summaryrefslogtreecommitdiff
path: root/include/trace/events/cxl.h
diff options
context:
space:
mode:
authorDan Williams <dan.j.williams@intel.com>2022-12-06 07:22:44 +0300
committerDan Williams <dan.j.williams@intel.com>2022-12-07 01:36:02 +0300
commit7fe898041fb0c8e630504ecc2cb8805651ac85c1 (patch)
tree1155178b662404c422d9e3bb0760c97eb58eb123 /include/trace/events/cxl.h
parent2aeaf663b85e436dc6287692b7561ffbf0aa4381 (diff)
downloadlinux-7fe898041fb0c8e630504ecc2cb8805651ac85c1.tar.xz
cxl/security: Drop security command ioctl uapi
CXL PMEM security operations are routed through the NVDIMM sysfs interface. For this reason the corresponding commands are marked "exclusive" to preclude collisions between the ioctl ABI and the sysfs ABI. However, a better way to preclude that collision is to simply remove the ioctl ABI (command-id definitions) for those operations. Now that cxl_internal_send_cmd() (formerly cxl_mbox_send_cmd()) no longer needs to talk the cxl_mem_commands array, all of the uapi definitions for the security commands can be dropped. These never appeared in a released kernel, so no regression risk. Reviewed-by: Dave Jiang <dave.jiang@intel.com> Reviewed-by: Ira Weiny <ira.weiny@intel.com> Link: https://lore.kernel.org/r/167030056464.4044561.11486507095384253833.stgit@dwillia2-xfh.jf.intel.com Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Diffstat (limited to 'include/trace/events/cxl.h')
0 files changed, 0 insertions, 0 deletions