A technique is disclosed for detecting a memory leak. A request to
allocate or deallocate memory is received. In a memory leak table that is
bounded in size, an entry that is associated with a call path with which
the request is associated is accessed. The entry in the memory leak table
is updated. The entry is accessed and a value stored in the entry is
read. It is determined if the value indicates that a memory leak may be
present.