[for-next][PATCH 00/13] tracing: Reading user space data in syscall events for v6.19

From: Steven Rostedt

Date: Wed Oct 29 2025 - 10:40:43 EST



git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace.git
trace/for-next

Head SHA1: 25bd47a592751eba6ed337e6293dc69f8aa2452f


Steven Rostedt (13):
tracing: Make trace_user_fault_read() exposed to rest of tracing
tracing: Have syscall trace events read user space string
perf: tracing: Simplify perf_sysenter_enable/disable() with guards
perf: tracing: Have perf system calls read user space
tracing: Have system call events record user array data
tracing: Display some syscall arrays as strings
tracing: Allow syscall trace events to read more than one user parameter
tracing: Add a config and syscall_user_buf_size file to limit amount written
tracing: Show printable characters in syscall arrays
tracing: Add trace_seq_pop() and seq_buf_pop()
tracing: Add parsing of flags to the sys_enter_openat trace event
tracing: Check for printable characters when printing field dyn strings
tracing: Have persistent ring buffer print syscalls normally

----
Documentation/trace/ftrace.rst | 8 +
include/linux/seq_buf.h | 17 +
include/linux/trace_seq.h | 13 +
include/trace/syscall.h | 8 +-
kernel/trace/Kconfig | 14 +
kernel/trace/trace.c | 327 ++++++++++++---
kernel/trace/trace.h | 20 +
kernel/trace/trace_output.c | 27 +-
kernel/trace/trace_syscalls.c | 929 ++++++++++++++++++++++++++++++++++++++---
9 files changed, 1244 insertions(+), 119 deletions(-)