diff options
author | Dan Williams <dan.j.williams@intel.com> | 2022-12-05 20:22:44 -0800 |
---|---|---|
committer | Dan Williams <dan.j.williams@intel.com> | 2022-12-06 14:36:02 -0800 |
commit | 7fe898041fb0c8e630504ecc2cb8805651ac85c1 (patch) | |
tree | 1155178b662404c422d9e3bb0760c97eb58eb123 /net/ax25 | |
parent | 2aeaf663b85e436dc6287692b7561ffbf0aa4381 (diff) | |
download | linux-stable-7fe898041fb0c8e630504ecc2cb8805651ac85c1.tar.gz linux-stable-7fe898041fb0c8e630504ecc2cb8805651ac85c1.tar.bz2 linux-stable-7fe898041fb0c8e630504ecc2cb8805651ac85c1.zip |
cxl/security: Drop security command ioctl uapi
CXL PMEM security operations are routed through the NVDIMM sysfs
interface. For this reason the corresponding commands are marked
"exclusive" to preclude collisions between the ioctl ABI and the sysfs
ABI. However, a better way to preclude that collision is to simply
remove the ioctl ABI (command-id definitions) for those operations.
Now that cxl_internal_send_cmd() (formerly cxl_mbox_send_cmd()) no
longer needs to talk the cxl_mem_commands array, all of the uapi
definitions for the security commands can be dropped.
These never appeared in a released kernel, so no regression risk.
Reviewed-by: Dave Jiang <dave.jiang@intel.com>
Reviewed-by: Ira Weiny <ira.weiny@intel.com>
Link: https://lore.kernel.org/r/167030056464.4044561.11486507095384253833.stgit@dwillia2-xfh.jf.intel.com
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Diffstat (limited to 'net/ax25')
0 files changed, 0 insertions, 0 deletions