New kmod-rtsx_pci packages are now available for Red Hat Enterprise Linux 6.
The kmod-rtsx_pci packages contain the Realtek card reader RTS5250S SD4.0 driverkernel module.

These packages add support for the Realtek RTS5250S card reader.The PCI ID supported by these packages: 10EC:525AThe kernel modules delivered by this erratum have been made available aspart of the Red Hat Driver Update Program, which provides updated kernelmodules that add support for selected devices in advance of the next RedHat Enterprise Linux minor update release. We strongly recommend thatthese kernel modules are used only to enable the specific hardware mentioned inthis erratum.

For all other devices that require this driver, partners andcustomers are recommended to continue to use the driver that is shipped in thelatest Red Hat Enterprise Linux kernel. (BZ#1410849)All users who require kmod-rtsx_pci are advised to install these new packages.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
rtsx_pci-642-1.el6_8.src.rpm
    MD5: 7850f79344615628a679e8a4c9947bb4SHA-256: 198875b7b69df3c16491a97bbc1acc837c873fc0dae76af2028d34ad96dcb546
 
IA-32:
kmod-rtsx_pci-642-1.el6_8.i686.rpm
    MD5: f3ca1a7ed6131ef5710b636f7ecab67bSHA-256: 8eff36021a365c421592c4635f02f473f245c68df070b97736b6e8eca47e2bbb
rtsx_pci-debuginfo-642-1.el6_8.i686.rpm
    MD5: 3eb7b63986834c709e7b1b30ec7badc6SHA-256: d2e41df1e336ec4286498f1cd8f9b2777844ea5d70a348ae4721a745ef66ea58
 
x86_64:
kmod-rtsx_pci-642-1.el6_8.x86_64.rpm
    MD5: 1549ddfbf43d03648b32d2d229af3859SHA-256: 5e22f5c57080292e6d4200db65541c0f4f4ba729d30016e9c07d3ae9575d53e8
rtsx_pci-debuginfo-642-1.el6_8.x86_64.rpm
    MD5: 395fa704f859bce826b7358e578c95b7SHA-256: 852d8cff16e43df0f899245d4ee3a4d6779acadb80dfd8e085291059ff63acbf
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
rtsx_pci-642-1.el6_8.src.rpm
    MD5: 7850f79344615628a679e8a4c9947bb4SHA-256: 198875b7b69df3c16491a97bbc1acc837c873fc0dae76af2028d34ad96dcb546
 
x86_64:
kmod-rtsx_pci-642-1.el6_8.x86_64.rpm
    MD5: 1549ddfbf43d03648b32d2d229af3859SHA-256: 5e22f5c57080292e6d4200db65541c0f4f4ba729d30016e9c07d3ae9575d53e8
rtsx_pci-debuginfo-642-1.el6_8.x86_64.rpm
    MD5: 395fa704f859bce826b7358e578c95b7SHA-256: 852d8cff16e43df0f899245d4ee3a4d6779acadb80dfd8e085291059ff63acbf
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
rtsx_pci-642-1.el6_8.src.rpm
    MD5: 7850f79344615628a679e8a4c9947bb4SHA-256: 198875b7b69df3c16491a97bbc1acc837c873fc0dae76af2028d34ad96dcb546
 
IA-32:
kmod-rtsx_pci-642-1.el6_8.i686.rpm
    MD5: f3ca1a7ed6131ef5710b636f7ecab67bSHA-256: 8eff36021a365c421592c4635f02f473f245c68df070b97736b6e8eca47e2bbb
rtsx_pci-debuginfo-642-1.el6_8.i686.rpm
    MD5: 3eb7b63986834c709e7b1b30ec7badc6SHA-256: d2e41df1e336ec4286498f1cd8f9b2777844ea5d70a348ae4721a745ef66ea58
 
x86_64:
kmod-rtsx_pci-642-1.el6_8.x86_64.rpm
    MD5: 1549ddfbf43d03648b32d2d229af3859SHA-256: 5e22f5c57080292e6d4200db65541c0f4f4ba729d30016e9c07d3ae9575d53e8
rtsx_pci-debuginfo-642-1.el6_8.x86_64.rpm
    MD5: 395fa704f859bce826b7358e578c95b7SHA-256: 852d8cff16e43df0f899245d4ee3a4d6779acadb80dfd8e085291059ff63acbf
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
rtsx_pci-642-1.el6_8.src.rpm
    MD5: 7850f79344615628a679e8a4c9947bb4SHA-256: 198875b7b69df3c16491a97bbc1acc837c873fc0dae76af2028d34ad96dcb546
 
IA-32:
kmod-rtsx_pci-642-1.el6_8.i686.rpm
    MD5: f3ca1a7ed6131ef5710b636f7ecab67bSHA-256: 8eff36021a365c421592c4635f02f473f245c68df070b97736b6e8eca47e2bbb
rtsx_pci-debuginfo-642-1.el6_8.i686.rpm
    MD5: 3eb7b63986834c709e7b1b30ec7badc6SHA-256: d2e41df1e336ec4286498f1cd8f9b2777844ea5d70a348ae4721a745ef66ea58
 
x86_64:
kmod-rtsx_pci-642-1.el6_8.x86_64.rpm
    MD5: 1549ddfbf43d03648b32d2d229af3859SHA-256: 5e22f5c57080292e6d4200db65541c0f4f4ba729d30016e9c07d3ae9575d53e8
rtsx_pci-debuginfo-642-1.el6_8.x86_64.rpm
    MD5: 395fa704f859bce826b7358e578c95b7SHA-256: 852d8cff16e43df0f899245d4ee3a4d6779acadb80dfd8e085291059ff63acbf
 
(The unlinked packages above are only available from the Red Hat Network)

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply