]> git.proxmox.com Git - mirror_ubuntu-eoan-kernel.git/commit
[PATCH] Fix RLIMIT_RTPRIO breakage
authorAndreas Steinmetz <ast@domdv.de>
Sat, 23 Jul 2005 11:42:04 +0000 (13:42 +0200)
committerLinus Torvalds <torvalds@g5.osdl.org>
Tue, 26 Jul 2005 22:30:51 +0000 (15:30 -0700)
commit18586e721636527cb5177467fb17e2350615978a
tree96d34b10d000fa8b1df16ae8f4c73761013371b5
parentfc00a6274b786f6863b32c79ff6f92aa0960b789
[PATCH] Fix RLIMIT_RTPRIO breakage

RLIMIT_RTPRIO is supposed to grant non privileged users the right to use
SCHED_FIFO/SCHED_RR scheduling policies with priorites bounded by the
RLIMIT_RTPRIO value via sched_setscheduler(). This is usually used by
audio users.

Unfortunately this is broken in 2.6.13rc3 as you can see in the excerpt
from sched_setscheduler below:

        /*
         * Allow unprivileged RT tasks to decrease priority:
         */
        if (!capable(CAP_SYS_NICE)) {
                /* can't change policy */
                if (policy != p->policy)
                        return -EPERM;

After the above unconditional test which causes sched_setscheduler to
fail with no regard to the RLIMIT_RTPRIO value the following check is made:

               /* can't increase priority */
                if (policy != SCHED_NORMAL &&
                    param->sched_priority > p->rt_priority &&
                    param->sched_priority >
                                p->signal->rlim[RLIMIT_RTPRIO].rlim_cur)
                        return -EPERM;

Thus I do believe that the RLIMIT_RTPRIO value must be taken into
account for the policy check, especially as the RLIMIT_RTPRIO limit is
of no use without this change.

The attached patch fixes this problem.

Signed-off-by: Andreas Steinmetz <ast@domdv.de>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
kernel/sched.c