[argyllcms] Re: Latest development sources, slow execution?

  • From: "Auke Nauta" <auke@xxxxxxxxxxxxx>
  • To: argyllcms@xxxxxxxxxxxxx
  • Date: Tue, 29 Jan 2013 17:07:50 +0100

Dear Graeme,

I ran a previous version of colprof as well as the latest through depends.exe.
I include the log files, although they are not conclusive to me...

Greetings,
Auke

> Auke Nauta wrote:
>> A simple "colprof -v -qh target" is incredibly slow with the new built (on 
>> my machine that is).
>>
>> I timed it, is is ~50x slower.
>> There must be something wrong here.
>
> Debugging is on in the snapshot code. Try turning it off in
> the top level Jamfile. ie. change:
>
> #PREF_CCFLAGS   = $(CCOPTFLAG) ;        # Turn optimisation on
> PREF_CCFLAGS        = $(CCDEBUGFLAG) ;      # Debugging flags
>
> to
>
> PREF_CCFLAGS   = $(CCOPTFLAG) ;        # Turn optimisation on
> #PREF_CCFLAGS        = $(CCDEBUGFLAG) ;      # Debugging flags
>
> do a "jam clean" then "jam", and see how much difference that makes.
>
> Graeme Gill.
>
>
--------------------------------------------------------------------------------
Starting profile on 1/29/2013 at 16:53:07

Operating System: Microsoft Windows NT/2000/XP/2003/Vista based Home Premium 
(64-bit), version 6.01.7601 Service Pack 1
Program Executable: d:\sources\cbuilder2007\3dlut\debug\COLPROF_OK.EXE
Program Arguments: -v -qh DP2_Output2
Starting Directory: D:\Sources\CBuilder2007\3DLUT\Debug\
Search Path: C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\WINDOWS 
LIVE;C:\PROGRAM FILES (X86)\COMMON FILES\MICROSOFT SHARED\WINDOWS 
LIVE;C:\PROGRAM FILES (X86)\CODEGEAR\RAD 
STUDIO\5.0\BIN;C:\USERS\PUBLIC\DOCUMENTS\RAD 
STUDIO\5.0\BPL;C:\WINDOWS\SYSTEM32;C:\WINDOWS;C:\WINDOWS\SYSTEM32\WBEM;C:\WINDOWS\SYSTEM32\WINDOWSPOWERSHELL\V1.0\;C:\PROGRAM
 FILES (X86)\COMMON FILES\LENOVO;C:\SWTOOLS\READYAPPS;C:\PROGRAM FILES 
(X86)\INTEL\SERVICES\IPT\;C:\PROGRAM FILES (X86)\COMMON 
FILES\ACRONIS\SNAPAPI\;C:\PROGRAM FILES\MYSQL\MYSQL SERVER 5.5\BIN;C:\PROGRAM 
FILES (X86)\MICROSOFT SQL SERVER\100\TOOLS\BINN\;C:\PROGRAM FILES\MICROSOFT SQL 
SERVER\100\TOOLS\BINN\;C:\PROGRAM FILES\MICROSOFT SQL 
SERVER\100\DTS\BINN\;C:\PROGRAM FILES (X86)\VISUAL LEAK 
DETECTOR\BIN\WIN32;C:\PROGRAM FILES (X86)\VISUAL LEAK 
DETECTOR\BIN\WIN64;C:\PROGRAM FILES (X86)\WINDOWS LIVE\SHARED;C:\PROGRAM 
FILES\TORTOISESVN\BIN;C:\PROGRAM FILES (X86)\ACRONIS\TRUEIMAGEHOME\;C:\Program 
Files\ThinkPad\Bluetooth Software\;C:\Program Files\ThinkPad\Bluetooth 
Software\syswow64;C:\Program Files (x86)\Lenovo\Access Connections\;C:\Program 
Files (x86)\Intel\OpenCL SDK\2.0\bin\x86;C:\Program Files (x86)\Intel\OpenCL 
SDK\2.0\bin\x64;C:\Program 
Files\TortoiseGit\bin;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program 
Files (x86)\Bitvise SSH Client;C:\Program Files\Intel\WiFi\bin\;C:\Program 
Files\Common Files\Intel\WirelessCommon\;C:\Users\Public\Documents\RAD 
Studio\5.0\BPL;C:\Program Files (x86)\IDM Computer 
Solutions\UltraCompare\;D:\Argyll;D:\Sources;C:\Program Files (x86)\CMake 
2.8\bin;C:\Program Files (x86)\IDM Computer 
Solutions\UEStudio;C:\Users\Auke\AppData\Local\nasm;C:\Program Files (x86)\IDM 
Computer Solutions\UEStudio;D:\Argyll\ajam-2.5.2-1.3.3\bin.ntx86;C:\Program 
Files (x86)\IDM Computer Solutions\UEStudio\;C:\Program 
Files\Intel\WiFi\bin\;C:\Program Files\Common Files\Intel\WirelessCommon\

