Skip to content

Handles leak to processes spawned by runInteractiveProcess

I believe this is related to http://hackage.haskell.org/trac/ghc/ticket/2650 however this occurs on Linux and Windows both, as far as I can tell.

Attached is the test case. It opens a simple server which echoes everything to stdout with two exceptions: commands beginning with q signal "quit" and commands beginning with "l" signal launching a new process.

1) Launch sockLeak. Telnet to port 9020. Type in some junk. It will be echoed.
2) Type in "q". The connection will terminate.
3) Telnet in again. This time, type "l". Now type "q". The connection has not terminated.
4) This is clearly because the handle to the socket has gotten passed to the child process somehow.
Trac metadata
Trac field Value
Version 6.10.1
Type Bug
TypeOfFailure OtherFailure
Priority normal
Resolution Unresolved
Component libraries/process
Test case
Differential revisions
BlockedBy
Related
Blocking
CC
Operating system
Architecture
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information