From: Andres Beltran <[email protected]> Sent: Monday, July 6, 2020 9:09 AM > > For additional robustness in the face of Hyper-V errors or malicious > behavior, validate all values that originate from packets that > Hyper-V has sent to the guest. Ensure that invalid values cannot > cause data being copied out of the bounds of the source buffer > when calling memcpy. Ensure that outgoing packets do not have any > leftover guest memory that has not been zeroed out. > > Cc: James E.J. Bottomley <[email protected]> > Cc: Martin K. Petersen <[email protected]> > Cc: [email protected] > Signed-off-by: Andres Beltran <[email protected]> > --- > drivers/scsi/storvsc_drv.c | 11 +++++++++++ > 1 file changed, 11 insertions(+) >
Reviewed-by: Michael Kelley <[email protected]>

