Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp4264877img; Tue, 26 Mar 2019 06:19:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqz0sk9aGJCqiGHwhwQxzHsGVn8OjTWpjn+g0LzwkfcZuaCpkb8Z/Nsn5GMVmD88tmP0ddD5 X-Received: by 2002:a65:5b47:: with SMTP id y7mr28856467pgr.449.1553606373014; Tue, 26 Mar 2019 06:19:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553606373; cv=none; d=google.com; s=arc-20160816; b=fRMrJnRH6jz+FXoptbUW/bjl1qpQt1LNoQ8Ec+/P2ws1i3WqiGgxbO47tJhS5ZmQbi 6HEbk+bBJw4c/Xylv8X9ljeYL99+DYk9dVcnKIFg6uATppgywU7sccKqoJVGhjJnznvg Xe/+1BKnONiC388EquKtAv9rTFxsxqDHcj6IxsAcgzEYCGNYLtzYvl9ZGMgPUhn62Dsy EsWhKJ3fv2ZbIVxxDZC30BJfM4GjnHMjakuVXKs/SqYSmzZ7ZLjKKqE7K6C4Z9MOBNqC L1Bhzt53AICQyGETVM+kiJV1mOwrtaiKvK4C2mbsb/i0euB0udVPyDYepWTxzC4YdO64 HJnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=x8SgbsjKzx/NuD53StPGCvE88pPBlhz3mdWAmFSFm8I=; b=Jte5gae/BQsbpwfCqwc8m+dZypPdMOAKDZxqb0LBflgk+rlzJYCzWQqT6NZ903n31O 1RCXvRPQg0a0bSLPg0KWzF+3hjp73DzKQKsurdbyggzF7rlfuIFjSczqg7GchR2K5Kz8 +p1EtO3vZHTq2VHDC59RVRUMspgOGOVi1kov47PMLuTnlFxcLHJhg4mDJNeS1Jm3LY6X Oz1ueUDEWkupND2Fv99ib7fOzsCiDrOl/+/zYXKnZQrOktz0PFc+SjHh+a40jPFbyzJ/ 7au5gVaLSO0q7IIZO/7cyLLBIwwlJFh0IbiFDmyUIdbkmCajVnVqD6Ano1EHPIL2Uws3 2Dwg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j34si404913pgb.64.2019.03.26.06.19.17; Tue, 26 Mar 2019 06:19:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731531AbfCZNRF (ORCPT + 99 others); Tue, 26 Mar 2019 09:17:05 -0400 Received: from mx3.molgen.mpg.de ([141.14.17.11]:53307 "EHLO mx1.molgen.mpg.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726175AbfCZNRE (ORCPT ); Tue, 26 Mar 2019 09:17:04 -0400 Received: from [172.18.205.202] (unknown [46.183.103.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: pmenzel) by mx.molgen.mpg.de (Postfix) with ESMTPSA id A0DFE604E3A59; Tue, 26 Mar 2019 14:17:02 +0100 (CET) Subject: Re: Reading `/sys/kernel/debug/kmemleak` takes 3 s and content not shown To: Christophe Leroy , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman Cc: linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org References: <88e651e2-d876-376e-81fa-eab0729ebb47@molgen.mpg.de> From: Paul Menzel Message-ID: <33ad8e80-4275-d5bf-9b6a-052dd8afe7ef@molgen.mpg.de> Date: Tue, 26 Mar 2019 14:17:01 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.5.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: de-DE Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Dear Christophe, On 26.03.19 13:55, Christophe Leroy wrote: > Le 26/03/2019 à 13:49, Paul Menzel a écrit : >> On 19.02.19 10:44, Paul Menzel wrote: >> >>> On a the IBM S822LC (8335-GTA) with Ubuntu 18.10, and Linux 5.0-rc5+ >>> accessing `/sys/kernel/debug/kmemleak` takes a long time. According to >>> strace it takes three seconds. >>> >>> $ dmesg | grep leak >>> [    4.407957] kmemleak: Kernel memory leak detector initialized >>> [    4.407959] kmemleak: Automatic memory scanning thread started >>> [745989.625624] kmemleak: 1 new suspected memory leaks (see >>> /sys/kernel/debug/kmemleak) >>> [1002619.951902] kmemleak: 1 new suspected memory leaks (see >>> /sys/kernel/debug/kmemleak) >>> ``` >>> >>> Unfortunately, the leaks supposedly stored in that file are not shown >>> either. >> >> The problem is still present with Linux 5.0. Do you have an idea, how >> to fix this? > > Have you identified a previous version that works properly? It seems to have worked with Linux 4.18-rc4+ [1]. > If so, have you been able to bisect the problem? No, sorry, I have not. I do not have resources for this. Kind regards, Paul [1]: https://lists.ozlabs.org/pipermail/linuxppc-dev/2018-July/175658.html