As per Stevens/Rago, "file and record locking provides a convenient
mutual-exclusion mechanism".  They note the convention of putting the lock
file in /var/run in a file called <name>.pid, where <name> is the name of
the daemon and content is the pid.  Seems like a good suggestion as I see
pid files from many other daemons there.  However, /var/run is owned by
root, so it is not possible to write in it without root permission.  I
could put the pid file in /tmp, but doing so would make it harder to find. 
I could write a C program to write the lock file that takes command-line
arguments for passing the name of the daemon and the pid and give the
executable suid root, but that's a lot of bother.  Has anyone else dealt
with this problem?
-- 
Jeffrey Barish

--
http://mail.python.org/mailman/listinfo/python-list

Reply via email to