk
00:00:00.655142 PIIX3 ATA: LUN#2: CD/DVD, total number of sectors 0, passthrough disabled
00:00:00.655153 PIIX3 ATA: LUN#3: no unit
00:00:00.655201 PIIX3 ATA: Ctl#0: finished processing RESET
00:00:00.655241 PIIX3 ATA: Ctl#1: finished processing RESET
00:00:00.655346 E1000#0 Chip=82540EM LinkUpDelay=3000ms EthernetCRC=on GSO=enabled Itr=disabled ItrRx=enabled TID=disabled R0=enabled GC=enabled
00:00:00.663726 NAT: Guest address guess set to 10.0.2.15 by initialization
00:00:00.663873 NAT: resolv.conf: nameserver 152.200.55.90
00:00:00.663892 NAT: DNS#0: 152.200.55.90
00:00:00.665120 Audio: Initializing PulseAudio driver
00:00:00.670955 Audio: Initializing VRDE driver
00:00:00.670955 AC97: Reset
00:00:00.670955 VUSB: Attached 'HidMouse' to port 1 on RootHub#0 (FullSpeed)
00:00:00.670955 PGM: The CPU physical address width is 36 bits
00:00:00.670955 PGM: PGMR3InitFinalize: 4 MB PSE mask 0000000fffffffff
00:00:00.670955 TM: TMR3InitFinalize: fTSCModeSwitchAllowed=true
00:00:00.677648 VMM: Enabled thread-context hooks
00:00:00.677701 HM: fWorldSwitcher=0x7 (fIbpbOnVmExit=1 fIbpbOnVmEntry=1 fL1dFlushOnVmEntry=1); fL1dFlushOnSched=0
00:00:00.677721 HM: Using VT-x implementation 2.0
00:00:00.677722 HM: Host CR4 = 0x20670
00:00:00.677723 HM: Host EFER = 0xd01
00:00:00.677724 HM: MSR_IA32_SMM_MONITOR_CTL = 0x0
00:00:00.677725 HM: MSR_IA32_FEATURE_CONTROL = 0x5
00:00:00.677726 HM: MSR_IA32_VMX_BASIC_INFO = 0xda04000000000f
00:00:00.677727 HM: VMCS id = 0xf
00:00:00.677727 HM: VMCS size = 1024 bytes
00:00:00.677728 HM: VMCS physical address limit = None
00:00:00.677729 HM: VMCS memory type = 0x6
00:00:00.677730 HM: Dual-monitor treatment support = true
00:00:00.677731 HM: OUTS & INS instruction-info = true
00:00:00.677731 HM: Supports true capability MSRs = true
00:00:00.677732 HM: Max resume loops = 8192
00:00:00.677732 HM: MSR_IA32_VMX_PINBASED_CTLS = 0x7f00000016
00:00:00.677734 HM: EXT_INT_EXIT
00:00:00.677734 HM: NMI_EXIT
00:00:00.677735 HM: VIRTUAL_NMI
00:00:00.677735 HM: PREEMPT_TIMER
00:00:00.677736 HM: POSTED_INTR (must be cleared)
00:00:00.677737 HM: MSR_IA32_VMX_PROCBASED_CTLS = 0xfff9fffe0401e172
00:00:00.677738 HM: INT_WINDOW_EXIT
00:00:00.677739 HM: USE_TSC_OFFSETTING
00:00:00.677739 HM: HLT_EXIT
00:00:00.677740 HM: INVLPG_EXIT
00:00:00.677740 HM: MWAIT_EXIT
00:00:00.677741 HM: RDPMC_EXIT
00:00:00.677741 HM: RDTSC_EXIT
00:00:00.677742 HM: CR3_LOAD_EXIT (must be set)
00:00:00.677742 HM: CR3_STORE_EXIT (must be set)
00:00:00.677743 HM: CR8_LOAD_EXIT
00:00:00.677743 HM: CR8_STORE_EXIT
00:00:00.677744 HM: USE_TPR_SHADOW
00:00:00.677744 HM: NMI_WINDOW_EXIT
00:00:00.677744 HM: MOV_DR_EXIT
00:00:00.677745 HM: UNCOND_IO_EXIT
00:00:00.677745 HM: USE_IO_BITMAPS
00:00:00.677746 HM: MONITOR_TRAP_FLAG
00:00:00.677746 HM: USE_MSR_BITMAPS
00:00:00.677747 HM: MONITOR_EXIT
00:00:00.677747 HM: PAUSE_EXIT
00:00:00.677748 HM: USE_SECONDARY_EXEC_CTRL
