Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1467584pxb; Tue, 8 Feb 2022 19:04:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJzxyXePC3A/VJYhQrexO2v/M6KilCgGW0/znQt3C3lj5oW2rHlaXUIsN8oFYmufTYmpP2tE X-Received: by 2002:a17:90a:fc6:: with SMTP id 64mr307706pjz.36.1644375852179; Tue, 08 Feb 2022 19:04:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644375852; cv=none; d=google.com; s=arc-20160816; b=xtiXdUYW40AcR8KU2BCfnF7VpMKA1ctsYPrNVCnca9gHhDnseeBiwbBeOrZVTCYhLv lURfUOi789CkCo+oJKWEmJhcrD7GSBs4FFNtxlah+DfJux8gPlEGhV0qe8lKQOzXuSXq QRi+ip06pQ3fhUfENTgxMMqdKqIkiKJ6THu7ATdUrMRCyqPS2+KpEIgGdQ01kU0ql6fs oVxKj6OIOwtVeLQBzwppmK4rAZQMoZtbT66oZ7d0HboLPLCP87Iuv8VlQ1KLiyuE/2tu hD9N8A8en6Nhn7Bi+lgTyfj90+QsnarZMgGufAm52PTZJskNFYBlJB1t5mn6dPehGTsn vtKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=LqpS1C58rEre6k1Ish5WUbwOdRiZi0f8EFHi+i5WIvo=; b=XWXcZJz4bZXGqG4t35+L3H1PGCj2pqNsQVMl/a7G44QUe5Eg8i9WNtCuvNvyBkCb19 Fa1hKL/Yrq/1nm5ynx7FQ4RKbLzP879SxXQaqXQBniyUTXiSC8thBuuzrmn/+7331RTk qsZfQgt8/WYlkvLUpB8lvGRPHV+5LdhutPQ7pU25FztyYQJFAFEM7Tt6DRnQM+0189OD aLONN9JVMuqoYw3KuRpW67/TJ7lmD3qG2SR2EoTEYk9/QtX6KUTx0QSJodxIus2Fo7x8 ToxGJpHL7NN20/PsD21nz4pzUw/NIRJEnWOP5b+HXcvRNQ5FBJLgaTkMMyO5LsZknGwV obgQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=S6Eh7lva; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v10si7360668plo.134.2022.02.08.19.03.55; Tue, 08 Feb 2022 19:04:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=S6Eh7lva; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1387015AbiBHWfp (ORCPT + 99 others); Tue, 8 Feb 2022 17:35:45 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49622 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1386339AbiBHUKm (ORCPT ); Tue, 8 Feb 2022 15:10:42 -0500 Received: from mail-ej1-x630.google.com (mail-ej1-x630.google.com [IPv6:2a00:1450:4864:20::630]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 682E1C0613CB; Tue, 8 Feb 2022 12:10:40 -0800 (PST) Received: by mail-ej1-x630.google.com with SMTP id y3so1047224ejf.2; Tue, 08 Feb 2022 12:10:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=LqpS1C58rEre6k1Ish5WUbwOdRiZi0f8EFHi+i5WIvo=; b=S6Eh7lva1WoZBEDwp+ntAxc6UTzGvE268VB2ZOvJrE3kx7bfpIdHK2pFiNWZq8DDb1 C5GOG1D17V4xl4okMH6Jh+QNoYUs99YVS4y0/rLJh+jM9sDWjxkmV0zJFkQMZeTRmlHG kCaCv1UGhByN9XKDjE9H/OTbwelG6rz4igNyLeBlDfgtBh+MHgapRuALdkl6K+ZCvn0Q mrSZk57aoLP1gddt2x4654GT9Gk5Cb2lb5jMqNJNuqzdfee0miBBMmukdIIb+GhItwgJ WtUqRETIkXiw+3CehiKM0L6xbyQOZSpdo3InuusC0ZgEfDiyidann1XdezKcrYFj9TKV Dkew== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=LqpS1C58rEre6k1Ish5WUbwOdRiZi0f8EFHi+i5WIvo=; b=xwFs/N52UlyBjfVISpg1PRQzEyKhk16h6soWlTxHLEG1JY7Ipm/pWzY1HwFVj0TLmB KPyLg/CzhBrR5BS8CMovwytrZfBA7S/6XpL/T+/wsVovQZ2Rmjx5qaTPK8icYP9q53jU B/igMyXR5msSQinYEfCZZHFuWhlHy2nDk0IR6HG7SzkZ7WrE1UV3WwrlGrTYGtbgRLg5 vXeCS0UXrnrNyA3hkA5oZETSsVhSQ4ZG7Dl1TX5WQhsFM8zvRPgl+vkYLd8i9LAa6JN9 hv8N0eEfX6svTImLKpYby9xgiei1oY9s8N0XFZdmA0dOUZ9Ur98RxI0bzBf5mDER5dxs BWeQ== X-Gm-Message-State: AOAM530TowMt0AnSnLv6rKnmd4h3bRzrokx4AJlsEPjrfmkY9hSScMWg 8KFKw9cgdnTtIZ33iwzcMwYbjOdztIkget7y/WMYyEOlI46VSw== X-Received: by 2002:a17:907:6d17:: with SMTP id sa23mr4821509ejc.551.1644351038635; Tue, 08 Feb 2022 12:10:38 -0800 (PST) MIME-Version: 1.0 References: <159db05f-539c-fe29-608b-91b036588033@molgen.mpg.de> <3534d781-7d01-b42a-8974-0b1c367946f0@molgen.mpg.de> <04a597dc-64aa-57e6-f7fb-17bd2ec58159@molgen.mpg.de> <20220130174421.GS4285@paulmck-ThinkPad-P17-Gen-1> <20220201175023.GW4285@paulmck-ThinkPad-P17-Gen-1> In-Reply-To: From: Zhouyi Zhou Date: Wed, 9 Feb 2022 04:10:26 +0800 Message-ID: Subject: Re: BUG: Kernel NULL pointer dereference on write at 0x00000000 (rtmsg_ifinfo_build_skb) To: "Paul E. McKenney" Cc: Paul Menzel , Josh Triplett , rcu , LKML , "David S. Miller" , Jakub Kicinski , netdev@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-0.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,NORMAL_HTTP_TO_IP, NUMERIC_HTTP_ADDR,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Paul Below are my preliminary test results tested on PPC VM supplied by Open source lab of Oregon State University, thank you for your support! [Preliminary test results on ppc64le virtual guest] 1. Conclusion Some other kernel configuration besides RCU may lead to "BUG: Kernel NULL pointer dereference" at boot 2. Test Environment 2.1 host hardware 8 core ppc64le virtual guest with 16G ram and 160G disk cpu : POWER9 (architected), altivec supported clock : 2200.000000MHz revision : 2.2 (pvr 004e 1202) 2.2 host software Operating System: Ubuntu 20.04.3 LTS, Compiler: gcc version 9.3.0 3. Test Procedure 3.1 kernel source next-20220203 3.2 build and boot the kernel with CONFIG_DRM_BOCHS=3Dm and CONFIG_RCU_TORTURE_TEST=3Dy test result: "BUG: Kernel NULL pointer dereference" at boot config file: http://154.223.142.244/Feb2022/config-5.17.0-rc2-next.bochs.to= rture boot msg: http://154.223.142.244/Feb2022/dmesg.torture.bochs 3.3 build and boot the kernel with CONFIG_DRM_BOCHS=3Dm test result: "BUG: Kernel NULL pointer dereference" at boot config file: http://154.223.142.244/Feb2022/config-5.17.0-rc2-next.bochs boot msg: http://154.223.142.244/Feb2022/dmesg.bochs 3.4 build and boot the kernel with CONFIG_RCU_TORTURE_TEST=3Dy (without CONFIG_DRM_BOCHS) test result: boot without error config file: http://154.223.142.244/Feb2022/config-5.17.0-rc2-next.torture boot msg: http://154.223.142.244/Feb2022/dmesg.torture 3.5 build and boot the kernel with CONFIG_RCU_TORTURE_TEST=3Dm (without CONFIG_DRM_BOCHS) test result: boot without error config file: http://154.223.142.244/Feb2022/config-5.17.0-rc2-next boot msg: http://154.223.142.244/Feb2022/dmesg 4. Acknowledgement Thank Open source lab of Oregon State University and Paul Menzel and all other community members who support my tiny research. Thanks Zhouyi On Wed, Feb 2, 2022 at 10:39 AM Zhouyi Zhou wrote: > > Thank Paul for your encouragement! > > On Wed, Feb 2, 2022 at 1:50 AM Paul E. McKenney wrot= e: > > > > On