Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp3893082ybc; Thu, 21 Nov 2019 15:46:11 -0800 (PST) X-Google-Smtp-Source: APXvYqzTl0Q9NC14mBKIcN5zsxVj4s57gtk22KtTtSPx474Xn1hEM/ENVVbRRsh8CFqfC37gYGhZ X-Received: by 2002:a17:906:11cf:: with SMTP id o15mr17809650eja.208.1574379971756; Thu, 21 Nov 2019 15:46:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574379971; cv=none; d=google.com; s=arc-20160816; b=xP/F5M8Z56msAMbOhMNLEHVTBKM71Xu3enP1agQlnHLqzdzPdLutrmcPC7w+ngvcfm pqe8ZpLnk4ZwgpUmVjlFLKUhF6EhW5leoP0CD1N9bVJ2iPWD6RmmKwXmfcbpKOuT01ug NnKJBJY+e/Jp6CdRC4RDEC4xGKXK52ydGjiHVSSajxHEl49NnHzm1UBmyBy5MTeagJGd agGpcRkO+R/pwmdBb4ebZUI1FmHVtryPXkB7JhKeUktJDaPROt6VLZCllxsj9En0/cfp 0jMDzxShQyzqP+bpgeDdJ/0Wqcc4TJ9LtKe6x32HN8uFOFnK6XexM4cz0xGdS4k8jzzf tT6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=yQN5Ykhmzlr6yatU5PfK0FoRKBek1Nzxhn05Ga8uiX8=; b=BwgN+PcBDx2pZ2bp7NCusBEJDbBByw9A82B1b/8THw99Wq7pAvh5IzA2Z5vSWp4yfq 6pGSBgHo1Hicq+MEOyjjvRhscmeVCziiwqBRU/WYJ77CQXK7774IpGrVnNFzs1k7np6O IqmvfvRyg40dZlLyc5H6NsOarRP79GUjX31yPKz1EV9FEEaI4noQyJm4zlO6qgeoOP5z Ea++hXLrLbKJcbCXSEsCi7rhMzgZ+jdXU/4D+ltBK7VE4dZ/y8TMVLkFvYuwfJp4VgY+ RaasHTKY1XogskM0LaAHU38gGqnJvybh9TlFdYaqAdhOu9dCsXNDNM5384c2HhW8uF0M WDYg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e21si3024820ejt.77.2019.11.21.15.45.47; Thu, 21 Nov 2019 15:46:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726757AbfKUXnq (ORCPT + 99 others); Thu, 21 Nov 2019 18:43:46 -0500 Received: from mx2.suse.de ([195.135.220.15]:44088 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726038AbfKUXnp (ORCPT ); Thu, 21 Nov 2019 18:43:45 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id E2D6CAECB; Thu, 21 Nov 2019 23:43:42 +0000 (UTC) Date: Fri, 22 Nov 2019 00:43:39 +0100 From: Michal =?iso-8859-1?Q?Such=E1nek?= To: Jens Axboe Cc: linux-scsi@vger.kernel.org, linux-block@vger.kernel.org, Jonathan Corbet , "James E.J. Bottomley" , "Martin K. Petersen" , Alexander Viro , Eric Biggers , "J. Bruce Fields" , Mauro Carvalho Chehab , Benjamin Coddington , Ming Lei , Chaitanya Kulkarni , Bart Van Assche , Damien Le Moal , Hou Tao , Pavel Begunkov , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Jan Kara , Hannes Reinecke , "Ewan D. Milne" , Christoph Hellwig , Matthew Wilcox Subject: Re: [PATCH v4 00/10] Fix cdrom autoclose Message-ID: <20191121234339.GL11661@kitsune.suse.cz> References: <4ba670de-80d4-130e-91f3-c6e1cc9c7a47@kernel.dk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4ba670de-80d4-130e-91f3-c6e1cc9c7a47@kernel.dk> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Nov 21, 2019 at 12:00:03PM -0700, Jens Axboe wrote: > On 11/21/19 10:13 AM, Michal Suchanek wrote: > > Hello, > > > > there is cdrom autoclose feature that is supposed to close the tray, > > wait for the disc to become ready, and then open the device. > > > > This used to work in ancient times. Then in old times there was a hack > > in util-linux which worked around the breakage which probably resulted > > from switching to scsi emulation. > > > > Currently util-linux maintainer refuses to merge another hack on the > > basis that kernel still has the feature so it should be fixed there. > > The code needs not be replicated in every userspace utility like mount > > or dd which has no business knowing which devices are CD-roms and where > > the autoclose setting is in the kernel. > > This is a lot of code/churn (and even an fops addition...) to work around > a broken hw emulation, essentially. Why aren't we just pushing vmware > to fix this? This is fix for kernel feature: cdrom autoclose. There is one patch that deals with blacklisting the feature on VMWare becase their emulation is broken and triggers an issue with the feature when it actually works. Thanks Michal