From: Andres Beltran <lkmlab...@gmail.com> Date: Tue, 28 Jul 2020 18:53:21 -0400
> For additional robustness in the face of Hyper-V errors or malicious > behavior, validate all values that originate from packets that Hyper-V > has sent to the guest in the host-to-guest ring buffer. Ensure that > invalid values cannot cause indexing off the end of an array, or > subvert an existing validation via integer overflow. Ensure that > outgoing packets do not have any leftover guest memory that has not > been zeroed out. > > Cc: David S. Miller <da...@davemloft.net> > Cc: Jakub Kicinski <k...@kernel.org> > Cc: netdev@vger.kernel.org > Signed-off-by: Andres Beltran <lkmlab...@gmail.com> I need hyperv maintainer reviews before I will apply this. Thank you.