.grsec patch size_overflow
I think you sure know linux kernel patches from grsecurity. In follow tweet you can read about size overflow in patch from grsec. Tweet was in the meanwhile deleted. So what is the problem in this patch? When you change int (signed value) to size_t (unsigned value), you have to be sure you are saving unsigned value. room = N_TTY_BUF_SIZE - (ldata->read_head - tail); And what happens when the right site will have negative value?...