Skip to content
Snippets Groups Projects
Commit a13a6d60 authored by Ivica Bukvic's avatar Ivica Bukvic
Browse files

tried a quick fix to enable rt by default (needs to be tested)

parent e6cf50d1
No related branches found
No related tags found
No related merge requests found
...@@ -1170,13 +1170,18 @@ int sys_startgui(const char *guidir) ...@@ -1170,13 +1170,18 @@ int sys_startgui(const char *guidir)
#if defined(__linux__) || defined(IRIX) #if defined(__linux__) || defined(IRIX)
/* now that we've spun off the child process we can promote /* now that we've spun off the child process we can promote
our process's priority, if we can and want to. If not specfied our process's priority, if we can and want to. If not specfied
(-1), we check root status. This misses the case where we might (-1), we assume real-time was wanted. Afterward, just in case
have permission from a "security module" (linux 2.6) -- I don't someone made Pd setuid in order to get permission to do this,
know how to test for that. The "-rt" flag must b eset in that unset setuid and lose root priveliges after doing this. Starting
case. */ in Linux 2.6 this is accomplished by putting lines like:
@audio - rtprio 99
@audio - memlock unlimited
in the system limits file, perhaps /etc/limits.conf or
/etc/security/limits.conf */
if (sys_hipriority == -1) if (sys_hipriority == -1)
sys_hipriority = (!getuid() || !geteuid()); sys_hipriority = 1; //(!getuid() || !geteuid());
sprintf(cmdbuf, "%s/pd-watchdog\n", guidir);
if (sys_hipriority) if (sys_hipriority)
{ {
/* To prevent lockup, we fork off a watchdog process with /* To prevent lockup, we fork off a watchdog process with
...@@ -1216,7 +1221,6 @@ int sys_startgui(const char *guidir) ...@@ -1216,7 +1221,6 @@ int sys_startgui(const char *guidir)
} }
close(pipe9[1]); close(pipe9[1]);
sprintf(cmdbuf, "%s/pd-watchdog\n", guidir);
if (sys_verbose) fprintf(stderr, "%s", cmdbuf); if (sys_verbose) fprintf(stderr, "%s", cmdbuf);
execl("/bin/sh", "sh", "-c", cmdbuf, (char*)0); execl("/bin/sh", "sh", "-c", cmdbuf, (char*)0);
perror("pd: exec"); perror("pd: exec");
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment