Solved

Redhat linux 6.2 and eepro100 - busy or no resources

Posted on 2002-03-05
5
236 Views
Last Modified: 2010-03-18
Need to install Redhat Linux 6.2 on a server with an Intel eepro100 network card but insmod reports that it's either busy or it hasn't got any free resources..

(don't ask why I need to install version 6.2, I just have to do - server requirements that sort)

Anyway, I need a few hints to what I might do to fix it.

Easy points here, so everyone come on :)
0
Comment
Question by:htj
  • 2
  • 2
5 Comments
 
LVL 4

Expert Comment

by:MFCRich
ID: 6842241
Is that a PCMCIA card?
0
 

Author Comment

by:htj
ID: 6846689
nope, it's an eepro100..

I'm trying to install it on this:
http://www.saintsong.com.tw/english/products/tx2/all-tx2.htm
0
 
LVL 40

Expert Comment

by:jlevie
ID: 6849038
I'm pretty sure that I've installed 6.2 on a system with Intel NICs without having any problems. In this case it might be BIOS or motherboard problem. I didn't see a whole lot of good technical information on that page, so I can't tell if it is a custom MB or whether it uses one of the standard BIOS implementaions. If possible, you might try disabling PnP mode and see if you have any better luck.

Could you try a current version of RedHat, say 7.2, just to see if it might be a driver issue?
0
 

Author Comment

by:htj
ID: 6849941
yeah, I tried 7.2 but it blue screened me to death during the install bootup (believe it or not, RH show a blue BSOD :) . I got a signal 11 error.

I've tried disabling the pnp, the serial and the parallel port.

I've since given up and returned it. Reason being that the BIOS started resetting and the cdrom stopped reading my cd's.
0
 
LVL 40

Accepted Solution

by:
jlevie earned 200 total points
ID: 6850266
Ah, sounds like it might have had a hardware problem on the motherboard...
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now