XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    8.3 USB Passthrough - Win Server 2019 BSOD

    Scheduled Pinned Locked Moved XCP-ng
    19 Posts 5 Posters 650 Views 5 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A Offline
      andsmith @dinhngtu
      last edited by

      @dinhngtu Sorry, I failed to mention this is a Windows Server 2019 VM, it appears that Windbg is a Windows 10/11 application. I've googled installing on Server 2019, but haven't had any luck getting it installed.

      J M 2 Replies Last reply Reply Quote 0
      • J Offline
        john.c @andsmith
        last edited by john.c

        @andsmith said in 8.3 USB Passthrough - Win Server 2019 BSOD:

        @dinhngtu Sorry, I failed to mention this is a Windows Server 2019 VM, it appears that Windbg is a Windows 10/11 application. I've googled installing on Server 2019, but haven't had any luck getting it installed.

        Update the AppX Package Deployment software via Microsoft Store or its equivalent in Windows Server 2019. Then once winget is updated (or installed) run the following command:

        winget install Microsoft.WinDbg

        @olivierlambert If this works for andsmith then it may be worth documenting this, for future users of Windows Server 2019, 2022 and possibly if required the upcoming Windows Server 2025.

        A 1 Reply Last reply Reply Quote 1
        • olivierlambertO Offline
          olivierlambert Vates 🪐 Co-Founder CEO
          last edited by

          Agreed 🙂

          J 1 Reply Last reply Reply Quote 0
          • J Offline
            john.c @olivierlambert
            last edited by

            @olivierlambert said in 8.3 USB Passthrough - Win Server 2019 BSOD:

            Agreed 🙂

            Oh also this includes Windows Server 2016 and also if not present then Windows 10 and 11.

            Anyway just thought I would help out the user with the method of installing WinDbg on their server VM.

            While waiting to be pinged back later by a poster with the Epyc network bug, worth checking out the latest responses to that bug on the forums.

            1 Reply Last reply Reply Quote 0
            • A Offline
              andsmith @john.c
              last edited by andsmith

              @john-c said in 8.3 USB Passthrough - Win Server 2019 BSOD:

              winget install Microsoft.WinDbg

              Following information from this website

              I've run the following commands in PowerShell:

              Install-Script -Name winget-install
              winget-install
              

              These ran without issue, however when I ran the command:

              winget install Microsoft.WinDbg
              

              The installer starts, but fails with the error:

              InstallFlowReturnCodeBlockedByPolicy
              InstallerFailedWithCode
              
              J D 2 Replies Last reply Reply Quote 0
              • J Offline
                john.c @andsmith
                last edited by john.c

                @andsmith said in 8.3 USB Passthrough - Win Server 2019 BSOD:

                @john-c said in 8.3 USB Passthrough - Win Server 2019 BSOD:

                winget install Microsoft.WinDbg

                Following information from this here

                I've run the following commands in PowerShell:

                Install-Script -Name winget-install
                winget-install
                

                These ran without issue, however when I ran the command:

                winget install Microsoft.WinDbg
                

                The installer starts, but fails with the error:

                InstallFlowReturnCodeBlockedByPolicy
                InstallerFailedWithCode
                

                That's a reference to GroupPolicy settings applied which affect the software installation of Appx Packages, as well as possibly other relevant policies. As well as any Conditional Access policies applied which affected the installation, these policies can also come from services like Microsoft Entra etc.

                1 Reply Last reply Reply Quote 0
                • D Offline
                  dinhngtu Vates 🪐 XCP-ng Team @andsmith
                  last edited by

                  @andsmith Another method if that doesn't work for you:

                  • Enable sideloading apps in Developer settings
                  • Get the Appinstaller file from https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/ (Install WinDbg directly)
                  • Open it with Notepad and download the .msixbundle file from the MainBundle URI
                  • Install the .msixbundle with Add-Appxpackage
                  A 1 Reply Last reply Reply Quote 0
                  • A Offline
                    andsmith @dinhngtu
                    last edited by andsmith

                    @dinhngtu said in 8.3 USB Passthrough - Win Server 2019 BSOD:

                    @andsmith Another method if that doesn't work for you:

                    • Enable sideloading apps in Developer settings
                    • Get the Appinstaller file from https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/ (Install WinDbg directly)
                    • Open it with Notepad and download the .msixbundle file from the MainBundle URI
                    • Install the .msixbundle with Add-Appxpackage

                    Following these instruction I was able to get Windbg installed and running. Having never done this before, I believe what you are after is below, please let me know.

                    For analysis of this file, run !analyze -v
                    nt!KeBugCheckEx:
                    fffff802`6e0586e0 48894c2408      mov     qword ptr [rsp+8],rcx ss:0018:ffff920e`9a9ac910=000000000000001e
                    1: kd> !analyze -v
                    *******************************************************************************
                    *                                                                             *
                    *                        Bugcheck Analysis                                    *
                    *                                                                             *
                    *******************************************************************************
                    
                    KMODE_EXCEPTION_NOT_HANDLED (1e)
                    This is a very common BugCheck.  Usually the exception address pinpoints
                    the driver/function that caused the problem.  Always note this address
                    as well as the link date of the driver/image that contains this address.
                    Arguments:
                    Arg1: ffffffffc0000096, The exception code that was not handled
                    Arg2: fffff804db200407, The address that the exception occurred at
                    Arg3: 0000000000000000, Parameter 0 of the exception
                    Arg4: 0000000000000000, Parameter 1 of the exception
                    
                    Debugging Details:
                    ------------------
                    
                    *************************************************************************
                    ***                                                                   ***
                    ***                                                                   ***
                    ***    Either you specified an unqualified symbol, or your debugger   ***
                    ***    doesn't have full symbol information.  Unqualified symbol      ***
                    ***    resolution is turned off by default. Please either specify a   ***
                    ***    fully qualified symbol module!symbolname, or enable resolution ***
                    ***    of unqualified symbols by typing ".symopt- 100". Note that     ***
                    ***    enabling unqualified symbol resolution with network symbol     ***
                    ***    server shares in the symbol path may cause the debugger to     ***
                    ***    appear to hang for long periods of time when an incorrect      ***
                    ***    symbol name is typed or the network symbol server is down.     ***
                    ***                                                                   ***
                    ***    For some commands to work properly, your symbol path           ***
                    ***    must point to .pdb files that have full type information.      ***
                    ***                                                                   ***
                    ***    Certain .pdb files (such as the public OS symbols) do not      ***
                    ***    contain the required information.  Contact the group that      ***
                    ***    provided you with these symbols if you need this command to    ***
                    ***    work.                                                          ***
                    ***                                                                   ***
                    ***    Type referenced: ExceptionRecord                               ***
                    ***                                                                   ***
                    *************************************************************************
                    *************************************************************************
                    ***                                                                   ***
                    ***                                                                   ***
                    ***    Either you specified an unqualified symbol, or your debugger   ***
                    ***    doesn't have full symbol information.  Unqualified symbol      ***
                    ***    resolution is turned off by default. Please either specify a   ***
                    ***    fully qualified symbol module!symbolname, or enable resolution ***
                    ***    of unqualified symbols by typing ".symopt- 100". Note that     ***
                    ***    enabling unqualified symbol resolution with network symbol     ***
                    ***    server shares in the symbol path may cause the debugger to     ***
                    ***    appear to hang for long periods of time when an incorrect      ***
                    ***    symbol name is typed or the network symbol server is down.     ***
                    ***                                                                   ***
                    ***    For some commands to work properly, your symbol path           ***
                    ***    must point to .pdb files that have full type information.      ***
                    ***                                                                   ***
                    ***    Certain .pdb files (such as the public OS symbols) do not      ***
                    ***    contain the required information.  Contact the group that      ***
                    ***    provided you with these symbols if you need this command to    ***
                    ***    work.                                                          ***
                    ***                                                                   ***
                    ***    Type referenced: ContextRecord                                 ***
                    ***                                                                   ***
                    *************************************************************************
                    
                    KEY_VALUES_STRING: 1
                    
                        Key  : Analysis.CPU.mSec
                        Value: 3562
                    
                        Key  : Analysis.Elapsed.mSec
                        Value: 3659
                    
                        Key  : Analysis.IO.Other.Mb
                        Value: 0
                    
                        Key  : Analysis.IO.Read.Mb
                        Value: 0
                    
                        Key  : Analysis.IO.Write.Mb
                        Value: 23
                    
                        Key  : Analysis.Init.CPU.mSec
                        Value: 1608
                    
                        Key  : Analysis.Init.Elapsed.mSec
                        Value: 187592
                    
                        Key  : Analysis.Memory.CommitPeak.Mb
                        Value: 90
                    
                        Key  : Bugcheck.Code.KiBugCheckData
                        Value: 0x1e
                    
                        Key  : Bugcheck.Code.LegacyAPI
                        Value: 0x1e
                    
                        Key  : Bugcheck.Code.TargetModel
                        Value: 0x1e
                    
                        Key  : Failure.Bucket
                        Value: 0x1E_C0000096_GVUSBD!unknown_function
                    
                        Key  : Failure.Hash
                        Value: {e33840ed-d273-c482-6ab3-fda3f8b1b7cf}
                    
                        Key  : Hypervisor.Enlightenments.Value
                        Value: 112
                    
                        Key  : Hypervisor.Enlightenments.ValueHex
                        Value: 70
                    
                        Key  : Hypervisor.Flags.AnyHypervisorPresent
                        Value: 1
                    
                        Key  : Hypervisor.Flags.ApicEnlightened
                        Value: 1
                    
                        Key  : Hypervisor.Flags.AsyncMemoryHint
                        Value: 0
                    
                        Key  : Hypervisor.Flags.CpuManager
                        Value: 0
                    
                        Key  : Hypervisor.Flags.DeprecateAutoEoi
                        Value: 0
                    
                        Key  : Hypervisor.Flags.DynamicCpuDisabled
                        Value: 0
                    
                        Key  : Hypervisor.Flags.Epf
                        Value: 0
                    
                        Key  : Hypervisor.Flags.ExtendedProcessorMasks
                        Value: 0
                    
                        Key  : Hypervisor.Flags.HardwareMbecAvailable
                        Value: 0
                    
                        Key  : Hypervisor.Flags.MaxBankNumber
                        Value: 0
                    
                        Key  : Hypervisor.Flags.MemoryZeroingControl
                        Value: 0
                    
                        Key  : Hypervisor.Flags.NoExtendedRangeFlush
                        Value: 1
                    
                        Key  : Hypervisor.Flags.NoNonArchCoreSharing
                        Value: 0
                    
                        Key  : Hypervisor.Flags.Phase0InitDone
                        Value: 1
                    
                        Key  : Hypervisor.Flags.PowerSchedulerQos
                        Value: 0
                    
                        Key  : Hypervisor.Flags.RootScheduler
                        Value: 0
                    
                        Key  : Hypervisor.Flags.SynicAvailable
                        Value: 0
                    
                        Key  : Hypervisor.Flags.UseQpcBias
                        Value: 0
                    
                        Key  : Hypervisor.Flags.Value
                        Value: 536585
                    
                        Key  : Hypervisor.Flags.ValueHex
                        Value: 83009
                    
                        Key  : Hypervisor.Flags.VpAssistPage
                        Value: 1
                    
                        Key  : Hypervisor.Flags.VsmAvailable
                        Value: 0
                    
                        Key  : Hypervisor.RootFlags.Value
                        Value: 0
                    
                        Key  : Hypervisor.RootFlags.ValueHex
                        Value: 0
                    
                        Key  : WER.OS.Branch
                        Value: rs5_release
                    
                        Key  : WER.OS.Version
                        Value: 10.0.17763.1
                    
                    
                    BUGCHECK_CODE:  1e
                    
                    BUGCHECK_P1: ffffffffc0000096
                    
                    BUGCHECK_P2: fffff804db200407
                    
                    BUGCHECK_P3: 0
                    
                    BUGCHECK_P4: 0
                    
                    FILE_IN_CAB:  MEMORY.DMP
                    
                    EXCEPTION_PARAMETER1:  0000000000000000
                    
                    EXCEPTION_PARAMETER2:  0000000000000000
                    
                    BLACKBOXBSD: 1 (!blackboxbsd)
                    
                    
                    PROCESS_NAME:  ASManagerService.exe
                    
                    TRAP_FRAME:  ffffe782ff4a811c -- (.trap 0xffffe782ff4a811c)
                    NOTE: The trap frame does not contain all registers.
                    Some register values may be zeroed or incorrect.
                    Unable to get program counter
                    rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000000
                    rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
                    rip=ff4a8280ffffe782 rsp=ff4a82a000000000 rbp=00060000ffffe782
                     r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
                    r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
                    r14=0000000000000000 r15=0000000000000000
                    iopl=0         nv up di pl nz na pe nc
                    e782:e782 ??              ???
                    Resetting default scope
                    
                    IP_IN_FREE_BLOCK: 0
                    
                    STACK_TEXT:  
                    ffff920e`9a9ac908 fffff802`6e0d4077     : 00000000`0000001e ffffffff`c0000096 fffff804`db200407 00000000`00000000 : nt!KeBugCheckEx
                    ffff920e`9a9ac910 fffff802`6e06c102     : ffffe782`ff3c8a10 ffffbc89`00000000 ffffe782`ff4a811c fffff802`6deefd10 : nt!KiDispatchException+0x129ee7
                    ffff920e`9a9acfc0 fffff802`6e067885     : ffffe782`f9a02000 ffffbc89`00000190 ffff920e`00000000 ffff920e`9a9ad540 : nt!KiExceptionDispatch+0xc2
                    ffff920e`9a9ad1a0 fffff804`db200407     : ffffe782`ff0e94a0 00000000`00000000 00000000`00000000 ffffe782`fdf9b1b0 : nt!KiGeneralProtectionFault+0x305
                    ffff920e`9a9ad338 ffffe782`ff0e94a0     : 00000000`00000000 00000000`00000000 ffffe782`fdf9b1b0 fffff804`db209e91 : GVUSBD+0x407
                    ffff920e`9a9ad340 00000000`00000000     : 00000000`00000000 ffffe782`fdf9b1b0 fffff804`db209e91 ffffe782`fa0fef00 : 0xffffe782`ff0e94a0
                    
                    
                    SYMBOL_NAME:  GVUSBD+407
                    
                    MODULE_NAME: GVUSBD
                    
                    IMAGE_NAME:  GVUSBD.sys
                    
                    STACK_COMMAND:  .cxr; .ecxr ; kb
                    
                    BUCKET_ID_FUNC_OFFSET:  407
                    
                    FAILURE_BUCKET_ID:  0x1E_C0000096_GVUSBD!unknown_function
                    
                    OS_VERSION:  10.0.17763.1
                    
                    BUILDLAB_STR:  rs5_release
                    
                    OSPLATFORM_TYPE:  x64
                    
                    OSNAME:  Windows 10
                    
                    FAILURE_ID_HASH:  {e33840ed-d273-c482-6ab3-fda3f8b1b7cf}
                    
                    Followup:     MachineOwner
                    ---------
                    
                    D 1 Reply Last reply Reply Quote 1
                    • D Offline
                      dinhngtu Vates 🪐 XCP-ng Team @andsmith
                      last edited by

                      @andsmith That's what I'm looking for. Which host CPU are you using? And if you don't mind, could you share with me the crash dump and the driver files being used (see Device Manager)? It might contain some sensitive information so if you have some concerns, feel free to share it via PM.

                      A 1 Reply Last reply Reply Quote 0
                      • A Offline
                        andsmith @dinhngtu
                        last edited by

                        @dinhngtu said in 8.3 USB Passthrough - Win Server 2019 BSOD:

                        @andsmith That's what I'm looking for. Which host CPU are you using? And if you don't mind, could you share with me the crash dump and the driver files being used (see Device Manager)? It might contain some sensitive information so if you have some concerns, feel free to share it via PM.

                        Host Server is a Dell R760 with dual Intel(R) Xeon(R) Gold 5415+. We have a second server in the pool an older R740 with dual Intel(R) Xeon(R) Silver 4110 CPU @ 2.10GHz. I sent you a DM. The crash dump is 280mb.

                        D 1 Reply Last reply Reply Quote 0
                        • D Offline
                          dinhngtu Vates 🪐 XCP-ng Team @andsmith
                          last edited by dinhngtu

                          @andsmith Could you try this command on the host:

                          xe vm-param-add uuid=... param-name=platform msr-relaxed=true
                          

                          (edit: it's msr-relaxed not msr_relaxed)

                          Replace ... with your VM's UUID.

                          You'll need to completely shut down the VM before running the command.

                          A 1 Reply Last reply Reply Quote 0
                          • A Offline
                            andsmith @dinhngtu
                            last edited by

                            @dinhngtu said in 8.3 USB Passthrough - Win Server 2019 BSOD:

                            xe vm-param-add uuid=... param-name=platform msr_relaxed=true

                            This produced the same result.

                            D 1 Reply Last reply Reply Quote 0
                            • D Offline
                              dinhngtu Vates 🪐 XCP-ng Team @andsmith
                              last edited by dinhngtu

                              @andsmith I misspelled the command, sorry. It should be

                              xe vm-param-add uuid=... param-name=platform msr-relaxed=true
                              

                              (Note the dash and not the underscore)

                              If your VM works afterwards, could you post the lines containing "RDMSR ... unimplemented" from the output of xl dmesg?

                              A 1 Reply Last reply Reply Quote 0
                              • A Offline
                                andsmith @dinhngtu
                                last edited by andsmith

                                @dinhngtu said in 8.3 USB Passthrough - Win Server 2019 BSOD:

                                @andsmith I misspelled the command, sorry. It should be

                                xe vm-param-add uuid=... param-name=platform msr-relaxed=true
                                

                                (Note the dash and not the underscore)

                                If your VM works afterwards, could you post the lines containing "RDMSR ... unimplemented" from the output of xl dmesg?

                                Sweet, this worked! I searched the xl dmesg output, but didn't find any such line. So here is the whole thing:

                                 __  __            _  _    _ _____ ____
                                 \ \/ /___ _ __   | || |  / |___  | ___|
                                  \  // _ \ '_ \  | || |_ | |  / /|___ \
                                  /  \  __/ | | | |__   _|| | / /_ ___) |
                                 /_/\_\___|_| |_|    |_|(_)_|/_/(_)____/
                                
                                (XEN) [0000004693950393] Xen version 4.17.5-3 (mockbuild@[unknown]) (gcc (GCC) 11.2.1 20210728 (Red Hat 11.2.1-1)) debug=n Wed Oct  2 16:21:17 CEST 2024
                                (XEN) [0000004693951667] Latest ChangeSet: 430ce6cd9365, pq 326ba7419f1d
                                (XEN) [0000004693952b35] build-id: 8dbf3a0a4e64db53bf7d322a2fde56a7a922f5e0
                                (XEN) [000000469395325d] Bootloader: GRUB 2.06
                                (XEN) [0000004693953a1b] Command line: dom0_mem=8192M,max:8192M watchdog ucode=scan dom0_max_vcpus=1-16 crashkernel=256M,below=4G console=vga vga=mode-0x0311
                                (XEN) [0000004693954657] Xen image load base address: 0x5a800000
                                (XEN) [0000004693954c4f] Video information:
                                (XEN) [000000469395551d]  VGA is graphics mode 1280x1024, 32 bpp
                                (XEN) [0000004693955b8b] Disc information:
                                (XEN) [000000469395619f]  Found 0 MBR signatures
                                (XEN) [0000004693956791]  Found 2 EDD information structures
                                (XEN) [0000004693958c67] CPU Vendor: Intel, Family 6 (0x6), Model 143 (0x8f), Stepping 8 (raw 000806f8)
                                (XEN) [000000469395b8e7] Enabling Supervisor Shadow Stacks
                                (XEN) [000000469395c14d] Enabling Indirect Branch Tracking
                                (XEN) [000000469395c8af]   - IBT disabled in UEFI Runtime Services
                                (XEN) [00000046939607c9] EFI RAM map:
                                (XEN) [000000469396116d]  [0000000000000000, 000000000009ffff] (usable)
                                (XEN) [0000004693961a9d]  [00000000000a0000, 00000000000fffff] (reserved)
                                (XEN) [000000469396240f]  [0000000000100000, 000000004debbfff] (usable)
                                (XEN) [0000004693962c91]  [000000004debc000, 00000000506bbfff] (ACPI NVS)
                                (XEN) [00000046939634d5]  [00000000506bc000, 00000000641fdfff] (usable)
                                (XEN) [0000004693963c7b]  [00000000641fe000, 0000000074dfefff] (reserved)
                                (XEN) [000000469396447d]  [0000000074dff000, 00000000771fefff] (ACPI NVS)
                                (XEN) [0000004693964c5d]  [00000000771ff000, 00000000777fefff] (ACPI data)
                                (XEN) [00000046939655a7]  [00000000777ff000, 00000000777fffff] (usable)
                                (XEN) [0000004693965d19]  [0000000077800000, 000000008fffffff] (reserved)
                                (XEN) [0000004693966499]  [00000000fe010000, 00000000fe010fff] (reserved)
                                (XEN) [0000004693966d41]  [0000000100000000, 000000407fffffff] (usable)
                                (XEN) [000000469506bab9] Kdump: 256MB (262144kB) at 0x3de00000
                                (XEN) [00000046950b30b9] ACPI: RSDP 777FE014, 0024 (r2 DELL  )
                                (XEN) [00000046950b51b1] ACPI: XSDT 774F3188, 00E4 (r1 DELL   PE_SC3          0       1000013)
                                (XEN) [00000046950b6b7d] ACPI: FACP 777F6000, 0114 (r6 DELL   PE_SC3          0 INTL 20091013)
                                (XEN) [00000046950b84ed] ACPI: DSDT 776F5000, FBFCE (r2 DELL   PE_SC3          3 INTL 20091013)
                                (XEN) [00000046950b9639] ACPI: FACS 7653C000, 0040
                                (XEN) [00000046950ba2c9] ACPI: SSDT 777FB000, 131D (r2  INTEL RAS_ACPI        1 INTL 20210331)
                                (XEN) [00000046950bb497] ACPI: SSDT 777FA000, 076E (r2  INTEL ADDRXLAT        1 INTL 20210331)
                                (XEN) [00000046950bc427] ACPI: BERT 777F9000, 0030 (r1 DELL   PE_SC3          1 INTL        1)
                                (XEN) [00000046950bd3c9] ACPI: ERST 777F8000, 0230 (r1 DELL   PE_SC3          1 INTL        1)
                                (XEN) [00000046950be331] ACPI: MCEJ 777F7000, 0130 (r1 INTEL                  1 INTL  100000D)
                                (XEN) [00000046950bf257] ACPI: HPET 777F5000, 0038 (r1 DELL   PE_SC3          1 INTL 20091013)
                                (XEN) [00000046950c00df] ACPI: MCFG 777F4000, 003C (r1 DELL   PE_SC3          1 INTL 20091013)
                                (XEN) [00000046950c0ed5] ACPI: MIGT 777F3000, 0040 (r1 DELL   PE_SC3          0 INTL 20091013)
                                (XEN) [00000046950c1e65] ACPI: MSCT 777F2000, 0090 (r1 DELL   PE_SC3          1 INTL 20091013)
                                (XEN) [00000046950c2c17] ACPI: WSMT 777F1000, 0028 (r1 DELL   PE_SC3          0 INTL 20091013)
                                (XEN) [00000046950c3a07] ACPI: APIC 776F4000, 025E (r5 DELL   PE_SC3   10182021 INTL 20091013)
                                (XEN) [00000046950c49bf] ACPI: SRAT 776EC000, 7830 (r3 DELL   PE_SC3          2       1000013)
                                (XEN) [00000046950c5839] ACPI: SLIT 776EB000, 0030 (r1 DELL   PE_SC3          2       1000013)
                                (XEN) [00000046950c663b] ACPI: HMAT 776EA000, 0158 (r2 DELL   PE_SC3          2       1000013)
                                (XEN) [00000046950c748d] ACPI: OEM4 77562000, 187A51 (r2  INTEL CPU  CST     3000 INTL 20210331)
                                (XEN) [00000046950c85bd] ACPI: SSDT 774F8000, 69895 (r2  INTEL SSDT  PM     4000 INTL 20210331)
                                (XEN) [00000046950c94f7] ACPI: SSDT 774F7000, 0A1F (r2 DELL   PE_SC3          0 INTL 20091013)
                                (XEN) [00000046950ca451] ACPI: HEST 774F6000, 017C (r1 DELL   PE_SC3          1 INTL        1)
                                (XEN) [00000046950cb213] ACPI: SSDT 774F5000, 0623 (r2 DELL   Tpm2Tabl     1000 INTL 20210331)
                                (XEN) [00000046950cc1b9] ACPI: TPM2 774F4000, 004C (r4 DELL   PE_SC3          2       1000013)
                                (XEN) [00000046950ccf9f] ACPI: SSDT 777FD000, 085A (r2 DELL   PE_SC3          2 DELL        1)
                                (XEN) [00000046950cdd51] ACPI: NBFT 774F2000, 0122 (r1 DELL   PE_SC3          0       1000013)
                                (XEN) [00000046950ceb49] ACPI: DMAR 774F1000, 0370 (r1 DELL   PE_SC3          1 INTL 20091013)
                                (XEN) [0000004695135eaf] System RAM: 261657MB (267937404kB)
                                (XEN) [00000046b947f713] SRAT: Node 0 PXM 0 [0000000000000000, 000000007fffffff]
                                (XEN) [00000046b94804b9] SRAT: Node 0 PXM 0 [0000000100000000, 000000207fffffff]
                                (XEN) [00000046b9480eb9] SRAT: Node 1 PXM 1 [0000002080000000, 000000407fffffff]
                                (XEN) [00000046f67171e9] Domain heap initialised DMA width 32 bits
                                (XEN) [00000046fc07a4b1] vesafb: framebuffer at 0x0000000094000000, mapped to 0xffff82c000201000, using 5120k, total 5120k
                                (XEN) [00000046fc07b199] vesafb: mode is 1280x1024x32, linelength=5120, font 8x16
                                (XEN) [00000046fc07bdf7] vesafb: Truecolor: size=8:8:8:8, shift=24:16:8:0
                                (XEN) [0000004770f1c62f] SMBIOS 3.3 present.
                                (XEN) [0000004770fea01b] XSM Framework v1.0.1 initialized
                                (XEN) [00000047710ffd53] Initialising XSM SILO mode
                                (XEN) [0000004771329d19] x2APIC mode is already enabled by BIOS.
                                (XEN) [00000047714505cd] Using APIC driver x2apic_mixed
                                (XEN) [00000047715ad32f] ACPI: PM-Timer IO Port: 0x508 (24 bits)
                                (XEN) [00000047716bf507] ACPI: v5 SLEEP INFO: control[0:0], status[0:0]
                                (XEN) [0000004771817ad9] ACPI: SLEEP INFO: pm1x_cnt[1:504,1:0], pm1x_evt[1:500,1:0]
                                (XEN) [00000047719915bd] ACPI: 32/64X FACS address mismatch in FADT - 7653c000/0000000000000000, using 32
                                (XEN) [0000004771b5579d] ACPI:             wakeup_vec[7653c00c], vec_size[20]
                                (XEN) [0000004771e92ab5] ACPI: IOAPIC (id[0x08] address[0xfec00000] gsi_base[0])
                                (XEN) [00000047720b2595] IOAPIC[0]: apic_id 8, version 32, address 0xfec00000, GSI 0-119
                                (XEN) [0000004772270755] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
                                (XEN) [0000004772431289] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
                                (XEN) [0000004772674de5] ACPI: HPET id: 0x8086a701 base: 0xfed00000
                                (XEN) [0000004772821923] PCI: MCFG configuration 0: base 80000000 segment 0000 buses 00 - ff
                                (XEN) [0000004772a39499] PCI: MCFG area at 80000000 reserved in E820
                                (XEN) [0000004772bbdfe9] PCI: Using MCFG for segment 0000 bus 00-ff
                                (XEN) [0000004772dac69f] Xen ERST support is initialized.
                                (XEN) [0000004772eec0ab] HEST: Table parsing has been initialized
                                (XEN) [000000477303e971] Using ACPI (MADT) for SMP configuration information
                                (XEN) [00000047731f83f1] SMP: Allowing 32 CPUs (0 hotplug CPUs)
                                (XEN) [000000477339e105] IRQ limits: 120 GSI, 6536 MSI/MSI-X
                                (XEN) [0000004776ce4dab] BSP microcode revision: 0x2b0005d2
                                (XEN) [0000004776e9fbcb] CPU0: invalid PERF_GLOBAL_CTRL: 0 adjusting to 0xff
                                (XEN) [0000004776fef70f] CPU0: TSC: 25000000 Hz * 232 / 2 = 2900000000 Hz
                                (XEN) [000000477716993f] CPU0: bus: 100 MHz base: 2900 MHz max: 4100 MHz
                                (XEN) [000000477753723d] CPU0: 800 ... 2900 MHz
                                (XEN) [00000047776dc6d5] xstate: size: 0xa88 and states: 0x2e7
                                (XEN) [00000047778131af] CPU0: Intel machine check reporting enabled
                                (XEN) [000000477797bc0f] Unrecognised CPU model 0x8f - assuming vulnerable to LazyFPU
                                (XEN) [0000004777ba13b9] Speculative mitigation facilities:
                                (XEN) [0000004777d331b9]   Hardware hints: RDCL_NO EIBRS RRSBA SKIP_L1DFL MDS_NO TAA_NO SBDR_SSDP_NO FBSDP_NO PSDP_NO GDS_NO RFDS_NO
                                (XEN) [00000047780263ab]   Hardware features: IBPB IBRS STIBP SSBD PSFD L1D_FLUSH MD_CLEAR TSX_CTRL
                                (XEN) [00000047782464ff]   Compiled-in support: INDIRECT_THUNK HARDEN_ARRAY HARDEN_BRANCH HARDEN_GUEST_ACCESS HARDEN_LOCK
                                (XEN) [00000047784c6f7b]   Xen settings: BTI-Thunk: JMP, SPEC_CTRL: IBRS+ STIBP+ SSBD- PSFD- BHI_DIS_S+ TSX+, Other: IBPB-ctxt BRANCH_HARDEN
                                (XEN) [00000047787b5c69]   Support for HVM VMs: MSR_SPEC_CTRL MSR_VIRT_SPEC_CTRL RSB EAGER_FPU
                                (XEN) [00000047789d1829]   Support for PV VMs: MSR_SPEC_CTRL EAGER_FPU
                                (XEN) [0000004778b86fe1]   XPTI (64-bit PV only): Dom0 disabled, DomU disabled (with PCID)
                                (XEN) [0000004778dfaa31]   PV L1TF shadowing: Dom0 disabled, DomU disabled
                                (XEN) [0000004778fef76d] Using scheduler: SMP Credit Scheduler (credit)
                                (XEN) [0000004781c92429] Platform timer is 25.000MHz HPET
                                (XEN) [    1.378435] Detected 2899.999 MHz processor.
                                (XEN) [    1.388276] EFI memory map:
                                (XEN) [    1.388514]  0000000000000-0000000000fff type=3 attr=000000000000000f
                                (XEN) [    1.389112]  0000000001000-0000000004fff type=2 attr=000000000000000f
                                (XEN) [    1.389708]  0000000005000-000000000ffff type=7 attr=000000000000000f
                                (XEN) [    1.390291]  0000000010000-0000000013fff type=3 attr=000000000000000f
                                (XEN) [    1.390874]  0000000014000-000000004afff type=7 attr=000000000000000f
                                (XEN) [    1.391549]  000000004b000-000000005afff type=2 attr=000000000000000f
                                (XEN) [    1.392174]  000000005b000-0000000086fff type=3 attr=000000000000000f
                                (XEN) [    1.392716]  0000000087000-000000008ffff type=4 attr=000000000000000f
                                (XEN) [    1.393264]  0000000090000-000000009ffff type=3 attr=000000000000000f
                                (XEN) [    1.393868]  0000000100000-0000000794fff type=2 attr=000000000000000f
                                (XEN) [    1.394460]  0000000795000-0000000bfffff type=7 attr=000000000000000f
                                (XEN) [    1.395085]  0000000c00000-0000000ffffff type=3 attr=000000000000000f
                                (XEN) [    1.395737]  0000001000000-00000024a3fff type=2 attr=000000000000000f
                                (XEN) [    1.396484]  00000024a4000-000002324bfff type=7 attr=000000000000000f
                                (XEN) [    1.397241]  000002324c000-00000371fffff type=1 attr=000000000000000f
                                (XEN) [    1.398089]  0000037200000-00000372fffff type=4 attr=000000000000000f
                                (XEN) [    1.398960]  0000037300000-000004c2bffff type=7 attr=000000000000000f
