Language selection

Search

Patent 2307297 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2307297
(54) English Title: INTERACTIVE DEBUGGING SYSTEM WITH DEBUG DATA BASE SYSTEM
(54) French Title: OUTIL INTERACTIF DE DEBOGAGE COMPRENANT UN SYSTEME DE BASE DE DONNEES DE DEBOGAGE
Status: Expired and beyond the Period of Reversal
Bibliographic Data
(51) International Patent Classification (IPC):
  • G06F 11/36 (2006.01)
(72) Inventors :
  • SPERTUS, MICHAEL P. (United States of America)
  • FITERMAN, CHARLES (United States of America)
  • RODRIGUEZ RIVERA, GUSTAVO (United States of America)
(73) Owners :
  • SYMANTEC CORPORATION
(71) Applicants :
  • SYMANTEC CORPORATION (United States of America)
(74) Agent: DEETH WILLIAMS WALL LLP
(74) Associate agent:
(45) Issued: 2009-07-21
(86) PCT Filing Date: 1998-10-28
(87) Open to Public Inspection: 1999-05-06
Examination requested: 2003-08-25
Availability of licence: N/A
Dedicated to the Public: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US1998/022923
(87) International Publication Number: WO 1999022288
(85) National Entry: 2000-04-17

(30) Application Priority Data:
Application No. Country/Territory Date
60/063,992 (United States of America) 1997-10-29

Abstracts

English Abstract


An interactive system for debugging programs in which a persistent data base
system responds to update queries containing debugging
information from a debugging information source and to read queries on the
debugging information from an interactive interface. The
interactive interface produces the read queries in response to inputs from
users and formats the results of the read queries as required by
the user. One source of inputs is a standard Web browser for which the
interactive interface functions as a Web server. The system also
includes a command channel by which the source of debugging information
receives commands from the interactive interface. In one
embodiment, the command channel is implemented in the data base. In a
disclosed implementation, the source of debugging information
provides memory debugging information. Also disclosed are techniques for using
an automatic memory management system to reduce
memory fragmentation and heap footprint size.


French Abstract

L'invention concerne un outil interactif de débogage de programmes dans lequel un système de base de données permanentes répond, d'une part, à des demandes de mise à jour contenant des informations de débogage provenant d'une source d'informations de débogage et, d'autre part, à des demandes de lecture d'informations de débogage provenant d'une interface interactive. Cette interface produit les demandes de lecture en réponse à des entrées utilisateur, et formate les résultats des demandes de lecture, selon la demande de l'utilisateur. Une source d'entrées est constituée par un navigateur classique du Web pour lequel l'interface interactive fonctionne en tant que serveur du Web. Ce système comprend également une voie de commande via laquelle la source d'informations de débogage reçoit les commandes provenant de l'interface interactive. Dans un mode de réalisation, la voie de commande est implémentée dans la base de données. Dans une implémentation décrite, la source d'informations de débogage fournit des informations de débogage de mémoire. L'invention concerne également des techniques d'utilisation d'un système de gestion automatique de la mémoire, afin de réduire la fragmentation de la mémoire et la dimension de l'encombrement du tas.

Claims

Note: Claims are shown in the official language in which they were submitted.


1. An interactive debugging system for debugging an executing program
comprising:
a debug data base system which stores debugging information indicating an
execution state of the program and responds to queries on the debugging
information;
a debugging information source which provides an update query containing the
debugging information to the debug data base system during execution of the
program
wherein the debugging information source comprises a debugger that is linked
to the
program prior to beginning execution of the program;
an interactive interface that responds to an input from a user by providing a
read
query on the debugging information to the debug data base system during
execution of
the program and responds to results returned for the read query by formatting
the results
and outputting the formatted results to the user; and
a channel for transferring a command from the interactive interface to the
debugging information source during execution of the program,
the interactive interface transferring the command in response to another
input
from the user and the debugging information source responding to the command
by
providing an update query to the debug data base system.
2. The debugging system set forth in claim 1 wherein:
the debugging information persists after the executing program has ceased
executing; and
31

the interactive interface further responds to the input from the user by
providing a
read query on the persistent debugging information after the executing program
has
ceased executing.
3. The debugging system set forth in claim 2 wherein:
the persistent debugging information includes persistent debugging information
for a plurality of executions of the program; and
the input selects persistent debugging information from an execution of the
plurality thereof.
4. The debugging system set forth in claim 3 wherein:
the input further specifies one of a plurality of views of the debugging
information; and
the interactive interface responds to the input by providing the read query as
required for the view specified in the input.
5. The debugging system set forth in claim 1 wherein:
the input further specifies one of a plurality of views of the debugging
information; and
the interactive interface responds to the input by providing the read query as
required for the view specified in the input.
6. The interactive debugging system set forth in claim 1 further comprising:
32

a plurality of the interactive interfaces.
7. The interactive debugging system set forth in claim 1 further comprising:
a plurality of the debugging information sources.
8. The interactive debugging system set forth in claim 1 wherein:
the interactive interface is associated with a universal resource indicator,
receives
a first message according to the http protocol which is directed to the
associated universal
resource indicator, and responds to the first message by sending a second
message
according to the http protocol,
the first message containing the input from the user to the interactive
interface and
the second message containing the formatted results.
9. The interactive debugging system set forth in claim 8 wherein:
the interactive interface is part of a given computer system; and
the source of the first message and the destination of the second message are
in
the alternative local to the given computer system or remote therefrom.
10. The debugging system set forth in claim 1 wherein:
there is a plurality of the commands; and
the commands further include a stop command for stopping the executing
program and
a restart command for restarting the executing program.
33

11. The debugging system set forth in claim 1 wherein:
the debug data base system further stores command information and the channel
transfers the command by means of an update query from the interactive
interface to the
debug data base system and a read query to the debug data base system from the
debugging information source.
12. The interactive debugging system set forth in claim 1 wherein:
the channel further transfers an event indicator from the debugging
information
source to the interactive interface,
the interactive interface responding to the event indicator by providing a new
read query
to the debug data base system.
13. The interactive debugging system set forth in claim 12 wherein:
the debug data base system further stores event information and the channel
transfers the event by means of an update query from debugging information
source to
the debug data base system and a read query to the debug data base system from
the
interactive interface.
14. A storage device having recorded thereon computer readable code for
execution by a
computer system for implementing an interactive debugging system for debugging
an
executing program, the code comprising:
34

debug data base system means for storing debugging information indicating an
execution state of the program and responding to queries on the debugging
information;
debugging information source means for providing an update query containing
the
debugging information to the debugging data base system means during execution
of the
program;
interactive interface means for responding to an input from a user by
providing a
read query on the debugging information to the debug data base system means
during
execution of the program and for responding to results returned for the read
query by
formatting the results and outputting the formatted results to the user; and
channel means for transferring a command from the interactive interface means
to
the debugging information source means during execution of the program;
wherein the interactive interface means transfers the command in response to
another input from the user and the debugging information source means
responds to the
command by providing an update query to the debug data base system means.
15. An interactive debugging system for debugging memory usage by an executing
program,
the debugging system comprising:
a debug data base system which stores debugging information indicating a
current
state of memory usage by the executing program and responds to queries on the
debugging information;
35

a memory allocator used by the executing program to allocate memory, the
memory allocator providing an update query containing the debugging
information to the
debug data base system;
an interactive interface that responds to an input from a user by providing a
read
query on the debugging information to the debug data base system during
execution of
the program and responds to results returned for the read query by formatting
the results
and outputting the formatted results to the user;
a memory leak detector used by the executing program to detect memory leaks,
the memory leak detector providing an update query containing information from
which
the current amount of memory leaked by the program may be determined;
the read query obtains the information from which the current amount of memory
leaked by the program may be determined;and
command information in the debugging information specifying a leak detector
command,
the command information being provided to the debug data base system by an
update query from the interactive interface, being read from the debug data
base system
by a read query from the memory allocator, and the memory allocator responding
to the
leak detector command by causing execution of the memory leak detector.
16. The debugging system set forth in claim 15 wherein:
the memory usage information includes information from which the current heap
size for the executing program may be determined; and
36

