[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#552465: marked as done (r8169 does not work correctly for RTL8111)



Your message dated Wed, 20 Jan 2010 13:53:07 +0000
with message-id <E1NXazb-0003VQ-Ei@ries.debian.org>
and subject line Bug#552465: fixed in user-mode-linux 2.6.26-1um-2+21
has caused the Debian Bug report #552465,
regarding r8169 does not work correctly for RTL8111
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
552465: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552465
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-2.6
Version: 2.6.26-13lenny2
Severity: important

Hi,

Ben Hutchings suggested to report a bug for this. With lenny and its
usual 2.6.26 kernel the r8169 driver is loaded for the following card:

01:00.0 Ethernet controller: Realtek Semiconductor Co., Ltd.
RTL8111/8168B PCI Express Gigabit Ethernet controller (rev 03)

This is right, except that the version in the Lenny kernel does not work
for this card. Usually it fails to detect the link properly and says
that the "device is not ready" instead. From a hardware side one can
say that a link exists (both by looking at the cards LED and the
switch LED to which it is connected).
Using the 8168 driver from Realtek is working fine.
Sometimes the 8169 also works (it worked fine when I had it connected
at a friends place, so probably related to the hardware to which it
is attached).

The problem has gone away in 2.6.31. There the driver is working fine.
Sorry, but I cannot provide logs anymore, because I don't have such.
I'm also not using the Lenny 2.6.26 kernel anymore, because the ath5k
code in that kernel is outdated and does not support the master mode,
which I need.

Best Regards,
Patrick

-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing')
Architecture: i386 (x86_64)

Kernel: Linux 2.6.30-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



--- End Message ---
--- Begin Message ---
Source: user-mode-linux
Source-Version: 2.6.26-1um-2+21

We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:

user-mode-linux_2.6.26-1um-2+21.diff.gz
  to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+21.diff.gz
user-mode-linux_2.6.26-1um-2+21.dsc
  to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+21.dsc
user-mode-linux_2.6.26-1um-2+21_i386.deb
  to main/u/user-mode-linux/user-mode-linux_2.6.26-1um-2+21_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 552465@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <dannf@debian.org> (supplier of updated user-mode-linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 19 Jan 2010 18:32:16 -0700
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source i386
Version: 2.6.26-1um-2+21
Distribution: stable
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Closes: 332942 444043 513050 522922 550898 552465 558426 559064
Changes: 
 user-mode-linux (2.6.26-1um-2+21) stable; urgency=high
 .
   * Rebuild against linux-source-2.6.26 (2.6.26-21):
     [ Ben Hutchings ]
     * Fix false soft lockup reports for the nohz idle loop
     * nohz: Fix two bugs that can keep a processor idle and lead to a
       system hang (may fix #496917, #538158 and others)
     * usbmidi: Fix crash when device is disconnected (Closes: #513050)
     * r8169: Apply various upstream bug fixes
     * r8169: Add support for RTL8101e (v2), RTL8102e (v1,v2,v3),
       RTL8168c/8111c (v3,v4), RTL8168cp/8111cp (v2,v3), RTL8168d (v1)
       (Closes: #552465; may fix #516187)
     * Revert patch to sanitise <linux/socket.h>, which introduced
       different build failures
     * usbnet: Set link down initially for drivers that update link state
       (Closes: #444043)
     * atl1e: Remove broken implementation of TSO for TCP/IPv6
       (Closes: #558426) and allow other hardware offloads to be disabled in
       case they are also buggy
 .
     [ dann frazier ]
     * floppy: request and release only the ports we actually use
       (Closes: #332942)
     * igb: Add 82576 MAC support (Closes: #522922), backport
       by Ben Hutchings
     * [SCSI] gdth: Prevent negative offsets in ioctl (CVE-2009-3080)
     * NFSv4: Fix a problem whereby a buggy server can oops the kernel
       (CVE-2009-3726)
     * [SCSI] megaraid_sas: remove sysfs dbg_lvl world writeable permissions
       (CVE-2009-3889)
     * isdn: hfc_usb: Fix read buffer overflow (CVE-2009-4005)
     * fuse: prevent fuse_put_request on invalid pointer (CVE-2009-4021)
     * hpilo: new PCI ID (Closes: #559064)
     * Avoid /proc/$pid/maps visibility during initial setuid ELF loading
       (CVE-2009-2691)
     * hfs: fix a potential buffer overflow (CVE-2009-4020)
     * KVM: x86 emulator: limit instructions to 15 bytes (CVE-2009-4031)
     * firewire: ohci: handle receive packets with a data length of zero
       (CVE-2009-4138)
     * ext4: Avoid null pointer dereference when decoding EROFS w/o a journal
       (CVE-2009-4308)
     * s390: dasd diag - add support for read-only minidisks (Closes: #550898)
Checksums-Sha1: 
 ad9733dc7c4cd8fdff5904c8f1961d52db3977ed 1243 user-mode-linux_2.6.26-1um-2+21.dsc
 7ac14a7b6bb60654cb8c9595b75632a115bb4758 16601 user-mode-linux_2.6.26-1um-2+21.diff.gz
 6bc0fca4ea3760d9b3612801856050adf74a0a2c 5361360 user-mode-linux_2.6.26-1um-2+21_i386.deb
Checksums-Sha256: 
 3c1b24b7e98b96388cc8286d2056cef9a05079e340dfa079ea2dba8cfc42cc1e 1243 user-mode-linux_2.6.26-1um-2+21.dsc
 2fe9ce7d52a67a16bcb3a2c55988e4e4e7563d5f2c5db54d457060fbce813d3a 16601 user-mode-linux_2.6.26-1um-2+21.diff.gz
 7133e262a90829a6545b5fb5bb9d4cdac5f6c2f9d80319d782288c967c655275 5361360 user-mode-linux_2.6.26-1um-2+21_i386.deb
Files: 
 d986558a5d4929a2134d3fab8fcf73df 1243 misc extra user-mode-linux_2.6.26-1um-2+21.dsc
 3e654c18d23bc4bb3691b755d9ad45b0 16601 misc extra user-mode-linux_2.6.26-1um-2+21.diff.gz
 d08d51158ebf10e4fe55806ddee50cb8 5361360 misc extra user-mode-linux_2.6.26-1um-2+21_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iD8DBQFLVmYZhuANDBmkLRkRAj/YAKCOa3bHPPEJ1vRltHg/9EJutiyXyACdFnj4
lVFuVqQHFe1gqZMycEr/wWg=
=I7b2
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: