https://bugs.kde.org/show_bug.cgi?id=454229
Bug ID: 454229 Summary: kioslave5 keeps laptop from sleeping when searching in dolphin Product: plasmashell Version: 5.24.4 Platform: Kubuntu Packages OS: Linux Status: REPORTED Severity: normal Priority: NOR Component: general Assignee: plasma-b...@kde.org Reporter: j...@garloff.de CC: k...@davidedmundson.co.uk Target Milestone: 1.0 STEPS TO REPRODUCE 1. Open Dolphin File Manager (package version 4:21.12.3-0ubuntu1, current default on Kubuntu 22.04) 2. Go to any folder where searching for files takes a while (long enough to put laptop into sleep mode while it's searching), like "/" 3. Search for some string (which doesn't matter from what I can tell) 4. Try to go to sleep OBSERVED RESULT The desktop freezes on a blackscreen with only the mouse cursor still visible (but only occasionally moving for short times). Recently playing audio starts looping, and switching to login shells tty2-tty6 doesn't work. After 30-40 seconds (for me), it returns to the lock screen, as if the laptop had woken up from sleep. After waking up the searching doesn't continue, and even after all dolphin instances are closed, a kioslave5 program continues running, which uses up a lot of memory and cpu and is potentially leaking memory (I haven't found enough time to test this yet), and the memory usage of kio-fuse also increases potentially leaking more memory. This remaining kioslave5 program also stops subsequent tries to go to sleep, leading to the same results as described above and the same error messages described below. Killing this program (typically the kioslave5 program with the highest memory by far (>100MB) usage if no other file search is happening) resolves the problems, until you do the steps to reproduce again. EXPECTED RESULT The laptop goes to sleep successfully, after waking up the file search continues and kio-fuse and kioslave5 don't have high memory usage/memory leaks SOFTWARE/OS VERSIONS: Linux Kernel: 5.15.0-30-generic (64bit) KDE Plasma Version: 5.24.4 KDE Frameworks Version: 5.92.0 Qt Version: 5.15.3 ADDITIONAL INFORMATION Hardware: Acer Aspire 5 Laptop with Intel 11th Gen i5-1135G7, 15.4 GiB RAM When using sudo dmesg to get the kernel log, I get this error message: [ 2311.801748] Freezing user space processes ... ... [ 2331.806769] Freezing of tasks failed after 20.005 seconds (5 tasks refusing to freeze, wq_busy=0): [ 2331.806960] task:kioslave5 state:D stack: 0 pid:11294 ppid: 1 flags:0x00004006 [ 2331.806967] Call Trace: [ 2331.806970] <TASK> [ 2331.806973] __schedule+0x23d/0x590 [ 2331.806982] schedule+0x4e/0xb0 [ 2331.806986] request_wait_answer+0xa6/0x210 [ 2331.806991] ? wait_woken+0x70/0x70 [ 2331.806996] fuse_simple_request+0x1b1/0x360 [ 2331.806999] fuse_send_open+0xb7/0x110 [ 2331.807003] fuse_file_open+0xdf/0x180 [ 2331.807007] fuse_open_common+0x9c/0x190 [ 2331.807011] ? fuse_dir_release+0x20/0x20 [ 2331.807014] fuse_dir_open+0x13/0x20 [ 2331.807016] do_dentry_open+0x157/0x380 [ 2331.807021] vfs_open+0x2d/0x30 [ 2331.807025] do_open+0x205/0x3d0 [ 2331.807029] path_openat+0x10e/0x2b0 [ 2331.807032] do_filp_open+0xb2/0x150 [ 2331.807035] ? __check_object_size+0x19/0x20 [ 