Handles leak to processes spawned by runInteractiveProcess
I believe this is related to http://hackage.haskell.org/trac/ghc/ticket/2650 however this occurs on Linux and Windows both, as far as I can tell.
Attached is the test case. It opens a simple server which echoes everything to stdout with two exceptions: commands beginning with q signal "quit" and commands beginning with "l" signal launching a new process.
1) Launch sockLeak. Telnet to port 9020. Type in some junk. It will be echoed.
2) Type in "q". The connection will terminate.
3) Telnet in again. This time, type "l". Now type "q". The connection has not terminated.
4) This is clearly because the handle to the socket has gotten passed to the child process somehow.
Trac metadata
Trac field | Value |
---|---|
Version | 6.10.1 |
Type | Bug |
TypeOfFailure | OtherFailure |
Priority | normal |
Resolution | Unresolved |
Component | libraries/process |
Test case | |
Differential revisions | |
BlockedBy | |
Related | |
Blocking | |
CC | |
Operating system | |
Architecture |