Solved

Ultra DMA66 under Linux

Posted on 2000-04-19
4
317 Views
Last Modified: 2010-04-20
Does anyone know if there is a kernel patch available that enables DMA66 from a hard drive under Linux.   I know the latest stable kernel only supports Ultra DMA33.
0
Comment
Question by:cliffhanger121599
  • 2
  • 2
4 Comments
 
LVL 1

Expert Comment

by:Ted22
ID: 2732664
There are some patches available, but you must get one for your controler. Find out what controler you have. If a patch is available, download it. Then get the latest kernel from http://www.kernel.org/. You need a good, unmodified kernel to patch. RH kernel is not.

The best place to find out how to do this is http://linuxdoc.org/.

I have an abit motherboard with a highpoint ata66 and it is working for me.

If you have partition magic 4.0 or newer and keep /boot and / separate you can load on ata33, patch and compile. Copy / to ata66, add it to lilo and it will boot. That's what I did. Then lilo from / on ata66 and delete / on ata33.

Or you can plug the drive into ata33, patch, and then plug into ata66.
0
 

Author Comment

by:cliffhanger121599
ID: 2734530
Thanks, can you point me in the direction of the patch sites, i know of the /pub/linux/people/kernel/hendrick site, but there are obviously others?   When you talk of a controller, is that offboard, i.e.a plug in card?   I have an onboard AMD Irongate controller which could be a problem.
0
 
LVL 1

Accepted Solution

by:
Ted22 earned 10 total points
ID: 2735396
http://download.sourceforge.net/pub/linux/kernel/people/hedrick/

This patch is newer than the one I have.
I gave you bad info because this is the only patch for linux I know of,try it.
I was thinking windows2000, which believe it or not has an ata66 problem that must be patched.Be sure you have kernel 2.2.14. The odd numbers are not stable. If you patch and it won't work, I have ide.2.2.14.20000124.patch. I can email it to you.
0
 

Author Comment

by:cliffhanger121599
ID: 2736352
many thanks
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The purpose of this article is to demonstrate how we can use conditional statements using Python.
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now