On Tue 28-02-23 17:46:51, Suren Baghdasaryan wrote: > Currently /proc/pressure/* files can be written only by processes with > CAP_SYS_RESOURCE capability to prevent any unauthorized user from > creating psi triggers. However no such limitation is required for > per-cgroup pressure files. Fix this inconsistency by requiring the same > capability for writing per-cgroup psi files. > > Fixes: 6db12ee0456d ("psi: allow unprivileged users with CAP_SYS_RESOURCE to write psi files") Is this really a regression from this commit? 6db12ee0456d is changing permissions of those files to be world writeable with the CAP_SYS_RESOURCE requirement. Permissions of cgroup files is not changed and the default mode is 644 (with root as an owner) so only privileged processes are allowed without any delegation. I think you should instead construct this slightly differently. The ultimate goal is to allow a reasonable delegation after all, no? So keep your current patch and extend it by removing the min timeout constrain and justify the change by the necessity of the granularity tuning as reported by Sudarshan Rajagopala. If this causes any regression then a revert would also return the min timeout constrain back and we will have to think about a different approach. The consistency with the global case is a valid point only partially because different cgroups might have different owners which is not usually the case for the global psi interface, right? Makes sense? -- Michal Hocko SUSE Labs