O'Reilly logo
  • Sruthi Pakanati thinks this is interesting:

The second protection technique used by Linux applies to critical sections that occur in interrupt service routines.

From

Cover of Operating System Concepts, 9th Edition

Note

Take Note