[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20251029144041.475297995@kernel.org>
Date: Wed, 29 Oct 2025 10:40:41 -0400
From: Steven Rostedt <rostedt@...nel.org>
To: linux-kernel@...r.kernel.org
Cc: Masami Hiramatsu <mhiramat@...nel.org>,
Mark Rutland <mark.rutland@....com>,
Mathieu Desnoyers <mathieu.desnoyers@...icios.com>,
Andrew Morton <akpm@...ux-foundation.org>
Subject: [for-next][PATCH 00/13] tracing: Reading user space data in syscall events for v6.19
git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace.git
trace/for-next
Head SHA1: 25bd47a592751eba6ed337e6293dc69f8aa2452f
Steven Rostedt (13):
tracing: Make trace_user_fault_read() exposed to rest of tracing
tracing: Have syscall trace events read user space string
perf: tracing: Simplify perf_sysenter_enable/disable() with guards
perf: tracing: Have perf system calls read user space
tracing: Have system call events record user array data
tracing: Display some syscall arrays as strings
tracing: Allow syscall trace events to read more than one user parameter
tracing: Add a config and syscall_user_buf_size file to limit amount written
tracing: Show printable characters in syscall arrays
tracing: Add trace_seq_pop() and seq_buf_pop()
tracing: Add parsing of flags to the sys_enter_openat trace event
tracing: Check for printable characters when printing field dyn strings
tracing: Have persistent ring buffer print syscalls normally
----
Documentation/trace/ftrace.rst | 8 +
include/linux/seq_buf.h | 17 +
include/linux/trace_seq.h | 13 +
include/trace/syscall.h | 8 +-
kernel/trace/Kconfig | 14 +
kernel/trace/trace.c | 327 ++++++++++++---
kernel/trace/trace.h | 20 +
kernel/trace/trace_output.c | 27 +-
kernel/trace/trace_syscalls.c | 929 ++++++++++++++++++++++++++++++++++++++---
9 files changed, 1244 insertions(+), 119 deletions(-)
Powered by blists - more mailing lists