On Sun, Mar 22, 2009 at 1:38 PM, Chetan Nanda <chetannanda@xxxxxxxxx> wrote: > Hi All, > > I am experimenting with real time process on kernel version 2.6.24 (under > UML) and having root privileges. > I have written a simple code as follow: > > /*##############################*/ > int main() > { > pid_t pid; > struct sched_param param; > pid = getpid(); > memset((void *)¶m, 0 , sizeof(struct sched_param)); > param.sched_priority = 30; > > /*change the priority to rt*/ > sched_setscheduler(pid,SCHED_FIFO, ¶m); > > while(1); > } > /*##############################*/ > > On running this program cause system to hangs and this is as per the real > time task implementation in the kernel. > Which says a rt task with policy equal to 'SCHED_FIFO' will run till it > voluntarily release CPU. > > Is there any way to kill such task? Isn't this kind of behavior compromising > system security? > AFAIK, No. And as far as the security is concerned, only a super user can run this task. Meaning that the user has the authority to do such things. > ~~ > Chetan Nanda > -- Regards, Sandeep. “To learn is to change. Education is a process that changes the learner.” -- To unsubscribe from this list: send an email with "unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx Please read the FAQ at http://kernelnewbies.org/FAQ