<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="https://openzfsonosx.org/w/skins/common/feed.css?303"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://openzfsonosx.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ichundes</id>
		<title>OpenZFS on OS X - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://openzfsonosx.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ichundes"/>
		<link rel="alternate" type="text/html" href="https://openzfsonosx.org/wiki/Special:Contributions/Ichundes"/>
		<updated>2026-04-19T21:11:04Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.22.3</generator>

	<entry>
		<id>https://openzfsonosx.org/wiki/Windows_BSOD</id>
		<title>Windows BSOD</title>
		<link rel="alternate" type="text/html" href="https://openzfsonosx.org/wiki/Windows_BSOD"/>
				<updated>2023-10-13T12:30:11Z</updated>
		
		<summary type="html">&lt;p&gt;Ichundes: Set symbol path using symfix/sympath&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Windows Crash Dumps ==&lt;br /&gt;
&lt;br /&gt;
If you do managed to get a Blue Screen Of Death (BSOD), Windows should in theory write a crash dump file to:&lt;br /&gt;
&lt;br /&gt;
 C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
The dump file can be analyzed with [http://windbg.org WinDbg.exe]&lt;br /&gt;
&lt;br /&gt;
Debug builds of ZFSin include debugging symbols to assist in dump analysis which are located at:&lt;br /&gt;
&lt;br /&gt;
 C:\Program Files\OpenZFS On Windows\symbols\&lt;br /&gt;
&lt;br /&gt;
=== WinDbg.exe at the Command Line ===&lt;br /&gt;
&lt;br /&gt;
Once installed, WinDbg.exe can be run from a CMD.com or PowerShell terminal with Administrative privileges:&lt;br /&gt;
&lt;br /&gt;
 WinDbgX.exe -y ‘C:\Program Files\OpenZFS On Windows\symbols\’ -z C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
This will launch the application and you can perform dump analysis with:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; !analyze -v&lt;br /&gt;
&lt;br /&gt;
To run the analysis in a single command:&lt;br /&gt;
&lt;br /&gt;
 WinDbgX.exe -y ‘C:\Program Files\OpenZFS On Windows\symbols\’ -z C:\Windows\MEMORY.DMP -c !analyze -v&lt;br /&gt;
&lt;br /&gt;
=== WinDbg.exe in the GUI ===&lt;br /&gt;
&lt;br /&gt;
Launch WinDbg.exe and set the symbol path:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; .symfix c:\cache&lt;br /&gt;
 kd&amp;gt; .sympath+ C:\Program Files\OpenZFS On Windows\symbols&lt;br /&gt;
 kd&amp;gt; .reload&lt;br /&gt;
&lt;br /&gt;
So that it can load both the symbols from Microsoft, and from the installed Open ZFS directory. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Open the crash dump file with:&lt;br /&gt;
&lt;br /&gt;
 File: Open crash dump&lt;br /&gt;
 C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
Perform the analysis:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; !analyze -v&lt;br /&gt;
&lt;br /&gt;
Should at least show the stack. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed-hover&amp;quot;&amp;gt;&lt;br /&gt;
Image:minidump1.png|''Set symbol path''&lt;br /&gt;
Image:minidump2.png|''Add path''&lt;br /&gt;
Image:minidump3.png|''Load crash dump''&lt;br /&gt;
Image:minidump4.png|''Locate minidump''&lt;br /&gt;
Image:minidump5.png|''minidump loading''&lt;br /&gt;
Image:minidump6.png|''analyze with stack''&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Example Crash report ===&lt;br /&gt;
&lt;br /&gt;
A successful crash dump would look something like:&lt;br /&gt;
&lt;br /&gt;
  	ZFSin!zfs_range_lock_reader+0x290 [c:\src\zfsin\zfsin\zfs\module\zfs\zfs_rlock.c @ 417]	C/C++/ASM&lt;br /&gt;
 	ZFSin!zfs_range_lock+0x16d [c:\src\zfsin\zfsin\zfs\module\zfs\zfs_rlock.c @ 453]	C/C++/ASM&lt;br /&gt;
 	ZFSin!zil_lwb_commit+0x99f [c:\src\zfsin\zfsin\zfs\module\zfs\zil.c @ 1570]	C/C++/ASM&lt;br /&gt;
 	ZFSin!zil_process_commit_list+0x30e [c:\src\zfsin\zfsin\zfs\module\zfs\zil.c @ 2182]	C/C++/ASM&lt;br /&gt;
 	ZFSin!zil_commit_writer+0x111 [c:\src\zfsin\zfsin\zfs\module\zfs\zil.c @ 2318]	C/C++/ASM&lt;br /&gt;
&lt;br /&gt;
If you get only ZFSin+0x&amp;quot;hex-number&amp;quot; it means it is not reading the debug symbols correctly, to be able to convert the hex-number into a function name.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Debug Print Buffer ===&lt;br /&gt;
&lt;br /&gt;
Windows features a circular debug print buffer which can also be written to disk:&lt;br /&gt;
&lt;br /&gt;
Old&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; r $t0 = poi(ZFSin!cbuf)&lt;br /&gt;
 kd&amp;gt; .writemem C:\Users\&amp;lt;your Windows username&amp;gt;\Desktop\cbuf.txt $t0 L100000&lt;br /&gt;
&lt;br /&gt;
New&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; r $t0 = poi(OpenZFS!cbuf)&lt;br /&gt;
 kd&amp;gt; .writemem C:\Users\&amp;lt;your Windows username&amp;gt;\Desktop\cbuf.txt $t0 L100000&lt;br /&gt;
&lt;br /&gt;
Do not worry if you get a message about short write, it just means you have not yet filled the buffer.&lt;br /&gt;
&lt;br /&gt;
This will include -EB- at the end of the buffer.&lt;br /&gt;
Do not worry if the rest of the buffer has &amp;quot;@&amp;quot; (nul) symbols, it just means the buffer was not yet full.&lt;br /&gt;
&lt;br /&gt;
Please provide the contents of the dump analysis and cbuf.txt in you ZFSin in your crash-related tickets.&lt;/div&gt;</summary>
		<author><name>Ichundes</name></author>	</entry>

	<entry>
		<id>https://openzfsonosx.org/wiki/Windows_BSOD</id>
		<title>Windows BSOD</title>
		<link rel="alternate" type="text/html" href="https://openzfsonosx.org/wiki/Windows_BSOD"/>
				<updated>2023-10-13T12:26:54Z</updated>
		
		<summary type="html">&lt;p&gt;Ichundes: easier way to write cbuf without having to copy and paste the address&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Windows Crash Dumps ==&lt;br /&gt;
&lt;br /&gt;
If you do managed to get a Blue Screen Of Death (BSOD), Windows should in theory write a crash dump file to:&lt;br /&gt;
&lt;br /&gt;
 C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
The dump file can be analyzed with [http://windbg.org WinDbg.exe]&lt;br /&gt;
&lt;br /&gt;
Debug builds of ZFSin include debugging symbols to assist in dump analysis which are located at:&lt;br /&gt;
&lt;br /&gt;
 C:\Program Files\OpenZFS On Windows\symbols\&lt;br /&gt;
&lt;br /&gt;
=== WinDbg.exe at the Command Line ===&lt;br /&gt;
&lt;br /&gt;
Once installed, WinDbg.exe can be run from a CMD.com or PowerShell terminal with Administrative privileges:&lt;br /&gt;
&lt;br /&gt;
 WinDbgX.exe -y ‘C:\Program Files\OpenZFS On Windows\symbols\’ -z C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
This will launch the application and you can perform dump analysis with:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; !analyze -v&lt;br /&gt;
&lt;br /&gt;
To run the analysis in a single command:&lt;br /&gt;
&lt;br /&gt;
 WinDbgX.exe -y ‘C:\Program Files\OpenZFS On Windows\symbols\’ -z C:\Windows\MEMORY.DMP -c !analyze -v&lt;br /&gt;
&lt;br /&gt;
=== WinDbg.exe in the GUI ===&lt;br /&gt;
&lt;br /&gt;
Launch WinDbg.exe and set the Symbol path in:&lt;br /&gt;
 &amp;lt;nowiki&amp;gt;&lt;br /&gt;
 File &amp;gt; Symbol File Path:&lt;br /&gt;
 srv*c:\cache*https://msdl.microsoft.com/download/symbols;C:\Program Files\OpenZFS On Windows\symbols&lt;br /&gt;
 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
So that it can load both the symbols from Microsoft, and from the installed Open ZFS directory. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Open the crash dump file with:&lt;br /&gt;
&lt;br /&gt;
 File: Open crash dump&lt;br /&gt;
 C:\Windows\MEMORY.DMP&lt;br /&gt;
&lt;br /&gt;
Perform the analysis:&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; !analyze -v&lt;br /&gt;
&lt;br /&gt;
Should at least show the stack. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed-hover&amp;quot;&amp;gt;&lt;br /&gt;
Image:minidump1.png|''Set symbol path''&lt;br /&gt;
Image:minidump2.png|''Add path''&lt;br /&gt;
Image:minidump3.png|''Load crash dump''&lt;br /&gt;
Image:minidump4.png|''Locate minidump''&lt;br /&gt;
Image:minidump5.png|''minidump loading''&lt;br /&gt;
Image:minidump6.png|''analyze with stack''&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Example Crash report ===&lt;br /&gt;
&lt;br /&gt;
A successful crash dump would look something like:&lt;br /&gt;
&lt;br /&gt;
  	ZFSin!zfs_range_lock_reader+0x290 [c:\src\zfsin\zfsin\zfs\module\zfs\zfs_rlock.c @ 417]	C/C++/ASM&lt;br /&gt;
 	ZFSin!zfs_range_lock+0x16d [c:\src\zfsin\zfsin\zfs\module\zfs\zfs_rlock.c @ 453]	C/C++/ASM&lt;br /&gt;
 	ZFSin!zil_lwb_commit+0x99f [c:\src\zfsin\zfsin\zfs\module\zfs\zil.c @ 1570]	C/C++/ASM&lt;br /&gt;
 	ZFSin!zil_process_commit_list+0x30e [c:\src\zfsin\zfsin\zfs\module\zfs\zil.c @ 2182]	C/C++/ASM&lt;br /&gt;
 	ZFSin!zil_commit_writer+0x111 [c:\src\zfsin\zfsin\zfs\module\zfs\zil.c @ 2318]	C/C++/ASM&lt;br /&gt;
&lt;br /&gt;
If you get only ZFSin+0x&amp;quot;hex-number&amp;quot; it means it is not reading the debug symbols correctly, to be able to convert the hex-number into a function name.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Debug Print Buffer ===&lt;br /&gt;
&lt;br /&gt;
Windows features a circular debug print buffer which can also be written to disk:&lt;br /&gt;
&lt;br /&gt;
Old&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; r $t0 = poi(ZFSin!cbuf)&lt;br /&gt;
 kd&amp;gt; .writemem C:\Users\&amp;lt;your Windows username&amp;gt;\Desktop\cbuf.txt $t0 L100000&lt;br /&gt;
&lt;br /&gt;
New&lt;br /&gt;
&lt;br /&gt;
 kd&amp;gt; r $t0 = poi(OpenZFS!cbuf)&lt;br /&gt;
 kd&amp;gt; .writemem C:\Users\&amp;lt;your Windows username&amp;gt;\Desktop\cbuf.txt $t0 L100000&lt;br /&gt;
&lt;br /&gt;
Do not worry if you get a message about short write, it just means you have not yet filled the buffer.&lt;br /&gt;
&lt;br /&gt;
This will include -EB- at the end of the buffer.&lt;br /&gt;
Do not worry if the rest of the buffer has &amp;quot;@&amp;quot; (nul) symbols, it just means the buffer was not yet full.&lt;br /&gt;
&lt;br /&gt;
Please provide the contents of the dump analysis and cbuf.txt in you ZFSin in your crash-related tickets.&lt;/div&gt;</summary>
		<author><name>Ichundes</name></author>	</entry>

	</feed>