Re: [PATCH] x86/hyper-v: Validate entire GVA range for non-canonical addresses during PV TLB flush
From: Sean Christopherson
Date: Thu Mar 05 2026 - 12:09:00 EST
On Thu, 19 Feb 2026 21:05:49 +0100, Manuel Andreas wrote:
> In KVM guests with Hyper-V hypercalls enabled, the hypercalls
> HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST and HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX
> allow a guest to request invalidation of portions of a virtual TLB.
> For this, the hypercall parameter includes a list of GVAs that are supposed
> to be invalidated.
>
> Currently, only the base GVA is checked to be canonical. In reality,
> this check needs to be performed for the entire range of GVAs.
> This still enables guests running on Intel hardware to trigger a
> WARN_ONCE in the host (see prior commit below).
>
> [...]
Applied to kvm-x86 fixes, thanks!
[1/1] x86/hyper-v: Validate entire GVA range for non-canonical addresses during PV TLB flush
https://github.com/kvm-x86/linux/commit/45692aa4a7ce
--
https://github.com/kvm-x86/linux/tree/next