cxl/security: Drop security command ioctl uapi
authorDan Williams <dan.j.williams@intel.com>
Tue, 6 Dec 2022 04:22:44 +0000 (20:22 -0800)
committerDan Williams <dan.j.williams@intel.com>
Tue, 6 Dec 2022 22:36:02 +0000 (14:36 -0800)
commit7fe898041fb0c8e630504ecc2cb8805651ac85c1
tree1155178b662404c422d9e3bb0760c97eb58eb123
parent2aeaf663b85e436dc6287692b7561ffbf0aa4381
cxl/security: Drop security command ioctl uapi

CXL PMEM security operations are routed through the NVDIMM sysfs
interface. For this reason the corresponding commands are marked
"exclusive" to preclude collisions between the ioctl ABI and the sysfs
ABI. However, a better way to preclude that collision is to simply
remove the ioctl ABI (command-id definitions) for those operations.

Now that cxl_internal_send_cmd() (formerly cxl_mbox_send_cmd()) no
longer needs to talk the cxl_mem_commands array, all of the uapi
definitions for the security commands can be dropped.

These never appeared in a released kernel, so no regression risk.

Reviewed-by: Dave Jiang <dave.jiang@intel.com>
Reviewed-by: Ira Weiny <ira.weiny@intel.com>
Link: https://lore.kernel.org/r/167030056464.4044561.11486507095384253833.stgit@dwillia2-xfh.jf.intel.com
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
drivers/cxl/core/mbox.c
include/uapi/linux/cxl_mem.h