the read query obtains the information from which the current heap size may be
determined.
17. The debugging system set forth in claim 15 wherein:
the memory usage information includes information from which the memory
allocated by the executing program may be determined; and
the read query obtains the information from which the memory allocated by the
executing program may be determined.
18. The debugging system set forth in claim 15 wherein:
the debugging information persists after the executing program has ceased
executing; and
the interactive interface further responds to the input from the user by
providing a
read query on the persistent debugging information after the executing program
has
ceased executing.
19. The debugging system set forth in claim 18 wherein:
the persistent debugging information includes persistent debugging information
for a plurality of executions of the program; and
the input selects persistent debugging information from an execution of the
plurality thereof.
20. The debugging system set forth in claim 19 wherein:
37

the input further specifies one of a plurality of views of the debugging
information; and
the interactive interface responds to the input by providing the read query as
required for the view specified in the input.
21. The debugging system set forth in claim 20 wherein:
the plurality of views include a view that shows the memory allocated during
the
execution.
22. The debugging system set forth in claim 20 wherein:
the debugging system further includes a memory leak detector used by the
executing program to detect memory leaks, the memory leak detector providing
update
queries containing information from which the memory leaked by the program may
be
determined; and
the plurality of views include a view that shows the memory leaked during the
execution.
23. The interactive debugging system set forth in claim 15 wherein:
the interactive interface is associated with a universal resource indicator,
receives
a first message according to the http protocol which is directed to the
associated universal
resource indicator, and responds to the first message by sending a second
message
according to the http protocol,
38

the first message containing the input from the user to the interactive
interface and
the second message containing the formatted results.
24. The interactive debugging system set forth in claim 23 wherein:
the interactive interface is part of a given computer system; and
the source of the first message and the destination of the second message are
in the
alternative local to the given computer system or remote therefrom.
25. A storage device having recorded thereon computer readable code for
execution by a
computer system for implementing an interactive debugging system for debugging
memory usage by an executing program, the code comprising:
debug data base system means for storing debugging information indicating a
current state of memory usage by the executing program and responding to
queries on the
debugging information;
memory allocator means for providing an update query containing the debugging
information to the debug data base system;
interactive interface means for responding to an input from a user by
providing a
read query on the debugging information to the debug data base system during
execution
of the program and responding to results returned for the read query by
formatting the
results and outputting the formatted results to the user; and
memory leak detector means for providing an update query containing
information from which the current amount of memory leaked by the program may
be
determined;
39

wherein the read query obtains the information from which the current amount
of
memory leaked by the program may be determined; and
wherein command information in the debugging information specifying a leak
detector command is provided to the debug data base system means by an update
query
from the interactive interface means, and is read from the debug data base
system means
by a read query from the memory allocator means, and wherein the memory
allocator
means responds to the leak detector command by causing execution of the memory
leak
detector means.
40

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02307297 2006-04-05
WO 99122288 PCT1US98122923
Interactive debugging system with debug data base
System
Background of the invention
1. Field of the invention
The invention concerns interactive programming tools generally and more
specifically
concerns interactive program debuggers.
2. Description of the prior art
Debuggers are tools used by programmers to determine what is going on when a
program
is executed. A debugger typically permits a programmer to start and stop the
program's
execution and to examine the state of the memory (including hardware
registers) being
used by the program. Modern debuggers are interactive: that is, a programmer
can
input a command to the debugger and see the effects of the command within a
relatively
short period of time. Modem debuggers can further relate what the programmer
does and
sees to the source code for the program being debugged. Thus, if the
programmer wants
to examine the contents of a certain variable, he or she can select the
variable by name
and the debugger will show the programmer the contents in a form that
corresponds to
the type of the variable. Similarly, a trace of calls to subroutines made by
the program
and returns therefrom will display the names of the subroutines being called
and returned
to. Two examples of state-of-the-art debuggers are the BoundsCheckerTM,
manufactured
by Compuware Corporation, and Purify, manufactured by Rational Software.
Further information about BoundsChecker may be found at
www.numega.com/library/doc.shtml, which in October, 1998 contained the
1

