--- /dev/null
--- /dev/null
++/******************************************************************************
++ * arch/x86/audit.c
++ *
++ * Copyright (c) 2002-2005 K A Fraser
++ * Copyright (c) 2004 Christian Limpach
++ * Copyright (c) 2005 Michael A Fetterman
++ *
++ * This program is free software; you can redistribute it and/or modify
++ * it under the terms of the GNU General Public License as published by
++ * the Free Software Foundation; either version 2 of the License, or
++ * (at your option) any later version.
++ *
++ * This program is distributed in the hope that it will be useful,
++ * but WITHOUT ANY WARRANTY; without even the implied warranty of
++ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
++ * GNU General Public License for more details.
++ *
++ * You should have received a copy of the GNU General Public License
++ * along with this program; if not, write to the Free Software
++ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
++ */
++
++#include <xen/config.h>
++#include <xen/init.h>
++#include <xen/kernel.h>
++#include <xen/lib.h>
++#include <xen/mm.h>
++//#include <xen/sched.h>
++//#include <xen/errno.h>
++#include <xen/perfc.h>
++//#include <xen/irq.h>
++//#include <xen/softirq.h>
++#include <asm/shadow.h>
++#include <asm/page.h>
++#include <asm/flushtlb.h>
++//#include <asm/io.h>
++//#include <asm/uaccess.h>
++//#include <asm/domain_page.h>
++//#include <asm/ldt.h>
++
++// XXX SMP bug -- these should not be statics...
++//
++static int ttot=0, ctot=0, io_mappings=0, lowmem_mappings=0;
++static int l1, l2, oos_count, page_count;
++
++#define FILE_AND_LINE 1
++
++#if FILE_AND_LINE
++#define adjust(_p, _a) _adjust((_p), (_a), __FILE__, __LINE__)
++#define ADJUST_EXTRA_ARGS ,const char *file, int line
++#define APRINTK(_f, _a...) printk(_f " %s:%d\n", ## _a, file, line)
++#else
++#define adjust _adjust
++#define ADJUST_EXTRA_ARGS
++#define APRINTK(_f, _a...) printk(_f "\n", ##_a)
++#endif
++
++int audit_adjust_pgtables(struct domain *d, int dir, int noisy)
++{
++ int errors = 0;
++ int shadow_enabled = shadow_mode_enabled(d) ? 1 : 0;
++
++ void _adjust(struct pfn_info *page, int adjtype ADJUST_EXTRA_ARGS)
++ {
++ if ( adjtype )
++ {
++ // adjust the type count
++ //
++ int tcount = page->u.inuse.type_info & PGT_count_mask;
++ tcount += dir;
++ ttot++;
++
++ if ( page_get_owner(page) == NULL )
++ {
++ APRINTK("adjust(mfn=%p, dir=%d, adjtype=%d) owner=NULL",
++ page_to_pfn(page), dir, adjtype, file, line);
++ errors++;
++ }
++
++ if ( tcount < 0 )
++ {
++ APRINTK("Audit %d: type count went below zero mfn=%x t=%x ot=%x",
++ d->id, page-frame_table,
++ page->u.inuse.type_info,
++ page->tlbflush_timestamp);
++ errors++;
++ }
++ else if ( (tcount & ~PGT_count_mask) != 0 )
++ {
++ APRINTK("Audit %d: type count overflowed mfn=%x t=%x ot=%x",
