On Thu, 2008-06-12 at 09:03 +0200, Thomas Hellström wrote:

> Yes, unless it's to enforce a local permission model, like the old DRM 
> shmem maps did.

Abusing GEM objects to hold state which never touches the graphics card
is an ugly way to accomplish this.

We can create a cryptographically secure name for a secret 'shmem'
object and pass the name of that over the DRI2 protocol.

-- 
[EMAIL PROTECTED]

Attachment: signature.asc
Description: This is a digitally signed message part

-------------------------------------------------------------------------
Check out the new SourceForge.net Marketplace.
It's the best place to buy or sell services for
just about anything Open Source.
http://sourceforge.net/services/buy/index.php
--
_______________________________________________
Dri-devel mailing list
Dri-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dri-devel

Reply via email to