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
complete documentation for the debugger. Further information about Purify
could be
found in October, 1998 at www. rational. com/support/techpapers . In
addition, the Purify debugger is the subject matter of U.S. patent 5,535,329,
Reed
Hastings, Method and apparatus for modifying relocatable object code files and
monitoring programs, issued 7/9/96. A general discussion of debuggers may be
found in
Jonathan B. Rosenberg, How Debuggers Work, Algorithms, Data Structures,
Architecture, Wiley 1996.
While any modern debugger is useful, debuggers would be more useful if they
offered
more flexible user interfaces. As it stands, debuggers have two ways of
providing the
user with information: by means of a proprietary interactive user interface
which
communicates directly with the debugger as it executes the program and by
means of a
log file, that is, a text file which contains a list of the interactions
between the user and
the debugger. Problems with this arrangement include first, that the
interactive user
interface can only be used to analyze the current execution of the program;
information
about past executions is contained in the log file, and that requires other
tools to read it.
A second problem is that the proprietary user interface requires that the user
interacting
with the debugger have the interface software and also limits the user to the
kind of
interaction dictated by the proprietary user interface. As for the log files,
nothing can be
done with the log file beyond what is usually done with text files.
One consequence of the use of proprietary user interfaces is that debuggers
have not
taken advantage of the standard graphical user interfaces that have lately
evolved. In
particular, they have not been adapted to work with Web browsers, and that in
turn means
not only that the programmer must use a less-convenient user interface than
that provided
by the his or her Web browser, but also that a programmer who wants to debug a
program
that is running on a remote machine cannot use the Web browser and the
Internet to do
the debugging, but must instead have a special connection to the remote
machine which
permits the programmer to use the proprietary interface.
2
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
What is needed, then, is a debugger which may be easily adapted to a number of
different
kinds of user interfaces, including the user interface provided by Web
browsers and that
works as well to analyze information about past executions of a program as it
does to
analyze information about a current execution. It is an object of the present
invention to
provide such a debugger.
Summary of the invention
The problems indicated above and others as well are solved by providing a
debugging
system in which a source of debugging information from an executing program
performs
update queries to a debug data base system containing debugging information
the source
receives as a result of the execution of the program and an interactive
interface responds
to user inputs by performing a read query on the debug data base which reads
the debug
information placed there by the source and then formatting the results of the
read query
as required by the user.
The information in the data base is persistent, and consequently, the
interactive interface
can be used not only with debug information from a current execution of the
program but
also with debug information from past executions of the program. Moreover, the
debug
data base effectively isolates the debugging information source and the
interactive
interface from each other; consequently, changes in either which do not affect
what is
written to or read from the data base do not affect the other. Further, a
variety of
different interactive interfaces may read from the debug data base and a
variety of
different debug information sources may write to the debug data base.
Among interactive interfaces that may be used with the debug data base is one
that is
adapted to be used with a standard World Wide Web browser. Such a Web server
interactive interface has a URI (universal resource indicator) and responds to
a message
containing its URI by formatting and sending a HTML page to the browser. In
many
cases, the response also involves performing a read query on the debug
database and
returning an HTML page that contains the results of the query. Since the Web
server
interactive interface works with any Web browser, regardless of the browser's
location in
3
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
the Internet, debugging may be done equally easily either on the system where
the Web
server interactive interface is located or on a remote system.
One species of debugging systems of the type described above employs a source
of
debugging information which provides memory debugging information such as
memory
allocations, memory leaks, and current heap size.
Other objects and advantages will be apparent to those skilled in the arts to
which the
invention pertains upon perusal of the following Detailed Description and
drawing,
wherein:
Brief description of the drawing
FIG. 1 is an overview of a debugging system which employs the invention;
FIG. 2 is a block diagram of a presently-preferred embodiment of the
invention;
FIG. 3 provides an overview of the debugger database of the preferred
embodiment;
FIG. 4 shows a display generated from the HTML page by means of which the user
selects a debugging report;
FIG. 5 shows a display generated from the HTML page by means of which the user
views leak information;
FIG. 6 shows a display generated from the HTML page by means of which the user
views heap allocation;
FIG. 7 shows a display generated from the HTML page by means of which the user
views heap statistics;
FIG. 8 shows the display used to update debugger settings in a preferred
embodiment;
FIG. 9 shows how buckets for objects are organized;
FIG. 10 shows free list defragmentation and footprint reduction; and
FIG. 11 shows how object buckets are organized in a preferred embodiment.
Reference numbers in the drawing have three or more digits: the two right-hand
digits
are reference numbers in the drawing indicated by the remaining digits. Thus,
an item
with the reference number 203 first appears as item 203 in FIG. 2.
4
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
Detailed Description
The following Detailed Description will first present an overview of a
debugging system
that includes the invention, will then show how the invention may be used to
provide
multiple user interfaces, including a Web browser user interface, for an
existing
debugging system, and will then present details of the debug database and the
Web
browser interface in a preferred embodiment. The source of the debugging
information
in a preferred embodiment is an automatic memory management system, and the
Detailed Description also includes details of the automatic memory management
system.
Overview of a debugging system constructed according to the invention:
FIG. 1
FIG. I is a conceptual block diagram of a debugging system 101 that is
constructed
according to the invention. The major components of debugging system 101 are
debugging data base system 107, debugger client 102, and one or more user
interface
(UI) clients 111. Debugging data base system 107 contains a database 110 with
persistent debugging information 109(a..n) for a variety of executions of
programs. The
term persistent is used herein to mean that the debugging information remains
available
in the database after execution of the program has ceased. Database 110 is
managed by
debug database server 106, which responds to queries from the other components
of
debugging system 101 by writing to or reading from debug info 109 as required
by the
query (arrow 108). Conceptually, debug data base server 106 has two sets of
clients:
debugger client 102, which provides update queries 105 containing debug
information
109 to database 110, and one or more user interface clients 111, which provide
queries
that read selected. debug information 109 from data base 110. Debug data base
system
107 may be specially implemented for system 101, or it may be one of the many
commercial data base systems.
One of the functions of debug database server 106 is to coordinate reads and
writes of
database 110. In some debugger systems 101, it will be enough simply to ensure
that a
5
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
read query never attempts to read data which is not yet available in database
110; in
others, it may be necessary to ensure that what is read is the last complete
write done by
debugger client 102. One method of coordinating reads and writes is to treat
each read
and write as a transaction and to use standard database transaction processing
techniques;
where consistency requirements are less stringent, the overhead of transaction
processing
can be avoided and sufficient coordination of reads and writes may be achieved
by
ordering the writes such that information which a given record in the data
base depends
on is written to the database before the record itself is written, thereby
ensuring that all
the information needed to respond to a query for which the given record is a
result is in
the database by the time the record itseif can be queried.
Debugger client 102 is a debugger which is executing a program being debugged
104 in
debugger process 103. For purposes of the present discussion, a debugger
client 102 may
be any entity which executes a computer program in such a fashion that
information
about the execution which would not normally be available to a user of the
program
becomes available. Thus, debugger client 102 may be implemented expressly for
system
101 or it may be any kind of existing interactive debugger. Debugger client
102 may
have access to both the source code 117 and object code 119 for program 104.
Debugger
client 102 may interpret source code 117, but more generally, it will execute
object code
119 and use source code 117 to make debug info 109 more understandable to the
user of
the debugger. Debug info 109 obtained from source code 117 and by means of
execution
of object code 119 is written to debug database 110 by means of update queries
to debug
database server 106. In some embodiments there may be more than one debugger
client
102; for example, a programmer may want to watch the behavior of two closely-
cooperating programs, or there may be debugger clients specialized for
different
programming languages or for different programming problems.
Each user interface client 111 receives inputs 125 from a user, responds to
some inputs
by making a read query (Rquery) 113 for debug data base server 106, and
responds to the
results of Rquery 113 by formatting the results and providing the formatted
results to the
user as formatted output 127. The forms of the inputs received and the outputs
provided
6
SUBSTITUTE SHEET ( rute 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
by a given interface client 111 depends on the kind of interactive interface
employed by
the user. Again, the interactive interface may be any presently existing or
future
interactive interface.
Debugger client 101 and the user interface clients 111 further communicate
with each
other by means of control channel 121, which may be any arrangement which
permits
transfer of messages between debugger client 102 and a user interface client
111. User
interface client 111 uses control channel 121 to transfer debugger commands to
debugger
client 101, while debugger client 102 uses control channel 121 to transfer
debugger event
messages to user interface client 111. For example, a first debugger command
may
instruct the debugger concerning the kinds of information it is to output,
while another
may instruct the debugger to stop execution of program 104 at a predetermined
point. A
debugger event may inform interface client 111 that the predetermined point
has been
reached and that the debugger has stopped execution of the program. Possible
implementations of control channel 121 include among others inter-process
communications, events and callbacks, shared memory, and a shared database.
Operation of debugger system 101 is as follows: as debugger client 102 is
executing
program 104, it outputs debugger information 109 to debug database server 106
by means
of update queries 105. While doing this, debugger client 102 also responds to
commands
received on control channel 120 and where required, sends event messages via
control
channel 120 to user interface client 11 l. Debug data base server 106 updates
debug info
109 for the execution of program 104 being performed by debugger client 102 in
response to the update queries 105. While this is going on, user interface
client 111 is
responding to event messages from debugger client 102 and responding to user
inputs
125. In both cases, the response may involve a command to debugger client 102
and/or a
read query 113 to debug database server 106. Debug database server 106
responds to
read query 113 by sending a result to user interface client 111, which then
formats the
result as required by the interactive user interface being used by the user
and sends the
formatted result to the user. The user may respond to the formatted result
with another
input 125, beginning the process again. Coordination between database server
106 and
7
SUBSTITUTE SHEET { rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
client 111 may be done in many ways. In some cases, client 11 l may initiate
all actions;
in others, client I 11 may respond to changes in database 110. In those cases,
client 111
may simply repeatedly poll database I 10 until a change occurs or data base
system 107
may include a mechanism for sending an event message to user interface client
111
indicating that a change has taken place.
It is a particular advantage of debugging system 101 that debug database
system 107
isolates debugger client 102 and UI clients 111 from each other. The builders
of
debugger client 102 need know nothing about the forms taken by user input 125
and
formatted output 127 in a given user interface client 11 I(i); all they need
to know is the
query interface to debug data base system 107. Similarly, the builders of user
interface
client 111(i) need know nothing about the form taken by debugger information
in
debugger client 102; they, too, need to know only the query interface to debug
data base
system 107. Moreover, because debugger client 102 and user interface clients
111 are
isolated from each other, modifying a user interface client 111(i) or adding a
new user
interface client 111(x) to debugging system 101 requires no changes whatever
to
debugger client 102. Similarly, modifications of debugger client 102 or
additions of new
debugger clients requires changes to the user interface clients 111 only to
the extent that
the changes in debugger client 102 involve the addition of new kinds of
information to
database system 107. If control channel 120 is implemented in debug data base
system
107, there is no direct communication between debugger client 102 and a UI
client I 11(i)
and the isolation is complete.
A memory debugging system incorporating the invention: FIG. 2
In a preferred embodiment of the invention, the techniques described above are
used to
provide a Web browser user interface and a CLI user interface for a memory
debugger.
A memory debugger is a debugger which is used to analyze how the program
explicitly
allocates and frees memory. Memory explicitly allocated by a program resides
on the
program's heap. One problem detected by a memory debugger is memory "leaks",
which
occur when a program contains code that allocates memory, but does not contain
code
that frees the allocated memory when it is no longer being used by the
program. Leaks
8
SUBSTITUTE SHEET ( ruie 26 )

CA 02307297 2006-04-05
WO 99122288 PCT1US98122923
of course always waste memory; with serious leaks, all of the heap memory
available to
the program may be occupied by leaks, and in that case, the program will fail
when a new
allocation is attempted. Another problem detected by a memory debugger is data
structures that continue to grow until they occupy all of the available heap
memory.
The memory debugger in the preferred embodiment is the Great CircleTM
automatic
memory management system, manufactured by Geodesic Systems, Inc. The main
function of the Great Circle system is to provide automatic memory management
for
programs written in languages such as C or C++, which have no provision for
automatic
memory management. Great Circle does automatic memory management by
periodically
collecting garbage, that is, memory which was once allocated but is no longer
being used
by the program, and freeing the garbage memory for reuse. From the point of
view of
memory debugging, of course, garbage is the result of leaks. Thus, the
information
required to do garbage collection can also be used for memory debugging, and
consequently, the Great Circle system has a debugging mode as well as a memory
management mode. The Great Circle system prior to its modification as required
for it
to be a component of a debugging system of the type shown in FIG. 1 is
described in
detail in the manual, Great Circle Automatic Memory Management System for C
and
C++, version 1.0, Geodesic Systems, Inc., 1995.
FIG. 2 shows a presently-preferred embodiment of the invention in which
debugger client
203 is implemented by means of Great Circle process 205 which is executing a
program
208 whose object code 200 has been linked at the beginning of execution to a
set of
dynamically-linked libraries (DLLs) 211 which include code that performs Great
Circle's
30 memory management and debugging functions. Of particular interest in the
present
discussion is the code in the DLLs for program initialization 213, for memory
allocation
215, and for garbage collection 217. When the Great Circle system is operating
in
debugging mode, code 213, 215, and 217 responds to debugger commands and makes
update queries containing debugger information to shared database system 226.
9

