--- /dev/null
+From foo@baz Tue Apr 9 07:32:41 PM CEST 2024
+Date: Tue, 09 Apr 2024 19:32:41 +0200
+To: Greg KH <gregkh@linuxfoundation.org>
+From: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+Subject: x86: set SPECTRE_BHI_ON as default
+
+commit 2bb69f5fc72183e1c62547d900f560d0e9334925 upstream.
+
+Part of a merge commit from Linus that adjusted the default setting of
+SPECTRE_BHI_ON.
+
+Cc: Linus Torvalds <torvalds@linux-foundation.org>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ arch/x86/Kconfig | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+--- a/arch/x86/Kconfig
++++ b/arch/x86/Kconfig
+@@ -2569,7 +2569,7 @@ config MITIGATION_RFDS
+ choice
+ prompt "Clear branch history"
+ depends on CPU_SUP_INTEL
+- default SPECTRE_BHI_AUTO
++ default SPECTRE_BHI_ON
+ help
+ Enable BHI mitigations. BHI attacks are a form of Spectre V2 attacks
+ where the branch history buffer is poisoned to speculatively steer