When booting an SEV-SNP guest with a sufficiently large amount of memory (1TB+), the host can experience CPU soft lockups when running an operation in kvm_vm_set_mem_attributes() to set memory attributes on the whole range of guest memory. watchdog: BUG: soft lockup - CPU#8 stuck for 26s! [qemu-kvm:6372] CPU: 8 UID: 0 PID: 6372 Comm: qemu-kvm Kdump: loaded Not tainted 6.15.0-rc7.20250520.el9uek.rc1.x86_64 #1 PREEMPT(voluntary) Hardware name: Oracle Corporation ORACLE SERVER E4-2c/Asm,MB Tray,2U,E4-2c, BIOS 78016600 11/13/2024 RIP: 0010:xas_create+0x78/0x1f0 Code: 00 00 00 41 80 fc 01 0f 84 82 00 00 00 ba 06 00 00 00 bd 06 00 00 00 49 8b 45 08 4d 8d 65 08 41 39 d6 73 20 83 ed 06 48 85 c0 <74> 67 48 89 c2 83 e2 03 48 83 fa 02 75 0c 48 3d 00 10 00 00 0f 87 RSP: 0018:ffffad890a34b940 EFLAGS: 00000286 RAX: ffff96f30b261daa RBX: ffffad890a34b9c8 RCX: 0000000000000000 RDX: 000000000000001e RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000018 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: ffffad890a356868 R13: ffffad890a356860 R14: 0000000000000000 R15: ffffad890a356868 FS: 00007f5578a2a400(0000) GS:ffff97ed317e1000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f015c70fb18 CR3: 00000001109fd006 CR4: 0000000000f70ef0 PKRU: 55555554 Call Trace: <TASK> xas_store+0x58/0x630 ? srso_alias_return_thunk+0x5/0xfbef5 ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 __xa_store+0xa5/0x130 xa_store+0x2c/0x50 kvm_vm_set_mem_attributes+0x343/0x710 [kvm] kvm_vm_ioctl+0x796/0xab0 [kvm] ? srso_alias_return_thunk+0x5/0xfbef5 ? srso_alias_return_thunk+0x5/0xfbef5 ? rseq_ip_fixup+0x8c/0x1e0 __x64_sys_ioctl+0xa3/0xd0 do_syscall_64+0x8c/0x7a0 ? srso_alias_return_thunk+0x5/0xfbef5 ? __alloc_frozen_pages_noprof+0x18d/0x340 ? srso_alias_return_thunk+0x5/0xfbef5 ? try_charge_memcg+0x76/0x640 ? srso_alias_return_thunk+0x5/0xfbef5 ? __count_memcg_events+0xbb/0x150 ? srso_alias_return_thunk+0x5/0xfbef5 ? __mod_memcg_lruvec_state+0xb6/0x1b0 ? srso_alias_return_thunk+0x5/0xfbef5 ? __lruvec_stat_mod_folio+0x83/0xd0 ? srso_alias_return_thunk+0x5/0xfbef5 ? srso_alias_return_thunk+0x5/0xfbef5 ? srso_alias_return_thunk+0x5/0xfbef5 ? set_ptes.isra.0+0x36/0x90 ? srso_alias_return_thunk+0x5/0xfbef5 ? do_anonymous_page+0x103/0x4d0 ? srso_alias_return_thunk+0x5/0xfbef5 ? __handle_mm_fault+0x397/0x6f0 ? srso_alias_return_thunk+0x5/0xfbef5 ? __count_memcg_events+0xbb/0x150 ? srso_alias_return_thunk+0x5/0xfbef5 ? count_memcg_events.constprop.0+0x26/0x50 ? srso_alias_return_thunk+0x5/0xfbef5 ? handle_mm_fault+0x245/0x350 ? srso_alias_return_thunk+0x5/0xfbef5 ? do_user_addr_fault+0x221/0x686 ? srso_alias_return_thunk+0x5/0xfbef5 ? arch_exit_to_user_mode_prepare.isra.0+0x1e/0xd0 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f5578d031bb Code: ff ff ff 85 c0 79 9b 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 2d 4c 0f 00 f7 d8 64 89 01 48 RSP: 002b:00007ffe0a742b88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 000000004020aed2 RCX: 00007f5578d031bb RDX: 00007ffe0a742c80 RSI: 000000004020aed2 RDI: 000000000000000b RBP: 0000010000000000 R08: 0000010000000000 R09: 0000017680000000 R10: 0000000000000080 R11: 0000000000000246 R12: 00005575e5f95120 R13: 00007ffe0a742c80 R14: 0000000000000008 R15: 00005575e5f961e0 Limit the range of memory per operation when setting the attributes to avoid holding kvm->slots_lock for too long and causing a cpu soft lockup. Fixes: 5a475554db1e ("KVM: Introduce per-page memory attributes") Cc: stable@xxxxxxxxxxxxxxx # 6.12.x Signed-off-by: Liam Merwick <liam.merwick@xxxxxxxxxx> --- virt/kvm/kvm_main.c | 37 ++++++++++++++++++++++++++++++++----- 1 file changed, 32 insertions(+), 5 deletions(-) diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 69782df3617f..6e6d404a7d7a 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -2533,7 +2533,9 @@ static int kvm_vm_set_mem_attributes(struct kvm *kvm, gfn_t start, gfn_t end, static int kvm_vm_ioctl_set_mem_attributes(struct kvm *kvm, struct kvm_memory_attributes *attrs) { - gfn_t start, end; + gfn_t start, end, section_start, section_end; + u64 size, size_remaining; + int ret = 0; /* flags is currently not used. */ if (attrs->flags) @@ -2545,9 +2547,6 @@ static int kvm_vm_ioctl_set_mem_attributes(struct kvm *kvm, if (!PAGE_ALIGNED(attrs->address) || !PAGE_ALIGNED(attrs->size)) return -EINVAL; - start = attrs->address >> PAGE_SHIFT; - end = (attrs->address + attrs->size) >> PAGE_SHIFT; - /* * xarray tracks data using "unsigned long", and as a result so does * KVM. For simplicity, supports generic attributes only on 64-bit @@ -2555,7 +2554,35 @@ static int kvm_vm_ioctl_set_mem_attributes(struct kvm *kvm, */ BUILD_BUG_ON(sizeof(attrs->attributes) != sizeof(unsigned long)); - return kvm_vm_set_mem_attributes(kvm, start, end, attrs->attributes); + size_remaining = attrs->size; + section_start = start = attrs->address >> PAGE_SHIFT; + section_end = end = (attrs->address + attrs->size) >> PAGE_SHIFT; + while (size_remaining > 0) { + /* + * If the range of memory is greater than 512GB, clamp it for + * this iteration to 512GB. This avoids a potential CPU soft + * lockup when run on a larger range for an SEV-SNP guest. + * (measured at 940GB so there is some headroom, just in case). + */ + if (size_remaining > SZ_512G) { + size = SZ_512G; + size_remaining -= size; + section_end = section_start + (size >> PAGE_SHIFT); + } else { + size = size_remaining; + size_remaining = 0; + section_end = end; + WARN_ON_ONCE(section_end != (section_start + (size >> PAGE_SHIFT))); + } + + ret = kvm_vm_set_mem_attributes(kvm, section_start, section_end, attrs->attributes); + if (ret != 0) + break; + + section_start = section_end; + } + + return ret; } #endif /* CONFIG_KVM_GENERIC_MEMORY_ATTRIBUTES */ -- 2.47.1