From: Sebastian Andrzej Siewior <bigeasy@linutronix.de>
To: Jason Xing <kerneljasonxing@gmail.com>
Cc: Willem de Bruijn <willemdebruijn.kernel@gmail.com>,
netdev@vger.kernel.org, "David S. Miller" <davem@davemloft.net>,
Eric Dumazet <edumazet@google.com>,
Jakub Kicinski <kuba@kernel.org>,
Kurt Kanzenbach <kurt@linutronix.de>,
Paolo Abeni <pabeni@redhat.com>, Simon Horman <horms@kernel.org>,
Willem de Bruijn <willemb@google.com>
Subject: Re: [PATCH net] net: Drop the lock in skb_may_tx_timestamp()
Date: Tue, 17 Feb 2026 15:44:04 +0100 [thread overview]
Message-ID: <20260217144404.qTWlJBxw@linutronix.de> (raw)
In-Reply-To: <CAL+tcoAN_T8c4z5wN82FD-skyY=gJedX5X4VK=QDaQWz0isocg@mail.gmail.com>
On 2026-02-17 15:48:11 [+0800], Jason Xing wrote:
> Hi Sebastian,
Hi,
> > sock_alloc() allocates a struct socket_alloc which contains the struct
> > socket and struct inode (sock_alloc_inode()). This the sk_socket in
> > struct sock. Once you close the socket via the close syscall and the
> > last reference is gone then you end up in __fput(). The invoked
> > ->release() callback is sock_close(). Here socket::file gets NULLed and
> > proto::release should sock_orphan() the sock where sock::sk_socket gets
> > NULLed (I don't see where else and packet_release() does so). The
> > "struct sock" remains around because the skb has a reference on.
> > Otherwise it would go, too.
>
> If skb still exists, there is no way to do the real destruction of its
> socket, at least I know it works for TCP. That means IIUC TCP doesn't
> have such an issue?
There is struct sock and struct socket. socket will be removed once the
fd goes. sock remains until the last skb is gone.
> I roughly know what you meant here, but still wondering if you can
> provide a specific call trace or case where the socket using socket
> timestamping feature leads to this NULL-pointer problem?
So assuming we delay the timestamp delivery and as soon as ptp4l
complains, we kill it. Then we see this on ptp4l's side:
| ptp4l[89.480]: port 1 (enp4s0): delay timeout
| ptp4l[89.490]: timed out while polling for tx timestamp
| ptp4l[89.490]: increasing tx_timestamp_timeout or increasing kworker priority may correct this issue, but a driver bug likely causes it
|CTRL-C
and delay delivery in igc:
diff --git a/drivers/net/ethernet/intel/igc/igc_main.c b/drivers/net/ethernet/intel/igc/igc_main.c
index 89a321a344d2..5bfd4a442b16 100644
--- a/drivers/net/ethernet/intel/igc/igc_main.c
+++ b/drivers/net/ethernet/intel/igc/igc_main.c
@@ -1546,6 +1546,7 @@ static bool igc_request_tx_tstamp(struct igc_adapter *adapter, struct sk_buff *s
if (tstamp->skb)
continue;
+ trace_printk("skb %px dest %pS\n", skb, skb->destructor);
tstamp->skb = skb_get(skb);
tstamp->start = jiffies;
*flags = tstamp->flags;
@@ -5563,6 +5564,21 @@ igc_features_check(struct sk_buff *skb, struct net_device *dev,
return features;
}
+struct delayed_ptp {
+ struct delayed_work dw;
+ struct igc_adapter *adapter;
+};
+
+static void delayed_ts(struct work_struct *work)
+{
