Hi all,

This set is a continuation of the work for hardening the VMBus drivers
against an erroneous or malicious host.  This is based on hyperv-next.

Thanks,
  Andrea

Andrea Parri (Microsoft) (6):
  Drivers: hv: vmbus: Initialize memory to be sent to the host
  Drivers: hv: vmbus: Avoid double fetch of msgtype in
    vmbus_on_msg_dpc()
  Drivers: hv: vmbus: Avoid double fetch of payload_size in
    vmbus_on_msg_dpc()
  Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind()
  Drivers: hv: vmbus: Resolve race condition in vmbus_onoffer_rescind()
  Drivers: hv: vmbus: Do not allow overwriting
    vmbus_connection.channels[]

 drivers/hv/channel.c      |  4 ++--
 drivers/hv/channel_mgmt.c | 45 +++++++++++++++++++++++++++------------
 drivers/hv/hyperv_vmbus.h |  2 +-
 drivers/hv/vmbus_drv.c    | 33 ++++++++++++++++------------
 include/linux/hyperv.h    |  1 +
 5 files changed, 54 insertions(+), 31 deletions(-)

-- 
2.25.1

Reply via email to