Lines Matching full:fault
3 * Based on arch/arm/mm/fault.c
278 * If we now have a valid translation, treat the translation fault as in is_spurious_el1_translation_fault()
285 * If we got a different type of fault from the AT instruction, in is_spurious_el1_translation_fault()
286 * treat the translation fault as spurious. in is_spurious_el1_translation_fault()
334 * tag fault. in do_tag_recovery()
359 * Are we prepared to handle this kernel fault? in __do_kernel_fault()
366 "Ignoring spurious kernel translation fault at virtual address %016lx\n", addr)) in __do_kernel_fault()
403 * an alignment fault not caused by the memory type would take in set_thread_esr()
404 * precedence over translation fault for a real access to empty in set_thread_esr()
405 * space. Unfortunately we can't easily distinguish "alignment fault in set_thread_esr()
406 * not caused by memory type" from "alignment fault caused by memory in set_thread_esr()
408 * fault.) in set_thread_esr()
418 * We always report the ESR as if the fault was taken in set_thread_esr()
420 * clear. (In fact it always will be a fault to EL1.) in set_thread_esr()
428 * Claim a level 0 translation fault. in set_thread_esr()
458 * handle this fault with. in do_bad_area()
494 * Check that the permissions on the VMA allow for the fault which in __do_page_fault()
509 * should fault. EL0 cannot issue DC IVAC (undef).
521 vm_fault_t fault; in do_page_fault() local
531 * the fault. in do_page_fault()
541 * for the fault to be benign, __do_page_fault() would check in do_page_fault()
546 /* It was exec fault */ in do_page_fault()
550 /* It was write fault */ in do_page_fault()
554 /* It was read fault */ in do_page_fault()
599 fault = __do_page_fault(mm, addr, mm_flags, vm_flags, regs); in do_page_fault()
602 if (fault_signal_pending(fault, regs)) { in do_page_fault()
608 if (fault & VM_FAULT_RETRY) { in do_page_fault()
619 if (likely(!(fault & (VM_FAULT_ERROR | VM_FAULT_BADMAP | in do_page_fault()
625 * handle this fault with. in do_page_fault()
630 if (fault & VM_FAULT_OOM) { in do_page_fault()
633 * userspace (which will retry the fault, or kill us if we got in do_page_fault()
642 if (fault & VM_FAULT_SIGBUS) { in do_page_fault()
645 * this page fault. in do_page_fault()
648 } else if (fault & (VM_FAULT_HWPOISON_LARGE | VM_FAULT_HWPOISON)) { in do_page_fault()
652 if (fault & VM_FAULT_HWPOISON_LARGE) in do_page_fault()
653 lsb = hstate_index_to_shift(VM_FAULT_GET_HINDEX(fault)); in do_page_fault()
662 fault == VM_FAULT_BADACCESS ? SEGV_ACCERR : SEGV_MAPERR, in do_page_fault()
695 return 1; /* "fault" */ in do_bad()
742 { do_bad, SIGKILL, SI_KERNEL, "ttbr address size fault" },
743 { do_bad, SIGKILL, SI_KERNEL, "level 1 address size fault" },
744 { do_bad, SIGKILL, SI_KERNEL, "level 2 address size fault" },
745 { do_bad, SIGKILL, SI_KERNEL, "level 3 address size fault" },
746 { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 0 translation fault" },
747 { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 1 translation fault" },
748 { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 2 translation fault" },
749 { do_translation_fault, SIGSEGV, SEGV_MAPERR, "level 3 translation fault" },
751 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 1 access flag fault" },
752 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 2 access flag fault" },
753 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 3 access flag fault" },
755 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 1 permission fault" },
756 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 2 permission fault" },
757 { do_page_fault, SIGSEGV, SEGV_ACCERR, "level 3 permission fault" },
759 { do_tag_check_fault, SIGSEGV, SEGV_MTESERR, "synchronous tag check fault" },
775 { do_alignment_fault, SIGBUS, BUS_ADRALN, "alignment fault" },
791 { do_bad, SIGKILL, SI_KERNEL, "Unsupported atomic hardware update fault" },
794 { do_bad, SIGKILL, SI_KERNEL, "implementation fault (lockdown abort)" },
795 { do_bad, SIGBUS, BUS_OBJERR, "implementation fault (unsupported exclusive)" },
803 { do_bad, SIGKILL, SI_KERNEL, "section domain fault" },
804 { do_bad, SIGKILL, SI_KERNEL, "page domain fault" },
817 pr_alert("Unhandled fault at 0x%016lx\n", addr); in do_mem_abort()
823 * At this point we have an unrecognized fault type whose tag bits may in do_mem_abort()
911 * Used during anonymous page fault handling.