Lines Matching full:faults
418 * Note we only handle faults in kernel here.
563 * ones are faults accessing the GDT, or LDT. Perhaps in show_fault_oops()
620 * kernel addresses are always protection faults. in sanitize_error_code()
693 /* Only not-present faults should be handled by KFENCE. */ in page_fault_oops()
896 * 3. T1 : faults... in bad_area_access_error()
971 * Spurious faults may only occur if the TLB contains an entry with
973 * and reserved bit (R = 1) faults are never spurious.
995 * spurious faults. in spurious_kernel_fault()
1000 * faults. in spurious_kernel_fault()
1080 * faults just to hit a X86_PF_PK as soon as we fill in a in access_error()
1133 * Called for all faults where 'address' is part of the kernel address
1134 * space. Might get called for faults that originate from *code* that
1186 /* kprobes don't want to hook the spurious faults: */ in do_kern_addr_fault()
1203 * Handle faults in the user portion of the address space. Nothing in here
1239 /* kprobes don't want to hook the spurious faults: */ in do_user_addr_fault()
1289 * Treat all shadow stack accesses as WRITE faults. This ensures in do_user_addr_fault()
1303 * system page faults are still user accesses. in do_user_addr_fault()
1310 * Faults in the vsyscall page might need emulation. The in do_user_addr_fault()
1516 * getting values from real and async page faults mixed up. in DEFINE_IDTENTRY_RAW_ERRORCODE()