APPLIED: [SRU][Noble][PULL] Noble upstream stable patchset 2026-04-13

Edoardo Canepa edoardo.canepa at canonical.com
Fri May 8 18:31:11 UTC 2026


Applied to N:linux/master-next. Thanks.

On 4/14/26 21:01, alice.munduruca at canonical.com wrote:
> This pull request (26 commits) includes the following Noble stable patchsets:
>
>          Noble update: upstream stable patchset 2026-04-13
>                   Ported from the following upstream stable releases:
>                           v6.6.125, v6.12.71, v6.12.72
>          https://bugs.launchpad.net/bugs/2148260
>
> Note also that the 'stable-next' branch head contains this and all
> prior pending upstream stable releases. I recommend fetching and
> applying just this reference ('stable-next') instead of each
> tags/noble-stable-* reference:
>
>    git://git.launchpad.net/~ubuntu-kernel-stable/+git/noble stable-next
>
>   - Alice C. Munduruca
>
> ------------------------------------------------------------------------
>
> The following changes since commit 5682dee4c4efd5671985a19c43e83549bd3c3cf0:
>
>    UBUNTU: Upstream stable to v6.6.124, v6.12.70 (2026-04-10 13:57:25 +0200)
>
> are available in the Git repository at:
>
>    git://git.launchpad.net/~ubuntu-kernel-stable/+git/noble tags/noble-stable-2026-04-13
>
> for you to fetch changes up to 6e88a3d4b0aaf6a57505dc71801e8202da80522a:
>
>    UBUNTU: Upstream stable to v6.6.125, v6.12.71, v6.12.72 (2026-04-13 20:00:22 -0400)
>
> ----------------------------------------------------------------
> Alice C. Munduruca (2):
>        Revert "netfilter: nf_tables: missing objects with no memcg accounting"
>        UBUNTU: Upstream stable to v6.6.125, v6.12.71, v6.12.72
>
> Anil Gurumurthy (4):
>        scsi: qla2xxx: Validate sp before freeing associated memory
>        scsi: qla2xxx: Delay module unload while fabric scan in progress
>        scsi: qla2xxx: Free sp in error path to fix system crash
>        scsi: qla2xxx: Query FW again before proceeding with login
>
> Bibo Mao (2):
>        crypto: virtio - Add spinlock protection with virtqueue notification
>        crypto: virtio - Remove duplicated virtqueue_kick in virtio_crypto_skcipher_crypt_req
>
> Bitterblue Smith (1):
>        wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()
>
> Danilo Krummrich (1):
>        gpio: omap: do not register driver in probe()
>
> Edward Adam Davis (1):
>        nilfs2: Fix potential block overflow that cause system hang
>
> Eric Dumazet (1):
>        mptcp: fix race in mptcp_pm_nl_flush_addrs_doit()
>
> Henrique Carvalho (2):
>        smb: client: split cached_fid bitfields to avoid shared-byte RMW races
>        smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()
>
> Kees Cook (1):
>        crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly
>
> Khairul Anuar Romli (1):
>        spi: cadence-quadspi: Implement refcount to handle unbind during busy
>
> Konstantin Shkolnyy (1):
>        vsock/test: verify socket options after setting them
>
> Liu Song (1):
>        PCI: endpoint: Avoid creating sub-groups asynchronously
>
> Matthieu Baerts (NGI0) (1):
>        selftests: mptcp: pm: ensure unknown flags are ignored
>
> Menglong Dong (1):
>        net: tunnel: make skb_vlan_inet_prepare() return drop reasons
>
> Namjae Jeon (1):
>        ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths
>
> Pablo Neira Ayuso (1):
>        netfilter: nf_tables: missing objects with no memcg accounting
>
> Shreyas Deodhar (1):
>        scsi: qla2xxx: Allow recovery for tape devices
>
> Thorsten Blum (2):
>        crypto: octeontx - Fix length check to avoid truncation in ucode_load_store
>        crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode
>
> Zenm Chen (1):
>        Bluetooth: btusb: Add USB ID 7392:e611 for Edimax EW-7611UXB
>
>   debian.master/upstream-stable                      |   4 +-
>   drivers/bluetooth/btusb.c                          |   2 +
>   drivers/crypto/intel/iaa/iaa_crypto_main.c         |  12 +-
>   drivers/crypto/marvell/octeontx/otx_cptpf_ucode.c  |   2 +-
>   drivers/crypto/omap-crypto.c                       |   2 +-
>   drivers/crypto/virtio/virtio_crypto_core.c         |   5 +
>   .../crypto/virtio/virtio_crypto_skcipher_algs.c    |   2 -
>   drivers/gpio/gpio-omap.c                           |  22 +++-
>   drivers/net/bareudp.c                              |   4 +-
>   drivers/net/geneve.c                               |   4 +-
>   drivers/net/vxlan/vxlan_core.c                     |   2 +-
>   drivers/net/wireless/realtek/rtw88/main.c          |   4 +-
>   drivers/pci/endpoint/pci-ep-cfs.c                  |  15 +--
>   drivers/scsi/qla2xxx/qla_gs.c                      |  41 +++---
>   drivers/scsi/qla2xxx/qla_init.c                    |  28 ++--
>   drivers/scsi/qla2xxx/qla_isr.c                     |  19 ++-
>   drivers/scsi/qla2xxx/qla_os.c                      |   3 +-
>   drivers/spi/spi-cadence-quadspi.c                  |  33 +++++
>   fs/nilfs2/sufile.c                                 |   4 +
>   fs/smb/client/cached_dir.h                         |   8 +-
>   fs/smb/server/server.c                             |   6 +-
>   fs/smb/server/transport_tcp.c                      |   3 +-
>   include/net/ip_tunnels.h                           |  13 +-
>   net/mptcp/pm_netlink.c                             |  16 ++-
>   net/netfilter/nft_set_pipapo.c                     |   2 +-
>   tools/testing/selftests/net/mptcp/pm_netlink.sh    |   4 +
>   tools/testing/selftests/net/mptcp/pm_nl_ctl.c      |  11 ++
>   tools/testing/vsock/control.c                      |   9 +-
>   tools/testing/vsock/util.c                         | 143 +++++++++++++++++++++
>   tools/testing/vsock/util.h                         |   7 +
>   tools/testing/vsock/vsock_test.c                   |  29 ++---
>   31 files changed, 348 insertions(+), 111 deletions(-)
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0x20F88172E14F6784.asc
Type: application/pgp-keys
Size: 3167 bytes
Desc: OpenPGP public key
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20260508/d7f0fdd1/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20260508/d7f0fdd1/attachment.sig>


More information about the kernel-team mailing list