ACK/Cmnt: [SRU] [Jammy] [PATCH 0/1] UBUNTU: audit: fix memory leak of audit_log_lsm()

Tim Gardner tim.gardner at canonical.com
Tue Feb 21 16:18:13 UTC 2023


On 2/17/23 10:05 AM, Jianlin Lv wrote:
> BugLink: https://bugs.launchpad.net/bugs/1987430
> 
> [Impact]
> 
> Under upgrading server to Ubuntu 22.04 with kernel 5.15.0-XX, memory
> started to ramp up slowly that growth ~1 GB a day.
> 
> [Fix]
> 
> The memory leak is an allocated struct audit_buffer object in
> audit_log_lsm() that to record LSM attributes.
> Free audit buffer before audit_log_lsm() return.
> 
> [Test Plan]
> 
> 1.Disable apparmor module by append apparmor=0 to grub
> 
> 2.Start auditd service with following audit rule:
> -a exit,always -F arch=b64 -S execve
> -a exit,always -F arch=b32 -S execve
> 
> 3.Using Kmemleak to check if memory leak has occurred
>      $ cat /sys/kernel/debug/kmemleak
>    or Keep watching for changes in slabinfo
>      $ watch "sudo cat /proc/slabinfo | grep kmalloc-2k"
> 
> Jianlin Lv (1):
>    UBUNTU: audit: fix memory leak of audit_log_lsm()
> 
>   kernel/auditsc.c | 5 +++--
>   1 file changed, 3 insertions(+), 2 deletions(-)
> 
Acked-by: Tim Gardner <tim.gardner at canonical.com>

Have you reported this upstream ?

We could carry this patch, but it needs SAUCE: in the subject which can 
be added when the patch is applied.
-- 
-----------
Tim Gardner
Canonical, Inc




More information about the kernel-team mailing list