Method for performing memory leak analysis inside a virtual...

Data processing: database and file management or data structures – Garbage collection – Reference counting

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

08032568

ABSTRACT:
A method, system, computer program product, and computer program storage device for performing a memory leak analysis inside a virtual machine is disclosed. By utilizing thread stack(s), class statics, and/or a list of root objects, a DFS algorithm starts execution at root objects in the thread stack(s), class statics, and/or a list of root objects. Upon fully processing an object, a reachability (sum of sizes of all child objects plus a size of the object itself) of the object is calculated. When the reachability of the object is larger than a threshold and when all reachabilities of children of the objects are less than another threshold (i.e., a largest child reachability of the object is less than another threshold), the object is determined as a potential source of a memory leak.

REFERENCES:
patent: 5752241 (1998-05-01), Cohen
patent: 6167535 (2000-12-01), Foote et al.
patent: 6321240 (2001-11-01), Chilimbi et al.
patent: 6330556 (2001-12-01), Chilimbi et al.
patent: 6381735 (2002-04-01), Hunt
patent: 6560773 (2003-05-01), Alexander et al.
patent: 6658652 (2003-12-01), Alexander et al.
patent: 6675379 (2004-01-01), Kolodner et al.
patent: 6934615 (2005-08-01), Flann et al.
patent: 6986117 (2006-01-01), Teig et al.
patent: 7069281 (2006-06-01), Garthwaite
patent: 7092978 (2006-08-01), Garthwaite
patent: 7100003 (2006-08-01), Betancourt et al.
patent: 7234080 (2007-06-01), Cirne et al.
patent: 7293051 (2007-11-01), Printezis et al.
patent: 7313661 (2007-12-01), Dmitriev
patent: 7325106 (2008-01-01), Dmitriev et al.
patent: 7389395 (2008-06-01), Garthwaite et al.
patent: 7412466 (2008-08-01), Garthwaite
patent: 7434206 (2008-10-01), Seidman et al.
patent: 7480782 (2009-01-01), Garthwaite
patent: 7526750 (2009-04-01), Andrews et al.
patent: 7584232 (2009-09-01), Guo
patent: 7594111 (2009-09-01), Kiriansky et al.
patent: 7603704 (2009-10-01), Bruening et al.
patent: 7802232 (2010-09-01), Zorn et al.
patent: 7827538 (2010-11-01), Trotter
patent: 7870170 (2011-01-01), Achanta et al.
patent: 2002/0072830 (2002-06-01), Hunt
patent: 2004/0078540 (2004-04-01), Cirne et al.
patent: 2004/0154016 (2004-08-01), Randall
patent: 2004/0167945 (2004-08-01), Garthwaite
patent: 2004/0167947 (2004-08-01), Garthwaite
patent: 2004/0181562 (2004-09-01), Findeisen
patent: 2004/0181782 (2004-09-01), Findeisen
patent: 2004/0193349 (2004-09-01), Flann et al.
patent: 2005/0114844 (2005-05-01), Betancourt et al.
patent: 2006/0206885 (2006-09-01), Seidman et al.
patent: 2006/0247907 (2006-11-01), Qadeer et al.
patent: 2006/0253845 (2006-11-01), Achanta et al.
patent: 2007/0027942 (2007-02-01), Trotter
patent: 2008/0082968 (2008-04-01), Chang et al.
patent: 2008/0172708 (2008-07-01), Perry et al.
patent: 2008/0271104 (2008-10-01), Perry et al.
patent: 2008/0271105 (2008-10-01), Perry et al.
patent: 2008/0276293 (2008-11-01), Perry et al.
patent: 2009/0089842 (2009-04-01), Perry et al.
Rong Zhou and Eric A. Hansen. 2002. Memory-Bounded A Graph Search. In Proceedings of the Fifteenth International Florida Artificial Intelligence Research Society Conference, Susan M. Haller and Gene Simmons (Eds.). AAAI Press 203-209.
Koushik Sen, Darko Marinov, and Gul Agha. 2005. CUTE: a concolic unit testing engine for C. In Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering (ESEC/FSE-13). ACM, New York, NY, USA, 263-272. DOI=10.1145/1081706.1081750.
Thomas Reps, Susan Horwitz, and Mooly Sagiv. 1995. Precise interprocedural dataflow analysis via graph reachability. In Proceedings of the 22nd ACM SIGPLAN-SIGACT symposium on Principles of programming languages (POPL '95). ACM, New York, NY, USA, 49-61. DOI=10.1145/199448.199462.
Tsai, Timothy et al., “Low-Overhead Run-TimeMemory Leak Detection and Recovery”, 12th Pacific Rim International Symposium on Dependable Computing, (PRDC'06), 2006, pp. 329-340, IEEE.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for performing memory leak analysis inside a virtual... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for performing memory leak analysis inside a virtual..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for performing memory leak analysis inside a virtual... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4253816

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.