Mon, Jan 31, 2022 at 09:08:40AM +0800, Zhouyi Zhou wrote: > > > Thank Paul for joining us! > > > > > > On Mon, Jan 31, 2022 at 1:44 AM Paul E. McKenney = wrote: > > > > > > > > On Sun, Jan 30, 2022 at 09:24:44PM +0800, Zhouyi Zhou wrote: > > > > > Dear Paul > > > > > > > > > > On Sun, Jan 30, 2022 at 4:19 PM Paul Menzel wrote: > > > > > > > > > > > > Dear Zhouyi, > > > > > > > > > > > > > > > > > > Am 30.01.22 um 01:21 schrieb Zhouyi Zhou: > > > > > > > > > > > > > Thank you for your instructions, I learned a lot from this pr= ocess. > > > > > > > > > > > > Same on my end. > > > > > > > > > > > > > On Sun, Jan 30, 2022 at 12:52 AM Paul Menzel wrote: > > > > > > > > > > > > >> Am 29.01.22 um 03:23 schrieb Zhouyi Zhou: > > > > > > >> > > > > > > >>> I don't have an IBM machine, but I tried to analyze the pro= blem using > > > > > > >>> my x86_64 kvm virtual machine, I can't reproduce the bug us= ing my > > > > > > >>> x86_64 kvm virtual machine. > > > > > > >> > > > > > > >> No idea, if it=E2=80=99s architecture specific. > > > > > > >> > > > > > > >>> I saw the panic is caused by registration of sit device (A = sit device > > > > > > >>> is a type of virtual network device that takes our IPv6 tra= ffic, > > > > > > >>> encapsulates/decapsulates it in IPv4 packets, and sends/rec= eives it > > > > > > >>> over the IPv4 Internet to another host) > > > > > > >>> > > > > > > >>> sit device is registered in function sit_init_net: > > > > > > >>> 1895 static int __net_init sit_init_net(struct net *net) > > > > > > >>> 1896 { > > > > > > >>> 1897 struct sit_net *sitn =3D net_generic(net, sit_n= et_id); > > > > > > >>> 1898 struct ip_tunnel *t; > > > > > > >>> 1899 int err; > > > > > > >>> 1900 > > > > > > >>> 1901 sitn->tunnels[0] =3D sitn->tunnels_wc; > > > > > > >>> 1902 sitn->tunnels[1] =3D sitn->tunnels_l; > > > > > > >>> 1903 sitn->tunnels[2] =3D sitn->tunnels_r; > > > > > > >>> 1904 sitn->tunnels[3] =3D sitn->tunnels_r_l; > > > > > > >>> 1905 > > > > > > >>> 1906 if (!net_has_fallback_tunnels(net)) > > > > > > >>> 1907 return 0; > > > > > > >>> 1908 > > > > > > >>> 1909 sitn->fb_tunnel_dev =3D alloc_netdev(sizeof(str= uct ip_tunnel), "sit0", > > > > > > >>> 1910 NET_NAME_UNKNOWN, > > > > > > >>> 1911 ipip6_tunnel_setup); > > > > > > >>> 1912 if (!sitn->fb_tunnel_dev) { > > > > > > >>> 1913 err =3D -ENOMEM; > > > > > > >>> 1914 goto err_alloc_dev; > > > > > > >>> 1915 } > > > > > > >>> 1916 dev_net_set(sitn->fb_tunnel_dev, net); > > > > > > >>> 1917 sitn->fb_tunnel_dev->rtnl_link_ops =3D &sit_lin= k_ops; > > > > > > >>> 1918 /* FB netdevice is special: we have one, and on= ly one per netns. > > > > > > >>> 1919 * Allowing to move it to another netns is clea= rly unsafe. > > > > > > >>> 1920 */ > > > > > > >>> 1921 sitn->fb_tunnel_dev->features |=3D NETIF_F_NETN= S_LOCAL; > > > > > > >>> 1922 > > > > > > >>> 1923 err =3D register_netdev(sitn->fb_tunnel_dev); > > > > > > >>> register_netdev on line 1923 will call if_nlmsg_size