On Tue, Mar 11, 2003 at 02:41:58PM +0100, Thomas Jarosch wrote:
> > You're letting any user do this ioctl.  If that's ok, fine.
> > You are also accepting data directly from the user, without validating
> > the input at all.  It looks like you can send a mis-formed data packet
> > to the device by doing this.  What happens to the device if you do that?
> 
> Good point. Erasing/writing the eeprom
> should only be done by root. I'll add that...
> The device ignores void data and switches back
> to the default configuration.

That would be a good reason to check for valid data, right?

> > Also, you're still using "typedef" in the ioctl and firmware download
> > code.  Not nice :)
> 
> Hmm, seems like Bill missed to include my patch :-)
> Remember, I've sent you a CC: with the patch?

You sent it to me, but it was against a driver version that I didn't
have :)

> How can another application open /dev/ttyUSB0 when I've locked it?

How do you "lock" a port, using flock(2)?  If another application
doesn't try to also get the lock, but rather just use the port, then it
can open it just fine, right?

thanks,

greg k-h


-------------------------------------------------------
This SF.net email is sponsored by:Crypto Challenge is now open! 
Get cracking and register here for some mind boggling fun and 
the chance of winning an Apple iPod:
http://ads.sourceforge.net/cgi-bin/redirect.pl?thaw0031en
_______________________________________________
[EMAIL PROTECTED]
To unsubscribe, use the last form field at:
https://lists.sourceforge.net/lists/listinfo/linux-usb-devel

Reply via email to