[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#311357: marked as done (kernel-image-2.6.8-2: via-rhine fails to reserve I/O region, no networking available)

Your message dated Fri, 16 Dec 2005 21:30:24 -0800
with message-id <E1EnUeG-00008z-Ps@spohr.debian.org>
and subject line Bug#311357: fixed in kernel-source-2.6.8 2.6.8-16sarge1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

Received: (at submit) by bugs.debian.org; 31 May 2005 13:12:34 +0000
>From craig@copi.org Tue May 31 06:12:34 2005
Return-path: <craig@copi.org>
Received: from copi.org [] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1Dd6Xp-00046j-00; Tue, 31 May 2005 06:12:34 -0700
Received: by copi.org (Postfix, from userid 10000)
	id 0576F2D21; Tue, 31 May 2005 09:12:33 -0400 (EDT)
Received: from localhost (acheron.net.copi [])
	by copi.org (Postfix) with ESMTP id DA16B2D19
	for <submit@bugs.debian.org>; Tue, 31 May 2005 09:12:28 -0400 (EDT)
Received: by localhost (Postfix, from userid 400)
	id 5B36B28D72; Tue, 31 May 2005 09:12:28 -0400 (EDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Craig J Copi <craig@copi.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: kernel-image-2.6.8-2: via-rhine fails to reserve I/O region,
 no networking available
X-Mailer: reportbug 3.8
Date: Tue, 31 May 2005 09:12:28 -0400
Message-Id: <20050531131228.5B36B28D72@localhost>
X-SPF-Status: Unchecked
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: kernel-image-2.6.8-2-k7
Version: 2.6.8-16
Severity: important
File: kernel-image-2.6.8-2

The via-rhine module no longer configures my network card correctly.
This broke with the latest kernel upgrade.  Below are the messages from
the broken kernel and a working kernel.

When loading the via-rhine module at boot (or by hand) with kernel
2.6.8-16 I get
May 31 00:55:15 localhost kernel: via-rhine.c:v1.10-LK1.1.20-2.6
May-23-2004 Written by Donald Becker
May 31 00:55:15 localhost kernel: PCI: Found IRQ 10 for device 0000:00:06.0
May 31 00:55:15 localhost kernel: PCI: Sharing IRQ 10 with 0000:00:04.4
May 31 00:55:15 localhost kernel: PCI: Unable to reserve I/O region #1:80@d800 for device 0000:00:06.0
May 31 00:55:15 localhost kernel: via-rhine: probe of 0000:00:06.0 failed with error -16
and networking is unavailable on the system.

When loading the via-rhine module at boot (or by hand) with kernel
2.6.8-13 where it works I get
May 31 01:53:00 localhost kernel: via-rhine.c:v1.10-LK1.1.20-2.6
May-23-2004 Written by Donald Becker
May 31 01:53:00 localhost kernel: PCI: Found IRQ 10 for device 0000:00:06.0
May 31 01:53:00 localhost kernel: PCI: Sharing IRQ 10 with 0000:00:04.4
May 31 01:53:00 localhost kernel: eth0: VIA VT86C100A Rhine at 0xd800, 00:50:ba:c3:4f:50, IRQ 10.
May 31 01:53:00 localhost kernel: eth0: MII PHY found at address 8, status 0x782d advertising 05e1 Link 45e1.

lspci -v give
0000:00:06.0 Ethernet controller: VIA Technologies, Inc. VT86C100A [Rhine] (rev 06)
        Subsystem: D-Link System Inc DFE-530TX rev A
        Flags: bus master, medium devsel, latency 64, IRQ 10
        I/O ports at d800 [size=128]
        Memory at effff680 (32-bit, non-prefetchable) [size=128]
        Expansion ROM at effd0000 [disabled] [size=64K]

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-386
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)

Versions of packages kernel-image-2.6.8-2-k7 depends on:
ii  coreutils [fileutils]         5.2.1-2    The GNU core utilities
ii  initrd-tools           tools to create initrd image for p
ii  module-init-tools             3.2-pre1-2 tools for managing Linux kernel mo

-- no debconf information

Received: (at 311357-close) by bugs.debian.org; 17 Dec 2005 05:33:10 +0000
>From katie@ftp-master.debian.org Fri Dec 16 21:33:10 2005
Return-path: <katie@ftp-master.debian.org>
Received: from katie by spohr.debian.org with local (Exim 4.50)
	id 1EnUeG-00008z-Ps; Fri, 16 Dec 2005 21:30:24 -0800
From: Simon Horman <horms@debian.org>
To: 311357-close@bugs.debian.org
X-Katie: $Revision: 1.17 $
Subject: Bug#311357: fixed in kernel-source-2.6.8 2.6.8-16sarge1
Message-Id: <E1EnUeG-00008z-Ps@spohr.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Fri, 16 Dec 2005 21:30:24 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-5.0 required=4.0 tests=BAYES_01,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 6

Source: kernel-source-2.6.8
Source-Version: 2.6.8-16sarge1

We believe that the bug you reported is fixed in the latest version of
kernel-source-2.6.8, which is due to be installed in the Debian FTP archive:

  to pool/main/k/kernel-source-2.6.8/kernel-doc-2.6.8_2.6.8-16sarge1_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.diff.gz
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1.dsc
  to pool/main/k/kernel-source-2.6.8/kernel-source-2.6.8_2.6.8-16sarge1_all.deb
  to pool/main/k/kernel-source-2.6.8/kernel-tree-2.6.8_2.6.8-16sarge1_all.deb

A summary of the changes between this version and the previous one is

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 311357@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
Simon Horman <horms@debian.org> (supplier of updated kernel-source-2.6.8 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)

Hash: SHA1

Format: 1.7
Date: Mon, 15 Aug 2005 18:51:34 +0900
Source: kernel-source-2.6.8
Binary: kernel-source-2.6.8 kernel-doc-2.6.8 kernel-tree-2.6.8 kernel-patch-debian-2.6.8
Architecture: source all
Version: 2.6.8-16sarge1
Distribution: stable-security
Urgency: high
Maintainer: Debian kernel team <debian-kernel@lists.debian.org>
Changed-By: Simon Horman <horms@debian.org>
 kernel-doc-2.6.8 - Linux kernel specific documentation for version 2.6.8
 kernel-patch-debian-2.6.8 - Debian patches to Linux 2.6.8
 kernel-source-2.6.8 - Linux kernel source for version 2.6.8 with Debian patches
 kernel-tree-2.6.8 - Linux kernel source tree for building Debian kernel images
Closes: 309308 311357 317286 321401 322237 322339 323059
 kernel-source-2.6.8 (2.6.8-16sarge1) stable-security; urgency=high
   [ Dann Frazier ]
   * mckinley_icache.dpatch:
     [Security] Fix a cache coherency bug unearthed by a new ia64 processor,
     codenamed Montecito.  This bug causes data corruption that has manifested
     itself in kernel hangs and userspace crashes, and causes d-i to fail.
     Reference: http://www.intel.com/cd/ids/developer/asmo-na/eng/215766.htm
     N.B: I have marked this as security as it seems that it would
     be trivial to construct a user-space DoS - Simon Horman.
   [ Simon Horman ]
   # Excluded from security-only release
   # * drivers-net-via-rhine-wol-oops.dpatch (removed):
   #   This patch breaks the via-rhine driver and 2.6.8 and is
   #   completely bogus for this version of the kernel
   #   (closes: #311357)
   * arch-x86_64-kernel-ptrace-boundary-check.dpatch
     [Security, x86_64] Don't allow accesses below register frame in ptrace
     See CAN-2005-1763.
   * arch-x86_64-kernel-ptrace-canonical-rip-1.dpatch
     [Security, x86_64] This works around an AMD Erratum by
     checking if the ptrace RIP is canonical.
     See CAN-2005-1762
   * arch-x86_64-kernel-ptrace-canonical-rip-2.dpatch
     [Security, x86_64] Fix canonical checking for segment registers in ptrace
     See CAN-2005-0756
   * arch-x86_64-kernel-smp-boot-race.dpatch
     [Security, x86_64] Keep interrupts disabled during smp bootup
     This avoids a race that breaks SMP bootup on some machines.
   * arch-x86_64-mm-ioremap-page-lookup.dpatch
     [Security, x86_64] Don't look up struct page pointer of physical address
     in iounmap as it may be in a memory hole not mapped in mem_map and that
     causes the hash lookup to go off to nirvana.
   # Excluded from security-only release
   # * drivers-media-vidio-bttv-vc100xp-detect.dpatch
   #   Allow Leadtek WinFast VC100 XP cards to work.
   * fs-exec-ptrace-core-exec-race.dpatch
     [Security] Fix race between core dumping and exec with shared mm
   * fs-exec-ptrace-deadlock.dpatch
     [Security] Fix coredump_wait deadlock with ptracer & tracee on shared mm
   * fs-exec-posix-timers-leak-1.dpatch,
     [Security] fs-exec-posix-timers-leak-2.dpatch
     Make exec clean up posix timers.
   * fs-hfs-oops-and-leak.dpatch
     [Security] Fix a leak in HFS and HFS+
     Fix an oops that occurs when an attempt is made to
     mount a non-hfs filesystem as HFS+.
     N.B: Marked as security as users may have mount privelages.
   # Excluded from security-only release
   # * fs-jbd-checkpoint-assertion.dpatch
   #   Fix possible false assertion failure in log_do_checkpoint(). We might fail
   #   to detect that we actually made a progress when cleaning up the checkpoint
   #   lists if we don't retry after writing something to disk.
   * mm-mmap-range-test.dpatch
     [Security] Make sure get_unmapped_area sanity tests are done regardless of
     wheater MAP_FIXED is set or not.
     See CAN-2005-1265
   # Excluded from security-only release
   # * mm-rmap-out-of-bounds-pte.dpatch
   #   Stop try_to_unmap_cluster() passing out-of-bounds pte to pte_unmap()
   * net-bridge-netfilter-etables-smp-race.dpatch
     [Security] The patch below fixes an smp race that happens on such
     systems under heavy load.
   Excluded from security-only release
   * net-bridge-mangle-oops-1.dpatch, net-bridge-mangle-oops-2.dpatch
     Fix oops when mangling and brouting and tcpdumping packets
     Needed for net-bridge-forwarding-poison-1.dpatch
   * net-bridge-forwarding-poison-2.dpatch,
     [Security] Avoid poisoning of the bridge forwarding table by frames that
     have been dropped by filtering. This prevents spoofed source addresses on
     hostile side of bridge from causing packet leakage, a small but possible
     security risk.
   # Excluded from security-only release
   # * net-ipv4-netfilter-ip_queue-deadlock.dpatch
   #   Fix deadlock with ip_queue and tcp local input path.
   * [Security] net-rose-ndigis-verify.dpatch
     Verify ndigis argument of a new route.
   * sound-usb-usbaudio-unplug-oops.dpatch
     [Security] Prevent oops & dead keyboard on usb unplugging while the device
     is being used.
   * net-ipv4-ipvs-conn_tab-race.dpatch
     [Security] Fix race condition on ip_vs_conn_tab list modification
   # Excluded from security-only release
   # * asm-i386-mem-clobber.dpatch:
   #   Make sure gcc doesn't reorder memory accesses in strncmp and friends on
   #   i386.
   # Excluded from security-only release
   # * drivers-acpi-pci_irq-elcr.dpatch:
   #   Make sure we call acpi_register_gsi() even for default PCI interrupt
   #   assignment. That's the part that keeps track of the ELCR register, and we
   #   want to make sure that the PCI interrupts are properly marked level/low.
   * asm-i386-mem-clobber.dpatch:
     Make sure netlink_autobind() propagates the error return from
     netlink_insert().  Otherwise, callers will not see the error as they
     should and thus try to operate on a socket with a zero pid, which is very
   * fs-ext3-64bit-offset.dpatch
     [Security] Incorrect offset checks for ext3 xattr on 64 bit architectures
     an lead to a local DoS.
     See CAN-2005-0757. (see: #311164).
   * arch-x86_64-mm-mmap.dpatch
     [Security, x86_64] Compat mode program can hang kernel
     See CAN-2005-1765.
   * arch-ia64-ptrace-getregs-putregs.dpatch
     [Security, ia64] Fix unchecked user-memory accesses in ptrage_getregs()
     and ptrace_setregs.
   * arch-ia64-ptrace-restore_sigcontext.dpatch
     [Security, ia64] Fix to prevent users from using ptrace to set the pl field
     of the ar.rsc reginster to any value, leading to the
     ability to overwrite kernel memory.
     Note, this patch requires the arch-ia64-ptrace-getregs-putregs.dpatch
     patch to apply cleanly.
     See CAN-2005-1761.
   # Excluded from security-only release
   # * Makefile-gcc-3.3.dpatch, control
   #   Build with gcc-3.3, as gcc-4.0, now the dedault in unstable,
   #   fails to build this source. As this tree is primarily
   #   intended for use with sarge, there seems little point
   #   in putting in gcc-4.0 fixes, but at the same time,
   #   there is some value in being able to use it with unstable.
   #   (Closes: #323059)
   [ dann frazier ]
   * Merge in applicable fixes from
      - [Security] ppc32-time_offset-misuse.dpatch
      # Excluded from security-only release - v4l-cx88-hue-offset-fix.dpatch
      # Excluded from security-only release - tty_ldisc_ref-return-null-check.dpatch
   * Merge in applicable fixes from
      - [Security] netfilter-NAT-memory-corruption.dpatch
      # Excluded from security-only release - netfilter-deadlock-ip6_queue.dpatch
      - [Security] ipsec-array-overflow.dpatch See CAN-2005-2456
        (See: #321401) (Closes: #321401)
      - [Security] netfilter-ip_conntrack_untracked-refcount.dpatch
      - [Security] sys_get_thread_area-leak.dpatch
      # Excluded from security-only release - rocket_c-fix-ldisc-ref-count.dpatch
      # Excluded from security-only release - early-vlan-fix.dpatch
   [ Simon Horman ]
   * fs_ext2_ext3_xattr-sharing.dpatch
     [Security] Xattr sharing bug
     See http://lists.debian.org/debian-kernel/2005/08/msg00238.html
   * vlan-mii-ioctl.dpatch
     [Security] MII ioctl pass through was passing the wrong device.
     See http://lists.osdl.org/pipermail/bridge/2004-September/000638.html
     See CAN-2005-2548 (Closes: #309308)
   * fs-sysfs-read-write-race.dpatch
     [Security] Fix race in sysfs_read_file() and sysfs_write_file()
     that can lead to a user-space DoS.
     See CAN-2004-2302 (Closes: #322339)
   * net-ipv4-netfilter-ip_recent-last_pkts.dpatch
     [Security] Fixes remote DoS when using ipt_recent on a 64 bit machine.
     (Closes: #322237)
   # Excluded from security-only release
   # * drivers-sata-promise-sataii_tx2_tx4.dpatch
   #   Add SATAII TX2 and TX2/TX4 support to sata promise driver
   #   (Closes: #317286)
   [ Frederik Schüler ]
   * arch-x86_64-mm-ioremap-page-lookup-fix.dpatch
     Add build fix for arch-x86_64-mm-ioremap-page-lookup.dpatch
   [ Simon Horman ]
   * arch-x86_64-kernel-stack-faults.dpatch
     [Security, x86_64] Disable exception stack for stack faults
     See CAN-2005-1767
   * linux-zlib-fixes.dpatch
     [Security] Fix security bugs in the Linux zlib implementations.
     See CAN-2005-2458, CAN-2005-2459
   # Excluded from security-only release
   # * zisofs.dpatch
   #   Check input buffer size in zisofs
   #   From
   # Excluded from security-only release
   # * module-per-cpu-alignment-fix.dpatch
   #   Module per-cpu alignment cannot always be met
   #  From
 37a61dc966c032d1529e2c2a524c9cfa 1001 devel optional kernel-source-2.6.8_2.6.8-16sarge1.dsc
 cd72f4d2eb2309a2d77d2ec7a3471c7c 961237 devel optional kernel-source-2.6.8_2.6.8-16sarge1.diff.gz
 309f32838373e76c9b61be0e6c191252 1007230 devel optional kernel-patch-debian-2.6.8_2.6.8-16sarge1_all.deb
 65dca34768d7aa10074845d9b2f20431 34934446 devel optional kernel-source-2.6.8_2.6.8-16sarge1_all.deb
 5b04fd03ede3ae235a03624dc53e2026 32120 devel optional kernel-tree-2.6.8_2.6.8-16sarge1_all.deb
 b7388d2256a4396d2da938a687b3ab9b 6179472 doc optional kernel-doc-2.6.8_2.6.8-16sarge1_all.deb

Version: GnuPG v1.4.2 (GNU/Linux)


Reply to: