Michel Dänzer wrote:
> 
> On Son, 2002-02-10 at 10:31, Gareth Hughes wrote:
> 
> > These chips can read and write arbitrary locations in system memory.
> > For all chips that have this feature, the only safe way to program them
> > is from within a DRM kernel module.  Only clients that have been
> > authenticated via the usual (X auth) means are able to talk to such
> > modules.  There is simply no other way to do it.  You can trust the X
> > server and the kernel module.  You CANNOT trust anything else -- a
> > client-side 3D driver, something masquerading as one, whatever...
> 
> I wonder what this means for the current indirect buffer implementation
> in the r128 driver. It's been pretty much copied and pasted from radeon,
> I assume these issues have been thought about there?

I haven't had a good look at security on either of these cards, but it's
definitely worth doing, both to find out if we're doing too little and if
we're doing too much.

Keith

_______________________________________________
Dri-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/dri-devel

Reply via email to