Method for determining scope and cause of memory corruption
First Claim
1. A computer-based method for analyzing computer system memory after a system panic, comprising:
- retrieving an image for memory in a computer system generated after a panic in the computer system;
identifying a data structure in the memory image as a link to the panic; and
applying a data structure rule set to the memory image to determine a scope of corruption in the memory, wherein the data structure rule set is selected based on the identified data structure.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for analyzing memory after a system panic to identify scope and cause of memory corruption. The method includes retrieving a memory image for a computer system and identifying a data structure in the memory image that caused the panic. A rule set for the identified data structure is selected and applied to the memory image to determine a scope of the memory corruption. The method includes identifying data structures in the memory that are related to the identified data structure by type, structure, content, or location and applying the rule set to this subset of data structures. The method may include generating the rule set for the identified data structure and then validating the created rule set such as by applying it to data structures that are known to be uncorrupted. The corrupted data structures are then processed to determine a cause of the corruption.
32 Citations
20 Claims
-
1. A computer-based method for analyzing computer system memory after a system panic, comprising:
-
retrieving an image for memory in a computer system generated after a panic in the computer system;
identifying a data structure in the memory image as a link to the panic; and
applying a data structure rule set to the memory image to determine a scope of corruption in the memory, wherein the data structure rule set is selected based on the identified data structure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for identifying a cause of memory corruption, comprising:
-
providing a set of corrupted data structures from a computer system memory;
identifying a pattern to data corruption in the data structures; and
processing the pattern of the data corruption to determine a cause of the data corruption. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A client support computer system, comprising:
-
a memory device storing a received core file for a client computer system having a memory image for the client computer system and storing data structure rules for a plurality of data structures; and
a memory analysis tool configured to retrieve the memory image of the received core file, to select one of the data structure rules, and to apply the selected one of the data structure rules to a set of data structures in the memory image to create a list of corrupted data structures in the memory image. - View Dependent Claims (18, 19, 20)
-
Specification