Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp3004472ybg; Thu, 24 Oct 2019 19:50:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqzccv/Q8Fp9b0fBKIW2bMiFl2Vc6Fq0+Llj4/2aQV2PrL4RGW6P2F4eybJJz9nTCAsDwzXi X-Received: by 2002:a50:f058:: with SMTP id u24mr1455543edl.288.1571971802817; Thu, 24 Oct 2019 19:50:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571971802; cv=none; d=google.com; s=arc-20160816; b=fy9rDuBUKrV3hgadKdP0AaO7F7+2vBepy16rfHIutmKZpPToDNXvki59kQKsccFCm1 Hk0H23j/UwCwkX0WXoUBrapKFanAMJqWpQmUzsKZbaXXBBjTT/SezWFT2K30iz4V0f5n ipw67ewYlvg0zmtVlLmA4wcUt+RYpH6XJGwNxD+DbkyOsb05Sj2GNe6O4BKunfuBjTh4 G3HS5E8ilr3LGESS4EgUxYE37FX/EjoBFq0KhjaPOC5/t5PM9TXFA4wvhGqNpwFnmJ7v 8RwQ9TS2vFnxqpebY6uV2etpJAzHErwa5f3vz2kWLY1PYv+Reiey9SEWEdKf/6B/Ljes XJ7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=0Vy4r56Sc0Hn5y7m4fm8qmTqVzn/qhqTVsrqZQYjjTs=; b=h6j8XM8I4sklNOH0yyWT1IZeyV2/yYQavDuKDhpOsgYhsye0nMJ8lzxMFutkmzMtBZ rYVl6e5kDUFH03u8OOKPeSUjFFnJPYYgADLXiG8BfuWyC2t3TZDjGpB31DAOkM9gobRj 2yXlfypVZwCbqHdufP0DVeBhLpMdGuQq03JcWx+d4kQVjrlxlqu8nX3cGd+q9Yo2W+bS d/YZCWlPf7moCT3WMI5UAn2vPslykxZpJJ+M0OMw9Su496fPqjiPpfrPXDQJsmq+56dw 8baSWXi9leifsJB5JMMXu1xk2EfZetMrCYiuhMswlgklM++INhw6UDTWYJbL4wwqIjL9 b4mw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ec21si366924ejb.26.2019.10.24.19.49.38; Thu, 24 Oct 2019 19:50:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732622AbfJXI4g (ORCPT + 99 others); Thu, 24 Oct 2019 04:56:36 -0400 Received: from mx2.suse.de ([195.135.220.15]:54994 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727079AbfJXI4g (ORCPT ); Thu, 24 Oct 2019 04:56:36 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id E21C7B7EF; Thu, 24 Oct 2019 08:56:33 +0000 (UTC) Date: Thu, 24 Oct 2019 10:56:31 +0200 From: Michal =?iso-8859-1?Q?Such=E1nek?= To: Hannes Reinecke Cc: linux-scsi@vger.kernel.org, Jonathan Corbet , Jens Axboe , "James E.J. Bottomley" , "Martin K. Petersen" , Alexander Viro , Mauro Carvalho Chehab , Eric Biggers , "J. Bruce Fields" , Benjamin Coddington , Hannes Reinecke , Omar Sandoval , Ming Lei , Damien Le Moal , Bart Van Assche , Tejun Heo , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: Re: [PATCH v2 7/8] scsi: sr: workaround VMware ESXi cdrom emulation bug Message-ID: <20191024085631.GJ938@kitsune.suse.cz> References: <08f1e291-0196-2402-1947-c0cdaaf534da@suse.de> <20191023162313.GE938@kitsune.suse.cz> <2bc50e71-6129-a482-00bd-0425b486ce07@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <2bc50e71-6129-a482-00bd-0425b486ce07@suse.de> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 24, 2019 at 07:46:57AM +0200, Hannes Reinecke wrote: > On 10/23/19 6:23 PM, Michal Such?nek wrote: > > On Wed, Oct 23, 2019 at 04:13:15PM +0200, Hannes Reinecke wrote: > >> On 10/23/19 2:52 PM, Michal Suchanek wrote: > >>> The WMware ESXi cdrom identifies itself as: > >>> sr 0:0:0:0: [sr0] scsi3-mmc drive: vendor: "NECVMWarVMware SATA CD001.00" > >>> model: "VMware SATA CD001.00" > >>> with the following get_capabilities print in sr.c: > >>> sr_printk(KERN_INFO, cd, > >>> "scsi3-mmc drive: vendor: \"%s\" model: \"%s\"\n", > >>> cd->device->vendor, cd->device->model); > >>> > >>> So the model looks like reliable identification while vendor does not. > >>> > >>> The drive claims to have a tray and claims to be able to close it. > >>> However, the UI has no