DEBUGGING FEATURES FOR CLIENT OBJECTS
design.mps.object-debug
incomplete doc
pekka 1998-09-10
INTRODUCTION
.intro: This is the design for all the various debugging features that MPS
clients (and sometimes MPS developers) can use to discover what is happening to
their objects and the memory space.
.readership: MPS developers.
Document History
.hist.0: The first draft merely records all the various ideas about
fenceposting that came up in discussions in June, July and September 1998.
This includes the format wrapping idea from mail.ptw.1998-06-19.21-13(0).
pekka 1998-09-10
OVERVIEW
.over.fenceposts: In its current state, this document mostly talks about
fenceposts, straying a little into tagging where theses features have an effect
on each other. [There exist other documents that list other required features,
and propose interfaces and implementations. These will eventually be folded
into this one. pekka 1998-09-10]
REQUIREMENTS
.req.fencepost: Try to detect overwrites and underwrites of allocated blocks by
adding fenceposts (source req.product.??? VC++, req.epcore.fun.debug.support).
.req.fencepost.size: The fenceposts should be at least 4 bytes on either side
or 8 bytes if on one side only, with an adjustable content (although VC++ only
has 4 bytes with pattern 0xFDFDFDFD, having unwisely combined the
implementation with other debug features).
.req.fencepost.check: There should be a function to check all the fenceposts
(source req.epcore.fun.debug.support).
.req.free-block: Try to detect attempts to write and read free blocks.
.req.walk: There should be a way to map ("walk") a user function over all
allocated objects (except PS VM objects), possibly only in a separate debugging
variety/mode (source req.epcore.fun.debug.support).
.req.tag: There should be a way to store at least a word of user data (a "tag",
borrowing the SW term) with every object in debugging mode, to be used in
memory dumps (source req.product.??? VC++). .req.tag.walk: The walking
function (as required by .req.walk) should have access to this data (source
req.epcore.fun.debug.support).
.req.dump.aver: It must be possible to perform a memory dump after an AVER has
fired (naturally, if the information required for the dump has been corrupted,
it will fail, as softly as possible). (source @@@@)
[There are more, especially about memory dumps and allocation locations. pekka
1998-09-10]
SOLUTION IDEAS
.note.assumptions: I've tried not to assume anything about the coincidence of
manual/automatic, formatted/unformatted, and ap/mps_alloc. I think those
questions deserve to be decided on their own merits. instead of being
constrained by a debug feature.
.fence.content.repeat: The content of a fencepost could be specified as a
byte/word which used repeatedly to fill the fencepost.
.fence.content.template: The content could be given as a template which is of
the right size and is simply copied onto the fencepost.
.fence.walk: .req.fencepost.check requires the ability to find all the
allocated objects. In formatted pools, this is not a problem. In unformatted
pools, we could use the walker. It's a feasible strategy to bet that any pool
that might have to support fenceposting will also have a walking requirement.
.fence.tag: Fenceposting also needs to keep track which objects have
fenceposts. unless we manage to do them all. It would be easiest to put this
in the tags.
.fence.check.object: A function to check the fenceposts on a given object would
be nice.
.fence.ap: AP's could support fenceposting transparently by having a mode where
mps_reserve always goes out-of-line and fills in the fenceposts (the pool's
BufferFill method isn't involved). This would leave the MPS with more freedom
of implementation, especially when combined with some of the other ideas. We
think doing a function call for every allocation is not too bad for debugging.
.fence.outside-ap: We could also let the client insert their own fenceposts
outside the MPS allocation mechanism. Even if fenceposting were done like
this, we'd still want it to be an MPS feature, so we'd offer sample C macros
for adding the size of the fencepost and filling in the fencepost pattern.
Possibly something like this (while we could still store the parameters in the
pool or ap, there seems little point in doing so in this case, and having them
as explicit parameters to the macros allows the client to specify constants to
gain effiency):
#define mps_add_fencepost(size, fp_size)
#define mps_fill_fenceposts(obj, size, fp_size, fp_pattern)
The client would need to supply their own fencepost checking function,
obviously, but again we could offer one that matches the sample macros.
.fence.tail-only: In automatic pools, the presence of a fencepost at the head
of the allocated block results in the object reference being an internal
pointer. This means that the format or the pool would need to know about
fenceposting and convert between references and pointers. This would slow down
the critical path when fenceposting is used. This can be ameliorated by
putting a fencepost at the tail of
the block only: this obviates the internal pointer problem and could provide
almost the same degree of checking (provided the size was twice as large),
especially in copying pools, where there are normally no gaps between allocated
blocks. In addition to the inescapable effects on allocation and freeing
(including copying and reclaim thereunder), only scanning would have to know
about fenceposts. .fence.tail-only.under: Walking over all the objects in the
pool would be necessary to detect underwrites, as one couldn't be sure that
there is a fencepost before any given object (or where it's located exactly).
If the pool were doing the checking, it could be sure: it would know about
alignments and it could put fenceposts in padding objects (free blocks will
have them because they were once allocated) so there'd be one on either side of
any object (except at the head of a segment, which is not a major problem, and
could be fixed by adding a padding object at the beginning of every segment).
This requires some cleverness to avoid splinters smaller than the fencepost
size, but it can be done.
.fence.wrapper: On formatted pools, fenceposting could be implemented by
"wrapping" the client-supplied format at creation time. The wrapper can handle
the conversion from the fenceposted object and back. This will be invisible to
the client and gives the added benefit that the wrapper can validate fenceposts
on every format operation, should it desire. That is, the pool would see the
fenceposts as part of the client object, but the client would only see its
object; the format wrapper would translate between the two. Note that hiding
the fenceposts from scan methods, which are required to take a contiguous range
of objects, is a bit complicated. .fence.client-format: The MPS would supply
such a wrapper, but clients could also be allowed to write their own
fenceposted formats (provided they coordinate with allocation, see below).
This would make scanning fenceposted segments more efficient.
.fence.wrapper.variable: Furthermore, you could create different classes of
fencepost within a pool, because the fencepost itself could have a variable
format. For instance, you might choose to have the fencepost be minimal (1-2
words) for small objects, and more detailed/complex for large objects
(imagining that large objects are likely vector-ish and subject to overruns).
You could get really
fancy and have the fencepost class keyed to the object class (e.g., different
AP's create different classes of fenceposting).
.fence.wrapper.alloc: Even with a wrapped format, allocation and freeing would
still have know about the fenceposts. If allocation points are used, either
MPS-side (.fence.ap) or client-side (.fence.outside-ap) fenceposting could be
used, with the obvious modifications. .fence.wrapper.alloc.format: We could
add three format methods, to adjust the pointer and the size for alloc and
free, to put down the fenceposts during alloc, and to check them; to avoid
slowing down all allocation, this would require some MOPping to make the format
class affect the choice of the alloc and free methods (see
mail.pekka.1998-06-11.18-18). .fence.wrapper.alloc.size: We could just
communicate the size of the fenceposts between the format and the allocation
routines, but then you couldn't use variable fenceposts
(.fence.wrapper.variable). [All this applies to copying and reclaim
in a straight-forward manner, I think.]
.fence.pool.wrapper: Pools can be wrapped as well. This could be a natural way
to represent/implement the fenceposting changes to the Alloc and Free methods.
[@@@@alignment]
.fence.pool.new-class: We could simply offer a debugging version of each pool
class (e.g., mps_pool_class_mv_debug). As we have seen, debugging features
have synergies which make it advantageous to have a coordinated implementation,
so splitting them up would not just complicate the client interface, it would
also be an implementation problem; we can turn features on or off with pool
init parameters.