00:00:00.677749 HM: MSR_IA32_VMX_PROCBASED_CTLS2 = 0xff00000000
00:00:00.677750 HM: VIRT_APIC
00:00:00.677750 HM: EPT
00:00:00.677751 HM: DESCRIPTOR_TABLE_EXIT
00:00:00.677752 HM: RDTSCP
00:00:00.677752 HM: VIRT_X2APIC
00:00:00.677753 HM: VPID
00:00:00.677753 HM: WBINVD_EXIT
00:00:00.677754 HM: UNRESTRICTED_GUEST
00:00:00.677754 HM: APIC_REG_VIRT (must be cleared)
00:00:00.677755 HM: VIRT_INTR_DELIVERY (must be cleared)
00:00:00.677755 HM: PAUSE_LOOP_EXIT (must be cleared)
00:00:00.677756 HM: RDRAND_EXIT (must be cleared)
00:00:00.677756 HM: INVPCID (must be cleared)
00:00:00.677757 HM: VMFUNC (must be cleared)
00:00:00.677757 HM: VMCS_SHADOWING (must be cleared)
00:00:00.677758 HM: ENCLS_EXIT (must be cleared)
00:00:00.677758 HM: RDSEED_EXIT (must be cleared)
00:00:00.677759 HM: PML (must be cleared)
00:00:00.677759 HM: EPT_VE (must be cleared)
00:00:00.677760 HM: CONCEAL_FROM_PT (must be cleared)
00:00:00.677760 HM: XSAVES_XRSTORS (must be cleared)
00:00:00.677761 HM: TSC_SCALING (must be cleared)
00:00:00.677761 HM: MSR_IA32_VMX_ENTRY_CTLS = 0xffff000011ff
00:00:00.677762 HM: LOAD_DEBUG (must be set)
00:00:00.677763 HM: IA32E_MODE_GUEST
00:00:00.677763 HM: ENTRY_SMM
00:00:00.677764 HM: DEACTIVATE_DUALMON
00:00:00.677764 HM: LOAD_GUEST_PERF_MSR
00:00:00.677765 HM: LOAD_GUEST_PAT_MSR
00:00:00.677765 HM: LOAD_GUEST_EFER_MSR
00:00:00.677766 HM: MSR_IA32_VMX_EXIT_CTLS = 0x7fffff00036dff
00:00:00.677767 HM: SAVE_DEBUG (must be set)
00:00:00.677767 HM: HOST_ADDR_SPACE_SIZE
00:00:00.677768 HM: LOAD_PERF_MSR
00:00:00.677768 HM: ACK_EXT_INT
00:00:00.677769 HM: SAVE_GUEST_PAT_MSR
00:00:00.677769 HM: LOAD_HOST_PAT_MSR
00:00:00.677770 HM: SAVE_GUEST_EFER_MSR
00:00:00.677770 HM: LOAD_HOST_EFER_MSR
00:00:00.677771 HM: SAVE_VMX_PREEMPT_TIMER
00:00:00.677771 HM: MSR_IA32_VMX_EPT_VPID_CAP = 0xf0106114141
00:00:00.677772 HM: RWX_X_ONLY
00:00:00.677773 HM: PAGE_WALK_LENGTH_4
00:00:00.677773 HM: EMT_UC
00:00:00.677774 HM: EMT_WB
00:00:00.677774 HM: PDE_2M
00:00:00.677775 HM: INVEPT
00:00:00.677775 HM: INVEPT_SINGLE_CONTEXT
00:00:00.677776 HM: INVEPT_ALL_CONTEXTS
00:00:00.677776 HM: INVVPID
00:00:00.677777 HM: INVVPID_INDIV_ADDR
00:00:00.677777 HM: INVVPID_SINGLE_CONTEXT
00:00:00.677778 HM: INVVPID_ALL_CONTEXTS
00:00:00.677778 HM: INVVPID_SINGLE_CONTEXT_RETAIN_GLOBALS
00:00:00.677779 HM: MSR_IA32_VMX_MISC = 0x401e7
00:00:00.677779 HM: PREEMPT_TSC_BIT = 0x7 - erratum detected, using 0x0 instead
00:00:00.677780 HM: STORE_EFERLMA_VMEXIT = true
00:00:00.677781 HM: ACTIVITY_STATES = 0x7
00:00:00.677781 HM: CR3_TARGET = 0x4
00:00:00.677782 HM: MAX_MSR = 512
00:00:00.677783 HM: RDMSR_SMBASE_MSR_SMM = false
00:00:00.677783 HM: SMM_MONITOR_CTL_B2 = false
00:00:00.677784 HM: VMWRITE_VMEXIT_INFO = false
00:00:00.677785 HM: MSEG_ID = 0x0
00:00:00.677785 HM: MSR_IA32_VMX_CR0_FIXED0 = 0x80000021
00:00:00.677786 HM: MSR_IA32_VMX_CR0_FIXED1 = 0xffffffff
00:00:00.677787 HM: MSR_IA32_VMX_CR4_FIXED0 = 0x2000
00:00:00.677788 HM: MSR_IA32_VMX_CR4_FIXED1 = 0x267ff
00:00:00.677788 HM: MSR_IA32_VMX_VMCS_ENUM = 0x2a
00:00:00.677789 HM: HIGHEST_INDEX = 0x15
00:00:00.677790 HM: APIC-access page physaddr = 0x000000008b45d000
00:00:00.677791 HM: VCPU 0: MSR bitmap physaddr = 0x0000000013cf5000
00:00:00.677792 HM: VCPU 0: VMCS physaddr = 0x000000008b5d9000
00:00:00.677797 HM: Guest support: 32-bit and 64-bit
00:00:00.677802 HM: Supports VMCS EFER fields = true
00:00:00.677803 HM: Enabled VMX
00:00:00.677810 CPUM: SetGuestCpuIdFeature: Enabled SYSENTER/EXIT
00:00:00.677811 CPUM: SetGuestCpuIdFeature: Enabled PAE
00:00:00.677812 CPUM: SetGuestCpuIdFeature: Enabled LONG MODE
00:00:00.677813 CPUM: SetGuestCpuIdFeature: Enabled SYSCALL/RET
00:00:00.677813 CPUM: SetGuestCpuIdFeature: Enabled LAHF/SAHF
00:00:00.677814 CPUM: SetGuestCpuIdFeature: Enabled NX
00:00:00.677815 HM: Enabled VPID
00:00:00.677815 HM: VPID flush type = VMXFLUSHVPID_SINGLE_CONTEXT
00:00:00.677816 HM: Enabled VMX-preemption timer (cPreemptTimerShift=0)
00:00:00.677817 HM: VT-x/AMD-V init method: GLOBAL
00:00:00.677818 VMM: fUsePeriodicPreemptionTimers=false
00:00:00.678528 CPUM: Logical host processors: 2 present, 2 max, 2 online, online mask: 0000000000000003
00:00:00.678565 CPUM: Physical host cores: 2
00:00:00.678566 ************************* CPUID dump ************************
00:00:00.678583 Raw Standard CPUID Leaves
00:00:00.678583 Leaf/sub-leaf eax ebx ecx edx
00:00:00.678584 Gst: 00000000/0000 0000000b 756e6547 6c65746e 49656e69
00:00:00.678586 Hst: 0000000b 756e6547 6c65746e 49656e69
00:00:00.678588 Gst: 00000001/0000 00020655 00000800 80380209 078bfbff
00:00:00.678589 Hst: 00020655 04100800 029ae3ff bfebfbff
00:00:00.678591 Gst: 00000002/0000 55035a01 00f0b0dd 00000000 09ca212c
00:00:00.678592 Hst: 55035a01 00f0b0dd 00000000 09ca212c
00:00:00.678594 Gst: 00000003/0000 00000000 00000000 00000000 00000000
00:00:00.678595 Hst: 00000000 00000000 00000000 00000000
00:00:00.678596 Gst: 00000004/0000 00000121 01c0003f 0000003f 00000000
00:00:00.678597 Hst: 1c004121 01c0003f 0000003f 00000000
00:00:00.678599 Gst: 00000004/0001 00000122 00c0003f 0000007f 00000000
00:00:00.678600 Hst: 1c004122 00c0003f 0000007f 00000000
00:00:00.678601 Gst: 00000004/0002 00000143 01c0003f 000001ff 00000000
00:00:00.678602 Hst: 1c004143 01c0003f 000001ff 00000000
00:00:00.678604 Gst: 00000004/0003 00000163 02c0003f 00000fff 00000002
00:00:00.678605 Hst: 1c03c163 02c0003f 00000fff 00000002
00:00:00.678606 Gst: 00000004/0004 00000000 00000000 00000000 00000000
00:00:00.678607 Hst: 00000000 00000000 00000000 00000000
00:00:00.678609 Gst: 00000005/0000 00000040 00000040 00000000 00000000
00:00:00.678610 Hst: 00000040 00000040 00000003 00001120
00:00:00.678611 Gst: 00000006/0000 00000000 00000000 00000000 00000000
00:00:00.678612 Hst: 00000007 00000002 00000001 00000000
00:00:00.678613 Gst: 00000007/0000 00000000 00000000 00000000 1c000000
