tmpreaper should avoid deleting Chromium's SingletonCookie / SingletonSocket

Bug #1003186 reported by Lei Zhang
14
This bug affects 2 people
Affects Status Importance Assigned to Milestone
tmpreaper (Ubuntu)
Confirmed
Undecided
Unassigned

Bug Description

Please add the following files to the --protected list for Chromium / Google Chrome:
/tmp/.org.chromium.Chromium.XXXXXX/SingletonCookie
/tmp/.org.chromium.Chromium.XXXXXX/SingletonSocket
/tmp/.com.google.Chrome.XXXXXX/SingletonCookie
/tmp/.com.google.Chrome.XXXXXX/SingletonSocket

Background info:

Chromium uses a socket file so a new instance of the browser can check for an existing instance. However, if one has an AFS home dir, as reported in [1], then the socket creation would fail and Chromium would not start.

To work around this issue, Chromium creates the socket as /tmp/.org.chromium.Chromium.XXXXXX/SingletonSocket and it has a corresponding SingletonCookie in the same dir. Similarly, Google Chrome has the same setup, except the tmp directory is named /tmp/.com.google.Chrome.XXXXXX instead.

Should these files ever get deleted, say, by tmpreaper, then a new instance of Chromium would fail to see the existing running copy, and corrupt the browser profile due to two browser instances writing to the same profile data directory.

[1] http://code.google.com/p/chromium/issues/detail?id=44606,

Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in tmpreaper (Ubuntu):
status: New → Confirmed
Revision history for this message
Thiemo Nagel (tnagel) wrote :

Note that it is not sufficient to add a protect pattern to TMPREAPER_PROTECT_EXTRA because of breakage in tmpreaper's globbing, cf. https://bugs.debian.org/789919.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.