Re: [PATCH] x86/hyper-v: Validate entire GVA range for non-canonical addresses during PV TLB flush

From: Sean Christopherson

Date: Thu Mar 05 2026 - 12:09:00 EST


On Thu, 19 Feb 2026 21:05:49 +0100, Manuel Andreas wrote:
> In KVM guests with Hyper-V hypercalls enabled, the hypercalls
> HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST and HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX
> allow a guest to request invalidation of portions of a virtual TLB.
> For this, the hypercall parameter includes a list of GVAs that are supposed
> to be invalidated.
>
> Currently, only the base GVA is checked to be canonical. In reality,
> this check needs to be performed for the entire range of GVAs.
> This still enables guests running on Intel hardware to trigger a
> WARN_ONCE in the host (see prior commit below).
>
> [...]

Applied to kvm-x86 fixes, thanks!

[1/1] x86/hyper-v: Validate entire GVA range for non-canonical addresses during PV TLB flush
https://github.com/kvm-x86/linux/commit/45692aa4a7ce

--
https://github.com/kvm-x86/linux/tree/next