03 Aug, 2022

1 commit

  • commit f6336724a4d4220c89a4ec38bca84b03b178b1a3 upstream.

    tls_device_down takes a reference on all contexts it's going to move to
    the degraded state (software fallback). If sk_destruct runs afterwards,
    it can reduce the reference counter back to 1 and return early without
    destroying the context. Then tls_device_down will release the reference
    it took and call tls_device_free_ctx. However, the context will still
    stay in tls_device_down_list forever. The list will contain an item,
    memory for which is released, making a memory corruption possible.

    Fix the above bug by properly removing the context from all lists before
    any call to tls_device_free_ctx.

    Fixes: 3740651bf7e2 ("tls: Fix context leak on tls_device_down")
    Signed-off-by: Maxim Mikityanskiy
    Reviewed-by: Tariq Toukan
    Signed-off-by: David S. Miller
    Signed-off-by: Greg Kroah-Hartman

    Maxim Mikityanskiy
     

29 Jul, 2022

1 commit

  • [ Upstream commit f08d8c1bb97c48f24a82afaa2fd8c140f8d3da8b ]

    Socket destruction flow and tls_device_down function sync against each
    other using tls_device_lock and the context refcount, to guarantee the
    device resources are freed via tls_dev_del() by the end of
    tls_device_down.

    In the following unfortunate flow, this won't happen:
    - refcount is decreased to zero in tls_device_sk_destruct.
    - tls_device_down starts, skips the context as refcount is zero, going
    all the way until it flushes the gc work, and returns without freeing
    the device resources.
    - only then, tls_device_queue_ctx_destruction is called, queues the gc
    work and frees the context's device resources.

    Solve it by decreasing the refcount in the socket's destruction flow
    under the tls_device_lock, for perfect synchronization. This does not
    slow down the common likely destructor flow, in which both the refcount
    is decreased and the spinlock is acquired, anyway.

    Fixes: e8f69799810c ("net/tls: Add generic NIC offload infrastructure")
    Reviewed-by: Maxim Mikityanskiy
    Signed-off-by: Tariq Toukan
    Reviewed-by: Jakub Kicinski
    Signed-off-by: David S. Miller
    Signed-off-by: Sasha Levin

    Tariq Toukan
     

22 Jul, 2022

1 commit

  • [ Upstream commit 3d8c51b25a235e283e37750943bbf356ef187230 ]

    Add missing error checks in tls_device_init.

    Fixes: e8f69799810c ("net/tls: Add generic NIC offload infrastructure")
    Reported-by: Jakub Kicinski
    Reviewed-by: Maxim Mikityanskiy
    Signed-off-by: Tariq Toukan
    Link: https://lore.kernel.org/r/20220714070754.1428-1-tariqt@nvidia.com
    Signed-off-by: Jakub Kicinski
    Signed-off-by: Sasha Levin

    Tariq Toukan
     

29 Jun, 2022

3 commits

  • [ Upstream commit e34a07c0ae3906f97eb18df50902e2a01c1015b6 ]

    Commit 8a59f9d1e3d4 ("sock: Introduce sk->sk_prot->psock_update_sk_prot()")
    has moved the inet_csk_has_ulp(sk) check from sk_psock_init() to
    the new tcp_bpf_update_proto() function. I'm guessing that this
    was done to allow creating psocks for non-inet sockets.

    Unfortunately the destruction path for psock includes the ULP
    unwind, so we need to fail the sk_psock_init() itself.
    Otherwise if ULP is already present we'll notice that later,
    and call tcp_update_ulp() with the sk_proto of the ULP
    itself, which will most likely result in the ULP looping
    its callbacks.

    Fixes: 8a59f9d1e3d4 ("sock: Introduce sk->sk_prot->psock_update_sk_prot()")
    Signed-off-by: Jakub Kicinski
    Reviewed-by: John Fastabend
    Reviewed-by: Jakub Sitnicki
    Tested-by: Jakub Sitnicki
    Link: https://lore.kernel.org/r/20220620191353.1184629-2-kuba@kernel.org
    Signed-off-by: Paolo Abeni
    Signed-off-by: Sasha Levin

    Jakub Kicinski
     
  • [ Upstream commit 1b205d948fbb06a7613d87dcea0ff5fd8a08ed91 ]

    This reverts commit 69135c572d1f84261a6de2a1268513a7e71753e2.

