Aggregating data for debugging software

ABSTRACT

A method for obtaining data to debug an issue that affects a software application. In an embodiment, the method includes at least one computer processor receiving a request to obtain data associated with an issue that affects an executing software application. The method further includes determining a set of memory spaces utilized by the executing software application and one or more processes supporting the executing software application. The method further includes initiating a dump function to obtain data within the memory spaces of the determined set of memory spaces. The method further includes storing the data related to the dumped set of memory spaces by (i) high-speed capture and aggregation of data to volatile memory and (ii) spooling data within volatile memory to persistent memory for storage.

BACKGROUND OF THE INVENTION

The present invention relates generally to the field debugging softwareapplications, and more particularly to identifying and collecting datafor analysis of non-fatal abnormalities that occur during the executionof a software application.

A software application may be comprised of a plurality of modules,environments, executable files, and dynamically linked libraries thatexecute within one or more memory spaces. A software application candrive a number of end-user programs to perform a group of coordinatedfunctions tasks, and/or activities for the benefit of the users of acomputing system. A software application may also access data fromvarious sources and other computing systems (e.g., storage systems).During the development, testing, and deployment of a softwareapplication, users of a software application may encounter variousproblems and inconsistencies during the execution of a softwareapplication. Some problems are internal to the software application.Other problems experienced by the software application can be related tointeractions with other software and/or system issues. Various datadumps and system logs can be supplied to the developers of the softwareapplication to debug the software application.

With the advent of networked computing, grid computing, and cloudcomputing large computing applications, such as e-commerce apps,financial apps, medical apps, and enterprise apps often do not entirelyexecute within a single physical computer. Aspects of a softwareapplication can be distributed (e.g., hosted) among virtualized entitiesof one or more computing systems that are optimized for variousfunctions, such as computational speed, transaction processing, databasequeries and updates, and Web services. In addition, some capabilities ofa data center are purchased as: services, software, and/or platformservice offerings by a user. As such, a developer of a softwareapplication can utilize various application programming interfaces(APIs) and middleware offered by the data center as opposed to codingall aspects of a software app. The developer of a software applicationmay request manual intervention by an operator, a technician, and/or anadministrator of the data center to obtain data (e.g., memory and logdumps) related to the operations, hangs, and/or faults that occur duringthe execution of the software app.

SUMMARY

According to aspects of the present invention, there is a method,computer program product, and/or system for obtaining data to debug anissue that affects a software application. In an embodiment, the methodincludes one or more computer processors receiving a request to obtaindata associated with an issue that affects an executing softwareapplication. The method further includes determining a set of memoryspaces utilized by the executing software application and one or moreprocesses supporting the executing software application. The methodfurther includes initiating a dump function to obtain data within thememory spaces of the determined set of memory spaces. The method furtherincludes storing the data related to the dumped set of memory spaces.Where storing the data related to the dumped set of memory spacesincludes (i) high-speed capture and aggregation of data to volatilememory and (ii) spooling data within volatile memory to persistentmemory.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a computing environment, in accordance with anembodiment of the present invention.

FIG. 2 depicts a flowchart of the operational steps of a diagnostic dataprogram, in accordance with an embodiment of the present invention.

FIG. 3a depicts an illustrative example of identifying additional memoryspaces based on cross-memory relationships, in accordance with anembodiment of the present invention.

FIG. 3b depicts an illustrative result of a diagnostic data programdetermining the memory spaces utilized by software application andassociated processes, and generating a dump report, in accordance withan embodiment of the present invention.

FIG. 4 is a block diagram of components of a computer, in accordancewith an embodiment of the present invention.

DETAILED DESCRIPTION

Embodiments of the present invention recognize that an operating system(OS), system monitoring software, and system management software cancapture data while a computing system is running and hosting theexecution of a plurality of software applications. Various functions cantrace and log the status of processes (e.g., services, softwareapplications, communication applications, hardware operations, etc.)while a system is utilized by the plurality of hosted softwareapplications. A fatal error (e.g., an abend, a fatal exception error,etc.) and some non-fatal errors can occur during the execution of asoftware application resulting in a condition that is automaticallydetectable within the computing system. A computing system can includenumerous automatic functions that can initiate dumps of data in responseto a fatal error. For example, a system problem management function cangenerate a first failure data capture (FFDC) that includes a dump andother job/system related data. The dumped data is utilized to diagnoseand debug problems in software applications and/or the operations of acomputing system. Some dumps can be limited to the execution environmentof a single software application. Other dumps can obtain system-widedata related to a fatal error.

Embodiments of the present invention recognize that some non-fatalerrors and abnormalities that occur during the execution of a softwareapplication may not generate automatic dumps of data to aid in analyzingand debugging the non-fatal error. In addition, embodiments of thepresent recognize that a class of errors exists that is not detected byor recognized by the software of a computing system. Some such errorsare attributable to factors outside of the code of the softwareapplication, such as middleware issues, operating system services, andinteractions with one or more hardware elements (e.g., device drivers)within a computing system. Non-fatal errors, such as hangs, poorperformance, stuck in a loop, data loss, data corruption, and/or a classof errors not detected or recognized by the software of a computingsystem; are herein referred to as issues that affect a softwareapplication. When an issue affecting a software application problem isundetected by the software of a computing system, the administrator ofthe computing system can respond by manually initiating a dump tocollect diagnostic data.

A user/developer/owner of a software application may request dumps ofdata in response to events or issues, which occur during the executionof the software application. In some scenarios, a technician, anoperator, a system programmer, or an administrator of the computingsystem, herein referred to as an administrator, initiates dumps of datain response to a request from a developer of a software application. Inother scenarios, an administrator of the computing system initiatesdumps in response to a group of users of the computing systemidentifying issues related to the computing system. Alternatively, anadministrator of the computing system initiates dumps based on observingthe operational states of the computing system or based on messagesgenerated by one or more monitoring programs of the computing system.

Embodiments of the present invention also recognize that some computingsystems are comprised of a plurality of virtualized computing resourcesand virtualized computing entities, such as servers. Within avirtualized computing system, different computing entities, such aslogical partitions (LPARs), can utilize different operating systems; andthat the tasks, processes, executable functions, and other aspects of asoftware application can be distributed among various memory spacesallocated to a software application by the virtualized computing system.In addition, a developer of a software application is not required tocode every aspect of the software application.

The computer system that hosts a software application may providevarious services, middleware, and tasks (e.g., ancillary processes) thatare accessed by the software application. As such, a virtualizedcomputing system (e.g., a mainframe computer) may track the processes ofa software application and the processes, such as operating systemservices, kernel tasks, daemons, and/or middleware utilized by thesoftware application by unique identifiers. For example, a processidentifier (PID) can be a number or job name utilized by an operatingsystem kernel to uniquely identify a scheduled process and/or an activeprocess. One or more PIDs are available within a memory space and mayexecute or be scheduled to execute within the memory space. As withPIDs, memory spaces within a virtualized computing system can beuniquely identified (e.g., reference), such as by address spaceidentifiers (ASIDs). In some embodiments of the present invention, theterms ASID and memory space can be used interchangeably.

