[ofw] RE: [PATCH] make kal_cep_config safe
Sean Hefty
sean.hefty at intel.com
Wed Mar 25 14:41:04 PDT 2009
>Currently, kal_config_cep assumes that the CID passed in as input is always
>valid. However, users can destroy CEPs at will using the UAL_DESTROY_CEP IOCTL
>in IBAL. This means that a CEP could be destroyed while other kernel code is
>attempting to configure it, even though the CID was never explicitly exposed to
>user-mode.
>
>This patch traps an invalid CID in kal_config_cep.
Where does a race occur in the current code?
More information about the ofw
mailing list