notion of a tray - when medium is ejected it is > >>> dropped in the floor and the user must select a medium again before the > >>> drive can be re-loaded. On the kernel side the tray_move call to close > >>> the tray succeeds but the drive state does not change as a result of the > >>> call. > >>> > >>> The drive does not in fact emulate the tray state. There are two ways to > >>> get the medium state. One is the SCSI status: > >>> > >>> Physical drive: > >>> > >>> Fixed format, current; Sense key: Not Ready > >>> Additional sense: Medium not present - tray open > >>> Raw sense data (in hex): > >>> 70 00 02 00 00 00 00 0a 00 00 00 00 3a 02 00 00 > >>> 00 00 > >>> > >>> Fixed format, current; Sense key: Not Ready > >>> Additional sense: Medium not present - tray closed > >>> Raw sense data (in hex): > >>> 70 00 02 00 00 00 00 0a 00 00 00 00 3a 01 00 00 > >>> 00 00 > >>> > >>> VMware ESXi: > >>> > >>> Fixed format, current; Sense key: Not Ready > >>> Additional sense: Medium not present > >>> Info fld=0x0 [0] > >>> Raw sense data (in hex): > >>> f0 00 02 00 00 00 00 0a 00 00 00 00 3a 00 00 00 > >>> 00 00 > >>> > >>> So the tray state is not reported here. Other is medium status which the > >>> kernel prefers if available. Adding a print here gives: > >>> > >>> cdrom: get_media_event success: code = 0, door_open = 1, medium_present = 0 > >>> > >>> door_open is interpreted as open tray. This is fine so long as tray_move > >>> would close the tray when requested or report an error which never > >>> happens on VMware ESXi servers (5.5 and 6.5 tested). > >>> > >>> This is a popular virtualization platform so a workaround is worthwhile. > >>> > >>> Signed-off-by: Michal Suchanek > >>> --- > >>> drivers/scsi/sr.c | 6 ++++++ > >>> 1 file changed, 6 insertions(+) > >>> > >>> diff --git a/drivers/scsi/sr.c b/drivers/scsi/sr.c > >>> index 4664fdf75c0f..8090c5bdec09 100644 > >>> --- a/drivers/scsi/sr.c > >>> +++ b/drivers/scsi/sr.c > >>> @@ -867,6 +867,7 @@ static void get_capabilities(struct scsi_cd *cd) > >>> unsigned int ms_len = 128; > >>> int rc, n; > >>> > >>> + static const char *model_vmware = "VMware"; > >>> static const char *loadmech[] = > >>> { > >>> "caddy", > >>> @@ -922,6 +923,11 @@ static void get_capabilities(struct scsi_cd *cd) > >>> buffer[n + 4] & 0x20 ? "xa/form2 " : "", /* can read xa/from2 */ > >>> buffer[n + 5] & 0x01 ? "cdda " : "", /* can read audio data */ > >>> loadmech[buffer[n + 6] >> 5]); > >>> + if (!strncmp(cd->device->model, model_vmware, strlen(model_vmware))) { > >>> + buffer[n + 6] &= ~(0xff << 5); > >>> + sr_printk(KERN_INFO, cd, > >>> + "VMware ESXi bug workaround: tray -> caddy\n"); > >>> + } > >>> if ((buffer[n + 6] >> 5) == 0) > >>> /* caddy drives can't close tray... */ > >>> cd->cdi.mask |= CDC_CLOSE_TRAY; > >>> > >> This looks something which should be handled via a blacklist flag, not > >> some inline hack which everyone forgets about it... > > > > AFAIK we used to have a blacklist but don't have anymore. So either it > > has to be resurrected for this one flag or an inline hack should be good > > enough. > > > But we do have one for generic scsi; cf drivers/scsi/scsi_devinfo.c. > And this pretty much falls into the category of SCSI quirks, so I'd > prefer have it hooked into that. But generic scsi does not know about cdrom trays, does it? Thanks Michal