mirror of
https://github.com/torvalds/linux.git
synced 2024-11-30 16:11:38 +00:00
cxl/security: Drop security command ioctl uapi
CXL PMEM security operations are routed through the NVDIMM sysfs interface. For this reason the corresponding commands are marked "exclusive" to preclude collisions between the ioctl ABI and the sysfs ABI. However, a better way to preclude that collision is to simply remove the ioctl ABI (command-id definitions) for those operations. Now that cxl_internal_send_cmd() (formerly cxl_mbox_send_cmd()) no longer needs to talk the cxl_mem_commands array, all of the uapi definitions for the security commands can be dropped. These never appeared in a released kernel, so no regression risk. Reviewed-by: Dave Jiang <dave.jiang@intel.com> Reviewed-by: Ira Weiny <ira.weiny@intel.com> Link: https://lore.kernel.org/r/167030056464.4044561.11486507095384253833.stgit@dwillia2-xfh.jf.intel.com Signed-off-by: Dan Williams <dan.j.williams@intel.com>
This commit is contained in:
parent
2aeaf663b8
commit
7fe898041f
@ -65,12 +65,6 @@ static struct cxl_mem_command cxl_mem_commands[CXL_MEM_COMMAND_ID_MAX] = {
|
|||||||
CXL_CMD(GET_SCAN_MEDIA_CAPS, 0x10, 0x4, 0),
|
CXL_CMD(GET_SCAN_MEDIA_CAPS, 0x10, 0x4, 0),
|
||||||
CXL_CMD(SCAN_MEDIA, 0x11, 0, 0),
|
CXL_CMD(SCAN_MEDIA, 0x11, 0, 0),
|
||||||
CXL_CMD(GET_SCAN_MEDIA, 0, CXL_VARIABLE_PAYLOAD, 0),
|
CXL_CMD(GET_SCAN_MEDIA, 0, CXL_VARIABLE_PAYLOAD, 0),
|
||||||
CXL_CMD(GET_SECURITY_STATE, 0, 0x4, 0),
|
|
||||||
CXL_CMD(SET_PASSPHRASE, 0x60, 0, 0),
|
|
||||||
CXL_CMD(DISABLE_PASSPHRASE, 0x40, 0, 0),
|
|
||||||
CXL_CMD(FREEZE_SECURITY, 0, 0, 0),
|
|
||||||
CXL_CMD(UNLOCK, 0x20, 0, 0),
|
|
||||||
CXL_CMD(PASSPHRASE_SECURE_ERASE, 0x40, 0, 0),
|
|
||||||
};
|
};
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@ -717,17 +711,6 @@ int cxl_enumerate_cmds(struct cxl_dev_state *cxlds)
|
|||||||
/* Found the required CEL */
|
/* Found the required CEL */
|
||||||
rc = 0;
|
rc = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
|
||||||
* Setup permanently kernel exclusive commands, i.e. the
|
|
||||||
* mechanism is driven through sysfs, keyctl, etc...
|
|
||||||
*/
|
|
||||||
set_bit(CXL_MEM_COMMAND_ID_SET_PASSPHRASE, cxlds->exclusive_cmds);
|
|
||||||
set_bit(CXL_MEM_COMMAND_ID_DISABLE_PASSPHRASE, cxlds->exclusive_cmds);
|
|
||||||
set_bit(CXL_MEM_COMMAND_ID_UNLOCK, cxlds->exclusive_cmds);
|
|
||||||
set_bit(CXL_MEM_COMMAND_ID_PASSPHRASE_SECURE_ERASE,
|
|
||||||
cxlds->exclusive_cmds);
|
|
||||||
|
|
||||||
out:
|
out:
|
||||||
kvfree(gsl);
|
kvfree(gsl);
|
||||||
return rc;
|
return rc;
|
||||||
|
@ -41,12 +41,6 @@
|
|||||||
___C(GET_SCAN_MEDIA_CAPS, "Get Scan Media Capabilities"), \
|
___C(GET_SCAN_MEDIA_CAPS, "Get Scan Media Capabilities"), \
|
||||||
___C(SCAN_MEDIA, "Scan Media"), \
|
___C(SCAN_MEDIA, "Scan Media"), \
|
||||||
___C(GET_SCAN_MEDIA, "Get Scan Media Results"), \
|
___C(GET_SCAN_MEDIA, "Get Scan Media Results"), \
|
||||||
___C(GET_SECURITY_STATE, "Get Security State"), \
|
|
||||||
___C(SET_PASSPHRASE, "Set Passphrase"), \
|
|
||||||
___C(DISABLE_PASSPHRASE, "Disable Passphrase"), \
|
|
||||||
___C(FREEZE_SECURITY, "Freeze Security"), \
|
|
||||||
___C(UNLOCK, "Unlock"), \
|
|
||||||
___C(PASSPHRASE_SECURE_ERASE, "Passphrase Secure Erase"), \
|
|
||||||
___C(MAX, "invalid / last command")
|
___C(MAX, "invalid / last command")
|
||||||
|
|
||||||
#define ___C(a, b) CXL_MEM_COMMAND_ID_##a
|
#define ___C(a, b) CXL_MEM_COMMAND_ID_##a
|
||||||
|
Loading…
Reference in New Issue
Block a user