<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://openzfsonosx.org/w/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://openzfsonosx.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dexter</id>
		<title>OpenZFS on OS X - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://openzfsonosx.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dexter"/>
		<link rel="alternate" type="text/html" href="https://openzfsonosx.org/wiki/Special:Contributions/Dexter"/>
		<updated>2026-04-19T21:10:17Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.22.3</generator>

	<entry>
		<id>https://openzfsonosx.org/wiki/Windows_BSOD</id>
		<title>Windows BSOD</title>
		<link rel="alternate" type="text/html" href="https://openzfsonosx.org/wiki/Windows_BSOD"/>
				<updated>2019-11-28T06:55:17Z</updated>
		
		<summary type="html">&lt;p&gt;Dexter: Corrected path C:\Program Files\OpenZFS On Windows\symbols\&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Windows Crash Dumps ==&lt;br /&gt;
&lt;br /&gt;
If you do managed to get a Blue Screen Of Death (BSOD), Windows should in theory write a crash dump file to:&lt;br /&gt;
&lt;br /&gt;
 C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
The dump file can be analyzed with [http://windbg.org WinDbg.exe]&lt;br /&gt;
&lt;br /&gt;
Debug builds of ZFSin include debugging symbols to assist in dump analysis which are located at:&lt;br /&gt;
&lt;br /&gt;
 C:\Program Files\OpenZFS On Windows\symbols\&lt;br /&gt;
&lt;br /&gt;
=== WinDbg.exe at the Command Line ===&lt;br /&gt;
&lt;br /&gt;
Once installed, WinDbg.exe can be run from a CMD.com or PowerShell terminal with Administrative privileges:&lt;br /&gt;
&lt;br /&gt;
 WinDbgX.exe -y ‘C:\Program Files\OpenZFS On Windows\symbols\’ -z C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
This will launch the application and you can perform dump analysis with:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; !analyze -v&lt;br /&gt;
&lt;br /&gt;
To run the analysis in a single command:&lt;br /&gt;
&lt;br /&gt;
 WinDbgX.exe -y ‘C:\Program Files\OpenZFS On Windows\symbols\’ -z C:\Windows\MEMORY.DMP -c !analyze -v&lt;br /&gt;
&lt;br /&gt;
=== WinDbg.exe in the GUI ===&lt;br /&gt;
&lt;br /&gt;
Launch WinDbg.exe and set the Symbol path in:&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&lt;br /&gt;
 File &amp;gt; Symbol File Path:&lt;br /&gt;
 srv*c:\cache*https://msdl.microsoft.com/download/symbols;C:\Program Files\OpenZFS On Windows\symbols&lt;br /&gt;
 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So that it can load both the symbols from Microsoft, and from the installed Open ZFS directory. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Open the crash dump file with:&lt;br /&gt;
&lt;br /&gt;
 File: Open crash dump&lt;br /&gt;
 C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
Perform the analysis:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; !analyze -v&lt;br /&gt;
&lt;br /&gt;
Should at least show the stack. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed-hover&amp;quot;&amp;gt;&lt;br /&gt;
Image:minidump1.png|''Set symbol path''&lt;br /&gt;
Image:minidump2.png|''Add path''&lt;br /&gt;
Image:minidump3.png|''Load crash dump''&lt;br /&gt;
Image:minidump4.png|''Locate minidump''&lt;br /&gt;
Image:minidump5.png|''minidump loading''&lt;br /&gt;
Image:minidump6.png|''analyze with stack''&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Example Crash report ===&lt;br /&gt;
&lt;br /&gt;
A successful crash dump would look something like:&lt;br /&gt;
&lt;br /&gt;
  	ZFSin!zfs_range_lock_reader+0x290 [c:\src\zfsin\zfsin\zfs\module\zfs\zfs_rlock.c @ 417]	C/C++/ASM&lt;br /&gt;
 	ZFSin!zfs_range_lock+0x16d [c:\src\zfsin\zfsin\zfs\module\zfs\zfs_rlock.c @ 453]	C/C++/ASM&lt;br /&gt;
 	ZFSin!zil_lwb_commit+0x99f [c:\src\zfsin\zfsin\zfs\module\zfs\zil.c @ 1570]	C/C++/ASM&lt;br /&gt;
 	ZFSin!zil_process_commit_list+0x30e [c:\src\zfsin\zfsin\zfs\module\zfs\zil.c @ 2182]	C/C++/ASM&lt;br /&gt;
 	ZFSin!zil_commit_writer+0x111 [c:\src\zfsin\zfsin\zfs\module\zfs\zil.c @ 2318]	C/C++/ASM&lt;br /&gt;
&lt;br /&gt;
If you get only ZFSin+0x&amp;quot;hex-number&amp;quot; it means it is not reading the debug symbols correctly, to be able to convert the hex-number into a function name.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Debug Print Buffer ===&lt;br /&gt;
&lt;br /&gt;
Windows features a circular debug print buffer which can also be written to disk:&lt;br /&gt;
&lt;br /&gt;
 2: kd&amp;gt; dt ZFSin!cbuf&lt;br /&gt;
 0xffffe089`f0010000  &amp;quot;FFFFC1072DE87580: SPL: start.FFFFC1072DE87580: SPL: total ncpu 4&lt;br /&gt;
&lt;br /&gt;
Note the first string, i.e. &amp;quot;0xffffe089`f0010000&amp;quot;. Write the buffer out with the following:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; .writemem C:\Users\&amp;lt;your Windows username&amp;gt;\Desktop\cbuf.txt 0xffffe089`f0010000 L100000&lt;br /&gt;
&lt;br /&gt;
Do not worry if you get a message about short write, it just means you have not yet filled the buffer.&lt;br /&gt;
&lt;br /&gt;
This will include -EB- at the end of the buffer.&lt;br /&gt;
Do not worry if the rest of the buffer has &amp;quot;@&amp;quot; (nul) symbols, it just means the buffer was not yet full.&lt;br /&gt;
&lt;br /&gt;
Please provide the contents of the dump analysis and cbuf.txt in you ZFSin in your crash-related tickets.&lt;/div&gt;</summary>
		<author><name>Dexter</name></author>	</entry>

