Delen via


Kernel Trace Control API Reference

This section covers the Kernel Trace Control API available in previous versions of WPA. This API is an extension of the ETA Event Tracing API and is supported for backward compatibility with existing scripts and profiles. However, it is obsolete, and new profiles should be created using the current version. No public API is available for the current version of WPA.

This API enables capturing kernel stack traces, merging multiple trace files for analysis, and including system information in the merged files.

The Kernel Trace Control API became available in Windows Vista®.

Stackwalking on x64 systems requires that you set the DisablePagingExecutive registry value in HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management. For more information, see DisablePagingExecutive.

The following example shows how to query for this registry value.

@REG QUERY "HKLM\System\CurrentControlSet\Control\Session Manager\Memory Management" -v DisablePagingExecutive

The following example shows how to enable stackwalking.

@REG ADD "HKLM\System\CurrentControlSet\Control\Session Manager\Memory Management" -v DisablePagingExecutive -d 0x1 -t REG_DWORD -f
@IF NOT %ERRORLEVEL% == 0 echo error: Could not configure system for 64-bit stackwalking. Please run this script from an elevated administrator console.

Note

To make these changes effective, you must restart the system.

The following example shows how to disable stackwalking.

@REG ADD "HKLM\System\CurrentControlSet\Control\Session Manager\Memory Management" -v DisablePagingExecutive -d 0x0 -t REG_DWORD -f
@IF NOT %ERRORLEVEL% == 0 echo error: Could not remove 64-bit stackwalking configuration. Please run this script from an elevated administrator console.

Note

To make these changes effective, you must restart the system.

In This Section

See Also

Concepts

Windows Performance Toolkit Technical Reference