!rtanalyze

Analyzes the information found in the provided dump file and displays information about the state of the RTX64 subsystem and running processes at the time the memory dump file is generated.

Syntax

!rtanalyze

Remarks

For a glossary of common terms found in command output, see RTX64 WinDbg Extension Commands Glossary.

This should be the first command called after you load a memory dump file for postmortem analysis.

This command is supported for:

Output is similar to what is seen on a Green Screen. It is organized as follows:

Technical Information Section

The Technical Information section provides:

Current Thread Context Section

The Current Thread Context Section includes information about the context of the current thread on the processor that generates the exception.

Current Thread Stack Section

The Current Thread Stack section includes information about the last active RTSS thread on the processor that generates the exception.

Example

!rtanalyze
		
RTX64 Bugcheck Analysis:
      Exception Code      : 0x0000000e (Memory Access Fault)
      Exception Address   : 0xfffffa8008a07026
      Current RTSS Process: "C:\Program Files\IntervalZero\RTX64 SDK\1.1\Samples\Rtdll\Bin\RTSSDebug\explicitloadrtdll.rtss" 0x000003eb
      Current RTSS Thread : 15 (0xfffffa8008bed000)
		
Current Thread Context:
		             rax: 0x0000000000000000   rbx: 0xfffffa80089fcb00
		             rcx: 0x0000000000000004   rdx: 0x0000000000000000
		             rsi: 0x0000000000000000   rdi: 0x0000000000000000
		             rip: 0xfffffa8008a07026   rsp: 0xfffffa8008becef0
		             rbp: 0xfffff8800809c000
		             r8 : 0xfffff880068343d0   r9 : 0x0000000000000000
		             r10: 0xfffffffffffe0000   r11: 0x0000000000000010
		             r12: 0x0000000000000000   r13: 0x0000000000000000
		             r14: 0x0000000000000000   r15: 0x0000000000000000
		             EFlags: 0x00010286        cs:  0x0010
		             ss:  0x0018               ds:  0x002b
		             es:  0x002b               fs:  0x0053
		             gs:  0x002b
Current Thread Stack:
	Child-SP             RetAddr              Frame IP
	0xfffffa8008becef0   0xfffffa8008a07065   0xfffffa8008a07026   (SampleRtdll!SummaryFunc+0x26)
	0xfffffa8008becf10   0xfffffa8008a85013   0xfffffa8008a07065   (SampleRtdll!Toggle+0x25)
	0xfffffa8008becf50   0xfffff880080bb52b   0xfffffa8008a85013   (explicitloadrtdll!TimerHandler+0x13)
	0xfffffa8008becf80   0xfffff880080afd47   0xfffff880080bb52b   (Rtx_Rtss!RtssTimerHandler+0x1f)
RTX64 Active Process List:  
		
Process Object        PID           Process Name
0xfffffa80089df000    0x000003e9    srtm.rtss
0xfffffa8005cc0000    0x00000000    Real-time Proxy Process (Windows PID: 0x000008f4)
0xfffffa800890e000    0x000003eb    explicitloadrtdll.rtss

Related topics: