A technique is disclosed for detecting a memory leak. A request to
allocate or deallocate memory is received. In a memory leak table that is
bounded in size, an entry that is associated with a call path with which
the request is associated is accessed. The entry in the memory leak table
is updated.