Thanks for your help, I found the bug

You can find it in the next pax/grsec version or here:
http://www.grsecurity.net/~ephox/overfl ... 20130109.c
Excellent, ephox!ephox wrote:Hi,
Thanks for your help, I found the bug. I created a temporary fix for it. I will fix it properly in a later version.
note that we've always included experimental or in-progress features in PaX and grsec, and we usually say so when we announce them (in this case, the mailing list and the blog). as for the risk of false positives, they'll be there for some time because finding and eliminating them is not easy. this is because at the point the plugin gets access to the internal representation of the code it is already too late to tell intentional overflows (those intoduced by gcc itself due to canonicalization of expressions) from accidental ones. if the gcc plugin system gave access to the language frontends, things could be much improved but that's not the case today.Neokernsec wrote:In the interests of assessing "risk" to some of these features in PaX, would you say the overflow plugin is "high risk" with respect to being something that could cause these sorts of panics? I realise this is a new feature for grsecurity, and also can appreciate how radical it is in the sense that it works with the compiler to perform some additional semantic validation.
the panic was a sideeffect of trying to kill the offending process that triggered the (false positive) size overflow check which in this case happened in irq context.I've been a LONG TIME user of grsec patches, and this is the first time I've had *ANY* "stable" version that caused panics of any kind.