APPLIED: [SRU][Jammy][PULL] Jammy update: v5.15.193 upstream stable release

Edoardo Canepa edoardo.canepa at canonical.com
Fri Oct 10 14:52:48 UTC 2025


Applied to jammy/master-next. Thanks.

On 10/10/25 16:15, bethany.jamison at canonical.com wrote:
> This pull request (10 commits) includes the following Jammy stable patchsets:
>
>          Jammy update: v5.15.193 upstream stable release
>          https://bugs.launchpad.net/bugs/2127112
>
> Note also that the 'stable-next' branch head contains this and all
> prior pending upstream stable releases. I recommend fetching and
> applying just this reference ('stable-next') instead of each
> tags/jammy-stable-* reference:
>
>    git://git.launchpad.net/~bjamison/+git/ubuntu-kernel-stable-jammy stable-next
>
>   -Bethany Jamison
>
> ------------------------------------------------------------------------
>
> The following changes since commit f3505b6f4f5ac8d45c490f9332abf14f78720f32:
>
>    UBUNTU: Upstream stable to v5.15.192 (2025-10-08 10:59:32 -0500)
>
> are available in the Git repository at:
>
>    git://git.launchpad.net/~bjamison/+git/ubuntu-kernel-stable-jammy tags/jammy-stable-v5.15.193
>
> for you to fetch changes up to d3c7c6a9c592d7d13e522f97278a6a8d92a5e74a:
>
>    UBUNTU: Upstream stable to v5.15.193 (2025-10-08 12:50:18 -0500)
>
> ----------------------------------------------------------------
> Bethany Jamison (2):
>        UBUNTU: [Config] enable CONFIG_MITIGATION_VMSCAPE
>        UBUNTU: Upstream stable to v5.15.193
>
> Greg Kroah-Hartman (1):
>        Linux 5.15.193
>
> Pawan Gupta (7):
>        Documentation/hw-vuln: Add VMSCAPE documentation
>        x86/vmscape: Enumerate VMSCAPE bug
>        x86/vmscape: Add conditional IBPB mitigation
>        x86/vmscape: Enable the mitigation
>        x86/bugs: Move cpu_bugs_smt_update() down
>        x86/vmscape: Warn when STIBP is disabled with SMT
>        x86/vmscape: Add old Intel CPUs to affected list
>
>   Documentation/ABI/testing/sysfs-devices-system-cpu |   1 +
>   Documentation/admin-guide/hw-vuln/index.rst        |   1 +
>   Documentation/admin-guide/hw-vuln/vmscape.rst      | 110 +++++++++
>   Documentation/admin-guide/kernel-parameters.txt    |  11 +
>   Makefile                                           |   2 +-
>   arch/x86/Kconfig                                   |   9 +
>   arch/x86/include/asm/cpufeatures.h                 |   2 +
>   arch/x86/include/asm/entry-common.h                |   7 +
>   arch/x86/include/asm/nospec-branch.h               |   2 +
>   arch/x86/kernel/cpu/bugs.c                         | 264 +++++++++++++++------
>   arch/x86/kernel/cpu/common.c                       |  77 +++---
>   arch/x86/kvm/x86.c                                 |   9 +
>   debian.master/config/annotations                   |   1 +
>   debian.master/upstream-stable                      |   2 +-
>   drivers/base/cpu.c                                 |   6 +
>   include/linux/cpu.h                                |   1 +
>   16 files changed, 395 insertions(+), 110 deletions(-)
>   create mode 100644 Documentation/admin-guide/hw-vuln/vmscape.rst
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x20F88172E14F6784.asc
Type: application/pgp-keys
Size: 3167 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20251010/486c54f7/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20251010/486c54f7/attachment.sig>


More information about the kernel-team mailing list