OOM-killer prevention for master kdeinit process
Lubos Lunak
l.lunak at suse.cz
Fri Aug 4 14:40:36 BST 2006
On Friday 04 August 2006 15:33, Kuba Ober wrote:
> > The only things done as root are sprintf() with a number,
> > open()/write()/close() of the /proc file, pipe(), reading from the pipe
> > char by char, atol() and kill(). No C++ involved, nobody else can write
> > to the pipe than kdeinit, which only writes getpid() there. Should be
> > perfectly safe (fingers crossed ;) ).
>
> Er, while I wouldn't particularly mind having pipe messages go via
> beautiful, female, 1900's vintage switchboard operators wearing heavy
> makeup, I'm sure it would bring down things to a halt everywhere :)
>
> What's wrong with passing the binary value? It's not like pid_t is suddenly
> gonna change size or endianness on you machine, isn't it? Those pids are
> local. What's the point of having it human-readable?
Strange, it's not evening yet. It must be the Friday then :).
--
Lubos Lunak
KDE developer
---------------------------------------------------------------------
SuSE CR, s.r.o. e-mail: l.lunak at suse.cz , l.lunak at kde.org
Drahobejlova 27 tel: +420 2 9654 2373
190 00 Praha 9 fax: +420 2 9654 2374
Czech Republic http://www.suse.cz/
More information about the kde-core-devel
mailing list