Data processing: database and file management or data structures – Garbage collection – Reference counting
Reexamination Certificate
2008-06-30
2011-10-04
Jalil, Neveen Abel (Department: 2165)
Data processing: database and file management or data structures
Garbage collection
Reference counting
Reexamination Certificate
active
08032568
ABSTRACT:
A method, system, computer program product, and computer program storage device for performing a memory leak analysis inside a virtual machine is disclosed. By utilizing thread stack(s), class statics, and/or a list of root objects, a DFS algorithm starts execution at root objects in the thread stack(s), class statics, and/or a list of root objects. Upon fully processing an object, a reachability (sum of sizes of all child objects plus a size of the object itself) of the object is calculated. When the reachability of the object is larger than a threshold and when all reachabilities of children of the objects are less than another threshold (i.e., a largest child reachability of the object is less than another threshold), the object is determined as a potential source of a memory leak.
REFERENCES:
patent: 5752241 (1998-05-01), Cohen
patent: 6167535 (2000-12-01), Foote et al.
patent: 6321240 (2001-11-01), Chilimbi et al.
patent: 6330556 (2001-12-01), Chilimbi et al.
patent: 6381735 (2002-04-01), Hunt
patent: 6560773 (2003-05-01), Alexander et al.
patent: 6658652 (2003-12-01), Alexander et al.
patent: 6675379 (2004-01-01), Kolodner et al.
patent: 6934615 (2005-08-01), Flann et al.
patent: 6986117 (2006-01-01), Teig et al.
patent: 7069281 (2006-06-01), Garthwaite
patent: 7092978 (2006-08-01), Garthwaite
patent: 7100003 (2006-08-01), Betancourt et al.
patent: 7234080 (2007-06-01), Cirne et al.
patent: 7293051 (2007-11-01), Printezis et al.
patent: 7313661 (2007-12-01), Dmitriev
patent: 7325106 (2008-01-01), Dmitriev et al.
patent: 7389395 (2008-06-01), Garthwaite et al.
patent: 7412466 (2008-08-01), Garthwaite
patent: 7434206 (2008-10-01), Seidman et al.
patent: 7480782 (2009-01-01), Garthwaite
patent: 7526750 (2009-04-01), Andrews et al.
patent: 7584232 (2009-09-01), Guo
patent: 7594111 (2009-09-01), Kiriansky et al.
patent: 7603704 (2009-10-01), Bruening et al.
patent: 7802232 (2010-09-01), Zorn et al.
patent: 7827538 (2010-11-01), Trotter
patent: 7870170 (2011-01-01), Achanta et al.
patent: 2002/0072830 (2002-06-01), Hunt
patent: 2004/0078540 (2004-04-01), Cirne et al.
patent: 2004/0154016 (2004-08-01), Randall
patent: 2004/0167945 (2004-08-01), Garthwaite
patent: 2004/0167947 (2004-08-01), Garthwaite
patent: 2004/0181562 (2004-09-01), Findeisen
patent: 2004/0181782 (2004-09-01), Findeisen
patent: 2004/0193349 (2004-09-01), Flann et al.
patent: 2005/0114844 (2005-05-01), Betancourt et al.
patent: 2006/0206885 (2006-09-01), Seidman et al.
patent: 2006/0247907 (2006-11-01), Qadeer et al.
patent: 2006/0253845 (2006-11-01), Achanta et al.
patent: 2007/0027942 (2007-02-01), Trotter
patent: 2008/0082968 (2008-04-01), Chang et al.
patent: 2008/0172708 (2008-07-01), Perry et al.
patent: 2008/0271104 (2008-10-01), Perry et al.
patent: 2008/0271105 (2008-10-01), Perry et al.
patent: 2008/0276293 (2008-11-01), Perry et al.
patent: 2009/0089842 (2009-04-01), Perry et al.
Rong Zhou and Eric A. Hansen. 2002. Memory-Bounded A Graph Search. In Proceedings of the Fifteenth International Florida Artificial Intelligence Research Society Conference, Susan M. Haller and Gene Simmons (Eds.). AAAI Press 203-209.
Koushik Sen, Darko Marinov, and Gul Agha. 2005. CUTE: a concolic unit testing engine for C. In Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering (ESEC/FSE-13). ACM, New York, NY, USA, 263-272. DOI=10.1145/1081706.1081750.
Thomas Reps, Susan Horwitz, and Mooly Sagiv. 1995. Precise interprocedural dataflow analysis via graph reachability. In Proceedings of the 22nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages (POPL '95). ACM, New York, NY, USA, 49-61. DOI=10.1145/199448.199462.
Tsai, Timothy et al., “Low-Overhead Run-TimeMemory Leak Detection and Recovery”, 12th Pacific Rim International Symposium on Dependable Computing, (PRDC'06), 2006, pp. 329-340, IEEE.
Chacko Joseph K.
Flavell Stephen
Proctor Hedley
Abel Jalil Neveen
Bluestone, Esq. Randall J.
International Business Machines - Corporation
Radtke Mark Andrew X
Scully , Scott, Murphy & Presser, P.C.
LandOfFree
Method for performing memory leak analysis inside a virtual... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for performing memory leak analysis inside a virtual..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for performing memory leak analysis inside a virtual... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4253816