Re: WARNING : kernel 2.6.11.7 (others) kills megaraid 4e/Si dead

2005-07-07 Thread Jussi Hamalainen

On Wed, 6 Jul 2005, Thomas Backlund wrote:


I could check the firmware versions if you want.


Yes thanks, please do.


megaraid: fw version:[516A] bios version:[H418]
megaraid: fw version:[513O] bios version:[H418]

At least these versions seem to work just fine.

--
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

Re: WARNING : kernel 2.6.11.7 (others) kills megaraid 4e/Si dead

2005-07-07 Thread Jussi Hamalainen

On Wed, 6 Jul 2005, Thomas Backlund wrote:


I could check the firmware versions if you want.


Yes thanks, please do.


megaraid: fw version:[516A] bios version:[H418]
megaraid: fw version:[513O] bios version:[H418]

At least these versions seem to work just fine.

--
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

Re: WARNING : kernel 2.6.11.7 (others) kills megaraid 4e/Si dead

2005-07-06 Thread Jussi Hamalainen

On Tue, 5 Jul 2005, Chris Wright wrote:


Any news on this matter?
I hvr a PE1850 waiting for kernel upgrade, but I'm afraid to do so now...

I can't break my box with tests since it's in active use...
For now I'm running a 2.6.8.1 based kernel on the box...


Last known good one (that Andy tested) was 2.6.10.  His was the only
report I've seen, and I haven't found any more details on it.


I have several PE1850s running 2.6.11.10 and above. I have never had 
a megaraid controller die on me. This might be something related to a 
particular firmware version or setup. I could check the firmware 
versions if you want.


--
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

Re: WARNING : kernel 2.6.11.7 (others) kills megaraid 4e/Si dead

2005-07-06 Thread Jussi Hamalainen

On Tue, 5 Jul 2005, Chris Wright wrote:


Any news on this matter?
I hvr a PE1850 waiting for kernel upgrade, but I'm afraid to do so now...

I can't break my box with tests since it's in active use...
For now I'm running a 2.6.8.1 based kernel on the box...


Last known good one (that Andy tested) was 2.6.10.  His was the only
report I've seen, and I haven't found any more details on it.


I have several PE1850s running 2.6.11.10 and above. I have never had 
a megaraid controller die on me. This might be something related to a 
particular firmware version or setup. I could check the firmware 
versions if you want.


--
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

Re: CPU overheat with 2.2

2001-05-17 Thread Jussi Hamalainen

On Thu, 17 May 2001, Simon Richter wrote:

> CPU is a Pentium 166 MMX on an Asus TX97 mainboard, ISA cards are a 3c509
> and a Soundblaster.

The Asus TX97 is known to be a CPU toaster. I've replaced dozens of
them because of overheating problems. I don't know why the problem
seems to come up with Linux though.

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: CPU overheat with 2.2

2001-05-17 Thread Jussi Hamalainen

On Thu, 17 May 2001, Simon Richter wrote:

 CPU is a Pentium 166 MMX on an Asus TX97 mainboard, ISA cards are a 3c509
 and a Soundblaster.

The Asus TX97 is known to be a CPU toaster. I've replaced dozens of
them because of overheating problems. I don't know why the problem
seems to come up with Linux though.

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: lockd trouble

2001-04-10 Thread Jussi Hamalainen

On Tue, 10 Apr 2001, Jussi Hamalainen wrote:

>program vers proto   port
> 102   tcp111  portmapper
> 102   udp111  portmapper
> 1000211   udp   1024  nlockmgr
> 1000213   udp   1024  nlockmgr
> 151   udp686  mountd
> 152   udp686  mountd
> 151   tcp689  mountd
> 152   tcp689  mountd
> 132   udp   2049  nfs
> 132   tcp   2049  nfs

Duhh. Obviously I should have read the documentation before bashing
my head against the wall. I wasn't running statd. Got it working now,
sorry about that.

I do have a question about lockd. How do I get it back if I need
to restart portmap? Running rpc.lockd doesn't seem to have any
effect whatsoever on the listed rpc services and I can't just
reload the module since nfs depends on it.

