Global Information Lookup Global Information

Resource leak information


In computer science, a resource leak is a particular type of resource consumption by a computer program where the program does not release resources it has acquired. This condition is normally the result of a bug in a program. Typical resource leaks include memory leak and handle leak, particularly file handle leaks, though memory is often considered separately from other resources.[1]

Examples of resources available in limited numbers to the operating system include internet sockets, file handles, process table entries, and process identifiers (PIDs). Resource leaks are often a minor problem, causing at most minor slowdown and being recovered from after processes terminate. In other cases resource leaks can be a major problem, causing resource starvation and severe system slowdown or instability, crashing the leaking process, other processes, or even the system.[2] Resource leaks often go unnoticed under light load and short runtimes, and these problems only manifest themselves under heavy system load or systems that remain running for long periods of time.[3]

Resource leaks are particularly a problem for resources available in very low quantities. Leaking a unique resource, such as a lock, is particularly serious, as this causes immediate resource starvation (it prevents other processes from acquiring it) and causes deadlock. Intentionally leaking resources can be used in a denial-of-service attack, such as a fork bomb, and thus resource leaks present a security bug.

  1. ^ Deitel, Harvey M.; Deitel, Paul J. (2005), C# for Programmers (2nd ed.), Prentice Hall Professional, p. 443, ISBN 9780132465915.
  2. ^ Russinovich, Mark; Solomon, David; Ionescu, Alex (2012), Windows Internals, Part 1 (6th ed.), Pearson Education, p. 279, ISBN 9780735671300.
  3. ^ Gregory, Kate (1998), Using Visual C++ 6, Que Publishing, p. 590, ISBN 9780789715395.

and 21 Related for: Resource leak information

Request time (Page generated in 0.8277 seconds.)

Resource leak

Last Update:

In computer science, a resource leak is a particular type of resource consumption by a computer program where the program does not release resources it...

Word Count : 474

Memory leak

Last Update:

In computer science, a memory leak is a type of resource leak that occurs when a computer program incorrectly manages memory allocations in a way that...

Word Count : 2718

Resource acquisition is initialization

Last Update:

only when the object is alive. Thus if there are no object leaks, there are no resource leaks. RAII is associated most prominently with C++, where it originated...

Word Count : 2032

Handle leak

Last Update:

A handle leak is a type of software bug that occurs when a computer program asks for a handle to a resource but does not free the handle when it is no...

Word Count : 276

System resource

Last Update:

Managing resources is referred to as resource management, and includes both preventing resource leaks (not releasing a resource when a process has finished using...

Word Count : 502

Panama Papers

Last Update:

The Panama Papers (Spanish: Papeles de Panamá) are 11.5 million leaked documents (or 2.6 terabytes of data) that were published beginning on April 3, 2016...

Word Count : 14476

Zombie process

Last Update:

a long time are usually an error and can cause a resource leak. Generally, the only kernel resource they occupy is the process table entry, their process...

Word Count : 1344

Process state

Last Update:

table entry (concretely the process identifier or PID), and causes a resource leak. Two additional states are available for processes in systems that support...

Word Count : 939

Exception safety

Last Update:

corrupted content in v, an incorrect value in the count field, or a resource leak. Crichton, Alex (24 July 2015). "Rust RFC: Stabilize catch_panic". The...

Word Count : 935

Finalizer

Last Update:

common anti-pattern, and forgetting to call dispose will still cause a resource leak. In some cases both techniques are combined, using an explicit dispose...

Word Count : 4013

Linux kernel oops

Last Update:

example, for attackers to repeatedly trigger an oops and an associated resource leak, which eventually overflows an integer and allows further exploitation...

Word Count : 562

Resource exhaustion attack

Last Update:

C++), memory leaks are a very common bug exploited for resource exhaustion. Even if a garbage collected programming language is used, resource exhaustion...

Word Count : 231

Runtime error detection

Last Update:

runtime error detection include: Race conditions Exceptions Resource leaks Memory leaks Security attack vulnerabilities (e.g., SQL injection) Null pointers...

Word Count : 165

API testing

Last Update:

actual running of an API and focuses on monitoring, execution errors, resource leaks, and error detection. Detected errors are fixed to prevent runtime breakdowns...

Word Count : 1259

Kathy Sierra

Last Update:

didn't "rage quit", I just walked away. I shut off a big cognitive resource leak. From the beginning of my time tweeting as Seriouspony, that I tweeted...

Word Count : 1616

Security bug

Last Update:

use of an API Improper use case handling Improper exception handling Resource leaks, often but not always due to improper exception handling Preprocessing...

Word Count : 283

Cppcheck

Last Update:

memory allocation and destructor checks Memory leaks, e.g. due to lost scope without deallocation Resource leaks, e.g. due to forgetting to close a file handle...

Word Count : 734

Resource Conservation and Recovery Act

Last Update:

The Resource Conservation and Recovery Act (RCRA), enacted in 1976, is the principal federal law in the United States governing the disposal of solid waste...

Word Count : 2403

Structured programming

Last Update:

not deallocated, or open files are not closed, causing memory leaks or resource leaks. These must be done at each return site, which is brittle and can...

Word Count : 3717

Crew resource management

Last Update:

Crew resource management or cockpit resource management (CRM) is a set of training procedures for use in environments where human error can have devastating...

Word Count : 3399

Manual memory management

Last Update:

than memory leaks in manual systems. Manual memory management has one correctness advantage, which is that it allows automatic resource management via...

Word Count : 1417

PDF Search Engine © AllGlobal.net