--- Thomas Hellström <[EMAIL PROTECTED]> wrote:

> 
> You are probably right, and it would be quite easy to implement such
> checks in the via command verifier as long as each lock is associated
> with
> a certain hardware address range.
> 
> However, I don't quite see the point in plugging such a security hole
> when
> there are a similar ways to accomplish DOS, hardware crashes and even
> complete lockups using DRI.
> 
The ideas is to plug all of them, soner or later.

> On via, for example, writing random data to the framebuffer, writing
> random data to the sarea, taking the hardware lock and sleeping for an
> indefinite amount of time. Writing certain data sequences to the HQV
> locks
> the north bridge etc.
> 
> Seems like DRI allow authorized clients to do these things by design?
> 
> 
> /Thomas
> 
> 
> 
> 
> >
> >
> >
> >
> >
> > __________________________________
> > Do you Yahoo!?
> > Yahoo! Mail - You care about security. So do we.
> > http://promotions.yahoo.com/new_mail
> >
> 
> 
> 



                
__________________________________ 
Do you Yahoo!? 
Check out the new Yahoo! Front Page. 
www.yahoo.com 
 



-------------------------------------------------------
This SF.Net email is sponsored by:
Sybase ASE Linux Express Edition - download now for FREE
LinuxWorld Reader's Choice Award Winner for best database on Linux.
http://ads.osdn.com/?ad_id=5588&alloc_id=12065&op=click
--
_______________________________________________
Dri-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/dri-devel

Reply via email to