On Thu, 2008-06-12 at 09:03 +0200, Thomas Hellström wrote: > Yes, unless it's to enforce a local permission model, like the old DRM > shmem maps did.
Abusing GEM objects to hold state which never touches the graphics card is an ugly way to accomplish this. We can create a cryptographically secure name for a secret 'shmem' object and pass the name of that over the DRI2 protocol. -- [EMAIL PROTECTED]
signature.asc
Description: This is a digitally signed message part
------------------------------------------------------------------------- Check out the new SourceForge.net Marketplace. It's the best place to buy or sell services for just about anything Open Source. http://sourceforge.net/services/buy/index.php
-- _______________________________________________ Dri-devel mailing list Dri-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/dri-devel