Lines Matching full:faults
416 * Note we only handle faults in kernel here.
561 * ones are faults accessing the GDT, or LDT. Perhaps in show_fault_oops()
618 * kernel addresses are always protection faults. in sanitize_error_code()
691 /* Only not-present faults should be handled by KFENCE. */ in page_fault_oops()
894 * 3. T1 : faults... in bad_area_access_error()
969 * Spurious faults may only occur if the TLB contains an entry with
971 * and reserved bit (R = 1) faults are never spurious.
993 * spurious faults. in spurious_kernel_fault()
998 * faults. in spurious_kernel_fault()
1078 * faults just to hit a X86_PF_PK as soon as we fill in a in access_error()
1131 * Called for all faults where 'address' is part of the kernel address
1132 * space. Might get called for faults that originate from *code* that
1184 /* kprobes don't want to hook the spurious faults: */ in do_kern_addr_fault()
1201 * Handle faults in the user portion of the address space. Nothing in here
1237 /* kprobes don't want to hook the spurious faults: */ in do_user_addr_fault()
1287 * Treat all shadow stack accesses as WRITE faults. This ensures in do_user_addr_fault()
1301 * system page faults are still user accesses. in do_user_addr_fault()
1308 * Faults in the vsyscall page might need emulation. The in do_user_addr_fault()
1509 * getting values from real and async page faults mixed up. in DEFINE_IDTENTRY_RAW_ERRORCODE()