33fc379df76b ("x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb") 55a974021ec9 ("x86/speculation: Provide IBPB always command line options") 6b3e64c237c0 ("x86/speculation: Add seccomp Spectre v2 user space protection mode") 7cc765a67d8e ("x86/speculation: Enable prctl mode for spectre_v2_user") 9137bb27e60e ("x86/speculation: Add prctl() control for indirect branch speculation") 6893a959d7fd ("x86/speculation: Prepare arch_smt_update() for PRCTL mode") 6d991ba509eb ("x86/speculation: Prevent stale SPEC_CTRL msr content") e6da8bb6f9ab ("x86/speculation: Split out TIF update") 4c71a2b6fd7e ("x86/speculation: Prepare for conditional IBPB in switch_mm()") 5635d99953f0 ("x86/speculation: Avoid __switch_to_xtra() calls") ff16701a29cb ("x86/process: Consolidate and simplify switch_to_xtra() code") 5bfbe3ad5840 ("x86/speculation: Prepare for per task indirect branch speculation control") fa1202ef2243 ("x86/speculation: Add command line control for indirect branch speculation") 8770709f4117 ("x86/speculation: Mark string arrays const correctly") 15d6b7aab079 ("x86/speculation: Reorder the spec_v2 code") a74cfffb03b7 ("x86/speculation: Rework SMT state change") 321a874a7ef8 ("sched/smt: Expose sched_smt_present static key") 01daf56875ee ("x86/speculation: Reorganize speculation control MSRs update") 26c4d75b2340 ("x86/speculation: Rename SSBD update functions") 34bce7c9690b ("x86/speculation: Disable STIBP when enhanced IBRS is in use") a8f76ae41cd6 ("x86/speculation: Move STIPB/IBPB string conditionals out of cpu_show_common()") b86bda042685 ("x86/speculation: Remove unnecessary ret variable in cpu_show_common()") ef014aae8f1c ("x86/retpoline: Remove minimal retpoline support") 4cd24de3a098 ("x86/retpoline: Make CONFIG_RETPOLINE depend on compiler support") d82924c3b8d0 ("Merge branch 'x86-pti-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip")