Criteria are defined for determining when additional stack dumps would be saved and presented (e.g., to the developer). This provides more information for the developer to use for debugging, and yet does not overburden the developer with irrelevant information. Suspicious activity worthy of an additional stack dumps may be defined as a thread accessing an already suspicious location that is different than the original thread, a write access being made and no write access having yet been made to the target location, or if the lockset being held by the thread accessing the location is omitted from the intersection of all locksets involved in stack dumps for the location.

 
Web www.patentalert.com

< System and method for management of characterized resources

> Managing transactions in a messaging system

> Business process execution language (BPEL) application generator for legacy interfaces

~ 00559