++ d->id, page-frame_table,
++ page->u.inuse.type_info,
++ page->tlbflush_timestamp);
++ errors++;
++ }
++ else
++ page->u.inuse.type_info += dir;
++ }
++
++ // adjust the general count
++ //
++ int count = page->count_info & PGC_count_mask;
++ count += dir;
++ ctot++;
++
++ if ( count < 0 )
++ {
++ APRINTK("Audit %d: general count went below zero pfn=%x t=%x ot=%x",
++ d->id, page-frame_table,
++ page->u.inuse.type_info,
++ page->tlbflush_timestamp);
++ errors++;
++ }
++ else if ( (count & ~PGT_count_mask) != 0 )
++ {
++ APRINTK("Audit %d: general count overflowed pfn=%x t=%x ot=%x",
++ d->id, page-frame_table,
++ page->u.inuse.type_info,
++ page->tlbflush_timestamp);
++ errors++;
++ }
++ else
++ page->count_info += dir;
++ }
++
++ void adjust_l2_page(unsigned long mfn, int adjtype)
++ {
++ unsigned long *pt = map_domain_mem(mfn << PAGE_SHIFT);
++ int i, limit;
++
++ if ( shadow_mode_external(d) )
++ limit = L2_PAGETABLE_ENTRIES;
++ else
++ limit = DOMAIN_ENTRIES_PER_L2_PAGETABLE;
++
++ for ( i = 0; i < limit; i++ )
++ {
++ if ( pt[i] & _PAGE_PRESENT )
++ {
++ unsigned long l1mfn = pt[i] >> PAGE_SHIFT;
++ struct pfn_info *l1page = pfn_to_page(l1mfn);
++
++ if ( noisy )
++ {
++ if ( shadow_enabled )
++ {
++ if ( page_get_owner(l1page) != NULL )
++ {
++ printk("L2: Bizarre shadow L1 page mfn=%p "
++ "belonging to a domain %p (id=%d)\n",
++ l1mfn,
++ page_get_owner(l1page),
++ page_get_owner(l1page)->id);
++ errors++;
++ continue;
++ }
++ }
++ else
++ {
++ if ( page_get_owner(l1page) != d )
++ {
++ printk("L2: Skip bizarre L1 page mfn=%p "
++ "belonging to other dom %p (id=%d)\n",
++ l1mfn,
++ page_get_owner(l1page),
++ page_get_owner(l1page)->id);
++ errors++;
++ continue;
++ }
++
++ u32 page_type = l1page->u.inuse.type_info & PGT_type_mask;
++
++ if ( page_type == PGT_l2_page_table )
++ {
++ printk("Audit %d: [%x] Found %s Linear PT "
++ "t=%x mfn=%p\n",
++ d->id, i, (l1mfn==mfn) ? "Self" : "Other",
++ l1page->u.inuse.type_info, l1mfn);
++ }
++ else if ( page_type != PGT_l1_page_table )
++ {
++ printk("Audit %d: [L2 mfn=%p i=%x] "
++ "Expected L1 t=%x mfn=%p\n",
++ d->id, mfn, i,
++ l1page->u.inuse.type_info, l1mfn);
++ errors++;
++ }
++ }
++ }
++
++ adjust(l1page, adjtype);
++ }
++ }
++
++ unmap_domain_mem(pt);
++ }
++
++ void adjust_l1_page(unsigned long l1mfn)
++ {
++ unsigned long *pt = map_domain_mem(l1mfn << PAGE_SHIFT);
++ int i;
++
++ for ( i = 0; i < L1_PAGETABLE_ENTRIES; i++ )
++ {
++ if ( pt[i] & _PAGE_PRESENT )
++ {
++ unsigned long gmfn = pt[i] >> PAGE_SHIFT;
++ struct pfn_info *gpage = pfn_to_page(gmfn);
++
++ if ( gmfn < 0x100 )
++ {
++ lowmem_mappings++;
++ continue;
++ }
++
++ if ( gmfn > max_page )
++ {
++ io_mappings++;
++ continue;
++ }
++
++ if ( noisy )
++ {
++ if ( pt[i] & _PAGE_RW )
++ {
++ // If it's not a writable page, complain.