Unless further specified in a dump request, only the ASIDs of a softwareapplication or an identified system service are dumped. For example, theASID of the parent process that calls a service associated with a dumprequest are not automatically identified, captured, and dumped.Similarly, the ASIDs of the child processes called by a softwareapplication associated with a dump request are not automaticallyidentified, captured, and dumped. Thus, analyzing and debugging issuesaffecting a software program can be iterative and laborious. In oneexample, a user identifies that one or more ASIDs associated with asoftware application that is hung, and requests a dump of the one ormore ASIDs. In response, an administrator of a computing systeminitiates a request to dump of one or more identified ASIDs. A debugger(e.g., an application developer) utilizes the output of one or more dumprequests to identify other ASIDs and associated PIDs that may contributeto the issues that affect the software application. Subsequently, thesoftware application is rerun, and the newly identified PIDs andcorresponding ASID are included in the next dump request. The debugprocess is repeated until the user obtains the data to correct theissues affecting the software application.

Embodiments of the present invention increase the ability to collectmore relevant data related to issues affecting a software applicationinvocation, as opposed to a person iteratively collecting data relatedto issues affecting the software application invocation. Embodiments ofthe present invention utilize various relationships among processes,services, middleware programs, and tasks to determine a larger number ofmemory spaces (e.g., ASID) of interest. The larger number of memoryspaces are dumped in response to a request to obtain data to morethoroughly diagnose (e.g., analyze and debug) a software application.Embodiments of the present invention utilize relationships betweenprocesses, such as cross-memory relationships or process trees, toidentify additional memory spaces to automatically include in a dump ofdata.

Other embodiments of the present invention utilize relationships amongexecuting services of a computing system to identify the additionalmemory spaces to automatically include in a dump. For example, if usersof different software applications report related problems, then anadministrator of the computing system can formulate a dump request basedon observations of the user. The administrator can begin with one groupof processes and memory spaces and automatically expand the scope toidentify additional memory spaces and/or find other processes executingwithin shared memory spaces.

Some embodiments of the present invention can constrain (e.g., dictate)the scope or size of a dump of memory spaces. In an example, the scopefor identifying memory spaces may be constrained to three levels (e.g.,parent processes, child processes, grandchild processes), 2-degreesremoved, etc. In another example, if a cross-memory relationship isidentified for an orphan process (e.g., a PID) by a memory catalogingfunction (not shown), then the orphan process and corresponding ASID maybe excluded from the memory spaces to be dumped. In another example, ifa system management function of a computing system determines that thesize of the aggregate dump file is approaching a size that impacts theperformance of the system for other users, then one or more in-progressdump services can be cancelled or the scope of memory spaceidentification may be truncated.

Further embodiments of the present invention can identify memory spacesof interest for a dump based on identifying relationships other thancross-memory relationships. In one example, the provisioning informationassociated with a memory space may be analyzed to identify otherprocesses and corresponding memory spaces that are unrelated to asoftware application but can affect the process utilized by the softwareapplication. In this example, processes not utilized by the softwareapplication, by virtue of their provisioning, may be over-utilizingcomputing resource and “starving” the processes utilized by the softwareapplication. In another example, other relationships and interactionsbetween memory spaces may be associated with internal calls (e.g.,software emulation as opposed to direct hardware processing), componentinterfaces, physical device drivers, virtual device drivers, storagetier assignments, ancillary services, etc. that are not directlyutilized by a software application or a service within a computingsystem. In some instances, such relationships and interactions betweenmemory spaces can introduce issues that affect a software applicationand degrade performance of the software application.

Further, embodiments of the present invention provide beneficialcapabilities to the users and developers of a software application byidentifying additional memory spaces utilizing cross-memoryrelationships and relationships between processes, tasks, and servicesutilized by a software application. In addition, identifying additionalmemory spaces utilizing cross-memory relationships and relationshipsbetween other processes, tasks, and services of a computing system isbeneficial for administrators of the computing system. As such,automatically identifying and dumping additional memory spaces andobtaining data to debug of a software application is seen to be improvedin at least these aspects. Similarly, automatically identifying anddumping additional memory spaces and obtaining data to debug of issueswithin a computing system, operations of the computer system are seen tobe improved in at least these aspects.

The present invention will now be described in detail with reference tothe Figures. FIG. 1 is a functional block diagram illustrating computingenvironment 100, in accordance with an embodiment of the presentinvention. In an embodiment, networked computing environment 100includes: system 101 and device 130 interconnected over network 120. Insome embodiments, computing environment 100 is representative of avirtualized computing environment, such as within a mainframe computer(e.g., a “big-iron” system). In other embodiments, computing environment100 is representative of a networked computing environment. In variousembodiments, computing environment 100 is representative of acombination of architectures supporting a plurality of instances ofsystem 101, such as within a data center. Many modifications to thedepicted environment may be made by those skilled in the art withoutdeparting from the scope of the invention as recited by the claims.

System 101 and device 130 may be: laptop computers, tablet computers,netbook computers, personal computers (PC), desktop computers, personaldigital assistants (PDA), smart phones, wearable devices (e.g., digitaleyeglasses, smart glasses, smart watches, smart televisions, etc.), orany programmable computer systems known in the art. In certainembodiments, system 101 and device 130 represent computer systemsutilizing clustered computers and components (e.g., database servercomputers, application server computers, etc.) that act as a single poolof seamless resources when accessed through network 120, as is common indata centers and associated with cloud-computing applications.

In general, system 101 and device 130 are representative of anyprogrammable electronic device or combination of programmable electronicdevices capable of executing machine-readable program instructions andcommunicating with users of system 101 and device 130, via network 120.System 101 and device 130 may include components, as depicted anddescribed in further detail with respect to FIG. 4, in accordance withembodiments of the present invention.

In various embodiments, system 101 is representative of a virtualizedcomputing system that can include a plurality of physical, virtualized,and/or paravirtualized computing entities; and can be configured toproduce various execution environments. In one embodiment, system 101 isrepresentative of a single LPAR to host a software application. Inanother embodiment, system 101 is representative of a plurality of LPARsto host various aspects of a software application. In some embodiments,system 101 is representative of a large computing system (e.g., acomputing node) or group of computing systems configured to support anenterprise software application or host software application for aplurality of customers.

System 101 includes: administrative interface 102, storage 103,middleware programs 108, system management functions 109, and diagnosticdata program 200. In some embodiments, system 101 accesses one or morecomputing programs and/or databases that are network accessible and areutilized by one or more embodiments of the present invention and/or theexecution of software application 104. In an example, system 101 mayhave a license to access a virtual engineering program and/or one ormore analytics programs as-a-service via a cloud-service provider.

Administrative interface 102 is representative of one or more controlconsoles associated with system 101 that include input and displaycapabilities. In one embodiment, administrative interface 102 providescommand line input and control of system 101. In another embodiment,administrative interface 102 may be a graphical user interface (GUI) ora web user interface (WUI), and administrative interface 102 can displaytext, documents, forms, web browser windows, user options, applicationinterfaces, and instructions for operation, and include the information,such as graphic, text, and sound that a program presents to anadministrator of system 101. Administrative interface 102 may include aplurality of windows for viewing and/or inputting information to system101. For example, administrative interface 102 may include a pluralityof dashboards depicting the operations and key performance indicators ofsystem 101, and sending messages to and receiving messages from users ofsystem 101.

In addition, administrative interface 102 controls sequences/actionsthat an administrator of system 101 utilizes to input requests for datato diagnostic data program 200. In various embodiments, administrativeinterface 102 displays one or more icons representing applications thata user can execute via network 120, such as diagnostic data program 200and various programs (not shown) of system 101 and/or other computingsystems accessible via network 120. In addition, administrativeinterface 102 can control sequences of actions that the user utilizes torespond and/or confirms actions associated with diagnostic data program200 and/or system management functions 109.