indire= ctly. > > > > > > >>> > > > > > > >>> On the other hand, the function that calls the paniced strl= en is if_nlmsg_size: > > > > > > >>> (gdb) disassemble if_nlmsg_size > > > > > > >>> Dump of assembler code for function if_nlmsg_size: > > > > > > >>> 0xffffffff81a0dc20 <+0>: nopl 0x0(%rax,%rax,1) > > > > > > >>> 0xffffffff81a0dc25 <+5>: push %rbp > > > > > > >>> 0xffffffff81a0dc26 <+6>: push %r15 > > > > > > >>> 0xffffffff81a0dd04 <+228>: je 0xffffffff81a0de2= 0 > > > > > > >>> 0xffffffff81a0dd0a <+234>: mov 0x10(%rbp),%rdi > > > > > > >>> ... > > > > > > >>> =3D> 0xffffffff81a0dd0e <+238>: callq 0xffffffff8175= 32d0 > > > > > > >>> 0xffffffff81a0dd13 <+243>: add $0x10,%eax > > > > > > >>> 0xffffffff81a0dd16 <+246>: movslq %eax,%r12 > > > > > > >> > > > > > > >> Excuse my ignorance, would that look the same for ppc64le? > > > > > > >> Unfortunately, I didn=E2=80=99t save the problematic `vmlinu= z` file, but on a > > > > > > >> current build (without rcutorture) I have the line below, wh= ere strlen > > > > > > >> shows up. > > > > > > >> > > > > > > >> (gdb) disassemble if_nlmsg_size > > > > > > >> [=E2=80=A6] > > > > > > >> 0xc000000000f7f82c <+332>: bl 0xc000000000a10e30 = > > > > > > >> [=E2=80=A6] > > > > > > >> > > > > > > >>> and the C code for 0xffffffff81a0dd0e is following (line 52= 4): > > > > > > >>> 515 static size_t rtnl_link_get_size(const struct net_de= vice *dev) > > > > > > >>> 516 { > > > > > > >>> 517 const struct rtnl_link_ops *ops =3D dev->rtnl_li= nk_ops; > > > > > > >>> 518 size_t size; > > > > > > >>> 519 > > > > > > >>> 520 if (!ops) > > > > > > >>> 521 return 0; > > > > > > >>> 522 > > > > > > >>> 523 size =3D nla_total_size(sizeof(struct nlattr)) += /* IFLA_LINKINFO */ > > > > > > >>> 524 nla_total_size(strlen(ops->kind) + 1); /= * IFLA_INFO_KIND */ > > > > > > >> > > > > > > >> How do I connect the disassemby output with the correspondin= g line? > > > > > > > I use "make ARCH=3Dpowerpc CC=3Dpowerpc64le-linux-gnu-gcc-9 > > > > > > > CROSS_COMPILE=3Dpowerpc64le-linux-gnu- -j 16" to cross compil= e kernel > > > > > > > for powerpc64le in my Ubuntu 20.04 x86_64. > > > > > > > > > > > > > > gdb-multiarch ./vmlinux > > > > > > > (gdb)disassemble if_nlmsg_size > > > > > > > [...] > > > > > > > 0xc00000000191bf40 <+112>: bl 0xc000000001c28ad0 > > > > > > > [...] > > > > > > > (gdb) break *0xc00000000191bf40 > > > > > > > Breakpoint 1 at 0xc00000000191bf40: file ./include/net/netlin= k.h, line 1112. > > > > > > > > > > > > > > But in include/net/netlink.h:1112, I can't find the call to s= trlen > > > > > > > 1110static inline int nla_total_size(int payload) > > > > > > > 1111{ > > > > > > > 1112 return NLA_ALIGN(nla_attr_size(payload)); > > > > > > > 1113} > > > > > > > This may be due to the compiler wrongly encode the debug info= rmation, I guess. > > > > > > > > > > > > `rtnl_link_get_size()` contains: > > > > > > > > > > > > size =3D nla_total_size(sizeof(struct nlattr)) + /= * > > > > > > IFLA_LINKINFO */ > > > > > > nla_total_size(strlen(ops->kind) + 1); /* > > > > > > IFLA_INFO_KIND */ > > > > > > > > > > > > Is that inlined(?) and the code at fault? > > > > > Yes, that is inlined! because > > > > > (gdb) disassemble if_nlmsg_size > > > > > Dump of assembler code for function if_nlmsg_size: > > > > > [...] > > > > > 0xc00000000191bf38 <+104>: beq 0xc00000000191c1f0 > > > > > 0xc00000000191bf3c <+108>: ld r3,16(r31) > > > > > 0xc00000000191bf40 <+112>: bl 0xc000000001c28ad0 > > > > > [...] > > > > > (gdb) > > > > > (gdb) break *0xc00000000191bf40 > > > > > Breakpoint 1 at 0xc00000000191bf40: file ./include/net/netlink.h,= line 1112. > > > > > (gdb) break *0xc00000000191bf38 > > > > > Breakpoint 2 at 0xc00000000191bf38: file net/core/rtnetlink.c, li= ne 520. > > > > > > > > I suggest building your kernel with CONFIG_DEBUG_INFO=3Dy if you ar= e not > > > > already doing so. That gives gdb a lot more information about thin= gs > > > > like inlining. > > > I check my .config file, CONFIG_DEBUG_INFO=3Dy is here: > > > linux-next$ grep CONFIG_DEBUG_INFO .config > > > CONFIG_DEBUG_INFO=3Dy > > > Then I invoke "make clean" and rebuild the kernel, the behavior of gd= b > > > and vmlinux remain unchanged, sorry for that > > > > Glad you were already on top of this one! > I am very pleased to contribute my tiny effort to the process of > making Linux better ;-) > > > > > I am trying to reproduce the bug on my bare metal x86_64 machines in > > > the coming days, and am also trying to work with Mr Menzel after he > > > comes back to the office. > > > > This URL used to allow community members such as yourself to request > > access to Power systems: https://osuosl.org/services/powerdev/ > I have filled the request form on > https://osuosl.org/services/powerdev/ and now wait for them to deploy > the environment for me. > > Thanks again > Zhouyi > > > > In case that helps. > > > > Thanx, Paul > > > > > Thanks > > > Zhouyi > > > > > > > > Thanx, Paul > > > > > > > > > > >>> But ops is assigned the value of sit_link_ops in function s= it_init_net > > > > > > >>> line 1917, so I guess something must happened between the c= alls. > > > > > > >>> > > > > > > >>> Do we have KASAN in IBM machine? would KASAN help us find o= ut what > > > > > > >>> happened in between? > > > > > > >> > > > > > > >> Unfortunately, KASAN is not support on Power, I have, as far= as I can > > > > > > >> see. From `arch/powerpc/Kconfig`: > > > > > > >> > > > > > > >> select HAVE_ARCH_KASAN if PPC32 &= & PPC_PAGE_SHIFT <=3D 14 > > > > > > >> select HAVE_ARCH_KASAN_VMALLOC if PPC32 &= & PPC_PAGE_SHIFT <=3D 14 > > > > > > >> > > > > > > > en, agree, I invoke "make menuconfig ARCH=3Dpowerpc > > > > > > > CC=3Dpowerpc64le-linux-gnu-gcc-9 CROSS_COMPILE=3Dpowerpc64le-= linux-gnu- -j > > > > > > > 16", I can't find KASAN under Memory Debugging, I guess we sh= ould find > > > > > > > the bug by bisecting instead. > > > > > > > > > > > > I do not know, if it is a