| bd87e6f6610a ("x86/entry/common: Make prepare_exit_to_usermode() static") |
| 8f159f1dfa1e ("x86/entry/common: Protect against instrumentation") |
| 1723be30e46f ("x86/entry: Mark enter_from_user_mode() noinstr") |
| 04dcbdb80578 ("x86/speculation/mds: Clear CPU buffers on exit to user") |
| 6a9e52927251 ("x86/speculation/mds: Add mds_clear_cpu_buffers()") |
| fa1202ef2243 ("x86/speculation: Add command line control for indirect branch speculation") |
| 8770709f4117 ("x86/speculation: Mark string arrays const correctly") |
| 15d6b7aab079 ("x86/speculation: Reorder the spec_v2 code") |
| a74cfffb03b7 ("x86/speculation: Rework SMT state change") |
| 321a874a7ef8 ("sched/smt: Expose sched_smt_present static key") |
| 34bce7c9690b ("x86/speculation: Disable STIBP when enhanced IBRS is in use") |
| a8f76ae41cd6 ("x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()") |
| b86bda042685 ("x86/speculation: Remove unnecessary ret variable in cpu_show_common()") |
| ef014aae8f1c ("x86/retpoline: Remove minimal retpoline support") |
| 4cd24de3a098 ("x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support") |
| bb4b3b776273 ("x86/speculation: Propagate information about RSB filling mitigation to sysfs") |
| 53c613fe6349 ("x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation") |