                                (XEN) [    1.399746]  000004c2c0000-000004c3d3fff type=1 attr=000000000000000f
                                (XEN) [    1.400657]  000004c3d4000-000004debbfff type=3 attr=000000000000000f
                                (XEN) [    1.401635]  000004debc000-00000506bbfff type=10 attr=000000000000000f
                                (XEN) [    1.418699] Setting RUNTIME attribute for 000004debc000-00000506bbfff
                                (XEN) [    1.434726]  00000506bc000-0000051ffcfff type=3 attr=000000000000000f
                                (XEN) [    1.450505]  0000051ffd000-00000521fffff type=4 attr=000000000000000f
                                (XEN) [    1.470268]  0000052200000-0000052267fff type=3 attr=000000000000000f
                                (XEN) [    1.488400]  0000052268000-0000052287fff type=4 attr=000000000000000f
                                (XEN) [    1.507214]  0000052288000-0000052309fff type=3 attr=000000000000000f
                                (XEN) [    1.526352]  000005230a000-0000052326fff type=4 attr=000000000000000f
                                (XEN) [    1.543590]  0000052327000-000005235afff type=3 attr=000000000000000f
                                (XEN) [    1.562588]  000005235b000-000005235bfff type=4 attr=000000000000000f
                                (XEN) [    1.581282]  000005235c000-000005235ffff type=3 attr=000000000000000f
                                (XEN) [    1.598584]  0000052360000-0000052396fff type=4 attr=000000000000000f
                                (XEN) [    1.615713]  0000052397000-00000523aefff type=3 attr=000000000000000f
                                (XEN) [    1.633370]  00000523af000-00000523c9fff type=4 attr=000000000000000f
                                (XEN) [    1.652247]  00000523ca000-00000523d0fff type=3 attr=000000000000000f
                                (XEN) [    1.668917]  00000523d1000-00000523e7fff type=4 attr=000000000000000f
                                (XEN) [    1.686545]  00000523e8000-0000052402fff type=3 attr=000000000000000f
                                (XEN) [    1.705380]  0000052403000-000005242dfff type=4 attr=000000000000000f
                                (XEN) [    1.725300]  000005242e000-000005243dfff type=3 attr=000000000000000f
                                (XEN) [    1.741681]  000005243e000-0000052d17fff type=4 attr=000000000000000f
                                (XEN) [    1.757121]  0000052d18000-0000052d22fff type=3 attr=000000000000000f
                                (XEN) [    1.772548]  0000052d23000-0000052d3cfff type=4 attr=000000000000000f
                                (XEN) [    1.788848]  0000052d3d000-0000052d48fff type=3 attr=000000000000000f
                                (XEN) [    1.806686]  0000052d49000-0000052d64fff type=4 attr=000000000000000f
                                (XEN) [    1.823536]  0000052d65000-0000052d95fff type=3 attr=000000000000000f
                                (XEN) [    1.840824]  0000052d96000-0000052dd6fff type=4 attr=000000000000000f
                                (XEN) [    1.858861]  0000052dd7000-0000052dd8fff type=3 attr=000000000000000f
                                (XEN) [    1.875619]  0000052dd9000-00000570d9fff type=4 attr=000000000000000f
                                (XEN) [    1.892683]  00000570da000-00000570e8fff type=3 attr=000000000000000f
                                (XEN) [    1.909471]  00000570e9000-00000570e9fff type=4 attr=000000000000000f
                                (XEN) [    1.925096]  00000570ea000-0000057116fff type=3 attr=000000000000000f
                                (XEN) [    1.941540]  0000057117000-00000571c0fff type=4 attr=000000000000000f
                                (XEN) [    1.957492]  00000571c1000-00000571c1fff type=2 attr=000000000000000f
                                (XEN) [    1.975048]  00000571c2000-00000571dffff type=3 attr=000000000000000f
                                (XEN) [    1.991642]  00000571e0000-00000571eafff type=4 attr=000000000000000f
                                (XEN) [    2.008069]  00000571eb000-00000571fdfff type=3 attr=000000000000000f
                                (XEN) [    2.023999]  00000571fe000-000005a9fffff type=7 attr=000000000000000f
                                (XEN) [    2.039571]  000005aa00000-000005b3fffff type=2 attr=000000000000000f
                                (XEN) [    2.056001]  000005b400000-000005bc24fff type=7 attr=000000000000000f
                                (XEN) [    2.072679]  000005bc25000-00000641fdfff type=4 attr=000000000000000f
                                (XEN) [    2.087838]  00000641fe000-00000645fdfff type=6 attr=800000000000000f
                                (XEN) [    2.103707]  00000645fe000-0000064dfdfff type=5 attr=800000000000000f
                                (XEN) [    2.119118]  0000064dfe000-0000074dfefff type=0 attr=000000000000000f
                                (XEN) [    2.137570]  0000074dff000-00000771fefff type=10 attr=000000000000000f
                                (XEN) [    2.153361] Setting RUNTIME attribute for 0000074dff000-00000771fefff
                                (XEN) [    2.168626]  00000771ff000-00000777fefff type=9 attr=000000000000000f
                                (XEN) [    2.185156]  00000777ff000-00000777fffff type=4 attr=000000000000000f
                                (XEN) [    2.200602]  0000100000000-000407fffffff type=7 attr=000000000000000f
                                (XEN) [    2.216274]  00000000a0000-00000000fffff type=0 attr=0000000000000000
                                (XEN) [    2.232227]  0000077800000-0000077ffffff type=0 attr=0000000000000000
                                (XEN) [    2.247423]  0000078000000-000007fffffff type=0 attr=0000000000000009
                                (XEN) [    2.262021]  0000080000000-000008fffffff type=11 attr=8000000000000001
                                (XEN) [    2.280292]  00000fe010000-00000fe010fff type=11 attr=8000000000000001
                                (XEN) [    2.295163] alt table ffff82d0406a36b8 -> ffff82d0406b2e58
                                (XEN) [    2.320912] Intel VT-d iommu 12 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.335317] Intel VT-d iommu 11 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.350660] Intel VT-d iommu 10 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.366445] Intel VT-d iommu 9 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.380589] Intel VT-d iommu 8 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.396467] Intel VT-d iommu 7 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.412889] Intel VT-d iommu 6 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.428571] Intel VT-d iommu 5 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.443744] Intel VT-d iommu 4 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.459681] Intel VT-d iommu 3 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.475423] Intel VT-d iommu 2 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.491314] Intel VT-d iommu 1 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.508744] Intel VT-d iommu 0 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.524051] Intel VT-d iommu 13 supported page sizes: 4kB, 2MB, 1GB
