APPLIED[J]/Cmnt: [SRU] [Jammy] [PATCH 0/1] UBUNTU: audit: fix memory leak of audit_log_lsm()

Stefan Bader stefan.bader at canonical.com
Fri Feb 24 09:43:51 UTC 2023


On 17.02.23 18:05, Jianlin Lv wrote:
> BugLink: https://bugs.launchpad.net/bugs/1987430
> 
> [Impact]
> 
> Under upgrading server to Ubuntu 22.04 with kernel 5.15.0-XX, memory
> started to ramp up slowly that growth ~1 GB a day.
> 
> [Fix]
> 
> The memory leak is an allocated struct audit_buffer object in
> audit_log_lsm() that to record LSM attributes.
> Free audit buffer before audit_log_lsm() return.
> 
> [Test Plan]
> 
> 1.Disable apparmor module by append apparmor=0 to grub
> 
> 2.Start auditd service with following audit rule:
> -a exit,always -F arch=b64 -S execve
> -a exit,always -F arch=b32 -S execve
> 
> 3.Using Kmemleak to check if memory leak has occurred
>      $ cat /sys/kernel/debug/kmemleak
>    or Keep watching for changes in slabinfo
>      $ watch "sudo cat /proc/slabinfo | grep kmalloc-2k"
> 
> Jianlin Lv (1):
>    UBUNTU: audit: fix memory leak of audit_log_lsm()
> 
>   kernel/auditsc.c | 5 +++--
>   1 file changed, 3 insertions(+), 2 deletions(-)
> 

Applied to jammy:linux/master-next adding "SAUCE:" and a "Fixes:". 
Thanks. I saw that the bug report also has a Kinetic task but not seeing 
any submission for that. Is that expected?

-Stefan

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xE8675DEECBEECEA3.asc
Type: application/pgp-keys
Size: 44613 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230224/10d5847f/attachment-0001.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230224/10d5847f/attachment-0001.sig>


More information about the kernel-team mailing list