A technique is disclosed for detecting a memory leak. A request to allocate or deallocate memory is received. In a memory leak table that is bounded in size, an entry that is associated with a call path with which the request is associated is accessed. The entry in the memory leak table is updated.

 
Web www.patentalert.com

< Smart card with volatile memory file subsystem

> Mirrored computer memory on split bus

> Reformat logic to translate between a virtual address and a compressed physical address

~ 00504