Options Selected:
     Simulate ShellExecute by inserting any App Paths directories into the PATH 
environment variable.
     Log DllMain calls for process attach and process detach messages.
     Hook the process to gather more detailed dependency information.
     Log LoadLibrary function calls.
     Log GetProcAddress function calls.
     Log debug output messages.
     Automatically open and profile child processes.
--------------------------------------------------------------------------------

Started "COLPROF_OK.EXE" (process 0x17E0) at address 0x01230000.  Successfully 
hooked module.
Loaded "NTDLL.DLL" at address 0x76F00000.  Successfully hooked module.
Loaded "KERNEL32.DLL" at address 0x74940000.  Successfully hooked module.
Loaded "KERNELBASE.DLL" at address 0x75B10000.  Successfully hooked module.
DllMain(0x75B10000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNELBASE.DLL" called.
DllMain(0x75B10000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNELBASE.DLL" 
returned 1 (0x1).
DllMain(0x74940000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" called.
DllMain(0x74940000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 
1 (0x1).
Injected "DEPENDS.DLL" at address 0x08370000.
DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" called.
DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" returned 1 
(0x1).
Loaded "MSVCR100.DLL" at address 0x73780000.  Successfully hooked module.
Entrypoint reached. All implicit modules have been loaded.
DllMain(0x73780000, DLL_PROCESS_ATTACH, 0x0036FC78) in "MSVCR100.DLL" called.
GetProcAddress(0x74940000 [KERNEL32.DLL], "FlsAlloc") called from 
"MSVCR100.DLL" at address 0x7379BA3B and returned 0x74954F13.
GetProcAddress(0x74940000 [KERNEL32.DLL], "FlsGetValue") called from 
"MSVCR100.DLL" at address 0x7379BA48 and returned 0x74951252.
GetProcAddress(0x74940000 [KERNEL32.DLL], "FlsSetValue") called from 
"MSVCR100.DLL" at address 0x7379BA55 and returned 0x749541F0.
GetProcAddress(0x74940000 [KERNEL32.DLL], "FlsFree") called from "MSVCR100.DLL" 
at address 0x7379BA62 and returned 0x7495357F.
DllMain(0x73780000, DLL_PROCESS_ATTACH, 0x0036FC78) in "MSVCR100.DLL" returned 
1 (0x1).
LoadLibraryA("KERNEL32") called from "COLPROF_OK.EXE" at address 0x01298C38.
LoadLibraryA("KERNEL32") returned 0x74940000.
GetProcAddress(0x74940000 [KERNEL32.DLL], "GlobalMemoryStatusEx") called from 
"COLPROF_OK.EXE" at address 0x01298C3F and returned 0x7497D4B4.
LoadLibraryA("KERNEL32") called from "COLPROF_OK.EXE" at address 0x01298C38.
LoadLibraryA("KERNEL32") returned 0x74940000.
GetProcAddress(0x74940000 [KERNEL32.DLL], "GlobalMemoryStatusEx") called from 
"COLPROF_OK.EXE" at address 0x01298C3F and returned 0x7497D4B4.
LoadLibraryA("KERNEL32") called from "COLPROF_OK.EXE" at address 0x01298C38.
LoadLibraryA("KERNEL32") returned 0x74940000.
GetProcAddress(0x74940000 [KERNEL32.DLL], "GlobalMemoryStatusEx") called from 
"COLPROF_OK.EXE" at address 0x01298C3F and returned 0x7497D4B4.
DllMain(0x73780000, DLL_PROCESS_DETACH, 0x00000001) in "MSVCR100.DLL" called.
DllMain(0x73780000, DLL_PROCESS_DETACH, 0x00000001) in "MSVCR100.DLL" returned 
1 (0x1).
DllMain(0x08370000, DLL_PROCESS_DETACH, 0x00000001) in "DEPENDS.DLL" called.
DllMain(0x08370000, DLL_PROCESS_DETACH, 0x00000001) in "DEPENDS.DLL" returned 1 
(0x1).
DllMain(0x74940000, DLL_PROCESS_DETACH, 0x00000001) in "KERNEL32.DLL" called.
DllMain(0x74940000, DLL_PROCESS_DETACH, 0x00000001) in "KERNEL32.DLL" returned 
1 (0x1).
DllMain(0x75B10000, DLL_PROCESS_DETACH, 0x00000001) in "KERNELBASE.DLL" called.
DllMain(0x75B10000, DLL_PROCESS_DETACH, 0x00000001) in "KERNELBASE.DLL" 
returned 1 (0x1).
Exited "COLPROF_OK.EXE" (process 0x17E0) with code 0 (0x0).
--------------------------------------------------------------------------------
Starting profile on 1/29/2013 at 16:56:50

