!rtanalyze
Analyzes the information found in the provided dump file and displays information about the state of the wRTOS Subsystem and running processes at the time the memory dump file is generated.
Syntax
!rtanalyze
Remarks
For a glossary of common terms found in command output, see wRTOS WinDbg Extension Commands Glossary.
This should be the first command called after you load a memory dump file for postmortem analysis.
This command is supported for:
Output is like what is seen on a Blue Screen. It is organized as follows:
Technical Information Section
The Technical Information section provides:
- Bugcheck code, a hex number that identifies the source of the error.
- Exception address.
- Current RTSS process name and PID (Process ID) on the processor that generates the exception.
- Current RTSS thread TID (Thread ID) and object address on the processor that generates the exception.
Current Thread Context Section
The Current Thread Context Section includes information about the context of the current thread on the processor that generates the exception.
Current Thread Stack Section
The Current Thread Stack section includes information about the last active RTSS thread on the processor that generates the exception.
Example
!rtanalyze
wRTOS Bugcheck Analysis:
Exception Code : 0x0000000e (Memory Access Fault)
Exception Address : 0xfffffa8008a07026
Current RTSS Process: "C:\Program Files\IntervalZero\wRTOS SDK\1.1\Samples\Rtdll\Bin\RTSSDebug\explicitloadrtdll.rtss" 0x000003eb
Current RTSS Thread : 15 (0xfffffa8008bed000)
Current Thread Context:
rax: 0x0000000000000000 rbx: 0xfffffa80089fcb00
rcx: 0x0000000000000004 rdx: 0x0000000000000000
rsi: 0x0000000000000000 rdi: 0x0000000000000000
rip: 0xfffffa8008a07026 rsp: 0xfffffa8008becef0
rbp: 0xfffff8800809c000
r8 : 0xfffff880068343d0 r9 : 0x0000000000000000
r10: 0xfffffffffffe0000 r11: 0x0000000000000010
r12: 0x0000000000000000 r13: 0x0000000000000000
r14: 0x0000000000000000 r15: 0x0000000000000000
EFlags: 0x00010286 cs: 0x0010
ss: 0x0018 ds: 0x002b
es: 0x002b fs: 0x0053
gs: 0x002b
Current Thread Stack:
Child-SP RetAddr Frame IP
0xfffffa8008becef0 0xfffffa8008a07065 0xfffffa8008a07026 (SampleRtdll!SummaryFunc+0x26)
0xfffffa8008becf10 0xfffffa8008a85013 0xfffffa8008a07065 (SampleRtdll!Toggle+0x25)
0xfffffa8008becf50 0xfffff880080bb52b 0xfffffa8008a85013 (explicitloadrtdll!TimerHandler+0x13)
0xfffffa8008becf80 0xfffff880080afd47 0xfffff880080bb52b (wRTOS_Rtss!RtssTimerHandler+0x1f)
wRTOS Active Process List:
Process Object PID Process Name
0xfffffa80089df000 0x000003e9 srtm.rtss
0xfffffa8005cc0000 0x00000000 Real-time Proxy Process (Windows PID: 0x000008f4)
0xfffffa800890e000 0x000003eb explicitloadrtdll.rtss
Requirements
| Minimum supported version |
|---|
|
wRTOS 1.0 SDK |