APPLIED: [SRU][Noble][PULL] Noble upstream stable patchset 2026-04-13
Edoardo Canepa
edoardo.canepa at canonical.com
Fri May 8 18:31:11 UTC 2026
Applied to N:linux/master-next. Thanks.
On 4/14/26 21:01, alice.munduruca at canonical.com wrote:
> This pull request (26 commits) includes the following Noble stable patchsets:
>
> Noble update: upstream stable patchset 2026-04-13
> Ported from the following upstream stable releases:
> v6.6.125, v6.12.71, v6.12.72
> https://bugs.launchpad.net/bugs/2148260
>
> Note also that the 'stable-next' branch head contains this and all
> prior pending upstream stable releases. I recommend fetching and
> applying just this reference ('stable-next') instead of each
> tags/noble-stable-* reference:
>
> git://git.launchpad.net/~ubuntu-kernel-stable/+git/noble stable-next
>
> - Alice C. Munduruca
>
> ------------------------------------------------------------------------
>
> The following changes since commit 5682dee4c4efd5671985a19c43e83549bd3c3cf0:
>
> UBUNTU: Upstream stable to v6.6.124, v6.12.70 (2026-04-10 13:57:25 +0200)
>
> are available in the Git repository at:
>
> git://git.launchpad.net/~ubuntu-kernel-stable/+git/noble tags/noble-stable-2026-04-13
>
> for you to fetch changes up to 6e88a3d4b0aaf6a57505dc71801e8202da80522a:
>
> UBUNTU: Upstream stable to v6.6.125, v6.12.71, v6.12.72 (2026-04-13 20:00:22 -0400)
>
> ----------------------------------------------------------------
> Alice C. Munduruca (2):
> Revert "netfilter: nf_tables: missing objects with no memcg accounting"
> UBUNTU: Upstream stable to v6.6.125, v6.12.71, v6.12.72
>
> Anil Gurumurthy (4):
> scsi: qla2xxx: Validate sp before freeing associated memory
> scsi: qla2xxx: Delay module unload while fabric scan in progress
> scsi: qla2xxx: Free sp in error path to fix system crash
> scsi: qla2xxx: Query FW again before proceeding with login
>
> Bibo Mao (2):
> crypto: virtio - Add spinlock protection with virtqueue notification
> crypto: virtio - Remove duplicated virtqueue_kick in virtio_crypto_skcipher_crypt_req
>
> Bitterblue Smith (1):
> wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()
>
> Danilo Krummrich (1):
> gpio: omap: do not register driver in probe()
>
> Edward Adam Davis (1):
> nilfs2: Fix potential block overflow that cause system hang
>
> Eric Dumazet (1):
> mptcp: fix race in mptcp_pm_nl_flush_addrs_doit()
>
> Henrique Carvalho (2):
> smb: client: split cached_fid bitfields to avoid shared-byte RMW races
> smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()
>
> Kees Cook (1):
> crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly
>
> Khairul Anuar Romli (1):
> spi: cadence-quadspi: Implement refcount to handle unbind during busy
>
> Konstantin Shkolnyy (1):
> vsock/test: verify socket options after setting them
>
> Liu Song (1):
> PCI: endpoint: Avoid creating sub-groups asynchronously
>
> Matthieu Baerts (NGI0) (1):
> selftests: mptcp: pm: ensure unknown flags are ignored
>
> Menglong Dong (1):
> net: tunnel: make skb_vlan_inet_prepare() return drop reasons
>
> Namjae Jeon (1):
> ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths
>
> Pablo Neira Ayuso (1):
> netfilter: nf_tables: missing objects with no memcg accounting
>
> Shreyas Deodhar (1):
> scsi: qla2xxx: Allow recovery for tape devices
>
> Thorsten Blum (2):
> crypto: octeontx - Fix length check to avoid truncation in ucode_load_store
> crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode
>
> Zenm Chen (1):
> Bluetooth: btusb: Add USB ID 7392:e611 for Edimax EW-7611UXB
>
> debian.master/upstream-stable | 4 +-
> drivers/bluetooth/btusb.c | 2 +
> drivers/crypto/intel/iaa/iaa_crypto_main.c | 12 +-
> drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c | 2 +-
> drivers/crypto/omap-crypto.c | 2 +-
> drivers/crypto/virtio/virtio_crypto_core.c | 5 +
> .../crypto/virtio/virtio_crypto_skcipher_algs.c | 2 -
> drivers/gpio/gpio-omap.c | 22 +++-
> drivers/net/bareudp.c | 4 +-
> drivers/net/geneve.c | 4 +-
> drivers/net/vxlan/vxlan_core.c | 2 +-
> drivers/net/wireless/realtek/rtw88/main.c | 4 +-
> drivers/pci/endpoint/pci-ep-cfs.c | 15 +--
> drivers/scsi/qla2xxx/qla_gs.c | 41 +++---
> drivers/scsi/qla2xxx/qla_init.c | 28 ++--
> drivers/scsi/qla2xxx/qla_isr.c | 19 ++-
> drivers/scsi/qla2xxx/qla_os.c | 3 +-
> drivers/spi/spi-cadence-quadspi.c | 33 +++++
> fs/nilfs2/sufile.c | 4 +
> fs/smb/client/cached_dir.h | 8 +-
> fs/smb/server/server.c | 6 +-
> fs/smb/server/transport_tcp.c | 3 +-
> include/net/ip_tunnels.h | 13 +-
> net/mptcp/pm_netlink.c | 16 ++-
> net/netfilter/nft_set_pipapo.c | 2 +-
> tools/testing/selftests/net/mptcp/pm_netlink.sh | 4 +
> tools/testing/selftests/net/mptcp/pm_nl_ctl.c | 11 ++
> tools/testing/vsock/control.c | 9 +-
> tools/testing/vsock/util.c | 143 +++++++++++++++++++++
> tools/testing/vsock/util.h | 7 +
> tools/testing/vsock/vsock_test.c | 29 ++---
> 31 files changed, 348 insertions(+), 111 deletions(-)
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x20F88172E14F6784.asc
Type: application/pgp-keys
Size: 3167 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20260508/d7f0fdd1/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20260508/d7f0fdd1/attachment.sig>
More information about the kernel-team
mailing list