From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 3yM2553tHwzDql4 for ; Wed, 25 Oct 2017 05:35:16 +1100 (AEDT) Received: from pps.filterd (m0098409.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id v9OIZC3U102863 for ; Tue, 24 Oct 2017 14:35:12 -0400 Received: from e34.co.us.ibm.com (e34.co.us.ibm.com [32.97.110.152]) by mx0a-001b2d01.pphosted.com with ESMTP id 2dt78e02ts-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Tue, 24 Oct 2017 14:35:09 -0400 Received: from localhost by e34.co.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Tue, 24 Oct 2017 12:35:01 -0600 Date: Tue, 24 Oct 2017 11:34:50 -0700 From: Ram Pai To: Michael Ellerman Cc: linuxppc-dev@lists.ozlabs.org, benh@kernel.crashing.org, paulus@samba.org, khandual@linux.vnet.ibm.com, aneesh.kumar@linux.vnet.ibm.com, bsingharora@gmail.com, hbabu@us.ibm.com, mhocko@kernel.org, bauerman@linux.vnet.ibm.com, ebiederm@xmission.com Subject: Re: [PATCH 08/25] powerpc: sys_pkey_alloc() and sys_pkey_free() system calls Reply-To: Ram Pai References: <1504910713-7094-1-git-send-email-linuxram@us.ibm.com> <1504910713-7094-17-git-send-email-linuxram@us.ibm.com> <871sls4ke8.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii In-Reply-To: <871sls4ke8.fsf@concordia.ellerman.id.au> Message-Id: <20171024183450.GL5454@ram.oc3035372033.ibm.com> List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Tue, Oct 24, 2017 at 05:48:15PM +0200, Michael Ellerman wrote: > Ram Pai writes: > > > Finally this patch provides the ability for a process to > > allocate and free a protection key. > > This must be the last patch in the series. > > We don't want to expose a half working interface to userspace. The way the patch series is organized -- this patch; even-though introduces the syscall, the syscall will fail because the pkey subsystem is enabled only by the last patch. Till than the code exists , but does a great job of failing with an appropriate return code. Hope this helps, RP