++ //
++ if ( !((gpage->u.inuse.type_info & PGT_type_mask) ==
++ PGT_writable_page) )
++ {
++ printk("Audit %d: [l1mfn=%p, i=%x] Illegal RW "
++ "t=%x mfn=%p\n",
++ d->id, l1mfn, i,
++ gpage->u.inuse.type_info, gmfn);
++ errors++;
++ }
++
++ if ( shadow_enabled &&
++ page_is_page_table(gpage) &&
++ ! page_out_of_sync(gpage) )
++ {
++ printk("Audit %d: [l1mfn=%p, i=%x] Illegal RW of "
++ "page table gmfn=%p\n",
++ d->id, l1mfn, i, gmfn);
++ errors++;
++ }
++ }
++
++ if ( page_get_owner(gpage) != d )
++ {
++ printk("Audit %d: [l1mfn=%p,i=%x] Skip foreign page "
++ "dom=%p (id=%d) mfn=%p c=%08x t=%08x\n",
++ d->id, l1mfn, i,
++ page_get_owner(gpage),
++ page_get_owner(gpage)->id,
++ gmfn,
++ gpage->count_info,
++ gpage->u.inuse.type_info);
++ continue;
++ }
++ }
++
++ adjust(gpage, (pt[i] & _PAGE_RW) ? 1 : 0);
++ }
++ }
++
++ unmap_domain_mem(pt);
++ }
++
++ void adjust_shadow_tables()
++ {
++ struct shadow_status *a;
++ unsigned long smfn, gmfn;
++ struct pfn_info *page;
++ int i;
++
++ for ( i = 0; i < shadow_ht_buckets; i++ )
++ {
++ a = &d->arch.shadow_ht[i];
++ while ( a && a->gpfn_and_flags )
++ {
++ gmfn = __gpfn_to_mfn(d, a->gpfn_and_flags & PGT_mfn_mask);
++ smfn = a->smfn;
++ page = &frame_table[smfn];
++
++ adjust(pfn_to_page(gmfn), 0);
++
++ switch ( a->gpfn_and_flags & PGT_type_mask ) {
++ case PGT_snapshot:
++ break;
++ case PGT_l1_shadow:
++ case PGT_hl2_shadow:
++ adjust_l1_page(smfn);
++ if ( page->u.inuse.type_info & PGT_pinned )
++ adjust(page, 0);
++ break;
++ case PGT_l2_shadow:
++ adjust_l2_page(smfn, 0);
++ if ( page->u.inuse.type_info & PGT_pinned )
++ adjust(page, 0);
++ break;
++ default:
++ BUG();
++ break;
++ }
++
++ a = a->next;
++ }
++ }
++ }
++
++ void adjust_oos_list()
++ {
++ struct out_of_sync_entry *oos;
++
++ if ( (oos = d->arch.out_of_sync) )
++ ASSERT(shadow_enabled);
++
++ while ( oos )
++ {
++ adjust(pfn_to_page(oos->gmfn), 0);
++
++ // Only use entries that have low bits clear...
++ //
++ if ( !(oos->writable_pl1e & (sizeof(l1_pgentry_t)-1)) )
++ adjust(pfn_to_page(oos->writable_pl1e >> PAGE_SHIFT), 0);
++
++ oos = oos->next;
++ oos_count++;
++ }
++ }
++
++ void adjust_for_pgtbase()
++ {
++ struct exec_domain *ed;
++
++ for_each_exec_domain(d, ed)
++ {
++ if ( !shadow_enabled )
++ {
++ if ( pagetable_val(ed->arch.guest_table) )
++ adjust(&frame_table[pagetable_val(ed->arch.guest_table)
++ >> PAGE_SHIFT], 1);
++ }
++ else
++ {
++ if ( pagetable_val(ed->arch.guest_table) )
++ adjust(&frame_table[pagetable_val(ed->arch.guest_table)
++ >> PAGE_SHIFT], 0);
++ if ( pagetable_val(ed->arch.shadow_table) )
++ adjust(&frame_table[pagetable_val(ed->arch.shadow_table)
++ >> PAGE_SHIFT], 0);
++ }
++ }
++ }
++
++ void adjust_guest_pages()
++ {
++ struct list_head *list_ent = d->page_list.next;
++ struct pfn_info *page;
++ unsigned long mfn;
++
++ while ( list_ent != &d->page_list )
++ {
++ u32 page_type;
++
++ page = list_entry(list_ent, struct pfn_info, list);
++ mfn = page_to_pfn(page);
++ page_type = page->u.inuse.type_info & PGT_type_mask;
++
++ if ( page_get_owner(page) != d )
++ BUG();
++
++ page_count++;
++
++ switch ( page_type )
++ {
++ case PGT_l2_page_table:
++ l2++;
++
++ if ( noisy )
++ {
++ if ( shadow_enabled )
++ {
++ printk("Audit %d: found an L2 guest page "
++ "mfn=%p t=%08x c=%08x while in shadow mode\n",
++ mfn, page->u.inuse.type_info, page->count_info);
++ errors++;
++ }
++
++ if ( (page->u.inuse.type_info & PGT_validated) !=
++ PGT_validated )
++ {
++ printk("Audit %d: L2 mfn=%p not validated %p\n",
++ d->id, mfn, page->u.inuse.type_info);
++ errors++;
++ }
++
++ if ( (page->u.inuse.type_info & PGT_pinned) != PGT_pinned )
++ {
++ printk("Audit %d: L2 mfn=%p not pinned t=%p\n",
++ d->id, mfn, page->u.inuse.type_info);
++ errors++;
++ }
++ }
++
++ if ( page->u.inuse.type_info & PGT_pinned )
++ adjust(page, 1);
++
++ if ( page->u.inuse.type_info & PGT_validated )
++ adjust_l2_page(mfn, 1);
++
++ break;
++
++ case PGT_l1_page_table:
++ l1++;
++
++ if ( noisy )
++ {
++ if ( shadow_enabled )
++ {
++ printk("found an L1 guest page mfn=%p t=%08x c=%08x while in shadow mode\n",
++ mfn, page->u.inuse.type_info, page->count_info);
++ errors++;
++ }
++
++ if ( (page->u.inuse.type_info & PGT_validated) != PGT_validated )
++ {
++ printk("Audit %d: L1 not validated mfn=%p t=%p\n",
++ d->id, mfn, page->u.inuse.type_info);
++ errors++;
++ }
++
++ if ( (page->u.inuse.type_info & PGT_pinned) != PGT_pinned )
++ {
++ if ( !VM_ASSIST(d, VMASST_TYPE_writable_pagetables) )
++ {
++ printk("Audit %d: L1 mfn=%p not pinned t=%p\n",
++ d->id, mfn, page->u.inuse.type_info);
++ errors++;
++ }
++ }
++ }
++
++ if ( page->u.inuse.type_info & PGT_pinned )
++ adjust(page, 1);
++
++ if ( page->u.inuse.type_info & PGT_validated )
++ adjust_l1_page(mfn);
++
++ break;
++
++ case PGT_gdt_page:
++ ASSERT( !page_out_of_sync(page) );
++ adjust(page, 1);
++ break;
++
++ case PGT_ldt_page:
++ ASSERT( !page_out_of_sync(page) );
++ adjust(page, 1);
++ break;
++
++ case PGT_writable_page:
++ if ( shadow_enabled )
++ {
++ // In shadow mode, writable pages can get pinned by
++ // paravirtualized guests that think they are pinning
++ // their L1s and/or L2s.
++ //
++ if ( page->u.inuse.type_info & PGT_pinned )
++ adjust(page, 1);
++ }
++ }
++
++ list_ent = page->list.next;
++ }
++ }
++
++ adjust_for_pgtbase();
++
++ adjust_guest_pages();
++
++ if ( shadow_enabled )
++ {
++ adjust_oos_list();
++ adjust_shadow_tables();
++ }
++
++ return errors;
++}
++
++
++#ifndef NDEBUG
++
++void _audit_domain(struct domain *d, int flags, const char *file, int line)
++{
++ void scan_for_pfn_in_mfn(struct domain *d, unsigned long xmfn,
++ unsigned long mfn)
++ {
++ struct pfn_info *page = &frame_table[mfn];
++ unsigned long *pt = map_domain_mem(mfn);
++ int i;
++
++ for ( i = 0; i < L1_PAGETABLE_ENTRIES; i++ )
++ {
++ if ( (pt[i] & _PAGE_PRESENT) && ((pt[i] >> PAGE_SHIFT) == xmfn) )
++ printk(" found dom=%d mfn=%p t=%x c=%x pt[i=%x]=%p\n",
++ d->id, mfn, page->u.inuse.type_info,
++ page->count_info, i, pt[i]);
++ }
++
++ unmap_domain_mem(pt);
++ }
++
++ void scan_for_pfn(struct domain *d, unsigned long xmfn)
++ {
++ if ( !shadow_mode_enabled(d) )
++ {
++ struct list_head *list_ent = d->page_list.next;
++ struct pfn_info *page;
++
++ while ( list_ent != &d->page_list )
++ {
++ page = list_entry(list_ent, struct pfn_info, list);
++
++ switch ( page->u.inuse.type_info & PGT_type_mask )
++ {
++ case PGT_l1_page_table:
++ case PGT_l2_page_table:
++ scan_for_pfn_in_mfn(d, xmfn, page_to_pfn(page));
++ break;
++ default:
++ break;
++ }
++
++ list_ent = page->list.next;
++ }
++ }
++ else
++ {
++ struct shadow_status *a;
++ int i;
++
++ for ( i = 0; i < shadow_ht_buckets; i++ )
++ {
++ a = &d->arch.shadow_ht[i];
++ while ( a && a->gpfn_and_flags )
++ {
++ switch ( a->gpfn_and_flags & PGT_type_mask )
++ {
++ case PGT_l1_shadow:
++ case PGT_l2_shadow:
++ case PGT_hl2_shadow:
++ scan_for_pfn_in_mfn(d, xmfn, a->smfn);
++ break;
++ case PGT_snapshot:
++ break;
++ default:
++ BUG();
++ break;
++ }
++ a = a->next;
++ }
++ }
++ }
++ }
++
++ void scan_for_pfn_remote(unsigned long xmfn)
++ {
++ struct domain *e;
++ for_each_domain ( e )
++ scan_for_pfn( e, xmfn );
++ }
++
++ unsigned long mfn;
++ struct list_head *list_ent;
++ struct pfn_info *page;
++ int errors = 0;
++
++ if ( d != current->domain )
++ domain_pause(d);
++ synchronise_pagetables(~0UL);
++
++ // Maybe we should just be using BIGLOCK?
++ //
++ if ( !(flags & AUDIT_ALREADY_LOCKED) )
++ shadow_lock(d);
++
++ spin_lock(&d->page_alloc_lock);
++
++ /* PHASE 0 */
++
++ list_ent = d->page_list.next;
++ while ( list_ent != &d->page_list )
++ {
++ u32 page_type;
++
++ page = list_entry(list_ent, struct pfn_info, list);
++ mfn = page_to_pfn(page);
++ page_type = page->u.inuse.type_info & PGT_type_mask;
++
++ if ( page_get_owner(page) != d )
++ BUG();
++
++ if ( (page->u.inuse.type_info & PGT_count_mask) >
++ (page->count_info & PGC_count_mask) )
++ {
++ printk("taf(%08x) > caf(%08x) mfn=%p\n",
++ page->u.inuse.type_info, page->count_info, mfn);
++ errors++;
++ }
++
++ if ( shadow_mode_enabled(d) &&
++ (page_type == PGT_writable_page) &&
++ !(page->u.inuse.type_info & PGT_validated) )
++ {
++ printk("shadow mode writable page not validated mfn=%p t=%08x c=%08x\n",
++ mfn, page->u.inuse.type_info, page->count_info);
++ errors++;
++ }
++
++#if 0 /* SYSV shared memory pages plus writeable files. */
++ if ( page_type == PGT_writable_page &&
++ (page->u.inuse.type_info & PGT_count_mask) > 1 )
++ {
++ printk("writeable page with type count >1: mfn=%lx t=%x c=%x\n",
++ mfn,
++ page->u.inuse.type_info,
++ page->count_info );
++ errors++;
++ scan_for_pfn_remote(mfn);
++ }
++#endif
++
++ if ( page_type == PGT_none &&
++ (page->u.inuse.type_info & PGT_count_mask) > 0 )
++ {
++ printk("normal page with type count >0: mfn=%lx t=%x c=%x\n",
++ mfn,
++ page->u.inuse.type_info,
++ page->count_info );
++ errors++;
++ }
++
++ if ( page_out_of_sync(page) )
++ {
++ if ( !page_is_page_table(page) )
++ {
++ printk("out of sync page mfn=%p is not a page table\n", mfn);
++ errors++;
++ }
++ unsigned long pfn = __mfn_to_gpfn(d, mfn);
++ if ( !__shadow_status(d, pfn, PGT_snapshot) )
++ {
++ printk("out of sync page mfn=%p doesn't have a snapshot\n");
++ errors++;
++ }
++ if ( page_type != PGT_writable_page )
++ {
++ printk("out of sync page mfn=%p has strange type t=%08x c=%08x\n",
++ mfn, page->u.inuse.type_info, page->count_info);
++ errors++;
++ }
++ }
++
++ /* Use tlbflush_timestamp to store original type_info. */
++ page->tlbflush_timestamp = page->u.inuse.type_info;
++
++ list_ent = page->list.next;
++ }
++
++ /* PHASE 1 */
++ io_mappings = lowmem_mappings = 0;
++
++ errors += audit_adjust_pgtables(d, -1, 1);
++
++ if ( !(flags & AUDIT_QUIET) &&
++ ((io_mappings > 0) || (lowmem_mappings > 0)) )
++ printk("Audit %d: Found %d lowmem mappings and %d io mappings\n",
++ d->id, lowmem_mappings, io_mappings);
++
++ /* PHASE 2 */
++
++ list_ent = d->page_list.next;
++ while ( list_ent != &d->page_list )
++ {
++ page = list_entry(list_ent, struct pfn_info, list);
++ mfn = page_to_pfn(page);
++
++ switch ( page->u.inuse.type_info & PGT_type_mask)
++ {
++ case PGT_l1_page_table:
++ case PGT_l2_page_table:
++ if ( (page->u.inuse.type_info & PGT_count_mask) != 0 )
++ {
++ printk("Audit %d: type count!=0 t=%x ot=%x c=%x mfn=%lx\n",
++ d->id, page->u.inuse.type_info,
++ page->tlbflush_timestamp,
++ page->count_info, mfn);
++ errors++;
++ scan_for_pfn_remote(mfn);
++ }
++ break;
++ case PGT_none:
++ case PGT_writable_page:
++ case PGT_gdt_page:
++ case PGT_ldt_page:
++ if ( (page->u.inuse.type_info & PGT_count_mask) != 0 )
++ {
++ printk("Audit %d: type count!=0 t=%x ot=%x c=%x mfn=%lx\n",
++ d->id, page->u.inuse.type_info,
++ page->tlbflush_timestamp,
++ page->count_info, mfn);
++ errors++;
++ }
++ break;
++ default:
++ BUG(); // XXX fix me...
++ }
++
++ if ( (page->count_info & PGC_count_mask) != 1 )
++ {
++ printk("Audit %d: gen count!=1 (c=%x) t=%x ot=%x mfn=%lx\n",
++ d->id,
++ page->count_info,
++ page->u.inuse.type_info,
++ page->tlbflush_timestamp, mfn );
++ errors++;
++ scan_for_pfn_remote(mfn);
++ }
++
++ list_ent = page->list.next;
++ }
++
++ if ( shadow_mode_enabled(d) )
++ {
++ struct shadow_status *a;
++ struct pfn_info *page;
++ u32 page_type;
++ int i;
++
++ for ( i = 0; i < shadow_ht_buckets; i++ )
++ {
++ a = &d->arch.shadow_ht[i];
++ while ( a && a->gpfn_and_flags )
++ {
++ page = pfn_to_page(a->smfn);
++ page_type = a->gpfn_and_flags & PGT_type_mask;
++
++ switch ( page_type ) {
++ case PGT_snapshot:
++ // XXX -- what should we check here?
++ break;
++ case PGT_l1_shadow:
++ case PGT_l2_shadow:
++ if ( ((page->u.inuse.type_info & PGT_type_mask) != page_type ) ||
++ (page->count_info != 0) )
++ {
++ printk("Audit %d: shadow page counts wrong mfn=%p t=%x c=%x\n",
++ d->id, page_to_pfn(page),
++ page->u.inuse.type_info,
++ page->count_info);
++ errors++;
++ }
++ break;
++
++ case PGT_hl2_shadow: // haven't thought about this case yet.
++ default:
++ BUG();
++ break;
++ }
++
++ a = a->next;
++ }
++ }
++ }
++
++ /* PHASE 3 */
++ ctot = ttot = page_count = l1 = l2 = oos_count = 0;
++
++ audit_adjust_pgtables(d, 1, 0);
++
++#if 0
++ // This covers our sins of trashing the tlbflush_timestamps...
++ //
++ local_flush_tlb();
++#endif
++
++ spin_unlock(&d->page_alloc_lock);
++
++ if ( !(flags & AUDIT_QUIET) )
++ printk("Audit dom%d (%s:%d) Done. "
++ "pages=%d oos=%d l1=%d l2=%d ctot=%d ttot=%d\n",
++ d->id, file, line, page_count, oos_count, l1, l2, ctot, ttot );
++
++ if ( !(flags & AUDIT_ALREADY_LOCKED) )
++ shadow_unlock(d);
++
++ if ( d != current->domain )
++ domain_unpause(d);
++
++ if ( errors && !(flags & AUDIT_ERRORS_OK) )
++ BUG();
++}
++
++void audit_domains(void)
++{
++ struct domain *d;
++ for_each_domain ( d )
++ audit_domain(d);
++}
++
++void audit_domains_key(unsigned char key)
++{
++ audit_domains();
++}
++#endif