A technique is disclosed for detecting a memory leak. A request to allocate or deallocate memory is received. In a memory leak table that is bounded in size, an entry that is associated with a call path with which the request is associated is accessed. The entry in the memory leak table is updated. The entry is accessed and a value stored in the entry is read. It is determined if the value indicates that a memory leak may be present.

 
Web www.patentalert.com

> Method and apparatus of adding grant information to a memory

~ 00337