!rtanalyze
Analyzes the information found in the provided dump file and displays information about the state of the RTX64 subsystem and running processes at the time the memory dump file is generated.
Syntax
!rtanalyze
Remarks
For a glossary of common terms found in command output, see RTX64 WinDbg Extension Commands Glossary.
This should be the first command called after you load a memory dump file for postmortem analysis.
This command is supported for:
Output is similar to what is seen on a Green Screen. It is organized as follows:
Technical Information Section
The Technical Information section provides:
- Bugcheck code, a hex number that identifies the source of the error
- Exception address
- Current RTSS process name and PID (Process ID) on the processor that generates the exception.
- Current RTSS thread TID (Thread ID) and object address on the processor that generates the exception.
Current Thread Context Section
The Current Thread Context Section includes information about the context of the current thread on the processor that generates the exception.
Current Thread Stack Section
The Current Thread Stack section includes information about the last active RTSS thread on the processor that generates the exception.
Example
!rtanalyze
RTX64 Bugcheck Analysis:
Exception Code : 0x0000000e (Memory Access Fault) Exception Address : 0xfffffa8008a07026 Current RTSS Process: "C:\Program Files\IntervalZero\RTX64 SDK\1.1\Samples\Rtdll\Bin\RTSSDebug\explicitloadrtdll.rtss" 0x000003eb Current RTSS Thread : 15 (0xfffffa8008bed000)
Current Thread Context:
rax: 0x0000000000000000 rbx: 0xfffffa80089fcb00 rcx: 0x0000000000000004 rdx: 0x0000000000000000 rsi: 0x0000000000000000 rdi: 0x0000000000000000 rip: 0xfffffa8008a07026 rsp: 0xfffffa8008becef0 rbp: 0xfffff8800809c000 r8 : 0xfffff880068343d0 r9 : 0x0000000000000000 r10: 0xfffffffffffe0000 r11: 0x0000000000000010 r12: 0x0000000000000000 r13: 0x0000000000000000 r14: 0x0000000000000000 r15: 0x0000000000000000 EFlags: 0x00010286 cs: 0x0010 ss: 0x0018 ds: 0x002b es: 0x002b fs: 0x0053 gs: 0x002b
Current Thread Stack:
Child-SP RetAddr Frame IP 0xfffffa8008becef0 0xfffffa8008a07065 0xfffffa8008a07026 (SampleRtdll!SummaryFunc+0x26) 0xfffffa8008becf10 0xfffffa8008a85013 0xfffffa8008a07065 (SampleRtdll!Toggle+0x25) 0xfffffa8008becf50 0xfffff880080bb52b 0xfffffa8008a85013 (explicitloadrtdll!TimerHandler+0x13) 0xfffffa8008becf80 0xfffff880080afd47 0xfffff880080bb52b (Rtx_Rtss!RtssTimerHandler+0x1f)
RTX64 Active Process List: Process Object PID Process Name
0xfffffa80089df000 0x000003e9 srtm.rtss 0xfffffa8005cc0000 0x00000000 Real-time Proxy Process (Windows PID: 0x000008f4) 0xfffffa800890e000 0x000003eb explicitloadrtdll.rtss