On Mon, 22.06.09 19:59, Jens M Andreasen ([email protected]) wrote: > > Since it is rogue processes - from the interweb? - rather than rough > users that are the potential problem, wouldn't the cure then be to grant > certain trusted applications RT-privileges? > > A novice user would install well-known binaries from the distros > repository. The binary runs as user 'rt-audio' which is the only/one of > the few users on the system granted rt privileges.
But uh, that app could then not access the starting user's file in any way. There is no such thing a trusted user applications. And I don't think we want to go down the road to sandboxing for this. Lennart -- Lennart Poettering Red Hat, Inc. lennart [at] poettering [dot] net http://0pointer.net/lennart/ GnuPG 0x1A015CC4 _______________________________________________ Linux-audio-dev mailing list [email protected] http://lists.linuxaudio.org/mailman/listinfo/linux-audio-dev
