Package: ratpoison Version: 1.4.9-1+b1 Severity: wishlist Dear Maintainer,
When using ":tmpwm openbox", and subsequently quitting Openbox again, some root window X properties set by openbox remain: | $ xprop -root ; ratpoison -c 'tmpwm openbox' & sleep 2 ; killall openbox ; fg ; xprop -root | _NET_WM_NAME(UTF8_STRING) = "ratpoison" | _NET_SUPPORTED(ATOM) = _NET_WM_PID | XFree86_DDC_EDID1_RAWDATA(INTEGER) = [...snip...] | RESOURCE_MANAGER(STRING) = [...snip...] | _XKB_RULES_NAMES(STRING) = "evdev", "pc105", "de", "nodeadkeys", "terminate:ctrl_alt_bksp,compose:menu,numpad:mac,terminate:ctrl_alt_bksp" | XFree86_has_VT(INTEGER) = 1 | XFree86_VT(INTEGER) = 2 | [1] 26304 | ratpoison -c 'tmpwm openbox' | _NET_WM_NAME(UTF8_STRING) = "ratpoison" | _NET_SUPPORTED(ATOM) = _NET_WM_PID | _NET_CLIENT_LIST(WINDOW): window id # | _NET_CURRENT_DESKTOP(CARDINAL) = 0 | _NET_DESKTOP_NAMES(UTF8_STRING) = "desktop 1", "desktop 2", "desktop 3", "desktop 4" | _NET_WORKAREA(CARDINAL) = 0, 0, 1920, 1080, 0, 0, 1920, 1080, 0, 0, 1920, 1080, 0, 0, 1920, 1080 | _NET_DESKTOP_VIEWPORT(CARDINAL) = 0, 0, 0, 0, 0, 0, 0, 0 | _NET_NUMBER_OF_DESKTOPS(CARDINAL) = 4 | _NET_DESKTOP_GEOMETRY(CARDINAL) = 1920, 1080 | _NET_CLIENT_LIST_STACKING(WINDOW): window id # 0x800001 | _OB_THEME(UTF8_STRING) = "Clearlooks" | _OB_VERSION(UTF8_STRING) = "3.6.1" | _NET_SUPPORTING_WM_CHECK(WINDOW): window id # 0xc0020b | XFree86_DDC_EDID1_RAWDATA(INTEGER) = [...snip...] | RESOURCE_MANAGER(STRING) = [...snip...] | _XKB_RULES_NAMES(STRING) = "evdev", "pc105", "de", "nodeadkeys", "terminate:ctrl_alt_bksp,compose:menu,numpad:mac,terminate:ctrl_alt_bksp" | XFree86_has_VT(INTEGER) = 1 | XFree86_VT(INTEGER) = 2 | $ (One or more of) these xprops reproducibly cause Firefox to crash, unless I manually remove them or restart X. I'm tempted to forgive Firefox in this case, because presumably they're announcing some Window Manager capability that ratpoison doesn't provide. Of course, it would be nice if $TMPWM cleaned up after itself, but I'm not sure if that's a realistic ask: most WMs probably expect the X session to die when they quit, so why would they? And if they crash, they can't. Thus I think ratpoison cleaning up after the tmpwm exits is the best place to do it, hence filing as wishlist here. Feel free to reassign/clone as you see fit. I can of course script ratpoison to do the cleaning up, but this feels like a function that should be default. And/or maybe ratpoison should grow a hookable event when :tmpwm returns, so people can easily drop a cleanup hook in there? Thank you for maintaining ratpoison! Regards, Jan -- System Information: Debian Release: bullseye/sid APT prefers testing APT policy: (990, 'testing'), (650, 'testing-debug'), (550, 'unstable-debug'), (550, 'unstable'), (10, 'experimental-debug'), (10, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 5.7.0-2-amd64 (SMP w/4 CPU threads) Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=C.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) Versions of packages ratpoison depends on: ii libc6 2.31-3 ii libx11-6 2:1.6.10-3 ii libxft2 2.3.2-2 ii libxrandr2 2:1.5.1-1 ii libxtst6 2:1.2.3-1 Versions of packages ratpoison recommends: pn 9menu <none> pn menu <none> ii mlterm [x-terminal-emulator] 3.9.0-1 ii rxvt-unicode [x-terminal-emulator] 9.22-8 Versions of packages ratpoison suggests: pn xbindkeys <none> pn xclip <none> -- no debconf information
signature.asc
Description: PGP signature