Bug 882339
Summary: | spice-xpi doesn't clean up /tmp/spicec-XXXXXX/spice-foreign socket and /tmp/spicec-XXXXXX directory after the client exits | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | David Jaša <djasa> |
Component: | spice-xpi | Assignee: | Peter Hatina <phatina> |
Status: | CLOSED ERRATA | QA Contact: | Desktop QE <desktop-qa-list> |
Severity: | medium | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.4 | CC: | acathrow, cfergeau, dblechte, lnovich, pvine, tjamrisk, tsmetana, uril |
Target Milestone: | beta | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | spice-xpi-2.7-23.el6 | Doc Type: | Bug Fix |
Doc Text: |
Cause: The spice-xpi browser plugin was not cleaning up some socket files after client exit
Consequence: /tmp/spicec-XXXXXX/spice-foreign socket and /tmp/spicec-XXXXXX directory are still present after the client exits.
Fix: Remove these files when the clients exits
Result: These 2 files no longer stay around
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2013-11-21 21:40:45 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 947781 |
Description
David Jaša
2012-11-30 17:36:57 UTC
A patch for this issue was sent to the spice-devel mailing list: http://lists.freedesktop.org/archives/spice-devel/2013-April/012995.html Please, check this scratch build. https://brewweb.devel.redhat.com/taskinfo?taskID=5910797 OK, fixed. Does this issue happen upstream as well? If it does, this needs to get fixed there as well if we don't want to introduce a regression if we rebase or in rhel7 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHEA-2013-1667.html |