cxl/mbox: Fix CEL logic for poison and security commands
authorIra Weiny <ira.weiny@intel.com>
Sun, 3 Sep 2023 21:42:58 +0000 (14:42 -0700)
committerDan Williams <dan.j.williams@intel.com>
Thu, 14 Sep 2023 20:48:49 +0000 (13:48 -0700)
commitd2f706058826b803f5b9dc3f6d4c213ae0c54eb9
tree3fe8a92763d305fe4ebb2e23241b2f84faa0e794
parent55b8ff06a0c70e9a6a1696c69f52c0240167d23f
cxl/mbox: Fix CEL logic for poison and security commands

The following debug output was observed while testing CXL

cxl_core:cxl_walk_cel:721: cxl_mock_mem cxl_mem.0: Opcode 0x4300 unsupported by driver

opcode 0x4300 (Get Poison) is supported by the driver and the mock
device supports it.  The logic should be checking that the opcode is
both not poison and not security.

Fix the logic to allow poison and security commands.

Fixes: ad64f5952ce3 ("cxl/memdev: Only show sanitize sysfs files when supported")
Cc: <stable@vger.kernel.org>
Signed-off-by: Ira Weiny <ira.weiny@intel.com>
Reviewed-by: Davidlohr Bueso <dave@stgolabs.net>
Acked-by: Jonathan Cameron <Jonathan.Cameron@huawei.com>
Link: https://lore.kernel.org/r/20230903-cxl-cel-fix-v1-1-e260c9467be3@intel.com
[cleanup cxl_walk_cel() to centralized "enabled" checks]
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
drivers/cxl/core/mbox.c