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



lockd trouble

2001-04-10 Thread Jussi Hamalainen

I have two PCs running Slackware 7.1. I can't get lockd to work
properly with NFS:

Apr 10 21:03:59 sputnik kernel: nsm_mon_unmon: rpc failed, status=-93
Apr 10 21:03:59 sputnik kernel: lockd: cannot monitor xxx.xxx.xxx.xxx
Apr 10 21:03:59 sputnik kernel: lockd: failed to monitor xxx.xxx.xxx.xxx

Yet rpcinfo -p gives the following:

magellan:~$ rpcinfo -p mir
   program vers proto   port
102   tcp111  portmapper
102   udp111  portmapper
1000211   udp   1024  nlockmgr
1000213   udp   1024  nlockmgr
151   udp686  mountd
152   udp686  mountd
151   tcp689  mountd
152   tcp689  mountd
132   udp   2049  nfs
132   tcp   2049  nfs
magellan:~$ rpcinfo -p sputnik
   program vers proto   port
102   tcp111  portmapper
102   udp111  portmapper
1000211   udp   1024  nlockmgr
1000213   udp   1024  nlockmgr
151   udp721  mountd
152   udp721  mountd
151   tcp724  mountd
152   tcp724  mountd
132   udp   2049  nfs
132   tcp   2049  nfs

The NFS share in question is mounted as locking. Every time procmail
tries to get a kernel lock for a file in my home directory, I get an
error as described above. Both boxes are running exactly the same
2.2.19 kernel. Am I doing something wrong or is this a bug?

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



lockd trouble

2001-04-10 Thread Jussi Hamalainen

I have two PCs running Slackware 7.1. I can't get lockd to work
properly with NFS:

Apr 10 21:03:59 sputnik kernel: nsm_mon_unmon: rpc failed, status=-93
Apr 10 21:03:59 sputnik kernel: lockd: cannot monitor xxx.xxx.xxx.xxx
Apr 10 21:03:59 sputnik kernel: lockd: failed to monitor xxx.xxx.xxx.xxx

Yet rpcinfo -p gives the following:

magellan:~$ rpcinfo -p mir
   program vers proto   port
102   tcp111  portmapper
102   udp111  portmapper
1000211   udp   1024  nlockmgr
1000213   udp   1024  nlockmgr
151   udp686  mountd
152   udp686  mountd
151   tcp689  mountd
152   tcp689  mountd
132   udp   2049  nfs
132   tcp   2049  nfs
magellan:~$ rpcinfo -p sputnik
   program vers proto   port
102   tcp111  portmapper
102   udp111  portmapper
1000211   udp   1024  nlockmgr
1000213   udp   1024  nlockmgr
151   udp721  mountd
152   udp721  mountd
151   tcp724  mountd
152   tcp724  mountd
132   udp   2049  nfs
132   tcp   2049  nfs

The NFS share in question is mounted as locking. Every time procmail
tries to get a kernel lock for a file in my home directory, I get an
error as described above. Both boxes are running exactly the same
2.2.19 kernel. Am I doing something wrong or is this a bug?

-- 
-=[ Count Zero / TBH - Jussi Hmlinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



Re: lockd trouble

2001-04-10 Thread Jussi Hamalainen

On Tue, 10 Apr 2001, Jussi Hamalainen wrote:

program vers proto   port
 102   tcp111  portmapper
 102   udp111  portmapper
 1000211   udp   1024  nlockmgr
 1000213   udp   1024  nlockmgr
 151   udp686  mountd
 152   udp686  mountd
 151   tcp689  mountd
 152   tcp689  mountd
 132   udp   2049  nfs
 132   tcp   2049  nfs

Duhh. Obviously I should have read the documentation before bashing
my head against the wall. I wasn't running statd. Got it working now,
sorry about that.

I do have a question about lockd. How do I get it back if I need
to restart portmap? Running rpc.lockd doesn't seem to have any
effect whatsoever on the listed rpc services and I can't just
reload the module since nfs depends on it.

-- 
-=[ Count Zero / TBH - Jussi Hmlinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



LFS patch for 2.2.18

2001-03-16 Thread Jussi Hamalainen

Where can I get the LFS patch for 2.2.18? Www.scyld.com doesn't
seem to be carrying it anymore.

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/



RE: ipchains blocking port 65535

2001-01-17 Thread Jussi Hamalainen

On Wed, 17 Jan 2001, Tony Gale wrote:

> It looks like this is due to the odd way in which ipchains handles
> fragments. Try:
>
> echo 1 > /proc/sys/net/ipv4/ip_always_defrag

Thanks, this seems to do the trick. Does this oddity still exist
in 2.4?

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



ipchains blocking port 65535

2001-01-17 Thread Jussi Hamalainen

There seems to be a bug in ipchains. Matching port 65535 seems to
always fail. If I set the chain policy to REJECT or DENY and then
add a rule that accepts TCP to/from ports 0:65535, packets going to
port 65535 will still be caught by the kernel. Is there a fix for
this? It's driving me nuts. The firewall box is a 486 with 3 NICs and
is running kernel 2.2.18 vanilla.

Here is a piece of the kernel log:

Jan 17 15:13:03 galileo kernel: Packet log: forward REJECT eth0
PROTO=6 213.173.130.69:65535 xxx.xxx.xxx.xxx:65535 L=44 S=0x00
I=16815 F=0x00B6 T=56 (#25)
Jan 17 15:15:03 galileo kernel: Packet log: forward REJECT eth0
PROTO=6 213.173.130.69:65535 xxx.xxx.xxx.xxx:65535 L=44 S=0x00
I=19969 F=0x00B6 T=56 (#25)
Jan 17 15:17:03 galileo kernel: Packet log: forward REJECT eth0
PROTO=6 213.173.130.69:65535 xxx.xxx.xxx.xxx:65535 L=44 S=0x00
I=21869 F=0x00B6 T=56 (#25)

And here a piece of my forward chain:

ACCEPT tcp  --  anywhere  myhomenet/27
any ->   1024:65535
ACCEPT udp  --  anywhere  myhomenet/27
any ->   1024:65535

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



ipchains blocking port 65535

2001-01-17 Thread Jussi Hamalainen

There seems to be a bug in ipchains. Matching port 65535 seems to
always fail. If I set the chain policy to REJECT or DENY and then
add a rule that accepts TCP to/from ports 0:65535, packets going to
port 65535 will still be caught by the kernel. Is there a fix for
this? It's driving me nuts. The firewall box is a 486 with 3 NICs and
is running kernel 2.2.18 vanilla.

Here is a piece of the kernel log:

Jan 17 15:13:03 galileo kernel: Packet log: forward REJECT eth0
PROTO=6 213.173.130.69:65535 xxx.xxx.xxx.xxx:65535 L=44 S=0x00
I=16815 F=0x00B6 T=56 (#25)
Jan 17 15:15:03 galileo kernel: Packet log: forward REJECT eth0
PROTO=6 213.173.130.69:65535 xxx.xxx.xxx.xxx:65535 L=44 S=0x00
I=19969 F=0x00B6 T=56 (#25)
Jan 17 15:17:03 galileo kernel: Packet log: forward REJECT eth0
PROTO=6 213.173.130.69:65535 xxx.xxx.xxx.xxx:65535 L=44 S=0x00
I=21869 F=0x00B6 T=56 (#25)

And here a piece of my forward chain:

ACCEPT tcp  --  anywhere  myhomenet/27
any -   1024:65535
ACCEPT udp  --  anywhere  myhomenet/27
any -   1024:65535

-- 
-=[ Count Zero / TBH - Jussi Hmlinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



RE: ipchains blocking port 65535

2001-01-17 Thread Jussi Hamalainen

On Wed, 17 Jan 2001, Tony Gale wrote:

 It looks like this is due to the odd way in which ipchains handles
 fragments. Try:

 echo 1  /proc/sys/net/ipv4/ip_always_defrag

Thanks, this seems to do the trick. Does this oddity still exist
in 2.4?

-- 
-=[ Count Zero / TBH - Jussi Hmlinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: path MTU bug still there?

2000-12-31 Thread Jussi Hamalainen

On Mon, 1 Jan 2001, Lincoln Dale wrote:

> i know that you've said previously that you've increased your MTU beyond
> 1500, but can you validate that it is actually working?

Yup. At least 1500 byte ICMP echo packets get through the tunnel
OK.

> alternatively, ensure that your application is capable of enforcing a MSS
> <1460 if this is shown to not be the case ..

I found a way to work around this problem. I had to tell _ALL_
the hosts on my local network to use an MSS of 576 for the default
route (the GRE tunnel). Thus the packets always fit through without
fragmentation and the problem is gone (but not solved). If someone
has a more elegant solution, please tell me. This one seems to be
poison for the Windows boxes on my network. :I

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: path MTU bug still there?

2000-12-31 Thread Jussi Hamalainen

On Sun, 31 Dec 2000, Mikael Abrahamsson wrote:

> When the linux box does TCP to the outside it'll use the MTU of
> the tunnel (default route is the tunnel) and thus works perfectly
> (since TCP MSS will be set low enough to fit into the tunnel).

In my case I can't access a problematic host even from the router
box.

> Could it be some kind of incompability at the tunnel level that
> make you unable to receive large packets over the tunnel?

Could be. The internet connection is a 64k ISDN link.

> Have you tcpdump:ed to see if the tunnel packets actually make it
> the way they should?

