Solved

Using dumpbin output to profile symbol size?

Posted on 2003-10-24
3
915 Views
Last Modified: 2013-12-03
Through looking at dumpbin results from the object files and the mapfile for an executable, I'm hoping to map out the memory usage in a project where our exe size has balooned.

I've got a perl script that grabs the info out of dumpbin focusing on the "size of raw data" figure, but it looks like I might be missing a lot of data.  There are lots of symbols that have "number of relocations" greater than zero along with a "file pointer to raw data" and "file pointer to relocation".  Should I be digging more into any of these values or elsewhere in the dumpbin output to get a complete accounting to the size of symbols linked into my exe?   Thanks

matt
0
Comment
Question by:wormzer
3 Comments
 
LVL 86

Accepted Solution

by:
jkr earned 500 total points
ID: 9616847
Check out http://www.microsoft.com/msj/archive/s572.aspx ("Remove Fatty Deposits from Your Applications Using Our 32-Bit Liposuction Tools") - they have proven to be pretty effective in spotting superfluous apce, especially adressing relocations also and might tell a little more than 'dumpbin' and mapfiles.
0
 
LVL 1

Author Comment

by:wormzer
ID: 9616987
That showed me very little in my case unfortunately.  Great article.... Funny how they mention how people are throwing around terms like "200 Mhz" more and more these days (1996 :)

I did discover one thing with incremental linking that I didn't know about which may help some.  I really want to analize individual template instantiations and see where bloat may be occuring (that would be a tool that would give me enough info to say there are 30 different instantiations of Array< > template with a total code size of X bytes.  I was able to get better information out of VC6 for some reason through map/dumpbin and it's just not coming out as well for .NET.

Any other suggestions? And thanks for that.

matt
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With most software applications trying to cater to multiple user needs nowadays, the focus is to make them as configurable as possible. For e.g., when creating Silverlight applications which will connect to WCF services, the service end point usuall…
For most people, the WrapPanel seems like a magic when they switch from WinForms to WPF. Most of us will think that the code that is used to write a control like that would be difficult. However, most of the work is done by the WPF engine, and the W…
This is Part 3 in a 3-part series on Experts Exchange to discuss error handling in VBA code written for Excel. Part 1 of this series discussed basic error handling code using VBA. http://www.experts-exchange.com/videos/1478/Excel-Error-Handlin…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now