Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp1075285ybf; Thu, 27 Feb 2020 04:38:18 -0800 (PST) X-Google-Smtp-Source: APXvYqzrlqzQUMKKyZCxJIue6Hh1elcNv0QnXGzxP/JatF6NGOXDEk2oTqU2XzHZCNgI5z+snqx0 X-Received: by 2002:a05:6830:154c:: with SMTP id l12mr3069996otp.275.1582807098688; Thu, 27 Feb 2020 04:38:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582807098; cv=none; d=google.com; s=arc-20160816; b=fLxDC8b59mM13gM99psoEwlul6DKuPYULIkz8Cx64reKt8lZyexUnEcLs5RdTJrRv/ DNKnTrVnJtul2O6VXePNl4l/E4TKNydgzK2BZaxSTGER18HszYHrMqdKYpEWNZbFeIsC Ejto7p4bAwRHw/8YYz2rYrJ8RnA3X5smqRBGnRHVLyzlC8clDg5Nbw7dmi9nN2D4xEKL Ej+KjpwIUgEeewajej3hKPoYawtdlfQHjTggNwAB6BOH+kplWT5/C+92oFv5HkWxvHPo z6anCqUWuHVG45goE0RYlEDR4UOUP8/x7qb4LF0e0WlqQtevvvwgTbZwf5ZK7p4RBgBn BcsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=4+y94lcwn7l6+dMB1MJS29xPdauPpnYrGvDLW1JyGU0=; b=xMo4PVmkj2Db+sWGbdTMa2UkjXs5ocv6rM2DoeRIP9pCH0alQM1KMen2jsWeU0QYK4 T8l3Hx8Uvq8fCJtlCniX4m1WvHFGX7NgyjQ4h40/s+IyjXDC4ah5HtCE7j3w7QkdGjMK hHEKVV3miCaVO00St5A8wKSHiammF4eAC6Pdg3aELZq29IOlBVuddzT4M0bZB9BzbhnC qsLtynZHx29KfAKiB2Y5SvqZe1aThwiOsFwigcgtyU+0X9CgA0BUhfw6diGeq99JxEZM E6doFK+6rH3kNGtTuxjc3X+rjgN9ubCFUe0ttbDzeFzDEXYtu6coRwriizA9fHIVURqN LezA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DIhu14lK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n203si1084723oia.112.2020.02.27.04.38.05; Thu, 27 Feb 2020 04:38:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DIhu14lK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729079AbgB0Mgh (ORCPT + 99 others); Thu, 27 Feb 2020 07:36:37 -0500 Received: from mail.kernel.org ([198.145.29.99]:35888 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728977AbgB0Mgh (ORCPT ); Thu, 27 Feb 2020 07:36:37 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E33F524692; Thu, 27 Feb 2020 12:36:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582806996; bh=WVQFRXBahP96gdkhPZydltW4Lze2BFsGr6dnKM53hho=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=DIhu14lK1yDymB6alpgF9NHwX2ng77anG/DaHYXsT7F4WU3RZCLXrEin4O7jUgESa B0Wj73ivWfV3DFapyOCxCwrDKh56Ckj/4XkGc49sNQhmyPWKbSd6X+ZldUsyc116Kb W7+lVKRwbnw4Z0wafRg44nWIAS9ML+Poe1iJsmUE= Date: Thu, 27 Feb 2020 13:36:33 +0100 From: Greg Kroah-Hartman To: Lech Perczak Cc: "linux-kernel@vger.kernel.org" , Theodore Ts'o , Arnd Bergmann , Krzysztof =?utf-8?Q?Drobi=C5=84ski?= , Pawel Lenkow Subject: Re: Regression in v4.19.106 breaking waking up of readers of /proc/kmsg and /dev/kmsg Message-ID: <20200227123633.GB962932@kroah.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 27, 2020 at 11:09:49AM +0000, Lech Perczak wrote: > Hello, > > After upgrading kernel on our boards from v4.19.105 to v4.19.106 we found out that syslog fails to read the messages after ones read initially after opening /proc/kmsg just after booting. > I also found out, that output of 'dmesg --follow' also doesn't react on new printks appearing for whatever reason - to read new messages, reopening /proc/kmsg or /dev/kmsg was needed. > I bisected this down to commit 15341b1dd409749fa5625e4b632013b6ba81609b ("char/random: silence a lockdep splat with printk()"), and reverting it on top of v4.19.106 restored correct behaviour. That is really really odd. > My test scenario for bisecting was: > 1. run 'dmesg --follow' as root > 2. run 'echo t > /proc/sysrq-trigger' > 3. If trace appears in dmesg output -> good, otherwise, bad. If trace doesn't appear in output of 'dmesg --follow', re-running it will show the trace. > > I ran my tests on Debian 10.3 with configuration based directly on one from 4.19.0-8-amd64 (4.19.98-1) in Qemu. > I could reproduce the same issue on several boards with x86 and ARMv7 CPUs alike, with 100% reproducibility. > > I haven't yet digged into why exactly this commit breaks notifications for readers of /proc/kmsg and /dev/kmsg, but as reverting it fixed the issue, I'm pretty sure this is the one. It is possible that the same happened in 5.4 line, bu I hadn't had a chance to test this as well yet. I can revert this, but it feels like there is something else going wrong here. Can you try the 5.4 tree to see if that too has your same problem? thanks, greg k-h