[kde] [Bug 493520] New: baloo_file crash preventing system from sleeping or going into hibernate

Randall Larson bugzilla_noreply at kde.org
Mon Sep 23 06:00:25 BST 2024


https://bugs.kde.org/show_bug.cgi?id=493520

            Bug ID: 493520
           Summary: baloo_file crash preventing system from sleeping or
                    going into hibernate
    Classification: I don't know
           Product: kde
           Version: unspecified
          Platform: Arch Linux
                OS: Linux
            Status: REPORTED
          Severity: crash
          Priority: NOR
         Component: general
          Assignee: unassigned-bugs at kde.org
          Reporter: kde at list.randalllarson.me
  Target Milestone: ---

SUMMARY
When attempting to put my laptop into sleep or hibernate, I return to the
lockscreen but the GUI is completely unresponsive and does not even update the
time.  When I switch to a new console, and check dmesg, I see multiple stack
traces for baloo_file.  See below for example.  Disable baloo with balootctl6
does not change the outcome.


STEPS TO REPRODUCE
1. Attempt to put system into sleep or hibernate

OBSERVED RESULT
[Sun Sep 22 23:06:34 2024] task:baloo_file      state:D stack:0     pid:1036 
tgid:1036  ppid:944    flags:0x00004006
[Sun Sep 22 23:06:34 2024] Call Trace:
[Sun Sep 22 23:06:34 2024]  <TASK>
[Sun Sep 22 23:06:34 2024]  __schedule+0x3d5/0x1520
[Sun Sep 22 23:06:34 2024]  schedule+0x27/0xf0
[Sun Sep 22 23:06:34 2024]  request_wait_answer+0xd0/0x2b0
[Sun Sep 22 23:06:34 2024]  ? __pfx_autoremove_wake_function+0x10/0x10
[Sun Sep 22 23:06:34 2024]  fuse_simple_request+0x17e/0x2c0
[Sun Sep 22 23:06:34 2024]  fuse_readdir_uncached+0x17e/0x840
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? dput+0x2f/0x1b0
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? fuse_file_open+0xe4/0x1a0
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? mntput_no_expire+0x4a/0x260
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  iterate_dir+0x121/0x220
[Sun Sep 22 23:06:34 2024]  __x64_sys_getdents64+0x86/0x130
[Sun Sep 22 23:06:34 2024]  ? __pfx_filldir64+0x10/0x10
[Sun Sep 22 23:06:34 2024]  do_syscall_64+0x82/0x190
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? __rseq_handle_notify_resume+0xa6/0x490
[Sun Sep 22 23:06:34 2024]  ? do_sys_openat2+0x9c/0xe0
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? syscall_exit_to_user_mode+0x72/0x200
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? do_syscall_64+0x8e/0x190
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? __slab_free+0xdf/0x2f0
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? __slab_free+0xdf/0x2f0
[Sun Sep 22 23:06:34 2024]  ? __memcg_slab_free_hook+0xf7/0x140
[Sun Sep 22 23:06:34 2024]  ? __x64_sys_close+0x3c/0x80
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? kmem_cache_free+0x3a0/0x400
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? syscall_exit_to_user_mode+0x72/0x200
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? do_syscall_64+0x8e/0x190
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? __rseq_handle_notify_resume+0xa6/0x490
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? switch_fpu_return+0x4e/0xd0
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? syscall_exit_to_user_mode+0x72/0x200
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? do_syscall_64+0x8e/0x190
[Sun Sep 22 23:06:34 2024]  ? switch_fpu_return+0x4e/0xd0
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? syscall_exit_to_user_mode+0x72/0x200
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  ? do_syscall_64+0x8e/0x190
[Sun Sep 22 23:06:34 2024]  ? srso_alias_return_thunk+0x5/0xfbef5
[Sun Sep 22 23:06:34 2024]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[Sun Sep 22 23:06:34 2024] RIP: 0033:0x7621788f1137
[Sun Sep 22 23:06:34 2024] RSP: 002b:00007fff971bf4f8 EFLAGS: 00000293
ORIG_RAX: 00000000000000d9
[Sun Sep 22 23:06:34 2024] RAX: ffffffffffffffda RBX: 0000601a0c1c57a0 RCX:
00007621788f1137
[Sun Sep 22 23:06:34 2024] RDX: 0000000000008000 RSI: 0000601a0c1c57d0 RDI:
000000000000000f
[Sun Sep 22 23:06:34 2024] RBP: 00007fff971bf530 R08: 0000601a0c0e6c50 R09:
0000000000000000
[Sun Sep 22 23:06:34 2024] R10: 0000000000000000 R11: 0000000000000293 R12:
0000601a0c1c57a4
[Sun Sep 22 23:06:34 2024] R13: 0000601a0c1c57d0 R14: fffffffffffffeb8 R15:
0000000000000002
[Sun Sep 22 23:06:34 2024]  </TASK>

EXPECTED RESULT
Laptop would be able to enter sleep or hibernate and exit without having to
reboot system

SOFTWARE/OS VERSIONS
Operating System: Arch Linux 
KDE Plasma Version: 6.1.5
KDE Frameworks Version: 6.6.0
Qt Version: 6.7.2
Kernel Version: 6.10.10-arch1-1 (64-bit)
Graphics Platform: Wayland
Processors: 16 × AMD Ryzen 7 PRO 7840HS w/ Radeon 780M Graphics
Memory: 30.0 GiB of RAM
Graphics Processor: AMD Radeon 780M
Storage: BTRFS on Luks + Encrypted SWAP partion

ADDITIONAL INFORMATION
Even disabling baloo, my system shows this stack trace after it locks up.

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the Unassigned-bugs mailing list