Lines Matching full:fault

3  * Based on arch/arm/mm/fault.c
269 * If we now have a valid translation, treat the translation fault as in is_spurious_el1_translation_fault()
276 * If we got a different type of fault from the AT instruction, in is_spurious_el1_translation_fault()
277 * treat the translation fault as spurious. in is_spurious_el1_translation_fault()
305 * Are we prepared to handle this kernel fault? in __do_kernel_fault()
312 "Ignoring spurious kernel translation fault at virtual address %016lx\n", addr)) in __do_kernel_fault()
340 * an alignment fault not caused by the memory type would take in set_thread_esr()
341 * precedence over translation fault for a real access to empty in set_thread_esr()
342 * space. Unfortunately we can't easily distinguish "alignment fault in set_thread_esr()
343 * not caused by memory type" from "alignment fault caused by memory in set_thread_esr()
345 * fault.) in set_thread_esr()
355 * We always report the ESR as if the fault was taken in set_thread_esr()
357 * clear. (In fact it always will be a fault to EL1.) in set_thread_esr()
365 * Claim a level 0 translation fault. in set_thread_esr()
392 * handle this fault with. in do_bad_area()
429 * Check that the permissions on the VMA allow for the fault which in __do_page_fault()
444 * should fault. EL0 cannot issue DC IVAC (undef).
456 vm_fault_t fault; in do_page_fault() local
465 * the fault. in do_page_fault()
522 fault = __do_page_fault(mm, addr, mm_flags, vm_flags, regs); in do_page_fault()
525 if (fault_signal_pending(fault, regs)) { in do_page_fault()
531 if (fault & VM_FAULT_RETRY) { in do_page_fault()
542 if (likely(!(fault & (VM_FAULT_ERROR | VM_FAULT_BADMAP | in do_page_fault()
548 * handle this fault with. in do_page_fault()
553 if (fault & VM_FAULT_OOM) { in do_page_fault()
556 * userspace (which will retry the fault, or kill us if we got in do_page_fault()
565 if (fault & VM_FAULT_SIGBUS) { in do_page_fault()
568 * this page fault. in do_page_fault()
572 } else if (fault & (VM_FAULT_HWPOISON_LARGE | VM_FAULT_HWPOISON)) { in do_page_fault()
576 if (fault & VM_FAULT_HWPOISON_LARGE) in do_page_fault()
577 lsb = hstate_index_to_shift(VM_FAULT_GET_HINDEX(fault)); in do_page_fault()
587 fault == VM_FAULT_BADACCESS ? SEGV_ACCERR : SEGV_MAPERR, in do_page_fault()
619 return 1; /* "fault" */ in do_bad()
654 { do_bad, SIGKILL, SI_KERNEL, "ttbr address size fault" },
655 { do_bad, SIGKILL, SI_KERNEL, "level 1 address size fault" },
656 { do_bad, SIGKILL, SI_KERNEL, "level 2 address size fault" },
657 { do_bad, SIGKILL, SI_KERNEL, "level 3 address size fault" },
658 { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 0 translation fault" },
659 { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 1 translation fault" },
660 { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 2 translation fault" },
661 { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 3 translation fault" },
663 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 1 access flag fault" },
664 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 2 access flag fault" },
665 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 3 access flag fault" },
667 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 1 permission fault" },
668 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 2 permission fault" },
669 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 3 permission fault" },
671 { do_tag_check_fault, SIGSEGV, SEGV_MTESERR, "synchronous tag check fault" },
687 { do_alignment_fault, SIGBUS, BUS_ADRALN, "alignment fault" },
703 { do_bad, SIGKILL, SI_KERNEL, "Unsupported atomic hardware update fault" },
706 { do_bad, SIGKILL, SI_KERNEL, "implementation fault (lockdown abort)" },
707 { do_bad, SIGBUS, BUS_OBJERR, "implementation fault (unsupported exclusive)" },
715 { do_bad, SIGKILL, SI_KERNEL, "section domain fault" },
716 { do_bad, SIGKILL, SI_KERNEL, "page domain fault" },
728 pr_alert("Unhandled fault at 0x%016lx\n", addr); in do_mem_abort()