regression, as it was the first time = I tried > > > > > > to run a Linux kernel built with rcutorture on real hardware. > > > > > I tried to add some debug statements to the kernel to locate the = bug > > > > > more accurately, you can try it when you're not busy in the futu= re, > > > > > or just ignore it if the following patch looks not very effective= ;-) > > > > > diff --git a/net/core/dev.c b/net/core/dev.c > > > > > index 1baab07820f6..969ac7c540cc 100644 > > > > > --- a/net/core/dev.c > > > > > +++ b/net/core/dev.c > > > > > @@ -9707,6 +9707,9 @@ int register_netdevice(struct net_device *d= ev) > > > > > * Prevent userspace races by waiting until the network > > > > > * device is fully setup before sending notifications. > > > > > */ > > > > > + if (dev->rtnl_link_ops) > > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", dev->rtnl= _link_ops, > > > > > + dev->rtnl_link_ops->kind, __FUNCTION__); > > > > > if (!dev->rtnl_link_ops || > > > > > dev->rtnl_link_state =3D=3D RTNL_LINK_INITIALIZED) > > > > > rtmsg_ifinfo(RTM_NEWLINK, dev, ~0U, GFP_KERNEL); > > > > > @@ -9788,6 +9791,9 @@ int register_netdev(struct net_device *dev) > > > > > > > > > > if (rtnl_lock_killable()) > > > > > return -EINTR; > > > > > + if (dev->rtnl_link_ops) > > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", dev->rtnl= _link_ops, > > > > > + dev->rtnl_link_ops->kind, __FUNCTION__); > > > > > err =3D register_netdevice(dev); > > > > > rtnl_unlock(); > > > > > return err; > > > > > diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c > > > > > index e476403231f0..e08986ae6238 100644 > > > > > --- a/net/core/rtnetlink.c > > > > > +++ b/net/core/rtnetlink.c > > > > > @@ -520,6 +520,8 @@ static size_t rtnl_link_get_size(const struct > > > > > net_device *dev) > > > > > if (!ops) > > > > > return 0; > > > > > > > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", ops, > > > > > + ops->kind, __FUNCTION__); > > > > > size =3D nla_total_size(sizeof(struct nlattr)) + /* IFLA_LIN= KINFO */ > > > > > nla_total_size(strlen(ops->kind) + 1); /* IFLA_INFO_= KIND */ > > > > > > > > > > @@ -1006,6 +1008,9 @@ static size_t rtnl_proto_down_size(const st= ruct > > > > > net_device *dev) > > > > > static noinline size_t if_nlmsg_size(const struct net_device *de= v, > > > > > u32 ext_filter_mask) > > > > > { > > > > > + if (dev->rtnl_link_ops) > > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", dev->rtn= l_link_ops, > > > > > + dev->rtnl_link_ops->kind, __FUNCTION__); > > > > > return NLMSG_ALIGN(sizeof(struct ifinfomsg)) > > > > > + nla_total_size(IFNAMSIZ) /* IFLA_IFNAME */ > > > > > + nla_total_size(IFALIASZ) /* IFLA_IFALIAS */ > > > > > @@ -3825,7 +3830,9 @@ struct sk_buff *rtmsg_ifinfo_build_skb(int = type, > > > > > struct net_device *dev, > > > > > struct net *net =3D dev_net(dev); > > > > > struct sk_buff *skb; > > > > > int err =3D -ENOBUFS; > > > > > - > > > > > + if (dev->rtnl_link_ops) > > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", dev->rtnl= _link_ops, > > > > > + dev->rtnl_link_ops->kind, __FUNCTION__); > > > > > skb =3D nlmsg_new(if_nlmsg_size(dev, 0), flags); > > > > > if (skb =3D=3D NULL) > > > > > goto errout; > > > > > @@ -3861,7 +3868,9 @@ static void rtmsg_ifinfo_event(int type, st= ruct > > > > > net_device *dev, > > > > > > > > > > if (dev->reg_state !