Your message dated Wed, 19 Feb 2025 15:57:14 +0100 (CET)
with message-id <20250219145714.08a2dbe2...@eldamar.lan>
and subject line Closing this bug (BTS maintenance for src:linux bugs)
has caused the Debian Bug report #965292,
regarding linux-image-5.6.14: Sky2 ethernet driver bug
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
965292: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965292
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-5.6.14
Version: 5.6.14
Severity: important

Dear Maintainer,

   * What led up to the situation?

Noticed that the sky2 ethernet driver was flooding /var/log/messages like so:

Jul 18 15:03:06 nehalem kernel: [75100.182612] device eth0 entered promiscuous 
mode
Jul 18 15:03:08 nehalem kernel: [75102.108331] device eth0 left promiscuous mode
Jul 18 15:03:11 nehalem kernel: [75105.182616] device eth0 entered promiscuous 
mode
Jul 18 15:03:13 nehalem kernel: [75107.175461] device eth0 left promiscuous mode
Jul 18 15:03:16 nehalem kernel: [75110.222602] device eth0 entered promiscuous 
mode
Jul 18 15:03:18 nehalem kernel: [75112.181979] device eth0 left promiscuous mode

This will ping-pong forever without corrective action.

It can be stopped by enabling promiscuous mode on the interface, i.e. 'ifconfig 
eth0 promisc'. That however should
 not be necessary. By testing older kernels (and therefore older versions of 
the sky2 driver) I discovered that as
 of 4.9.2 and earlier this problem did not exist. At some point between 4.9.2 
and 5.6.14 changes to the driver
 introduced this problem.


-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.6.14 (SMP w/8 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_WARN, TAINT_OOT_MODULE
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8), 
LANGUAGE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

--- End Message ---
--- Begin Message ---
Hi

This bug was filed for a very old kernel or the bug is old itself
without resolution.

If you can reproduce it with

- the current version in unstable/testing
- the latest kernel from backports

please reopen the bug, see https://www.debian.org/Bugs/server-control
for details.

Regards,
Salvatore

--- End Message ---

Reply via email to