Lines Matching full:faults
415 * Note we only handle faults in kernel here.
558 * ones are faults accessing the GDT, or LDT. Perhaps in show_fault_oops()
612 * kernel addresses are always protection faults. in sanitize_error_code()
685 /* Only not-present faults should be handled by KFENCE. */ in page_fault_oops()
723 * the below recursive fault logic only apply to a faults from in kernelmode_fixup_or_oops()
743 /* XXX: hwpoison faults will set the wrong code. */ in kernelmode_fixup_or_oops()
915 * 3. T1 : faults... in bad_area_access_error()
990 * Spurious faults may only occur if the TLB contains an entry with
992 * and reserved bit (R = 1) faults are never spurious.
1014 * spurious faults. in spurious_kernel_fault()
1019 * faults. in spurious_kernel_fault()
1099 * faults just to hit a X86_PF_PK as soon as we fill in a in access_error()
1152 * Called for all faults where 'address' is part of the kernel address
1153 * space. Might get called for faults that originate from *code* that
1205 /* kprobes don't want to hook the spurious faults: */ in do_kern_addr_fault()
1222 * Handle faults in the user portion of the address space. Nothing in here
1258 /* kprobes don't want to hook the spurious faults: */ in do_user_addr_fault()
1315 * Treat all shadow stack accesses as WRITE faults. This ensures in do_user_addr_fault()
1328 * Faults in the vsyscall page might need emulation. The in do_user_addr_fault()
1531 * getting values from real and async page faults mixed up. in DEFINE_IDTENTRY_RAW_ERRORCODE()