Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp3152697pxb; Fri, 4 Feb 2022 02:27:09 -0800 (PST) X-Google-Smtp-Source: ABdhPJx8X49DVgzIZbESAMV3ctDLHWdZyf43/57Ntjox1trDFv/KwMBU9az0/Re7/fi2NRGioaT0 X-Received: by 2002:a17:90b:4b0a:: with SMTP id lx10mr2331295pjb.33.1643970429272; Fri, 04 Feb 2022 02:27:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643970429; cv=none; d=google.com; s=arc-20160816; b=F43w3motOHm37/jzWuLo/dMCqH5Q3thx2p7pMzT57+IxMkmoZBaIMS+1XBtQ0CvOem Oy90LuhmA07c+hjemGDKOVvavyysqH6Subjy9iLeVYpV2w1MF5VsSYgVt37sTCpV4PsN aLVgcqRq4/t4X+nxlKabHd/kxVRmwTWXUmCMS5lvUmJQ2sSCjrd7mM98Ng1Pbbkn5rcc JxhiwbDm+7TSprVm3eOICsLpHnVbfIjPWPkD4LKq1Ba3eSqIzNsHXPGk3UY28VM1tGCg avneF0N0J1VVXbNiTQNEJm0ToVGpH1/nojDamSUu5N995oIBexFl+18OmkV+zBNyV8zr HykQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=BuOtPq4Q7UgFzvgg5CA/ND7Ty2Q0na2BEdJNf9ub5LE=; b=Ed1dMjbP8PEZsqex65wy12j9FOCM5l3V1hi3Y3gf/w5Hx/7u3lDo3JgtXVXsPYoP0l B0qzHZjiqDUkRNo16GGJxmpQYSS8T4p1rPCqD2yTNgoLZa8R2zx5TOho8mKGVwaIdRlE 2fug8u7RvllJN7ocIPf1BkXv8AOZ/0gZDr9CbYAQKsydbR/FsTOhfrzwFvePL9lngFUW gzhCMAoBc2XLt3C3QdjxH6MItlwEzszPV4e7vDLYTrejWWL8rRd7f6yn+DPSrUb1fcgS W4sV8Wi31EfA61ElgCoBAnDSFq1H6tDptND3TkvAMZo2Tk8HtogVQcU9wEF01Obb0hWG pojw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=kmLuhYuO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u3si1462801ple.88.2022.02.04.02.26.55; Fri, 04 Feb 2022 02:27:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=kmLuhYuO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229837AbiBBCjo (ORCPT + 99 others); Tue, 1 Feb 2022 21:39:44 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51694 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231372AbiBBCjn (ORCPT ); Tue, 1 Feb 2022 21:39:43 -0500 Received: from mail-ej1-x62c.google.com (mail-ej1-x62c.google.com [IPv6:2a00:1450:4864:20::62c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3173DC061714; Tue, 1 Feb 2022 18:39:43 -0800 (PST) Received: by mail-ej1-x62c.google.com with SMTP id m4so60518486ejb.9; Tue, 01 Feb 2022 18:39:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=BuOtPq4Q7UgFzvgg5CA/ND7Ty2Q0na2BEdJNf9ub5LE=; b=kmLuhYuOi5pflUaDxQ48tLOO9QGWaTobXhrGUWwkQH+NV/atrOmDyM9D4eUDIGZwqp kfISaqBDQoX1ME7OfygHbqleiUOBZJmcsOnWIUkCjQGXqD3JbRSptsvmLMRP0r3+4rjb lYiU0812qQQ5bxvGnU2wcOtW5aD7r5gat3vUrRka4HnZ74MyXOavX/pnVpwDDr4jTCow xqCTD7eyoFU/RjPf6IQBZS9H3m3k8rms0lpLYtyPmpcb/ek1FAaK1ASqIq36zS/2+3XF LEWlO0LehMrQh79S/q5R8M0GH/2Y47LtdAC8IGAB7Uj+gd+pRKPH4xY0y1Zmk2ymWAFm w11g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=BuOtPq4Q7UgFzvgg5CA/ND7Ty2Q0na2BEdJNf9ub5LE=; b=H2B6nl7QULiJJYniBGGmehfKHuxWM8vcWEfdK9Y69anvcClaxAZ+u6RJYWVbjEw9O5 briA2nKT6eEegtnAIoxrFIJYSEjPMk/cY3itFJzTKvJVwHX3h1qXLrqrB8UhHbsKxcJk rJfn2Is1jZ5Ojj36HDPaX2G2YYEL12aNvZiK9DFCZGfhgQw594qCMuOaceeZSb6xpFBq UP0aLAnsbaS5I5U3iiSognGRpDK0ycmzfRuMLCBmxb14WDZ/hz/o/yC1dEth0Nr9dSIs 0BTnCFoWfGG0ZWxeblnCUc3iG2wX2KB2mktNLviNsNVUPjuO353M2acgOhGW3R6Pquaz fUcg== X-Gm-Message-State: AOAM5336lEz6mOK2mrTrY6PnUkwWSuEPOe3sS0taiKqpH4g1l7qTFDhe msNIZe8rqqbQ7TRCpjRLNhyFc/mkwj10e4KgGoPkQq71vd0= X-Received: by 2002:a17:907:2da0:: with SMTP id gt32mr22228440ejc.545.1643769581539; Tue, 01 Feb 2022 18:39:41 -0800 (PST) MIME-Version: 1.0 References: <159db05f-539c-fe29-608b-91b036588033@molgen.mpg.de> <3534d781-7d01-b42a-8974-0b1c367946f0@molgen.mpg.de> <04a597dc-64aa-57e6-f7fb-17bd2ec58159@molgen.mpg.de> <20220130174421.GS4285@paulmck-ThinkPad-P17-Gen-1> <20220201175023.GW4285@paulmck-ThinkPad-P17-Gen-1> In-Reply-To: <20220201175023.GW4285@paulmck-ThinkPad-P17-Gen-1> From: Zhouyi Zhou Date: Wed, 2 Feb 2022 10:39:29 +0800 Message-ID: Subject: Re: BUG: Kernel NULL pointer dereference on write at 0x00000000 (rtmsg_ifinfo_build_skb) To: "Paul E. McKenney" Cc: Paul Menzel , Josh Triplett , rcu , LKML , "David S. Miller" , Jakub Kicinski , netdev@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Thank Paul for your encouragement! On Wed, Feb 2, 2022 at 1:50 AM Paul E. McKenney wrote: > > On Mon, Jan 31, 2022 at 09:08:40AM +0800, Zhouyi Zhou wrote: > > Thank Paul for joining us! > > > > On Mon, Jan 31, 2022 at 1:44 AM Paul E. McKenney w= rote: > > > > > > On Sun, Jan 30, 2022 at 09:24:44PM +0800, Zhouyi Zhou wrote: > > > > Dear Paul > > > > > > > > On Sun, Jan 30, 2022 at 4:19 PM Paul Menzel = wrote: > > > > > > > > > > Dear Zhouyi, > > > > > > > > > > > > > > > Am 30.01.22 um 01:21 schrieb Zhouyi Zhou: > > > > > > > > > > > Thank you for your instructions, I learned a lot from this proc= ess. > > > > > > > > > > Same on my end. > > > > > > > > > > > On Sun, Jan 30, 2022 at 12:52 AM Paul Menzel wrote: > > > > > > > > > > >> Am 29.01.22 um 03:23 schrieb Zhouyi Zhou: > > > > > >> > > > > > >>> I don't have an IBM machine, but I tried to analyze the probl= em using > > > > > >>> my x86_64 kvm virtual machine, I can't reproduce the bug usin= g my > > > > > >>> x86_64 kvm virtual machine. > > > > > >> > > > > > >> No idea, if it=E2=80=99s architecture specific. > > > > > >> > > > > > >>> I saw the panic is caused by registration of sit device (A si= t device > > > > > >>> is a type of virtual network device that takes our IPv6 traff= ic, > > > > > >>> encapsulates/decapsulates it in IPv4 packets, and sends/recei= ves it > > > > > >>> over the IPv4 Internet to another host) > > > > > >>> > > > > > >>> sit device is registered in function sit_init_net: > > > > > >>> 1895 static int __net_init sit_init_net(struct net *net) > > > > > >>> 1896 { > > > > > >>> 1897 struct sit_net *sitn =3D net_generic(net, sit_net= _id); > > > > > >>> 1898 struct ip_tunnel *t; > > > > > >>> 1899 int err; > > > > > >>> 1900 > > > > > >>> 1901 sitn->tunnels[0] =3D sitn->tunnels_wc; > > > > > >>> 1902 sitn->tunnels[1] =3D sitn->tunnels_l; > > > > > >>> 1903 sitn->tunnels[2] =3D sitn->tunnels_r; > > > > > >>> 1904 sitn->tunnels[3] =3D sitn->tunnels_r_l; > > > > > >>> 1905 > > > > > >>> 1906 if (!net_has_fallback_tunnels(net)) > > > > > >>> 1907 return 0; > > > > > >>> 1908 > > > > > >>> 1909 sitn->fb_tunnel_dev =3D alloc_netdev(sizeof(struc= t ip_tunnel), "sit0", > > > > > >>> 1910 NET_NAME_UNKNOWN, > > > > > >>> 1911 ipip6_tunnel_setup); > > > > > >>> 1912 if (!sitn->fb_tunnel_dev) { > > > > > >>> 1913 err =3D -ENOMEM; > > > > > >>> 1914 goto err_alloc_dev; > > > > > >>> 1915 } > > > > > >>> 1916 dev_net_set(sitn->fb_tunnel_dev, net); > > > > > >>> 1917 sitn->fb_tunnel_dev->rtnl_link_ops =3D &sit_link_= ops; > > > > > >>> 1918 /* FB netdevice is special: we have one, and only= one per netns. > > > > > >>> 1919 * Allowing to move it to another netns is clearl= y unsafe. > > > > > >>> 1920 */ > > > > > >>> 1921 sitn->fb_tunnel_dev->features |=3D NETIF_F_NETNS_= LOCAL; > > > > > >>> 1922 > > > > > >>> 1923 err =3D register_netdev(sitn->fb_tunnel_dev); > > > > > >>> register_netdev on line 1923 will call if_nlmsg_size indirect= ly. > > > > > >>> > > > > > >>> On the other hand, the function that calls the paniced strlen= is if_nlmsg_size: > > > > > >>> (gdb) disassemble if_nlmsg_size > > > > > >>> Dump of assembler code for function if_nlmsg_size: > > > > > >>> 0xffffffff81a0dc20 <+0>: nopl 0x0(%rax,%rax,1) > > > > > >>> 0xffffffff81a0dc25 <+5>: push %rbp > > > > > >>> 0xffffffff81a0dc26 <+6>: push %r15 > > > > > >>> 0xffffffff81a0dd04 <+228>: je 0xffffffff81a0de20 = > > > > > >>> 0xffffffff81a0dd0a <+234>: mov 0x10(%rbp),%rdi > > > > > >>> ... > > > > > >>> =3D> 0xffffffff81a0dd0e <+238>: callq 0xffffffff817532= d0 > > > > > >>> 0xffffffff81a0dd13 <+243>: add $0x10,%eax > > > > > >>> 0xffffffff81a0dd16 <+246>: movslq %eax,%r12 > > > > > >> > > > > > >> Excuse my ignorance, would that look the same for ppc64le? > > > > > >> Unfortunately, I didn=E2=80=99t save the problematic `vmlinuz`= file, but on a > > > > > >> current build (without rcutorture) I have the line below, wher= e strlen > > > > > >> shows up. > > > > > >> > > > > > >> (gdb) disassemble if_nlmsg_size > > > > > >> [=E2=80=A6] > > > > > >> 0xc000000000f7f82c <+332>: bl 0xc000000000a10e30 > > > > > >> [=E2=80=A6] > > > > > >> > > > > > >>> and the C code for 0xffffffff81a0dd0e is following (line 524)= : > > > > > >>> 515 static size_t rtnl_link_get_size(const struct net_devi= ce *dev) > > > > > >>> 516 { > > > > > >>> 517 const struct rtnl_link_ops *ops =3D dev->rtnl_link= _ops; > > > > > >>> 518 size_t size; > > > > > >>> 519 > > > > > >>> 520 if (!ops) > > > > > >>> 521 return 0; > > > > > >>> 522 > > > > > >>> 523 size =3D nla_total_size(sizeof(struct nlattr)) + /= * IFLA_LINKINFO */ > > > > > >>> 524 nla_total_size(strlen(ops->kind) + 1); /* = IFLA_INFO_KIND */ > > > > > >> > > > > > >> How do I connect the disassemby output with the corresponding = line? > > > > > > I use "make ARCH=3Dpowerpc CC=3Dpowerpc64le-linux-gnu-gcc-9 > > > > > > CROSS_COMPILE=3Dpowerpc64le-linux-gnu- -j 16" to cross compile = kernel > > > > > > for powerpc64le in my Ubuntu 20.04 x86_64. > > > > > > > > > > > > gdb-multiarch ./vmlinux > > > > > > (gdb)disassemble if_nlmsg_size > > > > > > [...] > > > > > > 0xc00000000191bf40 <+112>: bl 0xc000000001c28ad0 > > > > > > [...] > > > > > > (gdb) break *0xc00000000191bf40 > > > > > > Breakpoint 1 at 0xc00000000191bf40: file ./include/net/netlink.= h, line 1112. > > > > > > > > > > > > But in include/net/netlink.h:1112, I can't find the call to str= len > > > > > > 1110static inline int nla_total_size(int payload) > > > > > > 1111{ > > > > > > 1112 return NLA_ALIGN(nla_attr_size(payload)); > > > > > > 1113} > > > > > > This may be due to the compiler wrongly encode the debug inform= ation, I guess. > > > > > > > > > > `rtnl_link_get_size()` contains: > > > > > > > > > > size =3D nla_total_size(sizeof(struct nlattr)) + /* > > > > > IFLA_LINKINFO */ > > > > > nla_total_size(strlen(ops->kind) + 1); /* > > > > > IFLA_INFO_KIND */ > > > > > > > > > > Is that inlined(?) and the code at fault? > > > > Yes, that is inlined! because > > > > (gdb) disassemble if_nlmsg_size > > > > Dump of assembler code for function if_nlmsg_size: > > > > [...] > > > > 0xc00000000191bf38 <+104>: beq 0xc00000000191c1f0 > > > > 0xc00000000191bf3c <+108>: ld r3,16(r31) > > > > 0xc00000000191bf40 <+112>: bl 0xc000000001c28ad0 > > > > [...] > > > > (gdb) > > > > (gdb) break *0xc00000000191bf40 > > > > Breakpoint 1 at 0xc00000000191bf40: file ./include/net/netlink.h, l= ine 1112. > > > > (gdb) break *0xc00000000191bf38 > > > > Breakpoint 2 at 0xc00000000191bf38: file net/core/rtnetlink.c, line= 520. > > > > > > I suggest building your kernel with CONFIG_DEBUG_INFO=3Dy if you are = not > > > already doing so. That gives gdb a lot more information about things > > > like inlining. > > I check my .config file, CONFIG_DEBUG_INFO=3Dy is here: > > linux-next$ grep CONFIG_DEBUG_INFO .config > > CONFIG_DEBUG_INFO=3Dy > > Then I invoke "make clean" and rebuild the kernel, the behavior of gdb > > and vmlinux remain unchanged, sorry for that > > Glad you were already on top of this one! I am very pleased to contribute my tiny effort to the process of making Linux better ;-) > > > I am trying to reproduce the bug on my bare metal x86_64 machines in > > the coming days, and am also trying to work with Mr Menzel after he > > comes back to the office. > > This URL used to allow community members such as yourself to request > access to Power systems: https://osuosl.org/services/powerdev/ I have filled the request form on https://osuosl.org/services/powerdev/ and now wait for them to deploy the environment for me. Thanks again Zhouyi > > In case that helps. > > Thanx, Paul > > > Thanks > > Zhouyi > > > > > > Thanx, Paul > > > > > > > > >>> But ops is assigned the value of sit_link_ops in function sit= _init_net > > > > > >>> line 1917, so I guess something must happened between the cal= ls. > > > > > >>> > > > > > >>> Do we have KASAN in IBM machine? would KASAN help us find out= what > > > > > >>> happened in between? > > > > > >> > > > > > >> Unfortunately, KASAN is not support on Power, I have, as far a= s I can > > > > > >> see. From `arch/powerpc/Kconfig`: > > > > > >> > > > > > >> select HAVE_ARCH_KASAN if PPC32 && = PPC_PAGE_SHIFT <=3D 14 > > > > > >> select HAVE_ARCH_KASAN_VMALLOC if PPC32 && = PPC_PAGE_SHIFT <=3D 14 > > > > > >> > > > > > > en, agree, I invoke "make menuconfig ARCH=3Dpowerpc > > > > > > CC=3Dpowerpc64le-linux-gnu-gcc-9 CROSS_COMPILE=3Dpowerpc64le-li= nux-gnu- -j > > > > > > 16", I can't find KASAN under Memory Debugging, I guess we shou= ld find > > > > > > the bug by bisecting instead. > > > > > > > > > > I do not know, if it is a regression, as it was the first time I = tried > > > > > to run a Linux kernel built with rcutorture on real hardware. > > > > I tried to add some debug statements to the kernel to locate the bu= g > > > > more accurately, you can try it when you're not busy in the future= , > > > > or just ignore it if the following patch looks not very effective ;= -) > > > > diff --git a/net/core/dev.c b/net/core/dev.c > > > > index 1baab07820f6..969ac7c540cc 100644 > > > > --- a/net/core/dev.c > > > > +++ b/net/core/dev.c > > > > @@ -9707,6 +9707,9 @@ int register_netdevice(struct net_device *dev= ) > > > > * Prevent userspace races by waiting until the network > > > > * device is fully setup before sending notifications. > > > > */ > > > > + if (dev->rtnl_link_ops) > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", dev->rtnl_l= ink_ops, > > > > + dev->rtnl_link_ops->kind, __FUNCTION__); > > > > if (!dev->rtnl_link_ops || > > > > dev->rtnl_link_state =3D=3D RTNL_LINK_INITIALIZED) > > > > rtmsg_ifinfo(RTM_NEWLINK, dev, ~0U, GFP_KERNEL); > > > > @@ -9788,6 +9791,9 @@ int register_netdev(struct net_device *dev) > > > > > > > > if (rtnl_lock_killable()) > > > > return -EINTR; > > > > + if (dev->rtnl_link_ops) > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", dev->rtnl_l= ink_ops, > > > > + dev->rtnl_link_ops->kind, __FUNCTION__); > > > > err =3D register_netdevice(dev); > > > > rtnl_unlock(); > > > > return err; > > > > diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c > > > > index e476403231f0..e08986ae6238 100644 > > > > --- a/net/core/rtnetlink.c > > > > +++ b/net/core/rtnetlink.c > > > > @@ -520,6 +520,8 @@ static size_t rtnl_link_get_size(const struct > > > > net_device *dev) > > > > if (!ops) > > > > return 0; > > > > > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", ops, > > > > + ops->kind, __FUNCTION__); > > > > size =3D nla_total_size(sizeof(struct nlattr)) + /* IFLA_LINKI= NFO */ > > > > nla_total_size(strlen(ops->kind) + 1); /* IFLA_INFO_KI= ND */ > > > > > > > > @@ -1006,6 +1008,9 @@ static size_t rtnl_proto_down_size(const stru= ct > > > > net_device *dev) > > > > static noinline size_t if_nlmsg_size(const struct net_device *dev, > > > > u32 ext_filter_mask) > > > > { > > > > + if (dev->rtnl_link_ops) > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", dev->rtnl_= link_ops, > > > > + dev->rtnl_link_ops->kind, __FUNCTION__); > > > > return NLMSG_ALIGN(sizeof(struct ifinfomsg)) > > > > + nla_total_size(IFNAMSIZ) /* IFLA_IFNAME */ > > > > + nla_total_size(IFALIASZ) /* IFLA_IFALIAS */ > > > > @@ -3825,7 +3830,9 @@ struct sk_buff *rtmsg_ifinfo_build_skb(int ty= pe, > > > > struct net_device *dev, > > > > struct net *net =3D dev_net(dev); > > > > struct sk_buff *skb; > > > > int err =3D -ENOBUFS; > > > > - > > > > + if (dev->rtnl_link_ops) > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", dev->rtnl_l= ink_ops, > > > > + dev->rtnl_link_ops->kind, __FUNCTION__); > > > > skb =3D nlmsg_new(if_nlmsg_size(dev, 0), flags); > > > > if (skb =3D=3D NULL) > > > > goto errout; > > > > @@ -3861,7 +3868,9 @@ static void rtmsg_ifinfo_event(int type, stru= ct > > > > net_device *dev, > > > > > > > > if (dev->reg_state !=3D NETREG_REGISTERED) > > > > return; > > > > - > > > > + if (dev->rtnl_link_ops) > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", dev->rtnl_= link_ops, > > > > + dev->rtnl_link_ops->kind, __FUNCTION__); > > > > skb =3D rtmsg_ifinfo_build_skb(type, dev, change, event, flags= , new_nsid, > > > > new_ifindex); > > > > if (skb) > > > > @@ -3871,6 +3880,9 @@ static void rtmsg_ifinfo_event(int type, stru= ct > > > > net_device *dev, > > > > void rtmsg_ifinfo(int type, struct net_device *dev, unsigned int c= hange, > > > > gfp_t flags) > > > > { > > > > + if (dev->rtnl_link_ops) > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", dev->rtnl_= link_ops, > > > > + dev->rtnl_link_ops->kind, __FUNCTION__); > > > > rtmsg_ifinfo_event(type, dev, change, rtnl_get_event(0), flags= , > > > > NULL, 0); > > > > } > > > > diff --git a/net/ipv6/sit.c b/net/ipv6/sit.c > > > > index c0b138c20992..fa5b2725811c 100644 > > > > --- a/net/ipv6/sit.c > > > > +++ b/net/ipv6/sit.c > > > > @@ -1919,6 +1919,8 @@ static int __net_init sit_init_net(struct net= *net) > > > > * Allowing to move it to another netns is clearly unsafe. > > > > */ > > > > sitn->fb_tunnel_dev->features |=3D NETIF_F_NETNS_LOCAL; > > > > - > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", > > > > + sitn->fb_tunnel_dev->rtnl_link_ops, > > > > + sitn->fb_tunnel_dev->rtnl_link_ops->kind, __FUNCTION__)= ; > > > > err =3D register_netdev(sitn->fb_tunnel_dev); > > > > if (err) > > > > goto err_reg_dev; > > > > > > > > > > >>> Hope I can be of more helpful. > > > > > >> > > > > > >> Some distributions support multi-arch, so they easily allow > > > > > >> crosscompiling for different architectures. > > > > > > I use "make ARCH=3Dpowerpc CC=3Dpowerpc64le-linux-gnu-gcc-9 > > > > > > CROSS_COMPILE=3Dpowerpc64le-linux-gnu- -j 16" to cross compile = kernel > > > > > > for powerpc64le in my Ubuntu 20.04 x86_64. But I can't boot the > > > > > > compiled kernel using "qemu-system-ppc64le -M pseries -nographi= c -smp > > > > > > 4 -net none -m 4G -kernel arch/powerpc/boot/zImage". I will con= tinue > > > > > > to explore it. > > > > > > > > > > Oh, that does not sound good. But I have not tried that in a long= time > > > > > either. It=E2=80=99s a separate issue, but maybe some of the PPC > > > > > maintainers/folks could help. > > > > I will do further research on this later. > > > > > > > > Thanks for your time > > > > Kind regards > > > > Zhouyi > > > > > > > > > > > > > > > Kind regards, > > > > > > > > > > Paul