	<entry>
		<id>https://openzfsonosx.org/wiki/Windows_BSOD</id>
		<title>Windows BSOD</title>
		<link rel="alternate" type="text/html" href="https://openzfsonosx.org/wiki/Windows_BSOD"/>
				<updated>2019-03-14T05:14:55Z</updated>
		
		<summary type="html">&lt;p&gt;Dexter: Added full command line&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Windows Crash Dumps ==&lt;br /&gt;
&lt;br /&gt;
If you do managed to get a Blue Screen Of Death (BSOD), Windows should in theory write a crash dump file to:&lt;br /&gt;
&lt;br /&gt;
 C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
The dump file can be analyzed with [http://windbg.org WinDbg.exe]&lt;br /&gt;
&lt;br /&gt;
Debug builds of ZFSin include debugging symbols to assist in dump analysis which are located at:&lt;br /&gt;
&lt;br /&gt;
 C:\Program Files (x86)\OpenZFS On Windows\symbols\&lt;br /&gt;
&lt;br /&gt;
=== WinDbg.exe at the Command Line ===&lt;br /&gt;
&lt;br /&gt;
Once installed, WinDbg.exe can be run from a CMD.com or PowerShell terminal with Administrative privileges:&lt;br /&gt;
&lt;br /&gt;
 WinDbgX.exe -y ‘C:\Program Files (x86)\OpenZFS On Windows\symbols\’ -z C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
This will launch the application and you can perform dump analysis with:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; !analyze -v&lt;br /&gt;
&lt;br /&gt;
To run the analysis in a single command:&lt;br /&gt;
&lt;br /&gt;
 WinDbgX.exe -y ‘C:\Program Files (x86)\OpenZFS On Windows\symbols\’ -z C:\Windows\MEMORY.DMP -c !analyze -v&lt;br /&gt;
&lt;br /&gt;
=== WinDbg.exe in the GUI ===&lt;br /&gt;
&lt;br /&gt;
Launch WinDbg.exe and set the Symbol path in:&lt;br /&gt;
&lt;br /&gt;
 Home: Settings Icon: Settings: Debugging Paths: Symbol path: C:\Program Files (x86)\OpenZFS On Windows\symbols\&lt;br /&gt;
&lt;br /&gt;
Open the crash dump file with:&lt;br /&gt;
&lt;br /&gt;
 File: Open dump file: C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
Perform the analysis:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; !analyze -v&lt;br /&gt;
&lt;br /&gt;
=== Debug Print Buffer ===&lt;br /&gt;
&lt;br /&gt;
Windows features a circular debug print buffer which can also be written to disk:&lt;br /&gt;
&lt;br /&gt;
 2: kd&amp;gt; dt ZFSin!cbuf&lt;br /&gt;
 0xffffe089`f0010000  &amp;quot;FFFFC1072DE87580: SPL: start.FFFFC1072DE87580: SPL: total ncpu 4&lt;br /&gt;
&lt;br /&gt;
Note the first string, i.e. &amp;quot;0xffffe089`f0010000&amp;quot;. Enter write this out with the following:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; .writemem C:\Users\&amp;lt;your Windows username&amp;gt;\Desktop\cbuf.txt 0xffffe089`f0010000 L100000&lt;br /&gt;
&lt;br /&gt;
This will include -EB- at the end of the buffer, followed by &amp;quot;@&amp;quot; symbols until the buffer wraps around.&lt;br /&gt;
&lt;br /&gt;
Please provide the contents of the dump analysis and cbuf.txt in you ZFSin in your crash-related tickets.&lt;/div&gt;</summary>