    This commit was just papering over the issue, ULP should not
    get ->update() called with its own sk_prot. Each ULP would
    need to add this check.

    Fixes: 69135c572d1f ("net/tls: fix tls_sk_proto_close executed repeatedly")
    Signed-off-by: Jakub Kicinski
    Reviewed-by: John Fastabend
    Link: https://lore.kernel.org/r/20220620191353.1184629-1-kuba@kernel.org
    Signed-off-by: Paolo Abeni
    Signed-off-by: Sasha Levin

    Jakub Kicinski
     
  • [ Upstream commit 69135c572d1f84261a6de2a1268513a7e71753e2 ]

    After setting the sock ktls, update ctx->sk_proto to sock->sk_prot by
    tls_update(), so now ctx->sk_proto->close is tls_sk_proto_close(). When
    close the sock, tls_sk_proto_close() is called for sock->sk_prot->close
    is tls_sk_proto_close(). But ctx->sk_proto->close() will be executed later
    in tls_sk_proto_close(). Thus tls_sk_proto_close() executed repeatedly
    occurred. That will trigger the following bug.

    =================================================================
    KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]
    RIP: 0010:tls_sk_proto_close+0xd8/0xaf0 net/tls/tls_main.c:306
    Call Trace:

    tls_sk_proto_close+0x356/0xaf0 net/tls/tls_main.c:329
    inet_release+0x12e/0x280 net/ipv4/af_inet.c:428
    __sock_release+0xcd/0x280 net/socket.c:650
    sock_close+0x18/0x20 net/socket.c:1365

    Updating a proto which is same with sock->sk_prot is incorrect. Add proto
    and sock->sk_prot equality check at the head of tls_update() to fix it.

    Fixes: 95fa145479fb ("bpf: sockmap/tls, close can race with map free")
    Reported-by: syzbot+29c3c12f3214b85ad081@syzkaller.appspotmail.com
    Signed-off-by: Ziyang Xuan
    Signed-off-by: David S. Miller
    Signed-off-by: Sasha Levin

    Ziyang Xuan
     

18 May, 2022

1 commit

  • [ Upstream commit 3740651bf7e200109dd42d5b2fb22226b26f960a ]

    The commit cited below claims to fix a use-after-free condition after
    tls_device_down. Apparently, the description wasn't fully accurate. The
    context stayed alive, but ctx->netdev became NULL, and the offload was
    torn down without a proper fallback, so a bug was present, but a
    different kind of bug.

    Due to misunderstanding of the issue, the original patch dropped the
    refcount_dec_and_test line for the context to avoid the alleged
    premature deallocation. That line has to be restored, because it matches
    the refcount_inc_not_zero from the same function, otherwise the contexts
    that survived tls_device_down are leaked.

    This patch fixes the described issue by restoring refcount_dec_and_test.
    After this change, there is no leak anymore, and the fallback to
    software kTLS still works.

    Fixes: c55dcdd435aa ("net/tls: Fix use-after-free after the TLS device goes down and up")
    Signed-off-by: Maxim Mikityanskiy
    Reviewed-by: Tariq Toukan
    Link: https://lore.kernel.org/r/20220512091830.678684-1-maximmi@nvidia.com
    Signed-off-by: Jakub Kicinski
    Signed-off-by: Sasha Levin

    Maxim Mikityanskiy
     

09 May, 2022

1 commit

  • [ Upstream commit a0df71948e9548de819a6f1da68f5f1742258a52 ]

    Calling tls_append_frag when max_open_record_len == record->len might
    add an empty fragment to the TLS record if the call happens to be on the
    page boundary. Normally tls_append_frag coalesces the zero-sized
    fragment to the previous one, but not if it's on page boundary.

    If a resync happens then, the mlx5 driver posts dump WQEs in
    tx_post_resync_dump, and the empty fragment may become a data segment
    with byte_count == 0, which will confuse the NIC and lead to a CQE
    error.

    This commit fixes the described issue by skipping tls_append_frag on
    zero size to avoid adding empty fragments. The fix is not in the driver,
    because an empty fragment is hardly the desired behavior.

    Fixes: e8f69799810c ("net/tls: Add generic NIC offload infrastructure")
    Signed-off-by: Maxim Mikityanskiy
    Reviewed-by: Tariq Toukan
    Link: https://lore.kernel.org/r/20220426154949.159055-1-maximmi@nvidia.com
    Signed-off-by: Jakub Kicinski
    Signed-off-by: Sasha Levin

    Maxim Mikityanskiy
     

14 Apr, 2022

1 commit

  • [ Upstream commit 9381fe8c849cfbe50245ac01fc077554f6eaa0e2 ]

    The memory size of tls_ctx->rx.iv for AES128-CCM is 12 setting in
    tls_set_sw_offload(). The return value of crypto_aead_ivsize()
    for "ccm(aes)" is 16. So memcpy() require 16 bytes from 12 bytes
    memory space will trigger slab-out-of-bounds bug as following:

    ==================================================================
    BUG: KASAN: slab-out-of-bounds in decrypt_internal+0x385/0xc40 [tls]
    Read of size 16 at addr ffff888114e84e60 by task tls/10911

    Call Trace:

    dump_stack_lvl+0x34/0x44
    print_report.cold+0x5e/0x5db
    ? decrypt_internal+0x385/0xc40 [tls]
    kasan_report+0xab/0x120
    ? decrypt_internal+0x385/0xc40 [tls]
    kasan_check_range+0xf9/0x1e0
    memcpy+0x20/0x60
    decrypt_internal+0x385/0xc40 [tls]
    ? tls_get_rec+0x2e0/0x2e0 [tls]
    ? process_rx_list+0x1a5/0x420 [tls]
    ? tls_setup_from_iter.constprop.0+0x2e0/0x2e0 [tls]
    decrypt_skb_update+0x9d/0x400 [tls]
    tls_sw_recvmsg+0x3c8/0xb50 [tls]

    Allocated by task 10911:
    kasan_save_stack+0x1e/0x40
    __kasan_kmalloc+0x81/0xa0
    tls_set_sw_offload+0x2eb/0xa20 [tls]
    tls_setsockopt+0x68c/0x700 [tls]
    __sys_setsockopt+0xfe/0x1b0

    Replace the crypto_aead_ivsize() with prot->iv_size + prot->salt_size
    when memcpy() iv value in TLS_1_3_VERSION scenario.

    Fixes: f295b3ae9f59 ("net/tls: Add support of AES128-CCM based ciphers")
    Signed-off-by: Ziyang Xuan
    Reviewed-by: Jakub Kicinski
    Signed-off-by: David S. Miller
    Signed-off-by: Sasha Levin

    Ziyang Xuan
     

08 Dec, 2021

1 commit

  • commit 5961060692f8b17cd2080620a3d27b95d2ae05ca upstream.

    When the TLS cipher suite uses CCM mode, including AES CCM and
    SM4 CCM, the first byte of the B0 block is flags, and the real
    IV starts from the second byte. The XOR operation of the IV and
    rec_seq should be skip this byte, that is, add the iv_offset.

    Fixes: f295b3ae9f59 ("net/tls: Add support of AES128-CCM based ciphers")
    Signed-off-by: Tianjia Zhang
    Cc: Vakul Garg
    Cc: stable@vger.kernel.org # v5.2+
    Signed-off-by: David S. Miller
    Signed-off-by: Greg Kroah-Hartman

    Tianjia Zhang
     

01 Dec, 2021

3 commits

  • [ Upstream commit f3911f73f51d1534f4db70b516cc1fcb6be05bae ]

    We replace proto_ops whenever TLS is configured for RX. But our
    replacement also overrides sendpage_locked, which will crash
    unless TX is also configured. Similarly we plug both of those
    in for TLS_HW (NIC crypto offload) even tho TLS_HW has a completely
    different implementation for TX.

    Last but not least we always plug in something based on inet_stream_ops
    even though a few of the callbacks differ for IPv6 (getname, release,
    bind).

    Use a callback building method similar to what we do for struct proto.

    Fixes: c46234ebb4d1 ("tls: RX path for ktls")
    Fixes: d4ffb02dee2f ("net/tls: enable sk_msg redirect to tls socket egress")
    Signed-off-by: Jakub Kicinski
    Signed-off-by: Sasha Levin

    Jakub Kicinski
     
  • [ Upstream commit e062fe99cccd9ff9f232e593d163ecabd244fae8 ]

    recvmsg() will put peek()ed and partially read records onto the rx_list.
    splice_read() needs to consult that list otherwise it may miss data.
    Align with recvmsg() and also put partially-read records onto rx_list.
    tls_sw_advance_skb() is pretty pointless now and will be removed in
    net-next.

