Bug#963469: cdrom: /dev/sr0 scanned on and on for no visible reason

2020-06-22 Thread Thomas Schmitt
Hi,

I am not aware of a package that is in charge for drive behavior.
libburn or kernel are near the hardware. But i don't see this as libburn
problem and for now not as a kernel problem either.

It is unusual that an empty DVD drive makes noises, except when the tray
was freshly loaded and the drive has a look whether there is a medium.
So even if there is a process which periodically tries to read from the
drive, this should be a silent thing.

My first suspicion would be that the drive has problems to recognize media.
- Does the drive still read DVDs ?
- Do you see system log messages around the times when the drive is active ?
- Does the noise happen while the computer is under control of its firmware
  (BIOS or EFI) waiting for some user input (e.g. in a setup screen) ?

A bit far fetched:
What text output do you get from a xorriso run with SCSI log while no medium
is in the drive ?

  xorriso -scsi_log on -outdev /dev/sr0 >/tmp/xorriso_sr0.log 2>&1

The resulting file xorriso_sr0.log normally has 300 to 500 lines, which is
probably too long for a bug report. So send it to scdbac...@gmx.net in
private. I will then send my assessment to this bug report.


Have a nice day :)

Thomas



Bug#963469: cdrom: /dev/sr0 scanned on and on for no visible reason

2020-06-21 Thread kj
Package: cdrom
Severity: normal

For no obvious reason, my current system started scanning /dev/sr0 (i.e.
my DVD drive, even without any media inserted) about once every 30 to 60
seconds.

After reboot, I wouldn't expect that behaviour to continue, but it did.

Removing the entry "/dev/sr0 /media/cdrom0" from /etc/fstab didn't make
that stop.

For explanation: My DVD drive is loud. I don't want to hear the
repositioning noise every so-and-so-seconds. And, who does this, for what
reason?

-- System Information:
Debian Release: 10.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-9-amd64 (SMP w/6 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, 
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US 
(charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled