Lines Matching full:ve
507 * fail, and, as a practical matter, we've overflowed the in DEFINE_IDTENTRY_DF()
1355 #define VE_FAULT_STR "VE fault"
1374 * Virtualization Exceptions (#VE) are delivered to TDX guests due to
1395 * MMIO regions, use #VE triggering MSRs, instructions, or CPUID leaves
1396 * that might generate #VE. VMM can remove memory from TD at any point,
1398 * termination, not to #VE.
1403 * During #VE delivery, all interrupts, including NMIs, are blocked until
1404 * TDGETVEINFO is called. It prevents #VE nesting until the kernel reads
1405 * the VE info.
1407 * If a guest kernel action which would normally cause a #VE occurs in
1413 * aspect. Similarly to #PF, #VE in these places will expose kernel to
1418 struct ve_info ve; in DEFINE_IDTENTRY() local
1422 * till TDGETVEINFO TDCALL is executed. This ensures that VE in DEFINE_IDTENTRY()
1423 * info cannot be overwritten by a nested #VE. in DEFINE_IDTENTRY()
1425 tdx_get_ve_info(&ve); in DEFINE_IDTENTRY()
1433 if (!tdx_handle_virt_exception(regs, &ve)) in DEFINE_IDTENTRY()
1434 ve_raise_fault(regs, 0, ve.gla); in DEFINE_IDTENTRY()