From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7BD2039FCE for ; Thu, 8 Jan 2026 15:51:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1767887468; cv=none; b=iwzH41U7oYhNOyqAkz0/iYjJG0jCSIeoGCQVwpNr5NidpJwegdn8eiqSf/SWM7SUGFI5SaZx8R9/Ro+bJMJGS8RJNAWM68ESEjx0pR3ojycNUqM8HGSH7jC7NsyuYLgxO1KWRFvyCtRZD7S+5kFvOJtrYuMKeokfd2MhFlzDVPU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1767887468; c=relaxed/simple; bh=3dqW78l+AtBzY9j7vBg/GHCqTgPuHF4TsjDtvzUl+yQ=; h=Message-ID:Date:From:To:Cc:Subject; b=FkJjVIknauMQCYGrAt2g2E0YmFm5Qdsfd2jbOQQiwUdARKAaErOxP8ugFl5cUH7hKbe2U41CFwmnCdVT7qzEWU2qVR4cjjIFL3lTdfaHLKSs+89CjCsqPYzmwxcelaiCOv8qxQajQLIaMRvMmBMhwBPebYEf0kfHWIKEBq7Ebis= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=kts8WJI5; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="kts8WJI5" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 020F0C116C6; Thu, 8 Jan 2026 15:51:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1767887468; bh=3dqW78l+AtBzY9j7vBg/GHCqTgPuHF4TsjDtvzUl+yQ=; h=Date:From:To:Cc:Subject:From; b=kts8WJI5PVuSjyOdBiSehdVDHGpxCMSyXH9TXKgx0vPH8brdHkbuTWeImI2vLz/BJ R5b/Luk1wgsK3R+IcbOQ9iYzP9OEHs+BLYSZQTToZBXaZWQGRUDFx82CiMOGSIvJ6i 1uhUK9nWa13kA1I9F1xEJPPQ+VmaMg0isnUimllaZ+mXizPJUaRWh0K4Q7nubgmtq9 mqcQazgzHqA9BFINrTbQQWxnxsOPXHs8pGJLDg6FCalh6RFje+E+pR372oI2y9sYh/ FRoqmB6eojkp6WATLu9DBt/zmaim7fWqjayLOKKS0mB1IgfodQjbAwvZN8APdsVmux VUSdhge4kcDgQ== Received: from rostedt by gandalf with local (Exim 4.99.1) (envelope-from ) id 1vdsIT-00000004aU4-2atk; Thu, 08 Jan 2026 10:51:37 -0500 Message-ID: <20260108155120.023038025@kernel.org> User-Agent: quilt/0.68 Date: Thu, 08 Jan 2026 10:51:20 -0500 From: Steven Rostedt To: linux-kernel@vger.kernel.org Cc: Masami Hiramatsu , Mark Rutland , Mathieu Desnoyers , Andrew Morton Subject: [for-linus][PATCH 0/5] tracing: Fixes for v6.19 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: tracing fixes for v6.19: - Remove useless assignment of soft_mode variable The function __ftrace_event_enable_disable() sets "soft_mode" in one of the branch paths but doesn't use it after that. Remove the setting of that variable. - Add a cond_resched() in ring_buffer_resize() The resize function that allocates all the pages for the ring buffer was causing a soft lockup on PREEMPT_NONE configs when allocating large buffers on machines with many CPUs. Hopefully this is the last cond_resched() needed to be added as PREEMPT_LAZY becomes the norm in the future. - Make ftrace_graph_ent depth field signed The "depth" field of struct ftrace_graph_ent was converted from "int" to "unsigned long" for alignment reasons to work with being embedded in other structures. The conversion from a signed to unsigned caused integrity checks to always pass as they were comparing "depth" to less than zero. Make the field signed long. - Add recursion protection to stack trace events A infinite recursion was triggered by a stack trace event calling RCU which internally called rcu_read_unlock_special(), which triggered an event that was also doing stacktraces which cause it to trigger the same RCU lock that called rcu_read_unlock_special() again. Update the trace_test_and_set_recursion() to add a set of context checks for events to use, and have the stack trace event use that for recursion protection. - Make the variable ftrace_dump_on_oops static The cleanup of sysctl that moved all the updates to the files that use them moved the reference of ftrace_dump_on_oops to where it is used. It is no longer used outside of the trace.c file. Make it static. git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace.git trace/fixes Head SHA1: 1e2ed4bfd50ace3c4272cfab7e9aa90956fb7ae0 Ben Dooks (1): trace: ftrace_dump_on_oops[] is not exported, make it static Julia Lawall (1): tracing: Drop unneeded assignment to soft_mode Steven Rostedt (2): ftrace: Make ftrace_graph_ent depth field signed tracing: Add recursion protection in kernel stack trace recording Wupeng Ma (1): ring-buffer: Avoid softlockup in ring_buffer_resize() during memory free ---- include/linux/ftrace.h | 2 +- include/linux/trace_recursion.h | 9 +++++++++ kernel/trace/ring_buffer.c | 2 ++ kernel/trace/trace.c | 8 +++++++- kernel/trace/trace_events.c | 7 +++---- 5 files changed, 22 insertions(+), 6 deletions(-)