!rtprocess

Displays information about a specified RTSS process or all RTSS processes, including RTX64 Subsystem process and RTSS proxy processes.

Syntax

!rtprocess [<process> <level>] [-p] [-s]

Parameters

process [optional]

An optional parameter which can be an RTSS process address or process ID.

If this parameter is not specified, !rtprocess lists all RTSS processes and their process addresses, excluding proxy unless -p is specified or Subsystem process (unless -s is specified)..

level [optional]

An optional parameter to specify the level of detail to return for the process parameter.

NOTE: Each parameter is a bit, and multiple parameters can be ORed together.

Parameter

Information Displayed

0 (default)

Summary information including name, ID, and address

1

List basic thread information for the process.

2

Allocated memory pertaining to the process (Windows memory only).

4

Object information pertaining to the process.

8

Process specific mapped memory information (physical to virtual address mapping).

10

Process specific contiguous memory information.

20

Extended process information, including: stack list, entry point for the process, handle array, initial thread information, pointer to a process heap, Shutdown handler, process being debugged, etc.

40 Module list referenced (explicitly or implicitly) by the process, i.e. the list of modules that are linked with the process executable or loaded by LoadLibrary(). The list is kept in load order. The first three modules are always HAL extension, Subsytem, and the process itself.

-p flag [optional]

Optional flag to list proxy processes.

-s flag [optional]

Optional flag to list System process.

Remarks

For information on supported Process Flags, see About Thread Flags and Process Flags.

For a glossary of common terms found in command output, see RTX64 WinDbg Extension Commands Glossary.

This command is supported for:

Examples

Example of !rtprocess with -p and -s flags to display proxy process and system process

!rtprocess /p /s

Process Object        PID           Process Name 

0xffffb00481437000    0x00000000    Real-time Proxy Process (Windows PID: 0x00003228)
0xffffb00475040010    0x000003ef    App1.rtss
0xfffff800f9611f40    0x00000000    System Process

Example of !rtprocess with process address and level 2 detail

!rtprocess 0xffffb00475040010 2

Process 0xffffb00475040010 Summary Information:

Name:  App1.rtss
Command line:  #

Object:                0xffffb00475040010    PID:                0x000003ef
Reference descriptor:  0xffffb004751043b0    Reference count:    0x00000001
Shutdown object:       0x0000000000000000    Flags:              0x00000400
Heap:                  0x0000000000000000    Debugger attached:  False
Affinity mask:         0x00000000000003e0    Affined processor:  0x00000005

RTSS Process 0xffffb00475040010 Windows Memory (non-deterministic) Information: None Available.

Example of !rtprocess with a process address and detail level 20

!rtprocess 0xfffffa80089df000 20
 		
Process 0xfffffa80089df000 Extended Information:
 		
Name:  "C:\Program Files\IntervalZero\RTX64 SDK\1.1\Samples\Srtm\VS2010\x64\RTSSDebug\srtm.rtss"
Command line:   /h 3600
 		
Object:                0xfffffa80089df000    PID:                0x000003e9
Reference descriptor:  0xfffffa80089dc180    Reference count:    0x00000001
Shutdown object:       0x0000000000000000    Flags:              0x00000400
Heap:                  0x0000000000000000    Debugger attached:  False
Affinity mask:         0x000000000000003c    Affined processor:  0x00000004
Entry point:           0x0000000000000000    ExitCode:                   259
Thread list:           0xfffffa80089df928    Primary thread address:     0xfffffa80089dd000
Primary thread stack:  0xfffffa8008956000    Primary thread stack size:  0x00008000	
Windows memory list:   0x0000000000000000
Stack memory list:     0x0000000000000000    Contiguous memory list:     0x0000000000000000
Mapped memory list:    0x0000000000000000    Module list:                0xfffffa80089dc040
RTDLL list:            0xfffffa80089dc080    Handle list:                0xfffffa80089df910

Related topics: