Automatic remount of safely removed USB 3.0 drive

Bug #792085 reported by Martin Wildam on 2011-06-02
568
This bug affects 152 people
Affects Status Importance Assigned to Milestone
Nautilus
New
Undecided
Unassigned
thunar
Invalid
Medium
Fedora
Fix Released
Undecided
openSUSE
Fix Released
Medium
linux (Ubuntu)
Medium
Joseph Salisbury
Trusty
Medium
Joseph Salisbury
Xenial
Medium
Joseph Salisbury
Yakkety
Medium
Joseph Salisbury
nautilus (Ubuntu)
Medium
Unassigned
Precise
Undecided
Unassigned
Trusty
Undecided
Unassigned
thunar (Ubuntu)
Medium
Unassigned
Precise
Undecided
Unassigned
Trusty
Undecided
Unassigned
udev (Ubuntu)
Medium
Unassigned
Precise
Undecided
Unassigned
Trusty
Undecided
Unassigned

Bug Description

Binary package hint: nautilus

When I choose "Safely remove drive" context menu entry for an external USB drive within a nautilus window or directly clicking on the desktop icon, after about 10 seconds the drive is automatically remounted and a Nautilus window showing the root folder opens.

I have noticed that similar already happened with a very old Ubuntu version - Bug #110589 and as that is so long time ago I thought it is better to open a new bug. Reason of the problem might even be completely different.

ProblemType: Bug
DistroRelease: Ubuntu 11.04
Package: nautilus 1:2.32.2.1-0ubuntu13
ProcVersionSignature: Ubuntu 2.6.38-8.42-generic-pae 2.6.38.2
Uname: Linux 2.6.38-8-generic-pae i686
Architecture: i386
Date: Thu Jun 2 23:40:08 2011
InstallationMedia: Ubuntu 11.04 "Natty Narwhal" - Release i386 (20110427.1)
ProcEnviron:
 LANGUAGE=en_US:en
 LANG=en_US.UTF-8
 SHELL=/bin/bash
SourcePackage: nautilus
UpgradeStatus: No upgrade log present (probably fresh install)

break-fix: - 37be66767e3cae4fd16e064d8bb7f9f72bf5c045

Martin Wildam (mwildam) wrote :
Alex Colorado (alex-kiwikiwi) wrote :

Same behaviour for me. Although it only happens after the first time I select "Safely remove drive".
After the first automatic remount, the second time I choose "Safely remove drive" the usb external drive does not remount.

It happens for different types of USB drives and USB keys, so it's not related to a specific external drive.

Marco Sulla (xdq4gh24rq) on 2011-06-23
Changed in nautilus (Ubuntu):
status: New → Confirmed
Changed in usb-creator (Ubuntu):
status: New → Confirmed
Marco Sulla (xdq4gh24rq) on 2011-06-23
Changed in udev (Ubuntu):
status: New → Confirmed
Marco Sulla (xdq4gh24rq) wrote :

Daniel Richard G. from Bug #507309 : usb-creator has a strange quirk in that when it starts up, it (re)mounts all unmounted partitions on all connected USB drives---even those drives on which the "Safely remove drive" operation has been performed, but are still plugged into the USB bus. This is with icons and everything on the desktop; this is clearly some sort of interaction with udev, similar to what occurs when a USB drive is plugged in.

I am filing this report to request that this "mount everything" behavior be removed. It is inappropriate for usb-creator to do this, not least because it may then go on to perform destructive operations on some of these newly-mounted filesystems!

Mihai Capotă (mihaic) wrote :

I have the same problem, but only with two Western Digital USB 3 drives. The drives are My Book Essential 3 TB (WDBACW0030HBK) and My Passport Essential 500 GB (WDBACY5000ABK). I can reproduce the behavior on a laptop and a desktop, both running Ubuntu 10.10. All other drives remain unmounted.

Changed in nautilus (Ubuntu):
importance: Undecided → Low

does this happen in 11.10 also?

Daniel Richard G. (skunk) wrote :

In 11.10, I'm no longer seeing usb-creator remount previously-removed disks on startup.

I can't speak to the Nautilus behavior described in this bug, however, as I've never observed it myself.

Jan Sonntag (finaljason) wrote :

As you can read on https://bugzilla.gnome.org/show_bug.cgi?id=641873 the specified behaviour seems to appear only with some nvidea chipsets.
Could the bug be a driver issue?

if it is a driver issue, is there anyway we can roll back to the driver version in lucid?

The behavior has changed, but still exists.

After "ejecting" the device, it now disappears and does not
automatically re-appear as a device; however, in "My Computer"
location when I select "Safely remove device" it disappears and
automatically re-appears. Interesting, after re-appearing I cannot
click on and open the disk drive.

At the OS-level the USB devices automatically remount, but at the
interface level it partially disappears, re-appears in my computer
inaccessible.

TH

On Fri, Oct 14, 2011 at 8:33 PM, Nikhil P Joseph
<email address hidden> wrote:
> does this happen in 11.10 also?
>
> --
> You received this bug notification because you are subscribed to a
> duplicate bug report (608508).
> https://bugs.launchpad.net/bugs/792085
>
> Title:
>  Automatic remount of safely removed drive
>
> Status in “nautilus” package in Ubuntu:
>  Confirmed
> Status in “udev” package in Ubuntu:
>  Confirmed
> Status in “usb-creator” package in Ubuntu:
>  Confirmed
>
> Bug description:
>  Binary package hint: nautilus
>
>  When I choose "Safely remove drive" context menu entry for an external
>  USB drive within a nautilus window or directly clicking on the desktop
>  icon, after about 10 seconds the drive is automatically remounted and
>  a Nautilus window showing the root folder opens.
>
>  I have noticed that similar already happened with a very old Ubuntu
>  version - Bug #110589 and as that is so long time ago I thought it is
>  better to open a new bug. Reason of the problem might even be
>  completely different.
>
>  ProblemType: Bug
>  DistroRelease: Ubuntu 11.04
>  Package: nautilus 1:2.32.2.1-0ubuntu13
>  ProcVersionSignature: Ubuntu 2.6.38-8.42-generic-pae 2.6.38.2
>  Uname: Linux 2.6.38-8-generic-pae i686
>  Architecture: i386
>  Date: Thu Jun  2 23:40:08 2011
>  InstallationMedia: Ubuntu 11.04 "Natty Narwhal" - Release i386 (20110427.1)
>  ProcEnviron:
>   LANGUAGE=en_US:en
>   LANG=en_US.UTF-8
>   SHELL=/bin/bash
>  SourcePackage: nautilus
>  UpgradeStatus: No upgrade log present (probably fresh install)
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/792085/+subscriptions
>

@Nikhil:

the bug didn't appear in lucid (for me) and i recognized it for the first time in natty (but i don't know whether the bug appears in maverick too)

@torstenaf:

sounds interesting. Can you check your dmesg-log for entries like:

[ 968.188033] usb 1-8: new high speed USB device using ehci_hcd and address 6

and after reappearing (same bus):

[ 1005.992037] usb 2-8: new full speed USB device using ohci_hcd and address 4

If it's a driver issue there is definitively something wrong with the communication between ohci_hcd and ehci_hcd.

@Jan: I can confirm that. My laptop's still running lucid and i noticed it first in maverick when i tried it for a short time. my machine has the nvidia mcp51 chipset. however i am not sure if the problem affects nvidia chipsets alone, ive seen some people with intel machines also encountering this problem.

Here are the dmesg messages.

After plugging in USB device:
[29103.712213] usb 1-1: new high speed USB device number 3 using ehci_hcd
[29103.852384] scsi8 : usb-storage 1-1:1.0

After clicking the "Eject" icon on the file manager (no change from before):
[29103.712213] usb 1-1: new high speed USB device number 3 using ehci_hcd
[29103.852384] scsi8 : usb-storage 1-1:1.0

After opening "Computer", right clicking on the USB drive, and
clicking "Safely Remove Drive" (the icon disappears, then re-appears):
[29103.712213] usb 1-1: new high speed USB device number 3 using ehci_hcd
[29103.852384] scsi8 : usb-storage 1-1:1.0
[29167.356346] usb 1-1: USB disconnect, device number 3
[29167.728213] usb 3-1: new full speed USB device number 2 using ohci_hcd
[29167.929262] usb 3-1: not running at top speed; connect to a high speed hub
[29167.953587] scsi9 : usb-storage 3-1:1.0

TH

On Mon, Oct 17, 2011 at 5:22 PM, Jan Sonntag <email address hidden> wrote:
> @Nikhil:
>
> the bug didn't appear in lucid (for me) and i recognized it for the
> first time in natty (but i don't know whether the bug appears in
> maverick too)
>
> @torstenaf:
>
> sounds interesting. Can you check your dmesg-log for entries like:
>
> [  968.188033] usb 1-8: new high speed USB device using ehci_hcd and
> address 6
>
> and after reappearing (same bus):
>
> [ 1005.992037] usb 2-8: new full speed USB device using ohci_hcd and
> address 4
>
> If it's a driver issue there is definitively something wrong with the
> communication between ohci_hcd and ehci_hcd.
>
> --
> You received this bug notification because you are subscribed to a
> duplicate bug report (608508).
> https://bugs.launchpad.net/bugs/792085
>
> Title:
>  Automatic remount of safely removed drive
>
> Status in “nautilus” package in Ubuntu:
>  Confirmed
> Status in “udev” package in Ubuntu:
>  Confirmed
> Status in “usb-creator” package in Ubuntu:
>  Confirmed
>
> Bug description:
>  Binary package hint: nautilus
>
>  When I choose "Safely remove drive" context menu entry for an external
>  USB drive within a nautilus window or directly clicking on the desktop
>  icon, after about 10 seconds the drive is automatically remounted and
>  a Nautilus window showing the root folder opens.
>
>  I have noticed that similar already happened with a very old Ubuntu
>  version - Bug #110589 and as that is so long time ago I thought it is
>  better to open a new bug. Reason of the problem might even be
>  completely different.
>
>  ProblemType: Bug
>  DistroRelease: Ubuntu 11.04
>  Package: nautilus 1:2.32.2.1-0ubuntu13
>  ProcVersionSignature: Ubuntu 2.6.38-8.42-generic-pae 2.6.38.2
>  Uname: Linux 2.6.38-8-generic-pae i686
>  Architecture: i386
>  Date: Thu Jun  2 23:40:08 2011
>  InstallationMedia: Ubuntu 11.04 "Natty Narwhal" - Release i386 (20110427.1)
>  ProcEnviron:
>   LANGUAGE=en_US:en
>   LANG=en_US.UTF-8
>   SHELL=/bin/bash
>  SourcePackage: nautilus
>  UpgradeStatus: No upgrade log present (probably fresh install)
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/792085/+subscriptions
>

Don't experience this any more on Oneiric with Intel graphic card and 11.10 (release) under unity (other desktops not yet tested).

Jan Sonntag (finaljason) wrote :

@Martin Wildam:

which chipset you are using?

I'm actually downloading Puppy Linux and test if the bug also appears there...

Martin Wildam (mwildam) wrote :

product: Mobile 4 Series Chipset Integrated Graphics Controller
vendor: Intel Corporation

Jan Sonntag (finaljason) wrote :

Hmpf!

Puppy's kernel is too old...

Has someone a newer (Gentoo, Open Suse or whatever) live cd to test if the bug only appears in Ubuntu?

Im assuming we need a distribution with kernel version>=2.6.35. that's the one which shipped with maverick.

Hello,

tried with Fedora 15 Live CD on kernel 2.6.38.6-26 and did not
experience the problem there.
Ubuntu 11.10 with current kernel 3.0.0-12 also does not show the issue.

On Tue, Oct 18, 2011 at 17:33, Nikhil P Joseph
<email address hidden> wrote:
> Im assuming we need a distribution with kernel version>=2.6.35. that's
> the one which shipped with maverick.
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https://bugs.launchpad.net/bugs/792085
>
> Title:
>  Automatic remount of safely removed drive
>
> Status in “nautilus” package in Ubuntu:
>  Confirmed
> Status in “udev” package in Ubuntu:
>  Confirmed
> Status in “usb-creator” package in Ubuntu:
>  Confirmed
>
> Bug description:
>  Binary package hint: nautilus
>
>  When I choose "Safely remove drive" context menu entry for an external
>  USB drive within a nautilus window or directly clicking on the desktop
>  icon, after about 10 seconds the drive is automatically remounted and
>  a Nautilus window showing the root folder opens.
>
>  I have noticed that similar already happened with a very old Ubuntu
>  version - Bug #110589 and as that is so long time ago I thought it is
>  better to open a new bug. Reason of the problem might even be
>  completely different.
>
>  ProblemType: Bug
>  DistroRelease: Ubuntu 11.04
>  Package: nautilus 1:2.32.2.1-0ubuntu13
>  ProcVersionSignature: Ubuntu 2.6.38-8.42-generic-pae 2.6.38.2
>  Uname: Linux 2.6.38-8-generic-pae i686
>  Architecture: i386
>  Date: Thu Jun  2 23:40:08 2011
>  InstallationMedia: Ubuntu 11.04 "Natty Narwhal" - Release i386 (20110427.1)
>  ProcEnviron:
>   LANGUAGE=en_US:en
>   LANG=en_US.UTF-8
>   SHELL=/bin/bash
>  SourcePackage: nautilus
>  UpgradeStatus: No upgrade log present (probably fresh install)
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/792085/+subscriptions
>

--
Martin Wildam

http://www.google.com/profiles/mwildam

The issue is still present for me with 3.0.0-12-generic and the nvidia chipset discussed above.

Peter Kennes (mgt2000) on 2011-12-25
Changed in nautilus (Ubuntu):
assignee: nobody → Peter Kennes (mgt2000)
Matt 6:27 (goffice) wrote :

I'm having the same issue in the Unity launcher. External hard drive connected via USB. When I right-click the drive in the launcher and then select 'safely remove', it spins down the drive for about 5 seconds, then remounts. Did not experience this in Lucid. Currently using 11.10 and kernel 3.0.0-14-generic.

Peter Kennes (mgt2000) on 2012-01-08
Changed in nautilus (Ubuntu):
assignee: Peter Kennes (mgt2000) → nobody
vasja pupkin (klient1982) wrote :

same problem Ubuntu 10.10

Matt 6:27 (goffice) wrote :

I just discovered that when I first 'safely remove' it remounts as noted in post #20 above, but once external HD activity ceases (after the remount), I can use "safely remove" a second time and it spins down and stays off.

Dennis Fehr (cy-raid) wrote :

This also affects me.. I really wish this would get fixed, it's been around for quite some time and it's so annoying. I wonder how many other people it affects, and they just don't voice their opinion..

pelm (pelle-ekh) wrote :

For me too on Ubuntu 12.04, fresh install (yesterday daily ISO). As described, first time when i securely removes a USB drive with the rightclick option in Unity launcher it automatically remount in a few seconds. The second time i try to securely remove the drive it works. In Lucid it was no problem.

Matthias Niess (mniess) wrote :

This only happens on certain nvidia chipsets and only with newer kernels (the nautilus-version doesn't really matter).

Changed in nautilus (Ubuntu):
status: Confirmed → Invalid
Changed in usb-creator (Ubuntu):
status: Confirmed → Invalid
pelm (pelle-ekh) wrote :

Is there some workaround for this issue? It's a really big issue which users not knowing it can lose data when unplug the device too soon.

Martin Wildam (mwildam) wrote :

I don't have an nvidia chipset and it happened to me also - however does not occur any more on Precise released version with latest updates.

sojourner (itsmealso2) wrote :

hitting eject instead of safely remove works for me

Martin Wildam (mwildam) wrote :

Tried again (as a while passed by and I am currently on 12.04): Still same issue.

Clicking eject in Nautilus seems to remove the device correctly, but disk usage analyzer for example still sees it - so that does not completely unmount the drive/device!

I consider this a critical issue as I am not always able to eject and in the next seconds find the correct plug - otherwise it is already remounted when I unplug it.

Marius B. Kotsbak (mariusko) wrote :

Are any of you able to test a 12.10 live CD of the latest beta or daily image?

Rod Zazubek (zazubek) wrote :

This problem has not gone away with
Linux Mint 14 (Ubuntu 12.10) on my
pc with the nvidia chipset.
In fact, it is now worse because
Safely Remove Drive has been removed.
See launchpad #1067876.
So to safely remove my portable hard drive
I now need the following 4 commands:
> udisks --unmount /dev/sdb1
> udisks --detach /dev/sdb
wait for remount
> udisks --unmount /dev/sdb1
> udisks --detach /dev/sdb
Replace sdb with whatever your drive is using.
Add more udisks --unmount commands if you have
multiple partitions mounted.

Chris (fabricator4) wrote :

Confirmed for both 12.04 and 12.10, ASRock N68-VS3 FX motherboard, NVidia chipset.

When you click "Safely remove" on the launcher icon and then wait for buffers to be flushed, device remounts. The remount is done as a USB 1.x device as the speed is very slow on transfer (about 1MiB / minute). In the log (attached) it appears to think that the device is plugged into a slow speed hub.

     *-usb:0
          description: USB controller
          product: MCP61 USB 1.1 Controller
          vendor: NVIDIA Corporation
          physical id: 2
          bus info: pci@0000:00:02.0
          version: a3
          width: 32 bits
          clock: 66MHz
          capabilities: pm ohci bus_master cap_list
          configuration: driver=ohci_hcd latency=0 maxlatency=1 mingnt=3
          resources: irq:23 memory:effff000-efffffff

1 comments hidden view all 173 comments
Walter Ribeiro (wribeirojr) wrote :

At the first time pen drive is "safely removed", it is automatically remounted immediately.
If I repeat the operation, automatic remount don't occur.

Ubuntu 13.04 - HP Pavilion dv6000

Nithin C (nithin-aneesh) wrote :

The automatic remount occurs in Ubuntu 13.04 beta 1

no longer affects: nautilus
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in ubuntu:
status: New → Confirmed
Nithin C (nithin-aneesh) on 2013-04-09
affects: nautilus → ubuntu
Changed in nautilus (Ubuntu):
status: Invalid → Confirmed

After seeing this in some older version of Ubuntu this issue never reoccurred with whatever USB stick or -drive I have. I currently use Ubuntu 12.04LTS_64bit. I have no USB3 hardware.

chris blake (cblake-r) wrote :

12.04 ASUS 64 bit.
This only happens on usb 3.0 port, the 2.0 ports work as expected

I'm using 12.04 on Asus u41.
This damn problem exists for safely remove of USB hard disks but USB falsh has no probelm.

Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in ubuntu:
status: New → Confirmed
Adolfo Jayme (fitojb) on 2014-01-11
no longer affects: ubuntu
no longer affects: usb-creator (Ubuntu)
Changed in udev (Ubuntu):
importance: Undecided → Medium
Changed in thunar (Ubuntu):
status: New → Confirmed
116 comments hidden view all 173 comments

Description of problem:

When ejecting a drive, from the GUI (Gnome, XFCE, ...) or using udiskctl, I believe udev is responsible of spinning it down.

Some disks spins down but spins up again immediately, forcing the user to do a hot unplug.

How reproducible:

Steps to Reproduce:
1. Plug in an external USB disk
2. Then eject it or do type udisksctl power-off -b /dev/sdx

Actual results:

Some disk models would spin back up, while others will properly shutdown.

Expected results:

All disks should spin down.

Additional info:

All my disks are USB 3.
I have 2 Toshiba external hard drive (500 Mo and 1 To) that do spin down correctly.
I have 1 Seagate Slim hard drive of 500 Mo that also shuts down correctly.

But, another Seagate Slim drive of 1To does spin back up.

Also, strangely, all of these disks do spin back up when they are plugged and ejected from behind an USB 3 hub.

A lot of reports on the Ubuntu side for a similar issue: https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/792085

The culprit has not been identified yet, apparently.

Based on the comments it appears to be drive/chipset specific and maybe some driver issue. Reassigning to the kernel.

I find this on my enclosures with Asmedia and Norelsys bridges. The JMicron one seems to power down properly.

Koopee (koopee1234) on 2016-03-13
summary: - Automatic remount of safely removed drive
+ Automatic remount of safely removed usb 3.0 drive

James, how did you get this info? lsusb,lshw et hdparm do not seem to provide it.

C de-Avillez (hggdh2) on 2016-04-15
Changed in nautilus:
importance: Unknown → Undecided
status: Unknown → New

(In reply to Jean-Christophe Baptiste from comment #4)
> James, how did you get this info? lsusb,lshw et hdparm do not seem to
> provide it.

Sorry for the very late reply. Sometimes the info identifying the bridge chip is in dmesg. Otherwise I look up the USB numeric IDs on Google. This is for generic enclosures only. In my experience, the bridge on the 'complete' big-brand drives have their firmwares and device IDs modified for hide the chip's origin.

I see this behaviour as well on fully patched Fedora 24 with
kernel-4.6.4-301.fc24.x86_64

I have a LaCie 9223 1TB with USB ID 059f:1070. According to a google search this device uses a ASMedia 1053.
According to smartctl the HDD is a
Device Model: ST1000LM035-1RK172

If connected to USB 3 port on a
Gigabyte B85M-HD3 with
00:14.0 8086:8c31 USB controller: Intel Corporation 8 Series/C220 Series Chipset Family USB xHCI (rev 04)
or a
ASUS Z170-P D3 onboard USB port

the drive powers down using "safely remove drive"...
Aug 9 10:56:16 pcwb ntfs-3g[11727]: Unmounting /dev/sdb1 (LaCie-1TB)
Aug 9 10:56:16 pcwb udisksd[1491]: Unmounted /dev/sdb1 on behalf of uid 1000
Aug 9 10:56:16 pcwb udisksd[1491]: Successfully sent SCSI command SYNCHRONIZE CACHE to /dev/sdb
Aug 9 10:56:17 pcwb udisksd[1491]: Successfully sent SCSI command START STOP UNIT to /dev/sdb
Aug 9 10:56:17 pcwb systemd-udevd: inotify_add_watch(9, /dev/sdb1, 10) failed: No such file or directory
Aug 9 10:56:17 pcwb kernel: sd 6:0:0:0: [sdb] Synchronizing SCSI cache
Aug 9 10:56:17 pcwb kernel: sd 6:0:0:0: [sdb] Synchronize Cache(10) failed: Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK
Aug 9 10:56:17 pcwb udisksd[1491]: Powered off /dev/sdb - successfully wrote to sysfs path /sys/devices/pci0000:00/0000:00:14.0/usb4/4
-1/remove
Aug 9 10:56:17 pcwb kernel: usb 4-1: USB disconnect, device number 21

and immediately reappears...
Aug 9 10:56:17 pcwb kernel: usb 4-1: new SuperSpeed USB device number 22 using xhci_hcd
Aug 9 10:56:17 pcwb kernel: usb 4-1: New USB device found, idVendor=059f, idProduct=1070
Aug 9 10:56:17 pcwb kernel: usb 4-1: New USB device strings: Mfr=2, Product=3, SerialNumber=1
Aug 9 10:56:17 pcwb kernel: usb 4-1: Product: Porsche Mobile for Mac
Aug 9 10:56:17 pcwb kernel: usb 4-1: Manufacturer: LaCie

*********** MASS BUG UPDATE **************

We apologize for the inconvenience. There is a large number of bugs to go through and several of them have gone stale. Due to this, we are doing a mass bug update across all of the Fedora 24 kernel bugs.

Fedora 24 has now been rebased to 4.7.4-200.fc24. Please test this kernel update (or newer) and let us know if you issue has been resolved or if it is still present with the newer kernel.

If you have moved on to Fedora 25, and are still experiencing this issue, please change the version to Fedora 25.

If you experience different issues, please open a new bug report for those.

The bug is still here with latest kernel version.

(In reply to Jean-Christophe Baptiste from comment #9)
> The bug is still here with latest kernel version.

Confirmed.

Changed in opensuse:
importance: Unknown → Medium
status: Unknown → Fix Released
Norbert (nrbrtx) on 2016-10-16
tags: added: precise trusty xenial
tags: removed: i386
Changed in linux (Ubuntu):
status: New → Confirmed
Brad Figg (brad-figg) on 2016-10-16
affects: linux-meta (Ubuntu) → linux (Ubuntu)
Changed in linux (Ubuntu):
status: New → Confirmed
Changed in thunar (Ubuntu):
importance: Undecided → Medium
Changed in linux (Ubuntu):
importance: Undecided → Medium
Changed in nautilus (Ubuntu):
importance: Low → Medium
32 comments hidden view all 173 comments

openSUSE-SU-2016:2583-1: An update that solves four vulnerabilities and has 21 fixes is now available.

