*missingFile
New Member
- Reaction score
- 0
Well, I was thinking “hey, you shouldn't believe everything you read” and then I realized I wanted to know something: how do we know leaks are real?
At first, I considered the following example of proof:
Alright, I created a trigger, that's taking memory from Warcraft III, right? So the idea is [LJASS]DestroyTrigger[/LJASS] will remove it from memory and “clear” the leak. But how do we know that Warcraft III doesn't fail some how and keep the memory anyways?
How do we really know anything about how Warcraft III uses memory? Was it reverse–engineered or did other programmers apply real programming knowledge on Warcraft III?
At first, I considered the following example of proof:
JASS:
function InitTrig_DynamicTriggerKing takes nothing returns nothing
local trigger t=CreateTrigger()
set t=null
endfunction
Alright, I created a trigger, that's taking memory from Warcraft III, right? So the idea is [LJASS]DestroyTrigger[/LJASS] will remove it from memory and “clear” the leak. But how do we know that Warcraft III doesn't fail some how and keep the memory anyways?
How do we really know anything about how Warcraft III uses memory? Was it reverse–engineered or did other programmers apply real programming knowledge on Warcraft III?