[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

PurifyPlus is a memory debugger program used by software developers to detect memory access errors in programs, especially those written in C or C++. It was originally written by Reed Hastings of Pure Software.[1] Pure Software later merged with Atria Software to form Pure Atria Software, which in turn was later acquired by Rational Software, which in turn was acquired by IBM, and then divested to UNICOM Systems, Inc. on Dec 31, 2014. It is functionally similar to other memory debuggers, such as Insure++, Valgrind and BoundsChecker.

UNICOM PurifyPlus
Original author(s)Pure Software
Developer(s)UNICOM Systems, a division of UNICOM Global
Stable release
8.2 / September 20, 2024
Operating systemWindows, Linux, Solaris
TypeMemory debugger
LicenseProprietary software
Websitewww.teamblue.unicomsi.com/products/purifyplus/

Overview

edit

PurifyPlus allows dynamic verification, a process by which a program discovers errors that occur when the program runs, much like a debugger. Static verification or static code analysis, by contrast, involves detecting errors in the source code without ever compiling or running it, just by discovering logical inconsistencies. The type checking by a C compiler is an example of static verification.

When a program is linked with PurifyPlus, corrected verification code is automatically inserted into the executable by parsing and adding to the object code, including libraries. That way, if a memory error occurs, the program will print out the exact location of the error, the memory address involved, and other relevant information. PurifyPlus also detects memory leaks. By default, a leak report is generated at program exit but can also be generated by calling the PurifyPlus leak-detection API from within an instrumented application.

The errors that PurifyPlus discovers include array bounds reads and writes, trying to access unallocated memory, freeing unallocated memory (usually due to freeing the same memory for the second time), as well as memory leaks (allocated memory with no pointer reference). Most of these errors are not fatal (at least not at the site of the error), and often when just running the program there is no way to detect them, except by observing that something is wrong due to incorrect program behavior. Hence PurifyPlus helps by detecting these errors and telling the programmer exactly where they occur. Because PurifyPlus works by instrumenting all the object code, it detects errors that occur inside of third-party or operating system libraries. These errors are often caused by the programmer passing incorrect arguments to the library calls, or by misunderstandings about the protocols for freeing data structures used by the libraries. These are often the most difficult errors to find and fix.

Differences from traditional debuggers

edit

The ability to detect non-fatal errors is a major distinction between PurifyPlus and similar programs from the usual debuggers. By contrast, debuggers generally only allow the programmer to quickly find the sources of fatal errors, such as a program crash due to dereferencing a null pointer, but do not help to detect the non-fatal memory errors. Debuggers are useful for other things that PurifyPlus is not intended for, such as for stepping through the code line by line or examining the program's memory by hand at a particular moment of execution. In other words, these tools can complement each other for a skilled developer.

PurifyPlus also includes other functionality, such as high-performance watchpoints, which are of general use while using a debugger on one's code.

It is worth noting that using PurifyPlus makes the most sense in programming languages that leave memory management to the programmer. Hence, in Java, Lisp, or Visual Basic, for example, automatic memory management reduces occurrence of any memory leaks. These languages can however still have leaks; unnecessary references to objects will prevent the memory from being re-allocated. IBM has a product called Rational Application Developer to uncover these sorts of errors.

Supported platforms

edit

Supported C/C++ platforms

edit
Operating system Processor architectures Operating system versions Compilers
Solaris
Sun UltraSPARC Solaris 11 base through 11.4
Solaris 10 base through U11
Sun C/C++ 5.10 through 5.15
AMD64
Intel 64
Solaris 11 base through 11.4
Solaris 10 U6 through U11
Sun C/C++ 5.10 through 5.15
Linux
Intel IA-32 RHEL 9 (Server/Desktop) base through 9.4
RHEL 8 (Server/Desktop) base through 8.9
RHEL 7 (Server/Desktop) base through 7.9
SLES 15 base through 15.5
SLES 12 base through 12.5
GNU gcc/g++ 4 through 11
AMD64
Intel 64
RHEL 9 (Server/Desktop) base through 9.4
RHEL 8 (Server/Desktop) base through 8.9
RHEL 7 (Server/Desktop) base through 7.9
SLES 15 base through 15.5
SLES 12 base through 12.5
GNU gcc/g++ 4 through 11
Windows
Intel IA-32
Intel 64
AMD 64
Microsoft Windows 10 base through 21H1
Microsoft Windows Server 2019 Standard, Data Center
Microsoft Windows Server 2016 Standard, Data Center
Microsoft Windows Server 2012 Foundation, Essential, Standard, Data Center
Microsoft Visual Studio 2010 through 2022

Supported Java/.NET platforms

edit
Platform Data collection type Runtime environment
Windows
C/C++ (unmanaged code) data collection Microsoft Visual Studio 2010 through 2022
Java code coverage data collection IBM JRE 5 through 8
SUN JRE 1.5 through 1.8
.NET (managed code) data collection .NET Framework 3.0 through 4.5 used with Microsoft Visual Studio 2010 through 2022

See also

edit

References

edit
  1. ^ Purify: fast detection of memory leaks and access errors. by Reed Hastings and Bob Joyce, Usenix Winter 1992 technical conference.
edit