On Sun, Mar 22, 2009 at 1:38 PM, Chetan Nanda <[email protected]> wrote:
> Hi All,
>
> I am experimenting with real time process on kernel version 2.6.24 (under
> UML) and having root privileges.
> I have written a simple code as follow:
>
> /*##############################*/
> int main()
> {
>     pid_t pid;
>     struct sched_param param;
>     pid = getpid();
>     memset((void *)&param, 0 , sizeof(struct sched_param));
>     param.sched_priority = 30;
>
>     /*change the priority to rt*/
>     sched_setscheduler(pid,SCHED_FIFO, &param);
>
>     while(1);
> }
> /*##############################*/
>
> On running this program cause system to hangs and this is as per the real
> time task implementation in the kernel.
> Which says a rt task with policy equal to 'SCHED_FIFO' will run till it
> voluntarily release CPU.
>
> Is there any way to kill such task? Isn't this kind of behavior compromising
> system security?
>

AFAIK, No.

And as far as the security is concerned, only a super user can run
this task. Meaning that the user has the authority to do such things.



> ~~
> Chetan Nanda
>



-- 
Regards,
Sandeep.





        
“To learn is to change. Education is a process that changes the learner.”

--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to [email protected]
Please read the FAQ at http://kernelnewbies.org/FAQ

Reply via email to