Category: security (important)
Bug References: 1000287,1000304,1000907,1001462,1001486,1004418,1004462,1005101,799133,881008,909994,911687,922634,963655,972460,978094,979681,987703,991247,991665,993890,993891,996664,999600,999932
CVE References: CVE-2016-5195,CVE-2016-7039,CVE-2016-7425,CVE-2016-8658
Sources used:
openSUSE Leap 42.1 (src): drbd-8.4.6-10.1, hdjmod-1.28-26.1, ipset-6.25.1-7.1, kernel-debug-4.1.34-33.1, kernel-default-4.1.34-33.1, kernel-docs-4.1.34-33.3, kernel-ec2-4.1.34-33.1, kernel-obs-build-4.1.34-33.1, kernel-obs-qa-4.1.34-33.1, kernel-obs-qa-xen-4.1.34-33.1, kernel-pae-4.1.34-33.1, kernel-pv-4.1.34-33.1, kernel-source-4.1.34-33.1, kernel-syms-4.1.34-33.1, kernel-vanilla-4.1.34-33.1, kernel-xen-4.1.34-33.1, lttng-modules-2.7.0-4.1, pcfclock-0.44-268.1, vhba-kmp-20140928-7.1

This is an autogenerated message for OBS integration:
This bug (922634) was mentioned in
https://build.opensuse.org/request/show/437000 13.2 / kernel-source

openSUSE-SU-2016:2625-1: An update that solves 12 vulnerabilities and has 19 fixes is now available.

Category: security (important)
Bug References: 1000287,1001486,1003077,1003925,1003931,1004045,1004418,1004462,881008,909994,911687,922634,951155,960689,978094,980371,986570,989152,991247,991608,991665,993890,993891,994296,994520,994748,994752,994759,996664,999600,999932
CVE References: CVE-2015-7513,CVE-2015-8956,CVE-2016-0823,CVE-2016-1237,CVE-2016-5195,CVE-2016-5696,CVE-2016-6327,CVE-2016-6480,CVE-2016-6828,CVE-2016-7117,CVE-2016-7425,CVE-2016-8658
Sources used:
openSUSE 13.2 (src): bbswitch-0.8-3.22.1, cloop-2.639-14.22.1, crash-7.0.8-22.1, hdjmod-1.28-18.23.1, ipset-6.23-22.1, kernel-debug-3.16.7-45.1, kernel-default-3.16.7-45.1, kernel-desktop-3.16.7-45.1, kernel-docs-3.16.7-45.2, kernel-ec2-3.16.7-45.1, kernel-obs-build-3.16.7-45.1, kernel-obs-qa-3.16.7-45.1, kernel-obs-qa-xen-3.16.7-45.1, kernel-pae-3.16.7-45.1, kernel-source-3.16.7-45.1, kernel-syms-3.16.7-45.1, kernel-vanilla-3.16.7-45.1, kernel-xen-3.16.7-45.1, pcfclock-0.44-260.22.1, vhba-kmp-20140629-2.22.1, virtualbox-5.0.28-54.2, xen-4.4.4_05-51.2, xtables-addons-2.6-24.1

summary: - Automatic remount of safely removed usb 3.0 drive
+ Automatic remount of safely removed USB 3.0 drive
1 comments hidden view all 173 comments

SUSE-SU-2016:2912-1: An update that solves 11 vulnerabilities and has 111 fixes is now available.

Category: security (important)
Bug References: 1000189,1000287,1000304,1000776,1001419,1001486,1002165,1003079,1003153,1003400,1003568,1003866,1003925,1003964,1004252,1004462,1004517,1004520,1005666,1006691,1007615,1007886,744692,772786,789311,857397,860441,865545,866130,868923,874131,876463,898675,904489,909994,911687,915183,921338,921784,922064,922634,924381,924384,930399,931454,934067,937086,937888,940545,941420,946309,955446,956514,959463,961257,962846,966864,967640,970943,971975,971989,974406,974620,975596,975772,976195,977687,978094,979451,979928,982783,983619,984194,984419,984779,984992,985562,986445,987192,987333,987542,987565,987621,987805,988440,988617,988715,989152,989953,990245,991247,991608,991665,992244,992555,992591,992593,992712,993392,993841,993890,993891,994296,994438,994520,994748,995153,995968,996664,997059,997299,997708,997896,998689,998795,998825,999577,999584,999600,999779,999907,999932
CVE References: CVE-2015-8956,CVE-2016-5696,CVE-2016-6130,CVE-2016-6327,CVE-2016-6480,CVE-2016-6828,CVE-2016-7042,CVE-2016-7097,CVE-2016-7425,CVE-2016-8658,CVE-2016-8666
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP1 (src): kernel-default-3.12.67-60.64.18.1
SUSE Linux Enterprise Software Development Kit 12-SP1 (src): kernel-docs-3.12.67-60.64.18.3, kernel-obs-build-3.12.67-60.64.18.1
SUSE Linux Enterprise Server 12-SP1 (src): kernel-default-3.12.67-60.64.18.1, kernel-source-3.12.67-60.64.18.1, kernel-syms-3.12.67-60.64.18.1, kernel-xen-3.12.67-60.64.18.1
SUSE Linux Enterprise Module for Public Cloud 12 (src): kernel-ec2-3.12.67-60.64.18.1
SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP1_Update_9-1-6.3
SUSE Linux Enterprise Desktop 12-SP1 (src): kernel-default-3.12.67-60.64.18.1, kernel-source-3.12.67-60.64.18.1, kernel-syms-3.12.67-60.64.18.1, kernel-xen-3.12.67-60.64.18.1

Norbert (nrbrtx) wrote :

Dear Ubuntu developers!

Please apply SUSE's patch on kernels in Ubuntu 12.04 LTS, 14.04 LTS, 16.04 LTS, 16.10 - http://kernel.suse.com/cgit/kernel-source/commit/?id=43e64619bd7eeb1f3d287e8faffc16ed3c1f2a2b .

Why it is so difficult?
Why you ignore this serious bug?

Many users have USB 3.0 on their computers for at least seven years.
Switching to OpenSUSE from Ubuntu is not good option.

30 comments hidden view all 173 comments
28 comments hidden view all 173 comments

SUSE-SU-2016:2976-1: An update that solves 13 vulnerabilities and has 87 fixes is now available.

Category: security (important)
Bug References: 1000189,1001419,1002165,1003077,1003344,1003568,1003677,1003866,1003925,1004517,1004520,1005857,1005896,1005903,1006917,1006919,1007944,763198,771065,799133,803320,839104,843236,860441,863873,865783,871728,907611,908458,908684,909077,909350,909484,909618,909994,911687,915183,920016,922634,922947,928138,929141,934760,951392,956514,960689,963655,967716,968010,968014,971975,971989,973203,974620,976867,977687,979514,979595,979681,980371,982218,982783,983535,983619,984102,984194,984992,985206,986337,986362,986365,986445,987565,988440,989152,989261,989764,989779,991608,991665,991923,992566,993127,993890,993891,994296,994436,994618,994759,994926,995968,996329,996664,997708,998399,998689,999584,999600,999907,999932
CVE References: CVE-2013-4312,CVE-2015-7513,CVE-2015-8956,CVE-2016-0823,CVE-2016-3841,CVE-2016-4998,CVE-2016-5696,CVE-2016-6480,CVE-2016-6828,CVE-2016-7042,CVE-2016-7097,CVE-2016-7117,CVE-2016-7425
Sources used:
SUSE Linux Enterprise Software Development Kit 11-SP4 (src): kernel-docs-3.0.101-88.3
SUSE Linux Enterprise Server 11-SP4 (src): kernel-bigmem-3.0.101-88.1, kernel-default-3.0.101-88.1, kernel-ec2-3.0.101-88.1, kernel-pae-3.0.101-88.1, kernel-ppc64-3.0.101-88.1, kernel-source-3.0.101-88.1, kernel-syms-3.0.101-88.1, kernel-trace-3.0.101-88.1, kernel-xen-3.0.101-88.1
SUSE Linux Enterprise Server 11-EXTRA (src): kernel-default-3.0.101-88.1, kernel-pae-3.0.101-88.1, kernel-ppc64-3.0.101-88.1, kernel-trace-3.0.101-88.1, kernel-xen-3.0.101-88.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src): kernel-bigmem-3.0.101-88.1, kernel-default-3.0.101-88.1, kernel-ec2-3.0.101-88.1, kernel-pae-3.0.101-88.1, kernel-ppc64-3.0.101-88.1, kernel-trace-3.0.101-88.1, kernel-xen-3.0.101-88.1

openSUSE-SU-2016:3021-1: An update that solves 12 vulnerabilities and has 118 fixes is now available.

Category: security (important)
Bug References: 1000189,1000287,1000304,1000776,1001419,1001486,1002165,1003079,1003153,1003400,1003568,1003866,1003925,1004252,1004418,1004462,1004517,1004520,1005666,1006691,1007615,1007886,744692,772786,789311,799133,857397,860441,865545,866130,868923,874131,875631,876145,876463,898675,904489,909994,911687,915183,921338,921784,922064,922634,924381,924384,930399,931454,934067,937086,937888,940545,941420,946309,954986,955446,956514,959463,961257,962846,963655,963767,966864,967640,970943,971975,971989,974406,974620,975596,975772,976195,977687,978094,979451,979681,979928,982783,983619,984194,984419,984779,984992,985562,986445,987192,987333,987542,987565,987621,987805,988440,988617,988715,989152,989953,990245,991247,991608,991665,992244,992555,992591,992593,992712,993392,993841,993890,993891,994296,994438,994520,994748,994758,995153,995968,996664,997059,997299,997708,997896,998689,998795,998825,999577,999584,999600,999779,999907,999932
CVE References: CVE-2013-5634,CVE-2015-8956,CVE-2016-2069,CVE-2016-5696,CVE-2016-6130,CVE-2016-6327,CVE-2016-6480,CVE-2016-6828,CVE-2016-7042,CVE-2016-7097,CVE-2016-7425,CVE-2016-8658
Sources used:
openSUSE 13.1 (src): cloop-2.639-11.36.1, crash-7.0.2-2.36.1, hdjmod-1.28-16.36.1, ipset-6.21.1-2.40.1, iscsitarget-1.4.20.3-13.36.1, kernel-debug-3.12.67-58.1, kernel-default-3.12.67-58.1, kernel-desktop-3.12.67-58.1, kernel-docs-3.12.67-58.2, kernel-ec2-3.12.67-58.1, kernel-pae-3.12.67-58.1, kernel-source-3.12.67-58.1, kernel-syms-3.12.67-58.1, kernel-trace-3.12.67-58.1, kernel-vanilla-3.12.67-58.1, kernel-xen-3.12.67-58.1, ndiswrapper-1.58-37.1, openvswitch-1.11.0-0.43.1, pcfclock-0.44-258.37.1, vhba-kmp-20130607-2.36.1, virtualbox-4.2.36-2.68.1, xen-4.3.4_10-69.1, xtables-addons-2.3-2.35.1

Norbert (nrbrtx) wrote :

Dear Ubuntu developers!

Please apply SUSE's patch on kernels in Ubuntu 12.04 LTS, 14.04 LTS, 16.04 LTS, 16.10 - http://kernel.suse.com/cgit/kernel-source/commit/?id=43e64619bd7eeb1f3d287e8faffc16ed3c1f2a2b .

2 comments hidden view all 173 comments

SUSE-SU-2016:3304-1: An update that solves 13 vulnerabilities and has 118 fixes is now available.

