--- Thomas Hellström <[EMAIL PROTECTED]> wrote: > > You are probably right, and it would be quite easy to implement such > checks in the via command verifier as long as each lock is associated > with > a certain hardware address range. > > However, I don't quite see the point in plugging such a security hole > when > there are a similar ways to accomplish DOS, hardware crashes and even > complete lockups using DRI. > The ideas is to plug all of them, soner or later.
> On via, for example, writing random data to the framebuffer, writing > random data to the sarea, taking the hardware lock and sleeping for an > indefinite amount of time. Writing certain data sequences to the HQV > locks > the north bridge etc. > > Seems like DRI allow authorized clients to do these things by design? > > > /Thomas > > > > > > > > > > > > > > > > __________________________________ > > Do you Yahoo!? > > Yahoo! Mail - You care about security. So do we. > > http://promotions.yahoo.com/new_mail > > > > > __________________________________ Do you Yahoo!? Check out the new Yahoo! Front Page. www.yahoo.com ------------------------------------------------------- This SF.Net email is sponsored by: Sybase ASE Linux Express Edition - download now for FREE LinuxWorld Reader's Choice Award Winner for best database on Linux. http://ads.osdn.com/?ad_id=5588&alloc_id=12065&op=click -- _______________________________________________ Dri-devel mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/dri-devel