		<author><name>Dexter</name></author>	</entry>

	<entry>
		<id>https://openzfsonosx.org/wiki/Windows_BSOD</id>
		<title>Windows BSOD</title>
		<link rel="alternate" type="text/html" href="https://openzfsonosx.org/wiki/Windows_BSOD"/>
				<updated>2019-03-14T05:12:22Z</updated>
		
		<summary type="html">&lt;p&gt;Dexter: Added GUI option&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Windows Crash Dumps ==&lt;br /&gt;
&lt;br /&gt;
If you do managed to get a Blue Screen Of Death (BSOD), Windows should in theory write a crash dump file to:&lt;br /&gt;
&lt;br /&gt;
 C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
The dump file can be analyzed with [http://windbg.org WinDbg.exe]&lt;br /&gt;
&lt;br /&gt;
Debug builds of ZFSin include debugging symbols to assist in dump analysis which are located at:&lt;br /&gt;
&lt;br /&gt;
 C:\Program Files (x86)\OpenZFS On Windows\symbols\&lt;br /&gt;
&lt;br /&gt;
=== WinDbg.exe at the Command Line ===&lt;br /&gt;
&lt;br /&gt;
Once installed, WinDbg.exe can be run from a CMD.com or PowerShell terminal with Administrative privileges:&lt;br /&gt;
&lt;br /&gt;
 WinDbgX.exe -y ‘C:\Program Files (x86)\OpenZFS On Windows\symbols\’ -z C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
This will launch the application and you can perform dump analysis with:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; !analyze -v&lt;br /&gt;
&lt;br /&gt;
=== WinDbg.exe in the GUI ===&lt;br /&gt;
&lt;br /&gt;
Launch WinDbg.exe and set the Symbol path in:&lt;br /&gt;
&lt;br /&gt;
 Home: Settings Icon: Settings: Debugging Paths: Symbol path: C:\Program Files (x86)\OpenZFS On Windows\symbols\&lt;br /&gt;
&lt;br /&gt;
Open the crash dump file with:&lt;br /&gt;
&lt;br /&gt;
 File: Open dump file: C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
Perform the analysis:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; !analyze -v&lt;br /&gt;
&lt;br /&gt;
=== Debug Print Buffer ===&lt;br /&gt;
&lt;br /&gt;
Windows features a circular debug print buffer which can also be written to disk:&lt;br /&gt;
&lt;br /&gt;
 2: kd&amp;gt; dt ZFSin!cbuf&lt;br /&gt;
 0xffffe089`f0010000  &amp;quot;FFFFC1072DE87580: SPL: start.FFFFC1072DE87580: SPL: total ncpu 4&lt;br /&gt;
&lt;br /&gt;
Note the first string, i.e. &amp;quot;0xffffe089`f0010000&amp;quot;. Enter write this out with the following:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; .writemem C:\Users\&amp;lt;your Windows username&amp;gt;\Desktop\cbuf.txt 0xffffe089`f0010000 L100000&lt;br /&gt;
&lt;br /&gt;
This will include -EB- at the end of the buffer, followed by &amp;quot;@&amp;quot; symbols until the buffer wraps around.&lt;br /&gt;
&lt;br /&gt;
Please provide the contents of the dump analysis and cbuf.txt in you ZFSin in your crash-related tickets.&lt;/div&gt;</summary>
		<author><name>Dexter</name></author>	</entry>

