?
Solved

Kernel/Memory Bleed

Posted on 2002-05-14
1
Medium Priority
?
337 Views
Last Modified: 2008-03-06
Can anyone explain to me what a Kernel/Memory bleed is and how to fix it?
0
Comment
Question by:Whittonian
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 32

Accepted Solution

by:
jhance earned 300 total points
ID: 7009470
If by "bleed" you mean what is more commonly called "leak" then the answer is the allocation of memory or other resources in a program without freeing them.

Example:

main()
{
  BYTE *p;

  while(1){
    Sleep(1000);
    p = new BYTE[1024];
  }
}

What does this program do?  It allocates 1024 BYTES of memory, and then does it again.  Over and over again.  Eventually all available resources for memory allocation will be consumed.

Of course, in practice things are not usually this obvious.  Usually you have objects or memory or handles or whatever that you forget to free under certain circumstances and the program "leaks".
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In today's business world, data is more important than ever for informing marketing campaigns. Accessing and using data, however, may not come naturally to some creative marketing professionals. Here are four tips for adapting to wield data for insi…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question