CONFIG_PAX_SIZE_OVERFLOW breaks 2.6.32.59 ?

Discuss usability issues, general maintenance, and general support issues for a grsecurity-enabled system.

CONFIG_PAX_SIZE_OVERFLOW breaks 2.6.32.59 ?

Postby mnalis » Tue Mar 20, 2012 9:00 am

kernel is vanilla 2.6.32.59 patched with grsecurity-2.9-2.6.32.59-201203181400.patch

I've enabled new[1] option CONFIG_PAX_SIZE_OVERFLOW, and now kernel does not boot with:

Loading kernel module softdog.
PAX: size overflow detected in function strndup_user mm/util.c:203
Pid: 686, comm: modprobe Not tainted 2.6.32.59-grsec201203181400 #6
Call Trace:
[<ffffffff810e4015>] report_size_overflow+0x30/0x3a
[<ffffffff810b6edd>] strndup_user+0x3d/0x236
[<ffffffff8106ca35>] load_module+0x411/0x18fb
[<ffffffff811d032b>] ? gr_acl_is_capable+0x2f/0x204
[<ffffffff8106df4d>] sys_init_module+0x5e/0x24c
[<ffffffff810029eb>] system_call_fastpath+0x18/0x1d
Killed
Loading kernel module sky2.

If I disable CONFIG_PAX_SIZE_OVERFLOW it boots normally... any help?

[1] new as opposed to my previous working kernel which was 2.6.32.57-grsec201202200919
mnalis
 
Posts: 57
Joined: Fri Sep 29, 2006 11:23 am

Re: CONFIG_PAX_SIZE_OVERFLOW breaks 2.6.32.59 ?

Postby ephox » Tue Mar 20, 2012 4:41 pm

Thanks for the report, this will be fixed in the next patch.
ephox
 
Posts: 134
Joined: Tue Mar 20, 2012 4:36 pm


Return to grsecurity support