Lines Matching full:faults
417 * Note we only handle faults in kernel here.
562 * ones are faults accessing the GDT, or LDT. Perhaps in show_fault_oops()
619 * kernel addresses are always protection faults. in sanitize_error_code()
692 /* Only not-present faults should be handled by KFENCE. */ in page_fault_oops()
895 * 3. T1 : faults... in bad_area_access_error()
970 * Spurious faults may only occur if the TLB contains an entry with
972 * and reserved bit (R = 1) faults are never spurious.
994 * spurious faults. in spurious_kernel_fault()
999 * faults. in spurious_kernel_fault()
1079 * faults just to hit a X86_PF_PK as soon as we fill in a in access_error()
1132 * Called for all faults where 'address' is part of the kernel address
1133 * space. Might get called for faults that originate from *code* that
1185 /* kprobes don't want to hook the spurious faults: */ in do_kern_addr_fault()
1202 * Handle faults in the user portion of the address space. Nothing in here
1238 /* kprobes don't want to hook the spurious faults: */ in do_user_addr_fault()
1288 * Treat all shadow stack accesses as WRITE faults. This ensures in do_user_addr_fault()
1302 * system page faults are still user accesses. in do_user_addr_fault()
1309 * Faults in the vsyscall page might need emulation. The in do_user_addr_fault()
1515 * getting values from real and async page faults mixed up. in DEFINE_IDTENTRY_RAW_ERRORCODE()