=3D NETREG_REGISTERED) > > > > > return; > > > > > - > > > > > + if (dev->rtnl_link_ops) > > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", dev->rtn= l_link_ops, > > > > > + dev->rtnl_link_ops->kind, __FUNCTION__); > > > > > skb =3D rtmsg_ifinfo_build_skb(type, dev, change, event, fla= gs, new_nsid, > > > > > new_ifindex); > > > > > if (skb) > > > > > @@ -3871,6 +3880,9 @@ static void rtmsg_ifinfo_event(int type, st= ruct > > > > > net_device *dev, > > > > > void rtmsg_ifinfo(int type, struct net_device *dev, unsigned int= change, > > > > > gfp_t flags) > > > > > { > > > > > + if (dev->rtnl_link_ops) > > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", dev->rtn= l_link_ops, > > > > > + dev->rtnl_link_ops->kind, __FUNCTION__); > > > > > rtmsg_ifinfo_event(type, dev, change, rtnl_get_event(0), fla= gs, > > > > > NULL, 0); > > > > > } > > > > > diff --git a/net/ipv6/sit.c b/net/ipv6/sit.c > > > > > index c0b138c20992..fa5b2725811c 100644 > > > > > --- a/net/ipv6/sit.c > > > > > +++ b/net/ipv6/sit.c > > > > > @@ -1919,6 +1919,8 @@ static int __net_init sit_init_net(struct n= et *net) > > > > > * Allowing to move it to another netns is clearly unsafe. > > > > > */ > > > > > sitn->fb_tunnel_dev->features |=3D NETIF_F_NETNS_LOCAL; > > > > > - > > > > > + printk(KERN_INFO "%lx IFLA_INFO_KIND %s %s\n", > > > > > + sitn->fb_tunnel_dev->rtnl_link_ops, > > > > > + sitn->fb_tunnel_dev->rtnl_link_ops->kind, __FUNCTION_= _); > > > > > err =3D register_netdev(sitn->fb_tunnel_dev); > > > > > if (err) > > > > > goto err_reg_dev; > > > > > > > > > > > > >>> Hope I can be of more helpful. > > > > > > >> > > > > > > >> Some distributions support multi-arch, so they easily allow > > > > > > >> crosscompiling for different architectures. > > > > > > > I use "make ARCH=3Dpowerpc CC=3Dpowerpc64le-linux-gnu-gcc-9 > > > > > > > CROSS_COMPILE=3Dpowerpc64le-linux-gnu- -j 16" to cross compil= e kernel > > > > > > > for powerpc64le in my Ubuntu 20.04 x86_64. But I can't boot t= he > > > > > > > compiled kernel using "qemu-system-ppc64le -M pseries -nograp= hic -smp > > > > > > > 4 -net none -m 4G -kernel arch/powerpc/boot/zImage". I will c= ontinue > > > > > > > to explore it. > > > > > > > > > > > > Oh, that does not sound good. But I have not tried that in a lo= ng time > > > > > > either. It=E2=80=99s a separate issue, but maybe some of the PP= C > > > > > > maintainers/folks could help. > > > > > I will do further research on this later. > > > > > > > > > > Thanks for your time > > > > > Kind regards > > > > > Zhouyi > > > > > > > > > > > > > > > > > > Kind regards, > > > > > > > > > > > > Paul