On Mon, Apr 28, 2014 at 04:20:25PM -0600, Nathan Duehr wrote:
> Seems like the brokenness is the behavior of init ignoring 
> /etc/security/limits.conf, to my way of thinking anyway.

Umm, no.  That's you not understanding what limits.conf is.

Limits are hard to grok.  I had to write a massive document at work
explaining it.  And people still don't get it.

Basically:
  init scripts inherit from init (pid 1), which gets defaults from
  the kernel

  Processes initiated by a user will inherit limits from the the user's
  environment.  For most users that will have involved a PAM session,
  and most PAM configs call pam_limits and _that_ reads limits.conf.

  Doing a 'su' will involve PAM and that may cause pam_limits (and thus
  limits.conf) to be read.

Remember that init processes started at boot time will run as root
and so can increase limits.  You need to increase hard limits before
you increase soft limits.

Processes started as a user can _not_ increase hard limits.  You need to
"su" to root, or "su" to a user defined in limits.conf to change those
values.

Bottom line: limits.conf is a PAM config setting for pam_limits.  It's
not in the general path.  Other process _may_ use the file but they need
to have root level privs to obey it properly.

-- 

rgds
Stephen
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to