Operating System: Microsoft Windows NT/2000/XP/2003/Vista based Home Premium 
(64-bit), version 6.01.7601 Service Pack 1
Program Executable: d:\sources\cbuilder2007\3dlut\debug\COLPROF.EXE
Program Arguments: -v -qh DP2_Output2
Starting Directory: D:\Sources\CBuilder2007\3DLUT\Debug\
Search Path: C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\WINDOWS 
LIVE;C:\PROGRAM FILES (X86)\COMMON FILES\MICROSOFT SHARED\WINDOWS 
LIVE;C:\PROGRAM FILES (X86)\CODEGEAR\RAD 
STUDIO\5.0\BIN;C:\USERS\PUBLIC\DOCUMENTS\RAD 
STUDIO\5.0\BPL;C:\WINDOWS\SYSTEM32;C:\WINDOWS;C:\WINDOWS\SYSTEM32\WBEM;C:\WINDOWS\SYSTEM32\WINDOWSPOWERSHELL\V1.0\;C:\PROGRAM
 FILES (X86)\COMMON FILES\LENOVO;C:\SWTOOLS\READYAPPS;C:\PROGRAM FILES 
(X86)\INTEL\SERVICES\IPT\;C:\PROGRAM FILES (X86)\COMMON 
FILES\ACRONIS\SNAPAPI\;C:\PROGRAM FILES\MYSQL\MYSQL SERVER 5.5\BIN;C:\PROGRAM 
FILES (X86)\MICROSOFT SQL SERVER\100\TOOLS\BINN\;C:\PROGRAM FILES\MICROSOFT SQL 
SERVER\100\TOOLS\BINN\;C:\PROGRAM FILES\MICROSOFT SQL 
SERVER\100\DTS\BINN\;C:\PROGRAM FILES (X86)\VISUAL LEAK 
DETECTOR\BIN\WIN32;C:\PROGRAM FILES (X86)\VISUAL LEAK 
DETECTOR\BIN\WIN64;C:\PROGRAM FILES (X86)\WINDOWS LIVE\SHARED;C:\PROGRAM 
FILES\TORTOISESVN\BIN;C:\PROGRAM FILES (X86)\ACRONIS\TRUEIMAGEHOME\;C:\Program 
Files\ThinkPad\Bluetooth Software\;C:\Program Files\ThinkPad\Bluetooth 
Software\syswow64;C:\Program Files (x86)\Lenovo\Access Connections\;C:\Program 
Files (x86)\Intel\OpenCL SDK\2.0\bin\x86;C:\Program Files (x86)\Intel\OpenCL 
SDK\2.0\bin\x64;C:\Program 
Files\TortoiseGit\bin;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program 
Files (x86)\Bitvise SSH Client;C:\Program Files\Intel\WiFi\bin\;C:\Program 
Files\Common Files\Intel\WirelessCommon\;C:\Users\Public\Documents\RAD 
Studio\5.0\BPL;C:\Program Files (x86)\IDM Computer 
Solutions\UltraCompare\;D:\Argyll;D:\Sources;C:\Program Files (x86)\CMake 
2.8\bin;C:\Program Files (x86)\IDM Computer 
Solutions\UEStudio;C:\Users\Auke\AppData\Local\nasm;C:\Program Files (x86)\IDM 
Computer Solutions\UEStudio;D:\Argyll\ajam-2.5.2-1.3.3\bin.ntx86;C:\Program 
Files (x86)\IDM Computer Solutions\UEStudio\;C:\Program 
Files\Intel\WiFi\bin\;C:\Program Files\Common Files\Intel\WirelessCommon\

