Lines Matching defs:address
118 int __kprobes do_page_fault(struct pt_regs *regs, unsigned long address,
151 if (!user_mode(regs) && (address >= TASK_SIZE))
157 do_dabr(regs, address, error_code);
174 perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, 0, regs, address);
181 * address space. Luckily the kernel only validly references user
187 * Attempt to lock the address space, if we cannot we then validate the
188 * source. If this is invalid we can skip the address space check,
198 vma = find_vma(mm, address);
201 if (vma->vm_start <= address)
215 if (address + 0x100000 < vma->vm_end) {
222 * A user-mode access to an address a long way below
225 * address accessed if the instruction completed,
233 if (address + 2048 < uregs->gpr[1]
237 if (expand_stack(vma, address))
245 address matching DABR, eciwx, etc. */
253 _tlbil_va(address, 0, 0, 0);
310 ret = handle_mm_fault(mm, vma, address, is_write ? FAULT_FLAG_WRITE : 0);
321 regs, address);
332 regs, address);
343 _exception(SIGSEGV, regs, code, address);
351 address, current_uid());
372 info.si_addr = (void __user *)address;
384 void bad_page_fault(struct pt_regs *regs, unsigned long address, int sig)
400 "data at address 0x%08lx\n", regs->dar);
412 printk(KERN_ALERT "Faulting instruction address: 0x%08lx\n",