size overflow in kernel/cpuset.c

Discuss usability issues, general maintenance, and general support issues for a grsecurity-enabled system.

size overflow in kernel/cpuset.c

Postby boris64 » Tue Jan 07, 2014 8:50 am

Hey folks,

since kernel-3.12.* libvirtd doesn't start anymore. On 3.11 everything was ok.

Code: Select all
Jan  7 13:35:46 spectre20xx kernel: [23243.593977] PAX: size overflow detected in function cpuset_common_file_read kernel/cpuset.c:1790 cicus.378_48 min, count: 2
Jan  7 13:35:46 spectre20xx kernel: [23243.593981] CPU: 3 PID: 287671 Comm: libvirtd Not tainted 3.12.6-hardened-r4-20xx-v1.90aa #1
Jan  7 13:35:46 spectre20xx kernel: [23243.593982] Hardware name: System manufacturer System Product Name/P8H67-M PRO, BIOS 1106 10/17/2011
Jan  7 13:35:46 spectre20xx kernel: [23243.593984]  0000000000000000 00000353cc0963d0 ffffffff814c05d3 ffff8805a6784000
Jan  7 13:35:46 spectre20xx kernel: [23243.593986]  ffffffff8113da5b 8000000000000000 ffffffff810cd0d3 ffff880812456020
Jan  7 13:35:46 spectre20xx kernel: [23243.593987]  ffff88081f0f1f00 ffff8807f33b0000 00000353cc0963d0 0000000000002000
Jan  7 13:35:46 spectre20xx kernel: [23243.593989] Call Trace:
Jan  7 13:35:46 spectre20xx kernel: [23243.593995]  [<ffffffff814c05d3>] ? dump_stack+0x4d/0x7d
Jan  7 13:35:46 spectre20xx kernel: [23243.593999]  [<ffffffff8113da5b>] ? report_size_overflow+0x21/0x2b
Jan  7 13:35:46 spectre20xx kernel: [23243.594001]  [<ffffffff810cd0d3>] ? cpuset_common_file_read+0x102/0x14a
Jan  7 13:35:46 spectre20xx kernel: [23243.594004]  [<ffffffff810c785c>] ? cgroup_file_read+0x58/0x13b
Jan  7 13:35:46 spectre20xx kernel: [23243.594006]  [<ffffffff811391e3>] ? vfs_read+0x112/0x1f9
Jan  7 13:35:46 spectre20xx kernel: [23243.594008]  [<ffffffff81139447>] ? SyS_read+0x45/0x82
Jan  7 13:35:46 spectre20xx kernel: [23243.594010]  [<ffffffff814c7729>] ? system_call_fastpath+0x1a/0x1f
Jan  7 13:35:46 spectre20xx kernel: [23243.594013]  [<ffffffff8108ed8c>] ? __task_pid_nr_ns+0x63/0x76
Jan  7 13:35:46 spectre20xx kernel: [23243.595808] virbr0: port 1(vnet0) entered disabled state
Jan  7 13:35:46 spectre20xx kernel: [23243.595847] device vnet0 left promiscuous mode
Jan  7 13:35:46 spectre20xx kernel: [23243.595849] virbr0: port 1(vnet0) entered disabled state


Someone already openend a bug report at gentoo's bugzilla
-> https://bugs.gentoo.org/show_bug.cgi?id=496490

If anything/infos/debug stuff is needed, don't hesitate to ask.
Thank you in advance
boris64
 
Posts: 2
Joined: Mon Apr 18, 2011 7:12 pm

Re: size overflow in kernel/cpuset.c

Postby ephox » Tue Jan 07, 2014 1:01 pm

Thanks for the report. This bug will be fixed in the next PaX version.
ephox
 
Posts: 134
Joined: Tue Mar 20, 2012 4:36 pm


Return to grsecurity support