Blame view

security/tomoyo/audit.c 12.4 KB
b24413180   Greg Kroah-Hartman   License cleanup: ...
1
  // SPDX-License-Identifier: GPL-2.0
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
2
3
4
  /*
   * security/tomoyo/audit.c
   *
0f2a55d5b   Tetsuo Handa   TOMOYO: Update ke...
5
   * Copyright (C) 2005-2011  NTT DATA CORPORATION
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
6
7
8
9
10
11
   */
  
  #include "common.h"
  #include <linux/slab.h>
  
  /**
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
   * tomoyo_print_bprm - Print "struct linux_binprm" for auditing.
   *
   * @bprm: Pointer to "struct linux_binprm".
   * @dump: Pointer to "struct tomoyo_page_dump".
   *
   * Returns the contents of @bprm on success, NULL otherwise.
   *
   * This function uses kzalloc(), so caller must kfree() if this function
   * didn't return NULL.
   */
  static char *tomoyo_print_bprm(struct linux_binprm *bprm,
  			       struct tomoyo_page_dump *dump)
  {
  	static const int tomoyo_buffer_len = 4096 * 2;
  	char *buffer = kzalloc(tomoyo_buffer_len, GFP_NOFS);
  	char *cp;
  	char *last_start;
  	int len;
  	unsigned long pos = bprm->p;
  	int offset = pos % PAGE_SIZE;
  	int argv_count = bprm->argc;
  	int envp_count = bprm->envc;
  	bool truncated = false;
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
35

5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
  	if (!buffer)
  		return NULL;
  	len = snprintf(buffer, tomoyo_buffer_len - 1, "argv[]={ ");
  	cp = buffer + len;
  	if (!argv_count) {
  		memmove(cp, "} envp[]={ ", 11);
  		cp += 11;
  	}
  	last_start = cp;
  	while (argv_count || envp_count) {
  		if (!tomoyo_dump_page(bprm, pos, dump))
  			goto out;
  		pos += PAGE_SIZE - offset;
  		/* Read. */
  		while (offset < PAGE_SIZE) {
  			const char *kaddr = dump->data;
  			const unsigned char c = kaddr[offset++];
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
53

5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
  			if (cp == last_start)
  				*cp++ = '"';
  			if (cp >= buffer + tomoyo_buffer_len - 32) {
  				/* Reserve some room for "..." string. */
  				truncated = true;
  			} else if (c == '\\') {
  				*cp++ = '\\';
  				*cp++ = '\\';
  			} else if (c > ' ' && c < 127) {
  				*cp++ = c;
  			} else if (!c) {
  				*cp++ = '"';
  				*cp++ = ' ';
  				last_start = cp;
  			} else {
  				*cp++ = '\\';
  				*cp++ = (c >> 6) + '0';
  				*cp++ = ((c >> 3) & 7) + '0';
  				*cp++ = (c & 7) + '0';
  			}
  			if (c)
  				continue;
  			if (argv_count) {
  				if (--argv_count == 0) {
  					if (truncated) {
  						cp = last_start;
  						memmove(cp, "... ", 4);
  						cp += 4;
  					}
  					memmove(cp, "} envp[]={ ", 11);
  					cp += 11;
  					last_start = cp;
  					truncated = false;
  				}
  			} else if (envp_count) {
  				if (--envp_count == 0) {
  					if (truncated) {
  						cp = last_start;
  						memmove(cp, "... ", 4);
  						cp += 4;
  					}
  				}
  			}
  			if (!argv_count && !envp_count)
  				break;
  		}
  		offset = 0;
  	}
  	*cp++ = '}';
  	*cp = '\0';
  	return buffer;
  out:
  	snprintf(buffer, tomoyo_buffer_len - 1,
  		 "argv[]={ ... } envp[]= { ... }");
  	return buffer;
  }
  
  /**
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
112
113
114
115
116
117
   * tomoyo_filetype - Get string representation of file type.
   *
   * @mode: Mode value for stat().
   *
   * Returns file type string.
   */
d179333f3   Al Viro   tomoyo_mini_stat:...
118
  static inline const char *tomoyo_filetype(const umode_t mode)
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
  {
  	switch (mode & S_IFMT) {
  	case S_IFREG:
  	case 0:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_FILE];
  	case S_IFDIR:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_DIRECTORY];
  	case S_IFLNK:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_SYMLINK];
  	case S_IFIFO:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_FIFO];
  	case S_IFSOCK:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_SOCKET];
  	case S_IFBLK:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_BLOCK_DEV];
  	case S_IFCHR:
  		return tomoyo_condition_keyword[TOMOYO_TYPE_IS_CHAR_DEV];
  	}
  	return "unknown"; /* This should not happen. */
  }
  
  /**
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
141
142
143
144
145
146
147
148
149
150
151
152
153
   * tomoyo_print_header - Get header line of audit log.
   *
   * @r: Pointer to "struct tomoyo_request_info".
   *
   * Returns string representation.
   *
   * This function uses kmalloc(), so caller must kfree() if this function
   * didn't return NULL.
   */
  static char *tomoyo_print_header(struct tomoyo_request_info *r)
  {
  	struct tomoyo_time stamp;
  	const pid_t gpid = task_pid_nr(current);
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
154
  	struct tomoyo_obj_info *obj = r->obj;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
155
156
  	static const int tomoyo_buffer_len = 4096;
  	char *buffer = kmalloc(tomoyo_buffer_len, GFP_NOFS);
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
157
  	int pos;
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
158
  	u8 i;
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
159

eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
160
161
  	if (!buffer)
  		return NULL;
77f4fa089   Thomas Gleixner   tomoyo: Use sensi...
162

927340926   Arnd Bergmann   tomoyo: fix times...
163
  	tomoyo_convert_time(ktime_get_real_seconds(), &stamp);
77f4fa089   Thomas Gleixner   tomoyo: Use sensi...
164

2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
165
  	pos = snprintf(buffer, tomoyo_buffer_len - 1,
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
166
167
168
169
170
  		       "#%04u/%02u/%02u %02u:%02u:%02u# profile=%u mode=%s granted=%s (global-pid=%u) task={ pid=%u ppid=%u uid=%u gid=%u euid=%u egid=%u suid=%u sgid=%u fsuid=%u fsgid=%u }",
  		       stamp.year, stamp.month, stamp.day, stamp.hour,
  		       stamp.min, stamp.sec, r->profile, tomoyo_mode[r->mode],
  		       tomoyo_yesno(r->granted), gpid, tomoyo_sys_getpid(),
  		       tomoyo_sys_getppid(),
609fcd1b3   Eric W. Biederman   userns: Convert t...
171
172
173
174
175
176
177
178
  		       from_kuid(&init_user_ns, current_uid()),
  		       from_kgid(&init_user_ns, current_gid()),
  		       from_kuid(&init_user_ns, current_euid()),
  		       from_kgid(&init_user_ns, current_egid()),
  		       from_kuid(&init_user_ns, current_suid()),
  		       from_kgid(&init_user_ns, current_sgid()),
  		       from_kuid(&init_user_ns, current_fsuid()),
  		       from_kgid(&init_user_ns, current_fsgid()));
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
179
180
181
182
183
184
185
186
187
  	if (!obj)
  		goto no_obj_info;
  	if (!obj->validate_done) {
  		tomoyo_get_attributes(obj);
  		obj->validate_done = true;
  	}
  	for (i = 0; i < TOMOYO_MAX_PATH_STAT; i++) {
  		struct tomoyo_mini_stat *stat;
  		unsigned int dev;
d179333f3   Al Viro   tomoyo_mini_stat:...
188
  		umode_t mode;
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
189

8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
190
191
192
193
194
195
196
197
  		if (!obj->stat_valid[i])
  			continue;
  		stat = &obj->stat[i];
  		dev = stat->dev;
  		mode = stat->mode;
  		if (i & 1) {
  			pos += snprintf(buffer + pos,
  					tomoyo_buffer_len - 1 - pos,
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
198
199
  					" path%u.parent={ uid=%u gid=%u ino=%lu perm=0%o }",
  					(i >> 1) + 1,
609fcd1b3   Eric W. Biederman   userns: Convert t...
200
201
202
203
  					from_kuid(&init_user_ns, stat->uid),
  					from_kgid(&init_user_ns, stat->gid),
  					(unsigned long)stat->ino,
  					stat->mode & S_IALLUGO);
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
204
205
206
  			continue;
  		}
  		pos += snprintf(buffer + pos, tomoyo_buffer_len - 1 - pos,
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
207
208
  				" path%u={ uid=%u gid=%u ino=%lu major=%u minor=%u perm=0%o type=%s",
  				(i >> 1) + 1,
609fcd1b3   Eric W. Biederman   userns: Convert t...
209
210
211
212
  				from_kuid(&init_user_ns, stat->uid),
  				from_kgid(&init_user_ns, stat->gid),
  				(unsigned long)stat->ino,
  				MAJOR(dev), MINOR(dev),
8761afd49   Tetsuo Handa   TOMOYO: Allow usi...
213
214
215
216
217
218
219
220
221
222
223
224
  				mode & S_IALLUGO, tomoyo_filetype(mode));
  		if (S_ISCHR(mode) || S_ISBLK(mode)) {
  			dev = stat->rdev;
  			pos += snprintf(buffer + pos,
  					tomoyo_buffer_len - 1 - pos,
  					" dev_major=%u dev_minor=%u",
  					MAJOR(dev), MINOR(dev));
  		}
  		pos += snprintf(buffer + pos, tomoyo_buffer_len - 1 - pos,
  				" }");
  	}
  no_obj_info:
2066a3612   Tetsuo Handa   TOMOYO: Allow usi...
225
226
227
228
  	if (pos < tomoyo_buffer_len - 1)
  		return buffer;
  	kfree(buffer);
  	return NULL;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
  }
  
  /**
   * tomoyo_init_log - Allocate buffer for audit logs.
   *
   * @r:    Pointer to "struct tomoyo_request_info".
   * @len:  Buffer size needed for @fmt and @args.
   * @fmt:  The printf()'s format string.
   * @args: va_list structure for @fmt.
   *
   * Returns pointer to allocated memory.
   *
   * This function uses kzalloc(), so caller must kfree() if this function
   * didn't return NULL.
   */
  char *tomoyo_init_log(struct tomoyo_request_info *r, int len, const char *fmt,
  		      va_list args)
  {
  	char *buf = NULL;
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
248
  	char *bprm_info = NULL;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
249
  	const char *header = NULL;
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
250
251
  	char *realpath = NULL;
  	const char *symlink = NULL;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
252
  	int pos;
ea5048191   Tetsuo Handa   TOMOYO: Fix wrong...
253
  	const char *domainname = r->domain->domainname->name;
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
254

eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
255
256
257
258
259
260
  	header = tomoyo_print_header(r);
  	if (!header)
  		return NULL;
  	/* +10 is for '
  ' etc. and '\0'. */
  	len += strlen(domainname) + strlen(header) + 10;
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
261
262
  	if (r->ee) {
  		struct file *file = r->ee->bprm->file;
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
263

2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
264
  		realpath = tomoyo_realpath_from_path(&file->f_path);
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
265
266
  		bprm_info = tomoyo_print_bprm(r->ee->bprm, &r->ee->dump);
  		if (!realpath || !bprm_info)
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
267
  			goto out;
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
268
269
  		/* +80 is for " exec={ realpath=\"%s\" argc=%d envc=%d %s }" */
  		len += strlen(realpath) + 80 + strlen(bprm_info);
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
270
271
272
273
274
  	} else if (r->obj && r->obj->symlink_target) {
  		symlink = r->obj->symlink_target->name;
  		/* +18 is for " symlink.target=\"%s\"" */
  		len += 18 + strlen(symlink);
  	}
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
275
276
277
278
279
280
  	len = tomoyo_round2(len);
  	buf = kzalloc(len, GFP_NOFS);
  	if (!buf)
  		goto out;
  	len--;
  	pos = snprintf(buf, len, "%s", header);
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
281
  	if (realpath) {
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
282
  		struct linux_binprm *bprm = r->ee->bprm;
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
283

2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
284
  		pos += snprintf(buf + pos, len - pos,
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
285
286
  				" exec={ realpath=\"%s\" argc=%d envc=%d %s }",
  				realpath, bprm->argc, bprm->envc, bprm_info);
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
287
288
289
  	} else if (symlink)
  		pos += snprintf(buf + pos, len - pos, " symlink.target=\"%s\"",
  				symlink);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
290
291
292
293
294
  	pos += snprintf(buf + pos, len - pos, "
  %s
  ", domainname);
  	vsnprintf(buf + pos, len - pos, fmt, args);
  out:
2ca9bf453   Tetsuo Handa   TOMOYO: Allow usi...
295
  	kfree(realpath);
5b636857f   Tetsuo Handa   TOMOYO: Allow usi...
296
  	kfree(bprm_info);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
  	kfree(header);
  	return buf;
  }
  
  /* Wait queue for /sys/kernel/security/tomoyo/audit. */
  static DECLARE_WAIT_QUEUE_HEAD(tomoyo_log_wait);
  
  /* Structure for audit log. */
  struct tomoyo_log {
  	struct list_head list;
  	char *log;
  	int size;
  };
  
  /* The list for "struct tomoyo_log". */
  static LIST_HEAD(tomoyo_log);
  
  /* Lock for "struct list_head tomoyo_log". */
  static DEFINE_SPINLOCK(tomoyo_log_lock);
  
  /* Length of "stuct list_head tomoyo_log". */
  static unsigned int tomoyo_log_count;
  
  /**
   * tomoyo_get_audit - Get audit mode.
   *
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
323
   * @ns:          Pointer to "struct tomoyo_policy_namespace".
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
324
325
326
327
328
329
   * @profile:     Profile number.
   * @index:       Index number of functionality.
   * @is_granted:  True if granted log, false otherwise.
   *
   * Returns true if this request should be audited, false otherwise.
   */
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
330
331
  static bool tomoyo_get_audit(const struct tomoyo_policy_namespace *ns,
  			     const u8 profile, const u8 index,
1f067a682   Tetsuo Handa   TOMOYO: Allow con...
332
  			     const struct tomoyo_acl_info *matched_acl,
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
333
334
335
  			     const bool is_granted)
  {
  	u8 mode;
2c47ab935   Tetsuo Handa   TOMOYO: Cleanup p...
336
337
  	const u8 category = tomoyo_index2category[index] +
  		TOMOYO_MAX_MAC_INDEX;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
338
  	struct tomoyo_profile *p;
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
339

eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
340
341
  	if (!tomoyo_policy_loaded)
  		return false;
bd03a3e4c   Tetsuo Handa   TOMOYO: Add polic...
342
  	p = tomoyo_profile(ns, profile);
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
343
344
  	if (tomoyo_log_count >= p->pref[TOMOYO_PREF_MAX_AUDIT_LOG])
  		return false;
1f067a682   Tetsuo Handa   TOMOYO: Allow con...
345
346
347
  	if (is_granted && matched_acl && matched_acl->cond &&
  	    matched_acl->cond->grant_log != TOMOYO_GRANTLOG_AUTO)
  		return matched_acl->cond->grant_log == TOMOYO_GRANTLOG_YES;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
  	mode = p->config[index];
  	if (mode == TOMOYO_CONFIG_USE_DEFAULT)
  		mode = p->config[category];
  	if (mode == TOMOYO_CONFIG_USE_DEFAULT)
  		mode = p->default_config;
  	if (is_granted)
  		return mode & TOMOYO_CONFIG_WANT_GRANT_LOG;
  	return mode & TOMOYO_CONFIG_WANT_REJECT_LOG;
  }
  
  /**
   * tomoyo_write_log2 - Write an audit log.
   *
   * @r:    Pointer to "struct tomoyo_request_info".
   * @len:  Buffer size needed for @fmt and @args.
   * @fmt:  The printf()'s format string.
   * @args: va_list structure for @fmt.
   *
   * Returns nothing.
   */
  void tomoyo_write_log2(struct tomoyo_request_info *r, int len, const char *fmt,
  		       va_list args)
  {
  	char *buf;
  	struct tomoyo_log *entry;
  	bool quota_exceeded = false;
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
374

1f067a682   Tetsuo Handa   TOMOYO: Allow con...
375
376
  	if (!tomoyo_get_audit(r->domain->ns, r->profile, r->type,
  			      r->matched_acl, r->granted))
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
  		goto out;
  	buf = tomoyo_init_log(r, len, fmt, args);
  	if (!buf)
  		goto out;
  	entry = kzalloc(sizeof(*entry), GFP_NOFS);
  	if (!entry) {
  		kfree(buf);
  		goto out;
  	}
  	entry->log = buf;
  	len = tomoyo_round2(strlen(buf) + 1);
  	/*
  	 * The entry->size is used for memory quota checks.
  	 * Don't go beyond strlen(entry->log).
  	 */
  	entry->size = len + tomoyo_round2(sizeof(*entry));
  	spin_lock(&tomoyo_log_lock);
  	if (tomoyo_memory_quota[TOMOYO_MEMORY_AUDIT] &&
  	    tomoyo_memory_used[TOMOYO_MEMORY_AUDIT] + entry->size >=
  	    tomoyo_memory_quota[TOMOYO_MEMORY_AUDIT]) {
  		quota_exceeded = true;
  	} else {
  		tomoyo_memory_used[TOMOYO_MEMORY_AUDIT] += entry->size;
  		list_add_tail(&entry->list, &tomoyo_log);
  		tomoyo_log_count++;
  	}
  	spin_unlock(&tomoyo_log_lock);
  	if (quota_exceeded) {
  		kfree(buf);
  		kfree(entry);
  		goto out;
  	}
  	wake_up(&tomoyo_log_wait);
  out:
  	return;
  }
  
  /**
   * tomoyo_write_log - Write an audit log.
   *
   * @r:   Pointer to "struct tomoyo_request_info".
   * @fmt: The printf()'s format string, followed by parameters.
   *
   * Returns nothing.
   */
  void tomoyo_write_log(struct tomoyo_request_info *r, const char *fmt, ...)
  {
  	va_list args;
  	int len;
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
426

eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
  	va_start(args, fmt);
  	len = vsnprintf((char *) &len, 1, fmt, args) + 1;
  	va_end(args);
  	va_start(args, fmt);
  	tomoyo_write_log2(r, len, fmt, args);
  	va_end(args);
  }
  
  /**
   * tomoyo_read_log - Read an audit log.
   *
   * @head: Pointer to "struct tomoyo_io_buffer".
   *
   * Returns nothing.
   */
  void tomoyo_read_log(struct tomoyo_io_buffer *head)
  {
  	struct tomoyo_log *ptr = NULL;
cdcf6723a   Tetsuo Handa   tomoyo: Coding st...
445

eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
  	if (head->r.w_pos)
  		return;
  	kfree(head->read_buf);
  	head->read_buf = NULL;
  	spin_lock(&tomoyo_log_lock);
  	if (!list_empty(&tomoyo_log)) {
  		ptr = list_entry(tomoyo_log.next, typeof(*ptr), list);
  		list_del(&ptr->list);
  		tomoyo_log_count--;
  		tomoyo_memory_used[TOMOYO_MEMORY_AUDIT] -= ptr->size;
  	}
  	spin_unlock(&tomoyo_log_lock);
  	if (ptr) {
  		head->read_buf = ptr->log;
  		head->r.w[head->r.w_pos++] = head->read_buf;
  		kfree(ptr);
  	}
  }
  
  /**
   * tomoyo_poll_log - Wait for an audit log.
   *
   * @file: Pointer to "struct file".
6041e8346   Tetsuo Handa   TOMOYO: Return ap...
469
   * @wait: Pointer to "poll_table". Maybe NULL.
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
470
   *
a9a08845e   Linus Torvalds   vfs: do bulk POLL...
471
   * Returns EPOLLIN | EPOLLRDNORM when ready to read an audit log.
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
472
   */
c0d4be289   Al Viro   tomoyo: annotate ...
473
  __poll_t tomoyo_poll_log(struct file *file, poll_table *wait)
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
474
475
  {
  	if (tomoyo_log_count)
a9a08845e   Linus Torvalds   vfs: do bulk POLL...
476
  		return EPOLLIN | EPOLLRDNORM;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
477
478
  	poll_wait(file, &tomoyo_log_wait, wait);
  	if (tomoyo_log_count)
a9a08845e   Linus Torvalds   vfs: do bulk POLL...
479
  		return EPOLLIN | EPOLLRDNORM;
eadd99cc8   Tetsuo Handa   TOMOYO: Add audit...
480
481
  	return 0;
  }