On Mon, 22.06.09 19:59, Jens M Andreasen (jens.andreasen@email-addr-hidden) wrote:
>
> Since it is rogue processes - from the interweb? - rather than rough
> users that are the potential problem, wouldn't the cure then be to grant
> certain trusted applications RT-privileges?
>
> A novice user would install well-known binaries from the distros
> repository. The binary runs as user 'rt-audio' which is the only/one of
> the few users on the system granted rt privileges.
But uh, that app could then not access the starting user's file in any
way.
There is no such thing a trusted user applications. And I don't think
we want to go down the road to sandboxing for this.
Lennart
-- Lennart Poettering Red Hat, Inc. lennart [at] poettering [dot] net http://0pointer.net/lennart/ GnuPG 0x1A015CC4 _______________________________________________ Linux-audio-dev mailing list Linux-audio-dev@email-addr-hidden http://lists.linuxaudio.org/mailman/listinfo/linux-audio-devReceived on Tue Jun 23 00:15:02 2009
This archive was generated by hypermail 2.1.8 : Tue Jun 23 2009 - 00:15:02 EEST