is it currently possible with id 0 group 0 to escape from chroot jail on grsecurity kernel with chroot protections
As spender is saying, you can't break out unless you somehow disable the protection features. The root user can do this, unless you remove it's capability to. If sysctl is enabled, make sure you use the grsec_lock feature so root can't remove the restrictions (or at the very least, use RBAC to deny those changes unless you're authenticated as grsecurity admin). Deny the use of mknod, mount. Hell, enable all the chroot restrictions, unless you have a reason not to enable one.
I've done pretty extensive tests with C code as root in a jail on a grsecurity kernel to try to break out (with protections enabled), and I haven't been able to. So with these things enabled you're pretty safe, but don't count on just those hardening features to stay secure. Putting all your faith and trust in a single piece of software is *never* a good idea.
A grsecurity kernel, PAX, and RBAC are different pieces of software in this regard. Hide processes, make them unkillable / un-ptrace-able (even by root), deny socket/tcp connections your users shouldn't be making in the first place, etc. It's what a default deny policy is all about.
Remember that security is all about how many layers of protection you have, and how hard you want it to be to hack your system. A kernel built with the grsecurity patch, by itself, isn't the stop-all hacker solution. Use grsecurity. Enable PAX. Use the RBAC system. Encrypt your sensitive data. Keep your system up to date. Log what your users are doing.
Systems get hacked, identities get stolen, people get murdered. That's life. If it's your job on the line, show your employer that you're doing everything humanly possible to prevent it; being cautious and overly protective may prevent you from getting fired even if you do get hacked through all of your security hardening's. Look up what the SOX and PCI requirements are for security and act as if you had those organizations auditing you.