From: Andres Beltran <lkmlabelt@xxxxxxxxx> Sent: Monday, July 6, 2020 9:09 AM > > For additional robustness in the face of Hyper-V errors or malicious > behavior, validate all values that originate from packets that > Hyper-V has sent to the guest. Ensure that invalid values cannot > cause data being copied out of the bounds of the source buffer > when calling memcpy. Ensure that outgoing packets do not have any > leftover guest memory that has not been zeroed out. > > Cc: James E.J. Bottomley <jejb@xxxxxxxxxxxxx> > Cc: Martin K. Petersen <martin.petersen@xxxxxxxxxx> > Cc: linux-scsi@xxxxxxxxxxxxxxx > Signed-off-by: Andres Beltran <lkmlabelt@xxxxxxxxx> > --- > drivers/scsi/storvsc_drv.c | 11 +++++++++++ > 1 file changed, 11 insertions(+) > Reviewed-by: Michael Kelley <mikelley@xxxxxxxxxxxxx>