2331.807039] do_sys_openat2+0x9b/0x160 [ 2331.807043] __x64_sys_openat+0x55/0x90 [ 2331.807047] do_syscall_64+0x59/0xc0 [ 2331.807052] ? exit_to_user_mode_prepare+0x37/0xb0 [ 2331.807057] ? syscall_exit_to_user_mode+0x27/0x50 [ 2331.807060] ? __x64_sys_read+0x19/0x20 [ 2331.807063] ? do_syscall_64+0x69/0xc0 [ 2331.807067] ? exit_to_user_mode_prepare+0x37/0xb0 [ 2331.807070] ? syscall_exit_to_user_mode+0x27/0x50 [ 2331.807073] ? __x64_sys_write+0x19/0x20 [ 2331.807075] ? do_syscall_64+0x69/0xc0 [ 2331.807079] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 2331.807084] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2331.807088] RIP: 0033:0x7f6544e1bbcc [ 2331.807092] RSP: 002b:00007ffc3fc40b90 EFLAGS: 00000287 ORIG_RAX: 0000000000000101 [ 2331.807096] RAX: ffffffffffffffda RBX: 00007ffc3fc40f30 RCX: 00007f6544e1bbcc [ 2331.807098] RDX: 0000000000090800 RSI: 0000561f997bd018 RDI: 00000000ffffff9c [ 2331.807100] RBP: 00007ffc3fc40f20 R08: 0000000000090800 R09: 0000561f997bd018 [ 2331.807102] R10: 0000000000000000 R11: 0000000000000287 R12: 00007ffc3fc40ce8 [ 2331.807104] R13: 00007ffc3fc40da8 R14: 00007ffc3fc40da8 R15: 00007ffc3fc40f00 [ 2331.807107] </TASK> [ 2331.807110] task:kioslave5 state:D stack: 0 pid:11347 ppid: 1041 flags:0x00004006 [ 2331.807115] Call Trace: [ 2331.807116] <TASK> [ 2331.807117] __schedule+0x23d/0x590 [ 2331.807122] schedule+0x4e/0xb0 [ 2331.807126] request_wait_answer+0xa6/0x210 [ 2331.807129] ? wait_woken+0x70/0x70 [ 2331.807132] fuse_simple_request+0x1b1/0x360 [ 2331.807135] fuse_send_open+0xb7/0x110 [ 2331.807139] fuse_file_open+0xdf/0x180 [ 2331.807143] fuse_open_common+0x9c/0x190 [ 2331.807147] ? fuse_dir_release+0x20/0x20 [ 2331.807150] fuse_dir_open+0x13/0x20 [ 2331.807153] do_dentry_open+0x157/0x380 [ 2331.807156] vfs_open+0x2d/0x30 [ 2331.807160] do_open+0x205/0x3d0 [ 2331.807163] path_openat+0x10e/0x2b0 [ 2331.807166] do_filp_open+0xb2/0x150 [ 2331.807170] ? __check_object_size+0x19/0x20 [ 2331.807173] ? alloc_fd+0x53/0x170 [ 2331.807178] do_sys_openat2+0x9b/0x160 [ 2331.807182] __x64_sys_openat+0x55/0x90 [ 2331.807185] do_syscall_64+0x59/0xc0 [ 2331.807189] ? exit_to_user_mode_prepare+0x37/0xb0 [ 2331.807193] ? syscall_exit_to_user_mode+0x27/0x50 [ 2331.807196] ? __x64_sys_write+0x19/0x20 [ 2331.807198] ? do_syscall_64+0x69/0xc0 [ 2331.807201] ? syscall_exit_to_user_mode+0x27/0x50 [ 2331.807204] ? __x64_sys_write+0x19/0x20 [ 2331.807206] ? do_syscall_64+0x69/0xc0 [ 2331.807210] ? asm_common_interrupt+0x8/0x40 [ 2331.807213] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2331.807217] RIP: 0033:0x7fb189f8abcc [ 2331.807219] RSP: 002b:00007ffe3d060d90 EFLAGS: 00000287 ORIG_RAX: 0000000000000101 [ 2331.807221] RAX: ffffffffffffffda RBX: 00007ffe3d061130 RCX: 00007fb189f8abcc [ 2331.807223] RDX: 0000000000090800 RSI: 0000559a8a96ca68 RDI: 00000000ffffff9c [ 2331.807225] RBP: 00007ffe3d061120 R08: 0000000000090800 R09: 0000559a8a96ca68 [ 2331.807226] R10: 0000000000000000 R11: 0000000000000287 R12: 00007ffe3d060ee8 [ 2331.807228] R13: 00007ffe3d060fa8 R14: 00007ffe3d060fa8 R15: 00007ffe3d061100 [ 2331.807230] </TASK> [ 2331.807232] task:kioslave5 state:D stack: 0 pid:11351 ppid: 1041 