Lines Matching full:fault
3 * Based on arch/arm/mm/fault.c
293 * If we now have a valid translation, treat the translation fault as in is_spurious_el1_translation_fault()
300 * If we got a different type of fault from the AT instruction, in is_spurious_el1_translation_fault()
301 * treat the translation fault as spurious. in is_spurious_el1_translation_fault()
351 * tag fault. in do_tag_recovery()
382 * Are we prepared to handle this kernel fault? in __do_kernel_fault()
389 "Ignoring spurious kernel translation fault at virtual address %016lx\n", addr)) in __do_kernel_fault()
430 * an alignment fault not caused by the memory type would take in set_thread_esr()
431 * precedence over translation fault for a real access to empty in set_thread_esr()
432 * space. Unfortunately we can't easily distinguish "alignment fault in set_thread_esr()
433 * not caused by memory type" from "alignment fault caused by memory in set_thread_esr()
435 * fault.) in set_thread_esr()
445 * We always report the ESR as if the fault was taken in set_thread_esr()
447 * clear. (In fact it always will be a fault to EL1.) in set_thread_esr()
455 * Claim a level 0 translation fault. in set_thread_esr()
485 * handle this fault with. in do_bad_area()
508 * Check that the permissions on the VMA allow for the fault which in __do_page_fault()
523 * should fault. EL0 cannot issue DC IVAC (undef).
535 vm_fault_t fault; in do_page_fault() local
546 * the fault. in do_page_fault()
556 * for the fault to be benign, __do_page_fault() would check in do_page_fault()
561 /* It was exec fault */ in do_page_fault()
565 /* It was write fault */ in do_page_fault()
569 /* It was read fault */ in do_page_fault()
601 fault = handle_mm_fault(vma, addr, mm_flags | FAULT_FLAG_VMA_LOCK, regs); in do_page_fault()
602 if (!(fault & (VM_FAULT_RETRY | VM_FAULT_COMPLETED))) in do_page_fault()
605 if (!(fault & VM_FAULT_RETRY)) { in do_page_fault()
610 if (fault & VM_FAULT_MAJOR) in do_page_fault()
614 if (fault_signal_pending(fault, regs)) { in do_page_fault()
624 fault = VM_FAULT_BADMAP; in do_page_fault()
628 fault = __do_page_fault(mm, vma, addr, mm_flags, vm_flags, regs); in do_page_fault()
631 if (fault_signal_pending(fault, regs)) { in do_page_fault()
637 /* The fault is fully completed (including releasing mmap lock) */ in do_page_fault()
638 if (fault & VM_FAULT_COMPLETED) in do_page_fault()
641 if (fault & VM_FAULT_RETRY) { in do_page_fault()
651 if (likely(!(fault & (VM_FAULT_ERROR | VM_FAULT_BADMAP | in do_page_fault()
657 * handle this fault with. in do_page_fault()
662 if (fault & VM_FAULT_OOM) { in do_page_fault()
665 * userspace (which will retry the fault, or kill us if we got in do_page_fault()
674 if (fault & VM_FAULT_SIGBUS) { in do_page_fault()
677 * this page fault. in do_page_fault()
680 } else if (fault & (VM_FAULT_HWPOISON_LARGE | VM_FAULT_HWPOISON)) { in do_page_fault()
684 if (fault & VM_FAULT_HWPOISON_LARGE) in do_page_fault()
685 lsb = hstate_index_to_shift(VM_FAULT_GET_HINDEX(fault)); in do_page_fault()
694 fault == VM_FAULT_BADACCESS ? SEGV_ACCERR : SEGV_MAPERR, in do_page_fault()
730 return 1; /* "fault" */ in do_bad()
777 { do_bad, SIGKILL, SI_KERNEL, "ttbr address size fault" },
778 { do_bad, SIGKILL, SI_KERNEL, "level 1 address size fault" },
779 { do_bad, SIGKILL, SI_KERNEL, "level 2 address size fault" },
780 { do_bad, SIGKILL, SI_KERNEL, "level 3 address size fault" },
781 { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 0 translation fault" },
782 { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 1 translation fault" },
783 { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 2 translation fault" },
784 { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 3 translation fault" },
786 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 1 access flag fault" },
787 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 2 access flag fault" },
788 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 3 access flag fault" },
790 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 1 permission fault" },
791 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 2 permission fault" },
792 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 3 permission fault" },
794 { do_tag_check_fault, SIGSEGV, SEGV_MTESERR, "synchronous tag check fault" },
810 { do_alignment_fault, SIGBUS, BUS_ADRALN, "alignment fault" },
826 { do_bad, SIGKILL, SI_KERNEL, "Unsupported atomic hardware update fault" },
829 { do_bad, SIGKILL, SI_KERNEL, "implementation fault (lockdown abort)" },
830 { do_bad, SIGBUS, BUS_OBJERR, "implementation fault (unsupported exclusive)" },
838 { do_bad, SIGKILL, SI_KERNEL, "section domain fault" },
839 { do_bad, SIGKILL, SI_KERNEL, "page domain fault" },
855 * At this point we have an unrecognized fault type whose tag bits may in do_mem_abort()
940 * Used during anonymous page fault handling.