Hi all, This set is a continuation of the work for hardening the VMBus drivers against an erroneous or malicious host. This is based on hyperv-next. Thanks, Andrea Andrea Parri (Microsoft) (6): Drivers: hv: vmbus: Initialize memory to be sent to the host Drivers: hv: vmbus: Avoid double fetch of msgtype in vmbus_on_msg_dpc() Drivers: hv: vmbus: Avoid double fetch of payload_size in vmbus_on_msg_dpc() Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() Drivers: hv: vmbus: Resolve race condition in vmbus_onoffer_rescind() Drivers: hv: vmbus: Do not allow overwriting vmbus_connection.channels[] drivers/hv/channel.c | 4 ++-- drivers/hv/channel_mgmt.c | 45 +++++++++++++++++++++++++++------------ drivers/hv/hyperv_vmbus.h | 2 +- drivers/hv/vmbus_drv.c | 33 ++++++++++++++++------------ include/linux/hyperv.h | 1 + 5 files changed, 54 insertions(+), 31 deletions(-) -- 2.25.1