                                (XEN) [    2.539590] Intel VT-d Snoop Control enabled.
                                (XEN) [    2.555276] Intel VT-d Dom0 DMA Passthrough not enabled.
                                (XEN) [    2.571181] Intel VT-d Queued Invalidation enabled.
                                (XEN) [    2.589660] Intel VT-d Interrupt Remapping enabled.
                                (XEN) [    2.605988] Intel VT-d Posted Interrupt not enabled.
                                (XEN) [    2.620523] Intel VT-d Shared EPT tables enabled.
                                (XEN) [    2.639064] I/O virtualisation enabled
                                (XEN) [    2.654550]  - Dom0 mode: Relaxed
                                (XEN) [    2.669120] Interrupt remapping enabled
                                (XEN) [    2.683791] Enabled directed EOI with ioapic_ack_old on!
                                (XEN) [    2.700845] Enabling APIC mode.  Using 1 I/O APICs
                                (XEN) [    2.722047] ENABLING IO-APIC IRQs
                                (XEN) [    2.735628]  -> Using old ACK method
                                (XEN) [    2.749524] ..TIMER: vector=0xF0 apic1=0 pin1=2 apic2=-1 pin2=-1
                                (XEN) [    3.677505] Defaulting to alternative key handling; send 'A' to switch to normal mode.
                                (XEN) [    3.693501] Allocated console ring of 128 KiB.
                                (XEN) [    3.709086] VMX: Supported advanced features:
                                (XEN) [    3.724997]  - APIC MMIO access virtualisation
                                (XEN) [    3.739628]  - APIC TPR shadow
                                (XEN) [    3.753488]  - Extended Page Tables (EPT)
                                (XEN) [    3.768246]  - Virtual-Processor Identifiers (VPID)
                                (XEN) [    3.784820]  - Virtual NMI
                                (XEN) [    3.799495]  - MSR direct-access bitmap
                                (XEN) [    3.813649]  - Unrestricted Guest
                                (XEN) [    3.828341]  - VMCS shadowing
                                (XEN) [    3.842369]  - VM Functions
                                (XEN) [    3.855050]  - Virtualisation Exceptions
                                (XEN) [    3.868443]  - Page Modification Logging
                                (XEN) [    3.882016]  - TSC Scaling
                                (XEN) [    3.897261]  - Bus Lock Detection
                                (XEN) [    3.911781]  - Notify VM Exit
                                (XEN) [    3.924642]  - Virtualize SPEC_CTRL
                                (XEN) [    3.937029] HVM: ASIDs enabled.
                                (XEN) [    3.949954] HVM: VMX enabled
                                (XEN) [    3.963225] HVM: Hardware Assisted Paging (HAP) detected
                                (XEN) [    3.977009] HVM: HAP page sizes: 4kB, 2MB, 1GB
                                (XEN) [    3.990141] alt table ffff82d0406a36b8 -> ffff82d0406b2e58
                                (XEN) [    4.005382] altcall: Optimised away 329 endbr64 instructions
                                (XEN) [000000494bc303c5] CPU16: invalid PERF_GLOBAL_CTRL: 0 adjusting to 0xff
                                (XEN) [    4.048314] Brought up 32 CPUs
                                (XEN) [    4.061218] Testing NMI watchdog on all CPUs:ok
                                (XEN) [    4.334939] Scheduling granularity: cpu, 1 CPU per sched-resource
                                (XEN) [    4.347735] mcheck_poll: Machine check polling timer started.
                                (XEN) [    4.381323] NX (Execute Disable) protection active
                                (XEN) [    4.394476] d0 has maximum 1368 PIRQs
                                (XEN) [    4.407622] csched_alloc_domdata: setting dom 0 as the privileged domain
                                (XEN) [    4.421071] *** Building a PV Dom0 ***
                                (XEN) [    4.636874]  Xen  kernel: 64-bit, lsb
                                (XEN) [    4.650571]  Dom0 kernel: 64-bit, PAE, lsb, paddr 0x1000000 -> 0x302c000
                                (XEN) [    4.663505] PHYSICAL MEMORY ARRANGEMENT:
                                (XEN) [    4.676826]  Dom0 alloc.:   0000004028000000->000000402c000000 (2075484 pages to be allocated)
                                (XEN) [    4.691897]  Init. ramdisk: 000000407eb5c000->000000407ffffd69
                                (XEN) [    4.705341] VIRTUAL MEMORY ARRANGEMENT:
                                (XEN) [    4.717775]  Loaded kernel: ffffffff81000000->ffffffff8302c000
                                (XEN) [    4.733502]  Phys-Mach map: 0000008000000000->0000008001000000
                                (XEN) [    4.747489]  Start info:    ffffffff8302c000->ffffffff8302c4b8
                                (XEN) [    4.760816]  Page tables:   ffffffff8302d000->ffffffff8304a000
                                (XEN) [    4.773359]  Boot stack:    ffffffff8304a000->ffffffff8304b000
                                (XEN) [    4.788083]  TOTAL:         ffffffff80000000->ffffffff83400000
                                (XEN) [    4.802269]  ENTRY ADDRESS: ffffffff8242b180
                                (XEN) [    4.815696] Dom0 has maximum 16 VCPUs
                                (XEN) [    4.896093] Initial low memory virq threshold set at 0x4000 pages.
                                (XEN) [    4.910548] Scrubbing Free RAM in background
                                (XEN) [    4.928442] Std. Loglevel: Errors, warnings and info
                                (XEN) [    4.942718] Guest Loglevel: Nothing (Rate-limited: Errors and warnings)
                                (XEN) [    4.959482] Xen is relinquishing VGA console.
                                (XEN) [    5.015409] *** Serial input to DOM0 (type 'CTRL-a' three times to switch input)
                                (XEN) [    5.015609] Freed 2048kB init memory
                                
                                1 Reply Last reply Reply Quote 2
                                • M Offline
                                  markr @andsmith
                                  last edited by

                                  @andsmith windbg is also a regular win32 app and is included in any recent windows SDK. Here: https://developer.microsoft.com/en-us/windows/downloads/windows-sdk/

                                  You just need windbg so deselect all the other crap.

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post