APPLIED: [SRU][Jammy][PULL] Jammy update: v5.15.193 upstream stable release
Edoardo Canepa
edoardo.canepa at canonical.com
Fri Oct 10 14:52:48 UTC 2025
Applied to jammy/master-next. Thanks.
On 10/10/25 16:15, bethany.jamison at canonical.com wrote:
> This pull request (10 commits) includes the following Jammy stable patchsets:
>
> Jammy update: v5.15.193 upstream stable release
> https://bugs.launchpad.net/bugs/2127112
>
> Note also that the 'stable-next' branch head contains this and all
> prior pending upstream stable releases. I recommend fetching and
> applying just this reference ('stable-next') instead of each
> tags/jammy-stable-* reference:
>
> git://git.launchpad.net/~bjamison/+git/ubuntu-kernel-stable-jammy stable-next
>
> -Bethany Jamison
>
> ------------------------------------------------------------------------
>
> The following changes since commit f3505b6f4f5ac8d45c490f9332abf14f78720f32:
>
> UBUNTU: Upstream stable to v5.15.192 (2025-10-08 10:59:32 -0500)
>
> are available in the Git repository at:
>
> git://git.launchpad.net/~bjamison/+git/ubuntu-kernel-stable-jammy tags/jammy-stable-v5.15.193
>
> for you to fetch changes up to d3c7c6a9c592d7d13e522f97278a6a8d92a5e74a:
>
> UBUNTU: Upstream stable to v5.15.193 (2025-10-08 12:50:18 -0500)
>
> ----------------------------------------------------------------
> Bethany Jamison (2):
> UBUNTU: [Config] enable CONFIG_MITIGATION_VMSCAPE
> UBUNTU: Upstream stable to v5.15.193
>
> Greg Kroah-Hartman (1):
> Linux 5.15.193
>
> Pawan Gupta (7):
> Documentation/hw-vuln: Add VMSCAPE documentation
> x86/vmscape: Enumerate VMSCAPE bug
> x86/vmscape: Add conditional IBPB mitigation
> x86/vmscape: Enable the mitigation
> x86/bugs: Move cpu_bugs_smt_update() down
> x86/vmscape: Warn when STIBP is disabled with SMT
> x86/vmscape: Add old Intel CPUs to affected list
>
> Documentation/ABI/testing/sysfs-devices-system-cpu | 1 +
> Documentation/admin-guide/hw-vuln/index.rst | 1 +
> Documentation/admin-guide/hw-vuln/vmscape.rst | 110 +++++++++
> Documentation/admin-guide/kernel-parameters.txt | 11 +
> Makefile | 2 +-
> arch/x86/Kconfig | 9 +
> arch/x86/include/asm/cpufeatures.h | 2 +
> arch/x86/include/asm/entry-common.h | 7 +
> arch/x86/include/asm/nospec-branch.h | 2 +
> arch/x86/kernel/cpu/bugs.c | 264 +++++++++++++++------
> arch/x86/kernel/cpu/common.c | 77 +++---
> arch/x86/kvm/x86.c | 9 +
> debian.master/config/annotations | 1 +
> debian.master/upstream-stable | 2 +-
> drivers/base/cpu.c | 6 +
> include/linux/cpu.h | 1 +
> 16 files changed, 395 insertions(+), 110 deletions(-)
> create mode 100644 Documentation/admin-guide/hw-vuln/vmscape.rst
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x20F88172E14F6784.asc
Type: application/pgp-keys
Size: 3167 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20251010/486c54f7/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20251010/486c54f7/attachment.sig>
More information about the kernel-team
mailing list