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
Shared data base system 226 implements the debug data base system and control
channel
120 in the preferred embodiment. As before, the components of shared data base
system
226 are a debug data base server 225 and a data base 229. In the preferred
embodiment,
shared data base system 226 is implemented in memory that is shared between
Great
Circle process 205 and a user interface process 224 that implements UI clients
111.
Debug data base server 225 is a set of database management routines in the
shared
memory that may be directly executed by either Great Circle process 205 or
user
interface process 224. Database 229 in the preferred embodiment consists of
files which
have been memory mapped into the shared memory.
The preferred embodiment has two user interface clients: one, web server
client 243
responds to inputs from and produces outputs to a Web browser 249 which
communicates with web server client 243 by means of Internet 259. Use of
Internet 259
means that Web browser 249 may be operating on the computer system upon which
Web
server client 243 is executing or on any other computer system that has access
via
Internet 259 to the computer system upon which server client 243 is executing.
The
other user interface client is CLI client 251, which offers a standard CLI
interface to
system 201. Inputs 253 are received from the device s t di n, usually the
keyboard, and
outputs 255 go to the device stdout, usually the display. In the preferred
embodiment,
both Web server client 243 and CLI client 251 are implemented by means of code
that is
executed in user interface process 224, and thus both have access to shared
database
system 226.
Data base 229 contains three broad classes of information:
~ control information 231;
= per-program information 233; and
= per-execution information 235.
Control information 231 is the portion of the database that implements control
channel
120. As shown by dashed lines COMU 235 and COMR 221, either Web server client
243 or CLI client 251 provide commands to debugger client 203 by performing
update
queries to control information 231; debugger client 203 receives the commands
by
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
performing read queries on control information. In the preferred embodiment,
debugger
client 203 executes code in ALLOC 215 that performs a COMR query 221 on
control
information 231 prior to allocating new storage for the execution of program
208
Similarly, when an event occurs which is of interest to a user interface
client, debugger
client 203 does an update query EVU 219 to control information 231. In the
preferred
embodiment, the user interface client repeatedly does event read queries 237
on control
info 231 to determine whether the event has occurred.
Per-program information 231 is information which is peculiar to a given
program that has
been executed by the debugger but which is the same for all executions of the
program.
Debugger client 203 performs update queries 223 that write per-program
information
231 for a given program when it initializes itself for the first execution of
the program.
The update queries are done by code in INIT 213. Per-execution information 235
is
information that is accumulated on each execution of a program by debugger
client 203.
The update queries that provide per-execution information 235 to data base 229
are done
by code in ALLOC 215 that is executed whenever memory is allocated during
execution
of a program and code in COLLECT 217 that is executed whenever a garbage
collection
is done during execution of a program. Per-program info 233 and per-execution
info 235
are read by read queries (RQUERY) 239 made by the user interface client that
needs the
information.
Details of database 229: FIG. 3
FIG. 3 shows details of the contents of database 229 in the preferred
embodiment of FIG.
2. As already mentioned, database 229 is implemented as a set of database
files 301
which has been mapped into address space 303 for Great Circle process 205 and
address
space 305 for process 224 which executes the user interface clients in the
preferred
embodiment. There are three kinds of information in control information 231: a
queue
of commands 307 for debugger client 203, a queue of events 309 for the user
interface
process, and debugger settings 311, which are current control and status
settings for
debugger client 203. The control settings are set by the user interface
clients and read by
11
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCTIUS98/22923
debugger client 203 and the status settings are set by debugger client 203 and
read by the
user interface clients.
In the preferred embodiment, debugger client 203 responds to the following
commands:
= collect: perform garbage collection for the program 208 being currently
executed by
debugger client 203;
= stop: stop execution of the program 208 being currently executed by debugger
client
203;
= restart: restart execution of the program 208 being currently executed by
debugger
client 203.
Of these, the first is used by both web server client 243 and CLI client 251,
but the
second and third are used only by CLI client 251. In the preferred embodiment,
only CLI
client 251 responds to a debugger event. The event is the detection of a
memory leak.
When the event occurs, CLI client 251 responds by querying database system 226
and to
obtain the information about the leak that was written there by debugger
client 203. The
control and status settings 311 will be explained in more detail in the
following
description of the user interface for web browser 249.
Per-program information 233 in the preferred embodiment is a symbol table for
each
program that debugger client 203 has executed. Debugger client 203 makes the
symbol
table and writes it to database 229 as part of the initialization it performs
when it
executes a program for which there is no symbol table in database 220. The
symbol table
contains the information which is required to relate information about the
execution of a
program 208 to names and locations in source code 207 for the program.
Per-execution information 235 in the preferred embodiment includes information
concerning the execution of program 208 which debugger client 203 is currently
performing and information from executions of programs which debugger client
203 has
performed in the past. The information for the current execution includes
current heap
statistics 315, which shows the space currently occupied by storage in the
program's
heap, and execution information 317 for the current execution. Execution
information
12
SUBSTITUTE SHEET { rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
317 includes allocation statistics 319, indicating how much memory has been
allocated,
garbage collection statistics 321, indicating the memory leaks, and stack
trace 323,
showing the calls and returns made by the program during the program
execution. For
the current execution, execution information 317 shows the state of the
program as of the
most recent memory allocations and garbage collections. For past executions,
execution
information 317(i,j) for execution j of program i shows the state of
execution(j) as of
the conclusion of execution. Thus, allocation statistics 319 will show all
memory
allocated, collection statistics 321 will show all leaked memory, and stack
trace 323 will
show the stack trace for the entire execution(j).
Operation of debugging system 201
When debugger client 203 is not executing a program 208, a user interface
client can still
access execution information 317 (i,j) for any program(i) and execution (j)
for which the
information is present in data base 229. To access the information, the user
interface
client first queries database system 226 to obtain a list of the programs and
executions,
which it displays to the user, and then responds to a user selection of a
program and
execution by displaying execution information 317 (i,j) together with
information from
the relevant symbol table 313. What information is displayed is determined
from further
user inputs.
To analyze an execution of a program that is presently taking place with
debugging
system 201, the user first begins an execution of the program in which the
Great Circle
DLLs 211 have been linked to the program. The programs in the DLLs 211 cause
debugger client 203 to check control information 231 for commands and settings
each
time it allocates memory, to write the current program pointer to stack trace
323, and to
write statistics conceming the allocation to allocation statistics 319. Each
time debugger
client 203 does garbage collection, it writes collection statistics to
collection statistics
321. For each detected leak, the statistics for the leak show the size of the
leak and the
point in the stack trace at which the leak occurred. If the user of an
interface client
selects the current execution(m) of program(1), the resulting query to
database system 226
selects and returns the information currently in execution info 317(l,m). In a
preferred
13
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/11S98/22923
embodiment, the query to execution info 317(l,m) is repeated each time the
user of an
interface client desires a different view of the information in execution info
317(l,m).
Furthermore, the user can explicitly request the interface client to perform a
new query to
obtain the current state of execution info 317(l,m). In other embodiments, the
debug
database may provide an event message to the interface client when execution
info
317(l,m) changes and the interface client may respond thereto by making a new
query.
As indicated above, debugger client 203 further responds to collect, stop, and
restart
commands from the interface client. Ordinarily, debugger client 203 does
garbage
collection at predetermined intervals; execution info 317(1,m) reflects the
most recent
garbage collection. When the user interface client issues a collect command,
debugger
client 203 responds by making the collection the next time it does a memory
allocation
operation and outputting the new collection statistics to collection
statistics 321. In a
preferred embodiment, the user waits until he or she believes that a memory
allocation
operation has taken place and makes a new query to obtain the current state of
execution
info (l,m). The results of the new query reflect the garbage collection. In
other
embodiments, garbage collection may be done by a background thread that runs
in
response to the command and the update query containing the collection
statistics may
cause an event to be generated to the user interface client, which would then
respond by
making a new query. The stop command simply stops execution of program 208(1);
the
restart command restarts the execution of program 208(1).
Coordination between UI process 224's updates to and reads from database
system 226
and Great Circle process 205's updates to and reads from database system 226
need not
satisfy the strict requirements of transaction processing, since even results
that are not
quite current are useful and the user may easily update the results he or she
has. That
being the case, debugging system 201 avoids the overhead of transaction
processing by
ordering the writes in such a fashion that all of the information required for
a read query
is available by the time the read query can be made. For example, the
information about
a memory leak that is output to the user includes the stack trace for the
leak; in
performing update queries on data base system 226, debugger client 102
performs the
14
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
update query that writes the stack trace before it performs the update query
that writes the
leak information; consequently, if a read query can return leak information
for a leak, it
can also always return the stack trace for the leak. In other embodiments, of
course, other
coordination techniques, including transaction processing, may be used.
Details of Web server client 243: Figs. 4-8
Web server client 243 receives inputs from and provides outputs to any
standard Web
browser 249. The inputs and outputs are transferred via lnternet 259. From the
point of
view of Web browser 249, Web server client 243 is a standard Web server, that
is, it
receives a universal resource locator (LTRL) which specifies the server and in
many cases
attached data and responds to the URL by providing a page in HTML format to
web
browser 249. The attached data is used at the location specified by the URL.
If the
specified location has access to a data base, the specified location may use
the attached
data to form a query to the data base and return the result of the query in
the HTML page.
Details about all of this may be found for example in A Beginner's Guide to
HTML,
published by NCSA and available at pubs@ncsa. uiuc. edu and in the section
"Common Gateway Interface(CGI)" of HTML for Dummies, available in October,
1998
atwww.lanw.com/html4dum/h4d3e/extras/chl8secl.htm.
The URL specifies a Web server by means of a port number in the system on
which the
Web server is running and an Internet Protocol (IP) address for the system in
the Internet.
The URL for web server client 243 specifies port number 50565. The IP address
for the
system in the URL depends on whether Web browser 249 is running on the same
system
as Web server client 243. If it is, the IP address is the IP loop-back
address, normally
127Ø0.1, so that messages from Web browser 249 to client 243 go directly to
client 243,
without passing outside the system to which browser 249 and client 243 belong.
If IP
browser 249 is not running on the same system, the IP address of Web server
client 243 is
the IP address of the system on which it is running and the messages pass
between
browser 249 and client 243 via lntemet 259 external to the systems upon which
browser
249 and client 243 are located.
SUBSTITUTE SHEET (rule 26 }