+ struct delayed_ptp *dtp = container_of(work, struct delayed_ptp, dw.work);
+
+ /* retrieve hardware timestamp */
+ trace_printk("\n");
+ igc_ptp_tx_tstamp_event(dtp->adapter);
+ kfree(dtp);
+}
+
static void igc_tsync_interrupt(struct igc_adapter *adapter)
{
struct igc_hw *hw = &adapter->hw;
@@ -5579,8 +5595,15 @@ static void igc_tsync_interrupt(struct igc_adapter *adapter)
}
if (tsicr & IGC_TSICR_TXTS) {
- /* retrieve hardware timestamp */
- igc_ptp_tx_tstamp_event(adapter);
+ struct delayed_ptp *dtp;
+
+ dtp = kmalloc(sizeof(*dtp), GFP_ATOMIC);
+ if (dtp) {
+ INIT_DELAYED_WORK(&dtp->dw, delayed_ts);
+ dtp->adapter = adapter;
+ trace_printk("\n");
+ schedule_delayed_work(&dtp->dw, HZ * 10);
+ }
}
if (tsicr & IGC_TSICR_TT0) {
and few more in net/, I end up with:
| ptp4l-745 [005] ..... 88.609323: packet_create: sock ffff8ba689e28680 sk ffff8ba6822f8800
| ptp4l-745 [005] ..... 88.609325: sock_alloc_file: sock ffff8ba689e28680 sk ffff8ba6822f8800 file ffff8ba689575d80
socket allocation
| <idle>-0 [004] dNh1. 89.645405: igc_tsync_interrupt:
TX TS delayed
| ptp4l-745 [005] ..... 89.655483: __sock_release: packet_release+0x0/0x490 sock ffff8ba689e28680, file is NULL
| ptp4l-745 [005] ..... 89.655484: packet_release: sock ffff8ba689e28680 sk ffff8ba6822f8800
| ptp4l-745 [005] ..... 89.669111: packet_release: gone ffff8ba689e28680
ptp4l closed socket, sock->sk = sk->sk_socket = NULL.
| kworker/0:1-11 [000] ..... 99.769061: delayed_ts:
The worked kicked in
| kworker/0:1-11 [000] d..1. 99.769068: __skb_tstamp_tx: sk ffff8ba6822f8800 socket 0000000000000000
the NULL socket.
| kworker/0:1-11 [000] d..1. 99.769070: __skb_complete_tx_timestamp: added to ffff8ba6822f8800
| ksoftirqd/0-14 [000] ..s.. 99.769081: __sk_destruct: sk ffff8ba6822f8800
| ksoftirqd/0-14 [000] ..s.. 99.769082: packet_sock_destruct: sk ffff8ba6822f8800
This is the RCU free of sock after the skb was released.
Does this make sense?
> Thanks,
> Jason
Sebastian
next prev parent reply other threads:[~2026-02-17 14:44 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-02-14 23:24 [PATCH net] net: Drop the lock in skb_may_tx_timestamp() Sebastian Andrzej Siewior
2026-02-15 4:05 ` Willem de Bruijn
2026-02-15 18:46 ` Sebastian Andrzej Siewior
2026-02-16 16:47 ` Vadim Fedorenko
2026-02-16 18:08 ` Willem de Bruijn
2026-02-17 13:28 ` Sebastian Andrzej Siewior
2026-02-17 14:14 ` Willem de Bruijn
2026-02-17 12:13 ` Sebastian Andrzej Siewior
2026-02-17 7:48 ` Jason Xing
2026-02-17 14:44 ` Sebastian Andrzej Siewior [this message]
2026-02-17 8:01 ` Eric Dumazet
2026-02-17 14:45 ` Sebastian Andrzej Siewior
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260217144404.qTWlJBxw@linutronix.de \
--to=bigeasy@linutronix.de \
--cc=davem@davemloft.net \
--cc=edumazet@google.com \
--cc=horms@kernel.org \
--cc=kerneljasonxing@gmail.com \
--cc=kuba@kernel.org \
--cc=kurt@linutronix.de \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
--cc=willemb@google.com \
--cc=willemdebruijn.kernel@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox