From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6B325ECAAD1 for ; Tue, 30 Aug 2022 17:37:21 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232161AbiH3RhT (ORCPT ); Tue, 30 Aug 2022 13:37:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48124 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232155AbiH3Rgx (ORCPT ); Tue, 30 Aug 2022 13:36:53 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6D61812EC51; Tue, 30 Aug 2022 10:33:45 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 0A3E7B81D24; Tue, 30 Aug 2022 17:26:54 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A9B71C433D6; Tue, 30 Aug 2022 17:26:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1661880412; bh=xdlYmvdwMdSGOG7QzbxeM1ku4krKuvDuV1ZgWmDgk1I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=U4RhTE1F6zPlqKNLei4ISLPDAfIoo6w6RY6X6zlx2993laVYv02DpHSSSxxonJpKK TSMOMM492I++TBWx0a6UXwsdxi5xxiXudhHES+CWWZUGz5zsQuoUBNdrP2ZitfluxO 4Xi5+yv0LOAsWwUnWCUezDoPN9eJIutWFd13DlLo4MYN9U1rk1YJ4/92Mn84HrTR27 3KHKaVwjtDZFj6s03ZNDZm5norBeKcUawKCCXanj52WBi/r2hIv93Aty0Ik2Gb+0hR 8i7EsbkmvXxDUQcNJ8iWY9Y1c4BwQrBOk69iAsdJCCGLK2MEiHrcpJkmZ1EEpYaoAa pf5CQ3s5nLKEg== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Mark Brown , Catalin Marinas , Will Deacon , Sasha Levin , mark.rutland@arm.com, ebiederm@xmission.com, elver@google.com, seanjc@google.com, david.engraf@sysgo.com, linux-arm-kernel@lists.infradead.org Subject: [PATCH AUTOSEL 4.14 6/8] arm64/signal: Raise limit on stack frames Date: Tue, 30 Aug 2022 13:26:29 -0400 Message-Id: <20220830172631.581969-6-sashal@kernel.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220830172631.581969-1-sashal@kernel.org> References: <20220830172631.581969-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mark Brown [ Upstream commit 7ddcaf78e93c9282b4d92184f511b4d5bee75355 ] The signal code has a limit of 64K on the size of a stack frame that it will generate, if this limit is exceeded then a process will be killed if it receives a signal. Unfortunately with the advent of SME this limit is too small - the maximum possible size of the ZA register alone is 64K. This is not an issue for practical systems at present but is easily seen using virtual platforms. Raise the limit to 256K, this is substantially more than could be used by any current architecture extension. Signed-off-by: Mark Brown Acked-by: Catalin Marinas Link: https://lore.kernel.org/r/20220817182324.638214-2-broonie@kernel.org Signed-off-by: Will Deacon Signed-off-by: Sasha Levin --- arch/arm64/kernel/signal.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/arm64/kernel/signal.c b/arch/arm64/kernel/signal.c index 43442b3a463f5..1b3973de417ec 100644 --- a/arch/arm64/kernel/signal.c +++ b/arch/arm64/kernel/signal.c @@ -97,7 +97,7 @@ static size_t sigframe_size(struct rt_sigframe_user_layout const *user) * not taken into account. This limit is not a guarantee and is * NOT ABI. */ -#define SIGFRAME_MAXSZ SZ_64K +#define SIGFRAME_MAXSZ SZ_256K static int __sigframe_alloc(struct rt_sigframe_user_layout *user, unsigned long *offset, size_t size, bool extend) -- 2.35.1