    Fixes: 692d7b5d1f91 ("tls: Fix recvmsg() to be able to peek across multiple records")
    Signed-off-by: Jakub Kicinski
    Signed-off-by: Sasha Levin

    Jakub Kicinski
     
  • [ Upstream commit 520493f66f6822551aef2879cd40207074fe6980 ]

    We don't support splicing control records. TLS 1.3 changes moved
    the record type check into the decrypt if(). The skb may already
    be decrypted and still be an alert.

    Note that decrypt_skb_update() is idempotent and updates ctx->decrypted
    so the if() is pointless.

    Reorder the check for decryption errors with the content type check
    while touching them. This part is not really a bug, because if
    decryption failed in TLS 1.3 content type will be DATA, and for
    TLS 1.2 it will be correct. Nevertheless its strange to touch output
    before checking if the function has failed.

    Fixes: fedf201e1296 ("net: tls: Refactor control message handling on recv")
    Signed-off-by: Jakub Kicinski
    Signed-off-by: Sasha Levin

    Jakub Kicinski
     

28 Oct, 2021

2 commits

  • sk->sk_err contains a positive number, yet async_wait.err wants the
    opposite. Fix the missed sign flip, which Jakub caught by inspection.

    Fixes: a42055e8d2c3 ("net/tls: Add support for async encryption of records for performance")
    Suggested-by: Jakub Kicinski
    Signed-off-by: Daniel Jordan
    Signed-off-by: David S. Miller

    Daniel Jordan
     
  • sk->sk_err appears to expect a positive value, a convention that ktls
    doesn't always follow and that leads to memory corruption in other code.
    For instance,

    [kworker]
    tls_encrypt_done(..., err=)
    tls_err_abort(.., err)
    sk->sk_err = err;

    [task]
    splice_from_pipe_feed
    ...
    tls_sw_do_sendpage
    if (sk->sk_err) {
    ret = -sk->sk_err; // ret is positive

    splice_from_pipe_feed (continued)
    ret = actor(...) // ret is still positive and interpreted as bytes
    // written, resulting in underflow of buf->len and
    // sd->len, leading to huge buf->offset and bogus
    // addresses computed in later calls to actor()

    Fix all tls_err_abort() callers to pass a negative error code
    consistently and centralize the error-prone sign flip there, throwing in
    a warning to catch future misuse and uninlining the function so it
    really does only warn once.

    Cc: stable@vger.kernel.org
    Fixes: c46234ebb4d1e ("tls: RX path for ktls")
    Reported-by: syzbot+b187b77c8474f9648fae@syzkaller.appspotmail.com
    Signed-off-by: Daniel Jordan
    Signed-off-by: David S. Miller

    Daniel Jordan
     

27 Oct, 2021

1 commit

  • The proto ops ->stream_memory_read() is currently only used
    by TCP to check whether psock queue is empty or not. We need
    to rename it before reusing it for non-TCP protocols, and
    adjust the exsiting users accordingly.

    Signed-off-by: Cong Wang
    Signed-off-by: Alexei Starovoitov
    Link: https://lore.kernel.org/bpf/20211008203306.37525-2-xiyou.wangcong@gmail.com

    Cong Wang
     

30 Jun, 2021

1 commit


22 Jun, 2021

1 commit

  • We got multiple reports that multi_chunk_sendfile test
    case from tls selftest fails. This was sort of expected,
    as the original fix was never applied (see it in the first
    Link:). The test in question uses sendfile() with count
    larger than the size of the underlying file. This will
    make splice set MSG_MORE on all sendpage calls, meaning
    TLS will never close and flush the last partial record.

    Eric seem to have addressed a similar problem in
    commit 35f9c09fe9c7 ("tcp: tcp_sendpages() should call tcp_push() once")
    by introducing MSG_SENDPAGE_NOTLAST. Unlike MSG_MORE
    MSG_SENDPAGE_NOTLAST is not set on the last call
    of a "pipefull" of data (PIPE_DEF_BUFFERS == 16,
    so every 16 pages or whenever we run out of data).

    Having a break every 16 pages should be fine, TLS
    can pack exactly 4 pages into a record, so for
    aligned reads there should be no difference,
    unaligned may see one extra record per sendpage().

    Sticking to TCP semantics seems preferable to modifying
    splice, but we can revisit it if real life scenarios
    show a regression.

    Reported-by: Vadim Fedorenko
    Reported-by: Seth Forshee
    Link: https://lore.kernel.org/netdev/1591392508-14592-1-git-send-email-pooja.trivedi@stackpath.com/
    Fixes: 3c4d7559159b ("tls: kernel TLS support")
    Signed-off-by: Jakub Kicinski
    Tested-by: Seth Forshee
    Signed-off-by: David S. Miller

    Jakub Kicinski
     

08 Jun, 2021

2 commits


02 Jun, 2021

2 commits

  • When a netdev with active TLS offload goes down, tls_device_down is
    called to stop the offload and tear down the TLS context. However, the
    socket stays alive, and it still points to the TLS context, which is now
    deallocated. If a netdev goes up, while the connection is still active,
    and the data flow resumes after a number of TCP retransmissions, it will
    lead to a use-after-free of the TLS context.

    This commit addresses this bug by keeping the context alive until its
    normal destruction, and implements the necessary fallbacks, so that the
    connection can resume in software (non-offloaded) kTLS mode.

    On the TX side tls_sw_fallback is used to encrypt all packets. The RX
    side already has all the necessary fallbacks, because receiving
    non-decrypted packets is supported. The thing needed on the RX side is
    to block resync requests, which are normally produced after receiving
    non-decrypted packets.

    The necessary synchronization is implemented for a graceful teardown:
    first the fallbacks are deployed, then the driver resources are released
    (it used to be possible to have a tls_dev_resync after tls_dev_del).

    A new flag called TLS_RX_DEV_DEGRADED is added to indicate the fallback
    mode. It's used to skip the RX resync logic completely, as it becomes
    useless, and some objects may be released (for example, resync_async,
    which is allocated and freed by the driver).

    Fixes: e8f69799810c ("net/tls: Add generic NIC offload infrastructure")
    Signed-off-by: Maxim Mikityanskiy
    Reviewed-by: Tariq Toukan
    Signed-off-by: David S. Miller

    Maxim Mikityanskiy
     
  • RCU synchronization is guaranteed to finish in finite time, unlike a
    busy loop that polls a flag. This patch is a preparation for the bugfix
    in the next patch, where the same synchronize_net() call will also be
    used to sync with the TX datapath.

    Signed-off-by: Maxim Mikityanskiy
    Reviewed-by: Tariq Toukan
    Signed-off-by: David S. Miller

    Maxim Mikityanskiy
     

28 May, 2021

1 commit


15 May, 2021

1 commit


13 May, 2021

1 commit


28 Apr, 2021

1 commit

  • record is being initialized to ctx->open_record but this is never
    read as record is overwritten later on. Remove the redundant
    initialization.

    Cleans up the following clang-analyzer warning:

    net/tls/tls_device.c:421:26: warning: Value stored to 'record' during
    its initialization is never read [clang-analyzer-deadcode.DeadStores].

    Reported-by: Abaci Robot
    Signed-off-by: Jiapeng Chong
    Signed-off-by: David S. Miller

    Jiapeng Chong
     

02 Apr, 2021

1 commit

  • Although these two functions are only used by TCP, they are not
    specific to TCP at all, both operate on skmsg and ingress_msg,
    so fit in net/core/skmsg.c very well.

    And we will need them for non-TCP, so rename and move them to
    skmsg.c and export them to modules.

    Signed-off-by: Cong Wang
    Signed-off-by: Alexei Starovoitov
    Link: https://lore.kernel.org/bpf/20210331023237.41094-13-xiyou.wangcong@gmail.com

    Cong Wang
     

25 Mar, 2021

1 commit


12 Feb, 2021

1 commit


19 Jan, 2021

2 commits


15 Dec, 2020

1 commit

  • proc_fs was used, in af_packet, without a surrounding #ifdef,
    although there is no hard dependency on proc_fs.
    That caused the initialization of the af_packet module to fail
    when CONFIG_PROC_FS=n.

    Specifically, proc_create_net() was used in af_packet.c,
    and when it fails, packet_net_init() returns -ENOMEM.
    It will always fail when the kernel is compiled without proc_fs,
    because, proc_create_net() for example always returns NULL.

