lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 1 Nov 2021 09:49:06 +0000 From: Suzuki K Poulose <suzuki.poulose@....com> To: Leo Yan <leo.yan@...aro.org>, Mathieu Poirier <mathieu.poirier@...aro.org>, Mike Leach <mike.leach@...aro.org>, Alexander Shishkin <alexander.shishkin@...ux.intel.com>, James Clark <james.clark@....com>, coresight@...ts.linaro.org, linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH v1 1/4] coresight: etm4x: Add lock for reading virtual context ID comparator Hi Leo On 31/10/2021 14:42, Leo Yan wrote: > When read the virtual context ID comparator value via sysfs node, the > driver firstly reads out the index, then reads the comparator value > based on index. > > This patch adds the spinlock to protect the atomicity for up two steps. minor nit: This could be : "Updates to the values and the index are protected via the spinlock. Ensure we use the same lock to read the value safely" With that: Reviewed-by: Suzuki K Poulose <suzuki.poulose@....com>
Powered by blists - more mailing lists