Category: security (important)
Bug References: 1000189,1000287,1000304,1000776,1001419,1001486,1002165,1003079,1003153,1003400,1003568,1003925,1004252,1004418,1004462,1004517,1004520,1005666,1006691,1007615,1007886,744692,789311,857397,860441,865545,866130,868923,874131,875631,876145,876463,898675,904489,909994,911687,915183,921338,921784,922064,922634,924381,924384,930399,934067,937086,937888,941420,946309,955446,956514,959463,961257,962846,963655,963767,966864,967640,970943,971975,971989,974406,974620,975596,975772,976195,977687,978094,979451,979681,979928,980371,981597,982783,983619,984194,984419,984779,984992,985562,986362,986365,986445,987192,987333,987542,987565,987621,987805,988440,988617,988715,989152,989953,990058,990245,991247,991608,991665,991667,992244,992555,992568,992591,992593,992712,993392,993841,993890,993891,994167,994296,994438,994520,994758,995153,995968,996664,997059,997299,997708,997896,998689,998795,998825,999577,999584,999600,999779,999907,999932
CVE References: CVE-2015-8956,CVE-2016-2069,CVE-2016-4998,CVE-2016-5195,CVE-2016-5696,CVE-2016-6130,CVE-2016-6327,CVE-2016-6480,CVE-2016-6828,CVE-2016-7042,CVE-2016-7097,CVE-2016-7425,CVE-2016-8658
Sources used:
SUSE Linux Enterprise Real Time Extension 12-SP1 (src): kernel-compute-3.12.67-60.27.1, kernel-compute_debug-3.12.67-60.27.1, kernel-rt-3.12.67-60.27.1, kernel-rt_debug-3.12.67-60.27.1, kernel-source-rt-3.12.67-60.27.1, kernel-syms-rt-3.12.67-60.27.1

no longer affects: nautilus (Ubuntu Xenial)
no longer affects: nautilus (Ubuntu Yakkety)
no longer affects: thunar (Ubuntu Xenial)
no longer affects: thunar (Ubuntu Yakkety)
no longer affects: udev (Ubuntu Xenial)
no longer affects: udev (Ubuntu Yakkety)
Changed in linux (Ubuntu Xenial):
assignee: nobody → Joseph Salisbury (jsalisbury)
importance: Undecided → Medium
status: New → In Progress
Changed in linux (Ubuntu Yakkety):
assignee: nobody → Joseph Salisbury (jsalisbury)
importance: Undecided → Medium
status: New → In Progress
Changed in linux (Ubuntu):
assignee: nobody → Joseph Salisbury (jsalisbury)
status: Confirmed → In Progress
1 comments hidden view all 173 comments
Joseph Salisbury (jsalisbury) wrote :

I built a test kernel for Xenial and Yakkety with the following commit:
37be66767e3c usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices

The test kernels can be downloaded from:
Xenial: http://kernel.ubuntu.com/~jsalisbury/lp792085/xenial
Yakkety: http://kernel.ubuntu.com/~jsalisbury/lp792085/yakkety

Can someone affected by this bug test the kernels and see if they resolve this bug? Precise and Trusty require some backporting, so I'll review to see if any prereq commits are also needed for commit 37be66767e3c to apply.

Also, this commit was cc'd to upstream stable, so all supported upstream stable kernels should get it.

Kev Bowring (flocculant) wrote :

@jsalisbury

I've downloaded the patched kernels for both Xenial and Yakkety.

For both I tested copying to drive and ejecting. Also tested just mounting and ejecting.

In both it worked as expected - no re-mounting of the drive after ejecting.

Thanks.

1 comments hidden view all 173 comments
Joseph Salisbury (jsalisbury) wrote :

@flocculant, thanks for testing! I can submit and SRU request for both Xenial and Yakkety.

Can anyone confirm that this bug does in fact affect Precise and/or Trusty?

Norbert (nrbrtx) wrote :

@jsalisbury
I can't find my USB3 flash (as in comment #44) which reappears after removal.
But you can search this thread - Precise is mentioned 19 times; Trusty - 29 times.

So bug still exists in Precise and Trusty.

22 comments hidden view all 173 comments

*********** MASS BUG UPDATE **************
We apologize for the inconvenience. There is a large number of bugs to go through and several of them have gone stale. Due to this, we are doing a mass bug update across all of the Fedora 25 kernel bugs.

Fedora 25 has now been rebased to 4.9.3-200.fc25. Please test this kernel update (or newer) and let us know if you issue has been resolved or if it is still present with the newer kernel.

If you have moved on to Fedora 26, and are still experiencing this issue, please change the version to Fedora 26.

If you experience different issues, please open a new bug report for those.

21 comments hidden view all 173 comments

SUSE-SU-2017:0181-1: An update that solves 13 vulnerabilities and has 127 fixes is now available.

Category: security (important)
Bug References: 1000118,1000189,1000287,1000304,1000433,1000776,1001169,1001171,1001310,1001462,1001486,1001888,1002322,1002770,1002786,1003068,1003566,1003581,1003606,1003813,1003866,1003964,1004048,1004052,1004252,1004365,1004517,1005169,1005327,1005545,1005666,1005745,1005895,1005917,1005921,1005923,1005925,1005929,1006103,1006175,1006267,1006528,1006576,1006804,1006809,1006827,1006915,1006918,1007197,1007615,1007653,1007955,1008557,1008979,1009062,1009969,1010040,1010158,1010444,1010478,1010507,1010665,1010690,1010970,1011176,1011250,1011913,1012060,1012094,1012452,1012767,1012829,1012992,1013001,1013479,1013531,1013700,1014120,1014392,1014701,1014710,1015212,1015359,1015367,1015416,799133,914939,922634,963609,963655,963904,964462,966170,966172,966186,966191,966316,966318,966325,966471,969474,969475,969476,969477,969756,971975,971989,972993,974313,974842,974843,978907,979378,979681,981825,983087,983152,983318,985850,986255,986987,987641,987703,987805,988524,988715,990384,992555,993739,993841,993891,994881,995278,997059,997639,997807,998054,998689,999907,999932
CVE References: CVE-2015-1350,CVE-2015-8964,CVE-2016-7039,CVE-2016-7042,CVE-2016-7425,CVE-2016-7913,CVE-2016-7917,CVE-2016-8645,CVE-2016-8666,CVE-2016-9083,CVE-2016-9084,CVE-2016-9793,CVE-2016-9919
Sources used:
SUSE Linux Enterprise Workstation Extension 12-SP2 (src): kernel-default-4.4.38-93.1
SUSE Linux Enterprise Software Development Kit 12-SP2 (src): kernel-docs-4.4.38-93.3, kernel-obs-build-4.4.38-93.1
SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (src): kernel-default-4.4.38-93.1, kernel-source-4.4.38-93.1, kernel-syms-4.4.38-93.1
SUSE Linux Enterprise Server 12-SP2 (src): kernel-default-4.4.38-93.1, kernel-source-4.4.38-93.1, kernel-syms-4.4.38-93.1
SUSE Linux Enterprise Live Patching 12 (src): kgraft-patch-SLE12-SP2_Update_4-1-2.1
SUSE Linux Enterprise High Availability 12-SP2 (src): kernel-default-4.4.38-93.1
SUSE Linux Enterprise Desktop 12-SP2 (src): kernel-default-4.4.38-93.1, kernel-source-4.4.38-93.1, kernel-syms-4.4.38-93.1

22 comments hidden view all 173 comments

Just tested it again with my
LaCie 9223 1TB with USB ID 059f:1070 on USB3 xhci ports of an ASUS Z-170 board and a HP EliteBook 820 G1.

It works now as expected on:
F24: 4.8.16-200.fc24.x86_64
F25: 4.9.3-200.fc25.x86_64

Drive shuts down and disconnects from USB port after selecting "safely remove drive" on MATE desktop and it does not spin up again.

I also tested an older LaCie USB 2.0 drive and it still works as well.

Changed in thunar:
importance: Unknown → Medium
status: Unknown → Invalid
21 comments hidden view all 173 comments
Myk Dowling (politas) wrote :

Six and a half years. This still hasn't been resolved. You have a patch that works. Please, please, apply it! This has been giving me grief for far too long!

22 comments hidden view all 173 comments

Thank you for letting us know. I'm going to close this bug. If the problem shows up again, please reopen.

tags: added: kernel-bug-break-fix
Changed in linux (Ubuntu Yakkety):
status: In Progress → Fix Committed
description: updated
Changed in linux (Ubuntu Xenial):
status: In Progress → Fix Committed
Changed in linux (Ubuntu Precise):
importance: Undecided → Medium
status: New → In Progress
Changed in linux (Ubuntu Trusty):
importance: Undecided → Medium
status: New → In Progress
assignee: nobody → Joseph Salisbury (jsalisbury)
Changed in linux (Ubuntu Precise):
assignee: nobody → Joseph Salisbury (jsalisbury)
21 comments hidden view all 173 comments
SURAJIT BHAKTA (surajit697) wrote :

Is this fix available in the latest upates? (of xenial) or is it not ready yet?

At least for me, the problem was solved after this week's update (Xenial, 4.4.0-62-generic).

Donk (donk) wrote :

With the linux-hwe kernel (4.8.0-37.39~16.04.1, xenial) from the "kernel PPA", my two USB3 drive are successfully ejected and they stay poweroff.

I can also confirm fix after upgrading from something older to
4.4.0-63-generic. Thanks to everybody who was involved bringing the
solution!

Best wishes, Martin.

Simon P. (simpre) wrote :

Today kernel update to 4.8.0-39-generic fixed this issue for me on 16.04.2 Finally, thanks!

Gobinath (slgobinath) wrote :

Kernel update to 4.4.0-64-generic fixed the problem here.
Thanks!

Changed in linux (Ubuntu Xenial):
status: Fix Committed → Fix Released
Changed in linux (Ubuntu Yakkety):
status: Fix Committed → Fix Released
no longer affects: linux (Ubuntu Precise)
Myk Dowling (politas) wrote :

Confirm fixed in Xenial

SUSE-SU-2017:1102-1: An update that solves 27 vulnerabilities and has 114 fixes is now available.

Category: security (important)
Bug References: 1003077,1003344,1003568,1003677,1003813,1003866,1003925,1004517,1004520,1005857,1005877,1005896,1005903,1006917,1006919,1007615,1007944,1008557,1008645,1008831,1008833,1008893,1009875,1010150,1010175,1010201,1010467,1010501,1010507,1010711,1010716,1011685,1011820,1012411,1012422,1012832,1012851,1012917,1013018,1013038,1013042,1013070,1013531,1013533,1013542,1013604,1014410,1014454,1014746,1015561,1015752,1015760,1015796,1015803,1015817,1015828,1015844,1015848,1015878,1015932,1016320,1016505,1016520,1016668,1016688,1016824,1016831,1017686,1017710,1019148,1019165,1019348,1019783,1020214,1021258,748806,763198,771065,786036,790588,795297,799133,800999,803320,821612,824171,851603,853052,860441,863873,865783,871728,901809,907611,908458,908684,909077,909350,909484,909491,909618,913387,914939,919382,922634,924708,925065,928138,929141,953233,956514,960689,961589,962846,963655,967716,968010,969340,973203,973691,979681,984194,986337,987333,987576,989152,989680,989764,989896,990245,992566,992991,993739,993832,995968,996541,996557,997401,998689,999101,999907
CVE References: CVE-2004-0230,CVE-2012-6704,CVE-2013-6368,CVE-2015-1350,CVE-2015-8956,CVE-2015-8962,CVE-2015-8964,CVE-2016-10088,CVE-2016-3841,CVE-2016-5696,CVE-2016-7042,CVE-2016-7097,CVE-2016-7117,CVE-2016-7910,CVE-2016-7911,CVE-2016-7916,CVE-2016-8399,CVE-2016-8632,CVE-2016-8633,CVE-2016-8646,CVE-2016-9555,CVE-2016-9576,CVE-2016-9685,CVE-2016-9756,CVE-2016-9793,CVE-2016-9794,CVE-2017-5551
Sources used:
SUSE Linux Enterprise Real Time Extension 11-SP4 (src): kernel-rt-3.0.101.rt130-68.1, kernel-rt_trace-3.0.101.rt130-68.1, kernel-source-rt-3.0.101.rt130-68.1, kernel-syms-rt-3.0.101.rt130-68.1
SUSE Linux Enterprise Debuginfo 11-SP4 (src): kernel-rt-3.0.101.rt130-68.1, kernel-rt_debug-3.0.101.rt130-68.1, kernel-rt_trace-3.0.101.rt130-68.1

15 comments hidden view all 173 comments

Same issue on fedora 25 on XPS 15 9560. Running kernel 4.8.6-300.fc25.x86_64

Disk: seagate 1TEAPF-500 (4TB drive)

Other usb drives spin down as expected.

(In reply to Eric M from comment #15)
> Same issue on fedora 25 on XPS 15 9560. Running kernel 4.8.6-300.fc25.x86_64
>
> Disk: seagate 1TEAPF-500 (4TB drive)
>
> Other usb drives spin down as expected.

kernel 4.10.x resolves the issue for me.

Changed in fedora:
importance: Unknown → Undecided
status: Unknown → Fix Released
Displaying first 40 and last 40 comments. View all 173 comments or add a comment.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.