APPLIED[J]/Cmnt: [SRU] [Jammy] [PATCH 0/1] UBUNTU: audit: fix memory leak of audit_log_lsm()
Stefan Bader
stefan.bader at canonical.com
Fri Feb 24 09:43:51 UTC 2023
On 17.02.23 18:05, Jianlin Lv wrote:
> BugLink: https://bugs.launchpad.net/bugs/1987430
>
> [Impact]
>
> Under upgrading server to Ubuntu 22.04 with kernel 5.15.0-XX, memory
> started to ramp up slowly that growth ~1 GB a day.
>
> [Fix]
>
> The memory leak is an allocated struct audit_buffer object in
> audit_log_lsm() that to record LSM attributes.
> Free audit buffer before audit_log_lsm() return.
>
> [Test Plan]
>
> 1.Disable apparmor module by append apparmor=0 to grub
>
> 2.Start auditd service with following audit rule:
> -a exit,always -F arch=b64 -S execve
> -a exit,always -F arch=b32 -S execve
>
> 3.Using Kmemleak to check if memory leak has occurred
> $ cat /sys/kernel/debug/kmemleak
> or Keep watching for changes in slabinfo
> $ watch "sudo cat /proc/slabinfo | grep kmalloc-2k"
>
> Jianlin Lv (1):
> UBUNTU: audit: fix memory leak of audit_log_lsm()
>
> kernel/auditsc.c | 5 +++--
> 1 file changed, 3 insertions(+), 2 deletions(-)
>
Applied to jammy:linux/master-next adding "SAUCE:" and a "Fixes:".
Thanks. I saw that the bug report also has a Kinetic task but not seeing
any submission for that. Is that expected?
-Stefan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 44613 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230224/10d5847f/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230224/10d5847f/attachment-0001.sig>
More information about the kernel-team
mailing list