New kmod-tg3 packages are now available for Red Hat Enterprise Linux 6.

The kmod-tg3 packages provide kernel modules for controlling Broadcom Tigon3Ethernet network devices beyond what was delivered in the corresponding minorversion of Red Hat Enterprise Linux.This enhancement update adds the kmod-tg3 packages to Red Hat Enterprise Linux6.6. These packages contain a temporary driver update released as part of theRed Hat Enterprise Linux Driver Update Program (DUP). Notably, this version increases the timeout value on the “nvram” command to fixa lockup that in some cases occurred when using “nvram”, and that was preventingfirmware updates on certain Broadcom adapters. (BZ#1173182)Only users requiring temporary driver support for the specific hardware notedabove should install this package. Unless a system includes the exact hardwarekmod-tg3-3.137-2.el6_6 packages explicitly support, this package must not beinstalled.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
tg3-3.137-2.el6_6.src.rpm
    MD5: a00c6872da641caa19663c6613101be7SHA-256: 4000ceaa569d358f2c0f7a28facfe0f23476e0a9050a0c4357321d639da85c76
 
IA-32:
kmod-tg3-3.137-2.el6_6.i686.rpm
    MD5: 88ba478831038dd82618702c8707092dSHA-256: 5669f2d1351539fc9cb3f0b75cf1a2696a2a770df274c190c4482d2de4ed1f24
tg3-debuginfo-3.137-2.el6_6.i686.rpm
    MD5: 99ee1c09a7a1be4b0e2e3c20f2a7610eSHA-256: 4bd3080fc7f95b54cde9d0277ae3c63b9ee333c6e9208315173264c5ba18f182
 
x86_64:
kmod-tg3-3.137-2.el6_6.x86_64.rpm
    MD5: 29ed989d38f47788d3642ddfefd8a16cSHA-256: 825bf971c4578e45f2b337a8502a9ef06b225ec06671a281d830ecfea3754300
tg3-debuginfo-3.137-2.el6_6.x86_64.rpm
    MD5: 120000ba2d8a79d968ea51ffa192ce4bSHA-256: a3d9ccc62d7c63ff47023585f6cf9d5280a93506584f6d1cb89b1bad57e94eeb
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
tg3-3.137-2.el6_6.src.rpm
    MD5: a00c6872da641caa19663c6613101be7SHA-256: 4000ceaa569d358f2c0f7a28facfe0f23476e0a9050a0c4357321d639da85c76
 
x86_64:
kmod-tg3-3.137-2.el6_6.x86_64.rpm
    MD5: 29ed989d38f47788d3642ddfefd8a16cSHA-256: 825bf971c4578e45f2b337a8502a9ef06b225ec06671a281d830ecfea3754300
tg3-debuginfo-3.137-2.el6_6.x86_64.rpm
    MD5: 120000ba2d8a79d968ea51ffa192ce4bSHA-256: a3d9ccc62d7c63ff47023585f6cf9d5280a93506584f6d1cb89b1bad57e94eeb
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
tg3-3.137-2.el6_6.src.rpm
    MD5: a00c6872da641caa19663c6613101be7SHA-256: 4000ceaa569d358f2c0f7a28facfe0f23476e0a9050a0c4357321d639da85c76
 
IA-32:
kmod-tg3-3.137-2.el6_6.i686.rpm
    MD5: 88ba478831038dd82618702c8707092dSHA-256: 5669f2d1351539fc9cb3f0b75cf1a2696a2a770df274c190c4482d2de4ed1f24
tg3-debuginfo-3.137-2.el6_6.i686.rpm
    MD5: 99ee1c09a7a1be4b0e2e3c20f2a7610eSHA-256: 4bd3080fc7f95b54cde9d0277ae3c63b9ee333c6e9208315173264c5ba18f182
 
x86_64:
kmod-tg3-3.137-2.el6_6.x86_64.rpm
    MD5: 29ed989d38f47788d3642ddfefd8a16cSHA-256: 825bf971c4578e45f2b337a8502a9ef06b225ec06671a281d830ecfea3754300
tg3-debuginfo-3.137-2.el6_6.x86_64.rpm
    MD5: 120000ba2d8a79d968ea51ffa192ce4bSHA-256: a3d9ccc62d7c63ff47023585f6cf9d5280a93506584f6d1cb89b1bad57e94eeb
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
tg3-3.137-2.el6_6.src.rpm
    MD5: a00c6872da641caa19663c6613101be7SHA-256: 4000ceaa569d358f2c0f7a28facfe0f23476e0a9050a0c4357321d639da85c76
 
IA-32:
kmod-tg3-3.137-2.el6_6.i686.rpm
    MD5: 88ba478831038dd82618702c8707092dSHA-256: 5669f2d1351539fc9cb3f0b75cf1a2696a2a770df274c190c4482d2de4ed1f24
tg3-debuginfo-3.137-2.el6_6.i686.rpm
    MD5: 99ee1c09a7a1be4b0e2e3c20f2a7610eSHA-256: 4bd3080fc7f95b54cde9d0277ae3c63b9ee333c6e9208315173264c5ba18f182
 
x86_64:
kmod-tg3-3.137-2.el6_6.x86_64.rpm
    MD5: 29ed989d38f47788d3642ddfefd8a16cSHA-256: 825bf971c4578e45f2b337a8502a9ef06b225ec06671a281d830ecfea3754300
tg3-debuginfo-3.137-2.el6_6.x86_64.rpm
    MD5: 120000ba2d8a79d968ea51ffa192ce4bSHA-256: a3d9ccc62d7c63ff47023585f6cf9d5280a93506584f6d1cb89b1bad57e94eeb
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
tg3-3.137-2.el6_6.src.rpm
    MD5: a00c6872da641caa19663c6613101be7SHA-256: 4000ceaa569d358f2c0f7a28facfe0f23476e0a9050a0c4357321d639da85c76
 
IA-32:
kmod-tg3-3.137-2.el6_6.i686.rpm
    MD5: 88ba478831038dd82618702c8707092dSHA-256: 5669f2d1351539fc9cb3f0b75cf1a2696a2a770df274c190c4482d2de4ed1f24
tg3-debuginfo-3.137-2.el6_6.i686.rpm
    MD5: 99ee1c09a7a1be4b0e2e3c20f2a7610eSHA-256: 4bd3080fc7f95b54cde9d0277ae3c63b9ee333c6e9208315173264c5ba18f182
 
x86_64:
kmod-tg3-3.137-2.el6_6.x86_64.rpm
    MD5: 29ed989d38f47788d3642ddfefd8a16cSHA-256: 825bf971c4578e45f2b337a8502a9ef06b225ec06671a281d830ecfea3754300
tg3-debuginfo-3.137-2.el6_6.x86_64.rpm
    MD5: 120000ba2d8a79d968ea51ffa192ce4bSHA-256: a3d9ccc62d7c63ff47023585f6cf9d5280a93506584f6d1cb89b1bad57e94eeb
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply