[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

linux_6.16.12-1_source.changes ACCEPTED into unstable



Thank you for your contribution to Debian.



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 13 Oct 2025 17:42:52 +0200
Source: linux
Architecture: source
Version: 6.16.12-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Changes:
 linux (6.16.12-1) unstable; urgency=medium
 .
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.16.12
     - ALSA: hda/tas2781: Fix the order of TAS2781 calibrated-data
     - drm/amdgpu: Enable MES lr_compute_wa by default
     - wifi: rtw89: mcc: stop TX during MCC prepare
     - wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()
     - USB: serial: option: add SIMCom 8230C compositions
     - Bluetooth: btusb: Add USB ID 2001:332a for D-Link AX9U rev. A1
     - wifi: rtlwifi: rtl8192cu: Don't claim USB ID 07b8:8188
     - wifi: rtl8xxxu: Don't claim USB ID 07b8:8188
     - gpiolib: acpi: Ignore touchpad wakeup on GPD G1619-05
     - [amd64] ASoC: rt712: avoid skipping the blind write
     - dm-integrity: limit MAX_TAG_SIZE to 255
     - [amd64] platform/x86/amd/pmc: Add MECHREVO Yilong15Pro to spurious_8042
       list
     - drm/amdgpu/gfx11: Add Cleaner Shader Support for GFX11.0.1/11.0.4 GPUs
     - [amd64] platform/x86/amd/pmf: Support new ACPI ID AMDI0108
     - [amd64,arm64] ASoC: rt5682s: Adjust SAR ADC button mode to fix noise issue
     - btrfs: ref-verify: handle damaged extent root tree
     - netfs: Prevent duplicate unlocking
     - iommufd: WARN if an object is aborted with an elevated refcount
     - can: hi311x: fix null pointer dereference when resuming from sleep before
       interface was enabled
     - [amd64] platform/x86/amd/pmc: Add Stellaris Slim Gen6 AMD to spurious 8042
       quirks list
     - hid: fix I2C read buffer overflow in raw_event() for mcp2221
     - nvmem: layouts: fix automatic module loading
     - binder: fix double-free in dbitmap
     - driver core: faux: Set power.no_pm for faux devices
     - driver core/PM: Set power.no_callbacks along with power.no_pm
     - crypto: rng - Ensure set_ent is always present
     - net/9p: fix double req put in p9_fd_cancelled
     - [amd64] KVM: x86: Don't (re)check L1 intercepts when completing userspace
       I/O
     - ring buffer: Propagate __rb_map_vma return value to caller
Checksums-Sha1:
 04a5ccb482a985ff37ed5dfe7a6ab6cf991212a1 210812 linux_6.16.12-1.dsc
 6c5094cd8ac653855ba6b8b0745832ce1272cc4e 155713912 linux_6.16.12.orig.tar.xz
 f2173f98495a328dd46c613933e99a17cc0591b5 1552776 linux_6.16.12-1.debian.tar.xz
 9164ff8ab6a2981a0b17b42458f4a3ab0c616197 6740 linux_6.16.12-1_source.buildinfo
Checksums-Sha256:
 f6189d6088342991ff6e6e5466f1168f0694fbf02d4da4ae60fee91db804e8a4 210812 linux_6.16.12-1.dsc
 5e9ac6caae163268a9c9d4f1769f41a261cd9bad81c24487b8d8a7c0e277d2a8 155713912 linux_6.16.12.orig.tar.xz
 ecdc79561f7c7fecd8f8f2bc070a51cadc72ea508947b4f8cc96688a7d6af8f0 1552776 linux_6.16.12-1.debian.tar.xz
 49e98a61aa5af553d7400b660f625ff436022331e89a13e435774735ee4447fe 6740 linux_6.16.12-1_source.buildinfo
Files:
 038d1b0252bfac588de563355fb033aa 210812 kernel optional linux_6.16.12-1.dsc
 b7bfb8baa3aa5edeec1e534448428c40 155713912 kernel optional linux_6.16.12.orig.tar.xz
 40f95e17ccc369b599f1ba3cca07741d 1552776 kernel optional linux_6.16.12-1.debian.tar.xz
 d1afb47a79fafd4a2da40b6a049a3ecf 6740 kernel optional linux_6.16.12-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=Bo1r
-----END PGP SIGNATURE-----

Attachment: pgp5B4nW6GaIm.pgp
Description: PGP signature


Reply to: