Locating potential sources of memory leaks
First Claim
Patent Images
1. A method of monitoring for potential sources of memory leaks, comprising the steps of:
- tracking size of a first group of stored items; and
determining whether said first group of stored items is a potential memory leak source based on change in size of said first group of stored items.
3 Assignments
0 Petitions
Accused Products
Abstract
Potential sources of memory leaks are identified by tracking the size of groups of stored items and determining based on the growth pattern of the groups whether the groups of stored items are potential sources of memory leaks. An example of a group of stored items is an instance of a Java collection. If the growth pattern of a particular group of stored items indicates that it may be the source of a memory leak, that group is reported to a user and will continue to be tracked.
-
Citations
61 Claims
-
1. A method of monitoring for potential sources of memory leaks, comprising the steps of:
-
tracking size of a first group of stored items; and
determining whether said first group of stored items is a potential memory leak source based on change in size of said first group of stored items. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
tracking size of a first group of stored items; and
determining whether said first group of stored items is a potential source of a memory leak based on change in said size of said first group of stored items. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. An apparatus, comprising:
-
one or more storage devices; and
one or more processors in communication with said one or more storage devices, said one or more processors perform a method comprising the steps of;
tracking size of a first group of stored items, and determining whether said first group of stored items is a potential source of a memory leak based on change in said size of said first group of stored items. - View Dependent Claims (34, 35, 36, 37, 38)
-
-
39. A method of monitoring for potential sources of memory leaks, comprising the steps of:
-
automatically tracking size of a first group of stored items; and
automatically determining whether said size of said first group of stored items grows in a manner that suggests a memory leak. - View Dependent Claims (40, 41, 42)
-
-
43. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
tracking size of a first group of stored items; and
determining whether said size of said first group of stored items has a growth pattern that suggests a memory leak. - View Dependent Claims (44, 45, 46)
-
-
47. A method of monitoring for potential sources of memory leaks, comprising the steps of:
-
receiving a size of a group of stored items;
comparing said received size to a current value of a threshold; and
reporting that said group of stored items is a potential source of a memory leak if said received size satisfies said current value of said threshold and a set of previous values of said threshold have also been satisfied. - View Dependent Claims (48, 49, 50, 51, 52, 53)
-
-
54. One or more processor readable storage devices having processor readable code embodied on said processor readable storage devices, said processor readable code for programming one or more processors to perform a method comprising the steps of:
-
receiving a size of a group of stored items;
comparing said received size to a current value of a threshold; and
determining that said group of stored items is a potential source of a memory leak if said received size satisfies said current value of said threshold and a set of previous values of said threshold have also been satisfied. - View Dependent Claims (55, 56, 57, 58, 59)
-
-
60. An apparatus, comprising:
-
one or more storage devices; and
one or more processors in communication with said one or more storage devices, said one or more processors perform a method comprising the steps of;
receiving a size of an instance of a collection, comparing said received size to a current value of a threshold, and determining that said instance of said collection is a potential source of a memory leak if said received size satisfies said current value of said threshold and a set of previous values of said threshold have also been satisfied.
-
-
61. An apparatus, comprising:
-
one or more storage devices; and
one or more processors in communication with said one or more storage devices, said one or more processors perform a method comprising the steps of;
tracking size of a first instance of a collection, and determining whether said size of said first instance of said collection grows in a manner that suggests a memory leak.
-
Specification