I can't snoop the actual tunnel device, because tcpdump and sniffit
give me an unknown media type error. Here's a tcpdump from the router
box's ethernet device of a HTTP session (using lynx) to
www.doomworld.com:

17:19:46.126297 xxx.xxx.xxx.xxx.1029 > 206.96.221.6.80: S 2549095564:2549095564(0) win 
32120  (DF)
17:19:46.386142 206.96.221.6.80 > xxx.xxx.xxx.xxx.1029: S 1631828281:1631828281(0) ack 
2549095565 win 30660  (DF)
17:19:46.386142 206.96.221.6.80 > xxx.xxx.xxx.xxx.1029: S 1631828281:1631828281(0) ack 
2549095565 win 30660  (DF)
17:19:46.386142 xxx.xxx.xxx.xxx.1029 > 206.96.221.6.80: . ack 1 win 32120 
 (DF)
17:19:46.386142 xxx.xxx.xxx.xxx.1029 > 206.96.221.6.80: P 1:369(368) ack 1 win 32120 
 (DF)
17:19:46.685963 206.96.221.6.80 > xxx.xxx.xxx.xxx.1029: . ack 369 win 30660 
 (DF)
17:19:46.685963 206.96.221.6.80 > xxx.xxx.xxx.xxx.1029: . ack 369 win 30660 
 (DF)

And the connection locks up. This happens every time. I don't have
access to the Cisco so I can't dump traffic on the remote end of
my tunnel.

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



path MTU bug still there?

2000-12-31 Thread Jussi Hamalainen

I have an old 486-box acting as a router. It has two NICs and
an ISDN adapter. The box is connected to my ISP by ISDN link
and has a GRE tunnel running over the ISDN link. The other end
of the tunnel is a Cisco router and the tunnel is the default
route. I'm experiencing problems identical to the classic MTU
problem with IP masquarade where a TCP-connection to/from some
hosts becomes jammed after a few bytes have been sent. The only
difference is that the problem is reproducable also on the router
box itself.

I'm running 2.2.18 vanilla and my firewall rules aren't blocking
ICMP. The ethernet interfaces and the ISDN link have an MTU of
1500 and the GRE tunnel has an MTU of 1514 (courtesy of Cisco).

Has anyone got any bright ideas how to work around this? Would
upgrading to 2.4 fix this?

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



path MTU bug still there?

2000-12-31 Thread Jussi Hamalainen

I have an old 486-box acting as a router. It has two NICs and
an ISDN adapter. The box is connected to my ISP by ISDN link
and has a GRE tunnel running over the ISDN link. The other end
of the tunnel is a Cisco router and the tunnel is the default
route. I'm experiencing problems identical to the classic MTU
problem with IP masquarade where a TCP-connection to/from some
hosts becomes jammed after a few bytes have been sent. The only
difference is that the problem is reproducable also on the router
box itself.

I'm running 2.2.18 vanilla and my firewall rules aren't blocking
ICMP. The ethernet interfaces and the ISDN link have an MTU of
1500 and the GRE tunnel has an MTU of 1514 (courtesy of Cisco).

Has anyone got any bright ideas how to work around this? Would
upgrading to 2.4 fix this?

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: path MTU bug still there?

2000-12-31 Thread Jussi Hamalainen

On Sun, 31 Dec 2000, Mikael Abrahamsson wrote:

 When the linux box does TCP to the outside it'll use the MTU of
 the tunnel (default route is the tunnel) and thus works perfectly
 (since TCP MSS will be set low enough to fit into the tunnel).

In my case I can't access a problematic host even from the router
box.

 Could it be some kind of incompability at the tunnel level that
 make you unable to receive large packets over the tunnel?

Could be. The internet connection is a 64k ISDN link.

 Have you tcpdump:ed to see if the tunnel packets actually make it
 the way they should?

I can't snoop the actual tunnel device, because tcpdump and sniffit
give me an unknown media type error. Here's a tcpdump from the router
box's ethernet device of a HTTP session (using lynx) to
www.doomworld.com:

17:19:46.126297 xxx.xxx.xxx.xxx.1029  206.96.221.6.80: S 2549095564:2549095564(0) win 
32120 mss 1460,sackOK,timestamp 649398[|tcp] (DF)
17:19:46.386142 206.96.221.6.80  xxx.xxx.xxx.xxx.1029: S 1631828281:1631828281(0) ack 
2549095565 win 30660 mss 1460,sackOK,timestamp 91687185[|tcp] (DF)
17:19:46.386142 206.96.221.6.80  xxx.xxx.xxx.xxx.1029: S 1631828281:1631828281(0) ack 
2549095565 win 30660 mss 1460,sackOK,timestamp 91687185[|tcp] (DF)
17:19:46.386142 xxx.xxx.xxx.xxx.1029  206.96.221.6.80: . ack 1 win 32120 
nop,nop,timestamp 649423 91687185 (DF)
17:19:46.386142 xxx.xxx.xxx.xxx.1029  206.96.221.6.80: P 1:369(368) ack 1 win 32120 
nop,nop,timestamp 649423 91687185 (DF)
17:19:46.685963 206.96.221.6.80  xxx.xxx.xxx.xxx.1029: . ack 369 win 30660 
nop,nop,timestamp 91687216 649423 (DF)
17:19:46.685963 206.96.221.6.80  xxx.xxx.xxx.xxx.1029: . ack 369 win 30660 
nop,nop,timestamp 91687216 649423 (DF)

And the connection locks up. This happens every time. I don't have
access to the Cisco so I can't dump traffic on the remote end of
my tunnel.

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



Re: path MTU bug still there?

2000-12-31 Thread Jussi Hamalainen

On Mon, 1 Jan 2001, Lincoln Dale wrote:

 i know that you've said previously that you've increased your MTU beyond
 1500, but can you validate that it is actually working?

Yup. At least 1500 byte ICMP echo packets get through the tunnel
OK.

 alternatively, ensure that your application is capable of enforcing a MSS
 1460 if this is shown to not be the case ..

I found a way to work around this problem. I had to tell _ALL_
the hosts on my local network to use an MSS of 576 for the default
route (the GRE tunnel). Thus the packets always fit through without
fragmentation and the problem is gone (but not solved). If someone
has a more elegant solution, please tell me. This one seems to be
poison for the Windows boxes on my network. :I

-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



ide-disk: set_multmode?

2000-09-25 Thread Jussi Hamalainen

 hdc:hdc: set_multmode: status=0x51 { DriveReady SeekComplete Error }
hdc: set_multmode: error=0x04 { DriveStatusError }
 [PTBL] [523/255/63] hdc1 hdc2

This has been happening at least since 2.2.10. It's probably just
something cosmetic, but shouldn't it still be fixed? Running
vanilla-2.2.16 SMP on i686,

hdc: ST34321A, 4103MB w/128kB Cache, CHS=8894/15/63, (U)DMA

Here's a fix someone on this list suggested some time ago. It seems
to make the symptoms disappear, but I'm not sure wether it fixes the
actual problem. From vanilla-2.2.16:

--- ide-disk.c.orig Tue Sep 26 01:58:58 2000
+++ ide-disk.c  Tue Sep 26 02:00:36 2000
@@ -856,7 +856,7 @@
drive->mult_req = INITIAL_MULT_COUNT;
if (drive->mult_req > id->max_multsect)
drive->mult_req = id->max_multsect;
-   if (drive->mult_req || ((id->multsect_valid & 1) &&
id->multsect))
+   if (drive->mult_req && ((id->multsect_valid & 1) &&
id->multsect))
drive->special.b.set_multmode = 1;
 #else
id->multsect = ((id->max_multsect/2) >
1) ? id->max_multsect : 0;


-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/



ide-disk: set_multmode?

2000-09-25 Thread Jussi Hamalainen

 hdc:hdc: set_multmode: status=0x51 { DriveReady SeekComplete Error }
hdc: set_multmode: error=0x04 { DriveStatusError }
 [PTBL] [523/255/63] hdc1 hdc2

This has been happening at least since 2.2.10. It's probably just
something cosmetic, but shouldn't it still be fixed? Running
vanilla-2.2.16 SMP on i686,

hdc: ST34321A, 4103MB w/128kB Cache, CHS=8894/15/63, (U)DMA

Here's a fix someone on this list suggested some time ago. It seems
to make the symptoms disappear, but I'm not sure wether it fixes the
actual problem. From vanilla-2.2.16:

--- ide-disk.c.orig Tue Sep 26 01:58:58 2000
+++ ide-disk.c  Tue Sep 26 02:00:36 2000
@@ -856,7 +856,7 @@
drive-mult_req = INITIAL_MULT_COUNT;
if (drive-mult_req  id-max_multsect)
drive-mult_req = id-max_multsect;
-   if (drive-mult_req || ((id-multsect_valid  1) 
id-multsect))
+   if (drive-mult_req  ((id-multsect_valid  1) 
id-multsect))
drive-special.b.set_multmode = 1;
 #else
id-multsect = ((id-max_multsect/2) 
1) ? id-max_multsect : 0;


-- 
-=[ Count Zero / TBH - Jussi Hämäläinen - email [EMAIL PROTECTED] ]=-

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Please read the FAQ at http://www.tux.org/lkml/