In some embodiments, an administrator of system 101 can interact withadministrative interface 102 via a singular device, such as a touchscreen (e.g., display), that performs both input to a GUI/WUI, and as anoutput device (e.g., a display) presenting a plurality of iconsassociated with apps and/or images depicting one or more executingsoftware applications. In other embodiments, one or more aspects ofsystem management functions 109 can generate administrative interface102 operating within system 101. Administrative interface 102 may acceptinput from a plurality of input/output (I/O) devices (not shown)including, but not limited to, a tactile sensor interface (e.g., a touchscreen, a touchpad) or a natural user interface (e.g., voice controlunit, motion capture device, eye tracking, cyberglove, head-up displayetc.). In addition to the audio and visual interactions, administrativeinterface 102 may receive input in response to an administrator ofsystem 101 utilizing natural language, such as written words or spokenwords, that system 101 identifies as information and/or commands.

Storage 103 includes software application 104, log files 105, memoryspaces (MS) 106A thru 106Z, and data dump 107. In one embodiment,storage 103 includes volatile memory, such as random-access memory andnon-volatile memory (e.g., storage-class memory, persistent storage,etc.), such as flash memory, solid-state drives, hard-disk drives, andmagnetic tapes. In some embodiments, the resources of storage 103 changein response to the execution environment of system 101. In one example,if system 101 is representative of an LPAR, then storage 103 isprovisioned by a hypervisor (not shown) and may include virtualizedstorage entities. In another example, if system 101 is representative ofa computing node, then storage 103 may be comprised of physical storageentities.

Storage 103 includes various programs and data. In one embodiment,storage 103 may also include various programs and/or databases, such asbut not limited to: a hypervisor, one or more operating systems (e.g., ahost OS, various guest OSs), a file management program, a databasemanagement system, communication protocols, etc. (not shown) utilized bysystem 101. Storage 103 also includes various services, functions, andapplication programming interfaces (APIs) utilized by softwareapplications that execute on system 101. In various embodiments, storage103 includes the data, source code, libraries, and binary files utilizedby software application 104; data utilized by diagnostic data program200, such as a catalog of active memory spaces and associated PIDs;and/or data within requests to dump data. In one scenario, storage 103includes an in-progress summary report (not shown) for a receivedrequest to perform a dump of data. Upon completion of a request to dumpdata, the summary log is removed from general storage within storage 103and included in data dump 107. In some scenarios, a copy of the summaryreport for a request to dump data is included in a historical log ofdump request within log files 105.

Software application 104 includes one or more versions of a softwareapplication. In one embodiment, software application 104 is comprised ofa plurality of executable and/or interpretable files. Softwareapplication 104 may also include module, libraries, and binary files. Insome embodiments, software application 104 is an enterprise applicationthat includes and/or interfaces with a plurality of other softwareapplications. In an example, an e-commerce software application mayutilize a web server, a DNS name server, a database program, an e-mailprogram, a transaction-processing program, and a security program (e.g.,a firewall, an authentication program, etc.). In various embodiments,during the execution of software application 104, software application104 calls one or more APIs, services, or middleware programs installedon system 101.

Log files 105 include various logs associated with the operations system101, one or more functions (not shown) monitoring system 101, and/ormonitoring the execution of one or more applications hosted on system101. Examples of files included within log files 105 include error logs,message logs, system logs, event logs, transaction logs, and processtraces. In some embodiments, one or more files within log files 105 arebased on encoded data that is not readable by humans without parsing,conversion, and/or interpretation (e.g., post-processing). In addition,some data of log files 105 is structured as records in volatile memory.In various embodiments, the data within log files 105 is stored topersistent storage within storage 103 as files. As records, data withinone file of log files 105 can be related to other data within anotherfile of log files 105. In an embodiment, log files 105 include a dumpsummary log (not shown). The dump summary log includes a plurality ofdump summary reports for historical requests to dump data to diagnosesoftware applications and/or system 101. Diagnostic data program 200 cangenerate dump summary reports.

Memory space (MS) 106A thru 106Z are areas of physical and/orvirtualized memory of system 101 that are utilized by a plurality ofservice and processes, such as software application 104 and middlewareprograms 108. In some embodiments, an instance of MS 106 is allocatedfrom volatile memory of storage 103 in response to a service or programinitiating. If a service is utilized by one or more users, othersoftware applications, or other services, then the instance of MS 106persists. However, some processes and programs can dynamically establishand revoke access to another process and temporarily link (e.g., share)memory spaces. Therefore, some shared memory (e.g., cross-memory) spacesmay not be identified based on the timing (e.g., execution sequence) andinteractions between processes. In some scenarios, an instance of MS 106remains allocated but not accessed (e.g., linked). In other scenarios,if the process within the instance of MS 106 is terminated in responseto revoking the link to the process, then the memory of the instance ofMS 106 is released to the pool of memory of system 101 (e.g., a portionof storage 103).

Data dump 107 is a snapshot of the data in memory at a point in timewhen a dump request initiates. Data dump 107 may include user data,portions of the operating system, in process data, and code (e.g.,compiled code, binary code, interpretable code, etc.) of an executingservice, function, or program. In some embodiments, data dump 107 isencoded data that is not readable by humans without post processing. Inaddition, some of data dump 107 is structured as records. In oneembodiment, data dump 107 includes data associated with diagnosing theexecution of software application 104. In another embodiment, data dump107 includes data associated with diagnosing the execution and/oroperations of one or more aspects of system 101, such as the operationsof one or more programs of middleware programs 108, or one or moreservices utilized by users of system 101. In various embodiments, datadump 107 includes data associated with the hardware of system 101.

Middleware programs 108 include one or more programs, services, and/orprotocols that connects software components and/or enterpriseapplications. Some middleware programs 108 utilize APIs to interfacewith software applications and/or components. Middleware programs 108are included in the infrastructure, which facilitates creation ofbusiness applications; provides core services, such as concurrency,transactions, threading, and messaging; and a software communicationarchitecture for service-oriented architecture applications. Middlewareprograms 108 enable communication and management of data withindistributed software applications. Middleware programs 108 may includeWeb servers, application servers, content management systems, and acustomer information control system (CICS®). Other middleware servicesare associated with clustering, security, logging, and monitoring.

System management functions 109 includes a plurality of services,functions, tasks, and programs utilized to monitor, administer, andutilize system 101. System management functions 109 includes services,functions, tasks, and programs that manage software execution (e.g.,workloads), access log files, control resource allocations, traceexecuting processes, assist configuring servers, managing access andsecurity policies, etc. System management functions 109 also includesservices, functions, tasks, and programs for cataloging memory spaces,identifying cross-memory relationships, and performing dumps of memoryspaces. In some embodiments, an administrator of system 101 utilizesvarious windows associated with administrative interface 102 to accessone or more services, functions, tasks, or programs of system managementfunctions 109. In various embodiments, a service, a function, a task, ora program of system management functions 109 generates another window,such as a dashboard within a portion of administrative interface 102.

Diagnostic data program 200 is a program that determines memory spacesrelated to a request to obtain data by utilizing a dump function,service, or program. In an embodiment, diagnostic data program 200identifies memory spaces allocated within a computing system by ASIDs.Diagnostic data program 200 can determine shared memory spaces andcorresponding ASIDs (e.g., references) based on cross-memoryrelationships and/or by relationship among programs, services, andmiddleware executing within a computing system. Diagnostic data program200 can initiate dumps of the determined memory spaces to obtainuser-level data, system-level data, or a combination thereof. In oneembodiment, diagnostic data program 200 is utilized to obtain data todiagnose issues (e.g., non-fatal behaviors and abnormality) that occurduring the execution of a software application. In another embodiment,diagnostic data program 200 is utilized to obtain data to diagnoseissues and degradations of performance that occur during the operationsof a computing system.

In some embodiments, diagnostic data program 200 aggregates and filtersthe determined ASIDs of memory spaces associated with a received requestto dump data. In addition, diagnostic data program 200 can generate asummary report of the processes (e.g., PIDs), ASIDs of memory spaces,and data from various log files that are included in the data dumpassociated with a received request to dump data.

In one embodiment, system 101 communicates through network 120 to device130. In some embodiments, system 101 communicates with one or more othercomputing systems and/or computing resources (not shown), such as a webserver, an e-mail server, a storage area network (SAN), etc. via network120. Network 120 can be, for example, a local area network (LAN), atelecommunications network, a wireless local area network (WLAN), suchas an intranet, a wide area network (WAN), such as the Internet, or anycombination of the previous and can include wired, wireless, or fiberoptic connections. In general, network 120 can be any combination ofconnections and protocols that will support communications betweensystem 101 and device 130, in accordance with embodiments of the presentinvention. In various embodiments, network 120 operates locally viawired, wireless, or optical connections and can be any combination ofconnections and protocols (e.g., personal area network (PAN), near fieldcommunication (NFC), laser, infrared, ultrasonic, etc.).

Device 130 includes User Interface (UI) 132 and storage 133. Storage 133includes various programs and data (not shown) and data dump 137.Examples of programs and data that device 130 may include are: anoperating system, a web browser, an integrated development environment,one or more versions of software application 104 (e.g., source code,compiled code, etc.), a communication program, a data decompressionprogram, and certificates and security information to access system 101.Data dump 137 is representative of an instance of data dump 107 that istransferred to device 130 for off-line analysis and debug of softwareapplication 104.

In one embodiment, UI 132 may be a graphical user interface (GUI) or aweb user interface (WUI), and UI 132 can display text, documents, forms,web browser windows, user options, application interfaces, andinstructions for operation, and include the information, such asgraphic, text, and sound that a program presents to a user. UI 132enables a user (e.g., a software developer) of device 130 to communicatewith system 101 via network 120. UI 132 can initiate the execution of aninstance of software application 104 and in response view the results ofuser interactions with software application 104, such as submitting arequest to check inventory and receiving the results of the inventorycheck. In addition, a user of device 130 can use UI 132 to communicate,with an administrator of system 101, a request to obtain a dump of data.

In some embodiments, a user of device 130 can interact with UI 132 via asingular device, such as a touch screen (e.g., display) that performsboth input to a GUI/WUI, and as an output device (e.g., a display)presenting a plurality of icons associated with apps and/or imagesdepicting one or more executing software applications. In otherembodiments, a software program (e.g., a web browser) can generate UI132 operating within the GUI environment of device 130. UI 132 acceptsinput from a plurality of input/output (I/O) devices (not shown)including, but not limited to, a tactile sensor interface (e.g., a touchscreen, a touchpad) or a natural user interface (e.g., voice controlunit, motion capture device, eye tracking, cyberglove, head-up displayetc.). In addition to the audio and visual interactions, UI 132 mayreceive input in response to a user of device 130 utilizing naturallanguage, such as written words or spoken words, that device 130identifies as information and/or commands.

FIG. 2 is a flowchart depicting operational steps for diagnostic dataprogram 200, a program that generates dumps of data based on one or morerelationships among memory spaces and/or executing processes during theoperation of a computing system, in accordance with embodiments of thepresent invention. In one embodiment, diagnostic data program 200identifies memory spaces associated with an executing softwareapplication that have various cross-memory relationships with one ormore services, tasks, API, etc. utilized by the executing softwareapplication. In some embodiments, multiple instances of diagnostic dataprogram 200 can execute concurrently within the same computing system orvirtualized computing environment. In various embodiments, diagnosticdata program 200 consolidates, filters, and prioritizes the identifiedmemory spaces prior to initiating a dump of the data within some or allof the identified memory spaces associated with an executing softwareapplication.

In step 202, diagnostic data program 200 receives a request to obtaindata to diagnose a software application. In an embodiment, a request toobtain data (e.g., a data dump and a related report) to diagnose asoftware application may include a location for the data dump (e.g.,memory, DASD, or magnetic tape), a maximum size for a data dump, and adepth of analysis or scope of tracing associated with identifying sharedmemory (e.g., cross-memory) spaces. In an example, the scope of atracing may exclude scheduled by not yet active processes. In someembodiments, diagnostic data program 200 receives a request to obtaindata to diagnose a software application 104 based on an administrator ofsystem 101 manually processing a request input by an owner and/ordeveloper of software application 104. Manually input requests for adata dump and a related report may be input via administrative interface102 of system 101. In other embodiments, diagnostic data program 200receives a request to diagnose software application 104 based on dynamicautomation, a virtual engineer, or other cognitive program processing arequest to obtain data to diagnose a software application.

In one embodiment, diagnostic data program 200 receives a request toobtain data to diagnose software application 104 in response to acommunication from an owner and/or developer of software application104, such as input via UI 132 of device 130. In one scenario, diagnosticdata program 200 receives a request to diagnose software application 104in response to a communication associated with an owner and/or developernoting that software application 104 pauses or hangs while executing onsystem 101. In another scenario, diagnostic data program 200 receives arequest to diagnose software application 104 in response to acommunication associated with an owner and/or developer noting thatsoftware application 104 experiences one or more abnormalities, such asstuck in a loop, a degradation of performance, a corruption of data,and/or a loss of data while executing on system 101. In anotherembodiment, diagnostic data program 200 receives a request to obtaindata to diagnose a software application 104 based on detecting (e.g., bya user, a developer, or an enterprise) a deviation from a service levelagreement (SLA) during an execution of software application 104, such asan excessive consumption of resources and not releasing unneededresources (e.g., a memory leak).

Still referring to step 202 in various embodiments, diagnostic dataprogram 200 receives a request for data to diagnose software application104 based on an administrator of system 101 responding to anidentification of abnormalities associated with the operation of system101, such as multiple users of system 101 indicating issues with theexecution of software application 104. In a further embodiment,diagnostic data program 200 receives a request to obtain data todiagnose one or more problems, issues and/or abnormalities associatedwith one or more aspects of system 101. In one example, an administratorof system 101 initiates a request for diagnostic data program 200 to doa system dump of system 101 based on receiving communications fromvarious users indicating that aspects of system 101 are not performingas expected (e.g., slower response time than usual, program hangs duringcertain operations). In another example, an administrator of system 101initiates a request for diagnostic data program 200 to do a system dumpof system 101 based on receiving one or more reports indicating thatsystem 101 is not performing as expected, such networking issues.

