From nobody Thu Apr 2 15:37:59 2026 Received: from mail-wm1-f46.google.com (mail-wm1-f46.google.com [209.85.128.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 04165319859 for ; Tue, 10 Feb 2026 11:34:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.46 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770723298; cv=none; b=WOQdEq+CvU51qEUkd1Ob8QYJ7KW8Cr3F2XE6NQx2csM8KM2vE5iAusL9zTOk2Io/3kamGzBWMCt1gGuDM7XnN482Q2v/5uxvAjiOtffinR0Y98vdvYp3gBU0xHR4vlfUSN3iPkEv2V+5MjY/cUDdvfQH6fhaU0MrmVAMlIcziss= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1770723298; c=relaxed/simple; bh=zJ2Q3ZfXvTejXn7hADjwCYUmn97smDDde070ENCFaMg=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=udC2sN6ugZQ6KEsOTUJ40cBiYLzuExOBiacLMInArj1LA7fcAPEhSe4+a5ggBFW4Sx2UOZpJyH0C8Vk2czND20MulAV6pvnUz/wP7hvkbIDV+YBNb4J26zk+TlPQJSaIxTvNQDJ5l9Ei+jUlYQcdFJiM03o/CWzm3HxYLvhEs1E= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com; spf=pass smtp.mailfrom=suse.com; dkim=pass (2048-bit key) header.d=suse.com header.i=@suse.com header.b=QJ3JGM3b; arc=none smtp.client-ip=209.85.128.46 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=suse.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=suse.com header.i=@suse.com header.b="QJ3JGM3b" Received: by mail-wm1-f46.google.com with SMTP id 5b1f17b1804b1-47ff94b46afso52651575e9.1 for ; Tue, 10 Feb 2026 03:34:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=google; t=1770723292; x=1771328092; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=7n6tcTGOKkQhPa3J8Fp7f0Ik4WwCbQupTIGbvUZ9CRk=; b=QJ3JGM3b80e9zy/zZ5wDtoyJ8q04BkBmPKGDwzl/uaqiNsUM4B+b+YdmqooqMT+g7B dttALfLPl4eqcF9MciCVKB4X5bGj9cSz3qxl86NETEKhEvE99Az3YolPMdGJoyvpf8Pe Le9zLOWb8DXiXzzjMj8Zkl+iXyMLI9UvJm939PHP6IfGAmJsd0YeiaGrnzHs/c9d1j+9 es3eDIV7olXgTKz5GRDROBF6TJXeeoBljzllJdT4ZDnQmyZxaCGM5NEgPrI1aM//UdSO mvjAbZXFv7vj/Wy4WBtzKvVQ8J3aCmZs1Es5vz4LFV1Nv2uILrPqWwI0o8w+rFPOZpea UwOA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1770723292; x=1771328092; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=7n6tcTGOKkQhPa3J8Fp7f0Ik4WwCbQupTIGbvUZ9CRk=; b=EXwgChl8U9X5DdNj3ry0YMOWE3uNObpipyGOh4VQItd/NRjQ2c4OOBFXUc/mHmxvl0 u6BmAYBziEJdlonmPge1IMioWtrtE6tsEXOxVzAzzrRASpGP2uZjcQgWSaYxeym9P1io dnu+tq3LSMUBxgm9WIxrvqqorVIZOICxSgjsgl3zjwPXvYpzSSpwe9H42l32k2eyZbSX D0ELceGQAcyBPeOYsdGxQ77Ni4D2HEGdRNdVvcM+GJjH/Ql048TppcuHVslIlQtn4sz9 2TLOpm6wTxWiOVJLXntKS+3SrTGYuZ54ZhdiyZXgdTpK8mGahnWfsSAL7VuqGzqmxHrg bYjA== X-Forwarded-Encrypted: i=1; AJvYcCU9yjkHKyQumtRUabYWiOv/st+z+ir2jHtuUTtWXiIr2ibomOCVaR5XvCanVXkoJ+7iXQEW8ZVnSYahx/w=@vger.kernel.org X-Gm-Message-State: AOJu0Ywsdih4XaCug/quHF5ISgt702+ZRZ/OUo/Y8HxsSGG+LBZBPS8L 2LYBA/nYKWXUY5Z9UZMs5nwOFeyfbhrVwHiheChZMN9twgoV+EBFEx5P8v9n+Yy9z8k= X-Gm-Gg: AZuq6aJYkhVvvl6r6hxBczeu3Ey/gmPv5EeF2Jh4aD7pFRalWriJMB2oED9O/wcDlfM 0oUABGQWq5fF/ls9ThtamqOEFwriCctobzcys9t3hgENuS8WgfXmmeVPqn2RPlFGxyHCQf2QYnv IEOh3ImcPM9EuSmx1rqkROk+Qam5hrd3zBhXcpfKItEoIu2QhBXKIzyLjVRizRtsE1JdumPvjN+ o4IkmP46poaNYhP8sZdk4DxCsGmRtSa8vRDJB8CkebKXGHYKw8b6Ep5amXIppil6CP+jGO3vWRy xoS+Nv/V5VHc9ilV9IyOxihoRYdPX9TJsT+YIJgMjJhUK+aDH9Gl55T8mf6yeDCL/fz/66AW3f0 u01R96rg3/dTGpAhdw0pvuS1kTzg9RppB09aQBKvOsruZZ0De6bO3CFjq1fRabPYrBu/KEKhNsz d75Gvva389TbbmBJ/CRdBiW6sFXbIEDOP/tmELtMAGViGGu/kU8MSkii/zSTOcb4K24ImQuXWgP widWWF+cv9pJgtmMmoXEe5x X-Received: by 2002:a05:600c:3547:b0:47e:e59c:67c5 with SMTP id 5b1f17b1804b1-48350521bebmr28279235e9.8.1770723292197; Tue, 10 Feb 2026 03:34:52 -0800 (PST) Received: from zovi.suse.cz (dynamic-2a00-1028-838d-271e-8e3b-4aff-fe4c-a100.ipv6.o2.cz. [2a00:1028:838d:271e:8e3b:4aff:fe4c:a100]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-483209cfd77sm120182275e9.14.2026.02.10.03.34.