    The calling order that starts in af_packet.c is as follows:
    packet_init()
    register_pernet_subsys()
    register_pernet_operations()
    __register_pernet_operations()
    ops_init()
    ops->init() (packet_net_ops.init=packet_net_init())
    proc_create_net()

    It worked in the past because register_pernet_subsys()'s return value
    wasn't checked before this Commit 36096f2f4fa0 ("packet: Fix error path in
    packet_init.").
    It always returned an error, but was not checked before, so everything
    was working even when CONFIG_PROC_FS=n.

    The fix here is simply to add the necessary #ifdef.

    This also fixes a similar error in tls_proc.c, that was found by Jakub
    Kicinski.

    Fixes: d26b698dd3cd ("net/tls: add skeleton of MIB statistics")
    Fixes: 36096f2f4fa0 ("packet: Fix error path in packet_init")
    Signed-off-by: Yonatan Linik
    Signed-off-by: Jakub Kicinski

    Yonatan Linik
     

02 Dec, 2020

1 commit

  • Recent changes made to remove AES constants started using protocol
    aware salt_size. ctx->prot_info's salt_size is filled in tls sw case,
    but not in tls offload mode, and was working so far because of the
    hard coded value was used.

    Fixes: 6942a284fb3e ("net/tls: make inline helpers protocol-aware")
    Signed-off-by: Rohit Maheshwari
    Link: https://lore.kernel.org/r/20201201090752.27355-1-rohitm@chelsio.com
    Signed-off-by: Jakub Kicinski

    Rohit Maheshwari
     

28 Nov, 2020

4 commits


26 Nov, 2020

1 commit

  • tls_device_offload_cleanup_rx doesn't clear tls_ctx->netdev after
    calling tls_dev_del if TLX TX offload is also enabled. Clearing
    tls_ctx->netdev gets postponed until tls_device_gc_task. It leaves a
    time frame when tls_device_down may get called and call tls_dev_del for
    RX one extra time, confusing the driver, which may lead to a crash.

    This patch corrects this racy behavior by adding a flag to prevent
    tls_device_down from calling tls_dev_del the second time.

    Fixes: e8f69799810c ("net/tls: Add generic NIC offload infrastructure")
    Signed-off-by: Maxim Mikityanskiy
    Signed-off-by: Saeed Mahameed
    Link: https://lore.kernel.org/r/20201125221810.69870-1-saeedm@nvidia.com
    Signed-off-by: Jakub Kicinski

    Maxim Mikityanskiy
     

21 Nov, 2020

1 commit

  • In case when tcp socket received FIN after some data and the
    parser haven't started before reading data caller will receive
    an empty buffer. This behavior differs from plain TCP socket and
    leads to special treating in user-space.
    The flow that triggers the race is simple. Server sends small
    amount of data right after the connection is configured to use TLS
    and closes the connection. In this case receiver sees TLS Handshake
    data, configures TLS socket right after Change Cipher Spec record.
    While the configuration is in process, TCP socket receives small
    Application Data record, Encrypted Alert record and FIN packet. So
    the TCP socket changes sk_shutdown to RCV_SHUTDOWN and sk_flag with
    SK_DONE bit set. The received data is not parsed upon arrival and is
    never sent to user-space.

    Patch unpauses parser directly if we have unparsed data in tcp
    receive queue.

    Fixes: fcf4793e278e ("tls: check RCV_SHUTDOWN in tls_wait_data")
    Signed-off-by: Vadim Fedorenko
    Link: https://lore.kernel.org/r/1605801588-12236-1-git-send-email-vfedorenko@novek.ru
    Signed-off-by: Jakub Kicinski

    Vadim Fedorenko
     

18 Nov, 2020

1 commit

  • In async_resync mode, we log the TCP seq of records until the async request
    is completed. Later, in case one of the logged seqs matches the resync
    request, we return it, together with its record serial number. Before this
    fix, we mistakenly returned the serial number of the current record
    instead.

    Fixes: ed9b7646b06a ("net/tls: Add asynchronous resync")
    Signed-off-by: Tariq Toukan
    Reviewed-by: Boris Pismenny
    Link: https://lore.kernel.org/r/20201115131448.2702-1-tariqt@nvidia.com
    Signed-off-by: Jakub Kicinski

    Tariq Toukan