In step 204, diagnostic data program 200 identifies a set of informationassociated with the software application. A set of informationassociated with software application 104 may include, but is not limitedto, executable files, source code, dynamically linked libraries,software containers, and one or more programs of middleware programs108. Other information may include an indication whether a dump for oneor more aspects of a received request is a user-level dump or asystem-level dump. In one embodiment, diagnostic data program 200identifies a set of information associated with software application 104based on one or more configuration files, templates, and/or provisioninginformation (not shown) related to software application 104. In anexample, diagnostic data program 200 may identify information within aconfiguration file for software application 104 to identify each aspect(e.g., task, service, executable, code module, etc.) of softwareapplication 104. Each aspect of software application 104 may include aflag indicating whether the memory space of an aspect is shared orprivate (e.g., not included in a cross-memory relationship). Ifdiagnostic data program 200 determines that a memory space is shared,then diagnostic data program 200 may identify further information canindicate which of the one or more other aspects (e.g., PIDs) of softwareapplication 104 access the shared memory space.

In another embodiment, diagnostic data program 200 identifies a set ofinformation associated with software application 104 based on theresults of one or more initiated traces and/or information derived fromone or more function system management functions 109. In an example,diagnostic data program 200 may utilize a memory cataloging function(not shown) within system management functions 109 to identify thememory spaces utilized by software application 104 and to identify thePIDs that utilize each shared or private memory space. In someembodiments, a portion of the set of information associated withsoftware application 104 is input to administrative interface 102 and/orselected from information accessible via administrative interface 102.In an example, a request to diagnose software application 104 mayindicate that database operations appear to be related to an abnormalityassociated with software application 104. If the size of data dump 107is constrained, then an administrator of system 101 can utilizeadministrative interface 102 to indicate to diagnostic data program 200to prioritize (e.g., dictate) analyzing relationships and subsequentdumps of memory spaces related to the PIDs associated with databasetasks and services that access one or more databases.

In step 206, diagnostic data program 200 determines a first set ofmemory spaces utilized by the software application. With respect to somecontrol and/or operating systems, memory spaces within system 101 may beidentified by ASIDs. In one embodiment, diagnostic data program 200determines a first set of memory spaces utilized by software application104 based on information obtained via system management functions 109,such as a memory cataloging function. The first set of memory spaces mayinclude a master memory space associated with the provisioned memoryallocated to an aspect of system 101 to support software application104. In another embodiment, diagnostic data program 200 determines afirst set of memory spaces utilized by software application 104 thatinclude one or more ASIDs that correspond to various servers,subsystems, and/or tasks directly associated with software application104, such as a list of memory spaces of the PIDs of an enterprisesoftware application.

In some embodiments, diagnostic data program 200 determines a first setof memory spaces and corresponding ASIDs utilized by softwareapplication 104 based on the set of information identified in Step 204.In other embodiments, diagnostic data program 200 determines a first setof memory spaces and corresponding ASIDs based on input received viaadministrative interface 102. In one example, diagnostic data program200 determines a first set of memory space related to one or more issuesand/or abnormalities associated with the operation of system 101, suchas accessing data within a SAN. In some scenarios, diagnostic dataprogram 200 determines a first set of memory space based on manuallyinput information. In other scenarios, diagnostic data program 200determines a first set of memory space based on informationautomatically input, such as information automatically input via avirtual engineer.

In step 208, diagnostic data program 200 determines a second set ofmemory spaces based on relationships associated with the softwareapplication. One relationship associated with a software applicationincludes sharing/transferring data among two or more processes thatexecute within different memory spaces, such as cross-memoryrelationships. Another relationship associated with a softwareapplication is based on a chain of calls, services, and/or APIs thatperform one or more actions not natively programmed within the softwareapplication, such as querying a database and subsequently receiving theresults of the query. Other relationships and interactions betweenmemory spaces are associated with internal calls (e.g., softwareemulation as opposed to direct hardware processing), componentinterfaces, physical device drivers, virtual device drivers, daemons,etc. that are not directly utilized by a software application or aservice within a computing system. Some of the relationships betweenmemory spaces are indirectly related to a software application, such asa memory space of an ancillary process that affects a service utilizedby the software application.

In one embodiment, diagnostic data program 200 determines a second setof memory spaces and corresponding ASIDs, based on cross-memoryrelationships between aspects of software application 104, such asbetween a portion of executable code of software application 104 and oneor more APIs called by software application 104. In another embodiment,diagnostic data program 200 determines a second set of memory spaces andcorresponding ASIDs, based on cross-memory relationships. In onescenario, diagnostic data program 200 includes one or more ASIDs in thesecond set of memory spaces based on identifying one or morecross-memory relationships among services (not shown) that share dataamong two or more PIDs. In another scenario, diagnostic data program 200identifies one or more cross-memory relationships based on a flagindicating that a memory space is shared; the PIDs of the sharingentities; and/or information, such as a tuple of information (discussedin further detail with respect to FIG. 3a ) obtained from a memorycataloging function.

In some embodiments, diagnostic data program 200 constrains thedetermination of a second set of memory spaces associated with softwareapplication 104 based on information included within the request todiagnose software application 104, such as the depth of analysis. Invarious embodiments, diagnostic data program 200 also utilizesinformation included in log files 105 and/or one or more functions ofsystem management functions 109 to identify a memory space that wasallocated to a previously executing process or a process to be executed.In an example, diagnostic data program 200 determines that MS 106Z(referring to FIG. 3a ) is a shared memory space associated withsoftware application 104. If software application 104 had not initiatedthe process that utilizes MS 106Z as of the received request to obtaindata to diagnose software application 104, then diagnostic data program200 may exclude MS 106Z from the requested dumps. Alternatively, ifsoftware application 104 stopped utilizing the process within MS 106Z asof the received request to obtain data to diagnose software application104, then diagnostic data program 200 may exclude MS 106Z from therequested dumps.

Still referring to step 208 in a further embodiment, diagnostic dataprogram 200 determines a second set of memory spaces and correspondingASIDs, based on relationships between executing entities within system101. In one example, an administrator of system 101 determines that anumber of users, executing different software applications, are impactedby a service within middleware programs 108. The administrator of system101 indicates via administrative interface 102 that diagnostic dataprogram 200 determines the set of shared memory spaces utilized by oneor more processes (e.g., parent apps) that call the suspect middlewareprogram and/or the memory spaces associated with one or more processescalled by the suspect middleware service. In another example, theadministrator of system 101 indicates via administrative interface 102that diagnostic data program 200 determines a set of shared memoryspaces utilized by processes, calls, responses, protocols, etc. of oneor more suspect portions of hardware of system 101.

In step 210, diagnostic data program 200 consolidates the dataassociated with the determined sets of memory spaces associated with thesoftware application. In one embodiment, diagnostic data program 200aggregates a list of determined memory spaces and corresponding ASIDsassociated with the first set of memory spaces and the second set ofmemory spaces. Diagnostic data program 200 may also include informationassociated with the determined sets of memory spaces, such as PIDsutilizing a memory space, an ASID of a memory space, an indication of ashared memory space, a relationship between memory spaces, and ananalysis depth at which a memory space occurs with respect to an aspectof the received request. In another embodiment, diagnostic data program200 filters the information associated with the determined sets ofmemory spaces. In one example, diagnostic data program 200 filters out(e.g., eliminates) duplicate ASIDs or uncalled memory spaces from thesets of determined memory spaces. However, diagnostic data program 200may include the information associated with the determined sets ofmemory spaces, such as the memory spaces that were called and releasedby software application 104 or related processes.

In a further embodiment, diagnostic data program 200 assigns (e.g.,dictates) a priority for dumping each memory space of the aggregated andfiltered memory spaces. In one example, diagnostic data program 200 mayassign dump priority (e.g., an order for dumping) of 1 to the memoryspaces of software application 104; a dump priority of 2 to memoryspaces related to processes, such as middleware programs called byprocesses of software application 104; and a dump priority 3 for memoryspaces related to other processes called by the middleware programs. Insome embodiments, diagnostic data program 200 utilizes informationobtained in Steps 202 and/or 204 to determine the granularity ofprioritization. In an example, diagnostic data program 200 may obtaininformation that prioritizes (e.g., specifies) identifying and dumpingmemory spaces related to database process, such as creating queries,retrieving data, and processing data over processes related to graphicsprocessing.

In various embodiments, diagnostic data program 200 also aggregates,filters, and prioritizes information obtained by interrogating log files105 and/or executing one or more aspects of system management program109 for other information associated with the determined sets of memoryspaces. The information obtained by diagnostic data program 200 mayinclude process traces and changes in provisioning information (e.g., agrowth of the size of a memory space) during the execution of softwareapplication 104. Diagnostic data program 200 may utilize apost-processing program (not shown) to structure the obtained dataassociated with memory spaces to generate a dump summary report.

In step 212, diagnostic data program 200 initiates dumps of dataassociated with the request to diagnose the software application.Diagnostic data program 200 initiates to dump data within a memory spaceby utilizing a command of the operating system (not shown) or a functionof system management functions 109. In addition, diagnostic data program200 obtains information from one or more files within log files 105 thatare associated with memory spaces to dump, the execution of softwareapplication 104, and/or the operations of system 101. In someembodiments, diagnostic data program 200 initiates user-level dumps ofdata. In other embodiments, diagnostic data program 200 initiatessystem-level dumps of data.

In one embodiment, diagnostic data program 200 initiates dumps of datafor the consolidated memory spaces of Step 210. In another embodiment,if diagnostic data program 200 determines that one or more constraints(e.g., a maximum size for dump 107) are associated with the receivedrequest to obtain data to diagnose software application 104, thendiagnostic data program 200 includes the prioritization information toselect a memory space or group of memory spaces to dump.

In step 214, diagnostic data program 200 stores the dumps of datarelated to the received request. In one embodiment, diagnostic dataprogram 200 spools (e.g., stores) the dumps of data of the determinedmemory spaces to data dump 107. In various embodiments, diagnostic dataprogram 200 utilizes high-speed captures and aggregation of the dumpeddata in an encoded format, as opposed to basic text. Diagnostic dataprogram 200 may subsequently utilize specialized formatters orpost-processors (not shown) to utilize, parse, format, and extract dataand information within dumps. In another embodiment, diagnostic dataprogram 200 spools the dumps of data of the determined memory spaces todata dump 107 and can utilize a specialized formatter to generate a dumpsummary report (not shown) that includes information associated with theprocesses, services, PIDs, ASIDs, etc. of the dumped memory spaces asdiagnostic data program 200. In addition, upon completing the dumps ofthe determined memory spaces, diagnostic data program 200 can includethe generated dump summary report within data dump 107.

In some embodiments, in response to completing the dumps of thedetermined memory spaces, diagnostic data program 200 stores data dump107 to persistent storage. In some scenarios, diagnostic data program200 utilizes a data compression program (not shown) to reduce the sizeof data dump 107. In one scenario, diagnostic data program 200 maintainsdata dump 107 on system 101. Diagnostic data program 200 may migratedata dump 107 to a lower-cost form of persistent storage, such asmagnetic tape. In other scenarios, diagnostic data program 200 utilizesnetwork 120 to transfer, at least a copy of data dump 107 to device 130.

FIG. 3a is an illustrative example of diagnostic data program 200responding to a request to obtain data to diagnose software application104 by initiating data dumps. FIG. 3a is a snapshot of the processes ofsoftware application 104 and processes (e.g., program, service, tasks,etc.) utilized by software application 104 at a point in timecorresponding to diagnostic data program 200 receiving to a request toobtain data to diagnose software application 104.

Diagnostic data program 200 determines additional memory spaces to dumpbased on cross-memory relationships among processes of softwareapplication 104 and subsequent calls that interact with other processeswithin other memory spaces, in accordance with an embodiment of thepresent invention. In the illustrative example, software application 104includes five process indicated by PIDs 310, 311, 312, 313, and 314. Thefive processes of software application 104 execute within four memoryspaces (MSs). In this illustrative example, system 101 provisions fourmemory spaces for processes of software application 104, MS 106A hostsPID 310 and PID 311, MS 106B hosts PID 312, MS 106C hosts PID 313, andMS 106D hosts PID 314.

Within FIG. 3a , memory space with cross-memory relationships areidentified by boxes without shading. Unidentified memory spaces, such asMS 106Z are indicated by a diagonal hash shading. Identified memoryspaces, such as MS 106D, without a cross-memory relationship, areindicated by stipple shading. In an embodiment, diagnostic data program200 determines that MS 106A, 106B, 106C, and 106D are the first set ofmemory spaces utilized by a software application (referring to FIG. 2,step 206).

MS 106A hosts PID 310 and PID 311. PID 310 can dynamically establish andrevoke a connection and/or the activation of PID 321 of MS 106Z. In thisexample, if PID 310 is not active (depicted in reverse tone), then PID321 is also not active (reverse tone). In addition, dashed line 302indicates that as of the received request for a dump data associatedwith software application 104 (referring to FIG. 2, step 202), that PID310 is not communicating with PID 321. In an embodiment, without PID 310communicating with PID 321, diagnostic data program 200 does notidentify a cross-memory relationship between MS 106A and MS 106Z.However, diagnostic data program 200 can identify MS 106D because MS106D is included in the provisioning for software application 104.

The active child processes or processes linked to processes of softwareapplication 104 are PID 320, PID 322, and PID 323. Instances of element303 (solid lines with double arrowheads) indicate active relationships,such as cross-memory relationships between the processes of application104 and active child processes (e.g., linked processes). In one example,PID 311 interfaces with PID 322, PID 312, and PID 313 both interfacewith PID 320, and PID 313 interfaces with PID 323. In another example,an OS (not shown) of system 101 may identify a cross-memory relationshipbased on a tuple of information (e.g., a home memory space (HMS), aprimary memory space (PMS), and a secondary memory space (SMS)) includedin one or more catalogs of memory within system 101. In this example, MS106A may be represented by the tuple of HMS106A, PMS106A, SMS106A;similarly, MS 106G may be represented by the tuple of HMS106A, PMS106G,SMS106A; and MS 106M may be represented by the tuple of HMS106A,PMS106M, SMS106G.

As depicted, PID 320 executes within MS 106E, PID 323 executes within MS106H, and PID 322 executes within MS 106G. In addition, PID 330 is achild process associated with PID 322. Similarly, element 304 (solidlines with double arrowheads) indicated an active relationship betweenPID 322 and PID 330. Therefore, in an embodiment, diagnostic dataprogram 200 can identify MS 106M based on the cross-memory relationshipwith MS 106G.

In an embodiment, diagnostic data program 200 determines that MS 106E,MS 106G, MS 106H, and MS 106M are the second set of memory spacesassociated with a software application (referring to FIG. 2, step 208).

FIG. 3b is an illustrative example of the output of an instance ofdiagnostic data program 200. Referring to FIG. 2, Step 210, diagnosticdata program 200 aggregates and filters the determined memory spaces. MS106E has cross-memory relationships with two other memory spaces, MS106B and MS 106C. However, diagnostic data program 200consolidates/filters these two references and initiates a single dump ofMS 106E (referring to FIG. 2, steps 210 and 212). MS 106Z (diagonal hashshading) is excluded based on the lack of an established relationshipbetween PID 310 and PID 321. Conversely, MS 106D is included based onthe identification of MS 106D within the determined first set of memoryspaces (referring to FIG. 2, step 206).

Therefore, diagnostic data program 200 stores the data dumps from MS106A, 106B, 106C, 106D, 106E, 106H, 106G, and 106M to data dump 107. Inaddition, diagnostic data program 200 can generate dump report 340(e.g., a data dump summary report). Dump report 340 includes the ASID'sof MS 106A, 106B, 106C, 106D, 106E, 106H, 106G, and 106M, Dump report340 also includes the PIDs, the size, and the cross-memory relationshipsassociated with each utilized memory space. Dump report 340 may alsoinclude information obtained from one or more files of log files 105associated with the execution of software application 104, such as theexecution time, execution events, provisioning information for processesassociated with or utilized by software application 104. In addition,dump report 340 may include trace information that indicates whether PID310 established and revoked a relationship with PID 321. If therelationship between PID 310 and PID 321 had been established and thenrevoked, and if MS 106Z had not been released back to system 101, thenMS 106Z may still store data that can be dumped.

In another embodiment, in response to post-processing and reviewing ofdump report 340 a user of device 130 may include additional informationwithin the next request to obtain data to diagnose software application104. The additional information can flag the process of softwareapplication 104 that was previously associated with PID 310 and tracethe one or more subsequent processes that are called by the flaggedprocess. This additional information can be included in the set ofinformation associated with software application 104 (referring to FIG.2, Step 204). As such, this additional information can be utilized by anadministrator of system 101 to trap (e.g., identify and lock) the memoryspace of the process that is dynamically called and released by aprocess of software application 104 for inclusion in the determinedsecond set of memory spaces associated with software application 104.Thereby, diagnostic data program 200 can dump one or more additionalmemory spaces to another instance of data dump 107 during a subsequentexecution of software application 104.

FIG. 4 depicts a block diagram of computer system 400, which isrepresentative of system 101 and device 130. Computer system 400 is anexample of a system that includes software and data 412. Computer system400 includes processor(s) 401, memory 402, cache 403, persistent storage405, communications unit 407, input/output (I/O) interface(s) 406, andcommunications fabric 404. Communications fabric 404 providescommunications between memory 402, cache 403, persistent storage 405,communications unit 407, and I/O interface(s) 406. Communications fabric404 can be implemented with any architecture designed for passing dataand/or control information between processors (such as microprocessors,communications and network processors, etc.), system memory, peripheraldevices, and any other hardware components within a system. For example,communications fabric 404 can be implemented with one or more buses or acrossbar switch.

Memory 402 and persistent storage 405 are computer readable storagemedia. In this embodiment, memory 402 includes random access memory(RAM). In general, memory 402 can include any suitable volatile ornon-volatile computer readable storage media. Cache 403 is a fast memorythat enhances the performance of processor(s) 401 by holding recentlyaccessed data, and data near recently accessed data, from memory 402.

Program instructions and data used to practice embodiments of thepresent invention may be stored in persistent storage 405 and in memory402 for execution by one or more of the respective processor(s) 401 viacache 403. In an embodiment, persistent storage 405 includes a magnetichard disk drive. Alternatively, or in addition to a magnetic hard diskdrive, persistent storage 405 can include a solid-state hard drive, asemiconductor storage device, a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM), a flash memory, or any othercomputer readable storage media that is capable of storing programinstructions or digital information. In an embodiment, with respect tosystem 101, MS 106A thru MS 106Z are included in a portion of memory402. In an embodiment, with respect to system 101, a portion storage 103is included within persistent storage 405. In some embodiments, withrespect to system 101, an instance of data dump 107 is included inpersistent storage 405. In other embodiments, some instances of datadump 107 are included in memory 402. With respect to device 130, storage133 is included within persistent storage 405.

The media used by persistent storage 405 may also be removable. Forexample, a removable hard drive may be used for persistent storage 405.Other examples include optical and magnetic disks, thumb drives, andsmart cards that are inserted into a drive for transfer onto anothercomputer readable storage medium that is also part of persistent storage405. Software and data 412 are stored in persistent storage 405 foraccess and/or execution by one or more of the respective processor(s)401 via cache 403 and one or more memories of memory 402. With respectto system 101, software and data 412 includes: administrative interface102, software application 104, log files 105, middleware programs 108,system management functions 109, diagnostic data program 200, andvarious programs (not shown). In an embodiment, software and data 412includes an instance of data dump 107. With respect to device 130,software and data 412 includes: UI 132 and various programs and data(not shown).

Communications unit 407, in these examples, provides for communicationswith other data processing systems or devices, including resources ofsystem 101 and device 130. In these examples, communications unit 407includes one or more network interface cards. Communications unit 407may provide communications through the use of either or both physicaland wireless communications links. Program instructions and data used topractice embodiments of the present invention may be downloaded topersistent storage 405 through communications unit 407.

I/O interface(s) 406 allows for input and output of data with otherdevices that may be connected to each computer system. For example, I/Ointerface(s) 406 may provide a connection to external device(s) 408,such as a keyboard, a keypad, a touch screen, and/or some other suitableinput device. External device(s) 408 can also include portable computerreadable storage media, such as, for example, thumb drives, portableoptical or magnetic disks, and memory cards. Software and data 412 usedto practice embodiments of the present invention can be stored on suchportable computer readable storage media and can be loaded ontopersistent storage 405 via I/O interface(s) 406. I/O interface(s) 406also connect to display 409.

Display 409 provides a mechanism to display data to a user and may be,for example, a computer monitor. Display 409 can also function as atouch screen, such as the display of a tablet computer or a smartphone.

The programs described herein are identified based upon the applicationfor which they are implemented in a specific embodiment of theinvention. However, it should be appreciated that any particular programnomenclature herein is used merely for convenience, and thus theinvention should not be limited to use solely in any specificapplication identified and/or implied by such nomenclature.

The present invention may be a system, a method, and/or a computerprogram product at any possible technical detail level of integration.The computer program product may include a computer readable storagemedium (or media) having computer readable program instructions thereonfor causing a processor to carry out aspects of the present invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, configuration data for integrated circuitry, oreither source code or object code written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Smalltalk, C++, or the like, and procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The computer readable program instructions may executeentirely on the user's computer, partly on the user's computer, as astand-alone software package, partly on the user's computer and partlyon a remote computer or entirely on the remote computer or server. Inthe latter scenario, the remote computer may be connected to the user'scomputer through any type of network, including a local area network(LAN) or a wide area network (WAN), or the connection may be made to anexternal computer (for example, through the Internet using an InternetService Provider). In some embodiments, electronic circuitry including,for example, programmable logic circuitry, field-programmable gatearrays (FPGA), or programmable logic arrays (PLA) may execute thecomputer readable program instructions by utilizing state information ofthe computer readable program instructions to personalize the electroniccircuitry, in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the blocks may occur out of theorder noted in the Figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

Additionally, the phrase “based on” should be interpreted to mean“based, at least in part, on.”

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the invention.The terminology used herein was chosen to best explain the principles ofthe embodiment, the practical application or technical improvement overtechnologies found in the marketplace, or to enable others of ordinaryskill in the art to understand the embodiments disclosed herein.

What is claimed is:
 1. A method for obtaining data to debug an issuethat affects a software application, the method comprising: determining,by one or more computer processors, a first set of memory spacesutilized by an executing software application; determining, by one ormore computer processors, a second set of memory spaces utilized by theone or more processes supporting the executing software application,wherein the second set of memory spaces are determined based on (i) oneor more relationships between the executing software application and theone or more processes supporting the executing software application, and(ii) one or more relationships among the one or more processessupporting the executing software application; and initiating, by one ormore computer processors, a dump function to obtain data within thememory spaces of the determined first set of memory spaces and thedetermined second set of memory spaces.
 2. The method of claim 1,further comprising: in response to detecting one or more deviationsrelated to a service level agreement corresponding to an executingsoftware application, initiating, by one or more computer processors,debugging of the executing software application.
 3. The method of claim1, further comprising: in response to receiving a request to diagnosethe executing software application, initiating, by one or more computerprocessors, debugging of the executing software application
 4. Themethod of claim 1, wherein relationships are determined based oninformation selected from the group consisting of a memory catalogingfunction, a process tracing function, a process tree, provisioninginformation for a process, indications associated with a memory space,and sharing data among two or more processes.
 5. The method of claim 1,further comprising: identifying, by one or more computer processors, oneor more dictates related to debugging the executing softwareapplication, wherein the one or more dictates are selected from thegroup consisting of: a maximum size for the data related to the dumpedfrom among the determined first set of memory spaces and the determinedsecond set of memory spaces, a scope of tracing associated with thedetermined first set of memory spaces and the determined second set ofmemory spaces, specifying one or more processes supporting the executingsoftware application to dump, and an order to dump the determined firstset of memory spaces and the determined second set of memory spaces; anddetermining, by one or more computer processors, one or more memoryspaces to dump utilizing the dump function, from among the determinedfirst set of memory spaces and the determined second set of memoryspaces, based, at least in part, on the identified one or more dictatesrelated to debugging the executing software application.
 6. The methodof claim 1, further comprising: filtering, by one or more computerprocessors, the determined first set of memory spaces and the determinedsecond set of memory spaces to remove duplicate references correspondingto a memory space to dump.
 7. The method of claim 1, further comprising:identifying, by one or more computer processors, information associatedwith the determined first set of memory spaces and the determined secondset of memory, wherein the information includes: an ID corresponding toa memory space, one or more process IDs that access the memory space,and an indication identifying whether the memory space was released; andstoring, by one or more computer processors, the identified informationwithin a report related to debugging the executing software application.8. A computer program product for obtaining data to debug an issue thataffects a software application, the computer program product comprising:one or more computer readable storage media and program instructionsstored on the one or more computer readable storage media, the programinstructions readable/executable by one or more computer processors andfurther comprising: program instructions to determine a first set ofmemory spaces utilized by an executing software application; programinstructions to determine a second set of memory spaces utilized by theone or more processes supporting the executing software application,wherein the second set of memory spaces are determined based on (i) oneor more relationships between the executing software application and theone or more processes supporting the executing software application, and(ii) one or more relationships among the one or more processessupporting the executing software application; and program instructionsto initiate dump function to obtain data within the memory spaces of thedetermined first set of memory spaces and the determined second set ofmemory spaces.
 9. The computer program product of claim 8, furthercomprising: in response to detecting one or more deviations related to aservice level agreement corresponding to an executing softwareapplication, program instructions to initiate debugging of the executingsoftware application.
 10. The computer program product of claim 8,further comprising: in response to receiving a request to diagnose theexecuting software application, program instructions to initiatedebugging of the executing software application
 11. The computer programproduct of claim 8, wherein relationships are determined based oninformation selected from the group consisting of a memory catalogingfunction, a process tracing function, a process tree, provisioninginformation for a process, indications associated with a memory space,and sharing data among two or more processes.
 12. The computer programproduct of claim 8, further comprising: program instructions to identifyone or more dictates related to debugging the executing softwareapplication, wherein the one or more dictates are selected from thegroup consisting of: a maximum size for the data related to the dumpedfrom among the determined first set of memory spaces and the determinedsecond set of memory spaces, a scope of tracing associated with thedetermined first set of memory spaces and the determined second set ofmemory spaces, specifying one or more processes supporting the executingsoftware application to dump, and an order to dump the determined firstset of memory spaces and the determined second set of memory spaces; andprogram instructions to determine one or more memory spaces to dumputilizing the dump function, from among the determined first set ofmemory spaces and the determined second set of memory spaces, based, atleast in part, on the identified one or more dictates related todebugging the executing software application.
 13. The computer programproduct of claim 8, further comprising: program instructions to filterthe determined first set of memory spaces and the determined second setof memory spaces to remove duplicate references corresponding to amemory space to dump.
 14. The computer program product of claim 8,further comprising: program instructions to identify informationassociated with the determined first set of memory spaces and thedetermined second set of memory, wherein the information includes: an IDcorresponding to a memory space, one or more process IDs that access thememory space, and an indication identifying whether the memory space wasreleased; and program instructions to store the identified informationwithin a report related to debugging the executing software application.15. A computer system for obtaining data to debug an issue that affectsa software application the computer system comprising: one or morecomputer processors; one or more computer readable storage media;program instructions stored on the computer readable storage media forreading/execution by at least one of the one or more computerprocessors, the program instructions further comprising: programinstructions to determine a first set of memory spaces utilized by anexecuting software application; program instructions to determine asecond set of memory spaces utilized by the one or more processessupporting the executing software application, wherein the second set ofmemory spaces are determined based on (i) one or more relationshipsbetween the executing software application and the one or more processessupporting the executing software application, and (ii) one or morerelationships among the one or more processes supporting the executingsoftware application; and program instructions to initiate dump functionto obtain data within the memory spaces of the determined first set ofmemory spaces and the determined second set of memory spaces.
 16. Thecomputer system of claim 15, further comprising: in response todetecting one or more deviations related to a service level agreementcorresponding to an executing software application, program instructionsto initiate debugging of the executing software application.
 17. Thecomputer system of claim 15, wherein relationships are determined basedon information selected from the group consisting of a memory catalogingfunction, a process tracing function, a process tree, provisioninginformation for a process, indications associated with a memory space,and sharing data among two or more processes.
 18. The computer system ofclaim 15, further comprising: program instructions to identify one ormore dictates related to debugging the executing software application,wherein the one or more dictates are selected from the group consistingof: a maximum size for the data related to the dumped from among thedetermined first set of memory spaces and the determined second set ofmemory spaces, a scope of tracing associated with the determined firstset of memory spaces and the determined second set of memory spaces,specifying one or more processes supporting the executing softwareapplication to dump, and an order to dump the determined first set ofmemory spaces and the determined second set of memory spaces; andprogram instructions to determine one or more memory spaces to dumputilizing the dump function, from among the determined first set ofmemory spaces and the determined second set of memory spaces, based, atleast in part, on the identified one or more dictates related todebugging the executing software application.
 19. The computer system ofclaim 15, further comprising: program instructions to filter thedetermined first set of memory spaces and the determined second set ofmemory spaces to remove duplicate references corresponding to a memoryspace to dump.
 20. The computer system of claim 15, further comprising:program instructions to identify information associated with thedetermined first set of memory spaces and the determined second set ofmemory, wherein the information includes: an ID corresponding to amemory space, one or more process IDs that access the memory space, andan indication identifying whether the memory space was released; andprogram instructions to store the identified information within a reportrelated to debugging the executing software application.