09 May, 2013

1 commit


06 May, 2013

3 commits

  • Now that vfree() can be called from interrupt contexts, there's no
    need to play games with schedule_work() to escape calling vfree()
    from RCU callbacks.

    Signed-off-by: Al Viro
    Signed-off-by: David S. Miller

    Al Viro
     
  • This patch fixes race between inet_frag_lru_move() and inet_frag_lru_add()
    which was introduced in commit 3ef0eb0db4bf92c6d2510fe5c4dc51852746f206
    ("net: frag, move LRU list maintenance outside of rwlock")

    One cpu already added new fragment queue into hash but not into LRU.
    Other cpu found it in hash and tries to move it to the end of LRU.
    This leads to NULL pointer dereference inside of list_move_tail().

    Another possible race condition is between inet_frag_lru_move() and
    inet_frag_lru_del(): move can happens after deletion.

    This patch initializes LRU list head before adding fragment into hash and
    inet_frag_lru_move() doesn't touches it if it's empty.

    I saw this kernel oops two times in a couple of days.

    [119482.128853] BUG: unable to handle kernel NULL pointer dereference at (null)
    [119482.132693] IP: [] __list_del_entry+0x29/0xd0
    [119482.136456] PGD 2148f6067 PUD 215ab9067 PMD 0
    [119482.140221] Oops: 0000 [#1] SMP
    [119482.144008] Modules linked in: vfat msdos fat 8021q fuse nfsd auth_rpcgss nfs_acl nfs lockd sunrpc ppp_async ppp_generic bridge slhc stp llc w83627ehf hwmon_vid snd_hda_codec_hdmi snd_hda_codec_realtek kvm_amd k10temp kvm snd_hda_intel snd_hda_codec edac_core radeon snd_hwdep ath9k snd_pcm ath9k_common snd_page_alloc ath9k_hw snd_timer snd soundcore drm_kms_helper ath ttm r8169 mii
    [119482.152692] CPU 3
    [119482.152721] Pid: 20, comm: ksoftirqd/3 Not tainted 3.9.0-zurg-00001-g9f95269 #132 To Be Filled By O.E.M. To Be Filled By O.E.M./RS880D
    [119482.161478] RIP: 0010:[] [] __list_del_entry+0x29/0xd0
    [119482.166004] RSP: 0018:ffff880216d5db58 EFLAGS: 00010207
    [119482.170568] RAX: 0000000000000000 RBX: ffff88020882b9c0 RCX: dead000000200200
    [119482.175189] RDX: 0000000000000000 RSI: 0000000000000880 RDI: ffff88020882ba00
    [119482.179860] RBP: ffff880216d5db58 R08: ffffffff8155c7f0 R09: 0000000000000014
    [119482.184570] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88020882ba00
    [119482.189337] R13: ffffffff81c8d780 R14: ffff880204357f00 R15: 00000000000005a0
    [119482.194140] FS: 00007f58124dc700(0000) GS:ffff88021fcc0000(0000) knlGS:0000000000000000
    [119482.198928] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
    [119482.203711] CR2: 0000000000000000 CR3: 00000002155f0000 CR4: 00000000000007e0
    [119482.208533] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
    [119482.213371] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
    [119482.218221] Process ksoftirqd/3 (pid: 20, threadinfo ffff880216d5c000, task ffff880216d3a9a0)
    [119482.223113] Stack:
    [119482.228004] ffff880216d5dbd8 ffffffff8155dcda 0000000000000000 ffff000200000001
    [119482.233038] ffff8802153c1f00 ffff880000289440 ffff880200000014 ffff88007bc72000
    [119482.238083] 00000000000079d5 ffff88007bc72f44 ffffffff00000002 ffff880204357f00
    [119482.243090] Call Trace:
    [119482.248009] [] ip_defrag+0x8fa/0xd10
    [119482.252921] [] ipv4_conntrack_defrag+0x83/0xe0
    [119482.257803] [] nf_iterate+0x8b/0xa0
    [119482.262658] [] ? inet_del_offload+0x40/0x40
    [119482.267527] [] nf_hook_slow+0x74/0x130
    [119482.272412] [] ? inet_del_offload+0x40/0x40
    [119482.277302] [] ip_rcv+0x268/0x320
    [119482.282147] [] __netif_receive_skb_core+0x612/0x7e0
    [119482.286998] [] __netif_receive_skb+0x18/0x60
    [119482.291826] [] process_backlog+0xa0/0x160
    [119482.296648] [] net_rx_action+0x139/0x220
    [119482.301403] [] __do_softirq+0xe7/0x220
    [119482.306103] [] run_ksoftirqd+0x28/0x40
    [119482.310809] [] smpboot_thread_fn+0xff/0x1a0
    [119482.315515] [] ? lg_local_lock_cpu+0x40/0x40
    [119482.320219] [] kthread+0xc0/0xd0
    [119482.324858] [] ? insert_kthread_work+0x40/0x40
    [119482.329460] [] ret_from_fork+0x7c/0xb0
    [119482.334057] [] ? insert_kthread_work+0x40/0x40
    [119482.338661] Code: 00 00 55 48 8b 17 48 b9 00 01 10 00 00 00 ad de 48 8b 47 08 48 89 e5 48 39 ca 74 29 48 b9 00 02 20 00 00 00 ad de 48 39 c8 74 7a 8b 00 4c 39 c7 75 53 4c 8b 42 08 4c 39 c7 75 2b 48 89 42 08
    [119482.343787] RIP [] __list_del_entry+0x29/0xd0
    [119482.348675] RSP
    [119482.353493] CR2: 0000000000000000

    Oops happened on this path:
    ip_defrag() -> ip_frag_queue() -> inet_frag_lru_move() -> list_move_tail() -> __list_del_entry()

    Signed-off-by: Konstantin Khlebnikov
    Cc: Jesper Dangaard Brouer
    Cc: Florian Westphal
    Cc: Eric Dumazet
    Cc: David S. Miller
    Acked-by: Florian Westphal
    Signed-off-by: Jesper Dangaard Brouer
    Signed-off-by: David S. Miller

    Konstantin Khlebnikov
     
  • TCP metric cache expires entries after one hour.

    This probably make sense for TCP RTT/RTTVAR/CWND, but not
    for TCP fastopen cookies.

    Its better to try previous cookie. If it appears to be obsolete,
    server will send us new cookie anyway.

    Signed-off-by: Eric Dumazet
    Cc: Yuchung Cheng
    Cc: Neal Cardwell
    Signed-off-by: David S. Miller

    Eric Dumazet
     

04 May, 2013

2 commits

  • This patch set correct skb->protocol so that inner packet can
    lookup correct gso handler.

    Signed-off-by: Pravin B Shelar
    Signed-off-by: David S. Miller

    Pravin B Shelar
     
  • For ipv6 traffic, GRE can generate packet with strange GSO
    bits, e.g. ipv4 packet with SKB_GSO_TCPV6 flag set. Therefore
    following patch relaxes check in inet gso handler to allow
    such packet for segmentation.
    This patch also fixes wrong skb->protocol set that was done in
    gre_gso_segment() handler.

    Reported-by: Steinar H. Gunderson
    CC: Eric Dumazet
    Signed-off-by: Pravin B Shelar
    Acked-by: Eric Dumazet
    Signed-off-by: David S. Miller

    Pravin B Shelar
     

02 May, 2013

2 commits

  • Pull VFS updates from Al Viro,

    Misc cleanups all over the place, mainly wrt /proc interfaces (switch
    create_proc_entry to proc_create(), get rid of the deprecated
    create_proc_read_entry() in favor of using proc_create_data() and
    seq_file etc).

    7kloc removed.

    * 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs: (204 commits)
    don't bother with deferred freeing of fdtables
    proc: Move non-public stuff from linux/proc_fs.h to fs/proc/internal.h
    proc: Make the PROC_I() and PDE() macros internal to procfs
    proc: Supply a function to remove a proc entry by PDE
    take cgroup_open() and cpuset_open() to fs/proc/base.c
    ppc: Clean up scanlog
    ppc: Clean up rtas_flash driver somewhat
    hostap: proc: Use remove_proc_subtree()
    drm: proc: Use remove_proc_subtree()
    drm: proc: Use minor->index to label things, not PDE->name
    drm: Constify drm_proc_list[]
    zoran: Don't print proc_dir_entry data in debug
    reiserfs: Don't access the proc_dir_entry in r_open(), r_start() r_show()
    proc: Supply an accessor for getting the data from a PDE's parent
    airo: Use remove_proc_subtree()
    rtl8192u: Don't need to save device proc dir PDE
    rtl8187se: Use a dir under /proc/net/r8180/
    proc: Add proc_mkdir_data()
    proc: Move some bits from linux/proc_fs.h to linux/{of.h,signal.h,tty.h}
    proc: Move PDE_NET() to fs/proc/proc_net.c
    ...

