From: Scott Wood Subject: Re: [PATCH 2/2] talitos: Freescale integrated security engine (SEC) driver Date: Fri, 30 May 2008 14:41:17 -0500 Message-ID: <4840585D.8050805@freescale.com> References: <20080529141250.0946b02c.kim.phillips@freescale.com> <20080530180904.GA18945@2ka.mipt.ru> <20080530143614.1e675228.kim.phillips@freescale.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Cc: Evgeniy Polyakov , linuxppc-dev@ozlabs.org, mr.scada@gmail.com, linux-crypto@vger.kernel.org, herbert@gondor.apana.org.au To: Kim Phillips Return-path: Received: from az33egw02.freescale.net ([192.88.158.103]:56893 "EHLO az33egw02.freescale.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751367AbYE3Ttf (ORCPT ); Fri, 30 May 2008 15:49:35 -0400 In-Reply-To: <20080530143614.1e675228.kim.phillips@freescale.com> Sender: linux-crypto-owner@vger.kernel.org List-ID: Kim Phillips wrote: > On Fri, 30 May 2008 22:09:04 +0400 > Evgeniy Polyakov wrote: >> Don't you want to protect against simultaneous access to register space >> from different CPUs? Or it is single processor board only? > > Doesn't linux mask the IRQ line for the interrupt currently being > serviced, and on all processors? Yes. Could there be interference from non-interrupt driver code on another cpu (or interrupted code), though? -Scott