From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E2C233A1E9B for ; Sat, 7 Mar 2026 15:12:38 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772896359; cv=none; b=DsKJ3+Nd3/h06Y9WYyLRAKirCCX+lT4SQ14bRFfjw+hsgJXMlnGefEyH5Kmb5hn87sZI1dUqwFaDfkn/86ZKdPdR+6tYzK6a4r5C4l9i1cjJATC5/lgQNIhXYfLvliaM0/Yijgxgsfr2E90QpItTFzr02eXELBSt0qKOirCnd0g= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772896359; c=relaxed/simple; bh=RAi0wzQInAdrYtB55/BcymG4CaC12Xui65FyBU4w0Bo=; h=Message-ID:Date:From:To:Cc:Subject; b=QSB7ubgKECL9AFa9WQlTU8vnk4nM0sBHVjzJ6EewPAfnjTKxtWoEkcyfPhZ0Y6ucvSVSbVLStIZWbNKsHrnin6Dqr5zlVleJSNubLQRUBKOIfamsexqgJVcTaSRCfJ8RmFgJQhGF1TQkwo49LiIMX26r4+Zq1+fch8WYRnRGcUQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=NrYgDJ4b; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="NrYgDJ4b" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8F316C19422; Sat, 7 Mar 2026 15:12:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1772896358; bh=RAi0wzQInAdrYtB55/BcymG4CaC12Xui65FyBU4w0Bo=; h=Date:From:To:Cc:Subject:From; b=NrYgDJ4bgbf4VmNCo2mfOxizWYZYkF3F+H3TPEZWhRsysn35pGxZAQxs4b//h5sFz 7CJ7hXSuTbIb5E0K7KxP+yUEMdAK+sPJOut6a/A/Yis0IIXPNLyKqF9ZZgoo8m7TPs bu06/V9txcsM0fOj8vsGwMJqjpKX69wLZxGb8N++ROx1Uo2RNoas4WlnTE6sFNIG/F 5XSC6Tdc/OB2140mwEQ9rG9a68J9hsoDyu486yKqrbZHkvDz47hkN86+i8z+lOm/Tg pALBiClE7qGu5NhBOugnTvSW4hSw3HSSk1IYgFbtRrRwjbtnaPzeZtKBQp1cMWjBcN mJSelcSqhKm3A== Received: from rostedt by gandalf with local (Exim 4.99.1) (envelope-from ) id 1vytKb-000000010Ms-2wh8; Sat, 07 Mar 2026 10:12:41 -0500 Message-ID: <20260307151224.447677123@kernel.org> User-Agent: quilt/0.69 Date: Sat, 07 Mar 2026 10:12:24 -0500 From: Steven Rostedt To: linux-kernel@vger.kernel.org Cc: Masami Hiramatsu , Mark Rutland , Mathieu Desnoyers , Andrew Morton Subject: [for-linus][PATCH 0/3] tracing: More fixes for 7.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: tracing fixes for 7.0: - Fix possible NULL pointer dereference in trace_data_alloc() On the error path in trace_data_alloc(), it can call trigger_data_free() with a NULL pointer. This use to be a kfree() but was changed to trigger_data_free() to clean up any partial initialization. The issue is that trigger_data_free() does not expect a NULL pointer. Have trigger_data_free() return safely on NULL pointer. - Fix multiple events on the command line and bootconfig If multiple events are enabled on the command line separately and not grouped, only the last event gets enabled. That is: trace_event=sched_switch trace_event=sched_waking Will only enable sched_waking where as: trace_event=sched_switch,sched_waking Will enable both. The bootconfig makes it even worse as the second way is the more common method. The issue is that a temporary buffer is used to store the events to enable later in boot. Each time the cmdline callback is called, it overwrites what was previously there. Have the callback append the next value (delimited by a comma) if the temporary buffer already has content. - Fix command line trace_buffer_size if >= 2G The logic to allocate the trace buffer uses "int" for the size parameter in the command line code causing overflow issues if more that 2G is specified. git://git.kernel.org/pub/scm/linux/kernel/git/trace/linux-trace.git trace/fixes Head SHA1: d008ba8be8984760e36d7dcd4adbd5a41a645708 Andrei-Alexandru Tachici (1): tracing: Fix enabling multiple events on the kernel command line and bootconfig Calvin Owens (1): tracing: Fix trace_buf_size= cmdline parameter with sizes >= 2G Guenter Roeck (1): tracing: Add NULL pointer check to trigger_data_free() ---- kernel/trace/trace.c | 6 +++--- kernel/trace/trace_events.c | 6 +++++- kernel/trace/trace_events_trigger.c | 3 +++ 3 files changed, 11 insertions(+), 4 deletions(-)