    Linus Torvalds
     
  • Supply a function (proc_remove()) to remove a proc entry (and any subtree
    rooted there) by proc_dir_entry pointer rather than by name and (optionally)
    root dir entry pointer. This allows us to eliminate all remaining pde->name
    accesses outside of procfs.

    Signed-off-by: David Howells
    Acked-by: Grant Likely
    cc: linux-acpi@vger.kernel.org
    cc: openipmi-developer@lists.sourceforge.net
    cc: devicetree-discuss@lists.ozlabs.org
    cc: linux-pci@vger.kernel.org
    cc: netdev@vger.kernel.org
    cc: netfilter-devel@vger.kernel.org
    cc: alsa-devel@alsa-project.org
    Signed-off-by: Al Viro

    David Howells
     

30 Apr, 2013

4 commits

  • Conflicts:
    drivers/net/ethernet/broadcom/bnx2x/bnx2x_main.c
    drivers/net/ethernet/emulex/benet/be.h
    include/net/tcp.h
    net/mac802154/mac802154.h

    Most conflicts were minor overlapping stuff.

    The be2net driver brought in some fixes that added __vlan_put_tag
    calls, which in net-next take an additional argument.

    Signed-off-by: David S. Miller

    David S. Miller
     
  • Linux immediately returns SYNACK on (spurious) SYN retransmits, but
    keeps the SYNACK timer running independently. Thus the timer may
    fire right after the SYNACK retransmit and causes a SYN-SYNACK
    cross-fire burst.

    Adopt the fast retransmit/recovery idea in established state by
    re-arming the SYNACK timer after the fast (SYNACK) retransmit. The
    timer may fire late up to 500ms due to the current SYNACK timer wheel,
    but it's OK to be conservative when network is congested. Eric's new
    listener design should address this issue.

    Signed-off-by: Yuchung Cheng
    Acked-by: Eric Dumazet
    Acked-by: Neal Cardwell
    Signed-off-by: David S. Miller

    Yuchung Cheng
     
  • Add MIB counters for checksum errors in IP layer,
    and TCP/UDP/ICMP layers, to help diagnose problems.

    $ nstat -a | grep Csum
    IcmpInCsumErrors 72 0.0
    TcpInCsumErrors 382 0.0
    UdpInCsumErrors 463221 0.0
    Icmp6InCsumErrors 75 0.0
    Udp6InCsumErrors 173442 0.0
    IpExtInCsumErrors 10884 0.0

    Signed-off-by: Eric Dumazet
    Signed-off-by: David S. Miller

    Eric Dumazet
     
  • Instead of feeding net_secret[] at boot time, defer the init
    at the point first socket is created.

    This permits some platforms to use better entropy sources than
    the ones available at boot time.

    Signed-off-by: Eric Dumazet
    Signed-off-by: David S. Miller

    Eric Dumazet
     

25 Apr, 2013

1 commit


23 Apr, 2013

1 commit

  • Conflicts:
    drivers/net/ethernet/emulex/benet/be_main.c
    drivers/net/ethernet/intel/igb/igb_main.c
    drivers/net/wireless/brcm80211/brcmsmac/mac80211_if.c
    include/net/scm.h
    net/batman-adv/routing.c
    net/ipv4/tcp_input.c

    The e{uid,gid} --> {uid,gid} credentials fix conflicted with the
    cleanup in net-next to now pass cred structs around.

    The be2net driver had a bug fix in 'net' that overlapped with the VLAN
    interface changes by Patrick McHardy in net-next.

    An IGB conflict existed because in 'net' the build_skb() support was
    reverted, and in 'net-next' there was a comment style fix within that
    code.

    Several batman-adv conflicts were resolved by making sure that all
    calls to batadv_is_my_mac() are changed to have a new bat_priv first
    argument.

    Eric Dumazet's TS ECR fix in TCP in 'net' conflicted with the F-RTO
    rewrite in 'net-next', mostly overlapping changes.

