[LAD] [ANNOUNCE] Safe real-time on the desktop by default; Desktop/audio RT developers, read this!

Krzysztof Foltman wdev at foltman.com
Mon Jun 22 16:58:41 UTC 2009


Fons Adriaensen wrote:

>> You're not ignoring it, you're practically waging the war against it,
> Ever seen a real war ?

Your point being?

>> The existence of rtkit doesn't make it harder for you to assign RT
>> privileges to every process on the machine. However, it makes it
>> possible to prevent rogue processes from obtaining/abusing the RT
>> scheduling while letting user-approved processes to still use it.
> Which rogue processes ? What was the last time you've seen a
> RT-bomb ? Why did you run it ?

"When was the last time you've seen a Microsoft Word virus? Why did you
open it?" was probably some Microsoft manager's thinking more than
decade ago.

With the increasing number of Linux-based systems sold to novice users,
you're sure nobody will ever use RT API to do something nasty?

Basically, Lennart pointed out a potential security hole and shown a way
to fix it. The fact that it's not abused yet (mostly due to lack of
popularity of RT kernels) doesn't mean it won't be abused ever.
Especially if things like pulseaudio and games will making use of RT
privileges.

Krzysztof



More information about the Linux-audio-dev mailing list