flags:0x00004006 [ 2331.807235] Call Trace: [ 2331.807236] <TASK> [ 2331.807237] __schedule+0x23d/0x590 [ 2331.807242] schedule+0x4e/0xb0 [ 2331.807246] request_wait_answer+0xa6/0x210 [ 2331.807248] ? wait_woken+0x70/0x70 [ 2331.807252] fuse_simple_request+0x1b1/0x360 [ 2331.807255] fuse_dentry_revalidate+0x177/0x3c0 [ 2331.807260] lookup_fast+0xd9/0x160 [ 2331.807262] ? inode_permission+0x6c/0x190 [ 2331.807265] walk_component+0x43/0x1b0 [ 2331.807268] ? path_init+0x2bc/0x3e0 [ 2331.807271] path_lookupat+0x6e/0x1b0 [ 2331.807274] filename_lookup+0xcf/0x1d0 [ 2331.807278] ? __check_object_size+0x19/0x20 [ 2331.807280] ? strncpy_from_user+0x44/0x140 [ 2331.807285] ? getname_flags.part.0+0x4c/0x1b0 [ 2331.807288] ? restore_fpregs_from_fpstate+0x4e/0xc0 [ 2331.807294] user_path_at_empty+0x3f/0x60 [ 2331.807298] path_getxattr+0x4a/0xb0 [ 2331.807302] ? do_syscall_64+0x69/0xc0 [ 2331.807306] __x64_sys_getxattr+0x24/0x30 [ 2331.807310] do_syscall_64+0x59/0xc0 [ 2331.807314] ? __x64_sys_readlink+0x1e/0x30 [ 2331.807317] ? do_syscall_64+0x69/0xc0 [ 2331.807321] ? do_syscall_64+0x69/0xc0 [ 2331.807324] ? asm_sysvec_irq_work+0xa/0x20 [ 2331.807328] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2331.807332] RIP: 0033:0x7f84fbf4924e [ 2331.807333] RSP: 002b:00007ffc5a5125a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf [ 2331.807336] RAX: ffffffffffffffda RBX: 0000000000008000 RCX: 00007f84fbf4924e [ 2331.807337] RDX: 00007ffc5a5125b0 RSI: 00007f84fbac0000 RDI: 0000560a80b0eae8 [ 2331.807339] RBP: 00007ffc5a512700 R08: 00000000ffffffff R09: 0000000000000010 [ 2331.807340] R10: 0000000000000084 R11: 0000000000000246 R12: 0000560a80b0eae8 [ 2331.807342] R13: 00007ffc5a5125b0 R14: 00007f84fbac0000 R15: 00007ffc5a512780 [ 2331.807345] </TASK> [ 2331.807346] task:kioslave5 state:D stack: 0 pid:11372 ppid: 1 flags:0x00004006 [ 2331.807349] Call Trace: [ 2331.807350] <TASK> [ 2331.807351] __schedule+0x23d/0x590 [ 2331.807355] schedule+0x4e/0xb0 [ 2331.807359] request_wait_answer+0xa6/0x210 [ 2331.807362] ? wait_woken+0x70/0x70 [ 2331.807365] fuse_simple_request+0x1b1/0x360 [ 2331.807368] fuse_dentry_revalidate+0x177/0x3c0 [ 2331.807373] lookup_fast+0xd9/0x160 [ 2331.807376] walk_component+0x43/0x1b0 [ 2331.807379] path_lookupat+0x6e/0x1b0 [ 2331.807382] filename_lookup+0xcf/0x1d0 [ 2331.807386] ? __check_object_size+0x19/0x20 [ 2331.807388] ? strncpy_from_user+0x44/0x140 [ 2331.807391] ? getname_flags.part.0+0x4c/0x1b0 [ 2331.807395] user_path_at_empty+0x3f/0x60 [ 2331.807398] vfs_statx+0x7a/0x120 [ 2331.807402] do_statx+0x45/0x80 [ 2331.807406] ? restore_fpregs_from_fpstate+0x4e/0xc0 [ 2331.807410] ? switch_fpu_return+0x4e/0xc0 [ 2331.807415] __x64_sys_statx+0x1f/0x30 [ 2331.807419] do_syscall_64+0x59/0xc0 [ 2331.807422] ? do_syscall_64+0x69/0xc0 [ 2331.807426] ? exit_to_user_mode_prepare+0x92/0xb0 [ 2331.807430] ? syscall_exit_to_user_mode+0x27/0x50 [ 2331.807432] ? __x64_sys_getxattr+0x24/0x30 [ 2331.807436] ? do_syscall_64+0x69/0xc0 [ 2331.807440] ? do_syscall_64+0x69/0xc0 [ 2331.807443] ? do_syscall_64+0x69/0xc0 [ 2331.807447] ? do_syscall_64+0x69/0xc0 [ 2331.807450] ? syscall_exit_to_user_mode+0x27/0x50 [ 2331.807453] ? __x64_sys_getxattr+0x24/0x30 [ 2331.807456] ? do_syscall_64+0x69/0xc0 [ 2331.807460] ? syscall_exit_to_user_mode+0x27/0x50 [ 2331.807462] ? __x64_sys_getxattr+0x24/0x30 [ 2331.807466] ? do_syscall_64+0x69/0xc0 [ 2331.807469] ? do_syscall_64+0x69/0xc0 [ 2331.807473] ? asm_sysvec_reschedule_ipi+0xa/0x20 [ 2331.807477] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2331.807480] RIP: 0033:0x7f54635401ee [ 2331.807481] RSP: 002b:00007ffd23532568 EFLAGS: 00000246 ORIG_RAX: 000000000000014c [ 2331.807483] RAX: ffffffffffffffda RBX: 000000000000001f RCX: 00007f54635401ee [ 2331.807485] RDX: 0000000000000100 RSI: 0000563157c24328 RDI: 00000000ffffff9c [ 2331.807486] RBP: 00007ffd23532780 R08: 00007ffd235325e0 R09: 0000563157c1d120 [ 2331.807488] R10: 0000000000000a79 R11: 0000000000000246 R12: 0000000000000000 [ 2331.807490] R13: 00007ffd235327a8 R14: 0000000000000002 R15: 00007ffd235325e0 [ 2331.807492] </TASK> [ 2331.807494] task:kioslave5 state:D stack: 0 pid:11376 ppid: 1 flags:0x00004006 [ 2331.807496] Call Trace: [ 2331.807497] <TASK> [ 2331.807498] __schedule+0x23d/0x590 [ 2331.807503] schedule+0x4e/0xb0 [ 2331.807507] request_wait_answer+0xa6/0x210 [ 2331.807509] ? wait_woken+0x70/0x70 [ 2331.807512] fuse_simple_request+0x1b1/0x360 [ 2331.807515] fuse_send_open+0xb7/0x110 [ 2331.807519] fuse_file_open+0xdf/0x180 [ 2331.807523] fuse_open_common+0x9c/0x190 [ 2331.807527] ? fuse_dir_release+0x20/0x20 [ 2331.807529] fuse_dir_open+0x13/0x20 [ 2331.807532] do_dentry_open+0x157/0x380 [ 2331.807536] vfs_open+0x2d/0x30 [ 2331.807539] do_open+0x205/0x3d0 [ 2331.807542] path_openat+0x10e/0x2b0 [ 2331.807546] do_filp_open+0xb2/0x150 [ 2331.807549] ? __check_object_size+0x19/0x20 [ 2331.807552] ? alloc_fd+0x53/0x170 [ 2331.807556] do_sys_openat2+0x9b/0x160 [ 2331.807560] __x64_sys_openat+0x55/0x90 [ 2331.807564] do_syscall_64+0x59/0xc0 [ 2331.807567] ? exit_to_user_mode_prepare+0x37/0xb0 [ 2331.807571] ? syscall_exit_to_user_mode+0x27/0x50 [ 2331.807574] ? do_syscall_64+0x69/0xc0 [ 2331.807577] ? exit_to_user_mode_prepare+0x37/0xb0 [ 2331.807581] ? syscall_exit_to_user_mode+0x27/0x50 [ 2331.807584] ? __x64_sys_read+0x19/0x20 [ 2331.807586] ? do_syscall_64+0x69/0xc0 [ 2331.807590] ? do_syscall_64+0x69/0xc0 [ 2331.807593] ? do_syscall_64+0x69/0xc0 [ 2331.807597] ? do_syscall_64+0x69/0xc0 [ 2331.807600] ? do_syscall_64+0x69/0xc0 [ 2331.807604] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 2331.807607] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2331.807611] RIP: 0033:0x7fa07543abcc [ 2331.807612] RSP: 002b:00007ffed572d6b0 EFLAGS: 00000287 ORIG_RAX: 0000000000000101 [ 2331.807614] RAX: ffffffffffffffda RBX: 00007ffed572da50 RCX: 00007fa07543abcc [ 2331.807615] RDX: 0000000000090800 RSI: 0000557777328ae8 RDI: 00000000ffffff9c [ 2331.807617] RBP: 00007ffed572da40 R08: 0000000000090800 R09: 0000557777328ae8 [ 2331.807618] R10: 0000000000000000 R11: 0000000000000287 R12: 00007ffed572d808 [ 2331.807620] R13: 00007ffed572d8c8 R14: 00007ffed572d8c8 R15: 00007ffed572da20 [ 2331.807622] </TASK> [ 2331.807630] OOM killer enabled. [ 2331.807631] Restarting tasks ... done. -- You are receiving this mail because: You are watching all bug changes.