== src/bin/e_desklock.c ==
during auth, user's password may be written
to disk (core dump). To avoid that, the solution
is to limit core file size to 0 with|| setrlimit(). The
problem is that once set to 0, the file size can't
be raised; so we can't reset the size to the value
it was before.

Here is a little patch.

Ok or not ?
--- e_desklock.c	2012-08-22 12:45:13.650831422 +0200
+++ e_desklock.c	2012-08-22 12:43:46.449291918 +0200
@@ -196,6 +196,11 @@
    E_Manager *man;
    int total_zone_num;
    E_Event_Desklock *ev;
+   struct rlimit limit;
+
+   limit.rlim_cur = limit.rlim_max = 0;
+   if (setrlimit(RLIMIT_CORE, &limit) != 0)
+     printf("ERROR: unable to set core limit:  %s\n", strerror(errno));
 
    if (_e_custom_desklock_exe) return 0;
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
enlightenment-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/enlightenment-devel

Reply via email to