summaryrefslogtreecommitdiffstats
path: root/include/trace
diff options
context:
space:
mode:
authorDan Williams <dan.j.williams@intel.com>2022-12-05 20:22:44 -0800
committerDan Williams <dan.j.williams@intel.com>2022-12-06 14:36:02 -0800
commit7fe898041fb0c8e630504ecc2cb8805651ac85c1 (patch)
tree1155178b662404c422d9e3bb0760c97eb58eb123 /include/trace
parent2aeaf663b85e436dc6287692b7561ffbf0aa4381 (diff)
downloadlinux-stable-7fe898041fb0c8e630504ecc2cb8805651ac85c1.tar.gz
linux-stable-7fe898041fb0c8e630504ecc2cb8805651ac85c1.tar.bz2
linux-stable-7fe898041fb0c8e630504ecc2cb8805651ac85c1.zip
cxl/security: Drop security command ioctl uapi
CXL PMEM security operations are routed through the NVDIMM sysfs interface. For this reason the corresponding commands are marked "exclusive" to preclude collisions between the ioctl ABI and the sysfs ABI. However, a better way to preclude that collision is to simply remove the ioctl ABI (command-id definitions) for those operations. Now that cxl_internal_send_cmd() (formerly cxl_mbox_send_cmd()) no longer needs to talk the cxl_mem_commands array, all of the uapi definitions for the security commands can be dropped. These never appeared in a released kernel, so no regression risk. Reviewed-by: Dave Jiang <dave.jiang@intel.com> Reviewed-by: Ira Weiny <ira.weiny@intel.com> Link: https://lore.kernel.org/r/167030056464.4044561.11486507095384253833.stgit@dwillia2-xfh.jf.intel.com Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Diffstat (limited to 'include/trace')
0 files changed, 0 insertions, 0 deletions