So why don't we just build a VGA class driver or make null fbdev drivers? That solution works and stays in the model of one driver per device and user space using a device driver to control the hardware. This is a known problem and we have a valid solution, why build a new API perpetuating the old model? If there wasn't a workable alternative available I wouldn't be complaining.
We never have had one device driver for graphics devices, it would be nice yes, it won't be happening today or tomorrow though, I'm trying for now to remove as much of the evil crap from X as I can *now* so it works on certain systems.... I am also however trying to not break current deployments of systems already out there, the enable thing allows this, without adding the vga class stuff, I know I'm going to have to sort this merging of DRM and fb out at some stage, but so far I've falied 3 times and I hate going back to it, I'm going to have to force Greg to sit down and do some hacking at OLS this year, no getting away without fully understanding what we need (guess what the class changes didn't really help :-)
Have you seen this method of getting root from X? http://www.cansecwest.com/slides06/csw06-duflot.ppt It is referenced from Theo de Raadt interview on kerneltrap http://kerneltrap.org/node/6550 I am happy to see progress being made at getting X out of the PCI bus business.
Yes, and it really isn't a surprise, X is evil, but to be honest fixing X doesn't fix that problem, it does allow you to fix the OS more than likely though... Dave. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [email protected] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
- References:
- Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- From: Arjan van de Ven <[email protected]>
- Re: Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- From: "Jon Smirl" <[email protected]>
- Re: Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- From: Arjan van de Ven <[email protected]>
- Re: Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- From: "Jon Smirl" <[email protected]>
- Re: Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- From: Arjan van de Ven <[email protected]>
- Re: Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- From: "Jon Smirl" <[email protected]>
- Re: Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- From: Arjan van de Ven <[email protected]>
- Re: Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- From: "Jon Smirl" <[email protected]>
- Re: Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- From: "Dave Airlie" <[email protected]>
- Re: Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- From: "Jon Smirl" <[email protected]>
- Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- Prev by Date: Re: [Linux-fbdev-devel] [PATCH] vt: Delay the update of the visible framebuffer console
- Next by Date: Re: assert/crash in __rmqueue() when enabling CONFIG_NUMA
- Previous by thread: Re: Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- Next by thread: Re: Add a "enable" sysfs attribute to the pci devices to allow userspace (Xorg) to enable devices without doing foul direct access
- Index(es):