| Summary: | hardened-sources-3.14.3-r1 oopses in network | ||
|---|---|---|---|
| Product: | Gentoo Linux | Reporter: | satmd <satmd> |
| Component: | Hardened | Assignee: | The Gentoo Linux Hardened Kernel Team (OBSOLETE) <hardened-kernel+disabled> |
| Status: | RESOLVED NEEDINFO | ||
| Severity: | critical | CC: | pageexec, spender |
| Priority: | Normal | ||
| Version: | unspecified | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Package list: | Runtime testing required: | --- | |
|
Description
satmd
2014-05-19 18:40:53 UTC
can you try hardened-sources-3.14.4 which is based on the latest grsec/pax patches and see ifyou get the oops. it's not an oops but a WARN, not an oops and i'm wondering if you have the size overflow plugin enabled and if so, could you try without it? I've just compiled and booted 3.14.4. Meanwhile I studied my iptables rules and found a "iptables -t mangle -A POSTROUTING|OUTPUT -o virbr0 -j CHECKSUM --checksum-fill" (set by libvirtd) which seems obviously related. Unfortunately I don't have a way to trigger the bug manually, but to keep waiting for it to reappear. I've built the new kernel (as the old) with CONFIG_PAX_SIZE_OVERFLOW=y. (In reply to satmd from comment #3) > I've just compiled and booted 3.14.4. Meanwhile I studied my iptables rules > and found a "iptables -t mangle -A POSTROUTING|OUTPUT -o virbr0 -j CHECKSUM > --checksum-fill" (set by libvirtd) which seems obviously related. > > Unfortunately I don't have a way to trigger the bug manually, but to keep > waiting for it to reappear. > > I've built the new kernel (as the old) with CONFIG_PAX_SIZE_OVERFLOW=y. Is this still an issue? (In reply to satmd from comment #3) > Unfortunately I don't have a way to trigger the bug manually, but to keep > waiting for it to reappear. Please reopen if you get more information about this bug. |