kernel_samsung_a53x/drivers/net/ethernet/freescale/dpaa
Sean Anderson 3ad5828caa net: dpaa: Pad packets to ETH_ZLEN
[ Upstream commit cbd7ec083413c6a2e0c326d49e24ec7d12c7a9e0 ]

When sending packets under 60 bytes, up to three bytes of the buffer
following the data may be leaked. Avoid this by extending all packets to
ETH_ZLEN, ensuring nothing is leaked in the padding. This bug can be
reproduced by running

	$ ping -s 11 destination

Fixes: 9ad1a3749333 ("dpaa_eth: add support for DPAA Ethernet")
Suggested-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: Sean Anderson <sean.anderson@linux.dev>
Reviewed-by: Eric Dumazet <edumazet@google.com>
Link: https://patch.msgid.link/20240910143144.1439910-1-sean.anderson@linux.dev
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2024-11-23 23:21:13 +01:00
..
dpaa_eth.c net: dpaa: Pad packets to ETH_ZLEN 2024-11-23 23:21:13 +01:00
dpaa_eth.h Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
dpaa_eth_sysfs.c Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
dpaa_eth_trace.h Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
dpaa_ethtool.c net: dpaa: avoid on-stack arrays of NR_CPUS elements 2024-11-23 23:21:06 +01:00
Kconfig Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00
Makefile Import A536BXXU9EXDC 2024-06-15 16:02:09 -03:00