00:00:00.678614 Hst: 00000000 00000000 00000000 9c000000
00:00:00.678615 Gst: 00000007/0001 00000000 00000000 00000000 00000000
00:00:00.678616 Hst: 00000000 00000000 00000000 00000000
00:00:00.678617 Gst: 00000008/0000 00000000 00000000 00000000 00000000
00:00:00.678618 Hst: 00000000 00000000 00000000 00000000
00:00:00.678619 Gst: 00000009/0000 00000000 00000000 00000000 00000000
00:00:00.678620 Hst: 00000000 00000000 00000000 00000000
00:00:00.678621 Gst: 0000000a/0000 00000000 00000000 00000000 00000000
00:00:00.678621 Hst: 07300403 00000004 00000000 00000603
00:00:00.678623 Gst: 0000000b/0000 00000000 00000001 00000100 00000000
00:00:00.678624 Hst: 00000001 00000002 00000100 00000004
00:00:00.678625 Gst: 0000000b/0001 00000001 00000001 00000201 00000000
00:00:00.678626 Hst: 00000004 00000004 00000201 00000004
00:00:00.678627 Gst: 0000000b/0002 00000000 00000000 00000002 00000000
00:00:00.678628 Hst: 00000000 00000000 00000002 00000004
00:00:00.678629 Name: GenuineIntel
00:00:00.678631 Supports: 0x00000000-0x0000000b
00:00:00.678633 Family: 6 Extended: 0 Effective: 6
00:00:00.678634 Model: 5 Extended: 2 Effective: 37
00:00:00.678635 Stepping: 5
00:00:00.678636 Type: 0 (primary)
00:00:00.678638 APIC ID: 0x00
00:00:00.678639 Logical CPUs: 0
00:00:00.678640 CLFLUSH Size: 8
00:00:00.678641 Brand ID: 0x00
00:00:00.678642 Features
00:00:00.678643 Mnemonic - Description = guest (host)
00:00:00.678644 FPU - x87 FPU on Chip = 1 (1)
00:00:00.678645 VME - Virtual 8086 Mode Enhancements = 1 (1)
00:00:00.678647 DE - Debugging extensions = 1 (1)
00:00:00.678648 PSE - Page Size Extension = 1 (1)
00:00:00.678649 TSC - Time Stamp Counter = 1 (1)
00:00:00.678651 MSR - Model Specific Registers = 1 (1)
00:00:00.678652 PAE - Physical Address Extension = 1 (1)
00:00:00.678653 MCE - Machine Check Exception = 1 (1)
00:00:00.678655 CX8 - CMPXCHG8B instruction = 1 (1)
00:00:00.678656 APIC - APIC On-Chip = 1 (1)
00:00:00.678657 SEP - SYSENTER and SYSEXIT Present = 1 (1)
00:00:00.678658 MTRR - Memory Type Range Registers = 1 (1)
00:00:00.678660 PGE - PTE Global Bit = 1 (1)
00:00:00.678661 MCA - Machine Check Architecture = 1 (1)
00:00:00.678662 CMOV - Conditional Move instructions = 1 (1)
00:00:00.678663 PAT - Page Attribute Table = 1 (1)
00:00:00.678665 PSE-36 - 36-bit Page Size Extension = 1 (1)
00:00:00.678666 PSN - Processor Serial Number = 0 (0)
00:00:00.678667 CLFSH - CLFLUSH instruction = 1 (1)
00:00:00.678668 DS - Debug Store = 0 (1)
00:00:00.678670 ACPI - Thermal Mon. & Soft. Clock Ctrl. = 0 (1)
00:00:00.678671 MMX - Intel MMX Technology = 1 (1)
00:00:00.678672 FXSR - FXSAVE and FXRSTOR instructions = 1 (1)
00:00:00.678673 SSE - SSE support = 1 (1)
00:00:00.678675 SSE2 - SSE2 support = 1 (1)
00:00:00.678676 SS - Self Snoop = 0 (1)
00:00:00.678677 HTT - Hyper-Threading Technology = 0 (1)
00:00:00.678679 TM - Therm. Monitor = 0 (1)
00:00:00.678680 PBE - Pending Break Enabled = 0 (1)
