Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 19 for leaky (0.02 seconds)

  1. internal/bpool/bpool.go

    // along with this program.  If not, see <http://www.gnu.org/licenses/>.
    
    package bpool
    
    import (
    	"github.com/klauspost/reedsolomon"
    )
    
    // BytePoolCap implements a leaky pool of []byte in the form of a bounded channel.
    type BytePoolCap struct {
    	c    chan []byte
    	w    int
    	wcap int
    }
    
    // NewBytePoolCap creates a new BytePool bounded to the given maxSize, with new
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 3K bytes
    - Click Count (0)
  2. src/test/java/jcifs/util/ResourceManagerTest.java

            // Check for leaks
            resourceManager.checkForLeaks();
    
            Map<String, Object> stats = resourceManager.getStatistics();
            // The leak counter may or may not increment depending on GC timing
            assertNotNull(stats.get("totalLeaks"));
        }
    
        private void createLeakyResource() {
            TestResource resource = new TestResource("leaky");
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 30 05:58:03 GMT 2025
    - 8.9K bytes
    - Click Count (0)
  3. cmd/leak-detect_test.go

    	"sort"
    	"strings"
    	"time"
    )
    
    const (
    	// deadline (in seconds) up to which the go routine leak detection has to be retried.
    	leakDetectDeadline = 5
    	// pause time (in milliseconds) between each snapshot at the end of the go routine leak detection.
    	leakDetectPauseTimeMs = 50
    )
    
    // LeakDetect - type with  methods for go routine leak detection.
    type LeakDetect struct {
    	relevantRoutines map[string]bool
    }
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 5.2K bytes
    - Click Count (0)
  4. android/guava-tests/test/com/google/common/util/concurrent/ClosingFutureLeakTest.java

    import java.lang.ref.WeakReference;
    import junit.framework.TestCase;
    import org.jspecify.annotations.NullUnmarked;
    
    /** Tests for {@link ClosingFuture} leaks. */
    @NullUnmarked
    @GwtIncompatible
    @J2ktIncompatible
    public class ClosingFutureLeakTest extends TestCase {
      public void testLeak() {
        TestCloseable closeable = new TestCloseable("closeable");
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sat Mar 07 02:20:33 GMT 2026
    - 1.8K bytes
    - Click Count (0)
  5. guava-tests/test/com/google/common/util/concurrent/ClosingFutureLeakTest.java

    import java.lang.ref.WeakReference;
    import junit.framework.TestCase;
    import org.jspecify.annotations.NullUnmarked;
    
    /** Tests for {@link ClosingFuture} leaks. */
    @NullUnmarked
    @GwtIncompatible
    @J2ktIncompatible
    public class ClosingFutureLeakTest extends TestCase {
      public void testLeak() {
        TestCloseable closeable = new TestCloseable("closeable");
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sat Mar 07 02:20:33 GMT 2026
    - 1.8K bytes
    - Click Count (0)
  6. src/main/java/jcifs/smb/BufferCacheImpl.java

         */
        @Override
        public void releaseBuffer(final byte[] buf) {
            if (buf == null) {
                return;
            }
            // better safe than sorry: prevent leaks if there is some out of bound access
            Arrays.fill(buf, (byte) 0);
            synchronized (this.cache) {
                if (this.freeBuffers < this.cache.length) {
                    for (int i = 0; i < this.cache.length; i++) {
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 3.2K bytes
    - Click Count (0)
  7. okhttp-logging-interceptor/README.md

      @Override public void log(String message) {
        Timber.tag("OkHttp").d(message);
      }
    });
    ```
    
    **Warning**: The logs generated by this interceptor when using the `HEADERS` or `BODY` levels have
    the potential to leak sensitive information such as "Authorization" or "Cookie" headers and the
    contents of request and response bodies. This data should only be logged in a controlled way or in
    a non-production environment.
    
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Thu Oct 30 21:39:59 GMT 2025
    - 1.3K bytes
    - Click Count (0)
  8. .github/bot_config.yml

       - sanjoy
    # filesystem path
    filesystem_path:
       - tensorflow/c/experimental/filesystem
    # security path
    security_path:
       - tensorflow/security
    # words checklist
    segfault_memory:
       - segfault
       - memory leaks
    # assignees
    filesystem_security_assignee:
       - mihaimaruseac
       
    # Cuda Comment
    cuda_comment: >
       From the template it looks like you are installing **TensorFlow** (TF) prebuilt binaries:
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Mon Jun 30 16:38:59 GMT 2025
    - 4K bytes
    - Click Count (1)
  9. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/ws/MessageInflater.kt

        } while (inflater.bytesRead < totalBytesToRead && !inflater.finished())
    
        // The inflater data was self-terminated and there's unexpected trailing data. Tear it all down
        // so we don't leak that data into the input of the next message.
        if (inflater.bytesRead < totalBytesToRead) {
          deflatedBytes.clear()
          inflaterSource.close()
          this.inflaterSource = null
          this.inflater = null
        }
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Sun Sep 21 06:26:07 GMT 2025
    - 2.4K bytes
    - Click Count (0)
  10. SECURITY.md

    research](https://scholar.google.com/scholar?q=gpu+side+channel) shows that it
    might be possible to use side channel attacks on the GPU to leak data from other
    running models or processes in the same system. GPUs can also have
    implementation bugs that might allow attackers to leave malicious code running
    and leak or tamper with applications from other users. Please report
    vulnerabilities to the vendor of the affected hardware accelerator.
    
    Created: Tue Apr 07 12:39:13 GMT 2026
    - Last Modified: Wed Oct 16 16:10:43 GMT 2024
    - 9.6K bytes
    - Click Count (0)
Back to Top