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Feb 2026 03:34:51 -0800 (PST) From: Petr Pavlu To: Steven Rostedt , Masami Hiramatsu Cc: Mathieu Desnoyers , Tom Zanussi , linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org, Petr Pavlu Subject: [PATCH 5/5] tracing: Free up file->private_data for use by individual events Date: Tue, 10 Feb 2026 12:28:20 +0100 Message-ID: <20260210113427.1068932-6-petr.pavlu@suse.com> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260210113427.1068932-1-petr.pavlu@suse.com> References: <20260210113427.1068932-1-petr.pavlu@suse.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The tracing_open_file_tr() function currently copies the trace_event_file pointer from inode->i_private to file->private_data when the file is successfully opened. This duplication is not particularly useful, as all event code should utilize event_file_file() or event_file_data() to retrieve a trace_event_file pointer from a file struct and these access functions read file->f_inode->i_private. Moreover, this setup requires the code for opening hist files to explicitly clear file->private_data before calling single_open(), since this function expects the private_data member to be set to NULL and uses it to store a pointer to a seq_file. Remove the unnecessary setting of file->private_data in tracing_open_file_tr() and simplify the hist code. Signed-off-by: Petr Pavlu --- kernel/trace/trace.c | 2 -- kernel/trace/trace_events_hist.c | 4 ---- 2 files changed, 6 deletions(-) diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c index 8bd4ec08fb36..7c9882e5ba22 100644 --- a/kernel/trace/trace.c +++ b/kernel/trace/trace.c @@ -4805,8 +4805,6 @@ int tracing_open_file_tr(struct inode *inode, struct = file *filp) event_file_get(file); } =20 - filp->private_data =3D inode->i_private; - return 0; } =20 diff --git a/kernel/trace/trace_events_hist.c b/kernel/trace/trace_events_h= ist.c index 744c2aa3d668..1ca3e14d7531 100644 --- a/kernel/trace/trace_events_hist.c +++ b/kernel/trace/trace_events_hist.c @@ -5831,8 +5831,6 @@ static int event_hist_open(struct inode *inode, struc= t file *file) hist_file->file =3D file; hist_file->last_act =3D get_hist_hit_count(event_file); =20 - /* Clear private_data to avoid warning in single_open() */ - file->private_data =3D NULL; ret =3D single_open(file, hist_show, hist_file); if (ret) { kfree(hist_file); @@ -6114,8 +6112,6 @@ static int event_hist_debug_open(struct inode *inode,= struct file *file) if (ret) return ret; =20 - /* Clear private_data to avoid warning in single_open() */ - file->private_data =3D NULL; ret =3D single_open(file, hist_debug_show, file); if (ret) tracing_release_file_tr(inode, file); --=20 2.52.0