On Mon, 6 Jul 2020 12:09:28 -0400, Andres Beltran wrote: > For additional robustness in the face of Hyper-V errors or malicious > behavior, validate all values that originate from packets that > Hyper-V has sent to the guest. Ensure that invalid values cannot > cause data being copied out of the bounds of the source buffer > when calling memcpy. Ensure that outgoing packets do not have any > leftover guest memory that has not been zeroed out. Applied to 5.9/scsi-queue, thanks! [1/1] scsi: storvsc: Add validation for untrusted Hyper-V values https://git.kernel.org/mkp/scsi/c/0a76566595bf -- Martin K. Petersen Oracle Linux Engineering