    Thanks to Stephen Rothwell and Antonio Quartulli for help with several
    of these merge resolutions.

    Signed-off-by: David S. Miller

    David S. Miller
     

20 Apr, 2013

4 commits

  • Pablo Neira Ayuso says:

    ====================
    The following patchset contains a small batch of Netfilter
    updates for your net-next tree, they are:

    * Three patches that provide more accurate error reporting to
    user-space, instead of -EPERM, in IPv4/IPv6 netfilter re-routing
    code and NAT, from Patrick McHardy.

    * Update copyright statements in Netfilter filters of
    Patrick McHardy, from himself.

    * Add Kconfig dependency on the raw/mangle tables to the
    rpfilter, from Florian Westphal.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     
  • Memory mapped netlink needs to store the receiving userspace socket
    when sending from the kernel to userspace. Rename 'ssk' to 'sk' to
    avoid confusion.

    Signed-off-by: Patrick McHardy
    Signed-off-by: David S. Miller

    Patrick McHardy
     
  • Pablo Neira Ayuso says:

    ====================
    If time allows, please consider pulling the following patchset contains two
    late Netfilter fixes, they are:

    * Skip broadcast/multicast locally generated traffic in the rpfilter,
    (closes netfilter bugzilla #814), from Florian Westphal.

    * Fix missing elements in the listing of ipset bitmap ip,mac set
    type with timeout support enabled, from Jozsef Kadlecsik.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     
  • commit bd090dfc634d (tcp: tcp_replace_ts_recent() should not be called
    from tcp_validate_incoming()) introduced a TS ecr bug in slow path
    processing.

    1 A > B P. 1:10001(10000) ack 1
    2 B < A . 1:1(0) ack 1 win 257
    3 A > B . 1:1001(1000) ack 1 win 227
    4 A > B . 1001:2001(1000) ack 1 win 227

    (ecr 200 should be ecr 300 in packets 3 & 4)

    Problem is tcp_ack() can trigger send of new packets (retransmits),
    reflecting the prior TSval, instead of the TSval contained in the
    currently processed incoming packet.

    Fix this by calling tcp_replace_ts_recent() from tcp_ack() after the
    checks, but before the actions.

    Reported-by: Yuchung Cheng
    Signed-off-by: Eric Dumazet
    Cc: Neal Cardwell
    Acked-by: Neal Cardwell
    Signed-off-by: David S. Miller

    Eric Dumazet
     

19 Apr, 2013

4 commits

  • rpfilter is only valid in raw/mangle PREROUTING, i.e.
    RPFILTER=y|m is useless without raw or mangle table support.

    Signed-off-by: Florian Westphal
    Signed-off-by: Pablo Neira Ayuso

    Florian Westphal
     
  • Alex Efros reported rpfilter module doesn't match following packets:
    IN=br.qemu SRC=192.168.2.1 DST=192.168.2.255 [ .. ]
    (netfilter bugzilla #814).

    Problem is that network stack arranges for the locally generated broadcasts
    to appear on the interface they were sent out, so the IFF_LOOPBACK check
    doesn't trigger.

    As -m rpfilter is restricted to PREROUTING, we can check for existing
    rtable instead, it catches locally-generated broad/multicast case, too.

    Signed-off-by: Florian Westphal
    Signed-off-by: Pablo Neira Ayuso

    Florian Westphal
     
  • Host queues (Qdisc + NIC) can hold packets so long that TCP can
    eventually retransmit a packet before the first transmit even left
    the host.

    Its not clear right now if we could avoid this in the first place :

    - We could arm RTO timer not at the time we enqueue packets, but
    at the time we TX complete them (tcp_wfree())

    - Cancel the sending of the new copy of the packet if prior one
    is still in queue.

    This patch adds instrumentation so that we can at least see how
    often this problem happens.

    TCPSpuriousRtxHostQueues SNMP counter is incremented every time
    we detect the fast clone is not yet freed in tcp_transmit_skb()

    Signed-off-by: Eric Dumazet
    Cc: Yuchung Cheng
    Cc: Neal Cardwell
    Cc: Tom Herbert
    Cc: Willem de Bruijn
    Signed-off-by: David S. Miller

    Eric Dumazet
     
  • Add copyright statements to all netfilter files which have had significant
    changes done by myself in the past.

    Some notes:

    - nf_conntrack_ecache.c was incorrectly attributed to Rusty and Netfilter
    Core Team when it got split out of nf_conntrack_core.c. The copyrights
    even state a date which lies six years before it was written. It was
    written in 2005 by Harald and myself.

    - net/ipv{4,6}/netfilter.c, net/netfitler/nf_queue.c were missing copyright
    statements. I've added the copyright statement from net/netfilter/core.c,
    where this code originated

    - for nf_conntrack_proto_tcp.c I've also added Jozsef, since I didn't want
    it to give the wrong impression

    Signed-off-by: Patrick McHardy
    Signed-off-by: Pablo Neira Ayuso

    Patrick McHardy
     

17 Apr, 2013

1 commit

  • Commit 4a94445c9a5c (net: Use ip_route_input_noref() in input path)
    added a bug in IP defragmentation handling, as non refcounted
    dst could escape an RCU protected section.

    Commit 64f3b9e203bd068 (net: ip_expire() must revalidate route) fixed
    the case of timeouts, but not the general problem.

    Tom Parkin noticed crashes in UDP stack and provided a patch,
    but further analysis permitted us to pinpoint the root cause.

    Before queueing a packet into a frag list, we must drop its dst,
    as this dst has limited lifetime (RCU protected)

    When/if a packet is finally reassembled, we use the dst of the very
    last skb, still protected by RCU and valid, as the dst of the
    reassembled packet.

    Use same logic in IPv6, as there is no need to hold dst references.

    Reported-by: Tom Parkin
    Tested-by: Tom Parkin
    Signed-off-by: Eric Dumazet
    Signed-off-by: David S. Miller

    Eric Dumazet
     

16 Apr, 2013

1 commit


15 Apr, 2013

2 commits

  • Commit 10b96f7306e5 (``tcp_memcontrol: remove a redundant statement
    in tcp_destroy_cgroup()'') says ``We read the value but make no use
    of it.'', but forgot to remove the variable declaration as well. This
    was a follow-up commit of 3f1346193 (``memcg: decrement static keys
    at real destroy time'') that removed the read of variable 'val'.

    This fixes therefore:

    CC net/ipv4/tcp_memcontrol.o
    net/ipv4/tcp_memcontrol.c: In function ‘tcp_destroy_cgroup’:
    net/ipv4/tcp_memcontrol.c:67:6: warning: unused variable ‘val’ [-Wunused-variable]

    Signed-off-by: Daniel Borkmann
    Signed-off-by: David S. Miller

    Daniel Borkmann
     
  • Currently, sock_tx_timestamp() always returns 0. The comment that
    describes the sock_tx_timestamp() function wrongly says that it
    returns an error when an invalid argument is passed (from commit
    20d4947353be, ``net: socket infrastructure for SO_TIMESTAMPING'').
    Make the function void, so that we can also remove all the unneeded
    if conditions that check for such a _non-existant_ error case in the
    output path.

    Signed-off-by: Daniel Borkmann
    Signed-off-by: David S. Miller

    Daniel Borkmann
     

14 Apr, 2013

1 commit


13 Apr, 2013

1 commit

  • I noticed that TSQ (TCP Small queues) was less effective when TSO is
    turned off, and GSO is on. If BQL is not enabled, TSQ has then no
    effect.

    It turns out the GSO engine frees the original gso_skb at the time the
    fragments are generated and queued to the NIC.

    We should instead call the tcp_wfree() destructor for the last fragment,
    to keep the flow control as intended in TSQ. This effectively limits
    the number of queued packets on qdisc + NIC layers.

    Signed-off-by: Eric Dumazet
    Cc: Tom Herbert
    Cc: Yuchung Cheng
    Cc: Nandita Dukkipati
    Cc: Neal Cardwell
    Signed-off-by: David S. Miller

    Eric Dumazet
     

12 Apr, 2013

3 commits

  • If a TCP retransmission gets partially ACKed and collapsed multiple
    times it is possible for the headroom to grow beyond 64K which will
    overflow the 16bit skb->csum_start which is based on the start of
    the headroom. It has been observed rarely in the wild with IPoIB due
    to the 64K MTU.

    Verify if the acking and collapsing resulted in a headroom exceeding
    what csum_start can cover and reallocate the headroom if so.

