Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 468978 - =sys-kernel/hardened-sources-3.8.6 - CONFIG_PAX_SIZE_OVERFLOW triggered by carl9170 driver
Summary: =sys-kernel/hardened-sources-3.8.6 - CONFIG_PAX_SIZE_OVERFLOW triggered by ca...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Hardened (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: The Gentoo Linux Hardened Kernel Team (OBSOLETE)
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-05-08 03:13 UTC by Sean Santos
Modified: 2013-06-24 21:07 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
emerge --info (info.log,5.73 KB, text/plain)
2013-05-08 03:13 UTC, Sean Santos
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Sean Santos 2013-05-08 03:13:45 UTC
Created attachment 347692 [details]
emerge --info

This is a regression from kernel 3.8.3. It's either a new problem, or one that was rare enough that I never saw it in a few days of using 3.8.3, while it shows up every hour in 3.8.6.

Compiler is sys-devel/gcc-4.7.2-r1.

I'm feeling a bit lazy, so I'd rather not transcribe the whole panic message unless it's likely to be valuable, but the call immediately before report_size_overflow is "__carl9170_rx", not to be confused with "carl9170_rx", which is defined in the same file.

This function is in:

drivers/net/wireless/ath/carl9170/rx.c

It is very short, and there's not much space for a problem to show up, but the "len" variable is implicitly cast from unsigned to signed in one call. However, returning in the case "len > INT_MAX" didn't seem to help.

I'm inclined to wonder if this is a false positive, but I don't really have much experience with the kernel, so my temporary solution has just been to disable CONFIG_PAX_SIZE_OVERFLOW (as with most hardened features on this box, it's enabled more for testing than out of a true need for security).
Comment 1 Sean Santos 2013-05-08 03:15:35 UTC
I think I accidentally sent this to Java instead of hardened. Fixing.
Comment 2 Tom Wijsman (TomWij) (RETIRED) gentoo-dev 2013-05-09 13:28:44 UTC
Re-assigned.
Comment 3 Anthony Basile gentoo-dev 2013-05-14 20:46:28 UTC
Can you check with hardened-sources-3.8.12.  I think this is fixed.
Comment 4 Sean Santos 2013-05-16 03:33:05 UTC
Yes, I can tentatively say that this is fixed with 3.8.12. Thanks for the suggestion, Anthony.
Comment 5 PaX Team 2013-06-21 01:24:47 UTC
nothing changed on our side, so i'd like to see the overflow logs if possible.
Comment 6 Anthony Basile gentoo-dev 2013-06-24 21:07:23 UTC
No further complains.