On Thu, 25 Jul 2024 22:00:14 +0530
Ajay Kaher <ajay.ka...@broadcom.com> wrote:

> Thread A (read event)                      Thread B (remove event)
> 
> .                                          worker_thread()
> .                                          delayed_destroy_user_event()
> .                                                   -> acquire event_mutex
> .                                          destroy_user_event()
> vfs_read()                                 .
> seq_read()                                .
> f_start() -> acquire event_mutex           eventfs_remove_dir()
> . (waiting)                                kfree(user)
> . (waiting)                                 -> released event_mutex
> acquired event_mutex
> f_next()
> trace_get_fields():

Hmm, I wonder if this would fix it?

-- Steve

diff --git a/kernel/trace/trace_events_user.c b/kernel/trace/trace_events_user.c
index 3a2b46847c8b..e9ed2826ff46 100644
--- a/kernel/trace/trace_events_user.c
+++ b/kernel/trace/trace_events_user.c
@@ -321,6 +321,8 @@ static void user_event_put(struct user_event *user, bool 
locked)
         */
        refcount_set(&user->refcnt, 1);
 
+       user->call.data = NULL;
+
        if (WARN_ON_ONCE(!schedule_work(&user->put_work))) {
                /*
                 * If we fail we must wait for an admin to attempt delete or
@@ -973,6 +975,11 @@ size_t copy_nofault(void *addr, size_t bytes, struct 
iov_iter *i)
 static struct list_head *user_event_get_fields(struct trace_event_call *call)
 {
        struct user_event *user = (struct user_event *)call->data;
+       static LIST_HEAD(head);
+
+       /* If the user event is about to be deleted, return no fields */
+       if (!user)
+               return &head;
 
        return &user->fields;
 }

Reply via email to