.fence.pool.abstract: We could simply use pool init parameters only to control
all debugging features (optargs would be useful here). While there migh be
subclasses and wrappers internally, the client would only see a single pool
class; in the internal view, this would be an abstract class, and the
parameters would determine which concrete class actually gets instantiated.
.tag.out-of-line: It would be nice if tags were stored out-of-line, so they can
be used to study allocation patterns and fragmentation behaviours. Such an
implementation of tagging could also easily be shared among several pools.
ARCHITECTURE
.pool: The implementation is at the pool level, because pools manage allocated
objects. A lot of the code will be generic, naturally, but the data structures
and the control interfaces attach to pools. In particular, clients will be
able to use tagging and fenceposting separately on each pool.
.fence.size: Having fenceposts of adjustable size and pattern is quite useful.
We feel that restricting the size to an integral multiple of the [pool or
format?] alignment is harmless and simplifies the implementation enormously.
.fence.template: We use templates (.fence.content.template) to fill in the
fenceposts, but we do not give any guarantees about the location of the
fenceposts, only that they're properly aligned. This leaves us the opportunity
to do tail-only fenceposting, if we choose.
.fence.slop: [see impl.c.dbgpool.FenceAlloc @@@@]
.fence.check.free: We check the fenceposts when freeing an object.
.unified-walk: Combine the walking and tagging requirements (.req.tag.walk and
@@@@) into a generic facility for walking and tagging objects with just one
interface and one name: tagging. Also combine the existing formatted object
walker into this metaphor, but allowing the format and tag parameters of the
step function be optional [this part has not been implemented yet pekka
1998-09-10].
.init: It simplifies the implementation of both tagging and fenceposting if
they are always on, so that we don't have to keep track of which objects have
been fenceposted and which have not, and don't have to have three kinds of
tags: for user data, for fenceposting, and for both. So we determine this at
pool init time (and let fenceposting turn on tagging, if necessary).
.pool-parameters: Fencepost templates and tag formats are passed in as pool
parameters.
.modularity: While a combined generic implementation of tags and fenceposts is
provided, it is structured so that each part of it could be implemented by a
pool-specific mechanism with a minimum of new protocol. [This will be
improved, when we figure out formatted pools -- they don't need tags for
fenceposting.]
.out-of-space: If there's no room for tags, we will not dip into the reservoir,
just fail to allocate the tag. If the alloc call had a reservoir permit, we
let it succeed even without a tag, and just make sure the free method will not
complain if it can't find a tag. If the call didn't have a reservoir permit,
we free the block allocated for the object and fail the allocation, so that the
client gets a chance
to do whatever low-memory actions they might want to do. [Should this depend
on whether there is anything in the reservoir?] This breaks the 1-to-1
relationship between tags and objects, so some checks cannot be made, but we do
count the "lost" tags.
[need to hash out how to do fenceposting in formatted pools]
Client interface
.interface.fenceposting:
.interface.fenceposting.check: A function to check all fenceposts in a pool
(AVERs if a problem is found)
void mps_pool_check_fenceposts(mps_pool_t pool);
[from here on, these are tentative and incomplete]
.interface.fenceposting.format: A function to wrap a format (class) to provide
fenceposting
mps_res_t mps_fmt_fencepost_wrap(mps_fmt_t *format_return,
mps_arena_t arena,
mps_fmt_t format,
[fp parameters])
.interface.fenceposting.add: A format method to adjust size of a block about to
be allocted to allow for fenceposts
void (*mps_fmt_adjust_fencepost_t)(size_t *size_io)
.interface.fenceposting.add: A format method to add a fencepost around a block
about to be allocated [the NULL method adds a tail fencepost]
void (*mps_fmt_put_fencepost_t)(mps_addr_t * addr_io, size_t size)
.interface.fenceposting.add: A format method to check the fenceposts around an
object [the NULL method checks tails]
mps_bool_t (*mps_fmt_check_fenceposts_t)(mps_addr_t)
.interface.fenceposting.pool: A function to wrap a pool class to provide
fenceposting (note absence of arena parameter)
mps_class_t mps_debug_class(mps_class_t class)
.interface.tags.alloc: Three functions to replace existing mps_alloc
(request.???.??? proposes to remove the varargs)
mps_res_t mps_alloc(mps_addr_t *, mps_pool_t, size_t);
mps_res_t mps_alloc_dbg(mps_addr_t *, mps_pool_t, size_t, ...);
mps_res_t mps_alloc_dbg_v(mps_addr_t *, mps_pool_t, size_t,
va_list);
.interface.tags.walker: Functions to walk all the allocated objects in a pool
or an arena (only client pools in this case), format and tag_data can be NULL
(tag_data really wants to be void *, not mps_addr_t, because it's stored
together with the internal tag data in an MPS internal pool)
void (*mps_objects_step_t)(mps_addr_t addr, size_t size, mps_fmt_t format,
mps_pool_t pool, void *tag_data, void *p)
void mps_pool_walk(mps_arena_t arena, mps_pool_t pool,
mps_objects_step_t step, void *p)
void mps_arena_walk(mps_arena_t arena, mps_objects_step_t step, void *p)
Examples
.example.debug-alloc:
#define MPS_ALLOC_DBG(res_io, addr_io, pool, size)
MPS_BEGIN
static mps_tag_A_s _ts = { __FILE__, __LINE__ };
*res_io = mps_alloc(addr_io, pool, size, _ts_)
MPS_END
IMPLEMENTATION
.new-pool: The client interface to control fenceposting consists of the new
classes mps_pool_class_mv_debug, mps_pool_class_epdl_debug, and
mps_pool_class_epdr_debug, and their new init parameter of type
mps_pool_debug_option_s. [This is a temporary solution, to get it out without
writing lots of new interface. pekka 1998-09-10]
.new-pool.impl: The debug pools are implemented using the "class wrapper"
EnsureDebugClass, which produces a subclass with modified init, finish, alloc,
and free methods. These methods are implemented in the generic debug class
code (impl.c.dbgpool), and are basically wrappers around the superclass methods
(invoked through the pool->class->super field). To find the data stored in the
class for the debugging features, they use the debugMixin method provided by
the subclass. So to make a debug subclass, three things should be provided: a
structure definition of the instance containing a PoolDebugMixinStruct, a pool
class function that uses
EnsureDebugClass, and a debugMixin method that locates the PoolDebugMixinStruct
within an instance.
.tags.splay: The tags are stored in a splay tree of tags allocated from a
subsidiary MFS pool. The client needs to specify the (maximum) size of the
client data in a tag, so that the pool can be created.
[Lots more should be said, eventually. pekka 1998-09-10]
A. References
B. Document History
| 2002-06-07 | RB | Converted from MMInfo database design document. |
C. Copyright and License
This document is copyright © 2001 Ravenbrook Limited. All rights reserved. This is an open source license. Contact Ravenbrook for commercial licensing options.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
- Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
- Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
- Redistributions in any form must be accompanied by information on how to obtain complete source code for the this software and any accompanying software that uses this software. The source code must either be included in the distribution or be available for no more than the cost of distribution plus a nominal fee, and must be freely redistributable under reasonable conditions. For an executable file, complete source code means the source code for all modules it contains. It does not include source code for modules or files that typically accompany the major components of the operating system on which the executable file runs.
This software is provided by the copyright holders and contributors "as is" and any express or implied warranties, including, but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement, are disclaimed. In no event shall the copyright holders and contributors be liable for any direct, indirect, incidental, special, exemplary, or consequential damages (including, but not limited to, procurement of substitute goods or services; loss of use, data, or profits; or business interruption) however caused and on any theory of liability, whether in contract, strict liability, or tort (including negligence or otherwise) arising in any way out of the use of this software, even if advised of the possibility of such damage.