OOM-killer prevention for master kdeinit process

Lubos Lunak l.lunak at suse.cz
Fri Aug 4 14:40:36 BST 2006


On Friday 04 August 2006 15:33, Kuba Ober wrote:
> >  The only things done as root are sprintf() with a number,
> > open()/write()/close() of the /proc file, pipe(), reading from the pipe
> > char by char, atol() and kill(). No C++ involved, nobody else can write
> > to the pipe than kdeinit, which only writes getpid() there.  Should be
> > perfectly safe (fingers crossed ;) ).
>
> Er, while I wouldn't particularly mind having pipe messages go via
> beautiful, female, 1900's vintage switchboard operators wearing heavy
> makeup, I'm sure it would bring down things to a halt everywhere :)
>
> What's wrong with passing the binary value? It's not like pid_t is suddenly
> gonna change size or endianness on you machine, isn't it? Those pids are
> local. What's the point of having it human-readable?

 Strange, it's not evening yet. It must be the Friday then :).

-- 
Lubos Lunak
KDE developer
---------------------------------------------------------------------
SuSE CR, s.r.o.  e-mail: l.lunak at suse.cz , l.lunak at kde.org
Drahobejlova 27  tel: +420 2 9654 2373
190 00 Praha 9   fax: +420 2 9654 2374
Czech Republic   http://www.suse.cz/




More information about the kde-core-devel mailing list