From: Andres Beltran <[email protected]> Date: Tue, 28 Jul 2020 18:53:21 -0400
> For additional robustness in the face of Hyper-V errors or malicious > behavior, validate all values that originate from packets that Hyper-V > has sent to the guest in the host-to-guest ring buffer. Ensure that > invalid values cannot cause indexing off the end of an array, or > subvert an existing validation via integer overflow. Ensure that > outgoing packets do not have any leftover guest memory that has not > been zeroed out. > > Cc: David S. Miller <[email protected]> > Cc: Jakub Kicinski <[email protected]> > Cc: [email protected] > Signed-off-by: Andres Beltran <[email protected]> I need hyperv maintainer reviews before I will apply this. Thank you.

