From owner-freebsd-hackers Thu Aug 7 18:56:30 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id SAA14802 for hackers-outgoing; Thu, 7 Aug 1997 18:56:30 -0700 (PDT) Received: from misery.sdf.com (misery.sdf.com [204.244.210.193]) by hub.freebsd.org (8.8.5/8.8.5) with SMTP id SAA14797 for ; Thu, 7 Aug 1997 18:56:27 -0700 (PDT) Received: from tom by misery.sdf.com with smtp (Exim 1.62 #1) id 0wweHX-0006P1-00; Thu, 7 Aug 1997 18:55:59 -0700 Date: Thu, 7 Aug 1997 18:55:59 -0700 (PDT) From: Tom Samplonius To: David Nugent cc: Alan Batie , hackers@freebsd.org Subject: Re: login classes In-Reply-To: <199708080107.LAA03873@labs.usn.blaze.net.au> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Fri, 8 Aug 1997, David Nugent wrote: ... > > God help me if sendmail gives up root before invoking smrsh and I have to > > hack *it*. Especially when I have two days left before I leave... > > I don't see why this is necessary. Increase resources in your *daemon* > class since that's what applies here. The user's resources aren't > involved except when it comes to counting resource use for that user. Will this actually work? Since daemon hasn't logged in, or been executed by something that can set the resource limits? Also, the issue here is that Alan probably wants smsh NOT to have the limits of daemon, but of that user. Lot of users screw up, and put junk in their .forward file, and when they get mail they end of chewing up CPU, and/or RAM. ... > Regards, > David > > -- > David Nugent - Unique Computing Pty Ltd - Melbourne, Australia > davidn@freebsd.org davidn@blaze.net.au http://www.blaze.net.au/~davidn/ Tom