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
Detailed interaction between browser 249 and server 243: FIGs. 4-8
The interaction between Web browser 249 and Web server client 243 in a
preferred
embodiment is as follows: The user begins the interaction by specifying the
URL of Web
server client 243 to Web browser 249 then sends the URL . When server 243
receives the
URL, it sends an HTML page which, when displayed by browser 249, has the
appearance
shown in FIG. 4. Page 401 is the select program page, so called because it
permits the
user of browser 249 to select which execution of a program he wants to view a
debugging
report for. The execution is selected by clicking on the program's pathname in
execution
listing 413. Execution listing 413 also shows the time the debugging
information for the
program was recorded at 417, the amount of leaked memory at 419, and a file
421 which
contains the debugging report for the execution. This file is one of the ones
that is
mapped into memory to provide debug data base 229.
Once a program has been selected, its name and the number of leaked bytes
recovered are
indicated at 423 in page 401. Box 407 indicates the directory in which
debugging reports
may currently be found. The user can change the directory, and future
debugging reports
will be saved in the indicated directory. Box 409 indicates how many reports
for the
program will be saved; the user can of course change that value as well. If
the selected
program is currently being executed by debugger client 203, the user can click
on update
display button 411. In response thereto, web browser 249 sends a form together
with
Web server client 243's URL. The form indicates the program's pathname and the
current settings in fields 407 and 409, and Web server client 243 responds to
the form by
performing a query on the information for the current execution of the program
in shared
database system 226 and making a new select page 401 in which execution
listing 413 is
updated to reflect the most recent updates of database 229 by debugger client
203.
Further, the directory for the debugging reports and the number of reports
saved will be
changed as indicated in boxes 407 and 409.
Once the user has selected a program execution, the user may select other HTML
pages
to obtain more detailed information about that execution. An HTML page is
selected by
selecting one of the tabs 403. Each time the user selects a tab, web browser
249 responds
16
SUBSTITUTE SHEET ( ruie 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
by sending the URL of client 243 together with a form which contains an
indication of
the tab that has been selected, the pathname of the program, and an indication
of which
execution listing was selected. Web server client 243 responds to the
information in the
form by performing a query on data base 229 which obtains the information for
the
selected program that is required to make the selected HTML page and returning
the page
with the infonmation to browser 249. If the selected execution is a current
execution, the
selection of a new HTML page will cause a new query of database 229 for
information
about the current execution, and consequently, selection of a new HTML page
has the
same effect as clicking on Update Display button 411.
FIG. 5 shows leak information page 501. This page shows detailed leak
information for
the program execution selected by the user from select page 401. The page has
the same
general format as page 401; information specific to the page is contained in
area 502.
Area 502 has two main parts: control panel 504 and leak information display
525. The
settings of control panel 504 determine what information appears in leak
information
display 525. Control panel 504 contains update display button 411 and a
collect now
button 503. When the user clicks on collect now button 503, the form
transmitted with
the URL to web server client 243 indicates that client 243 is to send a
collect command to
debugger client 203, so that debugger client 203 will perform a garbage
collection in the
near future. The control panel further contains field 507, which permits the
user to filter
the leak information, field 509, which specifies a sort mode, and an
indication of how
much of the information is to be displayed. When the user clicks on update
display
button 411, this infonmation is included in the form which is sent to Web
server client
243 and Web server client 243 uses the information to fonxiulate its query on
database
229 and construct the new leak information page 501.
Leak information display 525 contains a leak listing 527 for each leak. The
listings 527
are ordered by leak size. Each listing 527 contains leak statistics 513 and a
leak stack
trace 529. Leak statistics 513 specify the amount allocated and the amount
leaked in
terms of both bytes and objects. Leak stack trace 529 indicates the execution
path that
resulted in the leak. The execution path has columns for program counters
(523), line
17
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
numbers (521), file names (519), function names (517), and module names (515).
It thus
relates the leak to program counter positions in modules and relates the
program counter
positions to the functions the program counters are in, the files that contain
the source
code for the functions, and the line number in the source code corresponding
to the
program counter position. The information for columns 515, 519, and 521 is of
course
obtained from symbol table 313 for the program.
FIG. 6 shows allocation profiler page 601. This HTML page shows allocations of
memory on the heap during execution of the program. The page has in general
the same
form as page 501, with the changes that correspond to its function. Thus, the
sort 603 is
now by live memory, area 605 displays live and allocated memory in terms of
bytes and
objects, and stack trace 529 gives the execution paths for the allocation
events. The
queries that produce the information on form 601 of course are directed to
allocation
information rather than leak information.
Fig. 7 shows heap statistics page 701. This page contains valid information
only when
debugger client 203 is currently executing a program. Page 701 displays a
running total
of leaked memory recovered by Great Circle and of memory that has been
unmapped by
explicit user calls to free () or delete made by the program. It also breaks
down the
total current heap, which is memory actually still in use, into several
categories:
= Live memory, shown at 703, includes all data structures that are currently
being used
(or at least explicitly pointed to) by program 208.
= Debug info, shown at 709, is the memory that Great Circle itself requires to
keep
track of stack traces and other information about the objects allocated by
program
208.
= Free lists, shown at 711, are structures that Great Circle, like any memory
allocation
function, stockpiles in order to perform future allocations rapidly and
efficiently,
without inducing excessive memory fragmentation.
= Waste, shown at 713, unlike free lists, is memory that is temporarily
unavailable for
future allocations because of fragmentation.
18
SUBSTITUTE SHEET ( ruie 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98122923
The sum of these categories is the current heap size, shown at 717. The
current heap size
is the actual current footprint in memory of program 208 that debugger client
203 is
currently executing. Since Great Circle attempts to reduce the footprint
whenever it can,
Heap Statistics page 701 also shows the maximum heap at 719. The maximum heap
is
the high-water mark of heap usage over the life of prograrn 208.
Other HTML pages produced by Web server client 243
Other HTML pages which the user may select include a settings page, which
permits the
user to set and read a number of parameters that control the operation of
debugger client
205, a log file page which permits the user to view an ASCII log file produced
by
debugger client 203, a page whose selection causes a URL to be sent to
Geodesic
Systems' Web site, and a page whose selection causes a page in the help system
for the
debugging system to be displayed. HTML pages 501 and 501 also include help
buttons
for help that is particularly relevant to those pages. In the following, the
settings page
and the log file page will be discussed in greater detail.
FIG. 8 shows the buttons 801 of the settings page. Each button shows the
current setting
of the parameter specified by the button, and in the case of the writeable
parameters
indicated at 805, 807, 809, 811, 813, 821, 823, 825, and 827, debugger client
203
responds to the new parameter value in real time when the user changes the
parameter
and then clicks on update settings button 803. Clicking on button 803 causes
web
browser 249 to send a form to Web server client 243 that contains the new
parameter
settings and Web server client 243 responds to the form by making an update
query with
the settings that updates the relevant parameters in debugger settings 311. As
previously
mentioned, debugger client 102 queries database 226 to obtain the current
values of
settings 311 as part of each allocate operation, and on reading the settings,
it updates its
parameter values and begins to operate according to the updated parameters.
Changes
made via the settings page affect only the program execution during which they
are set.
Default values for the settings may be supplied when debugger client 203 is
configured.
19
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
The log file page displays the log file, gc. log, that was generated by Great
Circle for
this program run. This file, unlike the files that make up database 229, is in
a plain ASCII
format that is well suited for piping through custom scripts provided by the
user of
debugger system 201.
As can be seen from FIGs. 4-8, the HTML pages produced by Web server client
243 in
response to inputs from Web browser 249 provide a user interface to debugger
client
which is clear and easy to use and can be employed on any system which has a
standard
Web browser and a connection to Internet 259. The interface further permits
the user to
view the results of past executions of programs by debugger client 203 and to
view the
results of a current execution as it happens. While viewing results being
produced by a
current execution, the user may send a collect command and/or new parameter
settings to
debugger client 203, and debugger client 203 will respond in real time to the
collect
command and parameter settings.
Improved memory allocation and footprint management techniques
As mentioned above, the memory debugger of the preferred embodiment is a mode
of
operation of the Great Circle memory management system. In the following, two
improvements in memory allocation and program footprint management that are
employed in the version of the Great Circle memory management system which is
used
in the preferred embodiment of the debugging system are described in detail.
Introduction
The two techniques described in the following are used the preferred
embodiment to
reduce fragmentation which results from the fact that the Great Circle memory
management system uses a non-moving garbage collector, that is, a garbage
collector that
cannot eliminate fragmentation by moving live data, leaving all free space in
consecutive
locations. For details about non-moving and moving garbage collectors, see
Jacques
Cohen and Alexandru Nicolau, "Comparison of compacting algorithms for garbage
collection", ACM Transactions on Programming Languages and Systems, 5(4):532-
553,
October 1983. The first technique is intended to reduce internal fragmentation
in
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
allocators that use a BiBoP scheme (Big-Bag-of-Pages) In a BiBoP allocator,
the
allocator allocates objects that are smaller than a memory page from a free
list in which
the objects are takes from page-size containers. All of the objects allocated
from a given
free list have the same size. Thus, when the allocator is given the size of
the object it is
to allocate, it allocates from the free list into whose objects the object to
be allocated fits
most closely. For details, see Hans-Juergen Boehm and Mark Wieser, "Garbage
collection in an uncooperative environment", Software Practice and Experience,
18(9):
807-820, September 1988. The second technique is intended to reduce external
fragmentation and uses virtual memory primitives that can be found in most
modem
operating systems.
Allocators such as the one described in the Boehm paper cited above have a
number of
free lists for allocating objects of a size such that more than one will fit
onto a memory
page and a single free list for allocating objects that are larger than that.
Objects of a size
such that more than one will fit onto a memory page are termed small objects,
and those
that are larger than that are termed large objects. With all of the small
object free lists,
the container size is 1 page. In this paper, we show that when the allocator
is able to
allocate only from small object free lists and a large object free list,
allocation of small
objects with sizes such that a number of them do not fit compactly into a
single-page
container or of large objects with sizes that do not fit compactly into an
integer number of
pages results in a large internal fragmentation in the free lists. To solve
this problem, the
first technique introduces free lists for allocating objects that do not fit
compactly into a
single-page container but that do fit compactly into a container made of a
number of
consecutive pages. The objects on these free lists are termed herein medium
objects. As
with small objects, there are a number of free lists for medium objects, with
the medium
objects on a given free list all having the same size, and the allocator takes
a medium
object from the free list into whose objects the object being allocated fits
most closely.
Most modem operating systems have separate virtual memory operations for
reserving
virtual address space and committing swap space to the reserved virtual
address space.
21
SUBSTITUTE SHEET ( ruie 26 )

CA 02307297 2006-04-05
WO 99122288 PCT1US98122923
Because this is the case, swap space may be committed and uncommitted at
runtime. The
basic idea of the second technique is to unconunit swap space belonging to
logical pages
in those sections of the large object free list that are too fragmented to be
used for most
large object allocations, and to commit that swap space to logical pages
located at
consecutive locations in the address space. In effect, this technique provides
many of the
defragmentation benefits of moving garbage collection by virtually moving the
free data
rather than the live data. In addition, this technique allows returning to the
operating
systems parts of the heap that were used during periods of heavy allocation
and that are
no longer used. We will refer to this aspect of the technique as footprint
reduction.
The ideas presented here are explained in the context of garbage collection.
Incremental
garbage collectors which use these ideas must have a decommit barrier which
ensures that
the garbage collector does not reference a logical page that has been
decommitted. A
garbage collector with a decommit barrier is described in detail in U.S.
Patent
No. 6,055,612, M. Spertus, et al., Incremental garbage collector with decommit
barrier, filed 7/11/97.
The ideas can, however, also be applied to any general-purpose memory
allocator, regardless of whether it uses garbage collection. In the following,
a preferred
embodiment of these techniques which is employed in the Great Circle memory
management system is explained in detail, beginning with medium objects.
Medium Objects: FIG. 9
Medium objects reduce fragmentation by providing a better fit between the
objects being
allocated and the container which holds them. In Boehm's allocator, the
container size
for all objects which are smaller than or equal to a page is a page; for all
objects which
are larger than a page, the container is the minimum number of pages required
to contain
the object. An important drawback of this approach is that the internal
fragmentation
with small objects that do not fit well into a single page or large objects
that do not fit
well into a multiple of pages can be very large. For example, if a small
object is a little
larger than half a page size, almost half of the page which contains it will
be wasted, and
if a large object is a little larger than a page, almost the entire second
page will be
22

