Solved

How to make old AS/400 SCSI disk work ?

Posted on 1997-08-22
2
466 Views
Last Modified: 2008-03-10
I just unplug two SCSI (I or II ?) hard disk (980 Mb) from
an old IBM AS/400 machine, I tried to connect it with my
Adaptec 2940UW SCSI controller and boot up the linux.
Both controller BIOS and Linux do detect the hard drive as
...but Linux give me a message "520 sector size, unsupport"
and delete that disk entry, why?

aslo, when I go into SCSI BIOS setup, and tried to verify
the disk by using the disk utility....it has a error message
"unable to sense key"....

Can someone give me some recommendation ?
0
Comment
Question by:tlee1
2 Comments
 
LVL 2

Expert Comment

by:jeffa072897
ID: 1626612
Have you checked, rechecked, and checked again the termination?
The 2940UW(because it handles wide and narrow SCSI) can drive you nuts on termination. If your other drive(s) are wide you have to disable the low termination on the controller and make sure ohe end drive on the SCSI 1 cain is terminated. This is documented in the Adaptec manual fairly clear.
Have you done the same with the SCSI ID's for duplicate addressing?
Have you verified that there is only 1 terminated drive(presuming these are all internal drives)?
Try lowering the transfer rate in the BIOS setup for these drives. I think that's why you have the sense key errors.
The Adaptec controller also had a "plug and play" option in the bios for configuring the drives - shut it off. Linux will ultimate thank you for it.

0
 

Accepted Solution

by:
dhaun earned 200 total points
ID: 1626613
The AS/400's OS requires SCSI drives to use a sector size of 520
bytes, like the error message said. Linux (and most everything
else) wants a sector size of 512 bytes. It might be possible to
reformat the drive with a different sector size. Try
http://index.storsys.ibm.com/hddtech/scsi/utility/SCSIMD10.EXE
You'll need to load a DOS ASPI driver first.

0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Linux users are sometimes dumbfounded by the severe lack of documentation on a topic. Sometimes, the documentation is copious, but other times, you end up with some obscure "it varies depending on your distribution" over and over when searching for …
The purpose of this article is to demonstrate how we can upgrade Python from version 2.7.6 to Python 2.7.10 on the Linux Mint operating system. I am using an Oracle Virtual Box where I have installed Linux Mint operating system version 17.2. Once yo…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

822 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question