    A big thank you to Jim Foraker and the team at
    LLNL for helping out with the investigation and testing.

    Reported-by: Jim Foraker
    Signed-off-by: Thomas Graf
    Acked-by: Eric Dumazet
    Signed-off-by: David S. Miller

    Thomas Graf
     
  • Steffen Klassert says:

    ====================
    1) Allow to avoid copying DSCP during encapsulation
    by setting a SA flag. From Nicolas Dichtel.

    2) Constify the netlink dispatch table, no need to modify it
    at runtime. From Mathias Krause.
    ====================

    Signed-off-by: David S. Miller

    David S. Miller
     
  • There is a bug in cookie_v4_check (net/ipv4/syncookies.c):
    flowi4_init_output(&fl4, 0, sk->sk_mark, RT_CONN_FLAGS(sk),
    RT_SCOPE_UNIVERSE, IPPROTO_TCP,
    inet_sk_flowi_flags(sk),
    (opt && opt->srr) ? opt->faddr : ireq->rmt_addr,
    ireq->loc_addr, th->source, th->dest);

    Here we do not respect sk->sk_bound_dev_if, therefore wrong dst_entry may be
    taken. This dst_entry is used by new socket (get_cookie_sock ->
    tcp_v4_syn_recv_sock), so its packets may take the wrong path.

    Signed-off-by: Dmitry Popov
    Signed-off-by: David S. Miller

    Dmitry Popov
     

10 Apr, 2013

3 commits

  • The only part of proc_dir_entry the code outside of fs/proc
    really cares about is PDE(inode)->data. Provide a helper
    for that; static inline for now, eventually will be moved
    to fs/proc, along with the knowledge of struct proc_dir_entry
    layout.

    Signed-off-by: Al Viro

    Al Viro
     
  • Commit 90ba9b1986b5ac (tcp: tcp_make_synack() can use alloc_skb())
    broke certain SELinux/NetLabel configurations by no longer correctly
    assigning the sock to the outgoing SYNACK packet.

    Cost of atomic operations on the LISTEN socket is quite big,
    and we would like it to happen only if really needed.

    This patch introduces a new security_ops->skb_owned_by() method,
    that is a void operation unless selinux is active.

    Reported-by: Miroslav Vadkerti
    Diagnosed-by: Paul Moore
    Signed-off-by: Eric Dumazet
    Cc: "David S. Miller"
    Cc: linux-security-module@vger.kernel.org
    Acked-by: James Morris
    Tested-by: Paul Moore
    Acked-by: Paul Moore
    Signed-off-by: David S. Miller

    Eric Dumazet
     
  • We read the value but make no use of it.

    Signed-off-by: Li Zefan
    Signed-off-by: David S. Miller

    Zefan Li
     

09 Apr, 2013

3 commits


08 Apr, 2013

3 commits

  • Propagate errors from ip_xfrm_me_harder() instead of returning EPERM in
    all cases.

    Signed-off-by: Patrick McHardy
    Signed-off-by: Pablo Neira Ayuso

    Patrick McHardy
     
  • Propagate routing errors from ip_route_me_harder() when dropping a packet
    using NF_DROP_ERR(). This makes userspace get the proper error instead of
    EPERM for everything.

    Example:

    # ip r a unreachable default table 100
    # ip ru add fwmark 0x1 lookup 100
    # iptables -t mangle -A OUTPUT -d 8.8.8.8 -j MARK --set-mark 0x1

    Current behaviour:

    PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
    ping: sendmsg: Operation not permitted
    ping: sendmsg: Operation not permitted
    ping: sendmsg: Operation not permitted

    New behaviour:

    PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
    ping: sendmsg: Network is unreachable
    ping: sendmsg: Network is unreachable
    ping: sendmsg: Network is unreachable
    ping: sendmsg: Network is unreachable

    Signed-off-by: Patrick McHardy
    Signed-off-by: Pablo Neira Ayuso

    Patrick McHardy
     
  • Conflicts:
    drivers/nfc/microread/mei.c
    net/netfilter/nfnetlink_queue_core.c

    Pull in 'net' to get Eric Biederman's AF_UNIX fix, upon which
    some cleanups are going to go on-top.

    Signed-off-by: David S. Miller

    David S. Miller