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
wasted. Since we found that these allocation sizes happen to be the common
case for
many applications, we decided to add free lists with medium objects, that is,
free.lists
whose containers are some number of consecutive pages, with the number of
consecutive
pages for a given free list being chosen such that objects of the size
contained in the free
list fit compactly into the container.
The benefits of medium objects can be seen from the following example: let us
assume
that there is a request to allocate an object of 2050 bytes in a system that
has a page size
of 4096. In an allocator that allocates only from free lists of small and
large objects, an
object of such a size is a small object, but only one such small object will
fit in a single
page, and consequently, the allocator will return an object of 4096 bytes
because the
page cannot be subdivided into any smaller equal-size portions that will
contain the
object to be allocated. An allocator that uses medium objects can divide a
container made
up of two consecutive pages into 3 objects of size 2730 bytes (plus 2 spare
bytes that
cannot be divided), and return one of these objects. In the first case, 2046
bytes are
wasted, and in the second case only 680 bytes are wasted.
To put the above more formally, the intelnal fragmentation is the percentage
of wasted
space for a given object size. It can be computed by subtracting the requested
object size
from the real size of the object returned by the allocator and dividing the
result by the real
size.
% Fragmentation =100.0 * (realSize - requestedSize) /realSize
As one would expect from the foregoing, in an allocator without medium
objects, the
fragmentation for objects with sizes around the size of the page approaches
50%.
Especially at sizes 2049 and 4097 bytes (one byte after half the page size and
one byte
after the page size) the fragmentation reaches 50%. With medium objects
however, the
internal fragmentation for these sizes may be bounded to lower levels, with
the bounds
depending on the fit between the sizes of small and medium objects and their
containers.
23
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
The memory allocator of Great Circle allocates objects out of three kinds of
containers:
small objects are allocated out of single-page containers. Medium objects are
allocated
out of containers that are made of consecutive pages. Large objects are
objects for
which more than one page is allocated. The small and medium object allocators
have a
separate bucket for each of the sizes of objects that they allocate. Each of
the buckets is
what is termed a segregated free list. See Paul R. Wilson, Mark S. Johnstone.
Michael
Neely, and David Boles, Dynamic Storage Allocation: A survey and Critical
Review,
available for anonymous FTP from cs.utexas.edu in /pub/garbage/ in October,
1998.
FIG. 9 shows the structure of a bucket 901. Each bucket 901 is made up of a
page
information structure 907 which includes information 904 indicating the size
of the
objects that will be allocated from the bucket and a free list pointer 906
indicating the
head of the list of unallocated objects 911 contained in bucket 901. The
objects 911 are
stored in one or more containers 917, which are made up of one or more
contiguous
logical pages 905. The size of the container is the number of logical pages
905 which
reduces waste 910 to a minimum for the size of object 911 stored in the
bucket. Each
object 911(i) which has not yet been allocated has an object free list pointer
913 pointing
to the next unallocated object 911. When an object is allocated, the free list
pointer 913
is overwritten by data and free list pointer 906 is set to point to the next
unallocated
object 911 in the list. When an object is freed, the allocator to which the
bucket belongs
links the freed object in at the head of the free list. This has the advantage
that an object
that has been used tends to be reused before it is removed from the caches in
the machine
that the program that uses the object is executing on. When a bucket 901 runs
out of
unallocated objects 911, the allocator that uses the bucket obtains an
additional container
917 for the bucket from the large object allocator.
FIG. 11 shows small object buckets, medium object buckets, and large object
free list as
they may be employed in a memory allocation system that employs small and
medium
objects. There is a set of small object buckets 1107 for small objects 1104,
that is objects
that have sizes such that they fit into a 1-page container 1105 with little
waste. Each
small object bucket 1103 contains small objects of a single size.
24
SUBSTITUTE SHEET ( rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
There is further a set of medium object buckets 1113 for medium objects 1112,
that is,
objects that have sizes such that they fit into a multi-page container 1111
with little
waste. Again, each medium object bucket 1109 contains medium objects of a
single size,
and the size of multi-page container 111 is chosen to minimize waste for the
size of
medium object in bucket 1109.
Large object free list 115, finally, can be seen as a free list in which each
large object to
be allocated has its own bucket that contains the number of pages required to
allocate the
large object. Large object free list 115 is a list of free logical pages that
is ordered by
address. Ordering by address permits coalescing of objects that are returned
to the large
object free list. The allocator satisfies a request for a large object by
returning the first
block of pages in the free list that is large enough to accommodate the large
object.
Access by the allocator to the buckets and large object free list is speeded
up by bytes-to-
bucket table 1119, which maps the size of an object to be allocated in bytes
to the bucket
which contains the objects into which the object to be allocated fits most
closely or to the
free list if the object is larger than the largest medium object.
A preferred embodiment sets up buckets 1107 and 1113 as required by the page
sizes
and data granularities of the system that the allocator is allocating memory
for. The
algorithm first sets up small object buckets for single-word objects and
objects containing
1 to 8 double words; then the algorithm sets up buckets for objects of
increasing size up
to I page. For each size, the algorithm determines how much waste widl results
if a small
object bucket 1107 is made for the size, and if the waste is above a
threshold, the
algorithm determines the size of container required for a medium object bucket
for the
object and sets up the medium object bucket. It should be noted here that
medium
objects need not be less than a page in size. For example, if objects of a
size of 1 1/3
pages were common, it might be worthwhile to set up a medium object bucket
that had a
container size of four pages.
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
Free list defragmentation and footprint reduction: FIG. 10
The second technique reduces fragmentation in free list 1115 of large objects.
Notice
that the small and medium object buckets 1107 and 1113 are relatively
unaffected by
external fragmentation, because the free elements in a small or medium object
bucket are
always large enough to satisfy an allocation request where the object being
allocated is
taken from the bucket. In addition, the technique can also uncommit physical
memory
pages to which logical memory pages in the free list are mapped, allowing long-
running
programs to reduce their swap space requirements when their memory
requirements
decrease.
Free list defragmentation is based on the observation that moving collectors
make the
free memory space contiguous by moving the live data. However, the free memory
space
by definition contains no live data; consequently, it can be made contiguous
simply by
committing the physical pages corresponding to the free memory space to a
different
portion of the virtual address space where the free memory space will have
contiguous
virtual addresses. This provides a major defragmentation benefit of moving
collection
without the complexity, restrictions, or expense of moving data and updating
pointers.
Fig. 10 shows how defragmentation works. On the left side, there is a
representation 1005
of the heap in virtual memory and in physical memory prior to footprint
reduction. The
heap is part of an arena 1006 which is a range of contiguous virtual
addresses. Arena
1006 is subdivided into logical pages 905, some of which have physical pages
1002
committed to them in the swap space. Prior to defragmentation, seven logical
pages 905
have physical pages 1002 committed to them; four of the pages, indicated by L,
contain
live data; three of the pages, indicated by F, are free: three pages with free
objects, and
three pages, indicated by the fact that they are blank, are uncommitted, i.e.,
do not have
swap space assigned. The three free logical pages 905 do not occupy
consecutive
locations in the virtual address space, and therefore a request to the
allocator for a three-
page object cannot be satisfied with the available free logical pages.
Defragmentation de-
commits the physical pages 1002 from the three free non-consecutive logical
pages 905
26
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
to which they are committed in representation 1005, making them available to
be
conunitted to consecutive logical pages 905, as shown at 1009 in
representation 1007.
The large object can thus be allocated from the pages at 1009 without
increasing the swap
space.
To implement defragmentation and footprint reduction, the pages of the heap
are
represented by an array of bytes called page-flags, where each byte represents
a page.
Every bit in a byte represents a different characteristic of the page. For
defragmentation
and footprint reduction, only three bits in each byte are used: committed-bit,
free-bit, and
recently used-bit. The array is shown at 1011. There is a page flag entry 1011
for each
logical page 905 in arena 1006; the relevant flags appear as committed bit
1015, free bit
1017, and recently-used bit 1019. Committed bit 1015 is used in the garbage
collector's
decommit barrier. Before the garbage collector references a logical page 905,
it checks
committed bit 1015 in the logical page's page flag entry and makes the
reference only if
the committed bit is set.
At initialization time, the allocator creates arena 1006 by mapping a large
sequence of
logical pages 905. This mapping operation reserves the virtual address space
required for
the logical pages, but does not commit swap space to any of the pages. Since
the arena
has been mapped, no other memory map operation will return a page in this
range.
However, since no swap space is reserved, a memory read/write operation to a
word in
this range of pages at this point in the execution of the program may result
in a
segmentation violation. Finally, all of the flags in the PFEs 1013 for logical
pages 905 are
cleared.
During a request for allocation of a large object, if the request cannot be
satisfied with the
existing objects in the free list, the allocator will do the following. It
will search in page-
flags 1011 for a set of free logical pages 905 in arena 1006 which are at
contiguous
locations in the virtual address space and which are together large enough to
satisfy the
request or some larger amount if the requested size is too small. Then it will
call a virtual
memory operation to commit swap space for this range of pages. The swap space
of
27
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCTIUS98/22923
course includes the earlier decommitted physical pages 1002. The reason a
larger amount
is committed if the requested size is too small is to amortize the cost of the
virtual
memory operation. This range of pages is returned to the free list, the
physical pages
1002 for the non-contiguous free logical pages 905 are committed to the
contiguous free
logical pages 905, and the corresponding committed-bits and free-bits in the
PFEs 1013
for the logical pages 905 involved in the operation are updated. Finally, the
allocation
request is satisfied. If the number of consecutive uncommitted pages in arena
1006 is not
enough, another large group of uncommitted memory is mapped and added to arena
1006.
Footprint reduction is done using recently-used bits 1019. Whenever a group of
logical
pages 905 is returned to the free-list, the corresponding recently used-bits
and the free-
bits are set. The recently used-bits tell the allocator that the corresponding
page has been
recently used and that it is not a good candidate for footprint reduction.
During a
footprint reduction, the physical pages 1002 corresponding to logical pages
905 whose
recently-used bits 1019 are cleared are uncommitted from those logical pages
905, i.e.,
committed bits 1015 for the logical pages 905 are cleared and the swap space
represented
by the physical pages 1002 is returned to the operating system. When the
execution of
the program terminates, the recently used-bit is cleared for all of the
logical pages 905 in
its arena 1006.
The frequency with which footprint reduction is executed is linked to the
activity of the
allocator. In our implementation, a footprint reduction is performed after a
pre-specified
number of garbage collections. If a logical page 905 has remained on free list
901 during
this pre-specified number of garbage collections, its physical page 1002 is
uncommitted
and returned to the operating system. Programs that explicitly manage their
memory will
run a footprint reduction after a pre-specified number of bytes have been
explicitly
returned to the free-list. Alternatively Great Circle supplies a footprint
reduction
procedure that the program can explicitly call after periods of heavy
allocation.
28
SUBSTITUTE SHEET (rule 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
Alternatives to the commit/uncommit operations are the map/unmap operations.
The
difference is that the uncommit memory operations return the associated swap
space to
the operating system, however the address space range is kept. The unmap
operation
returns both the address space and the swap space to the operating system. We
have
decided to use the commit/uncommit operations over a contiguous uncommitted
arena
because it allows recycling address space. The map operation can return memory
mappings that are not contiguous, resulting in a heap whose virtual address
space has
holes.
Another modification for footprint reduction is that during the allocation of
large objects
every search in free list 1115 always starts from the first block in the list.
This will result
in reusing the same large objects most of the time and leaving the least used
objects at the
end of the list. If a new search started where the previous one ended it would
reuse all the
objects in the list and would not give the opportunity for footprint
reduction.
A good side effect of footprint reduction is that pages that are black-listed,
and therefore
cannot be used because they are being pointed by false pointers, are unmapped
if they
continue black-listed for several consecutive allocations. For details on
black-listed
pages, see Hans-Juergen Boehm, "Space-efficient conservative garbage
collection". In
Proceedings of the 1993 SIGPLAN Conference on Programming Language Design and
Implementation, Albuquerque, New Mexico, June 1993. ACM Press, pages 197-206.
Conclusion
The foregoing Detailed Description has disclosed to those skilled in the arts
to which it
pertains how to make and use debugging systems in which a database system
mediates
between the debugger and the interface the user employs to see the results of
execution of
a program by a debugger. The Detailed Description has provided a detailed
disclosure
of a preferred embodiment in which the debugger is a memory debugger and the
interfaces employed by the users include a CLI interface and a Web browser
interface. It
will, however, be immediately apparent to those skilled in the relevant arts
that
29
SUBSTITUTE SHEET ( ruie 26 )

CA 02307297 2000-04-17
WO 99/22288 PCT/US98/22923
debugging systems of the type described herein may be made using any type of
interactive debugger and any type of user interface. Moreover, the database
may be
implemented using a commercially-available database system, as well as one
designed
specifically for the debugging system. The manner in which the debugger, the
debugging
system, and the user interface components interact will of course depend on
the
requirements of the debugging system and the capacities of the database
system. The
process architecture of the debugging system may similarly vary between one
extreme in
which all components execute in a single process and another extreme in which
each
component consists of one or more processes. The Detailed Description has
further
included details of the HTML pages used in a preferred embodiment; however,
what is
on an HTML page in a system that is built according to the principles
disclosed herein
and that employs a Web browser as a user interface will depend on the nature
of the
debugging being done and the taste of the designer of the HTML pages.
For all of the foregoing reasons, the Detailed Description is to be regarded
as being in all
respects exemplary and not restrictive, and the breadth of the invention
disclosed here in
is to be determined not from the Detailed Description, but rather from the
claims as
interpreted with the full breadth permitted by the patent laws.
What is claimed is:
SUBSTITUTE SHEET (rule 26 )

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

2024-08-01:As part of the Next Generation Patents (NGP) transition, the Canadian Patents Database (CPD) now contains a more detailed Event History, which replicates the Event Log of our new back-office solution.

Please note that "Inactive:" events refers to events no longer in use in our new back-office solution.

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Event History , Maintenance Fee  and Payment History  should be consulted.

Event History

Description Date
Time Limit for Reversal Expired 2017-10-30
Letter Sent 2016-10-28
Inactive: Office letter 2016-02-12
Letter Sent 2015-08-28
Letter Sent 2015-08-28
Inactive: Multiple transfers 2015-08-07
Maintenance Request Received 2012-10-22
Grant by Issuance 2009-07-21
Inactive: Cover page published 2009-07-20
Pre-grant 2009-05-04
Inactive: Final fee received 2009-05-04
Notice of Allowance is Issued 2009-02-12
Letter Sent 2009-02-12
Notice of Allowance is Issued 2009-02-12
Inactive: Approved for allowance (AFA) 2008-12-09
Amendment Received - Voluntary Amendment 2008-07-23
Inactive: IPRP received 2008-07-16
Inactive: S.30(2) Rules - Examiner requisition 2008-02-28
Amendment Received - Voluntary Amendment 2007-12-07
Letter Sent 2007-11-14
Inactive: Single transfer 2007-09-28
Inactive: S.30(2) Rules - Examiner requisition 2007-06-07
Letter Sent 2007-03-28
Inactive: Multiple transfers 2007-02-23
Inactive: Office letter 2007-01-25
Letter Sent 2006-12-13
Inactive: Multiple transfers 2006-11-01
Amendment Received - Voluntary Amendment 2006-04-05
Inactive: S.30(2) Rules - Examiner requisition 2005-10-12
Letter Sent 2003-09-11
All Requirements for Examination Determined Compliant 2003-08-25
Request for Examination Requirements Determined Compliant 2003-08-25
Request for Examination Received 2003-08-25
Letter Sent 2000-11-21
Inactive: Single transfer 2000-10-24
Inactive: Cover page published 2000-07-19
Inactive: First IPC assigned 2000-06-28
Inactive: Courtesy letter - Evidence 2000-06-20
Inactive: Notice - National entry - No RFE 2000-06-13
Application Received - PCT 2000-06-07
Application Published (Open to Public Inspection) 1999-05-06

Abandonment History

There is no abandonment history.

Maintenance Fee

The last payment was received on 2008-10-22

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
SYMANTEC CORPORATION
Past Owners on Record
CHARLES FITERMAN
GUSTAVO RODRIGUEZ RIVERA
MICHAEL P. SPERTUS
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative drawing 2000-07-14 1 9
Description 2000-04-17 30 1,683
Abstract 2000-04-17 1 61
Drawings 2000-04-17 11 760
Claims 2000-04-17 8 259
Cover Page 2000-07-14 2 75
Description 2006-04-05 30 1,666
Claims 2007-12-07 8 190
Claims 2008-07-23 10 278
Representative drawing 2008-12-12 1 11
Cover Page 2009-06-22 1 50
Reminder of maintenance fee due 2000-06-29 1 109
Notice of National Entry 2000-06-13 1 192
Courtesy - Certificate of registration (related document(s)) 2000-11-21 1 113
Reminder - Request for Examination 2003-07-02 1 112
Acknowledgement of Request for Examination 2003-09-11 1 173
Courtesy - Certificate of registration (related document(s)) 2006-12-13 1 106
Courtesy - Certificate of registration (related document(s)) 2007-03-28 1 105
Courtesy - Certificate of registration (related document(s)) 2007-11-14 1 104
Commissioner's Notice - Application Found Allowable 2009-02-12 1 163
Courtesy - Certificate of registration (related document(s)) 2015-08-28 1 102
Courtesy - Certificate of registration (related document(s)) 2015-08-28 1 101
Maintenance Fee Notice 2016-12-09 1 178
Correspondence 2000-06-13 1 15
PCT 2000-04-17 5 196
Fees 2003-08-29 1 36
Fees 2002-08-28 1 36
Fees 2000-10-10 1 35
Fees 2001-10-04 1 36
Fees 2004-10-01 1 36
Fees 2005-10-11 1 37
Fees 2006-10-02 1 32
Correspondence 2007-01-25 1 11
Fees 2007-07-06 1 36
PCT 2000-04-18 3 106
Fees 2008-10-22 1 34
Correspondence 2009-05-04 1 37
Fees 2009-10-21 1 38
Fees 2010-09-23 1 42
Fees 2011-08-30 1 37
Fees 2012-10-22 1 39
Courtesy - Office Letter 2016-02-12 1 26