Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

AHA-2940 and linux kernel 2.0.32

Posted on 1997-12-13
1
289 Views
Last Modified: 2013-12-15
I recently installed kernel 2.0.32 (Redhat 5.0) and I
noticed different messages when booting up:

Warning: detected auto-termination please verify
driver detected settings and use manual termination
if necessary

Does anyone know what the cause/solution to this
problem may be??

I think this may also be giving me problems with my
CD-Writer which dies when trying to write a CD.  
The writer is the last device on the SCSI chain,
i.e. it has physical termination.  When I use
an older kernel (2.0.18) which doesn't produce the
same warning messages, the CD-Write seems to
work fine.
                        Mark
0
Comment
Question by:lumsden
1 Comment
 
LVL 1

Accepted Solution

by:
c4lv1n earned 100 total points
ID: 1631007
Looks like Linux 2.0.32 does not want a controller to auto-terminate itself. The adaptec AHA2940 has got a feature called auto-termination. this means that the controller is able to detect 'on the fly' if it is at the end of a local scsi cable and then terminating itself with an active termination circuit enabled by the controller-bios. you can switch that off by entering the bios-setup utility of your 2940 via entering ctrl-A or something like that at system startup and before detecting scsi-devices. look at the menus and turn off auto-termination. this should fix your problem.
Note: you do not need to terminate your adaptec 2940 by hand if it resides at one end of your scsi-cable AND auto-termination is ENABLED. but if you turn off the auto-termination you MUST enable the termination manually in the controller-bios. Optionally an external active (!) terminator should do.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
ifconfig 4 69
android secure ftp 3 52
IP 10.0.1.2 / 255.0.0.0 61 56
I am sending emails to my new email / server nothing is returned but nothing is received. 11 55
Introduction We as admins face situation where we need to redirect websites to another. This may be required as a part of an upgrade keeping the old URL but website should be served from new URL. This document would brief you on different ways ca…
Google Drive is extremely cheap offsite storage, and it's even possible to get extra storage for free for two years.  You can use the free account 15GB, and if you have an Android device..when you install Google Drive for the first time it will give…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question