Difference between revisions of "Windows BSOD"

From OpenZFS on OS X
Jump to: navigation, search
m
(Expanded Windows Crash Dump text at the request of Lundman)
Line 1: Line 1:
  
== Windows minidumps ==
+
== Windows Crash Dumps ==
  
If you do managed to get a Blue Screen Of Death, Windows should in theory write a dump file:
+
If you do managed to get a Blue Screen Of Death (BSOD), Windows should in theory write a crash dump file to:
  
 
  C:\Windows\MEMORY.DMP
 
  C:\Windows\MEMORY.DMP
  
Which you can load into '''windbg.exe''' ...
+
The dump file can be analyzed with [http://windbg.org WinDbg.exe]
  
enhance guide with windbg, loading dmp, loading symbols, "!analyze -v" and writing out cbuf.
+
Debug builds of ZFSin include debugging symbols to assist in dump analysis which are located at:
 +
 
 +
C:\Program Files (x86)\OpenZFS On Windows\symbols\’
 +
 
 +
Once installed, WinDbg.exe can be run from a CMD.com or PowerShell terminal with Administrative privileges:
 +
 
 +
WinDbgX.exe -y ‘C:\Program Files (x86)\OpenZFS On Windows\symbols\’ -z C:\Windows\MEMORY.DMP
 +
 
 +
This will launch the application and you can perform dump analysis with:
 +
 
 +
kd> !analyze -v
 +
 
 +
Windows features a circular debug print buffer which can also be written to disk:
 +
 
 +
2: kd> dt ZFSin!cbuf
 +
0xffffe089`f0010000  "FFFFC1072DE87580: SPL: start.FFFFC1072DE87580: SPL: total ncpu 4
 +
 
 +
Note the first string, i.e. "0xffffe089`f0010000". Enter write this out with the following:
 +
 
 +
kd> .writemem C:\Users\<your Windows username>\Desktop\cbuf.txt 0xffffe089`f0010000 L100000
 +
 
 +
This will include -EB- at the end of the buffer, followed by "@" symbols until the buffer wraps around.
 +
 
 +
Please provide the contents of the dump analysis and cbuf.txt in you ZFSin in your crash-related tickets.

Revision as of 04:26, 14 March 2019

Windows Crash Dumps

If you do managed to get a Blue Screen Of Death (BSOD), Windows should in theory write a crash dump file to:

C:\Windows\MEMORY.DMP

The dump file can be analyzed with WinDbg.exe

Debug builds of ZFSin include debugging symbols to assist in dump analysis which are located at:

C:\Program Files (x86)\OpenZFS On Windows\symbols\’

Once installed, WinDbg.exe can be run from a CMD.com or PowerShell terminal with Administrative privileges:

WinDbgX.exe -y ‘C:\Program Files (x86)\OpenZFS On Windows\symbols\’ -z C:\Windows\MEMORY.DMP

This will launch the application and you can perform dump analysis with:

kd> !analyze -v

Windows features a circular debug print buffer which can also be written to disk:

2: kd> dt ZFSin!cbuf
0xffffe089`f0010000  "FFFFC1072DE87580: SPL: start.FFFFC1072DE87580: SPL: total ncpu 4

Note the first string, i.e. "0xffffe089`f0010000". Enter write this out with the following:

kd> .writemem C:\Users\<your Windows username>\Desktop\cbuf.txt 0xffffe089`f0010000 L100000

This will include -EB- at the end of the buffer, followed by "@" symbols until the buffer wraps around.

Please provide the contents of the dump analysis and cbuf.txt in you ZFSin in your crash-related tickets.