Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp6029434ybc; Wed, 27 Nov 2019 13:41:59 -0800 (PST) X-Google-Smtp-Source: APXvYqwYu+syrYILgf1PGjnob96rI4zEupxScIsH8akRNZ7uPjCiLW/RGSD6B7E+PUJoNf/AyeW5 X-Received: by 2002:aa7:c0c8:: with SMTP id j8mr34250904edp.235.1574890919661; Wed, 27 Nov 2019 13:41:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574890919; cv=none; d=google.com; s=arc-20160816; b=Eo/+W1nvDyqF4yUy8JIX5gMLrEn385qudXMCm6GyOgwtz84LODgtccUi7CDn+MxR47 eQcyEgbhr4UIAgGY4B3fQTpyJ2Zxe0PU1TuT6EwUHgIxGnUY/n0TGPF7BW0N0c+hKB7q N7gIb0MYvPX9/Vb16+IUZuYf50zPvBs+q7FNOytIBAZKBlPWlxDva4cE98MdR5iMrHp3 p4S08Fk89T7cePk0mG2DLO/p7zqDZRyQTp3MBX8MSuIeq4+VDM6XfsJD4+mkLmRKTDz8 l04KqQZyqPOncAXSmtHW5kNzy6SJ0Ca1Jen+YWTM0k+uiB5kDdX9yf0+2rIGtq08SOmR G89w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=t+Lci+V+HkTqe8lnEK+oHxxfvXMOz9htjiJpK4ofnAo=; b=vnUlz5z9Em3eb6fdETYmdBxkhEHpg7RerPAuwcQ/hZ5Rda4WD3L+ZwK+K8Jl6ZleE0 LPOmZ0gXSLvvQtx6SLk+I6fe5ZWj4/y93P9XJMBAIfHG3OXEN7hQQBN6j3v3K/gqz0xr seDsdJdHBf6L8ULWEDuOT3I+loRq6mmiR0c68OgTmWJuqD8QI9r0o/w4hGiZTIW6CbnJ 42PECr8cmnORaZDzqpU/seFoV4ksjLx0y+fx8TVpXWidsv5NcQmHQs1TQv1Zm9OhIxvT klOHPOjYZaCzKSb/ebIpUiJngYjBsgU+MJ6P6Ba2KOt/Po/0ez04ebWDNXsa69M5ZsHI jNBw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ee0w3e6L; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z16si9982779eji.25.2019.11.27.13.41.36; Wed, 27 Nov 2019 13:41:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ee0w3e6L; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729969AbfK0UrM (ORCPT + 99 others); Wed, 27 Nov 2019 15:47:12 -0500 Received: from mail.kernel.org ([198.145.29.99]:59564 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729950AbfK0UrD (ORCPT ); Wed, 27 Nov 2019 15:47:03 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CF0D72166E; Wed, 27 Nov 2019 20:47:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574887622; bh=A6r981WiwlLsuLjXzBrf8L+e7ByY9YU5xFewKaitogw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Ee0w3e6LMjFYDlt27IbYOUxmjUj4S7iYJwiYNZ5OFupV0JJFkVkfbHX1Oe0kJ2PWk L4iNsJ9gU//KTcJnWltuW91N/NCBGRLlk2PhcHNuGhlov0i5r/aH9YC1EnfEM/GTJd uTFJkUvFEJr4PbEMewx90w+uTqgyJj5CUSx1xDgY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ondrej Zary , Jens Axboe , Sasha Levin Subject: [PATCH 4.14 030/211] cdrom: dont attempt to fiddle with cdo->capability Date: Wed, 27 Nov 2019 21:29:23 +0100 Message-Id: <20191127203054.355605248@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191127203049.431810767@linuxfoundation.org> References: <20191127203049.431810767@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jens Axboe [ Upstream commit 8f94004e2a51a3ea195cf3447eb5d5906f36d8b3 ] We can't modify cdo->capability as it is defined as a const. Change the modification hack to just WARN_ON_ONCE() if we hit any of the invalid combinations. This fixes a regression for pcd, which doesn't work after the constify patch. Fixes: 853fe1bf7554 ("cdrom: Make device operations read-only") Tested-by: Ondrej Zary Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- drivers/cdrom/cdrom.c | 27 +++++++++++++-------------- 1 file changed, 13 insertions(+), 14 deletions(-) diff --git a/drivers/cdrom/cdrom.c b/drivers/cdrom/cdrom.c index ea6558d4864c0..90dd8e7291dab 100644 --- a/drivers/cdrom/cdrom.c +++ b/drivers/cdrom/cdrom.c @@ -410,10 +410,10 @@ static int cdrom_get_disc_info(struct cdrom_device_info *cdi, * hack to have the capability flags defined const, while we can still * change it here without gcc complaining at every line. */ -#define ENSURE(call, bits) \ -do { \ - if (cdo->call == NULL) \ - *change_capability &= ~(bits); \ +#define ENSURE(cdo, call, bits) \ +do { \ + if (cdo->call == NULL) \ + WARN_ON_ONCE((cdo)->capability & (bits)); \ } while (0) /* @@ -589,7 +589,6 @@ int register_cdrom(struct cdrom_device_info *cdi) { static char banner_printed; const struct cdrom_device_ops *cdo = cdi->ops; - int *change_capability = (int *)&cdo->capability; /* hack */ cd_dbg(CD_OPEN, "entering register_cdrom\n"); @@ -601,16 +600,16 @@ int register_cdrom(struct cdrom_device_info *cdi) cdrom_sysctl_register(); } - ENSURE(drive_status, CDC_DRIVE_STATUS); + ENSURE(cdo, drive_status, CDC_DRIVE_STATUS); if (cdo->check_events == NULL && cdo->media_changed == NULL) - *change_capability = ~(CDC_MEDIA_CHANGED | CDC_SELECT_DISC); - ENSURE(tray_move, CDC_CLOSE_TRAY | CDC_OPEN_TRAY); - ENSURE(lock_door, CDC_LOCK); - ENSURE(select_speed, CDC_SELECT_SPEED); - ENSURE(get_last_session, CDC_MULTI_SESSION); - ENSURE(get_mcn, CDC_MCN); - ENSURE(reset, CDC_RESET); - ENSURE(generic_packet, CDC_GENERIC_PACKET); + WARN_ON_ONCE(cdo->capability & (CDC_MEDIA_CHANGED | CDC_SELECT_DISC)); + ENSURE(cdo, tray_move, CDC_CLOSE_TRAY | CDC_OPEN_TRAY); + ENSURE(cdo, lock_door, CDC_LOCK); + ENSURE(cdo, select_speed, CDC_SELECT_SPEED); + ENSURE(cdo, get_last_session, CDC_MULTI_SESSION); + ENSURE(cdo, get_mcn, CDC_MCN); + ENSURE(cdo, reset, CDC_RESET); + ENSURE(cdo, generic_packet, CDC_GENERIC_PACKET); cdi->mc_flags = 0; cdi->options = CDO_USE_FFLAGS; -- 2.20.1