Options Selected:
     Simulate ShellExecute by inserting any App Paths directories into the PATH 
environment variable.
     Log DllMain calls for process attach and process detach messages.
     Hook the process to gather more detailed dependency information.
     Log LoadLibrary function calls.
     Log GetProcAddress function calls.
     Log debug output messages.
     Automatically open and profile child processes.
--------------------------------------------------------------------------------

Started "COLPROF.EXE" (process 0x13F8) at address 0x001B0000.  Successfully 
hooked module.
Loaded "NTDLL.DLL" at address 0x76F00000.  Successfully hooked module.
Loaded "KERNEL32.DLL" at address 0x74940000.  Successfully hooked module.
Loaded "KERNELBASE.DLL" at address 0x75B10000.  Successfully hooked module.
DllMain(0x75B10000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNELBASE.DLL" called.
DllMain(0x75B10000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNELBASE.DLL" 
returned 1 (0x1).
DllMain(0x74940000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" called.
DllMain(0x74940000, DLL_PROCESS_ATTACH, 0x00000000) in "KERNEL32.DLL" returned 
1 (0x1).
Injected "DEPENDS.DLL" at address 0x08370000.
DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" called.
DllMain(0x08370000, DLL_PROCESS_ATTACH, 0x00000000) in "DEPENDS.DLL" returned 1 
(0x1).
Loaded "MSVCR100.DLL" at address 0x73780000.  Successfully hooked module.
Entrypoint reached. All implicit modules have been loaded.
DllMain(0x73780000, DLL_PROCESS_ATTACH, 0x004EFA1C) in "MSVCR100.DLL" called.
GetProcAddress(0x74940000 [KERNEL32.DLL], "FlsAlloc") called from 
"MSVCR100.DLL" at address 0x7379BA3B and returned 0x74954F13.
GetProcAddress(0x74940000 [KERNEL32.DLL], "FlsGetValue") called from 
"MSVCR100.DLL" at address 0x7379BA48 and returned 0x74951252.
GetProcAddress(0x74940000 [KERNEL32.DLL], "FlsSetValue") called from 
"MSVCR100.DLL" at address 0x7379BA55 and returned 0x749541F0.
GetProcAddress(0x74940000 [KERNEL32.DLL], "FlsFree") called from "MSVCR100.DLL" 
at address 0x7379BA62 and returned 0x7495357F.
DllMain(0x73780000, DLL_PROCESS_ATTACH, 0x004EFA1C) in "MSVCR100.DLL" returned 
1 (0x1).
LoadLibraryA("KERNEL32") called from "COLPROF.EXE" at address 0x0021A3C8.
LoadLibraryA("KERNEL32") returned 0x74940000.
GetProcAddress(0x74940000 [KERNEL32.DLL], "GlobalMemoryStatusEx") called from 
"COLPROF.EXE" at address 0x0021A3CF and returned 0x7497D4B4.
LoadLibraryA("KERNEL32") called from "COLPROF.EXE" at address 0x0021A3C8.
LoadLibraryA("KERNEL32") returned 0x74940000.
GetProcAddress(0x74940000 [KERNEL32.DLL], "GlobalMemoryStatusEx") called from 
"COLPROF.EXE" at address 0x0021A3CF and returned 0x7497D4B4.
LoadLibraryA("KERNEL32") called from "COLPROF.EXE" at address 0x0021A3C8.
LoadLibraryA("KERNEL32") returned 0x74940000.
GetProcAddress(0x74940000 [KERNEL32.DLL], "GlobalMemoryStatusEx") called from 
"COLPROF.EXE" at address 0x0021A3CF and returned 0x7497D4B4.
Terminating process by user's request.
Exited "COLPROF.EXE" (process 0x13F8) with code 57005 (0xDEAD).

Other related posts: