Solved

Problem to install Linux on EISA Computer

Posted on 1997-12-11
4
180 Views
Last Modified: 2013-12-15
I have a Siemens Nixdorf PC5E

This machine have an EISA architecture whit two onboard
scsi controllers ( NCR57C710 in 2 chips )

When i try a kernel with NCR53C7XX , it doesn't works
When i try a kernel with EATA_DMA , it doesn't works
When i try a kernel whit EATA_Generic , it doesn't works

I will try now with the last kernel ( 2.1.71 ) , peraps it will be good ?

If someone have any idea ....
0
Comment
Question by:sfavre
  • 2
4 Comments
 
LVL 2

Expert Comment

by:frowijn
ID: 1630951
The scsi bus is defined at i/o base adresses and interupt requests, linux support only the i/o bases of 330 and 334 for scsi devices, i think that's your problem, look at the hardware device and configure it so that the i/o base stands at 334 (best) or else 330 (often your netcard is at 330), so it's best to set it on 334, let linux autoprobe your scsi device and probaly will detect this !, if the problem sustains, i will check my linux host on what it says of your scsi devices, try the above first, if it's fails, contact me, then i will give you the right adresses !

Regards
Oscar Frowijn

0
 

Author Comment

by:sfavre
ID: 1630952
I can't redefine the io-port of the scsi card, and if I look into the kernel source, i can't find the io-port used by Linux.
0
 

Expert Comment

by:matpae
ID: 1630953
All most you can change the IO of your NCR-SCSI with a jumper on the board or in the EISA-setup
0
 
LVL 2

Accepted Solution

by:
frowijn earned 200 total points
ID: 1630954
go to the /usr/src/linux/drivers/scsi
look at ncr*.c files and open them, there you can find on what i/o base the card probes, change the adress according to your own address and save the file, rebuild your kernel with the ncr devices install the lilo again and reboot !

Maybe this helps a bit !
Oscar
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Linux haproxy: stop temporary haproxy service 9 47
Ubuntu Apache Webserver - File Permissions 5 59
Linux FTP Error 5 33
HOw To Install Docker on VMware Workstation 19 176
Daily system administration tasks often require administrators to connect remote systems. But allowing these remote systems to accept passwords makes these systems vulnerable to the risk of brute-force password guessing attacks. Furthermore there ar…
Fine Tune your automatic Updates for Ubuntu / Debian
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question