Solved

Ultra DMA66 under Linux

Posted on 2000-04-19
4
315 Views
Last Modified: 2010-04-20
Does anyone know if there is a kernel patch available that enables DMA66 from a hard drive under Linux.   I know the latest stable kernel only supports Ultra DMA33.
0
Comment
Question by:cliffhanger121599
  • 2
  • 2
4 Comments
 
LVL 1

Expert Comment

by:Ted22
ID: 2732664
There are some patches available, but you must get one for your controler. Find out what controler you have. If a patch is available, download it. Then get the latest kernel from http://www.kernel.org/. You need a good, unmodified kernel to patch. RH kernel is not.

The best place to find out how to do this is http://linuxdoc.org/.

I have an abit motherboard with a highpoint ata66 and it is working for me.

If you have partition magic 4.0 or newer and keep /boot and / separate you can load on ata33, patch and compile. Copy / to ata66, add it to lilo and it will boot. That's what I did. Then lilo from / on ata66 and delete / on ata33.

Or you can plug the drive into ata33, patch, and then plug into ata66.
0
 

Author Comment

by:cliffhanger121599
ID: 2734530
Thanks, can you point me in the direction of the patch sites, i know of the /pub/linux/people/kernel/hendrick site, but there are obviously others?   When you talk of a controller, is that offboard, i.e.a plug in card?   I have an onboard AMD Irongate controller which could be a problem.
0
 
LVL 1

Accepted Solution

by:
Ted22 earned 10 total points
ID: 2735396
http://download.sourceforge.net/pub/linux/kernel/people/hedrick/

This patch is newer than the one I have.
I gave you bad info because this is the only patch for linux I know of,try it.
I was thinking windows2000, which believe it or not has an ata66 problem that must be patched.Be sure you have kernel 2.2.14. The odd numbers are not stable. If you patch and it won't work, I have ide.2.2.14.20000124.patch. I can email it to you.
0
 

Author Comment

by:cliffhanger121599
ID: 2736352
many thanks
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

You ever wonder how to backup Linux system files just like Windows System Restore?  Well you can use Timeshift in Linux to perform those similar action.  This tutorial will show you how to backup your system files and keep regular intervals. Note…
The purpose of this article is to demonstrate how we can use conditional statements using Python.
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now