Description of problem: The synchronized patches mainly include: 1. warning if KVM set a guest with SEV-ES active but SEV not 2. Fix VMSA cache flushing when destroy a SEV-ES guest 3. Fix 64-bit determination for SEV-ES guest 4. Track IF flag of SEV-ES guest 5. Ensure traverse vcpu properly when encrypting VMSA 6. Ensure GHCB is mapped as expected Version-Release number of selected component (if applicable): How reproducible: Steps to Reproduce: 1. 2. 3. Actual results: Expected results: Additional info:
The PR Link: https://gitee.com/anolis/cloud-kernel/pulls/1974