Solved

Kernel/Memory Bleed

Posted on 2002-05-14
1
326 Views
Last Modified: 2008-03-06
Can anyone explain to me what a Kernel/Memory bleed is and how to fix it?
0
Comment
Question by:Whittonian
1 Comment
 
LVL 32

Accepted Solution

by:
jhance earned 100 total points
ID: 7009470
If by "bleed" you mean what is more commonly called "leak" then the answer is the allocation of memory or other resources in a program without freeing them.

Example:

main()
{
  BYTE *p;

  while(1){
    Sleep(1000);
    p = new BYTE[1024];
  }
}

What does this program do?  It allocates 1024 BYTES of memory, and then does it again.  Over and over again.  Eventually all available resources for memory allocation will be consumed.

Of course, in practice things are not usually this obvious.  Usually you have objects or memory or handles or whatever that you forget to free under certain circumstances and the program "leaks".
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cursor typing problems 5 43
Active Directory Replication 10 1,139
Windows 2000 Server Pagefile.sys Error 7 649
Referencing a mapped drive 6 136
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question