00:00:00.678682 SSE3 - SSE3 support = 1 (1)
00:00:00.678683 PCLMUL - PCLMULQDQ support (for AES-GCM) = 0 (1)
00:00:00.678684 DTES64 - DS Area 64-bit Layout = 0 (1)
00:00:00.678685 MONITOR - MONITOR/MWAIT instructions = 1 (1)
00:00:00.678687 CPL-DS - CPL Qualified Debug Store = 0 (1)
00:00:00.678688 VMX - Virtual Machine Extensions = 0 (1)
00:00:00.678689 SMX - Safer Mode Extensions = 0 (1)
00:00:00.678690 EST - Enhanced SpeedStep Technology = 0 (1)
00:00:00.678691 TM2 - Terminal Monitor 2 = 0 (1)
00:00:00.678693 SSSE3 - Supplemental Streaming SIMD Extensions 3 = 1 (1)
00:00:00.678694 CNTX-ID - L1 Context ID = 0 (0)
00:00:00.678695 SDBG - Silicon Debug interface = 0 (0)
00:00:00.678696 FMA - Fused Multiply Add extensions = 0 (0)
00:00:00.678698 CX16 - CMPXCHG16B instruction = 0 (1)
00:00:00.678699 TPRUPDATE - xTPR Update Control = 0 (1)
00:00:00.678700 PDCM - Perf/Debug Capability MSR = 0 (1)
00:00:00.678701 PCID - Process Context Identifiers = 0 (1)
00:00:00.678702 DCA - Direct Cache Access = 0 (0)
00:00:00.678704 SSE4_1 - SSE4_1 support = 1 (1)
00:00:00.678705 SSE4_2 - SSE4_2 support = 1 (1)
00:00:00.678706 X2APIC - x2APIC support = 1 (0)
00:00:00.678708 MOVBE - MOVBE instruction = 0 (0)
00:00:00.678709 POPCNT - POPCNT instruction = 0 (1)
00:00:00.678710 TSCDEADL - Time Stamp Counter Deadline = 0 (0)
00:00:00.678711 AES - AES instructions = 0 (1)
00:00:00.678713 XSAVE - XSAVE instruction = 0 (0)
00:00:00.678714 OSXSAVE - OSXSAVE instruction = 0 (0)
00:00:00.678715 AVX - AVX support = 0 (0)
00:00:00.678717 F16C - 16-bit floating point conversion instructions = 0 (0)
00:00:00.678718 RDRAND - RDRAND instruction = 0 (0)
00:00:00.678719 HVP - Hypervisor Present (we're a guest) = 1 (0)
00:00:00.678720 Structured Extended Feature Flags Enumeration (leaf 7):
00:00:00.678721 Mnemonic - Descriptio
comment:7 by , 6 years ago
Is this bug report complete? I mean, is there anything else required from me for this bug report?
comment:8 by , 6 years ago
It seems Trac is set up here to not allow adding myself to the CC for this bug without spamming a NOP message?
comment:9 by , 4 years ago
Nothing further is required from the submitter. Just to summarize the current situation: The mitigation for the Spectre/Meltdown issues documented in CVE-2017-5715 can be passed through to VirtualBox guests using:
VBoxManage modifyvm <VM name> --spec-ctrl on
This functionality is available in VirtualBox 5.2.32 and later, 6.0.0 and later, and 6.1.0 and later.
The VirtualBox changes required for passing through the Speculative Store Bypass (SSB) (CVE-2018-3639) mitigations and Rogue System Register Read (RSRE), Variant 3a (CVE-2018-3640) mitigations to VirtualBox guests have not been implemented yet.


Expected behavior. If you want the mitigation to be available in a VM (default is not, because it comes at a cost) you can enable it. See the https://www.virtualbox.org/manual/ch08.html,