[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Kernel/Memory Bleed

Posted on 2002-05-14
1
Medium Priority
?
339 Views
Last Modified: 2008-03-06
Can anyone explain to me what a Kernel/Memory bleed is and how to fix it?
0
Comment
Question by:Whittonian
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 32

Accepted Solution

by:
jhance earned 300 total points
ID: 7009470
If by "bleed" you mean what is more commonly called "leak" then the answer is the allocation of memory or other resources in a program without freeing them.

Example:

main()
{
  BYTE *p;

  while(1){
    Sleep(1000);
    p = new BYTE[1024];
  }
}

What does this program do?  It allocates 1024 BYTES of memory, and then does it again.  Over and over again.  Eventually all available resources for memory allocation will be consumed.

Of course, in practice things are not usually this obvious.  Usually you have objects or memory or handles or whatever that you forget to free under certain circumstances and the program "leaks".
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Geo-targeting is the practice of distributing content based on a person’s location, as best as you can determine it. Let’s look at some ways you could successfully use this tactic. The following tips and case studies could lead to meaningful results.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question