	<entry>
		<id>https://openzfsonosx.org/wiki/Windows_BSOD</id>
		<title>Windows BSOD</title>
		<link rel="alternate" type="text/html" href="https://openzfsonosx.org/wiki/Windows_BSOD"/>
				<updated>2019-03-14T04:26:49Z</updated>
		
		<summary type="html">&lt;p&gt;Dexter: Expanded Windows Crash Dump text at the request of Lundman&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Windows Crash Dumps ==&lt;br /&gt;
&lt;br /&gt;
If you do managed to get a Blue Screen Of Death (BSOD), Windows should in theory write a crash dump file to:&lt;br /&gt;
&lt;br /&gt;
 C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
The dump file can be analyzed with [http://windbg.org WinDbg.exe]&lt;br /&gt;
&lt;br /&gt;
Debug builds of ZFSin include debugging symbols to assist in dump analysis which are located at:&lt;br /&gt;
&lt;br /&gt;
 C:\Program Files (x86)\OpenZFS On Windows\symbols\’&lt;br /&gt;
&lt;br /&gt;
Once installed, WinDbg.exe can be run from a CMD.com or PowerShell terminal with Administrative privileges:&lt;br /&gt;
&lt;br /&gt;
 WinDbgX.exe -y ‘C:\Program Files (x86)\OpenZFS On Windows\symbols\’ -z C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
This will launch the application and you can perform dump analysis with:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; !analyze -v&lt;br /&gt;
&lt;br /&gt;
Windows features a circular debug print buffer which can also be written to disk:&lt;br /&gt;
&lt;br /&gt;
 2: kd&amp;gt; dt ZFSin!cbuf&lt;br /&gt;
 0xffffe089`f0010000  &amp;quot;FFFFC1072DE87580: SPL: start.FFFFC1072DE87580: SPL: total ncpu 4&lt;br /&gt;
&lt;br /&gt;
Note the first string, i.e. &amp;quot;0xffffe089`f0010000&amp;quot;. Enter write this out with the following:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; .writemem C:\Users\&amp;lt;your Windows username&amp;gt;\Desktop\cbuf.txt 0xffffe089`f0010000 L100000&lt;br /&gt;
&lt;br /&gt;
This will include -EB- at the end of the buffer, followed by &amp;quot;@&amp;quot; symbols until the buffer wraps around.&lt;br /&gt;
&lt;br /&gt;
Please provide the contents of the dump analysis and cbuf.txt in you ZFSin in your crash-related tickets.&lt;/div&gt;</summary>
		<author><name>Dexter</name></author>	</entry>

	</feed>